US Pat. No. 10,482,523

METHODS AND SYSTEMS FOR PROVIDING PURCHASE RECOMMENDATIONS BASED ON RESPONSES TO INQUIRIES ON PRODUCT ATTRIBUTES

Capital One Services, LLC...

1. A computer-implemented method for determining vehicle recommendations based on user interaction, the method comprising:determining respective frequency distributions of a plurality of vehicle attributes, the frequency distributions being determined based on occurrences of values of the plurality of vehicle attributes in a set of vehicles;
selecting a vehicle attribute from the plurality of vehicle attributes based on the frequency distributions of the plurality of vehicle attributes;
transmitting, to a user device, an inquiry for user preference regarding the selected vehicle attribute;
receiving, from the user device, a response indicating the user preference; and
presenting, to the user device, a recommendation of one or more vehicles determined based on the received response.

US Pat. No. 10,482,522

METHOD FOR PROVIDING A CUSTOMIZED PRODUCT RECOMMENDATION

The Gillette Company LLC,...

1. A digital imaging method of analyzing shaving stroke video information for providing a customized product recommendation to a user, the digital imaging method comprising the steps of:a. collecting by a digital camera video information from a user when shaving;
b. transmitting the video information from the digital camera to a computing device;
c. analyzing by an analyzing logic in the computing device the video information from the digital camera to determine a type of each shaving stroke and an area on the body where each shaving stroke is taken when shaving;
d. selecting by the analyzing logic in the computing device a product for the user from at least two available products based upon the type of each shaving stroke and the area on the body where each shaving stroke is taken; and
e. recommending by an interface logic in the computing device the selected product to the user.

US Pat. No. 10,482,521

INTENT PREDICTION BASED RECOMMENDATION SYSTEM USING DATA COMBINED FROM MULTIPLE CHANNELS

1. A computer implemented method for making recommendations to a user, comprising:providing a processor configured for receiving a query from a user through a plurality of channels;
during a data fusion stage, said processor configured for using said customer's Web journey, multi-channel journeys, and activities that generate data from multi-channels to match the query received from the user with a previous query from any of said user and one or more other users;
said processor configured for combining data from said plurality of channels in real time to predict user intent in connection with said identified resources, wherein unique identifiers are created, captured, and/or passed between said plurality of channels to identify and tag the user and the user's context uniquely;
during an intent prediction stage, said processor configured for predicting in real time an outcome of a future selection by said user from a sequence of previous selections made by any of said user and from one or more frequent sequences of previous selections made by a plurality of users;
said processor configured for using activities of a group of similar users to provide a basis for determining a current user's intent where insufficient information is available about said user or said user is a new visitor;
during a recommendation stage, said processor configured for collecting and analyzing information gathered during previous visits of one or more users, including that of a current user, to determine in descending order a most frequent sequence of selections;
said processor configured for ranking results of said predicting;
said processor configured for presenting a ranked order of recommended results to said user;
said processor configured for displaying products or services having the highest scores through any of a plurality of channels, wherein each channel has a different setting for top products or services;
said processor configured for proactively identifying a user need and initiating user contact and/or interaction through any of chat sessions and telephonic contact with a call center;
said processor configured for, during user interaction, determining a specific type of user engagement mode based upon the intent of the user; and
said processor configured for providing a recommendation to said user based on any of information gathered through said contact and/or interaction and past user activities.

US Pat. No. 10,482,519

RELATIONSHIP-BASED SEARCH AND RECOMMENDATIONS VIA AUTHENTICATED NEGATIVES

NETFLIX, INC., Los Gatos...

1. A method, comprising:receiving, from a first client device, a first selection of a first recommended item included in a plurality of recommended items presented on the first client device for streaming to the first client device over a network, wherein each of the plurality of recommended items is tagged with a user identifier associated with a user of the first client device;
identifying a second recommended item included in the plurality of recommended items that has not been selected for presentation by the user of the first client device, wherein the second recommended item is marked as an item that has not been selected for presentation by the user of the first client device;
retrieving an authenticated negative item from a plurality of authenticated negative items not included in the plurality of recommended items, wherein the plurality of authenticated negative items are not presented on the first client device and are associated with content deemed to be undesirable by one or more users other than the user of the first client device;
tagging the authenticated negative item with the user identifier associated with the user of the first client device;
marking the authenticated negative item as an item that has not been selected by the user of the first client device;
storing in a digital log file one or more entries associated with a presentation of the plurality of recommended items on the first client device, wherein each of the one or more entries includes the user identifier associated with the user of the first client device, and wherein at least one of the one or more entries identifies the authenticated negative item tagged with the user identifier and marked as an item that has not been selected; and
generating a second plurality of recommended items for presentation on the first client device based at least on the one or more entries stored in the digital log file.

US Pat. No. 10,482,518

HTTP PARALLEL PROCESSING ROUTER

Walmart Apollo, LLC, Ben...

1. A server comprising:a router comprising an Input/Output (I/O) terminal;
wherein the router is configured to communicatively couple with at least one client;
wherein the I/O terminal of the router is configured to communicatively couple with a plurality of remote servers; and
wherein the router is configured to:
receive a web services request from the at least one client;
identify, based on the web services request, at least two remote servers of the plurality of remote servers that are to fulfill at least a portion of the web services request; and
transmit, in parallel via the I/O terminal, requests to fulfill respective portions of the received web services request to each of the at least two remote servers;
wherein the router is further configured to:
generate a first send web service request to be sent to a first remote server of the at least two remote servers, wherein the first send web service request comprises a first product identification information corresponding to a first product identified from the web service request;
generate a second send web service request to be sent to a second remote server of the at least two remote servers, wherein the second send web service request comprises a second product identification information corresponding to a second product identified from the web service request; and
wherein the router, in transmitting the requests to fulfill the respective portions of the received web service request, is configured to transmit in parallel the first send web service request to the first remote server and the second send web service request to the second remote server.

US Pat. No. 10,482,517

PROVIDING A SIMULATION OF WEARING ITEMS SUCH AS GARMENTS AND/OR ACCESSORIES

ZUGARA, INC., Culver Cit...

1. A system configured for allowing a user to simulate wearing real-wearable items, the system comprising:one or more hardware processors configured by machine-readable instructions to:
obtain, from a client computing platform, a live video feed;
recognize a position and/or orientation of one or more body parts of a user within the live video feed, the one or more body parts including a first body part;
provide a virtual-outfitting interface for presentation to the user via the client computing platform, the virtual-outfitting interface including two or more separate portions simultaneously presented in the virtual-outfitting interface, the two or more separate portions including a main display portion and an icon that is overlaid upon the main display portion,
wherein the main display portion includes a composite video feed that incorporates the live video feed of the user and a first virtual-wearable item, and wherein a position, size, and/or orientation of the first virtual-wearable item is determined such that the first virtual-wearable item moves within the main display portion according to the position and/or orientation of the user within the live video feed so that the user appears to be wearing the first virtual-wearable item in real time in the main display portion; and
provide a social-networking tool graphically presented in the virtual-outfitting interface, the social-networking tool allowing the user to interface with one or more social-networking services with which the user is associated.

US Pat. No. 10,482,514

PRECIOUS METALS TRANSACTION SYSTEMS AND METHODS

1. A method of conducting a sales transaction between a seller and a buyer involving an article formed of precious metal, said method including the steps of:prompting the seller to identify the type of article;
prompting the seller to place the article on a mount in an analysis chamber, said mount automatically selected from a plurality of mounts based on article type;
capturing photographic images of the article using a digital camera, and electronically storing said photographic images in a transaction data file on a computer data storage device;
analyzing said photographic images to determine whether the article includes non-precious metal material;
terminating the transaction if the article is determined to include material other than precious metal;
determining the weight of said article using a digital scale, and electronically storing the determined weight in said transaction file;
determining the surface alloy composition of said article using an XRF analysis device, and electronically storing the determined surface alloy composition in said transaction file;
determining whether the composition of the article is uniform throughout by analyzing the electrical conductivity of the article, and electronically storing the composition uniformity determination in said transaction file;
terminating the transaction if the composition of the article is not determined to be uniform, and continuing the transaction if the composition of the article is determined to be uniform;
initiating a wireless communications link to a precious metals exchange and determining the current market value of precious metal matching said determined surface alloy composition, and electronically storing the determined market value in said transaction file;
determining an offer price for the purchase of said article using the determined weight of the article, the determined alloy composition of the article, and the determined market value of a precious metal matching the surface alloy composition;
displaying a purchase offer to the seller on an electronic display;
confirming the seller's acceptance of said purchase offer;
obtaining a biometric fingerprint sample from the seller using a fingerprint scanner, and storing said fingerprint sample in said transaction file;
obtaining a digital copy of the seller's driver's license using a document scanner, and storing said copy in said transaction file;
recording a verbal description of the article by the seller, and saving said verbal description in said transaction file;
converting said verbal description to a text file using voice recognition software, and saving said text file in said transaction file;
generating a bill of sale form to document the transaction by populating fields using data from said transaction file, said data including information obtained from the seller's driver's license, including name, address, date of birth, and driver's license number, a text description of the article obtained from said text file, at least one image of the article, and a printout of said biometric fingerprint sample;
obtaining an executed bill or sale by receiving the seller's signature using a touch-screen display, and storing;
paying the seller for the article upon seller's execution of said bill of sale by dispensing payment in the form of a pre-paid debit card; and
electronically transmitting said bill of sale form to a local law enforcement agency.

US Pat. No. 10,482,510

SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR TRACKING AND CORRELATING ONLINE USER ACTIVITIES WITH SALES OF PHYSICAL GOODS

TrueCar, Inc., Santa Mon...

1. A method, comprising:receiving user-provided customer data from a user device, the receiving performed by a server computer via a website on the Internet, the server computer communicatively connected to a validation sever;
communicating the user-provided customer data from the server computer to the validation sever;
receiving, by the server computer, a response from the validation sever;
based on the response from the validation sever, determining, in real time and while the user is browsing the website, whether the user-provided customer data is valid customer data, the determining performed by the server computer;
responsive to the user-provided customer data being determined by the server computer as valid customer data, generating appended data associated with the user, the generating performed by the server computer;
subsequent to generating the appended data associated with the user, generating, by the server computer, customer lead data associated with the user, the customer lead data including the valid customer data determined by the server computer, the appended data generated by the server computer, and a desired product, service, or vehicle configuration that the user has selected through the website;
based at least in part on the customer lead data associated with the user, selecting, by the server computer, at least one dealer from a plurality of dealers affiliated with the website;
presenting the at least one dealer within the website on the user device while the user is still browsing the website;
automatically tracking and storing, in a database by the server computer, user activities relating to vehicle research by the user on the website while the at least one dealer is presented within the website on the user device, the user activities stored in the database including at least one of: at least one search query submitted by the user to the website, navigation of the website by the user, a product or service selected or viewed by the user, or any changes in desired vehicle attributes made by the user;
communicating the customer lead data associated with the user from the server computer to a computing device associated with the at least one dealer;
receiving, by the server computer, sales data from the at least one dealer, the sales data including information on sales of vehicles by the at least one dealer;
matching, by the server computer applying a matching rule, the sales of vehicles by the at least one dealer and the user activities stored in the database relating to the vehicle research by the user on the website while the at least one dealer is presented within the website on the user device; and
responsive to a match being found between a vehicle sale by a dealer of the at least one dealer and the user activities stored in the database relating to the vehicle research by the user on the website while the at least one dealer is presented within the website on the user device, generating, by the server computer, an output linking the customer lead data, which is associated with the user and which is generated by the server computer, with the vehicle sale by the dealer of the at least one dealer.

US Pat. No. 10,482,509

TECHNIQUES FOR COLLABORATIVE SHOPPING

NCR Corporation, Atlanta...

1. A processor-implemented method programmed in a non-transitory processor-readable medium and to execute on one or more processors configured to execute the method, comprising:automatically logging, by a mobile device, a user into a remote shopping collaboration manager based on detection of the mobile device at a certain physical location associated with a store indicating that the user is at the store and automatically logging the user into the remote shopping collaboration manager based on a profile associated with the user;
identifying, by the mobile device, a shopping transaction for the user, wherein identifying further includes obtaining the a transaction identifier for the shopping transaction that is assigned to the store and the user based on the certain physical location, and pushing the transaction identifier to the mobile device of the user;
requesting, by the mobile device, feedback on one or more aspects of the shopping transaction from the remote shopping collaboration manager;
receiving, by the mobile device, the feedback on the one or more aspects from the remote shopping collaboration manager and/or one or more second users assigned to the shopping transaction, wherein receiving further includes receiving the portions of the one or more aspects as images, video, text, and graphics, received from the one or more second users, and wherein at least one of the one or more aspects includes a dynamic video conference between the mobile device of the user and at least one second device associated with a particular second user;
presenting, by the mobile device, the feedback to the user within an interface of the mobile device.

US Pat. No. 10,482,508

CUSTOMIZABLE STATE MACHINE AND STATE AGGREGATION TECHNIQUE FOR PROCESSING COLLABORATIVE AND TRANSACTIONAL BUSINESS OBJECTS

JDA Software Group, Inc.,...

1. A computer-implemented method for facilitating processing by a state machine of business objects, comprising:retrieving, over a computer network, composite state information of a composite business object from a non-transitory computer-readable medium, the composite business object representing at least one collaboration between two or more business enterprises and including one or more components comprising component state information;
controlling the composite state information of the composite business object based on one or more data structures comprising state information stored as values in a multidimensional state transition matrix, action information, and transition information associated with the composite business object, wherein a first dimension of the state transition matrix represents a state identifier associated with the composite business object, a second dimension of the state transition matrix represents an action identifier associated with the composite business object, and a third dimension of the state transition matrix represents an entity identifier associated with the composite business object; and
configuring a derived state information for the composite business object by assigning a priority level from a hierarchy of states to the individual component state information of the one or more components and selecting the component state information having the highest priority, each state in the hierarchy of states having a corresponding assigned priority level.

US Pat. No. 10,482,507

HANDLING DIGITAL ADVERTISEMENTS IN A COMMUNICATION NETWORK

Telefonaktiebolaget LM Er...

1. A method, performed by a proxy server of a communication network, wherein said method comprises the steps of:receiving, from a user equipment device of the communication network, a request to download a web page from one of a web site or a web portal of the communication network;
responsive to receiving the request, obtaining web page code corresponding to said web page;
responsive to obtaining the web page code, identifying an executable script of an ad script of an advertisement in the web page code corresponding to said web page;
inserting, directly in the executable script of said ad script of the web page code, replacement functions that overwrite original built-in functions of the ad script, the replacement functions removing at least one Uniform Resource Locator (URL) of the original built-in functions of the ad script that would result in download of an object of the objects referenced in the ad script of said advertisement;
inserting, at the end of executable script of said ad script, restoration functions that restore the original built-in functions of the ad script comprising said at least one URL after occurrence of a specific event within the web page code; and
transmitting the modified web page code to the user equipment device to enable the user equipment device to delay download of objects referenced in the ad script of said advertisement during download of the content of the web page.

US Pat. No. 10,482,505

SALES ASSISTANCE BASED ON PURCHASING PREDICTION

International Business Ma...

1. A method comprising:identifying, by one or more computer processors, one or more items searched for by a user on a client device;
determining, by one or more computer processors, if a location of the client device is within a threshold distance of an item of the one or more searched items;
in response to determining that the client device is within the threshold distance, generating, by one or more computer processors, a communication that the item of the one or more searched items presents to the user of the client device, wherein the communication includes details about the item and personalized information about the user;
sending, by one or more computer processors, the generated communication to the item to be displayed as text by the item;
determining, by one or more computer processors, if a received response comprising a reply of the user to the generated communication indicates that a threshold probability that the user will purchase the item is exceeded; and
in response to determining the response exceeds the threshold probability, identifying, by one or more computer processors, a sales representative to assist the user.

US Pat. No. 10,482,504

SYSTEMS AND METHODS FOR ANALYZING INPUT DATA AND PRESENTING INFORMATION

1. A method of displaying offer data in response to receiving input on a mobile device, the method comprising:analyzing information input to an input field of a communications application to determine whether all or a portion of the information relates to one or more brands, merchants, products, or services;
searching for offer data for the one or more brands, merchants, products, or services;
displaying a suggestion bar associated with a virtual keyboard of the mobile device, the suggestion bar including a field displaying an object that identifies a merchant or a brand;
in response to a first gesture to select the object, displaying an offer message of the merchant or the brand; and
in response to a second gesture on the displayed offer message, dismissing the offer message or saving the offer message.

US Pat. No. 10,482,503

SUGGESTING AND/OR PROVIDING AD SERVING CONSTRAINT INFORMATION

Google LLC, Mountain Vie...

1. A computer-implemented method to display content items on user computing devices, comprising:receiving, by one or more computing devices, a set of content items to be displayed on one or more documents on user computing devices, wherein each content item is associated with a time constraint;
providing, by the one or more computing devices, a set of candidate keywords associated with each of the set of content items;
providing, by the one or more computing devices, an estimate of a number of times each of the content items will be served based on each of the set of candidate keywords;
based on the provided estimate, receiving, by the one or more computing devices, one or more keywords of the set of candidate keywords to associate with each of the content items;
receiving, by the one or more computing devices, a request to display a content item in conjunction with an electronic document on a particular user computing device;
determining, by the one or more computing devices, a time of the request to display the content item;
determining, by the one or more computing devices, a set of content items having a configured time constraint that corresponds to the time of the request;
analyzing, by the one or more computing devices, content of the electronic document to determine one or more characteristics of the electronic document;
determining, by the one or more computing devices, at least one of the set of determined content items that corresponds to the one or more characteristics of the electronic document based on the one or more received keywords associated with each of the content items; and
providing, by the one or more computing devices, the at least one of the set of determined content items to the particular user computing device for display in conjunction with the electronic document.

US Pat. No. 10,482,502

INFORMATION PROVISION SYSTEM, SPECIFIC-INFORMATION GENERATION DEVICE, AND SPECIFIC-INFORMATION GENERATION METHOD

PANASONIC INTELLECTUAL PR...

1. An information provision system connected to an in-home network configured by a Web terminal and a household electric appliance terminal, and comprising a first history collection device, a second history collection device, and a specific-information generation device, whereinthe first history collection device acquires, from the Web terminal,
first history information including an access history of the Web terminal and a network identifier of the Web terminal, and
the second history collection device acquires, from the household electric appliance terminal,
second history information including a manipulation history of the household electric appliance terminal, a household electric appliance terminal identifier of the household electric appliance terminal, and a network identifier of the household electric appliance terminal,
the specific-information generation device comprises:
a history collector that acquires the first history information from the first history collection device, and the second history information from the second history collection device; and
a specific-information generator that generates specific information regarding an attribute and a preference of a user, based on the first history information and the second history information acquired in the history collector, and
the specific-information generator
disposes, on a map of a thesaurus prepared in advance, a first keyword obtained from the access history of the Web terminal, and a second keyword obtained from the manipulation history of the household electric appliance terminal, and
generates first specific information, based on a single or a plurality of the second keywords having a distance smaller than a predetermined distance from a disposed position of the first keyword disposed on the map
wherein second specific information is generated, based on the single or the plurality of the second keywords having a distance larger than or equal to the predetermined distance from the disposed position of the first keyword disposed on the map, and
wherein the information provision system provides an external advertisement provision system with:
the first specific information as overt attribute information, and
the second specific information as latent attribute information.

US Pat. No. 10,482,501

METHOD AND APPARATUS FOR DISPLAYING ADS DIRECTED TO PERSONAS HAVING ASSOCIATED CHARACTERISTICS

AutoGraph, Inc., Seattle...

1. A processor-based system for receiving advertisements, comprising:memory for storing instructions that are executable by processor electronics;
a display screen;
processor electronics configured to execute the instructions in order to:
display a plurality of icons to which advertisements can be directed to a user;
receive a selection from the user to activate a first icon of the plurality of icons to which advertisements can be directed during a time period when the icon is active, wherein the first icon defines one or more characteristics of the user that can be analyzed by an advertiser to determine a target audience for an ad;
in response to the selection of the first icon, select a cookie associated to the first icon, wherein the cookie is configured to reference a portion of user interest data collected during the period of time when the first icon is active;
display an ad directed to the selected first icon;
determine if a predetermined triggering event has occurred;
in response to the determination of the triggering event occurring, automatically select a second icon from the plurality of icons that defines one or more characteristics of the user to which ads are to be directed; and
in response to the selection of the second icon, select a second cookie associated to the second icon, wherein the second cookie is configured to reference a portion of user interest data collected during a second time period that the second icon is active.

US Pat. No. 10,482,500

AUTOMATICALLY GENERATING BOTH RICH ADVERTISING MESSAGES AND ASSOCIATED LANDING PAGES USING SOCIAL MEDIA PLATFORM CONTENT

2KDirect, LLC, San Luis ...

1. A computer-readable medium having contents configured to cause a computing system to perform a method, the method comprising:receiving text from a user;
accessing a social media platform to identify a company having a presence on the social media platform and identifying information that includes the received text;
retrieving content from the identified company's presence on the social media platform, the content including a text string, an image, a web resource, and a color;
using the retrieved content to construct a webpage, for the identified company, containing a link to the web resource;
using the retrieved content to construct an advertising message, for the identified company, separate from the constructed webpage and containing a link to the constructed webpage;
causing the constructed advertising message to be presented by a publisher;
receiving a first communication indicating that a user to whom the constructed advertising message was presented selected the constructed advertising message;
in response to the first communication, serving the constructed webpage;
receiving a second communication indicating that a user viewing the served webpage selected a link to the web resource; and
in response to the second communication, causing the web resource to be served to the user viewing the served webpage.

US Pat. No. 10,482,499

METHOD FOR CONDUCTING A TRANSACTION

Mastercard Asia Pacific P...

1. A method for conducting a transaction between a merchant and a customer, the method comprising:broadcasting, from a merchant device to a customer device, information identifying the merchant device while the merchant device and the customer device are both located at a physical merchant location to cause the broadcast information to be displayed on the customer device, wherein the merchant device includes one or more point of sale (POS) terminals;
receiving, at the merchant device from the customer device, a connection request to initiate a connection between the merchant device and the customer device;
in response to the received connection request, exchanging encryption keys between the merchant device and the customer device to establish a secure wireless channel between the merchant device and the customer device;
receiving, over the secure wireless channel, at the merchant device, a check-in request from the customer device, the check-in request including information identifying the customer;
prompting the merchant to accept the check-in request by displaying a message on the merchant device;
accepting, at the merchant device, the check-in request based on an input made by the merchant on the merchant device in response to the displayed message;
generating, as a result of acceptance of the check-in request, cart information of the customer at the merchant device, the cart information generated based on data inputted by the merchant into the merchant device, the cart information representing details of items being purchased;
transmitting, by the merchant device, the cart information to the customer device to cause the cart information to be displayed on the customer device prior to initiating a payment process for the items and while the customer device is located at the physical merchant location, and to cause the cart information to be synchronized in real-time between the merchant device and the customer device while the customer is present at the physical merchant location;
sending, from the merchant device, a cart update to the customer device, wherein the cart update corrects an error in the cart information, the error caused by at least one of a duplicate entry of an item and an erroneous entry of an item entered by the merchant;
receiving, at the merchant device from the customer device, a cart update acknowledgement indicating that the cart information was corrected on the customer device;
receiving, from the customer device at the merchant device, a cart lock request generated at the customer device such that the merchant device temporarily stops the real-time synchronization of the cart information between the merchant device and the customer device;
transmitting, in response to temporarily stopping the real-time synchronization, a cart lock acknowledgement from the merchant device to the customer device;
receiving, from the customer device at the merchant device, a cart update, wherein the cart update indicates an addition or removal of an item from the cart information;
sending, from the merchant device to the customer device, a cart update acknowledgement;
receiving, from the customer device at the merchant device, a cart unlock confirmation generated at the customer device;
resuming, by the merchant device, the real-time synchronization of the cart information in response to the cart unlock confirmation received from the customer device;
determining, via the secure wireless channel, at least one payment option for checking out the items corresponding to the cart information; and
processing, over the secure wireless channel established between the merchant device and the customer device, a payment associated with the cart information based on a selected payment option out of the at least one payment option.

US Pat. No. 10,482,497

SYSTEM AND METHOD FOR PROVIDING SMART STATEMENTS

CAPITAL ONE SERVICES, LLC...

1. A system for providing an account holder with a purchase-data driven statement, comprising:one or more processors configured to:
receive, via a network:
account data comprising one or more past purchases of the account holder,
advertising data associated with a first merchant and comprising information associated with advertised products and services including location information for the advertised products and services, and
location data of an account holder device;
compare the advertising data to the account data to identify a first product or service included in both the advertising data and the account data;
determine that the location information for the first product or service matches the location data of the account holder device;
create, in real-time, a targeted advertisement for the first product or service that includes a personalized text-based message, the message including a link that is selectable by a user of the account holder device to direct the account holder device to a website associated with the first product or service;
generate, in real-time, a graphical user interface comprising the account data, the advertising data, and the targeted advertisement;
transmit, to the account holder device, the graphical user interface, wherein the graphical user interface facilitates two-way communication between the account holder device and the first merchant and causes a single display of the account holder device to present and organize the targeted advertisement, the account data, and the advertising data;
receive new account data comprising one or more new purchases of the account holder made after transmitting the targeted advertisement;
compare the account holder's spending associated with the new account data to the account holder's spending associated with the account data;
determine a quantitative measure of a relative effectiveness of the targeted advertisement based on whether the account holder's spending increased or decreased after transmitting the targeted advertisement;
obtain demographic information associated with the account holder;
generate predictive recommendations by associating the quantitative measure of the relative effectiveness of the targeted advertisement with the demographic information; and
transmit the predictive recommendations to the first merchant.

US Pat. No. 10,482,495

BEHAVIORAL RETARGETING SYSTEM AND METHOD FOR COOKIE-DISABLED DEVICES

Oath Inc., New York, NY ...

1. A system for retargeting advertisements usable with cookie-disabled users, the system comprising:a processor; and
memory comprising instructions that, when executed by the processor, perform actions comprising:
storing historical user behavior data comprising information related to a plurality of consumers, wherein the historical user behavior data are collected from respective mobile devices of the plurality of consumers, the mobile devices having web browsing cookies disabled from on-line web browsing;
processing the historical user behavior data and translating the historical user behavior data into a plurality of indices;
processing the plurality of indices and generating a multi-indexed user behavior cube corresponding to a particular user by indexing historical user identification attributes to historical user behaviors, wherein the multi-indexed user behavior cube comprises two or more indices, associated with a plurality of lengths and dimensions, including (i) a first index that comprises a first behavior and a second behavior and that is keyed by a combination of a first attribute key and a second attribute key and (ii) a second index that comprises a third behavior and a fourth behavior and that is keyed by a third attribute key, wherein the first behavior is keyed by one or more other attribute keys in the multi-indexed user behavior cube, wherein the first index has a different length than the second index, wherein the first behavior and the second behavior of the first index are accessible using the first attribute key and are accessible using the second attribute key, wherein the third behavior and the fourth behavior of the second index are accessible using the third attribute key, and wherein the first behavior is accessible using the one or more other attribute keys;
receiving an advertisement request from a respective mobile device and processing the advertisement request to determine one or more related user identification attributes pertaining to the respective mobile device;
retrieving a set of one or more predicted user behaviors from the multi-indexed user behavior cube via at least one of the plurality of indices and using at least the one or more related user identification attributes as an input to the multi-indexed user behavior cube, the set of one or more predicted user behaviors at least based on a historical user behavior indexed by the at least one of the plurality of indices; and
generating a list of recommended advertisements using the set of one or more predicted user behaviors and an advertiser retargeting criterion in order that advertisers deliver targeted advertisement to the respective mobile device according to the advertiser targeting criterion and the one or more related user identification attributes without utilizing the disabled web browsing cookies.

US Pat. No. 10,482,493

CORRELATING GEOGRAPHIC POSITIONS OF MOBILE DEVICES WITH POINT-OF-SALES DEVICE TRANSACTIONS

Splunk Inc., San Francis...

1. A method, comprising:accessing a plurality of events in a field-searchable data store, the plurality of events comprising raw machine data associated with a timestamp, the raw machine data representing a plurality of interactions between a mobile device and at least one network device at a locale;
determining, based on the plurality of interactions, at least one geographic position of the mobile device;
calculating a metric for the locale using the at least one geographic position;
obtaining a plurality of sales transactions from a point of sale (POS) device at the locale;
correlating the at least one geographic position and at least one time interval determined from the plurality of interactions with the plurality of sales transactions;
determining, in response to the correlating, an impact on the metric by a promotion used in the plurality of sales transactions; and
predicting, using the impact on the metric, a value of the metric in a periodic time interval using a trend in a plurality of previous values of the metric in the periodic time interval.

US Pat. No. 10,482,492

METHOD AND SYSTEM FOR PLATFORM ATTRIBUTION USING DIGITIZED TOKENS

MASTERCARD INTERNATIONAL ...

1. A method for determining attribution for a computing device, comprising:receiving, by a receiving device of a processing server, an attribution request from a third party entity, wherein the attribution request includes at least a specific computing device identifier and an indication of an advertisement;
identifying, by a querying module of the processing server, a digital token number associated with the specific computing device identifier, wherein the association is based on a prior provisioning of the digital token number to a computing device associated with the specific computing device identifier;
identifying, by the querying module of the processing server, a primary account number corresponding to the identified digital token number and one or more alternative digital token numbers also corresponding to the identified digital token number, where each of the one or more alternative digital token numbers were previously provisioned to a separate computing device unique to the one or more alternative digital token numbers and distinct from the computing device associated with the specific computing device identifier;
identifying, by the querying module of the processing server, a transaction data entry related to an electronic transaction, wherein the transaction data entry includes transaction data and one of: the digital token number, the primary account number, and one of the one or more alternative digital token numbers; and
electronically transmitting, by a transmitting device of the processing server, an attribution message to the third party entity, wherein the attribution message includes attribution of the indicated advertisement to the related electronic transaction.

US Pat. No. 10,482,490

BEHAVIORAL TRACKING SYSTEM AND METHOD IN SUPPORT OF HIGH-ENGAGEMENT COMMUNICATIONS

SAILTHRU, INC., New York...

1. A system for providing targeted communications to each of a plurality of respective customers, and using information associated with the customers' interactions with the targeted communications in an external webmail system that is configured as a browser-based e-mail platform and used by the customers to access their email via web browser software operating on each respective customers' computing device, the system comprising:at least one database, stored on non-transitory processor readable media and that is accessible to at least one processor, the at least one database includes:
electronic user information associated with a plurality of registered users;
electronic customer information associated with each of a plurality of respective customers of at least one of the registered users;
electronic template information representing a plurality of templates that are useable for generating targeted email communications;
electronic content feed information representing information to be dynamically provided with the targeted email communications; and
electronic user profile information representing at least purchase history and purchase intent for each of the plurality of respective customers of the at least one of the registered users;
a template module that configures the at least one processor to:
process at least one template instruction received from a computing device operated by a registered user to select one of the plurality of the templates for generating the targeted email communications;
identify the plurality of respective customers;
generate the targeted email communications based on the selected one of the plurality of templates;
respectively customize the targeted email communications with at least some of the content feed respectively selected for each of the respective customers; and
access, in response to one of the respective customers interacting with one of the targeted email communications, at least some of the electronic user profile information associated with the one of the customers, wherein the at least some of the electronic user profile information further represents at least opening the one of the targeted communications, selecting a hyperlink in the one of the targeted communications, visiting a web page associated with the hyperlink and instigating an ecommerce transaction in the web page without completing the transaction;
at least one module provided by the at least one processor that extends the external email platform by interfacing with the external email platform and providing at least one user interface for operability in connection with the external email platform, wherein the at least one user interface includes at least one image from the web page associated with the hyperlink and includes selectable options for receiving input associated with completing a purchase of at least one item in an abandoned e-commerce shopping cart associated with the transaction.

US Pat. No. 10,482,488

IDENTIFYING AND DISPENSING SPECIAL OFFERS BASED ON CURRENT AND/OR PAST TRANSACTIONS

TARGET BRANDS, INC., Min...

1. A method for providing a loyalty and rewards system that implements a user incentive program using circuit chip technology, the method comprising:storing transactional information associated with the user;
identifying a special offer for a user based on activity by the user including at least the transactional information;
automatically dispensing the special offer to the user by downloading the special offer to a circuit chip associated with the user;
a POS terminal processing items for purchase selected by the user;
enabling an operator of the POS terminal to actively signal the POS terminal that the step of processing items for purchase has been completed by pressing a key on the POS terminal; and
after actively signaling the POS terminal, the POS terminal activating local loyalty software to complete a check-out transaction, the local loyalty software designating the special offer for automatic application during the user's next transaction, wherein the step of identifying the special offer is practiced at a time other than at a time of the check-out transaction,
the automatically dispensing step further comprising the POS terminal accessing the circuit chip, and the local loyalty software automatically applying the special offer at the user's next transaction,
once activated, the local loyalty software:
actuating a card acceptance device to detect the user's circuit chip,
requesting the card acceptance device to retrieve electronic coupons and other loyalty program information from the user's circuit chip including the special offer downloaded to the circuit chip,
retrieving from the POS terminal product information of the items for purchase,
comparing the items for purchase to items associated with the electronic coupons and other loyalty program information retrieved by the card acceptance device from the user's circuit chip including the special offer downloaded to the circuit chip, and
when applicable based on the comparing step, automatically applying the special offer.

US Pat. No. 10,482,487

INCENTIVIZING SHARING IN SOCIAL NETWORKS

LIVINGSOCIAL, INC., Wash...

1. A computer implemented method of simulating and optimizing an online incentive network without a need to concentrate on identifying a relatively small set of individuals with high network values and incentivizing the relatively small set of individuals to adopt a product, in the hope that the small set of individuals would influence many others to also adopt this product, the method of simulating and optimizing the online incentive network performed via an incentivized sharing model that (i) takes as input, parameters of organic sharing of an existing network to predict an effect of an incentive and (ii) provides, after purchasing a product, a reward if the user provides, via a dedicated link, an offer for the product to other users resulting in at least a threshold number (N) or more others purchasing the product, the method comprising:accessing online incentive network data including data regarding sharing between users of the online incentive network from at least one database;
inputting parameters and the accessed online incentive network data to one or more processing devices hosted by a deal broker;
applying, by one or more of the processing devices, the parameters and the accessed online incentive network data to each of a plurality of graph models for incentivized deal sharing, wherein each of the graph models are configured to accurately determine likely outcomes of various incentive scenarios, the various incentive scenarios associated with a plurality of values for the threshold number of the other users, the threshold number of the other users being a number of other users that must purchase the deal for the user to receive the incentive, wherein each of the plurality of graph models are modular and configured to use data corresponding to user behavior of a particular company interested in putting monetary incentives in place, enabling testing and comparing of the various incentive scenarios, by:
simulating, by one or more processing devices, deal sharing for various scenarios of parameters, including selecting a value for the threshold number of other users that must purchase the deal for the user to receive the incentive, and the accessed online incentive network data in the online incentive network;
determining, by one or more of the processing devices, a deal broker's profitability of each simulated scenario;
storing the determined deal broker's profitability of each simulated scenario in a decision matrix;
receiving feedback through additional accumulated data to modify each simulated scenario in the decision matrix based on actual performance associated with the particular deal;
identifying, from among a subset of each simulated scenario meeting a predefined threshold, at least one profitable model to be implemented; and
selecting, by one or more of the processing devices, a simulated scenario based on the determined profitability of each simulated scenario identified as meeting the predefined threshold, the selected simulated scenario being one that would increase the deal broker's profitability to an acceptable level,
wherein selecting the simulated scenario comprises selecting one or more parameters including the selected value for the threshold number of users that must purchase the deal for the user to receive the incentive by determining the selected value at which an additional volume of shares outweigh an associated incentive cost; and
providing a graph model associated with the selected one or more parameters of the incentive sharing scenario, including the selected value for the threshold number of other users, to the users of the online incentive network includes by way of the deal broker to an online or mobile interface associated with each user of the online incentive network.

US Pat. No. 10,482,485

SYSTEM, METHOD AND COMPUTER PROGRAM FOR VARYING AFFILIATE POSITION DISPLAYED BY INTERMEDIARY

TrueCar, Inc., Santa Mon...

1. A method for dealer pricing, comprising:determining, by a dealer pricing system embodied on one or more server machines:
a per-unit revenue realized by a dealer when an item is sold;
a per-unit cost to the dealer for the item;
a number of leads for the item in a geographic unit;
an amount of inventory of the item the dealer is able to sell;
a probability of the dealer closing a sale on the item to a customer from the geographic unit utilizing a regression model expressed relative to a set of exogenous features not controlled by the dealer and a set of endogenous features over which the dealer has control, wherein the probability of the dealer closing the sale is a function of a weighted sum of values corresponding to the set of exogenous features and the set of endogenous features;
an expected number of sales as a function of the amount of inventory of the item the dealer is able to sell, times the number of leads for the item in the geographic unit and the probability of the dealer closing the sale on the item to the customer from the geographic unit; and
a total amount of gross margin for the dealer as a function of the expected number of sales times the difference between the per-unit revenue realized by the dealer when the item is sold and the per-unit cost to the dealer for the item; and
providing, by the dealer pricing system, a visualization function through a user interface on a client device associated with the dealer, the visualization function provided by the dealer pricing system configured for visualizing effects of a plurality of metrics, the plurality of metrics including at least two of a display rank, the number of leads for the item in the geographic unit, the expected number of sales, or the total amount of gross margin for the dealer, the visualization function providing the dealer with an ability to select any endogenous feature over which the dealer has control and determine, through the effects visualized by the visualization function in a data structure or graph on the client device associated with the dealer, how varying a value of a selected endogenous feature changes the plurality of metrics.

US Pat. No. 10,482,484

ITEM DATA COLLECTION SYSTEMS AND METHODS WITH SOCIAL NETWORK INTEGRATION

1. A method of conducting a sampling event for items using an event management website computing system, comprising:providing a first routine with the event management website computing system, which first routine is adapted to enable a host to initiate and manage a live item sampling event for a first audiovisual content item;
providing a second routine with the event management website computing system, which second routine is adapted to execute on a portable electronic device and to permit one or more participants to join the host in the live item sampling event for said first audiovisual content item by selecting an activatable electronic link;
wherein said live item sampling event is a virtual event managed by the event management website computing system, in which at least some of said one or more participants are in different locations and are enabled through said second routine to sample and rate said first audiovisual item at the same time as a group of participants;
collecting and processing item sampling event data with the event management website computing system, including at least a set of individual user ratings provided by said group of participants during said virtual event using a data collection interface implemented within one or more respective portable electronic data collection devices used by said group of participants;
providing a selectable option to each of said group participants within said data collection interface, which, when selected, causes publication by the event management website computing system of information pertaining to participation in said live item sampling event to social network web pages associated with said group of participants during a time period associated with the live item sampling event; and
automatically generating and electronically displaying recommendations with the event management website computing system to at least some of said group of participants identifying other audiovisual items correlated to said first audio visual item by a recommender system.

US Pat. No. 10,482,483

SYSTEM FOR AGGREGATING DATA RECORD ATTRIBUTES FOR SUPPLEMENTAL DATA REPORTING

Bank of America Corporati...

1. A system comprising:a transaction record data store configured to store a plurality of transaction records corresponding to a representative account, wherein the representative account corresponds to a plurality of customers;
an operational attribute data store configured to store operational attributes associated with respective customers of the plurality of customers of the representative account;
a report staging data store configured to store a plurality of reports; and
a supplemental data report generation device comprising at least one processor and memory storing computer-readable instructions that, when executed by the at least one processor, cause the supplemental data report generation device to:
receive, from a computing device, a command to generate a supplemental data report;
execute the command to generating the supplemental data report, executing the command including:
receive, via an interactive user interface, a set of criteria for the supplemental data report corresponding to transactions of the representative account, wherein the set of criteria comprises a set of products and at least one threshold rule associated with a first operational attribute field;
retrieve, from the transaction record data store, one or more first transaction records of the plurality of transaction records based on the set of products, wherein the one or more first transaction records correspond to a subset of customers in the plurality of customers that is associated with the set of products, wherein the subset of customers comprises more than one customer;
retrieve, from the operational attribute data store and based on the subset of customers identified in the one or more first transaction records, a set of operational attributes associated with the one or more first transaction records;
select, based on the set of operational attributes associated with the one or more first transaction records, one or more second transaction records from the one or more first transaction records to be included in the supplemental data report based on operational attributes associated with the one or more second transaction records matching the at least one threshold rule, wherein determining that a given transaction record matches the at least one threshold rule is based on a first operational attribute of a given customer associated with the given transaction record;
calculate one or more aggregate metrics for the set of products based at least in part on the operational attributes associated with the one or more second transaction records;
generate the supplemental data report based on the set of products and the one or more second transaction records, wherein the supplemental data report comprises the one or more aggregate metrics in lieu of the first operational attribute of the given customer based on the at least one threshold rule;
generate a drill down report for a first product of the set of products based on the one or more second transaction records by determining one or more third transaction records to be included in the drill down report based on operational attributes associated with a given transaction record of the one or more second transaction records being associated with the first product and based on the operational attributes associated with the given transaction record meeting a first threshold rule of the at least one threshold rule, wherein the first threshold rule is based on the first operational attribute of the first product; and
store the supplemental data report and the drill down report in the report staging data store.

US Pat. No. 10,482,482

PREDICTING BEHAVIOR USING FEATURES DERIVED FROM STATISTICAL INFORMATION

Microsoft Technology Lice...

1. A method, performed by one or more computing devices, for utilizing a reduced-dimensionality feature space prediction model to present user-selectable content in an online environment based on a prediction of a future user behavior within the online environment, by way of the prediction model that utilizes a feature vector as an input, the method comprising:receiving a master dataset that includes a plurality of training examples, each training example in the plurality of training examples comprising:
an event that comprises a plurality of characteristics and a user's decision within a circumstance to click on an object or not click on the object,
wherein the event is associated with aspect variables that describe the characteristics of the event,
wherein the aspect variables associated with the event comprise user-related aspect variables, content-related aspect variables, and context-related aspect variables, and
wherein each aspect variable is associated with a set of one or more possible aspect values,
corresponding aspect values, and
a label associated with the event, wherein the label identifies whether the user clicked on the object or declined to click on the object;
for a particular aspect of the event, producing plural partitions within the aspect values that correspond to the particular aspect, based on a partitioning strategy that includes grouping the aspect values into plural subsets of aspect values such that each partition is associated with a respective subset of aspect values, wherein the partitioning strategy comprises assessing a frequency at which each aspect value occurs within the master dataset and grouping together aspect values that have similar frequency of occurrence values;
for each of the respective partitions,
identifying plural subsets of data within the master dataset that pertain to the respective plural partitions, and
generating an instance of statistical information based on the respective corresponding subset of data, wherein the plural instances of statistical information correspond respectively to feature information that reflects a distribution of labels in the subsets of data, and wherein individual statistical measures within the feature information respectively constitute features which describe one or more events, wherein each feature corresponds to a plurality of aspect values, thereby providing a reduced dimensionality of a feature space that is utilized to train the prediction model;
generating the prediction model based on the feature information and a set of training examples, wherein the prediction model utilizes as input the feature vector comprising a set of the features that describe an event for which a prediction of the future user behavior is made;
storing the prediction model in a data store;
receiving input information associated with a new event comprising an online environment that displays user-selectable items to a user;
utilizing the prediction model to predict that the user will select a particular user-selectable item, based on features that correspond to the new event; and
based on having predicted that the user will select the particular user-selectable item, causing the particular user-selectable item to be presented to the user.

US Pat. No. 10,482,481

MANAGING GRID INTERACTION WITH AN INTERCONNECT SOCKET ADAPTER CONFIGURED FOR A SOLAR POWER SOURCE

1. A system for managing grid interaction with a solar power source, comprising:an energy exchange server, a plurality of solar energy sources, a plurality of interconnect socket adapters, and a plurality of energy exchange controllers, each energy exchange controller being communicatively coupled to one of the plurality of interconnect socket adapters;
wherein the one of the plurality of interconnect socket adapters electrically couples to the power grid, one or more energy sinks, and one of the plurality of solar energy sources; and
wherein the energy exchange server comprises a processor and a non-statutory computer readable medium with software embedded thereon, the software configured to:
receive, from each interconnect socket adapter, a real-time energy consumption data set;
receive, from a real-time energy pricing database, a set of environmental parameters and a starting energy price;
receive, from each interconnect socket adapter and one or more energy production facilities, a real-time energy production data set;
generate a current aggregate electricity demand value as a function of the real-time energy consumption data set and the environmental parameters;
generate a current aggregate electricity supply value as a function of the real-time energy production dataset and the environmental parameters; and
generate a current energy price as a function of the starting energy price, the current aggregate electricity demand value, and the current aggregate electricity supply value.

US Pat. No. 10,482,479

FAST CALCULATIONS OF TOTAL UNDUPLICATED REACH AND FREQUENCY STATISTICS

International Business Ma...

1. A computer implemented method for performing a total unduplicated reach and frequency analysis performed via a turf analysis application executing in a distributed data processing environment, the method comprising:receiving a plurality of variables containing numerical or textual values from a data store;
in response applying a weight to the plurality of variables based on a first user selection input, via a user device, identifying a subset of variables of the plurality of variables, wherein the subset of variables is identified based on the associated weight meeting a product reach criteria value;
partitioning the subset of variables into a plurality of groups of variables, wherein the groups of variables are partitioned based on an associated weight rank value, wherein each of the plurality of groups of variables contains less than a predetermined maximum number of variables;
calculating a reach score for each group of variables of the plurality of groups of variables;wherein the reach score is based on a first total unduplicated reach and frequency analysis;identifying at least one group of variables, of the plurality of groups of variables that has a reach score above a first threshold value;
communicating, for display via the user device, the identified at least one group of variables and associated reach score and a set of first total unduplicated reach and frequency analysis results to the user;
receiving a second user selection input from the user, wherein the second user selection input modifies one or more variables of the at least one group of variables;
determining, using a processor that periodically determines at least one available resource of the computer for performing the total unduplicated reach and frequency analysis, an available computational resource value; and
in response to a determination that a count of identified variables of the modified at least one group of variables is below a second threshold value, wherein the second threshold value is based on the determined available computational resource value, performing a second total unduplicated reach and frequency analysis, of the identified at least one group of variables.

US Pat. No. 10,482,477

STRATIFIED SAMPLING APPLIED TO A/B TESTS

NETFLIX, INC., Los Gatos...

1. A method of testing a plurality of variations of a user experience on an online site, wherein each of the plurality of variations is distinct from other variations in the plurality of variations, comprising:for each permutation of a plurality of stratification factor values for one or more stratification factors that characterize users of the online site, generating a respective plurality of pseudorandom characters, wherein each distinct character included in the plurality of pseudorandom characters represents a different variation included in the plurality of variations;
receiving, by a computing system over a network, a plurality of user requests for accessing the online site;
assigning the plurality of user requests to variations in the plurality of variations by computationally traversing a subset of the generated pluralities of pseudorandom characters associated with the plurality of user requests;
tracking, by operation of one or more computer processors, user retention information relating to the plurality of user requests;
calculating a retention rate for each variation included in the plurality of variations based on the user retention information; and
selecting content of the online site based on a comparison between a first retention rate of a first variation and a second retention rate of a second variation, wherein the content is associated with the first variation or the second variation.

US Pat. No. 10,482,476

NON-ABSTRACT DEVICES, SYSTEMS, AND PROCESSES FOR THE DISPLAY AND FURNISHING OF TANGIBLE BENEFITS

1. A technology and computing improving, tangible, non-abstract system for permitting an entity to make use of benefits, the system comprising:receiving in at least one physical memory device (i) at least a sub-set of an entity's demographic, geographic, and psychographic data, (ii) benefit data for benefits which are offered to those entities meeting the specified qualifications and eligibility requirements as established by the benefit providers, and (iii) benefit provider data;
storing in at least one physical memory device (i) the entity's data, (ii) the benefit data, and (iii) the benefit provider data;
inputting at least the entity's data into a processing device by means of at least one data entry device in electronic communication with the processing device;
said processing device analyzing (i) the entity's data, (ii) the benefit data, (iii) the benefit provider data, and benefit correlation data in real or substantially real time to determine whether any benefit providers are offering any benefits applicable to the entity's data;
determining that the entity qualifies for at least one benefit from at least one benefit provider;
generating a message to a web-enabled phone to inform the entity of the at least one benefit applicable to the entity's data;
anytime thereafter, receiving data indicating that entity is at a new geographic location;
generating a new message to a web-enabled phone to inform the entity of at least one new, different benefit which was not previously but is now available to entity due at least in part to entity's new geographic location;
wherein at least one of both the message benefit(s) and the new-message different benefit(s) are from the group consisting of coupons, discounts, giveaways, free premiums, free merchandise, rebates, certificates, welfare, food stamps, rent vouchers, employment/unemployment, disability, survivor, retirement; property rehabilitation, modernization and retrofitting; government housing, grants and loans to start or grow a business; a reduced cost or free education, free or reduced cost research reports, books and materials, transportation, clothing, counseling, grants, bonuses, awards, free or reduced cost legal advice and services, foreclosed real estate, government jobs; police, customs, and other forced sales of personal property; reduced interest-rate real estate financing; reduced or zero down payment real estate loans; tax-sale real and personal property; educational grants, loans, scholarships, fellowships, internships, and awards; free and reduced-cost prescriptions and medical care/treatment; social security benefits; reduced price and financing for cars and other transportation; traveling and vacationing at reduced cost or for free.

US Pat. No. 10,482,475

SYSTEMS AND METHODS FOR PROVIDING TARGETED ADVERTISING

ADP DEALER SERVICES, INC....

1. A method for serving location-specific advertising content within an electronic communication network, comprising:maintaining on a computer-readable storage medium, an area of responsibility (AOR) data structure defining a plurality of AOR and a plurality of geographical areas covered by the electronic communication network, each AOR corresponding to a respective geographical area defined in the AOR data structure and being associated with respective AOR-specific electronic content;
embedding customization tags within electronic markup data of one or more advertising templates, the customization tags configured to provide for generating AOR-specific advertising content customized for each AOR of the plurality of AOR defined in the AOR data structure from a same advertising template; and
providing advertising content in response to each request of a plurality of requests received at a computing system through the electronic communication network, the requests corresponding to respective client computing devices at physical locations within geographical areas of a plurality of different AOR defined in the AOR data structure, the providing comprising:
the computing system using the AOR data structure to generate customized, AOR-specific advertising content for each request of the plurality of requests from the same advertising template, the generating comprising:
the computing system determining location-identifying information for each request of the plurality of requests, the location-identifying information determined for each request comprising electronic data indicating a physical location of a respective client computing device corresponding to each request,
the computing system using the AOR data structure to identify AOR-specific electronic content to include in the customized, AOR-specific advertising content generated for each request, the identifying comprising matching the location-identifying information determined for the requests to respective geographical areas of AOR defined in the AOR data structure and accessing the AOR-specific electronic content associated with the matching AOR,
the computing system generating the customized AOR-specific advertising content for each request of the plurality of requests from the same advertising template, by inserting the AOR-specific electronic content identified for each request into the electronic markup data of the same advertising template at locations identified by the customization tags embedded within the electronic markup data, and
the computing system transmitting the customized, AOR-specific advertising content generated for the plurality of requests to the respective client computing devices corresponding to each request through the electronic communication network.

US Pat. No. 10,482,471

UNAUTHORIZED PRODUCT DETECTION TECHNIQUES

Amazon Technologies, Inc....

1. A system, comprising:an image sensor located in a facility; and
an unauthorized-product detection system comprising one or more hardware processors, configured to:
receive from a provider of an item, an image of at least a portion of the item or a portion of the item packaging, wherein the image includes a representation of a physical characteristic of the portion of the item or the portion of the item packaging;
receive, via an interface of a web service, a captured image of at least a portion of a received item or a portion of item packaging for the received item captured by the image sensor located in the facility; and
compute a confidence score for authenticity of the received item, wherein the confidence score is computed as a numerical value based at least on two factors, the two factors comprising:
computation of a similarity score, wherein the computation is based on a comparison of the captured image of at least the portion of the received item or the portion of the item packaging for the received item to the representation of the physical characteristic of the portion of the item or the portion of the item packaging received from the provider of the item, and wherein the comparison is based at least on a match of locations of features of the captured image to locations of features found in the representation of the physical characteristic received from the provider of the item; and
a frequency that the representation of the physical characteristic has been queried at the web service, wherein the numerical value of the confidence score lowers in proportion to the frequency that the representation of the physical characteristic has been queried at the web service;
in response to determining that the confidence score for the received item satisfies one or more constraints, provide, via the interface of the web service, an indication that authenticity of the received item is verified; and
in response to determining that the confidence score for the received item does not satisfy the one or more constraints, provide, via the interface of the web service, an indication that the authenticity of the received item is not verified.

US Pat. No. 10,482,469

SYSTEMS AND METHODS FOR PROVIDING INFORMATION FROM MULTIPLE SOURCES

eBay Inc., San Jose, CA ...

1. A system comprising:a memory that stores instructions; and
one or more processors configured by the instructions to perform operations comprising:
receiving, from a first user, a selection of a question to include in postings by the first user for items in an online publication system;
receiving, after the selection of the question, data for an item, the data submitted by the first user;
generating a posting for the item in the online publication system based on the data and the selected question;
receiving, via a network, an inquiry submitted by a second user;
selectively retrieving, in response to the inquiry submitted by the second user, a response comprising an answer to the selected question, the answer comprising at least a portion of the data submitted by the first user; and
providing a user interface depicting the selected question and the retrieved response.

US Pat. No. 10,482,467

SYSTEMS AND METHODS FOR BLOCKING CREDIT CARD CHARGES

Capital One Services, LLC...

1. A system for blocking merchant charges to a payment account of a user, the system comprising:one or more memory devices storing instructions; and
one or more processors configured to execute the instructions to perform operations comprising:
receiving, from a user device, a dispute request of a charge by a merchant to the payment account;
identifying the merchant associated with the dispute request;
in response to receiving the dispute request, determining whether to block subsequent charges applied by the merchant to the payment account based on a history of charging activities of the merchant;
providing instructions to the user device to display an application interface for the user to accept or decline blocking subsequent charges by the merchant;
receiving, via the user device, the user's input to accept blocking subsequent charges by the merchant;
responsive to the receipt of the user's input to block subsequent charges, adding the merchant to a block-charge list associated with the payment account;
receiving a transaction authorization request to charge the payment account;
determining whether the merchant on the block-charge list initiated the transaction authorization request; and
responsive to the determination that the merchant on the block-charge list initiated the transaction authorization request, declining the transaction authorization request.

US Pat. No. 10,482,466

METHODS AND ARRANGEMENTS TO DISTRIBUTE A FRAUD DETECTION MODEL

CAPITAL ONE SERVICES, LLC...

1. An apparatus comprising:memory; and
logic circuitry coupled with the memory to:
assign customer identifications to models to associate customers with the models, each of the models pretrained to detect fraudulent transactions;
determine one or more clusters to associate with the customers based on characteristics associated with the customers;
associate one or more cluster identifications with each of the customers, each cluster identification to identify one cluster of the one or more clusters, each cluster to identify a particular group of the customers of a plurality of groups of the customers, each group of customers having at least one different characteristic of the characteristics than other groups of the plurality of groups of customers;
communicate the models, to cause the models to transmit to customer devices associated with the customers, each customer device associated with one of the customers;
receive transaction data for a transaction for one customer, the one customer associated with a first cluster;
modify the transaction data to create modified transaction data;
communicate the modified transaction data to customer devices of customers associated with the first cluster; and
receive responses from the customer devices based on application of a model of the customer devices of customers associated with the first cluster on the modified transaction data, the responses received to identify the modified transaction as a fraudulent transaction or a non-fraudulent transaction.

US Pat. No. 10,482,465

METHOD AND SYSTEM FOR HOSTED ORDER PAGE/SILENT ORDER POST PLUS FRAUD DETECTION

Visa International Servic...

1. A computer-implemented method, comprising performing by a merchant service computer system:obtaining, by a payment service executing on the merchant service computer system, order information from a merchant server via a post from a user device, the order information including information about an item in a purchase transaction involving a user and a merchant;
receiving, by the payment service, a merchant-generated one-way hash of the order information as part of the post from the user device, wherein the merchant-generated one-way hash is generated using a hashing technique specified by the merchant service computer system;
generating, by the payment service, a one-way hash of the order information using the order information and the hashing technique;
comparing, by the payment service, the received merchant-generated one-way hash of the order information to the generated one-way hash of the order information to verify that the order information is authentic;
upon verifying that the order information is authentic, providing, by the payment service, a hosted order page on behalf of the merchant, wherein the hosted order page is presented to the user via the user device;
obtaining, by the payment service via the hosted order page from the user device, payment information from the user on behalf of the merchant;
transmitting, from the payment service to fraud detection services, a transmission including both the order information obtained from the merchant server and the payment information obtained from the user device;
receiving, at the payment service from the fraud detection services, an approve or deny indication indicating whether the purchase transaction is approved or denied based on a fraud risk for the purchase transaction determined using the payment information of the user and the order information;
if the purchase transaction is denied, displaying, by the payment service, a transaction denied page on the hosted order page; and
if the purchase transaction is approved, sending, by the payment service, the purchase transaction along with the payment information to a payment processing server.

US Pat. No. 10,482,463

FACIAL PROFILE MODIFICATION FOR HANDS FREE TRANSACTIONS

GOOGLE LLC, Mountain Vie...

1. A computer-implemented method to provide updated facial templates of users located at service system locations to service computing devices for use in identifying users via facial recognition, comprising, by one or more computing devices:associating a first facial template with an account of a user;
receiving, from a user computing device, a facial image of the user and a request to modify the first facial template;
generating a second facial template comprising a computer code representation of the facial image;
comparing the second facial template and the first facial template to determine a difference value representing a difference between the second facial template and the first facial template;
determining that the difference value representing the difference between the second facial template and the first facial template is less than a threshold difference value;
associating the second facial template with the account of the user;
at a time after associating the second facial template with the user account, receiving, from the user computing device, a beacon device identifier broadcast by a service computing device at a service system location;
determining that the beacon device identifier corresponds to the service computing device;
in response to determining that the beacon device identifier corresponds to the service computing device, adding the second facial template to a log of current customers comprising facial templates corresponding to user computing devices that retransmitted the beacon device identifier to the one or more computing devices;
receiving, from the service computing device at the service system location, a request for the log of current customers; and
transmitting, to the service computing device at the service system location, the log of current customers comprising at least the second facial template; and
after an end of a predetermined period after first receiving the beacon identifier without subsequently receiving the beacon identifier, transmitting, to the service computing device, instructions to delete the second facial template from the log of current customers.

US Pat. No. 10,482,460

METHOD AND APPARATUS FOR FACILITATING ELECTRONIC PAYMENTS USING A WEARABLE DEVICE

ALIBABA GROUP HOLDING LIM...

1. A method for binding a wearable device, the method comprising:providing, by the wearable device, device information of the wearable device to a terminal based on an established connection between the wearable device and the terminal, the device information including a device identification;
receiving, by the wearable device, a device certificate from a server, the device certificate generated by the server based on the device identification and the device certificate corresponding to a user account associated with the wearable device;
generating, by the wearable device, a device-side key and a server-side key used for encrypting the device certificate during transmission;
storing, by the wearable device, the device-side key on the wearable device, the device-side key being the same as the server-side key or based on the server-side key;
transmitting, by the wearable device, the server-side key to the server; and
storing, by the wearable device, the device certificate on the wearable device, the device certificate enabling the wearable device to perform a payment operation using the user account, wherein the payment operation is capable of being performed by the wearable device if the established connection between the wearable device and the terminal is not detected and wherein the payment operation comprises:
generating, by the wearable device, a decrypted device certificate by decrypting the device certificate using the device-side key, wherein the device certificate is encrypted by the server using the server-side key;
generating, by the wearable device, a transaction certificate based on the decrypted device certificate; and
providing, by the wearable device, the transaction certificate to a payee device.

US Pat. No. 10,482,459

SYSTEM AND METHOD FOR AUTOMATED ACCOUNT CREATION VIA A MOBILE WIRELESS DEVICE IN A PAYMENT SYSTEM

1. A method of an automated sign-up and creation of an account of a new customer in a payment system, comprising the steps of:receiving a telephone call by the payment system from a new payment system customer, using a wireless mobile device of the customer;
identifying by the payment system, a caller Id of the telephone call, connecting to a telephone company database, and receiving from the database identification of a specific cellular wireless carrier company for this specific caller id of the customer;
connecting by the payment system to the specific wireless carrier for verifying the customer as being a customer of the cellular wireless company; and
retrieving by the payment system, a customer profile including a customer name, an address and a mobile device id ESN from the carrier database.

US Pat. No. 10,482,458

USER EQUIPMENT, SERVICE PROVIDING DEVICE, PAYMENT SYSTEM COMPRISING THE SAME, CONTROL METHOD THEREOF AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM STORING COMPUTER PROGRAM RECORDED THEREON

SK Planet Co., Ltd., Seo...

1. A service providing device, comprising:a communication unit which receives information on a payment card, a PIN number corresponding to the payment card, position information of user equipment of a user attempting to purchase an item at a physical payment store, position information of one or more devices in the vicinity of the user equipment, and identification information of the user equipment which are transmitted from the user equipment, wherein the one or more devices that are in the vicinity of the user equipment are located at the physical payment store; and
a control unit which determines whether the position information of the user equipment is located within a predetermined radius from the position information of the one or more devices located at the physical payment store for primary verification of the purchase, checks a type of the payment card from among one or more payment cards issued to the user equipment that is being used to purchase the item, payment date and time information associated with the attempted purchase of the item at the physical store, and position information of the physical payment store when the position information of the user equipment is located within the predetermined radius from the position information of the one or more devices located at the physical payment store as a determination result, and performs secondary verification based on a distance difference between the position information of the user equipment and position information of the physical payment store where the payment is made by the payment card and a time difference between a present time and the payment date and time information when the payment is made by the payment card.

US Pat. No. 10,482,457

SYSTEM AND METHOD FOR TOKEN-BASED PAYMENTS

CAPITAL ONE SERVICES, LLC...

1. A method for software-based contactless payment using an acquisition system, comprising:providing, via a network and by an issuer system, a dynamic payment packet that includes a first token and an additional data element comprising customer creditworthiness information to a mobile device of a customer for use with a transaction, the first token comprising a single-use token;
receiving, via the acquisition system, the dynamic payment packet in association with the transaction;
transmitting the dynamic payment packet to a third party system to obtain offer data from the third party system based on the customer creditworthiness information;
transmitting, via the acquisition system, data associated with the dynamic payment packet to the issuer system for authorization of the transaction, the authorization being based on whether the first token complies with a plurality of parameters and whether the first token is associated with the mobile device, the plurality of parameters comprising transaction limits, use limits, and time limits;
determining, by the issuer system, an authorization response based on the offer data from the third party system and data received from the issuer system authorizing the transaction;
transmitting, to the acquisition system by the issuer system, the first authorization response, a transaction identifier, and account data associated with the transaction, wherein the acquisition system converts the account data to create a second token and transmits the second authorization response, the transaction identifier, and the second token to a merchant system for customer approval and merchant transaction posting; and
providing, to the mobile device by the issuer system and responsive to the transmission of the authorization response, the transaction identifier, and the second token, real-time financing options related to the payment of the transaction and cross-selling of lending products based on the offer data.

US Pat. No. 10,482,456

SYSTEMS AND METHODS FOR GENERATING AND MANAGING DYNAMIC CUSTOMIZED ELECTRONIC TOKENS FOR ELECTRONIC DEVICE INTERACTION

Capital One Services, LLC...

1. A token-based electronic device interaction system for transferring data between a user device associated with a user and a remote device, comprising:a token database;
a memory storing instructions; and
a processor configured to execute the stored instructions to:
access information associated with an electronic token, the electronic token being:
associated with at least one of the user or the user device; and
associated with a first expiration parameter,
wherein the first expiration parameter is based on received transaction information associated with a transaction and is determined at an initiation of the transaction;
receive, from the remote device at a time after the initiation of the transaction, a transaction request associated with the transaction, the transaction request comprising modified transaction information associated with the transaction;
determine a second expiration parameter based on the modified transaction information; and
authorize the transaction request when the second expiration parameter is less than or equal to a predetermined threshold of the first expiration parameter.

US Pat. No. 10,482,454

GENERATING A SENSORY INDICATION

Capital One Services, LLC...

1. A method for generating a sensory indication, comprising:detecting execution of a transaction using a transaction card, the transaction relating to an event;
receiving, by the transaction card, an input signal specifying an output indication related to the event;
initiating a count-down to a time associated with the event, based on the input signal;
generating, by the transaction card, an output signal comprising the sensory indication; and
outputting the output signal by the transaction card upon expiration of the count-down.

US Pat. No. 10,482,451

METHOD OF USING BIOINFORMATICS AND GEOGRAPHIC PROXIMITY TO AUTHENTICATE A USER AND TRANSACTION

MASTERCARD INTERNATIONAL ...

1. A computer-implemented method of authenticating and processing a P2P payment at a payment transaction network, the method comprising:receiving a push or pull request from a first device associated with a first user and adapted to communicate in a P2P network, wherein the push or pull request relates to a transaction with a second device associated with a second user and adapted to communicate in a P2P network;
in response to the push or pull request, outputting a prompt on the first and second device requesting a biometric measurement;
receiving a first biometric measurement from sensors coupled with the first device;
receiving a second biometric measurement from sensors coupled with the second device;
retrieving a first biometric parameter associated with the first user and a second biometric parameter associated the second user from one or more P2P transaction authentication databases, wherein the first and second biometric measurement are each a type selected from any one of: an EKG measurement, a fingerprint, iris scan, a voice pattern, gait, typing rhythm, and a facial pattern;
comparing the first biometric measurement with the first biometric parameter and comparing the second biometric measurement with the second biometric parameter;
periodically tracking a relative proximity between the first device and the second device, and updating the one or more P2P transaction authentication databases with the relative proximity, wherein the relative proximity between the first device and the second device is determined via a Bluetooth or Near-Field Communication connection between the first device and the second device; and
responsive to determining that the first biometric measurement identifies the first user, determining that the second biometric measurement identifies the second user, and determining that the first device and second device are within a predetermined relative proximity, effecting the transaction based on the push or pull request.

US Pat. No. 10,482,450

METHOD FOR PROCESSING AN AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM

INGENICO GROUP, Paris (F...

1. A method comprising:processing by a processing entity, a payment transaction to implement a service and/or access an item, comprising:
receiving by the processing entity, from a requesting device, a payment request for implementing said service and/or accessing said item, said payment request comprising at least one payment information coming from a payment card;
searching by the processing entity for an indicator of dependency from at least one piece of data of said payment request, the indicator indicating dependency on additional payment authorization for the payment transaction having to be provided by a verification device; and
when the indicator of dependency is present, the processing entity obtaining the additional payment authorization from the verification device to implement said service and/or access said item, the obtaining said additional payment authorization comprising:
transmitting by the processing entity, to the verification device, a request for setting up a secured link;
setting up by the processing entity a secured link between the processing entity and a trusted execution environment of the verification device;
transmitting by the processing entity a notification to the verification device by using the secured link, accompanied by a request for entry of a PIN code;
receiving by the processing entity an encrypted PIN code transmitted through the secured link by the trusted environment of the verification device in reply to the notification, the PIN code having been entered on the verification device through a secured display module and a secured entry module; and
verifying by the processing entity validity of the entered PIN code by the processing entity.

US Pat. No. 10,482,449

PERSON TO PERSON PAYMENT SYSTEM AND METHOD

JPMORGAN CHASE BANK, N.A....

1. A computer-implemented method for sending a person to person (P2P) payment from a sender to a recipient comprising:electronically transmitting, via a P2P computer server comprising at least one computer processor, to the recipient through a communications channel-selected by the sender, the communications channel consisting of at least one of: email, text message, quick response (QR) code, and near field communication (NFC), a notification of the payment from the sender, the notification including an amount of the payment and a link to a P2P payment platform of a financial entity of the sender that is different from a P2P payment platform at which the recipient receives the payment;
after the recipient selects the link in the notification, electronically transmitting, via the P2P computer server, to the recipient an interface detailing funds transfer options including: an option to transfer of funds to a checking or savings account with a request for an account number and routing number, an option to transfer of funds to a transaction card account with a request for a card number, expiration date, and a card verification value (CVV), an option to transfer of funds to a third party P2P system with a request for an account identifier, and an option to transfer of funds in the form of a merchant electronic gift certificate with a request for identification of the desired merchant;
receiving from the recipient electronically, via the P2P computer server, a selection as to one of the funds transfer options whereby in the case of a deposit account, the recipient provides the requested routing number and account number, in the case of a transaction card account, the recipient provides the requested card number, expiration date, and card verification value (CVV), in the case of a third party P2P system, the recipient provides the requested account identifier, or in the case of a merchant electronic gift certificate, the recipient identifies the desired merchant; and
electronically transmitting, via the P2P computer server, the payment to the recipient via the recipient's selected funds transfer option without requiring the recipient to open a new account or verify an existing account, wherein the sender selects from a plurality of sending options comprising each of: near field communication, quick response code, an email address of the recipient, mobile phone number, and via social network.

US Pat. No. 10,482,447

RECOGNITION SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD

TOSHIBA TEC KABUSHIKI KAI...

1. A recognition system, comprising:an imaging device which images a prescribed imaging area and outputs image data;
a storage device which stores a commodity file including identification information for a plurality of commodities, feature values for the plurality of commodities, and a predetermined recognition classification for each commodity in the plurality indicating the commodity is one of a first commodity type or a second commodity type, the first commodity type being commodities to be recognized using a code symbol associated with the commodity in the commodity file and the second commodity type being commodities to be recognized using a feature value associated with the commodity in the commodity file; and
a processor which is configured to:
determine whether a code symbol can be detected in the image data from the imaging device,
detect an article in the image data from the imaging device if a code symbol cannot be detected in the image data,
extract a feature value of the detected article from the image data,
calculate similarities between the stored feature values in the commodity file for commodities of the first commodity type and the second commodity type and the extracted feature value,
recognize commodities in the commodity file as candidates corresponding to the detected article based on the calculated similarities,
exclude commodities of the first commodity type from the candidates based on the predetermined recognition classification included in the commodity file, and
select a commodity from the candidates as a recognized commodity based on calculated similarity provided that the calculated similarity for the commodity is above a threshold value.

US Pat. No. 10,482,446

PAYMENT SYSTEM

Intel Corporation, Santa...

1. At least one machine readable medium comprising one or more instructions that when executed by at least one processor, cause the at least one processor to:couple an electronic device to a physical point of sale terminal using enhanced privacy identification (EPID), wherein the electronic device includes a monitory account;
verify the monitory account with an account institution using EPID; and
request an action related to the monitory account using an EPID key, wherein the EPID key includes an anonymous EPID random base and a non-anonymous EPID named base, wherein the requested action is related to a sale of goods or services and includes changing a monitory value of the monitory account, wherein the monitory account is updated when the requested action is verified.

US Pat. No. 10,482,443

SYSTEM AND METHODS ASSOCIATED WITH VENDING MACHINE TELEMETRY, REPLENISHMENT, AND CONFIGURATION UTILIZING MULTIPLE TYPES COMMUNICATION NETWORKS

Katzenfreunde LLC, Austi...

1. A vending machine system comprising:a first network configured to transmit data over shorter distances;
a second network configured to transmit data over longer distances;
a vending machine configured to dispense items;
a vending machine computing device installed locally within the vending machine, the vending machine computing device being configured to determine first data on a predetermined schedule, and second data responsive to a transaction, the second data including a flag indicating if an inventory of a first item within the vending machine is below a vending threshold responsive to completing a transaction associated with the first item, the first data requiring more data bandwidth than the second data, the first data including a full inventory of items currently located at the vending machine, a status of each denomination of currency located at the vending machine, and a quantity of items sold by the vending machine over a time period;
a user computing device configured to wirelessly perform the transaction with the vending machine computing device to receive the first item from the vending machine, the user computing device being configured to receive the second data including the flag from the vending machine over the first network responsive to the transaction being performed, the user computing device being configured to relay the second data including the flag over the second network to a backend server after receiving the second data over the first network.

US Pat. No. 10,482,439

KEY DUPLICATION SYSTEM

The Hillman Group, Inc., ...

1. A network of self-service key duplication kiosks, comprising:a plurality of kiosks at different locations; and
a remote central server in network communication with the plurality of kiosks and configured to receive information from and send information to the plurality of kiosks,
each of the plurality of kiosks comprising,
a digital camera configured to take a digital image of a customer's key,
a key duplication system configured to replicate a tooth pattern on the customer's key using a cutting code, and
a communications interface configured to enable network communication with the remote central server for sending the digital image of the customer's key to the remote central server and, in response, receive the cutting code for the customer's key from the remote central server,
the remote central server configured to receive the digital image from a kiosk, identify the cutting code from the digital image, and send the cutting code to the kiosk for use in duplicating the customer's key.

US Pat. No. 10,482,438

METHOD AND APPARATUS FOR SHARING REGIONAL INFORMATION

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:obtaining, at a payment platform server, a payment bill query request initiated by a user through a third-party payment platform;
determining, by the payment platform server, whether a payment institution has generated a payment bill for the user based on the payment bill query request, wherein the payment institution does not provide the third-party payment platform with bill generation information;
in response to determining that the payment institution has generated the payment bill for the user:
obtaining, by the payment platform server and based on the payment bill, user information associated with the user, wherein the user information includes a region that the user belongs to;
determining, by the payment platform server, whether information for notification that the payment institution has generated the payment bill for the user has been pushed to the region that the user belongs to; and
in response to determining that the information for notification that the payment institution has generated the payment bill for the user has not been pushed to the region that the user belongs to:
pushing, by the payment platform server, the information for notification that the payment institution has generated a payment bill to each user associated with the third-party payment platform within the region that the user belongs to through an account of the third-party payment platform.

US Pat. No. 10,482,433

REAL-TIME TRANSACTION AND RECEIPT PROCESSING SYSTEMS

CAPITAL ONE SERVICES, LLC...

1. A transaction processing system, the system comprising:one or more processors; and
a memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, cause the system to:
receive, from a user device associated with a user, user receipt preferences comprising rules that specify whether the user wants a receipt, wants to decide at a point of sale, or does not want a receipt;
receive, from a merchant device, a purchase authorization request associated with an attempted purchase comprising a transaction amount, a financial account number associated with an account of the user, and a merchant category code (MCC);
receive, from the user device, location data;
determine, based on the user receipt preferences and the location data, a receipt status;
responsive to determining that the receipt status indicates that the user wishes to receive a receipt, set a receipt flag to indicate that the merchant device should provide the user with a receipt;
responsive to determining that the receipt status indicates that the user does not wish to receive a receipt, set the receipt flag to indicate that the merchant device should not provide the user with the receipt;
responsive to determining that the receipt status indicates that the user wishes to determine at the point of sale, set the receipt flag to indicate the merchant device should attempt to initiate a direct wireless communication session with the user device;
responsive to determining that the attempted purchase should be authorized, generate an authorization message and transmit, to the merchant device, the authorization message comprising the receipt flag and data indicative that the merchant device is authorized to complete the attempted purchase; and
responsive to determining that the attempted purchase should not be authorized, generate a cancellation message and transmit, to the merchant device, the cancellation message comprising the receipt flag and data indicative that the merchant device should cancel the attempted purchase.

US Pat. No. 10,482,432

SYSTEMS AND METHODS FOR REMOTE DEPOSIT OF CHECKS

United Services Automobil...

1. A system comprising:a customer's mobile device including a downloaded app, the downloaded app provided by a bank to control check deposit by causing the customer's mobile device to perform:
instructing the customer to have a digital camera take a photo of a check;
giving an instruction to assist the customer in placing the digital camera at a proper distance away from the check for taking the photo;
presenting the photo of the check to the customer after the photo is taken with the digital camera;
using a wireless network, transmitting a copy of the photo from the customer's mobile device and submitting the check for mobile check deposit in the bank after presenting the photo of the check to the customer; and
a bank computer programmed to update a balance of an account to reflect an amount of the check submitted for mobile check deposit by the customer's mobile device;
wherein the downloaded app causes the customer's mobile device to perform additional steps including:
confirming that the mobile check deposit can go forward after optical character recognition is performed on the check in the photo; and
checking for errors before the submitting step.

US Pat. No. 10,482,431

VEHICLE TRACKING SYSTEMS AND METHODS

THE REYNOLDS AND REYNOLDS...

1. A method comprising:providing a vehicle service facility, the vehicle service facility comprising:
an RFID transmitter-receiver, the RFID transmitter-receiver comprising at least one RFID antenna and an RFID reader, the at least one RFID antenna being a vehicle intake bay antenna;
a computer system, the computer system having a programmable processor and processor-readable or computer-readable programming code embodying logic embedded on tangible, non-transitory computer readable media, the computer system in data communication with the RFID reader;
a vehicle intake bay;
a greeting screen, the greeting screen located within the vehicle intake bay, the greeting screen positioned to be viewed by a customer, the greeting screen adapted to display a customer name, the vehicle service facility name banner; an advertisement banner; a vehicle year and model, or a combination thereof; and
a service shop;
detecting an RFID tag with the vehicle intake bay entry antenna;
determining whether the RFID tag is associated with a loaner vehicle;
determining whether the RFID tag is associated with a vehicle having a scheduled appointment;
determining whether the RFID tag is associated with a vehicle associated with a walk-in customer; and
displaying a customer name on a greeting screen only for customers having a scheduled appointment.

US Pat. No. 10,482,430

LIMITING CANDIDATE PLAYLISTS IN MULTI-SHOT SCHEDULING SYSTEM

iHeartMedia Management Se...

1. A method for use in an automated media scheduling system, the method comprising:determining, by a processing device:
a number of positions to be included in a shot;
a maximum index value specified by a restriction rule, wherein the maximum index value indicates a maximum relative ranking of a media item permitted to be assigned to a position, and wherein a relative ranking of the media item is determined based on a score of the media item relative to scores of other media items;
a specific number of shots to be generated based on the number of positions and the maximum index value;
generating, by the processing device, the specific number of shots, by assigning media items to each of the number of positions in each of the specific number of shots;
determining, by the processing device for each of the specific number of shots, aggregate scores of the media items assigned to each of the number of positions; and
scheduling, by the processing device, a best-scoring shot for transmission based on the aggregate scores.

US Pat. No. 10,482,427

SYSTEM AND METHOD FOR CONCEPT DISCOVERY WITH ONLINE INFORMATION ENVIRONMENTS

WORLDONE, INC., New York...

1. A system for interacting with an online information environment, the system comprising:at least one processor operatively connected to a memory, the at least one processor configured to execute a plurality of system components from the memory, the system components comprising a user interface component configured to:
display a creation view configured for creating a case and comprising an open-ended text field to receive text indicative of a chief complaint of a patient and a first close-ended data field to receive a parameter indicative of an age of the patient;
generate and display a list of suggested clinical terms to add to the open-ended text field using at least one text fragment from the text indicative of the chief complaint of the patient and the age of the patient;
identify and emphasize key terms in the text indicative of the chief complaint of the patient the open-ended text field;
assign one or more classification tags to the case based on the identified key terms;
display a response view configured for responding to the case and comprising a display of information regarding the case, a display of at least one previously submitted response to the case, and an open-ended text field to receive a response to the case;
display a search view configured for searching a database of cases, the database configured to store the cases as data objects including case information, the case information including a question, a specialty requirement for the case, and at least one concept, and comprising a search field; and
match terms in the search field with the one or more classification tags to identify relevant cases.

US Pat. No. 10,482,426

PROJECT MANAGEMENT PLATFORM

Accenture Global Solution...

1. A computer-implemented method for providing a project management (PM) platform as a cloud-based service, the method being executed by one or more processors and comprising:providing, by the one or more processors, a content management (CM) platform, and one or more applications on a cloud-based server system, the CM platform operating as a container, through which one or more applications of the PM platform can be accessed, such that the one or more applications are presented as though being hosted directly in the CM platform, while being hosted on one or more server systems, the one or more server systems being distinct from the CM platform;
transmitting, by the one or more processors, computer-executable instructions to display an electronic document within a web browser on a display of a client-side computing device; and
receiving, by the one or more processors, a user selection of an application through the electronic document displayed within the web browser on the client-side computing device, and in response:
transmitting, through the web browser, a first request to the CM platform,
loading, from the CM platform, a page frame of the application, the page frame being loaded to the web browser to enable the web browser to directly communicate with the one or more server systems through the page frame to retrieve one or more customizations associated with the application,
transmitting, through the web browser, a second request to the one or more server systems hosting the application, the one or more server systems storing one or more customizations and data,
receiving at least one response from the one or more server systems, the at least one response comprising at least one customization and data, the customization customizing the application to a particular client of a plurality of clients, and
displaying, on the client-side computing device, an application page within the page frame, the application page comprising the at least one customization, and at least a portion of the data.

US Pat. No. 10,482,425

TECHNIQUES FOR MANAGING FUNCTIONALITY CHANGES OF AN ON-DEMAND DATABASE SYSTEM

salesforce.com, inc., Sa...

1. A method for managing functional changes to an on-demand database system on behalf of an owner of the on-demand database system and which may affect multiple tenant-specific production environments of multiple tenants supported by the on-demand database system, each having a corresponding production environment and a corresponding test and development environment, wherein a production environment of the multiple tenant-specific production environments is one of two separate computation environments that operate independently of each other within a server-side facility, the two separate computation environments comprising the production environment and a test and development environment, said method comprising:identifying, from among the multiple tenant-specific production environments, the production environment as one of the multiple tenant-specific production environments that will be affected by the functional changes;
determining whether the production environment includes tenant-specific business logic including at least configuration information and customization information to be tested in the test and development environment prior to being applied to the production environment;
in response to determining the production environment includes tenant-specific business logic, copying the functional changes and at least a portion of the production environment subject to the functional changes to the test and development environment thereby forming a tenant-specific test and development environment to facilitate testing of the tenant-specific business logic by executing the functional changes within the tenant-specific test and development environment before expiration of a pre-configured duration of time;
providing to a graphical interface of a user system information related to the functional changes from the test and development environment, wherein the graphical interface allows concurrent access to both the production environment and the tenant-specific production environment for users of a common tenant; and
implementing the functional changes in the production environment after the pre-configured duration of time, wherein the pre-configured duration of time is configurable via the graphical interface, the graphical interface further providing an option for the functional changes to be implemented immediately rather than delaying until after the pre-configured duration of time.

US Pat. No. 10,482,424

SYSTEMS AND METHODS FOR MOBILE DEVICE-BASED ITEM ACQUISITION AND TRACKING

Capital One Services, LLC...

1. A method for providing a user interface on a mobile device, comprising:detecting, with the mobile device, a signal from a tag associated with an item in proximity to the tag, the item being in a first area;
presenting a user interface on the mobile device, the user interface including:
first item information associated with the tag,
second item information associated with a second tag that is within scanning range of the mobile device; and
buttons configured to remove displayed items from the user interface;
detecting, with the mobile device using a scan mode, a third tag associated with a second area separate from the first area;
presenting at least one of the first item information and second item information and a request to confirm checkout;
receiving a confirmation from the user; and
based on receiving a confirmation, sending a message over a wireless network to initiate checkout.

US Pat. No. 10,482,422

SYSTEM, METHOD AND APPARATUS FOR LOCATING AND MERGING DOCUMENTS

Chargerback, Inc., Carso...

1. A system to generate a merged record, comprising:a client server device configured to generate a first report; and
a recovery server device configured to:
receive the first report, the first report including first report information, the first report information including at least one first descriptive term and a customer identification (ID);
match the at least one first descriptive term to one of a plurality of descriptive terms in a descriptive term list;
determine if a weighted percentage associated with the matched at least one first descriptive term is greater than a predetermined weighted percent;
match the at least one first descriptive term to at least one second descriptive term in at least one second report if it is determined that the weighted percentage associated with the matched at least one first descriptive term is greater than the predetermined weighted percent; and
display the at least one second report if the at least one first descriptive term matches the at least one second descriptive term, the at least one second report including a match indicator proximate each of the at least one second descriptive term configured to indicate that the at least one first descriptive term matches the at least one second descriptive term.

US Pat. No. 10,482,421

SYSTEM FOR EXPEDITING DELIVERY OF ITEMS

Amazon Technologies, Inc....

1. A system comprising:at least one communication interface;
memory storing computer-executable instructions;
at least one hardware processor in communication with the at least one communication interface and the memory, the at least one hardware processor configured to execute the computer-executable instructions to:
receive geolocation data, acquired by a first device, the geolocation data is indicative of presence of a vehicle at a geographic boundary, wherein the vehicle is associated with a user identifier;
determine an estimated time of arrival of the vehicle at a facility;
access a first set of vehicle identification data that associates particular user identifiers with particular vehicle identification data;
determine, based on the estimated time of arrival and a threshold period of time, a second set of vehicle identification data comprising a portion of the first set of vehicle identification data associated with user identifiers having estimated times of arrival that are within the threshold period of time of a particular time, wherein the second set of vehicle identification data is smaller than the first set of vehicle identification data;
based at least in part on the geolocation data, stage, at one or more staging locations, at least a portion of a first order associated with the user identifier, wherein the user identifier is associated with the vehicle for delivery;
receive at least a portion of the particular vehicle identification data acquired by a second device, wherein the at least a portion of the particular vehicle identification data is associated with one or more of an approach or entry of the vehicle to a parking area of the facility, and wherein the second device comprises one or more of:
a camera,
a radio frequency identification (RFID) reader, or
a weight sensor;
determine a correspondence between the at least a portion of the particular vehicle identification data and the second set of vehicle identification data;
based at least in part on the determined correspondence, determine the user identifier associated with the at least a portion of the particular vehicle identification data is present at the facility, wherein the user identifier is associated with the vehicle; and
dispatch the first order that comprises one or more items to the parking area.

US Pat. No. 10,482,419

SENSOR DEVICE HAVING CONFIGURATION CHANGES

Tive, Inc., Cambridge, M...

1. A method, comprising:configuring a sensor device in accordance with a first configuration defining environmental data collection for a plurality of sensors and defining when the collected environmental data for the sensors is transmitted to a remote network, wherein the sensor device is coupled to an asset or good being shipped for collecting the environmental data as the asset or good is en route to a destination, wherein the environmental data includes at least temperature data; and
receiving a transition signal by the sensor device from the remote network instructing the sensor device to transition to a second configuration, wherein the second configuration defines transmission of the collected environmental data less frequently than the first configuration.

US Pat. No. 10,482,418

SYSTEMS AND METHODS FOR INSPECTING A DELIVERY VEHICLE USING A PAIRED INSPECTION DRONE

FEDERAL EXPRESS CORPORATI...

1. A drone-based system for inspecting a delivery vehicle, comprising:an internal docking station fixed within a drone storage area within the delivery vehicle, the internal docking station further comprising
a physical docking interface,
an electronic charging connection interface, and
an electronic data connection interface; and
an inspection drone paired to the delivery vehicle and operative to aerially inspect a plurality of targeted inspection points corresponding to respective parts of the delivery vehicle, the paired inspection drone further comprising:
a main housing,
an onboard controller disposed within the main housing,
a memory storage coupled to the onboard controller and maintaining an inspection profile record corresponding to the delivery vehicle,
a plurality of lifting engines coupled with respective lifting rotors, each of the lifting engines being fixed to a different portion of the main housing and responsive to flight control input generated by the onboard controller as part of maintaining a desired flight profile,
a drone capture interface responsive to the onboard controller and disposed on the main housing, the drone capture interface being operative to selectively mate to the physical docking interface of the internal docking station in response to a docking command from the onboard controller, wherein the drone capture interface holds the paired inspection drone in a secure position when selectively mated to the physical docking interface of the internal docking station,
at least one sensor coupled to the onboard controller, the sensor being operative to (a) detect sensor-based inspection information while the paired inspection drone is airborne and has aerially moved from the secured position on the internal docking station to respective aerial positions proximate each of the targeted inspection points and (b) provide the detected sensor-based inspection information to the onboard controller,
a communication interface coupled to the onboard controller, the communication interface being operative to transmit an inspection notification message in response to a transmission command from the onboard controller, and
an onboard battery providing electrical power to each of the onboard controller, the lifting engines, the drone capture interface, the at least one sensor, and the communication interface, wherein the onboard battery connecting to the electronic charging connection interface when the paired inspection drone is in the secure position on the internal docking station; and
wherein the onboard controller of the paired inspection drone is operative, in response to receiving an activation command over the communication interface, to
transition from at least a low power state to an active power state as part of a targeted inspection operation of the delivery vehicle, the paired inspection drone being exclusively assigned to the delivery vehicle;
cause the drone capture interface to automatically uncouple the paired inspection drone from the physical docking interface of internal docking station once the internal monitor drone transitions to the active monitoring state;
access the memory storage to identify the targeted inspection points from the inspection profile record stored in the memory storage, the targeted inspection points corresponding to respective parts of the delivery vehicle;
change the desired flight profile to first cause the lifting engines to move the paired inspection drone from the secured position on the internal docking station to an initial airborne position within the drone storage area of the delivery vehicle and then move the paired inspection drone from the initial airborne position to the respective aerial positions proximate each of the targeted inspection points;
automatically identify an inspection condition about at least one of the targeted inspection points based upon the sensor-based inspection information detected from at least one of the aerials positions, the inspection condition being outside an acceptable range for operation of the delivery vehicle; and
cause the communication interface to responsively transmit an inspection notification message to a delivery vehicle receiver disposed on the delivery vehicle upon identifying the inspection condition for the at least one targeted inspection point is outside the acceptable range for operation of the delivery vehicle.

US Pat. No. 10,482,417

ITEM IDENTIFIER ASSIGNMENT

Hewlett-Packard Developme...

1. A computing system, comprising:a processor; and
a memory storing instructions that are executable to cause the processor to:
create a set of sequential item identifiers for a first container and items to be included within the first container;
assign the item identifiers to the first container and the items to be included in the first container by assigning a first item identifier in the sequential item identifiers to the first container, assigning next item identifiers subsequent to the first item identifier in the sequential item identifiers to the items to be included in the first container, and assigning a last item identifier in the sequential item identifiers to the first container, wherein each of the item identifiers in the set of sequential item identifiers relates to the first container and a second container;
physically attach the assigned item identifiers to the first container and the items, and cause the items to be placed in the first container;
determine a total number of items supposed to be in the first container based on the first item identifier and the last item identifier of the first container;
compare the total number of items supposed to be in the first container to a total number of items present in the first container to determine whether any item is missing from the first container; and
in response to a determination that one of the items is missing from the first container, attach a new item identifier to a new item and cause the new item to be placed in the first container to replace the missing item.

US Pat. No. 10,482,416

TERMINAL APPARATUS, MANAGEMENT APPARATUS, MANAGEMENT SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

FUJI XEROX CO., LTD., Mi...

1. A terminal apparatus comprising:a camera device configured to read an identifier of an object from among a plurality of objects; and
a display comprising a first display and a second display, the first display being configured to display the identifier read by the camera device, the second display being configured to display a plurality of records at once that are associated with the plurality of objects, the plurality of records including information items that identify the plurality of objects and information items that indicate whether respective identifiers of the plurality of objects have been read by the camera device; and
a controller configured to receive, from a management apparatus, a list of records associated with objects from among the plurality of objects that are scheduled to be delivered within a predetermined time,
wherein the second display is configured to display a predetermined number of records included in the list of records at once, and
wherein, in response to the object being associated with a record included in the list of records that is not displayed by the second display, the second display is adjusted to display the record.

US Pat. No. 10,482,415

SYSTEMS AND METHODS FOR CUSTOMIZED SHIPMENT NOTIFICATIONS

UNITED PARCEL SERVICE OF ...

1. A method for sending messages comprising:providing, over a communications network, a graphical user interface to a shipper computing device, the graphical user interface includes: a first field, a second field, and a third field, the first field associated with a hyperlink that points to at least one of: an audio file, an image file, or a video file, that includes a personal message associated with a shipper of an item, the second field corresponding to a user selection of a predefined triggering event to receive a notification message about, the third field corresponding to a user selection of an electronic message address that the notification message will be sent to;
receiving, over the communications network and from the shipper computing device, by a computer system, shipping data comprising a destination address for delivery of the item;
at least partially in response to the receiving, over the communications network, the shipping data, generating a digital shipping label that is to be affixed to the item and that comprises machine-readable indicia of a carrier-specific tracking identifier scanned by a mobile station to obtain tracking information regarding transport of the item through a carrier's transportation network and presenting the tracking information to a user interface of a display device to enable user interaction with the tracking information and provide visibility of the item in transit, the mobile station configured to be operated by carrier personnel during delivery of the item;
receiving, over the communications network and based on a first user input into the third field of the graphical user interface and by the computer system, the electronic message address for sending the notification message;
receiving, over the communications network and based on a second user input into the second field of the graphical user interface and by the computer system, an identification of the predefined triggering event for sending the notification message;
detecting first coordinates of a geolocation at which the at least one of the audio file, the image file, and the video file was captured by the mobile station of the carrier personnel;
storing the at least one of: the audio file, the image file, and the video file, by a computer system, in association with the shipping data, the electronic message address and the triggering event identification;
detecting second coordinates of a geolocation of the item as the item is being transported through the carrier's transportation network, in part, in response to the mobile station scanning the carrier-specific tracking identifier;
based at least in part on receiving a first indication that the mobile station has scanned the carrier-specific tracking identifier and third user input into the first field, transmitting, over the communications network, the hyperlink to the mobile station and causing the mobile station to prompt the carrier personnel to select the hyperlink comprising the at least one of the audio file, the image file, and the video file;
receiving, over the communications network, a second indication that the hyperlink has been selected, wherein the at least one of the audio file, the image file, and the video file is configured to be played for a recipient of the item on the mobile station; and
at least partially in response to the receiving of the second indication that the hyperlink has been selected, automatically transmitting, over the communications network, the notification message to the electronic message address, and providing access within the mobile station to enable user interaction with at least one of the audio file, the image file, and the video file of the customized data.

US Pat. No. 10,482,413

DATA TRANSFER TOOL FOR SECURE CLIENT-SIDE DATA TRANSFER TO A SHIPPABLE STORAGE DEVICE

Amazon Technologies, Inc....

1. A system, comprising:one or more computing devices connected to a network of a client site;
one or more storage devices attached to the network of the client site;
at least one shippable storage device provided by a remote storage provider, wherein the at least one shippable storage device is attached to the network of the client site; and
a data transfer tool implemented on at least one of the one or more computing devices, wherein the data transfer tool is configured to:
obtain, from a remote storage service provider, at least one encryption key;
identify data stored on the one or more storage devices to be imported to a storage service of the remote storage service provider;
obtain the identified data from the one or more storage devices;
generate one or more encryption keys for encrypting the identified data;
encrypt the identified data using the one or more generated encryption keys to generate encrypted data;
encrypt the one or more generated encryption keys using the at least one encryption key provided by the remote storage service provider to generate an encrypted one or more generated encryption keys for sending to the remote storage service provider;
transfer the encrypted data to the at least one shippable storage device; and
in response to completion of the transferring of the encrypted data to the at least one shippable storage device, indicate that the at least one shippable storage device is ready for shipment to the remote storage service provider.

US Pat. No. 10,482,412

SYSTEM AND METHOD FOR PROVIDING PRODUCT DELIVERY SERVICE IN ELECTRONIC TRANSACTION USING SMARTPHONE

eBay Inc., San Jose, CA ...

1. A system for providing a product delivery service through an electronic transaction using a smartphone configured to perform a shopping-mall-related application service, the system comprising:a shopping mall server configured to:
generate a unique product barcode provided to order a product registered through a seller terminal using the shopping-mall-related application service in response to a purchaser ordering the product, the unique product barcode including order-related information for the ordered product;
receive data indicating that delivery products including the ordered product have been obtained, from a seller of the ordered product, the delivery products being processed for delivery by attaching unique product barcodes thereto to perform a classification and delivery processing service by delivery destination using the unique product barcodes;
communicate with a device that is co-located with the delivery products and that is installed in a specific place to make the delivery products available for pickup by respective purchasers through the shopping-mall-related application service, wherein the device that is co-located with the delivery products is configured to transmit a specific signal to the shopping-mall-related application service installed in a smartphone of the purchaser;
receive order-related information of the delivery products from the device that is co-located with the delivery products;
transmit a delivery completion message to the purchaser smartphone of the purchaser of the ordered product indicating that the ordered product has been processed for delivery;
receive, from the purchaser smartphone of the purchaser, location information of the purchaser, wherein the location information is received based on the specific signal;
transmit, when the purchaser approaches the device that is co-located with the ordered product, using the location information of the purchase, an instruction for making the ordered product available for pickup by the purchaser to the device that is co-located with the delivery products.

US Pat. No. 10,482,411

DASHBOARD FOR DYNAMIC DISPLAY OF DISTRIBUTED TRANSACTION DATA

Cisco Technology, Inc., ...

1. A method for providing a user interface for creating a custom dashboard that displays runtime data associated with a distributed business transaction performed by a system of machines or nodes connected over a network, the method including:receiving the runtime data collected from the system of machines or nodes, the runtime data indicative of a performance of the distributed business transaction;
providing the user interface to include user selectable and configurable widgets;
receiving user selection of two or more of the widgets;
receiving user configuration of the selected two or more of the widgets individually or as a group;
based on the user configuration, configuring the widgets to create the custom dashboard for displaying the collected runtime data indicative of the performance of the distributed business transaction associated with the system of machines or nodes connected over the network;
receiving user specified parameters of the widgets in the custom dashboard;
determining whether additional distributed business transactions that satisfy the parameters;
dynamically updating the custom dashboard to display the additional distributed business transactions that satisfy the parameters;
dynamically updating the custom dashboard to remove any of the previously displayed distributed business transactions that subsequently fail to satisfy the parameters; and
sharing the custom dashboard to enable additional users to edit the parameters of the custom dashboard.

US Pat. No. 10,482,410

ITEM HANDLING AND TRACKING SYSTEM AND METHOD THEREFOR

SITA Information Networki...

1. A method of tracking passage of items from an arrival point to a departure point of an item handling system, comprising the steps of:acquiring information about the identity of one or more items, arrival and departure parameters for each of the items of the one or more items and a topology of a location through which each of the items may pass between arrival and departure;
for a particular item of the one or more items, defining a path through the item handling system, the path including a plurality of checkpoints at which the particular item is identified and recorded;
at a plurality of the checkpoints, determining a status of the particular item based on the time of arrival of the particular item at the checkpoint compared to a target time of arrival, and assigning a status from a plurality of statuses to the particular item, the plurality including a status indicating that the particular item is at risk of not arriving at a departure point by a required time; and
where the particular item is assigned an at risk status, determining and communicating a suggested remedial action to a controller.

US Pat. No. 10,482,409

PRODUCT PICKING SYSTEM

23. A method for picking products, the method comprising:receiving a work order to obtain at least one product;
determining business rules for stacking the at least one product;
receiving a virtual stack of the at least one product based on the work order, the virtual stack being a 3D representation of the at least one product;
determining business rules for selecting the at least one product; wherein determining business rules for selecting the at least one product comprises determining a set of business rules for selecting a first product based on quality assurance; wherein the quality assurance comprises determining whether to select the first product based on a product condition of the first product; and
providing business rules for selecting the first product of the at least one product to an automatic vehicle,
wherein the automatic vehicle is configured to select the first product upon determining that the first product satisfies the business rules for selecting the first product, and
wherein the automatic vehicle is further configured to arrange the first product into a physical stack corresponding to the virtual stack upon selecting the first product.

US Pat. No. 10,482,406

ENERGY-SAVING-OPERATION RECOMMENDING SYSTEM

TOSHIBA MITSUBISHI-ELECTR...

1. An energy-saving-operation recommending system in a rolling line for rolling a material to be rolled using a plurality of facilities including a finishing mill having a plurality of rolling stands, comprising:one or more processors configured to:
calculate total energy consumption of the plurality of facilities during passage of one material to be rolled through the rolling line,
divide the total energy consumption by a width and a length of the material to be rolled before rolling to calculate an energy consumption reference value that defines energy consumption per unit width and unit length of the material to be rolled, and
store the calculated energy consumption reference value in association with a steel grade and a target post-rolling plate thickness of the material to be rolled in an energy consumption reference value table; and
a sensor configured to measure a crown value of a material on a downstream side of the finishing mill and output a signal representing the crown value,
wherein the one or more processor is further configured to:
obtain an energy consumption reference value corresponding to a steel grade and a target post-rolling plate thickness of a material to be next rolled on the rolling line, from the energy consumption reference value table,
multiply the energy consumption reference value obtained from the energy consumption reference value table by a width and a length of the material to be next rolled to calculate predicted energy consumption predicted to be consumed by the plurality of facilities during passage of the material to be next rolled through the rolling line,
obtain the signal representing the crown value output from the sensor, and
recommend to an operator an operation condition reducing energy consumption consumed by the plurality of facilities to be smaller than the predicted energy consumption while maintaining a product quality of a rolled material and a mechanical property of a product material quality within an allowable range including increasing a rolling load distribution ratio of a front stand of the plurality of rolling stands and reducing a rolling load distribution ratio of a rear stand of the plurality of rolling stands when the crown value as determined from the signal representing the crown value output from the sensor is an allowable value or smaller, which is set to be smaller than an upper limit value of the product quality.

US Pat. No. 10,482,405

MANAGEMENT AND ALLOCATION OF SERVICES USING REMOTE COMPUTER CONNECTIONS

BUSA STRATEGIC PARTNERS, ...

1. A method comprising:establishing a support session between a user computer having a geographic region associated therewith and a support server, and between the support server and a given support service computer from among a plurality of different support service computers, the plurality of different support service computers being partitioned by respective geographic service regions, and the support server selecting the given support service computer for the support session based upon its respective geographic service region and the geographic region associated with the user computer;
collecting user feedback data at the support server from the user computer upon conclusion of the support session; and
at the support server, when the feedback data meets a satisfaction threshold, performing a transaction comprising logging the feedback data to an account associated with a user of the user computer and logging both the feedback data and satisfaction level to an account associated with a user of the support service computer.

US Pat. No. 10,482,402

METHOD AND SYSTEM FOR PROVIDING NOTIFICATIONS RELATED TO SERVICE INFORMATION OF MACHINE

Caterpillar Inc., Peoria...

1. A method for providing notifications related to service information for service of a machine located at a worksite, the method comprising:detecting, by a worksite management system, an entry of the machine in a first predefined service zone based on machine location data and machine identification data, wherein the first predefined service zone is defined in the worksite management system corresponding to a first service area at the worksite at which to receive a first service;
generating, by the worksite management system, a first notification based on at least one predefined parameter and the machine identification data upon the entry of the machine in the first predefined service zone, wherein the first notification includes information related to the first service to be performed at the first service area, and the first service to be performed being to the machine at the first service area; and
detecting, by the worksite management system, an exit of the machine from the first predefined service zone based on the machine location data.

US Pat. No. 10,482,401

SYSTEM AND METHOD FOR ARRANGING AN ORDER

Amazon Technologies, Inc....

1. An apparatus comprising:an interface configured to display an unpacking sequence; and
a processor communicatively coupled to the interface and operable to:
determine a packing arrangement for a facility according to the unpacking sequence, wherein the packing arrangement is used to set a packing order of a plurality of items for a package; and
instruct one or more mobile drive units, wherein a mobile drive unit comprises a self-powered device, to transport the package along a replenishment path at the facility while docked with the package, the replenishment path comprising information that is received wirelessly by the mobile drive unit from a management module, wherein the replenishment path is calculated by the management module according to an inventory unpacking sequence that is based on an arrangement of items in the package and the inventory holders receive items from the package along the path;
instruct the one or more mobile drive units to stop at points along the replenishment path such that the items in the package are unloaded from the package at the points that correspond to inventory holders designated to receive the items.

US Pat. No. 10,482,399

SHARED VEHICLE MANAGEMENT APPARATUS AND SHARED VEHICLE MANAGEMENT METHOD

Nissan Motor Co., Ltd., ...

1. A navigation system for managing shared vehicles shared by users, comprising:a first storage configured to store information on a plurality of stations at which the shared vehicles can be used and returned;
a reservation acceptance device configured to accept a use reservation of a shared vehicle from a user,
the use reservation including information on a departure station and an arrival station,
the departure station being set by the user as a station from which the user expects to use the shared vehicle, and
the arrival station being set by the user as a station to which the user returns the shared vehicle after use;
a return occasion detector configured to detect a return start occasion on which the user using the shared vehicle returns the shared vehicle based on a remaining distance for return from the current position of the shared vehicle to the arrival station;
a route guidance device configured to execute guidance of a travel route including a route from a current position of the shared vehicle used by the user to the arrival station set for the shared vehicle; and
a remaining distance detector configured to:
detect a remaining distance for return that is a distance from the current position of the shared vehicle to the arrival station set for the shared vehicle and
calculate a reduction rate of the remaining distance for return per unit time as a positive value when the shared vehicle is traveling toward the arrival station and a negative value when the shared vehicle is traveling away from the arrival station,
wherein, the route guidance device does not start the guidance of the travel route until the return occasion detector detects the return start occasion for the user after the user starts to use the shared vehicle, and the route guidance device uses detection of the return start occasion by the return occasion detector as a trigger to start the guidance of the travel route,
wherein the return occasion detector is configured to detect the return start occasion based on the comparison result between data obtained by using the remaining distance for return that is a distance from the current position of the shared vehicle to the arrival station and a predetermined threshold value,
wherein, when the reduction rate is a reduction rate threshold or more, the return occasion detector detects the return start occasion, and
wherein the reduction rate threshold is corrected from a first value to a second value based on a detected situation.

US Pat. No. 10,482,398

SECURE ANONYMOUS TRANSACTION APPARATUSES, METHODS AND SYSTEMS

Visa International Servic...

1. A computer-implemented method, comprising:receiving, by a computer system from a merchant computer, an anonymized purchase order that comprises a one-time anonymized account number and an anonymized shipping address, the one-time anonymized account number and the anonymized shipping address generated by a one-time anonymous data generation component of a network server; and
prior to instructing, by the computer system, shipment of items related to the anonymized purchase order to the anonymized shipping address:
receiving, by the computer system from the network server, an identifier associated with the anonymized purchase order, and
requesting, by the computer system, an actual shipment address for the anonymized purchase order based at least in part on the identifier by generating an encrypted request message that is verified by the network server.

US Pat. No. 10,482,397

MANAGING IDENTIFIERS

TRUSTARC INC, San Franci...

1. A method of managing attributes comprising:obtaining a unique mutable identifier for storage in memory in response to a request from an end entity to an attribute service provider to generate the unique mutable identifier;
utilizing a processor to provide a set of attributes of the end entity selected by the end entity and provided to the attribute service provider for association with the unique mutable identifier and storage at the attribute service provider;
providing, by the end entity, the unique mutable identifier from the end entity to a first application whereby the first application can obtain the associated set of attributes of the end entity by inquiring the attribute service provider;
providing the unique mutable identifier to a second application whereby the second application can obtain the associated set of attributes of the end entity by inquiring the attribute service provider; and
upon request from the end entity to the attribute service provider, obtaining a modified mutable identifier associated with the selected set of attributes previously associated with the unique mutable identifier.

US Pat. No. 10,482,396

SYSTEM AND METHOD FOR AUTOMATED COMPLIANCE VERIFICATION

Refinitiv US Organization...

1. A distributed, computer-based system for filtering content in order to update compliance policies in a compliance document while protecting confidential information in the compliance document, the distributed computer-based system comprising:a local computer system including one or more processors and a non-transitory storage medium containing instructions that, when executed by the one or more processors, cause the one or more processors to:
identify a reference to a compliance rule in the compliance document and a location in the compliance document in which the compliance rule is referenced; and
create a transmission object including metadata in place of the confidential information from the compliance document and a subset of information from the compliance document, the subset of information including the reference to the compliance rule in the compliance document and location information that identifies the location in the compliance document in which the compliance rule information is referenced, the metadata identifying a section of the compliance document that includes the confidential information; and
a remote computer system including:
a transmission object receiver configured to receive the transmission object using one or more processors of the remote computer system and to parse the reference to the compliance rule in the compliance document from the location information and to extract the metadata;
a compliance rules database containing data regarding a set of compliance rules;
the one or more processors of the remote computer system executing instructions stored in a non-transitory medium of the remote computer system to:
identify a compliance rule applicable to the entity using the data in the compliance rules database and the reference to the compliance rule in the compliance document from the transmission object, wherein the one or more processors of the remote computer system are configured to receive the reference to the compliance rule in the compliance document from the transmission object receiver; and
compile an electronic notification indicative of the identified compliance rule and to compile the location information and the metadata identifying the section of the compliance document that includes the confidential information from the transmission object into the electronic notification, wherein the one or more processors of the remote computer system are configured to receive the location information from the transmission object receiver; and
a transmitter configured to transmit the electronic notification to the entity.

US Pat. No. 10,482,391

DATA-ENABLED SUCCESS AND PROGRESSION SYSTEM

PEARSON EDUCATION, INC., ...

1. A system for remote intervention comprising:memory comprising:
a user profile database comprising information identifying one or several attributes of a user; and
a model database comprising a risk model and categorization data identifying a plurality of alert categories;
a user device comprising:
a first network interface configured to exchange data via the communication network; and
a first I/O subsystem configured to convert electrical signals to user interpretable outputs via a user interface;
a supervisor device comprising:
a second network interface configured to exchange data via the communication network; and
a second I/O subsystem configured to convert electrical signals to user interpretable outputs via a user interface; and
a content management server, wherein the content management server is configured to:
receive data identifying a user of the user device;
retrieve user data for the user from the user profile database;
retrieve a risk model from the model database;
input the user data into the risk model to generate a risk value, wherein the risk value is indicative of the likelihood of the user failing to achieve a predetermined outcome;
identify a user categorization according to a classification algorithm;
determine a response attribute for the user, wherein the response attribute identifies the degree of a positive or negative user response to an intervention;
generate an action recommendation identifying an action for completion, wherein the action recommendation is generated based on the response attribute;
generate and send an alert to the supervisor device, wherein the alert comprises the action recommendation, and wherein the alert comprises computer code to trigger activation of the I/O subsystem of the supervisor device to provide the action recommendation; and
select, based on the response attribute, from a plurality of potential dashboard updates stored in a dashboard database, a dashboard update, wherein the dashboard update:
positively affects the risk value, and decreases the risk value of the user failing to achieve the predetermined outcome;
includes, on a second dashboard, a new dashboard data, dashboard architecture, and dashboard content that was not displayed on a first dashboard, the new dashboard data, dashboard architecture, and dashboard content including the alert; and
includes an identification field, a performance field, a participation field, and a notification field displayed in a different position on the second dashboard than on an original position on the first dashboard, wherein the new dashboard data, dashboard architecture, and dashboard content includes a risk field including a graphical depiction of the risk value indicative of the likelihood of the user failing to achieve the predetermined outcome.

US Pat. No. 10,482,390

INFORMATION DISCOVERY SYSTEM

Salesforce.com, inc., Sa...

1. A computer-implemented method for an information discovery system comprising:retrieving a first element of data;
extracting at least one knowledge point from the first element of data using sentiment analysis of the first element of data, wherein the at least one knowledge point comprises an aspect of the first element of data;
retrieving a second element of data;
extracting the at least one knowledge point from the second element of data using sentiment analysis of the second element of data;
linking the first element of data and the at least one knowledge point with a first traversable link, wherein the at least one knowledge point is further linked to a second element of data with a second traversable link;
receiving at least one user criteria from a user device; matching the at least one knowledge point to the at least one user criteria; identifying the first element of data linked to the at least one knowledge point based on a traversal of the first traversable link between the at least one knowledge point and the first element of data;
identifying the second element of data linked to the at least one knowledge point based on a traversal of the second traversable link between the at least one knowledge point and the second element of data; and
sending to the user device the at least one knowledge point matching the at least one user criteria, the identified first element of data, and the identified second element of data.

US Pat. No. 10,482,389

PARALLEL DEVELOPMENT AND DEPLOYMENT FOR MACHINE LEARNING MODELS

SAP SE, Walldorf (DE)

1. A method of using a plurality of processors, of a computer, in parallel to develop a learning model, the method comprising:accessing, using at least one of the processors, a database storing a sample data set to train the learning model, wherein the learning model comprises a first learning algorithm having a number of inputs and a number of outputs, and wherein each sample of the sample data set comprises a state for each of the inputs and the outputs;
counting, using at least one of the processors, a number of states for each of the inputs of the samples of the sample data set;
selecting a subset of the inputs;
partitioning, using at least one of the processors, the sample data set into a number of partitions equal to a combined number of states of the selected inputs, wherein each of the partitions corresponds to a combined state of the selected inputs and each of the partitions includes the samples of the sample data set that exhibit a same combined state of the selected inputs corresponding to the partition;
creating, using at least one of the processors, a second learning algorithm for each of the partitions, wherein the second learning algorithm for a partition comprises logic of the first learning algorithm in which the combined state of the selected inputs is equal to the combined state that corresponds to the partition, and wherein the second learning algorithm is configured to receive as input those of the inputs that are not the selected inputs;
assigning each of the second learning algorithms to one of the plurality of processors;
training each of the second learning algorithms on the processor assigned to the second learning algorithm using the samples of the partition corresponding to the second learning algorithm to generate trained second learning algorithms;
receiving a plurality of operational data units comprising a state for each of a plurality of inputs corresponding to the inputs of the sample data set;
directing each of the plurality of operational data units as input to one of the trained second learning algorithms based on a combined state of the selected inputs corresponding to the operational data unit; and
generating an output for each of the plurality of the plurality of operational data units from the corresponding trained second learning algorithm.

US Pat. No. 10,482,388

SPIN-ORBIT QUBIT USING QUANTUM DOTS

1. A method of quantum information processing using a lateral double quantum dot (DQD) disposed at a substrate surface and having a first quantum dot (QD1) tunnel-coupled to a second quantum dot (QD2), comprising:populating QD1 with two confined electrons;
transferring one confined electron to QD2 to create a (1, 1) charge state;
performing at least two state rotations on the confined electrons while the DQD is in the (1, 1) charge state; and
reading out a final quantum state of the DQD,wherein:the at least two state rotations are performed while exposing the DQD to an externally sourced magnetic field having a component directed parallel to the substrate surface;
the performing of each of the at least two state rotations consists of applying a voltage pulse sequence to a planar gate electrode or combination of planar gate electrodes that is electrostatically coupled to the confined electrons so as to vary a relative tuning between QD1 and QD2;
at least a first one of the voltage pulse sequences comprises maintaining, for a first specified duration, a first relative tuning between QD1 and QD2; and
at least a second one of the voltage pulse sequences comprises maintaining, for a second specified duration, a second relative tuning between QD1 and QD2 that is different from the first relative tuning.

US Pat. No. 10,482,385

BAYESIAN CAUSAL RELATIONSHIP NETWORK MODELS FOR HEALTHCARE DIAGNOSIS AND TREATMENT BASED ON PATIENT DATA

Berg LLC, Framingham, MA...

1. A computer-implemented method for generating a causal relationship network model based on patient data, the method comprising:receiving data corresponding to a plurality of patients including between 50 and 1,000,000 patients, the data including diagnostic information and/or treatment information for each patient;
parsing the data to generate normalized data for a plurality of variables including at least one variable related to diagnosis or treatment for each patient, wherein, for each patient, the normalized data is generated for more than one variable;
generating a causal relationship network model relating the plurality of variables based on the generated normalized data, the generating including creating and evolving an ensemble of Bayesian networks based on the generalized normalized data from between 50 patients and 1,000,000 patients, the causal relationship network model including variables related to a plurality of medical conditions; and
the causal relationship network generated using a programmed computing system including storage holding network model building code and one or more processors configured to execute the network model building code.

US Pat. No. 10,482,383

BUILDING ANALYTIC DEVICE

Intelligent Buildings, C...

1. An information analytic system including:a plurality of automation units each connected to a plurality of monitoring and control devices and connected to a network and configured to collect environmental information;
an information analysis unit connected to the network and configured to store information relating to locations of devices related to a facility and at least one mechanical and electrical system interacting with the devices;
an information gathering unit connected to the network and communicatively coupled to at least one of the automation units and the information analysis unit that retrieves a listing of all monitoring and control devices connected to each automation unit and relates each monitoring and control device to at least one device in at least one facility; and
a rule analysis unit that analyzes the control and monitoring devices connected to each automation unit and selects a listing of rules from a predetermined listing of rules based on the control and monitoring devices connected to the automation units,
wherein,
the information analysis unit analyzes logically relates the devices in the facility based on physical locations of the devices in the facility and the mechanical or electrical systems interacting with the devices, and
the rule analysis unit applies at least one rule from the predetermined listing of rules to an operating of at least one device based on the location and the mechanical and electrical power systems interacting with the device.

US Pat. No. 10,482,382

SYSTEMS AND METHODS FOR REDUCING MANUFACTURING FAILURE RATES

Palantir Technologies Inc...

1. A system for reducing failure rates of a manufactured product comprising:one or more processors; and
memory storing instructions that, when executed by the one or more processors, cause the system to perform:
receiving, from a database, a first product data set associated with a first batch of a first product, the first product data set including a first product formula, a plurality of first product examples, and first test results of the plurality of first product examples, the first test results being associated with a post-manufacturing test, at least a portion of the first product data set being based on first sensor data recorded by one or more first sensors, the first sensor data being stored as time-series data of first sensor measurements;
receiving, from the database, a second product data set associated with a second batch of a second product, the second product being different from the first product, the second product data set including a second product formula, a plurality of second product examples, and second test results of the plurality of second product examples, the second test results being associated with the post-manufacturing test, at least a portion of the second product data set being based on second sensor data recorded by one or more second sensors, the second sensor data being stored as time-series data of second sensor measurements;
clustering, by machine learning, a first product cluster including the first product data set and the second product data set according to a comparison between the first product formula and the second product formula;
determining, based on the clustering, a failure rate reduction mechanism of at least one product of the first product cluster, wherein the determining the failure rate reduction mechanism comprises:
identifying, based on the clustering, the post-manufacturing test from a plurality of different post-manufacturing tests based on one or more failure results of the post-manufacturing test included in the first test results and the second test results; and
modifying, based on the clustering, a passing quality parameter range of the post-manufacturing test such that the failing result is within a modified passing quality parameter range of the post-manufacturing test.

US Pat. No. 10,482,377

SYSTEM, RFID CHIP, SERVER AND METHOD FOR CAPTURING VEHICLE DATA

Brain Trust Innovations I...

1. A server device for determining a location relating to a transport service, the server device comprising:a transceiver configured to, via a network connection, receive a plurality of messages associated with a plurality of vehicles, each of the plurality of messages indicative of location information, and a pick-up request indicative of location information associated with a user;
a controller operatively coupled to the transceiver; and
one or more memory sources operatively coupled to the controller, the one or more memory sources including instructions for configuring the controller to generate an output value from a trained model based upon the location information in the pick-up request and the location information in the plurality of messages associated with the plurality of vehicles.

US Pat. No. 10,482,376

USER INTERFACE FOR ASSESSMENT OF CLASSIFICATION MODEL QUALITY AND SELECTION OF CLASSIFICATION MODEL CUT-OFF SCORE

SAS Institute Inc., Cary...

1. A computer-program product tangibly embodied in a non-transitory machine-readable storage medium, the computer-program product including instructions operable to cause a computing device to:receive received data regarding results of exposing a sample population to a sample stimulus;
generate, based on the received data, a classification model providing prediction data indicating predicted users in a target population who will respond to a target stimulus according to a predefined user response category;
display in a graphical user interface (GUI):
a graphical representation of the generated classification model,
wherein the graphical representation plots, according to the generated classification model, the prediction data as a function of a variable number of users eligible to receive the target stimulus; and
wherein a cut-off in the graphical representation graphically separates the variable number of users of the classification model into two regions, a first region that corresponds to target data for a target group to receive the target stimulus and a second region that corresponds to exclusion data for an excluded group to not receive the target stimulus; and
a plurality of options each specifying one of different objectives for determining a proportion of users in the target population to expose to the target stimulus, wherein the plurality of options control a location of the cut-off in the graphical representation and comprise a first option that indicates that the location of the cut-off accounts for a first factor for increasing a number of targeted users who will respond to the target stimulus according to a predefined user response category and a second factor related to a detriment of a user of the GUI from employing the target stimulus, the first factor different from the second factor;
receive data input from the user of the GUI selecting a selected option of the plurality of options;
determine the location of the cut-off in the graphical representation of the generated classification model based on the selected option;
predict proportion data indicating the proportion of users in the target population to expose to the target stimulus based on the determined location of the cut-off;
determine one of predefined quality categories for the classification model; and
responsive to the received data input and the determined one of the predefined quality categories, issue one or more indications as to whether to use the classification model as a basis for exposing the proportion of users in the target population to the target stimulus according to the proportion data.

US Pat. No. 10,482,373

GRID LONG SHORT-TERM MEMORY NEURAL NETWORKS

DeepMind Technologies Lim...

1. A system for processing a neural network input to generate a neural network output, the system comprising:a grid Long Short-Term Memory (LSTM) neural network implemented by one or more computers, wherein the grid LSTM neural network comprises a plurality of N-LSTM blocks arranged in an N-dimensional grid, wherein N is an integer greater than zero, and wherein each N-LSTM block is configured to:
receive N input hidden vectors, the N input hidden vectors each corresponding to a respective one of the N dimensions;
receive N input memory vectors, the N input memory vectors each corresponding to a respective one of the N dimensions; and
for each of the dimensions, apply a respective transform for the dimension to the memory hidden vector corresponding to the dimension and the input hidden vector corresponding to the dimension to generate a new hidden vector corresponding to the dimension and a new memory vector corresponding to the dimension.

US Pat. No. 10,482,372

INTERCONNECTION SCHEME FOR RECONFIGURABLE NEUROMORPHIC HARDWARE

Intel Corporation, Santa...

1. A neuromorphic processor, comprising:a plurality of corelets, each corelet to include:
a plurality of synapse arrays, each synapse array to include:
a plurality of synapses, each synapse to include:
a synapse input;
a synapse output; and
a synapse memory to store a synapse destination of the corresponding synapse and a synapse weight for the corresponding synapse;
a synapse array router coupled to the synapse outputs in the synapse array; and
a neuron array to include a plurality of neurons, each neuron to include a neuron input and a neuron output;
wherein at least one of the synapse array routers includes circuitry to:
read at least one synapse memory;
identify a corresponding synapse destination;
identify a corresponding synapse weight; and
transmit a packet including the synapse weight and the corresponding synapse destination to a particular neuron group router, based on a routing algorithm.

US Pat. No. 10,482,370

IDENTIFICATION METHOD AND IDENTIFICATION MEDIUM

TOPPAN PRINTING CO., LTD....

1. An identification method for performing authenticity determination on an identification medium having code information and having a variable light pattern portion whose pattern of observed light varies with change in an observation angle and for performing reading of the code information, the method comprising:generating, for captured image data of the variable light pattern portion of the identification medium, reference image data corresponding to the observation angle as an angle of an imaging direction of the captured image data with respect to a reference line of an observation target surface of the identification medium by a reference image generation unit;
obtaining a degree of similarity between the captured image data and the reference image data; and
performing, based on whether the degree of similarity exceeds a preset threshold, the authenticity determination about whether the identification medium is authentic and reading the code information, wherein an observation angle estimation unit is further provided, the observation angle estimation unit being configured to obtain, in a three-dimensional space where the identification medium is placed when the captured image data is captured, capture position and direction of the captured image data by a predetermined coordinate transformation equation, thereby obtaining the observation angle from the capturing position and direction.

US Pat. No. 10,482,369

WINDOW BASED LOCATIONING OF MOBILE TARGETS USING COMPLEMENTARY POSITION ESTIMATES

Trackonomy Systems, Inc.,...

1. A method performed by one or more systems comprising one or more processors executing one or more program instructions encoded in one or more non-transitory structures to track a geographic route navigated by a mobile target, the method comprising:receiving, by a tracking system, a respective sequence of locationing signals from each of multiple sources of different respective locationing signal source types comprising a satellite signal source type, a dead-reckoning signal source type, and a terrestrial wireless communication signal source type;
processing the multiple sequences of locationing signals of different locationing signal source types to obtain position estimates for the mobile target;
determining respective scores for respective map-defined paths based on respective comparisons between the position estimates obtained for the mobile target and locations on the respective map-defined paths; and
selecting a map-defined path as the geographic path most likely navigated by the mobile target based on the respective scores determined for the map-defined paths.

US Pat. No. 10,482,368

ELECTRONIC APPARATUS AND WIRELESS COMMUNICATION SYSTEM

OMRON Corporation, Kyoto...

1. An electronic apparatus comprising:a wireless communication module including an antenna, a control circuit, a memory connected to the control circuit, and a wired communication port;
a processing unit connected to the wireless communication module via the wired communication port; and
a switch configured to electrically connect or interrupt the antenna and the control circuit,
wherein the processing unit detects a read request from an outside via the antenna during a period that a connection between the antenna and the control circuit is interrupted by the switch.

US Pat. No. 10,482,366

MITIGATING ADJACENT RFID READER INTERFERENCE

Neology, Inc., San Diego...

13. A method for mitigating interference in a radio frequency identification (RFID) system, the method comprising:selecting, by a first RFID reader, a first antenna of a plurality of antennas for transmitting a first signal, wherein the first RFID reader is coupled to the plurality of antennas and configured to transmit the first signal via at least one of the plurality of antennas;
determining a second RFID reader is transmitting a second signal via a second antenna; and
in response to the determination, selecting a next antenna of the plurality of antennas to transmit the first signal.

US Pat. No. 10,482,363

SYSTEMS AND METHODS FOR DETECTION MECHANISMS FOR MAGNETIC CARDS AND DEVICES

DYNAMICS INC., Pittsburg...

19. A device, comprising:a conductive pad including a plurality of separated conductive areas electrically connected by a plurality of conductive strips; and
one or more communications devices, every two of the plurality of conductive strips correspond to a different communications device.

US Pat. No. 10,482,361

OPTICAL IDENTIFICATION AND CHARACTERIZATION SYSTEM AND TAGS

THEWHOLLYSEE LTD., Haifa...

1. A system comprising:(a) a plurality of structural-color tags, generating a distinct spectral response in a specified spectral range, said distinct spectral response including at least one characteristic spectral feature including at least one transition between a high-intensity level and a low-intensity level, said intensity levels differing by 20% or more and said transition occurring over a spectral bandwidth of 1000 inverse centimeters or less;
(b) a spectral imaging system for capturing a dataset of at least 5 spectrally-filtered digital images of a field of view; and
(c) a processing system comprising at least one processor, said processing system being configured to process the dataset of spectrally-filtered digital images from said spectral imaging system so as to:
(i) identify spatial pixels of said dataset having said characteristic spectral feature in said specified spectral range as spatial pixels corresponding to one of said tags; and
(ii) process spectral data from said dataset for said tag to derive information relating to said tag.

US Pat. No. 10,482,360

METHOD FOR IMPROVING HYBRID HALFTONING AND APPARATUS THEREFOR

Samsung Electronics Co.,,...

1. A method by which an image forming apparatus forms an image, the method comprising:detecting a boundary area in a portion of image data;
determining a direction of the boundary area, a dominant color of the boundary area, and an edge intensity of the boundary area;
determining enhancement information with respect to the boundary area based on the direction, the dominant color, and the edge intensity; and
forming an image with respect to the image data based on the determined enhancement information,
wherein error diffusion is applied to an area where text is displayed, and dithering is applied to an area where a background of the text is displayed.

US Pat. No. 10,482,359

SYSTEMS AND METHODS FOR REMOVING NON-STATIONARY OBJECTS FROM IMAGERY

Google LLC, Mountain Vie...

1. An image capture device, comprising:an image capture system configured to capture frames of imagery;
a viewfinder configured to display at least a portion of a field of view of the image capture device;
one or more processors; and
one or more non-transitory computer-readable media that collectively store instructions that when executed by the one or more processors cause the image capture device to perform operations, the operations comprising:
capturing a plurality of frames of imagery over a period of time that depict a scene; and
while capturing the plurality of frames of imagery and during the period of time, and for each of the plurality of frames of imagery as such frame of imagery is captured:
receiving the frame of imagery;
upon receipt of the frame of imagery, updating a composite image based on the frame of imagery of the plurality of frames of imagery, wherein updating the composite image comprises:
detecting one or more edges in the frame of imagery that are associated with one or more non-stationary objects included in the scene; and
removing from the composite image the one or more non-stationary objects included in the scene; and
providing the composite image for display in the viewfinder, wherein the composite image depicts the one or more edges but not the one or more non-stationary objects.

US Pat. No. 10,482,358

APPARATUS THAT OPERATES WITH UNIT MOUNTED THEREIN AND THE UNIT

Canon Kabushiki Kaisha, ...

1. An apparatus that operates with a detachable unit mounted therein, the detachable unit including a memory that stores data, comprising:a storage unit configured to store a public key; and
a processor configured to control operation of the apparatus based on the data stored in the memory,
wherein the data includes attribute information indicating an attribute of the detachable unit, and authentication information generated from target information including the attribute information with a secret key paired with the public key and from which the target information is restorable, and
wherein the processor is further configured to:
read out the authentication information and the attribute information from the memory;
decode the authentication information using the public key to obtain restored attribute information;
compare the restored attribute information to the attribute information; and
display an anomaly if the restored attribute information does not match the attribute information.

US Pat. No. 10,482,356

SOFT-PROOF FILE GENERATION BASED ON PRINT-READY DATA

Hewlett-Packard Developme...

1. A soft-proof system comprising:a processor; and
a non-transitory computer-readable storage medium comprising instructions executed by the processor to:
obtain a job definition and a ticket template compatible with a device class of a target imaging device and usable with a class of content acceptable by a print service provider;
identify a plurality of parameters of the ticket template;
receive pre-rip data;
transfer the pre-rip data to a production preparation system to generate print-ready data by a raster image processor (RIP) based on the pre-rip data, content for production, the plurality of parameters of the ticket template, and the job definition, wherein the print-ready data comprises image element information formatted for use by the target imaging device in a production operation; and
transfer the print-ready data to a proof engine to generate a soft-proof file based on the print-ready data generated by the RIP, the job definition, and the plurality of parameters of the ticket template.

US Pat. No. 10,482,355

SYSTEMS AND METHODS FOR APPLYING A CONVOLUTIONAL NETWORK TO SPATIAL DATA

Atomwise Inc., San Franc...

1. A computer system for characterization of a test object using spatial data, the computer system comprising:at least one processor; and
memory addressable by the least one processor, the memory storing at least one program for execution by the at least one processor, the at least one program comprising instructions for:
(A) obtaining spatial coordinates for a target object;
(B) modeling the test object with the target object in each pose of a plurality of different poses, thereby creating a plurality of voxel maps, wherein each respective voxel map in the plurality of voxel maps comprises the test object in a respective pose in the plurality of different poses;
(C) inputting each respective voxel map in the plurality of voxel maps to a network architecture that includes (i) an input layer for sequentially receiving the plurality of voxel maps, (ii) a plurality of convolutional layers, and (iii) a scorer, wherein
the plurality of convolutional layers includes an initial convolutional layer and a final convolutional layer,
each layer in the plurality of convolutional layers is associated with a different set of weights,
responsive to a respective voxel map in the plurality of voxel maps, the input layer feeds values from the respective voxel map into the initial convolutional layer;
(D) obtaining a plurality of scores from the scorer, wherein each score in the plurality of scores corresponds to the input of a voxel map into the input layer; and
(E) using the plurality of scores to characterize the test object.

US Pat. No. 10,482,353

BANDWIDTH SELECTION IN SUPPORT VECTOR DATA DESCRIPTION FOR CLASSIFICATION OR OUTLIER DETECTION

SAS INSTITUTE INC., Cary...

1. A non-transitory computer-readable medium having stored thereon computer-readable instructions that when executed by a computing device cause the computing device to:(a) compute a mean pairwise distance value between a plurality of observation vectors, wherein each observation vector of the plurality of observation vectors includes a variable value for each variable of a plurality of variables;
(b) compute a tolerance value based on a number of the plurality of observation vectors;
(c) compute a scaling factor value based on the number of the plurality of observation vectors and the computed tolerance value;
(d) compute a Gaussian bandwidth parameter value by multiplying the computed mean pairwise distance value and the computed scaling factor value;
(e) train a support vector data description (SVDD) model using the plurality of observation vectors by computing an optimal value of an objective function that includes a Gaussian kernel function that uses the computed Gaussian bandwidth parameter value, wherein the objective function associated with the optimal value defines a set of support vectors selected from the plurality of observation vectors to define a boundary around the plurality of observation vectors; and
(f) output the computed Gaussian bandwidth parameter value and the trained SVDD model for determining if a new observation vector is an outlier or for classifying the new observation vector.

US Pat. No. 10,482,352

INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM

FUJI XEROX CO., LTD., To...

12. An information processing device comprising:a first data acquirer that acquires first observational data;
a second data acquirer that acquires second observational data; and
a processor that performs machine learning by semi-supervised learning to output an emotion of a person as a latent factor using training data of the first observational data and the second observational data, and that infers and outputs the emotion from at least one of the first observational data and the second observational data using a trained model,
wherein the processor performs the machine learning by a combination of a recurrent neural network (RNN) and a variational autoencoder (VAE), and
wherein the processor uses the RNN to calculate a first characteristic quantity of the first observational data acquired by the first data acquirer and a second characteristic quantity of the second observational data acquired by the second data acquirer, and uses the VAE to infer the latent factor using the first characteristic quantity and the second characteristic quantity.

US Pat. No. 10,482,349

SYSTEMS AND METHODS FOR REDUCING DATA DENSITY IN LARGE DATASETS

INSCAPE DATA, INC., Irvi...

1. A computer-implemented method, comprising:obtaining a reference data point;
determining first representative data associated with the reference data point, the first representative data indicating a relationship between a vector associated with the reference data point and a plurality of projected vectors;
removing a number of bits associated with the reference data point from storage in response to determining the first representative data;
obtaining an unknown data point;
determining second representative data associated with the unknown data point, the second representative data indicating a relationship between a vector associated with the unknown data point and the plurality of projected vectors; and
identifying, using the first representative data and the second representative data, one or more candidate data points for matching the unknown data point, wherein identifying the one or more candidate data points includes comparing the unknown data point to the reference data point.

US Pat. No. 10,482,348

SYSTEM AND METHOD FOR TRACKING COHERENTLY STRUCTURED FEATURE DYNAMICALLY DEFINED WITH MIGRATORY MEDIUM

SR2 Group, LLC, Laurel, ...

1. A method for discriminating and tracking a coherently structured flow feature dynamically evolving over time within a migratory medium, comprising:capturing a data set for a medium undergoing migratory flow with respect to a plurality of physical points within a physical space, said data set including data content captured for each physical point in terms of a plurality of scalar parameter values;
selectively generating a sparse set of key points within a scalar field defined by at least one of said scalar parameters, said key points corresponding to at least one coherently structured flow feature of a predetermined feature type occurring and substantially recurring over time with respect to other portions of the migratory medium;
adaptively determining descriptive information for each said key point according to a proximity-based weighting of said data content relative to said key point within a neighborhood of a corresponding physical point, said neighborhood being defined responsive to said predetermined feature type; and,
executing over a time period at least one predetermined feature-based operation on said data content of said key points within said sparse set as a surrogate for execution on said data set entirely to generate evolving flow feature data substantially representative of said data set;
wherein said feature-based operation includes discriminating and tracking said coherently structured flow feature occurring with evolving shape within different data sets.

US Pat. No. 10,482,347

INSPECTION OF THE CONTOURED SURFACE OF THE UNDERCARRIAGE OF A MOTOR VEHICLE

BEISSBARTH GMBH, Munich ...

1. A method for providing a contrast enhanced image of a contoured surface of an undercarriage of a motor vehicle with an image capturing device and an illumination device including an illumination matrix formed of a plurality of illumination elements arranged in illumination rows, the method comprising:(a) moving the motor vehicle with respect to the image capturing device and the illumination device;
(b) illuminating the surface with the illumination device by sequentially activating individual illumination rows of the illumination matrix such that the surface is illuminated from different directions;
(c) recording, using at least one image capturing device, multiple overlapping images of the surface using at least one of different light exposure and different illumination while the motor vehicle is moved with respect to the image capturing device;
(d) automatically generating partial images of the overlapping areas of the recorded images, wherein at least two partial images comprising the same region of the surface are generated from the images which have been recorded with at least one of different light exposure and different illumination;
(e) automatically generating, for each region, a contrast enhanced image from the partial images of the respective region; and
(f) automatically assembling the generated contrast enhanced images to form an enhanced total image of the surface;
wherein, in step (e) a contrast enhanced image for a region is generated by either
automatically generating from at least two partial images of the same region, which have been recorded with at least one of different light exposure and different illumination, at least one synthetic intermediate image, identifying partial objects having maximum contrast in the at least one synthetic intermediate image, and assembling the identified partial objects forming the contrast enhanced image; or by
automatically generating at least one synthetic intermediate image from at least two partial images of the same region, which have been recorded with at least one of different light exposure and different illumination, employing variance-based contrast adaption, and automatically generating the contrast enhanced image from adjacent partial images by employing variance-based contrast adaption.

US Pat. No. 10,482,342

SEARCH APPARATUS, IMAGING APPARATUS INCLUDING THE SAME, AND SEARCH METHOD

Canon Kabushiki Kaisha, ...

18. A search method, comprising: dividing an image on an imaging plane into areas for respective angle regions in space coordinates with an imaging apparatus set as an origin thereof;calculating an importance level of a subject for each of the areas obtained by division; and
changing a center position of a field angle of a captured image in which to search for a subject based on the importance level of a subject calculated for each of the areas,
wherein a division unit is configured for the dividing, a calculation unit is configured for the calculating, and a changing unit is configured for the changing,
wherein each of the division unit, calculation unit and changing unit are implemented by one or more processors, circuitry, or a combination thereof,
wherein the changing unit changes the center position of the field angle to an area the importance level of a subject for which is largest among the areas, and
wherein the changing unit calculates a position of a center of gravity based on the importance levels of a subject of the area the importance level of a subject for which is largest among the areas and an area adjacent to the area the importance level of a subject for which is largest, and changes the center position of the field angle to the position of the center of gravity.

US Pat. No. 10,482,341

OBJECT RECOGNITION DEVICE AND OBJECT RECOGNITION METHOD

FANUC CORPORATION, Yaman...

1. An object recognition device comprising:an imaging unit that captures images of a predetermined monitoring area to acquire a three-dimensional image and a two-dimensional image; and
a controller which has positional-relation-correspondence information between pixels of the three dimensional image and pixels of the two dimensional image, wherein the controller is configured to conduct:
an object extraction process that extracts, in the three dimensional image whose pixels respectively have their height information, an area having pixels whose pixel values are within a predetermined height range, and that determines a search area in the two-dimensional image so as to correspond to the extracted area based on the positional-relation-correspondence information;
an image searching process that searches the two-dimensional image, acquired by the imaging unit, for a reference image registered in advance according to a type of an object; and
a determination process that determines the type of the object depending on whether or not the reference image searched for in the image searching process exists in the search area determined in the two dimensional image; and
a control unit that controls a robot based on the determination process.

US Pat. No. 10,482,340

SYSTEM AND METHOD FOR OBJECT RECOGNITION AND RANGING BY DEFORMATION OF PROJECTED SHAPES IN A MULTIMODAL VISION AND SENSING SYSTEM FOR AUTONOMOUS DEVICES

Samsung Electronics Co., ...

1. A method, comprising:projecting, by a projecting device located at a platform, an array of light shapes, wherein each of the light shapes has a geometric shape that does not overlap with any other of the light shapes within an operating range of the projecting device;
detecting, as reflected light shapes, a plurality of the light shapes reflected from an object in a projection path of the light shapes;
processing the reflected light shapes to determine at least one of: distance from the platform to the object, orientation of the object, an edge of the object, and a corner of the object;
identifying the object by results of the processing;
maintaining a first library of shapes, wherein each shape in the first library corresponds to at least a portion of one of the light shapes,
identifying comprises correlating fiducial points of one of the reflected light shapes to a shape in the first library of shapes; and
in identifying the object, finding corresponding one or more primary shapes in the first library, wherein the primary shape is the shape that matches a target reflected light shape to at least a first threshold matching score.

US Pat. No. 10,482,339

QUANTIFYING COMPUTER VISION ALGORITHM PERFORMANCE IN THE PRESENCE OF SYSTEM UNCERTAINTY

United States of America ...

1. A method of determining an operational range for a computer vision algorithm, the method comprising:receiving a first image and a second image from an imaging system, each of the first and second images characterized by an image intensity value;
iteratively, applying an evaluation value of a noise profile to the first and second images to yield first and second composite images, respectively, and measuring performance of the computer vision algorithm on the first and second composite images;
comparing the measure of performances; and
determining an operational range of the computer vision algorithm from the comparison,
wherein the noise profile includes at least one source of noise inherent to the imaging system.

US Pat. No. 10,482,338

IMAGE READING APPARATUS THAT ALIGNS DIRECTIONS OF DOCUMENT IMAGES, IMAGE READING METHOD, IMAGE FORMING APPARATUS, AND RECORDING MEDIUM

KYOCERA Document Solution...

1. An image reading apparatus for reading images on a plurality of documents to create image data, the image reading apparatus comprising:a character recognition processing unit that recognizes characters in at least one of a plurality of directions, the characters being expressed by the created image data;
an incorrect recognition index calculator that calculates incorrect recognition indexes, the incorrect recognition index being set based on a count of incorrect recognition characters, the count of incorrect recognition characters being a count of candidates for characters possibly incorrectly recognized when the plurality of documents are read, the incorrect recognition index being set such that recognition certainty indicative of accuracy of the recognition becomes smaller as the count of incorrect recognition characters increases;
a certainty calculator that adjusts the recognition certainty using the incorrect recognition index;
a direction determining unit that determines a direction of the plurality of documents based on the adjusted recognition certainty; and
an image processing unit that corrects the image data based on the determined document direction to align image directions of the plurality of documents;
wherein the certainty calculator divides the recognition certainty by the incorrect recognition index for the adjustment.

US Pat. No. 10,482,335

ATM WITH BIOMETRIC SECURITY

Capital One Services, LLC...

1. A computer-implemented method for improving security in an automated teller machine (ATM) network comprising a plurality of ATM devices, the method comprisingreceiving, at an ATM device of the ATM network, a transaction request from a user associated with a user-identifying information;
prompting the user, via the ATM device, to provide a biometric sample;
receiving, through a biometric sensor of the ATM device, the biometric sample of the user;
determining, by the ATM device, that the biometric sample is not blacklisted by communicating with a server configured to compare the received biometric sample against biometric sample information stored within a blacklist database; and
allowing the user to complete, by the ATM device, the transaction associated with the user in response to determining that the biometric sample is not blacklisted,wherein the server is configured to store anonymized event details comprising a location of the transaction, a date and time of the transaction, an amount for the transaction, and the biometric sample, wherein the anonymized event details include information different from the user-identifying information associated with the user completing the transaction on the ATM device.

US Pat. No. 10,482,334

DRIVER BEHAVIOR RECOGNITION

HONDA MOTOR CO., LTD., T...

1. A system for driver behavior recognition, comprising:an image capture sensor configured to capture an image sequence;
a vehicle sensor configured to capture a corresponding vehicle data signal sequence which corresponds to the image sequence;
a memory receiving the image sequence and the corresponding vehicle data signal sequence from the image capture sensor and the vehicle sensor, the image sequence including at least a first image frame and a second image frame, the corresponding vehicle data signal sequence including vehicle data associated with the first image frame and vehicle data associated with the second image frame; and
a processor, for each image frame of the image sequence, configured to:
generate a first feature vector based on the image sequence and a first neural network;
generate a second feature vector based on a fully connected layer or a convolutional layer and the corresponding vehicle data signal sequence;
generate a fusion feature by performing data fusion based on the first feature vector and the second feature vector;
process the fusion feature using a long short term memory (LSTM) layer;
store the processed fusion feature as a recognized driver behavior associated with each corresponding frame by analyzing the fusion feature including the first feature vector indicative of image segmentation of the image sequence and the second feature vector indicative of vehicle data;
communicate the recognized driver behavior to the memory; and
operate a vehicle based on the recognized driver behavior,
wherein the first feature vector is generated based on the image sequence, the first neural network, and a second LSTM layer.

US Pat. No. 10,482,333

MENTAL STATE ANALYSIS USING BLINK RATE WITHIN VEHICLES

Affectiva, Inc., Boston,...

1. A computer-implemented method for mental state analysis comprising:obtaining video of an individual within a vehicle with an image capture device;
analyzing, using one or more processors, the video to detect a blink event based on a classifier for a blink that was determined wherein the blink event is determined by identifying that eyes of the individual are closed for a frame in the video using temporal analysis, and wherein the analyzing filters out looking down by the individual;
evaluating, using the one or more processors, a blink duration of the individual for the blink event;
determining, using the one or more processors, blink-rate information using the blink event and one or more other blink events;
compensating, using the one or more processors, the blink-rate information for a context; and
inferring, using the one or more processors, mental states of the individual for the blink event, wherein the mental states are based on the blink event, the blink duration of the individual, and the blink-rate information that was compensated.

US Pat. No. 10,482,331

STIXEL ESTIMATION METHODS AND SYSTEMS

GM GLOBAL TECHNOLOGY OPER...

1. A method for detecting an object, comprising:receiving, by a processor, image data from an image sensor;
receiving, by the processor, radar data from a radar system;
processing, by the processor, the image data from the image sensor to determine one or more stixels;
processing, by the processor, the radar data from the radar system to determine one or more presence vectors;
fusing, by the processor, the one or more stixels and the one or more presence vectors using a deep learning method;
estimating, by the processor, a motion of the one or more stixels based on the fused stixels and presence vectors; and
detecting, by the processor, an object based on the estimated motion of the one or more stixels.

US Pat. No. 10,482,330

THERMOGRAPHIC MODULE FOR PAVERS

1. A system comprising:a temperature measurement device configured to continuously detect temperature values of a pavement laid by means of a paver during a pavement laying process;
an image recording unit; and
an evaluation unit configured to determine an area of the laid pavement as a deviation area based on temperature values detected for the area fulfilling one or more deviation criteria, wherein the determination is carried out during the pavement laying process and in temporal proximity to the detection of the temperature values for the area;
wherein the system is configured to generate, making use of the image recording unit, an image assigned to the deviation area, the deviation area is a first deviation area, the evaluation unit is configured to assign the same image to a second deviation area of the laid pavement as auxiliary information, and the evaluation unit is configured to carry out the assignment on the basis of a temporal-spatial relationship between the first and second deviation areas and one or more predefined parameters representing causes for incorrect measurements, and wherein the second deviation area is different than the first deviation area.

US Pat. No. 10,482,329

SYSTEMS AND METHODS FOR IDENTIFYING ACTIVITIES AND/OR EVENTS IN MEDIA CONTENTS BASED ON OBJECT DATA AND SCENE DATA

Disney Enterprises, Inc.,...

1. A system comprising:a non-transitory memory storing an executable code including an object data module, a scene data module, an image data module, and a plurality of fusion layers of a neural network; and
a hardware processor to:
receive a media content having video frames;
extract object data, by executing the object data module, from the video frames of the media content;
generate an average object data representation of the extracted object data;
extract scene data, by executing the scene data module, from the frames of the video media content;
generate an average scene data representation of the extracted scene data;
extract image data, by executing the image data module, from the frames of the video media content;
generate an average image data representation of the extracted image data;
feed the average object data representation, the average scene data representation and the average image data representation to the plurality of fusion layers of the neural network; and
classify an action in the video frames of the media content by executing the plurality of fusion layers using the average object data representation, the average scene data representation and the average image data representation.

US Pat. No. 10,482,328

FEATURE-BASED VIDEO ANNOTATION

Google LLC, Mountain Vie...

1. A computer-implemented method for annotating videos, the method comprising:identifying, using a hardware processor, a plurality of entities identifying characteristics of video items;
selecting, using the hardware processor, a set of features correlated with the plurality of entities based on a value of a feature of a plurality of features;
determining, using the hardware processor, a classifier for the plurality of entities using the set of features;
determining, using the hardware processor, an aggregation calibration function for the plurality of entities based on the set of features;
selecting, using the hardware processor, a video frame from a video item, the video frame having associated features; and
determining, using the hardware processor, a probability of existence for each entity of the plurality of entities based on the associated features of the video frame using the classifier and the aggregation calibration function, wherein the probability of existence for each entity of the plurality of entities are normalized.

US Pat. No. 10,482,326

IMAGE PROCESSING SYSTEM, PROCESSING METHOD, AND STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An image processing system comprising:a memory that stores a program; and
a processor that executes the program stored in the memory so as to function as units including:
a detection unit configured to detect a retinal layer of a fundus retina in each of a plurality of tomographic images captured by a tomographic imaging apparatus;
an obtaining unit configured to obtain a shape feature amount of the retinal layer of the fundus retina based on the detected retinal layer of the each of the tomographic images, the shape feature amount being a plurality of curvatures calculated at respective parts on the detected retinal layer in the tomographic image; and
an analysis unit configured to obtain shape analysis information by comparing the shape feature amount of the retinal layer of the fundus retina with a database in which a plurality of shape feature amounts are stored, the plurality of shape feature amounts being classified based on ophthalmic axis length-dependent parameter.

US Pat. No. 10,482,324

METHOD FOR ANALYZING A STRUCTURED DOCUMENT LIKELY TO BE DEFORMED

1. A method for analyzing content of a deformable structured document from of a first acquired (E1) image (A1) and a second acquired (E1?) image (A2) each showing the document, and comprising steps of:matching (E6) first points of interest (P1A1) extracted in the first acquired image (A1) with second points of interest (P2M1) of a first reference image (M1) showing a first model of the document,
estimation (E8) of a first geometric transformation (TM1A1) taking account of deformations of the structured document shown in the first acquired image (A1) relative to the first model, from the matches made in the preceding step,
determination (E9) of at least one first region to be analyzed in the first acquired image (A1), by projection of at least one reference region of the first reference image by means of the first transformation (TM1A1),
analysis (E10) of the content of the first determined region,wherein the method further comprises steps of:matching (E12) third points of interest (P3A2) extracted in the second acquired image (A2) with fourth points of interest (P4A1) extracted in the first acquired image (A1),
estimation (E13), from the matches made in the preceding step (E12), of a second geometric transformation (TA1A2) taking account of deformations of the document shown in the second acquired image (A2) relative to the document shown in the first acquired image (A1),
estimation of a third geometric transformation (TM1A2) taking account of deformations of the document shown in the second acquired image (A2) relative to the first model shown in the first reference image (M1), wherein the third transformation is a composition of the first geometric transformation (TM1A1) and of the second geometric transformation (TA1A2),
determination (E14) of at least one second region to be analyzed in the second acquired image (A2) by projection of the reference region of the first reference image by means of the third geometric transformation,
analysis (E15) of the content of the second determined region.

US Pat. No. 10,482,323

SYSTEM AND METHOD FOR SEMANTIC TEXTUAL INFORMATION RECOGNITION

Autonom8, Inc., Saratoga...

1. A method for semantic textual information recognition comprising:receiving a plurality of text elements along with respective text element coordinates;
identifying the plurality of text elements on an information axis based on the respective text element coordinates;
determining a plurality of semantic clusters of the plurality of text elements by calculating a proximity matrix using the plurality of text elements on the same information axis and a semantic data model;
generating a plurality of rank clusters by ranking the plurality of semantic clusters based on one or more heuristic rules of the semantic data model;
generating a feature set of the plurality of text elements on the same information axis, the plurality of semantic clusters and the plurality of rank clusters; and
updating the semantic data model based on the feature set.

US Pat. No. 10,482,321

METHODS AND SYSTEMS FOR IDENTIFYING THE CROSSING OF A VIRTUAL BARRIER

Cerner Innovation, Inc., ...

1. A method of identifying the crossing of a virtual barrier, the method being performed by a computerized monitoring system and comprising:receiving image data for a room from one or more 3D motion sensors;
configuring a virtual barrier within the room;
classifying an object within the room as a person;
creating a bounding box to circumscribe at least a portion of the person;
monitoring a position of the bounding box over time and relative to the virtual barrier; and
wherein upon detecting that at least a portion of the bounding box has touched or crossed the virtual barrier, initiating skeletal tracking, blob tracking, or a combination thereof to confirm the touching or crossing of the virtual barrier.

US Pat. No. 10,482,320

DEVICE AND METHOD FOR PROVIDING MOVING BODY INFORMATION FOR A VEHICLE, AND RECORDING MEDIUM, ON WHICH A PROGRAM FOR EXECUTING THE METHOD IS RECORDED

LG INNOTEK CO., LTD., Se...

1. A moving object information providing device for a vehicle, comprising:a camera configured to acquire a peripheral image of the vehicle;
a processor configured to:
extract at least one of a first image of an upper body of at least one moving object or a second image of a lower body of the moving object from the peripheral image of the vehicle; and
determine as a moving object information at least one of presence/absence of the moving object around the vehicle or a position of the moving object using at least one of the extracted first image or second image, wherein the processor extracts, as the first image, at least one of a ‘1-1’-st image of an entirety of the upper body of the moving object; or a ‘1-2’-nd image of a part of the upper body of the moving object, and
extract, as the second image, at least one of a ‘2-1’-st image of an entirety of the lower body of the moving object; or a ‘2-2’-nd image of a part of the lower body of the moving object, and
wherein the processor determines the moving object information using only the second image without using the first image, when the processor extracts the first and second images.

US Pat. No. 10,482,317

IMAGE ANALYSIS FOR DETERMINING CHARACTERISTICS OF HUMANS

1. A computerized method for predicting one or more characteristics of a human based on one or more digital images representing the human, comprising:receiving the one or more digital images representing the human, wherein a portion of at least one of the digital images representing the human's head is annotated with a plurality of reference points;
associating at least one other data value about the human with the one or more digital images representing the human;
computing, with a digital computer:
a plurality of scale-free metrics comprising at least two of the following: a length metric, an area metric, and curvature measures using relative locations of a predetermined subset of the reference points and descriptive points, wherein the descriptive points are based on the relative locations of the reference points;
a combined metric based on a predetermined function of the plurality of scale-free metrics;
selecting, using dimension reduction techniques, a combination of the plurality of scale-free metrics useable for predicting a characteristic of the human based on the combined metric and data about a group of subjects; and
providing the predicted characteristic to an output device.

US Pat. No. 10,482,316

IMAGE INFORMATION PROCESSING METHOD AND APPARATUS, AND COMPUTER STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. An image information processing method, comprising:at a device having one or more processors and memory:
performing face recognition on a first image;
identifying one or more faces corresponding to one or more persons in a first image in accordance with result of the face recognition;
extracting feature information of a respective facial portion of at least a first person of the one or more persons located in the first image;
receiving a first user comment including a first descriptive term for the first person identified in the first image;
in response to receiving the first user comment, displaying the first image that is modified with the respective facial portion of the first person replaced with a first image tile that matches the first descriptive term and the respective facial portion of the first person in accordance with predefined correspondence between the feature information of the respective facial portion of the first person and pre-stored description information of the first image tile;
while displaying the first image that is modified with the respective facial portion of the first person replaced with the first image tile, receiving a second user comment including a second descriptive term that is different from the first descriptive term for the first person identified in the first image; and
in response to receiving the second user comment, displaying the first image that is modified with the respective facial portion of the first person replaced with a second image tile that is different from the first image tile, and that matches the second descriptive term.

US Pat. No. 10,482,313

METHOD AND SYSTEM FOR CLASSIFICATION OF ENDOSCOPIC IMAGES USING DEEP DECISION NETWORKS

Siemens Healthcare GmbH, ...

1. A method for classifying endoscopic images, comprising:classifying an endoscopic image and determining a confidence score for the endoscopic image using an initial trained deep network classifier;
comparing the confidence score for the endoscopic image to a learned confidence threshold;
in response to a determination that the confidence score for the endoscopic image is higher than the learned confidence threshold, outputting the classification of the endoscopic image by the initial trained deep network classifier; and
in response to a determination that the confidence score for the endoscopic image is not higher than the learned confidence threshold, classifying the endoscopic image with a first specialized network classifier built on a feature space of the initial trained deep network classifier,
wherein the learned confidence threshold is a confidence score for which no training samples in a validation dataset of training data were incorrectly classified by the initial trained deep network classifier.

US Pat. No. 10,482,312

FINGER SCANNER, AND METHOD OF SCANNING A FINGER USING THE FINGER SCANNER

1. A finger scanner, comprising:a first member and a second member, wherein the first member has a first contact surface configured to contact a first part of a finger, and the second member has a second contact surface adjacent to the first member and configured to contact a second part of the finger adjacent to the first part of the finger, wherein the first contact surface has a first height and the second contact surface has a second height, wherein the first height and the second height have a fixed or variable height difference;
a first fingerprint sensor associated with the first contact surface; and
a second fingerprint sensor associated with the second contact surface.

US Pat. No. 10,482,308

METHOD OF RECOGNIZING FINGERPRINT AND ELECTRONIC DEVICE INCLUDING THE SAME

SAMSUNG ELECTRONICS CO., ...

1. A method of processing a fingerprint, the method comprising:obtaining a fingerprint image from a fingerprint sensor;
calculating a dispersion value of each of a plurality of pixels of the fingerprint image with respect to time at a first time;
determining a pixel having the dispersion value less than a reference value among the plurality of pixels of the fingerprint image as a defective pixel;
in response to determining that the pixel is the defective pixel, generating an interpolated pixel value of the pixel by performing interpolation on a first pixel value of the pixel based on a second pixel value of another pixel different from the pixel; and
correcting the fingerprint image based on the interpolated pixel value, wherein the dispersion value of each of the pixels with respect to time at the first time is calculated by using a pixel value of each of the pixels at the first time, an average value of each of the pixels with respect to time at the first time, and a dispersion value of each of the pixels with respective to time calculated at a second time immediately before the first time from another fingerprint image different from the fingerprint image.

US Pat. No. 10,482,307

FINGERPRINT SENSING SYSTEM AND METHOD UTILIZING EDGE-COMPENSATING STRUCTURE

Fingerprint Cards AB, Go...

1. A fingerprint sensing system for sensing a fingerprint pattern of a finger, comprising:a sensor array including a plurality of electrically conductive sensing structures;
read-out circuitry connected to each of said sensing structures for providing sensing signals indicative of a capacitive coupling between said sensing structures and said finger;
first signal providing circuitry for providing a first time-varying voltage signal to a set of the sensing structures in the plurality of sensing structures;
at least one electrically conductive edge-compensating structure arranged outside said sensor array; and
second signal providing circuitry for providing a second time-varying voltage signal to said at least one edge-compensating structure.

US Pat. No. 10,482,306

FINGERPRINT SENSING SYSTEM AND METHOD

NXP B.V., Eindhoven (NL)...

14. A fingerprint sensing method, comprising:using a capacitance-to-voltage converter to measure a capacitance from the fingerprint sensing cell to produce a voltage in dependence on said physical property;
providing an analog-to-digital converter that implements a logarithmic conversion function to convert said voltage into a digital signal; and
using a look-up table to convert the digital signal to a value representing a linearization of the logarithmic conversion function to provide a measurement of a valley depth of the fingerprint.

US Pat. No. 10,482,304

FINGERPRINT AND PALMPRINT IMAGE COLLECTOR WITH HONEYCOMB STRUCTURE, AND TERMINAL DEVICE

Vkansee Technology Compan...

1. A fingerprint and palmprint image collector with a honeycomb structure, comprising:a light guide plate and a light source for emitting at least part of light into the light guide plate, wherein a honeycomb plate is disposed at one surface of the light guide plate, a plurality of vias parallel to each other are densely disposed on the honeycomb plate, diameters of the plurality of vias are in a range from 0.5 micrometer to 50 micrometers, a size of an acquired fingerprint and palmprint is equal to a size of an acquired image, a thickness of the honeycomb plate is more than five times the diameters of the vias, a distance between centers of adjacent vias is less than or equal to 50.8 micrometers, and an image sensor is disposed on the other surface of the honeycomb plate,
wherein, the light source is fixed on the light guide plate through a support which is provided with a light guide groove, and the light source is disposed in the light guide groove, wherein the light guide groove is configured to control an angle between a normal line and light emitted into the light guide plate from the light source through the light guide groove to be in a range from arcsin(n0/n2) to arcsin(n1/n2), where n0 refractive index of air, n1 is a refractive index of liquid on a surface of an object contacting the light guide plate, and n2 is a refractive index of the light guide plate.

US Pat. No. 10,482,302

METHOD AND APPARATUS FOR PERFORMING DIFFERENT DECODING ALGORITHMS IN DIFFERENT LOCATIONS

Cognex Corporation, Nati...

1. A method for decoding codes applied to objects for use with an image sensor that includes a two dimensional field of view (FOV), the method comprising:obtaining, using the image sensor, an image that includes a plurality of code candidates;
determining an order for the plurality of code candidates based on a distance from each code candidate of the plurality of code candidates to a point of interest at a position in the image;
attempting, based on the order, to decode a first code candidate of the plurality of code candidates that is closest to the point of interest using a decode algorithm;
attempting, based on the order, to decode a second code candidate of the plurality of code candidates that is next closest to the point of interest using the decode algorithm subsequent to attempting to decode the first code candidate.

US Pat. No. 10,482,301

SCANNABLE CHECK MANAGEMENT SERVICE

Capital One Services, LLC...

1. A method of providing data access, the method comprising:receiving, at a server, login data identifying a private account from among a plurality of private accounts from a client device;
processing, by a processor of the server, the login data to log a user into the private account;
sending, by the processor, data enabling an account app to access the private account to the client device in response to the processing;
receiving, at the server, data identifying a scanned code from the account app of the client device;
analyzing, by the processor, the data identifying the scanned code to identify one of the plurality of private accounts to which a check including the scanned code printed thereon was assigned;
determining, by the processor, whether the private account identified in the login data is the one of the plurality of private accounts to which the check was assigned by analyzing the login data and the scanned code;
in response to determining that the private account identified in the login data is the one of the plurality of private accounts to which the check was assigned:
permitting, by the processor, the account app of the client device to access private account functionality associated with the check, the private account functionality including at least memo creation functionality,
receiving, at the processor, a message from the account app through the memo creation functionality, and
storing, by the processor, the message as a memo for the check in a memory; and
in response to determining that the private account identified in the login data is not the one of the plurality of private accounts to which the check was assigned, causing, by the processor, the account app of the client device to display the message associated with the memo without providing access to the private account functionality.

US Pat. No. 10,482,298

INTERACTIVE ELECTRONIC DEVICE

PIXART IMAGING INC., Hsi...

1. An interactive electronic device, comprising:an image capture module;
a response module; and
a processing module electrically connected to the image capture module and the response module; wherein
the image capture module is configured to capture an image of an object,
the processing module is configured to generate a first command set according to the image and accordingly output a control signal containing the first command set,
the response module is configured to drive the interactive electronic device to perform a specific action according to each command in the first command set, the response module is further configured to drive the interactive electronic device to perform a first continuous reaction corresponding to a specific pattern contained in the image according to the first command set, and
wherein the processing module, triggered by a random algorithm installed in the interactive electronic device, further randomly replaces, adds or deletes at least a command in the first command set in operation thereby randomly obtaining a new command set different from the first command set to drive the interactive electronic device to perform unexpected reactions according to the new command set,
wherein in a period of time during which the specific pattern is continuously recognizable in the image, the interactive electronic device is driven to:
perform the unexpected reactions according to the new command set within only a part of the period of time, and
perform the continuous reaction according to the stored command set in the rest of the period of time.

US Pat. No. 10,482,295

CARD COUNTING SYSTEMS AND METHODS FOR SAME

Entrust Datacard Corporat...

1. A sensor system for counting cards comprising:an optical sensor assembly configured to detect edges of cards in a card stack, the optical sensor assembly includes:
an optical sensor, and
a reflecting light element coupled with the optical sensor, the reflecting light element configured to reflect light from a card stack toward the optical sensor,
a remote light element spaced from the optical sensor assembly, the remote light element configured to direct light through the card stack and toward the optical sensor; and
wherein one or more of the optical sensor or the remote light element are configured to isolate the optical sensor from uninterrupted light from the remote light element.

US Pat. No. 10,482,294

INFORMATION PROCESSING APPARATUS, INFORMATION COLLECTING APPARATUS, AND INFORMATION COLLECTING SYSTEM

TOSHIBA TEC KABUSHIKI KAI...

1. An information collecting apparatus, comprising:a plurality of tag readers disposed on the apparatus, each respective tag reader in the plurality of tag readers being configured to detect a wireless tag attached to an article located within a detection range of the respective tag reader;
a movement controller configured to control movement of the apparatus within a search area along a plurality of routes, each route enclosing a different segment region of the search area; and
a data processor configured to:
acquire tag detection information of the wireless tag during a time in which the apparatus is moving in a particular route enclosing each segment region, the tag detection information including a number of times the wireless tag is detected while the apparatus moves along the particular route,
aggregate the number of times for which the wireless tag is detected during the time in which the apparatus is moving along the particular route, and
identify a particular segment region in which the wireless tag is present based on the aggregated number of times for which the wireless tag is detected.

US Pat. No. 10,482,291

SECURE FIELD-PROGRAMMABLE GATE ARRAY (FPGA) ARCHITECTURE

Raytheon Company, Waltha...

1. A method of using a stateful encryption algorithm for non-bypassable FPGA configuration, the method comprising:before encrypting FPGA-configuration data, generating, by a cryptographic algorithm, a first message authentication code (MAC) value using the FPGA-configuration data and a first initial value, wherein the first MAC value indicates a cryptographic state of the FPGA-configuration data;
encrypting the FPGA-configuration data;
receiving, at an FPGA, the encrypted FPGA-configuration data and the first MAC value;
decrypting, at the FPGA, the encrypted FPGA-configuration data;
generating, by the cryptographic algorithm, a second MAC value using the decrypted FPGA-configuration data and the first initial value;
comparing the first MAC value with the second MAC value;
in response to the first MAC value being the same as the second MAC value, authenticating the decrypted FPGA-configuration data;
receiving, at the FPGA, a challenge message from an authentication device;
generating, by the cryptographic algorithm, a third MAC value using the challenge message and the second MAC value as a second initial value;
encrypting, at the FPGA, the challenge message to generate a response message, wherein the response message includes the third MAC value; and
transmitting the response message from the FPGA to the authentication device.

US Pat. No. 10,482,290

VIRTUAL POLYMORPHIC HARDWARE ENGINE

Cipherloc Corporation, B...

1. A printed circuit board having at least one non field programmable gate array micro processor chip wherein said chip is configured using firmware such that a shared memory is created by a non-persisted memory mapping function, said shared memory being in the form of a look up table: wherein the transfer function of a circuit within a field programmable gate array chip is simulated by partitioning a sufficiently large amount of memory having memory addresses into different blocks corresponding to different circuits represented by the transfer function in a portion of the memory and wherein indexing to the memory addresses and using the contiguous memory for a look up table corresponds to loading a field programmable gate array chip and its internal fabric configuration as if it were a new circuit.

US Pat. No. 10,482,289

COMPUTING DEVICE TO PROVIDE ACCESS CONTROL TO A HARDWARE RESOURCE

QUALCOMM Incorporated, S...

1. A computing device comprising:a hardware resource;
a safety configuration register;
a component to send a transaction signal, the transaction signal including a target address of the hardware resource, a security data associated with an initiator of the transaction signal, a safety data associated with the initiator, and a safety master identifier, wherein the safety master identifier allows safety access to the safety configuration register but prevents safety access to the hardware resource when the safety master identifier is set to a first value, and does not prevent safety access to the hardware resource but prevents safety access to the safety configuration register when the safety master identifier is set to a second value; and
an access control unit coupled to the component and the hardware resource, the access control unit to:
receive the transaction signal;
determine whether security access is granted based on the transaction signal;
determine whether safety access is granted based on the transaction signal; and
allow access to the hardware resource based on both the security access and the safety access being granted.

US Pat. No. 10,482,285

EVENT PROCESSING SYSTEM

Mediasift Limited, Readi...

1. A method of processing user events of a platform to extract aggregate information about users of the platform, the method comprising, at an event processing system:initializing a privacy policy with an event processing system;
receiving, at the event processing system, a query relating to the user events;
determining, from the query, by the event processing system, at least one query parameter for each of a plurality of buckets;
for each of the buckets, computing with the event processing system, for a set of the user events satisfying the at least one query parameter for that bucket, an approximate unique user count with an error margin of at least two percent;
comparing, by the event processing system, the approximate unique user count for each bucket with a bucket redaction threshold;
applying, by the event processing system, quantization to the approximate unique user count for at least one of the buckets to generate a quantized unique user count for that bucket; and
responding to the query by releasing, from the event processing system, aggregate information comprising or derived from the quantized unique user count, wherein any of the buckets for which the approximate unique user count is below a minimum user count indicated by the bucket redaction threshold is redacted, wherein no unique user count is released for any redacted bucket.

US Pat. No. 10,482,284

IDENTIFYING, MARKING AND ERASING SENSITIVE INFORMATION IN SCREEN CAPTURES FOR DATA LOSS PREVENTION

Symantec Corporation, Mo...

1. A computer implemented method for protecting data displayed on a screen against loss, the method comprising:defining an original protection region in a bitmap, the defined original protection region comprising a section of the bitmap containing sensitive information;
embedding a protection marker identifying the original protection region into the bitmap, before the bitmap is copied to a screen buffer by an application;
dividing the defined original protection region into a plurality of sub-regions, before the bitmap is copied to the screen buffer by the application;
embedding a separate sub-region protection marker in each sub-region of the original protection region, before the bitmap is copied to the screen buffer by the application;
parsing captured content that was displayed on the screen after the bitmap was copied to the screen buffer;
detecting one or more unobscured sub-region protection markers embedded in the captured content;
calculating a real protection region in the captured content, based on information in the detected one or more unobscured sub-region protection markers; and
erasing the real protection region in the captured content.

US Pat. No. 10,482,283

DATA BREACH DETECTION SYSTEM

Walmart Apollo, LLC, Ben...

1. A distributed computing system comprising:a first computing system including at least one server and a first database, the first computing system selectively connected to a first user device or a second user device and selectively connected to a second computing system via a communications network, the second computing system including a secured database server and a second database, the first computing system configured to receive a first data set, wherein the first database is configured to store a unique identifier assigned to a second data set and the second database is configured to store the unique identifier and the second data set according to an encryption scheme;
establish a connection between the first computing system and the first user device or the second user device via the communications network in response to verification of the first data set received by the first computing system from the first user device or the second user device;
in response to determining there is a potential data breach by an unauthorized user, (i) retrieve the unique identifier from the first database by the at least one server upon receiving a request for the second data set from the first user device or the second user device, (ii) request a first subset of the second data set from the first user device or the second user device to confirm that the first computing system is authorized to retrieve the second data set from the second computing system, (iii) receive by the at least one server, a data string from the first user device or the second user device in response to requesting confirmation, (iv) transmit the unique identifier and the data string from the first computing system to the second computing system, and (v) receive at least one of a failure message or the second data set based on whether the data string matches the first subset of the second data set,
wherein the failure message is received in response to failure of the secured database server to match the data string to the first subset of the second data set, and in response to receiving the failure message, the first computing system further programmed to:
request a second subset of the second data set from the first user device or the second user device to confirm that the first computing system is authorized to retrieve the second data set from the second computing system;
receive, by the at least one server, a second data string from the first user device or the second user device in response to requesting confirmation;
transmit the unique identifier and the second data string from the first computing system to the second computing system; and
receive at least one of a further failure message or the second data set based on whether the data string matches the second subset of the second data set.

US Pat. No. 10,482,282

MANAGEMENT OF A SOCIAL NETWORK CONTACT GROUP THROUGH THE USE OF EMBEDDED LIMITATIONS

1. A social networking system comprising: an online network in which the social networking system operates via a hardware processor and memory; at least one terminal connected to said social networking system through said online network; an embedded limitation located within the social networking system that defines a range of specified allowable user positive actions; said range of specified allowable user positive actions forms a select core group of contacts; said user positive action being analyzed within the online network in accordance with the embedded limitation to determine if the user positive action falls within a limitation range of the embedded limitation; a first determination being made within the social networking system that the user positive action falls within the limitation range of the embedded limitation and that the positive user action will be allowed within the social networking system based on the first determination; said user positive action being analyzed within the online network in accordance with a third party allowance to determine if the third party allowance is required user; a second determination being made that the user positive action does not require the third party allowance and that the positive user action will be allowed within the social networking system based on the second determination; said user positive action being added to previously allowed user positive actions based on the first determination and the second determination; said embedded limitation being closed based on the user positive action being added to previously allowed user positive actions; a user negative action being received within the social networking system; said user negative action being analyzed within the online network in accordance with the embedded limitation; said user negative action being subtracted from previously allowed positive actions; and said embedded limitation being opened based on the user negative action being subtracted from previously allowed positive actions.

US Pat. No. 10,482,280

STRUCTURED TEXT AND PATTERN MATCHING FOR DATA LOSS PREVENTION IN OBJECT-SPECIFIC IMAGE DOMAIN

Symantec Corporation, Mo...

1. A computer-implemented method comprising:receiving, by a computing device, an image;
identifying, by the computing device, multiple physical objects represented in the image based on attributes of the multiple physical objects;
determining, by the computing device, an object type of a first object of the multiple physical objects;
determining, by the computing device, an object type of a second object of the multiple physical objects;
identifying, by the computing device, one or more specific regions of the first object for recognition based on the object type of the first object;
identifying, by the computing device, one or more specific regions of the second object for recognition based on the object type of the second object;
responsive to identifying the one or more specific regions, recognizing, by the computing device, text in the one or more specific regions of the first object;
recognizing, by the computing device, text in the one or more specific regions of the second object;
providing, by the computing device, the text recognized in the one or more specific regions of the first object to a security engine, the security engine configured to evaluate whether the text comprises sensitive information; and
providing, by the computing device, the text in the one or more specific regions of the second object to the security engine.

US Pat. No. 10,482,279

PATTERN-LESS PRIVATE DATA DETECTION ON DATA SETS

Microsoft Technology Lice...

1. A computing system comprising:at least one processor; and
system memory having stored thereon computer-executable instructions that are executable by the at least one processor to cause the computing system to perform at least the following:
configure a collection mechanism by coding the collection mechanism to collect data from a device executing the collection mechanism, the collection mechanism being coded to specify when the data is to be collected on the device and being coded to specify which information used by the device is to be included in the data;
provide the collection mechanism to a plurality of external computing device(s) for execution by the plurality of external computing device(s);
from each external computing device included in the plurality of external computing device(s), collect corresponding data from said each external computing device using the collection mechanism;
combine the corresponding data received from the plurality of external computing device(s) to generate telemetry data;
organize the telemetry data based on one or more parameter(s) that describe details regarding how the telemetry data was collected, wherein at least some of the telemetry data is organized into data sets that share a same combination of parameters included among the one or more parameter(s), and wherein each data set includes a corresponding data value such that a plurality of data values are associated with the telemetry data;
identify, from among the plurality of data values, one or more data value(s) that are determined to be unique relative to other data values included in the plurality of data values;
determine a likelihood that the telemetry data includes personal identifiable information (PII) data and assign a risk index to the telemetry data based on the determined likelihood; and
in response to determining that the risk index of the telemetry data is higher than a risk threshold, change the collection mechanism to prevent further collection of the PII data.

US Pat. No. 10,482,277

SECURITY APPLICATION FOR DATA SECURITY FORMATTING, TAGGING AND CONTROL

Tangoe US, Inc., Shelton...

1. A system for formatting data records based on security rules, the system comprising:a computer and a storage accessible by said computer, the storage having a plurality of data records stored thereon in a first format, the first format associated with an application, wherein each of the plurality of data records is a file such that the file is formatted in the first format;
a security application executing on said computer and intercepting disk input and output (I/O) operations between said computer and said storage;
said security application identifying a content of a data record of said plurality of data records based on a content identifier associated with one or more of: a keyword, a user identifier and a device identifier;
said security application tagging said data record with a tag based on the content identifier and a security rule, the security rule indicative of permissions or restrictions or combinations thereof associated with access to the data record based on the content identifier;
wherein said data record includes at least two sections, a first section contains the tag and a second section contains the content of the data record, said security application converting the second section of the data record to a second format wherein when in the second format, the second section is not accessible by the application, such that the data record in the second format is the content thereof in the second format in its entirety;
the data record is stored on said storage in the second format such that when said security application intercepts a disk operation to access the data record via the application, said security application compares the tag to the security rule and converts the data record to the first format if the disk operation complies with the security rule based on the tag, such that the data record is accessible as the file formatted in the first format;
wherein the tag is accessible from the first section of said data record when said second section is in the second format.

US Pat. No. 10,482,275

IMPLEMENTING ACCESS CONTROL BY SYSTEM-ON-CHIP

Cryptography Research, In...

1. A system-on-chip (SoC), comprising a hardware access control unit, the hardware access control unit comprising a secure memory for storing access control data, the hardware access control unit to:receive, from a programming agent, a message comprising an access control data item;
store the access control data item in the secure memory;
update a state variable reflecting a state of communications between the hardware access control unit and the programming agent, by applying a non-linear function to a current value of the state variable, a cryptographic key shared between the programming agent and the hardware access control unit, and a hash of contents of the secure memory;
calculate a message digest by applying a first cryptographic hash function to contents of the message, a cryptographic key the state variable;
authenticate the message using the message digest;
repeatedly validate the access control data item for detecting unauthorized modification of the access control data item stored in the secure memory, wherein validating the access control data item comprises comparing a value of a second cryptographic hash function of the access control data item to a stored reference value; and
control, in view of the access control data item, access by an initiator device to a target device.

US Pat. No. 10,482,273

SYSTEM AND METHOD FOR ACTIVATING A DATA ENTRY MECHANISM FOR AN APPLICATION BASED ON SECURITY REQUIREMENTS

AO Kaspersky Lab, Moscow...

1. A method for activating a data entry mechanism for an application based on security requirements, the method comprising:detecting, by a hardware processor, an activity state of the application during an execution of the application on a user device;
determining, by the hardware processor, the security requirements associated with the detected activity state, wherein the determined security requirements comprise properties for the data entry mechanism;
activating, by the hardware processor, the data entry mechanism for receiving user input for the application, wherein the data entry mechanism is based on the determined security requirements; and
receiving, by the hardware processor, user input in accordance with the activated data entry mechanism.

US Pat. No. 10,482,272

SYSTEM AND METHOD FOR RECEIVING USER DATA USING A DATA ENTRY MECHANISM ACTIVATED FOR AN APPLICATION

AO Kaspersky Lab, Moscow...

1. A method for receiving user input using a data entry mechanism activated for an application, the method comprising:detecting, by a hardware processor, an activity state of the application during an execution of the application on a user device;
determining, by the hardware processor, security requirements associated with the activity state, wherein the security requirements comprise properties for the data entry mechanism;
selecting, by the hardware processor, a data entry mechanism corresponding to the determined security requirements associated with the activity state;
activating, by the hardware processor, the selected data entry mechanism for receiving user input for the application, wherein the selected data entry mechanism is governed according to the properties of the security requirements associated with the activity state;
receiving, by the hardware processor, the user input in accordance with the activated data entry mechanism; and
displaying, by the hardware processor, a modified version of the user input according to the properties of the security requirements.

US Pat. No. 10,482,271

METHODS AND DEVICES FOR DISPLAYING CONTENT

Lenovo (Beijing) Limited,...

1. A method comprising:displaying, via an electronic device, a first content corresponding to a first privilege level of a first user;
acquiring biometric information of a current user;
determining, based on the biometric information, whether the current user is a second user having a second privilege level different from the first privilege level of the first user; and
in response to determining that the current user is the second user, transitioning from displaying the first content to displaying a second content via the electronic device, wherein the second content corresponds to the second privilege level of the second user, wherein transitioning from displaying the first content to displaying the second content comprises:
determining at least one application corresponding to the second privilege level; and
displaying the at least one application in a running state, wherein one or more applications other than the at least one application are in a non-running state.

US Pat. No. 10,482,269

TECHNIQUES FOR AUTOMATIC BUCKET ACCESS POLICY GENERATION

Capital One Services, LLC...

1. At least one non-transitory computer-readable medium comprising a set of instructions that, in response to being executed by a processor circuit, cause the processor circuit to:apply one or more filter algorithms to log data to determine a set of entities that have accessed a data bucket, the log data comprising access records for the data bucket and the data bucket comprising enterprise information, the one or more filter algorithms to remove noise from the log data or resolve permutations of accesses to the data bucket by a common entity;
identify a set of one or more access characteristics for each entity in the set of entities based on the log data, each set of one or more access characteristics to include one or more access types to the data bucket requested by a corresponding entity for the set of entities;
analyze the set of one or more access characteristics for each entity in the set of entities to determine a set of access requirements for each entity in the set of entities;
create first and second subsets of the set of entities based on the set of access requirements for each entity in the set of entities, the first subset of the set of entities to include one or more entities that require read-only access to the data bucket and the second subset of the set of entities to include one or more entities that require read-write access to the data bucket; and
generate an access policy for the data bucket based on the first and second subsets of the set of entities, the access policy to allow read-only access to the data bucket by the first subset of the set of entities, allow read-write access to the data bucket by the second subset of the set of entities, and prevent access to the data bucket by entities absent from the first and second subsets of the set of entities.

US Pat. No. 10,482,268

SYSTEMS AND METHODS FOR ACCESS MANAGEMENT

1. A system for access management using machine learning, the system comprising:at least one processor; and
a storage device storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising:
obtaining user information and access right information from an access directory and a database;
preprocessing the obtained user information and access right information into user access information, wherein the user access information comprises at least a combination of the user information and the access right information;
generating, based on the user access information, a network for community determination comprising nodes and edges, wherein:
the nodes comprise:
a first type of nodes representing users based on the preprocessed user access information; and
a second type of nodes representing access rights based on the preprocessed user access information; the edges comprise:
a first type of edges connecting nodes of the first type and nodes of the second type, the first type of edges comprising a confidence parameter indicating a likelihood that users represented by nodes of the first type have access rights represented by nodes of the second type, wherein the confidence parameter is computed based on a ratio between a number of users within a prior result of a community determination that have that access right and a total number of users within the prior result of the community determination; and
a second type of edges connecting two nodes of the first type and indicating degrees of similarity between two users represented by the two nodes, based on a set of access rights of the two users, wherein the degrees of similarity is based on the access right information; and
determining, using an unsupervised machine learning algorithm, from the generated network for community determination, and from the user information, a group of nodes of the first type, the group representing a community of users sharing a degree of commonality higher than a degree of commonality shared by other users outside the community.

US Pat. No. 10,482,265

DATA-CENTRIC MONITORING OF COMPLIANCE OF DISTRIBUTED APPLICATIONS

International Business Ma...

1. A method comprising:monitoring a distributed application, by a computer system, using one or more logs of information technology events in a distributed system comprising the distributed application, wherein the distributed application is an application that is executed on multiple computers simultaneously within the distributed system, and wherein the monitoring comprises collecting information technology events by a plurality of components in the distributed application,
wherein the distributed system comprises a plurality of data objects, and the distributed application uses, processes, or otherwise accesses one or more of the plurality of the data objects, and
wherein the information technology events concern the distributed application and concern accesses by the distributed application to one or more of the data objects;
correlating, by the computer system, the information technology events with a selected set of the plurality of data objects;
estimating, by the computer system, risks to the selected set of data objects based on the information technology events,
wherein estimating risks uses at least ranks of compliance rules as these rules apply to the data objects in the system and vulnerability scores of components of the distributed application corresponding to the set of data objects and information technology events,
wherein the estimated risks include a breach of the compliance rules associated with the selected set of data objects, and
wherein the compliance rules are defined by one or more regulations; and
displaying, by the computer system, information allowing a user to determine the estimated risks for the selected set of data objects, wherein the information displayed by the computer system provides the user with an estimated risk of a breach of the regulatory compliance requirements, including user selectable representations of data objects used for data-centric monitoring of compliance applications, and comprising visual indications of the estimated risk for the selected set of data objects, wherein the displayed information allows the user to perform mitigation of the estimated risks for at least one of the selected set of data objects.

US Pat. No. 10,482,264

REGULATING BLOCKCHAIN CONFIDENTIAL TRANSACTIONS

Alibaba Group Holding Lim...

1. A computer-implemented method of a client node participating in a blockchain confidential transaction, the method comprising:obtaining, by a client node of a blockchain network, a public key of a regulator node;
generating, by the client node, one or more commitment values of a confidential transaction of the client node by applying a cryptographic commitment scheme to transaction data of the confidential transaction;
generating, by the client node, encrypted regulatory information of the confidential transaction by encrypting the transaction data using the public key of the regulator node; and
transmitting, by the client node to a consensus node of the blockchain network, a content of the confidential transaction for execution, wherein the content of the confidential transaction comprises:
the one or more commitment values;
the encrypted regulatory information; and
one or more zero-knowledge proofs of the transaction data.

US Pat. No. 10,482,263

COMPUTING ON ENCRYPTED DATA USING DEFERRED EVALUATION

Microsoft Technology Lice...

1. A method in a data server implemented in at least one computing device, comprising:receiving a query from a database application, the query having been received by the database application from a requester;
retrieving a set of data to evaluate the query, the set of data including encrypted data;
designating the query for deferred evaluation by the database application rather than by the data server due to at least one predetermined factor, said deferred evaluation enabling an untrusted server to perform operations on the encrypted data without an encryption key;
determining expression evaluation information for evaluating at least a portion of the query at the database application, the expression evaluation information identifying query evaluation steps to be performed on decrypted database values generated from the encrypted data; and
providing to the database application at least the encrypted data and the expression evaluation information for evaluation at the database application.

US Pat. No. 10,482,260

IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS

Symantec Corporation, Mo...

1. A system for in-line filtering of applications for mobile devices, comprising:a processor configured to:
intercept a request for downloading an application to a mobile device;
determine a response based on an application risk assessment for the application, wherein the application risk assessment is based at least in part on a behavior associated with the application, wherein the determining of the response comprises to:
perform the following:
decompile the application to generate a source code version of the application;
determine the application risk assessment based on a software code path, an application action tree or a combination thereof, the software code path, the application action tree or the combination thereof being determined based on the source code version;
execute the application on one or more emulators to monitor internal and external application programming interface (API) calls and downloading of new components during run-time in an emulated environment; and
determine the application risk assessment based on comparing the monitored internal and external API calls and downloaded new components during the run-time to the software code path, the application action tree or the combination thereof; and
modify the response to the request for downloading the application to the mobile device by blocking downloading of the application to the mobile device based on the application risk assessment indicating an application risk policy violation, wherein the response includes a notification that the application cannot be downloaded due to the application risk policy violation; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,482,259

SECURING OPERATING SYSTEM CONFIGURATION USING HARDWARE

International Business Ma...

1. A method comprising:receiving, from a user application executing under a first operating system configuration on a computing device, a request to execute a second operating system configuration of a set of operating system configurations, wherein the second operating system configuration is:
signed by a private key of a public-private key pair, and
comprises at least an operating system kernel compiled with a set of parameters, the set of parameters associated with an access control policy of the second operating system configuration;
storing, in response to receiving the request, a public key corresponding to the private key in a nonvolatile memory of the computing device; and
executing a trusted application during a pre-boot state of the computing device to:
validate that the public key stored is one for a valid operating system configuration,
receive, from a local interface to the computing device, a signal confirming the received request, move the public key to a protected memory when the signal confirms the request, and
execute a boot loader having access to the protected memory to authenticate the second operating system using the public key stored in the protected memory, and to boot the second operating system configuration in response to the authenticating.

US Pat. No. 10,482,258

METHOD FOR SECURING RUNTIME EXECUTION FLOW

NXP USA, INC., Austin, T...

1. A runtime security system, comprising:a shared core configured to execute processes having varying levels of trustworthiness configured to receive security services requests;
an execution monitor configured to monitor the execution of the shared core further comprising a timer, a policy table, and an execution monitor state machine; secure assets including cryptographic keys; and immutable security service functions configured to enable access to the secure assets in response to secure services requests, wherein the execution monitor is configured to:
detect that the shared core has received a secure boot request;
verify that the secure boot request is valid during a temporary window of access based upon a state of the execution monitor, a received command, and a requestor ID: and
allow the shared core to securely boot when the secure boot request is valid;
wherein the execution monitor is further configured to set the timer related to an expected reaction time of the shared core to the secure boot request.

US Pat. No. 10,482,253

CONFIGURING BASIC INPUT OUTPUT SYSTEM (BIOS) FEATURES BASED ON A POLICY

Dell Products L. P., Rou...

1. A method comprising:receiving, by one or more processors of a computing device, settings associated with one or more features of a basic input output system (BIOS) of the computing device;
receiving, by the one or more processors, a device identifier that uniquely identifies the computing device;
determining, by the one or more processors, a policy identifier that identifies a policy being implemented by the settings associated with the one or more features of the BIOS;
retrieving, by the one or more processors, a public key associated with an organization that acquired the computing device;
sending to a service, by the one or more processors, a request to validate the policy, the request including the policy identifier and the public key;
receiving, by the one or more processors, a response indicating that the policy is valid;
initiating, by the one or more processors, a reboot; and
modifying, by the one or more processors and during the reboot, the one or more features of the BIOS of the computing device based on the settings.

US Pat. No. 10,482,252

METHOD FOR PROTECTING THE CONFIDENTIALITY AND INTEGRITY OF FIRMWARE FOR AN INTERNET OF THINGS DEVICE

NXP B.V., Eindhoven (NL)...

1. A method for secure firmware provisioning of a device, the method comprising:manufacturing, by a first entity, an integrated circuit (IC) for use in the device;
providing the IC to a second entity for manufacturing the device using the IC, the IC having a unique identifier (UID) and secret key derivation data (KDD);
providing a secure memory to a third entity, the secure memory having a first key pair, the secure memory being used with a firmware provisioning toolchain of the second entity;
storing a device configuration parameter in the secure memory, the device configuration parameter arranged to be used for generation of a first shared secret for encrypting the firmware decryption key in the secure memory; and
storing the device configuration parameter in the IC, the device configuration parameter arranged to be used for generating a second shared secret for use in decrypting the firmware decryption key in the IC,
wherein during the manufacturing of the device by the second entity, the secure memory being enabled to verify the IC by verifying the UID, the secure memory being enabled to store a firmware decryption key, the secure memory being enabled to encrypt the firmware decryption key, the encrypted firmware decryption key being provided to the IC, and the IC enabled to decrypt the encrypted firmware decryption key for use by the IC in decrypting the firmware.

US Pat. No. 10,482,251

USING INTEGRITY REPORTS TO DETECT NETWORK INSTRUSION

Christopher Luis Hamlin, ...

1. A computer-implemented method for detecting intrusions in a network, comprising:collecting integrity reports from a plurality of devices in the network, wherein each device in the plurality of devices generates an integrity report by:
measuring a first set of execution parameter values during an execution of a portion of a software image at the device, wherein the first set of execution parameter values represents a first sequence of execution states that the device passes through while executing the portion of the software image;
comparing the first set of execution parameter values with a second set of execution parameter values associated with executing the portion of the software image at a secure instance of the device, wherein the second set of execution parameter values represents a second sequence of execution states that the secure instance of the device is expected to pass through while executing the portion of the software image; and
generating the integrity report based on said comparing; and
detecting, by using a computer, intrusions in the network based on the integrity reports.

US Pat. No. 10,482,250

USING A COMMON ACCOUNT TO BLOCK MALWARE ON MULTIPLE DEVICES

Symantec Corporation, Mo...

1. A method for preventing malware, the method being performed by one or more computing devices comprising at least one processor, the method comprising:identifying, by a first computing device, a malicious application running on the first computing device;
determining, by the first computing device, that the identified malicious application is installed on a second computing device based at least in part on the identifying;
generating a message indicating the identified malicious application and a selectable option to perform a security action comprising at least one of quarantining, blocking, or force stopping the identified malicious application;
transmitting, to the second computing device, the message indicating the Identified malicious application and the selectable option to perform the security action based at least in part on the first computing device and the second computing device sharing a common account associated with a malware detection application or an enterprise application store; and
performing, by the first computing device, a single operation comprising uninstalling the identified malicious application from the first computing device and the second computing device based at least in part on a global setting to enable removal of malicious applications from all connected devices, wherein uninstalling the identified malicious application from the second computing device is based at least in part on the message.

US Pat. No. 10,482,249

EXCLUDING STRESSED MACHINES FROM LOAD BALANCING OF DISTRIBUTED APPLICATIONS

NICIRA, INC., Palo Alto,...

1. For a particular end machine that executes on a particular host computer and executes a distributed application, along with a plurality of other end machines operating on at least two host computers including the particular host computer, a method for redirecting new network connection requests sent to the particular end machine, the method comprising:at a monitor executing on the particular host computer:
receiving at least one measurement data value for at least one particular resource consumed by a component of the distributed application executing on the particular end machine;
determining whether the measurement data value received for the particular resource has exceeded a threshold amount; and
when the measurement data value has exceeded the threshold amount, sending a notification message to a measurement monitoring module executing on the particular host computer to add the particular end machine to a stressed security group, members of which should not receive new network connection requests to the distributed application,
wherein the measurement monitoring module tags the particular end machine as a member of the stressed security group,
wherein a load balancer that balances new requests for connection to the distributed application between the plurality of end machines that implement the distributed application receives a notification message based on the tagging of the particular end machine as a member of the stressed security group, said notification message causing the load balancer not to send any new connection requests from remote clients to the particular end machine.

US Pat. No. 10,482,247

MITIGATION OF MALWARE

McAfee, LLC, Santa Clara...

1. At least one non-transitory, computer-readable medium including one or more instructions that, when executed by at least one processor, cause the at least one processor to perform a method comprising:determining a first checksum at a first region or area of a first file;
comparing the first checksum to a root in a checksum tree, the root indicating a checksum at a point of a second file or a fuzzy checksum at the point of the second file;
determining a second checksum at a second region or area of the first file offset from the first region or area of the first file, if the first checksum matches the root;
comparing the second checksum to a descendant node of the root in the checksum tree, the descendant node indicating a checksum or fuzzy checksum, wherein the checksum or fuzzy checksum indicated by the descendant node is offset from the point of the second file;
assigning a classification to the first file, if the second checksum matches the descendant node, wherein the classification indicates malware or a benign file; and
assigning a percentage to the classification.

US Pat. No. 10,482,246

BINARY SEARCH OF BYTE SEQUENCES USING INVERTED INDICES

CrowdStrike, Inc., Irvin...

1. A computer-implemented method comprising:for each byte sequence of a fixed length comprising a file, searching an inverted index which specifies byte sequences of the fixed length and, for each specified byte sequence, file identifiers of files that include the specified byte sequence, wherein each file identifier is associated with a security status;
based on results of the search, creating a list of candidate byte sequences, wherein the candidate byte sequences are only found in files with file identifiers that are associated with a malware status or an unknown status;
selecting ones of the candidate byte sequences that are associated with the greatest numbers of file identifiers; and
generating a signature from the selected ones of the candidate byte sequences.

US Pat. No. 10,482,244

SYSTEMS AND METHODS FOR EFFICIENTLY MATCHING FILES

Symantec Corporation, Mo...

1. A computer-implemented method for efficiently matching files, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:analyzing a file to identify a set of functions within the file and relationships between functions within the set of functions;
creating a set of representations for the set of functions by, for each function within the set of functions;
combining a representation of a size of the function with a representation of a size of each function identified, when analyzing the file, as having a relationship to the function; and
combining a representation of a total number of instructions within a given function with a representation of the total number of instructions within each function identified as having the relationship to the given function;
comparing a subset of the set of representations of the set of functions with a subset of a set of representations of an additional set of functions identified within an additional file; and
determining, based on comparing the subset of the set of representations of the set of functions with the subset of the set of representations of the additional set of functions identified within the additional file, that the file matches the additional file.

US Pat. No. 10,482,242

SYSTEM AND METHOD FOR PERFORMING EVENT INQUIRIES IN A NETWORK

TANIUM INC., Emeryville,...

1. A method of monitoring a network comprising a collection of machines that forms a linear communication orbit, the method comprising:at a respective machine in the linear communication orbit:
receiving from a respective server, external to the linear communication orbit, an instruction packet via the linear communication orbit, wherein the instruction packet has been propagated to the respective machine through one or more upstream machines of the respective machine along the linear communication orbit, and wherein the instruction packet includes an instruction for establishing a direct duplex connection between the respective machine and the respective server;
in response to receiving the instruction packet through the linear communication orbit, sending an outbound connection request to the respective server to establish the direct duplex connection between the respective machine and the respective server in accordance with a respective network connection protocol; and
uploading local data to the respective server through the direct duplex connection, wherein the respective server is configured to perform analysis on the local data received from the respective machine through the direct duplex connection.

US Pat. No. 10,482,241

VISUALIZATION OF DATA DISTRIBUTED IN MULTIPLE DIMENSIONS

SAP SE, Walldorf (DE)

1. A computer-implemented method, comprising:defining a filter path associated with a set of selected log data, wherein the filter path is user-selected and specifies a series of one or more filters used to generate a particular subset of the log data associated with the filter path;
receiving an indication on a graphical user interface (GUI) to generate a bubblegram associated with the filter path, wherein the bubblegram comprises one or more bubbles, each bubble representing a particular dimension associated with the filter path, and the one or more bubbles are distributed using a distribution value;
rendering the one or more bubbles on the GUI according to a performed ranking of the one or more bubbles, wherein higher ranking bubbles are displayed closer to a middle of the bubblegram than lower ranking bubbles;
receiving a user input comprising a selection of a bubble indicating a filter to be added to the filter path based on a dimension of the bubble, the filter defining a narrowed set of the selected log data; and
rendering a subsequent bubblegram based on the narrowed set of the selected log data.

US Pat. No. 10,482,239

RENDERING AN OBJECT USING MULIPLE VERSIONS OF AN APPLICATION IN A SINGLE PROCESS FOR DYNAMIC MALWARE ANALYSIS

Palo Alto Networks, Inc.,...

1. A system, comprising:a processor configured to:
receive a sample at a cloud security service for detonating in an instrumented virtual machine environment wherein the sample includes an embedded object;
modify the instrumented virtual machine environment to support execution of a plurality of versions of an application, wherein modifying the instrumented virtual machine environment to support execution of the plurality of versions of the application comprises one or more of the following to facilitate co-rendering of the embedded object using the plurality of versions of the application:
hot patch a baseline virtual machine image to add a new class identifier (ID) and a type for each of the plurality of versions of the application in a registry; and
modify a physical executable file for each of the plurality of versions of the application;
detonate the sample using a browser executed in the instrumented virtual machine environment; and
render the embedded object included in the sample using the plurality of versions of the application in a single process for executing the browser during a dynamic malware analysis using the instrumented virtual machine environment, wherein the application is an external application that is called by the browser to render the embedded object included in the sample; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,482,233

DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT

RICOH COMPANY, LTD., Tok...

1. A device configured to perform plural predetermined functions, the device comprising:a main body including a first processor configured to execute one or more first programs of instructions to:
provide a predetermined function to be performed, amongst the plural predetermined functions;
generate authentication information to be used for user authentication, and register, in a first storage device, the generated authentication information to be used for user authentication; and
provide the predetermined function amongst the plural predetermined functions when a user authentication result indicating that a specified user is an authorized user is obtained; and
an operating body including a second processor configured to execute one or more second programs of instructions to:
acquire, from the first storage device before performance of a user authentication process, the authentication information registered in the first storage device;
register, in a second storage device, the acquired authentication information;
generate first priority user information and register the first priority user information in the second storage device, the first priority user information including, amongst the acquired authentication information, specified authentication information corresponding to a specified user amongst recently-authenticated users each having been recently authenticated as an authorized user, the specified authentication information for each user in the first priority user information including corresponding user authentication time information;
install, in the second storage device, a program that becomes usable by the user upon authentication of the user as an authorized user;
generate second priority user information separately from the first priority user information and register the second priority user information in the second storage device, the second priority user information specifying recently-authenticated users each having been recently authenticated as an authorized user of the installed program;
acquire input information that is input in the user authentication process; and
perform the user authentication process, including collating the input information with the first priority user information or the second priority user information registered in the second storage device, to obtain a user authentication result of the user authentication process, and when the input information is collated with the first priority user information, notifying the main body of the user authentication result, and when the input information is collated with the second priority user information and the user authentication result indicates that the specified user is an authorized user, providing the program installed in the second storage device, to be used by the authorized user,
wherein the operating body is further configured to disable, while the program is installed, the first priority user information and enable the second priority user information.

US Pat. No. 10,482,232

ROBOTIC PROCESS AUTOMATION USING CONTROLLER EXECUTION MODEL

Bank of America Corporati...

1. A system for implementing robotic process automation using a controller execution model, the system comprising:at least one non-transitory memory device with computer-readable code stored thereon;
at least one processing device; and
at least one module stored in said memory device and comprising instruction code that is executable by the at least one processing device and configured to cause said at least one processing device to:
receive electronically, from a user computing device, a request to establish a communication link with a hosted virtual desktop (HVD) bot;
determine a controller hosted virtual desktop (CHVD) hub associated with the HVD bot, wherein the CHVD hub comprises one or more HVD bots connected to the CHVD hub in a hub-and-spoke configuration, wherein the HVD bot is accessible only via the CHVD hub;
receive one or more authentication credentials associated with the CHVD from an encrypted credential repository;
validate the one or more authentication credentials associated with the CHVD, wherein validating further comprises authorizing the user computing device to access to the CHVD hub;
establish a communication link between the user computing device and the HVD bot, via the CHVD;
receive electronically, from the user computing device, a request to access a first HVD bot via the CHVD hub;
establish a first communication link between the first HVD bot and the user computing device;
receive electronically, from the user computing device, a request to access a second HVD bot via the CHVD hub;
establish a second communication link between the second HVD bot and the user computing device, wherein establishing the second communication link further comprises severing the first communication link with the first HVD bot and establishing the second communication link with the second HVD bot.

US Pat. No. 10,482,231

CONTEXT-BASED ACCESS CONTROLS

Amazon Technologies, Inc....

1. A computer-implemented method comprising:obtaining, from a service, information about a context of user actions to be performed as a result of a pending request made to the service by a requester authenticated with the service being fulfilled;
as a result of determining that a context validation plugin is usable to evaluate the information about the context of user actions, causing the context validation plugin to determine validity of the information about the context of user actions;
acquiring, from the context validation plugin, an indication as to whether the request is allowable based at least in part on a set of context-based rules associated with the context validation plugin and the validity of the information about the context of user actions, the context-based rules including one or more constraints on user actions based at least in part on a context of user actions associated with a request;
determining that the request is allowable based at least in part on the indication; and
providing, to the service, an indication that the set of context-based rules allows fulfillment of the request.