US Pat. No. 10,339,379

METHOD OF SEARCHING DATA TO IDENTIFY IMAGES OF AN OBJECT CAPTURED BY A CAMERA SYSTEM

AVIGILON ANALYTICS CORPOR...

1. A system comprising:a display;
an input device;
a processor communicatively coupled to the display and the input device; and
a memory communicatively coupled to the processor and having stored thereon computer program code that is executable by the processor, wherein the computer program code, when executed by the processor, causes the processor to:
receive image data representing a first object in an image of a field of view of a camera system, the first object having a first signature representing features of the first object;
display an image of the first object on the display;
accept input from the input device indicative of a selection of the first object;
make determinations as to whether the first signature matches one or more signatures of a group that correspond to a set of objects captured in images of the field of view; and
send a notification indicating a match between the first signature and a second signature of a second object of the set.

US Pat. No. 10,339,374

DETECTING A FRAGMENTED OBJECT IN AN IMAGE

Capital One Services, LLC...

1. A method, comprising:capturing, by a user device, an image including an object;
analyzing, by the user device, the image to identify the object based on an expected aspect ratio of the object;
determining, by the user device, that the object cannot be identified in the image based on the expected aspect ratio of the object;
analyzing, by the user device, the image to identify a first part of the object based on an expected aspect ratio of the first part of the object;
identifying, by the user device, the first part of the object,
wherein the first part of the object is identified based on detecting an outline of the first part of the object that corresponds to the expected aspect ratio of the first part of the object;
analyzing, by the user device, a first region of the image determined in relation to the first part of the object to detect a second part of the object;
identifying, by the user device, the second part of the object based on detecting the first part of the object and based on analyzing the first region;
combining, by the user device, first image data associated with the first part of the object and second image data associated with the second part of the object to generate object data associated with the object; and
performing, by the user device, an action related to the object data.

US Pat. No. 10,339,373

OPTICAL CHARACTER RECOGNITION UTILIZING HASHED TEMPLATES

INTUIT INC., Mountain Vi...

1. A computer-implemented method for creating a template associated with a document, comprising:receiving a first digital image including a document, the document including a plurality of bordered text sections comprising respective text values and at least one text label adjacent to one bordered text section of the plurality of bordered text sections;
extracting a portion of the first digital image depicting the document;
determining spatial information associated with the plurality of bordered text sections in the extracted portion of the first digital image depicting the document;
removing the respective text values from the plurality of bordered text sections in the extracted portion of the first digital image depicting the document;
generating a scaled image by scaling the extracted portion of the first digital image depicting the document from a first resolution to a second resolution, wherein;
the second resolution is less than the first resolution,
the scaled image includes the plurality of bordered text sections and the at least one text label, and
the scaled image does not include the respective text values;
generating a first hash based on the scaled image;
generating a template comprising the first hash and the spatial information;
storing the template in a database of templates;
receiving a second hash based on a second digital image;
comparing the second hash to a set of hashes corresponding to a set of templates in the database of templates;
determining that the first hash matches the second hash;
providing the template comprising the first hash to an optical character recognition component, wherein the template is configured to be used by the optical character recognition component to extract one or more sections of the second digital image.

US Pat. No. 10,339,372

ANALOG STROKES TO DIGITAL INK STROKES

Microsoft Technology Lice...

1. A method, executed by a hardware processor, for transforming analog written content to digital ink strokes, comprising:receiving a static image of written content captured by a camera;
extracting, from the static image, analog strokes of the written content from background information of the static image and marks that are not part of the written content;
analyzing the analog strokes to identify at least two ink parameters associated with an underlying analog stroke of the written content;
converting the analog strokes to an ink modifiable format of digital ink strokes comprising the at least two ink parameters;
storing the digital ink strokes;
displaying the digital ink strokes separate from the background information of the static image and the marks that are not part of the written content;
receiving a modification to at least one of the digital ink strokes; and
displaying the digital ink strokes with the modification to the at least one of the digital ink strokes.

US Pat. No. 10,339,369

FACIAL EXPRESSION RECOGNITION USING RELATIONS DETERMINED BY CLASS-TO-CLASS COMPARISONS

INTEL CORPORATION, Santa...

1. A method of determining descriptors for each of a plurality of facial expression classes for expression class recognition, the method comprising:defining a plurality of pair-wise facial expression class-to-class tasks;
learning a set of discriminative image patches for each task using a plurality of labelled training images for each task, each image patch being a portion of an image;
determining differences in the learned image patches in each training image for each task;
defining a relation graph for each image for each task using the determined differences, the relation graph representing connections of a subset of image patches containing different facial image features having relations to each other;
determining a final descriptor for each image by stacking and concatenating the relation graphs for each task; and
determining a facial expression for a face by feeding the final descriptors of the images of the plurality of training images into a training algorithm and learning a final facial expression model.

US Pat. No. 10,339,367

RECOGNIZING A FACE AND PROVIDING FEEDBACK ON THE FACE-RECOGNITION PROCESS

Microsoft Technology Lice...

1. A method comprising:obtaining an image of a face;
commencing a face-recognition algorithm that recognizes features of the face;
in conjunction with recognizing the features of the face, displaying an indication of one or more of the features on a rendering of the face; and
displaying, prior to completion of the rendering, a progressive indicator indicating progress for facial recognition processing of the face, wherein the displaying presents the progressive indicator overlaying a portion of the rendering.

US Pat. No. 10,339,365

AUTOMATED AVATAR GENERATION

Snap Inc., Santa Monica,...

1. A method, comprising:receiving, by one or more processors, one or more two-dimensional images depicting at least a portion of a face of a first user;
detecting, by the one or more processors, the portion of the face depicted within the one or more two-dimensional images;
identifying a set of facial landmarks within the portion of the face depicted within the one or more two-dimensional images;
in response to detecting the portion of the face and the set of facial landmarks, determining one or more characteristics representing the portion of the face depicted in the one or more two-dimensional images, the determining comprising:
identifying a set of colors within a hair region of the face;
determining a hair texture for the hair region based on variations in the set of colors that indicate edges, objects or shapes within the hair associated with the hair texture;
comparing a dimension of the hair region to one or more of the set of facial landmarks; and
determining hair length or hair volume based on the comparison of the dimension of the hair region to the one or more of the set of facial landmarks;
based on the one or more characteristics and the set of facial landmarks, generating a representation of a face for the at least one portion of the face depicted in the one or more images;
generating one or more sticker graphics incorporating the representation of the face, the generating of the one or more sticker graphics comprising generating a scaled version of the representation corresponding to a template graphic; and
generating, by a user device of the first user, a message, directed to a second user, that includes the one or more sticker graphics incorporating the representation of the face of the first user.

US Pat. No. 10,339,363

APPARATUS AND METHOD USING OPTICAL SPECKLE

SAMSUNG ELECTRONICS CO., ...

1. An apparatus comprising:a light source configured to emit coherent light to an object;
an imaging device configured to photograph a speckle image of a speckle pattern generated on the object by the coherent light; and
a processor configured to determine whether the object is a living body or a non-living body based on a contrast value of the speckle pattern,
wherein, when the object comprises skin and blood vessels under skin, the apparatus is configured to determine whether the object is a living body or not from the speckle pattern of a skin surface or a skin tissue of the object, without imaging blood vessels under the skin surface of the object or using a change of the speckle image according to a heartbeat of the object,
wherein, when the speckle image is divided into a plurality of windows, the contrast value is determined according to a standard deviation of a brightness of each of the plurality of windows and an average brightness of the plurality of windows.

US Pat. No. 10,339,362

SYSTEMS AND METHODS FOR PERFORMING FINGERPRINT BASED USER AUTHENTICATION USING IMAGERY CAPTURED USING MOBILE DEVICES

VERIDIUM IP LIMITED, Lon...

1. A method for performing fingerprint recognition, the method comprising:capturing, by a mobile device having a camera, a storage medium, instructions stored on the storage medium, and a processor configured by executing the instructions, images depicting a plurality of fingers of a subject;
detecting, with the processor using a finger detection algorithm, the plurality of fingers depicted in one or more of the images;
processing, with the processor, at least one image using a segmentation algorithm, to identify a respective fingertip segment for one or more fingers depicted in the at least one image;
extracting, with the processor from the identified respective fingertip segment for the one or more fingers, features of the one or more fingers;
generating, with the processor, a biometric identifier including the extracted features;
storing the generated biometric identifier in the memory; and
determined, with the processor, a liveness of the subject, wherein the step of determining liveness comprises:
processing an image of the identified respective fingertip segment using a convolutional neural network (CNN), wherein the CNN is trained on two classes of images including images of fingers captured from the live subjects and images of spoofed fingers.

US Pat. No. 10,339,361

COMPOSITE FINGERPRINT AUTHENTICATOR

International Business Ma...

1. A computer-implemented method, comprising:receiving a composite fingerprint comprising thermal image data generated from a single thermal scan of a reference finger by a thermal scanner, wherein the composite fingerprint thermal image data comprises a first fingerprint plurality of ridges having a first temperature value and a second fingerprint plurality of ridges having a second temperature value that is different from the first temperature value;
authenticating the composite fingerprint in response to matching the first fingerprint plurality of ridges to a known fingerprint of the reference finger and to matching the second fingerprint plurality of ridges to a known fingerprint of an other finger that is different from the reference finger; and
returning a result of the authentication.

US Pat. No. 10,339,360

METHOD FOR CONTROLLING UNLOCKING AND TERMINAL

Guangdong Oppo Mobile Tel...

1. A method for controlling unlocking, comprising:determining, by a terminal, whether a finger of a user is in a steady state when a touch operation of the finger on a fingerprint recognition sensor of the terminal is detected;
collecting, by the fingerprint recognition sensor, a first fingerprint image according to capacity auto control (CAC) parameters corresponding to a wet finger when the finger of the user is in the steady state;
collecting, by the fingerprint recognition sensor, N second fingerprint images corresponding to N sets of CAC parameters during the collecting of the first fingerprint image, wherein N is an integer greater than one;
determining, by the terminal, a target fingerprint image and performing, by the terminal, a fingerprint comparison on the target fingerprint image, wherein the target fingerprint image is a fingerprint image having the best image quality among the first fingerprint image and the N second fingerprint images; and
controlling, by the terminal, unlocking of the terminal according to a result of the fingerprint comparison, wherein determining, by the terminal, whether the finger of the user is in the steady state comprises:
collecting, by the fingerprint recognition sensor, M third fingerprint image, wherein the M third fingerprint images are fingerprint images collected at M time points, and M is an integer greater than one;
determining, by the terminal, the clarity of each of the M third fingerprint images and determining a difference in the clarity of any two of the M third fingerprint images;
determining, by the terminal, that the finger of the user is in the steady state when the difference in the clarity of any two of the M third fingerprint images is less than or equal to a first threshold; and
determining, by the terminal, that the finger of the user is not in the steady state when the difference in the clarity of any two of the M third fingerprint images is greater than the first threshold;
wherein unlocking the terminal comprises:
determining, by the terminal, an application interface that is loaded and displayed the most in a preset time period; and
loading and displaying the determined application interface, wherein the preset time period comprises a current system time.

US Pat. No. 10,339,359

DISPLAY PANEL AND DISPLAY DEVICE

Shanghai Tianma Micro-Ele...

1. A display panel, comprising:a display module comprising a first substrate and a first polarizer disposed on the first substrate, wherein the first substrate has an inner side facing the first polarizer and an opposite outer side, the first polarizer has an inner side facing the first substrate and an opposite outer side, and a light-exiting surface of the display module is arranged on the outer side of the first polarizer;
a fingerprint recognition module disposed on the outer side of the first substrate and comprising a fingerprint recognition layer and a second polarizer, wherein the fingerprint recognition layer has an inner side facing the display module and an opposite outer side, and the second polarizer is disposed on the inner side of the fingerprint recognition layer; and
a light source disposed on the inner side of the first polarizer,
wherein the fingerprint recognition layer is configured to recognize fingerprint based on fingerprint signal light, the fingerprint signal light being light emitted from the light source and then reflected to the fingerprint recognition layer by a touch object,
the first polarizer is engaged with the second polarizer, such that the fingerprint signal light is transmitted through the first polarizer and the second polarizer without a light intensity loss, and
the second polarizer is configured to reduce the light intensity of fingerprint noise light, the fingerprint noise light being light other than the fingerprint signal light.

US Pat. No. 10,339,358

PALMPRINT RECOGNITION CIRCUIT BASED ON LTPS TECHNOLOGY, A PALMPRINT RECOGNITION METHOD AND A DISPLAY SCREEN

BOE TECHNOLOGY GROUP CO.,...

1. A palmprint recognition circuit based on a low temperature poly-silicon (LTPS), comprising:an optical signal collecting unit, configured to collect an optical signal indicating a palmprint information and to convert the collected optical signal into a current signal, wherein the optical signal is obtained when a light emitted from a back light being reflected by a palmprint of a user palm;
a current signal amplifying unit, connected to the optical signal collecting unit and configured to amplify the converted current signal; and
a current signal detecting unit, connected to the current signal amplifying unit and configured to detect an intensity of the amplified current signal which indicates a ridge line or a valley line of the palmprint in the palmprint information,
wherein the current signal detecting unit comprises:
a first switch, of which a turn off time is controlled by a clock, such that during the turn off time, a lead-to-ground capacitor in the current signal detecting unit and a reference capacitor inside a chip are charged by the amplified current signal.

US Pat. No. 10,339,356

FINGERPRINT SENSOR

ILI TECHNOLOGY CORP., Hs...

1. A fingerprint sensor, having a central region and a border region, comprising:a plurality of first touch electrode strips, arranged along a first direction; and
a plurality of second touch electrode strips, arranged along a second direction different from the first direction, wherein
each of the first touch electrode strips intersects each of the second touch electrode strips to form a plurality of intersections,
the first touch electrode strips and the second touch electrode strips form a plurality of maximum included angles, wherein a maximum included angle of the plurality of maximum included angles is formed at each intersection of the plurality of intersections, and
a maximum included angle of a first touch electrode strip of the plurality of first touch electrode strips gradually increases from a center towards two ends of the first touch electrode strip.

US Pat. No. 10,339,355

FINGERPRINT SENSING CIRCUIT, ELECTRONIC DEVICE AND METHOD FOR PROCESSING FINGERPRINT IMAGE

HIMAX TECHNOLOGIES LIMITE...

1. A fingerprint sensing circuit, comprising:a plurality of sensing units, arranged as a plurality of columns and a plurality of rows, wherein each of the sensing units comprises a sensing electrode and a transfer switch having a first terminal, a second terminal and a control terminal, and the first terminal of the transfer switch is connected to a respective sensing electrode;
a sensing circuit, configured to be electrically connected to the sensing electrodes in at least two first sensing units of the sensing units in a first period to obtain a first fingerprint grey level;
a plurality of first conductive lines respectively corresponding to the rows, wherein each of the first conductive lines is electrically connected to the control terminals of the transfer switches in one of the rows;
a plurality of second conductive lines respectively corresponding to the columns and electrically connected to the sensing circuit, wherein each of the second conductive lines is electrically connected to the second terminals of the transfer switches in one of the columns;
a plurality of column switches respectively disposed on the second conductive lines and disposed between the sensing units and the sensing circuit;
a row select circuit, configured to transmit a first signal to the first conductive lines corresponding to a first row and a second row in the first period for turning on the transfer switches in the first row and the second row; and
a column select circuit, configured to turn on the column switches corresponding to a first column and a second column in the first period,
wherein the row select circuit is further configured to transmit the first signal to the first conductive lines corresponding to the first row and the second row in a second period to turn on the transfer switches in the first row and the second row,
wherein the column select circuit is further configured to turn on the column switches corresponding to the second column and a third column in the second period.

US Pat. No. 10,339,354

WEARABLE DEVICE AND CONTROLLING METHOD THEREOF

LG ELECTRONICS INC., Seo...

1. A wearable device, comprising:a memory;
a flexible surface light source;
a photo panel located on a top surface of the flexible surface light source; and
a controller coupled with the flexible surface light source and the photo panel,
wherein the controller is configured to detect a first biometric image by controlling the flexible surface light source and identify a user by comparing the detected first biometric image to a second biometric image previously saved in the memory,
wherein the flexible surface light source further comprises:
at least one or more infrared or white light projection units arranged sequentially; and
a reflective unit located on one side of the flexible surface light source in a direction parallel with the flexible surface light source to project at least one of an infrared light and a white light in a direction vertical to the flexible surface light source, and
wherein the flexible surface light source is configured to selectively project at least one of the infrared light and the white light under a control of the controller.

US Pat. No. 10,339,352

WEARABLE METROLOGICAL APPARATUS

HAND HELD PRODUCTS, INC.,...

1. A system for measuring dimension and weight of an object, the system comprising:an article of headgear to be worn by a user, the headgear comprising a dimensioner, the dimensioner comprising a range camera configured to optically scan an object to measure a length, a width, and a height of the object;
an article of footwear to be worn on at least one foot of the user, the footwear comprising a force sensing device configured to measure a weight of the object when held by the user based at least in part on a force acting on a bottom portion of the footwear and a combined weight of the user and the article of headgear; and
a control unit comprising a dimension input module and a weight input module, the control unit configured to receive signals comprising data pertaining to the length, the width, and the height of the object, and data pertaining to the weight of the object.

US Pat. No. 10,339,347

BAND WITH RFID CHIP HOLDER AND IDENTIFYING COMPONENTS

S.P.M. Flow Control, Inc....

1. An apparatus, comprising:a band adapted to be coupled to a component of a system associated with a wellhead, the band comprising first and second ends;
a holder coupled to the band;
an electronic identifying device attached to the holder and adapted to identify the component to which the band is adapted to be coupled; and
an identifying component positioned on the band;
wherein the identifying component visually conveys information about at least one of:
the electronic identifying device, and
the component to which the band is adapted to be coupled.

US Pat. No. 10,339,346

SYSTEMS AND METHODS FOR A RECONFIGURABLE ANTENNA

INTERMEC, INC., Lynnwood...

1. A device comprising:a plurality of antenna elements configured to read a radio-frequency identification (RFID) tag;
a switch having an input configured to receive an RFID control signal from an RFID reader via a communication line to select one antenna of the plurality of antenna elements; and
a controller configured to control a state of the switch,
wherein the switch is configured to be switched between states when the controller receives the RFID control signal comprising an address unique to the controller, thereby allowing the RFID reader to send an interrogation signal to and receive a response from the RFID tag in response to receiving the RFID control signal.

US Pat. No. 10,339,345

CARD PROCESSING APPARATUS AND AUTOMATIC TRANSACTION MACHINE

HITACHI-OMRON TERMINAL SO...

1. A card processing apparatus, comprising:a card insertion opening in which a magnetic card is to be inserted;
a card insertion detection sensor configured to detect the magnetic card inserted in the card insertion opening;
a magnetic head provided near the card insertion opening and configured to read magnetic information from magnetic stripe of a magnetic card and magnetic information from radio waves sent from a radio terminal as a magnetic signal and output a magnetic signal;
a card lock unit configured to hold the magnetic card inserted in the card insertion opening; and
a control unit configured to: receive the magnetic signal from the magnetic head when the card insertion detection sensor detects the magnetic card; receive the magnetic signal from the magnetic head when the card insertion detection sensor does not detect the magnetic card; acquire the magnetic signal when the magnetic signal includes a predetermined pattern; discard the magnetic signal when the magnetic signal does not include the predetermined pattern; and cause the card lock unit to restrict insertion of the magnetic card into the card insertion opening while the control unit is processing a magnetic signal of a wireless terminal.

US Pat. No. 10,339,344

ELECTROMAGNETIC MARKING DEVICE AND METHODS FOR ITS USE

1. A system for marking objects using an electromagnetic marking device, the system comprising:a first electromagnetic marking device, wherein the first electromagnetic marking device further comprises:
a body having a top surface and a bottom surface, the body comprising:
a first part, wherein the first part further comprises:
a through-hole in the first part, the through-hole comprising a first opening in the top surface of the body and a second opening in the bottom surface of the body; and
first member disposed within the through-hole, the first member including a first proximal end attached to the body and a first distal end not attached to the body; and
a second member disposed within the through-hole, the second member including a second proximal end attached to the body and a second distal end; and
a second part attached to the first part; and
a signal generator attached to the second part, the signal generator further including a wave generator circuit and a wave modulator circuit.

US Pat. No. 10,339,343

STORAGE SYSTEM AND METHOD FOR IMPROVED GENERATION AND STORAGE OF DATA PROTECTION INFORMATION

Western Digital Technolog...

1. A storage system comprising:a memory; and
a controller in communication with the memory, wherein the controller is configured to:
receive a write command, data, and a logical address;
determine a physical address associated with the logical address;
generate protection information for the data using the data, the logical address, and physical address; and
store the data and the protection information in the memory without storing the logical address and physical address in the memory.

US Pat. No. 10,339,342

DATA TRANSFER BASED ON INPUT DEVICE IDENTIFYING INFORMATION

LENOVO (SINGAPORE) PTE. L...

1. An input device, comprising:a portable housing;
at least one processor supported by the portable housing; and
at least one light accessible to the at least one processor, wherein the at least one light establishes a bar that extends longitudinally along the portable housing relative to a longitudinal axis of the portable housing; and
storage accessible to the at least one processor and bearing instructions executable by the at least one processor to:
indicate, via the at least one light, available storage capacity of the input device, wherein the available storage capacity is indicated by illuminating a first amount of the bar that is less than a total illuminable amount of the bar;
sense physical contact of the input device against a first device different from the input device; and
in response to the physical contact being sensed, provide information to at least one of the first device and/or a server as part of a cut, copy, or paste operation.

US Pat. No. 10,339,341

METHODS AND SYSTEMS FOR OBFUSCATING SENSITIVE INFORMATION IN COMPUTER SYSTEMS

1. A computer-implemented method for masking information of a dataset, in a computing system that includes one or more servers, a memory for storing information and instructions to be executed by a processor automatically, and coupled via a web network, the method comprising the steps of:receiving, by an analytics computing system from a data computing system, a first data set that is characterized as having a statistical distribution and the first data set further comprising identifying information;
analyzing, by the analytics computing system, the statistical distribution of the first data set by a statistical analysis engine;
selecting, by the analytics computing system based at least in part on the analyzed statistical distribution of the first data set, a discrete transform to be performed on the data to alter the statistical distribution relative to the identifying information;
generating, by the analytics computer system, a third data set by replacing at least a portion of the first data set with a second data set, such that the statistical distribution for the identifying information of the third data is different than the statistical distribution that characterized the first data set;
creating, by a mapping computer system, a value mapping scheme between the first, second and third datasets, wherein the value mapping scheme is changeable based on a user request; and
outputting, by the mapping computer system to the data computing system, the third data set as the masked data set of the first data set.

US Pat. No. 10,339,340

ANONYMOUS REPUTATION REQUESTS

Symantec Corporation, Mo...

1. A method to improve customer privacy in computer security comprising:calculating a full thumbprint of an object on a client machine;
trimming one or more bits from the full thumbprint to generate a trimmed thumbprint;
sending the trimmed thumbprint to a reputation server; and
receiving a result from the reputation server regarding the trimmed thumbprint, the result indicating each server thumbprint of which a portion of each server thumbprint matches at least a portion of the trimmed thumbprint.

US Pat. No. 10,339,336

METHOD AND APPARATUS FOR ENCRYPTING DATABASE COLUMNS

Oracle International Corp...

1. A method for accessing encrypted columns in a database, comprising:receiving, by a database system on a server computer, a database query command directed to a column in the database;
determining, by the database system, whether the column is encrypted based on metadata for the column; and
responsive to determining that the column is encrypted:
determining a plurality of database commands performing a plurality of inter-dependent cryptographic operations on the database query command, wherein a first database command of the plurality of database commands retrieves a key encrypting the column, and wherein a second operation of the plurality of database commands decrypts the encrypted column;
inserting in the database query command, by the database system, the plurality of database commands to generate a modified query command; and
performing the modified query command, by the database system, that decrypts the encrypted column to obtain column data of the column and performs the received database query command on the obtained column data.

US Pat. No. 10,339,335

SEMICONDUCTOR DEVICE

RENESAS ELECTRONICS CORPO...

1. A semiconductor device, comprising:a first storage unit including twin cells which are electrically rewritable and complementarily store 1-bit data based on a difference in a threshold voltage;
a second storage unit including a memory cell which is electrically rewritable, data stored in the memory cell being erased when data in the twin cells is erased;
at least one scrambler subjecting first data to a scramble processing by using scramble data to generate second data;
a first write circuit which writes the second data into the twin cells in the first storage unit;
a second write circuit which writes the scramble data into the memory cell in the second storage unit; and
at least one descrambler subjecting the second data read from the first storage unit to a descramble processing by using the scramble data read from the second storage unit,
wherein the second storage unit includes a plurality of single cells each consisting of one memory cell and storing 1 bit of the scramble data, and the plurality of single cells redundantly store 1 bit of the scramble data, and
wherein the semiconductor device further comprises a sense amplifier including one input terminal simultaneously connected to a plurality of bit lines connected to the plurality of single cells and another terminal connected to a constant current source circuit.

US Pat. No. 10,339,334

AUGMENTED REALITY CAPTCHA

CA, Inc., Islandia, NY (...

1. A method for authorizing a user to access a network location, the method comprising:receiving an indication that a user is attempting to access the network location;
receiving a streaming image feed from a camera associated with a device being used by the user to attempt to access the network location;
determining from the streaming image feed an environment in which the user is located;
determining from the environment, an interactive image overlay;
augmenting the streaming image feed with the interactive image overlay;
receiving an augmented image feed from the camera, the augmented image feed comprising image data indicating that the user is interacting virtually with the interactive image overlay;
verifying that the user interaction with the interactive image overlay is a correct interaction for the interactive image overlay for passing a challenge-response test; and
providing access to the user to the network location.

US Pat. No. 10,339,332

CONTAINERIZED BUILD STEPS

Google LLC, Mountain Vie...

1. A method comprising:receiving, at data processing hardware, a build request containing build step instructions from a user, the build step instructions specifying a usage of containers within memory hardware for building an output container, the containers comprising at least one private container having private contents and/or at least one public container having public contents, the at least one private container requiring a user authorization for accessing the private contents, the private contents of the at least one private container comprising a proprietary software development kit for use in building the output container;
authenticating, by the data processing hardware, the user initiating the build request;
determining, by the data processing hardware, whether the user is authorized to access the private containers; and
when the user is authenticated and authorized to access the private containers:
obtaining, by the data processing hardware, the containers specified by the build step instructions from the memory hardware;
executing, by the data processing hardware, the build step instructions to build the output container while using the obtained containers; and
outputting, by the data processing hardware, the built output container,
wherein the built output container includes contents that exclude the proprietary software development kit.

US Pat. No. 10,339,331

PLAYBACK DEVICE QUEUE ACCESS LEVELS

Sonos, Inc., Santa Barba...

1. A method, comprising:receiving, via a playback device from a first control interface, a request for information identifying all media items in a playback queue, the request comprising a credential associated with the first control interface, wherein the first control interface is associated with a first playlist, wherein the media items comprise one or more media items added from a second playlist associated with a second control interface, and wherein the playback device is configured to play back media according to the playback queue;
determining an access level of the playback queue for the first control interface based on the credential;
determining, via the playback device, a first subset of the media items in the playback queue and a second subset of the media items in the playback queue based on the credential, wherein the determining the first subset and the second subset comprises:
identifying, as included in the first subset, media items in the playback queue that were added via the second control interface; and
identifying, as included in the second subset, media items in the playback queue that were added via a control interface different from the second control interface; and
providing, via the playback device to the first control interface, first information identifying the first subset of the media items in the playback queue based on the access level and second information identifying the second subset of the media items in the playback queue.

US Pat. No. 10,339,329

CONTROLLING ACCESS TO DATA IN A DATABASE

International Business Ma...

1. A method for accessing data in a database table, said method comprising:displaying a login page on a display screen of a first computer;
receiving a first user ID and a first password associated with a first user via the displayed login page;
sending, by a processor of the first computer, a first authentication request for the first user ID and the first password;
in response to successful authentication of the first user ID and the first password, receiving a first cookie having a first cookie value associated with the first user ID;
displaying an additional login page on the display screen of the first computer;
receiving a second user ID, that differs from the first user ID, and a second password associated with a second user via the displayed additional login page;
sending, by the processor of the first computer, a second authentication request for the second user ID and the second password without logging out the first user, wherein the first cookie having the first cookie value is sent with the second authentication request;
in response to successful authentication of the second user ID and the second password, receiving a second cookie having a second cookie value associated with the first user ID and the second user ID;
sending, by the processor of the first computer, to a second computer having access to the database table while the first user and the second user are simultaneously logged in via the first computer, a search request for first data from the database table that the first user is authorized to access and second data from the database table that the second user is authorized to access, wherein the second cookie having the second cookie value is sent with the search request;
after said sending the search request, receiving, by the processor of the first computer, the requested first and second data in the database table, wherein the received first and second data comprises individual data and family data, wherein the individual data comprises a first set of rows of the table that the first user is authorized to access and a second set of rows of the table that the second user is authorized to access, wherein the family data is (i) a sum set consisting of a combination of the first set of rows and the second set of rows or (ii) a product set consisting of a combination of the rows that both the first set of rows and the second set of rows comprise; and
displaying, by the processor in a user interface on the display screen of the first computer, the individual data or the family data, in response to the individual data or the family data having been selected in the user interface by the first user or the second user.

US Pat. No. 10,339,327

TECHNOLOGIES FOR SECURELY BINDING A PLATFORM MANIFEST TO A PLATFORM

Intel Corporation, Santa...

1. A computing device for platform manifest management, the computing device comprising:a field-programmable fuse;
a security engine, wherein the security engine comprises a hash manager to receive a manifest hash, wherein the manifest hash comprises a hash of a platform manifest, and wherein the platform manifest is indicative of a hardware configuration of the computing device; and
a fuse manager to modify a bit of the field-programmable fuse in response to receipt the manifest hash;
wherein the hash manager is further to (i) store the manifest hash and a counter value in a non-volatile storage of the computing device in response to modification of the bit to generate a stored manifest hash and a stored counter value, wherein the counter value is indicative of a value of the field-programmable fuse, (ii) generate a message authentication code over the stored manifest hash and the stored counter value in response to the modification of the bit, and (iii) store the message authentication code in the non-volatile storage.

US Pat. No. 10,339,326

CABLE MODEM ANTI-CLONING

ARRIS Enterprises LLC, S...

1. A method comprising:retrieving a unique identifier associated with a cable modem, wherein the unique identifier associated with the cable modem is retrieved by a security engine of a system-on-a-chip that is associated with the cable modem;
retrieving a unique key associated with the system-on-a-chip, wherein the unique key associated with the system-on-a-chip is retrieved by the security engine;
producing, at the security engine, an encrypted unique identifier, wherein the encrypted unique identifier is produced by using the unique key as an encryption key to encrypt the unique identifier associated with the cable modem;
storing the encrypted unique identifier at the cable modem;
initiating an authentication process at the cable modem;
producing, at the security engine, the unique identifier associated with the cable modem, wherein the unique identifier associated with the cable modem is produced by using the unique key as a decryption key to decrypt the encrypted unique identifier; and
outputting the unique identifier associated with the cable modem to an upstream controller, wherein the unique identifier associated with the cable modem is output as an authorization request message.

US Pat. No. 10,339,324

TAMPER-PROOF STORAGE USING SIGNATURES BASED ON THRESHOLD VOLTAGE DISTRIBUTIONS

APPLE INC., Cupertino, C...

1. An apparatus, comprising:an interface, configured to communicate with a memory comprising multiple memory cells that store data as respective analog values, wherein the memory is addressable using physical addresses; and
storage circuitry, which is configured to:
perform a first read operation from a physical address, and determine a first sequence of analog values retrieved by the first read operation;
perform a second read operation from the physical address, and determine a second sequence of analog values retrieved by the second read operation;
evaluate a variation between the first sequence and the second sequence, including classifying the analog values of the first and second sequences into predefined analog zones; and
determine that an unauthorized re-programming to the physical address has occurred between the first read operation and the second read operation, by detecting at least first and second analog values, which have a same position in the first and second sequences, respectively, but that belong to non-neighboring analog zones among the predefined analog zones of the analog values, in response to the evaluated variation exceeding a predefined variation level.

US Pat. No. 10,339,323

GROUP LICENSE ENCRYPTION AND DECRYPTION

GOOGLE LLC, Mountain Vie...

1. A method comprising:receiving, over a network, a license request from a client computing device requesting access to media content provided by a media content provider, the media content associated with a license group, the license request including a group identifier assigned to the license group among a plurality of license groups and a content identifier that identifies the media content, each of the plurality of license groups defining a different group of media content and being associated with a different master key;
obtaining a master key for the license group using the group identifier, the master key being a key for the license group such that content keys for all media content that is part of the license group can be derived using the master key;
deriving a content key for the media content based on the master key, the content identifier, and the group identifier using a key derivation function; and
sending, over the network, a license to the client computing device and the license includes the master key and the content key such that the media content is configured to be decrypted at the client computing device using the content key and content keys for other media content that is part of the license group are configured to be obtained at the client computing device based on the master key, a respective content identifier, and the group identifier using the key derivation function.

US Pat. No. 10,339,321

CYBERSECURITY MATURITY FORECASTING TOOL/DASHBOARD

Dignity Health, San Fran...

1. A system comprising:a server,
a custom-designed special-purpose hardware computing device coupled to a network and at least one processor executing specific computer-executable instructions comprising a specific device logic within a memory that, when executed, cause the system to: extract, from an electronic assessment document, at least one assessment data comprising an original maturity score defining an original level of compliance with a cybersecurity framework; analyze a first input into a graphical user interface (GUI) on a client hardware computing device, the first input comprising: a forecast maturity score representing a desired level of compliance with the cybersecurity framework; a forecast date identifying a target date by which an organization, identified by an authenticated organization identifier, will achieve a level of compliance represented by the forecast maturity score;
automatically generate, using a combination of the cybersecurity framework, the original maturity score, the forecast maturity score, and the forecast date: at least one project objective to achieve the forecast maturity score; a project objective forecast date by which the at least one project objective will be completed;
automatically update the at least one project objective responsive to at least one update in the cybersecurity framework;
programmatically audit the system for security weaknesses by executing a remote procedure call to determine whether a system process is performing the at least one project objective, or is configured to complete the at least one project objective prior to or subsequent to the project objective forecast date: and
responsive to a determination that the system process is configured to complete the at least one project objective prior to or subsequent to the project objective forecast date:
update the project objective forecast date thereby dynamically updating the forecast date and generate a notification to a project manager of the at least one project objective that the system process is configured to complete the at least one project objective prior to or subsequent to the project objective forecast date.

US Pat. No. 10,339,320

APPLYING MACHINE LEARNING TECHNIQUES TO DISCOVER SECURITY IMPACTS OF APPLICATION PROGRAMMING INTERFACES

International Business Ma...

1. A computer-implemented method of improving security of a tangible computer, the method comprising:normalizing, by a processor, a plurality of application programming interfaces (APIs) on the tangible computer to form a plurality of normalized APIs, wherein the plurality of APIs include first APIs with unknown security information;
analyzing, by the processor using a machine learning algorithm, the plurality of normalized APIs by identifying a subset of the plurality of APIs that have semantics of a feature, wherein the feature is selected from the group consisting of a source, a sink, and a taint propagator;
performing, by the processor, static analysis security testing only on the subset of the plurality of APIs;
identifying, by the processor, a compromised API from the subset of the plurality of APIs using the static analysis security testing;
improving, by the processor, security of the computer by taking an action on the computer as a result of identifying the compromised API; and
automatically marking-up, by the processor, the subset of the plurality of APIs, wherein marking-up highlights sources of taint, sinks, and taint propagators.

US Pat. No. 10,339,319

METHOD AND APPARATUS FOR IDENTIFYING VULNERABILITY INFORMATION USING KEYWORD ANALYSIS FOR BANNER OF OPEN PORT

1. A method for identifying information of a computer system by a computing device, the method comprising:acquiring, by the computing device, service information which operates in a specific port of the computer system connected to a network;
processing, by the computing device, the acquired service information;
acquiring, by the computing device, a vulnerability occurrence product name common platform enumeration (CPE) dictionary through the network;
creating, by the computing device, a CPE tree having a plurality of levels including at least three levels and a plurality of nodes by analyzing the CPE dictionary,
wherein a node corresponding to a first level includes vendor information, a node corresponding to a second level includes product name information, a node corresponding to a third level includes product version information, a node corresponding to a fourth level includes update information, a node corresponding to a fifth level includes edition information, and a node corresponding to a sixth level includes product language information, and
wherein the CPE dictionary includes a character string used to create the CPE tree, and the character string corresponds to at least (i) a respective first node of the CPE tree corresponding to the first level or the second level, (ii) a respective second node of the CPE tree having the respective first node as a parent node, and (iii) a respective third node of the CPE tree having the respective second node as a parent node;
searching, by the computing device, keywords of respective levels of the CPE tree in the processed service information; and
combining, by the computing device, the keywords included in the processed service information among the keywords of the CPE tree to generate one or more CPEs based on the CPE tree that observe the format of the CPE dictionary and output the CPEs, in order to generate the CPEs from the acquired service information more rapidly and easily when the acquired service information does not conform to a predetermined pattern.

US Pat. No. 10,339,318

SEMICONDUCTOR MEMORY SYSTEM AND OPERATING METHOD THEREOF

SK hynix Inc., Gyeonggi-...

1. An operating method of a semiconductor memory system including a memory controller and a memory device, the method comprising:storing at least a customer identification (ID) identifying a customer in a one-time-programmable memory component of the memory controller;
executing instructions by a processor of the memory controller for:
authenticating whether a program is authorized by a controller provider for the customer in a first-level authentication, in accordance with a customer image format, by generating a controller signature and authenticating the controller signature with a controller public key, including matching the customer ID with a program customer ID defined in the program;
authenticating whether the program is authorized by the customer in a second-level authentication, using a customer signature and a customer public key, after the first-level authentication is passed;
embedding the controller public key into the memory controller during the first-level authentication;
authenticating whether the program is authorized by the controller provider for the customer identified by the customer ID in a repeated first-level authentication after the second-level authentication is passed; and
executing the program after the program is authenticated.

US Pat. No. 10,339,317

COMPUTING DEVICES

Intel Corporation, Santa...

1. A computing device, comprising:a trusted execution environment;
a Basic Input/Output System (BIOS) configured to request a Key Encryption Key (KEK) from the trusted execution environment; and
a Self-Encrypting Storage (SES) associated with the KEK;
wherein the trusted execution environment is configured to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, and the BIOS is configured to provide the KEK to the SES to unlock the SES for access by the trusted execution environment.

US Pat. No. 10,339,316

INTEGRITY ASSURANCE THROUGH EARLY LOADING IN THE BOOT PHASE

CrowdStrike, Inc., Irvin...

1. A computing device comprising:a processor;
memory; and
a plurality of components stored in the memory and operable by the processor during a boot phase of the computing device, wherein the boot phase is not a pre-boot phase, the components including:
a library component of a driver of an integrity manager associated with a kernel-mode component, the library component to be processed during the boot phase and before initialization of drivers by an operating system of the computing device and which, when processed, ensures that the driver of the integrity manager is a first of the drivers in an initialization order of the drivers utilized by the operating system;
the driver of the integrity manager which, when initialized, causes the computing device to launch the integrity manager; and
the integrity manager which, when launched:
determines that a driver of the kernel-mode component is not next in the initialization order after the driver of the integrity manager; and
alters the initialization order to place the driver of the kernel-mode component next in the initialization order to initialize the driver of the kernel-mode component before initializing remaining ones of the drivers.

US Pat. No. 10,339,315

APPARATUS AND METHOD FOR DETECTING MALICIOUS MOBILE APP

Electronics and Telecommu...

1. An apparatus for detecting a malicious application, the apparatus comprising:a processor configured to
collect a mobile application,
extract basic information from the collected mobile application,
generate a call flow graph (CFG) of the mobile application,
execute the collected mobile application, and expand the CFG of the mobile application to a dynamic action-based CFG,
extract a semantic-based partial action-based graph from the dynamic action-based CFG with reference to a semantic division rule set,
compare the extracted semantic-based partial action-based graph and a partial graph signature image of a reference malicious action, and
determine whether the collected mobile application is malicious based on the comparison and by analyzing the extracted basic information,
wherein the basic information comprises any one or any combination of any two or more of an execution file, resource information, metadata information, and permission information of the mobile application.

US Pat. No. 10,339,314

DEVICE, METHOD AND STORAGE MEDIUM FOR TERMINATING OPERATION OF SOFTWARE THAT IS NOT SUCCESSFULLY VERIFIED

FUJITSU LIMITED, Kawasak...

1. A system comprising:a verification device configured to
receive software,
execute the software received, and
transmit to the software, when a first command is generated by the software, information which causes the software to terminate an operation of the software in the verification device; and
a terminal device configured to
receive, from the verification device, the information and a notification regarding the first command,
receive, from the verification device, the software;
hook a second command when the second command is generated by the software, and
transmit, to the software, the information that is transmitted from the verification device and causes the software to terminate the operation of the software in the terminal device when the second command corresponds with the first command.

US Pat. No. 10,339,313

SYSTEM AND METHOD FOR BYPASSING A MALWARE INFECTED DRIVER

WEBROOT INC., Broomfield...

1. A method comprising:determining a lowest level driver in a driver chain, wherein the driver chain comprises one or more drivers for communicating with a device;
locating a trusted copy of the lowest level driver, wherein the trusted copy is not infected by a rootkit;
establishing an alternate communication path to the device, wherein the alternate communication path includes the trusted copy of the lowest level driver;
submitting a first request via the alternate communication path;
receiving a first response to the first request via the alternate communication path; and
based upon the first response, determining that the driver chain is infected with a rootkit.

US Pat. No. 10,339,312

SYSTEM AND METHOD FOR DETECTING MALICIOUS COMPOUND FILES

AO KASPERSKY LAB, Moscow...

1. A computer-implemented method for detecting malicious compound files, the method comprising:obtaining, by a processor of a computing device, at least one compound file;
identifying, by the processor, a first set of features of the at least one compound file including features associated with a header of the at least one compound file;
subsequent to identifying the first set of features, identifying, by the processor, a second set of features of the at least one compound file including features associated with at least one directory of the at least one compound file;
determining a hash of the at least one compound file based on the first and second set of features by concatenating byte representations of the first set of features with byte representations of the second set of features and byte representations of a size of the compound file;
comparing the hash of the at least one compound file with information associated with a plurality of compound files stored in a database; and
identifying the at least one compound file as being malicious, trusted or untrusted based at least on comparison results.

US Pat. No. 10,339,311

ANOMALOUS COMMIT DETECTION

SAP SE, Walldorf (DE)

1. A system for detecting anomalous modifications to a software component, the system comprising:a computing device comprising one or more processors and a memory in communication with the one or more processors, wherein the computing device is programmed to perform operations comprising:
receiving, from a version control system, version metadata describing properties of a plurality of commits for the software component;
generating a distance in a multidimensional space between a first commit of the plurality of commits and a second commit of the plurality of commits, wherein a first dimension of the multidimensional space corresponds to at least one commit property;
generating a plurality of commit clusters based, at least in part, on the distance, wherein the plurality of commit clusters comprises a first commit cluster and a second commit cluster;
determining a first anomalous commit of the plurality of commits, wherein determining the first anomalous commit comprises:
determining that a first commit of the plurality of commits is not in the first commit cluster; and
determining that the first commit is not in the second commit cluster; and
generating an alert message indicating a first code segment modified by the first commit.

US Pat. No. 10,339,309

SYSTEM FOR IDENTIFYING ANOMALIES IN AN INFORMATION SYSTEM

Bank of America Corporati...

1. A computerized system for identifying anomalies in a computerized information system, comprising:a computer processor;
a memory;
a network communication device; and
an information security analysis module stored in the memory, executable by the processor, and configured for:
collecting information regarding a hierarchy of capabilities of the information system;
storing, in a graph database, a plurality of capability nodes, each capability node corresponding to a capability category of the hierarchy of capabilities;
collecting information regarding a hierarchy of resources of the information system;
storing, in the graph database, a plurality of resource nodes, each resource node corresponding to a resource category of the hierarchy of resources;
collecting information regarding a plurality of capability instances of the information system;
storing, in the graph database, a plurality of capability instance nodes, each capability instance node corresponding to a capability instance of the plurality of capability instances of the information system;
collecting information regarding a plurality of resource instances of the information system;
storing, in the graph database, a plurality of resource instance nodes, each resource instance node corresponding to a resource instance of the plurality of resource instances of the information system;
collecting information regarding relationships among the hierarchy of capabilities, the hierarchy of resources, the plurality of capability instances, and the plurality of resource instances;
defining, in the graph database, edges among the plurality of capability nodes, the plurality of resource nodes, the plurality of capability instance nodes, and the plurality of resource instance nodes, the edges corresponding to the relationships among the hierarchy of capabilities, the hierarchy of resources, the plurality of capability instances, and the plurality of resource instances;
collecting event and/or state data for the information system, wherein the event and/or state data includes parameters of an event and/or state;
comparing the parameters of the event and/or state to the graph database;
based on comparing the parameters of the event and/or state to the graph database, determining that the event and/or state is anomalous; and
in response to determining that the event and/or state is anomalous, taking an information security action.

US Pat. No. 10,339,308

SYSTEMS AND METHODS FOR REMEDIATING COMPUTER RELIABILITY ISSUES

Symantec Corporation, Mo...

1. A computer-implemented method for remediating computer reliability issues, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:obtaining a computer-generated log line that potentially includes information pertaining to a cause of a reliability issue experienced by a device;
determining that a product-specific schema has not been created for a product that generated the computer-generated log line;
in response to determining that a product-specific schema has not been created for the product, matching values of the computer-generated log line to fields within one or more established schemas that are not specific to the product;
based at least in part on the fields that match the values of the computer-generated log line, identifying an entry, within the one or more established schemas, that corresponds to the computer-generated log line; and
remediating the device based on information associated with the entry within the one or more established schemas.

US Pat. No. 10,339,307

INTRUSION DETECTION SYSTEM IN A DEVICE COMPRISING A FIRST OPERATING SYSTEM AND A SECOND OPERATING SYSTEM

IDEMIA FRANCE, Colombes ...

1. A device comprising:a first operating system;
a second operating system;
intrusion detection system comprising:
listening-executable instructions configured to be executed by one or more processors in the first operating system in order to listen to the activity of the first operating system,
collecting-executable instructions configured to be executed by the one or more processors in the first operating system in order to collect data characterizing the activity of the first operating system, and
analysis and detection-executable instructions configured to be executed by the one or more processors in the second operating system in order to analyze the data collected in the first operating system and to detect a suspicious activity in the first operating system as a result of said analysis; and
one or more hardware processors configured to execute the first operating system, the second operating system, and the intrusion detection system,
wherein the first operating system and the second operating system are executed exclusively of each other, and
the second operating system conforms to a Trusted Execution Environment (TEE) Protection Profile version 1.0 defined by the GlobalPlatform Organization.

US Pat. No. 10,339,306

METHODS AND SYSTEMS FOR FRAUD CONTAINMENT

The 41st Parameter, Inc.,...

1. A computer-implemented method for device identification in a fraudulent electronic transaction, the computer-implemented method comprising:by one or more processors:
accessing an electronic repository storing at least: a plurality of data records corresponding to a plurality of device identifiers, a plurality of account identifiers, and a plurality of relationship indicators, each of the plurality of relationship indicators associated with one more relationships among one or more of the plurality of device identifiers and one or more of the plurality of account identifiers;
receiving an electronic information data packet associated with an electronic fraudulent transaction and including a fraud event indicator;
parsing the electronic information data packet to identify a first fraud device identifier used to carry out the electronic fraudulent transaction, the first fraud device identifier corresponding to one of the plurality of device identifiers stored in the electronic repository;
executing an automated search of the electronic repository using one or more of the plurality of relationship indicators to identify: (a) a first set of device identifiers of the plurality of device identifiers, the first set of device identifiers potentially related to the electronic fraudulent transaction, and (b) a first set of account identifiers of the plurality of account identifiers, the first set of account identifiers potentially related to the electronic fraudulent transaction;
calculating a first plurality of proximity indicators each associated with each of the first set of device identifiers, each of the first plurality of proximity indicators indicating a number of device identifiers or account identifiers between a device and the first fraud device identifier, the device flagged as a master perpetrator device if the proximity indicator is zero such that the device is used to access an account for committing the electronic fraudulent transaction;
generating a first plurality of assessment indicators based on the first plurality of proximity indicators and involvement factor rules, each of the first plurality of assessment indicators representing a first confidence level that the device is involved with a perpetrator associated with the electronic fraudulent transaction;
identifying a subset of the first set of device identifiers based at least on the first plurality of assessment indicators;
generating one or more electronic flags indicating that the subset of the first set of device identifiers are likely involved with the perpetrator associated with the electronic fraudulent transaction; and
generating a risk score for a victim circle the risk score representing a second confidence level that one or more potential victim accounts are compromised.

US Pat. No. 10,339,304

SYSTEMS AND METHODS FOR GENERATING TRIPWIRE FILES

Symantec Corporation, Mo...

1. A computer-implemented method for generating tripwire files, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:generating an initial tripwire file according to an initial variant of a tripwire generation algorithm, the initial tripwire file configured such that modification of the initial tripwire file triggers investigation of a security breach;
generating a subsequent tripwire file according to a subsequent variant of the tripwire generation algorithm, the subsequent variant of the tripwire generation algorithm randomly differing from the initial variant of the tripwire generation algorithm along at least one dimension;
receiving automated feedback that indicates whether at least one of the initial tripwire file and the subsequent tripwire file failed to enable detection of a security threat at least in part by:
a backup client receiving an indication from a user to perform a restoration operation; and
the backup client asking the user, in response to receiving the indication from the user to perform the restoration operation, whether the restoration operation is a result of a recent crypto-lock attack; and
adjusting automatic generation of a third tripwire file based on the automated feedback indicating whether at least one of the initial tripwire file and the subsequent tripwire file failed to detect the security threat at least in part by selecting which variant of the tripwire generation algorithm was more effective in protecting against known ransomware exploits.

US Pat. No. 10,339,303

DETECTION OF MALICIOUS INVOCATION OF APPLICATION PROGRAM INTERFACE CALLS

McAfee, LLC, Santa Clara...

1. At least one non-transitory computer-readable medium comprising one or more instructions that when executed by at least one processor, cause the processor to:receive, by a kernel driver executed by the at least one processor, an application program interface (API) call, wherein the kernel driver is included within a kernel space;
extract, with the kernel driver, metadata from the API call;
determine, with the kernel driver, that the API call should be hooked based on the extracted metadata;
hook, with the kernel driver, the API call;
communicate the API call and the extracted metadata to a security module, wherein the security module determines if the API call should be allowed or denied; and
allow the API call if a response from the security module is not received after a predetermined amount of time has passed from when the API call and the extracted metadata was communicated to the security module.

US Pat. No. 10,339,302

CREATING MULTIPLE WORKSPACES IN A DEVICE

AIRWATCH LLC, Atlanta, G...

7. A method, comprising:intercepting, by a translator in a managed application executed in a managed device, a message from a target application executed in the managed device to a system service of the managed device, wherein the managed application operates in a workspace managed by a workspace manager;
generating, by the translator, a modified version of the message;
providing the modified version of the message to the system service;
obtaining a component invocation message from the managed application;
determining whether the component invocation message is intended to invoke a public component in the workspace managed by the workspace manager; and
providing an instruction to the managed application in response to determining whether the component invocation message is intended to invoke the public component.

US Pat. No. 10,339,301

SYSTEM AND METHOD OF ANALYSIS OF FILES FOR MALICIOUSNESS IN A VIRTUAL MACHINE

AO Kaspersky Lab, Moscow...

1. A method for analysis of files for maliciousness, the method comprises: opening and executing a file, by a processor, in a virtual machine; intercepting, by the processor, an event arising during an execution of a thread of a process created upon opening of the file; halting the execution of the thread of the process upon interception of the event; reading a context of the processor on which the thread of the process created upon opening of the file is being executed; comparing, by the processor, the context of the processor with a plurality of rules that check: a path of the file, a type of the file, an extension of the file, a behavior of the thread of the process created upon opening of the file, a changing, by the thread of the process, of attributes of the file, and an access of the thread of the process to the Internet; and based on a result of the comparison, performing at least one of: recognizing the file as being malicious, halting the execution of the process created upon opening of the file, changing the context of the processor, and waiting for a next intercepted event.

US Pat. No. 10,339,298

WEAK PASSWORD SUPPORT IN A MULTI-USER ENVIRONMENT

International Business Ma...

1. A method for supporting weak password authentication in a multi-user application environment, the method comprising:registering a different weak password without minimum length or minimum mix of alphabetical and numerical characters for each of a multiplicity of different end users in the multi-user application environment;
detecting an event in the multi-user application environment indicating a failed log in attempt attempted by an end user amongst the different end users in the multi-user application environment; and,
responsive to the detected event, acquiring log in data for the end user, messaging the acquired log in data to others of the different end users for subjective analysis by the others of the different end users in detecting an unauthorized log in attempt, determining if a threshold number of the different end users of a particular supervisory role report the acquired log in data as an anomaly, and transmitting a message indicating the unauthorized log in attempt by at least one of the different end users to an administrator of the multi-user application environment in response to determining that a threshold number of the different end users of the particular supervisory role have reported the acquired log in data as an anomaly so as to implement communal policing of the multi-user application environment.

US Pat. No. 10,339,296

TERMINAL APPARATUS AND CONTROL METHOD FOR TERMINAL APPARATUS

LG ELECTRONICS INC., Seo...

1. A terminal device, comprising:an input unit configured to receive a fingerprint input;
a display comprising a touchscreen; and
a controller operably coupled with the input unit and the display and configured to:
perform an authentication procedure in response to the fingerprint input;
cause the display to display a notification message when fingerprint authentication for a finger associated with the fingerprint input is completed;
if a contact of the finger is maintained for more than a predetermined first time after the fingerprint authentication is completed, set a fingerprint authentication cancellation mode;
cause the display to display a cancel button when the finger moves from the input unit to the touchscreen during the fingerprint authentication cancellation mode, continuous contact maintained by the finger with the input unit or the touchscreen when the finger moves from the input unit to the touchscreen; and
cancel the fingerprint authentication in response to selection of the displayed cancel button.

US Pat. No. 10,339,295

TRACKING WORK BETWEEN SYSTEM ENTITIES

Microsoft Technology Lice...

1. A method implemented in a computer having a processor and a memory with instructions executable by the processor to provide an operating system and first and second processes, the method comprising:receiving, at the operating system, a first request from the first process for a ticket of work tracking;
in response to the received first request, generating and assigning a first ticket to the first process, wherein the generating and assigning include encoding the first ticket with an authentication key accessible by the operating system; and
subsequently, at the operating system,
receiving a second request from the second process for validating a second ticket as being attributable to the first process, the second request indicating that the first process has requested the second process to perform work for the first process by passing to the second process the first ticket;
determining whether the received second ticket from the second process is a valid ticket assigned to the first process, wherein the determining includes decoding the received second ticket with the authentication key; and
in response to determining that the second ticket is a valid ticket assigned to the first process,
instructing the second process to perform the work for the first process; and
recording the work performed by the second process as attributable to the first process.

US Pat. No. 10,339,294

CONFIDENCE-BASED AUTHENTICATION

JPMorgan Chase Bank, N.A....

11. A computer system, comprising:a memory; and
a processing device communicatively coupled to the memory, the processing device accessing the memory and executing instructions to perform steps including:
assigning an authentication requirement rating to an activity, the authentication requirement rating being a value associated with the activity and independent of authentication technology used to perform authentication;
assigning an authentication capability rating to each of one or more authentication methods, wherein the authentication capability rating indicates a maximum authentication level that each authentication method can provide;
receiving over a network from a remote user access device, a request from a user to perform the activity;
formulating, in response to the request, an authentication challenge requiring a first authentication method for presentation to the user;
receiving over the network from the remote user access device, an authentication attempt from the user;
calculating a first authentication sample result as a degree of similarity correspondence between the authentication attempt and an expected authentication result;
determining a current authentication rating for the user based on the authentication capability rating of the first authentication method and the first authentication sample result, wherein the current authentication rating is a product of the authentication capability rating and the authentication sample result;
determining whether to allow the user to perform the requested activity based on a comparison of the authentication requirement rating associated with the activity requested by the user and the current authentication rating determined for the user;
wherein the requested activity is permitted when the current authentication rating is greater than or equal to the authentication requirement rating for the activity;
wherein when the current authentication rating is less than the requirement rating for the activity, the processing device accessing the memory and executing instructions performs additional steps including:
denying the requested activity;
providing the user with a second authentication challenge;
receiving a second authentication attempt in response to the second authentication challenge and calculating a second sample result, wherein the second sample result is calculated as a degree of similarity between the second authentication attempt and a second expected authentication result; and
adjusting the current authentication rating determined for the user based on the second authentication sample result.

US Pat. No. 10,339,293

AUTHENTICATED DEVICE USED TO UNLOCK ANOTHER DEVICE

Apple Inc., Cupertino, C...

1. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by one or more processors of an electronic device having a user-interface locked state and a user-interface unlocked state, cause the electronic device to:detect, via wireless communication, an external device, wherein the external device has a user-interface locked state and a user-interface unlocked state;
receive, from the external device, unlocking information for unlocking the electronic device;
obtain an indication that the external device is in the user-interface unlocked state;
detect, while in the user-interface locked state, user input at the electronic device; and
in response to detecting the user input at the electronic device and receiving the unlocking information from the external device, and based on the indication that the external device is in the user-interface unlocked state, unlock the electronic device.

US Pat. No. 10,339,291

APPROVING TRANSACTIONS USING A CAPTURED BIOMETRIC TEMPLATE

AMERICAN EXPRESS TRAVEL R...

1. A method comprising:identifying, by a server, a transaction account for a transaction using a scratch pad having a predetermined set of inputs that map to the transaction account,
wherein the transaction account is associated with a stored biometric template,
wherein biometric data is converted to a captured biometric template, and
wherein the scratch pad changes based on the captured biometric template;
approving, by the server, the transaction in response to comparing the stored biometric template with the captured biometric template.

US Pat. No. 10,339,290

SPOKEN PASS-PHRASE SUITABILITY DETERMINATION

NXP B.V., Eindhoven (NL)...

1. An apparatus comprising at least one processor and at least one memory including computer program code,the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following:
based on at least one utterance of a pass-phrase and predetermined scoring information comprising predetermined linguistic-element-scores attributable to one or more linguistic elements that form at least part of each of the at least one utterance,
provide for spoken pass-phrase suitability determination wherein the at least one utterance is assigned a pass-phrase-score based on linguistic analysis in which one or more linguistic elements identified in said utterances are assigned their corresponding linguistic-element-score from the predetermined scoring information, the pass-phrase score based on the one or more linguistic-element scores of the, identified, linguistic elements, wherein the spoken pass-phrase suitability is determined to be deficient at least based on the pass-phrase score being below a predetermined pass-phrase score threshold;
wherein the apparatus is configured to base said spoken pass-phrase suitability on at least two utterances of the pass-phrase and the pass-phrase suitability is also determined to be deficient based on a measure of spoken pass-phrase consistency comprising a difference between the at least two utterances being above a predetermined consistency threshold and wherein the apparatus is configured to generate a pass-phrase model from the at least two utterances of the pass-phrase, the pass-phrase model comprising a statistical description of the utterances of the pass-phrase, wherein the measure of spoken pass-phrase consistency comprises a difference between the model and a corresponding statistical description of at least one of the at least two utterances;
wherein the apparatus is configured to provide for the spoken pass-phrase suitability determination as part of an enrolment procedure in which a user provides a spoken pass-phrase to a microphone of the apparatus for future use to authenticate the identity of the user;
wherein the apparatus comprises at least part of: a portable electronic device, a mobile phone, a Smartphone, a laptop computer, a desktop computer, a tablet computer, a personal digital assistant, a digital camera, a smartwatch, a non-portable electronic device, a monitor, a household appliance, a smart TV, a server, or a module/circuitry for one or more of the same.

US Pat. No. 10,339,289

SYSTEM AND METHOD FOR SHARING OF DATA SECURELY BETWEEN ELECTRONIC DEVICES

1. A system for securely transferring data in an electronic environment, said system comprising:a personal information device, said personal information device comprising a processor and a memory accessible to the processor, the memory having personal data and a biometric template stored therein, the personal information device having an input/output port for transferring data;
a centralized system having a server connected to a database, the database having stored therein a unique identification number associated with the personal information device;
an access device having a processor and a memory accessible to the processor, the access device further having an input/output port for communicating with the personal information device;
a network connection between the centralized system and the access device;
a biometric sensor;
wherein the biometric sensor, upon being prompted, obtains a biometric sample from a user and provides it to the personal information device;
wherein the personal information device, upon being prompted, performs the steps of: (i) receive a biometric sample from a user, (ii) compare the biometric sample from the user to the biometric template, and (iii) provide a unique identification number and personal data to the access device if the biometric sample and biometric template match;
wherein the memory of the access device has operating instructions stored therein to cause the processor of the access device to perform the steps of: (i) receive a unique identification number from the personal information device, (ii) transmit the unique identification number to the centralized system, and (iii) receive personal data from the personal information device;
wherein the memory of the centralized system has operating instructions stored therein to cause the processor of the centralized system to perform the step of receiving a unique identification number associated with a personal information device from an access device.

US Pat. No. 10,339,288

USER AUTHENTICATION FOR MOBILE DEVICES USING BEHAVIORAL ANALYSIS

MCAFEE, LLC, Santa Clara...

1. A hardware computer readable medium comprising instructions that, when executed, cause a machine to at least:collect usage data representative of usage of a mobile computing device by an authentic user;
collect media data representative of media usage by the authentic user including a frequency of access of music content by genre, by artist, or a combination thereof;
generate one or more usage patterns from the collected usage data and the media usage, the one or more usage patterns including a pattern of use of a spoken phrase by the authentic user;
monitor second media usage by a second user;
monitor second usage of the mobile computing device by the second user, the second usage of the mobile computing device by the second user including a detected pattern of use of the spoken phrase by the second user and the second media usage by the second user;
in response to determining that the monitored second usage of the mobile computing device by the second user meets a threshold of deviation from the one or more usage patterns of the authentic user, encrypting data stored on the mobile computing device.

US Pat. No. 10,339,285

AUTHENTICATION SELECTION FOR INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

FUJI XEROX CO., LTD., Mi...

1. An information processing apparatus comprising:a processor configured to:
specify an authentication mode from a plurality of authentication modes supported by a document management apparatus;
acquire information indicating an authentication mode supported by a first terminal apparatus; and
perform, in response to determining the authentication mode indicated by the acquired information does not match the specified authentication mode, control of outputting to the first terminal apparatus information on a second terminal apparatus that supports the specified authentication mode.

US Pat. No. 10,339,284

MEASUREMENT METHOD, ELECTRONIC DEVICE, AND MEASUREMENT SYSTEM

HUAWEI TECHNOLOGIES CO., ...

1. A measurement method, comprising:writing, by an electronic device to a hardware storage device, running code and running data that are in a running process of a virtual machine manager (VMM), the electronic device running the VMM;
reading, by the electronic device from the hardware storage device, the running code and the running data without disrupting the running process of the VMM;
generating, by the electronic device, first verification information according to the running code and the running data using a digital digest calculation;
storing, by the electronic device, the first verification information; and
transmitting, to a trusted data center, log information comprising the running code, the running data, and a timestamp corresponding to a time at which the first verification information is generated,
the trusted data center generating second verification information according to the running code and the running data of the log information corresponding to the timestamp and using the digital digest calculation, and
the trusted data center measuring the electronic device using the first verification information and the second verification information.

US Pat. No. 10,339,282

FILE ORIGIN DETERMINATION

International Business Ma...

1. A file validation method comprising:requesting, by a computer processor of a computing system executing an agent in response to a request, a detachable fetch software module;
generating, by said computer processor executing said detachable fetch software module, a digital fingerprint associated with securing an artifact file downloaded via said detachable fetch software module; and
generating, by said computer processor, metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system;
encrypting, by said computer processor based on results of said executing, said metadata resulting in encrypted metadata;
generating, by said computer processor, a log indicating that said encrypted metadata has been successfully generated;
generating, by said computer processor, a modified artifact file comprising said encrypted metadata combined with said artifact file and said log;
validating, by said computer processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; and
generating, by said computer processor, an encrypted package comprising said modified artifact file and a first portion of an encryption key.

US Pat. No. 10,339,281

APPARATUS AND METHODS FOR RIGHTS-MANAGED CONTENT AND DATA DELIVERY

Time Warner Cable Enterpr...

1. A computerized method for providing digitally rendered content to a computerized client device in a content delivery network, the computerized method comprising:receiving, from a rights management application computer program operating on a computerized client device, data representative of a request for a rights profile, the data representative of the request comprising identification information, the identification information identifying a user associated with the computerized client device;
based at least on a portion of the identification information, causing an association of the computerized client device to a subscriber account of the user associated with the computerized client device via association data;
based at least on the association data, receiving rights data relating to rights of the user to access the digitally rendered content;
utilizing the rights data to generate rights profile data; and
transmitting the rights profile data to the rights management application computer program, the rights profile data enabling the rights management application computer program to authorize rendering digitally rendered content via a media player application computer program configured to operate on the computerized client device or another computerized device associated with the user.

US Pat. No. 10,339,280

SYSTEMS AND METHODS FOR PROTECTING CONTENT WHEN USING A GENERAL PURPOSE USER INTERFACE APPLICATION

Stamps.com Inc., El Segu...

1. A method comprising:providing, by a server, a web page comprising content to a web browser application controlled by a user device, the content including unprotected content and executable code configured to access protected content that comprises at least one value bearing indicium, wherein said executable code is executed to access the protected content in response to a command received via the web browser application;
receiving, by the server in response to execution of the executable code, a request to obtain the protected content;
in response to receiving the request, determining whether the request to obtain the protected content is an initial request or a subsequent request to obtain the protected content, wherein the request is determined to be the subsequent request when the request is received subsequent to receiving the initial request; and
selectively providing, by the server, the protected content or the unprotected content to the web browser application based on whether the request is determined to be the initial request or the subsequent request, wherein the protected content is provided in response to a determination that the request is the initial request and the unprotected content is provided in response to a determination that the request is the subsequent request.

US Pat. No. 10,339,279

SYSTEM AND METHODS FOR SECURE COLLABORATIVE COMMUNICATION

MINDHIVE INC., New York,...

1. A method for sharing content over a communication network, the method comprising:receiving at a computing device coupled to a communication network a content identifier from a second computing device through the communication network, the first and second computing device each comprising a tangible, non-transitory memory coupled to a processor;
(i) retrieving content associated with the content identifier from the non-transitory memory of the computing device or (ii) sending a request for the content to a server through the communication network, sending a user credential to the server through the communication network, and receiving a copy of the content from the server through the communication network;
receiving, from a user, editing instructions modifying the content;
creating an editing parameter wherein the computing device is operable to synthesize and display edited content from the content and the editing parameter;
sending the editing parameter to the second computing device wherein the second computing device is operable to synthesize and display the edited content from the editing parameter and a copy of the content stored on the tangible, non-transitory memory of the second computing device.

US Pat. No. 10,339,277

REAL-TIME AND SECURED PICTURE/VIDEO UPLOAD VIA A CONTENT DELIVERY NETWORK

1. A method, comprising:facilitating establishing, by a system including a processor, a first communication path through an overlay network between a mobile device and customer premises equipment, the customer premises equipment being registered with a content delivery network based on a first electronic serial number, the mobile device being registered with the content delivery network based on a second electronic serial number;
exchanging encryption keys with the mobile device;
verifying, by the system, that incoming content is authorized based on the encryption keys exchanged with the mobile device, wherein the verifying further comprises preventing, based on the encryption keys, a rogue system impersonating the customer premises equipment from accessing the content;
selectively transferring, by the system, the content from the mobile device along the first communication path to the customer premises equipment;
facilitating establishing, by the system, a second communication path through the overlay network between the mobile device and the customer premises equipment responsive to a determination that the first communication path is overloaded; and
transferring, by the system, the content from the mobile device along the second communication path to the customer premises equipment responsive to a determination that bandwidth is limited, wherein the content from the mobile device is prioritized over other content for transfer along the second communication path to the customer premises equipment in response to the determination that the bandwidth is limited, wherein a bit rate of the content is reduced according to the bandwidth by the mobile device prior to transferring the content at a reduced rate to the customer premises equipment, wherein the content is provided, in part, to the customer premises equipment at the reduced rate by reducing the bit rate of the content,
wherein the content is captured by the mobile device when the bandwidth is insufficient for a real-time stream, and
wherein the content is formatted by the mobile device based on capabilities of an available display device.

US Pat. No. 10,339,276

METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR CONTINUOUSLY PROVIDING A LICENSE TO A NETWORK ELEMENT VIA A REMOTE CONNECTION

NOKIA TECHNOLOGIES OY, E...

1. A method comprising:temporarily enabling, at a first device, one or more transmission software features, configured to control transmission and reception of data at a first network element comprising a base transceiver station, for a predetermined time period;
alternately disabling and enabling the one or more transmission software features periodically, via the first device, after the predetermined time period expires during respective disabling and enabling time periods;
obtaining, via the first device, one or more licenses from a second network element, corresponding to the one or more features, during the predetermined time period or during a subsequent enabling time period; and
activating the one or more licenses obtained during the predetermined time period or during the subsequent enabling time period and enabling provision, via the first device, of the one or more licenses to the first network element to fully enable the one or more transmission software features, configured to control the transmission of data from the first network element and the reception of data at the first network element.

US Pat. No. 10,339,275

LICENSE CONFIRMATION VIA EMBEDDED CONFIRMATION CHALLENGE

Intel Corporation, Santa...

1. A method of operation on a license server in communication with a client device having a rights manager, the method comprising:generating, by the license server, a license defining rights to certain contents on the client device;
obtaining, by the license server, a challenge identifier targeting an intended recipient, the intended recipient corresponding to at least one of the rights manager and the client device;
encrypting, by the license server, the license and the challenge identifier into an encrypted communication for the intended recipient;
challenging, by the license server, the intended recipient to demonstrate successful application of the license, wherein the challenging includes sending the encrypted communication to the intended recipient; and
confirming, by the license server, that the encrypted communication was not intercepted by a spoofing device and that the intended recipient successfully applied the license, wherein the confirming includes receiving, by the license server from the intended recipient, a confirmation response corresponding to the challenge identifier.

US Pat. No. 10,339,273

SYSTEMS AND METHODS FOR PRE-OPERATIVE PROCEDURE DETERMINATION AND OUTCOME PREDICTING

Warsaw Orthopedic, Inc., ...

1. A spinal kinematics system for measuring objective parameters used to determine a predicted outcome of a procedure based on vertebral motion analysis of a patient, the system comprising:at least one imaging sensor configured to image and measure vertebral displacement by measuring the displacement of one or more vertebra of the patient relative to one or more predetermined reference points;
at least one motion sensor configured detect motion using accelerometers to detect motion of a patient; and
a monitoring device that includes: a wireless interface adapter in communication with and receives information from the at least one imaging sensor and the at least one motion sensor, and a control circuit having a processor and a memory and is configured to process information received from the at least one imaging sensor and the at least one motion sensor;
wherein the control circuit is further configured to determine:
an activity score, based on the vertebral displacement measured by the at least one imaging sensor and the motion detected by the at least one motion sensor, that measures a rest-activity cycle of the patient for a predetermined activity period;
a quality of sleep score, based on information generated by the at least one motion sensor, that measures a number of sleep interruptions during a predetermined sleep period;
a cumulative activity score by summing weighted daily averages of a plurality of activity scores across a plurality of predetermined activity periods;
a cumulative quality of sleep score by summing weighted daily averages of a plurality of quality of sleep scores across a plurality of predetermined sleep periods;
a combined baseline score by summing the cumulative activity score and the cumulative quality of sleep score; and
whether the procedure is recommended by comparing the combined baseline score to one or more predetermined cut-points, wherein each predetermined cut-point is associated with an increasing outcome probability, and wherein a higher baseline score indicates the procedure is likely to be successful.

US Pat. No. 10,339,272

SYSTEM AND METHOD FOR PATIENT CARE IMPROVEMENT

1. A system, comprising:an input module for receiving a first data set that includes at least one patient condition for each of a plurality of patients, wherein the data of the first data set is obtained during a predetermined time period of 24 hours;
a comparison module configured to:
compare each of the at least one patient condition to at least one filter criterion; and
compare information related to each of the plurality of patients to a predetermined patient type, wherein the predetermined patient type includes patients who are below a particular age threshold and patients who have been admitted to a medical facility for less than 24 hours;
a filter module for filtering the first data set to create a second data set that includes the at least one patient condition for each of one or more patients of the plurality of patients, wherein the at least one patient condition for a particular patient is included in the second data set if the at least one patient condition for the particular patient satisfies the at least one filter criterion and the particular patient does not satisfy the predetermined patient type;
a report module for generating a report that includes, for each of the one or more patients of the plurality of patients, i) at least one patient identifier, ii) at least one descriptor of the at least one patient condition, and iii) a healthcare provider identifier associated with the at least one patient identifier, wherein the report represents a 24-hour snapshot of all patients in the medical facility who are included in the second data set;
a recommendation module for generating a treatment recommendation for at least one of the one or more patients associated with the second data set, wherein the treatment recommendation is based at least partially on the at least one descriptor associated with the at least one of the one or more patients, and wherein a dose of insulin is administered to the at least one of the one or more patients based at least partially on the treatment recommendation;
a classification module for generating and storing at least one classification value for the at least one patient condition, wherein the classification value is generated based on one or more factors selected as having contributed to an onset of the at least one patient condition; and
an alert module for transmitting, for each of the one or more patients of the plurality of patients, an alert message to an address that corresponds to the healthcare provider identifier associated with the at least one patient identifier.

US Pat. No. 10,339,271

INTELLIGENT ELIGIBILITY REQUEST AND RESPONSE

PASSPORT HEALTH COMMUNICA...

13. A method comprising:using an intermediary computer system disposed between a provider computer system and a payer computer system to create an intelligent eligibility request, the intermediary computer system:
receiving an eligibility request containing eligibility request data from the provider computer system;
in response to receipt of the eligibility request from the provider computer system:
creating the intelligent eligibility request to send to the payer computer system that includes one or more appropriate component service type codes (STCs) and one or more appropriate explicit STCs, wherein the one or more appropriate component STCs and one or more appropriate explicit STCs are determined according to: the eligibility request data received from the provider computer system and an average response time for the payer computer system to respond to eligibility requests according to a communication pathway associated with the payer computer system, wherein the intermediary computer system creates the intelligent eligibility request with the one or more appropriate component STCs and one or more appropriate explicit STCs to prompt the payer computer system to provide a particular eligibility response having one or more desired response STCs without experiencing a time out according to a time out value; and
sending the intelligent eligibility request as an electronic transmission to the payer computer system with the one or more appropriate component STCs and one or more appropriate explicit STCs to prompt the payer computer system to provide the particular eligibility response having the one or more desired response STCs.

US Pat. No. 10,339,269

HAND-HELD SPHERICAL ANTENNA SYSTEM TO DETECT TRANSPONDER TAGGED OBJECTS, FOR EXAMPLE DURING SURGERY

Covidien LP, Mansfield, ...

1. A transponder detection device to detect surgical objects in a work area, the surgical objects marked by respective resonant tag elements that produce return signals in response to energization, the transponder detection device comprising:a hand-held probe comprising:
a substantially spherically shaped coil form that includes three coil support channels, each of the three coil support channels defines an outer coil support surface;
a first antenna element comprising a first electrical wire wound around the outer coil support surface of a first one of the three coil support channels, the first antenna element arranged to transmit and receive signals generally in a first coordinate direction;
a second antenna element comprising a second electrical wire wound around the outer coil support surface of a second one of the three coil support channels over the first electrical wire, the second antenna element arranged to transmit and receive signals generally in a second coordinate direction orthogonal to the first coordinate direction;
a third antenna element comprising a third electrical wire wound around the outer coil support surface of a third one of the three coil support channels over the first electrical wire and the second electrical wire, the third antenna element arranged to transmit and receive signals generally in a third coordinate direction orthogonal to the first coordinate direction and the second coordinate direction;
a processor operatively coupled to the first antenna element, the second antenna element, and the third antenna element; and
a nontransitory processor-readable medium communicatively coupled to the processor and that stores at least one of instructions or data executable by the processor, which cause the processor to:
independently control each of the first antenna element, the second antenna element and the third antenna element to emit wideband interrogation signals;
receive any of the return signals from any of the resonant tag elements; and
determine from a receipt of any of the return signals whether any of the resonant tag elements are present in the work area.

US Pat. No. 10,339,268

SYSTEM AND METHOD FOR CYTOPATHOLOGICAL AND GENETIC DATA BASED TREATMENT PROTOCOL IDENTIFICATION AND TRACKING

COVIDIEN LP, Mansfield, ...

1. A user interface for assessing a target and presenting treatment options, the user interface comprising:a present patient data field;
a care team field;
a disease identification field;
a plurality of fields presenting data including one or more of imaging data, cytopathological data, genetic information and treatment options for an identified target of a present patient, wherein the treatment options include power and duration parameters for an ablation treatment and are based on a correlation of similarities in data from a plurality of prior patients having been treated by an ablation treatment and the data for the identified target of the present patient; and
a personalized plan field presenting a personalized treatment plan for the present patient, the personalized treatment plan selected by software based on one or more treatment options having a ranking exceeding a preconfigured threshold, the ranking based on an observed patient outcome of each treatment option of the one or more treatment options for the plurality of prior patients, the personalized treatment plan including personalized power and duration parameters for ablation treatment of the identified target of the present patient, wherein the personalized power and duration parameters are determined by identifying a match between a genetic mutation in the identified target of the present patient and a genetic mutation in a target of at least one patient of the plurality of prior patients.

US Pat. No. 10,339,266

MECHANISMS FOR CONSTRUCTING SPLINE SURFACES TO PROVIDE INTER-SURFACE CONTINUITY

Board of Regents of the U...

1. A computer-implemented method for modifying a computer-aided design (CAD) model of a tangible object, the method comprising:performing, by the computer:
storing geometric input data describing first and second input parametric surfaces associated with the CAD model, wherein the first and second input surfaces are described in a first and second parameter space domain, respectively;
storing a model space trim curve associated with the first and second input surfaces, wherein the model space trim curve is a parametric curve that approximates a geometric intersection of the first and second input surfaces;
reparametrizing the first and second parametric surfaces into a common third parameter space domain based on the model space trim curve;
constructing first and second output surfaces as approximations of at least portions of the first and second input surfaces, respectively, wherein the first and second output surfaces are described in the third parameter space domain, wherein at least a portion of the boundary of each of the first and second output surfaces coincides with the model space trim curve; and
storing a modified CAD model of the tangible object comprising the first and second output surfaces, wherein the modified CAD model exhibits increased inter-surface continuity between the first and second output surfaces relative to the first and second input surfaces.

US Pat. No. 10,339,265

METHOD AND SYSTEMS FOR OFF-LINE CONTROL FOR SIMULATION OF COUPLED HYBRID DYNAMIC SYSTEMS

MTS SYSTEMS CORPORATION, ...

1. An arrangement for controlling a coupled hybrid dynamic system comprising modeled components in a virtual model and physical components, the arrangement comprising:a physical test rig configured to drive the physical structural components and generate a test rig response comprising a coupling response corresponding to an input to the virtual model and a convergence response that is compared to an output of the virtual model;
a storage device; and
a processor operable with the storage device to store a virtual model of a complementary system to the physical structural components, the virtual model comprising a model of a disembodied assembly, the processor configured to:
obtain a virtual dynamic response of the virtual model of the disembodied assembly;
obtain a combined virtual dynamic response for a plurality of disembodied assemblies using the virtual dynamic response for the disembodied assembly; and
obtain the system dynamic response model using the combined virtual dynamic response, the coupling response and the convergence response.

US Pat. No. 10,339,262

SYSTEM AND METHOD FOR DEFINING CARE AREAS IN REPEATING STRUCTURES OF DESIGN DATA

KLA-Tencor Corporation, ...

1. A system, comprising:an inspection tool, wherein the inspection tool includes a detector configured to acquire one or more images of a selected region of a sample;
a user interface, wherein the user interface includes a display and a user input device; and
a controller including one or more processors configured to execute a set of program instructions stored in memory, wherein the program instructions are configured to cause the one or more processors to:
receive design data, wherein the design data includes a block of repeating cells;
present, on the user interface, a particular cell of the block of repeating cells;
define a first care area associated with a first design of interest in the particular cell from a first input received via the user interface, wherein the first care area has a first sensitivity threshold;
define an additional care area associated with an additional design of interest in the particular cell from an additional input received via the user interface, wherein the additional care area has an additional sensitivity threshold, wherein the first care area is more sensitive than the additional care area;
identify a set of first care areas within the block of repeating cells by performing a search function to identify additional occurrences of the first design of interest within the block of repeating cells;
identify a set of additional care areas within the block of repeating cells by performing a search function to identify additional occurrences of the additional design of interest within the block of repeating cells;
configure the inspection tool based on the set of first care areas and the set of additional care areas to reduce inspection time when acquiring the one or more images of the selected region of the sample;
receive the one or more images of the selected region of the sample from the inspection tool;
identify one or more defects within the first set of care areas in the one or more images of the selected region of the sample based on the first sensitivity threshold; and
identify one or more defects within the additional set of care areas in the one or more images of the selected region of the sample based on the additional sensitivity threshold.

US Pat. No. 10,339,261

OPTICAL RULE CHECKING FOR DETECTING AT RISK STRUCTURES FOR OVERLAY ISSUES

INTERNATIONAL BUSINESS MA...

1. A method of performing lithography and detecting at risk structures due to a lithographic mask overlay, comprising:performing a lithography process;
performing the lithographic mask overlay; and
the method of detecting being implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to:
obtain a simulation of a metal layer and a via;
determine a probability that an arbitrary point (x, y) on the metal layer is covered by the via by calculating a statistical coverage area metric followed by mathematical approximations of a summing function; and
detect the at risk structures of a semiconductor device during the lithography process in which a misalignment of a lithography mask overlay occurs when the metal layer is covered by the via by detecting a lithography error occurring from the misalignment of the lithography mask overlay based on the determined probability,
wherein the arbitrary point (x, y) is defined by an x coordinate and a y coordinate in a cartesian coordinate system, and
wherein determining the probability that the arbitrary point (x, y) on the metal layer is covered by the via comprises:
determining that the metal layer is inside the via by calculating:

wherein:
Pin is representative of a probability that the via covers the metal layer, at the arbitrary point,
Ox and Oy follows Gaussian distributions to calculate for the Pin, and
P is a probability, and Ox, and Oy is an overlay in a x direction and a y direction, respectively.

US Pat. No. 10,339,260

METHODOLOGY TO GENERATE GUIDING TEMPLATES FOR DIRECTED SELF-ASSEMBLY

ASML Netherlands B.V., V...

1. A method comprising:determining a guiding template for each of two or more features in a design layout without accounting for the others of the two or more features;
determining, by a hardware computer system, a characteristic of a joined guiding template for guiding a physical process of self-assembly of block copolymer to form the two or more features, the joined guiding template being the joining of each of the guiding templates for the two or more features, wherein curvatures on the joined guiding template are not greater than a maximum curvature, the maximum curvature being a function of numerical aperture and of wavelength of radiation, of the process to produce the joined guiding template; and
producing electronic data, using the determined characteristic, to setup and/or modify an aspect of a physical equipment or process to produce the joined guiding template on a substrate and/or of the physical process of self-assembly of block copolymer.

US Pat. No. 10,339,259

METHOD FOR ORGANIZING, CONTROLLING, AND REPORTING ON DESIGN MISMATCH INFORMATION IN IC PHYSICAL DESIGN DATA

SYNOPSYS, INC., Mountain...

1. A method for detecting and reporting design mismatch information in integrated circuit (IC) physical design data generated via a computer-aided electronic design automation (EDA) system, comprising:receiving, at a computer, a plurality of sets of design mismatch settings each identifying potential mismatch types generated via the EDA system;
receiving, at the computer, a selection of a set of design mismatch settings selected from the plurality of sets of design mismatch settings;
configuring, at the computer, one or more handlers for execution with the EDA system based at least in part on the selected set of design mismatch settings, wherein the one or more handlers comprise a detecting module configured to import at least a portion of the selected set of design mismatch settings to detect a mismatch within the IC physical design data satisfying at least one potential mismatch type of the selected set of design mismatch settings and an encounter module configured to automatically perform one or more actions to detected design mismatches within the IC physical design data;
applying, via the EDA system executing on the computer, the one or more handlers to the physical design data;
automatically performing, via the encounter module of the one or more handlers operating via the EDA system executing on the computer, one or more actions with respect to one or more detected design mismatches;
generating, by the computer, a record identifying the performed one or more actions.

US Pat. No. 10,339,258

LOOK-AHEAD TIMING PREDICTION FOR MULTI-INSTANCE MODULE (MIM) ENGINEERING CHANGE ORDER (ECO)

SYNOPSYS, INC., Mountain...

1. A method for determining an engineering change order (ECO) for a multi-instance module (MIM) in a circuit design that includes multiple instances of the MIM, the method comprising:creating a merged timing data structure that is associated with a pin of the MIM, wherein the merged timing data structure stores timing information for the pin across the multiple instances of the MIM, and wherein the timing information includes at least one of an arrival time, a required time, a slack, or a slew; and
determining the ECO for the MIM by using a processor that accesses the merged timing data structure, wherein said determining comprises using the merged timing data structure to compute a change in the timing information for the pin across the multiple instances of the MIM when an incremental adjustment is applied to the MIM.

US Pat. No. 10,339,257

INFORMATION PROCESSING APPARATUS, METHOD, AND STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An information processing apparatus that evaluates an appropriateness of an arrangement of a bypass capacitor on a printed circuit board, comprising:a memory device; and
circuitry communicable with the memory device and configured to:
specify positions of a power source pad of a die and a ground pad of the die which are arranged within an integrated circuit package based on a power source wiring and a power source ring which are included in design information on the printed circuit board;
specify a bypass capacitor arranged on the printed circuit board based on the design information;
derive an evaluation value for evaluating the arrangement of the specified bypass capacitor on the printed circuit board based on the design information, information on the specified positions of the power source pad of the die and the ground pad of the die which are arranged within the integrated circuit package, and information on the specified bypass capacitor; and
determine whether the arrangement of the specified bypass capacitor on the printed circuit board is appropriate based on the derived evaluation value,
wherein the arrangement of the specified bypass capacitor on the printed circuit board is rearranged in a case where it is determined that the arrangement of the specified bypass capacitor on the printed circuit board is not appropriate based on the derived evaluation value.

US Pat. No. 10,339,256

METHOD OF PATTERNING TARGET LAYER

IMEC vzw, Leuven (BE) Gl...

1. A method of defining routing tracks to be formed in a target layer over a standard cell semiconductor device, the method comprising:forming a first mandrel, a second mandrel and a third mandrel above the target layer, the second mandrel being arranged between the first mandrel and the third mandrel;
forming a first set of spacers including a first spacer on a sidewall of the first mandrel facing the second mandrel, a second spacer and a third spacer on sidewalls of the second mandrel, and a fourth spacer on a sidewall of the third mandrel facing the second mandrel;
removing the first, second and third mandrels;
using the first set of spacers as a masking layer to pattern a sacrificial layer arranged vertically between the target layer and the first set of spacers, thereby forming a set of sacrificial features including first, second, third and fourth sacrificial features corresponding to the first, second, third and fourth spacers, wherein the set of sacrificial features defines positions of off-center routing tracks (T1, T2, T3, T4); and
forming a second set of spacers on at least part of the sidewalls of the set of sacrificial features, wherein the second set of spacers fill a gap between the first and second sacrificial features and a gap between the third and fourth sacrificial features, while leaving a gap between the second and third sacrificial feature that define a position of a central routing track.

US Pat. No. 10,339,255

PROGRAM DEVELOPMENT SUPPORT DEVICE, NON-TRANSITORY STORAGE MEDIUM STORING THEREON COMPUTER-READABLE PROGRAM DEVELOPMENT SUPPORT PROGRAM, AND PROGRAM DEVELOPMENT SUPPORT METHOD

OMRON CORPORATION, Kyoto...

1. A program development support device for supporting development of a safety program to be executed in a safety controller, the program development support device comprising:a first display control module configured to display, in response to selection of any input/output unit connected to the safety controller, a first image object representing an external appearance and input/output terminals of the selected input/output unit; and
a second display control module configured to display, together with the first image object, a second image object representing an external appearance of a safety device and a circuit configuration of the safety device, the safety device being set to be allocated to any of the input/output terminals of the selected input/output unit, wherein the circuit configuration includes an internal circuit of the safety device and connection between the safety device and the allocated input/output terminals;
wherein for an input/output terminal to which each safety device is allocated, the input/output terminal represented by the first image object and the circuit configuration represented by the second image object being displayed in association with each other,
wherein the first image object includes, as the external appearance of the input/output unit corresponding to the first image object, one or more partial image objects each representing an input/output terminal, and
wherein the first display control module varies, depending on a type of the safety device allocated to the input/output unit, a manner of displaying a corresponding partial image object.

US Pat. No. 10,339,254

INTEGRATED CIRCUIT DESIGN SYSTEMS AND METHODS

Motivo, Inc., Sunnyvale,...

1. A method, performed by one or more processors, for determining a netlist describing the electrical connectivity of an integrated circuit electrical design and having target metrics, the method comprising:building a netlist configuration database to include a plurality of netlist configurations with annotations, the building comprising:
analyzing sample netlists from one or more other integrated circuit electrical designs;
annotating the sample netlists with corresponding electrical characteristics, wherein each of the plurality of netlist configurations is based on at least one of the sample netlists; and
representing each of the plurality of netlist configurations by a plurality of matrices, wherein each matrix of the plurality of matrices is connected to another matrix of the plurality of matrices to form a connected graph of the plurality of matrices; and annotating each of the plurality of matrices with metrics based on the analyzing of the sample netlists;
accessing the netlist configuration database comprising the plurality of netlist configurations, wherein at least two of the plurality of netlist configurations of the netlist configuration database are annotated with electrical characteristics, the at least two of the plurality of netlist configurations comprising a first netlist configuration and a second netlist configuration, the first netlist configuration being annotated with first electrical characteristics and connecting a set of elements in a first order, and the second netlist configuration being annotated with second electrical characteristics and connecting the set of elements in a second order, wherein a first matrix of the plurality of matrices represents the first netlist configuration and is annotated with first metrics and a second matrix of the plurality of matrices represents the second netlist configuration and is annotated with second metrics;
partitioning the integrated circuit electrical design into a plurality of circuit design configurations including one specific circuit design configuration, the one specific circuit design configuration comprising the set of elements; and
selecting, based on the target metrics, one of the first or the second netlist configurations from the netlist configuration database, annotated with the target metrics, the selecting comprising searching the connected graph of the plurality of the matrices to find a matrix corresponding to the selected one of the first or the second netlist configurations;
determining a manufacturing configuration for manufacturing an integrated circuit, the manufacturing configuration comprising the netlist of the integrated circuit electrical design including the selected one of the first or the second netlist configurations; and
manufacturing the integrated circuit using the determined manufacturing configuration.

US Pat. No. 10,339,253

METHOD OF YIELD PREJUDGMENT AND BUMP RE-ASSIGNMENT AND COMPUTER READABLE STORAGE MEDIUM

INDUSTRIAL TECHNOLOGY RES...

1. A method of yield prejudgment and bump re-assignment for a die, the die comprising a plurality of areas, each area being electrically connected to a substrate through a bump, and the method comprising:calculating a probability for an occurrence of warpage in each area to obtain a successful-connection probability for the area;
defining some of the areas as a short-circuit region according to the successful-connection probabilities, wherein the successful-connection probabilities of the areas of the short-circuit region are not within a predetermined range;
arranging the areas excluding the areas of the short-circuit region and the areas located at corners of the die in a descending order from high to low according to the corresponding successful-connection probabilities;
defining some of the areas which are arranged in the descending order as a signal region, wherein the successful-connection probabilities of the areas of the signal region are greater than a predetermined value;
dividing the short-circuit region into at least one power region and at least one ground region;
determining whether the number of areas in the power region is less than a first required value and whether the number of areas in the ground region is less than a second required value;
when the number of areas in the power region is less than the first required value, assigning at least one area among the areas arranged in the descending order to the power region, wherein the successful-connection probability of the area assigned to the power region is less than the predetermined value; and
when the number of areas in the ground region is less than the second required value, assigning at least one area among the areas arranged in the descending order to the ground region, wherein the successful-connection probability of the area assigned to the ground region is less than the predetermined value.

US Pat. No. 10,339,252

AUTOMATED CUSTOM CIRCUIT LAYOUT ENHANCEMENT

ORACLE INTERNATIONAL CORP...

1. A method for enhancing a chip layout, comprising:obtaining the chip layout comprising:
a first layer comprising a first track and a second track, a first route occupying the first track, and
an open net comprising open terminals;
grouping the open terminals into at least a first subset of open terminals;
calculating, based on the first subset, a region of interest (ROI) within the chip layout;
determining that neither the first track nor the second track within the ROI can be used to connect all the open terminals in the first subset;
determining that the first track can be used to connect all the open terminals in the first subset after moving the first route from the first track to the second track;
moving, within the chip layout, the first route from the first track to the second track; and
attempting to connect all the open terminals in the first subset using the first track.

US Pat. No. 10,339,251

METHOD TO IMPROVE TRANSISTOR MATCHING

TEXAS INSTRUMENTS INCORPO...

1. A process of forming an integrated circuit, comprising the steps:selecting a target transistor in a design data base of the integrated circuit with a target transistor active overlap of gate that is different than a reference active overlap of gate of a reference transistor;
determining a target transistor gate length change that will match a drive current of the target transistor with a drive current of the reference transistor;
applying the target transistor gate length change to the gate of the target transistor in the design data base, wherein the target gate length change occurs to only a portion of the gate, the portion located where the target transistor gate crosses a boundary between isolation and active of the transistor; and
fabricating the transistor with the target transistor gate length change on a semiconductor wafer.

US Pat. No. 10,339,250

METHOD OF GENERATING ENGINEERING CHANGE ORDER (ECO) LAYOUT OF BASE CELL AND COMPUTER-READABLE MEDIUM COMPRISING EXECUTABLE INSTRUCTIONS FOR CARRYING OUT SAID METHOD

TAIWAN SEMICONDUCTOR MANU...

1. A method of generating an ECO-layout of an engineering change order (ECO) base cell, the ECO-layout being stored on a non-transitory computer-readable medium, the method comprising:generating first and second active area patterns having corresponding long axes arranged in a first direction parallel to a first axis of symmetry;
arranging the first and second active area patterns on opposite sides of the first axis of symmetry;
generating non-overlapping first, second and third conductive patterns having corresponding long axes in a second direction perpendicular to the first direction and parallel to a second axis of symmetry;
arranging each of the first, second and third conductive patterns to correspondingly overlap the first and second active area patterns;
locating the first conductive pattern between the second and third conductive patterns;
generating a first cut-pattern which overlaps corresponding central regions of the second and third conductive patterns and which is indicative that the central regions will be removed subsequently;
aligning the first cut-pattern relative to the first axis of symmetry;
generating a fourth conductive pattern;
locating the fourth conductive pattern over an area bounded by the first cut-pattern;
expanding the fourth conductive pattern to occupy an area which substantially overlaps a first segment of the first conductive pattern and a first segment of one of the second and third conductive patterns, thereby resulting in the ECO layout; and
fabricating, based on the ECO-layout, at least one of (A) one or more semiconductor masks or (B) at least one component in a layer of an inchoate semiconductor integrated circuit and
wherein at least one of the generating, arranging, locating and expanding is executed by a processor of a computer.

US Pat. No. 10,339,249

USING COLOR PATTERN ASSIGNED TO SHAPES FOR CUSTOM LAYOUT OF INTEGRATED CIRCUIT (IC) DESIGNS

Synopsys, Inc., Mountain...

1. A method for facilitating custom layout of an integrated circuit (IC) design, the method comprising:for each net in a set of nets in the IC design, assigning a distinct color pattern to a set of shapes in a layout of the IC design that correspond to the net, wherein each shape in the set of shapes represents a source, gate, or drain of a multigate device, and wherein each net in the set of nets specifies electrical connectivity between one or more multigate devices; and
displaying the layout of the IC design in a graphical user interface (GUI) of a computer, wherein each shape in the layout of the IC design is displayed in the GUI of the computer using the distinct color pattern assigned to the shape, thereby enabling a user to easily connect the one or more multigate devices.

US Pat. No. 10,339,248

MODIFIED DESIGN RULES TO IMPROVE DEVICE PERFORMANCE

TAIWAN SEMICONDUCTOR MANU...

1. A method, comprising:designing a layout of gate structures and diffusion regions of a plurality of active devices;
identifying an edge device of the plurality of active devices;
adding a dummy device next to the edge device and a dummy gate structure next to the dummy device resulting in a modified layout; and
fabricating, based on the modified layout, at least one of a photolithography mask or at least one component in a layer of a semiconductor device,
wherein the dummy device shares a diffusion region with the edge device, and
a gate structure of the dummy device is one of two dummy gate structures added next to the edge device, and the edge device has a gate structure and a diffusion region.

US Pat. No. 10,339,246

SCHEMATIC OVERLAY FOR DESIGN AND VERIFICATION

Synopsys, Inc., Mountain...

1. A computer-implemented method for modifying an integrated circuit (IC) design, comprising:displaying at least a part of a base schematic data including a plurality of base objects;
receiving modification information indicating a change in the base schematic data;
responsive to receiving the modification information, producing schematic overlay data representing modification to at least one of the base objects or connectivity between the base objects in the base schematic data;
generating a modified schematic data representing the base schematic data as modified by the schematic overlay data, the base schematic data representing a circuit different from a modified circuit corresponding to the modified schematic data, the modified circuit being modified with respect to at least one of: (i) omission of an object and removal of one or more connections associated with the omitted object, or (ii) inclusion of an object and addition of at least one connection associated with the included object;
performing an electronic design automation (EDA) operation based on the modified schematic data; and
retaining the base schematic data unchanged during or after performing of the EDA operation.

US Pat. No. 10,339,245

TIMING EXACT DESIGN CONVERSIONS FROM FPGA TO ASIC

CALLAHAN CELLULAR L.L.C.,...

1. A method comprising:accessing programming data for a programmable logic design to meet a plurality of design specifications; and
altering a programming data layer of the programmable logic design to form a hard-wired design that meets the plurality of design specifications, said altering including:
based on the programming data, determining a plurality of interconnects between the programming data layer and at least one of a plurality of input programming nodes of a programmable circuit layer of the programmable logic design and determining a plurality of individual logic values provided by a respective one of the plurality of interconnects; and
based on the plurality of individual logic values, replacing the programming data layer with a wire pattern layer hard-wired to a first portion of the plurality of interconnects to provide a logic high and hard-wired to a second portion of the plurality of interconnects to provide a logic low.

US Pat. No. 10,339,244

METHOD AND APPARATUS FOR IMPLEMENTING USER-GUIDED SPECULATIVE REGISTER RETIMING IN A COMPILATION FLOW

Altera Corporation, San ...

1. A method for designing a system on a target device, comprising:performing speculative register retiming with speculative changes made to a design of the system after an initial compilation of the design;
generating a strategy for an actual register retiming in response to user specified preferences on the speculative changes;
generating a data file that reflects the strategy for the design of the system; and
programming the target device with the data file to physically transform components on the target device to implement the system.

US Pat. No. 10,339,243

METHOD AND APPARATUS FOR AUTOMATIC HIERARCHICAL DESIGN PARTITIONING

ALTERA CORPORATION, San ...

1. A method for synthesis of a circuit in a target integrated circuit (IC) device that comprises programmable logic, wherein the programmable logic comprises a set of logic sections, each logic section associated with a physical location, wherein the method comprises:receiving a circuit design for the target IC device, wherein the circuit design comprises at least one constraint for the target IC device;
dividing automatically the circuit design into a set of partitions, wherein the division balances an assignment of resources of the target IC device to produce a partitioned circuit design, and wherein each partition is associated with a physical location of a respective logic section of the set of logic sections;
generating a bit stream based on the target IC device and the partitioned circuit design; and
programming the target IC device using the bit stream.

US Pat. No. 10,339,242

SEMICONDUCTOR LSI DESIGN DEVICE AND DESIGN METHOD

Hitachi, Ltd., Tokyo (JP...

7. A semiconductor LSI design method, comprising:a step of generating a combinational circuit configured by combining functional blocks defined by a functional block library from an application specification;
a step of allocating an operation order of each functional block in the combinational circuit under a condition for starting an operation of a functional block connected to an input pin after ending the operation;
a step of converting the combinational circuit into a sequence circuit which uses the functional block twice or more in a time division manner, such that a number of functional blocks is reduced from the combinational circuit to the sequence circuit by a factor of 100 or more;
a step of extracting the operation order at a time of execution of the sequence circuit;
a step of determining whether the operation order allocated to the combinational circuit coincide with the extracted operation order; and
a step of communicating with a semiconductor manufacturing device that manufactures a semiconductor based on the sequence circuit.

US Pat. No. 10,339,241

METHODS FOR INCREMENTAL CIRCUIT DESIGN LEGALIZATION DURING PHYSICAL SYNTHESIS

Altera Corporation, San ...

1. A method of using logic design equipment to generate configuration data for loading onto a target device, wherein the target device implements a logic design when loaded with the configuration data, the method comprising:with the logic design equipment, identifying a given logic block in the logic design that fails to satisfy a timing constraint for the target device;
with the logic design equipment, identifying a first target location in the logic design at which the given logic block satisfies the timing constraint for the target device;
with the logic design equipment, creating an empty location at the first target location for the given logic block by moving a target logic block located at the first target location to a second target location in the logic design at which the target logic block satisfies the timing constraint for the target device;
with the logic design equipment, moving the given logic block to the first target location in the logic design after moving the target logic block to the second target location;
with the logic design equipment, generating configuration data associated with the logic design for the target device; and
loading the target device with the configuration data such that the loaded target device implements the logic design.

US Pat. No. 10,339,240

ADAPTIVE HIGH SIGMA YIELD PREDICTION

1. A computer implemented method of determining a yield of a circuit in semiconductor manufacturing, performed by a yield prediction engine or at least a processor, comprising:performing a first pass of Monte Carlo simulations of the circuit with a scaled sigma to identify a plurality of failed sampling points in a high sigma region of a statistical distribution, wherein simulating the circuit with the scaled sigma increases a probability of identifying the plurality of failed sampling points in the high sigma region of the statistical distribution;
partitioning the plurality of failed sampling points into a plurality of clusters based on angular separation of the plurality of failed sampling points;
determining a boundary of each cluster in the plurality of clusters, comprising for the each cluster in the plurality of clusters, identifying a center of gravity point for the each cluster, searching back along a direction to a nominal point from the center of gravity point, and determining the boundary of the each cluster, wherein the boundary of each cluster is an approximation of separation of failed sampling points and passing sampling points of the each cluster with respect to one or more circuit parameters;
performing sensitivity analysis from the boundary of the each cluster to identify an estimated closest failed sampling point associated with the each cluster; and
performing a second pass of Monte Carlo simulations of the circuit to determine the yield of the circuit using the estimated closest failed sampling point associated with the each cluster and the boundary of each cluster in the plurality of clusters, wherein the yield determined is used to ensure low probability of failure in semiconductor manufacturing of the circuit.

US Pat. No. 10,339,238

METHOD AND APPARATUS FOR PERFORMING REGISTER RETIMING IN THE PRESENCE OF TIMING ANALYSIS EXCEPTIONS

Altera Corporation, San ...

1. A method for designing a system on a target device, comprising:identifying an area on the target device that includes components affected by a timing exception for a portion of a signal path; and
performing register retiming where a register is moved from a first position on the signal path on one side of the area to a second position on the signal path on another side of the area.

US Pat. No. 10,339,236

TECHNIQUES FOR IMPROVING COMPUTATIONAL THROUGHPUT BY USING VIRTUAL MACHINES

VMware, Inc., Palo Alto,...

1. A computer-implemented method, comprising: receiving, by a computer system, a request to run a plurality of tests, the plurality of tests including a set of instruction sets that are associated with a sequence of common instructions;creating, by the computer system, a first virtual machine (VM), wherein the first VM is created upon receiving the request;
executing, by the computer system, a portion of the sequence of common instructions in the first VM, wherein at least a portion of the sequence of common instructions generates a first result;
storing, by the computer system, the first result in a first memory page accessible by the first VM;
determining, by the computer system, a point in the plurality of tests to clone a set of second VMs;
cloning, by the computer system, the set of second VMs using a state of the first VM, the set of second VMs sharing the first memory page with the first VM such that the first memory page is accessible by the set of second VMs for accessing the first result; and
executing, by the computer system and in the set of second VMs, a set of instruction sets associated with a remainder of the sequence of common instructions that were not executed by the first VM, wherein the set of second VMs execute the set of instruction sets from the plurality of tests using the first result stored in the first memory page as a starting point from which the set of second VMs execute the set of instruction sets, wherein the first memory page is shared by the first VM and the set of second VMs such that there is a single shared instance of the first result stored in the first memory page and accessible by the set of second VMs during execution of the set of instruction sets, wherein each of the set of instruction sets uses the single shared instance of the first result to generate a set of second results for the plurality of tests without executing the sequence of common instructions previously executed by the first VM, and wherein the first VM remains in a steady state such that the first result remains unchanged during execution of the set of instruction sets by the set of second VMs.

US Pat. No. 10,339,235

MASSIVELY PARALLEL PROCESSING (MPP) LARGE-SCALE COMBINATION OF TIME SERIES DATA

EMC Corporation, Hopkint...

1. A method for generating one or more multivariate statistical models from time series data for a given target time series, comprising the steps of:obtaining a given group of time series data on a given working compute node of a plurality of said working compute nodes, wherein said given group comprises one of a plurality of groups of time series data selected from a larger set of time series data;
generating a measurement matrix, using at least one processing device of said given working compute node, for said given group of time series data based on a plurality of time series selected for said given group and a plurality of time lags of said selected time series;
processing, using the at least one processing device of said given working compute node, said measurement matrix for said given group to generate a first linear model for the given target time series for said given group using an Orthogonal Matching Pursuit algorithm with a predefined number of first independent selected variables, wherein the predefined number of first independent selected variables is less than a total number of the plurality of time series selected for said given group and the plurality of time lags of said selected time series, and wherein each first independent selected variable corresponds to a specific time series or a particular time lag of one of the plurality of time series selected for said given group;
assigning a score, using the at least one processing device of said given working compute node, to each of said first independent selected variables based on an order of an absolute value of a coefficient of said first independent selected variable within said first linear model of said plurality of time series selected for said given group and said corresponding plurality of time lags; and
providing said first independent selected variables and said corresponding assigned scores to a master compute node, wherein at least one processing device of said master compute node obtains first independent selected variables and corresponding assigned scores for each of said plurality of groups from the plurality of said working compute nodes; ranks the said first independent selected variables according to said corresponding assigned scores for all of said plurality of groups; selects a predefined number of second independent selected variables based on a final rank to create a final group of time series; and processes said final group of time series to generate a final linear model for the given target time series using said Orthogonal Matching Pursuit algorithm.

US Pat. No. 10,339,231

ENTITY TYPE TEMPLATES IN PROCESS SIMULATION

Schneider Electric Softwa...

1. A system for simulating a process entity in an industrial process, the system comprising:a processor configured to be coupled to one or more control elements in the industrial process, the control elements configured to control one or more aspects of the industrial process;
a memory device coupled to the processor;
software instructions stored on the memory device and executable by the processor, said instructions comprising:
instructions for presenting a model editor on a remote processing device;
instructions for defining, via the model editor, one or more parameters of a plurality of parameters in an entity type object, said entity type object generically representing a type of process entity in the industrial process, and the plurality of parameters corresponding to particular parameters associated with the type of process entity, the plurality of parameters including one or more undefined parameters, wherein the one or more parameters of the plurality of parameters in the entity type object are defined, based at least in part, in response to user input;
instructions for dynamically displaying the plurality of parameters, and an icon associated with the entity object type, on a canvas of the model editor;
instructions for creating the entity type object from the one or more parameters defined therein;
instructions for creating a simulation representing the industrial process on a flowsheet;
instructions for instantiating an entity type instance in the simulation based on the entity type object in response to the entity type object being placed on the flowsheet, said entity type instance representing a specific process entity in the industrial process;
instructions for evaluating a condition of the one or more parameters defined in the entity type object in response to the entity type object being placed on the flowsheet;
instructions for configuring behavior of the entity type instance based on the evaluating;
instructions for simulating the functionality of the specific process entity by the entity type instance having the configured behavior in the simulation to solve for at least one of the one or more undefined parameters; and
instructions for evaluating the one or more defined parameters and the at least one solved-for parameter to locate inefficiencies in the specific process entity in the industrial process and to determine alterations in the plurality of parameters that can improve, or eliminate, the located inefficiencies in the specific process entity,
wherein, in response to evaluating the one or more defined parameters and the at least one solved-for parameter, one or more of the control elements in the industrial process are controlled to adjust operation of at least a portion of the industrial process in order to optimize the industrial process.

US Pat. No. 10,339,230

SIMULATION APPARATUS AND METHOD OF AN ARTICLE AND A CONVEYOR IN A 3D SIMULATED SPACE

FUJITSU LIMITED, Kawasak...

8. A computing method for a simulation in which an article, a conveyor performing an operation of moving the article upwardly by supporting the article from bottom using a contact plane of a lifter, and a table on which the article is to be placed are plotted in a three dimensional simulated space, and in which the conveyor conveys the article, the computing method comprising:setting, using a processor, a first priority representing a degree at which the lifter is handled as a single unit as the article higher than a second priority representing a degree at which the table is handled as a single unit as the article when the lifter of the conveyor moves the article placed on the table upwardly by executing a control program for controlling the conveyor, the control program being a debugging target;
setting, using the processor, the first priority lower than the second priority when the lifter conveying the article moves downwardly below the table;
comparing the first priority and the second priority when the article is included in both a conveyable region of the lifter set on the contact plane of the lifter and a conveyable region of the table set on a contact plane of the table that is to be unified with the article;
computing movement of the article assuming that the article is unified with either the lifter or the table whose priority is higher; and
displaying a simulation result in the three dimensional simulated space based on the computing of the movement of the article for debugging of the control program.

US Pat. No. 10,339,229

SIMULATION OBSERVABILITY AND CONTROL OF ALL HARDWARE AND SOFTWARE COMPONENTS OF A VIRTUAL PLATFORM MODEL OF AN ELECTRONICS SYSTEM

CADENCE DESIGN SYSTEMS, I...

1. A method for simulating multiple layers of modeled components in a virtual platform, the method comprising:on a computer device having a single interface to access all of the modeled components in the virtual platform, the modeled components including a plurality of model component types including (i) at least one hardware model, (ii) at least one operating system (OS) runnable on the at least one hardware model, and (iii) at least one application that is runnable on the OS, the interface running on a single control thread:
implementing the at least one hardware model simulating a processor in the virtual platform, the at least one hardware model running on a simulator thread, wherein the processor is implemented using an instruction set simulator (ISS);
simulating the at least one OS, the at least one OS operating in conjunction with the at least one hardware model;
executing the at least one application on the at least one OS; and
upon detecting a breakpoint in source code for one of the modeled components, the simulator thread yielding to the control thread, wherein at the breakpoint, the control thread accesses state information for the modeled component associated with the detected breakpoint before switching to a simulation of another one of the modeled components, wherein the breakpoint corresponds to a change from the source code for the one of the modeled components to source code for the other one of the modeled components, wherein the modeled component types for the one of the modeled components and the other one of the modeled components are different, wherein the simulator thread sequentially steps through a simulation of each of the modeled components, wherein the simulation of the modeled components is implemented with the ISS.

US Pat. No. 10,339,228

AERODYNAMIC ANALYSIS FOR QUALITY ASSURANCE OF MANUFACTURED PARTS

Bell Helicopter Textron I...

1. A quality assurance system comprising a quality analyzer operable to:receive a plurality of coordinates of a part that has been manufactured according to a design, the plurality of coordinates measured on a coordinate measurement machine and indicative of a geometric characteristic of the manufactured part;
use the plurality of coordinates of the manufactured part measured on the coordinate measurement machine to determine aerodynamic performance data for the part;
compare the aerodynamic performance data for the manufactured part to minimum aerodynamic performance requirements;
determine that the aerodynamic performance data for the manufactured part does not satisfy minimum aerodynamic performance requirements using the comparison;
in response to the determination that the aerodynamic performance data for the manufactured part does not satisfy minimum aerodynamic performance requirements:
determine a second plurality of coordinates indicative of a modified shape of the manufactured part;
use the second plurality of coordinates indicative of the modified shape of the manufactured part to recommend a modification to change the shape of the manufactured part;
use the second plurality of coordinates of the manufactured part to determine second aerodynamic performance data for the manufactured part having the recommended modification;
compare the second aerodynamic performance data for the manufactured part having the recommended modification to the minimum aerodynamic performance requirements; and
determine that the second aerodynamic performance data for the manufactured part having the recommended modification satisfies the minimum aerodynamic performance requirements using the comparison; and
in response to the determination that the second aerodynamic performance data satisfies the minimum aerodynamic performance requirements, use the determination to approve the manufactured part having the recommended modification.

US Pat. No. 10,339,227

DATA CENTER DESIGN

Google LLC, Mountain Vie...

1. A method for constructing a data center, comprising:determining, using a computer system, a design power density using inputs that include (a) a platform roadmap that provides a projection of a peak power draw of a group of computers in the data center; and (b) at least one facility component restraint defining an upper bound of the design power density, wherein the design power density is in units of power per unit length;
determining, using the computer system, an oversubscription ratio that defines a ratio of the design power density to a representative power density of the group of computers;
determining, using the computer system and based on the oversubscription ratio, that the peak power draw of the group of computers exceeds a power capacity of the data center and an average power draw of the group of computers is less than the power capacity of the data center;
determining, using the computer system, a spatial layout for the group of computers for deployment in the data center of the data center using the design power density and the oversubscription ratio, wherein determining the spatial layout includes determining a total length of one or more rows of racks of computers and determining a layout of power taps; and
deploying the group of computers in the data center in the determined spatial layout.

US Pat. No. 10,339,225

SECURE ACCESS FRUSTROM CULLING FOR MULTI USER CAX

UNITED TECHNOLOGIES CORPO...

1. A method for providing computer-aided design access control in a computing network executing computer-aided technology (CAx) software, the method comprising a host computer in the network:receiving from a plurality of client computers on the network, operated by a respective one of plurality of users, one of a respective plurality of login requests, wherefrom the host computer determines for the users a respective plurality of user clearance levels,
receiving from the client computers a respective plurality of requests to manipulate at a same time and in real time a rendering of a mechanical part, wherein the mechanical part comprises a plurality of mechanical components,
accessing, from a part file database, a part file for the mechanical part, the part file identifying (i) the plurality of mechanical components, and (ii) a plurality of component clearance level flags identifying clearance levels for manipulating the respective plurality of mechanical components,
comparing the plurality of component clearance level flags against the user clearance levels, and
generating a plurality of access permissions for the respective users to manipulate a rendering of those mechanical components for which component clearance levels do not exceed the user clearance levels, and
instructing each of the client computers to continuously render at a same time and in real time a respective one of a plurality of composite images that includes:
(i) those mechanical components for the respective one of the users thereon having access permission, and
(ii) a visually obstructed representation of those other mechanical components for the respective one of the users thereon not having access permission,
wherein during simultaneous manipulation of the plurality of composite images on the respective plurality of client computers, the plurality of client composite images continuously provide the visually obstructed representation of those other mechanical components for the respective one of the users thereon not having access permission.

US Pat. No. 10,339,223

TEXT PROCESSING SYSTEM, TEXT PROCESSING METHOD AND STORAGE MEDIUM STORING COMPUTER PROGRAM

NEC CORPORATION, Tokyo (...

1. A textual entailment recognition system comprising:at least one processor that is configured to:
extract a first structure representing a first sentence and a second structure representing a second sentence, wherein the first structure and the second structure are each trees including linked nodes each representing one or more words;
determine whether the first structure and the second structure include at least one common substructure that is of a same type;
extract a first dependency relationship between the at least one common substructure in the first structure and a substructure in the first structure that is different from the at least one common substructure;
extract a second dependency relationship between the least one common substructure in the second structure and a substructure in the second structure that is different from the at least one common substructure;
extract a feature amount based on a difference between the extracted first dependency relationship and the extracted second dependency relationship; and
determine a textual entailment relationship between the first sentence and the second sentence by using the extracted feature amount that is based on the difference between the extracted first dependency relationship and the extracted second dependency relationship.

US Pat. No. 10,339,221

AUTO-COMPLETION AND AUTO-CORRECTION OF CRYPTIC LANGUAGE COMMANDS WITH DYNAMIC LEARNING OF SYNTAX RULES

AMADEUS S.A.S., Biot (FR...

1. A method for auto-completion and auto-correction of Cryptic language with dynamic learning of syntax rules, conducted by a computer system, the Cryptic language containing Cryptic commands, wherein each Cryptic command is composed of unsegmented Cryptic words, wherein each Cryptic word is composed of Cryptic symbols, the method comprising a pair of automatic processes, a general knowledge extraction process and a runtime auto-completion and auto-correction process, wherein the general knowledge extraction process comprises:receiving, from a database, a training data set containing an temporally ordered collection of Cryptic commands;
segmenting the Cryptic commands into Cryptic symbols;
creating a symbol-level n-gram tree by using the information of the in Cryptic symbols segmented set of Cryptic commands, wherein the symbol-level n-gram tree captures n-gram information between Cryptic symbols;
storing the symbol-level n-gram tree;
determining positions of separators between Cryptic words within the Cryptic commands by applying a hierarchical majority voting by using the information from the symbol-level n-gram tree, the hierarchical majority voting comprises:
grouping at least one text separation procedure in at least one group; determining, by the at least one text separation procedure, positions for Cryptic word separators;
determining, by a first level voting among the text separation procedures within each group, positions for Cryptic word separators; and thereafter
determining, by a second level voting among the groups, final positions for Cryptic word separators;
segmenting the Cryptic commands into Cryptic words based on the final positions determined by the hierarchical majority voting;
creating a word-level n-gram tree and a word-bounded symbol-level n-gram tree by using the information of the in Cryptic words segmented Cryptic commands, wherein the word-level n-gram tree captures n-gram information between Cryptic words and the word-bounded symbol-level n-gram tree captures n-gram information between Cryptic symbols within Cryptic words;storing the word-level and the word-bounded symbol-level n-gram tree;extracting Cryptic command IDs from the Cryptic commands, wherein a Cryptic command ID is the first Cryptic word at the beginning of a Cryptic command, by using the information of the word-level n-gram tree;
storing a modified training data set containing the temporally ordered Cryptic command IDs;
creating a command-level n-gram tree by using the information of the modified training data set, wherein the command-level n-gram tree captures n-gram information between Cryptic command IDs; and
storing the command-level n-gram tree; and
the runtime auto-completion and auto-correction process comprises:
receiving, via a user interface, a runtime Cryptic command, wherein the runtime Cryptic command is either empty or composed of at least one Cryptic symbol;
generating auto-correction and auto-completion suggestions for the runtime Cryptic command, wherein the generation of the suggestions is based on the extracted knowledge information about the Cryptic language stored in the symbol-level, word-bounded symbol-level, word-level, and command-level n-gram trees;
returning, via the user interface to the user, the auto-correction and auto-completion suggestions for the runtime Cryptic command; and
updating, for the runtime Cryptic command being complete and correct, in the database, the stored training data set of Cryptic commands by adding the runtime Cryptic command.

US Pat. No. 10,339,210

METHODS, DEVICES AND COMPUTER-READABLE MEDIUMS PROVIDING CHAT SERVICE

LINE Corporation, Tokyo ...

1. A method of providing a chat service, the method comprising:sequentially displaying, on a display unit of a first device, a plurality of visual signs according to at least one of transmission and reception times of the plurality of visual signs, the plurality of visual signs being included in a conversation between the first device and a plurality of second devices, and being transmitted between the first device and the plurality of second devices;
receiving an edit mode entry command to enter an edit mode in which the plurality of visual signs are editable;
receiving a visual sign selection command selecting one or more of the plurality of visual signs;
changing a display order of the plurality of visual signs by moving the selected one or more of the plurality of visual signs;
fixing, relative to a screen of the display unit, the moved one or more of the plurality of visual signs to a position such that the fixed one or more of the plurality of visual signs do not move in response to sequential display of additional visual signs; and
transmitting, after the changing, edit information indicating the movement and the fixing of the selected one or more of the plurality of visual signs to only a subset of the plurality of second devices, the subset including only second devices among the plurality of second devices that have transmitted at least one of the selected one or more of the plurality of visual signs.

US Pat. No. 10,339,209

WEBPAGE DISPLAY METHOD AND DEVICE

UC Mobile Co., Ltd., Bei...

1. A webpage display method, the method comprising:acquiring source code of a webpage to be displayed;
parsing the source code to form tree-shaped nodes;
composing the tree-shaped nodes according to style specifications of the source code;
determining at least a primary container according to the composed tree-shaped nodes, wherein the determining a primary container according to the composed tree-shaped nodes comprises:
judging whether a parent node of the current node is the primary container;
upon judging that the parent node of the current node is the primary container, judging whether the width of the current node is greater than or equal to a first percentage of the width of a root node and greater than or equal to a second percentage of the width of the parent node of the current node;
upon judging that the width of the current node is greater than or equal to the first percentage of the width of the root node and greater than or equal to the second percentage of the width of the parent node of the current node, judging whether the height of the current node is a fixed value; and
upon judging that the height of the current node is not the fixed value, determining the current node as the primary container;
determining a plurality of secondary containers in the primary container, wherein each of the secondary containers contains some of elements of the webpage to be displayed;
determining an area of each of the secondary containers in the primary container and a threshold value associated with areas of the secondary containers;
adjusting the area of one or more of the secondary containers that is greater than the threshold value to be scaled up and the area of other one or more of the secondary containers to be scaled down; and
displaying the elements of the webpage to be displayed which are contained in the adjusted secondary containers on a screen of a terminal.

US Pat. No. 10,339,205

EFFICIENT HANDLING OF BI-DIRECTIONAL DATA

International Business Ma...

1. A method for standardized layout transformations of bi-directional (BIDI) data exchanged between legacy and modern systems, the method comprising:retrieving, by one or more computer processors, client connection information from a client request for data;
determining, by the one or more computer processors, based, at least in part, on the client connection information, an operating system of a client application;
determining, by the one or more computer processors, whether the data requested in the client request is BIDI data;
responsive to a determination that the data requested is BIDI data, initiating, by the one or more computer processors, a layout transformation of the data requested at a single point within a database server;
determining, by the one or more computer processors, a plurality of data from a connection string of the client request, where the plurality of data indicates a type of bi-directional data transformation, wherein the type of bi-directional data transformation may be a transformation of visual data to logical data and logical data to visual data;
responsive to the plurality of data from the connection string indicating data being returned to the client application from a database, converting, by the one or more computer processors, visual data to logical data at the single point within the database server;
returning, by the one or more computer processors, transformed BIDI data to the client application; and
inserting, by the one or more computer processors, the transformed BIDI data into a database.

US Pat. No. 10,339,204

CONVERTING ELECTRONIC DOCUMENTS HAVING VISIBLE OBJECTS

Konica Minolta Laboratory...

4. A method for managing electronic documents (EDs), comprising:receiving a first request to convert an original ED comprising an equation object in a markup of the original ED from a first format to a second format;
extracting, in response to the first request, an attribute in the original ED specifying the equation object and required to restore the equation object in the first format, wherein the attribute comprises at least one of parameters used in the equation object, variables used in the equation object, and operators of the equation object, and wherein the attribute is specified using a tag in the markup of the original ED;
rendering the equation object into one or more visible objects native to the second format, wherein the attribute is not necessary to render the one or more visible objects in the second format;
generating metadata comprising the attribute extracted from the markup of the original ED;
associating the attribute with the one or more visible objects; and
generating, by converting the original ED from the first format to the second format, a converted ED comprising: the one or more visible objects and the metadata,
wherein the first format is Office Open XML (OOXML) and the second format is portable document format (PDF).

US Pat. No. 10,339,203

CORRELATION COEFFICIENT CALCULATION METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND CORRELATION COEFFICIENT CALCULATION DEVICE

FUJITSU LIMITED, Kawasak...

1. A method for determining a response delay source using correlation coefficients, the method, executed by a computer, comprising:calculating, for a system that is made up of multiple tiers including a Web tier, an application tier and a database tier, on each of the multiple tiers a processing type being executed on a server included in a respective tier, by reading data from a storing unit that stores time-series data of a number of requests on a processing type executed in the system wherein the time series data is used for calculating correlation coefficients, time series data of a total number of requests of processing types included in a tier;
calculating a first correlation coefficient of time series data of a number of requests on a first processing type in the application tier and time series data of a number of requests on a second processing type in the database tier;
calculating a second correlation coefficient of time series data of a total number of requests of processing types in the application tier and the time series data of a number of requests on the first processing type;
calculating a third correlation coefficient of time series data of the total number of requests of processing types in the application tier and time series data of a total number of requests of processing types in the database tier;
calculating a fourth correlation coefficient of time series data of the total number of requests of processing types in the database tier and the time series data of a number of requests on the second processing type;
calculating a fifth correlation coefficient of the time series data of the total number of requests of processing types in the application tier and the time series data of a number of requests on the second processing type;
calculating a sixth correlation coefficient of the time series data of the total number of requests of processing types in the database tier and the time series data of a number of requests on the first processing type;
calculating a sixth partial correlation coefficient by removing an effect of all requests of processing types in the application tier on the sixth correlation coefficient, using the second correlation coefficient and the third correlation coefficient;
calculating a fourth partial correlation coefficient by removing the effect of all requests of processing types in the application tier on the fourth correlation coefficient, using the third correlation coefficient and the fifth correlation coefficient;
calculating a first partial correlation coefficient by removing the effect of all requests of processing types in the application tier on the first correlation coefficient, using the second correlation coefficient and the fifth correlation coefficient;
calculating a corrected first correlation coefficient, that is a corrected correlation coefficient of the first correlation coefficient, the corrected first correlation coefficient being obtained by removing the effect of all requests in the database tier on the first partial correlation coefficient, using the sixth partial correlation coefficient and the fourth partial correlation coefficient;
specifying a third processing type that is present in the application tier and that is different from the first processing type and specifying a fourth processing type that is present in the Web tier higher than the application tier;
obtaining a seventh correlation coefficient of the time series data on the first processing type and time series data of a number of requests on the third processing type;
obtaining an eighth correlation coefficient of the time series data on the first processing type and time series data of a number of requests on the fourth processing type;
obtaining a ninth correlation coefficient of the time series data on the second processing type and the time series data on the third processing type;
obtaining a tenth correlation coefficient of the time series data on the third processing type and the time series data on the fourth processing type;
obtaining an eleventh correlation coefficient of the time series data on the second processing type and the time series data on the fourth processing type;
updating the ninth correlation coefficient on the basis of the tenth correlation coefficient and on the basis of the eleventh correlation coefficient;
updating the seventh correlation coefficient on the basis of the eighth correlation coefficient and on the basis of the tenth correlation coefficient;
firstly updating the corrected first correlation coefficient as a firstly updated first correlation coefficient, on the basis of the eighth correlation coefficient and on the basis of the eleventh correlation coefficient;
secondly updating the firstly updated first correlation coefficient as a secondly updated first correlation coefficient on the basis of the updated seventh correlation coefficient and on the basis of the updated ninth correlation coefficient, to remove the effect due to a simultaneous call by the processing types that are executed between tiers on the corrected first correlation coefficient;
specifying, based on the secondly updated first correlation coefficient and other updated correlation coefficients for other processing types, a pair of processing types that have a significant correlation with each other as being in a call relationship, and registering the pair of processing types in a call relationship table in the storing unit;
acquiring time series data indicating a response time of the processing types that are executed between tiers from the system; and
specifying, when the acquired time series data on the first processing type indicates a response delay occurring in the first processing type, from pairs of processing types registered in the call relationship table a processing type that is in the call relationship with the first processing type, determining whether a response delay occurs in the processing type, and outputting a determination result wherein the determination result indicates that the response delay is propagated from the processing type to the first processing type when the processing type is executed in a tier lower than a tier in which the first processing type is executed, and the acquired time series data on the processing type indicates a response delay occurring in the processing type in a same time period as for the first processing type.

US Pat. No. 10,339,202

RESISTIVE MEMORY ARRAYS FOR PERFORMING MULTIPLY-ACCUMULATE OPERATIONS

Hewlett Packard Enterpris...

1. A resistive memory array comprising:a number of memristors to receive a common-valued read signal that has a voltage less than a switching voltage of the number of memristors, in which a resistance of a memristor defines a value within a matrix;
a number of multiplication engines to perform a multiply operation by:
receiving a memristor output from a corresponding memristor;
receiving an input signal; and
generating a multiplication output based on a received memristor output and a received input signal; and
an accumulation engine to sum multiplication outputs from the number of multiplication engines, in which summed multiplication outputs represent a multiplication of the matrix and a number of input signals.

US Pat. No. 10,339,201

DOT PRODUCT BASED PROCESSING ELEMENTS

Altera Corporation, San ...

1. An electronic device comprising:a plurality of digital signal processing units that are configurably connected to perform a variety of operations and that are configured to function together to output a dot product, wherein at least one of the plurality of digital signal processing units comprises:
a plurality of input ports to receive a plurality of inputs at the respective digital signal processing unit;
a multiplier to generate a product based at least in part on the plurality of inputs;
a dedicated route to transmit the product to or receive an output from another digital signal processing unit of the plurality of digital signal processing units; and
an adder to add the product with the output of a multiplier of the other digital signal processing unit of the plurality of digital signal processing units, wherein the dot product is based at least in part on an output of the adder.

US Pat. No. 10,339,200

SYSTEM AND METHOD FOR OPTIMIZING MIXED RADIX FAST FOURIER TRANSFORM AND INVERSE FAST FOURIER TRANSFORM

1. A system for implementing a mixed radix fast fourier transformation using a single port single bank data memory, said system comprisinga data source that provides an input data;
an address generator that (a) processes said input data to (i) generate an index for a given radix configuration and a given size of a fast Fourier transformation (FFT), or (ii) generate an index for said given radix configuration and a given size of an inverse fast Fourier transformation (IFFT);
said single port single bank data memory that stores said input data (i) in an order based on the address generator and stores outputs of intermediate stages of FFT and final output of FFT in normal order for decimation in time fast Fourier transform (DIT-(I)FFT), and (ii) in a normal order and stores said outputs of intermediate stages of FFT and final output of FFT in said order based on the address generator for decimation in frequency—fast Fourier transform (DIF-(I)FFT), wherein a plurality of samples are packed to a single memory data word in said single port single bank data memory;
a register array that comprises a plurality of registers that are configured to cache multiple data words comprising intermediate values obtained from said single port single bank data memory;
a control unit that identifies butterfly operations based on a radix of a current stage for a radix configuration, and generate addresses for fetching or storing data from said single port single bank data memory into said register array, wherein said control unit generates selected data word addresses for fetching data word from said single port single bank data memory and stores computed, immediate, and final results in said single port single bank data memory;
a butterfly extraction unit that extracts data samples for said butterfly operations from said multiple data words from said register array based on a current radix and said radix configuration;
a twiddle factor generator that stores at least one look up table (LUTs), wherein number of unique entries of said lookup table is reduced based on least common multiple of all possible multiples of twiddle factor sizes; and
a computation unit that performs twiddle factor multiplications and said butterfly operations for said current radix, wherein an output of said computation unit is written back to said register array.

US Pat. No. 10,339,199

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR CAPTURING AND STORING A WEB PAGE SCREENSHOT

ORACLE INTERNATIONAL CORP...

1. A method for capturing and storing a web page screenshot, the method comprising:at a server:
receiving a request for a web page from a client;
determining, based on a first server-hosted file, that the web page includes a parameter value specifying to enable the web page to be saved as a web page screenshot;
in response to receiving the request and determining that the web page includes the parameter value specifying to enable the web page to be saved as a web page screenshot, calling a second server-hosted file to generate web page file contents and sending the web page file contents to the client for displaying the web page, wherein the web page file contents are one or more HyperText Markup Language (HTML) files, wherein the second server-hosted file includes one or more parameters that identify content from the web page file contents to be displayed on the web page that can be optionally retained;
receiving a request to capture and store a web page screenshot, captured by the server, of the web page as displayed at the client at a time of capture;
parsing the second server-hosted file and identifying content from the web page file contents based on the one or more parameters to place the identified content for retention in an intermediate HyperText Markup Language (HTML) file from the web page file contents;
converting the intermediate HTML file into the web page screenshot of the web page as displayed at the client at the time of capture as a document that when displayed shows the web page as displayed at the client with only the content identified by the one or more parameters for retention; and
storing the document in a storage device associated with the server.

US Pat. No. 10,339,197

METHOD AND SYSTEM FOR BOOKMARKING A WEBPAGE

Samsung Electronics Co., ...

1. A method of bookmarking a webpage, the method comprising:detecting a plurality of webpage elements having the same Uniform Resource Locator (URL) from among webpage elements on a webpage;
determining a default display index value associated with each of the plurality of webpage elements having the same URL;
updating the default display index value of at least one of the plurality of webpage elements in response to a bookmark event and storing the updated display index value; and
bookmarking the webpage according to the at least one updated display index value.

US Pat. No. 10,339,196

LIFESTREAM ANNOTATION METHOD AND SYSTEM

Apple Inc., Cupertino, C...

1. A method comprising:receiving, by at least one computer processor, a first stream of note data items, a second stream of recording data items, and a third stream of annotation data items;
determining, by the at least one computer processor, that:
a plurality of recording data items of the second stream should be linked to a first plurality of note data items of the first stream, and
a plurality of annotation data items of the third stream should be linked to a second plurality of note data items of the first stream;
linking, by the at least one computer processor:
the plurality of recording data items with the first plurality of note data items, and
the plurality of annotation data items with the second plurality of note data items to create a network of linked data items; and
determining, by the at least one computer processor, a relevance of a particular data item within the network of linked data items based on a density of related connections to the particular data item in the network of linked data items.

US Pat. No. 10,339,193

BUSINESS CHANGE DETECTION FROM STREET LEVEL IMAGERY

Google LLC, Mountain Vie...

1. A method comprising:selecting, using one or more processors, a business associated with stored business information;
selecting, from pre-stored images, using the one or more processors, a reference image depicting a business location of the business, the reference image having a timestamp;
identifying, using the one or more processors, one or more new images based on characteristics of at least one of the business and the reference image, each of the one or more new images being associated with a timestamp that is more recent than the timestamp of the reference image and location and orientation information;
for each new image, determining, using the one or more processors, a likelihood value indicative of the likelihood that the business location is shown in a given new image of the one or more new images by:
projecting one or more rays from the business location to the a location of the given new image, and
identifying an angular relationship between the one or more rays and the given new image's location and orientation;
selecting from the one or more new images, using the one or more processors, a comparison image based on the likelihood values of the one or more new images;
comparing, using the one or more processors, text information and visual features of the reference image with text information and visual features of the comparison image;
determining, using the one or more processors, a text similarity score and a feature similarity score based on the comparison;
determining, using the one or more processors, a confidence level using the text similarity score and the feature similarity score, the confidence level indicating whether the business in the reference image is in the comparison image; and
updating, using the one or more processors, the business information of the business according to the confidence level.

US Pat. No. 10,339,191

METHOD OF AND A SYSTEM FOR PROCESSING A SEARCH QUERY

Yandex Europe AG, Lucern...

1. A method of processing a search query from a user associated with an electronic device and generating a search engine result page (SERP) responsive to the search query, the method executable at a search server coupled to the electronic device via a communication network, the method comprising:receiving the search query from the electronic device of the user;
performing the search based on the search query and creating a list of search results;
ranking the search results, the ranking process including:
accessing a first screenshot of a first web page included in the search results, where the first screenshot:
has been previously created, the accessing the first screenshot including accessing the first screenshot from a web page server, and
has not been previously created, the accessing the first screenshot including creating the first screenshot,
determining a first appeal factor of the first web page as a function of the first screenshot, the first appeal factor representing a probability that the first web page is appealing to the user,
accessing a second screenshot of a second web page included in the search results, where the second screenshot:
has been previously created, the accessing the second screenshot including accessing the second screenshot from a web page server, and
has not been previously created, the accessing the second screenshot including creating the second screenshot,
determining a second appeal factor of the second web page as a function of the second screenshot, the second appeal factor representing a probability that the second web page is appealing to the user, and
ranking the first web page versus the second web page in the list of search results, the ranking based at least in part on the first appeal factor and the second appeal factor; and
generating the SERP responsive to the search query, the SERP including a ranked list of search results.

US Pat. No. 10,339,190

QUESTION ANSWERING USING ENTITY REFERENCES IN UNSTRUCTURED DATA

GOOGLE LLC, Mountain Vie...

1. A method performed by one or more processors comprising:receiving a query, the query being a natural language query that is received based on user input at a computing device;
obtaining search results for the query and a ranking of the search results, the search results generated based at least in part on the query and the ranking of the search results being based on relevance of the search results to the query;
identifying that the query is associated with a particular type of entity, wherein the particular type of entity defines a particular categorization that encompasses multiple entities, and wherein identifying that the query is associated with the particular type of entity comprises identifying the particular type of entity, from a plurality of candidate types of entities, based on at least one term of the query;
retrieving data comprising one or more entity references that occur in content of one or more of the search results, wherein retrieving the data comprises:
retrieving the entity references, that occur in the content of one or more of the search results, based on the entity references being identified as the particular type of entity, and based on the particular type of entity having been identified based on the at least one term of the query, and
retrieving the entity references based on their occurrence in the content of the one or more of the search results and based on the one or more of the search results being obtained for the query;
determining a ranking signal for each of the entity references;
ranking the entity references based on the determined ranking signals;
selecting an entity result from the entity references based at least in part on the ranking;
generating a natural language answer to the query based on the selected entity result and based on the query, wherein generating the natural language answer to the query based on the selected entity result and based on the query comprises including at least one query term, from the query, in the natural language answer and including at least one entity term, for the entity result, in the natural language answer; and
providing the natural language answer to the query for presentation at the computing device, wherein providing the natural language answer to the query comprises providing the answer for presentation in place of the search results.

US Pat. No. 10,339,189

IDENTIFICATION OF PEOPLE IN COMMON

Google LLC, Mountain Vie...

1. A computer-implemented method comprising:determining one or more connections of a first user, a second user, and a third user from a social networking service, a connection including a direction and a security permission, wherein the direction between two users defines information of each user visible by another user;
determining an intersection between the first user's social graph and the second user's social graph in the social networking service;
identifying that the third user connects to both the first user and the second user based on the intersection;
determining, from a perspective of the first user, that the third user is a person in common between the first user and the second user based on a first direction of a first restricted connection, and a first security permission controlling visibility of the first restricted connection between the second user and the third user to members of a first group and the first user being a member of the first group;
determining, from a perspective of the second user, that the third user is not a person in common between the first user and the second user based on a second direction of a second restricted connection, and a second security permission controlling visibility of the second restricted connection between the first user and the third user to members of a second group and the second user failing to be a member of the second group;
determining different sets of people in common between the first user and the second user from different perspectives of the first user and the second user using the first and second restricted connections, and the first and second security permissions, wherein a set of people in common determined from the perspective of the first user includes the third user;
predetermining, from the perspective of the first user, a truncated set of people in common between the first user and the second user based on the set of people in common; and
subsequent to predetermining the truncated set of people in common between the first user and the second user:
automatically generating a request for people in common between the first user and the second user from the perspective of the first user in response to detecting an interaction of the first user on the social networking service that is related to the second user;
in response to automatically generating the request for people in common between the first user and the second user, determining whether the first security permission has changed since the truncated set of people in common was predetermined, the first security permission being related to the third user;
in response to determining that the first security permission has changed, removing the third user from the truncated set of people in common; and
providing the first user with the truncated set of people in common between the first user and the second user from the perspective of the first user, wherein the truncated set of people in common is updated at a predetermined interval.

US Pat. No. 10,339,188

QUESTION DISTRIBUTION METHOD AND A QUESTION DISTRIBUTION SYSTEM FOR A Q AND A PLATFORM

Baidu Online Network Tech...

1. A question distribution method for a question and answer (Q & A) platform, the method comprising:obtaining a question entering into a Q & A platform through a first interface associated with the Q & A platform;
displaying the question on the first interface;
determining a user suitable for answering the question based on a question distribution model;
distributing the question to a third party platform where the user suitable for answering the question is located, wherein the third party platform interfaces with the Q & A platform through an application programming interface (API) of the Q & A platform, and the question distributing model is established by using user data collected from the third party platform interfaced with the Q & A platform, wherein the third party platform is different from the Q & A platform, and the third party platform is modified according to API of the Q & A platform to interface with the Q & A platform;
displaying the question on a second interface associated with the third party platform;
obtaining an answer to the question from the third party platform through the second interface; and
displaying the answer to the question on the first interface,
wherein the question distribution model comprises a platform model, and the determining a user suitable for answering the question based on a question distribution model comprises:
extracting features of respective types from the question based on features on respective types in the platform model, the platform model being built based on multi-type features;
mapping the extracted features to the features on the respective types in the platform model;
calculating, with weight values of respective features, score values of answers of respective platforms to the question; and
selecting a platform having a score value satisfying a preset condition from the platforms.

US Pat. No. 10,339,187

SYSTEM AND METHOD FOR CONDUCTING A SEARCH

Yandex Europe AG, Lucern...

1. A method of conducting a search, the method being executable at a search engine server communicatively coupled to a user electronic device via a communication network, the method comprising:receiving, by the search engine server via the communication network, a search query from the user electronic device;
determining a search intent parameter by parsing the received search query;
based at least on the determined intent parameter, determining a search query relevant host, the search query relevant host hosting a plurality of resources related to at least a portion of the search query, wherein at least one of the plurality of resources related to at least a portion of the search query has not been crawled by the search engine server by a time of the receiving the search query;
based on the search query relevant host, receiving an address template associated with the search query relevant host;
based on the address template associated with the search query relevant host, generating a search query relevant resource address indicative of an uncrawled search query relevant resource, the uncrawled search query relevant resource being relevant to the search query;
the generating the search query relevant resource address comprising inserting at least a portion of the search query into the received address template of the search query; and
causing the user electronic device to display a search engine results page (SERP), the SERP including a search result indicative of least one of:
the uncrawled search query relevant resource retrieved using the generated search query relevant resource address; and
the generated search query relevant resource address.

US Pat. No. 10,339,186

INTERFACE FOR SIMULTANEOUS DISPLAY OF SELECTED ITEMS FROM SEARCH ENGINE RESULTS

International Business Ma...

1. A computer-implemented method of processing a search of network sites comprising:detecting initiation of a search of network sites for information by a search engine operating in conjunction with an Internet browser;
processing results of the detected search and enabling selection of a plurality of items within the search results, wherein the items are associated with network sites containing the information;
retrieving the information from each of the network sites associated with the plurality of selected items;
generating a plurality of individually controllable frames each to receive and present on a display screen the retrieved information for a different corresponding selected item, wherein the display screen includes a common control to scroll each of the frames simultaneously;
collectively displaying the retrieved information for the plurality of selected items in the plurality of frames;
detecting available space on the display screen and sizing each frame based at least upon relevance of the selected item displayed in the frame to the search, a count of the plurality of selected items, and the available space on the display screen, wherein the plurality of frames enable the retrieved information for the plurality of selected items to be visible simultaneously on the display screen and indicate relevance of the selected items to the search based on frame sizes;
normalizing the retrieved information of the corresponding different selected items to present related information at same locations within the plurality of frames; and
in response to actuation of the common control of the display screen, simultaneously scrolling the retrieved information within each of the plurality of frames to concurrently traverse within each frame the retrieved information of the corresponding different selected item.

US Pat. No. 10,339,185

EFFICIENT MANAGEMENT OF DOCUMENT CORPUS

International Business Ma...

1. A method for managing a document corpus stored in a document system, comprising:extracting elements from a plurality of documents in the document corpus by the document system;
establishing links between the elements to form an initial set of inter-document relationships for the plurality of documents in the document corpus by the document system;
adding a new document to the document corpus;
extracting a new set of elements from the new document by the document system;
comparing the new set of elements with the elements corresponding to the plurality of documents in the document corpus;
determining whether any existing inter-documents relationships in the initial set of inter-document relationships is changed by the new document; and
responsive to determining that a given existing inter-document relationship is changed, modifying a given document of the given existing inter-document relationship by taking an action based on a set of criteria, wherein the set of criteria indicates that the new document is a more recent version of the given document, wherein the action comprises removing the given document from the document corpus stored in the document system.

US Pat. No. 10,339,184

SYSTEM AND METHOD FOR TOPIC EXTRACTION AND OPINION MINING

eBay Inc., San Jose, CA ...

1. A system comprising:one or more hardware processors; and
a machine-readable medium for storing instructions that, when executed by the one or more hardware processors, cause the one or more hardware processors to perform operations comprising:
accessing a document from a document record of a database;
building a syntax tree of a sentence of the document based on parsing the sentence;
assigning a polarity impact to one or more words of the sentence based on matching one or more lexical patterns and the one or more words of the sentence, a lexical pattern being a token sequence, each token of the token sequence comprising a lemma field, a polarity tag field, and a part-of-speech tag field;
determining that a plurality of words in the sentence have conflicting polarity based on the syntax tree and the assigned polarity impact of the plurality of words;
determining a classification of the sentence based on the determining that the plurality of words in the sentence have conflicting polarity; and
generating a classification record of the classification in the database.

US Pat. No. 10,339,183

DOCUMENT STORAGE FOR REUSE OF CONTENT WITHIN DOCUMENTS

Microsoft Technology Lice...

1. A method, executed at least in part by a computing device, comprising:identifying at least one predefined action class from a session log for a user for an aggregated window of time during which the user interacted with content associated with a document within a productivity application by normalizing a plurality of actions, wherein the normalizing of the plurality of actions comprises classifying the plurality of actions into the at least one predefined action class;
determining a label of the user in relation to the document or a portion of the content associated with the document based on the at least one predefined action class by:
mapping the at least one predefined action class to an actor class; and
assigning the user as belonging to the actor class determined based on the mapping of the at least one predefined action class to the actor class, the actor class including the label;
storing the label associated with the user and the document or the portion of content in a document graph to indicate a relationship between the user and the document or portion of the content associated with the document;
receiving a request for reusable content, wherein the request for reusable content comprises a particular label, wherein the particular label is a label for a user who has created content that has been reused by other users, a label for a user who reuses or shares content created by other users, or a label for a user who has interacted with new or previously created content;
in response to the request for reusable content, searching the document graph for content connected to the user or another user for which the user or the another user has the particular label; and
providing the content for reuse to a source of the request.

US Pat. No. 10,339,182

METHOD FOR STORING DATA BY USING CLOUD SERVICES AND APPARATUS THEREOF

SAMSUNG ELECTRONICS CO., ...

1. A method of storing data, the method performed by a network storage server, the method comprising:storing at least one file control information corresponding to a plurality of files stored in a plurality of cloud storage, the plurality of cloud storage storing the plurality of files based on accounts of a user;
receiving, from the plurality of cloud storage, a file change event indicating that a user's file is changed and an information about the changed file, wherein the information about the changed file includes file attribute information about the changed file and cloud storage information for access to the changed file;
storing the changed file in correspondence to identification information of the changed file;
transmitting, to an external apparatus, information about at least one file transmittable from the plurality of cloud storage to the network storage server;
receiving, from the external apparatus, a request for a file and a network status of the external apparatus, via a home network;
in response to receiving the request for the file according to a selection by the user, identifying a cloud storage, in which the file is stored, from among the plurality of cloud storage, based on the at least one file control information;
receiving the file, from the cloud storage, via a wide area network; and
transmitting the received file to the external apparatus, via the home network,
wherein the at least one file control information comprises at least one of file identification information, the file attribute information, and file access information,
wherein the at least one file control information further comprises file storage information on whether the plurality of files are stored in the network storage server and a ratio of a size of a portion of a given file stored in the network storage server to a total file size of the given file, and
wherein, based on a determination that only a first portion of the requested file is stored in the network storage server based on the file storage information, the network storage server is configured to transmit the first portion of the file stored in the network storage server to the external apparatus, receive a second portion of the file which is not stored in the network storage server from the cloud storage, and transmit the received second portion of the file to the external apparatus.

US Pat. No. 10,339,181

TECHNIQUES FOR VISUALIZING CLUSTERED DATASETS

SAS INSTITUTE INC., Cary...

1. An apparatus comprising a processor and a storage to store instructions that, when executed by the processor, cause the processor to perform operations comprising:identify a collection of clustered datasets, each clustered dataset in the collection of clustered datasets comprising a plurality of correlated samples, wherein each sample in the plurality of correlated samples includes a value for each variable in a group of variables;
assign a different color hue to each clustered dataset in the collection of clustered datasets;
identify a pair of variables in the group of variables, the pair of variables comprising a first variable and a second variable;
identify plotting data comprising a data point for each sample in each clustered dataset in the collection of clustered datasets, wherein each data point comprises a value corresponding to each variable in the pair of variables from a respective sample in the plurality of correlated samples;
determine a set of bin crossings for the plotting data based on one or more binning parameters, wherein each bin crossing includes a first range of values for the first variable and a second range of values for the second variable;
assign each data point in the plotting data to one bin crossing in the set of bin crossings;
determine, for each bin crossing, a number of assigned data points corresponding to each clustered dataset;
identify a dominant clustered dataset from the collection of clustered datasets for each bin crossing in the set of bin crossings, the dominant clustered dataset for a bin crossing comprising a clustered dataset in the collection of clustered datasets with a highest number of assigned data points in the bin crossing;
assign a color hue to each bin crossing in the set of bin crossings based on the color hue assigned to the clustered dataset identified as the dominant clustered dataset for each bin crossing;
determine a set of dominated bin crossings for each clustered dataset, the set of dominated bin crossings for a respective clustered dataset comprising each bin crossing in the set of bin crossings that the respective clustered dataset is identified as the dominant clustered dataset for;
compare each number of assigned data points for each bin crossing in each set of dominated bin crossings to determine a scheme of color intensities to apply to each set of dominated bin crossings;
assign a color intensity to each bin crossing in the set of bin crossings based on the scheme of color intensities determined for each set of dominated bin crossings;
generate a heat map comprising each bin crossing in the set of bin crossings, wherein each bin crossing in the set of bin crossings is colored based on the color hue and the color intensity assigned to each bin crossing in the set of bin crossings; and
present the heat map via a user interface (UI).

US Pat. No. 10,339,180

PREVENTING BIASED QUERIES BY USING A DICTIONARY OF CAUSE AND EFFECT TERMS

International Business Ma...

1. A processor-implemented method for eliminating confirmation bias in a user search query, the method comprising:receiving, by a processor, a user-entered search query from an open ended-search tool;
identifying a field associated with the received user-entered search query;
creating a dictionary based on the identified field, wherein creating the dictionary further comprises:
analyzing a plurality of documents with a plurality of factual information in the identified field for one or more if/then statements using one or more natural language processing techniques, wherein the plurality of documents comprise a public domain article, a legislative bill, and a medical journal;
identifying one or more cause and effect terms within the one or more if/then statements;
labeling the identified one or more cause and effect terms as either a cause or an effect; and
mapping each cause to one or more effects and each effect to one or more causes using the plurality of factual information;
determining the received user-entered search query relates to an effect by parsing the created dictionary;
identifying one or more causes associated with the effect by parsing the created dictionary;
generating a plurality of suggested search queries based on the one or more identified causes, wherein each suggested search query expressly mentions each cause associated with the effect;
presenting the plurality of generated suggested search queries to a user in a graphical user interface, wherein the plurality of generated suggested search queries are ordered from least biased to most biased in a drop down menu; and
in response to a user selecting a suggested search query from the drop down menu, executing the suggested search query in the open-ended search tool.

US Pat. No. 10,339,179

GRAPH PROCESSING SYSTEM THAT CAN DEFINE A GRAPH VIEW FROM MULTIPLE RELATIONAL DATABASE TABLES

Oracle International Corp...

1. A method comprising:receiving a mapping of one or more relational tables to one or more node tables and one or more edge tables, wherein:
said one or more node tables comprise one or more columns and one or more rows,
said one or more edge tables comprise one or more columns and one or more rows,
each row of said one or more edge tables represents one edge of a graph,
each edge of the graph corresponds to one row of said one or more edge tables, and
said one or more rows of said one or more node tables and said one or more rows of said one or more edge tables define a graph;
transforming content of at least one node table of said one or more node tables, or at least one edge table of said one or more edge tables, into an in-memory representation according to at least one format of: compressed sparse row (CSR) or compressed sparse column (CSC), wherein said transforming content comprises calculating, based on said mapping and said one or more relational tables, a value of at least one column of at least one row of said one or more rows of said one or more node tables;
returning, based on an execution of a query of said graph, said value;
wherein the method is performed by one or more computers.

US Pat. No. 10,339,178

FINGERPRINT RECOGNITION METHOD AND APPARATUS

SAMSUNG ELECTRONICS CO., ...

1. A fingerprint recognition method comprising:generating an enrollment modified image by modifying a fingerprint image corresponding to a fingerprint to be enrolled;
extracting enrollment property information from the fingerprint image;
generating mapping information that maps the enrollment modified image to the enrollment property information;
storing the enrollment modified image and the enrollment property information;
matching an input modified image and the enrollment modified image;
dividing an overlapping region of the input modified image and the enrollment modified image into sub-regions;
calculating, for each of the sub-regions, histogram information of the input modified image relative to the enrollment modified image; and
determining a score corresponding to the matching based on the histogram information,
the modifying of the fingerprint image including converting a type of the fingerprint image to a modified type, the modified type being a local binary pattern (LBP) type, a histogram of oriented gradients (HOG) type, a Haar feature type, a modified census transform (MCT) type, or a geometrically warped type.

US Pat. No. 10,339,177

METHOD AND A SYSTEM FOR VERIFYING FACIAL DATA

HUAWEI TECHNOLOGIES CO., ...

11. An apparatus for generating a Discriminative Multi-Task Gaussian Process (DMTGP) model and using the DMTGP model as a binary classifier in facial recognition, the apparatus comprising:at least one processor,
a memory configured to store computer program instructions that, when executed by the at least one processor, cause the at least one processor to be configured to:
generate the DMTGP model by:
retrieving a plurality of source-domain datasets Xi from a first database and a target-domain dataset Xt from a second database different from the first database;
determining a latent subspace Zt matching with the target-domain dataset Xt best and a posterior distribution P for the determined latent subspace Zt from the target-domain dataset Xt and the source-domain datasets Xi;
determining information M shared between the target-domain data Xt and the source-domain datasets Xi; and
establishing a multi-task learning model Lmodel from the posterior distribution P, the shared information M on the target-domain dataset Xt and the source-domain datasets Xi, the multi-task learning model Lmodel being based on Gaussian processes that comprise hyper-parameters, and the hyper-parameters being learned from data automatically without using model selection methods;
obtain a pair of images to be compared by the DMTGP model to determine whether the pair of images correspond to a same person or correspond to different people, a first one of the images corresponding to a first face A and a second one of the images corresponding to a second face B, a first plurality of multiple scale features m1, m2, . . . mp, being extracted from the first face A, and a second plurality of multiple scale features n1, n2, . . . np being extracted from the second face B in different landmarks of the first face A and the second face B;
concatenate each pair of multi-scale features and its flipped version to obtain [m1, n1] and [n1, m1] so as to generate 2P multi-scale features of size 2L [m1, n1], [n1, m1], . . . , [mp, np], [np, mp] as input vector x to the multi-task learning model Lmodel;
feed similarities S1, S2, . . . Sp to the DMTGP model to determine whether the first face A matches the second face B by applying the multi-task learning model Lmodel to the similarities S1, S2, . . . Sp to determine whether the first face A matches the second face B; and
verify that the first face A matches the second face B according to a facial recognition result from the DMTGP model.

US Pat. No. 10,339,175

AGGREGATING PHOTOS CAPTURED AT AN EVENT

GOOGLE LLC, Mountain Vie...

1. A computer-implemented method to share digital media of an event, the method comprising:establishing an Near Field Communication (NFC) check-in connection by a computing device to a first check-in point of a plurality of check-in points, each check-in point being located at a different physical location at a venue of the event, by sending a connection request to the first check-in point, wherein the first check-in point includes a chip or a tag encoded with event data;
receiving at the computing device by the NFC check-in connection of the computing device to the first check-in point, the event data from the encoded chip or tag of the first check-in point, wherein the event data includes information associated with a digital media sharing system for the event;
accessing with use of the event data, over a network, a plurality of digital media items from the digital media sharing system captured at the event by a plurality of capture devices and transmitted to the digital media sharing system by respective other NFC check-in connections of the plurality of capture devices at the event with other check-in points of the plurality of check-in points, wherein the event data includes information associated with a respective other check-in point that received the respective digital media item;
sorting the plurality of digital media items based on the information associated with the respective other check-in point that received the respective digital media item; and
displaying on an electronic display, one or more sorted digital media items of the plurality of digital media items.

US Pat. No. 10,339,172

SYSTEM AND METHODS THEREOF FOR ENHANCING A USER'S SEARCH EXPERIENCE

Doat Media Ltd., Tel Avi...

1. A computer implemented method for enhancing search experiences of users, comprising:receiving, at a search server, an input query and a metadata related to the input query sent from a user device;
selecting, based on an analysis of the input query, at least one resource from a plurality of resources to respond to the input query and provide at least one answer to the input query;
sending the input query as an input to the selected at least one resource, wherein the input is generated based on the at least one selected resource;
providing, for each of the at least one selected resource, an associated respective single unique display segment within a display area on the user device, wherein content displayed in each unique display segment corresponds only to content retrieved by the corresponding selected resource, and wherein the associated respective single unique display segment is controlled on the user device at least through the use of software;
causing the at least one selected resource to respond to the input within each corresponding unique display segment; and
establishing a direct communication link between the at least one selected resource and the user device, without user intervention, for at least enabling direct interaction between the at least one selected resource and a user of the user device within each corresponding unique display segment.

US Pat. No. 10,339,170

DEFECT RECORD CLASSIFICATION

INTERNATIONAL BUSINESS MA...

1. A method comprising:receiving, by at least one computing device, a defect record associated with a defect;
predicting a recommended plain language phrase or word based on a user input from a user and how many times within a predetermined time period a plain language phrase or word has been previously selected in response to the user input being included in a plain language dictionary;
predicting the recommended plain language phrase or word based on a synonym of the user input from the user and how many times within the predetermined time period the plain language phrase or word has been selected in response to the user input not being included in the plain language dictionary;
providing the recommended plain language phrase or word to classify the defect record;
classifying the defect record based on the recommended plain language phrase or word;
sending the classified defect record to another computing device to analyze the defect record to find out how the defect record was determined and how the defect record was resolved; and
resolving the defect record,
wherein how the defect is resolved includes a resolution description which defines what is necessary to resolve the defect, and
the resolution description includes at least one of adding, removing, and correcting elements of a system being tested.

US Pat. No. 10,339,169

METHOD AND SYSTEM FOR RESPONSE EVALUATION OF USERS FROM ELECTRONIC DOCUMENTS

Conduent Business Service...

1. A method of operating a computer-assisted assessment system, the method comprising:extracting, by a document processor, one or more examination questions and a first free-text response pertaining to each of the one or more examination questions from one or more first electronic documents received from an evaluator computing device associated with an evaluator over a communication network;
extracting, by the document processor, a second free-text response pertaining to each of the one or more extracted examination questions and metadata from one or more second electronic documents received from a subject computing device associated with a subject to be evaluated over the communication network, wherein the metadata comprises at least one subject identifier;
for the second free-text response pertaining to each of the one or more extracted examination questions:
determining, by a processor, a score and feedback based on one or more similarity measures associated with a category of each of the one or more extracted examination questions, wherein the one or more similarity measures comprise a lexical similarity measure, a syntactic similarity measure, a semantic similarity measure, or a vector space similarity measure, or a combination thereof, wherein:
the lexical similarity measure is associated with a disjunctive category, a concept completion category, a feature specification category, or a casual antecedent category, or a combination thereof;
the syntactic similarity measure is associated with a verification category, a quantification category, a definition category, an example category, a comparison category, an instrumental/procedural category, or an enablement category;
the semantic similarity measure is associated with the definition category, the comparison category, an interpretation category, a causal antecedent category, a casual consequence category, a goal orientation category, the enablement category, an expectational category, or a judgmental category, or a combination thereof; and
the vector space similarity measure is associated with a disjunctive category, the feature specification category, or both;
generating, by the processor, an evaluation report comprising the determined score and the feedback; and
rendering, by the processor, the evaluation report on a user interface displayed on a display screen of the evaluator computing device.

US Pat. No. 10,339,168

SYSTEM AND METHOD FOR GENERATING FULL QUESTIONS FROM NATURAL LANGUAGE QUERIES

International Business Ma...

1. A computer implemented method, in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor to cause the processor to implement a full question generation system for training a cognitive system comprising a question-answer system pipeline, the method comprising:ingesting, into the full question generation system, a query dataset derived from one or more search queries entered by one or more users of an internet search engine;
identifying questions from the ingested query dataset;
separating, through a full question identification module, one or more prior full questions from the ingested dataset;
identifying, through a question intent query identification module, one or more question intent queries from the query dataset using one or more regular expressions to detect at least one trigger phrase contained in each question intent query, wherein an interrogative word and a verb are missing from the one or more question intent queries;
for each identified question intent query:
sorting, through a sorting module, the question intent query into one or more bins based on one or more missing interrogative words, wherein each missing interrogative word corresponds to a different bin;
determining whether the at least one trigger phrase is plural or singular;
identifying a proper conjugation of the verb for the question intent query based on plurality or singularity of the at least one trigger phrase; and
appending, through an appending module, the one or more missing interrogative words and the proper conjugation of the verb onto the question intent query to generate a full question;
ingesting, through the cognitive system, the one or more generated full questions as training dataset;
analyzing, through the question-answer system pipeline, each of the one or more generated full questions contained in the training dataset; and
training the full question generation system based on the analysis of the one or more generated full questions by the question-answer system pipeline.

US Pat. No. 10,339,167

SYSTEM AND METHOD FOR GENERATING FULL QUESTIONS FROM NATURAL LANGUAGE QUERIES

International Business Ma...

1. A computer implemented method, in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor to cause the processor to implement a full question generation system, the method comprising:ingesting a query dataset derived from one or more search queries entered by one or more users of an internet search engine;
identifying questions from the ingested query dataset;
separating one or more prior full questions from the ingested dataset;
identifying one or more question intent queries from the query dataset using one or more regular expressions to detect at least one trigger phrase contained in each question intent query, wherein an interrogative word and a verb are missing from the one or more question intent queries;
for each identified question intent query:
sorting the question intent query into one or more bins based on one or more missing interrogative words, wherein each missing interrogative word corresponds to a different bin;
determining whether the at least one trigger phrase is plural or singular;
identifying a proper conjugation of the verb for the question intent query based on plurality or singularity of the at least one trigger phrase; and
appending the missing interrogative word and the proper conjugation of the verb onto the question intent query to generate a full question.

US Pat. No. 10,339,166

SYSTEMS AND METHODS FOR PROVIDING NATURAL RESPONSES TO COMMANDS

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:during a first time period:
receiving, from a requesting device, first audio data representing first speech,
determining that the first speech corresponds to a first intent,
determining, based at least in part on determining that the first speech corresponds to the first intent, a first response to the first speech, the first response having a first format, and
sending, to the requesting device, the first response; and
during a second time period:
receiving, from the requesting device, second audio data representing second speech,
determining that the second speech corresponds to the first intent,
determining a temporal difference between a first time of a first event associated with the first speech and a second time of a second event associated with the second speech,
determining that the temporal difference is less than a first threshold,
based at least in part on determining that the temporal difference is less than the first threshold, determining a second format for a second response to the second speech, the second format being different than the first format,
determining, based at least in part on determining that the second speech corresponds to the first intent, the second response, the second response having the second format, and
sending, to the requesting device, the second response.

US Pat. No. 10,339,165

SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA FOR GENERATING SYNONYMS OF A SEARCH QUERY

WALMART APOLLO, LLC, Ben...

1. A system for generating synonyms of a search query, the system comprising:a database configured to store a plurality of session logs for one or more web search browsers, wherein the plurality of session logs include query data from search queries and with the search queries comprising the search query, wherein the query data comprises user feedback included in search results and viewed by a user, wherein a session log of the plurality of session logs comprises a portion of the query data entered into a web search engine during a session;
a processor in communication with the database and configured to execute computer-readable instructions causing the processor to:
receive the search query from a user interface of a device of the user;
prior to displaying the query data obtained from the search query to the user interface of the device of the user, reformulate the query data from the search query into a set of synonyms by:
searching the plurality of session logs for search terms in the query data that match the search query;
tying the search query to a search query category comprising a product, a service, or a point of interest linked to a particular category path of one or more category paths collected by the processor and stored in the database, wherein the one or more category paths are tied to internet links;
dynamically updating the plurality of session logs by removing each session log from the database after a preset amount of time;
analyzing the query data of the session log of the plurality of session logs to formulate a plurality of groups of synonym candidates;
identifying one or more synonym candidates from the plurality of groups of synonym candidates based on at least the web search engine performing a first search based on a first search query and the web search engine performing a second search based on a second search query within a single session of the plurality of session logs, wherein the first search query was changed to form the second search query during the single session from the plurality of session logs, wherein the first search query and the second search query comprises the user feedback included in the search results and viewed by the user, wherein the first search query and the second search query are configured to form a synonym candidate pair;
determining a number of times the synonym candidate pair appears in a group of synonym candidates of the plurality of groups of synonym candidates:
when the number of times a particular synonym candidate pair appears in the group of synonym candidates exceed a predetermined threshold, the particular synonym candidate pair is retained in the group of synonym candidates; or
when the number of times the particular synonym candidate pair appears in the group of synonym candidates falls below the predetermined threshold, the particular synonym candidate pair is removed from the group of synonym candidates;
selecting a particular group of synonym candidates of the plurality of groups of synonym candidates containing a synonym candidate that matches the search query category of the search query;
filtering the particular group of synonym candidates by causing the processor to:
tie each synonym candidate of the particular group of synonym candidates to a synonym candidate category;
compare the search query category of the search query with a respective synonym candidate category of each of the one or more synonym candidates of the particular group of synonym candidates; and
remove at least one synonym candidate from the particular group of synonym candidates to form the set of synonyms with each synonym in the set of synonyms being tied to a set category that is common with the search query category of the search query;
after filtering the particular group of synonym candidates, identify the set of synonyms remaining to form a final set of synonyms matching the search query;
enter the final set of synonyms matching the search query into the web search engine; and
transmit web search results of the web search engine to be displayed at the user interface of the device of the user, wherein the user selects at least an icon associated with the web search results to access the particular category path of the one or more category paths.

US Pat. No. 10,339,164

DATA EXCHANGE IN A COLLABORATIVE ENVIRONMENT

ROCKWELL AUTOMATION TECHN...

1. An apparatus comprising:a data module that:
receives first data from a first application, the first data representing a project in the first application and corresponding to second data representing a project of a second application, the first data having a structured format readable by the first application, but not readable by the second application, the structured format comprising a semantic language format; and
combines the first data representing the project in the first application in the semantic language format with one or more other data sets representing different projects for applications different from the first application that are formatted using the semantic language format so that the first data and the other data sets comprise a single project structure representing the plurality of different projects;
a conversion module that:
maintains a mapping of identifiers for one or more data objects of the first data to identifiers for one or more corresponding data objects of the second data so that data changes made to the data objects of the first data by the first application are propagated to the corresponding data objects of the second data and data changes made to the data objects of the second data by the second application are propagated to the corresponding data objects of the first data; and
converts, in response to a request from the second application, at least a subset of the data of the single project structure representing the first data from the semantic language format to an intermediate data having a format readable by the second application using the mapping of data object identifiers; and
a synchronization module that synchronizes changes that are made to the intermediate data by the second application with the first data of the single project structure that corresponds to the intermediate data using the mapping of data object identifiers to identify the corresponding data objects of the first data,
wherein at least a portion of the said modules comprises one or more of hardware and executable code, the executable code stored on one or more computer readable storage media.

US Pat. No. 10,339,162

IDENTIFYING SECURITY-RELATED EVENTS DERIVED FROM MACHINE DATA THAT MATCH A PARTICULAR PORTION OF MACHINE DATA

Splunk Inc., San Francis...

1. A method, comprising:analyzing machine data stored in at least one storage device in order to segment the machine data into a plurality of events by identifying a source of the machine data, selecting a rule from a plurality of rules based on the identified source, the rule identifies event boundaries in machine data from the identified source, and segmenting the machine data into the plurality of events by determining a beginning and ending of each event in the plurality of events in the machine data using the rule, the machine data related to security aspects of one or more information technology systems;
extracting a particular portion of machine data from an event in the plurality of events using an extraction rule that defines how to locate the particular portion of machine data in the event;
identifying, in the plurality of events, one or more other events that include the particular portion of machine data;
wherein the method is performed by one or more computing devices.

US Pat. No. 10,339,161

EXPANDING NETWORK RELATIONSHIPS

International Business Ma...

1. A method, said method comprising:executing, by a processor of a data processing system, a similarity based clustering algorithm to generate clusters of user profiles, each cluster comprising a group of users of a plurality of users in an electronic community, each cluster representing a relationship between the users in each group that each cluster comprises, wherein relationships between the users in the clusters are non-static and change over time, and wherein interconnections or relationships in the clusters result in time-changing potential interactions among the users;
said processor displaying, on a display device, the relationships between the users in the clusters as hyperlinks that dynamically change over time on the display device in response to the relationships between the users in the clusters dynamically changing over time; and
said processor storing each cluster in a user profile and relationship database,
wherein the similarity based clustering algorithm comprises a member importance function and a member similarity function,
wherein said executing the similarity based clustering algorithm comprises: ascertaining, by the member importance function, an importance value of keywords as a depth of the keywords in a semantic hierarchical tree,
wherein said executing the similarity based clustering algorithm comprises: ascertaining, by the member similarity function, a similarity distance between keywords as a path distance between the keywords in the semantic hierarchical tree, and
wherein said executing the similarity based clustering algorithm comprises: using the member importance function and the member similarity function to ascertain the clusters.

US Pat. No. 10,339,157

HIVE TABLE LINKS

Facebook, Inc., Menlo Pa...

1. A method, comprising:receiving a data query from a tenant assigned to a first virtual data warehouse included in a plurality of virtual data warehouses located within a multi-tenancy data warehouse, wherein the first virtual data warehouse is a database part of a first physical data center,
wherein the tenant is associated with multiple namespaces, wherein the data query identifies a first namespace of the multiple namespaces, wherein the multiple namespaces are mapped to the multi-tenancy data warehouse, wherein the multi-tenancy data warehouse corresponds to a physical data warehouse, and wherein the first virtual data warehouse is included in a first physical data center;
generating a set of information, based on the data query, indicating data the tenant is authorized to access within the multi-tenancy data warehouse;
receiving a declaration from the tenant to utilize a subset of the data which the tenant can access as indicated by the set of information;
determining whether the subset of the data is in a second physical data center that is different from the first physical data center;
in response to determining the subset of the data is in a second physical data center different from the first physical data center, caching the subset of the data from the second physical data center in the first physical data center and generating a link identifying a set of parameters for retrieving the data, wherein the set of parameters comprises a time range of data to be retrieved;
importing data that is outside of the first virtual data warehouse using the link;
preventing access, by the first namespace using a two-part name syntax, to a second virtual warehouse by the first virtual data warehouse, wherein the second virtual data warehouse is included in the plurality of virtual data warehouses;
monitoring utilization of the data outside of the first virtual data warehouse;
determining the utilization of the data only includes data from a smaller time range; and
updating the set of parameters so that the link only retrieves the data from the smaller time range.

US Pat. No. 10,339,156

SYSTEMS AND METHODS TO ENABLE USERS TO INTERACT WITH REMOTELY MANAGED DOCUMENTS WITH A SINGLE INTERACTION USING LOCALLY STORED DOCUMENTS

Open Text SA ULC, Halifa...

1. A content management system for editing files stored on a remote content management server comprising;a client computing device, including a processor and a non-transitory computer readable medium comprising instructions for:
accessing a content management server browser interface configured to enable users to view and manage files stored by a content management server and configure hyperlinks for corresponding files stored by the content management server, each hyperlink including an e-tag that enables a content management server to identify the corresponding file as stored by the content management server;
a sync agent deployed on the client computing device coupled over a network to the content management server, wherein the client computing device includes a file system, a first local cache associated with the content management system and a first user in the file system of the client computing device and a second local cache associated with the content management system and a second user in the file system of the client computing device, each local cache including a content management cache and wherein each local cache is associated with a corresponding content management database on the client computing device, wherein the sync agent, in response to a single first user action by the first user relative to one of the hyperlinks referencing a first selected file, is configured to automatically download the first corresponding file stored at the content management server, and store the first corresponding file and the corresponding first e-tag together in the first local cache associated with the content management system and the first user, and in response to a single second user action by the second user relative to one of the hyperlinks referencing a second selected file, is configured to automatically download the second corresponding file stored at the content management server, and store the second corresponding file and the corresponding second e-tag together in the second local cache associated with the content management system and the second user; and
an edit client control module of the content management system deployed on the client computing device and coupled to the sync agent, wherein the edit client control module, in response to the same first single user action relative to one of the hyperlinks referencing the first selected file, configured to automatically launch an editing application which is further configured to automatically open the first selected file stored in the first local cache.

US Pat. No. 10,339,155

METHOD AND SYSTEM FOR DATA HANDLING

KING.COM LTD., St. Julia...

1. A method of migrating data between a first database location and a second database location of a computer implemented database, said method being implemented in at least one server, the method comprising:storing in at least one memory in said at least one server, a look-up table comprising respective location values of a plurality of data collections stored in said computer implemented database, wherein a respective location value indicates a respective first location within the computer implemented database where an associated data collection is stored, wherein when access to a respective data collection is required, a look up request is performed with respect to the look up table for the respective location value for said respective data collection;
storing by at least one processor, in the look-up table, an indicator for each of said data collections being migrated in response to initiation of a respective data migration process of one or more of said data collections from a respective first database location to a respective second database location, said indicator being
changeable between a first state and a second state, the first state being indicative of the initiation of the data migration process,
receiving a look up request for a location of a data collection;
determining that the indicator for the data collection for which the look up request has been received is in the first state and in response changing the indicator for that data collection from the first state to the second state; and
at an end of a data migration process for a given data collection, either updating the location value of a respective data collection in the look-up table to indicate the second database location if the indicator is in the first state or retaining the location value indicating the first database location if the indicator is in the second state.

US Pat. No. 10,339,154

DECENTRALIZED IMAGE MANAGEMENT

SAP SE, Walldorf (DE)

1. A non-transitory computer-readable medium to store instructions, which when executed by a computer, causes the computer to:receive a request for retrieving an image;
based upon the request, identify a metadata related to the image;
determine one or more layers of the image from the metadata;
determine one or more nodes storing the one or more layers of the image;
retrieve the one or more layers of the image from at least one of the determined one or more nodes;
generate the image using the retrieved one or more layers of the image; and
send the generated image as a response to the request,
wherein the one or more layers of the image and the metadata of the image are generated upon:
receiving a request for creating the image;
based upon the request, identifying one or more executable and configurable components of the image as the one or more layers of the image;
storing each of the one or more layers of the image as a file;
generating a hash address for the each of the one or more files;
packaging the one or more files as an image file with a hash address representing the image; and
generating a meta file including the metadata of the image indicating information about the one or more layers of the image and the hash addresses of the image and its one or more layers.

US Pat. No. 10,339,152

MANAGING SOFTWARE ASSET ENVIRONMENT USING COGNITIVE DISTRIBUTED CLOUD INFRASTRUCTURE

INTERNATIONAL BUSINESS MA...

1. A method for performing an extract-transform-load (ETL) process, comprising:collecting load information about a volume and a complexity of raw data to be processed during the ETL process;
receiving an expected completion time of the ETL process and execution information about (i) hardware resources and (ii) an influence of the hardware resources on an execution time of the ETL process;
calculating, by a processor, resources for a distributed processing software infrastructure to be used to perform the ETL process, by applying a statistical method to the load information, the expected completion time, and the execution information;
dynamically assigning cloud resources corresponding to and based on the calculated resources, in accordance with the expected completion time; and
performing the ETL process on the raw data using the assigned cloud resources and storing results of the ETL process in a database.

US Pat. No. 10,339,151

CREATING FEDERATED DATA SOURCE CONNECTORS

Red Hat, Inc., Raleigh, ...

1. A method comprising:translating, using a federated data source connector for a particular type of data source, a set of federated queries submitted to a federated data source server into a set of native data source queries for the particular type of data source;
inputting the set of native data source queries for the particular type of data source into a component corresponding to the particular type of data source, the component comprising a directed graph having a group of nodes to represent the set of native data source queries;
marking, by a processing device, the component in view of inputting the set of native data source queries into the component, wherein the marked component indicates whether the federated data source connector for the particular type of data source comprises an error;
generating first output indicating whether one or more queries of the set of native data source queries is not acceptable as input for the marked component, wherein the first output indicates whether the federated data source connector for the particular type of data source comprises an error; and
generating second output comprising a list of unsupported queries of the marked component, the list of unsupported queries comprising the one or more queries of the set of native data source queries that are not acceptable as input for the marked component.

US Pat. No. 10,339,150

SCALABLE DYNAMIC ACRONYM DECODER

Capital One Services, LLC...

1. A system, comprising:a computer processor; and
a memory storing instructions which when executed by the processor to cause the processor to:
receive an authentication request from a first user interface of a plurality of user interfaces;
authenticate credentials for an account received in the authentication request;
receive a query specifying a search term comprising an acronym, the query received via the first user interface;
provide, by a load balancer based on a current load, the query to a first virtual machine instance of a plurality of virtual machine instances, each virtual machine instance providing an instance of a database management system (DBMS) comprising a database;
receive, by the first virtual machine instance via an application programming interface (API), contextual data associated with the account, the contextual data comprising indications of a role of a user and membership of the user within an organizational unit;
generate, by the first virtual machine instance, a context vector comprising elements describing the account based on the received contextual data;
process, by the DBMS of the first virtual machine instance, the query against the database to generate a result set, the query processed based at least in part on: (i) matching the elements of the context vector and a plurality of content tags applied to each of a plurality of entries in the database, and (ii) comparing the acronym in the query to the plurality of entries in the database;
compute, by the DBMS of the first virtual machine instance, a score for each result in the result set based on a machine learning (ML) model and the context vector;
order, by the DBMS of the first virtual machine instance, the results in the result set based on the computed scores;
return, by the DBMS of the first virtual machine instance, the ordered results of the result set as responsive to the query, each result in the ordered result set comprising a respective definition for the acronym, the ordered result set outputted for display via the first user interface;
receive classification data comprising a subset of the plurality of content tags, the subset comprising manually added content tags;
receive learning data describing use of the plurality of user interfaces by a plurality of users, the learning data comprising: (i) a frequency of use of each of the plurality of user interfaces, (ii) a type of each query received via the plurality of user interfaces, (iii) the role of the users submitting queries via the plurality of user interfaces, and (iv) the organizational units the users submitting queries are members of;
generate at least one new content tag for at least one of the plurality of entries in the database by a ML algorithm based on the classification data, the learning data, and the ML model; and
apply the generated at least one new content tag to the at least one of the plurality of entries in the database.

US Pat. No. 10,339,149

DETERMINING AND PROVIDING QUANTITY OF UNIQUE VALUES EXISTING FOR A FIELD

SPLUNK Inc., San Francis...

1. A method, comprising:receiving a query for searching a set of field searchable events stored in a data store, the set of field searchable events indicative of security or performance aspects of one or more information technology systems;
executing the query against the set of field searchable events to generate a subset of events;
identifying a field that exists in one or more events of the subset of events;
determining a number corresponding to how many unique values exist for the field among the subset of events;
causing concurrent display of (i) the number corresponding to how many unique values exist for the field and (ii) a field name by which the field can be referenced in queries, thereby improving the performance and efficiency of communicating information from complex search results to a user;
wherein the method is performed by one or more computing devices.

US Pat. No. 10,339,148

CROSS-PLATFORM COMPUTER APPLICATION QUERY CATEGORIES

Microsoft Technology Lice...

1. A computer system comprising:at least one processor; and
memory comprising instructions stored thereon that when executed by at least one processor cause at least one processor to perform acts for cross-platform application query categorization, with the acts comprising:
performing a category stamping technique that uses the computer system's searching capability in searching for computer applications associated with a first set of one or more computer application platforms to improve the computer system's searching capability in searching for computer applications associated with a second set of one or more computer application platforms, with the category stamping technique comprising:
accessing a plurality of computerized category application queries;
retrieving a limited first set of computerized search engine results from running the queries, with the limited first set of results being limited to applications associated with the first set of one or more application platforms, with the first set of one or more application platforms being one or more platforms that is each a computing platform that is configured to run computer applications;
identifying categories associated with applications referenced in the limited first set of results;
generating computerized category stamps for the queries, with the generating of the category stamps comprising, for each of the queries, generating and comparing scores that are based at least in part upon quantities of applications in the limited first set of results that are associated with each of a plurality of available categories;
retrieving a limited second set of computerized search engine results from running the queries, with the limited second set of results being limited to applications associated with the second set of one or more application platforms, with the second set of one or more application platforms being one or more application platforms that is each a computing platform that is configured to run computer applications and is different from the first set of one or more application platforms, and with the limited second set of results being limited, for each of the queries, to applications in a category corresponding to a category stamp for that query, with the category stamp for that query being one of the generated category stamps; and
for each of the queries, generating a computerized application list for the query using the limited second set of search engine results, with the application list comprising references to applications from the limited second set of search engine results for that query.

US Pat. No. 10,339,147

DATA SET SCORING

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:analyzing a first characteristic of a data set using a set of rules to evaluate suitability for machine learning models, the first characteristic being independent of data values in the data set and representing a quality of the data values;
assigning a first characteristic score to the first characteristic using the set of rules;
analyzing a second characteristic of the data set using the set of rules;
assigning a second characteristic score to the second characteristic using the set of rules;
assigning a data set score to the data set based on the first and second characteristic scores;
ranking the data set as suitable to use with a machine learning model against a plurality of other data sets based on at least one of the first characteristic score, the second characteristic score or the data set score;
receiving a search request for data sets suitable for the machine learning model, which match a query received from a client device; and
providing, using an electronic page, the data set and the plurality of other data sets for access by the client device through the electronic page based in part on the ranking and in response to the search request to compare the quality of the data set against the plurality of other data sets;
providing a uniform resource locator (URL) for the data set to the client device after one or more data sets are selected from the electronic page, wherein the URL includes authentication credentials; and
verifying the authentication credentials in the URL to determine access to the data set, in response to receipt of the URL.

US Pat. No. 10,339,146

DEVICE AND METHOD FOR PROVIDING MEDIA RESOURCE

SAMSUNG ELECTRONICS CO., ...

1. A display device for providing a media resource, the display device comprising:a processor configured:
to extract text information from each of a plurality of media resources included in a background media resource DB,
to acquire at least one respective feature word of each corresponding one of the plurality of media resources based on the extracted text information,
to generate a feature word weight matrix which includes a respective first weight of each of the at least one respective feature word,
to determine whether a current media resource is not included in the background media resource DB,
to calculate a clustering similarity between each of the plurality of media resources included in the background media resource DB and the current media resource, which is being accessed by a user, by using the feature word weight matrix, and
to display a media resource recommendation list which includes at least one media resource based on the calculated clustering similarity,
wherein the processor is further configured, when a determination is made that the current media resource is not included in the background media resource DB, to acquire at least one feature word of the current media resource based on text information extracted from the current media resource and to include a respective first weight of each of the acquired at least one feature word of the current media resource in the feature word weight matrix of the current media resource which includes the respective first weight of each of the acquired at least one feature word of the current media resource.

US Pat. No. 10,339,144

SEARCH OPERATION ADJUSTMENT AND RE-SCORING

Google LLC, Mountain Vie...

1. A method performed by data processing apparatus, the method comprising:receiving queries, each received query received from a corresponding user device and for each received query:
receiving data indicating resources identified by a search operation as being responsive to the query and ranked according to a first order, each resource having a corresponding search score by which the resources are ranked in responsiveness to the query relative to the other resources identified by the search operation as being responsive to the query, wherein the search operation scores each of the resources based, in part, on features of the resource and the query;
selecting a set of the resources;
determining, from the set of the resources and for each of the features of the resources and the query, a respective impact measure that measures the impact of the feature on the ranking, for the query and relative to historical queries stored in a query log based on a scoring contribution of the feature for the query relative to scoring contributions of the feature for the historical queries, of the resources that belong to the set;
determining that at least one respective impact measure for at least one of the features of the resources and the query meets a corresponding impact measure threshold;
in response to a determination that at least one respective impact measure for the at least one of the features of the resources and the query meets the corresponding impact threshold, re-scoring the resources for the query in the set of the resources based, in part, on the impact measures and ranking the set of the resources according to a second order that is different from the first order;
and providing, to the user device in response to the query, search results according to the second order, each search result identifying a corresponding resource.

US Pat. No. 10,339,143

SYSTEMS AND METHODS FOR RELATION EXTRACTION FOR CHINESE CLINICAL DOCUMENTS

Koninklijke Philips N.V.,...

1. A system, including one or more electronic processors configured to:receive a cardiology note;
identify and annotate a section within the cardiology note;
identify and annotate a sentence within the section;
extract a grammatical structure of the sentence;
determine words in the sentence;
map the words to concepts; and
based on both: (i) the grammatical structure of the sentence, and (ii) the concepts, generate an entity-feature-value (EFV) triple, the EFV triple including:
an entity;
a feature including a property of the entity; and
a value of the feature;
wherein the EFV triple is configured to be used as a search term to access the cardiology note in a clinical database, and the one or more electronic processors are further configured to:
provide the EFV to the clinical database; and
search the clinical database with the search term to find the cardiology note, wherein the search is restricted by a section header:
wherein:
the entity is a child linked to a parent;
the child is a specific portion of an anatomical site; and
the one or more electronic processors are further configured to find the parent by tracing back from the child.

US Pat. No. 10,339,142

WINDOW MANAGEMENT IN A STREAM COMPUTING ENVIRONMENT

International Business Ma...

1. A computer program product for window management in a stream computing environment, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, the program instructions executable by a processor to cause the processor to perform a method comprising:receiving a stream of tuples to be processed by a set of processing elements which operates on a set of computer nodes;
detecting in real-time a set of tuples that correspond to a window of a stream computing environment, wherein the set of tuples has a set of data;
processing using the set of processing elements on the set of computer nodes the stream of tuples;
determining in real-time based on the set of data of the set of tuples, a confidence factor related to a set of expected result data for the set of tuples that correspond to the window of the stream computing environment;
configuring in real-time, based on a set of operator data of a set of stream operators, the window in the stream computing environment to process the stream of tuples;
determining, based on a set of downstream operator data of a downstream operator of the set of stream operators, a threshold confidence for utilization to configure the window in the stream computing environment to process the stream of tuples;
comparing the confidence factor with the threshold confidence;
resolving that the confidence factor exceeds the threshold confidence; and
closing, in response to resolving that the confidence factor exceeds the threshold confidence, the window.

US Pat. No. 10,339,141

DETECTING AT LEAST ONE PREDETERMINED PATTERN IN STREAM OF SYMBOLS

The Regents of the Univer...

1. An apparatus comprising:pattern matching circuitry to detect instances of at least one predetermined pattern of symbols within a subject stream of symbols, wherein the pattern matching circuitry comprises:
a plurality of pattern automaton units configured to operate in parallel on corresponding bit portions of a group of one or more adjacent symbols, each pattern automaton unit configured to output a partial match value indicating, based on the corresponding bit portion, which of one or more query conditions representing said at least one predetermined pattern are potentially satisfied by the group of adjacent symbols; and
combining circuitry to combine the partial match values generated by a set of pattern automaton units operating on the same group of adjacent symbols to generate a match value indicating any query condition for which the same query condition is determined as potentially satisfied by all of said set of pattern automaton units;
encoding circuitry to generate an encoded stream of symbols in dependence on an input stream of symbols, wherein the encoding circuitry is configured to map a number of consecutive repetitions of a same pattern of one or more symbols detected within the input stream to a single instance of a symbol of the encoded stream and a corresponding repetition indicator indicative of said number of consecutive repetitions of said same pattern detected in said input stream of symbols; and
control circuitry to control the pattern matching circuitry to process the encoded stream of symbols generated by the encoding circuitry as the subject stream.

US Pat. No. 10,339,140

DATABASE SEARCH DEVICE, DATABASE SEARCH METHOD, AND PROGRAM

NEC Corporation, Tokyo (...

1. A database search device comprising:a search command separating unit that separates an input search command into a plurality of atomic formulas,
wherein each of the plurality of atomic formulas is indicated by a logical product of an external conjunction, which is indicated by a logical product of a plurality of first atomic formulas that can be executed in a predetermined database, and an internal atomic formula, which is indicated by a combination of negation, a logical product, or a logical sum of a plurality of second atomic formulas that cannot be executed in the predetermined database, and
wherein the search command separating unit converts the input search command into a partitioned sum-product standard formula that is indicated by a logical sum of the plurality of atomic formulas;
a cipher embedding unit replaces the first atomic formula that exists in the input search command with an encryption search procedure, and sends the encryption search procedure to the predetermined database, wherein the predetermined database executes a processing corresponding to the input search command to get a pre-search result;
a cipher decryption unit decrypts the pre-search result received from the predetermined database; and
a search command execution unit executes the second atomic formulas on the pre-search result received from the predetermined database, and provides a search result for the input search command.

US Pat. No. 10,339,139

COMPUTER SYSTEM AND METHODS FOR PERFORMING DATA-DRIVEN COORDINATION

Cornell University, Itha...

1. A computer implemented method for performing data-driven coordination of a transaction, comprising the steps of:providing at least two queries as an entangled query in extended Structured Query Language (SQL) in the form {C}H:?B, wherein B represents a body of the entangled query specifying conditions on data source relations from a WHERE clause, H represents a head of the entangled query corresponding to a SELECT INTO clause, and C represents a postcondition of the entangled query specifying conditions on answer relations from the WHERE clause;
identifying one or more disconnected and independent query sets from the entangled query, wherein each query set excludes any query whose postcondition C unifies with the head H of two or more other queries;
determining a coordination structure based on automatically matching the head and the postcondition of each query in each of the one or more query sets to obtain one or more answerable query sets;
constructing one or more sets of combined queries based on the one or more answerable query sets;
forwarding the one or more sets of combined queries to one or more data sources to obtain one or more candidate answers of the combined queries;
evaluating one or more candidate answers of the combined queries to obtain one or more result answers; and
returning the one or more result answers, wherein the one or more result answers satisfy the head and postcondition of each query of the at least two queries.

US Pat. No. 10,339,138

SYSTEM AND A METHOD FOR DETERMINING AN INDEX OF AN OBJECT IN A SEQUENCE OF OBJECTS

ADVANCED DIGITAL BROADCAS...

1. A computer-implemented method for determining an index of an object in a sequence of objects, the method comprising the steps of:obtaining a unique identifier value of a given object O;
obtaining a query definition Q of a sequence, the Q query including an order definition according to a parameter of the O object;
constructing a Q? query based on the Q query, the Q? query being different from the Q query by having a reversed ordering of results, with respect to the Q query, and providing results having said parameter value of objects preceding or matching the parameter value of the object O in the sequence of objects in the Q query result set;
executing the Q? query by a query execution engine;
checking whether the object O is matched exactly with the first item in Q? result set and in case it is not matched, requesting one object at position P and one object at position P +1, the position P being the position of an object from Q result set corresponding to the first item of Q? result set;
and in case the Q? result set is empty, choosing an object at the first position in Q result set as the closest one to the object O;
in case only one of the requested objects is available, choosing the object at the last position of Q result set as the closest one to the object O;
in case both objects at position P and position P +1 are available, determining which of these objects is closer with respect to the object O and choosing this object as the closest object;
and - determining the index of the selected closest object in Q sequence as the index of the closest object to the O object.

US Pat. No. 10,339,137

SYSTEM AND METHOD FOR CACHING AND PARAMETERIZING IR

Futurewei Technologies, I...

1. A method comprising:receiving, by a database, a first query;
parsing, by the database, the first query to obtain a plan tree comprising a plurality of plan nodes arranged in hierarchical order descending from a top plan node;
generating, by the database, first node intermediate representations (IRs) for the plan nodes;
parameterizing, by the database, the first node IRs to replace one or more constants or tuple attributes in bodies of the first node IRs each with a respective parameter;
combining, by the database, the parameterized first node IRs to obtain a first module for the first query;
executing, by the database, the first query using the first module;
receiving, by the database, a second query;
generating, by the database, second node IRs for the second query;
parameterizing, by the database, the second node IRs to replace one or more constants or tuple attributes in bodies of the second node IRs each with a respective parameter;
matching, by the database, one or more of the parameterized first node IRs each with a corresponding one of the parameterized second node IRs, the matching parameterized first node IRs differing from the corresponding parameterized second node IRs in the respective parameters for each;
reusing, by the database, the parameterized first node IRs to obtain a second module for the second query, the second module being compiled from the matching parameterized first node IRs and unmatched parameterized second node IRs; and
executing, by the database, the second query using the second module.

US Pat. No. 10,339,136

INCREMENTAL SKEWNESS CALCULATION FOR BIG DATA OR STREAMED DATA USING COMPONENTS

1. A computing-system-implemented method for generating a skewness for data elements in a modified computation subset, the method comprising:initializing, by a computing-device-based computing system, a sum or an average or both for a pre-modified computation subset of a data set on at least one of one or more storage media or a data stream accessible by the computing-device-based computing system, one or more other components of a skewness for the pre-modified computation subset, and a computation subset size counter n(n?10) which specifies a number of data elements in the pre-modified computation subset;
accessing or receiving, by the computing-device-based computing system, a data element to be added to the pre-modified computation subset;
modifying, by the computing-device-based computing system, the pre-modified computation subset by:
adding the accessed or received data element to the pre-modified computation subset; and
modifying the computation subset size counter;
incrementally deriving, by the computing-device-based computing system, a sum or an average or both for the modified computation subset;
directly incrementally deriving, by the computing-device-based computing system and based at least in part on the one or more components of the skewness other than a sum and an average initialized or derived for the pre-modified computation subset, one or more components of a skewness other than a sum and an average for the modified computation subset, wherein the incrementally deriving includes:
accessing the one or more components of the skewness other than a sum and an average for the pre-modified computation subset without accessing all data elements in the modified computation subset to reduce data accessing latency thereby saving computing resources and reducing the computing-device-based computing system's power consumption; and
adding any contribution of the added data element to each of the accessed components mathematically without using all data elements in the modified computation subset in order to reduce the number of operations performed by the computing-device-based computing system thereby increasing calculation efficiency; and
generating, by the computing-device-based computing system, a skewness for the modified computation subset based on one or more of the incrementally derived components.

US Pat. No. 10,339,135

QUERY HANDLING IN SEARCH SYSTEMS

INTERNATIONAL BUSINESS MA...

1. A method for handling queries, comprising:extracting keywords related to a first query from one or more information sources;
classifying the keywords according to a plurality of categories defined by a query schema;
combining a plurality of the keywords into a second query according to the query schema; and
executing the second query to generate one or more results.

US Pat. No. 10,339,134

SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA FOR GENERATING NORMALIZATION CANDIDATES FOR A SEARCH QUERY

WALMART APOLLO, LLC, Ben...

1. A system for generating normalization candidates for a first search query, the system comprising:one or more non-transitory memory storage systems storing computing instructions configured to run on one or more computer processors;
a database for storing a plurality of session logs with each session log including query data; and
the one or more computer processors in communication with the database and configured to execute the computing instructions causing the one or more computer processors to:
analyze the query data of the plurality of session logs to generate a plurality of sets of query reformulations for each of a plurality of search queries;
select a first set of the plurality of sets of query reformulations containing a normalization candidate that matches the first search query;
filter the first set of the plurality of sets of query reformulations, as selected, comprising query reformulations of the plurality of sets of query reformulations that appear more than a pre-determined number of times in the plurality of session logs, the query reformulations comprising the normalization candidates that match the first search query, the normalization candidates comprising the normalization candidate;
tie each of the normalization candidates of each of the first set of the plurality of sets of query reformulations, as selected, to a respective category;
compare respective categories of the normalization candidates of the each of the first set of the plurality of sets of query reformulations;
remove at least one query reformulation from the first set of the plurality of sets of query reformulations when the respective category of one of the normalization candidates in the at least one query reformulation is uncommon with the respective categories of other ones of the normalization candidates;
upon removing the at least one query reformulation from the first set of the plurality of sets of query reformulations, transmit the first set of the plurality of sets of query reformulations, as revised, to a web search engine to replace the first search query; and
store the normalization candidates of the first set of the plurality of sets of query reformulations remaining in the first set of the plurality of sets of query reformulations in the database.

US Pat. No. 10,339,133

AMORPHOUS DATA PREPARATION FOR EFFICIENT QUERY FORMULATION

INTERNATIONAL BUSINESS MA...

1. A method for amorphous data preparation, the method comprising:selecting a normalized form of representing a set of data cubes, wherein the set of data cubes includes a first data cube from a first data source and conforming to first data representation, and a second data cube from a second data source and conforming to a second data representation, and wherein the normalized form selects a third data representation to represent the data of each data cube in the set;
applying a transformation to the first data cube to represent the first data cube using the third data representation to create a normalized first data cube;
creating, responsive to creating the normalized first data cube, a set of metadata elements corresponding to the normalized first data cube, wherein an element in the set of metadata is configured to indicate a precision of a part of a query, the precision of the part of the query being an estimate of precision achievable using a data entity from the normalized first data cube in the query;
saving the normalized first data cube and the metadata of the normalized first data cube in a data store
receiving, from the first data source, a change to the first data cube, the change comprising changed data, the changed data forming a changed first data cube;
detecting the normalized first data cube in the data store;
creating an additional normalized first data cube using the changed data, such that the additional normalized first data cube conforms to the third data representation;
saving the additional normalized first data cube in the data store such that the data store includes both the normalized first data cube and the additional normalized first data cube; and
presenting a visual representation of the normalized first data cube and a visual representation of the metadata in a visual environment for constructing the query, wherein the query uses the normalized first data cube.

US Pat. No. 10,339,132

FLOW CONTROL TECHNIQUE FOR EOS SYSTEM

NetApp, Inc., Sunnyvale,...

1. A method comprising:receiving a write request directed towards a storage container, the write request having data, the write request processed at a storage system having a memory and a processor, the storage system attached to a storage array;
creating a first transaction at a client process of the storage system, the first transaction having an operation to store the data, the operation including a transaction identifier (ID);
sending the first transaction to a server process of the storage system;
incrementing a number of pending transactions;
processing the first transaction at the server process, the first transaction stored to a first log maintained in the memory by the server process, wherein the data is stored on the storage array;
sending a first reply for the first transaction from the server process to the client process;
determining at the client process whether the number of pending transactions exceeds a threshold;
in response to determining that the number of pending transactions exceeds the threshold, sending by the client process a second transaction to the server process, the second transaction including the transaction ID; and
in response to receiving the second transaction at the server process, removing the first transaction from the first log and checkpointing un-replied and unacknowledged transactions in the first log to a checkpoint file stored on the storage array.

US Pat. No. 10,339,130

DIVERSE ADDRESSING OF GRAPH DATABASE ENTITIES BY DATABASE APPLICATIONS

Microsoft Technology Lice...

1. A computer-readable medium having contents configured to cause a computing system to perform a method for addressing nodes in a graph database, the method comprising:receiving from a first application a first indication that it treats a first property as a unique identifier;
receiving from a second application distinct from the first application a second indication that it treats a second property distinct from the first property as a unique identifier;
from the first application, receiving a first update request for a distinguished entity, the distinguished entity identified in the first update request by its value for the first property;
in response to receiving the first update, determining that the distinguished entity is identified in the first update request by its value for the first property by accessing a stored mapping from (1) the identity of the first property and (2) the first update request's value for the first property to a distinguished internal identifier that identifies the distinguished entity;
performing the first update request with respect to the distinguished entity;
from the second application, receiving a second update request for the distinguished entity, the distinguished entity identified in the second update request by its value for the second property;
in response to receiving the second update, determining that the distinguished entity is identified in the second update request by its value for the second property by accessing a stored mapping from (1) the identity of the second property and (2) the second update request's value for the second property to the distinguished internal identifier; and
performing the second update request with respect to the distinguished entity.