US Pat. No. 10,769,444

OBJECT DETECTION FROM VISUAL SEARCH QUERIES

GOH SOO SIAH, Singapore ...

1. A method of detecting an object in video and matching the object to one or more products comprising the steps of:a) obtaining video and automatically extracting metadata and attributes of objects in frames and/or portions of frames in the video;
b) segmenting the video based on depicted settings and/or events by comparing contents of consecutive frames for similarities and differences, wherein the video is traversed sequentially to detect a pair of frames or sequence of frames which breach a similarity threshold, wherein a key frame is identified for each segment;
c) compiling segments of same or similar settings and/or events, wherein each segment is tagged with a segment identifier;
d) analysing one or more segments to detect one or more objects, wherein frames and/or portions of frames are compared with defined content in a database populated by aligning known objects and metadata clusters, wherein the metadata is linked to the frames and/or portions of frames by the segment identifier, wherein the location of the detected one or more objects are obtained in each key frame, wherein an object-wise feature vector is generated for each segment;
e) comparing the one or more objects to products;
f) identifying products associated with the one or more objects, wherein a convolutional neural network (CNN) is used;
g) notifying one or more viewers of the products;
wherein a second screen augmentation is used for live or streaming video.

US Pat. No. 10,769,443

DOMINANT TOOL DETECTION SYSTEM FOR SURGICAL VIDEOS

SONY CORPORATION, Tokyo ...

1. A system comprising:one or more processors; and
logic encoded in one or more non-transitory computer-readable storage media for execution by the one or more processors and when executed operable to perform operations comprising:
receiving at least one image frame;
detecting one or more objects in the at least one image frame;
classifying the one or more objects into one or more tool classifications, wherein the one or more objects are one or more tools;
determining if each tool of the one or more tools is non-assistive based on the one or more tool classifications;
determining a handedness of the one or more tools; and
determining a dominant tool from the one or more tools based at least in part on the dominant tool being determined as non-assistive and based at least in part on the handedness of the one or more tools.

US Pat. No. 10,769,442

SCENE CHANGE DETECTION IN IMAGE DATA

AMAZON TECHNOLOGIES, INC....

1. A method comprising:determining a Euclidean distance between a first histogram of a first frame of video data representing an environment and a second histogram of a second frame of the video data;
determining that the Euclidean distance exceeds a threshold value;
determining, in response to the Euclidean distance exceeding the threshold value, a flow value representing changes in the environment represented in a third frame of the video data and a fourth frame of the video data, wherein the flow value is determined based at least in part on a motion vector between a first block of pixels of the third frame of the video data and a second block of pixels of the fourth frame of the video data, and a sum of absolute differences (SAD) between the first block of pixels and the second block of pixels;
determining that the flow value exceeds a flow threshold value; and
transmitting to a remote computing device at least a first portion of the video data subsequent to the first frame based at least in part on the flow value exceeding the flow threshold value.

US Pat. No. 10,769,441

CLUSTER BASED PHOTO NAVIGATION

Google LLC, Mountain Vie...

1. A method for organizing and navigating image clusters comprising:accessing, by one or more processing devices, a set of captured images;
detecting, by the one or more processing devices, whether images within the set of captured images satisfy a predetermined pattern;
grouping, by the one or more processing devices, the images in the set of captured images into one or more clusters according to the detected predetermined pattern;
receiving, by the one or more processing devices, a request to display a first cluster of the one or more clusters of captured images;
determining, by the one or more processing devices, from the images within the first cluster, a set of neighboring captured images that are within a predetermined proximity to the first captured image;
assigning, by the one or more processing devices, one or more neighboring images of the first captured image from the set of neighboring captured images;
selecting, by the one or more processing devices in response to the request, a first captured image from the first cluster to display; and
providing the first captured image from the first cluster for display.

US Pat. No. 10,769,440

VISUAL-INERTIAL POSITIONAL AWARENESS FOR AUTONOMOUS AND NON-AUTONOMOUS TRACKING

Trifo, Inc., Santa Clara...

1. A system including:two or more mobile autonomous units, including a first autonomous unit and a second autonomous unit, each having a mobile platform and disposed thereon:
a visual sensor comprising cameras providing capturing images including at least two frames, thereby providing a 360-degrees view about a centerline of the mobile platform; and at least one of:
a multi-axis inertial measuring unit (IMU) sensor capable of providing measurement of at least acceleration using one or more accelerometers; and
a global positioning system (GPS) receiver; and
a map server, including a processor and a coupled memory storing instructions to build 3D maps of surrounding scenery encountered by the autonomous units using information sourced by the autonomous units, which instructions when executed by the processor perform:
receiving a set of keyrigs from a first autonomous unit, each keyrig comprising visual information of surrounding scenery captured by the visual sensor of the first autonomous unit and a position of the first autonomous unit where the visual information was captured, the position of the autonomous unit generated using combinations of global positioning system (GPS) receiver, the multi-axis inertial measurement unit (IMU), and visual information of the surrounding scenery by the first autonomous unit during travel from a starting point to an end point;
classifying at least one of one or more objects from the visual information of the surrounding scenery from the set of keyrigs into a set of moving objects and a set of non-moving objects;
selecting a subset of keyrig from the set of keyrigs and determining a sparse 3D mapping of object feature points taken from the visual information of the surrounding scenery from the subset of keyrigs for the set of non-moving objects;
building a 3D map of object feature points from the sparse 3D mapping of object feature points using visual information of the surrounding scenery from the set of keyrigs for the set of non-moving objects, wherein the 3D map is accurate within 20 centimeters; and
providing the 3D map via a communications link to one or more additional autonomous units to guide the one or more additional autonomous units at a future time.

US Pat. No. 10,769,439

SYSTEM AND METHOD FOR FIXED CAMERA AND UNMANNED MOBILE DEVICE COLLABORATION TO IMPROVE IDENTIFICATION CERTAINTY OF AN OBJECT

MOTOROLA SOLUTIONS, INC.,...

1. A method for fixed camera and unmanned mobile device collaboration to improve identification of an object of interest, the method comprising:receiving, at an electronic processing device from a fixed camera, a captured first point of view of a first captured object and determining, with a first level of certainty in a predetermined level of certainty range, that the captured first point of view of the first object matches a first stored object of interest;
causing, by the electronic processing device, a dispatch instruction and intercept information to be wirelessly broadcast for receipt by one or more camera-equipped unmanned mobile vehicles within broadcast range, the intercept information including the determined direction of travel of the first captured object, information sufficient to identify either the first captured object or a vehicle with which the first captured object is travelling, and information identifying a desired second point of view of the first captured object different from the first point of view;
wirelessly receiving, by the electronic processing device, via the one or more camera-equipped unmanned mobile vehicles, a captured second point of view of the first captured object; and
using, by the electronic processing device, the captured second point of view of the first captured object to determine, with a second level of certainty, that the first captured object matches the stored object of interest.

US Pat. No. 10,769,438

AUGMENTED REALITY

SAMSUNG ELECTRONICS COMPA...

1. A system comprising: one or more processors; and a non-transitory memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to:sample a plurality of frames of media content with a sampling frame rate, each frame corresponding to at least part of an image from a scene in a video captured by one or more cameras;
automatically detect one or more objects in at least one of the frames;
for each of the detected objects, automatically associate an annotation corresponding to that object for display with the object, wherein each annotation comprises one or more graphical elements;
determine whether there is global motion of the scene by detecting global changes in the frames corresponding to movement of the one or more cameras;
determine whether there is local object motion by detecting movement of the one or more objects in the frames; and
update each annotation in successive frames at a new sampling frame rate based on the determination that there is global motion and/or local object motion.

US Pat. No. 10,769,437

ADAPTIVE SAMPLING OF TRAINING VIEWS

SEIKO EPSON CORPORATION, ...

1. A non-transitory computer-readable medium storing thereon a computer program that, when executed by one or more processors, performs a method comprising the steps of:(a) receiving, in a memory, feature data sets of (i) a reference object or (ii) a 3D model, each feature data set being obtained from an image captured or generated from a primary set of views within a view range around the reference object or the 3D model,
(b) deriving similarity scores between each pair of adjacent views among the primary set of views using the feature data sets,
(c) sampling a secondary set of views disposed between each pair of the adjacent primary views that have the similarity score being equal to or less than a threshold so that sampling density varies across the view range, and
(d) generating data corresponding to (i) the primary set of views including each pair of the adjacent primary views that have the similarity score being equal to or less than the threshold and (ii) the secondary set of views.

US Pat. No. 10,769,436

MULTIBAND FILTERING IMAGE COLLECTION AND ANALYSIS

Sentera, Inc., Minneapol...

1. An aerial multispectral imagery system comprising: a first multichannel image sensor attached to an aerial vehicle to capture a first multispectral filtered image of a vegetation area;a first multiband optical filter attached to the first multichannel image sensor to filter an image of the vegetation area and provide the first multispectral filtered image of the vegetation area to the first multichannel image sensor; and
a processor to; generate a first image data set based on the captured first multispectral filtered image, the first image data set including data for a first spectral response curve of a first channel having a first spectral region of interest and data for a second spectral response curve of a second channel having a second spectral region of interest;
determine, using the first image data set, a first spectral content in the first spectral region of interest by subtracting from a first channel spectral response a percentage of a second channel spectral response within the second spectral region of interest, where the percentage is a ratio of the first channel spectral response and the second channel spectral response within the second spectral region of interest; and
determine, using the first image data set, a second spectral content in the second spectral region of interest by subtracting from the second channel spectral response a percentage of the first channel spectral response within the first spectral region of interest, where the percentage is a ratio of the second channel spectral response and the first channel spectral response within the first spectral region of interest.

US Pat. No. 10,769,435

METHOD OF AVOIDING BIOMETRICALLY IDENTIFYING A SUBJECT WITHIN AN IMAGE

FotoNation Limited, Galw...

1. A method of image processing comprising:with an imaging device, acquiring an image of a subject, the image including a face region of the subject;
with an image processing device:
identifying an iris region within the face region;
analyzing the iris region to identify a first iris region;
determining that the first iris region is capable of providing a first iris pattern that enables the subject to be biometrically identified by the first iris pattern;
determining a second iris region for the first iris region, the second iris region including a substitute iris pattern distinct from the first iris pattern and avoiding the subject to be biometrically identified,
wherein determining the second iris region includes:
retrieving a standard iris region from a data storage device, the standard iris region including a characteristic included within the first iris region;
subtracting a first blurred image of the first iris region from the first iris region to produce a detail first iris region;
subtracting a second blurred image of the standard iris region from the standard iris region to produce a detail standard iris region;
adding the detail standard iris region to the detail first iris region to create the second iris region for the first iris region;
extracting a first iris code from the substitute iris pattern;
comparing the first iris code with a second iris code from the first iris pattern; and
reconstructing the first iris region within the image based on the second iris region.

US Pat. No. 10,769,434

MIRROR ASSEMBLY INCORPORATING A SCANNING APPARATUS

GENTEX CORPORATION, Zeel...

1. A scanning apparatus comprising:an electrochromic element comprising:
a first substrate comprising a first surface and a second surface;
a second substrate comprising a third surface and a fourth surface,
wherein the first substrate and the second substrate form a cavity wherein a transflective dielectric coating comprising alternating layers of a plurality of high refractive index (H) materials and a plurality of low refractive index (L) materials is disposed on one of the third surface and the fourth surface; and
an electrochromic medium contained in the cavity;
an image sensor directed toward the fourth surface and configured to capture image data of an object through the electrochromic element;
a light source directed toward the fourth surface and configured to transmit an emission comprising detection light an a near infrared spectrum comprising a wavelength of light from 800 nm to 940 nm through the electrochromic element, wherein the image sensor is configured to capture the image data to identify a subject in the image data; and
a display disposed proximate the fourth surface, wherein the display is configured to present the image data output from the first surface, wherein the image data demonstrates the object in the image data configured to identify the subject and the image data output from the first surface is transmitted in a visible range of wavelengths comprising an average visible transmittance of at least 20% over a visible range of wavelengths from 400 nm to 700 nm, and wherein a near infrared transmittance of the detection light through the electrochromic element is greater than the average visible transmittance through the electrochromic element.

US Pat. No. 10,769,433

METHOD FOR BIOMETRIC BASED SIGNING OF DOCUMENT

Mastercard International ...

1. A method for biometric based signing of documents comprising:receiving, by a user terminal via an authentication platform from a requestor, a signature request associated to a document, the signature request comprising preferences defining a combination of at least one portion of the document to present for a minimum document presentation time and at least two signing positions, and further comprising a type of biometric signing required for valid signing of the document;
displaying, by the user terminal on a display, a first portion of the document to a user for the minimum document presentation time;
presenting, by the user terminal on the display, a request for the type of biometric signing based on the preferences to associate with the first portion of the document;
matching, by the user terminal in response to the request for the type of biometric signing, biometric samples provided by the user to a biometric template created during an enrollment process;
repeating, by the user terminal, the displaying, presenting and matching steps for at least a second signing position based on the preferences;
determining, by the user terminal, that the preferences associated with the biometric signature requests have been satisfied;
creating, by the user terminal, at least one signing receipt;
associating, by the user terminal, the at least one signing receipt to the document; and
transmitting, by the user terminal via the authentication platform to the requestor, at least one of the document and the signing receipt confirming successful signing of the document.

US Pat. No. 10,769,432

AUTOMATED PARAMETERIZATION IMAGE PATTERN RECOGNITION METHOD

DRVISION TECHNOLOGIES LLC...

1. A computerized automated parameterization image pattern detection method, comprising the steps of:a) inputting learning image and labeled region data into electronic storage means;
b) performing a morphological metrics learning by computing means using the labeled region data to generate at least one morphological metric;
c) performing an intensity metrics learning by computing means using the learning image and the labeled region data to generate at least one intensity metric; and
d) performing a population learning by computing means using the at least one morphological metric and the at least one intensity metric to generate at least one learned pattern detection parameter.

US Pat. No. 10,769,431

HANDHELD DEVICE FOR CAPTURING TEXT FROM BOTH A DOCUMENT PRINTED ON PAPER AND A DOCUMENT DISPLAYED ON A DYNAMIC DISPLAY DEVICE

Google LLC, Mountain Vie...

1. A computer-implemented method to capture data from digital images, comprising:receiving, by one or more computing devices, an input to capture digital images;
providing, by the one or more computing devices, a user interface that displays instructions to capture digital images;
initiating, by the one or more computing devices, an image capturing module of the one or more computing devices;
receiving, by the one or more computing devices, a digital image from the image capturing module;
determining, by the one or more computing devices, that at least a portion of a set of text in the digital image is readable;
performing, by the one or more computing devices, an optical character recognition algorithm on text in the digital image; and
providing, by the one or more computing devices, a display of at least a portion of the results of the optical character recognition algorithm as an overlay to the digital image on the user interface.

US Pat. No. 10,769,430

METHOD AND SYSTEM FOR CORRECTING FABRICATION IN A DOCUMENT

Wipro Limited, Bangalore...

1. A method of correcting a fabrication in a document, the method comprising:receiving, by a fabrication correction system, an input document from a user;
identifying, by the fabrication correction system, a reference document based on a category of the input document, from a reference document database;
detecting, by the fabrication correction system, fabrication indicating distortion associated with at least one of text and one or more images of the input document based on a predefined machine learning technique, by comparing one or more parameters associated with the input document with corresponding one or more parameters of the reference document;
determining, by the fabrication correction system, one or more fabricated regions in the input document and a type of the fabrication in each of the one or more fabricated regions, based on one or more predefined techniques, by:
identifying one or more boundaries for multiple segmented regions in the input document using Mask Region Convolutional Neural Network (R-CNN) technique;
generating region-proposals indicating location and boundary of fabricated regions in the input document, by applying Region Proposal Network (RPN) technique in combination with Fast R-CNN technique on each segment in the input document; and
determining the type of the fabrication in each of the one or more fabricated region based on Discrete Wavelet Transform (DWT) technique, wherein the type of the fabrication comprises variation in alignment, font, wavelength, syntax pixels, ink characteristics and opacity and nature of distortion associated with the at least one of text and one or more images of the input document; and
performing, by the fabrication correction system, one or more actions in each of the one or more fabricated regions based on the type of the fabrication and the reference document, upon receiving a user input, for correcting the one or more fabricated regions.

US Pat. No. 10,769,429

METHOD AND SYSTEM FOR EXTRACTING TEXT FROM AN ENGINEERING DRAWING

Wipro Limited, Bangalore...

1. A method to extract text from an engineering drawing for performing Optical Character Recognition (OCR), wherein the method comprises:receiving, by a text extraction system, an image of an engineering drawing comprising a plurality of components;
classifying, by the text extraction system, each of the plurality of components in the image to be one of a textual component and a non-textual component;
identifying, by the text extraction system, at least one word element for textual components from the plurality of components based on segmentation of the plurality of components, wherein the segmentation comprises:
drawing a plurality of horizontal edge projections of a predefined length for each of the textual components; and
identifying the textual components to be associated with the at least one word element when horizontal edge projection of each of the textual components overlaps with adjacent textual component; and
providing, by the text extraction system, the at least one word element as extracted text for performing OCR on the engineering drawing.

US Pat. No. 10,769,428

ON-DEVICE IMAGE RECOGNITION

Google LLC, Mountain Vie...

1. A method implemented in a data processing apparatus, comprising:accessing a first model that has been trained to generate an output that classifies, according to a classification scheme, image data received as input;
using the first model to train a second model to approximate the output of the first model to classify, according to the classification scheme, image data received as input, wherein the second model includes a plurality of connected layers including an output layer, an input layer, and a plurality of intermediate layers; and
after the second model is trained:
accessing map data that specifies a plurality of geographic locations, wherein each geographic location in at least a subset of the geographic locations is associated with an entity located at the geographic location and one or more images that depict the entity at the geographic location;
for each geographic location associated with an entity:
for each image of the one or more images that depict the entity located at the geographic location, providing the image to the second model to generate an embedding for the image, wherein the embedding are data generated by one of the intermediate layers;
associating each of the one or more embeddings generated by the second model with the geographic location; and
storing, in a database, location data specifying the geographic location, the associated one or more embeddings, and data specifying the entity, as an associated entity entry for the entity.

US Pat. No. 10,769,427

DETECTION AND DEFINITION OF VIRTUAL OBJECTS IN REMOTE SCREENS

Automation Anywhere, Inc....

1. A computer-implemented method for automating usage of an application program comprising:detecting objects and text from a first screen of information generated by the application program for display on a computer monitor by,
capturing a first image of the screen of information;
generating a first signature to identify the first image;
analyzing the first image to identify a set of actionable objects within the first image;
performing optical character recognition to detect text fields in the first image;
linking each identified actionable object to each detected text field positioned proximate to the identified actionable object in the first image;
in a screen signature database, storing for the first image, the first signature, which is associated with a smart screen, wherein the smart screen stores the links between each actionable object and its correspondingly linked text field; and
subsequently interacting with the application, and for a second screen of information displayed by the application,
capturing a second image of a second screen of information displayed by the application program,
generating a second signature to identify the second image;
in the screen signature database, searching for a previously stored signature, which comprises at least the first signature, that matches the second signature,
if the second signature matches a previously stored signature, then using the stored matching signature to retrieve and utilize a previously stored smart screen, that is associated with the stored matching signature, to process the second image.

US Pat. No. 10,769,426

INFERRING ATTRIBUTES OF ORGANIZATIONS USING MEMBER GRAPH

Microsoft Technology Lice...

1. A computer-implemented method comprising;obtaining, by a processor, a plurality of sample member profiles, each sample member profile corresponding to a sample member of a social networking service;
for each of the plurality of sample member profiles:
obtaining, by the processor, usage information for a corresponding sample member;
calculating, by the processor, one or more member metrics based on the sample member profile and usage information for the corresponding sample member;
extracting, by the processor, a first plurality of features from the sample member profile and the one or more member metrics;
feeding, by the processor, the first plurality of features into a supervised machine learning organization confidence score algorithm to train an organization name confidence score model to calculate a confidence score for a particular member profile indicating a probability that an organization name in the particular member profile is accurate, the supervised machine learning organization confidence score algorithm executed by the computer to implement a supervised machine learning classifier;
obtaining, by the processor, a member profile corresponding to a member of a social networking service;
obtaining, by the processor, usage information for the member;
calculating, by the processor, one or more member metrics based on the member profile and usage information for the corresponding member;
extracting, by the processor, a second plurality of features from the member profile and the one or more member metrics;
inputting, by the processor, the second plurality of features into the organization name confidence score model to obtain a confidence score for an organization name in the member profile.

US Pat. No. 10,769,425

METHOD AND SYSTEM FOR EXTRACTING INFORMATION FROM AN IMAGE OF A FILLED FORM DOCUMENT

International Business Ma...

14. A computer system for extracting information from an image of a filled form document, the form document comprising labeled fields comprising values and arranged in sections of the document, the computer system comprising an image of a blank template of the form document, the computer system being configured for:extracting first text lines from the image of the blank template using a text line recognizer of an optical character recognition (OCR) system;
performing using the OCR system an optical character recognition of the extracted first text lines resulting in first machine-encoded text lines;
merging the first machine encoded text lines into candidate sections based on the location of the first text lines in the blank template;
evaluating for each candidate section a set of predefined features indicative of the text lines and their location;
combining the evaluated features of each candidate section to generate an identifier of the candidate section, resulting in multiple identifiers;
determining sets of candidate sections that each share a respective identifier of the multiple identifiers;
selecting a set of candidate sections of the sets of sections that fulfills a predefined selection criterion based on the number of sections and number of respective fields;
determining as the hierarchy of the blank template the selected set of candidate sections;
extracting second text lines from the image of the filled form document using the text line recognizer;
performing using the OCR system an optical character recognition of the extracted second text lines resulting in second machine-encoded text lines;
merging the second machine encoded text lines into text regions based on the location of the second text lines;
for each second text line of the filled form document:
identifying the section of the determined hierarchy that matches the second text line based on the region of the second text line;
determining the first text line of the section that corresponds to the second text line by comparing the second text line with the first text lines, and determining the label of the field of the second text line and the position of the label within the filled form using the determined first text line;
using the determined labels for identifying and extracting field values of the second text lines;
comparing each of the field values with the determined labels for assigning the field value to a respective label of the determined labels.

US Pat. No. 10,769,424

INTERACTIVE EDITING OF ELECTRONIC TEXT

Google LLC, Mountain Vie...

1. A computer-implemented method of recognizing electronic handwriting, comprising:receiving a new segment of electronic handwriting for display at a user designated position within or adjacent to existing electronic content displayed on a display device;
providing the received new segment to a handwriting recognition module to obtain a plurality of textual interpretations of the new segment;
generating respective electronic handwriting representations for the plurality of textual interpretations obtained from the handwriting recognition module;
scoring the plurality of textual interpretations obtained from the handwriting recognition module based on how each respective electronic handwriting representation would change the display of the existing electronic content when the respective electronic handwriting representation is displayed substantially at the user designated position within or adjacent to the existing electronic content;
selecting, based on the scoring, an electronic handwriting representation corresponding to a respective textual interpretation of the plurality of textual interpretations; and
modifying, for display on the display device, the existing electronic content to include the selected electronic handwriting representation located substantially at the user designated position.

US Pat. No. 10,769,423

METHOD, SYSTEM AND TERMINAL FOR IDENTITY AUTHENTICATION, AND COMPUTER READABLE STORAGE MEDIUM

Baidu Online Network Tech...

1. A method for identity authentication, comprising:acquiring a human body image of a person to be authenticated, and determining from the human body image a plurality of skeleton key points of the person to be authenticated;
converting the skeleton key points into feature data, and combining the feature data to form physique feature information characterizing the person to be authenticated;
processing the physique feature information using a physique feature model by inputting the physique feature information into the physique feature model, to obtain a processing result; and
recognizing the identity of the person to be authenticated based on the processing result of the physique feature model,
wherein said converting the skeleton key points into feature data comprises:
defining a plurality of feature points based on the human body image, each of the feature points having a function; and
for each of the feature points, performing operations on all the skeleton key points according to the function of the feature point, and summing up the results of the operations performed on all the skeleton key points according to the function, to obtain one of the feature data corresponding to the feature point.

US Pat. No. 10,769,422

NEURAL NETWORK-BASED RECOGNITION OF TRADE WORKERS PRESENT ON INDUSTRIAL SITES

indus.ai Inc, North York...

1. A computer-implemented method comprising:using a computing device, receiving a plurality of digital images depicting a particular worker;
using the computing device, based on the plurality of digital images, determining a plurality of key-point sets of the digital images, each of the plurality of key-point sets comprising location information of key points identified within a depiction of the particular worker in a particular digital image;
using the computing device, based on the plurality of key-point sets, determining a plurality of trade-specific activities that appear to be performed by the particular worker;
using the computing device, based on the plurality of trade-specific activities, determining a plurality of trade probabilities, each trade probability among the trade probabilities indicating a likelihood that the particular worker belongs to a particular trade from among a plurality of trades.

US Pat. No. 10,769,421

METHOD FOR PERFORMING PEDESTRIAN DETECTION WITH AID OF LIGHT DETECTION AND RANGING

National Chung-Shan Insti...

1. A method for performing pedestrian detection with aid of light detection and ranging (LIDAR), comprising:obtaining 3-dimensional (3D) point cloud data through the LIDAR;
performing ground separation processing on the 3D point cloud data to remove ground information;
after the ground information is removed from the 3D point cloud data, performing object extraction processing on the 3D point cloud data to obtain a 3D point cloud chart that comprises a pedestrian candidate point cloud group;
performing 2-dimensional (2D) mapping processing on the 3D point cloud chart to obtain a 2D chart, wherein the 2D mapping processing comprises:
applying mapping to the 3D point cloud chart to generate the 2D chart;
removing noise of the 2D chart by utilizing binary image processing to dilate the 2D chart;
removing noise of the 2D chart by utilizing Gaussian blur filtering to blur the 2D chart;
utilizing morphology algorithm to obtain contours of respective objects within the 2D chart; and
filling up regions of the respective objects within the 2D chart; and
extracting a 3D feature and a 2D feature from the 3D point cloud chart and the 2D chart, respectively, and utilizing the 3D feature and the 2D feature to determine a location of the pedestrian.

US Pat. No. 10,769,420

DETECTION DEVICE, DETECTION METHOD, COMPUTER PROGRAM PRODUCT, AND INFORMATION PROCESSING SYSTEM

Kabushiki Kaisha Toshiba,...

1. A detection device comprising:processor circuitry configured to:
acquire, from a camera connected to the processor circuitry, an image including an area in which a mobile body is movable;
detect at least the area and a person from the image;
calculate a first distance between the person and a position of the device when the person is in the area; and
set a range around a position at which the person is detected, according to a result of the detection and the first distance, the range being an area range in which any person is estimated to be present after the person is detected;
store the area range in association with positional information at a first time period; and
present the area range to a user at a second time period, wherein the second time period corresponds to a time period during which the detection device is within a particular distance of the area range corresponding to the positional information regardless of the presence of a person within the area range, and wherein the second time period occurs later than the first time period.

US Pat. No. 10,769,419

DISRUPTOR MITIGATION

INTERNATIONAL BUSINESS MA...

1. A method comprising:obtaining one or more data feed that includes data of individuals within a crowd, wherein the crowd comprises a plurality of individuals gathered within an area;
examining data of the one or more data feed to return behavior parameter values for respective individuals of the plurality of individuals;
identifying, using values of the behavior parameter values, a disrupted group of a plurality of the individuals of the crowd, wherein the identifying is in dependence on a first one or more criterion being satisfied;
detecting, using values of the behavior parameter values, a disruptor individual within the disrupted group, the detecting in dependence on a second one or more criterion being satisfied; and
providing, by machine logic, one more disruptor mitigation output to mitigate disruptive behavior of the disruptor individual, wherein the behavior parameter values for respective individuals of the crowd include sentiment parameter values, and wherein providing parameter values of the sentiment parameter values includes processing a video data stream provided by one or of more video camera for obtaining video image data representation of the crowd, wherein the processing the video data stream includes processing video data to return facial expression based sentiment parameter values for users within the crowd.

US Pat. No. 10,769,418

DEVICES AND SYSTEMS FOR COLLECTIVE IMPACT ON MENTAL STATES OF MULTIPLE USERS

1. A device comprising:a processor; and
a computer-readable medium storing instructions which, when executed by the processor when deployed in a communication network, cause the processor to perform operations, the operations comprising:
receiving first biometric data for a first user, wherein the first biometric data comprises first facial image data of the first user from a first mobile device in communication with the processor;
quantifying a mental state of the first user based upon the first biometric data, wherein the quantifying the mental state of the first user includes pattern matching the first facial image data to a first eigenface from among a plurality of eigenfaces representing a plurality of different mental states, wherein the first eigenface represents the mental state of the first user;
receiving second biometric data for a second user, wherein the second biometric data comprises second facial image data of the second user from a second mobile device in communication with the processor;
quantifying a mental state of the second user based upon the second biometric data, wherein the quantifying the mental state of the second user includes pattern matching the second facial image data to a second eigenface from among the plurality of eigenfaces, wherein the second eigenface represents the mental state of the second user;
selecting a first automated action to affect the mental state of the first user and the mental state of the second user; and
implementing the first automated action to affect the mental state of the first user and the mental state of the second user, wherein the first automated action is implemented via an instruction to an apparatus at a location where the first user and the second user are anticipated to be co-located.

US Pat. No. 10,769,417

PAYMENT METHOD, APPARATUS, AND SYSTEM

Alibaba Group Holding Lim...

1. A payment method, comprising:acquiring a side face image from at least one side of a to-be-identified user;
performing a similarity comparison between the acquired side face image and a recorded side face image corresponding to a payment electronic account to obtain a side face similarity;
identifying whether the to-be-identified user is an authorized user of the payment electronic account based on at least the side face similarity; and
making a deduction operation on the payment electronic account if it is identified that the to-be-identified user is an authorized user of the payment electronic account,
wherein the performing a similarity comparison between the acquired side face image and a recorded side face image corresponding to the payment electronic account comprises: adjusting, based on positions of key points on the acquired side face image, the acquired side face image to obtain a standard side face image for the similarity comparison, wherein the standard side face image is of a specified size, and a side face in the standard side face image has a specified posture.

US Pat. No. 10,769,416

IMAGE PROCESSING METHOD, ELECTRONIC DEVICE AND STORAGE MEDIUM

GUANGDONG OPPO MOBILE TEL...

1. A method for image processing, comprising:acquiring a first face information set output by face recognition operation;
acquiring a recognition duration of the face recognition operation;
determining a preview image at a time point earlier than an output time point by the recognition duration, the output time point being a time point when first face information set is output; and
binding the first face information set with the determined preview image.

US Pat. No. 10,769,415

DETECTION OF IDENTITY CHANGES DURING FACIAL RECOGNITION ENROLLMENT PROCESS

Apple Inc., Cupertino, C...

1. A method, comprising:capturing a first image using a camera located on a device, the device comprising a computer processor and a memory, wherein the first image comprises an image captured while illuminating a subject in the image with infrared illumination from a projector located on the device, the first image being captured during a facial recognition enrollment authorization process;
determining whether the subject in the first image is a different subject than a reference subject from one or more images captured during the facial recognition enrollment authorization process prior to the first image being captured;
in response to the subject in the first image being determined to be different than the reference subject, capturing one or more second images using the camera located on the device;
determining whether a subject in the second images is the same subject as the subject in the first image; and
restarting the facial recognition enrollment authorization process in response to the subject in the second images being determined to be the same subject as the subject in the first image.

US Pat. No. 10,769,414

ROBUST FACE DETECTION

Apple Inc., Cupertino, C...

1. A method, comprising:capturing at least one image using a camera located on a device, the device comprising a computer processor and a memory, wherein the at least one image comprises an image captured while illuminating subjects in the image with an illuminator located on the device;
encoding the at least one image to generate feature vectors defining features of subjects in the image in a feature space;
assessing the generated feature vectors in the feature space to detect a face in the image, wherein at least some part of the face is present in the image, and wherein the face has any orientation in the image;
forming a bounding box around the face detected in the image, wherein, if a portion of the face detected is located outside an image boundary, the bounding box is formed around the at least some part of the face detected to be present in the image; and
providing an output, the output comprising the bounding box formed for the detected face in the image.

US Pat. No. 10,769,413

MOBILE TERMINAL AND CONTROL METHOD THEREOF

LG ELECTRONICS INC., Seo...

1. A mobile terminal comprising:a display;
a camera capturing images;
a database;
a wireless communication unit communicating with a wireless communication module located in a store or a point-of-sale (POS) terminal in the store; and
a controller configured to:
receive a facial image of a user related to goods from the POS terminal when a payment is made between the mobile terminal and the POS terminal;
receive a facial image of the user related to goods from the wireless communication module located in the store when the user of the mobile terminal leaves the store without purchasing the goods;
analyze the facial image received from the POS terminal or the wireless communication module using a face analysis algorithm to obtain facial expression information corresponding to the facial image received from the POS terminal or the wireless communication module according to the analysis;
generate goods information by associating the obtained facial expression information with other information related to the goods, and storing the goods information in the database;
search for goods information stored in the database by analyzing a facial image of the user received via the camera based on the face analysis algorithm in order to extract facial expression information corresponding to the facial image of the user received via the camera and feeling information, the feeling information extracted based on the facial expression information corresponding to the facial image received via the camera; and
cause the display to output the searched goods information stored in the database corresponding to at least the extracted facial expression information or feeling information,
wherein the analyzing the facial image received via the camera comprises:
causing the display to output an analysis result for the user to confirm whether the facial expression information corresponding to the facial image received via the camera corresponds to the analysis result when the analysis of the facial image received via the camera is complete;
causing the display to output other feeling items according to the user's response with regard to confirmation; and
matching a feeling corresponding to a feeling item selected by the user from the other feeling items to the facial expression information corresponding to the facial image received via the camera based on the facial image received via the camera.

US Pat. No. 10,769,412

MUG SHOT ACQUISITION SYSTEM

1. A mug shot acquisition system for acquiring mug shot images of a subject posed in front of a background, including a processor and a storage device including instructions configured to run on the processor, comprising:an image acquisition interface operative to receive digital mug shot images from an imaging device that is positioned to acquire images of the subject posed in front of the background,
a user interface presented on a display and responsive to system user input, including:
a control to cause a mug shot image to be acquired by the imaging device,
an image viewing display responsive to the image acquisition interface and operative to display the received digital mug shot images,
one or more standards-based image adjustment software tools operative to provide feedback to the user about compliance of acquired images to at least one predetermined mug shot uniformity standard, and operative to prevent the user from exporting the digital mug shot images that fail to meet the predetermined mug shot uniformity standard, and to allow the user to adjust the digital mug shot images to meet the predetermined mug shot image uniformity standard,
a software interface constructed to allow a transfer of control to the mug shot acquisition system from another application that is running on an operating system platform and wherein the software interface also includes a user interface presented on the same display and also responsive to system user input, and
an image export interface operative to export digital mug shot images adjusted based on the standards-based image adjustment software.

US Pat. No. 10,769,411

POSE ESTIMATION AND MODEL RETRIEVAL FOR OBJECTS IN IMAGES

QUALCOMM TECHNOLOGIES, IN...

1. A method of selecting a three-dimensional model, the method comprising:obtaining a first input image including an object;
determining a pose of the object in the first input image;
obtaining a plurality of candidate three-dimensional models representing one or more objects;
obtaining a descriptor for the object in the first input image and a plurality of descriptors for the plurality of candidate three-dimensional models;
determining, from the plurality of candidate three-dimensional models, a candidate three-dimensional model to represent the object in one or more images based on the descriptor for the object in the first input image and the plurality of descriptors for the plurality of candidate three-dimensional models;
obtaining a second input image including the object in a different pose than the pose of the object in the first input image; and
adjusting a pose of the candidate three-dimensional model in an output image based on a difference between the pose of the object in the second input image and the pose of the object in the first input image.

US Pat. No. 10,769,410

AUGMENTED REALITY BASED COMPONENT REPLACEMENT AND MAINTENANCE

ACCENTURE GLOBAL SERVICES...

1. An augmented reality (AR) based component replacement and maintenance system comprising:a component identifier, executed by at least one hardware processor, to receive a first wireless signal from a pair of AR glasses worn by a user, wherein the AR glasses include a display viewable by the user and a camera to image a component viewed by the user, wherein the component identifier is to
analyze the image of the component viewed by the user,
compare the image of the component viewed by the user to a plurality of images of components stored in a database, wherein the database includes information associated with the plurality of images of the components, and
based on a match of the image of the component viewed by the user to one of the plurality of images of the components stored in the database, identify the component viewed by the user to determine a component detail;
a component inventory analyzer, executed by the at least one hardware processor, to analyze an inventory of the identified component to
determine whether a plurality of suppliers include the identified component in stock,
in response to a determination that the plurality of suppliers include the identified component in stock, sort selected ones of the plurality of suppliers that include the identified component in stock in order of estimated times of delivery of the identified component to the user,
compare the estimated times of delivery for the selected ones of the plurality of suppliers that include the identified component in stock to a minimum required time of delivery, and
in response to a determination that all of the estimated times of delivery for the selected ones of the plurality of suppliers that include the identified component in stock are greater than the minimum required time of delivery, determine a three-dimensional printer that is to be used to print the identified component for the user; and
an AR integrator and controller, executed by the at least one hardware processor, to display, on the AR glasses display, the component detail and order details related to the sorted selected ones of the plurality of suppliers of the identified component to provide user selection of options in the display to perform functions related to the displayed component detail and the order details.

US Pat. No. 10,769,409

CULTURE DETECTION AND MEASUREMENT OVER TIME

Purdue Research Foundatio...

1. A computer-implemented method for correlating depictions of colonies of microorganisms, the method comprising:receiving a first image of a substrate having disposed on a surface thereof a colony of microorganisms, the first image associated with a first time and depicting the colony of microorganisms;
locating, using a processor, a first region in the first image, the first region depicting the colony of microorganisms;
receiving a second image of the substrate having disposed on the surface thereof a candidate colony of microorganisms, the second image associated with a second time different from the first time and depicting the candidate colony of microorganisms;
locating, using the processor, a second region in the second image, the second region depicting the candidate colony of microorganisms;
comparing, using the processor, the first region in the first image and the second region in the second image to provide a comparison result; and
determining, based at least in part on the comparison result, that the candidate colony of microorganisms is a same colony as the colony of microorganisms,
wherein the comparing is based at least in part on mathematically minimizing an objective function comparing first coordinates of the first region, second coordinates of the second region, third coordinates of a third region in the first image, the third region depicting a second colony of microorganisms, and fourth coordinates of a fourth region in the second image, the fourth region depicting a second candidate colony of microorganisms.

US Pat. No. 10,769,408

METHOD AND SYSTEM FOR AUTOMATIC CHROMOSOME CLASSIFICATION

TATA CONSULTANCY SERVICES...

1. A processor implemented method for chromosome classification, the method comprising:receiving, via one or more hardware processors, a chromosome image comprising a chromosome with a plurality of chromosome bands;
extracting, via one or more hardware processors, visual features associated with the plurality of chromosome bands of the chromosome by generating a plurality of feature maps with dimension G×H×K;
obtaining, via one or more hardware processors, a plurality of feature vectors from the plurality of feature maps, with each feature vector Fg of dimension H*K, by applying horizontal slicing on the plurality of feature maps;
concatenating, via one or more hardware processors, the plurality of feature vectors in sequence from a top chromosome band to a bottom chromosome band among the plurality of chromosome bands to generate a feature sequence; and
classifying, via one or more hardware processors, the chromosome into a class label among a plurality of pre-determined class labels of chromosomes by processing the feature sequence using a Recurrent Neural Network (RNN) augmented with an attention mechanism, wherein the RNN learns the feature sequence and the attention mechanism concentrates on a plurality of Regions-of-interest (ROIs) of the feature sequence, wherein the ROIs are specific to a class label of chromosomes.

US Pat. No. 10,769,407

FINGERPRINT REGISTRATION METHOD AND DEVICE

TSINGHUA UNIVERSITY, Bei...

1. A fingerprint registration method, comprising:obtaining a fingerprint to be registered and a target fingerprint;
extracting features from the fingerprint to be registered and the target fingerprint to obtain a first fingerprint feature of the fingerprint to be registered and a second fingerprint feature of the target fingerprint, wherein the first fingerprint feature comprises a first ridge feature and a first phase feature; the second fingerprint feature comprises a second ridge feature and a second phase feature;
performing a initial registration on the fingerprint to be registered and the target fingerprint according to the first ridge feature and the second ridge feature to obtain a initial registration result;
obtaining phase difference information of a phase overlap region between the first phase feature and the second phase feature; and
adjusting the initial registration result according to the phase difference information to obtain a final registration result of the fingerprint to be registered and the target fingerprint.

US Pat. No. 10,769,406

NON-DIRECTIONAL FINGERPRINT AND PALMPRINT IDENTIFICATION METHOD AND NON-DIRECTIONAL FINGERPRINT AND PALMPRINT DATA CREATION METHOD

KEYCORE TECHNOLOGY CORP.,...

1. A non-directional fingerprint and palmprint identification method comprising steps of:using a fingerprint and palmprint identification device to detect and scan the fingerprints and palmprint of a user to generate a fingerprint and palmprint image and transmit the image to a processor;
the processor processing the fingerprint and palmprint image to generate a processed fingerprint and palmprint image;
the processor identifying and calculating the fingerprint and palmprint image to obtain trough points between each two fingers of the fingerprint and palmprint image, wherein the trough points include a first trough point, a second trough point, a third trough point and a fourth trough point, according to the trough points;
the processor identifying and calculating the fingerprint and palmprint image to obtain the fingerprint of the specific finger and the palmprint and according to the at least one reference line and the fingerprint of the specific finger and the palmprint, the processor identifying and processing the intersection points to generate multiple intersection points; and
the processor calculating and processing the distances between the intersection points to generate multiple characteristic points and converting the characteristic points into digitalized characteristic data to compare the characteristic data with the characteristic data stored in a characteristic database to generate a comparison result, the processor identifying and taking out a specific finger between the second and third trough points of the fingerprint and palmprint image and selecting the reference line on the specific finger, which extends from the middle of a tip of the specific finger to the bottom end of the palm.

US Pat. No. 10,769,405

ELECTRONIC CARD COMPRISING A FINGERPRINT SENSOR AND METHOD OF MANUFACTURING SUCH A CARD

1. Flexible electronic card comprising:a card body (1) comprising an upper surface (11) and a lower surface (12);
at least one cavity (13, 13?) formed in the card body emerging from the upper surface;
a fingerprint module (2) configured to acquire a fingerprint of a user, the fingerprint module being housed in the cavity (13) and flush with the upper surface of the card body; the fingerprint module (2) comprising a flexible substrate (22) flushing with the upper surface and comprising an active part (21), designated capture part, flush with the upper surface of the card body and a microcontroller (23) arranged below the substrate.

US Pat. No. 10,769,404

ARRANGEMENT FOR THE OPTICAL RECORDING OF LIVE SKIN AREAS OF HUMAN AUTOPODIA AND OF DOCUMENTS

JENETRIC GmbH, Jena (DE)...

14. A method for optical recording of live skin areas of human autopodia and of documents, the method comprising:providing a layer body with a sensor layer of an image capture device, the sensor layer comprising light sensitive elements in a two dimensional regular pixel raster and placing the at least one autopodium or the document on a placement surface of the layer body of image capture device, and with at least one display for displaying user guidance;
prompting to place at least one autopodium or a document on a placement surface of the layer body by displaying a picture of an autopodium or of a document on the at least one display for animating a user to place the at least one autopodium or the at least one document on the placement surface;
placing the at least one autopodium or document on the placement surface in accordance with the displayed picture of the autopodium or the document;
providing an area light source comprising two layer-shaped light sources and controlling either a first layer-shaped light source in an illumination mode being suitable for capturing skin recordings by frustrated internal reflection or a second layer-shaped light source formed by the at least one display for user guidance in an illumination mode by emission of diffuse backlight for capturing documents in accordance with the displaced or placed autopodium or document;
capturing images of skin prints of the at least one autopodium or of the placed document with a sensor layer of the layer body of the image capture device;
providing an electronic controlling unit for image data capturing and sending image data of a captured image from the image capture device to a coupled further electronic device;
processing the image data for quality checking in the coupled further electronic device;
forwarding results of the quality checking by the coupled further electronic device with a prompt to the image capture device for a further image recording or finishing image capture by the image capture device; and
providing data management by the coupled further electronic device, the data management comprising processing, storing or routing transmitted image data to an external database.

US Pat. No. 10,769,403

IMAGE SENSING WITH A DISPLAY

Microsoft Technology Lice...

17. An electronic device providing fingerprint detection comprising:a cover glass having a display surface;
a pixelated photoemitting element array, one or more selected photoemitting elements of the pixelated photoemitting element array being configured to emit a light signal through the cover glass to a finger in contact with the display surface;
a pixelated photodetecting element array positioned relative to the pixelated photoemitting element array and the cover glass to receive a reflected light signal from the finger at individual photodetecting elements of the pixelated photodetecting element array, the reflected light signal including a portion of the emitted light signal reflected by total internal reflection from a refractive boundary at the display surface of the cover glass; and
image processing circuitry electrically coupled to the pixelated photoemitting element array and the pixelated photodetecting element array and configured to stitch the reflected light signal received by each photodetecting element of the pixelated photodetecting element array into a composite image of a fingerprint of the finger in contact with the display surface of the display.

US Pat. No. 10,769,402

NON-CONTACT FRICTION RIDGE CAPTURE DEVICE

Thales Dis France SA, Me...

1. A non-contact friction ridge capture device comprising:a device housing, the device housing including an electronics compartment having an open side onto which a user can present the user's hand;
the device further comprising a camera disposed in the electronics compartment for capturing an image of at least one friction ridge surface on the user's hand, wherein the camera comprises a global reset release shutter (GRRS) for capturing the image;
a light source disposed in the electronics compartment, the light source emitting light in the direction of the open side, wherein the peak wavelength of emitted light is in the range of 440 to 570 nanometers (nm); and
a light guide comprising a polycarbonate tube lined with an enhanced specular reflector (ESR) film to direct the emitted light toward the open side in a uniform manner;
wherein the user's hand is not required to contact the device when the camera captures the image of at least one friction ridge surface on a user's hand;
wherein the device housing further comprises an illumination shield connected to the electronics compartment such as to provide an opening between the illumination shield configured such that the user's hand can be inserted between the illumination shield and the electronics compartment, the illumination shield including a light absorbing material and reduces blurring that may occur in an image captured using the global reset release shutter due to the effects of ambient light.

US Pat. No. 10,769,401

IMAGE RECOGNITION DEVICE, IMAGE RECOGNITION METHOD AND IMAGE RECOGNITION UNIT

SEIKO EPSON CORPORATION, ...

1. An image recognition device used in an image display unit including an imaging device adapted to image an image display surface, and a detecting image display device adapted to display a detecting image on the image display surface, the image recognition device comprising:a pattern display section adapted to make the detecting image display device display a first pattern having a first linear pattern varying in luminance with a first pitch along a direction parallel to an epipolar line determined from a positional relationship between the imaging device and the detecting image display device, and a second linear pattern varying in luminance with a second pitch different from the first pitch along a direction parallel to the epipolar line;
a measurement point determination section adapted to detect an object located between the imaging device and the image display surface to determine a measurement target point of the object; and
a position detection section adapted to detect a position of the measurement target point with respect to the image display surface based on an image including the measurement target point and the first pattern obtained by the imaging device, wherein
the first linear pattern and the second linear pattern are displayed simultaneously.

US Pat. No. 10,769,400

BARCODE READER

The Code Corporation, Mu...

1. A barcode reader, comprising:a lens for focusing an image of a barcode onto a two-dimensional array of photosensitive diodes;
image read-out circuitry coupled to the two-dimensional array of photosensitive diodes and configured to generate a frame of image data, wherein the frame of image data is a sequence of values, each value representing intensity of illumination focused onto one of the photosensitive diodes;
image processing circuitry configured to receive the sequence of values of the frame of image data and perform at least two image processing functions to generate at least two distinct image data records from the frame of image data, the image processing circuitry comprising a plurality of image processing circuits implemented in hardware, the at least two image processing functions being performed by at least two different image processing circuits, each image data record being a derivative of the frame of image data and representing the image of the barcode;
non-transient computer readable media for storing the at least two distinct image data records; and
a processor configured to select an image data record from the at least two distinct image data records and decode the selected image data record.

US Pat. No. 10,769,399

METHOD FOR IMPROPER PRODUCT BARCODE DETECTION

Zebra Technologies Corpor...

1. A computer-implemented method for improper objection detection, the method comprising:receiving, at one or more processors, an image of an object and initial object identification data, the image captured by an image scanner;
determining if the initial object identification data corresponds to a lower priority object, using an object priority heuristic;
responsive to the initial object identification data corresponding to the lower priority object, excluding the received image from being provided to a trained neural network; and
responsive to the initial object identification data not corresponding to the lower priority object, providing the image to the trained neural network for analysis,
wherein the analysis includes:
analyzing, in a trained neural network, physical features of the object and determining an object identification data associated with the object based on the physical features and determining a confidence level indication corresponding to the certainty of the object identification data determined by the trained neural network; and
when the confidence level indication is in a first range of values, communicating an authorization signal having the object identification data, and when the confidence level indication is in a second range of values, communicating a failed authorization signal.

US Pat. No. 10,769,398

READING DEVICE

TOSHIBA TEC KABUSHIKI KAI...

1. A reading device, comprising:a housing having a height in a first direction;
a first reading window on a first surface side of the housing at a first height position along the first direction;
a first reading unit inside the housing and configured to direct light out the first reading window for imaging an item;
a second reading window on a second surface side of the housing at a second height position along the first direction that is less than the first height position in height; and
a second reading unit inside the housing and configured to direct light out the second reading window for imaging an item.

US Pat. No. 10,769,397

OPTICAL CODE, METHOD OF PRODUCING OPTICAL CODE, METHOD OF AUTHENTICATING OPTICAL CODE, DEVICE FOR READING OPTICAL CODE, AND READING ASSIST DEVICE

DENSO WAVE INCORPORATED, ...

1. An optical code in which data to be decoded is recorded, comprising:a pattern of a plurality of light-color modules having high visible light reflectance;
a plurality of dark-color modules having visible light reflectance lower than the visible light reflectance of the light-color modules, the data being expressed by the light-color and dark-color modules; and
a fixed region in which the light-color modules and the dark-color modules are positionally fixedly arranged in advance, the light-color and dark-color modules arranged in the fixed region providing a pattern assisting optical reading of the optical code, wherein:
at least either the light-color modules or the dark-color modules include a first module and a second module having reflectances different from each other for invisible light of a predetermined wavelength;
the light-color modules and the dark-color modules are recorded as a module pattern that is different between when irradiated with the visible light and when irradiated with the invisible light having the predetermined wavelength; and
at least either the light-color modules or the dark-color modules arranged in the fixed region consist of the first module and the second module, the first module and the second module being positionally fixed in advance in the fixed region.

US Pat. No. 10,769,396

DEVICE FOR IDENTIFYING ALUMINUM ALLOY DIE-CAST HUB

CITIC Dicastal CO., LTD.,...

1. A device for identifying an aluminum alloy die-cast hub, comprising a laser scanning means, a controller and a computer, wherein the laser scanning means comprises a laser head with a first objective lens and an image sensor with a second objective lens and is configured to shoot an image from a surface of the aluminum alloy die-cast hub; the controller and the computer are in data connection with the image sensor, and model information of the aluminum alloy die-cast hub is read from bar code information, wherein the first objective lens and the second objective lens are configured such that an optical path of a laser emitted by the laser head of the laser scanning means passes through the first objective lens, is incident on a bar code on the surface of the aluminum alloy die-cast hub to be detected after passing through the first objective lens, and passes through the second objective lens after being incident on the bar code to reach the image sensor, and the first objective lens and the second objective lens are rotatable objective lenses.

US Pat. No. 10,769,395

BARCODE-READING SYSTEM THAT REQUIRES AN ACCESSORY FOR ENHANCED OPERATION OF A BARCODE READING APPLICATION

The Code Corporation, Mu...

1. A barcode-reading system for a mobile device, the mobile device comprising a camera assembly, the barcode-reading system comprising:a barcode-reading enhancement accessory securable to the mobile device, the barcode-reading enhancement accessory comprising:
an optics module;
a reflective surface within the optics module, the reflective surface being positioned so as to fold a portion of a field of view of the camera assembly towards a target area beyond a top side of the mobile device when the barcode-reading enhancement accessory is secured to the mobile device; and
an indication of license entitlement detectable by the camera assembly; and
a barcode-reading application stored in memory of the mobile device and executable by a processor of the mobile device, the barcode-reading application being configured to enable an enhanced mode of operation of the barcode-reading application conditional upon obtaining the indication of license entitlement from the barcode-reading enhancement accessory.

US Pat. No. 10,769,394

DEVICES SYSTEMS AND METHODS FOR ALIGNMENT OF LENS ASSEMBLIES WITHIN A CHASSIS

Symbol Technologies, LLC,...

1. A method of installing a lens assembly having a protrusion within a chassis having a slot extending through a cavity wall, the cavity wall defining at least a portion of the cavity, the lens assembly having a corresponding imaging sensor positioned fixedly relative to the chassis, the method comprising:providing the chassis having a cavity configured to receive the lens assembly;
positioning the lens assembly within the chassis such that the protrusion is positioned within the slot, the lens assembly being free-floating relative to the chassis;
adjusting the lens assembly relative to the imaging sensor while the lens assembly is free-floating relative to the chassis; and
upon meeting an adjustment threshold, fixedly securing the lens assembly to the chassis.

US Pat. No. 10,769,393

CHIP ON BOARD BASED HIGHLY INTEGRATED IMAGER

HONEYWELL INTERNATIONAL I...

1. An apparatus for use in decoding a bar code symbol, the apparatus comprising:a printed circuit board, comprising:
an image sensor integrated circuit mounted directly onto the printed circuit board to facilitate an electrical connection between the printed circuit board and the image sensor integrated circuit, the image sensor integrated circuit comprising an image sensor associated with a plurality of pixels arranged in a plurality of rows and columns of pixels, timing and control circuitry configured to control the image sensor, gain circuitry configured to control gain of one or more analog signals associated with the image sensor, and an analog to digital converter configured to convert the one or more analog signals into one or more digital signals associated with the image sensor; and
an illumination subsystem comprising a light source bank mounted directly onto the printed circuit board to facilitate an electrical connection between the printed circuit board and the illumination subsystem, wherein the light source bank comprises a plurality of LED dies.

US Pat. No. 10,769,392

VEHICLE TRACKING SYSTEM USING TRANSPONDERS

Amtech Systems, LLC, Alb...

1. A Radio Frequency Identification (RFID) Transponder, comprising:a first radio frequency transceiver configured to transmit user identification and user-related data;
a motion sensor; and
a Bluetooth® transceiver comprising first logic, wherein said first logic is configured to:
receive first data via said Bluetooth® transceiver, said first data being associated with vehicle occupancy,
provide said first data to said first radio frequency transceiver, wherein the first data is related to the user-related data, and
not provide said first data to said radio frequency transceiver while said motion sensor detects motion.

US Pat. No. 10,769,391

FLEXIBLE LABEL WITH ACTIVATING CIRCUITRY

RFMicron, Inc., Austin, ...

1. A label sensor comprising:a first section of the label sensor, wherein the label sensor is operable to be affixed to an item, and wherein the first section includes:
memory;
an environmental sensor;
a radio frequency (RF) front end, wherein the RF front end includes a tuning circuit; and
a processing module operably coupled to the memory, the environmental sensor, and the RF front end; and
a second section of the label sensor that includes an activation circuit, wherein the activation circuit is operable, upon receiving an input, to activate one or more of the memory, the environmental sensor, the RF front end and the processing module, and wherein the activation causes the label sensor to be put in a first operational mode of a plurality of operational modes.

US Pat. No. 10,769,390

POSITION BASED IDENTIFIER COMBINATION INFORMATION PROCESSING SYSTEM, UNIT, AND METHOD

Sony Corporation, Tokyo ...

1. An information processing system comprising:a plurality of first wireless communication units each having an identifier, wherein each of the plurality of first wireless communication units is fixed to a user's hand directly or indirectly;
a second wireless communication unit that is not fixed to the user's hand directly or indirectly, wherein the second wireless communication unit that outputs a signal to a predetermined communication region that surrounds at least part of the second wireless communication unit, and each of the plurality of first wireless communication units is either within the communication region or outside the communication region, such that a first subset of the first wireless communication units is inside the communication region and a second subset of the first wireless communication units is outside the communication region, and the first subset includes a third subset of at least one of the first wireless communication units and a fourth subset of at least one of the first wireless communication units, wherein the second wireless communication unit reads out the identifier only from each of the first subset of the first wireless communication units, including reading out respective identifiers from each of the first wireless communication units in both the third subset and the fourth subset which are combined with each other; and
an information processing unit that executes processing based on a combination of the plurality of identifiers from the third and fourth subsets of the first wireless communication units that are read out by the second wireless communication unit.

US Pat. No. 10,769,389

AUTOMATIC SCANNER CONFIGURATION

NCR Corporation, Atlanta...

1. A method comprising:initializing, upon powering on, a scanner that is in an un-configured state, including sensing, by the scanner polling another device, when the scanner is connected to a network and determining that the scanner is in the un-configured state based on a value or state of one or more configuration settings missing from the scanner indicating the scanner has not been initialized; and
in response to the determining that the scanner is in the un-configured state:
requesting, by the scanner, scanner configuration settings from at least two other scanners via a network;
receiving, by the scanner, scanner configuration settings in response including receiving data representative of configuration settings from the at least two of other scanners;
analyzing, by the scanner, the received data representative of configuration settings to determine the configuration settings for the scanner; and
implementing the scanner configuration settings on the scanner of the initializing.

US Pat. No. 10,769,388

CHANGING A LANGUAGE FOR A USER SESSION REPLAY

International Business Ma...

12. A computer system comprising:a central processing unit (CPU);
a memory coupled to the CPU; and
a computer readable storage device coupled to the CPU, the storage device containing instructions that are executed by the CPU via the memory to implement a method of changing a language for a replay of a session of a user, the method comprising:
the computer system capturing data from requests and responses included in hits in the session;
based on the captured data, the computer system determining an initial language of content presented to the user in the session;
the computer system obtaining a selection by an analyst of a preferred language for the replay of the session;
the computer system determining whether the preferred language selected by the analyst matches the initial language of the content presented to the user in the session;
if the preferred language selected by the analyst does not match the initial language of the content presented to the user in the session, the computer system translating the captured data from the initial language into the preferred language and based on the translated captured data, the computer system performing the replay of the session by presenting the content in the preferred language and not in the initial language, the replay of the session being viewed by the analyst, or if the preferred language matches the initial language, the computer system performing the replay of the session by presenting the content in the initial language, without translating the captured data;
the computer system parsing events included in the captured data;
the computer system identifying a next event in the parsed events;
the computer system determining that the next event indicates a change in an image displayed on a computing device being utilized by the user during the session;
the computer system searching Hypertext Markup Language (HTML) documents generated from a resource file from which image data for the session is reproduced;
in response to the searching, the computer system determining that the HTML documents do not include an HTML document that specifies the change in the image displayed on the computing device; and
based on the HTML documents not including the HTML document that specifies the change in the image displayed on the computing device, the computer system generating the HTML document that specifies the change in the image displayed on the computing device, wherein the performing the replay of the session by presenting the content in the preferred language includes replaying the session by employing the generated HTML document.

US Pat. No. 10,769,387

SYSTEM AND METHOD FOR TRANSLATING CHAT MESSAGES

MZ IP Holdings, LLC, Pal...

1. A method, comprising:receiving an electronic text message from a client device of a user;
normalizing the electronic text message to generate a normalized text message comprising characters having a consistent width, the normalizing comprising at least one of:
converting a full-width character into a half-width character; or
converting a half-width character into a full-width character;
tagging at least one phrase in the normalized text message with a marker to generate a tagged text message, the marker indicating that the at least one phrase will be translated using a rule-based system;
translating the tagged text message using the rule-based system and a machine translation system to generate an initial translation,
wherein translating the tagged text message comprises (i) translating the at least one phrase using the rule-based system and (ii) translating other words or phrases using the machine translation system, and
wherein the machine translation system is trained using training data comprising characters having a consistent width; and
post-processing the initial translation to generate a final translation.

US Pat. No. 10,769,386

TERMINOLOGY PROPOSAL ENGINE FOR DETERMINING TARGET LANGUAGE EQUIVALENTS

SAP SE, Walldorf (DE)

1. A non-transitory computer-readable medium to store instructions, which when executed by a computer, cause the computer to perform operations comprising:receive, from a user, an input terminology in a source language to determine a target language proposal;
in a proposal engine, when a configuration profile corresponding to the user is available:
determine a set of target language equivalents by applying a user-defined set of approaches to the input terminology, wherein the user-defined set of approaches are comprised in the configuration profile;
compute statistics corresponding to the set of target language equivalents, wherein the statistics are computed based on a set of weights that are comprised in the configuration profile and are associated with the user-defined set of approaches, wherein the user pre-configures, in the configuration profile corresponding to the user, a corresponding weight for each one of the user-defined set of approaches;
based on the computed statistics, determine the target language proposal from among the set of target language equivalents; and
display the target language proposal along with at least a part of the computed statistics in a graphical user interface.

US Pat. No. 10,769,385

SYSTEM AND METHOD FOR INFERRING USER INTENT FROM SPEECH INPUTS

APPLE INC., Cupertino, C...

1. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with one or more processors and memory, cause the device to:receive audio input containing a user utterance;
perform speech-to-text processing on the audio input to determine a plurality of text representations of the user utterance and a plurality of speech recognition scores for the plurality of text representations;
perform natural language processing on each of the plurality of text representations to determine a plurality of candidate user intents and a plurality of intent deduction scores for the plurality of candidate user intents;
determine a plurality of composite scores for the plurality of candidate user intents based on a combination of the plurality of speech recognition scores and the plurality of intent deduction scores;
select a user intent from the plurality of candidate user intents based on the plurality of composite scores; and
perform a task corresponding to the selected user intent.

US Pat. No. 10,769,384

SYSTEMS AND METHODS FOR INTELLIGENTLY CONFIGURING AND DEPLOYING A MACHINE LEARNING-BASED DIALOGUE SYSTEM

Clinc, Inc., Ann Arbor, ...

1. A method for intelligently configuring a machine learning-based dialogue system, the method comprising:implementing, by a machine learning-based dialogue service, a conversational deficiency assessment of a target dialog system of a subscriber to the machine learning-based dialog service,
wherein implementing the conversational deficiency assessment includes:
(i) identifying one or more distinct corpora of mishandled utterances based on an assessment of the one or more distinct corpora of dialogue data;
(ii) identifying one or more candidate corpus of mishandled utterances from the one or more distinct corpora of mishandled utterances as one or more suitable candidates for building one or more new dialogue competencies for the target dialogue system if one or more candidate metrics of the one or more candidate corpus of mishandled utterances satisfy a candidate threshold;
building the one or more new dialogue competencies for the target dialogue system for each of the one or more candidate corpus of mishandled utterances having candidate metrics that satisfy the candidate threshold;
configuring a dialogue system control structure for the target dialogue system based on the one or more new dialogue competencies, wherein the dialogue system control structure governs an operation of an automated dialogue agent of the target dialogue system of the subscriber;
constructing a corpus of training data for training one or more machine learning models defining each of the one or more new dialogue competencies of the target dialogue system, wherein constructing the corpus of training data includes:
sourcing the corpus of training data from one or more distinct sources of machine learning training data; and
evaluating one or more efficacy metrics of the corpus of training data; and
if the one or more efficacy metrics of the corpus of training data for training of the one or more machine learning models defining each of the one or more new dialogue competencies satisfy one or more efficacy thresholds, deploying each of the one or more new dialog competencies in the target dialogue system.

US Pat. No. 10,769,383

CLUSTER-BASED WORD VECTOR PROCESSING METHOD, DEVICE, AND APPARATUS

Alibaba Group Holding Lim...

1. A cluster-based word vector processing method to be performed at a cluster comprising a plurality of worker computers, the method comprising operations performed by each of the worker computers:obtaining a word and at least one context word of the word that are extracted from a respective portion of a corpus through distributed reading;
creating a word pair according to the respective portion of the corpus, wherein the word pair comprises the word and a context word of the at least one context word;
obtaining word vectors for the word and at least one context word;
training the word vectors according to one or more of a designated loss function, a designated negative sample word, or the created word pair to generate training results, by:
traversing the corpus to obtain current words in the corpus; and
calculating a gradient according to one or more of the designated loss function, the designated negative sample word, or the created word pair, and iteratively updating word vectors of the current words and context words of the current words according to the following formulas:
wi,t+1=wi,t+gci,t,w?Bi,k and
ci,t+1=ci,t+gwi,t,c??(w),
wherein

w represents a current word, c represents a context word of w, c? represents a negative sample word, w represents a word vector of w, c represents a word vector of c, wi,t and ci,t represent a ith update on an ith worker computer, Bi,k represents a kth corpus on the ith worker computer, ?(w) represents a context word set of w, ? represents a learning rate, and ? is a sigmoid function; and
forwarding to a server cluster the training results to enable the server cluster to update the word vectors of the word and at least one context word based on the training results.

US Pat. No. 10,769,382

DISAMBIGUATION OF THE MEANING OF TERMS BASED ON CONTEXT PATTERN DETECTION

International Business Ma...

1. A method for disambiguating meaning of terms, the method comprising:obtaining a first set of words associated with a first linguistic domain;
obtaining a second set of words associated with a second linguistic domain;
generating a first set of patterns and a second set of patterns using said first set of words and said second set of words, respectively;
examining a word of interest in a passage that has different meanings; and
notifying a user that said word of interest is being used in a first sense or a second sense in response to identifying said word of interest in only said first set of patterns or said second set of patterns, respectively.

US Pat. No. 10,769,381

TOPIC-INFLUENCED DOCUMENT RELATIONSHIP GRAPHS

Quid, Inc., San Francisc...

20. A method, comprising:obtaining, with one or more processors, a topic vector for a given topic, wherein:
the given topic appears in a corpus of natural language text among a plurality of other topics,
the topic vector includes a plurality of topic-specific scores for respective n-grams,
the topic-specific scores are indicative of respective n-grams being associated with the given topic in natural language text, and
at least some of the respective n-grams of the topic vector appear in the corpus;
inferring, with one or more processors, a plurality of relationships from the corpus of natural language text at least in part by performing a computational linguistic analysis of the natural language text based on the topic vector,
wherein, for a given n-gram having a given topic-specific score in the topic vector, and a given relationship among the plurality of relationships based on the given n-gram, the given relationship is suppressed or enhanced based on the given topic-specific score relative to a computational linguistic analysis of the natural language text that is not based on the topic vector by adjusting a contribution of a co-occurrence of the given n-gram in a pair of documents to a semantic similarity relationship between the pair of documents; and
storing, with one or more processors, the plurality of relationships in memory.

US Pat. No. 10,769,380

METHOD AND APPARATUS FOR SITUATIONAL ANALYSIS TEXT GENERATION

Arria Data2Text Limited, ...

1. A computer-implemented method for generating a situational analysis text by transforming data that is expressed in a non-linguistic format into a format that can be expressed linguistically in a situational analysis text, the method comprising:assigning, by a processor and in response to an identification of an alert condition, at least one data channel on which the alert condition was identified, as a primary data channel;
determining, by the processor and in response to the identification of the alert condition, whether one or more additional data channels that are identified as related to the primary data channel are to be assigned as one or more related data channels, wherein the one or more related data channels are a subset of one or more monitored data channels;
generating a data structure representing a refined order of a plurality of messages instantiated based on the primary data channel and the one or more related data channels, the refined order based on the identified alert condition; and
generating, using a natural language generation system that is configured to execute on the processor, the situational analysis text for display via a computing device, the situational analysis text generated based at least on the data structure, wherein at least a portion of the situational analysis text is generated in response to the identification of the alert condition.

US Pat. No. 10,769,379

AUTOMATIC COMPLIANCE TOOLS

Unified Compliance Framew...

1. A method in a computing system, comprising:accessing a common control having a primary noun definition;
selecting a node of a semantic graph representing the primary noun definition of the accessed common control;
identifying a set of nodes of the semantic graph, wherein each node in the set of nodes is directly or indirectly connected to the selected node, wherein the connection between selected node and each particular node in the set of nodes includes at least one connection indicating that particular node represents a term that is a type-of another term represented by the selected node or another node in the set of nodes, and wherein each node in the set of nodes represents a noun definition different from the primary noun definition of the accessed common control;
for each of the identified nodes of the set of nodes, creating a copy of the accessed common control in which the primary noun definition of the accessed common control is replaced with the noun definition represented by the identified node; and
supplementing the accessed common control with the created common controls.

US Pat. No. 10,769,378

EXTENDING SYSTEM ENTITIES FOR CONVERSATIONAL SYSTEM

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for processing a set D of conversation logs, comprising:learning, by a processor device, a set R of entity relation mining rules from a set K of known entity utterances uttered by known entities; and
automatically recommending, by the processor device, extended utterances of the known entities from unrecognized ones of the known entities based on the set R;
wherein said learning step comprises:
replacing, in the set D of conversation logs, any of the known entity utterances from the set K that appear in the set D, by a respective representative utterance having a same meaning to form a set D1 of unified conversation logs;
finding a set CS of chat log segments in the set D1 which include at least two of the same utterances in the set D1;
generating the set R of entity relation mining rules based on the set CS;
randomly selecting a subset K1 from the set K;
for each of the respective representative utterance in the set D1 that also occurs in the subset K1, replacing the respective representative utterance with a corresponding original utterance from the set D to form a list D2 of conversation logs;
removing the subset K1 from the set K; and
for each individual rule r in the set R, applying the individual rule r on the list D2, checking a success rate of identifying utterance relations in the subset K1, and removing the individual rule r from the set R if the success rate is below a rule success rate threshold.

US Pat. No. 10,769,377

LEARNING OBJECT/ACTION PAIRS FOR RECIPE INGREDIENTS

INTERNATIONAL BUSINESS MA...

1. A method, comprising:receiving an ingredient list of a recipe stored in an electronic format in a corpus of recipes, the ingredient list including a plurality of entries, each of the entries comprising one or more words;
for each multi-word entry in the ingredient list:
identifying an ingredient associated with the entry, the identifying including comparing words contained in the entry to terms in a lexicon of cooking domain terms;
determining whether an action corresponds to the identified ingredient, the determining including parsing the entry to locate a verb that is associated with the identified ingredient; and
based on determining that an action corresponds to the identified ingredient, outputting a food item action pair that includes the identified ingredient and the located verb, wherein the located verb indicates that the action is performed on the identified ingredient and wherein the outputting is to a database;
outputting at least one additional food item action pair for at least one of the multi-word entries in the ingredient list; and
executing, at a computer, a recipe generator to automatically create a description of a new recipe not contained in the corpus of recipes using cognitive computing, the description of the new recipe including one of the food item action pairs.

US Pat. No. 10,769,376

DOMAIN-SPECIFIC LEXICAL ANALYSIS

International Business Ma...

1. A method comprising:initiating, at an electronic device, an analysis of a domain-specific corpus associated with a particular domain to:
identify the particular domain; and
identify a base term and a modifier term, the base term and the modifier term identified independently from the particular domain, wherein the modifier term: (i) modifies the base term in at least a portion of the domain-specific corpus, and (ii) is designated as a modifier term based, at least in part, upon a co-occurrence statistics that indicate that an identified term appears to modify the base term a minimum number of times;
accessing, by the electronic device, a first entry in lexicon data, wherein the lexicon data is accessible by the electronic device prior to the initiating and is configured for use at the electronic device in a language processing operation, the first entry including core data corresponding to domain-independent lexical information for the base term;
adding, based on the analysis, non-core data to the first entry, the non-core data corresponding to domain-specific lexical information for the base term, wherein the non-core data identifies the modifier term and the particular domain;
determining that a first portion of the non-core data is in a specific position relative to the identified base term;
responsive to the determination that the first portion of the non-core data is in the specific position relative to the identified base term, generating a first collocation rule; and
responsive to the generation of the first collocation rule, parsing, with the first collocation rule, the first entry in lexicon data to determine a first future placement for the first portion of the non-core data.

US Pat. No. 10,769,375

DOMAIN-SPECIFIC LEXICAL ANALYSIS

International Business Ma...

1. A computer program product for domain-specific data generation, the computer program product comprising a computer-readable storage medium having program instructions embodied therewith, the program instructions executable by a processor at an electronic device to cause the processor to perform operations comprising:initiating an analysis on a domain-specific corpus associated with a particular domain to:
identify the particular domain; and
identify a base term and a modifier term, the base term and the modifier term
identified independently from the particular domain, wherein the modifier term: (i) modifies the base term in at least a portion of the domain-specific corpus, and (ii) is designated as a modifier term based, at least in part, upon co-occurrence statistics that indicate that an identified term appears to modify the base term a minimum number of times;
accessing a first entry in lexicon data, wherein the lexicon data is accessible by the electronic device prior to the initiating and is configured for use at the electronic device in a language processing operation, the first entry including core data corresponding to domain-independent lexical information for the base term;
adding, based on the analysis, non-core data to the first entry, the non-core data corresponding to domain-specific lexical information for the base term, wherein the non-core data identifies the modifier term and the particular domain;
determining that a first portion of the non-core data is in a specific position relative to the identified base term;
responsive to the determination that the first portion of the non-core data is in the specific position relative to the identified base term, generating a first collocation rule; and
responsive to the generation of the first collocation rule, parsing, with the first collocation rule, the first entry in lexicon data to determine a first future placement for the first portion of the non-core data.

US Pat. No. 10,769,374

ANSWER SELECTION METHOD FOR QUESTION ANSWERING SYSTEM AND THE SYSTEM

Honghui Chen, Changsha, ...

10. An answer selection system for a question answering system, comprising a client and a server, wherein the client is connected with the server through a wireless network, wherein the server comprises the following modules:in module A, receiving a question sentence and an answer sentence input by a user, and obtaining a first word vector of each word in each sentence by using a word embedding model obtained through pre-training to calculate a combined word vector in combination with a second word vector obtained by performing fine adjustment for the word embedding model in a network training process;
in module B, obtaining a final vector of each word in the sentence by selecting a valid feature from the connected word vectors;
in module C, when a sentence length is greater or smaller than a preset sentence length threshold, processing the sentence by adopting a different feature extractor according to the preset sentence length threshold to generate a fitted sentence matrix representation containing contextual information;
in module D, obtaining, by an attention pooling layer, an attention similarity of the question sentence and the answer sentence according to the sentence matrix containing contextual information obtained at block C, and performing a length-adaptive distributed representation for the question sentence and the answer sentence by extracting a maximum feature at each dimension of row and column of a similarity matrix respectively to generate a distributed vector representation for the question sentence and the answer sentence respectively; and
in module E, obtaining a correlation of each answer sentence relative to the question sentence by measuring a cosine similarity between the distributed vector representations of the question sentence and the answer sentence, and sorting the answer sentences according to the correlation,
wherein the module A comprises the following units:
in unit A1, defining the input question sentence and the input answer sentence both as a sentence s with a length being L, obtaining a word embedding model of the t-th word Wt in the sentence s through pre-training in a corpus, and searching for a first word vector rWtfr corresponding to the word therefrom; and
in unit A2, performing fine adjustment for parameters of the pre-trained word embedding model in the network training process to adapt the model to a current data set, obtaining the updated word embedding model, and obtaining a second word vector r Wtft corresponding to the word therefrom to calculate a combined word vector as rWtC=rWtfr ?rWtft,
wherein the module B comprises the following units:
in unit B1, deploying a hidden layer and obtaining a final vector representation of each word in the sentence by selecting a valid feature from the connected word vectors based on rWt=tanh (Wh·rWtC+bh),
wherein h refers to a word representation with a memory in a particular direction, Wh?D×D and bh?D×1 both refer to hidden layer parameters, refers to a set of real numbers, D×D refers to a real number matrix with dimensions being D×D, D×1 refers to a real number matrix with dimensions being D×1, and D refers to a dimension of rWt,and
in unit B2, obtaining a sentence distributed matrix representation containing no contextual information based on Rs=(rW1rW2 . . . rWL) by performing blocks A1, A2 and B1 for all words in all sentences.

US Pat. No. 10,769,373

CONTEXTUAL VALIDATION OF SYNONYMS IN OTOLOGY DRIVEN NATURAL LANGUAGE PROCESSING

International Business Ma...

1. A method for providing contextual validation of synonyms in ontology driven natural language processing, the method comprising the computer-implemented steps of:determining, via at least one computing device, based on a linear sequence of symbols in electronic text, a token that identifies a linguistic unit of the electronic text, the linguistic unit comprising at least one of a word, a punctuation symbol, a number, or a letter;
structuring, via at least one computing device, the user input into a semantic model comprising a set of classes each containing a set of related permutations of the token, wherein the semantic model is stored as data in memory of the at least one computing device;
quantifying, via at least one computing device, a linear distance between the token and a contextual token within the user input, wherein the linear distance is a quantity of additional tokens in between the token and the contextual token;
comparing, via at least one computing device, the linear distance to a pre-specified linear distance limit to a number of words;
when, based on the comparing, the quantified linear distance is within the pre-specified linear distance limit to the number of words,
assigning a high confidence level to an annotation of the token, and
validating the annotation based on the high confidence level, wherein the validating the annotation comprises restructuring, via at least one computing device, the semantic model to include a knowledge structure containing the contextual token, the linear distance, the pre-specified linear distance limit, and the designation of the token as a synonym of the one of the set of related permutations; and
when, based on the comparing, the quantified linear distance is not within the pre-specified linear distance limit to the number of words, assigning a low confidence level to the annotation.

US Pat. No. 10,769,372

SYNONYMY TAG OBTAINING METHOD AND APPARATUS, DEVICE AND COMPUTER READABLE STORAGE MEDIUM

BEIJING BAIDU NETCOM SCIE...

1. A synonymy tag obtaining method, wherein the method comprises:obtaining a central morpheme of a tag to be recognized;
obtaining a tag template of the tag to be recognized according to the tag to be recognized and the central morpheme thereof; and
obtaining a synonymy tag of the tag to be recognized according to the tag template, and the central morpheme thereof and at least one cluster of synonymy tag templates, comprising:
if the tag template is in any cluster of synonymy tag templates in said at least one cluster of synonymy tag templates, obtaining the synonymy tags of the tag to be recognized according to other synonymy tag templates except the tag template in said any one cluster of synonymy tag templates and the central morpheme of the tag to be recognized.

US Pat. No. 10,769,371

AUTOMATIC EXECUTION OF ACTIONS RESPONSIVE TO SEARCH QUERIES

Amazon Technologies, Inc....

1. A method comprising:determining, by one or more computer processors coupled to at least one memory, a first set of verbs that represent digital user actions;
determining a set of synonyms for verbs in the first set of verbs;
selecting a second set of verbs from the set of synonyms;
determining a set of seed verbs comprising the first set of verbs and the second set of verbs;
determining a prompt phrase using a first seed verb of the set of seed verbs, wherein the prompt phrase is a question comprising the first seed verb;
sending the prompt phrase to a first search engine for input as a first search query;
determining a first autocomplete result from the first search engine responsive to input of the first search query;
determining that the first autocomplete result comprises the first seed verb;
sending the first autocomplete result to the first search engine for input as a second search query;
determining a second autocomplete result from the first search engine responsive to input of the second search query;
determining a set of autocompleted results comprising the first autocomplete result and the second autocomplete result;
extracting the first seed verb and a first noun from the first autocomplete result;
determining a search history associated with a user account for a second search engine;
determining that the search history comprises a fourth search query, the fourth search query comprising the first seed verb and the first noun;
determining first browsing data associated with the user account, wherein the first browsing data is for a first time interval preceding the fourth search query;
determining second browsing data associated with the user account, wherein the second browsing data is for a second time interval after the fourth search query;
determining that the second browsing data comprises a user action of changing a device setting;
associating the fourth search query with the user action of changing the device setting in a user intended action database;
determining that the fourth search query is input at the second search engine at a user device; and
causing a device setting control user interface to be presented at the user device responsive to input of the fourth search query.

US Pat. No. 10,769,370

METHODS AND APPARATUS FOR SPELL CHECKING

Beijing Kingsoft Office S...

1. A method for spell checking on a page when loading and presenting the page, which is applied to a client of a user, characterized in that the method comprises:in response to the user using the client to display the page, determining whether the page is being displayed to the user for the first time;
in response to determining that the page is being displayed to the user for the first time, performing the following operations:
determining character segments corresponding to characters contained in the page, according to a preset character segment dividing rule;
performing word segmentation on each of the determined character segments and obtaining words corresponding to each of the determined character segments, performing the spell checking on the words corresponding to each of the determined character segments according to a preset spell checking rule, determining wrong words in each of the determined character segments, and obtaining character locations of the wrong words in each of the determined character segments;
caching the obtained character locations of the wrong words in each of the determined character segments;
in response to determining that the page has been previously displayed to the user, performing the following operations:
obtaining character locations of the wrong words in each of the determined character segments from character locations cached when the page was displayed by the user for the first time; and
presenting, by the client to the user, each of the determined character segments and marking, according to the character locations of the wrong words in each of the determined character segments, the wrong words in each of the determined character segments,
wherein the preset character segment dividing rule includes at least one of the following operations:
determining all characters contained in the page as one character segment;
in presenting the page, determining characters contained in a line of the page as one character segment;
dividing characters contained in the page into character segments according to a preset character length; and after a character segment corresponding to characters contained in the page is obtained according to a preset character length, determining whether the character at the end of this character segment constitutes a word together with several characters at the beginning of the next character segment, and adjusting the obtained character segment according to the checking result;
wherein characters contained in the page are obtained from a text stream system, and the text stream system is a system consisting of mapping rules and data pools.

US Pat. No. 10,769,369

CORRELATING DISTINCT EVENTS USING LINGUISTIC ANALYSIS

Microsoft Technology Lice...

1. A method to detect a service outage, the method comprising:monitoring incoming and outgoing communications associated with one or more incidents, wherein the incoming and outgoing communications include communications between a user and a technical support personnel or communications between two technical support personnel;
performing a linguistic analysis on at least a portion of each communication such that differently worded comments associated with a same incident are determined as being associated with the same incident based on a determination of a similarity of a keyword within each communication to a predefined keyword, wherein a linguistic model used for the linguistic analysis is trained based on the monitored incoming and outgoing communications;
receiving one or more parameters associated with a service outage alert, wherein the one or more parameters include a service outage threshold, a service outage threshold timing, and an alert recipient; and
in response to determining that a number of the monitored incoming and outgoing communications determined as being associated with the same incident exceed the service outage threshold, issuing the service outage alert based on the one or more parameters.

US Pat. No. 10,769,368

EMBEDDING CALENDAR EVENTS IN SMS MESSAGES

WEST CORPORATION, Omaha,...

1. A method, comprising:receiving, into an SMS message processing application system, a text of an SMS message from a user that generates an appointment;
parsing, by the SMS message processing application system, a description, date, time and location of the appointment from the SMS message;
storing a calendar event including the description, date, time and location of the appointment in a website on the internet;
sending, by the SMS message processing application system, the description, date, time and location of the appointment to a URL shortener and redirector;
receiving, by the SMS message processing application system, from the URL shortener, a shortened and redirected URL that is selectable on a recipient device to cause the calendar event to be displayed and subsequently added to a calendar application on the recipient phone;
appending, by the SMS message processing application system, the shortened and redirected URL to the SMS message; and
transmitting, by the SMS message processing application system, the SMS message comprising the shortened and redirected URL to the recipient device.

US Pat. No. 10,769,367

LOW-LATENCY INTERACTIVE USER INTERFACE

Google LLC, Mountain Vie...

1. A computer-implemented method, comprising:providing, from a server to a client device, a first model specifying a first string presentation format and associated with a first string parsing pattern;
receiving, at the server and from the client device, in response to a client device parsing error, first characters in a sequence of characters being entered into an input field of an interactive user interface displayed on the client device and before the sequence of characters has been completely entered, the first characters having been parsed using the first string parsing pattern associated with the first model to generate first parsed input, the first model specifying the first string presentation format that causes the client device to present the first characters in the sequence of characters in a first display format, and wherein the client device parsing error indicates that first characters cannot be parsed by the first string parsing pattern associated with the first model;
parsing the first characters according to a plurality of string parsing patterns each associated with a respective model and string presentation format, each respective model is a respective software component that contains information and processing instructions required to achieve a functionality on the client device and executable by the client device, the processing instructions for each respective model including respective parsing instructions to instruct the client device to parse the first characters according to a particular parsing pattern, and wherein each parsing pattern for each respective model is different from each other parsing pattern for each other respective model;
determining, based on the parsing of the first characters according to the plurality of string parsing patterns, a second model from the respective models, the second model being different from the first model and associated with a second string parsing pattern and a second string presentation format that is different from the first string presentation format and that causes the client device, when executing the second model, to display the first characters in the sequence of characters in a second display format that is different from the first display format, wherein the second model is configured to address the error indicating that one or more first characters cannot be parsed by the first string parsing pattern associated with the first model by providing a message to enter a valid input of a particular type, and wherein the second string parsing pattern is different from the first string parsing pattern; and
providing the second model to the client device for execution by the client device instead of the first model.

US Pat. No. 10,769,366

VARIABLE DIMENSION VERSION EDITING FOR GRAPHICAL DESIGNS

Axure Software Solutions,...

1. A computer-implemented method for allowing a user to specify an interactive graphical design comprising:receiving an inheritance characterization specification from the user through an inheritance specification user interface, the inheritance specification user interface displaying a graphical representation of the inheritance characterization specification, the inheritance specification user interface being operable to receive an input from the user indicating which properties of a plurality of properties associated with the interactive graphical design will propagate through inheritance;
rendering a first dimension version of the interactive graphical design based on a first dimension specification, the first dimension version having a parent-child relationship with a second dimension version of the interactive graphical design according to an inheritance structure, the second dimension version of the interactive graphical design being based on a second dimension specification, and the first dimension version of the interactive graphical design being displayed concurrently with the inheritance specification user interface;
receiving a widget property specification for a rendered widget from the user while the user is editing the rendered first dimension version, the rendered widget being a rendered design element of the interactive graphical design; and
storing the widget property specification for the first dimension version and the second dimension version in accordance with the inheritance structure and the inheritance characterization specification.

US Pat. No. 10,769,365

DOCUMENT HISTORY INTERFACE

MICROSOFT TECHNOLOGY LICE...

1. A system comprising:at least one processing unit; and
at least one memory storing computer executable instructions that, when executed by the at least one processing unit, cause the system to perform a set of operations, the set of operations comprising:
providing a first version of a document, wherein the document has an associated document identifier;
receiving two or more communication events, wherein the two or more communication events include a calendar event and an audio or video conferencing event;
recognizing the two or more communication events as associated with the document based on:
the calendar event including at least one of the document or the document identifier; and
a discussion of the document during the audio or video conferencing event;
generating an interactive document timeline identifying the two or more communication events associated with the document, wherein the interactive document timeline includes different graphical identifiers for the two or more communication events;
receiving a selection to scroll along the interactive document timeline to a first communication event of the two or more communication events;
providing a second version of the document, wherein the second version of the document corresponds to the document as it existed at a time when the first communication event of the two or more communication events occurred;
retrieving additional information associated with the first communication event of the two or more communication events; and
providing the additional information.

US Pat. No. 10,769,364

GENERATING CUSTOM APPLICATION LINKS

Branch Metrics, Inc., Re...

1. A method comprising:receiving, at a computing device, a custom link request from a user device accessing a webpage, the custom link request including a uniform resource locator (URL) of the webpage and a device identifier that uniquely identifies the user device;
retrieving, at the computing device, a list of events associated with the user device based on the device identifier, wherein each of the events identifies a user action taken on the user device with respect to at least one of an application installed on the user device and a website, wherein the application includes a plurality of application states corresponding to webpages on the website, and wherein the website includes the accessed webpage;
retrieving, at the computing device, sets of template rules, wherein each set of template rules indicates one or more events that satisfy the set of template rules, wherein each set of template rules indicates one or more URLs that satisfy the set of template rules, and wherein each set of template rules is associated with a custom link template that includes custom link rendering data for rendering a custom link on the user device;
identifying, at the computing device, a set of template rules that is satisfied by the received URL and the retrieved list of events associated with the user device;
transmitting, from the computing device, custom link rendering data associated with the identified set of template rules to the user device; and
transmitting, from the computing device, custom link routing data to the user device, wherein the custom link routing data is configured to route the user device to an application state of the application corresponding to the accessed webpage in response to user selection of the custom link rendered from the transmitted custom link rendering data.

US Pat. No. 10,769,363

SYSTEM AND METHODS FOR TRANSMITTING CLINICAL DATA HAVING MULTI-SEGMENT FIELDS FROM ONE OR MORE MODALITIES TO A DICTATION MACHINE

1. A method of retrieving one or more values from a Health Level 7 (HL7) clinical data from one or more sending applications on a server or modality for transferring to a dictation system, comprising:receiving HL7 clinical data having one or more multi-segment fields from at least one modality that generates the HL7 clinical data;
parsing the HL7 clinical data received from the at least one modality that generates the HL7 clinical data;
accessing a formatting template for use in normalizing the parsed HL7 clinical data, the formatting template including one or more format settings, a selection of one or more fields from a specified multi-segment field of the HL7 clinical data from which one or more values are to be retrieved, and a retrieval setting that specifies a type of the one or more multi-segment fields from which to retrieve the one or more values;
retrieving the one or more values of the selection from the one or more multi-segment fields having the type from which to retrieve the one or more values as specified in the retrieval setting, wherein the retrieving the one or more values of the selection of the one or more fields from the specified multi-segment field of the parsed HL7 clinical data includes retrieving the one or more values of a field of a first applicable segment from the one or more multi-segment fields of the HL7 clinical data;
normalizing the retrieved one or more values by formatting the retrieved one or more values using the one or more format settings set in the formatting template; and
sending the one or more normalized values to the dictation system for use in generating a report by the dictation system.

US Pat. No. 10,769,362

METHOD AND APPARATUS FOR CAPTURING AND EXTRACTING CONTENT FROM DOCUMENTS ON A MOBILE DEVICE

Symbol Technologies, LLC,...

1. A method, comprising:selecting, by a mobile device, a template stored in a memory of the mobile device, wherein the selected template describes a document type, the template including parameters associated with the document type, wherein each of the parameters provides information on how to process an associated region in the document type;
capturing, on the mobile device, an image of a document;
determining, by the mobile device, that the image corresponds to the document type described by the selected template by verifying that a first region in the image of the document is located at a region location in the document type described by the selected template;
identifying, by the mobile device, a region in the image of the document;
processing information in the identified region in the image of the document in accordance with an associated one of the parameters;
validating, by the mobile device, that data content in the identified region representative of a first geographic location corresponds to a second geographic location of the mobile device at a time;
aggregating, by the mobile device, application specific information from the processed information; and
presenting, by the mobile device, the aggregated application specific information to a user program operating on one of the mobile device and a remote device connected with the mobile device.

US Pat. No. 10,769,361

DATA STORAGE AND RETRIEVAL SYSTEM AND METHOD FOR STORING CELL COORDINATES IN A COMPUTER MEMORY

WORKIVA INC., Ames, IA (...

1. A method for maintaining cell coordinates in a computer memory, the method carried out by a computing device, the method comprising:displaying a spreadsheet on a display device;
receiving a request for a search for a cell in the spreadsheet;
retrieving a plurality of nodes of an RTree from a data store,
wherein at least some of the plurality of nodes contain one or more minimum bounding rectangles, each minimum bounding rectangle encompassing coordinates of one or more cells of the spreadsheet;
loading, into a computer memory that is internal to the computing device, only those nodes of the plurality of nodes that contain a minimum bounding rectangle within which the cell located or that contain a reference to the cell;
maintaining a map that includes:
a mapping between a coordinate of a first row of the spreadsheet and a coordinate of a first node of the plurality of nodes, and
a mapping between a coordinate of a second row of the spreadsheet and a coordinate of a second node of the plurality of nodes;
in response to a row being inserted between the first row of the spreadsheet and the second row of the spreadsheet updating the map to include a mapping between the inserted row and a fractional coordinate that is between the coordinate of the first node and the coordinate of the second node; and
displaying the inserted row on the display device.

US Pat. No. 10,769,360

APPARATUS AND METHOD FOR PROCESSING AN ELECTRONIC DOCUMENT TO DERIVE A FIRST ELECTRONIC DOCUMENT WITH ELECTRONIC-SIGN ITEMS AND A SECOND ELECTRONIC DOCUMENT WITH WET-SIGN ITEMS

Snapdocs, Inc., San Fran...

1. An apparatus, comprising:a network interface circuit connected to a network;
a bus connected to the network interface circuit; a processor connected to the bus; and
a memory connected to the bus, the memory storing instructions executed by the processor to:
receive an electronic document from the network,
derive individual pages within the electronic document,
convert the individual pages into image processing segments,
process the image processing segments with an optical character recognition tool to generate classification data including signature items and text strings,
classify the electronic document based upon the classification data,
programmatically, without user input, characterize each of the signature items as one of an electronic-sign signature item or a wet-sign signature item to form a collection of electronic-sign signature items and a collection of wet-sign signature items,
programmatically, without user input, produce a first electronic document with pages from the electronic document that have the collection of electronic-sign signature items and a second electronic document with pages from the electronic document that have the collection of wet-sign signature items,
augment the first electronic document with metadata characterizing locations of the electronic-sign signature items,
supply the first electronic document to the network for delivery to a machine supporting an electronic signing service and
send the second electronic document to the network for delivery to a client machine.

US Pat. No. 10,769,359

DYNAMIC DETERMINATION OF MISSING FIELDS

INTUIT INC., Mountain Vi...

1. A method of automatically determining at least one required field in a user interface (UI), comprising:receiving, at a processor, a data submission made through the UI, the data submission including a plurality of fields used to complete a document, wherein the data submission lacks data in at least one blank field provided in the UI for entering information in which no information has been entered;
classifying, by the processor, the data submission as having at least one data submission type using at least one machine learning (ML) process that evaluates the data submission against training data including a plurality of sample data submissions having one or more filled in fields that include similar information to data input into at least one field of the data submission;
determining, by the processor, at least one required field for the at least one data submission type based on patterns, indicated in the training data, of observed fields that are usually filled in for sample data submissions of the at least one data submission type, wherein the at least one required field requiring information to be entered therein;
determining, by the processor, that the at least one blank field is also the at least one required field; and
causing, by the processor, the UI to indicate that the at least one blank field is also the at least one required field.

US Pat. No. 10,769,358

OBTAINING DATA FROM INCOMPLETE ELECTRONIC FORMS

MOV-OLOGY, LLC, Anaheim,...

1. A method to obtain data from incomplete electronic forms, the method comprising:assessing an incomplete electronic form associated with at least one webpage, the incomplete electronic form having one or more fields configured to accept user-entered text, the incomplete electronic form comprising at least one hypertext markup language (HTML) element associated with the one or more fields;
obtaining data from the incomplete electronic form by obtaining a protocol of the at least one webpage, writing a script tag associated with a script file to the at least one webpage according to the protocol, the script tag configured to place the script file onto the at least one webpage, the script file configured to locate the at least one HTML element, building a data structure based on the incomplete electronic form, and parsing the data structure to obtain the at least one HTML element;
storing one or more of the at least one HTML element and the user-entered text obtained from the incomplete electronic form;
communicating with one or more databases via and API to obtain additional information about the user based at least in part on the user-entered text obtained from the incomplete electronic form;
storing contact profile information that comprises at least a portion of the user-entered text obtained from the incomplete electronic form and at least a portion of the additional information about the user obtained from the one or more databases; and
sending a personalized message to the user based at least in part on the at least one HTML element and the contact profile information.

US Pat. No. 10,769,357

MINIMIZING EYE STRAIN AND INCREASING TARGETING SPEED IN MANUAL INDEXING OPERATIONS

Open Text Corporation, W...

1. A method of minimizing human eye strain and increasing visual target speed in validating data, comprising:displaying a validation interface on a display screen with a first set of validation interface elements located on the display screen based on a first layout of validation interface elements according to which a first type of validation interface element is to be displayed a first distance from a second type of validation interface element, the first set of validation interface elements comprising a first data entry form field to be validated;
receiving, by a processor, an input comprising an indication to display, in the validation interface, a next data entry form field to be validated;
automatically determining, by the processor, locations at which to display a second set of validation interface elements, wherein determining the locations at which to display the second set of validation interface elements comprises determining, based on display variation selection criteria, whether to vary a display of the validation interface from the first layout of validation interface elements to a second layout of validation interface elements according to which the first type of validation interface element is to be displayed a second distance apart from the second type of validation interface element, the second distance being greater than the first distance and selected to require eye movement at least twenty percent across the display screen; and
based on a determination to vary the display of the validation interface from the first layout of validation interface elements to the second layout of validation interface elements, updating the display of the validation interface to display the second set of validation interface elements at the determined locations with the first type of validation interface element displayed the second distance apart from the second type of validation interface element, wherein the second set of validation interface elements comprises the next data entry form field containing a current value extracted from a document image, a snippet associated with the next data entry form field and that is a portion of the document image from which the current value was extracted, and a validation message.

US Pat. No. 10,769,356

SYNCHRONIZING REVIEW COMMENTS BETWEEN SOURCE AND SHARED DOCUMENTS

Adobe Inc., San Jose, CA...

1. A method of synchronizing comments between a source document and a shared document, the method comprising:sending the source document from an author computing system to a shared storage resource administered by a cloud-based service;
after the source document has been sent to the shared storage resource, sending, from the author computing system, to the shared storage resource, a first query for a source document asset ID, wherein the first query includes an access token associated with a user of the author computing system and a location of the source document in the shared storage resource;
after the source document has been sent to the shared storage resource, sending, from the author computing system, to the shared storage resource, a second query for a shared document asset ID, wherein the second query includes the access token, such that the first and second queries include the same access token;
receiving, at the author computing system, from the shared storage resource, the source document asset ID and the shared document asset ID, wherein the source document asset ID uniquely identifies the source document, wherein the shared document asset ID uniquely identifies the shared document, and wherein the source and shared document asset IDs are generated and assigned to their respective documents by the shared storage resource;
generating, at the author computing system, a logical link between the source document and the shared document, the logical link including the shared document asset ID and the source document asset ID received from the shared storage resource;
associating the logical link with the source document;
opening the source document at the author computing system;
reading the shared document asset ID from the logical link that is associated with the source document;
sending a comment polling request from the author computing system to a review commenting tool administered by the cloud-based service, wherein the comment polling request includes the shared document asset ID read from the logical link;
receiving, at the author computing system, from the review commenting tool, one or more reviewer comments made in the shared document; and
causing display of the reviewer comments made in the shared document in a display of the author computing system.

US Pat. No. 10,769,355

MANAGING EXTENDED SCHEMAS

Oracle International Corp...

1. A non-transitory computer-readable storage medium carrying program instructions thereon, the instructions when executed by one or more processors cause the one or more processors to perform operations comprising:displaying a first extensible markup language schema definition (XSD) schema, wherein the first XSD schema includes a plurality of XSD elements arranged in a tree structure;
receiving a selection of at least one XSD element of the plurality of XSD elements;
accessing a map that associates XSD elements with XSD extensions;
determining XSD extensions that correspond with the selected at least one XSD element based on the map;
displaying the determined XSD extensions associated with the at least one XSD element;
receiving at least one XSD extension selection that is selected from the determined XSD extensions; and
loading the at least one XSD extension selection into the tree structure by appending in the tree structure at least one XSD extension element based on the at least one XSD extension selection.

US Pat. No. 10,769,354

SYSTEM AND METHOD FOR TRIGGERING STATE CHANGES IN CONTENT WITH INITIATION OF MULTI-MEDIA PLAYBACK

1. A method for synchronizing content state change, the method comprising:transmitting an email to a user, by an email server, the email containing Hypertext Markup Language (HTML);
wherein the email contains at least one multi-media element that is wrapped with a first HTML element, the first HTML element is sized to position a play button of the at least one multi-media element within a boundary of said first HTML element and obscure a remainder of the at least one multi-media element; and
on a condition that the user triggers the play button, activating and triggering a style change of a second HTML element by the pseudo-class associated with the first HTML element.

US Pat. No. 10,769,353

DYNAMIC STREAMING CONTENT PROVIDED BY SERVER AND CLIENT-SIDE TRACKING APPLICATION

Oath Inc., New York, NY ...

1. A system comprising:a user interface device configured to output data representative of a section of a first page view displayed on a display device, the first page view including first viewable content items of a set of viewable content items, the set of viewable content items comprising second viewable content items that are not displayed with the first viewable content items in the first page view;
a queue or stack configured to store links to the second viewable content items during the first page view,
wherein the user interface device is configured to:
receive a scrolling event to scroll through the set of viewable content items during display of the first page view; and
in response to the scrolling event, cause the second viewable content items to be displayed in an updated page view on the display device through the links to the second viewable content items stored in the queue or stack; and
a code scanner configured to scan a document object model of the second viewable content items in response to the scrolling event.

US Pat. No. 10,769,352

PROVIDING DYNAMIC WEB CONTENT WITHOUT FLICKER

ADOBE INC., San Jose, CA...

1. A system comprising:at least one processor; and
a non-transitory computer readable medium storing instructions thereon that, when executed by the at least one processor, cause the system to:
identify, from a web document, a plurality of action items associated with rendering a webpage having a dynamic visual element;
analyze the plurality of action items to identify a set of action items associated with rendering dynamic digital content corresponding to the dynamic visual element;
in response to identifying the set of action items associated with rendering the dynamic digital content, temporarily prohibit display of the dynamic visual element by hiding the dynamic visual element until performing the set of action items associated with rendering the dynamic digital content corresponding to the dynamic visual element is complete;
generate, from a dependency graph comprising the set of action items, an action queue comprising a first subset of independent action items that, when completed, updates to a second subset of independent action items; and
in response to completing at least the second subset of independent action items of the set of action items according to the dependency graph, reveal the dynamic visual element by providing, via a display device, the dynamic visual element with the dynamic digital content for display within the webpage without previously displaying default digital content that comprises renderable visual content.

US Pat. No. 10,769,351

RENDERING BASED ON A DOCUMENT OBJECT MODEL

Citrix Systems, Inc., Fo...

1. A method, comprising:adding a script to a received email, wherein the script is configured to prevent a web browser from retrieving external content linked within the email;
loading the email including the added script, using the web browser;
in response to receiving, from the web browser, an indication that parsing of the email is in progress, generating, using the web browser, a document object model (DOM) corresponding to the email;
canceling, by the script and during generation of the DOM corresponding to the email, one or more pending network requests to retrieve the external content linked within the email; and
rendering the email from the DOM, wherein rendering the email from the DOM comprises extracting content from a body portion of the DOM and rendering the email from the extracted content.

US Pat. No. 10,769,350

DOCUMENT LINK PREVIEWING AND PERMISSIONING WHILE COMPOSING AN EMAIL

Microsoft Technology Lice...

1. A method comprising:identifying a uniform resource locator (URL) in a message body of a composition interface for a message composed in an email application, the URL indicating a source of a document;
rendering the document within the message body as an interactive URL preview, the interactive URL preview enabling navigation to display different parts of the document while within the message body and enabling modification of content in the document displayed in the interactive URL preview while within the message body;
receiving a modification to the content in the document displayed in the interactive URL preview within the message body, wherein the modification includes editing the content in the document displayed in the interactive URL preview; and
updating the interactive URL preview to display the content comprising edits within the message body.

US Pat. No. 10,769,349

HANDWRITTEN DATA CAPTURE METHOD AND HANDWRITTEN DATA CAPTURE DEVICE

Wacom Co., Ltd., Saitama...

1. A handwritten data capture method that creates a plurality of pieces of stroke data, the handwritten data capture method comprising:acquiring a plurality of pieces of handwritten data created based on writing performed on a plurality of pages included in a paper medium and based on a writing order, wherein each of the pieces of handwritten data includes coordinate data indicating a position of an electronic pen on a sensor, pressure information indicating a pressure applied to a tip of the electronic pen, and timestamp information indicating a time value;
determining whether each of the pieces of handwritten data indicates that the electronic pen has a pen-down status or a pen-up status, wherein, when the pressure information included in a piece of handwritten data does not indicate that the pressure applied to the tip of the electronic pen is zero, the piece of handwritten data is determined to indicate that the electronic pen has the pen-down status, and when the pressure information included in the piece of handwritten data indicates that the pressure applied to the tip of the electronic pen is zero, the piece of handwritten data is determined to indicate that the electronic pen has the pen-up status;
storing M pieces of stroke data, wherein each of the M pieces of stroke data includes the coordinate data of at least one of the pieces of handwritten data that is determined to indicate that the pen has the pen-down status, wherein the coordinate data of the pieces of handwritten data that are determined to indicate that the pen has the pen-up status are excluded from the stroke data, wherein the timestamp information of the at least one of the pieces of handwritten data indicates a time that is after a time indicated by the timestamp information of a first one of the pieces of handwritten data that is determined to indicate that the pen has the pen-up status, and that is before a time indicated by the timestamp information of a second one of the pieces of handwritten data that is determined to indicate that the pen has the pen-up status;
assigning M order values to M pieces of stroke data, respectively, based on the timestamp information included in the handwritten data;
displaying together on a display device the M pieces of stroke data based on the M order values assigned to the M pieces of stroke data;
accepting an input of a break position of the M pieces of stroke data corresponding to one of the M order values, after acquiring the pieces of handwritten data created based on the writing performed on the pages included in the paper medium and based on the writing order;
identifying a continuous portion of the M pieces of stroke data based on the break position by extracting one or more of the M pieces of stroke data, wherein the one or more of the M pieces of stroke data are assigned one or more of the M order numbers that are greater than the one of the M order values corresponding to the break position;
updating the display device to display the identified continuous portion of the pieces of stroke data in the writing order; and
repeating the accepting, the identifying, and the updating until a given operation is received.

US Pat. No. 10,769,348

DYNAMIC TYPESETTING

TYPETURA LLC, Arlington,...

1. A computer implemented method for providing a dynamic typesetting package comprising:receiving a request from a user for a typesetting package to be served externally to contexts for rendering on a computerized device, the typesetting package comprising one or more font and one or more rendering rules for defining a typesetting for various elements of a content from a user across the contexts; said typesetting comprising configurations of layouts of the elements across the contexts;
in response to a requested typesetting package, providing a link to the user, the link referencing the requested typesetting package;
in response to the link being executed, matching at least a portion of the elements of the content to one or more parameters in the one or more rendering rules; and
wherein the one or more rendering rules, in response to an execution by the computerized device having a display context, dynamically configure and reorganize the elements in accordance with the layouts of the typesetting and provide progressive changes to the layouts in response to changes to instructions from the user.

US Pat. No. 10,769,347

PREDICTING NO-DEFECT-FOUND PHYSICAL FAILURE ANALYSIS RESULTS USING BAYESIAN INFERENCE AND GENERALIZED LINEAR MODELS

Synopsys, Inc., Mountain...

1. An electronic design automation (EDA) tool in a computer, the EDA tool including instructions that, when executed by a processor of said computer, cause the processor to perform operations comprising:generating a Bayesian Generalized Linear Model using a training data library including a plurality of first training data entries, where each first training data entry includes corresponding first evaluation data that respectively operably characterizes one or more measured operating characteristics of a corresponding first integrated circuit chip, and corresponding first physical failure analysis result data that operably characterizes results of a corresponding physical failure analysis of said corresponding first integrated circuit chip; and
utilizing the Bayesian Generalized Linear Model to generate a physical fault analysis (PFA) outcome prediction for a second evaluation data that operably characterizes said one or more measured operating characteristics of a corresponding second integrated circuit chip,
wherein the PFA outcome prediction includes at least one of a posterior distribution and a credible interval, said posterior distribution being a portion of said Bayesian Generalized Linear Model corresponding to said second evaluation data, and said credible interval being a partial certainty region defined by the posterior distribution.

US Pat. No. 10,769,346

METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR REARRANGEMENT OF OBJECTS WITHIN AN ELECTRONIC DESIGN

Cadence Design Systems, I...

1. A method for implementing placement for an electronic design, comprising:identifying a movement of an object within an electronic design, where the movement of the object causes one or more overlaps with one or more existing objects in the electronic design;
selecting an overlap from the one or more overlaps to correct;
identifying respective costs that respectively correspond to different possible solutions to correct the overlap, wherein a respective cost for a possible solution is determined based at least in part upon information of a perturbation or wirelength that pertains to the possible solution;
selecting a solution having a lower cost to correct the overlap; and
visually displaying the object moved to a dragged location, wherein movement of the one or more existing objects is also displayed to locations corresponding to the solution having the lower cost to resolve the overlap.

US Pat. No. 10,769,345

CLOCK TREE OPTIMIZATION BY MOVING INSTANCES TOWARD CORE ROUTE

Cadence Design Systems, I...

1. A system comprising:one or more processors of a machine; and
a computer storage medium storing instructions, which when executed by the machine, cause the machine to perform operations comprising:
accessing an integrated circuit design in memory, the integrated circuit design comprising a clock tree comprising one or more routes that interconnect terminals of a plurality of clock tree instances, a clock tree instance of the plurality of clock tree instances comprising a first terminal and a second terminal;
identifying a portion of a route in the clock tree that has a maximum transitive fanout that is less than a transitive fanout threshold, the transitive fanout threshold corresponding to a threshold number of terminals connected to a branch in the route;
determining a first offset by measuring a distance between the first terminal of the clock tree instance and the identified portion of the route;
determining a second offset by measuring a distance between the second terminal of the clock tree instance and the identified portion of the route;
determining a target offset based on a combination of the first and second offsets;
moving the clock tree instance toward the identified portion of the route by the target offset; and
generating an updated clock tree for the integrated circuit design based on moving the clock tree instance toward the identified portion of the route.

US Pat. No. 10,769,344

DETERMINING TIMING PATHS AND RECONCILING TOPOLOGY IN A SUPERCONDUCTING CIRCUIT DESIGN

Microsoft Technology Lice...

1. A method, implemented by a processor, for determining timing paths and reconciling topology in a superconducting circuit design, wherein the superconducting circuit design comprises a first timing path including a first set of timing pins, and wherein a first subset of the first set of timing pins is associated with a first timing constraint group including a first timing endpoint and a second timing endpoint, the method comprising:using the processor, processing the first timing constraint group to assign a first legal start time to the first timing endpoint and a second legal start time to the second timing endpoint;
inserting a first shadow element representing a first physically connected component on the timing path, wherein the first shadow element precedes the first timing endpoint or follows the second timing endpoint; and
addressing any changes to the first legal start time or the second legal start time caused by an insertion of the first shadow element on the timing path.

US Pat. No. 10,769,343

HIGH-SPEED SHAPE-BASED ROUTER

Pulsic Limited, Bristol ...

1. A method comprising:providing a layout with at least three pins to be coupled together using a single net;
adding a Steiner point to the layout;
determining a path between the Steiner point and a first pin of the at least three pins by using a computer, wherein the determining comprises:
determining a position of a spine segment between the Steiner point and the first pin;
connecting the Steiner point to the spine segment using a first subspine segment; and
connecting the first pin to the spine segment using a second subspine segment;
determining a path between the Steiner point and a second pin of the at least three pins; and
determining a path between the Steiner point and a third pin of the at least three pins,
wherein the determining a path between the Steiner point and a first pin of the at least three pins comprises:
ordering portions of the nets, wherein the ordering comprises:
when n pins of a net are to be routed, where n is an integer two or greater, determining at least n?1 routing problems to be solved;
determining an order of solving the at least n?1 routing problems;
when an X-orientation section of a first one of the at least n?1 routing problems is longer than a second one of the at least n?1 routing problems, ordering the first one of the at least n?1 routing problems before the second one of the at least n?1 routing problems; and
when an X-orientation section of a third one of the at least n?1 routing problems is longer than the second, but shorter than the first, ordering the third one of the at least n?1 routing problems after the first one of the at least n?1 routing problems, but before the second one of the at least n?1 routing problems.

US Pat. No. 10,769,342

PIN ACCESS HYBRID CELL HEIGHT DESIGN

TAIWAN SEMICONDUCTOR MANU...

1. A method of generating a layout diagram for an integrated circuit, the method comprising:arranging a plurality of first cells having a first cell height in a first row;
arranging a plurality of second cells having a second cell height in a second row abutting the first row, wherein the second cell height is less than the first cell height, and the first row and the second row extend along a first direction and are laid out relative to a routing grid comprising a plurality of first routing tracks extending along the first direction and a plurality of second routing tracks extending along a second direction perpendicular to the first direction;
placing a plurality of first cell pins within each first cell of the plurality of first cells, wherein each of the plurality of first cell pins extends along a corresponding second routing track of the plurality of second routing tracks; and
placing a plurality of second cell pins over a plurality of selected via placement points in each second cell of the plurality of second cells, wherein at least one second cell pin of the plurality of second cell pins extends along a corresponding second routing track of the plurality of second routing tracks across a boundary of a corresponding second cell of the plurality of second cells and into a corresponding first cell of the plurality of first cells abutting the corresponding second cell.

US Pat. No. 10,769,341

METHOD OF PLACING MACRO CELLS AND A SIMULATED-EVOLUTION-BASED MACRO REFINEMENT METHOD

NCKU Research and Develop...

1. A method of placing macro cells, comprising:performing corner-stitching-based macro legalization on a macro group composed of macro cells to be placed;
evaluating a score of each placed macro cell to be refined;
normalizing the score to be in a predetermined range to result in a normalized score;
generating a random number, which is in the same predetermined range as the normalized score;
determining whether the normalized score is greater than the random number;
placing the macro cell into a queue if the normalized score is greater than the random number; and
sorting and placing macro cells of the queue according to scores of the macro cells in the queue.

US Pat. No. 10,769,340

AUTOMATIC MOVING OF PROBE LOCATIONS FOR PARASITIC EXTRACTION

Mentor Graphics Corporati...

1. A method, executed by at least one processor of a computer, comprising:identifying probe location candidates for parasitic extraction from geometric elements on a probe layer, the probe layer being a physical layer of a layout design for a circuit design predetermined for placing one or more new probes, the probe location candidates being geometric elements on the probe layer within a boundary of an area having a predetermined size and covering an original probe location or having a distance from the original probe location less than a predetermined value, the probe location candidates being conductively connected to the original probe location, and the original probe location being on a geometric element representing a device pin of the circuit design on another physical layer;
selecting one or more new probe locations on the probe location candidates based on predetermined criteria; and
extracting, from the layout design, a parasitic resistance value for parasitic resistance between a geometric element representing a circuit pad or another device pin and the new one or more probe locations.

US Pat. No. 10,769,339

LOCAL BAND-TO-BAND-TUNNELING MODEL FOR TCAD SIMULATION

Synopsys, Inc., Mountain...

1. A computer implemented method for estimating a band-to-band tunneling (BBT) current in a circuit element, the method comprising:generating, by a processor, a model of the circuit element including a plurality of cells, wherein each cell includes position data and material data corresponding with an associated portion of said circuit element such that said position data defines a spatial position of said each cell within said model corresponding to a spatial positional of said associated portion, and such that said material data operably defines a material composition and corresponding electrical characteristics of said associated portion of said circuit element;
simulating operation of the circuit element including applying a simulated external electric field to a selected cell of said plurality of cells; and
utilizing a local BBT modeling function to generate a BBT current estimate, the local BBT modeling function including an exponential factor having a value determined by a difference between said external electric field and a built-in electric field at said selected cell and raised to an exponential power greater than one,
wherein the built-in electric field is calculated using said position data and said material data of said plurality of cells,
wherein said local BBT modeling function implements said exponential factor such that the BBT current estimate becomes zero when the external electric field is equal to the built-in electric field.

US Pat. No. 10,769,338

EMULATION OF QUANTUM AND QUANTUM-INSPIRED DYNAMICAL SYSTEMS WITH CLASSICAL TRANSCONDUCTOR-CAPACITOR CIRCUITS

THE TRUSTEES OF DARTMOUTH...

1. A system comprising a classical analog circuit to perform an emulation of a quantum or quantum-inspired dynamical systemwherein a complex probability amplitude of a component of a vector state of a quantum wave function is represented by, first and second voltages, VR and VI on identical first and second capacitors CR and CI respectively, corresponding to real and imaginary parts of the complex probability amplitude of said component respectively,
wherein a value of the identical capacitance of the first and second capacitors CR and CI is given by an adjustable capacitance value CHBAR with the adjustable capacitance value CHBAR being directly proportional to a value of a universal quantum Planck constant, h, divided by a mathematical constant, 2?, and
wherein current flows onto the first and second capacitors CR and CI correspond to Hamiltonian energy flows in the quantum or quantum-inspired dynamical system corresponding to said component.

US Pat. No. 10,769,337

IGBT MODELING METHOD AND CIRCUIT SIMULATION METHOD

TSINGHUA UNIVERSITY, Bei...

1. An insulated gate bipolar transistor (IGBT) modeling method, comprising:creating first piece-wise line functions describing a collector-emitter voltage vce, a collector current ic and a gate-emitter voltage vge of the IGBT during a switching-on transient based on an internal structure of the IGBT and transient processes of the IGBT, wherein creating the first piece-wise line functions comprises:
determining various periods during the switching-on transient of the IGBT, wherein the switching-on transient, which is after receipt of a turn-on signal and before a steady on-state, is divided into four on periods: a first on period starts when a gate drive sends the turn-on signal and ends when ic begins to rise, a second on period starts when ic begins to rise from 0 and ends when ic reaches a maximum value, a third on period starts when ic reaches the maximum value and ends when ic falls back to a load current, and a fourth on period ends when vce falls back to a saturation voltage; and
determining starting values and ending values of each of the collector-emitter voltage vce, the collector current ic and the gate-emitter voltage vge during the four on periods of the switching-on transient and a duration of each of the first on period, the second on period, the third on period and the fourth on period based on the transient processes of the IGBT, thereby determining the collector-emitter voltage vce, the collector current ic and the gate-emitter voltage vge during each of the first on period, the second on period, the third on period and the fourth on period as a linear function or an exponential function; and
creating second piece-wise line functions describing the collector-emitter voltage vce, the collector current ic and the gate-emitter voltage vge of the IGBT during a switching-off transient based on the internal structure of the IGBT and the transient processes of the IGBT, wherein creating the second piece-wise line functions comprises:
determining various periods during the switching-off transient of the IGBT, wherein the switching-off transient, which is after receipt of a turn-off signal and before a steady off-state, is divided into four off periods: a first off period starts when the gate drive sends the turn-off signal and ends when vce begins to rise, a second off period starts when vce begins to rise from the saturation voltage and ends when vce reaches a DC bus voltage, a third off period starts when ic begins to fall from the load current and ends when ic falls to a tail current initial value, and a fourth off period ends when ic falls to 0; and
determining starting values and ending values of each of the collector-emitter voltage vce, the collector current ic and the gate-emitter voltage vge during the four off periods of the switching-off transient and a duration of each of the first off period, the second off period, the third off period and the fourth off period based on the transient processes of the IGBT, thereby determining the collector-emitter voltage vce, the collector current ic and the gate-emitter voltage vge during each of the first off period, the second off period, the third off period and the fourth off period as a linear function or an exponential function.

US Pat. No. 10,769,336

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CONNECTING POWER SUPPLIES IN A MIXED SIGNAL DESIGN

Cadence Design Systems, I...

1. A computer-implemented method for converting between a SystemVerilog user-defined net (“UDN”) and an supply net comprising:providing a value conversion table (“VCT”) definition associated with an electronic circuit design;
mapping, using at least one processor during a simulation, between a SystemVerilog UDN field and a supply net field; and
converting at least one value between the SystemVerilog UDN field and the supply net field based upon, at least in part, the VCT definition.

US Pat. No. 10,769,335

SYSTEM AND METHOD FOR GRAPH BASED VERIFICATION OF ELECTRONIC CIRCUIT DESIGN

NXP USA, Inc., Austin, T...

1. An electronic design automation (EDA) tool for executing topological and functional checks on an electronic circuit design, the EDA tool comprising:a memory that is configured to store the electronic circuit design, a set of graphical rules, and a set of filter rules for executing the topological and functional checks; and
a processor that communicates with the memory, wherein the processor is configured to:
generate a test graph based on the electronic circuit design, wherein the test graph comprises a first set of normal nodes, a set of stretchable nodes, a first set of real edges, and a first set of functional edges;
replace the set of stretchable nodes with a set of nested networks in the test graph to generate a set of extended graphs, wherein each extended graph comprises the first set of normal nodes, the set of nested networks, a second set of real edges, and a second set of functional edges;
decouple the second set of real edges and the second set of functional edges of each extended graph to generate a set of real graphs and a set of functional graphs, respectively;
execute the topological checks on an input graph of the electronic circuit design, based on the set of graphical rules, to identify a set of real sub-graphs from the input graph, wherein each real sub-graph is isomorphic to a first real graph of the set of real graphs;
generate a set of functional sub-graphs by combining a first functional graph of the set of functional graphs with each real sub-graph; and
execute the functional checks on the set of functional sub-graphs, based on the set of filter rules, to identify a set of output graphs.

US Pat. No. 10,769,334

INTELLIGENT FAIL RECOGNITION

International Business Ma...

1. A method of debugging one or more simulation fails in processor design verification, the method comprising:determining whether a prediction model to predict one or more bug labels for the one or more simulation fails in a processor design exists;
retrieving, in response to determining the prediction model exists, the prediction model;
predicting one or more bug labels for the one or more simulation fails in the processor design using the prediction model;
determining whether a fix is available for the one or more predicted bug labels; and
simulating, in response to determining the fix is available for the one or more predicted bug labels, the fix for the one or more predicted bug labels in the processor design.

US Pat. No. 10,769,333

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DEBUGGING ONE OR MORE OBSERVABLE FAILURES IN A FORMAL VERIFICATION

Cadence Design Systems, I...

1. A computer-implemented method for electronic design verification comprising:providing, using a processor, an electronic design;
determining one or more design violations based upon, at least in part, a structural observability filter;
generating a violation trace based upon, at least in part, the one or more design violations, wherein the violation trace includes a violation starting point and at least one boundary signal;
displaying the violation trace at a graphical user interface configured to allow a user to debug the one or more design violations;
allowing the user to select at least one path to be waived at the graphical user interface;
generating a new violation trace without the at least one path to be waived; and
allowing the user to debug beginning at the boundary signal after the new violation trace without the at least one path to be waived is generated.

US Pat. No. 10,769,332

AUTOMATIC SIMULATION FAILURES ANALYSIS FLOW FOR FUNCTIONAL VERIFICATION

HCL Technologies Limited,...

1. A system for automatically diagnosing an error by performing a systematic failure analysis of a functional simulation, the system comprising:a Design Under Verification (DUV) or System Under Verification (SUV), wherein the DUV/SUV is configured to process a set of input packets to generate a set of actual output packets, wherein each input packet from the set of input packets comprises a set of data fields;
a testbench configured to communicate with the DUV/SUV, wherein the testbench includes:
a prediction unit corresponding to the DUV/SUV, wherein the prediction unit is configured to mimic the data processing associated with the DUV/SUV, and wherein the prediction unit is configured to process a set of input packets' copy for generating a set of expected output packets;
a comparison unit configured to compare
an actual output packet, from the set of actual output packets, with an expected output packet, from the set of expected output packets, corresponding to the actual output packet, and
the actual output packet with at least one subsequent expected output packet corresponding to the expected output packet, when the actual output packet is not matched with the expected output packet, wherein the actual output packet is compared with the at least one subsequent expected output packet until the match is found;
a diagnosing unit configured to
automatically diagnose at least one of a packet drop error, an ordering error, an error in routing, and report at least one of a diagnostic information and a default diagnostic information associated with the error;
compare a set of data fields in the actual output packet with a respective plurality of data fields in the corresponding expected output packet when the actual output packet is not matched with the at least one subsequent expected output packet;
compute a match score based upon the comparison of the set of data fields with the plurality of data fields;
compare a value of each non-matching data field, of the set of data fields, with an error value associated to an error reference code for the plurality of data fields when the match score is greater than a predefined score;
report the diagnostic information associated with the error reference code when the value and the error value are matched, and
the default diagnostic information associated with the error reference code when the value and the error value are not matched.

US Pat. No. 10,769,331

VERIFICATION ALGORITHM ENGINE SELECTION

INTERNATIONAL BUSINESS MA...

1. An apparatus comprising:a processing module that processes a netlist using a plurality of engines, the netlist comprising components and nodes of an integrated circuit design, each engine comprising an algorithm for verification of the integrated circuit design, wherein at least a portion of the plurality of engines comprise a transformation-based verification (“TBV”) engine that simplifies the netlist by reducing redundant elements;
a data collection module that stores, for each engine, execution results for the engine for a plurality of netlists, the results stored in a history buffer;
an engine selection module that, for a current netlist, calculates using execution results in the history buffer which engine of the plurality of engines has a highest predicted performance and selects the engine with the highest predicted performance; and
an engine execution module that executes the current netlist using the selected engine to produce execution results, reports the execution results, and stores the execution results in the history buffer,
wherein said modules comprise one or more of hardware circuits, a programmable hardware device and executable code, the executable code stored on one or more computer readable storage media.

US Pat. No. 10,769,330

PARTITIONING A LARGE CIRCUIT MODEL FOR SIGNAL ELECTROMIGRATION ANALYSIS

Cadence Design Systems, I...

1. A computer-implemented method for determining signal electromigration in an integrated circuit, comprising:selecting a plurality of partitions from a netlist of the integrated circuit, each of the plurality of partitions comprising independent signal paths along a plurality of components;
determining a size of a selected partition from the plurality of partitions;
when the size of the selected partition is greater than a pre-selected threshold, applying input vectors to at least one signal path in the selected partition to obtain a signal toggle in an output of the selected partition;
when the size of the selected partition is smaller than the pre-selected threshold, generating a logical representation comprising a plurality of input signals;
determining a current flow in the at least one signal path;
identifying an electromigration result from the current flow for a first component from the plurality of components;
generating an output database for the selected partition, the output database comprising an electromigration result for the first component; and
combining the output database for the selected partition with a second output database from a second partition, the second output database comprising a second electromigration result for a second component in the second partition to generate an electromigration report for the netlist of the integrated circuit.

US Pat. No. 10,769,329

RETENTION MODEL WITH RTL-COMPATIBLE DEFAULT OPERATING MODE

Synopsys, Inc., Mountain...

11. A computer-implemented method for incorporating a state retention cell between upstream circuitry and downstream circuitry of a circuit design, the method includinginstantiating a retention model into the circuit design such that a data input node of said retention model is configured to receive a generic input data signal from said upstream circuitry, such that a data output node of said retention model is configured to pass a generic output signal to downstream circuitry, and such that a clock node and a set/reset node are operably coupled to respectively receive generic clock and set/reset signals from corresponding circuitry of said circuit design,
wherein the retention model comprises:
a sequential block including
a storage element configured to store a first data value,
a retention element configured to store a second data value, and
a signal routing circuit operably coupled to the storage element, the retention element, the input node, the clock node, the set/reset node and the data output node; and
a retention controller block including a signal path control circuit configured to assert one or more signal path control signals in response to one or more external retention control signals, and
wherein the signal routing circuit is configured to enter a default operating mode when said retention controller block de-asserts all of said signal path control signals such that said signal routing circuit forms a first data signal path between the input terminal of the storage element and the data input node of the retention model, forms a second data signal path between the output terminal of the storage element and the data output node of the retention model, forms a clock signal path between a clock terminal of the storage element and the clock node of the retention model, and forms a set/reset signal path between a set/reset terminal of the storage element and the set/reset node of the retention model, whereby said storage element is operably configured to implement one of a flip-flop and a latch when said signal routing circuit is in said default operating mode.

US Pat. No. 10,769,328

GENERATING A TEMPLATE-DRIVEN SCHEMATIC FROM A NETLIST OF ELECTRONIC CIRCUITS

TEXAS INSTRUMENTS INCORPO...

1. A computer system, comprising:a memory; and
a processing device communicatively coupled to the memory, wherein the memory stores instructions that when executed by the processing device cause the processing device to:
receive an indication to export information pertaining to a first electronic design from a first Electronic Design Automation (EDA) tool executing on the computer system, the indication to export comprising information to request export in a common file format, the common file format comprising a human readable text based common file format;
export information describing the first electronic design from the first EDA tool; and
store the export information in a first simulation exchange format (SEF) file describing the first electronic design in the common file format, wherein the common file format in the SEF file includes information sufficient to recreate the placement and routing of components in the first electronic design, the information in the SEF file comprising: a schematic element including a hierarchical description of at least one circuit block and leaf elements of the at least one circuit block, the leaf elements comprising circuit components in the schematic; a component model element including at least one model for the circuit components in the schematic description for use in simulations; a simulation setup element including information used to set up simulations of the components in the schematic; and a symbol information component including graphical information used to display symbols corresponding to circuit blocks and components in the schematic.

US Pat. No. 10,769,327

INTEGRATED CIRCUIT AUTHENTICATION USING MASK FINGERPRINTING

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for authenticating a semiconductor chip, the computer-implemented method comprising:controlling, using a processor, a chip testing unit to measure, for each bit of a plurality of bits in the semiconductor chip, mask dimensions for a feature to determine variations of the feature within each bit;
using the processor to predict based on the variations, for each bit of the plurality of bits, a probability of being “0” or “1” to provide predicated probabilities;
using the processor to group, based on the predicted probabilities, each bit of the plurality of bits and selecting a subset of bits to provide a subset of predicted results;
controlling, using the processor, the chip testing unit to measure each bit of the subset of bits is in a state is “0” or “1” to provide measured results;
using the processor to compare the subset of predicted results and the measured results to provide a comparison; and
using the processor to determine, based on the comparison, that the semiconductor chip has been fabricated using an altered mask.

US Pat. No. 10,769,326

PARALLEL SOLUTION FOR FULLY-COUPLED FULLY-IMPLICIT WELLBORE MODELING IN RESERVOIR SIMULATION

Saudi Arabian Oil Company...

1. A method of simulating flow of multiphase fluids in wellbores of multilateral wells, the method comprising the steps of:partitioning a reservoir into a plurality of reservoir grid cells;
partitioning each multilateral wellbore of a plurality multilateral wellbores into a plurality of wellbore cells;
determining a plurality of sub-domains, each of the subdomains comprising a subset of the reservoir grid cells;
determining, for the reservoir grid cells, state changes and pressures of the reservoir grid cells and flow interchange of the multiphase fluids with the wellbore cells;
determining, for the wellbore cells, flow interchange within the wellbore cells and flow interchange of the multiphase fluids with the reservoir grid cells;
determining, for each of the multilateral wellbores, a multilateral wellbore dataset comprising:
well segment internal data corresponding to wellbore cells associated with the multilateral wellbore; and
for each sub-domain intersected by a segment of the multilateral wellbore, well-to-grid data comprising matrix data representing flow interchange between wellbore cells associated with the segment of the multilateral wellbore and reservoir grid cells of the sub-domain intersected;
determining, for each of the sub-domains, a sub-domain dataset comprising:
grid cell internal data corresponding to the reservoir grid cells associated with the sub-domain;
for each segment of a multilateral wellbore intersecting the sub-domain, grid-to-well data comprising matrix data representing flow interchange between the reservoir grid cells of the sub-domain and wellbore cells associated with the segment of the multilateral wellbore intersected; and
for each other sub-domain of the plurality of sub-domains that is adjacent the sub-domain, grid-to-grid data comprising matrix data representing flow interchange between the reservoir grid cells of the sub-domain and reservoir grid cells of the other sub-domain adjacent the sub-domain;
providing each of the multilateral wellbore datasets to different processors of a parallel processing system, wherein each of the multilateral wellbore datasets is provided to a respective processor of the parallel processing system that is different from the processor each of the other multilateral wellbore datasets is provided to, the providing of each of the multilateral wellbore datasets to different processors of the parallel processing system comprising:
providing, to a first processor of the parallel processing system associated with a first multilateral wellbore of the multilateral wellbores having segments intersecting a first sub-domain of the sub-domains, a first multilateral wellbore dataset comprising first well-to-grid data comprising matrix data representing flow interchange between wellbore cells associated with the segment of the first multilateral wellbore and reservoir grid cells of the first sub-domain;
providing each of the sub-domain datasets to different processors of the parallel processing system, wherein each of the sub-domain datasets is provided to a respective processor of the parallel processing system that is different from the processor each of the other sub-domain datasets is provided to, the providing of each of the sub-domain datasets to different processors of the parallel processing system comprising:
providing, to a second processor of the parallel processing system associated with the first sub-domain, a first sub-domain dataset comprising first grid-to-well data comprising matrix data representing flow interchange between the reservoir grid cells of the first sub-domain and wellbore cells associated with the segment of the first multilateral wellbore, and first grid-to-grid data comprising matrix data representing flow interchange between the reservoir grid cells of the first sub-domain and reservoir grid cells of a second sub-domain; and
providing, to a third processor of the parallel processing system associated with the second sub-domain, second grid-to-grid data comprising matrix data representing the flow interchange between the reservoir grid cells of the first sub-domain and reservoir grid cells of the second sub-domain; and
conducting, by the processors of the parallel processing system, parallel processing of the multilateral wellbore datasets and the sub-domain datasets to generate a simulation of representations of flow of the multiphase fluids of the wellbore in the reservoir, the parallel processing comprising:
exchanging, by the processors of the parallel processing system, well-to-grid data of the multilateral wellbore datasets, grid-to-well data of the sub-domain datasets, and grid-to-grid data of the sub-domain datasets, the exchanging comprising:
the first processor and the second processor exchanging the first well-to-grid data and the first grid-to-well data; and
the second processor and the third processor exchanging the first grid-to-grid data and the second grid-to-grid data;
forming, based on the exchange of well-to-grid data of the multilateral wellbore datasets, grid-to-well data of the sub-domain datasets, and grid-to-grid data of the sub-domain datasets by the processors of the parallel processing system, a series preconditioner as a series based expansion by matrix-vector multiplication operations of well influence terms based on the established representations of flow interchange with the wellbore cells for the reservoir grid cells and the established representations of flow interchange with the reservoir grid cells for wellbore cells having flow interchange;
applying a conjugate residual interactive matrix solution in the computer to solve the representations of flow of the multiphase fluids in the reservoir grid cells and wellbore cells to obtain a solution vector;
repeating the steps of forming a series preconditioner by matrix-vector multiplication operations and applying a conjugate residual interactive matrix solution in the computer to solve for the representations of flow of the multiphase fluids of the wellbore cells until the obtained solution vector is within an established limit of accuracy;
determining that the obtained residual is within the established limit of accuracy;
in response to determining that the obtained residual is within the established limit of accuracy:
storing the simulation of representations of flow of the multiphase fluids of the wellbore cells; and
displaying the simulation of representations of flow of the multiphase fluids of the wellbore in the reservoir,
determining, based on the simulation of representations of flow of the multiphase fluids of the wellbore in the reservoir, a location of a well to be drilled; and
drilling, based on the determination of the location of the well to be drilled, the well at the location determined.

US Pat. No. 10,769,325

SIMULATION AUGMENTED REALITY SYSTEM FOR EMERGENT BEHAVIOR

DASSAULT SYSTEMES SIMULIA...

20. A non-transitory computer program product for providing an augmented reality experience, the computer program product executed by a server in communication across a network with one or more clients and comprising:a computer readable medium, the computer readable medium comprising program instructions which, when executed by a processor causes:
defining in computer memory, a model of a real-world system;
performing a plurality of simulations of the real-world system using the defined model, each simulation of the plurality of simulations including one or more simulation input parameters for that simulation, performing each simulation of the plurality of simulations producing predicted field data for that simulation;
storing the predicted field data and the associated one or more simulation input parameters for each simulation of the plurality of simulations;
receiving field data from one or more sensors in the real-world system;
calibrating the model of the real-world system using the received field data relative to the predicted field data, resulting in a calibrated model; and
providing the augmented reality experience of the real-world system using the determined values of the one or more calibrated input parameters as inputs to the calibrated model of the real-world system, the state of the real-world system at a future time is determined to be the nearest failure condition to the current state of the real-world system.

US Pat. No. 10,769,324

INTELLIGENT ADDITIVE MANUFACTURING

Inkbit, LLC, Medford, MA...

1. A method for iteratively fabricating a 3D object via a printer, the method comprising, in a first iteration:receiving a 3D specification characterizing a first part of the 3D object to be printed on a second part of the 3D object fabricated in a previous iteration;
receiving scan data representative of the second part of the 3D object;
using a predistorter to process the 3D specification of the first part using the scan data to produce a modified 3D specification of the first part of the 3D object, wherein the predistorter is configured with configuration data to compensate for at least some characteristics of a printing process; and
causing the printer to print the first part of the object onto the second part according to the printing process based at least in part on the modified 3D specification, wherein the printed first part mates with the second part.

US Pat. No. 10,769,323

RIG SYSTEMS SELF DIAGNOSTICS

Schlumberger Technology C...

1. A system for deriving a numerical Health Index for one or more components, the system comprising:a first component having a first feature which decays when the first component is operated, wherein the first component comprises part of a drilling rig;
a second component having a second feature which decays when the second component is operated, wherein the second component comprises another part of the drilling rig, and wherein the second component is different from the first component;
a measurement sensor operably coupled to the first component and the second component and configured to measure a first decay of the first feature and a second decay of the second feature; and
a health model configured to receive a measurement from the measurement sensor, wherein the measurement represents the first decay and the second decay, the health model being configured to compute a first Health Index corresponding to the first component and a second Health Index corresponding to the second component, wherein the first and second Health Indices are on a same scale,
wherein the system is configured to alter operation of the first and second components to cause the first and second Health Indices to reach a threshold at a same time, wherein an operation of the drilling rig is stopped to perform maintenance on the first and second components when the first and second Health Indices to reach the threshold, and wherein performing the maintenance on the first and second components at the same time reduces an amount of time that the operation of the drilling rig is stopped.

US Pat. No. 10,769,322

PROCEDURE EXTRACTION SYSTEM

MITSUBISHI ELECTRIC CORPO...

1. A procedure extraction system for extracting and storing, from a plurality of steps included in an analysis log, those steps relevant to determination of a cause of an abnormality in facility equipment, comprising:an analysis log storage to store a procedure in accordance with which an operator has analyzed an operating condition of facility equipment using operation data relating to the operating condition of the facility equipment;
a processor to execute a program; and
a memory to store the program which, when executed by the processor, performs processes of:
creating a graph using the operation data,
specifying, upon receiving an input from the operator, at least a region of the graph as a region considered to be a cause of abnormality of the facility equipment, and
extracting, from among steps included in the procedure stored in the analysis log storage, a step necessary for creating the graph including the region specified by the process of specifying, said extracting including
determining, when the graph is a graph of composite data, that a step including information on an arithmetic expression used for generating the composite data is relevant to the determination of the cause of the abnormality,
tracing back, in reverse time order, steps stored in the analysis log storage starting from the step in which the region is specified, to obtain information on arithmetic expressions used for generating the composite data of the graph until the composite data is expressed only by operations between operation data, and
identifying each of the steps traversed in the tracing back as relevant to the determination of the cause of the abnormality.

US Pat. No. 10,769,321

PIPELINE DESIGN AND LAYOUT SYSTEM AND METHOD THEREFOR

Alex E. Paris Contracting...

1. A method for designing a pipeline, the method comprising the steps of:(a) providing a survey of a pipeline pathway;
(b) determining, using a processor, a digital terrain model from the survey;
(c) inputting to the processor a set of pipeline design criteria;
(d) determining, using the processor, a first pipeline layout based on the digital terrain model and the pipeline design criteria, including a plurality of points of intersection for the pipeline layout wherein each of the points of intersection includes first design information for a respective portion of the first pipeline layout;
(e) displaying at least one of a plan view and a profile view of the determined first pipeline layout on an electronic display device, wherein the displayed first pipeline layout includes the plurality of points of intersection, and wherein the first pipeline layout comprises straight line pipe sections between each pair of adjacent points of intersection;
(f) selecting one of the plurality of points of intersection and modifying, using the processor, the first design information for the respective portion of the first pipeline layout;
(g) automatically determining, using the processor, a modified pipeline layout based on the first pipeline layout and the modified design information;
(h) inputting to the processor a predetermined length of an uncut pipe;
(i) automatically calculating, using the processor, a cut length for the uncut pipe based on the modified design information;
(j) automatically determining, using the processor, a parts list including a plurality of pipes for the modified pipeline layout based on the modified design information;
(k) displaying at least one of a plan view and a profile view of the modified pipeline layout on the electronic display device, wherein the displayed modified pipeline layout includes a label for each of the plurality of pipes for the modified pipeline layout;
(l) automatically determining, using the processor, fabrication information for each of the plurality of pipes in the modified pipeline layout; and
(m) exporting position information relating to a ditch for the modified pipeline layout.

US Pat. No. 10,769,320

INTEGRATED USE OF MODEL-BASED METROLOGY AND A PROCESS MODEL

KLA-Tencor Corporation, ...

1. A method comprising:providing illumination radiation to a target structure fabricated on a semiconductor wafer, the illumination radiation provided by an illumination source of a metrology tool;
detecting an amount of radiation from the target structure in response to the illumination radiation, the amount of radiation detected by a detector of the metrology tool;
generating a measured response associated with the target structure based on the detected radiation, the measured response comprising an amount of measurement data;
determining a set of geometric parameter values characterizing the target structure and one or more process parameter values characterizing a fabrication process employed by a semiconductor process tool to fabricate the target structure on the semiconductor wafer based on a fitting of the amount of measurement data to an integrated measurement model of the target structure, wherein the integrated measurement model is based on a process based target model that constrains values of one or more of the set of geometric parameters characterizing the target structure based on a range of achievable values of one or more fabrication process parameters of the process based target model and a metrology based target model that predicts the measured response based on a model of an interaction of the target structure with the metrology tool; and
communicating the one or more process parameter values to the semiconductor process tool, that causes the semiconductor process tool to adjust one or more process parameters of the semiconductor process tool to achieve a desired target structure.

US Pat. No. 10,769,319

METHODS AND SYSTEMS FOR FORECASTING TIME-DEPENDENT PHENOMENA BY COMBINING EXPERIMENTAL AND DIGITAL DATA

Airbus Operations (S.A.S....

1. A computer implemented method for predicting at least one time-dependent phenomenon, the method comprising:A. acquiring, by a first data acquisition unit in communication with a first data generation unit comprising one or more sensors, first time-dependent data relating to the phenomenon, the first time-dependent data comprising experimental data of a parameter characterizing the phenomenon, the experimental data being generated by measurements performed using the one or more sensors;
B. acquiring, by a second data acquisition unit in communication with a second data generation unit comprising one or more processors, second time-dependent data, relating to the phenomenon, the second time-dependent data comprising digital data of the parameter characterizing the phenomenon, the digital data being obtained by digital simulation; and
C. generating, by a data processing unit in communication with the first data acquisition unit and the second data acquisition unit, a prediction of the time-dependent phenomenon by using the first time-dependent data to calibrate the second time-dependent data, wherein the prediction is a higher resolution prediction of the time-dependent phenomenon than at least the first time-dependent data, and the prediction is based on the second data that was calibrated, wherein step C comprises:
C1. transforming the first and second time-dependent data from a time domain into a frequency domain;
C2. constructing proper orthogonal decomposition (POD) models relating to a POD, the experimental data and the digital data being decomposed respectively into two POD models, the POD models that were constructed containing different POD modes relating to a POD;
C3. selecting, from the POD modes, relevant POD modes;
C4. producing calibrated data, based on the selected relevant POD modes, a corresponding base, called POD base, being computed from the digital data, the experimental data being then used to calibrate the POD base to form a complete solution to obtain the prediction of the time-dependent phenomenon; and
C5. in case of reversible transformation in sub-step C1, transforming the complete solution, from a frequency domain into a time domain, to obtain the prediction of the time-dependent phenomenon;
wherein the first data generation unit and the second data generation unit are separate data generation units;
wherein the first data acquisition unit and the second data acquisition unit are separate data acquisition units;
wherein the first data acquisition unit connects to the data processing unit via a first data transmission link and the second data acquisition unit connects to the data processing unit via a second data transmission link that is separate from the first data transmission link; and
wherein sub-step C3 comprises selecting, as relevant POD modes, a number p of first POD modes, p being an integer selected from the group consisting of 3, 4 and 5.

US Pat. No. 10,769,318

SYSTEMS AND METHOD FOR DETERMINING SOLAR PANEL PLACEMENT AND ENERGY OUTPUT

SUNPOWER CORPORATION, Sa...

1. A system for determining solar panel placement and corresponding energy output, comprising:a computing device; and
a server configured to be coupled to the computing device via a network and including circuitry configured to
receive a request from a computing device for energy production information for each solar panel type and for each array of solar panels, wherein the request includes installation location information corresponding to an installation location, and
transmit the energy production information for the solar panel in each array to the computing device,
wherein the computing device includes circuitry configured to:
store a maximum solar panel design including a maximum number of solar panels that can be installed at the installation location in a predetermined layout,
store the energy production information, and, without making additional requests to the server,
receive one or more of a selection and deselection of one or more solar panels and one or more solar panel arrays of the maximum solar panel design, and
determine a solar panel installation design based on solar panel placement at the installation location, the one or more of the selection and deselection of the one or more solar panels and one or more solar panel arrays, and an energy production estimate based on the stored energy production information,
wherein, in determining energy production information for each solar panel type and for each array of solar panels, the circuitry is further configured to
receive the installation location information,
determine the maximum solar panel design, wherein the maximum solar panel design is a predetermined number of solar panels placed on each section of a roof of the installation location, and the predetermined number of solar panels placed on each section of the roof comprises a solar panel array,
request energy production for a one panel system of one or more solar panel types for each solar panel array,
receive energy production information for each request, wherein the number of requests is based on the number of solar panel arrays and a number of types of solar panels, and
locally store the energy production information for each solar panel type for each solar panel array.

US Pat. No. 10,769,317

COMPUTER AIDED SYSTEMS AND METHODS FOR CREATING CUSTOM PRODUCTS

Best Apps, LLC, Miami Be...

1. A computer system comprising:a computing device;
a network interface;
a non-transitory data media configured to store instructions that when executed by the computing device, cause the computing device to perform operations comprising:
provide for display on a first user terminal an interface enabling the first user to specify proscribed combinations of design elements, wherein the interface enables the first user to specify that at least a first design element is not to be combined with design elements comprising text content, image content, and/or audio content of a specified feature type;
receive, via the network interface, from the first user terminal, a specification of one or more proscribed combinations of design elements, wherein the specification indicates that the first design element is not to be combined with a specified design element comprising text content, image content, and/or audio content of a proscribed first feature type, the proscribed first feature type comprising adult content or violent content;
store the specification of proscribed combinations of design elements;
enable a second user to access, via a second user terminal, the first design element;
provide, for display on the second user terminal, a design customization user interface enabling the second user to combine digital content with the first design element, wherein the digital content comprises image, text, and/or audio design elements;
determine, using an analysis engine configured to perform machine learning and to perform image, textual, and/or audio analysis and identify adult content and/or violent content, whether a second design element comprising digital text, image, and/or audio content specified by the second user includes content of the proscribed first feature type, the proscribed first feature type comprising adult content or violent content;
based at least in part on the determination of the analysis engine as to whether the second design element includes content of the proscribed first feature type, the proscribed first feature type comprising adult content or violent content, determine whether a combination of the second design element with the first design element is proscribed by the specification of proscribed combinations of design elements;
at least partly in response to a determination that the combination of the second design element is proscribed by the specification of proscribed combinations of design elements, inhibit printing on a physical item and/or electronic distribution by the second user of the first design element in combination with the second design element; and
at least partly in response to a determination that combination of the second design element with the first design element is not included in the specification of proscribed content combinations, enable printing on a physical item and/or electronic distribution by the second user of the first design element in combination with the second item.

US Pat. No. 10,769,316

PROTECTING MOBILE DEVICES FROM UNAUTHORIZED DEVICE RESETS

T-Mobile USA, Inc., Bell...

1. A method for preventing an unauthorized master reset of a mobile device, the method comprising:receiving, at a server remote from the mobile device, a token from the mobile device,
wherein the token is transmitted in part from an operating system of the mobile device to the server after invocation of a master reset at the mobile device, and
wherein the server is associated with a wireless network carrier that provides a telecommunication network for the mobile device;
extracting an identifier for the mobile device from the token;
identifying a status of the mobile device by comparing the extracted identifier to information stored within one or more databases associated with the server,
wherein the one or more databases store information for subscribers of the wireless network carrier that provides the telecommunication network for the mobile device;
wherein the information relates identifiers for mobile devices with status information for the mobile devices, and
wherein the status information for the mobile devices indicates whether the mobile devices are stolen;
based on the identified status of the mobile device, automatically authorizing the mobile device to perform the master reset without requiring a user authentication; and
transmitting to the mobile device an authorization token to the operating system of the mobile device based on the identified status of the mobile device,
wherein the authorization token causes the mobile device to complete the master reset at the mobile device when the identified status of the mobile device is an authorized status; and
wherein the authorization token causes the mobile device to prevent completion of the master reset operation at the mobile device when the identified status of the mobile device is a stolen status.

US Pat. No. 10,769,315

ANTI-THEFT RECOVERY TOOL

T-Mobile USA, Inc., Bell...

1. One or more non-transitory computer-readable media storing computer-executable instructions that upon execution cause one or more processors to perform acts comprising:receiving, at a server of a wireless carrier network, a registration request message that includes a service registration identifier of a messaging service, from an application on a user device;
sending a registration response message to the application that includes a session identifier generated by the server, the registration response message indicating that the application is registered to receive a disablement message;
receiving a request message from the application on the user device via the messaging service that provides communication between the server and the user device, the request message including a request for the server to provide the disablement message to the user device that triggers the user device to disable a function on the user device that calls for an input of an authentication credential by a user to perform a factory reset of the user device to permit the user to perform a factory reset of the user device without inputting the authentication credential;
sending, from the server, the disablement message to the user device via the messaging service following an authentication of the request message; and
receiving, at the server, a completion message from the application on the user device that indicates a disablement of the function on the user device that calls for the input of the authentication credential for the factory reset of the user device following the sending of the disablement message.

US Pat. No. 10,769,314

FINGERPRINT SENSING INTEGRATED CIRCUIT DEVICE

ELAN MICROELECTRONICS COR...

1. A fingerprint sensing integrated circuit device, comprising:a fingerprint sensing device configured to detect a fingerprint and generate fingerprint data;
an encryption unit, connected to the fingerprint sensing device and configured to encrypt the fingerprint data and output encrypted fingerprint data;
a multiplexer comprising an output end, a first input end and a second input end, the first input end connected to the fingerprint sensing device, the second input end connected to the encryption unit, wherein the multiplexer selectively outputs one of the fingerprint data and the encrypted fingerprint data, wherein the multiplexer connects the output end to the second input end according to a first selection signal in a normal operation mode, and wherein the multiplexer connects the output end to the first input end according to a second selection signal in a test operation mode; and
a transmission interface, connected to the output end of the multiplexer.

US Pat. No. 10,769,313

METHOD FOR FINGERPRINT UNLOCKING AND TERMINAL

GUANGDONG OPPO MOBILE TEL...

1. A method for application unlocking, comprising:acquiring fingerprint information for an application to be unlocked;
performing actions of comparing the fingerprint information with preset fingerprint information and refreshing a display page of the application to be unlocked in parallel;
displaying a refreshed display page of the application to be unlocked, when the fingerprint information matches the preset fingerprint information successfully; and
stopping refreshing the display page of the application to be unlocked, when the fingerprint information does not match the preset fingerprint information and the display page of the application to be unlocked has not been refreshed completely;
wherein the fingerprint information is a fingerprint image, wherein performing the actions of comparing the fingerprint information with the preset fingerprint information and refreshing the display page of the application to be unlocked in parallel comprises:
comparing the fingerprint information with the preset fingerprint information; and
refreshing the display page of the application to be unlocked while continuing performing the action of comparing the fingerprint information with the preset fingerprint information, when an area that is successfully matched in the fingerprint image reaches a first preset threshold before a fingerprint comparison is completed.

US Pat. No. 10,769,312

METHOD AND APPARATUS FOR TRUSTED DISPLAY ON UNTRUSTED COMPUTING PLATFORMS TO SECURE APPLICATIONS

CARNEGIE MELLON UNIVERSIT...

1. A system for providing a trusted display for secure applications on an untrusted computing platform, comprising:one or more graphics processing units (GPU) driving one or more display monitors, each GPU defining a plurality of GPU objects; and
a GPU separation kernel (GSK) performing the functions of
determining which of said plurality of GPU objects are security-sensitive;
mediating access to the security-sensitive objects issued by the secure applications and non-secure operating systems and applications;
emulating accesses to a subset of the security-sensitive objects for the non-secure operating systems and applications.

US Pat. No. 10,769,311

ENCRYPTING PORTABLE MEDIA SYSTEM AND METHOD OF OPERATION THEREOF

ClevX, LLC, Kirkland, WA...

1. A method comprising:generating, by a portable media system, an internal encryption key inside of the portable media system for encrypting clear information and decrypting cipher information, the portable media system being configured to store the cipher information, the portable media system configured to store the cipher information, the portable media system configured to receive and send the clear information, the portable media system configured to receive and send the cipher information;
storing the internal encryption key inside the portable media system, wherein the internal encryption key is not visible outside the portable media system;
receiving, by the portable media system from a host computer system, a command indicating a selection of the clear information or the cipher information to be transmitted;
retrieving the cipher information from a memory of the portable media system based on the command;
decrypting the cipher information when the command indicates the selection of clear information; and
transmitting the cipher information or the clear information from the portable media system to the host computer system based on the command, wherein the encryption and decryption is performed by the portable media system away from the host computer system using the internal encryption key.

US Pat. No. 10,769,310

METHOD FOR MAKING A MACHINE LEARNING MODEL MORE DIFFICULT TO COPY

NXP B.V., Eindhoven (NL)...

1. A method comprising:providing a neural network architecture having an input layer, a plurality of hidden layers, and an output layer, each of the plurality of hidden layers having a plurality of nodes;
providing a neural network application to run on the neural network architecture;
providing a first type of activation functions;
providing a second type of activation functions, wherein the second type of activation functions is different from the first type of activation functions;
assigning a combination of the activation functions of the first and second types to the plurality of nodes; and
training the neural network application with a training set to generate a machine learning model.

US Pat. No. 10,769,309

APPARATUS AND METHOD FOR GENERATING IDENTIFICATION KEY

ICTK HOLDINGS CO., LTD, ...

1. A semiconductor chip for generating an identification key, the chip comprising:an identification key generator circuit, including:
a plurality of two layers; and
a plurality of contacts or vias formed between the plurality of two layers, a hole size of at least one contact or via among the plurality of contacts or vias being
greater than a hole size at which the contact or via never creates a short between the two layers, and
less than a minimum hole size at which the contact or via always creates the short between the two layers,
wherein the identification key generator circuit generates an identification key based on an electrical characteristic of a contact or via between two layers and wherein the electrical characteristic of the contact or via between the two layers remains invariant over any period of time; and
an identification key reader circuit that reads the identification key by reading the electrical characteristic of the contact or via between the two layers constituting the identification key generator circuit.

US Pat. No. 10,769,308

TECHNIQUE USED IN TEXT ANALYSIS IN A SAFE MANNER

International Business Ma...

1. A computer program product used in text analysis, the computer program product comprising:one or more computer readable storage media; and
program instructions stored on the one or more computer readable storage media, the program instructions comprising:
program instructions to replace a first character string in a logic, wherein the logic is a format which analyzes input text and extracts additional information used for the text analysis, with a second character string which is different from the first character string, using a mapping between the first character string and the second character string, the first character string being a character or a combination of characters in the logic;
program instructions to search for a first character string in a target document for the text analysis and replacing the first character string, if found, with the second character string, using the mapping;
program instructions to send the logic after the replacement to a server computer;
program instructions to send the target document after the replacement to the server computer; and
program instructions to receive from the server computer a text analysis result for the target document after the replacement.

US Pat. No. 10,769,307

PROCESSING SYSTEM USING NATURAL LANGUAGE PROCESSING FOR PERFORMING DATASET FILTERING AND SANITIZATION

Bank of America Corporati...

1. A computing platform, comprising:at least one processor;
a communication interface commutatively coupled to the at least one processor; and
memory storing computing-readable instructions that, when executed by the at least one processor, cause the computing platform to:
receive, from a filtering control device, a dataset file and one or more commands directing the computing platform to sanitize the dataset file;
in response to receiving the one or more commands directing the computing platform to sanitize the dataset file, identify confidential information contained in the dataset file using named entity recognition and one or more dynamic entity profiles;
sanitize the dataset file by extracting the confidential information from the dataset file and replacing the confidential information with non-confidential information to produce a sanitized dataset file;
based on identifying the confidential information contained in the dataset file, update the one or more dynamic entity profiles;
send, to a target environment host server, the sanitized dataset file, wherein sending the sanitized dataset file to the target environment host server causes the target environment host server to use the sanitized dataset file in a testing environment that is prohibited from containing confidential information; and
update one or more of the dynamic entity profiles, wherein updating the one or more of the dynamic entity profiles comprises:
identifying that the confidential information comprises an account number containing a first number of digits,
identifying that the one or more of the dynamic entity profiles indicates that the account number should contain a second number of digits, and
modifying, based on identification of the account number containing the first number of digits, the one or more of the dynamic entity profiles to indicate that the account number should contain the first number of digits instead of the second number of digits.

US Pat. No. 10,769,306

APPLYING A DIFFERENTIAL PRIVACY OPERATION ON A CLUSTER OF DATA

INTERNATIONAL BUSINESS MA...

1. A method for data anonymity in a computing environment by a processor, comprising:receiving a dataset by the processor, the dataset comprising records stored in a database; wherein the records include a plurality of defined fields, some of the plurality of defined fields including at least categorical and numerical attributes;
defining, through a user interface, a first algorithm for a differential privacy operation and a second algorithm for a clustering operation to be performed on the dataset;
transforming the dataset by the processor into an anonymous dataset by applying the differential privacy operation and the clustering operation to the dataset; wherein the differential privacy operation is applied to each cluster of data obtained from the clustering operation such that the clustering operation is applied to a first subset of the plurality of defined fields of the records and the differential privacy operation is applied to a second, remaining subset of the plurality of defined fields of the records; and wherein, responsive to a completion of both the clustering operation and the differential privacy operation, the records of the dataset are shuffled as reorganized in the database; and
outputting and storing, by the processor, the transformed dataset as the anonymous dataset having a specified level of privacy according to the differential privacy operation such that k-anonymity is achieved on the plurality of defined fields including both the categorical and numerical attributes of the dataset transformed by the differential privacy operation into the anonymous dataset.

US Pat. No. 10,769,305

METHOD AND SYSTEM FOR DOUBLE ANONYMIZATION OF DATA

MASTERCARD INTERNATIONAL ...

1. A method for double anonymization of data, comprising:receiving, by a receiving device of a first computing system, a plurality of first data sets, each first data set including at least a set identifier and including personally identifiable information, each first data set including data related to an electronic payment transaction, each set identifier included in each first data set being a primary account number used in the related electronic payment transaction, and the personally identifiable information included in each first data set comprising the related primary account number;
anonymizing, by the first computing system, each of the first data sets, wherein anonymizing includes at least replacing the set identifier included in each first data set with a hashed identifier and deidentifying the personally identifiable information, where the hashed identifier is generated via the application of one or more hashing algorithms to at least the corresponding set identifier;
responsive to and subsequent to deidentifying the personally identifiable information, discarding, by the first computing system, the personally identifiable information;
electronically transmitting, by a transmitting device of the first computing system, the plurality of anonymized first data sets to a receiving device of a second computing system, wherein the second computing system is distinct and separate from the first computing system;
anonymizing, by the second computing system, each of the anonymized first data sets, wherein anonymizing includes at least replacing the hashed identifier with a double-hashed identifier, the double-hashed identifier being generated via application of one or more hashing algorithms to at least the corresponding hashed identifier; and
storing, in the second computing system or a third separate and distinct computing system, the plurality of double anonymized first data.

US Pat. No. 10,769,304

APPARATUS AND METHOD FOR TRANSMITTING PERSONAL INFORMATION IN INDIVIDUALLY UNIDENTIFIABLE WAY

UNIVERSITY-INDUSTRY COOPE...

1. A method for disclosing personal information in individually unidentifiable way by an apparatus, comprising:(a) generating an unidentifiable identifier (ID) of the apparatus with the personal information;
(b) setting a transmission cycle,
wherein the transmission cycle is a cycle for transmitting an ID list for transmission to a server,
wherein the transmission cycle includes:
at least one acquisition interval, which is a time interval during which at least one ID list disclosed by a first external terminal is acquired through a communication unit; and
at least one disclosure interval, which is a time interval during which an ID list for disclosure is disclosed to a second external terminal through the communication unit,
wherein a start time and a termination time of the acquisition interval and the disclosure interval respectively are set arbitrarily within the transmission cycle, or the start time of the acquisition interval is set to be ahead of the start time of the disclosure interval by a predetermined time, and
wherein the transmission cycle of the apparatus is the same as that of the first external terminal;
(c) acquiring at least one ID list disclosed by the first external terminal in the acquisition interval;
(d) generating an ID list acquired in an acquisition interval by using an ID list disclosed by an unidentifiable communication unit of the first external terminal in the acquisition interval;
(e) updating an ID list for storage by using the ID list acquired in the acquisition interval;
(f) generating the ID list for disclosure by rearranging the order of IDs or extracting IDs included in the ID list for storage; and
(g) disclosing the ID list for disclosure to the second external terminal during the disclosure interval.

US Pat. No. 10,769,303

DATA PROCESSING SYSTEMS FOR CENTRAL CONSENT REPOSITORY AND RELATED METHODS

OneTrust, LLC, Atlanta, ...

1. A computer-implemented data processing method for managing a plurality of data assets of an organization shared with a third-party data repository, the method comprising:identifying, by one or more processors, a form used to collect one or more pieces of personal data;
determining, by the one or more processors, one or more data assets of a plurality of data assets of the organization where input data of the form is transmitted;
adding, by the one or more processors, the one or more data assets to the third-party data repository;
in response to a user submitting the form, creating, by the one or more processors, a unique subject identifier associated with the user;
transmitting, by the one or more processors, the unique subject identifier to the third-party data repository along with the form data provided by the user in the form, to the data asset;
digitally storing, by the one or more processors, the unique subject identifier in the third-party data repository and along with the form data provided by the user in the form, in the data asset;
receiving, by the one or more processors, a data subject access request from the user, wherein the data subject access request comprises a type of data subject access request and the type of data subject access request is a data subject deletion request;
accessing, by the one or more processors, the third-party data repository to identify the unique subject identifier of the user;
determining, by the one or more processors, which one or more data assets of the plurality of data assets of the organization include the unique subject identifier;
accessing, by the one or more processors, personal data of the user stored in each of the one or more data assets of the plurality of data assets of the organization that include the unique subject identifier;
in response to accessing the personal data of the user stored in each of the one or more data assets of the plurality of data assets, automatically determining, by the one or more processors, that a first portion of personal data of the user stored in the one or more data assets has one or more legal bases for continued storage;
in response to determining that the first portion of personal data of the user stored in the one or more data assets has one or more legal bases for continued storage, automatically maintaining storage, by the one or more processors, of the first portion of personal data of the user stored in the one or more data assets;
automatically facilitating deletion, by the one or more processors, of a second portion of personal data of the user stored in the one or more data assets for which one or more legal bases for continued storage has not been identified, wherein the first portion of the personal data of the user stored in the one or more data assets is different from the second portion of personal data of the user stored in the one or more data assets.

US Pat. No. 10,769,302

CONSENT RECEIPT MANAGEMENT SYSTEMS AND RELATED METHODS

OneTrust, LLC, Atlanta, ...

1. A consent receipt management system comprising:one or more processors; and
computer memory that stores a plurality of consent records associated with a unique subject identifier, each of the plurality of consent records being associated with a respective transaction of a plurality of transactions involving a data subject and an entity, wherein the consent receipt management system is configured for:
receiving a request to initiate a transaction between the entity and the data subject, the transaction involving collection or processing of personal data associated with the data subject by the entity as part of a processing activity undertaken by the entity that the data subject is consenting to as part of the transaction;
in response to receiving the request:
identifying a transaction identifier associated with the transaction;
generating, a unique consent receipt key for the transaction; and
determining a unique subject identifier for the data subject;
electronically storing the unique subject identifier, the unique consent receipt key, and the transaction identifier in computer memory;
electronically associating the unique subject identifier, the unique consent receipt key, and the transaction identifier;
generating a consent record for the transaction, the consent record comprising at least the unique subject identifier and the unique consent receipt key;
electronically transmitting the consent record to the data subject;
providing a consent receipt management portal;
displaying, to the data subject, via the consent receipt management portal, the plurality of consent records;
analyzing the plurality of consent records to identify one or more transactions associated with the unique subject identifier that require the data subject to provide confirmatory consent;
enabling the data subject to withdraw, via the consent receipt management portal, a consent for the collection or processing of personal data associated with the data subject by the entity as part of the transaction;
receiving a request from the data subject via the consent receipt management portal to withdraw the consent;
in response to receiving the request to withdraw the consent:
modifying the unique consent receipt key to include data related to a time of the request to withdraw;
automatically ceasing the collection or processing of the personal data associated with the data subject as part of the transaction;
identifying, based at least in part on one or more data models defining one or more data transfers among one or more data assets utilized by the entity for the collection or processing of the personal data, a respective storage location of each of one or more pieces of personal data associated with the data subject on the one or more data assets that was collected or processed by the entity prior to receiving the request to withdraw the consent;
in response to identifying the respective storage location of each of the one or more pieces of personal data associated with the data subject, automatically determining that a first portion of the one or more of the pieces of personal data has one or more legal bases for continued storage; and
automatically facilitating deletion of a second portion of the one or more pieces of personal data associated with the data subject that do not have one or more legal bases for continued storage, wherein the first portion of the one or more pieces of personal data is different from the second portion of the one or more pieces of personal data;
enabling the data subject to modify, via the consent receipt management portal, one or more consent preferences for the collection or processing of personal data associated with the data subject by the entity as part of the transaction;
receiving, via the consent receipt management portal from the data subject, a request to modify the one or more consent preferences; and
in response to receiving the request to modify the one or more consent preferences, modifying the unique consent receipt key based at least in part on the request to modify the one or more consent preferences, wherein:
the processing of personal data associated with the data subject by the entity as part of the transaction comprises transmission, by the entity, of one or more communications to the data subject; and
the request to modify the one or more consent preferences comprises a request to modify a frequency with which the data subject consents to receiving the one or more communications.

US Pat. No. 10,769,301

DATA PROCESSING SYSTEMS FOR WEBFORM CRAWLING TO MAP PROCESSING ACTIVITIES AND RELATED METHODS

OneTrust, LLC, Atlanta, ...

1. A computer-implemented data processing method for modifying a data model based on one or more pieces of test data submitted via an electronic form, the method comprising:identifying, by one or more processors, an electronic form used to collect one or more pieces of personal data;
programmatically completing and submitting, by one or more processors, the identified electronic form with one or more pieces of test data;
accessing the data model, by one or more processors, the data model defining one or more electronic links between a plurality of data assets and storing a plurality of data inventories that define a plurality of inventory attributes for each of the plurality of data assets, wherein:
each of the plurality of data assets are used in the collection or storage of data; and
each of the plurality of data inventories are associated with a respective data asset of the plurality of data assets and comprise a plurality of fields that each define one or more respective inventory attribute values for each of the plurality of inventory attributes;
after submitting the identified electronic form, scanning the plurality of data inventories to identify at least one piece of the one or more pieces of test data in a first data inventory of the plurality of data inventories;
identifying, by one or more processors, at least partially in response to scanning the plurality of data inventories, a first data asset of the plurality of data assets, the first data asset being associated with the first data inventory;
identifying, by one or more processors at least one processing activity that utilizes data stored by the first data asset;
electronically linking, by one or more processors, the first data asset and the at least one processing activity to the electronic form;
modifying, by one or more processors, the first data inventory for the first data asset in the data model to include data associated with the electronic form; and
modifying, by one or more processors, the data model to include the modified first data inventory for the first data asset.

US Pat. No. 10,769,300

DATA PROCESSING IN A HYBRID CLUSTER ENVIRONMENT

International Business Ma...

1. A computer-implemented method, comprising operations for:providing a hybrid cluster environment with a public cloud cluster having nodes storing data and a plurality of private clusters, wherein each of the plurality of private clusters has nodes storing data;
receiving registration data that indicates a customer identifier, a new private cluster, and a file transfer server;
adding the new private cluster to the plurality of private clusters in the hybrid cluster environment;
receiving input to design a job to process data in the hybrid cluster environment;
determining that the job is to be deployed to the new private cluster;
deploying the job to the new private cluster using the file transfer server, wherein the job is executed at the new private cluster; and
receiving job status information and one or more job logs with the file transfer server.

US Pat. No. 10,769,299

SYSTEM AND METHOD FOR DYNAMIC GENERATION OF URL BY SMART CARD

CAPITAL ONE SERVICES, LLC...

1. A smart card comprising:a substrate;
a memory embedded in the substrate, wherein the memory contains an applet, a counter, and a unique customer identifier;
a contactless communication interface embedded in the substrate; and
a microprocessor embedded in the substrate,
wherein the microprocessor is in data communication with the memory and the contactless communication interface,
wherein, after entry of the contactless communication interface into a communication field of a communication device, the microprocessor increments the counter and synchronizes the value of the counter with a second counter stored in the communication device,
wherein the applet generates a unique one-time uniform resource locator (URL) by cryptographically hashing the incremented value of the counter and the unique customer identifier,
wherein the unique one-time URL is transmitted to the communication device via the contactless communication interface, and
wherein the communication device synchronizes the incremented value of the second counter value with a third counter stored in a server prior to the transmission of the unique one-time URL.

US Pat. No. 10,769,298

SECURITY SYSTEM FOR BENCHMARK ACCESS

Workday, Inc., Pleasanto...

1. A system for analytics security, comprising:an input interface configured to:
receive a request for analytics data, wherein the request is associated with a requestor; and
a processor configured to:
determine the analytics data based at least in part on the request, wherein the analytics data comprises one or more results of an analytic calculation performed on commingled data, wherein the commingled data comprises tenant data shared by a tenant of a plurality of tenants and other tenant data shared by one or more other tenants of the plurality of tenants;
determine security associated with the analytics data, wherein determining security associated with the analytics data comprises to:
determine that a required security level of a data instance of the commingled data exceeds a maximum security level associated with the analytics data; and
in response to determining that the required security level of the data instance of the commingled data exceeds the maximum security level associated with the analytics data, reset the maximum security level associated with the analytics data to the required security level of the data instance of the commingled data;
determine permissions associated with the requestor based at least in part on the tenant of the plurality of tenants, wherein the tenant of the plurality of tenants is associated with the requestor;
determine whether the requestor is credentialed based at least in part on the security associated with the analytics data and the permissions associated with the requestor; and
in response to determining that the requestor is credentialed:
provide the analytics data to the requestor.

US Pat. No. 10,769,297

CENTRALIZED IDENTIFICATION AND AUTHENTICATION SYSTEM AND METHOD

1. An authentication system for enhancing computer network security by authenticating a user in an electronic communication between a computing device of the user and an online computer system, the authentication system comprising one or more computing devices configured to perform operations comprising:while the online computer system is connected to the computing device of the user via a communication network, electronically receiving a request for a SecureCode;
generating the SecureCode;
while the online computer system is connected to the computing device of the user via the communication network, electronically providing to the user the SecureCode in response to the request for the SecureCode, wherein:
the SecureCode is invalid after a predetermined time passes,
the SecureCode is invalid after one use of the SecureCode for authentication, and
the SecureCode is only valid for authenticating the user; and
while the online computer system is connected to the computing device of the user via the communication network, electronically receiving from the online computer system a digital authentication request for authenticating the user, wherein:
the digital authentication request comprises a digital identity of the user, and
the digital identity includes the SecureCode; and
while the online computer system is connected to the computing device of the user via the communication network, authenticating the user by evaluating a validity of the SecureCode included in the digital authentication request.

US Pat. No. 10,769,296

SYSTEM AND METHOD OF PERMISSION-BASED DATA SHARING

Early Warning Services, L...

1. A system for providing data according to data sharing permissions, the system comprising:an interface configured to communicate with a network;
a processor coupled to the interface; and
a memory accessible to the processor and storing instructions, that when executed by the processor, cause the processor to:
receive data at a processor of a computing system, in response to a request received through a network from a computing device associated with a data requester, the data including first data and associated first data sharing permissions assigned to the first data by a first data owner, the first data sharing permissions stored with the first data in a data warehouse and defining limitations on access to the first data by others, the data further including second data and associated second data sharing permissions assigned to the second data by a second data owner, the second data sharing permissions stored with the second data in the data warehouse and defining limitations on access to the second data by others, the first data, with its associated first data sharing permissions, and the second data, with its associated second data sharing permissions, stored separately in separate exclusive memory areas of the data warehouse to maintain proprietary data of the first data owner and the second data owner, the received request including a unique identifier for the data requester and a purpose indicator for the intended use of the first data and the second data by the data requester;
automatically apply the first data sharing permissions to the first data to produce first filtered data based on at least (1) the unique identifier for the data requester and (2) the intended use by the data requester;
automatically apply the second data sharing permissions to the second data to produce second filtered data based on at least (1) the unique identifier for the data requester and (2) the intended use by the data requester;
determine a first access fee for the first filtered data and a second access fee for the second filtered data;
provide the requestor with an option to make financial arrangements with respect to the first access fee or the second access fee; and
provide an output based on the financial arrangements.

US Pat. No. 10,769,295

JOIN OPERATIONS ON ENCRYPTED DATABASE TABLES

SAP SE, Walldorf (DE)

1. A computer-implemented method comprising:a server storing in a database, a first encrypted table and a second encrypted table encrypted according to a non-deterministic and searchable first encryption scheme;
the server receiving from a client, a join token based upon a query including a join operation and a predicate attribute constraint;
an engine of the server, prior to joining the first encrypted table and the second encrypted table, separately searching the first encrypted table according to the predicate attribute constraint to reveal only rows of the first encrypted table fulfilling the predicate attribute constraint and searching the second encrypted table according to the predicate attribute constraint to reveal only rows of the second encrypted table fulfilling the predicate attribute constraint, the engine generating an intermediate construction including only rows of the first encrypted table and the second encrypted table fulfilling the predicate attribute constraint, the intermediate construction encrypted according to a different encryption scheme; and
the server communicating to the client, the rows of the first encrypted table and the second encrypted table fulfilling the predicate attribute constraint.

US Pat. No. 10,769,294

ASYNCHRONOUS UPDATE OF EXPLOSION DEFINITIONS BASED ON CHANGE TRIGGERS FOR EVALUATION OF AUTHORIZATION RIGHTS

SAP SE, Walldorf (DE)

1. A computer implemented method for maintaining explosion tables for optimized evaluation of authorization rights, the method comprising:receiving a request for a change associated with assignments of an object group in a hierarchy of a plurality of object groups, wherein the assignments are related to object group collections, wherein the object group collections are associated with the authorization rights and wherein the authorization rights are associated with actions to be performed on one or more object groups;
storing, at a first time, a change trigger at an explosion update trigger table, wherein the change trigger is stored synchronously with updating a definition of the object group collections and/or updating the hierarchy according to the request;
processing, asynchronously with the storing and at a second time, wherein the second time is after the first time, the explosion update trigger table to determine changes for an explosion table associated with the change trigger, wherein the change trigger is processed with one or more other triggers associated with the object group;
updating the explosion table to reflect changes to the object group and one or more other object groups hierarchically inherent for the object group;
defining assignments to associate object instances with object groups from the hierarchy of the plurality of object groups, wherein the plurality of object groups are positioned at different hierarchy levels at the hierarchy, wherein the object groups associated with the object instances are at a lowest hierarchy level of the hierarchy; and
defining the object group collections to be associated correspondingly with one or more of the plurality of object groups;
wherein the assignments are based on a vocabulary including definitions of one or more attributes of the object instances and including definitions of hierarchy assignments of object instances to a particular object group from the object groups in the hierarchy.

US Pat. No. 10,769,293

PRIVACY PRESERVING DATA SEARCH

Protegrity Corporation, ...

1. A method for data protection in a computer system associated with a plurality of levels of access rights, the method comprising:receiving, from a requesting entity, a query to search a database indexed with each of a plurality of indexes, each index associated with a different access rights level and including a plurality of values each mapped to a different set of database entries;
generating, by a hardware processor, a search key based on the received query;
hashing the generated search key using a hash table;
maintaining a leading portion of the hashed search key and discarding the remainder of the hashed search key to produce a shortened hashed search key;
searching, by the hardware processor, an index corresponding to an access rights level associated with the requesting entity by comparing the shortened hashed search key to a leading portion of hashed index values of the searched index to identify a set of index values; and
outputting database entries mapped to the identified set of index values.

US Pat. No. 10,769,292

HIERARCHICAL TEMPORAL MEMORY FOR EXPENDABLE ACCESS CONTROL

British Telecommunication...

1. A computer implemented method for access control for a restricted resource in a computer system, the method comprising:receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a training time period when the restricted resource is accessed in an approved manner;
generating a sparse distributed representation of the first set of records to form a training set for a hierarchical temporal memory (HTM);
training the HTM based on the training set in order that the trained HTM provides a model of operation of the computer system during the training time period;
receiving a request to access the restricted resource by a resource consumer;
allocating a predetermined quantity of cryptocurrency to the resource consumer, the allocation being recorded by a blockchain data structure accessible by a network, the blockchain data structure storing digitally signed records validated by network connected miner software components;
receiving a second set of records for the computer system, each record detailing an occurrence in the computer system during an operating time period for the computer system in use by the resource consumer of the restricted resource;
generating a sparse distributed representation of the second set of records to form an input set for the trained HTM;
executing the trained HTM based on the input set to determine a degree of recognition of the second set of records of the input set;
responsive to a determination that a degree of recognition of one or more records of the input set is below a threshold degree, generating a blockchain transaction to expend at least a portion of the cryptocurrency allocated to the resource consumer; and
responsive to a determination that a quantity of cryptocurrency allocated to the resource consumer is below a threshold quantity, identifying the resource consumer as unauthorized to access the restricted resource.

US Pat. No. 10,769,291

AUTOMATIC DATA ACCESS FROM DERIVED TRUST LEVEL

Microsoft Technology Lice...

1. A method for automatically granting access to user data, comprising:receiving a plurality of interactions from a first user to a second user, each interaction comprising an identity of the second user, information communicated to the second user, and a context in which the information was communicated;
deriving a trust model from the plurality of interactions using a machine learning technique;
without user intervention, annotating a subset of user data, the annotation indicating what trust level or security model setting grants access to the annotated user data, the annotated user data comprising first user data;
receiving either a request for the first user data from a requesting user or a communication from the first user to a receiving user;
responsive to receiving the request:
selecting the trust model from among a plurality of trust models based on an identity of the requesting user;
presenting the request to the trust model and in response, receiving a trust level or a security model setting; and
granting or denying access to the first user data based on the trust level or the security model setting;
responsive to receiving the communication:
selecting the trust model from among the plurality of trust models based on an identity of the receiving user;
identifying a subset of annotated user data that the receiving user is allowed to access based on the trust model;
determining whether data relevant to a conversation between the first user and the receiving user exists in the subset of annotated user data; and
responsive to determining data relevant to the conversation exists, injecting at least a portion of the relevant data into the conversation.

US Pat. No. 10,769,290

SYSTEMS AND METHODS FOR FRAUD DETECTION VIA INTERACTIVE LINK ANALYSIS

Fair Isaac Corporation, ...

1. A system for detecting fraud by displaying visual representations of data relating to entities-of-interest that are indicative of fraud, the system comprising:a first database that stores at least one attribute of a plurality of the entities-of-interest;
a second database, remote from the first database, that stores at least one attribute of the plurality of the entities-of-interest;
a pattern match generator that generates pattern matching rules;
a pattern matcher that receives the pattern matching rules and applies the pattern matching rules to recognize links between at least one attribute of two or more of the entities-of-interest according to one or more of the pattern matching rules, where the pattern matching rules are generated using the pattern match generator;
a layer builder that, based on the links recognized by the pattern matcher, creates an internal data structure that represents relationships between the two or more of the entities-of-interest in terms of types of links between the two or more of the entities-of-interest, number of links between the two or more of the entities-of-interest, and numerical strength of links between the two or more of the entities-of-interest;
a cluster explainer that derives rules that define requirements for the two or more of the entities-of-interest to be included in a cluster and categorize the two or more of the entities-of-interest that satisfy the defined requirements as potentially fraudulent entities, wherein the derived rules are applied to one or more first database-related transactions in real time and to one or more second database-related transactions in real-time to detect credit history transactions categorized as potentially fraudulent; and
an interface for displaying a visual representation of the relationships between the two or more of the entities-of-interest, as expressed by the layer builder, to a user, and
an editor for receiving an input from the user that indicates a user-generated requirement to modify the defined requirements to be included in the cluster and categorized as potentially fraudulent entities;
where displaying the visual representation comprises:
displaying in one of a plurality of locations of the interface different types of links between the two or more of the entities-of-interest as different colors, and displaying in another of the plurality of locations of the interface the numerical strength of links between the two or more of the entities-of-interest as lines of different thickness between the two or more of the entities-of-interest.

US Pat. No. 10,769,289

SYSTEMS AND METHODS FOR ELECTRONIC DOCUMENT DELIVERY, EXECUTION, AND RETURN

United Services Automobil...

1. A method comprising:receiving, by a merchant device and from an electronic mail system device, an unexecuted version of an electronic document, wherein the electronic document has an intended recipient, wherein the merchant device comprises one of a plurality of merchant devices each located at one of a plurality of merchant locations, and wherein the electronic document is available at the plurality of merchant devices;
providing, at the merchant device and to the intended recipient, the unexecuted version of the electronic document;
receiving, at the merchant device and via a user input, an executed version of the electronic document;
marking the executed version of the electronic document with routing information; and
sending, by the merchant device, the executed version of the electronic document marked with the routing information.

US Pat. No. 10,769,288

METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA

INTELLECTUAL PROPERTY VEN...

1. A central server for providing access control to secured data, comprising:a memory coupled to at least one hardware processor, the at least one hardware processor configured to:
authenticate a mobile device in response to a file access request received from the mobile device at a first local server, wherein the mobile device is associated with a user, and wherein the authentication is based on an identifier of the mobile device;
determine whether the first local server is configured to provide localized access control for the user; and
in response to determining that the first local server is not configured to provide localized access control for the user:
reconfigure the first local server to provide localized access control for the user by identifying a location of the authenticated mobile device from which the file access request originates so as to permit access by the user from a single access location at a time;
identify a second local server that previously provided localized access control for the user; and
remove localized access control support for the user from the second local server.

US Pat. No. 10,769,287

FORCED DATA TRANSFORMATION POLICY

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:obtaining a first request from a client device, the first request including a data object and indicating a logical data container as a storage location for the data object; and
processing the first request by at least:
causing a first portion of the data object to be encrypted using a cryptographic key to produce an encrypted data object based at least in part on a policy associated with the logical data container indicating that data objects stored in the logical data container are to be encrypted with the cryptographic key specified for the logical data container, the policy being specified for a customer account of a data storage service that provides the logical data container; and
storing the encrypted data object in the logical data container.

US Pat. No. 10,769,286

NON-INTRUSIVE DATA AUTHENTICATION SYSTEMS AND METHODS

1. A system, comprising:an information system;
a junction box connected to the information system;
a primary observer connected to the junction box, the primary observer receiving data from the information system;
a secondary observer connected to the junction box;
wherein the junction box comprises:
a secondary observer side that comprises hardware, firmware, and software that monitors and copies the data to form a data copy, cryptographically secures the data copy, and securely transmits the data copy to the secondary observer; and
wherein the data is copied and transmitted to the secondary observer without manipulation of the data; and
wherein the secondary observer is electrically isolated from the primary observer;
wherein the data is galvanically isolated from the data copy where the data copy is copied from the data.

US Pat. No. 10,769,285

PRIVACY ENABLED RUNTIME

INTERNATIONAL BUSINESS MA...

1. An apparatus for securing data, the apparatus comprising:a memory;
a communication interface; and
an encryption engine, having an encryption unit and an analytics unit, communicably coupled with the memory and the communication interface, the encryption engine configured to:
receive a request to apply cryptography to input data;
generate metadata for the input data using the analytics unit, wherein the metadata identifies characteristics of content included in the input data;
generate output data by applying a cryptographic technique to the input data;
return the output data and the metadata in response to the request, wherein the encryption unit and the analytics unit are on separate hardware units,
wherein the metadata includes a first metadata instance and a second metadata instance, the first metadata instance identifies a first set of characteristics in the input data, and the second metadata instance identifies a second set of characteristics in the input data, and
wherein the encryption engine applies a first cryptographic technique to the first metadata instance and a second cryptographic technique to the second metadata instance, the first cryptographic technique being distinct from the second cryptographic technique;
wherein the encryption engine further comprises a firewall, wherein the first metadata instance is decipherable by the firewall and the second metadata instance is not decipherable by the firewall.

US Pat. No. 10,769,284

INFORMATION PROCESSING APPARATUS AND METHOD, RECORDING MEDIUM, AND PROGRAM

Sony Corporation, Tokyo ...

1. An information processing apparatus comprising:a reception unit that receives a command requesting for an execution of predetermined processing via wireless communication, wherein the reception unit receives a polling signal from a reader/writer and the information processing apparatus is detected by the reader/writer based on the polling signal;
a storage unit that stores stage information of a plurality of stages in a lifecycle of an IC card, the plurality of stages including at least a terminated state; and
a controller that prevents execution of the command received by the reception unit when a determination unit determines that the command received by the reception unit is not an executable command in the stage on a basis of the stage information,
wherein the reception unit receives a terminate command for erasing data stored in the IC card and resetting the IC card to a disposal stage, and
wherein after the reception unit receives the terminate command, the controller causes at least a portion of data recorded in the storage unit to be erased and enters the disposal stage.

US Pat. No. 10,769,283

RISK ADAPTIVE PROTECTION

Forcepoint, LLC, Austin,...

1. A computer-implementable method for generating enriched event related to an event, comprising:receiving a stream of data from a data source, the stream of data comprising a plurality of events, the plurality of events comprising electronically-observable interactions by a user, the electronically-observable interactions being observed through at least one of an electronic device, a computer system and a software application executing on the computing system;
processing the steam of data to identify entity information and event information, the entity information comprising heterogeneous entity information, the event information comprising heterogeneous event information, the processing being performed by a data preprocessor module of a genericized data model management system;
transforming the entity information into transformed entity data and the event information into transformed event data, the transforming conforming to a genericized data model, the genericized data model comprising a data model that defines a general relational type along with at least one of an entity and event related by the general relational type, the transforming being performed by a data transformation module of a genericized data model management system;
storing the transformed entity data and the transformed event data in a data repository; and,
performing a security analytics operation using the transformed entity data and the transformed event data, the security analytics operation being performed by a security analytics system executing on a hardware processor, the security analytics operation accessing the transformed entity data and the transformed event data from the data repository, the security analytics operation processing the transformed entity data and the transformed event data to identify a possible security breach.

US Pat. No. 10,769,282

DYNAMIC SECURITY TESTING

NETFLIX, INC., Los Gatos...

1. A computer-implemented method, comprising:querying one or more database records based on one or more target characteristics, wherein the one or more database records are associated with server-based applications that interact with client computers over at least one computer network;
receiving a first set of security assets based at least on the one or more target characteristics, wherein the first set of security assets includes a first security asset associated with a first source and a second security asset associated with a second source, and each security asset in the first set of security assets comprises a server-side interface through which a server-based application interacts with a client computer over the at least one computer network;
selecting one or more target assets from the first set of security assets on which to conduct one or more security tests, wherein a first target asset included in the one or more target assets corresponds to a first server-based application that has undergone at least one change; and
conducting the one or more security tests on the one or more target assets to identify one or more security vulnerabilities associated with the one or more target assets.

US Pat. No. 10,769,281

COMPLIANT SOFTWARE COMPONENT INFRASTRUCTURE DEPLOYMENT

International Business Ma...

1. A compliance cloud software component deployment improvement method comprising:receiving from hardware machine sources, by a processor of a compliance framework, application compliance requirements associated with operational requirements associated with hardware and software components, wherein said application compliance requirements comprise encryption keys and audit logs associated with implemented hardware and software controls for said hardware and software components;
receiving, by said processor from said hardware and software components, original configuration files associated with a current hardware and software configuration for each hardware and software component of said hardware and software components, wherein said original configuration files are generated based on measurements of said hardware and software components;
generating, by said processor based on said application compliance requirements with respect to said original configuration files, modified configuration files associated with a modified hardware and software configuration for each said hardware and software component;
executing, by said processor, a risk assessment with respect to said application compliance requirements, said risk assessment associated with applying said modified configuration files to each said hardware and software component;
evaluating, by said processor, a workload of each said hardware and software component at a specified point in time with respect to regulatory requirements;
enabling, by said processor based on results of said executing and said evaluating, a specified cloud infrastructure stack comprising a group of software components associated with executing said application compliance requirements within a specified operational risk threshold of said risk assessment;
generating, by said processor, a software application comprising said specified cloud infrastructure stack;
deploying, by said processor to said hardware and software components, said software application, data encryption software, and an external firewall;
executing, by said processor, said software application, said data encryption software, and said external firewall resulting in execution of decryption keys enabling operation of said hardware and software components;
executing, by said processor, a gap analysis with respect to said operation of said hardware and software components; and
enabling, by said processor based on results of said executing said gap analysis, said specified cloud infrastructure stack with respect to a specified level of compliance.

US Pat. No. 10,769,280

SIDE CHANNEL ATTACK COUNTERMEASURES FOR SECURE BOOTLOADING

Silicon Laboratories, Inc...

1. A method of securely loading a new software image onto a device, comprising:receiving, at the device, a bundle, the bundle containing a header and an encrypted payload, from a sender;
verifying the integrity of the header and the identity of the sender, wherein the header includes a version number;
performing a version check;
comparing a value of an attempts counter to install a new software image to a predetermined threshold, wherein the attempts counter tracks a number of times that an installation of a software image has been attempted;
decrypting the encrypted payload, wherein the new software image is contained in the encrypted payload, only if:
the version check is successful and the attempts counter is less than the predetermined threshold; and
after the decrypting, installing the new software image in a memory device in the device;
wherein the attempts counter is incremented prior to the decrypting.

US Pat. No. 10,769,279

SECURE ELEMENT OPERATING SYSTEM UPDATE NOTIFICATION

Apple Inc., Cupertino, C...

1. A secure element (SE) of a cellular wireless communication device, the SE storing one or more profiles, the SE comprising:at least one processor; and
a memory storing instructions that, when executed by the at least one processor, cause the SE to perform operations that include, for each profile of the one or more profiles managed by the SE:
comparing (1) a first set of SE capabilities associated with the profile for which a notification should be sent, as indicated in a linked capability value included in the profile, when any of the SE capabilities are updated with (2) a second set of SE capabilities that are affected by an operating system (OS) update that targets the SE;
for each SE capability included in both the first and second sets of SE capabilities:
adding the SE capability to a respective notification list for the profile; and
in response to determining that the respective notification list includes at least one SE capability:
causing at least one notification based on the respective notification list to be provided to a server of a respective Mobile Network Operator (MNO) associated with the profile,
wherein each profile comprises MNO data and applications provisioned to the cellular wireless communication device for access to cellular communication services of the respective MNO, the MNO data including an address for the server of the MNO to which notifications are to be sent.

US Pat. No. 10,769,278

SERVICE IDENTIFICATION OF RANSOMWARE IMPACT AT ACCOUNT LEVEL

Microsoft Technology Lice...

1. A computer-implemented method comprising:determining features of files in a storage account of a cloud storage server, the storage account registered with a client device;
detecting ransomware activity based on the features of the files;
generating a notification to the client device in response to detecting the ransomware activity, the notification indicating the detected ransomware activity in the storage account, and one or more remediation options for the detected ransomware activity in the storage account;
receiving, from the client device, a remediation option selected from the one or more remediation options;
recovering one or more files in the storage account based on the selected remediation option;
receiving, at the cloud storage server, a request from the client device to perform changes to one or more files in the storage account of the cloud storage server; and
prior to detecting the ransomware activity, completing the requested changes to the one or more files in the storage account of the cloud storage server.

US Pat. No. 10,769,277

MALICIOUS APPLICATION DETECTION AND PREVENTION SYSTEM FOR STREAM COMPUTING APPLICATIONS DEPLOYED IN CLOUD COMPUTING ENVIRONMENTS

International Business Ma...

1. A computer-implemented method, comprising: providing malicious application detection and prevention for a stream computing application deployed in a cloud computing environment, by: performing static and run-time analyses of the stream computing application and any files associated therewith to create an expected profile of the stream computing application's behaviour, wherein the run-time analysis includes: analyzing any sources, sinks or system calls in the stream computing application, performing an estimated mapping of an amount of expected data to be sent from one or more source operators to one or more sink operators in the stream computing application and monitoring the sent data for deviation from the expected value data; invoking the stream computing application in an execution environment to compare the stream computing application's behavior to the expected profile as the stream computing application runs in the execution environment; and isolating the stream computing application within the cloud computing environment when the stream computing application's behavior deviates significantly from the expected profile.

US Pat. No. 10,769,276

ADVANCED THREAT PROTECTION CROSS-PRODUCT SECURITY CONTROLLER

McAfee, LLC, Santa Clara...

1. At least one non-transitory machine-readable storage medium, comprising computer-executable instructions carried on the machine readable medium, the instructions readable by a hardware processor, the instructions, when read and executed, for causing the hardware processor to:identify a file;
determine at least one uniform resource locator (URL) contacted by the file;
search for at least one other file that contacted the at least one URL;
determine that the file is suspicious based on both the file and the at least one other file having contacted the at least one URL;
display information regarding the at least one URL contacted by the file;
receive an indication that a user wants to block the file from contacting the at least on URL; and
block the file from contacting the at least one URL.

US Pat. No. 10,769,275

SYSTEMS AND METHODS FOR MONITORING BAIT TO PROTECT USERS FROM SECURITY THREATS

CA, Inc., San Jose, CA (...

1. A computer-implemented method for monitoring bait to protect users from security threats, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:monitoring a bait computing resource to detect attempts to access the bait computing resource, the bait computing resource comprising a registry key;
virtualizing, using a system filter driver, the bait computing resource to prevent a false positive by hiding the bait computing resource from at least one trusted application that has been categorized as safe, the filter driver hiding the bait computing resource by preventing the registry key from being revealed to the trusted application;
detecting an attempt by a different application to access the virtualized bait computing resource; and
performing a security action to protect a trusted user by reporting the attempt to access the virtualized bait computing resource by the different application;
wherein virtualizing the bait computing resource enables the bait computing resource to deceive attackers into interacting with the bait computing resource while the bait computing resource remains unseen by legitimate users to avoid false positives.

US Pat. No. 10,769,274

SECURITY IN MICROSERVICE ARCHITECTURES

SAP SE, Walldorf (DE)

1. A computer-implemented method for inhibiting security threats in microservice architectures hosted on a cloud infrastructure, the method being executed by one or more processors and comprising:receiving, by a first microservice used in one or more microservice-based applications hosted on the cloud infrastructure, a network packet comprising a set of features F;
determining, by the first microservice, a probability P that the set of features F corresponds to a category ci in a set of categories C using a probabilistic model, the probabilistic model applying a rule for detecting a maximum probability:

where m is a number of categories in the set of categories and i is a counter that increases from 1 to m;
determining, by the first microservice, substantially in near real time that the network packet corresponds to a first category within the set of categories C based on the probability P; and
in response to determining that the network packet corresponds to the first category, executing, by the first microservice, an action comprising shutting down a defective microservice on the cloud infrastructure and instantiating another instance of the defective microservice on the cloud infrastructure.

US Pat. No. 10,769,273

ELECTRONIC CONTROL UNIT

DENSO CORPORATION, Kariy...

1. An electronic control unit comprising:a memory configured to save a program that includes a call from a function and a return to the function respectively represented by and extractable as a control flow in the program, together with a check instruction inserted in a program code of the program for checking whether the program code is executable based on the extracted control flow;
an input unit configured to receive an input of use frequency information indicative of a use frequency of the function;
a measurement unit configured to measure a load of the electronic control unit;
an execution object determiner configured to determine execution of the check instruction based on the use frequency information and the load; and
an arithmetic unit configured to execute the check instruction as determined by the execution object determiner at a time of execution of the program.

US Pat. No. 10,769,272

TECHNOLOGY TO PROTECT VIRTUAL MACHINES FROM MALICIOUS VIRTUAL MACHINE MANAGERS

Intel Corporation, Santa...

1. A system comprising:a system agent that manages actions for an associated guest virtual machine that is to be provisioned; and
a semiconductor hardware device provided between the system agent and memory of the system, the semiconductor hardware device comprising: a substrate; and
logic coupled to the substrate, wherein the logic is implemented at least partly in one or more of configurable logic or fixed-functionality hardware logic, the logic coupled to the substrate working in conjunction with the system agent to:
associate, using a key for a customer, a key domain of a plurality of key domains with a customer boot image associated with the guest virtual machine, the key being unknown to a virtual machine manager associated with the guest virtual machine;
receive the customer boot image from the customer; partition, by at least the system agent, the customer boot image as a sequence of protocol data units (PDUs);
load content of each PDU of the sequence of PDUs consecutively into a sequential page of the memory, wherein each page is loaded into a page table of the guest virtual machine and the logic keeps track of loading using a global transaction count for the key domain and a location in memory of the page; and
verify an integrity of the customer boot image that is to be installed in the key domain by checking, using the key, a value calculated using the page location, content, and the global transaction count of each of the loaded PDUs.

US Pat. No. 10,769,271

APPARATUS FOR CREATING AND STORING PASSWORDS

1. An apparatus for creating and storing computer passwords, the apparatus comprising an array of M wheels arranged longitudinally on a central spindle, wherein each of the wheels has a plurality of segments and is labeled with a selection of N characters, such that when one or more of the wheels are rotated to create a longitudinal line of characters across one of the plurality of segments of the wheels as a master password known to the user, then N?1 additional, unique password pairs, originally unknown to the user are created along parallel lines of remaining segments of the plurality of segments of the wheels and which, if the wheels are then misaligned for obfuscation of the master password and resultant passwords when not in use, can be realigned by means of reestablishing the master password to recreate the N?1 unique password pairs, wherein the central spindle is equipped with M sets of a spring and ball located in channels, such that each ball engages detents in a corresponding one of the M wheels, there being N detents, to provide alignment of the wheels and the characters thereon longitudinally, together with an audible signal of proper alignment;wherein the array of M wheels is held in contact with one another by means of endcaps affixed on opposite ends of the center spindle, contacting outer wheels of the array of M wheels;
wherein the endcaps are fitted with indentations or other designated locations for labeling or other unique marks that are longitudinally aligned to the positions established by the detent and spring and ball arrangement, allowing for designation of a created password for a specific account, computer application, or other purpose, and wherein the indentations or other locations for labeling and marking incorporate one instance on either endcap for opposing alignment arrows or similar indications to designate the position of the master password and thereby provide regularity in the alignment of created passwords to the labeling or marking.

US Pat. No. 10,769,270

PASSWORD PROTECTION QUESTION SETTING METHOD AND DEVICE

Alibaba Group Holding Lim...

1. A method implemented by one or more computing devices, the method comprising:receiving a request to set a password protection question for a password, the request comprising a user identifier;
retrieving one or more pieces of setting information corresponding to the user identifier;
individually acquiring one or more password protection questions that match the one or more pieces of setting information, the one or more password protection questions not having corresponding answers set thereto; and
outputting the one or more password protection questions prior to the one or more password protection questions having corresponding answers set thereto;
wherein individually acquiring the one or more password protection questions that match the one or more pieces of setting information comprises generating the one or more password protection questions by adding information to the one or more pieces of setting information.