US Pat. No. 10,169,721

INJECTION MOLDING CONTROLLER INTERFACE WITH USER-ADJUSTABLE VARIABLES

IMFLUX, INC., Hamilton, ...

1. A method of retrofitting an injection molding machine, the method comprising:retrofitting an injection molding machine with a retrofit controller, the injection molding machine including a native controller adapted to control operation of the injection molding machine;
entering a learning mode of at least one of the native controller or the retrofit controller to calculate an initial load value of the injection molding machine based on a first set of operating parameters;
calculating a modified load value of the injection molding machine by operating the injection molding machine based on a second set of operating parameters;
generating a reference load curve based on at least the first set of operating parameters and the second set of operating parameters;
entering an operational mode of the retrofit controller; and
using the retrofit controller, selectively operating the injection molding machine such that an operational load value of the injection molding machine remains at or below the reference load curve.

US Pat. No. 10,169,719

USER CONFIGURABLE MESSAGE ANOMALY SCORING TO IDENTIFY UNUSUAL ACTIVITY IN INFORMATION TECHNOLOGY SYSTEMS

INTERNATIONAL BUSINESS MA...

1. A method for identifying unusual activity in an information technology (IT) system based on user configurable message anomaly scoring, the method comprising:receiving, by a processing device, a message stream for the IT system;
selecting a plurality of status messages from the message stream that correspond to an interval of time;
determining a default message anomaly score for each status message of the plurality of the status messages of the interval, wherein the default message anomaly scores are generated by IT equipment of the IT system and are included in the plurality of status messages received from the IT equipment;
calculating, by the processing device, an interval anomaly score for the interval by at least performing the following for each status message of the plurality of status messages of the interval:
determining whether the default message anomaly score of the status message corresponds to a message anomaly group comprising a custom scoring group having a custom message anomaly score, wherein the custom message anomaly score of the message anomaly group is received by the processing device as an input from a system expert during training of a model of a historical message stream;
upon determining that the default message anomaly score of the status message corresponds to the message anomaly group having the custom message anomaly score, adding the custom message anomaly score to an interval anomaly score for the interval; and
upon determining that the default message anomaly score of the status message does not correspond to the message anomaly group having the custom message anomaly score, adding the default message anomaly score of the status message to the interval anomaly score for the interval;
identifying a priority level of the interval by comparing the interval anomaly score to one or more priority level cutoffs, wherein the one or more priority level cutoffs are established based on the trained model; and
generating an alert for the selected plurality of status messages of the interval only when the identified priority level of the interval meets the one or more priority level cutoffs based on the comparison, wherein the alert flags the interval such that only the selected plurality of status message of the message stream are transmitted to the system expert.

US Pat. No. 10,169,718

SYSTEM AND METHOD FOR DEFINING AND USING DIFFERENT LEVELS OF GROUND TRUTH

International Business Ma...

1. A computer-implemented method comprising:receiving, by a computing device, a first set of ground truth instances from a first source;
receiving a second set of ground truth instances from a second source;
weighting the first and second sets of ground truth instances differently based on a level of trust associated with each of the first and second sources; and
applying the weighted first and second sets of ground truth instances in a machine learning task executed by a computer, wherein applying the weighted first and second sets of ground truth instances in the machine learning task includes adjusting a loss function for at least one of the first and second sets of ground truth instances based upon, at least in part, the level of trust associated with each of the first and second sources, and at least one of a mean squared error and duplication of instances for the first set of ground truth instances over that of the second set of ground truth instances, wherein the first set of ground truth instances are more trusted than the second set of ground truth instances, and wherein a model is created by the duplication of instances for the first set of ground truth instances in a model data set to create a more effective model by more thoroughly reflecting more trusted data.

US Pat. No. 10,169,717

SYSTEM AND METHOD FOR DEFINING AND USING DIFFERENT LEVELS OF GROUND TRUTH

International Business Ma...

1. A computer program product residing on a non-transitory computer readable storage medium having a plurality of instructions stored thereon which, when executed by a processor, cause the processor to perform operations comprising:receiving a first set of ground truth instances from a first source;
receiving a second set of ground truth instances from a second source;
weighting the first and second sets of ground truth instances differently based on a level of trust associated with each of the first and second sources; and
applying the weighted first and second sets of ground truth instances in a machine learning task executed by a computer, wherein applying the weighted first and second sets of ground truth instances in the machine learning task includes adjusting a loss function for at least one of the first and second sets of ground truth instances based upon, at least in part, the level of trust associated with each of the first and second sources, and at least one of a mean squared error and duplication of instances for the first set of ground truth instances over that of the second set of ground truth instances, wherein the first set of ground truth instances are more trusted than the second set of ground truth instances, and wherein a model is created by the duplication of instances for the first set of ground truth instances in a model data set to create a more effective model by more thoroughly reflecting more trusted data.

US Pat. No. 10,169,716

INTERACTIVE LEARNING

INTERNATIONAL BUSINESS MA...

1. A method for shared machine learning, comprising:providing a model to a plurality of agents comprised in a machine learning system, the model specifying attributes and attribute value data types for an event in which the plurality of agents act;
receiving agent-provided inputs from the plurality of agents during an instance of the event, the agent-provided inputs include estimated attribute values that are consistent with the attribute value data types;
determining expertise weights for at least one of the plurality of agents in response to at least one ground-truth which is learned from the estimated attribute values; and
determining an estimate value for one or more of the attributes using adaptive mixtures of the estimated attribute values.

US Pat. No. 10,169,715

FEATURE PROCESSING TRADEOFF MANAGEMENT

Amazon Technologies, Inc....

1. A system, comprising:one or more computing devices configured to:
determine, via one or more programmatic interactions with a client of a machine learning service of a provider network, (a) one or more target variables to be predicted using a specified training data set, (b) one or more prediction quality metrics including a particular prediction quality metric, and (c) one or more prediction run-time goals including a particular prediction run-time goal;
identify a set of candidate feature processing transformations to derive a first set of processed variables from one or more input variables of the specified data set, wherein at least a subset of the first set of processed variables is usable to train a machine learning model to predict the one or more target variables, and wherein the set of candidate feature processing transformations includes a particular feature processing transformation;
determine (a) a quality estimate indicative of an effect, on the particular prediction quality metric, of implementing the particular candidate feature processing transformation, and (b) a cost estimate indicative of an effect, on a particular run-time performance metric associated with the particular prediction run-time goal, of implementing the particular candidate feature processing transformation;
generate, based at least in part on the quality estimate and at least in part on the cost estimate, a feature processing proposal to be provided to the client for approval, wherein the feature processing proposal includes a recommendation to implement the particular feature processing transformation; and
in response to an indication of approval from the client, execute a machine learning model trained using a particular processed variable obtained from the particular feature processing transformation.

US Pat. No. 10,169,714

MODULAR ARRAY OF VERTICALLY INTEGRATED SUPERCONDUCTING QUBIT DEVICES FOR SCALABLE QUANTUM COMPUTING

INTERNATIONAL BUSINESS MA...

1. A quantum device comprising:a first substrate including a first set of locations;
a second substrate including a second set of locations; and
qubit chips having a first end positioned at the first set of locations and having a second end positioned at the second set of locations, wherein at least one of the qubit chips is configured to be removable.

US Pat. No. 10,169,713

REAL-TIME ANALYSIS OF PREDICTIVE AUDIENCE FEEDBACK DURING CONTENT CREATION

International Business Ma...

1. A method for providing and utilizing predictive feedback during content creation in real-time comprising:obtaining demographic data for profile generation from a viewer profile database;
receiving, by a server computer via a network adapter or interface from a user-computing device, an author-created electronic document during creation of the electronic document in real-time, the electronic document selected from a group consisting of a text file, a video file, and an audio file;
receiving, by the server computer, an intended audience specification for the received electronic document;
receiving, by the server computer from the user-computing device, a similarity score threshold;
calculating by the server computer a similarity score for a plurality of viewer profiles, the viewer profiles generated via obtaining of the demographic data and a viewer profile member assay via each viewer wearing one or more wearable sensors while consuming sample digital content;
determining by the server computer which viewer profiles have similarity score equal to or exceeding the similarity score threshold and storing the determined viewer profiles;
calculating by the server computer an individual interest level and an individual emotional response of the determined viewer profiles for a portion of the received electronic document by presentation of a graphic user interface, the individual interest level indicating a level of interest each viewer profile of the determined viewer profiles is likely to express regarding the portion of the received electronic document and the individual emotional response indicting indicating an emotional response anticipated for the portion of the electronic document for each viewer profile of the determined viewer profiles;
transmitting, by the server computer to the user-computing device, the individual interest level and the individual emotional response of the determined viewer profiles, weighting the individual interest level and individual emotional response of the determined viewer profiles according to the similarity score; and
modifying automatically by the server computer in real-time the portion of the received electronic document to improve the individual interest level of the determined viewer profiles and the individual emotional response of the determined viewer profiles by automatically altering objectionable language by the server computer including text, if the received electronic document is the text file, or by automatically bleeping out offensive words by the server computer if the received electronic document is the video file or the audio file.

US Pat. No. 10,169,712

DISTRIBUTED, PREDICTIVE, DICHOTOMOUS DECISION ENGINE FOR AN ELECTRONIC PERSONAL ASSISTANT

Telepathy IP Holdings, G...

1. A method comprising:receiving on a personal electronic device an environmental input from a user;
if the environmental input cannot be fully processed on the personal electronic device, the personal electronic device forwarding the environmental input to a remote device via a communication link while registering input from the user, processing the environmental input on the remote device, and the remote device returning a response for processing on the personal electronic device based on the environmental input; and
if the environmental input can be fully processed on the personal electronic device, fully processing the environmental input on the personal electronic device.

US Pat. No. 10,169,710

AUTOMATED DECISION SUPPORT PROVENANCE AND SIMULATION

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for supporting a decision making process, comprising:generating, by at least one computer, a graph that represents a decision making process, the graph comprising a plurality of nodes and a plurality of edges connecting the nodes, the nodes representing local decisions contributing to a global decision of the decision making process, each node associated with one or more parameters used for modeling the local decision represented by the node, each edge associated with one or more parameters used for defining a relationship between two nodes connected by the edge;
simulating, by the at least one computer, the graph based at least in part on the parameters of the nodes and edges to derive an output global decision of the decision making process;
receiving a change to at least one of the parameters for at least one of the nodes and edges of the graph from a user; and
simulating the graph based at least in part on the at least one changed parameter to determine that the output global decision of the decision making process changes.

US Pat. No. 10,169,706

CORPUS QUALITY ANALYSIS

International Business Ma...

1. A method, in a data processing system comprising a processor and a memory, the memory comprising instructions executed by the processor to specifically configure the processor to implement a corpus quality analysis system for corpus quality analysis, the method comprising:applying, by the corpus quality analysis system, at least one filter to a candidate corpus to determine a degree to which the candidate corpus supplement existing corpora for performing a natural language processing (NLP) operation, wherein the at least one filter comprises a first filter to determine whether documents in the candidate corpus contain NLP features known to be helpful for performing the NLP operation, wherein applying the first filter comprises:
extracting a set of the most frequent NLP features from a combination of the current corpora and candidate corpus;
examining evidence and candidate answers for questions answered correctly and incorrectly using the combination of the current corpora and candidate corpus;
determining a set most effective features from the set of the most frequent NLP feature using a machine learning model based on the evidence and candidate answers;
determining a number of the set of most effective features that are present in the candidate corpus; and
comparing the number of the set of most effective features that are present in the candidate corpus to the set of prerequisites for adding the candidate corpus to the existing corpora;
responsive to a determination to add the candidate corpus to the existing corpora based on a result of applying the at least one filter, adding, by the corpus quality analysis system, the candidate corpus to the existing corpora to form modified corpora; and
performing, by a question answering system executing in the data processing system, the NLP operation using the modified corpora.

US Pat. No. 10,169,705

SYSTEM, METHOD, AND RECORDING MEDIUM FOR GEOFENCE FILTERING

INTERNATIONAL BUSINESS MA...

1. A geofence filtering system comprising:a user location monitoring circuit configured to monitor a pinpoint location of a user and a boundary location of the user;
a geofence determining circuit configured to determine a plurality of geofences that overlap with the boundary location of the user, the plurality of geofences being stored in a database; and
a cognitive filtering and ranking circuit configured to filter the plurality of geofences that overlap with the boundary location of the user according to a set of behavioral measures of the user over a period of time mapped to a set of feature nodes and vectors, feature nodes and vectors corresponding to the behavioral measures' representations in a lower dimensional feature space, the mapped data being used to identify an emergence of a certain cognitive state over the period of time as a representation of the user's total behavior.

US Pat. No. 10,169,704

ARTIFICIALLY INTELLIGENT COMMUNICATION GENERATION IN COMPLEX COMPUTING NETWORKS

Research New Group, Inc.,...

1. An apparatus for artificially intelligent (AI) communication generation by traversing routes of a graph in a complex computing network, the intelligent communication generation being used for determining whether an input signal has desired signal attributes, the intelligent communication generation and the traversing of the graph being rooted in computing technology, the apparatus comprising:a signal communication interface for:
establishing a first connection to a first input signal system;
receiving, from the first input signal system, a first desired signal attribute and a second desired signal attribute;
establishing a second connection to a second input signal system;
receiving, from the second input signal system, a first input signal;
establishing a third connection to a third input signal system;
accessing a graph stored at the third input signal system, the graph comprising a plurality of signal attributes and routes between at least some of the signal attributes in the plurality of signal attributes;
transmitting communications to a first computing device associated with the first input signal; and
receiving responses to the communications from the first computing device associated with the first input signal;
a signal sensor for:
sensing a first signal attribute associated with the first input signal;
a memory for storing instructions for execution by a signal processor; and
the signal processor for:
determining the first signal attribute is equivalent to the first desired signal attribute;
determining, for the first input signal, a second signal attribute not sensed by the signal sensor, the second signal attribute being equivalent to the second desired signal attribute;
generating a first communication for transmission to the first computing device;
determining, based on a first response to the first communication, an intermediary signal attribute for the first input signal;
generating, based on a route connecting, either directly or indirectly, the intermediary signal attribute with the second signal attribute on the graph, a second communication for transmission to the first computing device; and
determining, based on a second response to the second communication, that the second signal attribute is associated with the first input signal.

US Pat. No. 10,169,703

SYSTEM AND METHOD FOR ANALOGY DETECTION AND ANALYSIS IN A NATURAL LANGUAGE QUESTION AND ANSWERING SYSTEM

International Business Ma...

1. A method, in an information handling system comprising a processor and a memory, for evaluating an analogical pattern, the method comprising:applying, by the system, natural language processing to an information source to identify a first analogical pattern comprising a subject term, a first verb phrase, a comparator term, a second verb phrase, and an object term;
applying, by the system, deep analysis to refine the first analogical pattern terms based on semantic analysis into corresponding entities, ontology, and characteristics, thereby forming metadata for the first analogical pattern;
generating, by the system, interpretations of different combinations of the first analogical pattern terms and the metadata;
scoring, by the system, each interpretation for each of the different combinations; and
selecting a first interpretation exceeding a predetermined threshold for interpretation of the analogical pattern, thereby evaluating the first analogical pattern.

US Pat. No. 10,169,702

METHOD FOR SEARCHING RELEVANT IMAGES VIA ACTIVE LEARNING, ELECTRONIC DEVICE USING THE SAME

HTC Corporation, Taoyuan...

1. A method of searching relevant images via active learning, adapted for a mobile electronic device comprising a plurality of stored images, comprising:obtaining a query image comprising a first subject and a second subject, wherein the query image initiates a process of searching a plurality of relevant images;
learning a query concept based on content information of the query image by:
sampling a plurality of first sample images from the stored images according to the content information of the query image, wherein the content information is extracted from content-related metadata of the query image;
providing the first sample images for selection, wherein the first sample images comprising an image having the first subject, an image having the second subject, and an image having both the first and second subjects;
obtaining a first selected image selected from the first sample images; and
determining the content information of the first selected image as the query concept;
refining the query concept based on context information of the first selected image extracted from context-related metadata by:
sampling a plurality of second sample images from the stored images according to context information of the first selected images for selection;
obtaining a second selected image selected from the second sample images; and
determining the context information of the second selected image as the query concept in addition to the content information of the first selected image; and
searching the relevant images among the stored images according to the query concept and grouping the relevant images into a collection album.

US Pat. No. 10,169,701

NEURON PERIPHERAL CIRCUITS FOR NEUROMORPHIC SYNAPTIC MEMORY ARRAY BASED ON NEURON MODELS

International Business Ma...

1. A neuromorphic memory system comprising:a plurality of neuromorphic memory arrays, each of the neuromorphic memory arrays including rows and columns of neuromorphic memory cells;
a column of postsynaptic circuits, each of the postsynaptic circuits electrically coupled to a plurality of postsynaptic spike timing dependent plasticity (STDP) lines, each of the postsynaptic STDP lines coupled to a row of neuromorphic memory cells at a respective memory array of the memory arrays;
a column of summing circuits, each of the summing circuits electrically coupled to a plurality of postsynaptic leaky integrate and fire (LIF) lines, each of the postsynaptic LIF lines coupled to the row of neuromorphic memory cells at the respective memory array, each of the summing circuits providing a sum of signals from the postsynaptic LIF lines to a respective postsynaptic circuit of the postsynaptic circuits.

US Pat. No. 10,169,700

NEUROMORPHIC NETWORK COMPRISING ASYNCHRONOUS ROUTERS AND SYNCHRONOUS CORE CIRCUITS

International Business Ma...

1. A method comprising:at a scheduler for a core circuit of a neural network including a plurality of hardware core circuits:
receiving one or more address-event packets that are asynchronously communicated between the core circuits via a plurality of asynchronous routers;
decoding each of the one or more address-event packets;
storing one or more spikes decoded from the one or more address-event packets into a memory of the scheduler, wherein each spike is scheduled for delivery in a future time step; and
in response to receiving a synchronization signal indicating occurrence of a time step:
reading, from the memory, one or more spikes scheduled for delivery in the time step; and
sending the one or more spikes scheduled for delivery in the time step to one or more electronic axons of the core circuit;
wherein each core circuit comprises a processing circuit configured for processing and integrating spikes delivered to electronic axons of the core circuit;
wherein the synchronization signal is distributed to the core circuits simultaneously to synchronize processing of spikes at the core circuits; and
wherein the asynchronous routers operate at a clock speed that is faster than the core circuits.

US Pat. No. 10,169,699

COGNITIVE INTERACTIVE ELEVATOR ASSISTANT

International Business Ma...

1. A computer system for providing an interactive elevator assistant, comprising:one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, wherein the computer system is capable of performing a method comprising:
identifying a plurality of amenities associated with a property, and identifying a plurality of location-based features within a vicinity outside of the property, wherein identifying a plurality of amenities comprises querying a database to identify the plurality of amenities, querying a first application to identify the plurality of amenities, and receiving a plurality of property information from an administrator via a user interface;
wherein the identified plurality of amenities are located on the property;
wherein the identified plurality of location-based features are located within a vicinity outside of the property;
mapping the plurality of identified amenities to one or more floor levels associated with the property;
storing the plurality of identified and mapped amenities;
receiving user input from a user located on an elevator associated with the property;
in response to determining that the received user input comprises at least one amenity associated with the stored plurality of identified and mapped amenities, determining the one or more floor levels on the property that are associated with the at least one amenity and triggering the elevator to navigate to the determined one or more floor levels;
in response to determining that the received user input comprises at least one location-based feature associated with the plurality of location-based features within the vicinity outside of the property, sending the received user input to a second application for processing; and
providing a response to the user on the elevator based on the determined one or more floor levels and the processed received user input via the first application and the second application, wherein the response comprises at least one of an audible acknowledgement of the determined one or more floor levels that the elevator is triggered to navigate to, and an audible application response based on the received application response.

US Pat. No. 10,169,696

RFID SYSTEM FOR CHECKING MEDICAL ITEMS

OSCL CORPORATION LIMITED,...

1. A RFID system for checking medical items comprising:a processor;
a first RFID reader connected with the processor;
a second RFID reader connected with the processor;
a first antenna connected to the first RFID reader and covering a first coverage area;
a second antenna connected to the second RFID reader and covering a second coverage area;
a first tray disposed in the first coverage area;
a second tray disposed in the second coverage area; and
a plurality of RFID tags being respectively attached to a plurality of medical items;
wherein the RFID tags are configured to store identification codes that respectively and uniquely correspond to the medical items that the RFID tags are attached to;
the first RFID reader only reads the identification codes of the medical items from the RFID tags through the first antenna and send the identification codes to the processor before a surgical operation, the second RFID reader only reads the identification codes of the medical items from the RFID tags through the second antenna and send the identification codes to the processor after the surgical operation;
the first tray is adapted to load the medical items before the surgical operation, the second tray is adapted to load at least one of the medical items moved from the first tray during the surgical operation;
the first coverage area and the second coverage area are mutually exclusive;
wherein the processor stores a first predetermined standard list of the medical items to be loaded in the first tray before the surgical operation, and a second predetermined standard list of the at least one of the medical items to be loaded in the second tray during the operation, and wherein the processor generates a list of missing medical items and a warning after determining that a sum of total numbers of the medical items in the first tray and the second tray after the operation are not identical with a total number of the medical items in the first tray before the operation; and
wherein the first and second trays are open trays.

US Pat. No. 10,169,695

REMOVABLE MARKING ELEMENT WITH ACCESS CREDENTIALS

VISA INTERNATIONAL SERVIC...

1. A method comprising:a) obtaining, by a mobile device, a non-transactable product identifier by obtaining a machine readable code associated with a removable marking element adapted to adhere to skin, wherein the removable marking element includes an integrated circuit that is configured to transmit a first transactable access credential associated with a first account over a wireless communication channel to an access device during a transaction, the removable marking element being in the form of a temporary tattoo; and
b) transmitting, by the mobile device, to a server computer, a message comprising the non-transactable product identifier, a value, and a second transactable access credential associated with a second account, wherein the server computer identifies the first account based on the non-transactable product identifier, and wherein the server computer loads the first account with the value from the second account.

US Pat. No. 10,169,691

COVERT COATING FOR AUTHENTICATION OF MATERIALS

Spectra Systems Corporati...

1. A security feature for authenticating an article comprising:at least one emitter material that generates a visible broad range emission within an emission band in response to a first excitation; and
at least one absorber material that upon exposure to said first excitation absorbs a non-visibly detectable portion of said broad range emission and upon exposure to a second excitation within said emission band and at a wavelength different than said first excitation absorbs a different non-visibly detectable portion of said broad range emission creating a non-visibly detectable spectral response shift in said broad emission range,
wherein said non-visibly detectable shift in spectral response is a machine detectable shift in a spectral characteristic of said emission.

US Pat. No. 10,169,690

COMMUNICATION DEVICE THAT COMMUNICATES WITH EXTERNAL DEVICE, CONTROL METHOD FOR THE SAME, AND STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. A communication device that utilizes an internet protocol (IP) address for data communication with an external device, the communication device comprising:a display device; and
at least one processor configured to control the display device so as to display a QR image including an IPv4 address of the communication device when the IPv4 address of the communication device is to be used by the communication device for data communication,
wherein when the IPv4 address of the communication device is not to be used by the communication device for data communication and an IPv6 address of the communication device is to be used by the communication device for data communication, the display device does not display a QR image including the IPv6 address of the communication device so that the external device does not obtain the IPv6 address of the communication device from the communication device.

US Pat. No. 10,169,689

WIRELESS IC DEVICE, CLIP-SHAPED RFID TAG, AND ARTICLE HAVING RFID TAG

MURATA MANUFACTURING CO.,...

1. A wireless IC device comprising:an object including a metal body;
a loop conductor including a first loop end and a second loop end;
an RFIC element including a first terminal electrode and a second terminal electrode respectively connected to the first loop end and the second loop end; and
a connection conductor including a first end and a second end respectively connected to the loop conductor and the object; wherein
a loop surface of the loop conductor extends along a surface of the object.

US Pat. No. 10,169,688

METHOD OF ENHANCING QUALITY OF IMAGE OBJECT INCLUDED IN COMPOUND DOCUMENT AND APPARATUS FOR PERFORMING THE METHOD

S-Printing Solution Co., ...

1. A method of enhancing quality of an image object included in a compound document comprising two or more types of objects, the method comprising:receiving a printing command to print the compound document, the printing command including a plurality of divided raster commands corresponding to the image object;
merging the plurality of divided raster commands corresponding to the image object;
assigning a group identification (ID) to a group of the merged raster commands;
applying an image enhancement algorithm to the merged raster commands;
re-dividing the merged raster commands;
assigning group information comprising the group ID, a number of commands included in the group, and positions of the re-divided raster commands in the group, to raster commands that are re-divided from the merged raster commands;
encoding data corresponding to the printing command by using a printer control language (PCL); and
outputting the encoded data.

US Pat. No. 10,169,687

PRINTING APPARATUS, PRINTING SYSTEM, AND PRINTING METHOD

Canon Kabushiki Kaisha, ...

1. A printing apparatus that can print an image of a printing target on a medium having a predetermined shape, the printing apparatus comprising at least one processor, the at least one processor control:a determination unit configured to determine whether or not predetermined processing in accordance with the predetermined shape is executed on the image of the printing target;
an execution unit configured to execute the predetermined processing on the image of the printing target in a case where the determination unit determines that the predetermined processing is not executed on the image of the printing target; and
a printing unit configured to print the image of the printing target on which the predetermined processing is executed by the execution unit on the medium having the predetermined shape,
wherein, in a case where the determination unit determines that the predetermined processing is executed on the image of the printing target, the printing unit prints the image of the printing target in which the determination unit determines that the predetermined processing is executed and also on which the predetermined processing is not executed by the execution unit.

US Pat. No. 10,169,685

AUTOMATIC SEGMENTATION AND QUANTITATIVE PARAMETERIZATION OF BRAIN TUMORS IN MRI

The Regents of the Univer...

1. A method for processing a magnetic resonance imaging (MRI) image, comprising:preprocessing the MRI image to correct distortions;
performing, after the preprocessing, a preliminary segmentation of the MRI image to assign a tissue label of a set of tissue labels to one or more preliminary volumes of voxels of the MRI image;
comparing each voxel of the MRI image with the one or more preliminary volumes of voxels with an assigned tissue label and assigning each voxel of the MRI image a probability of being associated with each tissue label of the set of tissue labels; and
assigning each voxel of the MRI image a tissue label according to its greatest probability among probabilities for each voxel being associated with the set of tissue labels,
wherein the comparing and assigning is performed using a classifier trained on a subject-by-subject basis that segments each patient according to his or her own subject-specific classifier by using both intensity and spatial data from each voxel, and
wherein a weighted random sampling of the one or more preliminary volumes of voxels of the MRI image is used to train the classifier such that weights for sampling reflect a relative distribution of voxels assigned to tissue labels from preliminary segmentation.

US Pat. No. 10,169,684

METHODS AND SYSTEMS FOR RECOGNIZING OBJECTS BASED ON ONE OR MORE STORED TRAINING IMAGES

IntelliVision technologie...

1. An object recognition system, comprising of:a processor;
a non-transitory storage element coupled to the processor;
encoded instructions stored in the non-transitory storage element,
wherein the encoded instructions when implemented by the processor, configure the object recognition system to:
generate a signature for an input image of an object by an image signature generation unit, wherein the image signature generation unit is further comprising of:
a feature detection unit configured to detect one or more feature points in the input image; and
a feature description unit configured to compute a description for each feature point of the one or more the feature points, wherein the feature description unit is further configured to:
identify a dominant gradient direction in a region around the feature point, wherein an angle of the dominant gradient direction is ?;
center a patch around the feature point, wherein the patch is tilted at the angle ?;
divide the patch in R segments;
compute a vector of length N for each segment of the R segments, wherein the vector is computed based on a horizontal gradient (dx) and a vertical gradient (dy) corresponding to each pixel in the segment;
compute a consolidated vector of length R*N by consolidating vectors computed for all the R segments; and
compute a byte vector of length R*N, wherein the byte vector is computed by normalizing the consolidated vector, wherein the byte vector is the description of the feature point;
whereby, the signature of the input image comprises the description corresponding to each of the one or more feature points in the input image;
store the set of training images in a data storage, wherein each training image of the set of training images is associated with one or more training feature descriptors, the data storage further comprising:
an index mapping unit configured to create an index mapping based on training feature descriptors; and
identify a matching image of the set of training images by a search engine comparing the signature of the input image with the training feature descriptors using the index mapping.

US Pat. No. 10,169,683

METHOD AND DEVICE FOR CLASSIFYING AN OBJECT OF AN IMAGE AND CORRESPONDING COMPUTER PROGRAM PRODUCT AND COMPUTER-READABLE MEDIUM

Thomson Licensing, Issy ...

1. A method for classifying an object of a current image, a plurality of first landmarks representative of the shape of said object being associated with the current image, a first unique identifier being associated with each first landmark, the method comprising:for at least a first landmark selected among the plurality of first landmarks, obtaining at least a first descriptor describing an area of the current image comprising said at least first selected landmark,
said at least first landmark being selected when its first identifier corresponds to a second identifier of a second landmark, a second descriptor of which being used in a classifier for classifying said object, wherein said classifier is an iterative classifier implementing a plurality of iterations, wherein, from the second iteration, each iteration uses the result of the previous iteration; and
determining information representative of confidence of said shape according to said at least first descriptor and according to weighting information associated with said second descriptor.

US Pat. No. 10,169,681

QUALITY CONTROL OF IMAGE REGISTRATION

Koninklijke Philips N.V.,...

1. An imaging quality control system, comprising:an imaging quality controller operable to execute an image processing of subject image data of an anatomical object,
wherein the image processing is at least one of a non-segmentation-based image registration and a segmentation-based image registration,
wherein the imaging quality controller is further operable to assess an accuracy of the image processing of the subject image data of the anatomical object as a function of a subject Eigen weight set relative to a training Eigen weight range set,
wherein the subject Eigen weight set is derived from the subject image data of the anatomical object, and
wherein the training Eigen weight range set is derived from multiple training image data of the anatomical object; and
a monitor in communication with the imaging quality controller to display an assessment of the accuracy of the image processing of the subject image data of the anatomical object by the imaging quality controller.

US Pat. No. 10,169,677

COUNTING STACKED INVENTORY USING IMAGE ANALYSIS

Amazon Technologies, Inc....

1. A computing system, comprising:a processor; and
a memory coupled to the processor and storing program instructions that when executed by the processor causes the processor to at least:
receive from a first camera a first image of an inventory location, wherein the first image includes a representation of a plurality of inventory items vertically stacked and located at the inventory location;
determine from an inventory location data store, an item type corresponding to the inventory location;
select a first histogram of oriented gradients (“HOG”) model and a second HOG model, wherein:
the first HOG model corresponds to the item type and is representative of a first vertical stack of a first quantity of an item of the item type;
the second HOG model corresponds to the item type and is representative of a second vertical stack of a second quantity of the item of the item type, wherein the first quantity and the second quantity are different;
process the first image to generate an inventory item feature vector representative of the plurality of inventory items vertically stacked and represented in the first image;
compare the inventory item feature vector with the first HOG model and the second HOG model;
determine that the inventory item feature vector substantially matches the first HOG model; and
in response to a determination that the inventory item feature vector substantially matches the first HOG model, determine an inventory item count representative of a number of inventory items vertically stacked at the inventory location to be the first quantity.

US Pat. No. 10,169,673

REGION-OF-INTEREST DETECTION APPARATUS, REGION-OF-INTEREST DETECTION METHOD, AND RECORDING MEDIUM

Canon Kabushiki Kaisha, ...

1. A region-of-interest detection apparatus comprising:a memory; and
a processor in communication with the memory, the processor configured to provide:
a segmentation unit configured to segment an input image into a plurality of partial regions;
a background region setting unit configured to set a background region in the input image;
an overlap region setting unit configured to set a plurality of overlap regions each corresponding to a region in which one of the partial regions and the background region overlap each other, and calculate a region feature amount of each of the overlap regions;
a foreground level calculation unit configured to calculate a foreground level indicating a possibility of a foreground based on the region feature amount of each of the overlap regions and a pixel feature amount of each of a plurality of pixel positions in the input image, the foreground level being calculated for each of the plurality of pixel positions;
a saliency calculation unit configured to, based on the feature amount of each of the plurality of pixel positions and a feature amount of a portion around each of the plurality of the pixel positions, calculate a saliency indicating a degree of saliency of each of the plurality of pixel positions; and
a detection unit configured to detect a region of interest based on the foreground level and the saliency of the position.

US Pat. No. 10,169,671

FACE DETECTION WITH TEMPERATURE AND DISTANCE VALIDATION

Motorola Mobility LLC, C...

1. A method comprising:receiving an image captured by an image capturing device;
processing the image for characteristics associated with a presence of at least one candidate face with a spatial dimension; and
in response to receiving, from the image characteristics, an initial confidence value indicating the presence of a candidate face:
detecting at least one of (i) a distance from the image capturing device to the candidate face and (ii) a temperature of the candidate face;
determining, based on the detected at least one of the distance to and the temperature of the candidate face and using known biometric characteristics of a human face, whether the candidate face is a validated candidate face;
in response to determining that the candidate face is a validated candidate face, increasing a confidence value assigned to the candidate face to a higher confidence value assigned as a final confidence value;
in response to determining that the candidate face is not a validated candidate face, decreasing the confidence value assigned to the candidate face to a lower confidence value assigned as the final confidence value;
determining whether the final confidence value is above a threshold value; and
in response to the final confidence value being above the threshold value, performing at least one action selected from among a group comprising at least one of (i) adjusting camera image controls and (ii) enabling a face recognition security component.

US Pat. No. 10,169,670

STROKE EXTRACTION IN FREE SPACE

International Business Ma...

1. A method for stroke extraction in free space utilizing a paired ring device and a paired display device including a video recording module connected to the paired display device, the method comprising:receiving, by one or more computer processors, a video from the video recording module of a free space environment;
determining, by one or more computer processors, one or more bounded surface areas within the video of the free space environment, with each bounded surface area including at least two dimensions of space;
displaying, by one or more computer processors, on the paired display device, a modified free space environment including the determined one or more bounded surface areas;
receiving, by one or more computer processors, one or more images transmitted from the paired ring device, wherein the one or more images are transcribed sequentially from one or more language movements recorded by the paired ring device utilizing a magnitude value and a direction value of proper acceleration of the one or more language movements, and wherein the one or more images include one or more of a plurality of vector points, a plurality of coordinates, and a plurality of dots interconnected by a plurality of lines;
determining, by one or more processors, at least one of the one or more language movements crossed at least one side of at least one bounded surface area of the one or more bounded surface areas;
responsive to determining that at least one of the one or more language movements crossed at least one side of at least one bounded surface area of the one or more bounded surface areas, providing, by the one or more processors, haptic feedback to the paired ring device;
inputting, by one or more computer processors, the one or more images into a character training model;
mapping, by one or more computer processors, the one or more images into one or more characters in the character training model, wherein mapping includes determining whether the one or more images indicate at least one of the one or more characters in the character training model utilizing a pre-determined range of motion of the paired ring device during a time period of movement in free space, where the pre-determined range of motion creates a specific image; and
responsive to a determination that the one or more images indicate at least one of the one or more characters in the character training model, transcribing, by one or more computer processors, the at least one of the one or more characters into a digital document, wherein the digital document is a visual augmentation for displaying in a heads up display of the paired display device.

US Pat. No. 10,169,669

DRIVING ASSISTANCE APPARATUS AND DRIVING ASSISTANCE METHOD

DENSO CORPORATION, Kariy...

1. A driving assistance apparatus that assists in driving of an own vehicle, the driving assistance apparatus comprising:a sign recognizer, using a processor, that recognizes a traffic sign from an image captured by an on-board imaging apparatus;
a notification executer, using the processor, that notifies a driver of information indicated by the traffic sign recognized by the sign recognizer; and
a change determiner, using the processor, that determines whether or not the own vehicle is making a lane change, wherein
the notification executer notifies the driver of destination lane information that is information for a traffic lane to which the own vehicle is moving, if the change determiner determines that the own vehicle is making a lane change while the own vehicle is traveling on a road in which different traffic signs are provided among traffic lanes;
the notification executer notifies the driver of, as the destination lane information, information indicated by a traffic sign for the traffic lane to which the own vehicle is moving, if the change determiner determines that the own vehicle is making a lane change and the sign recognizer recognizes the traffic sign for the traffic lane to which the own vehicle is moving; and
the notification executer notifies the driver of, as the destination lane information, information indicated by a traffic sign in a position closest to the own vehicle, among traffic signs recognized by the sign recognizer, if the change determiner determines that the own vehicle is making a lane change and the sign recognizer does not recognize a traffic sign for the traffic lane to which the own vehicle is moving.

US Pat. No. 10,169,668

DRIVING ASSISTANCE APPARATUS AND DRIVING ASSISTANCE METHOD

DENSO CORPORATION, Kariy...

1. A driving assistance apparatus that assists in driving of an own vehicle, the driving assistance apparatus comprising:a processor;
a memory;
a sign recognizing unit that recognizes, via the processor, a traffic sign from an image captured by an on-board imaging apparatus, the traffic sign corresponding to a road on which the own vehicle is travelling; and
a notification executing unit that notifies a driver, via the processor, of sign information that is information indicated by the traffic sign recognized by the sign recognizing unit, the sign information being stored in the memory, wherein
the notification executing unit stops notifying the driver of the sign information that was stored in the memory based on an indication that the own vehicle is changing roads, the indication based on a vehicle speed of the own vehicle and operating information of a turn indicator of the own vehicle under a condition that the driver is being notified of the sign information.

US Pat. No. 10,169,664

RE-IDENTIFYING AN OBJECT IN A TEST IMAGE

International Business Ma...

1. A method of re-identifying a first object in a first test image, the method comprising steps of:during a testing mode subsequent to a completion of a training mode, a computer receiving the first test image and subsequently determining respective measures of similarity between the first test image and each of first training images captured by a first camera by (i) estimating a foreground region and a background region of the first test image by segmenting the first test image into segments by using normalized cuts on the first test image in which the first object is centered, the foreground region being initialized using first segments that lie in a center of the first test image and the background region being initialized using second segments that do not lie in the center of the first test image and (ii) determining Bhattacharyya distances between feature representations of the estimated background region of the first test image and respective feature representations of background regions of the first training images, the first test image being captured by the first camera during the testing mode;
based in part on the Bhattacharyya distances and subsequent to the first test image being captured by the first camera, the computer transforming the first test image which results in a transformed first test image having a brightness that (1) is different from a brightness of the first test image captured by the first camera and (2) matches a brightness of training images captured by a second camera during the training mode, so that an appearance of the transformed first test image resembles an appearance of a capture of the first test image by the second camera, the transformed first test image including the first object which is in the first test image which was captured by the first camera;
the computer performing comparisons between the transformed first test image and each of test images captured by the second camera;
based on the comparisons between the transformed first test image and each of the test images captured by the second camera, the computer identifying one of the test images captured by the second camera that is closer in appearance to the transformed first test image than other test images captured by the second camera; and
the computer designating a second object in the identified test image as a re-identification of the first object in the first test image.

US Pat. No. 10,169,663

SCENE CHANGE DETECTION VIA MULTIPLE SENSORS

The Boeing Company, Chic...

1. A method for determining whether a change occurred within a scene, the method comprising:determining, by a computing device, one or more first classification rules based on accessing one or more first references images and first data that classifies pixel groups of the one or more first reference images as types of objects, wherein the one or more first reference images are captured by a first sensor;
determining, by the computing device, one or more second classification rules based on accessing one or more second reference images and second data that classifies pixel groups of the one or more second reference images as types of objects, wherein the one or more second reference images are captured by a second sensor;
classifying, by the computing device, one or more pixel groups of a first image of the scene as respective first objects based on the one or more first classification rules;
classifying, by the computing device, one or more pixel groups of a second image of the scene as respective second objects based on the one or more second classification rules; and
based on the classification of the one or more pixel groups of the first image as the respective first objects and the classification of the one or more pixel groups of the second image as the respective second objects, determining, by the computing device, whether the change occurred within the scene.

US Pat. No. 10,169,661

FILTERING METHODS FOR VISUAL OBJECT DETECTION

International Business Ma...

1. A method comprising:receiving a set of images;
filtering the set of images using a set of integral filters, resulting in a filtered set of images; and
performing machine-learning based object detection on the filtered set of images to generate a set of object-detected images,
wherein filtering the set of images using the set of integral filters includes:
determining a candidate image region of an image of the set of images, wherein the candidate image region corresponds to a particular modality, wherein the particular modality includes one of: (i) color channels, (ii) contextual background selection, and (iii) pixel intensities,
for the image of the set of images, computing an integral image based on the particular modality,
computing integral image output, including at least an average of pixels of the particular modality, utilizing the computed integral image, and
based, at least in part, on the computed integral image output, removing the candidate image region from the image, wherein the image no longer includes the candidate image region.

US Pat. No. 10,169,660

COUNTING INVENTORY ITEMS USING IMAGE ANALYSIS

Amazon Technologies, Inc....

1. A computing system, comprising:a processor; and
a memory coupled to the processor and storing program instructions that when executed by the processor cause the processor to at least:
receive from a first camera a first image of an inventory location, wherein the first image includes a representation of a plurality of inventory items located at the inventory location;
determine from an inventory location data store, an item type corresponding to the inventory location;
segment the first image into a plurality of image segments;
select a first histogram of oriented gradients (“HOG”) model for a first image segment of the plurality of image segments and a second HOG model for a second image segment of the plurality of image segments, wherein:
the first HOG model corresponds to the item type and is representative of a second image of an item of the item type obtained at a first distance or at a first item orientation;
the second HOG model corresponds to the item type and is representative of a third image of the item of the item type obtained at a second distance or at a second orientation;
process the first image to:
generate a first plurality of inventory item feature vectors corresponding to the first image segment, and
generate a second plurality of inventory item feature vectors corresponding to the second image segment;
compare the first plurality of inventory item feature vectors with the first HOG model;
compare the second plurality of inventory item feature vectors with the second HOG model; and
count a number of the first plurality of inventory item feature vectors that are substantially similar to the first HOG model and the number of the second plurality of inventory item feature vectors that are substantially similar to the second HOG model, wherein the count is representative of a quantity of items at the inventory location.

US Pat. No. 10,169,659

VIDEO SUMMARIZATION USING SELECTED CHARACTERISTICS

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:receiving video data;
determining that a first video frame of the video data includes a first representation of a first face and a second representation of a second face;
determining first image data including the first representation of the first face;
determining second image data including the second representation of the second face, the second image data corresponding to the first video frame of the video data;
determining a distance between the first representation and the second representation;
determining that the distance exceeds a distance threshold;
based at least in part on determining that the distance exceeds the distance threshold, creating a second video frame including the first image data and the second image data, but not including a portion of intervening space, wherein the intervening space is between the first image data and the second image data in the first video frame; and
generating a video summarization including the video data and the second video frame.

US Pat. No. 10,169,658

COMPUTERIZED VIDEO FILE ANALYSIS TOOL AND METHOD

INTERNATIONAL BUSINESS MA...

1. A system for dynamically creating and presenting video content information to a user, the system comprising:at least one processor;
a screen;
non-transient memory that stores program instructions which, when executed by the at least one processor, cause the at least one processor to:
i) load contents of a video file into a video player, for display in a user interface of the video player on the screen;
ii) display frames of the video file in the user interface;
iii) receive, via the user interface, a user's input indicating selection of an object displayed in at least one frame of the video file;
iv) perform an object identification analysis of frames comprising the video file to locate each instance where a specific frame of the video file contains the object;
v) for each specific frame of the video file that contains the object, perform a z-axis analysis of the object within the frame to determine prominence of the object within each specific frame;
vi) store metadata in non-volatile storage associated with the video file, the metadata indicating results of the object identification analysis and, for frames where the object was present, the z-axis analysis; and
vii) automatically generate and display for the video file, on the screen synchronized to the video file, a graphical timeline display for the user graphically reflecting frames of the video file containing the object and object prominence within those frames based upon the metadata.

US Pat. No. 10,169,656

VIDEO SYSTEM USING DUAL STAGE ATTENTION BASED RECURRENT NEURAL NETWORK FOR FUTURE EVENT PREDICTION

NEC Corporation, (JP)

1. A video camera system for video-based safety prediction, the device comprising:an imaging sensor configured to capture one or more video sequences in an environment having a plurality of safety concerns therein; and
a processor configured to:
generate a plurality of driving series based on a plurality of observations from the one or more video sequences;
generate predictions of one or more future events based on the observations using a dual-stage attention-based recurrent neural network (DA-RNN), wherein the DA-RNN includes;
an input attention mechanism to extract relevant driving series, an encoder to encode the extracted relevant driving series into hidden states, a temporal attention mechanism to extract relevant hidden states, and a decoder to decode the relevant hidden states; and
generate a signal for initiating an action to at least one of a plurality of machines to mitigate harm to at least one item.

US Pat. No. 10,169,655

DETECTION OF LOGOS IN A SEQUENCE OF VIDEO FRAMES

ARRIS Enterprises LLC, S...

1. One or more computer-readable storage media containing instructions which, when executed by the one or more processors performs a method, comprising:buffering N frames of a video program, where N?2;
calculating an absolute difference frame D(n,k) between a first subsequent frame n and each of the buffered frames k by determining an absolute value of a difference between pixel values for corresponding pixels in at least a portion of the first subsequent frame n and each of the buffered frames k;
generating a histogram H(n,k) for each absolute difference frame;
for each histogram H(n,k) calculating a weight w(n,k) based on a distribution in the histogram of the absolute value of the difference between pixel values;
repeating the calculating of the absolute difference frame, the histograms and the weights for at least a second subsequent frame n;
generating an accumulation difference frame A, where
andidentifying a region in the accumulation difference frame as a static graphical logo if an average value of the absolute value of the pixels in the identified region of the accumulation difference frame is below a threshold value.

US Pat. No. 10,169,654

CROWD-SOURCED VISION-BASED INFORMATION COLLECTION

OrCam Technologies Ltd., ...

1. A server-based system for interacting with a plurality of wearable apparatuses each being associated with a different user, the system comprising:a data interface; and
at least one processing device programmed to:
receive, via the data interface and for each of the plurality of wearable apparatuses, a data stream including image-based information associated with images captured by a camera present on a particular wearable apparatus from among the plurality of wearable apparatuses;
analyze the image-based information of the data streams received from each of the plurality of wearable apparatuses to determine at least one trait common to two or more of the different users of the plurality of wearable apparatuses;
determine at least one frequency related to the at least one trait;
store, in at least one database, the determined at least one frequency related to the at least one trait;
store, in the at least one database, information relating to the determined at least one trait; and
report the information relating to the determined at least one trait to at least one user of at least one of the plurality of wearable apparatuses.

US Pat. No. 10,169,653

REGISTERING THE HARVEST OF A RESOURCE USING IMAGE DATA AND METADATA

International Business Ma...

1. A method of tagging a resource, comprising:receiving a given number of unique electronic tags for tagging a specified resource;
for a harvested one of the specified resources, generating image data representing an image of the harvested one of the specified resources, and selecting one of the electronic tags for said harvested one of the specified resources;
sending said image data and data identifying said selected one of the electronic tags to a specified entity to register the harvested one of the resources;
generating said given number of unique physical tags for the specified resource; and
attaching said one of the physical tags to the harvested one of the resources; and wherein:
the generating image data representing an image of the harvested one of the resources comprises
including in the image data physical tag data representing one of the physical tags for the harvested one of the resources, and
capturing an image of the harvested one of the resources with said one of the physical tags attached to the harvested one of the resources;
each of the physical tags matches a respective one of the electronic tags; and
the method further comprises comparing the physical tag attached to the harvested one of the resources to the selected one of the electronic tags to determine if the physical tag attached to the harvested one of the resources matches the selected one of the electronic tags.

US Pat. No. 10,169,650

IDENTIFICATION OF EMPHASIZED TEXT IN ELECTRONIC DOCUMENTS

KONICA MINOLTA LABORATORY...

1. A method of identifying emphasized text, the method comprising:performing horizontal compression on an input image to generate a horizontally compressed image, the input image comprising lines of text, each line of text comprising a plurality of words or characters;
performing horizontal morphological dilation on the compressed image to form a horizontally dilated image, the horizontally dilated image comprising clusters, each cluster corresponding to a different one of the lines of text;
calculating a bounding box for each cluster, resulting in a plurality of bounding boxes;
calculating a first average density, the first average density calculated across all the bounding boxes;
for each of the bounding boxes, comparing the first average density to a density of the bounding box; and
identifying a specific bounding box, from among the plurality of bounding boxes, as having a word or character in bold, the identifying based on the comparison of the first average density to the density of the specific bounding box.

US Pat. No. 10,169,647

INFERRING BODY POSITION IN A SCAN

International Business Ma...

1. A method for inferring body position in a medical-imaging scan, the method comprising:accessing a two-dimensional digital image generated by a medical-imaging device, wherein the image represents a cross-sectional view of a subject's body at a position along an axis of the subject's body;
deriving from the accessed image a set of pixel-intensity feature vectors and a set of learned feature vectors,
wherein each of the pixel-intensity feature vectors and each of the learned feature vectors is an n-tuple that represents characteristics of the accessed image as an ordered list of numbers,
wherein the set of pixel-intensity feature vectors comprises at least one vector that represents characteristics of the accessed image derived from relationships among intensities of pixels of the accessed image,
wherein the set of learned feature vectors comprises at least one vector that represents characteristics of the accessed image selected from output of an internal layer of a convolutional neural network, and
wherein a first layer of the convolutional neural network has been populated with a digital representation of the accessed image;
submitting the set of pixel-intensity feature vectors and the set of learned feature vectors to a support-vector machine;
receiving from the support-vector machine a candidate image label for each submitted feature vector, wherein each candidate image label identifies a position of the subject's body along the axis; and
generating a single image label of the accessed image by mathematically combining the received candidate image labels,
wherein the mathematically combining comprises solving a linear equation, and wherein the linear equation comprises regression coefficients selected as a function of a pretraining of the convolutional neural network and further as a function of a pretraining of the support-vector machine.

US Pat. No. 10,169,646

FACE AUTHENTICATION TO MITIGATE SPOOFING

APPLIED RECOGNITION INC.,...

1. A security platform comprising:an image capture device configured to detect a user within a field of view of a camera;
a processor configured to:
provide an electronic prompt to request the user to perform a sequence of one or more position requests, each position request defined by a change in pitch and yaw;
trigger the image capture device to capture a sequence images of the user performing the sequence of one or more position requests, the sequence images capturing pitch and yaw movements of the user;
generate a series of face signatures for the sequence of images of the user performing the sequence of the one or more position requests;
compare the generated series of face signatures to stored face signatures corresponding to the requested sequence of the one or more position requests;
authenticate the user as being a human user as a first authentication step;
trigger the image capture device to capture at least one additional image of the user;
verify the identity of the user as being an authorized user based on the at least one additional image of the user as a second authentication step;
store the at least one additional image of the user in a data storage as an audit trail in an encrypted format;
provide a calibration prompt directing the user to come to a resting place in front of the camera with the user's eyes are on a horizontal plane;
measure at least one key landmark on the face and an overall bounding box of the face and record values corresponding thereto;
display a head position prompt on a display screen, the head position prompt directing the user to turn their head to match a position denoted by a head position image forming part of the head position prompt; and
measure the at least one key landmark on the face and the overall bounding box of the face and recording values corresponding thereto again.

US Pat. No. 10,169,645

ENSURING A DESIRED DISTRIBUTION OF IMAGES IN A MULTIMEDIA DOCUMENT UTILIZING FACIAL SIGNATURES

International Business Ma...

1. A method for ensuring a desired distribution of images in a multimedia document, the method comprising:receiving a desired distribution of facial signatures in said multimedia document;
receiving an image to be added to said multimedia document;
inspecting said image for instances of faces;
generating a facial signature for a face detected in said image;
determining a number of instances of said facial signature in said multimedia document;
determining, by a processor, a desired distribution for said facial signature in said multimedia document based on said received desired distribution of facial signatures in said multimedia document;
providing an indication that said number of instances of said facial signature in said multimedia document meets or does not meet said desired distribution for said facial signature in said multimedia document based on said number of instances of said facial signature in said multimedia document and said desired distribution for said facial signature in said multimedia document;
providing images to a user from a set of source images to be added to said multimedia document in response to said number of instances of said facial signature in said multimedia document being below said desired distribution for said facial signature in said multimedia document; and
displaying images to said user from said multimedia document to be removed from said multimedia document in response to said number of instances of said facial signature in said multimedia document being above said desired distribution for said facial signature in said multimedia document.

US Pat. No. 10,169,644

HUMAN FACIAL DETECTION AND RECOGNITION SYSTEM

Blue Line Security Soluti...

1. A method for detecting faces comprising:detecting, using one or more computing devices, at least a portion of a face from at least one image of a sequence of images by applying a plurality of image strips to the sequence of images, the plurality of image strips together forming a particular curvature and a particular pattern, each image strip of the plurality of image strips having a same width, and determining at least one of an edge-like feature of the face and a ridge-like feature of the face by:
generating, using the one or more computing devices, a mapping of facial points corresponding to the at least one image by:
generating a plurality of points on an image plane corresponding to the at least one image and determining a distance between each point to the plurality of points, each point corresponding to the at least one of the edge-like feature of the face and the ridge-like feature of the face;
projecting the plurality of points from the image plane to a surface of a face model;
mirroring the plurality of points using facial symmetry;
identifying, using the one or more computing devices, a match for the mapping of facial points by comparing the distance between each point to the plurality of points and the mapping of facial points to a recognized image stored in a database; and
triggering, using the one or more computing devices, an alert of the match and transmitting the alert for display to a user computer device.

US Pat. No. 10,169,641

APPARATUS AND METHOD FOR VISUALIZATION OF REGION OF INTEREST

Samsung Electronics Co., ...

1. An apparatus to visualize a region of interest (ROI), comprising:at least one processor; and
at least one memory storing one or more computer programs that, upon execution by the at least one processor, configure the at least one processor to:
receive images in sequence via a probe,
acquire at least one ROI comprising at least one pre-designated interest item from one (hereinafter, previous image) among the images,
output visualization information for visualizing the at least one ROI acquired from the previous image on the previous image,
detect at least one ROI from a current image received by a movement of the probe,
identify, in response to detection of the at least one ROI from the current image, whether an interest item exists in the at least one ROI detected from the current image,
remove, in response to a determination that the interest item does not exist in the at least one ROI detected from the current image, the visualization information of the at least one ROI acquired from the previous image,
determine, in response to a determination that the interest item exists in the at least one ROI detected from the current image, whether the interest item existing in the current image is identical to the pre-designated interest item in the previous image, and
output the visualization information of the at least one ROI acquired from the previous image as visualization information for visualizing the at least one ROI detected from the current image on the current image based on a result of the determination.

US Pat. No. 10,169,638

TRANSFORMED REPRESENTATION FOR FINGERPRINT DATA WITH HIGH RECOGNITION ACCURACY

CROSS MATCH TECHNOLOGIES,...

1. A system for processing fingerprint template data, and for generating transformed fingerprint template data from original fingerprint minutia template data, comprising:a first module configured to define for a minutia m included with in original fingerprint minutiae template data, a corresponding defined mega-vicinity as a vicinity area surrounding the minutia m as the center of the vicinity area;
a second module configured to align geometrically other minutiae located inside of the defined mega-vicinity with respect to the minutia m, and wherein the minutia m defines an origin of a coordinate system; wherein a direction of the minutia m of original fingerprint minutiae data defines an x-axis and a direction of a zero angle, of a Cartesian coordinate system and of a polar coordinate system, respectively;
a third module configured to check for each other minutia in the original fingerprint minutiae template data, to determine if its location is within the vicinity area; and
a fourth module configured to form mega-vicinity data for the minutia m as comprising first layer data comprising all minutiae located inside the vicinity area and second layer data comprising the respective N closest neighboring minutia around each of the minutiae in the first layer data, wherein N is a predetermined number, and wherein said N closest neighboring minutiae around each of the minutiae in the first layer data are not required to necessarily be located within said vicinity area.

US Pat. No. 10,169,637

ON-SCREEN OPTICAL FINGERPRINT CAPTURE FOR USER AUTHENTICATION

Qualcomm Incorporated, S...

1. A method comprising:receiving an image of a fingerprint captured by a camera, the image of the fingerprint being based on light reflected from a fingertip and propagated within a glass layer of a display assembly;
determining feature information from the captured image of the fingerprint;
reducing the amount of feature information through a quantization of the feature information;
generating a histogram associated with the captured image based on the reduced amount of feature information; and
authenticating a user based on the histogram.

US Pat. No. 10,169,635

DISPLAY DEVICE AND METHOD FOR FABRICATING A DISPLAY DEVICE

BOE TECHNOLOGY GROUP CO.,...

1. A display device comprising a display layer and a base layer under the display layer, wherein the base layer comprises:a substrate having a first conductivity type;
a well region, positioned in a portion of a side of the substrate facing towards the display layer, the well region having a second conductivity type opposite to the first conductivity type; and
an ultrasonic receiver formed in the well region, wherein the ultrasonic receiver comprises:
a first bottom electrode facing towards the substrate, the first bottom electrode comprising a first semiconductor region formed in the well region, and the first semiconductor region having the first conductivity type;
a first top electrode facing towards the display layer; and
a first piezoelectric layer, formed between the first bottom electrode and the first top electrode.

US Pat. No. 10,169,634

METHOD, DEVICE AND COMPUTER-READABLE STORAGE MEDIUM FOR FINGERPRINT RECOGNITION

XIAOMI INC., Beijing (CN...

1. A method for fingerprint recognition applied in an electronic device comprising a liquid crystal display, the liquid crystal display having fingerprint recognition sensors and optical proximity sensors, the method comprising:acquiring a fingerprint recognition instruction;
determining an area made up of a part of the optical proximity sensors after acquisition of the fingerprint recognition instruction, the distance between each of the part of the optical proximity sensor and a touch operation being less than a predetermined distance threshold;
selecting a part of the fingerprint recognition sensors according to the area; and
controlling the selected part of the fingerprint recognition sensors to perform fingerprint recognition.

US Pat. No. 10,169,631

RECOGNIZING FINGERPRINTS AND FINGERPRINT COMBINATIONS AS INPUTS

INTERNATIONAL BUSINESS MA...

1. A method of inputting an action to a computer device comprising:placing a fingerprint recognition sensor on a thumb of a first hand of a user, the fingerprint sensor having an outer surface to read a fingerprint of a user's finger placed in contact with the fingerprint recognition sensor, the fingerprint recognition sensor having an inner surface that does not read a fingerprint of the user's thumb;
setting a plurality of actions corresponding to fingerprint data from a user's fingerprint patterns;
storing the plurality of actions corresponding to the fingerprint data in the computer device;
placing a first finger of the first hand of the user in contact with the fingerprint recognition sensor;
reading fingerprint data by the fingerprint recognition sensor corresponding to the user's fingerprint patterns from the first finger of the first hand placed in contact with the fingerprint recognition sensor;
comparing the fingerprint pattern from the first finger of the first hand with the user's fingerprint data stored in the computer device;
responsive to a match between the fingerprint pattern from the first finger of the first hand and the user's fingerprint data stored in the computer device, initiating the action stored in the computer device corresponding to the first finger of the first hand placed in contact with the fingerprint recognition sensor;
placing another finger of the first hand of the user in contact with the fingerprint recognition sensor;
reading fingerprint data by the fingerprint recognition sensor corresponding to the user's fingerprint patterns from the another finger of the first hand placed in contact with the fingerprint recognition sensor;
comparing the fingerprint pattern from the another finger of the first hand with the user's fingerprint data stored in the computer device;
responsive to a match between the fingerprint pattern from the another finger of the first hand and the user's fingerprint data stored in the computer device, initiating the action stored in the computer device corresponding to the another finger of the first hand placed in contact with the fingerprint recognition sensor; and
repeating placing another finger, reading fingerprint data by the fingerprint recognition sensor corresponding to the user's fingerprint patterns from the another finger, comparing the fingerprint pattern from the another finger and initiating the action stored in the computer device corresponding to the another finger for additional fingers of the first hand placed in contact with the fingerprint recognition sensor.

US Pat. No. 10,169,630

OPTICAL SENSOR FOR INTEGRATION OVER A DISPLAY BACKPLANE

Synaptics Incorporated, ...

1. An optical sensor for imaging a biometric input object on a sensing region, comprising:a transparent layer having a first side and a second side opposite the first side;
a set of apertures disposed above the first side of the transparent layer;
a first set of reflective surfaces disposed below the second side of the transparent layer configured to receive light transmitted through the set of apertures and to reflect the received light;
a second set of reflective surfaces disposed above the first side of the transparent layer configured to receive the light reflected from the first set of reflective surfaces and to further reflect the light; and
a plurality of detector elements positioned to receive the further reflected light from the second set of reflective surfaces.

US Pat. No. 10,169,627

OPTICAL MARKER FOR DELIVERY DRONE CARGO DELIVERY

INTERNATIONAL BUSINESS MA...

1. A method, comprising:identifying a first optical marker contained in a first image captured by an image capture device of a delivery drone by processing at least the first image, the first optical marker indicating a first cargo recipient;
responsive to identifying the first optical marker contained in the first image, generating, using a processor, first data corresponding to the first optical marker by performing image processing on the first image; and
responsive to the generating the first data corresponding to the first optical marker, determining a first specific location at a general location by processing the first data, wherein the first optical marker indicates the first specific location and the first specific location is different than a second specific location where the first optical marker is positioned at the general location, and initiating the delivery drone to deliver the cargo at the first specific location indicated by the first optical marker.

US Pat. No. 10,169,624

TAMPER-PROOF ELECTRONIC PACKAGES WITH TWO-PHASE DIELECTRIC FLUID

INTERNATIONAL BUSINESS MA...

1. A tamper-proof electronic package comprising:an enclosure to enclose, at least in part, at least one electronic component within a secure volume;
a two-phase dielectric fluid within the secure volume; and
a tamper-respondent detector to monitor, at least in part, temperature and pressure of the two-phase dielectric fluid to determine therefrom a current pressure temperature relationship, wherein in operation, the current pressure temperature relationship of the two-phase dielectric fluid deviates from an established saturation line thereof within the secure volume with an intrusion event into the secure volume, and the tamper-respondent detector detects, from the monitoring of the temperature and pressure of the two-phase dielectric fluid and the determining of the current pressure temperature relationship, deviation from the established saturation line, and thereby the intrusion event.

US Pat. No. 10,169,623

SECURITY APPARATUS FOR COMPUTING SYSTEMS

International Business Ma...

1. A security apparatus, comprising:a transmitter configured to transmit acoustic signals in a computing system according to an acoustic pattern;
a receiver configured to receive returned acoustic signals in response to the transmitted acoustic signals;
a logic configured to:
upon receiving the returned acoustic signals at the receiver, generate acoustic measurements from the returned acoustic signals based on the acoustic pattern, the generated acoustic measurements relating to a physical arrangement of computing components within the computing system;
compare the generated acoustic measurements to baseline acoustic measurements, wherein the baseline acoustic measurements are derived from acoustic profiles corresponding to a default physical arrangement of computing components within the computing system; and
upon determining that the generated acoustic measurements do not substantially match the baseline acoustic measurements, assert a signal indicating that the default physical arrangement of computing components within the computing system has been altered.

US Pat. No. 10,169,619

PHYSICAL TOKEN BASED SECURED CHARGE MANAGEMENT OF A USER EQUIPMENT

INTERNATIONAL BUSINESS MA...

1. A method for physical token based secured charge management of a user equipment (UE) by a processor, comprising:authorizing a power charging session by firmware of the UE for charging the UE upon detecting one or more physical authentication tokens within a selected area of a power charging source or on the power charging source itself, or combination thereof, the power charging source comprising a power supply brick receiving power from an outlet; wherein the detecting further includes validating a current geographic location of the UE is on an approved list of authorized geographic locations stored in a database associated with the UE; and
allowing an unauthorized charging session, prior to the authorizing, to charge the UE up to a pre-authorized charging limit comprising a predetermined percentage of charged capacity of the UE; wherein the unauthorized charging session is allowed prior to the authorizing upon detecting, by the firmware of the UE, that an unauthorized power charging source has been connected to the UE.

US Pat. No. 10,169,618

ENCRYPTION METHOD FOR EXECUTE-IN-PLACE MEMORIES

Cypress Semiconductor Cor...

1. A device comprising:an internal memory configured to store a key; and
a controller configured to communicate with an external memory device over a serial interface, wherein the controller is configured at least to:
transfer, to the external memory device, an address for an access operation to the external memory device over the serial interface;
encrypt, with the key, the address for the access operation to obtain an encrypted address concurrently with transferring the address to the external memory device over the serial interface; and
encrypt or decrypt a block of data for the access operation with the encrypted address.

US Pat. No. 10,169,616

CRYPTOGRAPHIC PROCESSING OF DATA AND INSTRUCTIONS STORED OFF-CHIP

XILINX, INC., San Jose, ...

1. A circuit arrangement, comprising:a programmable integrated circuit (IC) including:
a processor subsystem including:
an interconnect circuit; and
one or more processors coupled to the interconnect circuit; and
a programmable logic subsystem providing a first address space and including:
a proxy memory circuit coupled to the interconnect circuit and implemented in programmable logic circuitry of the programmable logic subsystem; and
a decryption circuit coupled to the proxy memory circuit and implemented in programmable logic circuitry of the programmable logic subsystem; and
a first memory circuit providing a second address space, external to the programmable IC, coupled to the interconnect circuit;
wherein the interconnect circuit is configured and arranged to receive a first transaction from one of the one or more processors and transmit the first transaction to the proxy memory circuit in response to a first address of the first address space in the first transaction;
wherein the proxy memory circuit is configured and arranged to translate the first address into a second address of the second address space, generate a second transaction including the second address, transmit the second transaction to the interconnect circuit, and receive encrypted data from the first memory circuit in a response to the second transaction;
wherein the decryption circuit is configured and arranged to decrypt the encrypted data into decrypted data; and
wherein the proxy memory circuit is further configured and arranged to transmit the decrypted data to the one processor in a response to the first transaction.

US Pat. No. 10,169,614

CONTAINER UPDATE SYSTEM

International Business Ma...

1. A method, comprising:operating a software container, the software container including a blockchain subsystem and a blockchain ledger;
generating a blockchain entry by executing a hashing function on a current state of the software container and a last entry in the blockchain ledger, and wherein the blockchain entry is generated by extracting and providing information from a predetermined set of directories within the software container to the hashing function;
updating the blockchain ledger with the generated blockchain entry; and
transmitting the generated blockchain entry to one or more connected software containers.

US Pat. No. 10,169,613

SYSTEMS AND METHODS FOR WAVEFORM WATERMARKING

Raytheon Company, Waltha...

1. A device for watermarking a waveform, the device comprising:an overt symbol modulator to receive mapped overt data and provide overt data modulated in accord with an overt data modulation scheme;
a covert symbol modulator to receive mapped covert data and provide, using dither modulation and micro-amplitude modulation, covert data modulated in accord with a covert data modulation scheme;
a clock that operates with a jitter on the order of femtoseconds coupled to the overt symbol modulator and the covert symbol modulator;
a switch to receive the modulated covert data and the modulated overt data and forward the covert data and modulated overt data based on a signal indicating whether covert data is to be transmitted and/or the overt data is to be transmitted; and
transmission circuitry to produce an electromagnetic waveform of the modulated overt data and/or modulated covert data from the switch,
wherein the modulated overt data includes a constellation of symbols and the modulated covert data includes a symbol for every sub-constellation of symbols in the constellation of symbols, wherein the symbol is within a perimeter of the sub-constellation.

US Pat. No. 10,169,612

METHOD FOR EXECUTING A SAFETY-CRITICAL FUNCTION OF A COMPUTING UNIT IN A CYBER-PHYSICAL SYSTEM

ROBERT BOSCH GMBH, Stutt...

1. A method for executing a safety-critical function of a computing unit in a cyber-physical system, the method comprising:receiving a request by a first computing unit in the cyber-physical system from a second computing unit, separate from the first computing unit, for an execution of the a safety-critical function at the first computing unit, the safety-critical function being a cryptographic operation;
acquiring at least one of an environment-specific measurement value and a user-specific measurement value by at least one sensor of the first computing unit, the environment-specific measurement value describing an environment of the first computing unit, the user-specific measurement value describing an interaction of a user with the first computing unit;
determining, by the first computing unit, whether the acquired at least one of the environment-specific measurement value and the user user-specific measurement value fulfills a specified criterion, wherein the specified criterion describe a specific manner in which the user interacts with the first computing unit;
in response to the determination that the values fulfills the specified criterion, executing, by the first computing unit, a physical unclonable function as the safety-critical function;
generating a cryptographic key by the physical unclonable function; and
encrypting communication between the first computing unit and second computing unit using the generated cryptographic key.

US Pat. No. 10,169,611

DYNAMIC APPLICATION HIDING

International Business Ma...

1. A computer-implemented method for dynamic application hiding, the computer-implemented method comprising:detecting, repeatedly, by one or more processors, environmental cues in a vicinity of a computing device wherein the environmental dues comprise a location of the computing device, historical crime rates associated with the location, number of devices at the location, security level of a network communicatively connected to the computing device and keywords sent by the device towards social media;
determining, by one or more processors, a presence of a threat based on matching at least one of the detected environmental cues with one or more stored threat criteria;
determining, by one or more processors, a presence of one or more sensitive applications on a user interface; and
hiding, responsive to determining the presence of the threat, by one or more processors, the one or more sensitive applications based on removing icons associated with the one or more sensitive applications from the user interface and rearranging remaining icons on the user interface to fill empty space resulting from sensitive icon removal.

US Pat. No. 10,169,610

DATA PRIVACY EMPLOYING A K-ANONYMITY MODEL WITH PROBABALISTIC MATCH SELF-SCORING

International Business Ma...

1. A computer-implemented method of protecting data comprising:determining a desired duplication rate for a data set based on a level of desired anonymity for the data in the data set, wherein one or more attributes of data records within the data set that individually identify an identity for a corresponding data record are de-identified, and remaining attributes of the data records include quasi-identifiers;
generating a self-score threshold for the data records within the data set based on the desired duplication rate and Receiver Operating Characteristic (ROC) curves;
producing a data record self-score for each data record in the data set by comparing quasi-identifiers for that data record to quasi-identifiers of a corresponding original data record;
comparing the data record self-scores to the self-score threshold; and
controlling access to the data records of the data set based on the data record self-scores satisfying the self-score threshold, wherein controlling access further comprises:
modifying attributes of data records failing to satisfy the self-score threshold to be less specific; and
enabling access to data records in response to the data record self-scores satisfying the self-score threshold indicating a presence of the desired level of anonymity for the data records.

US Pat. No. 10,169,608

DYNAMIC MANAGEMENT OF DATA WITH CONTEXT-BASED PROCESSING

MICROSOFT TECHNOLOGY LICE...

1. A method comprising:receiving data that has been acquired;
determining, by a computing device, contextual information regarding data-handling of the data, the contextual information including at least two of:
function data indicating an action or a type of action for which the data was acquired;
authority data indicating at least one of a jurisdiction or authority that is applicable to the data, a law that is applicable to the data, a regulation that is applicable to the data, a rule that is applicable to the data, a standard that is applicable to the data, or an industry practice or procedure that is applicable to the data;
control data indicating at least one of a control on the data that is set for a device, a control on the data that is set by or on behalf of a data subject, a control on the data that is set by an entity, a control regarding a data-handling requirement for the data, a control regarding security or privacy of the data, a control regarding consent for the data, a choice mechanism control regarding a manner of obtaining the consent, or a choice control regarding a right to object to use of the data;
class data indicating at least one of a class related to a data authority, a class related to the data subject or a device associated with the data subject, a class regarding whether or not the data is sanitized or aggregated, a class related to protected business information, a class related to national security, a class related to protection of Critical Infrastructure, or a class related to public health or safety; or
history data indicating at least one of actions that the data has been involved with, who initiated actions that the data has been involved with, how the data was acquired, or how the data has changed overtime;
tagging the data with the contextual information;
receiving, by the computing device and from a requestor, a request regarding data-handling of the data, the data-handling including storing, manipulating, sharing, analyzing, or other use of the data;
determining, by the computing device, a response to the request based at least in part on the contextual information and one or more data-handling requirements that are applicable to the request, the response providing guidance on handling the data while complying with the one or more data-handling requirements that are applicable to the data or the request, the response indicating:
whether the data-handling indicated in the request can be performed with the data in view of the one or more data-handling requirements that are applicable to the request; or
a task that needs to be performed to enable the data-handling to be performed with the data to comply with the one or more data-handling requirements that are applicable to the request;
providing, by the computing device, the response to the requestor;
determining, by the computing device, that a particular action or type of action has been performed with the data; and
updating, by the computing device, the contextual information to reflect performance of the particular action or type of action.

US Pat. No. 10,169,607

INDIVIDUAL CENTRIC PERSONAL DATA MANAGEMENT PROCESS AND METHOD

1. An individual and group centric bidirectional data management method for a user to aggregate personal information, medical history and health and wellness data manually or through secure interfaces on an encrypted cloud based software platform designated computer system that said user can use to exchange said data with any authorized third party or recipient healthcare providers or with any recipient or authorized third party family members, care givers and others in a bidirectional controlled way via a one time secure token using a personal computer, tablet or smart phone, the method comprising the steps of:a) receiving a user's authorized account creation request at said designated computer system and said designated computer system completing authorized account setup and authorization process upon first login attempt, and completing verification and multifactor authentication on all login attempts and performing ID verification and authentication for validation and fraud prevention using user entered information or third party services;
b) said designated computer system encrypting all the personal and medical information using encryption with personal and public key;
c) said designated computer system presenting to said user a list of general and specialty medical history profiles and status of each profile completion including percentages, readings and alerts upon logging in;
d) said designated computer system receiving user input to complete personal information consisting of demographics, emergency contacts, insurance, payments, medical directives and medical information;
e) said designated computer system uploading or importing said user documents and images including lab reports, medical photos, identification card, insurance cards, directives and consents discharge summary and clinical reports;
f) said designated computer system receiving said user input to complete adult or child primary care information including purpose of visit, history of prior illnesses, previous surgical procedures, prior, hospitalization, and tests performed;
g) said designated computer system recording vitals and biometrics data including blood pressure, blood glucose level, blood oxygen level, weight, body temperature, and pulse rate manually entered by the user or automatically recorded from connected devices or transferred from a third party system;
h) said designated computer system presenting to said user or authorized third party the forms, documents, charts and readings aggregated from all sources;
i) said designated computer system user sharing aggregated records with authorized third parties using the same system;
j) said designated computer system user selecting one or more recipients of user information where said recipient may be an organization or a person with or without an authorized account on the system;
k) said designated computer system user selecting one or more medical data forms, documents and aggregated vital data readings and charts to be sent to the selected one or more recipients;
l) said designated computer system creating an optional out of band security token with optional finite validation time interval and single or multiple use for transmission to a recipient for validation of said recipient access to said system;
m) said designated computer system encrypting and decrypting the data using a public and private key that is filtered to match recipient organizational preferences and secured with sender's security token;
n) said recipient redeeming the security token so as to be able to receive the data;
o) said recipient viewing, printing, editing, forwarding or exporting the data to internal systems of the recipient;
p) said designated computer system receiving input from a recipient identifying incomplete parts of a data set sent by a user and prompting a user to complete the incomplete part of forms and readings and re-sending the data to said recipient; and
q) said designated computer system taking data from external systems of an authorized third party, the one or more recipients and the user via various interfaces and updating the user information with the latest information from the external systems such that said updated latest user information is available to the user, the authorized third party and the one or more recipients in a secure bidirectional manner that ensures maintenance of complete up to date user information; and
r) use of said up to date user information to treat said user.

US Pat. No. 10,169,606

VERIFIABLE DATA DESTRUCTION IN A DATABASE

International Business Ma...

1. A computer-implemented method for verifying data destruction in a database, the method comprising:determining, by a computing device, that a policy event to initiate data destruction for a first set of data has been triggered, the first set of data located on a first file;
identifying, by the computing device, a second set of data on the first file that does not need to be destroyed;
copying, in response to the identifying and prior to the deleting of a first security key, the second set of data to a second file;
generating, in response to the copying and prior to the deleting of the first security key, a second security key for the second file;
encrypting, in response to the generating, the second set of data with the second security key;
deleting, by the computing device and in response to the determining, the first security key used for decrypting the first set of data; and
deleting, by the computing device and in response to the determining, one or more transaction log entries associated with the first set of data, wherein the one or more transaction log entries include a copy of the first set of data, and wherein the one or more transaction log entries are a part of a transaction log, the transaction log being a second file that stores a history of each data change within the database.

US Pat. No. 10,169,605

IMPLEMENTING BLOCK DEVICE EXTENT GRANULARITY AUTHORIZATION MODEL PROCESSING IN CAPI ADAPTERS

International Business Ma...

1. A method for implementing block extent granularity authorization model processing for a Coherent Accelerator Processor Interface (CAPI) adapter in a computer system comprising:providing the CAPI adapter with an authorization table and a file system authorization function;
said file system authorization function, authenticating data access for each CAPI client at an extent granularity level and preventing an application from accessing unauthorized data in the CAPI adapter;
each authorization table providing for each said CAPI client, a CAPI client identification (ID), a CAPI server register space assigning resource ownership to the CAPI client and a CAPI set of allowed functions; and
the CAPI adapter, responsive to receiving a CAPI client requesting authorization to a file from a file system in the computer system, validating and processing the CAPI client request using said CAPI client identification (ID), said CAPI server register space assigning resource ownership to the CAPI client and said CAPI set of allowed functions for performing command operations.

US Pat. No. 10,169,604

METHOD AND SYSTEM TO PREVENT ULTRASOUND DATA LEAKS IN MOBILE DEVICES

International Business Ma...

1. An ultrasound security system that integrates with an operating system on a mobile computing device, and comprises:an app flow analysis system that generates and maintains runtime flow graphs for apps running on the mobile device and analyzes the runtime flow graphs to identify a set of apps having confidential data flow application programming interfaces (APIs) in their execution paths;
a detector that further evaluates the set of apps having confidential data flow APIs to identify a subset of vulnerable apps also having ultrasound emitting APIs; and
a runtime correlation system that flags a vulnerable app as a potential data leak when a call to an ultrasound emitting API is detected from the vulnerable app.

US Pat. No. 10,169,603

REAL-TIME DATA LEAKAGE PREVENTION AND REPORTING

INTERNATIONAL BUSINESS MA...

1. A method comprising:detecting, by an analysis engine, that an extract transform load (ETL) job in an ETL system has been submitted for execution, the ETL job including an input data storage location and an output data storage location;
analyzing, by the analysis engine, the ETL job to predict whether execution of the ETL job will result in sensitive information being made accessible to an unauthorized user, the analyzing based on a sensitivity status of contents of the input data storage location and a data lineage of contents of the output data storage location;
preventing, by the analysis engine, the ETL job from executing based on predicting that execution of the ETL job will result in sensitive information being made accessible to an unauthorized user; and
initiating execution of the ETL job based on predicting that execution of the ETL job will not result in sensitive information being made accessible to an unauthorized user,
wherein the predicting includes a recursive or iterative process of tracing data of the output data storage location through subsequent ETL jobs in the ETL system.

US Pat. No. 10,169,602

METHOD FOR LOCAL KEY MANAGEMENT SETUP AND RECOVERY

Dell Products, L.P., Rou...

1. A method in an information handling system (IHS) for local key management setup and recovery, the method comprising:receiving, from a first requesting device, a lock request to secure one or more drives;
in response to receiving the lock request, querying, by a service processor executing a security manager, for one or more key identifiers associated with the first requesting device, wherein the security manager is a module operating on the service processor;
in response to receiving at least one key identifier at the security manager, dynamically, generating, via the service processor, a first public-private key and a first public certificate associated with the at least one key identifier;
automatically transmitting the first public certificate to the first requesting device;
invoking the first public-private key to secure the one or more drives;
encrypting the public-private key to create a recovery key;
generating a recovery certificate associated with the recovery key;
archiving the recovery key and the recovery certificate in one or more of (i) at least one recovery server and (ii) at least one recovery database;
assigning a lifecycle period to the first public-private key, wherein the lifecycle period designates a set time period of existence for the first public-private key and the recovery key;
determining when a remaining period of existence of the first public-private key is within a predetermined time before an end of the lifecycle period;
in response to the remaining period of existence being within the predetermined time, dynamically transmitting a reminder message that the public-private key will be updated;
in response to detecting a manual intervention prior to the expiry of the lifecycle period, providing a temporary period of additional time beyond the lifecycle period to unlock the one or more drives via the first public-private key;
detecting an expiry of the lifecycle period; and in response to detecting the expiry of the lifecycle period, dynamically generating a new public-private key and securing the one or more drives via the dynamically generated new public-private key.

US Pat. No. 10,169,600

ENCRYPTION POLICIES FOR VARIOUS NODES OF A FILE

International Business Ma...

1. A computer-implemented method for providing encryption policies for various portions of a file in a file system, the method comprising:parsing, by a computing device, a file into a plurality of nodes, the file being organized into one or more inode blocks, one or more data blocks, and a super-block;
the one or more inode blocks includes:
information about a size of the file, one or more timestamps, one or more pointers to where data is in the one or more data blocks, which node of the plurality of nodes a data block is associated with, and security key information of an encryption policy associated with each node of the plurality of nodes;
the superblock includes:
information about how many of the one or more inode blocks and the one or more data blocks are in the file,
where the one or more inode blocks and the one or more data blocks begin,
and an identifier to identify a type of the file;
each node of the plurality of nodes is defined by two or more of the one or more data blocks, and the one or more inode blocks, the plurality of nodes being associated with a first database table of the file, a first node of the plurality of nodes is defined by a logical boundary that groups a first set of database records of the first database table of the file and does not group a second set of database records of the first database table of the file, a second node of the plurality of nodes is defined by a second logical boundary that groups a first plurality of database columns of the first database table of the file and does not group a second plurality of database columns of the first database table of the file;
associating, based on the security key information in the one or more inode blocks by the computing device, at least a first encryption policy with the first node of the plurality of nodes;
associating, based on the security key information in the one or more inode blocks by the computing device, at least a second encryption policy with the second node of the plurality of nodes;
encrypting, based on the associating the at least the first encryption policy with the first node, data within the first node;
encrypting, based on the associating the at least the second encryption policy with the second node, data within the second node;
receiving a first request from a first user to access the file;
receiving a user security key from the first user, the user security key for use in decrypting a particular set of data within at least one of the plurality of nodes;
receiving a first identifier (ID) associated with the first user, the first ID corresponding to a particular work title of the first user;
determining that the user security key and the first ID are associated with the first node and the first encryption policy;
determining, based on the determining that the user security key and the first ID are associated with the first node and the first encryption policy, that the first user is authorized to access the first set of database records of the first database table of the file within the first node; and
in response to the determining that the first user is authorized to access the first set of database records of the first database table of the file within the first node, decrypting the first set of database records using the user security key; and
wherein the parsing the file into the plurality of nodes is carried out after a file manager determines that a first portion and a second portion of the file need to be encrypted by identifying the file type of the file within the superblock of the file, and wherein the first portion corresponds to the first node and the second portion corresponds to the second node.

US Pat. No. 10,169,599

DATA ACCESS CONTROL WITH FLEXIBLE DATA DISCLOSURE

International Business Ma...

1. A computer-implemented method, comprising:controlling access to a data item value of a data item that is obscured by an indicator providing a description of the obscured data item value, wherein the data item is any one of a structured data and an unstructured data, by:
presenting, with a first computer output device, the indicator; and
in response to receiving a request from a requestor to access the data item value,
receiving a reason for the request, wherein the reason is associated with a level of access control, wherein the level of access control is based on any one of the requestor, a role, and the data item value;
determining that the reason is valid;
providing access to the data item value by presenting the data item value on a second computer output device; and
recording an identity of the requestor, the reason, and the description of the data item value.

US Pat. No. 10,169,598

SYSTEMS AND METHODS FOR SENDING AND RECEIVING ENCRYPTED SUBMESSAGES

United Services Automobil...

1. A system for controlling paths of messages over a plurality of networks, comprising:a first computing device comprising:
a memory coupled to a processor unit of the first computing device, wherein the processor unit and the memory are configured to store a set of computer-readable instructions executable by the processor unit to:
partition a word processing document into a plurality of submessages containing content from a portion of the word processing document,
wherein at least one submessage contains content from comments or metadata of the word processing document and at least one submessage contains randomly generated bits unrelated to the word processing document;
encrypt each of the submessages, thereby generating a plurality of encrypted submessages,
wherein a portion of the content of a first encrypted submessage and a portion of the content of a second encrypted submessage contain overlapping content from the word processing document; and
one or more routing devices of one or more networks accessible to the first computing device, at least one routing device configured to:
transmit to a second computing device the first encrypted submessage via a first path of the one or more networks according to header data of the first encrypted submessage of said two encrypted submessages;
transmit to the second computing device the second encrypted submessage via a second path of the one or more networks according to header data of the second encrypted submessage of said two encrypted submessages,
wherein at least a portion of the content of the second encrypted submessage contains comments associated with the word processing document or metadata associated with the word processing document;
transmitting to the second computing device at least one copy of at least one of the first and the second encrypted submessages via a third path of the one or more networks;
transmit to the second computing device a first key via a fourth path of the one or more networks, wherein the first key identifies the randomly generated bits as unrelated to the word processing document; and
transmit to the second computing device, a second key and a third key to decrypt the first and the second encrypted submessages respectively,
whereby when the second computing device receives more than one copy of an encrypted submessage, the second computing device decrypts the copy that is least corrupted, and
wherein a first routing device of the one or more routing devices is configured to ensure that a first network of the first path is different from a second network of the second path, and wherein the first key is transmitted at a different time than the transmission of the second key, the third key, and the first and the second encrypted submessages.

US Pat. No. 10,169,596

INFORMATION PROCESSING APPARATUS, METHOD, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. An information processing apparatus configured to control an operation of software based on an issued license, the information processing apparatus comprising:at least one processor; and
at least one memory storing instructions that, when executed, cause the at least one processor to operate as:
a holding unit configured to hold a serial number input to issue a first license for controlling the operation of the software;
a reception unit configured to receive an input of a serial number required to issue a second license for controlling the operation of the software at a different version;
a checking unit configured to check whether the serial number corresponding to the first license held by the holding unit and the serial number received by the reception unit are different from each other; and
a control unit configured to control the software based on the second license issued by a licensing server based on the serial number received by the reception unit along with returning the first license to the licensing server, if the checking unit confirms that the serial number corresponding to the first license held by the holding unit and the serial number received by the reception unit are different.

US Pat. No. 10,169,595

DETECTING MALICIOUS DATA ACCESS IN A DISTRIBUTED ENVIRONMENT

International Business Ma...

7. A system, comprising:a processor; and
a memory containing a program which when executed by the processor performs an operation comprising:
identifying a first access to a first subset of a first database table on a first storage node, of a plurality of storage nodes;
identifying a second access to a second subset of the first database table on a second storage node, of the plurality of storage nodes; and
performing a predefined operation to restrict access to the first database table on the plurality of storage nodes based on the first and second accesses, and further based on determining that the first database table is being improperly accessed, wherein determining that the first database table is being improperly accessed comprises:
comparing a first bitmap associated with the first database table on the first storage node to a second bitmap associated with the first database table on the second storage node, wherein comparing the first and second bitmaps comprises performing at least one of: (i) an AND operation, and (ii) an OR operation on the first and second bitmaps; and
determining that a result of the comparison of the bitmaps exceeds a predefined threshold.

US Pat. No. 10,169,594

NETWORK SECURITY FOR DATA STORAGE SYSTEMS

International Business Ma...

1. A method comprising:creating, by one or more processors of a network adapter of a storage system, a set of filter rules, wherein the set of filter rules is located in a firmware that is included on the network adapter, and wherein the set of filter rules includes a list of port numbers and protocols that are allowed or blocked from being accessed within the storage system;
responsive to receiving a request to modify the set of filter rules, prompting, by one or more processors of the network adapter, a requestor for a cryptographic key, wherein the requestor has privileged access to a guest operating system running on the storage system only if the cryptographic key is provided;
receiving, by one or more processors of the network adapter, a first packet;
analyzing, by one or more processors of the network adapter, a header of the first packet to determine a set of packet parameters, wherein the set of packet parameters includes a set of ports and protocols;
determining, by one or more processors of the network adapter, that the set of packet parameters of the received first packet is consistent with a rule in the set of filter rules;
in response to determining that the set of packet parameters of the received first packet is consistent with a rule in the set of filter rules, transmitting, by one or more processors of the network adapter, the received first packet through the network adapter;
receiving, by one or more processors of the network adapter, a second packet;
analyzing, by one or more processors of the network adapter, a header of the second packet to determine a set of packet parameters, wherein the set of packet parameters includes a set of ports and protocols;
determining, by one or more processors of the network adapter, that the set of packet parameters of the received second packet is inconsistent with the set of filter rules; and
in response to determining that the set of packet parameters of the received second packet is inconsistent with the set of filter rules, dropping, by one or more processors of the network adapter, the received second packet to prevent transmission through the network adapter.

US Pat. No. 10,169,593

SECURITY SYSTEMS GUI APPLICATION FRAMEWORK

International Business Ma...

1. A computer-implemented method for injecting functionality into a security intelligence platform, comprising:providing the security intelligence platform with a plurality of backend endpoints, each of the plurality of backend endpoints comprising:
a visualization interface point, the visualization interface point enabling new screens to be presented in a new tab with content served from application code running securely within a customer module;
a right click menu interface point, the right click menu interface point enabling new right click menu options to be available within a user interface of the security intelligence platform, the right click menu interface point enabling the application code running securely within the customer module;
a toolbar buttons interface point, the toolbar buttons interface point enabling new toolbar buttons to be available to the user interface of the security intelligence platform, the toolbar buttons interface point enabling the application code running securely within the customer module;
a dashboard interface point, the dashboard interface point enabling new dashboard widgets to be added to the user interface of the security intelligence platform, the dashboard interface point enabling the application code running securely within the customer module;
an administrative screens interface point, the administrative screens interface point enabling new administrative tabs, configuration screens and setup screens to be added to the user interface of the security intelligence platform, the administrative screens interface point enabling the application code running securely within the customer module;
a hover over metadata endpoint, the hover over metadata endpoint enabling injection of hover over additional metadata functionality to be incorporated into existing hover over areas of the user interface of the security intelligence platform, the hover over metadata endpoint running securely within the customer module;
a Javascript page scripts interface point, the Javascript page scripts interface point enabling injected browser Javascript specific to a particular existing user interface of the security intelligence platform, the Javascript page scripts interface point dynamically linking Javascript from the application code running securely within the customer model module; and
a resource bundles interface point, the resource bundles interface point providing support for globalization and localization key value properties, the resource bundles interface point dynamically loading resource bundles from the application code running securely within the customer model module;
generating a modification to the security intelligence platform according to an application framework, the modification comprising metadata associated with its functionality, the metadata corresponding to a predefined format; and,
merging the modification with the security intelligence platform via a secure system container and an endpoint of the plurality of backend endpoints.

US Pat. No. 10,169,592

SECURITY SYSTEMS GUI APPLICATION FRAMEWORK

International Business Ma...

7. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:providing the security intelligence platform with a plurality of backend endpoints, each of the plurality of backend endpoints comprising:
a visualization interface point, the visualization interface point enabling new screens to be presented in a new tab with content served from application code running securely within a customer module;
a right click menu interface point, the right click menu interface point enabling new right click menu options to be available within a user interface of the security intelligence platform, the right click menu interface point enabling the application code running securely within the customer module;
a toolbar buttons interface point, the toolbar buttons interface point enabling new toolbar buttons to be available to the user interface of the security intelligence platform, the toolbar buttons interface point enabling the application code running securely within the customer module;
a dashboard interface point, the dashboard interface point enabling new dashboard widgets to be added to the user interface of the security intelligence platform, the dashboard interface point enabling the application code running securely within the customer module;
an administrative screens interface point, the administrative screens interface point enabling new administrative tabs, configuration screens and setup screens to be added to the user interface of the security intelligence platform, the administrative screens interface point enabling the application code running securely within the customer module;
a hover over metadata endpoint, the hover over metadata endpoint enabling injection of hover over additional metadata functionality to be incorporated into existing hover over areas of the user interface of the security intelligence platform, the hover over metadata endpoint running securely within the customer module;
a Javascript page scripts interface point, the Javascript page scripts interface point enabling injected browser Javascript specific to a particular existing user interface of the security intelligence platform, the Javascript page scripts interface point dynamically linking Javascript from the application code running securely within the customer model module; and
a resource bundles interface point, the resource bundles interface point providing support for globalization and localization key value properties, the resource bundles interface point dynamically loading resource bundles from the application code running securely within the customer model module;
generating a modification to the security intelligence platform according to an application framework, the modification comprising metadata associated with its functionality, the metadata corresponding to a predefined format; and,
merging the modification with the security intelligence platform via a secure system container and an endpoint of the plurality of backend endpoints.

US Pat. No. 10,169,591

CHAINED SECURITY SYSTEMS

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:receiving an attestation request from a customer system to a main subsystem of a computing device, the computing device operating a customer virtual machine associated with the customer system;
sending a request to a limited subsystem provided using trusted hardware physically connected to the computing device, the limited subsystem configured to perform administrative tasks for the customer virtual machine;
receiving, at the limited subsystem, a first certificate from a certificate authority;
generating, at the limited subsystem, first credentials using the first certificate, a first measurement, and a second certificate for authenticating the main subsystem;
receiving, at the main subsystem, the second certificate from the limited subsystem;
generating, at the main subsystem, second credentials using the second certificate, and a second measurement including state information for the customer virtual machine; and
sending an attestation response to the customer system, the attestation response including the first measurement with the first credentials and the second measurement with the second credentials.

US Pat. No. 10,169,589

SECURELY BOOTING A COMPUTER FROM A USER TRUSTED DEVICE

International Business Ma...

1. A method for allowing a computer to boot from a user trusted device, wherein:the computer comprises a long-term data storage device storing operating system (OS) services; and
the user trusted device is separate from the computer and stores:
a boot loader, detectable and executable by a firmware of the computer, upon detecting a connection of the user trusted device to said computer;
an OS loader designed to load an operating system, or OS, of the computer; and
one or more crypto drivers designed for allowing access to the OS and data stored encrypted on said data storage device of the computer;
the method comprising:
upon connection of the user trusted device to the computer, letting the boot loader be detected by said firmware for a subsequent execution of the boot loader at least partly at the computer to cause to transfer the OS loader of the user trusted device from the user trusted device to the computer, by loading the OS loader into a main memory of the computer;
executing the transferred OS loader at least partly at said computer, to cause the one or more crypto drivers of the user trusted device to access said OS and access said data stored on said long-term data storage device, to start said OS services and complete booting of the computer; and
configuring the one more crypto drivers or the OS loader to retrieve at least one key for encrypting and decrypting said long-term storage device.

US Pat. No. 10,169,588

CONTROLLED STARTING OF AN ELECTRONIC CIRCUIT

PROTON WORLD INTERNATIONA...

1. A method to authenticate content of a non-volatile memory of an electronic device, the electronic device having a microcontroller and an embedded secure element, the method comprising:starting the microcontroller by executing instructions stored in a first non-reprogrammable memory area of the non-volatile memory, the first non-reprogrammable memory area associated with the microcontroller;
starting a boot sequence in the secure element;
monitoring with the secure element whether a request originating from the microcontroller is received;
in response to the monitoring indicating no request from the microcontroller has been received within a threshold period of time, interrupting a power supply of the microcontroller;
verifying, with the secure element, a signature generated by the secure element from content stored in a second reprogrammable memory area of the non-volatile memory area, the second reprogrammable memory area associated with the microcontroller;
if the signature is verified, sending, by the secure element, a message of validation of the content of the second reprogrammable memory area to the microcontroller; and
interrupting the power supply of the microcontroller if the signature is not verified.

US Pat. No. 10,169,587

HOSTED DEVICE PROVISIONING PROTOCOL WITH SERVERS AND A NETWORKED INITIATOR

8. A method for conducting a device provisioning protocol (DPP), the method performed by a mobile phone, the method comprising:operating, by the mobile phone, a DPP application, wherein the DPP application comprises an initiator for the device provisioning protocol;
establishing, by the mobile phone, a secure session with a server, wherein the secure session comprises at least, in part, authentication of the DPP application;
receiving, by the mobile phone and from a device, a tag value for a responder;
sending, by the mobile phone and to the server, the received tag value;
receiving, by the mobile phone and from the server, an initiator configuration, wherein the mobile phone uses the received initiator configuration with a WiFi radio in the mobile phone;
receiving, by the mobile phone and from the server, an initiator ephemeral public key and a first ciphertext, wherein the first ciphertext includes an initiator nonce;
sending, by the mobile phone and to the device, the initiator ephemeral public key and the first ciphertext, wherein the mobile phone uses the received initiator configuration to send the initiator ephemeral public key and the first ciphertext to the device;
receiving, by the mobile phone and from the device, a responder ephemeral public key and a second ciphertext, wherein the second ciphertext includes a responder authentication value;
sending, by the mobile phone and to the server, the responder ephemeral public key and the second ciphertext; and,
receiving, by the mobile phone and from the server, a third ciphertext, wherein the third ciphertext includes a set of network credentials for the device.

US Pat. No. 10,169,583

MALWARE DROPPER DISCOVERY METHOD AND SYSTEM

INTERNATIONAL BUSINESS MA...

1. A method for facilitating finding a potentially harmful malware dropper on a computer system, comprising the steps of:a) identifying an executable file upon execution of said executable file on a computer;
b) storing, responsive to identifying said executable file upon execution of said executable file on said computer, a copy of said executable file in a database; and
c) inspecting said copy of said executable file responsive to detecting malware on said computer and subsequent to said executable file deleting said executable file from said computer,
wherein the identifying and storing are embodied in computer-readable instructions stored on a computer-readable medium for execution by a computer processor.

US Pat. No. 10,169,580

IDENTIFYING WHETHER AN APPLICATION IS MALICIOUS

INTERNATIONAL BUSINESS MA...

1. A method comprising:detecting a first application being presented for installation on a processing system;
scanning, via a static analysis implemented by a processor, the first application to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system, wherein the user interface layout of the first application being suspiciously similar to the user interface layout of a second application indicates the first application is attempting to emulate the second application; and
responsive to the static analysis being indeterminate as to whether the user interface layout of the first application is suspiciously similar to the user interface layout of the second application:
during execution of the first application by the processing system, performing a runtime analysis of the first application, the runtime analysis comprising determining whether each of a plurality of user interface layouts of the first application is suspiciously similar to a respective user interface layout of the second application; and
responsive to the runtime analysis indicating that each of the plurality of the user interface layouts of the first application is suspiciously similar to the respective user interface layout of the second application, generating an alert indicating that the first application is malicious.

US Pat. No. 10,169,579

MALICIOUS PDF DETECTION

Palo Alto Networks, Inc.,...

1. A system, comprising:a processor configured to:
receive a first Portable Document Format (PDF) document;
classify the received first PDF document using a classifier trained at least in part using a set of features extracted from a plurality of training PDF documents, wherein a first classification that can be determined for the first PDF document is a classification of “likely benign” and wherein a second classification that can be determined for the first PDF document is a classification of “likely malicious”, and wherein the plurality of training PDF documents comprise a set of PDF documents that were, at a time previous to the training of the classifier, known to be benign, and are labeled as belonging to a benign set, and wherein the plurality of training PDF documents further comprise a set of PDF documents that were, at a time previous to the training of the classifier, known to be malicious, and are labeled as belonging to a malicious set; and
wherein at least one feature extracted from the malicious set includes a feature associated with at least two stream filters cascaded to form a decoding pipeline; and
wherein, in the event the received first PDF document is classified as likely malicious, additional analysis of potential maliciousness of the first PDF document is caused to be performed, and wherein, in the event the received first PDF document is classified as likely benign, additional analysis of potential maliciousness of the first PDF document is not caused to be performed; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,169,578

MIGRATION SERVICE METHOD AND MODULE FOR SOFTWARE MODULES

TELEFONAKTIEBOLAGET LM ER...

1. A migration service method for software modules, the method comprising:detecting a security flaw in a first environment in which the software modules are running, wherein the security flaw in the first environment is usable by an intrusion to intrude into the first environment, and wherein the security flaw is attributable to at least one of a software component in the first environment, a hardware component in the first environment, a version of a software component in the first environment, and a version of a hardware component in the first environment; and
when the security flaw is detected,
migrating the software modules or part of the software modules from the first environment to a second environment that differs from the first environment by not having the security flaw,
wherein detecting the security flaw in the first environment comprises:
monitoring security issues in a subscribed mailing list, on a web page, in a database or on a web forum; and
detecting the security flaw in the first environment based on whether or not the security issues are related to the software modules running on the first environment,
wherein migrating the software modules or part of the software modules from the first environment to the second environment further comprises:
identifying the software modules which are sensitive to the security flaw based on a pre-determined or calculated sensitivity rating; and
migrating the identified software modules from the first environment to the second environment.

US Pat. No. 10,169,576

MALWARE COLLUSION DETECTION

International Business Ma...

1. A method for malware collusion detection in a mobile computing device, the method comprising:filtering applications installed in the mobile device to identify a set of related applications;
monitoring, by the mobile device, computing operations associated with execution of the related applications in the set of related applications;
determining, based upon the monitoring, that resource utilization is high for a first related application of the set of related applications, which first application is executing in a background of the mobile device;
determining, based upon the monitoring, that computing execution performance is low for a second related application of the set of related applications; and,
responsive to the determination that the resource utilization for the first related application is high, and further responsive to the determination that computing execution performance for the second related application is low, generating a notification in the display of the mobile device that the first related application of the set of related applications is suspected of malware collusion with the second related application of the set of related applications.

US Pat. No. 10,169,574

USING TRUSTED EXECUTION ENVIRONMENTS FOR SECURITY OF CODE AND DATA

Intel Corporation, Santa...

1. An apparatus comprising:at least one memory comprising instructions; and
at least one processor to execute the instructions to:
create a first trusted execution environment (TXE) in protected non-privileged user address space of the at least one memory, the first TXE to make a first measurement of first executable code included in a first software application, the first TXE further to, while the first measurement is within the first TXE, encrypt the first measurement with a persistent first hardware based key, the first TXE to measure executable code only of the first software application;
create a second TXE in the non-privileged user address space, the second TXE to measure executable code only of a second software application;
create a third TXE in the non-privileged user address space;
create a first secure communication channel between the first and third TXEs; and
communicate the first measurement encrypted by the first TXE from the first TXE to the third TXE via the first secure communication channel.

US Pat. No. 10,169,573

MAINTAINING SECURE DATA ISOLATED FROM NON-SECURE ACCESS WHEN SWITCHING BETWEEN DOMAINS

ARM Limited, Cambridge (...

1. A data processing apparatus comprising:processing circuitry configured to execute a stack select flag set instruction specifying a register and, in response to said select flag set instruction, to determine whether a target address that is stored in said register is in a less secure region of a data store than a current operating region, and when said target address is determined to be in said less secure region to set a stack select flag to indicate said less secure region;
wherein in response to program code calling a function stored in a first region of the data store, the processing circuitry is configured to access a first stack stored in the first region for function arguments and return data values when said stack select flag indicates the first region, and to access a second stack stored in a second region of the data store for the function arguments and the return data values when said stack select flag indicates the second region.

US Pat. No. 10,169,570

COGNITIVE PASSWORD PATTERN CHECKER TO ENFORCE STRONGER, UNREPEATABLE PASSWORDS

International Business Ma...

1. A processor-implemented method for determining a password strength, the method comprising:identifying a keyboard layout type associated with a keyboard utilized to enter a user-entered password;
mapping each character within a plurality of characters in the user-entered password to a corresponding location on a grid associated with the identified keyboard layout type, wherein mapping each of the plurality of characters in the user-entered password includes overlaying a plurality of icons on the grid, and wherein each of the plurality of icons represents a character within the plurality of characters;
determining a coordinate sequence associated with the user-entered password based on the mapped plurality of characters;
applying a pattern recognition algorithm to the determined coordinate sequence; and
determining a password strength based on the applied pattern recognition algorithm and comparing the determined coordinate sequence of the user-entered password with a previous password coordinate sequence.

US Pat. No. 10,169,568

EYE GAZING PASSCODE GENERATION CROSSING AUGMENTED REALITY (AR) AND VIRTUAL REALITY (VR) DEVICES

International Business Ma...

1. A system, comprising:a processing circuit; and
logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit, the logic being configured to cause the processing circuit to:
receive an eye gaze of a source user generated by a source augmented reality or virtual reality device (source AR/VR device) on a receiver AR/VR device;
determine gazed content from the eye gaze of the source user using a password key phrase determination feature;
generate a symmetric password key utilising the gazed content according to a set of password determination rules; and
perform an operation using the receiver AR/VR device, the operation being secured by the symmetric password key,
wherein the symmetric password key is not exchanged with any other device,
wherein the operation secured by the symmetric password key is selected from the group consisting of: a data transfer, determination of access rights for the source user, licensing of an application configured to operate on the source AR/VR device, and authentication of an identity of the source user.

US Pat. No. 10,169,567

BEHAVIORAL AUTHENTICATION OF UNIVERSAL SERIAL BUS (USB) DEVICES

Lockheed Martin Corporati...

1. A method for authenticating a universal serial bus (USB) device, the method comprising:receiving the USB device with a USB interface of a host device;
sensing a plurality of behavioral characteristics of the USB device;
comparing the plurality of behavioral characteristic of the USB device with data associated with the USB device, the data associated with the USB device being stored in a non-volatile memory of the host device, to obtain a value indicative of a degree of similarity between the plurality of behavioral characteristic of the USB device and the data associated with the USB device; and
determining whether the USB device is an authorized device based on the value indicative of the degree of similarity between the plurality of behavioral characteristics of the USB device and the data associated with the USB device;
wherein sensing a plurality of behavioral characteristics of the USB device comprises sensing a plurality of timing characteristics of the USB device, and comparing the plurality of behavioral characteristics of the USB device with the data associated with the USB device comprises comparing the plurality of timing characteristics of the USB device with timing data associated with the USB device.

US Pat. No. 10,169,566

AUTHENTICATION USING EMOJI-BASED PASSWORDS

Capital One Services, LLC...

1. A method, comprising:receiving, by a device, an input from a user,
the user being associated with a user account,
the input relating to a request for access to the user account, and including a selection of a plurality of emojis;
identifying, by the device, a plurality of text strings associated with the plurality of emojis after receiving the input,
each text string, of the plurality of text strings, corresponding to a respective emoji of the plurality of emojis;
performing, by the device, an action to generate a combined text string based on the plurality of text strings;
processing, by the device, the combined text string to derive an output value after performing the action;
determining, by the device, whether the output value corresponds to a particular value after processing the combined text string; and
authenticating, by the device, the user to permit the user to access the user account based on determining that the output value corresponds to the particular value.

US Pat. No. 10,169,565

METHOD OF DYNAMICALLY ADAPTING A SECURE GRAPHICAL PASSWORD SEQUENCE

1. A method of dynamically adapting a secure graphical password sequence by executing computer-executable instructions stored on a non-transitory computer-readable medium comprising:providing a computing device;
the computing device performing:
authenticating a user to request access to a restricted user account on the computing device;
defining a plurality of element selection requirements for a password sequence;
defining a plurality of preferences for the password sequence and a selection grid, the selection grid being used to input the password sequence;
dynamically generating the selection grid from the element selection requirements and the plurality of preferences, the selection grid comprising a plurality of grid cells containing at least one graphical element from a plurality of graphical elements, each of the graphical elements being associated with at least one element category and an authentication value;
displaying a user interface with the selection grid;
receiving a plurality of cell selections as the password sequence, each of the cell selections corresponding to one of the grid cells and corresponding to one of a plurality of sequential locations in the password sequence;
comparing the password sequence to the element selection requirements in order to authenticate the password sequence as a valid password sequence;
rejecting the password sequence as a current invalid password sequence;
accepting the password sequence as a current valid password sequence in response to determining the password sequence as valid; and
providing the access to the restricted user account in response to authenticating the user requesting the access with the current valid password sequence;
allowing the user to update parameters of the password sequence via successful or unsuccessful logins over time;
adding at least one additional layer of complexity to the element selection requirements in response to finding the pattern similarities between the current and previous invalid password sequences; and
randomizing or increasing or decreasing a probability of displaying incorrect selections.

US Pat. No. 10,169,564

VARIABLE IMAGE PRESENTATION FOR AUTHENTICATING A USER

INTERNATIONAL BUSINESS MA...

1. A method comprising:performing an authentication procedure to determine whether a user is authenticated to use a processing device, the performing comprising:
automatically selecting a graphical image, from a plurality of graphical images, for presentation to the user based on activation of the processing device, the plurality of graphical images being associated with predefined authenticators corresponding to at least one authentication type of a plurality of authentication types, wherein the predefined authenticators and the at least one authentication type are user-selected, wherein, for each graphical image of the plurality of graphical images, a user-selected authentication type to associate with the graphical image for use in authenticating the user is received and associated with the graphical image, and, based on that user-selected authentication type, a user-selected authenticator, of that user-selected authentication type, to associate with the graphical image for use in authenticating the user is also received and associated with the graphical image;
presenting, using a graphical display of the processing device, the selected graphical image to the user;
presenting, along with the selected graphical image, a plurality of elements each corresponding to a respective different authentication type of the plurality of authentication types; and
determining whether the user is authenticated to use the processing device, the determining whether the user is authenticated to use the processing device comprising:
based on presenting to the user the selected graphical image along with the plurality of elements, receiving a first input from the user comprising a selection of one element of the plurality of elements;
determining whether the authentication type to which the selected one element corresponds matches the user-selected authentication type associated with the graphical image; and
performing processing based on whether the authentication type to which the selected one element corresponds matches the user-selected authentication type associated with the graphical image.

US Pat. No. 10,169,563

ENCRYPTION AUTHORIZATION DONGLE HAVING VOLATILE MEMORY

International Business Ma...

1. A method comprising:establishing a communication link between an authorization dongle and a secure device, the authorization dongle being communicatively coupled with the secure device using a data connector, the secure device having encrypted data stored thereon;
establishing a communication link between the authorization dongle and a secure server, the authorization dongle being communicatively coupled with the secure server using a network adapter;
receiving an encryption key from the secure server, the encryption key being associated with the encrypted data stored on the secure device;
storing the encryption key on volatile memory of the authorization dongle;
receiving, from the secure device, an indication that a user is attempting to access the encrypted data stored on the secure device;
transmitting, in response to the user attempting to access the encrypted data stored on the secure device, the encryption key from the authorization dongle to the secure device;
receiving a second indication that the encryption key is cleared from the volatile memory, wherein the encryption key is cleared as a result of the communication link between the authorization dongle and the secure device being severed;
determining that the authorization dongle is authorized to access the secure server;
establishing, in response to the determination that the authorization dongle is authorized to access the secure server, a second communication link between the authorization dongle and the secure server; and
restoring, by the authorization dongle, the encryption key using updates received from the secure server in response to the second indication that the encryption key is cleared from the volatile memory.

US Pat. No. 10,169,562

ACTIVITY RECOGNITION TO CONFIRM SECURE AUTHENTICATION OF A USER

International Business Ma...

1. A method of two-factor authentication for gaining access to an application using a first device and a second device registered to a user, the first device and the second device each having a plurality of sensors for detecting activity modalities indicative of a user's behavior relative to the first device and the second device, the first device and the second device in communication with a server computer, comprising the steps of:the server computer receiving credentials from the first device for gaining access to the application and at least two detected activity modalities of a locomotive state of the user indicating a type of locomotion of the user and a geographical location state of the user detected by the first device;
the server computer sending a request to the second device registered to the user for at least two detected activity modalities of the locomotive state of the user and the geographical location state of the user;
the server computer receiving the at least two detected activity modalities of the locomotive state of the user and the geographical location state of the user from the second device;
the server computer comparing the at least two detected activity modalities of the locomotive state of the user and the geographical location state of the user detected by the first device to the at least two detected activity modalities of the locomotive state of the user and the geographical location state of the user received from the second device; and
the server computer granting access to the user on the first device to the application if the at least two detected activity modalities of the locomotive state of the user and the geographical location state of the user detected by the first device matches the at least two detected activity modalities of the locomotive state of the user and the geographical location state of the user received from the second device.

US Pat. No. 10,169,561

BIOMETRIC INTERFACE SYSTEM AND METHOD

1. An earpiece for authenticating users using stored finger print authentication data, the earpiece comprising:an earpiece housing;
at least one speaker;
at least one microphone;
a processor disposed within the earpiece housing and operatively connected to the at least one speaker and the at least one microphone, wherein once authentication occurs all or portions of earpiece operation or programming become accessible to a user;
a plurality of sensors operatively connected to the processor;
a data storage device disposed within the earpiece housing and operatively connected to the processor, wherein a first portion of the stored finger print authentication data is stored on the data storage device;
a radio transceiver disposed within the earpiece housing and operatively connected to the processor, wherein a second portion of the stored fingerprint authentication data is stored at a remote location and accessible over a network through the radio transceiver;
wherein the processor is configured to receive fingerprint data from a first sensor at a fingerprint contact surface on the earpiece housing and analyze the fingerprint data using the first portion of the stored fingerprint authentication data and the second portion of the stored fingerprint authentication data; and
wherein the processor is configured to receive users biometric data from a second sensor and make an authentication decision based on the fingerprint data and the biometric data.

US Pat. No. 10,169,559

CONTROLLING INPUT/OUTPUT DEVICES

Samsung Electronics Co., ...

1. A wearable electronic device comprising:one or more sensors;
a communication module;
a touchscreen display;
a battery module;
at least one memory configured to store executable instructions; and
at least one processor configured to execute the stored instructions to:
control the one or more sensors to obtain heart rate information of a user,
control the one or more sensors to obtain motion information of the user,
obtain power state information of the battery module including a remaining battery charge,
control operation of at least one of the touchscreen display and the communication module based on the obtained power state information, including controlling a Wireless Fidelity module of the communication module to be turned on or off based on the obtained power state information, and
control operation of the touchscreen display based on the obtained motion information of the user, including deactivating the touchscreen display when the motion information indicates a movement greater than a predefined value,
wherein the one or more sensors include at least one of a heartbeat sensor, an acceleration sensor, a gyro sensor, a geomagnetic sensor, and a GPS module.

US Pat. No. 10,169,558

ENHANCING BIOMETRIC SECURITY OF A SYSTEM

Intel Corporation, Santa...

1. A method comprising:receiving an ordered sequence of biometric inputs from a user via a biometric sensor associated with a processing system, wherein each biometric input of the ordered sequence of biometric inputs is associated with a corresponding digit of the user;
determining an indication of a direction of motion of the corresponding digit for each of the biometric inputs while the corresponding digit is being sensed by the biometric sensor;
determining if the biometric input and direction of motion of each of the ordered sequence of biometric inputs matches a corresponding entry stored in a table of a non-volatile storage of the processing system, the table including a stored ordered sequence of biometric inputs corresponding to a password pattern of the user selected by the user, the table including a plurality of entries each to store, for one of the stored ordered sequence, a biometric input, direction of motion, and mapping to an alphanumeric character;
if the biometric input and direction of motion of each of the ordered sequence of biometric inputs matches the corresponding entry stored in the table, determining whether a collection of the alphanumeric characters of each entry matches a stored password in a password database;
if so, enabling the user to access the processing system and converting the stored password to the password pattern, and otherwise preventing the user from accessing the processing system, wherein each of the ordered sequence of biometric inputs maps to an element of the password pattern selected by the user and the stored password is an alphanumeric password previously stored without biometrical-based information.

US Pat. No. 10,169,557

PICTURE/GESTURE PASSWORD PROTECTION

International Business Ma...

2. A system for identifying a strength of an input picture password formed from a selected picture and performing a sequence of gestures relative to the picture, the system comprising:a memory device for storing a crowd source history of picture passwords formed by tracking a plurality of picture passwords used to authenticate a plurality of users, each of the plurality of users having a respective user profile including at least one non-language demographic and each of the plurality of picture passwords including a picture selected by a user of the plurality of users and a sequence of gestures performed relative to the picture by the user;
a processor-based demography-based pattern usage assessment generator for generating a demography-based pattern usage assessment corresponding to the at least one non-language demographic by analyzing the crowd source history and the user profiles of the plurality of users to develop rules from the crowd source history according to common gestures for the at least one non-language demographic, wherein the rules are indicative of a strength of each gesture in the sequence of gestures according to how the sequence of gestures is performed relative to the picture; and
a user-perceptible indication device for providing an indication of the strength of the input picture password in accordance with the demography-based pattern usage assessment corresponding to the at least one non-language demographic.

US Pat. No. 10,169,554

WORK SUPPORT SYSTEM, WORK SUPPORT METHOD AND COMPUTER-READABLE RECORDING MEDIUM

CASIO COMPUTER CO., LTD.,...

1. A work support system, comprising:a processor configured to perform a display control process to display, on a display, a first list including a plurality of unprocessed task indices each of which has a first periphery size and a second list including a plurality of processed task indices each of which has a second periphery size smaller than the first periphery size,
wherein, in the display control process, when attribution of one of the unprocessed task indices in the first list is changed to a processed task index, a periphery size of the changed-to-processed task index, the attribution of which is changed to the processed task index, is reduced from the first periphery size to a third periphery size which is smaller than the first periphery size and larger than the second periphery size, and the changed-to-processed task index is displayed in a moving manner from the first list to the second list so that the changed-to-processed task index is visually recognized as passing behind other unprocessed task indices.

US Pat. No. 10,169,553

MANAGING GROUPED STUDENT DEVICES WITH TIMED LOCKS

AirWatch, LLC, Atlanta, ...

1. A system comprising:at least one processor; and at least one non-transitory computer-readable medium including instructions, which when executed by the at least one processor, cause the at least one processor to perform stages including:
determine at least one user device that corresponds to a session to which a master device is assigned;
send device identifiers to the master device that correspond to the at least one user device;
receive a lock request from the master device to apply a lock to a group of user devices comprising the at least one user device, the group being selected by the master device, wherein the lock request includes timing information relating to the lock and the lock is associated with a whitelist of resources that can be accessed by the group of user devices, wherein the lock request further includes a selection of a lock type and the lock type is selected from a group that includes an application lock, a file lock and a web lock;
determining two or more different operating systems of two or more user devices from the group of user devices and using two different messaging servers corresponding to the two different operating systems to send the lock requests to the two or more user devices, respectively; and
cause the group of user devices to apply the lock for a duration based on the timing information and the whitelist of resources, wherein applying the lock includes locking the group of user devices into a single application mode such that the user devices are locked into an application managed by a management server that specifies which resources are available to the application for access by the user devices, and wherein the timing information causes the group of user devices to unlock after the duration without further contact with the master device or the management server.

US Pat. No. 10,169,552

EVENT-DRIVEN GENERATION OF WATERMARKED PREVIEWS OF AN OBJECT IN A COLLABORATION ENVIRONMENT

Box, Inc., Redwood City,...

1. A method for watermarking an editable document comprising:configuring a server in a cloud-based environment, wherein one or more storage devices are accessible by the server to provide cloud-based storage services to two or more client entities as a service across a network;
maintaining an editable document at the server in a first version using a version indication, wherein the editable document is accessible from the server by a first client entity, wherein the first client entity edits the editable document live and a second client entity receives updated watermarked pages indicating a preview representation of the editable document as the updated watermarked pages are edited by the first client entity in an editing session of the editable document, wherein the editing session corresponds to the first client entity editing the first version of the editable document comprising a first watermark image and a preview session corresponds to a second client entity viewing the preview representation of the editable document comprising a second watermark image that is different from the first watermark, wherein the first version of the editable document is stored in a first storage location and the preview representation of the editable document is stored in a second storage location different from the first storage location;
applying the first watermark image to the first version of the editable document and granting edit access to the first version of the editable document to the first client entity of the two or more client entities;
generating the preview representation of the editable document that is different from the first version of the editable document while the first client entity has edit access to the first version of the editable document; and
applying the second watermark image to the preview representation of the editable document by manipulating the preview representation of the editable document rather than manipulating the editable document before delivering the preview representation of the editable document to the second client entity of the two or more client entities.

US Pat. No. 10,169,551

CONTENT READING METHOD FOR READING OUT COPYRIGHT-PROTECTED CONTENT FROM NON-TRANSITORY RECORDING MEDIUM, CONTENT READING APPARATUS, AND NON-TRANSITORY RECORDING MEDIUM

PANASONIC INTELLECTUAL PR...

1. A method, comprising:receiving a command for reading out a content from a non-transitory recording medium from a host apparatus;
identifying first version information indicating a version of a content copyright protection method for the non-transitory recording medium based on the non-transitory recording medium;
identifying second version information indicating a version of a protocol used in authentication of the host apparatus;
determining whether the authentication is to be approved or not based on the first version information with the second version information;
authenticating the host apparatus according to a result of the determination as to whether the authentication is to be approved or not;
reading out, from the non-transitory recording medium, medium-specific information used in decrypting an encrypted content stored in the non-transitory recording medium and sending the medium-specific information to the authenticated host apparatus; and
reading out the encrypted content from the non-transitory recording medium and sending the encrypted content to the authenticated host apparatus,
wherein the first version information is identified based on disk information that is meta data stored at a beginning of the recording medium formed in a disk shape in the identifying first version information.

US Pat. No. 10,169,548

IMAGE OBFUSCATION

International Business Ma...

1. A method for managing image obfuscation comprising:receiving, by the computer, an image file uploaded to a social networking site;
identifying at least two portions of the image file that match at least one criteria of a plurality of obfuscation methods;
dividing the image file into a plurality of regions based on the at least two portions; and
executing, simultaneously, each obfuscation method to a corresponding region of the plurality of regions based on the corresponding region matching the at least one criteria of the plurality of obfuscation methods.

US Pat. No. 10,169,547

SECURE COMPUTING SYSTEM RECORD TRANSFER CONTROL

Microsoft Technology Lice...

1. A computing system comprising:at least one processor; and
memory storing instructions executable by the at least one processor, wherein the instructions, when executed, configure the computing system to provide:
a record generation component configured to generate a record in a computing system, the record identifying a set of users associated with the record and having an owner property that identifies a first user as an owner of the record;
a record security component configured to control modification of the record based on the owner property of the record; and
a record ownership transfer component configured to:
receive an indication of an ownership transfer that transfers ownership of the record from the first user to a second user;
based on the received indication, modify the owner property to identify the second user as the owner of the record; and
propagate the ownership transfer to the set of users by instructing an electronic messaging system to:
for each respective user of the set of users,
 send a structured electronic message to a respective user computing system that is associated with the respective user and maintains a separate copy of the record having a corresponding owner property,
 wherein the structured electronic message includes:
 a protected header field that is generated by the electronic messaging system and stores a unique identifier that identifies, to the respective user computing system, the first user as a sender of the structured electronic communication, wherein the protected header field is protected through control of the protected header field by the electronic messaging system; and
 an instruction to the respective user computing system to modify the separate copy of the record to reflect the ownership transfer based on a comparison of the protected header field relative to the corresponding owner property on the separate copy of the record.

US Pat. No. 10,169,546

GENERATING DOCUMENT PROCESSING WORKFLOWS CONFIGURED TO ROUTE DOCUMENTS BASED ON DOCUMENT CONCEPTUAL UNDERSTANDING

International Business Ma...

1. A computer-implemented method of generating a document processing workflow to enforce and record compliance with a set of disclosure provisions, the computer-implemented method comprising:receiving an unstructured document comprising a contractual agreement between a source party and a target party, the contractual agreement containing a disclosure provision to be complied with by the source party in written communications pertaining to the target party and published by the source party;
parsing the contractual agreement in order to identify a set of terms included in the disclosure provision;
annotating each term with metadata describing the respective term in order to create a structured pattern describing the disclosure provision;
facilitating pattern identification by semantically normalizing one or more of the annotated terms based on a contractual ontology in order to create a semantically normalized, structured pattern corresponding to the disclosure provision;
comparing the semantically normalized, structured pattern to a plurality of patterns in order to identify a best-fit pattern from the plurality of patterns, wherein each of the plurality of patterns pattern describes a workflow template;
upon identifying the best-fit pattern, automatically generating, based on the workflow template corresponding to the best-fit pattern, a workflow for the semantically normalized, structured pattern and by operation of one or more computer processors, wherein the workflow specifies a sequence of steps to enforce and record compliance, of the source party, with the disclosure provision, the sequence of steps involving a set of reviewing individuals of the target party, wherein the generated workflow is stored in a repository;
upon automatically determining that a written communication to be published the source party contains a set of statements, pertaining to the target party, that warrants initiating an approval workflow to ensure compliance with the disclosure provision, executing the generated workflow in order to solicit, from the set of reviewing individuals of the target party, approval of the written communication for publication by the source party; and
generating, for each step of the sequence in the generated workflow completed, an audit record indicating that the respective step is complete, wherein the audit record is stored in an audit log, wherein upon approval, by the target party, of the written communication for publication by the source party, the written communication is published by the source party without violating the disclosure provision.

US Pat. No. 10,169,545

COMPUTER-IMPLEMENTED TOOLS FOR USE IN ELECTROPHYSIOLOGY

1. A computer-implemented process for computing and displaying a spatial distribution, a time series, or a spatial distribution and a time series of at least one electrical variable for at least a portion of an electrophysiological system, said method comprising:(I) modeling said at least a portion of an electrophysiological system by a method that comprises:
(A) inputting data to a computer regarding structure and at least one electrical property of said at least a portion of an electrophysiological system;
(B) simulating, using the computer, at least one spatial charge distribution for said at least a portion of an electrophysiological system without first determining and differentiating an electrical potential distribution, wherein simulating comprises determining quantities of charge in a plurality of calculation cells, each of said plurality of calculation cells having at least two faces;
(II) using the computer to determine the spatial distribution, the time series, or the spatial distribution and the time series of the electrical variable from the at least one spatial charge distribution simulated in step (I); and
(III) displaying the spatial distribution, the time series, or the spatial distribution and the time series of the electrical variable determined in step (II);
wherein for at least one of said plurality of calculation cells, a quantity of charge for the calculation cell is determined in step (I)(B), at least in part, using a solid angle of a face of the calculation cell as seen from a quantity of charge in at least one other calculation cell of said plurality of calculation cells, and
in step (I)(B), at least one of the calculation cells of the plurality of calculation cells is a flattened calculation cell having only two faces with substantial areas as seen from quantities of charge in the other calculation cells of said plurality of calculation cells.

US Pat. No. 10,169,544

SIMULATION OF ENDOGENOUS AND EXOGENOUS GLUCOSE/INSULIN/GLUCAGON INTERPLAY IN TYPE 1 DIABETIC PATIENTS

University of Virginia Pa...

1. An electronic system that simulates a glucose-insulin metabolic system of a T1DM subject, comprising:an electronic subsystem configured to model dynamic glucose concentration in the T1DM subject, including an electronic module configured to model glucagon action on endogenous glucose production (EGP(t)),
an electronic module configured to model meal glucose rate of appearance (Ra(t)),
an electronic module configured to model insulin-dependent glucose utilization (Uid(t)), according to following equation:
where Gt(t) is an amount of glucose in tissue, X(t) is insulin action on glucose utilization and [Vm0, Vmx, Km0, p2U] are model parameters, where Vm0 governs amplitude of insulin action on glucuose utilization at basal steady state, Vmx governs amplitude of insulin action on glucuose utilization, Km0 governs glucose control on glucose utilization, p2U accounts for delay between insulin signal and insulin action on glucose utilization, andwith G being total glucose, Gb being patient basal glucose, Gth a hypoglycemic threshold, which is set at 60 mg/d1, and risk is a measure of risk of hypoglycemia,and [r1, r2] are additional randomly generated integers;an electronic module configured to model renal excretion of glucose (E(t));
a subsystem configured to model dynamic insulin concentration in said T1DM subject, including
an electronic module configured to model insulin secretion (S(t));
an electronic module configured to model glucagon subcutaneous transport;
an electronic database containing a population of virtual T1DM subjects, each virtual subject having a plurality of metabolic parameters with values within a range of values derived from in vivo T1DM subjects; and
a processing module configured to calculate an effect of variation of at least one metabolic parameter value on the glucose-insulin metabolic system of a virtual subject by inputting said plurality of metabolic parameter values including said at least one varied metabolic parameter value into said glucose concentration and insulin concentration subsystems;
wherein calculated effects of variation of at least one metabolic parameter value are outputted by said processing module and used to determine effectiveness of insulin treatment strategies that vary said at least one metabolic parameter value on a subject.

US Pat. No. 10,169,543

SYSTEMS AND METHODS FOR REPORTING BLOOD FLOW CHARACTERISTICS

HeartFlow, Inc., Redwood...

1. A system for displaying cardiovascular information of a patient, the system comprising:at least one computer system configured to:
receive patient-specific image data regarding a geometry of one or more of the patient's arteries;
create a model representing at least a portion of the patient's arteries based on the patient-specific image data;
determine at least one value of a fractional flow reserve for at least the portion of the patient's arteries based on the model;
generate a report for visual display comprising a representation of at least the portion of the patient's arteries and a summary portion including a listing of the represented portion of the patient's arteries adjacent to a graph of one or more markers of the value of the fractional flow reserve for each respective portion of the patient's arteries;
display, on the graph of the summary portion of the report, an indicator of uncertainty for each determined value of the fractional flow reserve, wherein each indicator of uncertainty is displayed as a bar overlapping a respective marker of fractional flow reserve on the graph of the summary portion of the report, and wherein each indicator of uncertainty is displayed when it cannot be determined whether the respective value of the fractional flow reserve exceeds the predetermined threshold value.

US Pat. No. 10,169,540

BLOOD GLUCOSE SYSTEM HAVING TIME SYNCHRONIZATION

Roche Diabetes Care, Inc....

1. A blood glucose system for treating a glucose metabolic disorder, comprising:a portable, independent ambulantly operable dosing device for delivering a medicinal agent for the treatment of the glucose metabolic disorder to a body, the dosing device being free from having an integrated time counter for generating relative time values, wherein each relative time value is a time count in relation to a reference instant and is not an actual time, a memory unit in which data sets of dosing quantities and relative time values are stored, and a device for transmitting stored data sets to a data processing apparatus;
a portable, independent ambulantly operable blood glucose measuring device for determining a blood glucose content of the body, the blood glucose measuring device including an integrated time standard, a memory unit in which data sets of blood glucose measurements and associated time values are stored, and a device for transmitting stored data sets to a data processing apparatus; and
wherein the data processing apparatus is for processing data sets of the dosing device and the blood glucose measuring device, the data processing apparatus having a receiving device for receiving the data sets from the dosing device and the blood glucose measuring device, wherein the data processing device has an arithmetic unit for converting the relative time values of the data sets of the dosing device into absolute time values by calculating a difference between the relative time value of the time counter of the dosing device and the associated time value of the time standard of the blood glucose measuring device;
wherein, the data processing apparatus synchronizes the data sets of the dosing device and the data sets of the blood glucose measuring device with one another by adding the difference to the relative time value of the time counter of the dosing device;
wherein the dosing device has a needle and a needle sensor with which it registers whether the needle is in the body during delivery of the medicinal agent, and further operates in a priming mode to evaluate when a bolus is delivered without the needle being injected in the body and marks the data sets accordingly when the bolus is delivered without the needle being injected in the body.

US Pat. No. 10,169,537

SYSTEM AND METHOD FOR THE VISUALIZATION OF MEDICAL DATA

Forward Health Group, Inc...

1. A computer-implemented method for the automated visualization of patient medical information and medical data over an Internet network, comprising:storing medical data of patients for each of at least one medical provider and at least one payor organization in a plurality of datasets, wherein each of the datasets in the plurality of datasets is stored in a computer memory accessible over the Internet network separately from each of the other datasets, each of the plurality of datasets including at least an electronic medical record and a secondary healthcare record, the electronic medical record and the secondary healthcare record stored separately and having at least one common key;
normalizing the medical data by executing database-specific calls to each of the datasets over the Internet network and retrieving at least some of the medical data from the plurality of datasets by a normalizer, the normalizer configured to generate a set of metadata based on at least one quality measure of the medical data and generate normalized medical data for the set of metadata using a denominator to define a patient population having the at least one quality measure;
populating a database with the normalized medical data, the database operably coupled to the Internet network, wherein the normalized medical data is stored separately from the plurality of datasets to create a medical data superset for each patient including medical data common to each patient stored among the plurality of datasets;
configuring an application layer operably coupled to the Internet network to enable communication between the database of the medical data superset for each patient and a dashboard over the Internet network;
displaying an output of normalized medical data on the dashboard, the dashboard displayed on a user device operably coupled to the Internet, the dashboard configured to:
enable a user to select one of a set of display options from the set including: a Venn diagram-type output, a scatter plot-type output or an orbit plot-type output;
display medical data for the patient population captured by the at least one quality measure using the display option selected by the user; and
enable the user to further interactively select details of a particular data section displayed in the display option.

US Pat. No. 10,169,536

RECORDING DOSE DATA FROM DRUG INJECTION DEVICES USING OPTICAL CHARACTER RECOGNITION (OCR)

Sanofi-Aventis Deutschlan...

1. A method of recording a medicament dose using a handheld data collection device, the method comprising:capturing, by a camera of the handheld data collection device positioned at a distance from a medicament dose indicator of a medicament delivery device, an image of the medicament dose indicator, wherein the distance between the camera and the medicament dose indicator is variable;
adjusting a scale of said image;
adjusting said image for skew of one or more characters displayed by the medicament dose indicator;
determining a position of at least one of said one or more characters in the image;
identifying the at least one character using optical character recognition; and
determining a medicament dose indicated by the medicament dose indicator based on a result of said optical character recognition.

US Pat. No. 10,169,534

MEDICAL IMAGE DISPLAY SYSTEM AND METHOD

Toshiba Medical Systems C...

1. A display system for collaboratively displaying a plurality of separate medical images across a plurality of separate display devices, the system comprising:processing circuitry connected to the plurality of separate display devices and configured to
provide a hanging protocol specifying the plurality of separate medical images to be displayed and a relative position in which each of the separate medical images is to be displayed;
obtain, from each of the plurality of separate display devices, consent to join a collaboration with other of the plurality of separate display devices, in order to display the plurality of separate medical images across the plurality of separate display devices, wherein establishment of the collaboration is dependent on at least one of user preference, group preference, a person using at least one of the separate display devices, and particular protocols used;
automatically assign each of the plurality of separate medical images to one of the plurality of separate display devices according to the hanging protocol; and
in response to receiving the consent to join the collaboration from each of the plurality of separate display devices, display the plurality of separate medical images concurrently on the plurality of separate display devices to obtain a collaborative display of the medical images across the plurality of separate display devices,
wherein at least one of the plurality of separate display devices comprises a mobile display device, and
the processing circuitry is further configured to
automatically detect a physical location of each of the plurality of separate display devices,
select, based on the detected physical location of each of the separate display devices, at least one device out of the detected plurality of separate display devices, and
after receiving the consent from the selected at least one device, assign at least one of the plurality of separate medical images for display on the selected at least one device, based on the hanging protocol and at least one of the detected location and an orientation of the selected at least one device with respect to the mobile display device.

US Pat. No. 10,169,533

VIRTUAL WORKLIST FOR ANALYZING MEDICAL IMAGES

Compressus, Inc., Austin...

1. A method for automating and managing workflow for healthcare data retrieval, display, and analysis on a healthcare enterprise network and providing interoperability between nodes of the healthcare enterprise network, the method comprising:receiving a study order for a patient from a first workstation of an imaging system on the healthcare enterprise network, wherein the study order contains data associated with at least one study image;
storing the study order in a master worklist on a network server as an uncompleted study order;
collecting and organizing network locations of data related to a patient in an enterprise-wide database using interrelated data structures in a computer memory to store the data related to the patient so that programmed rules provided to a workflow manager can test the contents of the various fields of the data structures to determine the destination of a study order in the worklist;
testing the contents of the various fields of the data structures to determine the destination group of a study order;
applying a workflow routing rule to the data associated with the at least one study image contained in the study order to route the workflow to the destination group, wherein the workflow routing rule depends on at least one of a criticality of the study order, image modality, and a body part in the at least one study image, the routing rules are implemented in modifiable, enterprise-specific, locally-defined tables that are utilized to automatically route patient studies based on an imaging modality of the study order, the routing rules comprise conditional rules that depend upon on loads and responsiveness of destinations to facilitate balancing routing workloads;
adding the study order to a first filtered worklist which is specific to the destination group;
acquiring study order related data from the nodes of the healthcare enterprise network including any available historical studies, patient records, and reports related to the study order, wherein sets of the study order related data have differing formats;
manipulating file characteristics of the data including compiling the data from a variety of differing formats on a number of workstations into a common format, to render the data accessible by a workstation of the destination group to provide interoperability between the nodes of the healthcare enterprise network;
storing a primary study, the historical studies, the patient records, and the reports related to study order in a designated memory associated with the destination group;
displaying the first filtered worklist on the second workstation in use by a logged-in diagnostician who is a member of the destination group;
making accessible to the second workstation an image of the primary study of the patient associated with the study order, and the historical studies, the patient records, and the reports;
accepting a claim of the study order from the logged in diagnostician;
preventing the claimed study order from being claimed by any other diagnostician;
receiving a report created by the logged-in diagnostician;
routing the report, in accordance with the modifiable, enterprise-specific, locally-defined tables, to a designated repository while the study order is claimed by the logged-in diagnostician;
removing the study order from the first filtered worklist from any other filtered worklist on which the study order appears;
sending an indication to the first workstation that the study order has been completed;
marking the study order in the master worklist as complete;
updating historical diagnostic throughput information based on a measured diagnostic throughput of the study, wherein the measured diagnostic throughput comprises an elapsed amount of time or expense between receiving the study order and marking the study order as complete; and
adjusting the workflow routing rule base on the updated historical diagnostic throughput information.

US Pat. No. 10,169,532

QUERY SEQUENCE GENOTYPE OR SUBTYPE CLASSIFICATION METHOD

OMICSIS, INC., Daejeon (...

1. A computer system for classifying genotype or subtype of a query sequence, the system comprising:one or more databases that store information on classified types of sequences of various viruses;
a client computer that receives user inputs of the query sequence; and
a web server comprising a processor and a memory, and coupled to the databases and the client computer via an Internet computer network,
wherein the web server
receives the query sequence from the client computer,
selects, from the classified types stored in the databases, base sequences of various viruses of which genotypes or subtypes are known as reference sequences
obtains a distance matrix by calculating distances between sequences in a multiple alignment of said reference sequences,
develops a discriminant equation which classifies the reference sequences by performing discriminant analysis for a cluster obtained by clustering said reference sequences through multidimensional scaling of the distance matrix,
classifies retroviral or flaviviral query sequence against the same type of virus, according to said discriminant equation, and
provides the classified query sequence to the client computer, and
wherein the client computer receives the classified query sequence and displays the classified query sequence on a screen of the client computer.

US Pat. No. 10,169,531

ALGEBRAIC PHASING OF POLYPLOIDS

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for applying algebraic rules to single-nucleotide polymorphisms (SNPs), the method comprising:receiving, by a processor, a matrix comprising a set of rows and a set of columns, the matrix representing a set of two or more SNPs for two or more sample organisms;
setting each row in the set of rows to a ploidy based on a number of ploidies present in the two or more sample organisms;
representing each allele in the set of two or more SNPs as a binary number;
receiving a set of algebraic rules, wherein the set of algebraic rules comprises an algebraic phasing algorithm; and
applying the set of algebraic rules to the matrix to determine a haplotype of a parent of the two or more sample organisms.

US Pat. No. 10,169,529

METHOD AND APPARATUS FOR DETERMINING A ROAD NETWORK PARTITIONING BORDER LINE

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for determining a road network partitioning border line, comprising:determining a border point based on road network data;
determining a buffer zone between adjacent partitions based on the border point, partitioning information of road segments in a road network, and the road network data;
determining a border line segment between the adjacent partitions based on the buffer zone; and
determining a border line of at least one partition based on the border line segment.

US Pat. No. 10,169,528

METHOD AND DEVICE FOR GENERATING ENGINEERING TOPOLOGY OF DIGITAL SUBSTATION

Korea Electric Power Corp...

1. A method of controlling and/or monitoring a digital substation, the method comprising:automatically generating a computer-readable engineering topology of a digital substation by:
generating, by a single-line diagram generation module, a single-line diagram of the digital substation based on input information regarding a plurality of substation component devices and connection relations therebetween;
converting, by a topology conversion module, the single-line diagram of the digital substation into an engineering topology conforming to international standards by use of conversion conditions stored in a topology component management module;
verifying, by a topology verification module, whether the engineering topology is suitable for the digital substation based on the international standards; and
generating, by an international standard file generation module, a computer-readable single-line diagram engineering file of the digital substation as a system specification description (SSS) by use of the verified engineering topology;
providing the computer-readable single-line diagram engineering file to a computerized supervisory control and data acquisition (SCADA) system; and
controlling, by the SCADA system, the digital substation,
wherein converting the single-line diagram into an engineering topology comprises establishing connection relations between connection nodes (CN) and terminals for individual objects included in the single-line diagram of the digital substation, and
verifying whether the engineering topology is suitable comprises determining whether an isolated object is present among objects contained in the single-line diagram of the digital substation based on a determination that an object is not linked with any other object.

US Pat. No. 10,169,527

ACCURATE STATISTICAL TIMING FOR BOUNDARY GATES OF HIERARCHICAL TIMING MODELS

INTERNATIONAL BUSINESS MA...

1. A method of improving performance of a semiconductor chip design, the method comprising:determining, by a computer processor, a hierarchical arrangement of the semiconductor chip design, the hierarchical arrangement including a plurality of arcs located at different levels internal to the semiconductor chip design, wherein the different levels include a macro level, a unit level and a core level;
determining, by the computer processor, first timing characteristics of at least one first arc in the macro level based on a load applied to the at least one first arc; and
determining, by the computer processor, second timing characteristics of at least one second arc in at least one of the unit level and the core level based on the first timing characteristics, wherein a portion of the second timing characteristics is determined irrespective of the load,
wherein the load includes a first capacitance load applied to the output of at least one first arc and a second capacitance load applied to an output of the at least one second arc, and
wherein an input slew rate is implemented in the semiconductor design and the semiconductor chip design is provided for semiconductor chip fabrication.

US Pat. No. 10,169,526

INCREMENTAL PARASITIC EXTRACTION FOR COUPLED TIMING AND POWER OPTIMIZATION

INTERNATIONAL BUSINESS MA...

1. A method of optimizing a semiconductor device according to a non-coupling scenario, the method comprising:constructing, by a computer system, an initial logic circuit included with the semiconductor device, the initial logic circuit including a plurality of initial design components;
performing, by the computer system, at least one first optimization action on the initial logic circuit, the at least one optimization action resulting in an updated performance requirement of at least one affected design component among the plurality of initial design components;
generating, by the computer system, an invalidation list that indicates the at least one affected design component;
replacing, by the computer system, the at least one affected design component with an updated design component capable of operating according to the updated performance requirement to construct an updated logic circuit included with the semiconductor device; and
performing, by the computer system, at least one second optimization action on the updated logic circuit, the at least one second optimization action generating performance results of the updated design component along with the remaining initial design components without requiring coupling,
wherein the second optimization action includes re-computing timing information of the updated design component and all of the remaining initial design components before outputting results of a slack analysis, and
wherein at least one new RC network is implemented in a semiconductor device design and the semiconductor device including the at least one new RC network is fabricated based on the semiconductor device design.

US Pat. No. 10,169,525

MULTIPLE-DEPTH TRENCH INTERCONNECT TECHNOLOGY AT ADVANCED SEMICONDUCTOR NODES

International Business Ma...

1. A method of forming a metal interconnect structure, said method comprising:controlling, using a hardware processor, a material deposition tool to form a dielectric material layer and a stack of hard mask layers over an underlying semiconductor structure, said stack of hard mask layers comprising at least, from bottom to top, a first dielectric layer of a first dielectric material, a lower metallic hard mask layer including a first metallic material, a second dielectric layer including a second dielectric material, an upper metallic hard mask layer including a metallic material, and a third dielectric layer including a third dielectric material;
controlling, using the hardware processor, a semiconductor lithographic patterning tool to form a first pattern of materials on top said third dielectric layer, and controlling an etching tool to recess a first portion of said third dielectric layer and said metallic hard mask layer within an area of the first pattern by employing a combination of a first lithographic process and a first etch; and
controlling, using the hardware processor, the semiconductor lithographic patterning tool to form a second pattern of materials on top said third dielectric layer, and controlling the etching tool to recess a second portion of said third dielectric layer and said metallic hard mask layer within an area of the second pattern by employing a combination of a second lithographic process and a second etch, wherein a cavity is formed within an area of intersection between said first pattern and said second pattern, said cavity having a bottom surface below a first horizontal plane including a bottom surface of said lower metallic hard mask layer,
wherein said first lithographic process and second lithographic process result in a double exposed overlapped feature portion at said area of intersection such that a resultant formed trench is deeper as compared to a depth of a trench formed as a result of the first lithographic process and the first etch.

US Pat. No. 10,169,524

UNIVERSAL CELL MODEL FOR ARRAY AND CIRCUIT SIMULATION USING THE SAME

TAIWAN SEMICONDUCTOR MANU...

1. A method, performed by at least one processor, for designing and implementing an integrated circuit, the method comprising:receiving, by the at least one processor, for each of at least a first array, a layout of the first array which comprises a plurality of cells, and a plurality of first circuit paths running across at least one side length in a first array size configuration of the first array,
each of the plurality of cells being configured with a first node that is coupled to a respective one of the plurality of first circuit paths;
extracting, by the at least one processor, a first representative characteristic associated with the plurality of first circuit paths;
generating, by the at least one processor, a universal cell model applied to each cell in a second array based on a base cell model comprising parameters independent of positions in the second array, and the first representative characteristic,
the second array having a second array size configuration the same as or different from the first array size configuration; and
effecting a physical implementation of an integrated circuit based on the universal cell model.

US Pat. No. 10,169,523

TIMING CONSTRAINTS FORMULATION FOR HIGHLY REPLICATED DESIGN MODULES

International Business Ma...

1. A method for managing time constraints in a circuit, the method comprising:creating an initial placement design of blocks of macros in a circuit based on a weighted combination of a micro-architectural requirement, a critical path timing requirement, and a connection density requirement;
determining, by one or more processors, whether a first location-based criteria is met, wherein the first location-based criteria comprises a first predefined threshold;
in response to determining that the first location-based criteria is met, initiating, by one or more processors, a first checkpoint procedure, the first checkpoint procedure comprising a pin list filtering to generate a first shortened pin list;
performing an intermediate placement of blocks of macros in the circuit if the first predefined threshold is not met;
determining, by one or more processors, whether a second timing-based criteria is met, wherein the second timing-based criteria comprises a second predefined threshold;
in response to determining that the second timing-based criteria is met, initiating, by one or more processors, a second checkpoint procedure, the second checkpoint procedure comprising a pin list filtering to generate a second shortened pin list; and
performing design iterations, by one or more processors, using at least the first shortened pin list or the second shortened pin list instead of an unfiltered pin list to reach a final optimized stage.

US Pat. No. 10,169,522

METHODS AND SYSTEM FOR MODEL-BASED GENERIC MATCHING AND TUNING

ASML Netherlands B.V., V...

1. A method of tuning a to-be-tuned lithographic process to a reference lithographic process, each of the reference and the to-be-tuned lithographic processes involving use of a lithographic apparatus to manufacture a pattern on or in a substrate, the method comprising:obtaining respective lithographic process models for both the reference lithographic process and the to-be-tuned lithographic process, the reference and to-be-tuned lithographic process models each comprise a plurality of mathematical terms and each model a physical characteristic of an aspect of the respective lithographic processes;
identifying a set of tunable parameters of the to-be-tuned lithographic process;
determining, by a hardware computer, one or more changes in the set of tunable parameters that cause responses of the reference and to-be-tuned lithographic process models to match, wherein the determining the one or more changes includes applying non-uniform weights to different mathematical terms in the reference and to-be-tuned lithographic process models; and
tuning the to-be-tuned lithographic process to the reference lithographic process by adjusting the model for the to-be-tuned lithographic process based on the determined one or more changes,
where an output of the adjusted model is configured (a) to (i) design, (ii) control, (iii) modify, or (iv) any combination selected from (i) to (iii), an aspect of a physical manufacturing step of the to-be-tuned lithographic process, or (b) to (v) design, (vi) control, (vii) modify, or (viii) any combination selected from (v) to (vii), an aspect of a physical object or apparatus to be used or manufactured in the to-be-tuned lithographic process, or (c) both (a) and (b).

US Pat. No. 10,169,521

METHOD FOR FORMING CONTACT PLUG LAYOUT

UNITED MICROELECTRONICS C...

1. A method for forming a contact plug layout, comprising:(a) receiving a plurality of active region patterns and a plurality of buried gate patterns, the buried gate patterns respectively extending along a first direction and arranged along a second direction perpendicular to the first direction, the active region patterns respectively extending along an extending direction different from the first direction and the second direction and overlapping adjacent two of the buried gate patterns to form two overlapping regions and one contact plug region in between the two overlapping regions in each of the active region patterns;
(b) forming a plurality of contact plug patterns respectively on the contact plug region in each of the active region patterns, the contact plug patterns respectively comprising a parallelogram having a pair of second short sides and a pair of second long sides, wherein the second short sides are parallel with the first direction and the second long sides are parallel with the extending direction of the active region patterns, wherein an included angle of the parallelograms is not equal to 90°, and the contact plug patterns respectively partially overlapping the adjacent two of the buried gate patterns and completely overlapping the contact plug region between the adjacent two of the buried gate pattern; and
(c) outputting the contact plug patterns to a photomask for forming an DRAM device.

US Pat. No. 10,169,520

METHOD OF RECONFIGURING UNCROWNED STANDARD CELLS AND SEMICONDUCTOR APPARATUS INCLUDING UNCROWNED AND CROWNED CELLS

TAIWAN SEMICONDUCTOR MANU...

1. A method of reconfiguring a set of uncrowned standard cells in a layout of a semiconductor apparatus,wherein each uncrowned standard cell includes a standard first array;
each standard first array including a first stacked arrangement of vias interspersed with corresponding one or more first segments of corresponding M(i)˜M(N) metallization layers; and
wherein the M(N) metallization layer includes one or more second segments which connect corresponding first segments of the M(N) metallization layer in the first standard array of each uncrowned standard cell in the set;
the method comprising:
crowning each first standard array in the set with a corresponding second standard array thereby resulting in a corresponding crowned standard cell;
wherein each second standard array includes a second stacked arrangement of vias interspersed with corresponding one or more of first segments of corresponding M(N+1)˜M(N+Q) metallization layers; and
adding, to the M(N+Q) layer, one or more second segments which connect corresponding first segments of the M(N+Q) metallization layer in the corresponding second standard arrays, thereby resulting in the layout;
wherein i, N and Q are non-negative integers, i?N and 1?Q; and
wherein at least one of the disconnecting, crowning and adding is executed by a processor of a computer.

US Pat. No. 10,169,519

AREA SHARING BETWEEN MULTIPLE LARGE BLOCK SYNTHESIS (LBS) BLOCKS

International Business Ma...

1. A method comprising:receiving an integrated circuit (IC) floorplan comprising a plurality of large block synthesis (LBS) blocks, wherein respective LBS blocks comprise respective pluralities of macros merged therein;
selecting at least a first LBS block and at least a second LBS block of the plurality of LBS blocks, wherein the first LBS block shares at least a portion of a perimeter of the first LBS block with at least a portion of a perimeter of the second LBS block, wherein the first LBS block comprises a first area, and wherein the second LBS block comprises a second area, wherein selecting at least the first LBS block and at least the second LBS block further comprises:
determining a first utilization of a periphery of the first LBS block is below a target utilization and a second utilization of a periphery of the second LBS block is below the target utilization;
overlapping a portion of the first LBS block with a portion of the second LBS block to form an overlap area, wherein the overlap area is less than the first area, wherein the overlap area is less than the second area;
apportioning a first portion of the overlap area to the first LBS block and a second portion of the overlap area to the second LBS block, wherein apportioning a respective portion to a respective LBS block dedicates resources of the respective portion to the respective LBS block; and
manufacturing an integrated circuit based on the IC floorplan and comprising the first portion of the overlap area apportioned to the first LBS block and the second portion of the overlap area apportioned to the second LBS block.

US Pat. No. 10,169,518

METHODS FOR DELAYING REGISTER RESET FOR RETIMED CIRCUITS

Intel Corporation, Santa...

1. A method of operating an integrated circuit design tool implemented on computing equipment, comprising:receiving a circuit design that includes a plurality of registers that are resettable using a first reset sequence;
performing a first register move operation on the circuit design to move a first register in the plurality of registers across a first circuit element in the circuit design;
updating a first counter value associated with the first circuit element for a clock domain; and
generating a second reset sequence by delaying the first reset sequence based on the first counter value for the clock domain, wherein the second reset sequence is at least associated with resetting the moved first register to a reset state.

US Pat. No. 10,169,517

METHODS AND SYSTEMS FOR REDUCING CONGESTION IN VERY LARGE SCALE INTEGRATED (VLSI) CHIP DESIGN

Wipro Limited, Bangalore...

1. A method of reducing congestion in a Very Large Scale Integrated (VLSI) chip design, the method comprising:applying a placement constraint with at least one hot-spot logic cell, wherein the placement constraint restricts placement of new logic cells within a predefined distance from each of the at least one hot-spot logic cell;
applying a routing constraint on a metal layer in a node of the VLSI chip, wherein the node includes the at least one hot-spot logic cell;
restricting fresh placement of the at least one hot-spot logic cell to original location extracted using feedback received after culmination of routing procedure while applying the placement constraint and the routing constraint;
performing placement of circuit components based on the placement constraint and the routing constraint, wherein the routing procedure establishes paths for interconnections, the paths comprising at least one of standard cell and macro pins, pins on block boundary, and pads at chip boundary; and
fabricating the VLSI chip based on the placement of the circuit components.

US Pat. No. 10,169,516

METHODS AND COMPUTER PROGRAM PRODUCTS FOR VIA CAPACITANCE EXTRACTION

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for via capacitance extraction, the method comprising:placing a plurality of shapes of target nets of an integrated circuit (IC) into a Cshapes collection and placing a plurality of via pad shapes of the target nets into a CshapesVia collection, wherein each of the via pads has a first via pad shape, and a second via pad shape;
processing the plurality of shapes in the Cshapes collection and placing the processed shapes into a Ctile collection, and processing the plurality of via pad shapes in the CshapesVia collection and placing the processed shapes into a CtilesVia collection;
extracting via capacitance of the plurality of target nets through each of the Cshapes collection, the CshapesVia collection, the Ctiles collection, and the CtilesVia collection; and
fabricating the integrated circuit.

US Pat. No. 10,169,515

LAYOUT MODIFICATION METHOD AND SYSTEM

TAIWAN SEMICONDUCTOR MANU...

1. A method of forming an integrated circuit, the method comprising:analyzing, by the at least one processor, at least dimensional and positional characteristics of a plurality of specific layout segments of a circuit cell layout to determine a cell boundary of the circuit cell layout, wherein the cell boundary is a boundary between the circuit cell layout and an adjacent cell abutted to the circuit cell layout;
selecting at least a first specific layout segment and a second specific layout segment from the plurality of specific layout segments based on a first distance between the first specific layout segment and the cell boundary and a second distance between the second specific layout segment and the cell boundary;
determining, by the at least one processor, if the first specific layout segment and the second specific layout segment are electrically connected to a first reference voltage level;
merging, by the at least one processor, the first specific layout segment and the second specific layout segment to form a first merged layout segment when the first specific layout segment and the second specific layout segment are electrically connected to the first reference voltage level;
selecting at least a third specific layout segment and a fourth specific layout segment from the plurality of specific layout segments in response to said analyzing;
merging, by the at least one processor, the third specific layout segment and the fourth specific layout segment to form a second merged layout segment;
merging, by the at least one processor, the first merged layout segment and the second merged layout segment to form a rail;
generating a modified circuit cell layout based on the rail; and
causing the integrated circuit to be fabricated according to the modified circuit cell layout.

US Pat. No. 10,169,514

APPROXIMATION OF RESISTOR-CAPACITOR CIRCUIT EXTRACTION FOR THREAD-SAFE DESIGN CHANGES

International Business Ma...

1. A method of fabricating an integrated circuit, the method comprising:performing, using a processor, a design change for a net among a plurality of nets of the integrated circuit;
performing, using the processor, an extraction for the net, the performing the extraction including re-computing values for a resistor-capacitor (RC) circuit representation of the net;
recording re-computed values resulting from the re-computing and a timestamp of the extraction;
changing a capacitance value of a capacitor coupling the net with a neighboring net in the RC circuit representation of the neighboring net to be the capacitance value of the capacitor coupling the net with the neighboring net that was re-computed for the RC circuit representation of the net;
updating timing and noise parameters for the net and the neighboring net to updated timing and noise parameters;
performing timing analysis based on the updated timing and noise parameters; and
implementing a physical implementation of the integrated circuit based on a result of the timing analysis meeting design criteria.

US Pat. No. 10,169,512

COMPUTER SYSTEM FOR STATE ASSIGNMENTS USING A FINITE STATE MACHINE

King Fahd University of P...

1. A computer system for optimizing state assignments for a finite state machine, the system comprising:processing circuitry configured to
generate a random initial state assignment for each of a plurality of states of the finite state machine with a probabilistic pairwise swap search,
determine an initial cost associated with the random initial state assignments,
identify a code swap to explore as a function of a code swap probability,
calculate a cost for the code swap when one or more criteria is satisfied, the one or more criteria include one or more of an indication of whether the code swap has not been explored in a current round, a solution associated with the code swap was not previously generated, a round is not repeated wherein the round is an iteration where all pairs of code swaps are considered, and a maximum predetermined number of code swaps by round is not exceeded, the maximum predetermined number of code swaps by round being a function of a number of hill climbs taken in a period, the period starting when a current solution does not improve after finishing a round and ending when a best solution is found,
update the code swap probability as a function of the cost of the code swap and a best cost,
perform the code swap when the cost of the swap is smaller than the best cost and/or a current cost, to optimize the state assignments,
output optimized state assignments and
implement a physical circuit including one or more flip flops based on the optimized state assignments.

US Pat. No. 10,169,511

METHOD TO SYNTHESIZE A CROSS BAR SWITCH IN A HIGHLY CONGESTED ENVIRONMENT

INTERNATIONAL BUSINESS MA...

1. A method comprising:automatically generating design data for a semiconductor circuit comprising a crossbar switch, the automatically generating comprising:
synthesizing the crossbar switch using predefined multiplexer building blocks, wherein the predefined multiplexer building blocks comprise at least a multiplexer, an input driver and a select driver;
regularly placing the predefined multiplexer building blocks to define a crossbar switch arrangement;
testing the crossbar switch arrangement for timing constraints;
re-synthesizing the crossbar switch or replacing of the predefined multiplexer building blocks based on the testing;
wherein:
the re-synthesizing comprises using multiplexers comprising multiple multiplexer areas;
one of said multiplexer areas comprise a primary output driver and the remaining multiplexer areas include the multiplexing circuits;
the replacing comprises placing the multiplexer such that the multiplexer area are located in adjacent bit bay areas, wherein a single bit bay area includes two power supply rails; and
initiating fabrication of the semiconductor circuit comprising the crossbar switch using the automatically generated design data.

US Pat. No. 10,169,510

DYNAMIC FAULT MODEL GENERATION FOR DIAGNOSTICS SIMULATION AND PATTERN GENERATION

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for locating defects in a fabricated device, the method comprising:inputting, by a computer system, inline fabrication parametric data, the inline fabrication parametric data is a collection of physical measurements measured on the fabricated device during stages of building process layers in the fabricated device, wherein a fault model is based on the inline fabrication parametric data;
generating, by the computer system, test patterns according to inline fabrication parametric data of the fabricated device according to the fault model in order to obtain results from testing the fabricated device; and
detecting a physical location of one or more defects in the fabricated device by running a simulation of the fabricated device using the results.

US Pat. No. 10,169,509

EFFICIENT DEPLOYMENT OF TABLE LOOKUP (TLU) IN AN ENTERPRISE-LEVEL SCALABLE CIRCUIT SIMULATION ARCHITECTURE

INTERNATIONAL BUSINESS MA...

1. A system for conducting numerical analysis, the system comprising:a processor that is configured to define a plurality of components in a circuit and a condition to be statistically analyzed;
a module that is configured to perform a table look-up in a table for individual components of the plurality of components;
a module that is configured to acquire a result for the condition to be statistically analyzed based on information in the table in which a component of the plurality of components is defined, wherein a result of the statistical analysis provides a design of the circuit for a fabrication facility for manufacturing integrated circuits; and
a module that determines if the condition to be statistically analyzed is possible to be interpolated from existing conditions for the component in the table,
wherein, when it is determined that the condition to be statistically analyzed is possible to be interpolated from the existing conditions, the existing conditions for the component in the table are interpolated to obtain the condition to be statistically analyzed.

US Pat. No. 10,169,508

EFFICIENT DEPLOYMENT OF TABLE LOOKUP (TLU) IN AN ENTERPRISE-LEVEL SCALABLE CIRCUIT SIMULATION ARCHITECTURE

INTERNATIONAL BUSINESS MA...

1. A method for conducting numerical analysis, the method comprising:defining a plurality of components in a system and a condition to be statistically analyzed;
performing a table look-up in a table for individual components of the plurality of components;
acquiring a result for the condition to be statistically analyzed based on information in the table when a component of the plurality of components is defined in the table;
designing a circuit from integrated circuits based on conducting the statistical analysis of the system, wherein the designing the circuit from the integrated circuits is implemented in manufacturing the integrated circuits; and
determining if the condition to be statistically analyzed is possible to be interpolated from existing conditions for the component in the table,
wherein, when the determining determines that the condition to be statistically analyzed is possible to be interpolated from the existing conditions, the method further comprises interpolating the existing conditions for the component in the table to obtain the condition to be statistically analyzed.

US Pat. No. 10,169,507

VARIATION-AWARE CIRCUIT SIMULATION

Taiwan Semiconductor Manu...

1. An integration circuit (IC) simulation method, comprising:(a) providing a design netlist of a system-level circuit, wherein the system-level circuit comprises a first sub-circuit;
(b) providing a first behavior model that is determined based on an operation of the first sub-circuit, wherein the first behavior model is a function of one or more respective behavior-level parameters;
(c) incorporating a first variation into each of the one or more behavior-level parameters of the first behavior model; and
(d) simulating the system-level circuit based on the one or more behavior-level parameters of the first behavior model that incorporates the first variation, wherein the first variation comprises at least one first local mismatch variation, wherein the at least one first local mismatch variation corresponds to a variation of a design parameter of an element of the first sub-circuit.

US Pat. No. 10,169,506

CIRCUIT DESIGN METHOD AND SYSTEM

TAIWAN SEMICONDUCTOR MANU...

1. A method of fabricating a circuit by a predetermined fabrication process, the method comprising:designing a first layout of the circuit based on a first plurality of corner variation values for an electrical characteristic of a corresponding plurality of back end of line (BEOL) features of the circuit to be fabricated by the predetermined fabrication process;
using a processor, calculating, based on the first layout, a first delay attributable to the plurality of BEOL features and a second delay attributable to a plurality of front end of line (FEOL) devices of the circuit;
if the first delay is greater than the second delay, designing a second layout of the circuit based on a second plurality of corner variation values for the electrical characteristic of the corresponding plurality of BEOL features,
wherein each corner variation value of the first plurality of corner variation values is obtained by multiplying a corresponding corner variation value of the second plurality of corner variation values by a corresponding scaling factor,
in response to the first delay being greater than the second delay, fabricating the circuit based on the second layout; and
in response to the first delay not being greater than the second delay, fabricating the circuit based on the first layout.

US Pat. No. 10,169,504

ACHIEVING POWER SUPPLY AND HEAT DISSIPATION (COOLING) IN THREE-DIMENSIONAL MULTILAYER PACKAGE

International Business Ma...

1. A computer-implemented method for designing a package for a stacked multiple-chip Integrated Circuit (IC) structure, the method comprising the steps of:establishing, using the computer, a silicon (Si)-containing substrate having a wiring layer that optimizes power supply and heat dissipation for the stacked multiple-chip structure from an upper surface side of said stacked multiple-chip structure, said wiring layer supplying power to said stacked multiple-chip structure via a power supply;
setting, using the computer, a heat conductive thermal via density initial value for a chip of said stacked multiple-chip structure, wherein thermal via structures of said chip at said initial value density provide a heat dissipation route in the stacked multi-chip structure;
preparing the Si-containing substrate where said wiring layer is of a predetermined thickness and is formed on a bottom surface side of said Si-containing substrate contacting said upper surface side of said stacked multiple-chip structure and, prior to setting up an initial value of the power supply, connecting a heat dissipater a top an upper surface side of said Si-containing substrate for dissipating heat directly above the upper surface side of said Si-containing substrate;
setting, using the computer, the initial value of the power supply for said stacked multiple-chip structure supplied from said wiring layer of said Si-containing substrate;
determining, using the computer, whether the initial value of the power supply and the initial value of the thermal via density are both within a predetermined range; and based on said determining, performing, using the computer, one or more of:
increasing or decreasing said initial value of the power supply until detecting a convergence of the initial power supply value within the predetermined range; and
increasing or decreasing said heat conductive thermal via density initial value until detecting a convergence of the thermal via density initial value within the predetermined range, and
fabricating a three-dimensional multilayer chip package including said stacked multiple-chip structure having a thermal via density corresponding to the thermal via density value at the detected convergence, said three-dimensional multilayer chip package for receiving a power supply input at a value corresponding to the power supply value at the detected convergence.

US Pat. No. 10,169,503

CALLBACK BASED CONSTRAINT PROCESSING FOR CLOCK DOMAIN INDEPENDENCE

INTERNATIONAL BUSINESS MA...

1. A method of performing timing analysis of an integrated circuit design with callback-based constraint processing for clock domain independence, the method comprising:generating a timing graph representation of the integrated circuit design, wherein the timing graph includes nodes interconnected by edges;
loading timing abstracts representing the nodes of the timing graph;
obtaining, using a processor, a timing result based on propagating timing values and associated timing tags from an input to an output of the integrated circuit design and processing timing constraints at one or more of the nodes as callbacks, wherein each timing tag indicates a clock domain;
applying a design change;
determining, using the processor, one or more modified timing tags that are added or changed as a result of the design change;
processing the timing constraints associated with the modified timing tags as callbacks;
re-computing the timing result; and
providing the integrated circuit design to obtain a physical implementation based on the timing analysis.

US Pat. No. 10,169,502

ADDRESSING OF PROCESS AND VOLTAGE POINTS

International Business Ma...

1. A method for addressing process and voltage points across voltage and process space, the method comprising:computer processors identifying an integrated circuit design;
the computer processors identifying a timing model associated with the identified integrated circuit design;
the computer processors identifying a minimum set of voltage/process pairs associated with the integrated circuit design, wherein an operating temperature and frequency are constant;
the computer processors identifying a number n that defines the number of finite differencing operations to be performed for the identified minimum set of voltage/process pairs;
the computer processors performing a single statistical static timing analysis with multi-corner projection for the identified integrated circuit based on the identified number n that provides a finite difference for each number of finite differencing operations to be performed based on the identified number n for the identified minimum set of voltage/process pairs;
the computer processors performing addressing based on an exact timing at each individual voltage/process pairs for the identified minimum set of voltage/process pairs with respect to a process corner and a delay from the identified timing models;
the computer processors providing a report; and
the computer processors initiating to manufacture an updated integrated circuit design.

US Pat. No. 10,169,501

TIMING CONTEXT GENERATION WITH MULTI-INSTANCE BLOCKS FOR HIERARCHICAL ANALYSIS

Cadence Design Systems, I...

1. A method for hierarchical timing comprising:accessing a memory of a computing device to obtain a first circuit design, the first circuit design comprising a plurality of instances of a first block;
determining, by one or more hardware processors of the computing device, a plurality of multi-mode multi-corner (MMMC) views for the first circuit design;
generating, by the one or more hardware processors, a plurality of timing contexts for the circuit design, each timing context of the plurality of timing contexts being generated from a different combination of an instance of the plurality of instances and an MMMC view of the plurality of MMMC views;
generating, by the one or more hardware processors, an analysis view output file comprising a plurality of content MMMC views, the plurality of content MMMC views comprising the plurality of MMMC views and the plurality of timing contexts;
determining a block timing merge threshold for the circuit design;
determining a first phase value for a first propagation point within the circuit design using a first timing context and a first MMMC view from the analysis view output file;
determining a second phase value for the first propagation point within the circuit design using a second timing context and a second MMMC view from the analysis view output file;
generating a merged phase value by comparing the block timing merge threshold with a difference between the first phase value and the second phase value; and
fabricating semiconductor devices using the circuit design with the hierarchical timing.

US Pat. No. 10,169,500

CRITICAL PATH DELAY PREDICTION

International Business Ma...

1. A method of predicting a delay of one or more critical paths of an integrated circuit, the method comprising:determining a respective delay of each of a plurality of on-board ring oscillators on the integrated circuit based on a real-time measurement of a respective frequency of each of the plurality of ring oscillators,
wherein the plurality of on-board ring oscillators includes one or more on-board high-voltage threshold (HVT) ring oscillators, one or more on-board medium-voltage threshold (SVT) ring oscillators, and one or more on-board low-voltage threshold (UVT) ring oscillators; and
calculating, using a computer system processor, a predicted delay for each of the one or more critical paths based on a delay of components of the respective critical path at a corner condition, a wire delay of the respective critical path, a delay of each of the plurality of on-board ring oscillators at a corner condition, and the determined delay of each of the plurality of on-board ring oscillators,
wherein each of the one or more critical paths include at least one HVT component on the integrated circuit having a first voltage threshold, at least one SVT component on the integrated circuit having a second voltage threshold less than the first voltage threshold, and at least one UVT component on the integrated circuit having a third voltage threshold less than both the first voltage threshold and the second voltage threshold.

US Pat. No. 10,169,499

THERMOSET RESIN FLOW MODELS FOR PRINTED CIRCUIT BOARD LAMINATES

International Business Ma...

1. A method comprising:storing thermoset resin rheology data at a memory, the thermoset resin rheology data including a plurality of dynamic fluid flow properties that are measured for a thermoset resin;
receiving, at a computing device, information associated with a printed circuit board (PCB) laminate design;
receiving, at the computing device, a first set of PCB lamination parameters;
storing, at the computing device, a first thermoset resin flow model that is generated based on the thermoset resin rheology data, the information associated with the PCB laminate design, and the first set of PCB lamination parameters;
sending first instructions to a PCB lamination device; and
forming a first printed circuit board laminate according to the first set of PCB lamination parameters.

US Pat. No. 10,169,498

PARTICLE-BASED SIMULATION THROUGH POWER DIAGRAMS

California Institute of T...

1. A system for generating computer graphics comprising:a processor; and
a memory containing a model of a fluid, where the fluid is broken into a set of cells each defining a volume with boundaries that are relative to a distance of a set of points and the set of cells are continuous within the model of the fluid;
wherein the processor is directed by a power particle application to:
calculate a plurality of forces acting on the set of cells;
move the set of cells within the model of the fluid based upon the plurality of forces; and
update the model of the fluid with a new set of cells; wherein updating the model of the fluid comprises updating the volume of the set of cells with a local volume change using the following expression:
Vi?Vi+dt[Dv]i
where V is a target volume, i is a point in a cell in the set of cells, D is a divergence operator, and v is a velocity.

US Pat. No. 10,169,497

METHOD AND APPARATUS FOR ANALYSIS OF SHAPE OPTIMIZATION

JFE Steel Corporation, (...

1. A method for analysis of shape optimization in which a computer executes optimization of a portion forming a structural body model with a two-dimensional element or a three-dimensional element, the method executed by the computer, and comprising:a design space setting step of setting, as a design space, a portion to be optimized in the structural body model;
an optimization block model generating step of generating, in the set design space, an optimization block model formed of three-dimensional elements and that performs an analysis processing of optimization;
a connection processing step of connecting the generated optimization block model with the structural body model;
a material property setting step of setting a material property for the optimization block model;
a crashworthy optimum shaping condition setting step of setting a crashworthy optimum shaping condition for the optimization block model, the crashworthy optimum shaping condition being a condition that finds an optimum shape for a crashworthiness;
a crashworthiness analysis condition setting step of setting a crashworthiness analysis condition for the structural body model with which the optimization block model has been connected, the crashworthiness analysis condition being a condition that performs a crashworthiness analysis;
a three-dimensional element necessity calculation step of executing, based on the set crashworthy optimum shaping condition and the crashworthiness analysis condition, the crashworthiness analysis on the optimization block model, and calculating information related to necessity of each of the three-dimensional elements of the optimization block model for the crashworthiness;
an optimum shape determining step of determining, based on a result of the calculation, an optimum shape for the crashworthiness,
utilizing the analysis of shape optimization for configuring optimization of the structural body formed from a thin sheet, and
displaying the structural body model based on the optimum shape determining step,
wherein in the optimization block model generating step,
when the computer or an operator selects a plane having the maximum area of the design space having a size that fits in the set design space, along a peripheral surface where the design space has been set in the structural body model,
the computer pushes out the three-dimensional elements in parallel with the plane having the maximum area of the design space such that the three-dimensional elements and the design space are to be integrated by node sharing, and subdivides the three-dimensional elements such that the three-dimensional elements have at least one pair of sides parallel to each other, and
the optimization block model is generated by:
setting nodes in a connected portion with the two-dimensional elements or the three-dimensional elements forming the structural body model; and
stacking the three-dimensional elements along a plane including the nodes set in the connected portion.

US Pat. No. 10,169,496

SPRINGBACK AMOUNT EVALUATION METHOD

JFE STEEL CORPORATION, T...

1. A method of manufacturing a press forming product, comprising:forming the press forming product by press forming a metal sheet with a die;
evaluating a springback amount after die release of the press forming product by a computer; and
implementing countermeasures against the springback amount based on the evaluation,
wherein evaluating the springback amount includes:
finding a shape to be a reference of the press forming product and a shape after the die release by an analysis using the computer or by actually performing three dimensional shape measurement; and
executing a predetermined program, the predetermined program executed by a processor of the computer, as follows:
setting, with respect to the shape to be the reference of the press forming product and the shape after the die release, a plurality of section planes intersecting a shape of the press forming product at predetermined intervals and parallel to one another, the plurality of section planes being set on the computer;
obtaining a sectional shape of the press forming product for each of the set section planes; and
obtaining an orientation of each of the sectional shapes in each section plane as a direction of each of the sectional shapes,
in which for each of the shape to be the reference of the press forming product and the shape after the die release, the section plane setting step, the sectional shape obtaining step, and the sectional shape direction obtaining step are performed,
the amount of springback is evaluated from an amount of torsion defined as a deformation by rotation of the sectional shapes about an axis by comparing, for all of the section planes, the obtained directions of the sectional shapes for the shape to be the reference and for the shape after the die release, and by obtaining a rotational angle of each sectional shape of the section planes and comparing the rotational angle of each sectional shape for all of the obtained sectional shapes, and
a direction of each of the sectional shapes in the each section plane is a direction in which a second moment of area in the sectional shape indicates a maximum value or minimum value, a direction in which a section modulus in the sectional shape indicates a maximum value or minimum value, or a long side direction or a short side direction of a smallest rectangle circumscribing the sectional shape.

US Pat. No. 10,169,495

METHOD FOR VERIFYING HARDWARE/SOFTWARE CO-DESIGNS

International Business Ma...

1. A computer system for formally verifying a hardware/software co-design, the computer system comprising:one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, wherein the computer system is capable of performing a method comprising:
providing in a co-design, a first model, and a second model, wherein the first model is one of a hardware model, and the second model is one of a software model, or vice versa;
performing an abstraction on the first model, wherein the abstraction comprises refining the first model to a lower abstraction level;
specifying a safety property comprising one or more conditions to be satisfied by a composed hardware/software model;
combining the abstraction of the first model and the safety property to obtain an abstracted first model;
translating the abstracted first model and a corresponding interface model into a Property Specification Language, wherein the Property Specification Language is capable of describing a model environment for the second model;
based on the described model environment, composing, by a model checker, the abstracted first model and the second model to obtain the composed hardware/software model, wherein the model checker automatically composes the abstracted first model and the second model using a construct in the Property Specification Language;
verifying whether the composed hardware/software model satisfies the safety property;
in response to the composed hardware/software model not satisfying the safety property, projecting, by the model checker, a counterexample on the first model, wherein the counterexample is projected on variables of the abstracted first model, the interface model, and the second model such that a sequence of model states is obtained as a consequence of projecting the counterexample;
verifying whether the counterexample projected on the first model comprises a real error trace in the first model;
based on the counterexample being a real error trace, signaling that the hardware/software co-design violates the safety property; and
based on the counterexample not being a real error trace, refining the abstraction of the first model to eliminate the error trace.

US Pat. No. 10,169,493

METHOD FOR MANIPULATING A COMPUTER AIDED DESIGN (CAD) MODEL, COMPUTER PROGRAM PRODUCT AND SERVER THEREFORE

Bricsys NV, Ghent (BE)

1. A method for manipulating a computer aided design (CAD) model, comprising the computer-implemented steps of:a) determining one or more entities in a CAD model that are associated with a cursor controlled by a user;
b) determining a set of one or more adequate user actions to execute on said one or more entities;
c) providing a suggestion menu comprising said set of one or more adequate user actions;
characterized in, that said set of one or more adequate user actions is partly determined by previously executed user actions by said user, wherein each one of the previously executed user actions is a CAD action previously executed on said one or more entities in the CAD model.

US Pat. No. 10,169,492

FIBER PLACEMENT OPTIMIZATION FOR STEERED-FIBER PLIES

The Boeing Company, Chic...

1. A method, performed by a computer system, for determining optimum tow cut locations for steered-fiber placement, said method comprising:(a) generating stream function data with a multiplicity of corresponding stream lines;
(b) generating course pair data representing successive pairs of neighboring courses having centerlines corresponding to the stream lines representing the stream function data generated in operation (a) such that there is no gap between the neighboring courses; and
for each pair of neighboring courses:
(c) determining potential tow cut locations where any uncut tow from one of the pair of neighboring courses will potentially overlap with any uncut tow from the other of the pair of neighboring courses in dependence on a set of allowable coverage parameter values,
(d) generating geometry data for each potential tow cut location, and
(e) selecting which tows of the pair of neighboring courses should be cut or added at which tow cut locations selected from the potential tow cut locations determined in operation (c) and in which direction the courses should be laid down, wherein the tows selected for cutting at the selected tow cut locations and the selected direction for course laydown minimize a penalty function taking a plurality of constraints into account;
(f) generating machine code for controlling a fiber placement machine to cut the tows selected for cutting in operation (e) and lay down the courses in the direction selected in operation (e);
(g) storing the machine code generated in operation (f) on a computer-readable medium; and
(h) operating a computer numerical control tow placement machine in accordance with the machine code stored on said computer-readable medium,
wherein said plurality of constraints comprise a maximum thickness build-up, a minimum turning radius for a centerline of each neighboring course, a coverage parameter which determines where tows will be terminated and restarted with respect to a boundary, a minimum cut length for each tow, and a maximum number of tow cuts within an overlap area, and
wherein operation (e) further comprises generating a list of segment variables for each tow, indicating whether it is active or inactive, and generating a list of cut variables, indicating whether a tow is cut or added at a potential tow cut location or if the status is unchanged.

US Pat. No. 10,169,491

QUERY SERVICING WITH ACCESS PATH SECURITY IN A RELATIONAL DATABASE MANAGEMENT SYSTEM

International Business Ma...

1. A method for servicing a data query with access path security in a relational database management system (RDBMS) within a computer system that comprises a processor, said method comprising:said processor configuring access path security corresponding to a user originating the data query requesting data stored in the RDBMS pursuant to a configuration query associated with the user;
after said configuring the access path security, said processor receiving the data query from the user,
wherein the RDBMS operates in a computer system, said RDBMS comprising a database, said database comprising at least one table, a table of said at least one table comprising at least one record, a record of said at least one record comprising at least one field, a field of said at least one field having a name of the field and a value stored in the field, wherein the table comprises an index field that uniquely identifies each record of the table, wherein the database searches the record faster when using the index field than when a non-index field of the table in searching for the record within the table,
wherein the data query requests a value stored in a result field by specifying the result field and a result table of said at least one table, wherein the result field is within a result record of the result table,
wherein the configuration query specifies a usable index field associated with the result table enabling the user to access the result table by use of the usable index field,
wherein the access path security is selected from a group consisting of access-by-key and access-by-scan,
wherein the access-by-key access path security mandates the user to provide a search key in the data query in searching the result table, wherein the search key comprises a name and a value, the name of the search key being identical to the usable index field specified in the configuration query associated with the user such that the access-by-key access path security enables users to search the result table only when the users specify the usable index field in the data query, and
wherein the access-by-scan access path security enables the user to scan all fields in any record of the result table pursuant to a search condition of the data query.

US Pat. No. 10,169,490

QUERY DISAMBIGUATION IN A QUESTION-ANSWERING ENVIRONMENT

International Business Ma...

1. A computer-implemented method of query disambiguation in a question-answering environment, the method comprising:identifying, using a first natural language processing technique, a first set of word clusters in a first candidate answer of a plurality of candidate answers generated in response to a first input query for a question-answering system, the first set of word clusters including a first word cluster, each of the first set of word clusters classified according to a semantic term of a first set of semantic terms and a syntactic element of a first set of syntactic elements, wherein one or more syntactic elements of the first set of syntactic elements are a first set of parts of speech and the identification of the first set of word clusters includes tagging the first set of semantic terms and the first set of syntactic elements;
identifying, using the first natural language processing technique, in the first input query, a second set of word clusters, each of the second set of word clusters classified according to a semantic term of a second set of semantic terms and a syntactic element of a second set of syntactic elements, wherein one or more syntactic elements of the second set of syntactic elements are a second set of parts of speech and the identification of the second set of word clusters includes tagging the second set of semantic terms and the second set of syntactic elements;
determining, by comparing the first and second sets of semantic terms and the first and second set of syntactic elements, respectively, that the first word cluster is classified according to a first semantic term and a first syntactic element that is not present in the second set of semantic terms and the second set of syntactic elements, respectively;
determining, using a second natural language processing technique, a set of domains from the first set of word clusters, each of the set of domains corresponding to a topic, and wherein at least one domain of the set of domains is an ontological domain;
determining a number of domains in the set of domains;
determining an amalgamated confidence value for the first candidate answer; and
wherein the determining that the first word cluster is classified according to a syntactic element not present in the second set of syntactic elements, and generating the clarification query in response to determining that the amalgamated confidence value achieves a first ambiguity criterion and the number of domains achieves a second ambiguity criterion, wherein the second ambiguity criterion is based on at least a ratio of the number of domains to the number of candidate answers in the plurality of candidate answers; and
generating, using a third natural language processing technique, a user-display clarification query using the first input query and the first word cluster; and
providing, using a display, the user input query to a user that provided the first input query.

US Pat. No. 10,169,489

QUERY DISAMBIGUATION IN A QUESTION-ANSWERING ENVIRONMENT

International Business Ma...

1. A system for query disambiguation in a question-answering environment, the system comprising:a processor; and
a computer readable storage medium having program instructions embodied therewith, the program instructions executable by the processor to cause the system to:
identify, using a first natural language processing technique, a first set of word clusters in a first candidate answer of a plurality of candidate answers generated in response to a first input query for a question-answering system, the first set of word clusters including a first word cluster, each of the first set of word clusters classified according to a semantic term of a first set of semantic terms and a syntactic element of a first set of syntactic elements, wherein one or more syntactic elements of the first set of syntactic elements are a first set of parts of speech and the identification of the first set of word clusters includes tagging the first set of semantic terms and the first set of syntactic elements;
identify, using the first natural language processing technique, in the first input query, a second set of word clusters, each of the second set of word clusters classified according to a semantic term of a second set of semantic terms and a syntactic element of a second set of syntactic elements, wherein one or more syntactic elements of the second set of syntactic elements are a second set of parts of speech and the identification of the second set of word clusters includes tagging the second set of semantic terms and the second set of syntactic elements;
determine, by comparing the first and second sets of semantic terms and the first and second set of syntactic elements, respectively, that the first word cluster is classified according to a first semantic term and a first syntactic element that is not present in the second set of semantic terms and the second set of syntactic elements, respectively;
determine, using a second natural language processing technique, a set of domains from the first set of word clusters, each of the set of domains corresponding to a topic, and wherein at least one domain of the set of domains is an ontological domain;
determine a number of domains in the set of domains;
determine an amalgamated confidence value for the first candidate answer; and
wherein the program instructions cause the system to determine that the first word cluster is classified according to a syntactic element not present in the second set of syntactic elements and generate the clarification query in response to program instructions that further cause the system to determine that the amalgamated confidence value achieves a first ambiguity criterion and the number of domains achieves a second ambiguity criterion, wherein the second ambiguity criterion is based on at least a ratio of the number of domains to the number of candidate answers in the plurality of candidate answers; and
generate, using a third natural language processing technique, a user-display clarification query using the first input query and the first word cluster.

US Pat. No. 10,169,487

GRAPH DATA REPRESENTATION AND PRE-PROCESSING FOR EFFICIENT PARALLEL SEARCH TREE TRAVERSAL

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for clique enumeration of graph data, the method comprising:receiving, using a processor system, data representing a graph comprising a plurality of nodes and a plurality of edgesI connecting at least some of the nodes;
generating, using the processor system at least one adjacency list specifying nodes that are neighbors of a node based on the received data representing the graph, wherein the at least on adjacency list is generated by:
generating for a node, a set of nodes including the node and all neighboring nodes;
generating an ordering of the set of nodes including the node and all neighboring nodes by performing a lexicographic breadth-first search on the data representing the graph by selecting neighbors of nodes that have already been selected; and
reordering nodes in the at least one adjacency list based on the generated ordering of the set of nodes; and
generating, based on the at least one adjacency list, at least one maximal clique, wherein the at least one maximal clique specifies at least one set of nodes in which every node is connected to every other node and to which no additional node can be added with every node still being connected to every other node.

US Pat. No. 10,169,486

BUILDING MANAGEMENT SYSTEM WITH TIMESERIES PROCESSING

Johnson Controls Technolo...

1. A building management system comprising:building equipment that provide raw data samples of one or more data points in the building management system, the building equipment comprising one or more physical devices that operate to monitor or control a physical building condition, the physical devices comprising at least one of a sensor, an air handling unit, a heater, a chiller, a boiler, a pump, a valve, a fan, an actuator, or a controller;
a processing system comprising one or more processors and one or more memories having instructions stored thereon that, when executed by the one or more processors, cause the processing system to operate as a data collector, a timeseries processing engine, a control application, and a timeseries storage interface;
the data collector operates to collect the raw data samples from the building equipment and generate one or more raw data timeseries comprising a plurality of the raw data samples, each of the raw data samples comprising a timestamp and a data value;
the timeseries processing engine operates to:
identify an initial timeseries processing workflow that applies to the raw data timeseries, the initial timeseries processing workflow being stored in a timeseries processing workflow database, and retrieve the initial timeseries processing workflow from the timeseries processing workflow database, the initial timeseries processing workflow comprising a predefined sequence of timeseries processing operations;
identify one or more other data timeseries required as inputs to the initial timeseries processing workflow;
generate an enriched timeseries processing workflow comprising the initial timeseries processing workflow, the raw data timeseries, and the other data timeseries; and
execute the enriched timeseries processing workflow to generate one or more derived data timeseries from the raw data timeseries and the one or more other data timeseries;
the timeseries storage interface operates to store the raw data timeseries and the derived data timeseries in a timeseries database; and
the control application operates to:
generate a control signal for the building equipment based at least in part on the derived data timeseries stored in the timeseries database; and
control the physical building condition by operating the building equipment based on the control signal.

US Pat. No. 10,169,485

DYNAMIC PARTITIONING OF GRAPH DATABASES BASED ON EDGE SAMPLING

International Business Ma...

1. A computer-implemented method comprising:identifying, by one or more processors, a graph database partitioned across multiple computers in a clustered computing environment, wherein the graph database includes, as data structures for storing data in the database, a set of graph database edges and a set of graph database vertices, and wherein each vertex of the set of graph database vertices is associated with one or more edges of the set of graph database edges;
determining, by one or more processors, an edge traversal value for one or more edges of the set of graph database edges, wherein the edge traversal value for a respective edge relates to a number of times that the respective edge is traversed in response to one or more queries of the graph database, and wherein the edge traversal value for a respective edge resets when the respective edge reaches a certain age;
calculating, by one or more processors, a first vertex score for a first vertex on a first graph partition on a first computer, based, at least in part, on the edge traversal value(s) for one or more interpartition edges associated with the first vertex and not on the edge traversal value(s) for intrapartition edges; and
responsive to determining that the first vertex score is above a predetermined threshold, migrating, by one or more processors, the first vertex to a second graph partition on a second computer.

US Pat. No. 10,169,483

VALIDATION OF SCHEMA AND SCHEMA CONFORMANCE VERIFICATION

INTERNATIONAL BUSINESS MA...

1. A method comprising:receiving a schema as an input;
for at least one element in the schema:
parsing the element from the schema;
validating the parsed element by comparing the parsed element to a node within a first schema parse tree;
generating, using a processor, a parse tree node for the parsed element, the parse tree node configured to call at least one validation rule, external to a second schema parse tree, which validates an element of a document corresponding to the parse tree node; and
adding the parse tree node to the second schema parse tree; and
outputting the second schema parse tree.

US Pat. No. 10,169,482

SPATIALLY-ORIENTED TRAVERSAL ANIMATIONS FOR NETWORK ADDRESS TRANSITIONS

International Business Ma...

1. A method comprising:receiving a destination Internet address for a destination web page into a graphical web browser that is displaying a current web page having a current Internet address on an electronic display device;
determining, via electronic analysis of the destination Internet address and the current Internet address by a computer processor, a relationship between the destination Internet address and the current Internet address within an Internet domain, wherein the determining the relationship includes determining the relationship is one of a drill-down relationship within a hierarchy of the Internet domain, a back-out relationship within the hierarchy of the Internet domain, or a same-level relationship within the hierarchy of the Internet domain;
determining, by the computer processor, a spatially-oriented traversal animation based on the relationship between the destination Internet address and the current Internet address, wherein the spatially-oriented traversal animation is from a plurality of different types of animations associated with different hierarchical relationships between Internet pages within the Internet domain, wherein the determining includes selecting a corresponding one of the plurality of different types of animations associated with the one of the drill-down relationship, the back-out relationship, or the same-level relationship;
animating bringing the destination web page onto the electronic display device using the spatially-oriented traversal animation; and
displaying the destination web page after the spatially-oriented traversal animation.

US Pat. No. 10,169,481

METHOD FOR INTELLIGENT WEB REFERENCE PRELOADING BASED ON USER BEHAVIOR PREDICTION

ADOBE SYSTEMS INCORPORATE...

1. A non-transitory computer storage media storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising:identifying one or more links in a document object model of a document corresponding to a current page provided via a browser;
creating an index containing the one or more links, the index including coordinates of the one or more links and predefined trigger area coordinates of an individual trigger area for each of the one or more links, wherein each trigger area is a predefined area around a corresponding link from the one or more links;
detecting a user interaction, the user interaction corresponding to movement of a cursor within a first trigger area, the first trigger area associated with a first link of the one or more links, the user interaction occurring before selection of the first link associated with the first trigger area; and
upon detecting the user interaction within the first trigger area, disabling standard click behavior for the first link.

US Pat. No. 10,169,479

INTERNET-BASED PROXY SERVICE TO LIMIT INTERNET VISITOR CONNECTION SPEED

CLOUDFLARE, INC., San Fr...

1. A method in a proxy server for limiting Internet connection speed of visitors that pose a threat, comprising:receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain returning an IP address of the proxy server instead of an IP address of the origin server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities;
analyzing the request to determine whether a visitor belonging to the request poses a threat; and
responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open.

US Pat. No. 10,169,478

OPTIMIZE DATA EXCHANGE FOR MVC-BASED WEB APPLICATIONS

International Business Ma...

1. A method for reducing network traffic when updating a web page, the method comprising the steps of:receiving, by a first computer, a Hypertext Transfer Protocol (HTTP) request for an update for a webpage from a second computer;
determining, by the first computer, a portion of the webpage has changed;
determining, by the first computer, that an amount of data to be transmitted to update the portion of the webpage that has changed is smaller in size than an amount of data to be transmitted to update the entire webpage;
responsive to determining the amount of data to update the portion of the webpage that has changed is smaller than the amount of data to update the entire webpage, transmitting, by the first computer, to the second computer the amount of Hypertext Markup language (HTML) data to update the portion of the webpage that has changed wherein the portion of the webpage that has changed is identified based on a server framework mapping one or more unique runtime identifiers associated with one or more input HTML tags to an application definition identifier; and
responsive to determining the amount of data to update the entire webpage is smaller than the amount of data to update the portion of the webpage that has changed, transmitting, by the first computer, to the second computer the amount of HTML data to update the entire webpage.

US Pat. No. 10,169,477

METHOD AND SYSTEM FOR RENDERING A WEB PAGE FREE OF INAPPROPRIATE URLS

SAMSUNG ELECTRONICS CO., ...

1. A method for disabling inappropriate Universal Resource Locators (URLs) in a web page, the method comprising:loading the web page;
parsing the web page to obtain at least one URL present in the web page;
preloading the obtained URL comprises fetching at least one of metadata information and web page content corresponding to the obtained URL,
wherein the preloading the obtained URL comprises preloading each URL identified in the web page into a secondary page viewer that is running in background;
identifying whether the obtained URL comprises inappropriate content based on the at least one of the metadata information and the web page content of the obtained URL;
based on identifying that the obtained URL comprises the inappropriate content, modifying the web page by disabling the obtained URL; and
rendering the modified web page,
wherein the disabling comprises disabling the obtained URL by replacing information identifying the obtained URL with at least one from among a text, an image and a dummy URL.

US Pat. No. 10,169,476

METHOD, APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM FOR GROUPING SOCIAL NETWORK NODES

TENCENT TECHNOLOGY (SHENZ...

1. A method for recommending friends to a user of a social networking group, performed by a computing device, comprising:obtaining user identifiers of members of the social networking group;
dividing the members of the social networking group into a first set of members that have a direct relationship with the user and a second set of members that have no direct relationship with the user;
for each of the user identifiers of the social networking group:
determining a total number of members within the first set of members whose relationship with a corresponding member satisfy at least one of a set of predefined conditions including:
the corresponding member being a member of the first set of members;
the corresponding member having the direct relationship with a member of the first set of members; and
when the corresponding member has the direct relationship with a predetermined number of members of the second set of members and the predetermined number of members of the second set of members have the direct relationship with a member of the first set of members, the corresponding member having the relationship with a member of the first set of members;
dividing the total number of members within the first set of members whose relationship with the corresponding member satisfy at least one of the set of predefined conditions by a total number of members within the first set of members as a relevance degree between the corresponding member and the other members of the social networking group;
displaying the user identifiers of the members in the social networking group according to their respective calculated relevance degrees, wherein at least one member in the second set of members has a relevance degree higher than that of at least one member in the first set of members;
receiving a user selection of the user identifier of the at least one member in the second set of members; and
establishing a direct relationship between the user and the at least one member in the second set of members.

US Pat. No. 10,169,475

PATTERN FOR NAVIGATING CONTENT IN A PORTAL

International Business Ma...

3. A portal application system comprising:a processor configured to implement:
a navigation portlet provided for a portal; and
a content viewer portlet provided for the portal, wherein said navigation portlet and said content viewer portlet each comprises a model component, a view component and a controller component, and wherein the view component of the navigation portlet displays category information obtained by the model component of the navigation portlet from a content management system to form displayed category information, wherein the category information is a classification assigned to a content item that indicates a higher level grouping to which the content item belongs, and the view component of the content viewer portlet displays content information obtained by the model component of the content viewer portlet from the content management system to form displayed content information, wherein the content information is information that includes content items associated with a specific category of the category information;
wherein the controller component of the navigation portlet is operable to update the displayed category information in the navigation portlet, and is further operable to send an update message to the controller component of the content viewer portlet, in order to update the displayed content information in the content viewer portlet, in response to a user action selecting a category from displayed category information in the navigation portlet;
wherein the view component of the content viewer portlet is operable to update the displayed content information in the content viewer portlet, in response to controller component of the content viewer portlet receiving the update message from the controller component of the navigation portlet;
wherein the controller component of the content viewer portlet is operable to update the displayed content information in the content viewer portlet, and is further operable to send another update message to the controller component of the navigation portlet, in order to update the displayed category information in the navigation portlet, in response to a user action selecting content from displayed content information in the content viewer portlet;
wherein the view component of the navigation portlet is operable to update the displayed category information in the navigation portlet, in response to controller component of the navigation portlet receiving the another update message from the controller component of the content viewer portlet;
wherein operating the controller component of the navigation portlet to update the display category information in the navigation portlet comprises sending, by the controller component of the navigation portlet, a request to the model component of the navigation portlet to obtain additional category information from the content management system that is coupled to both the navigation portlet and the content viewer portlet; and
wherein operating the controller component of the content viewer portlet to update the display content information in the content viewer portlet comprises sending, by the controller component of the content viewer portlet, a request to the model component of the content viewer portlet to obtain additional content information from the content management system.

US Pat. No. 10,169,474

MOBILE APPLICATION DISCOVERY USING AN ELECTRONIC MAP

International Business Ma...

1. A method for mobile application usage detection, the method comprising:detecting, by one or more computer processors, mobile application usage data of one or more computing devices in a first geographic area during a first time period;
displaying, by the one or more computer processors, the mobile application usage data on an electronic map, wherein the electronic map depicts at least the first geographic area;
receiving, by the one or more computer processors, an additional time period, wherein the additional time period is a future time period;
retrieving, by the one or more computer processors, mobile application usage data of one or more computing devices corresponding to one or more geographic areas included in the electronic map and to a past time period associated with the one or more geographic areas;
determining, by the one or more computer processors, based, at least in part, on the retrieved mobile application usage data, historical trends of mobile application usage;
predicting, by the one or more computer processors, based, at least in part, on the historical trends, mobile application usage data for the future time period by forecasting the historical trends into the future time period;
overlaying, by the one or more computer processors, on the first geographic area depicted by the electronic map, one or more mobile application icons associated with the detected mobile application usage data in one or more locations corresponding to the detected mobile application usage data;
receiving, by the one or more computer processors, a selection of one or more overlaid mobile application icons; and
responsive to receiving the selection of one or more overlaid mobile application icons, overlaying, by the one or more computer processors, on the electronic map, a boundary line that surrounds an area in which one or more mobile applications represented by the selected one or more overlaid mobile application icons are commonly used.

US Pat. No. 10,169,473

PACKAGED SEARCHING SYSTEM AND METHOD

Hyundai Motor Company, S...

1. A packaged searching system, comprising:a memory configured to store program instructions; and
a processor configured to execute the program instructions, the program instructions when executed configured to:
display a plurality of search target objects selected on a map to distinguish the plurality of search target objects from unselected objects;
create and display a plurality of search boxes on the map, wherein each of the plurality of search boxes correspond to the respective distinguished search target objects, and search keywords are independently input in each of the plurality of search boxes;
map the respective distinguished search target objects to each of the created search boxes;
search information regarding the respective distinguished search target objects mapped to the respective search boxes simultaneously using the independently inputted search keywords, wherein the information regarding the respective distinguished search target objects is searched within a space related to the search target objects, contents related to the search target objects, and information related to the selected search target objects; and
display the searched information for each of the plurality of search target objects, wherein
pieces of information among the searched information are displayed at separate positions on the map adjacent to the displayed plurality of search boxes for each of the plurality of search target objects, and
when the plurality of search target objects and the plurality of search boxes are configured as layers, the plurality of search boxes are mapped to the plurality of search target objects by invoking an interface disposed between the layers to transmit identifier information of the plurality of search target objects.

US Pat. No. 10,169,471

GENERATING AND EXECUTING QUERY LANGUAGE STATEMENTS FROM NATURAL LANGUAGE

International Business Ma...

1. A method for generating query language statements for a document repository comprising:detecting, via a processor, a search query corresponding to a document repository;
generating, via the processor, a modified search query by adding atomic tags to the search query, the atomic tags being based on prior knowledge obtained by static analysis of the document repository and semantic rules;
generating, via the processor, enriched tags based on combinations of the atomic tags and any previously identified enriched tags and adding the generated enriched tags to the modified search query;
generating, via the processor, a first set of conditions based on combinations of the atomic tags and the generated enriched tags and generating a second set of conditions based on free-text conditions, the second set of conditions corresponding to terms in the search query that are not associated with any of the first set of conditions;
reconciling, via the processor, the first set of conditions based on identified contradictions;
generating, via the processor, the query language statements corresponding to the search query, the query language statements based in part on the first set of conditions and the second set of conditions; and
displaying, via the processor, a plurality of documents from the document repository that satisfy the query language statements, wherein
the generating the query language statements comprises:
joining at least two queries for documents of a same type with a logical disjunction or at least two queries for documents of a different type with a logical conjunction.