US Pat. No. 10,248,851

COLLECTION OF MACHINE LEARNING TRAINING DATA FOR EXPRESSION RECOGNITION

Emotient, Inc., La Jolla...

1. A computer-implemented method comprising:receiving, responsive to one or more requests for one or more images depicting a specific affective state, image data corresponding to at least one image from one or more first devices, wherein the affective state is one of anger, contempt, disgust, fear, happiness, sadness, and surprise;
receiving, from one or more second devices, one or more selections corresponding to the image data;
determining one or more ratings relating to the image data, each of the one or more ratings corresponding to at least one selection from amongst the one or more received selections;
testing a machine learning classifier by:
presenting, based at least in part on the one or more ratings, the image data to the machine learning classifier;
receiving, from the machine learning classifier, a classification corresponding to the image data; and
detecting whether the classification corresponds to the specific affective state; and
providing, responsive to the detection, training data to the machine learning classifier.

US Pat. No. 10,248,850

GENERATING ACTIONS BASED ON A USER'S MOOD

IMMERSION CORPORATION, S...

1. A method of operating an electronic device, the method comprising:determining a mood of a first user associated with a first electronic device based on a physical attribute of the first user, wherein the physical attribute comprises an input pressure applied by the first user to the first electronic device, and wherein said determining a mood of the first user includes determining a deviation of the input pressure from a normal input in an input profile;
determining an action to be performed by the first electronic device based on the determined mood;
initiating the determined action, wherein the initiating of the determined action comprises transmitting an object that corresponds to the determined mood to a second electronic device, and wherein the object includes a haptic effect that reflects the determined mood; and
modulating the determined action to be generated for a second user associated with the second electronic device based on mood information of the second user detected prior to the transmitting of the object to the second electronic device,
wherein the modulating of the determined action is performed by a processor of the first electronic device.

US Pat. No. 10,248,843

IMAGE PROCESSING APPARATUS AND METHOD FOR REMOVING A FACIAL OBJECT

Omron Corporation, Kyoto...

5. An image processing method performed by an image processing apparatus that performs correction for removing an object from a face image, which is an image including a face of a person, the image processing method comprising the steps of:acquiring the face image;
determining a representative pixel value, which is a pixel value representing a skin region, on the basis of pixels included in the face image;
generating a first region, which is a region including the object;
determining correction pixels, which are one or more pixels used for the correction, out of a plurality of pixels present in a vicinity of the first region, on the basis of similarity to the representative pixel value, wherein the correction pixels include a plurality of pairs of a first correction pixel and second correction pixel opposed to each other across the first region, each of the first and second correction pixel being specified by performing scanning a predetermined distance toward an outer side from a pixel present on a boundary line of the first region and specifying a pixel having a luminance component closest to a luminance component of the representative pixel value;
generating a partial image, which is a collection of pixels for replacing pixels corresponding to the object, using the correction pixels; and
performing correction by combining the partial image with the face image,
wherein the generating of the partial image further includes generating, for each of the pairs, a pixel row for connecting the first correction pixel and the second correction pixel to generate a partial image in which the first region is interpolated, and
wherein the color of the pixels included in the pixel row changes stepwise from a color of the first correction pixel to a color of the second correction pixel.

US Pat. No. 10,248,840

METHOD AND SYSTEM FOR AUTOMATICALLY TRACKING FACE POSITION AND RECOGNIZING FACE

FIVEGT CO., LTD, Seoul (...

1. A system for automatically tracking a face position and recognizing a face, comprising:a capturing unit configured to capture a face image of a user;
a face region detection unit configured to detect a face region from the face image, and to output position information of the detected face region;
a displacement calculation unit configured to measure a displacement of the capturing unit based on the face region position information, such that the face region captured by the capturing unit is moved to a face authentication region;
a driving unit configured to move the capturing unit based on the displacement; and
a face recognition unit configured to execute face recognition by comparing a current authentication image input from the face region detection unit, with a plurality of registered face images pre-stored in a database,
wherein the face recognition unit executes face recognition by storing the plurality of registered face images with matching frequencies indicating the number of times that the plurality of registered face images have been matched with an authentication image input of a prior face recognition process, and by sequentially comparing the current authentication image with the registered face images having large matching frequencies when the current authentication image is input from the face region detection unit,
wherein the plurality of face images pre-stored in the database are classified into a plurality of groups in order of large matching frequency,
wherein the face recognition unit firstly compares the current authentication image with users' registered face images which belong to a group having a largest matching frequency, and then compares the current authentication image with users' registered face images which belong to a group having a next largest matching frequency, and
wherein the face recognition unit replaces a registered face image having a smallest matching frequency, among the plurality of registered face images, by the current authentication image, at a predetermined time period.

US Pat. No. 10,248,838

METHOD AND DEVICE FOR SINGLE MOLECULE IMAGING

THE REGENTS OF THE UNIVER...

1. A device for imaging fluorescently labeled nucleic acid molecules in a sample comprising:a mobile phone having a camera therein;
a modular attachment device configured to mount to the mobile phone and position a fluorescently labeled nucleic acid sample contained therein within a field of view of the camera, the modular attachment device comprising:
an excitation light source;
a sample holder configured to hold the sample containing the fluorescently labeled nucleic acid compressed between two optically transparent substrates, wherein fluorescently labeled nucleic acid molecules are stretched or extended in response to a compression force applied to the two optically transparent substrates;
a lens or set of lenses for magnifying the image of the sample;
a filter interposed between the lens and the camera of the mobile phone and configured to reject scattered background light from the excitation light source and transmit fluorescent light through the filter;
a moveable stage for moving the excitation light source and sample holder relative to the camera of the mobile phone; and
wherein the mobile phone comprises software executed thereon to identify molecules of fluorescently labeled nucleic acid in the sample along with their respective lengths or lengths of sub-regions of the nucleic acid molecules.

US Pat. No. 10,248,837

MULTI-RESOLUTION FINGERPRINT SENSOR

Synaptics Incorporated, ...

1. A method of processing an image obtained with a biometric sensor having a sensing region, the method comprising:acquiring with the biometric sensor an image of an input object in the sensing region, the image having a first resolution;
providing the image for first image processing to determine whether the input object is a legitimate biometric object;
adjusting the image to a second resolution lower than the first resolution to produce a reduced-resolution image; and
providing the reduced-resolution image for second image processing to validate the biometric object.

US Pat. No. 10,248,831

FLAT-PANEL DISPLAY EMBEDDED WITH A FINGERPRINT SENSOR AND A METHOD OF FORMING THE SAME

Himax Technologies Limite...

1. A flat-panel display embedded with a fingerprint sensor, comprising:a substrate;
a photo sensor formed on a bottom surface of the substrate;
a lens region disposed above and substantially aligned with the photo sensor vertically; and
a light barrier substantially aligned with the photo sensor vertically and disposed between the photo sensor and the lens region;
wherein a liquid crystal layer for constructing a liquid crystal display or an encapsulation layer for constructing a light-emitting diode display is disposed above the light barrier, the lens region vertically passing through the liquid crystal layer or the encapsulation layer; wherein a first dielectric layer formed on a top surface of the substrate, wherein the light barrier is formed on the first dielectric layer, wherein the light barrier comprises: a polysilicon layer; a first metal layer formed above the polysilicon layer; and a second metal layer formed on the first metal layer; wherein the polysilicon layer, the first metal layer and the second metal layer surround a passage; wherein a light beam representing a fingerprint passes the lens region and the passage, and is then detected by the photo sensor.

US Pat. No. 10,248,829

FINGERPRINT DETECTION CIRCUIT AND METHOD, ELECTRONIC DEVICE

BYD COMPANY LIMITED, She...

19. A fingerprint detection method, comprising:applying an excitation signal to a finger so as to generate ridge capacitors and valley capacitors;
generating a first voltage or a second voltage by a collecting unit according to a regulation voltage, a capacitance value of one of the ridge capacitors and a capacitance value of one of the valley capacitors;
amplifying the first voltage and the second voltage with a predetermined factor by a processing module;
calculating a difference between an amplified first voltage and an amplified second voltage by the processing module;
determining whether the difference is greater than or equal to a predetermined threshold by the processing module;
when the difference is greater than or equal to the predetermined threshold, calculating the capacitance value of one of the ridge capacitors according to the first voltage and calculating the capacitance value of one of the valley capacitors according to the second voltage by the processing module; and
when the difference is less than the predetermined threshold, adjusting an excitation voltage of the excitation signal according to the predetermined threshold and the difference by the processing module, wherein the excitation voltage is a voltage magnitude of the excitation signal.

US Pat. No. 10,248,824

ENCODING INFORMATION IN PHYSICAL PROPERTIES OF AN OBJECT

1. A method comprising:obtaining a representation of a three dimensional object having physical properties;
obtaining information to encode within the three dimensional object when produced;
modifying the physical properties to determine modified physical properties, wherein said modifying comprises encoding the information within the physical properties; and
producing a tangible product, wherein the tangible product is the three dimensional object having the modified physical properties, whereby the tangible product encodes within its physical properties the information, whereby the information is decodable from the tangible product.

US Pat. No. 10,248,811

METHODS AND APPARATUS TO ASSIGN DEMOGRAPHIC INFORMATION TO PANELISTS

The Neilson Company (US),...

1. An apparatus comprising:a decoy generator to generate decoy database proprietor identifiers to protect privacies of members of panelist households corresponding to panelist database proprietor identifiers, the decoy database proprietor identifiers to be determined by the decoy generator based on a probability density function so that a quantity of the decoy database proprietor identifiers is less than would be used if the decoy database proprietor identifiers were selected by a random selection process;
a query handler to query, via a network, a server at a database proprietor using the panelist database proprietor identifiers and the decoy database proprietor identifiers, to obtain demographic information; and
a panelist comparator to assign the panelist database proprietor identifiers to panelists in the panelist households based on the demographic information obtained from the server at the database proprietor.

US Pat. No. 10,248,810

AUTOMATIC SQL QUERY MODIFICATION FOR DATA RESTRICTION

Pearson Education, Inc., ...

1. A method for managing access to information via a modification of a request for information, the method comprising:receiving, by a network interface of a server comprising a special purpose hardware computing device coupled to a network and including at least one processor executing instructions in a memory coupled to the at least one processor, from a graphical user interface (GUI) on a user device coupled to the network a transmission of:
an authentication user input from a user operating the user device: and
a query from the user device, wherein the query comprises a character string arranged according to a programming language;
responsive to an authentication of the user using the authentication user input, automatically identifying, by the server, a character string parsed from the query and matching the name of a first table;
automatically executing, by the server, at least one database command:
selecting, from a database coupled to the network:
a user categorization data defining an access rule corresponding to a user attribute data associated in the database with the user authenticated by the authentication user input and the user device that identifies a limitation of accessibility of a data in the first table and the data accessible by the user: and
predicate, stored within a second table referenced in association with the first table, and associated with the access rule, the predicate comprising a pre-created text string insertable into the query to limit the accessibility of data of the first table identified in the query;
automatically editing, by the server, the scope of the query by inserting the predicate into the character string;
retrieving a second predicate associated with the first table;
inserting the second predicate into the character string of the query;
using the edited query with the predicate to access the data in the first table according to the limitation of accessibility of data corresponding to the access rule; and
transmitting, by the server, the data through the network for display on the GUI.

US Pat. No. 10,248,809

SYSTEM AND METHOD FOR AUTOMATICALLY SECURING SENSITIVE DATA IN PUBLIC CLOUD USING A SERVERLESS ARCHITECTURE

Capital One Services, LLC...

1. A system comprising a cloud compute service for executing jobs immediately upon receipt of a notification, the cloud compute service comprising:one or more hardware processors; and
a memory unit storing instructions executable by the one or more hardware processors to perform operations comprising:
receiving, at the cloud compute service, a first notification that a first sensitive file comprising sensitive data has been received at a file receipt location, the first sensitive file being sent by a client device;
selecting, by the cloud compute service, a warm container instance for completing a first job comprising stripping the sensitive data from the first sensitive file;
assigning, by the cloud compute service, the first job to the warm container instance;
retrieving, by the warm container instance, the first sensitive file from the file receipt location;
generating, by the warm container instance, a first stripped file by stripping the sensitive data from the first sensitive file based on a configuration file;
transmitting, by the warm container instance, the first stripped file to a storage location;
deleting the first sensitive file from the file receipt location; and
terminating the warm container instance, wherein
terminating the container instance comprises deleting files comprising sensitive data.

US Pat. No. 10,248,808

FILE SHARING AND POLICY CONTROL BASED ON FILE LINK MECHANISM

International Business Ma...

1. A machine-implemented method for accessing a file, the method comprising:creating, by a computing device, a plurality of links to a file, each of the plurality of links being for use by a respective user of a plurality of users to access the file, and each of the plurality of links being a respective data structure on a file system, the respective data structure including information about the file and failing to include a content of the file;
encrypting, by the computing device, the content of the file by using a common key;
encrypting, by the computing device, the common key using a respective public key of each respective user to produce a respective encrypted common key for the each respective user;
registering, by the computing device, the respective encrypted common key for the each respective user in a respective link of the plurality of links;
setting, by the computing device, respective access rights regarding the file for the each respective user;
registering, by the computing device, the respective access rights for the each respective user in the respective link of the plurality of links; and
permitting or denying access to the content of the file for the each respective user based on information stored in the respective link of the plurality of links, wherein
the information about the file includes access rights for accessing the file by a respective user, key information for obtaining the common key encrypted with the public key of the respective user, key management information for accessing information managed by a key management service, and at least one block for accessing the content of the file encrypted by using the common key, each of the at least one block is one of a direct block for directly accessing the encrypted content of the file, an indirect block for accessing a direct block for directly accessing the encrypted content of the file, a double indirect block for accessing an indirect block for accessing a direct block for directly accessing the encrypted content of the file, and a triple indirect block for accessing a double indirect block for accessing an indirect block for accessing a direct block for directly accessing the encrypted content of the file.

US Pat. No. 10,248,807

ENHANCED PERMISSION ALLOCATION IN A COMPUTING ENVIRONMENT

CONJUR, INC., Waltham, M...

1. A method of operating a control service for cloud-based applications in a virtualized computing environment, the method comprising:obtaining an error report for a cloud-based application operating within the virtualized computing environment, wherein the error report comprises application identifying data and error identifying data, and wherein an error indicated in the error report is caused by a malware issue;
identifying a permission change for the cloud-based application based on the error report, wherein the identified permission change defines one or more rights to access or control one or more resources in the virtualized computing environment and the identified permission change may permit managing network connections for the cloud-based application and wherein the identified permission change is identified to facilitate a response based on the error report; and
allocating the identified permission change to the at least one new or existing member of the virtualized computing environment.

US Pat. No. 10,248,806

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, CONTENT MANAGEMENT SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An information processing apparatus comprising:one or more processors; and
a memory having stored thereon instructions which, when executed by the one or more processors, cause the information processing apparatus to function as:
a management unit configured to manage authorities, each of which is set to each of one or more keywords which are associated with each of a plurality of contents, wherein each of the authorities allows a corresponding group of users to receive provision of content associated with the one or more keywords;
an obtainment unit configured to obtain user identification information of a user and a keyword input by the user; and
a control unit configured to exclude, from one or more contents to be displayed on a predetermined display as a result of a search of content associated with the keyword obtained by the obtainment unit from the plurality of contents, any content whose provision to a user indicated in the user identification information obtained by the obtainment unit is restricted by an authority set to the keyword obtained by the obtainment unit, wherein
in a case where the keyword obtained by the obtainment unit is a first keyword and the user indicated in the user identification information obtained by the obtainment unit is not given an authority for receiving provision of a first content set to the first keyword, the control unit excludes the first content from content displayed on the predetermined display as results of a search of content associated with the first keyword,
in a case where the keyword obtained by the obtainment unit is a second keyword and the user indicated in the user identification information obtained by the obtainment unit is given an authority for receiving provision of a second content set to the second keyword, where the second content is different from the first content set to the first keyword, the control unit displays, on the predetermined display, one or more contents including the second content as results of a search of content associated with the second keyword,
each of the plurality of contents is an image, and
the first keyword, to which the authority which cannot provide any content to a part or users is set, represents a position with respect to the image.

US Pat. No. 10,248,805

DATABASE SECURITY TOOL

Bank of America Corporati...

1. A database security tool comprising:a user interface configured to receive a request from a user to add a row to a table in a database;
a retrieval engine configured to retrieve, in response to the request, an authorization table from the database, the authorization table separate from the table, the authorization table indicating a plurality of users who are authorized to edit the table;
an authorization engine configured to determine whether the plurality of users includes the user;
an alert engine configured to communicate an alert in response to a determination that the plurality of users does not include the user, the alert indicating that the user is not authorized to add the row to the table;
an update engine configured to communicate, to the database, an update request in response to a determination that the plurality of users includes the user, wherein the row is added to the table in response to the update request;
a data integrity engine configured to determine, for each column of the table, at least one value based on a retrieved datatype of the column, wherein the retrieval engine is further configured to retrieve the datatype for each column; and
a logging engine configured to:
receive an indication that the request was received;
add an entry to a log indicating that the request was received;
receive an indication that the plurality of users includes the user;
add an entry to the log indicating that the addition of the row to the table was authorized;
receive an indication that the row was added to the table; and
add an entry to the log indicating that the row was added to the table.

US Pat. No. 10,248,801

SYSTEMS AND METHODS FOR ROLE-BASED FILE ACCESS CONTROL

AMERICAN EXPRESS TRAVEL R...

1. A method comprising:writing, by a data storage system, a file to a storage media,
wherein the file contains data, an embedded flag, and an embedded verification datum of the embedded flag,
wherein the embedded flag indicates an access permission requisite for file access;
receiving, by the data storage system, a request to access the file from a user;
retrieving, by the data storage system, the access permission for the user;
comparing, by the data storage system, the embedded flag to the access permission for the user to determine the user has permission to access the file;
calculating, by the data storage system, a verification datum; and
comparing, by the data storage system, the calculated verification datum to the embedded verification datum to determine the embedded flag has not changed.

US Pat. No. 10,248,799

DISCOURAGING SCREEN CAPTURE

Wickr Inc., San Francisc...

1. A system for discouraging screen capture, the system comprising:a processor configured to:
provide a first designated region of a display to a user to allow the user to view a first file;
detect a first location of a first finger of the user in the first designated region of the display;
display the first file when the first finger is held at the first location in the first designated region of the display;
detect a second location of the first finger;
determine whether the second location is located within the first designated region of the display by determining whether a distance between the first location and the second location is greater than a predetermined threshold;
indicate an attempted screen capture by the user when the distance is greater than the predetermined threshold; and
cease displaying the first file in response to the indication of the attempted screen capture by the user and a determination that the second location is outside the first designated region of the display; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,248,798

METHOD AND SYSTEM FOR A CONFIDENTIAL SCAN OF A DOCUMENT

Toshiba Tec Kabushiki Kai...

1. A method for confidential scanning of a document in a scanner device, comprising:receiving, by a confidential scan system, a request from a user for a confidential scan of a document through a scanner associated with the confidential scan system;
receiving, by the confidential scan system, first credential data from the user;
authenticating, by the confidential scan system, the user based on the first credential data;
storing, by the confidential scan system, the document as a hidden document which is a confidential scanned document in a predefined path, upon the authentication;
permitting the user to view the confidential scanned document by:
(i) receiving, by the confidential scan system, second credential data from the user;
(ii) receiving, by the confidential scan system, a request from the user to view the confidential scanned document;
(iii) verifying, by the confidential scan system, the second credential data to be the same as the first credential data upon receiving the request; and
(iv) enabling, by the confidential scan system, the user to view the confidential scanned document upon verification when the confidential scanned document is retrieved from the predefined path for viewing; and
providing, by the confidential scan system, access to the user to perform one or more tasks relating to the confidential scanned document upon the verification, wherein the one or more tasks relating to the confidential scanned document include at least one of modifying, deleting, printing, copying, cutting, pasting, or publishing the confidential scanned document,
wherein the publishing of the confidential scanned document comprises disabling hiding of the confidential scanned document in the predefined path.

US Pat. No. 10,248,797

SYSTEMS AND METHODS FOR ZERO-DAY DLP PROTECTION HAVING ENHANCED FILE UPLOAD PROCESSING

SYMANTEC CORPORATION, Mo...

14. A non-transitory computer-readable medium including code for performing a method, the method comprising:capturing file upload context for a scheduled file or folder upload, wherein
capturing the file upload context comprises:
detecting an associated operation for the scheduled file or folder upload, including whether the scheduled file or folder upload corresponds to a single file upload, multi-file upload, folder upload, or a drag-and-drop operation, and wherein detecting the associated operation comprises:
intercepting a shell dialogue Application Programming Interface (API) to detect the single file upload and multi-file upload;
intercepting a browse folder API to detect the folder upload;
intercepting a drop process interface exposed by browser during an instance creation to detect the drag-and-drop operation;
detecting a match between the scheduled file or folder upload and data associated with the shell dialogue API, the browse folder API, and the drop process interface;
extracting metadata, and active Uniform Resource Locator (URL) associated with the scheduled file or folder upload; and
caching folder name, metadata, and active URL to form the file upload context wherein the folder name is cached in a global structure;
sending the file upload context to a DLP filesystem driver;
generating a file upload cache including the file upload context, prior classification entries, and a timestamp indicating when the scheduled file or folder upload was last modified;
intercepting a file open call by the DLP filesystem driver; and
processing the file open call based upon the file upload cache.

US Pat. No. 10,248,796

ENSURING COMPLIANCE REGULATIONS IN SYSTEMS WITH DYNAMIC ACCESS CONTROL

SAP SE, Walldorf (DE)

1. A computer-implemented method for enforcing dynamic access control constraints of a plurality of access control policies, the method being executed using one or more processors and comprising:receiving, by the one or more processors, a set of ordered policies that are ordered according to a policy lattice defining a hierarchy from most restrictive policies to least restrictive policies, the policy lattice combining an access control algorithm, a deny cache storing previously denied requests, and a permit cache storing previous access control requests, the policy lattice enabling access control overriding for a first portion of policies that are controlled in a fine-grained manner and providing an explicit access control specification for a second portion of policies that are enforceable at any time;
determining, by the one or more processors, a set of active policies comprising one or more policies in the set of ordered policies, the set of active policies being used in evaluating an access control request during a particular time period;
determining, by the one or more processors, an access control decision based on at least a first policy in the set of active policies, the access control decision being based on operations comprising:
determining whether one of a permit decision and a deny decision is inherited from a second policy in the set of ordered policies that extends from the first policy in the set of active policies based on the policy lattice, the permit decision being inherited if the second policy is active and the deny decision being inherited regardless whether the second policy is active, and
in response to determining that the permit decision and the deny decision are not inherited from the second policy, evaluating the first policy in the set of active policies based on the policy lattice; and
transmitting, by the one or more processors, the access control decision for enforcement of the access control policy.

US Pat. No. 10,248,793

TECHNIQUES AND SYSTEMS FOR DURABLE ENCRYPTION AND DELETION IN DATA STORAGE SYSTEMS

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:in response to receiving a data storage request for data to be stored in a plurality of volumes of durable storage of a data storage system, storing the data by at least:
encrypting the data using an encryption key provided by a key management service to produce encrypted data;
and, redundancy coding, using a redundancy code, at least the encrypted data to generate a bundle of bundle-encoded shards, a quorum quantity of which is sufficient to reconstruct original data associated with the bundle, the bundle of bundle-encoded shards including at least:
an identity shard that contains an original form of the encrypted data, and
encoded shards representing a redundancy coded form of the encrypted data;
and in response to receiving a deletion request to delete the data, rendering the data storage system incapable of producing the data using the identity shards by discarding the encryption key,wherein other data associated with the bundle is recoverable using the identity shard.

US Pat. No. 10,248,791

TECHNOLOGIES FOR SECURE HARDWARE AND SOFTWARE ATTESTATION FOR TRUSTED I/O

Intel Corporation, Santa...

1. A computing device for trusted I/O attestation and verification, the computing device comprising:a hardware processor;
an in-field programmable fuse;
a hardware attestation module, executed by the hardware processor, to (i) collect hardware attestation information associated with one or more statically attached hardware I/O components of the computing device, wherein the hardware I/O components are associated with a trusted I/O usage protected with a cryptographic engine of the computing device, wherein to collect the hardware attestation information comprises to read a platform manifest of the computing device, wherein the platform manifest is indicative of the statically attached hardware I/O components, and (ii) verify the hardware attestation information, wherein to verify the hardware attestation information comprises to verify, by a trusted software component of the computing device, a cryptographic signature of the platform manifest;
a secure enumeration module, executed by the hardware processor, to (i) securely enumerate one or more dynamically attached hardware I/O components of the computing device in response to verification of the hardware attestation information, and (ii) load one or more trusted software components in response to secure enumeration of the one or more dynamically attached hardware I/O components; and
a software attestation module, executed by the hardware processor, to (i) collect software attestation information associated with the trusted software components in response to loading of the trusted software components, wherein the software attestation information is indicative of identity and topology of the trusted software components, and (ii) verify the software attestation information;
wherein to verify the hardware attestation information further comprises to: (i) read, by a trusted system computing agent of the computing device, a platform model identifier from the in-field programmable fuse; (ii) securely transmit, by the trusted system computing agent, the platform model identifier to the trusted software component; and compare, by the trusted software component, the platform model identifier to a second platform model identifier of the platform manifest in response to verification of the cryptographic signature of the platform manifest.

US Pat. No. 10,248,790

INFORMATION PROCESSING SYSTEM, CONTROLLING METHOD, AND CONTROLLING COMPUTER PROGRAM

NIPPON TELEGRAPH AND TELE...

1. An information processing system including a first information processing apparatus that analyzes behavior of malware started up and a second information processing apparatus that transfers received transmission information transmitted from the first information processing apparatus, whereinthe first information processing apparatus comprises:
a memory that stores pieces of data and pieces of tag information assigned to the pieces of data, so as to be kept in correspondence with one another; and
processing circuitry configured to, when the malware transmits data, generate the transmission information containing the transmitted data and tag information assigned to the transmitted data and further transmits the generated transmission information to the second information processing apparatus, and
the second information processing apparatus comprises:
processing circuitry configured to
extract the tag information from the received transmission information; and
determine a transfer destination of the transmission information on a basis of the extracted tag information and further transfers the transmission information to the determined transfer destination,
wherein
the second information processing apparatus further stores tag type information that keeps each of the pieces of tag information in correspondence with a piece of information indicating whether or not a piece of data, to which the piece of tag information is assigned, is permitted to be transferred to an external apparatus, and
the processing circuitry of the second information processing apparatus determines the transfer destination of the transmission information by selecting one from between a simulating Internet network and a real Internet network, by referring to the tag type information.

US Pat. No. 10,248,788

DETECTING HARMFUL APPLICATIONS PRIOR TO INSTALLATION ON A USER DEVICE

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for detecting harmful applications prior to installation on a user device, the method comprising:analyzing, by a processing device, a plurality of reviews for a first version of an application and a second version of the application to associate a first subset of the plurality of reviews with the first version of the application based at least in part on a timestamp of the first version of the application and to associate a second subset of the plurality of reviews with the second version of the application based at least in part on a timestamp of the second version of the application;
determining, by the processing device, whether the first version of the application is harmful based on the first subset of the plurality of reviews;
determining, by the processing device, whether the second version of the application is harmful based on the second subset of the plurality of reviews;
responsive to determining that the first version of the application is harmful based on the first subset of the plurality of reviews, preventing a user from installing the first version of the application; and
responsive to determining that the second version of the application is harmful based on the second subset of the plurality of reviews, preventing the user from installing the second version of the application.

US Pat. No. 10,248,787

SYSTEMS AND METHODS FOR DETERMINING REPUTATIONS OF FILES

Symantec Corporation, Mo...

1. A computer-implemented method for determining reputations of files, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:identifying, on an endpoint device, a loadpoint data entry created by a file installed on the endpoint device that directs an operating system of the endpoint device to execute the file during boot up operations of the endpoint device;
determining a reputation of the loadpoint data entry created by the file installed on the endpoint device that indicates a reputation of the file installed on the endpoint device;
detecting, on an additional endpoint device, an attempt to install a suspicious file with a loadpoint data entry at least partially similar to the loadpoint data entry of the file installed on the endpoint device;
determining a reputation of the suspicious file based on the reputation of the loadpoint data entry of the file installed on the endpoint device; and
protecting the additional endpoint device from security threats by performing a security action on the suspicious file based on the reputation of the suspicious file.

US Pat. No. 10,248,786

PLATFORM SECURITY USING PROCESSOR ASSISTS

Intel Corporation, Santa...

1. A platform comprising:a platform resource;
a host processor to execute an operating system (OS) and a guest kernel associated with the OS;
a resource monitor to detect an attempt by the OS to access the platform resource; and
an extension component communicatively coupled to the resource monitor, the extension component to inject, in response to the attempt, an access event into a platform security component, wherein the guest kernel is to respond to the attempt in accordance with a policy response from the platform security component,
wherein the attempt is to be detected with respect to one or more of an extended page table (EPT) permission or a virtual machine exit control set by a security virtual machine monitor (SVMM).

US Pat. No. 10,248,785

APPLICATION MEMORY PROTECTION USING A HOST PAGE TABLE SWITCHING VIRTUAL MACHINE FUNCTION

1. A system comprising:a memory;
one or more processors, in communication with the memory;
a virtual machine, including a guest operating system (OS), executing on the one or more processors; and
a hypervisor executing on the one or more processors,
wherein the one or more processors are configured to:
generate, by the hypervisor, a first page view and a second page view, wherein a guest physical address of the virtual machine points to a first page of the first page view, which is protected, and a second page of the second page view, which is unprotected;
write a first pointer value to the first page of the first page view and a second pointer value to the second page of the second page view;
execute, by the guest OS, a first task;
determine, by the guest OS, whether to switch to a second task;
responsive to a determination to switch from the first task to the second task, read, by the guest OS, a current pointer value pointed to by a guest physical address, wherein the current pointer value is one of the first pointer value and the second pointer value;
responsive to reading the current pointer value, determine, by the guest OS, a current page view based on the current pointer value, wherein the current page view is one of the first page view and the second page view; and
responsive to determining that the current page view is the first page view:
save, by the guest OS, the first pointer value in a first memory of the first task;
load, by the guest OS, the second pointer value from a second memory of the second task; and
execute, by the guest OS, a virtual machine function, wherein the virtual machine function receives the second pointer value as a parameter and, when executed, switches to the second page view.

US Pat. No. 10,248,784

SEQUENTIAL OBJECT SET PASSWORDS

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for authentication, the method comprising:receiving, at a user device, a first object set;
transmitting, to a processing device, a first rearranged object set that represents the first object set rearranged into a first sequential order by the user, the first sequential order being a different order than an order of the first object set;
responsive to the first rearranged object set matching a first known sequential object set, receiving, at the user device, a second object set;
transmitting, to the processing device, an indication that the second object set is a false object set;
responsive to identifying the second object set as a false object set, receiving, at the user device, a third object set;
transmitting, to the processing device, a second rearranged object set that represents the third object set rearranged into a second sequential order by the user, wherein the second sequential order being a different order than an order of the third object set; and
responsive to the second rearranged object set matching a second known sequential object set, receiving, at the user device, access to a restricted resource.

US Pat. No. 10,248,781

METHOD OF PASSCODE UNLOCK USING FORCE DETECTION

BlackBerry Limited, Wate...

1. A method comprising:providing, with an electronic device, a prompt requesting entry of a passcode having a reference set of sequential numerical fields stored in memory in the electronic device, a successful entry of the passcode toggling a user interface of the electronic device from a locked state to an unlocked state;
sequentially unlocking one at a time each sequential numerical field in the reference set of sequential numerical fields of the passcode by performing the following with a processor in the electronic device:
selecting each sequential numerical field in the reference set of sequential numerical fields;
detecting a level of external input pressure force imparted onto a touch location on an outer surface of the electronic device, in which the detected level of external input pressure force is detected as a press and hold gesture on the outer surface;
driving, with the processor and based on the detected level of input pressure force, a haptic feedback actuator mechanically coupled to the outer surface to communicate outwardly from the touch location a series of pulsed vibratory signals;
advancing a counter from a start value by one for each pulsed vibratory signal in the series of pulsed vibratory signals that is communicated outwardly from the touch location;
halting the communicating of the series of pulsed vibratory signals to the touch location on the outer surface in response to sensing the press and hold gesture is released;
comparing, in response to sensing the press and hold gesture is released, a numerical value of the counter with a numerical value of the currently selected sequential numerical field in the reference set of sequential numerical fields; and
if the numerical value of the counter matches the numerical value of the currently selected sequential numerical field then selecting a subsequent sequential numerical field in the reference set of sequential numerical fields, initializing the counter to the start value, and repeating the above steps for each subsequent sequential numerical field, until the numerical value of each and every subsequent sequential numerical field has been compared with, and matches, a respective numerical value of the counter; and
sending an unlock signal to toggle the user interface of the electronic device from a locked state to an unlocked state in response to the numerical value of each and every subsequent sequential numerical field having been compared with, and matching, a respective numerical value of the counter; and
wherein providing a haptic effect comprises providing a set of pulsed vibration signals, each pulsed vibration signal comprising a pulsed vibration cycle of a pulsed vibration signal immediately followed by no vibration signal; and
wherein the pulsed vibration cycle has a cycle duration that varies based on detecting a varying level of input pressure force imparted onto the touch location on the outer surface of the electronic device.

US Pat. No. 10,248,780

METHOD AND DEVICE FOR SECURING AN OBJECT, CORRESPONDING CONTROL METHOD AND DEVICE SECURED OBJECT

1. Device for securing an object, comprising:an input component to input a digital file representing a photograph that represents at least one portion of the object;
an image processor for extracting from the digital file, characteristic elements of the photograph by applying image processing, said characteristic elements including biometric data;
an encoder to encode the characteristic elements of the photograph into a matrix code; and
a printer to print the matrix code on or in the object;
wherein the encoder encodes a message in a copy-protection mark, and the matrix code printed by the printer comprises a zone representative of the copy-protection mark.

US Pat. No. 10,248,779

MOBILE TERMINAL, SMART WATCH, AND METHOD OF PERFORMING AUTHENTICATION WITH THE MOBILE TERMINAL AND THE SMART WATCH

LG ELECTRONICS INC., Seo...

1. A smart watch comprising:a display unit;
a sensor mounted in a bottom of a smart watch; and
a controller configured to:
measure a heartbeat rhythm using the sensor when an authentication request signal for an application displayed on an external apparatus is detected, wherein the external apparatus is interworked with the smart watch,
perform an authentication for the application by comparing the measured heartbeat rhythm with a stored heartbeat rhythm, and
transmit a result of the authentication to the external apparatus so that the external apparatus can execute the application,
wherein the external apparatus is further configured to:
detect a grip type in which a user holds a mobile terminal in one hand or both hands,
automatically measure the heartbeat rhythm using the sensor when a stored specific grip type is detected,
perform a user authentication by comparing the measured heartbeat rhythm with a stored heartbeat rhythm, and
display a function screen that is frequently used in the detected specific grip type when the authentication is completed,
wherein the function screen includes at least one a website, a game site, a bank website, and a cloud image folder, and
wherein the controller is further configured to:
execute a different operational mode according to the detected specific grip type and which finger touches on the mobile terminal.

US Pat. No. 10,248,776

BACKGROUND ENROLLMENT AND AUTHENTICATION OF A USER

Apple Inc., Cupertino, C...

1. A method for authenticating a user of an electronic device that includes a biometric sensing device, the method comprising:capturing, as part of background operations of the electronic device, a first biometric as the user interacts with the electronic device;
receiving user identification data (UID) from the user as the user interacts with the electronic device;
if the first biometric and the UID are received within a given time period of each other:
tagging the first biometric with the UID; and
assigning the tagged first biometric to a cluster, wherein the cluster comprises one or more biometrics associated with a respective biometric attribute of the user;
capturing a second biometric as the user interacts with the electronic device;
determining if the second biometric matches at least one biometric in the cluster; and
providing the user with access to the electronic device or to an application on the electronic device in response to determining that the second biometric matches at least one biometric in the cluster.

US Pat. No. 10,248,775

MANAGING LATENCY AND POWER IN A HETEROGENEOUS DISTRIBUTED BIOMETRIC AUTHENTICATION HARDWARE

QUALCOMM Incorporated, S...

1. A method of managing latency and power in a biometric authentication system, comprising:receiving a biometric image information on a first processor and a second processor, wherein a processing capability of the first processor is greater than the processing capability of the second processor;
configuring the first processor to operate in a high speed mode;
determining a feature extraction result and a feature matching result with the first processor operating in the high speed mode, wherein the feature matching result is based on a comparison of the received biometric image information and a previously stored biometric template;
providing the feature extraction result and the feature matching result to the second processor;
configuring the first processor to operate in a default mode, wherein the processing capability of the first processor while in the default mode is less than it is while in the high speed mode; and
determining an authentication score with the second processor, wherein the authentication score is based at least in part on the feature matching result determined on the first processor.

US Pat. No. 10,248,773

VEHICLE SECURITY ACCESSORY AND METHODS OF IDENTITY AUTHENTICATION

GENTEX CORPORATION, Zeel...

1. An accessory configured to authenticate a transaction, the accessory comprising:a communication circuit configured to communicate with transaction system;
at least one sensor mounted in connection with the vehicle and configured to collect verification data indicative of authentication of the transaction with the transaction system; and
a processor in communication with the communication circuit and the at least one sensor, wherein the processor is configured to:
communicate the verification data received from the at least one sensor to a transaction verification server as a first authentication;
receive an authentication of the transaction from the transaction system, wherein the authentication comprises coded light data received by the at least one sensor; and
communicate a verification of the receipt of the coded light data as a second authentication, wherein the first authentication and the second authentication are used in combination validating the transaction based on the verification data and the coded light data.

US Pat. No. 10,248,772

SECURE COMMUNICATION BETWEEN A VIRTUAL SMARTCARD ENCLAVE AND A TRUSTED I/O ENCLAVE

McAfee, LLC, Santa Clara...

1. A hardware machine readable medium comprising instructions that when executed cause a machine to:transmit, from a first trusted execution environment operatively connected to a biometric capture device, a request for a biometric match claim;
receive, in response to the request for the biometric match claim, biometric data from the biometric capture device;
perform, by the first trusted execution environment, a match of the biometric data against biometric templates stored in the first trusted execution environment;
verify, with a report including a signed piece of data transmitted by a second trusted execution environment via a credential manager application operating in a third execution environment, an authorization of the first trusted execution environment, wherein the second trusted execution environment is sealed; and
in response to the verification of the first trusted execution environment, unseal the second trusted execution environment based on the match of the biometric data performed by the first trusted execution environment, wherein the second trusted execution environment includes a virtual smartcard including cryptographic data specific to a user corresponding to the biometric data, and wherein the first trusted execution environment is independent from the second trusted execution environment.

US Pat. No. 10,248,771

PERFORMING BIOMETRICS OPERATIONS IN UNCONTROLLED ENVIRONMENTS

MicroStrategy Incorporate...

1. A system comprising:a data store for storing data; and
one or more computing devices comprising one or more processors configured to interact with the data store, the one or more computing devices being further configured to perform operations comprising:
receiving an enrollment biometric identifier of a user in an environment;
receiving data indicating an environmental condition occurring in the environment of the user at a time the enrollment biometric identifier was obtained from the user;
determining a matching threshold based on a characteristic of the enrollment biometric identifier of the user;
storing, in the data store and in association with the enrollment biometric identifier, the data indicating the environmental condition occurring in the environment of the user at the time the enrollment biometric identifier was obtained from the user, the data indicating the environmental condition being stored in an enrollment profile for the user; and
storing, in the data store and in association with the enrollment biometric identifier, the matching threshold in the enrollment profile for the user.

US Pat. No. 10,248,769

SYSTEMS AND METHODS FOR AUTHENTICATING USERS ON TOUCHSCREEN DEVICES

Symantec Corporation, Mo...

1. A computer-implemented method for authenticating users on touchscreen devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:detecting that the computing device is at an authentication step that requires valid authentication input from a user of the computing device in order to authenticate the user to a service on the computing device, wherein the computing device has a single touchscreen comprising a numerical keypad;
detecting that the computing device is physically oriented such that the touchscreen of the computing device is facing away from the user and facing downwards towards a surface relative to the user;
receiving input from the user via the touchscreen when the touchscreen is facing downwards towards the surface relative to the user;
determining that the input from the user comprises a mirrored version of the valid authentication input that is flipped along a vertical axis relative to the touchscreen; and
authenticating the user to the service in response to determining that the input was received from the user while the touchscreen was facing away from the user and downwards towards the surface relative to the user and determining that the input comprises the mirrored version of the valid authentication input.

US Pat. No. 10,248,766

SIMULATION METHOD AND ANALYZING DEVICE

SUMITOMO HEAVY INDUSTRIES...

1. An analyzing device for simulating of a flow of particles in a virtual space, the analyzing device comprising:disturbance source data storage means configured to electronically store data for a source of a disturbance in the flow of the particles in the virtual space and data for a source of generation of a vortex that is caused by the flow of the particles in the virtual space;
particle data storage means configured to electronically store positions of the particles in the virtual space and velocities of the particles in the virtual space;
constraint assigning means configured to electronically assign a constraint to the particles so as to simulate the flow of the particles in the virtual space, the constraint including an initial velocity assigned to each of the particles so that the particles in the virtual space move in a direction of the flow;
numerical computation means configured to electronically, after the constraint to the particles is assigned by the constraint assigning means, compute a governing equation that governs the motion of said each of the particles; and
display control means configured to electronically control a display, on a display device, the flow of the particles in the virtual space and the vortex that is caused by the flow of the particles in the virtual space,
wherein the numerical computation means, by referring to the disturbance source data storage means and the particle data storage means, electronically identifies the particles that are linked with the source of the disturbance in the flow of the particles in the virtual space, and
wherein the particles displayable on the display device that the numerical computation means has identified as being linked with the source of the disturbance in the flow in the virtual space are distinguishable on the display device from others of the particles that are displayable on the display device.

US Pat. No. 10,248,764

SYSTEM AND METHODS FOR PERFORMING MEDICAL PHYSICS CALCULATIONS

STC.UNM, Albuquerque, NM...

1. A method of determining distributions of energy deposition and fluence due to ionizing radiation comprising the steps of:accessing a distributed processing framework connecting a medical provider network;
uploading from the medical provider network to the distributed processing framework a Monte Carlo task comprising calculation parameters including a patient anatomy and a beam configuration;
determining by a master node of the distributed processing framework a number of virtual nodes required for the Monte Carlo task, wherein the number of virtual nodes includes one or more additional virtual nodes determined by a threshold amount;
distributing by the master node to each virtual node the calculation parameters;
performing by each virtual node a portion of a Monte Carlo calculation using the calculation parameters to compute a dose calculation result;
meeting a threshold value by the number of virtual nodes that completes the Monte Carlo calculation;
using a linear model to aggregate by the master node all dose calculation results from each virtual node to obtain a final dose calculation result comprising a distribution of energy deposition;
storing the final dose calculation result in a data storage of the distributed processing framework; and
communicating by the distributed processing framework to the medical provider network the final dose calculation result.

US Pat. No. 10,248,763

HEALTHCARE PRESCRIPTION DELIVERY TECHNIQUES USING A MONEY TRANSFER NETWORK

Moneygram International, ...

1. A method for healthcare prescription delivery comprising:receiving information associated with a healthcare prescription order for a patient, wherein the information is provided to a device at an agent location of a money transfer network operated by a money transfer service provider;
validating the healthcare prescription order, wherein the validating includes:
establishing a communication connection between a central server of the money transfer network and a server associated with a pharmacy service;
providing at least a portion of the received information associated with the healthcare prescription order to the server;
receiving, at the central server, a validation determination from the server of the pharmacy service, wherein the validation determination indicates whether the healthcare prescription order is valid; and
transmitting the validation determination to the device at the agent location; and
in response to receiving validation information that indicates the healthcare prescription order is valid:
configuring a money transfer transaction between a receiving party and a sending party, wherein the sending party is a third party to the patient, wherein the third party is located at a different location from the patient, and wherein the receiving party is associated with the pharmacy service that validated the healthcare prescription order;
receiving payment information associated with a payment for the healthcare prescription order, wherein the payment is provided by the third party at the agent location, wherein the payment comprises a funding amount paid in a foreign currency, and wherein the money transfer transaction is funded using the funding amount;
initiating the money transfer transaction to provide payment for the healthcare prescription order, wherein initiating the money transfer transaction includes:
charging the funding amount to a financial account of the sending party based on the payment information, and wherein the funding amount includes a send amount corresponding to the payment provided to the receiving party and a fee amount corresponding to a fee charged by the money transfer service provider for facilitating the money transfer transaction;
converting the funding amount from an amount in the foreign currency to an amount in a local currency of a geographic area where the pharmacy is located;
determining whether the amount converts evenly into the amount in the local currency; and
in response to a determination that the amount in the foreign currency does not convert evenly into the amount in the local currency, reducing the fee such that the amount in the foreign currency converts evenly into the amount in the local currency; and
transmitting a notification to the pharmacy service that the payment has been received from the sending party.

US Pat. No. 10,248,762

SYSTEM AND METHOD OF MEDICAL DEVICE ALARM MANAGEMENT

General Electric Company,...

1. A system for patient evaluation based upon medical device alarms, the system comprising:a plurality of medical devices that each produce physiological data of a patient monitored by the medical device and generate a plurality of alarms based upon analysis of the physiological data;
a processor that receives alarm data identifying each of the plurality of alarms from each of the plurality of medical devices, the processor receives the physiological data from the plurality of medical devices and categorizes each of the plurality of alarms in the alarm data into a plurality of alarm types;
a graphical display operable by the processor to visually present a summary of the plurality of alarms identified in the received alarm data, the summary comprising the total number of alarms, and an alarm type of each of the plurality of alarms, wherein the processor operates the graphical display to graphically present the physiological data and one or more alarm limits relevant to at least one of the alarms; and
a user input device communicatively connected to the processor and operable to receive at least one user input of a selection of a patient wherein upon receiving the selection of the patient, the processor operates the graphical display to visually present an identification of each of the alarms from medical devices monitoring the selected patient, a frequency of occurrence of each of the alarms, and the processor operates the graphical display to present physiological data from the medical device resulting in at least one of the alarms;
wherein the one or more alarm limits are an upper alarm limit and a lower alarm limit and the processor operates the graphical display to present a percentage of physiological data outside of the one or more alarm limits comprising a percentage of physiological data above the upper alarm limit and a percentage of physiological data below the lower alarm limit.

US Pat. No. 10,248,761

COMPUTERIZED SYSTEM AND METHOD FOR RECORDING AND TRACKING DERMATOLOGICAL LESIONS

Derm Mapper, LLC, Akron,...

1. A computerized method for tracking and analyzing skin lesions comprisinga) displaying a graphical template image on a display screen of a computerized device
i) wherein said graphical template image consists of a portion of a human body form;
b) receiving a video input from a camera;
c) displaying said video input on said display screen;
d) creating a composite image consisting of said graphical template image and said video input;
e) displaying said composite image on said display screen;
f) receiving an instruction to capture a photographic image from said video input;
g) creating and storing a first photographic image from said video input;
h) receiving a selection of a portion of said first photographic image, wherein said selection contains a dermatological lesion;
i) highlighting said selection on said first photographic image on said display;
j) creating a prompt to create a second photographic image in response to receiving a selection of a portion of said first photographic image, wherein said second photographic image is a zoomed image of said dermatological lesion;
k) receiving an instruction to capture a second photographic image from said video input;
l) creating and storing a second photographic image from said video input;
m) creating and storing a third photographic image from said video input, wherein said third photographic image is a zoomed image of said dermatological lesion;
n) displaying said second photographic image and said third photographic image adjacent on said display screen;
o) receiving an instruction to display a merged image of said second photographic image and said third photographic image;
p) creating a merged image of said second photographic image and said third photographic image;
q) aligning one or more topographical features of said dermatological lesion in said second photographic image with one or more topographical features of said dermatological lesion in said third photographic image;
r) accenting one or more differences in one or more topographical features between said dermatological lesion in said second photographic image and said dermatological lesion in said third photographic image to provide a physician with information to make a diagnostic determination with respect to the dermatological lesion.

US Pat. No. 10,248,760

SYSTEM AND METHOD FOR PRODUCING MEDICAL IMAGE DATA ONTO PORTABLE DIGITAL RECORDING MEDIA

DatCard Systems, Inc., I...

1. A system for recording and viewing medical data comprising:at least one receiver to receive medical image information in DICOM format through a software module, wherein the medical image information comprises patient identification information and study information;
wherein the medical image information is stored in one or more files;
at least one storage to store the medical image information;
at least one storage to store a medical data image viewing software;
at least one receiver to receive an input information to create a job;
a processor;
wherein the processor performs an analysis of the input information and the medical image information;
wherein the analysis comprises generating matches in the medical information based on the input information;
a creator to create the job based on the analysis;
wherein the job comprises the matched medical image information and the medical data image viewing software;
a creator to create label data;
wherein the label data comprises information selected from the patient identification information based on the job;
a submitter to submit the job to at least one recorder;
wherein the at least one recorder further comprises a recording media control software;
wherein the at least one recorder records the job on a recording media;
wherein the recording media is readable by a platform or an operating system;
a submitter to submit the label data to a printer; and
the printer to print the label data.

US Pat. No. 10,248,759

MEDICAL IMAGING REFERENCE RETRIEVAL AND REPORT GENERATION

Konica Minolta Laboratory...

1. A method for managing a patient medical case, comprising:obtaining the patient medical case comprising a patient medical image and a patient medical record;
automatically identifying, within the patient medical image, an abnormal image region;
extracting features of the abnormal image region into a multidimensional feature space of the abnormal image region;
searching a reference medical case database using the multidimensional feature space of the abnormal image region as a search criterion;
automatically retrieving, from the reference medical case database, a plurality of reference medical cases comprising a plurality of reference medical images matching the multidimensional feature space of the abnormal image region and a plurality of reference medical records corresponding to the plurality of reference medical images,
wherein the reference medical cases are retrieved by:
automatically comparing the multidimensional feature space of the abnormal image region with multidimensional feature spaces of the reference medical images, and
automatically mapping the comparison between the multidimensional feature space of the abnormal image region and the multidimensional feature spaces of the reference medical images to a one-dimensional value that reflects proximity between the abnormal image region and each of the plurality of reference medical images,
wherein the reference medical images are considered match to the multidimensional feature space of the abnormal image region based on the one-dimensional value,
receiving, from a user, a selection of a reference medical case of the plurality of reference medical cases comprising a reference medical record and a reference medical diagnosis; and
modifying the patient medical record based on the reference medical record and the reference medical diagnosis in the reference medical case by populating a field of the patient medical record with a data item from the selection of the reference medical case.

US Pat. No. 10,248,757

GENETIC, METABOLIC AND BIOCHEMICAL PATHWAY ANALYSIS SYSTEM AND METHODS

WAYNE STATE UNIVERSITY, ...

1. A computer-implemented method of correcting for crosstalk effects in analyzing a set of reference pathways and a list of genes or proteins or metabolites or reactants that are differentially expressed in a given condition, comprising:constructing, via a computer, a matrix whereby each pathway to which any given gene or protein or metabolite or reactant contributes most is identified;
processing, via said computer, the matrix by applying a likelihood-based estimation upon an impact matrix and thereby identify a new set of new and/or existing pathways that is not affected by crosstalk effects;
generating, via said computer, a heat map using the matrix, the heat map illustrating a p-value of each pathway when an influence of genes or proteins or metabolites or reactants from each other pathway are removed;
displaying, via said computer, the heat map; and
treating a patient based on the heat map.

US Pat. No. 10,248,756

ANATOMICALLY SPECIFIC MOVIE DRIVEN MEDICAL IMAGE REVIEW

Siemens Healthcare GmbH, ...

1. A method for generating anatomically specific movie driven medical image review, the method comprising:receiving scan data representing an anatomy of a patient;
receiving a movie generation preset selection associated with the scan data;
detecting a plurality of anatomical landmarks associated with positional points within the scan data; and
generating a movie of the patient along a movie path, the movie comprising a continuous sequence of movie image frames based on the scan data along the movie path, wherein the movie path is determined based on an order of the positional points associated with the anatomical landmarks, the generating being based on the scan data, the movie generation preset, and the anatomical landmarks, wherein a viewing perspective of the movie is automatically controlled based on the anatomical landmarks detected within the scan data as the movie of the patient is generated, wherein automatically controlling the viewing perspective of the movie includes changing a direction of the viewing perspective of the movie as passing from a view of one of the anatomical landmarks along the movie path to another view of another of the anatomical landmarks along the movie path.

US Pat. No. 10,248,755

CHECKING WAFER-LEVEL INTEGRATED DESIGNS FOR ANTENNA RULE COMPLIANCE

INTERNATIONAL BUSINESS MA...

1. A method for checking a wafer-level design for compliance with a rule, comprising:identifying nets that cross chip boundaries for each of a plurality of chip layouts;
combining interconnected identified nets into one or more virtual ensembles having properties defined by a sum of properties of the respective interconnected nets;
modifying chip layouts related to virtual ensembles that do not comply with a design rule to bring non-compliant virtual ensembles into compliance.

US Pat. No. 10,248,754

MULTI-STAGE PATTERN RECOGNITION IN CIRCUIT DESIGNS

GLOBALFOUNDRIES INC., Gr...

1. A method performed by a computerized device executing instructions in a computer-readable electronic computer storage, the method comprising:receiving an identification of a first area of an integrated circuit (IC) design surrounding a failure component;
automatically selecting a smaller portion of the first area that surrounds the failure component, is smaller than the first area, and contains less circuit components than the first area;
automatically matching the smaller portion to other areas of the IC design to identify potentially undesirable patterns of the IC design that are the same size as the first area;
automatically grouping the potentially undesirable patterns into pattern categories;
automatically matching the pattern categories to known good pattern categories;
automatically removing the known good pattern categories from the potentially undesirable patterns to leave potential failure patterns;
automatically outputting the potential failure patterns of the IC design;
automatically updating the IC design based on the potential failure patterns to produce an updated IC design; and
manufacturing IC devices using the updated IC design.

US Pat. No. 10,248,753

PESSIMISM REDUCTION IN HIERARCHICAL BLOCKAGE AGGRESSORS USING ESTIMATED RESISTOR AND CAPACITOR VALUES

International Business Ma...

11. A computer system for performing a coupled noise analysis in designing an integrated circuit (IC), the computer system comprising:a memory device storing machine executable instructions; and
at least one processing device coupled to the memory device, the at least one processing device configured to run the machine executable instructions to perform:
copying one or more victim circuit sections of a victim circuit in the IC;
generating a blockage circuit section that represents a blockage aggressor circuit in the IC, using the copied one or more victim circuit sections of the victim circuit, wherein the one or more victim circuit sections are directly connected to the blockage circuit section through at least one coupling capacitor;
determining a first subcircuit from the blockage circuit section, wherein circuit elements constituting the first subcircuit are all connected one to another within the blockage circuit section,
selecting, for a first victim pin on the victim circuit, a first power-driven virtual node on the first subcircuit;
applying a first power source to the selected first power-driven virtual node on the first subcircuit;
calculating a first coupled noise at the first victim pin contributed by the first subcircuit in response to the first power source being applied;
comparing the first coupled noise at the first victim pin to a threshold noise level; and
altering the IC design when the first coupled noise exceeds the threshold noise level.

US Pat. No. 10,248,752

METHOD FOR ROUTING BETWEEN PINS OF SEMICONDUCTOR DEVICE AND DESIGN SYSTEM THEREWITH

Samsung Electronics Co., ...

1. A method for designing and fabricating a routing between pins of a semiconductor device, the method comprising:receiving information associated with candidate pins in the semiconductor device;
pre-processing the candidate pins to select one or more of the candidate pins as selected pins, based on at least one of a density of the candidate pins, one or more shapes of the candidate pins, one or more intervals between one or more sets of the candidate pins, and one or more sizes of the candidate pins;
generating a net list associated with the selected pins, the net list defining a set of electrical connections between the selected pins;
generating an interface script to execute the net list in a library-based disposition and wiring tool that is driven in a computer system; and
executing the interface script through the library-based disposition and wiring tool to fabricate one or more physical routings between the selected pins of the semiconductor device, the one or more physical routings configured to establish the set of electrical connections between the selected pins.

US Pat. No. 10,248,751

ALTERNATIVE HIERARCHICAL VIEWS OF A CIRCUIT DESIGN

Synopsys, Inc., Mountain...

1. A method for displaying a circuit design in a graphical user interface (GUI) of a computer, the method comprising:displaying a first view of the circuit design in the GUI by grouping a set of circuit elements into a first set of hierarchical blocks in accordance with a logical hierarchy of the circuit design, wherein each circuit element in the set of circuit elements is associated with an attribute value of an attribute type;
responsive to receiving a request to display the circuit design in the GUI based on the attribute type, generating a second view of the circuit design by:
creating a second set of hierarchical blocks, wherein each hierarchical block in the second set of hierarchical blocks corresponds to a different attribute value,
assigning each circuit element in the set of circuit elements to a corresponding hierarchical block in the second set of hierarchical blocks based on the attribute value associated with the circuit element,
drawing the second set of hierarchical blocks in the second view of the circuit design, and
for each hierarchical block in the second set of hierarchical blocks, drawing all circuit elements assigned to the hierarchical block within a boundary of the hierarchical block in the second view of the circuit design; and
displaying the second view of the circuit design in the GUI.

US Pat. No. 10,248,750

POWER SAVINGS METHOD IN A CLOCK MESH-BASED DESIGN THROUGH A SMART DECLONING TECHNIQUE

SAMSUNG ELECTRONICS CO., ...

1. A method comprising:receiving, by a computer, a digital circuit model comprising models of:
a clock mesh configured to provide a clock signal to a plurality of logic circuits, and
a plurality of logic circuits, each logic circuit at least partially controlled by an application of the clock signal to one or more clock-gater cells;
identifying a group of clock-gater cells having common input signals;
grouping, based at least in part upon a set of bounding dimensions, a sub-portion of the group of clock-gater cells into at least one clustered sub-portion of the group of clock-gater cells, wherein each clustered sub-portion includes a plurality of clock-gater cells;
for each clustered sub-portion, de-cloning in the digital circuit model, each of the clock-gater cells with a combination of a new clock-gater cell and at least one matching buffer cell; and
manufacturing or laying out an integrated circuit based, at least in part, upon the digital circuit model.

US Pat. No. 10,248,749

AUTOMATED ATTRIBUTE PROPAGATION AND HIERARCHICAL CONSISTENCY CHECKING FOR NON-STANDARD EXTENSIONS

INTERNATIONAL BUSINESS MA...

1. A system for automated attribute propagation and hierarchical consistency checking, the system comprising:a memory having computer readable instructions; and
a processing device for executing the computer readable instructions, the computer readable instructions comprising:
detecting a non-standard extension during convergence of an integrated circuit logic design;
propagating the non-standard extension to each level of a plurality of hierarchies of the integrated circuit design for which a net utilizes a special constraint; and
verifying a hierarchy consistency by checking the attribute propagation at each level of the plurality of hierarchies, and
wherein an integrated circuit is manufactured using the integrated circuit design.

US Pat. No. 10,248,747

INTEGRATED CIRCUIT SIMULATION WITH DATA PERSISTENCY FOR EFFICIENT MEMORY USAGE

CADENCE DESIGN SYSTEMS, I...

1. A computer-implemented method for simulating an integrated circuit (IC) design, comprising:parsing an IC netlist and loading the IC netlist into memory;
forming a table model including parameter values for at least one circuit component in the IC netlist, the parameter values selected from a portion of a parameter space;
storing, from a first processor in a cloud computing environment upon completion of a first simulation stage, a data value associated with the parsing of the IC netlist and the table model in a first register of an ordered parameter stack of a database accessible through the cloud computing environment, the data value comprising a metadata associated with the data value;
loading, to a second processor at a second simulation stage, at least one of the data value or the metadata from the database;
modifying the data value or the metadata that is loaded in the second processor, according to the portion of the parameter space;
storing the data value in a second register of the ordered parameter stack in the database; and
performing an analysis on at least one block of the IC netlist according to the data value or the metadata that is loaded in the second processor, wherein the first register and the second register are accessed from different nodes of a hierarchical layout for the IC netlist.

US Pat. No. 10,248,746

METHOD AND APPARATUS FOR ESTIMATING IDEAL POWER OF AN INTEGRATED CIRCUIT DESIGN

CADENCE DESIGN SYSTEMS, I...

1. A computer-implemented method for determining a power consumed by a circuit, comprising:identifying a redundant frame comprising one of a clock toggle or a data toggle that is not propagated to an output pin of the circuit;
identifying a non-redundant frame comprising a clock toggle and a data toggle that are propagated to the output pin of the circuit;
determining an ideal power consumed by the circuit during the non-redundant frame; and
providing a feedback to a user, the feedback comprising the redundant frame, a source of the redundant frame, and the ideal power consumed by the circuit during the non-redundant frame, wherein providing the feedback to the user comprises:
excluding a source of the redundant frame from an integrated circuit model, and
providing the integrated circuit model for fabrication of an integrated circuit.

US Pat. No. 10,248,745

INTEGRATED CIRCUIT SIMULATION WITH VARIABILITY ANALYSIS FOR EFFICIENT MEMORY USAGE

CADENCE DESIGN SYSTEMS, I...

1. A computer-implemented method for simulating an integrated circuit (IC) design, comprising:forming a partition of an integrated circuit netlist into blocks based on a performance value from at least a portion of a parameter space;
forming a table with parameter values comprising multiple instances of a block of the partition;
analyzing a direct-current solution of the block by combining at least a first instance of a first block with a second instance of a second block based on the performance value from the portion of the parameter space;
performing a transient analysis where signals change over time for the block, wherein forming a table with parameter values comprises forming an ordered stack of memory registers, each memory register storing a parameter value according to a circuit hierarchy;
separating a connectivity from multiple parameters in the portion of the parameter space at each level of a simulation hierarchy;
sharing a memory registry for multiple parameters having a same connectivity;
storing a unique identification for a first parameter according to the simulation hierarchy to leverage the sharing of the memory registry;
evaluating at least one instance of the block with the first parameter having the unique identification;
forming a shared database for a simulation instance that has a same parameter value as the first parameter having the unique identification and
providing a circuit layout for fabrication after evaluating the at least one instance of the block.

US Pat. No. 10,248,744

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ACOUSTIC CLASSIFICATION AND OPTIMIZATION FOR MULTI-MODAL RENDERING OF REAL-WORLD SCENES

THE UNIVERSITY OF NORTH C...

1. A method for determining acoustic material properties associated with a real-world scene, the method comprising:obtaining an acoustic response in a real-world scene;
obtaining images of the real-world scene;
generating, using the images of the real-world scene, a three-dimensional (3D) virtual model of the real-world scene;
determining acoustic material properties of surfaces in the 3D virtual model using a visual material classification algorithm to identify materials in the real-world scene that make up the surfaces and known acoustic material properties of the materials, wherein the visual material classification algorithm comprises:
performing, using the images of the real-world scene and a convolutional neural network (CNN) based material classifier, a visual material segmentation, wherein the visual material segmentation indicates material classification probabilities for triangles associated with the 3D virtual model;
identifying, using a patch segmentation algorithm, patches associated with the 3D virtual model, wherein each patch represents a localized group of triangles appearing to be the same material; and
determining, using the material classification probabilities, material classifications for the patches, where each material classification is associated with predetermined acoustic material properties; and
performing one or more acoustic simulations in the 3D virtual model using an optimization algorithm, wherein the optimization algorithm includes a sound propagation simulation phase for generating a simulated acoustic response based on the acoustic material properties and a material estimation phase for adjusting the acoustic material properties used in the sound propagation simulation phase, wherein the acoustic response in the real-world scene is used to adjust the acoustic material properties, wherein the optimization algorithm uses a solver to determine the adjustment for the acoustic material properties during the material estimation phase, wherein the optimization algorithm alternates between the phases until a simulated acoustic response of an acoustic simulation in the 3D virtual model is similar to the acoustic response in the real-world scene or until a termination condition is met; and
generating, using the acoustic material properties of surfaces in the 3D virtual model, physically-based sound effects for the real-world scene.

US Pat. No. 10,248,743

DETERMINING CUMULATIVE WATER FLOW ON A GRID-BY-GRID BASIS IN A GEOCELLULAR EARTH MODEL

Saudi Arabian Oil Company...

1. A computer-implemented method, comprising:receiving four-dimensional fluid flow data associated with a time dimension and I, J, and K dimensions, the four-dimensional fluid flow data including, for each time step of plural time steps associated with the time step dimension, a fluid flow amount for the respective time step and for a respective I, J, K cell;
determining, using the four-dimensional fluid flow data and for each of plural time steps t, a four-dimensional geocellular model having I, J, K and t dimensions and indicating, for each I, J, K, I cell, a fluid flow amount of a fluid flowing through the I, J, K cell for a respective time step t;
determining, using plural four-dimensional geocellular models, a three-dimensional time-independent model for the I, J, K cell, wherein determining the three-dimensional time-independent model includes summing, for a particular I, J, K cell, the fluid (low amounts from the plural time steps; and
determining, using the three-dimensional time-independent model, a two-dimensional time-independent model that includes a cumulative fluid flow amount for each I, J cell in the respective time-independent mode;
wherein the fluid flow amount for a respective cell is determined as a function of the square root of a sum of squares of fluid flow amounts in each of the I, J, and K directions.

US Pat. No. 10,248,742

ANALYZING FLIGHT DATA USING PREDICTIVE MODELS

University of North Dakot...

1. A system, comprising:at least one processor;
at least one memory device;
wherein the at least one memory device stores a machine learning algorithm trained based on flight information to discover related groupings and identify clusters of outliers in the groupings and stores a program to cause the at least one processor to:
derive, using a quadratic least squares model applied to a matrix of time-series flight parameter data for a flight, a mathematical signature for each flight parameter of each flight in a set of data including a plurality of sensor readings corresponding to time-series flight parameters of a plurality of flights;
aggregate the derived mathematical signatures into a dataset;
measure a similarity between each pair of flights within the plurality of flights by calculating a distance metric between the mathematical signatures for each flight parameter of each pair of flights within the dataset;
combine the measured similarities with the dataset; and
apply the machine-learning algorithm to the dataset to discover related groupings of data based on the calculated distance metric and identify clusters of outliers within the dataset by using a unified distance matrix to train the machine-learning algorithm, wherein:
new data corresponding to a flight parameter is acquired from a flight sensor;
contemporaneously with acquisition of the new data corresponding to the flight parameter, the new data corresponding to the flight parameter is processed using the trained machine-learning algorithm to detect when the new data is an outlier of the flight parameter and generate an alert; and
an adjustment to an avionics device is generated to prevent or mitigate a hazardous condition responsive to the alert being generated.

US Pat. No. 10,248,740

THREE-DIMENSIONAL PRINTING PREPARATION

AUTODESK, INC., San Rafa...

1. A computer-implemented method for preparing 3D geometry for 3D printing, comprising:receiving, by a processor, the 3D geometry;
identifying, by the processor, one or more non-manifold edges in the 3D geometry;
for each non-manifold edge, separating, by the processor, the non-manifold edge into a plurality of edges corresponding to faces meeting at the non-manifold edge, to create a set of patches;
orienting, by the processor, the patches so that coincident faces have topologically consistent normals; and
iteratively stitching, by the processor, boundaries of the patches together, wherein the boundaries are stitched together by stitching a longest zip first.

US Pat. No. 10,248,739

APPARATUS, SYSTEM, AND METHOD OF PROCESSING LOG DATA, AND RECORDING MEDIUM STORING LOG DATA PROCESSING PROGRAM

Ricoh Company, Ltd., Tok...

1. A management system, comprising:a temporary storage that stores information including communication state data indicating a communication state of a terminal, the communication state data being received directly or indirectly from the terminal, as conference log data including the received communication state data;
a format processor that reads out the conference log data from the temporary storage, determines whether the received communication state data included in the conference log data matches one of a plurality of specific, predetermined communication states, and applies processing to remove incomplete log data to the conference log data read out from the temporary storage to generate formatted log data, when the received communication state data matches one of the plurality of specific, predetermined communication states, and does not apply processing to the conference log data when the received communication state data does not match the one of the plurality of specific predetermined communication states;
a formatted log storage that stores the formatted log data; and
a first interface that receives a request for obtaining the formatted log data of the terminal directly or indirectly from the terminal,
wherein the format processor applies the processing to remove incomplete log data to the conference log data to generate the formatted log data before the interface receives the request for obtaining the formatted log data.

US Pat. No. 10,248,738

STRUCTURING NARRATIVE BLOCKS IN A LOGICAL SEQUENCE

International Business Ma...

15. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform a method comprising:receiving a textual work by an input device coupled to a computer system;
ingesting the textual work using a natural language processor;
dividing the textual work into a plurality of narrative blocks, each narrative block being a contiguous portion of text within the textual work, each narrative block being separated from other narrative blocks by linguistic delimiters;
generating, by the natural language processor, a first knowledge graph based on the ingested textual work, the first knowledge graph including nodes that represent concepts and edges between nodes that represent links between concepts;
receiving, from a user, a selection of a target concept from a plurality of concepts in the first knowledge graph, wherein all concepts in the first knowledge graph that are not selected by the user are non-target concepts;
identifying a first set of narrative blocks and a second set of narrative blocks, the first set of narrative blocks including one or more narrative blocks of the plurality of narrative blocks that include the target concept, the second set of narrative blocks including one or more background narrative blocks, the one or more background narrative blocks being narrative blocks of the plurality of narrative blocks that do not include the target concept;
determining, using the first knowledge graph, which non-target concepts are related to the target concept;
identifying related background narrative blocks, the related background narrative blocks being narrative blocks that contain a related non-target concept, the related non-target concept being a non-target concept that is related to the target concept, wherein the related background narrative blocks do not contain the target concept;
identifying unrelated background narrative blocks, the unrelated background narrative blocks being narrative blocks that do not contain the target concept or a related non-target concept;
determining a narrative path for the target concept, the narrative path including the target narrative blocks and the related background narrative blocks ordered in a sequence consistent with an ordering of the narrative blocks in the textual work, wherein the narrative path does not include the unrelated background narrative blocks, wherein the determining the narrative path for the target concept comprises receiving the narrative path from the user;
generating a second knowledge graph based on the narrative path;
comparing, by the computer system, the first knowledge graph to the second knowledge graph; and
determining, based on the comparing and by the computer system, whether the narrative path is approved; and
outputting the narrative path to an output device coupled with the computer system.

US Pat. No. 10,248,737

METHOD FOR DETERMINING THE STATE OF A DEVICE IN AN AIRCRAFT

Airbus (S.A.S.), Blagnac...

1. A method for determining a state of a device of interest in an aircraft, this state specifying a version of the device of interest present in the aircraft, the method comprising:transmitting, by one or more computers, and to at least one database, a request formed from an identifier of the aircraft;
receiving, by the one or more computers and in response to the transmitting, a list of updates previously performed on the device of interest, each update specifying an earlier version of the device of interest before the update and a later version of the device of interest after the update, wherein the device of interest comprises a functional assembly including hardware elements and software elements, and wherein the earlier versions of the device of interest are different from the later versions of the device of interest by one or more of a group consisting of hardware and software differences;
from a directed graph, stored in a memory, and such that each edge of a plurality of edges of the directed graph corresponds to one update out of a set of updates associated with devices of a type of the device of interest, determining, by the one or more computers, a sub-graph of the directed graph corresponding to the list of updates, wherein the directed graph and the sub-graph are each stored in a form of an adjacent matrix, each non-zero coefficient of the adjacent matrix of the generic graph being associated with at least one update;
determining, by the one or more computers, the state of the device of interest from the sub-graph; and
causing, by the one or more computers, the state of the device of interest to be displayed on a display device.

US Pat. No. 10,248,736

DATA LOADER AND MAPPER TOOL

Sprint Communications Com...

13. A method of managing data in a telecommunication network data structure by converting source data in a source data structure to target data in a target data structure, where the source data structure and target data structure are arbitrarily selected from a plurality of at least 50 different data structures comprising:receiving, by a translation application executing on a telecommunication network computer system, a request to translate source data stored in a source data structure to a target data structure;
identifying, by way of information stored in a taxonomy repository:
a data store key within the source data;
a category of an element of the source data;
inferring, by way of information stored in the taxonomy repository, a relationship between the data store key and the element;
converting, by the translation application, a format of the data store key to a format of a target data store key;
converting, by the translation application, a format of the element to a format of a target element;
storing, by the translation application, the target data store key and the target element in the target data structure;
receiving a request to translate second data stored in a second data structure to the target data structure;
identifying, based on information in the taxonomy repository, redundant and non-redundant data between the second data and source data;
determining, by way of information stored in the taxonomy repository that the second data structure is not a data store of record; and
translating the non-redundant data to the target data structure.

US Pat. No. 10,248,735

COLLABORATIVE VIRTUAL MARKUP

JPMORGAN CHASE BANK, N.A....

1. A computer-implemented method for collaborative markup of a webpage between multiple users, the method comprising:providing a capture interface available to user computers over a network, the capture interface including a menu of webpages available for modification, the webpages residing at a webpage server;
receiving at a markup server a capture request from a first user for a webpage selected from the available webpages residing at the webpage server and offered through the capture interface;
capturing the requested webpage from the webpage server, the captured webpage including an original layout and original content, the original content including interactive features and the original layout being described by original layout information in the requested webpage;
receiving first markup data from the first user, the first markup data corresponding to a modification of at least the original webpage, the first markup data including a first time stamp, a first user stamp, and a first modifier;
storing the received first markup data in a related file in a computer memory accessible to the markup server separately from the requested webpage;
automatically generating at the markup server, using a computer processor, a first code for a first marked-up webpage based on the received first markup data, thereby rendering a first marked-up webpage based on the first markup data and enabling the first user to view the first marked-up webpage including the first markup data in real time;
notifying the second user that the first marked up web page was generated and automatically transmitting from the markup server the first code to a second user for real-time rendering of the first marked-up webpage to the second user, thereby enabling the second user to view the modified webpage including the first markup data in real time;
providing the mark-up interface to the second user;
receiving, at the markup server, second markup data associated with the second user, the second markup data corresponding to a modification of at least one of the requested webpage and the first markup data, the second markup data including a second time stamp, a second user stamp, and a second modifier, wherein the second modifier indicates at least one of an acceptance and a rejection of at least a portion of the first modifier;
storing the received mark-up data in a related file in a computer memory accessible to the markup server separately from the requested webpage;
automatically generating at the markup server, using the computer processor, a second code for a second marked-up webpage based on the second mark-up data associated with the second user, thereby rendering a second marked-up webpage including the second markup data in real time; and
publishing in real-time to the webpage server an updated webpage based on the first markup data or the second markup data, wherein at least a portion of the original webpage remains functional during collaboration.

US Pat. No. 10,248,734

OBFUSCATING NETWORK PAGE STRUCTURE

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:receiving, from a client, a request for a network page;
in response to the request:
obtaining the network page;
determining which of either a new randomization or a same randomization is to be applied to a document structure of the network page, the same randomization having been previously applied to the document structure in response to a previous request;
generating an obfuscated network page by changing the document structure according to the new randomization or the same randomization such that:
when rendered for display, the network page and the obfuscated network page have a same visual appearance; and
the obfuscated network page has a changed document structure that is unpredictable to the client; and
providing the obfuscated network page to the client.

US Pat. No. 10,248,733

INTEGRATION OF A CATALOG APPLICATION WITH A MONITORING APPLICATION

SAP SE, Walldorf (DE)

1. A computer implemented method for performance measurement, the method comprising:monitoring one or more applications by a monitoring application, the one or more applications operating on at least one computer platform and the monitoring application operating on a second computer platform in communication with the at least one computer platform across a network;
installing an instantiation of a catalog application service interface on the second computer platform for processing requests from the monitoring application for information about key indicators available at the catalog application, the catalog application providing data defining different key indicators for measuring performance of at least one of the one or more monitored applications;
the catalog application service interface receiving a request to provide data for one or more key indicators compatible with a first application of the one or more applications;
the catalog application evaluating the request to determine the one or more compatible key indicators based on technical characteristics of the first application; and
executing in a second application measurement of the one or more key indicators over performance of the first application;
displaying in a user interface the one or more compatible key indicators determined by the catalog application; and
providing in the user interface measurement results of the performance of the first application.

US Pat. No. 10,248,732

IDENTIFYING RELATED ENTITIES

Microsoft Technology Lice...

1. A computer-implemented method, the method comprising:identifying an entity within a search query;
identifying mined criteria comprising one or more related entities related to the entity, wherein the one or more related entities are identified based on a distance of each of the one or more related entities from the entity, wherein the distance is a number of connections away from the entity for each of the one or more related entities,
wherein the mined criteria further comprises at least one of (a) historical session data of a plurality of users and (b) at least two URLs that occur together in a user session, wherein the historical session data includes a set of URLs clicked by a user within a given time period;
ranking the one or more related entities based on the distance of each of the one or more related entities from the entity, wherein a first related entity having a fewer number of connections from the entity than a second related entity is ranked higher than the second related entity; and
providing at least one of the one or more related entities in a condensed display simultaneously with one or more search results responsive to the search query such that review of each of the one or more search results is avoided.

US Pat. No. 10,248,731

SYSTEM AND METHOD FOR LINKING DATA RECORDS FOR PARCELS

Corelogic Solutions, LLC,...

1. A method of linking real estate parcels in a database, the method comprising:under control of a geocoding engine comprising computer hardware:
accessing a data repository that is configured to store parcel data for each of a plurality of real estate parcels, the parcel data associated with each real estate parcel comprising a parcel boundary;
identifying a community of real estate parcels, the community comprising a plurality of real estate parcels separated by no more than a threshold distance, at least some of the plurality of real estate parcels having spatially contiguous boundaries;
calculating a community border for the community of real estate parcels by:
determining links among the real estate parcels in the community to identify a set of neighboring parcels for each of the real estate parcels in the community;
generating spatially enlarged parcels by spatially enlarging the parcel boundaries of the real estate parcels in the community to create an overlap among the neighboring parcels among the real estate parcels in the community;
finding a union of the spatially enlarged parcels to identify an outward facing boundary of the union of spatially enlarged parcels; and
reducing the outward facing boundary of the union of spatially enlarged parcels to determine the community border for the community;
identifying a group of real estate parcels in the community, wherein each of the real estate parcels in the group intersects the community border;
determining, for each real estate parcel in the group, a border intersection between the real estate parcel and the community border;
finding, for each real estate parcel in the group, a reduced set of neighboring real estate parcels based at least in part on a distance between the border intersection for the real estate parcel and locations of the other real estate parcels in the group;
linking, for each real estate parcel in the group, the real estate parcel to at least one other real estate parcel in the reduced set, wherein a data record associated with the at least one other real estate parcel is missing an address number; and
matching the at least one other real estate parcel in the reduced set to an address number that brackets an address number of the real estate parcel based on the linking.

US Pat. No. 10,248,729

METHOD AND SYSTEM OF QUANTIFYING AND QUALIFYING ATHLETIC SKILLS AND COMPETITIVE RESULTS IN A SOCIAL NETWORK

Bari Enterprises, Inc., ...

1. A method of quantifying and qualifying athletic skills and competitive data in a social network implemented on a client computing device having one or more processors and memory for storing one or more programs to be executed by the processors comprising:registering a first user with the social network and creating a first user account;
establishing a user profile for the first user;
searching at least one remote database for at least one of skills data, ratings data and competition data relating to the first user and retrieving the at least one of skills data, ratings data and competition data and adding the data to the first user account in a social network database;
displaying predetermined information from the first user account on the client computing device;
creating a connection list for the first user that comprises at least one other user;
calculating a number of users through whom the first user connects to another user; and
determining a separation degree of the another user based on the calculated number of users,
wherein if there are n users through whom the first user connects to the another user, the separation degree of the another user is determined as n+1;
retrieving at least one of skills data, ratings data, and competition data of the another user from the at least one remote database;
displaying the at least one of skills data, ratings data, and competition data, and the separation degree between the user and the another user on the client computing device; and
displaying predetermined information from the another user account or the remote database and a connection starting date on the client computing device based on the separation degree between the user and the another user,
wherein the predetermined information from the another user comprises at least one of:
a summary of competition data of the another user over a pre-defined time period; and
competition data over a pre-defined time period of the another user against each opponent.

US Pat. No. 10,248,728

SEARCH AND NOTIFICATION PROCEDURES BASED ON USER HISTORY INFORMATION

Open Invention Network LL...

1. A method comprising:receiving at least one first action as a voice command from a first user device comprising a first data repository;
storing the at least one first action in a first category in the first data repository;
receiving at least one second action as a first air gesture from a second user device comprising a second data repository, air gestures comprising user movements in front of a user device display;
ignoring all other air gestures, except for an overriding gesture, for a predetermined time period after receiving the first air gesture;
in response to receiving the overriding gesture as a second air gesture during the predetermined time period:
permitting receipt of another of at least one second action as a third air gesture from the second user device comprising the second data repository;
storing the other of at least one second action in a second category in the second data repository, the first and second data repositories organized into default categories defined by other users different than users of the first and second user devices; and
creating a notification and transmitting the notification to at least one of the first user device and the second user device responsive to receiving at least one of the at least one first action and the at least one second action.

US Pat. No. 10,248,727

SYSTEM FOR PROVIDING WORDS SEARCHING SERVICE BASED ON MESSAGE AND METHOD THEREOF

1. A system for providing a word search service based on message, comprising:a database which is equipped with a plurality of data modules and registers sentence data and word extracted from the sentence data in each data module equipped to manage the sentence data and the word; and
a service server which,
if a sentence data is newly registered, gives a sentence data number to the registered sentence data, and registers the given sentence data number as a key,
extracts words on a form basis from the registered sentence data, converts each extracted word into 64-bit hash code, creates a word listener data structure including the converted word, word size and sentence data number, and assigns the data module in the database to the created word listener data structure to store the data module therein,
wherein the service server, if receiving a search word from a user terminal, converts the received search word into the 64-bit hash code, and thereafter creates a transmission protocol structure including the converted search word, user ID and word size, and broadcasts the created transmission protocol structure to all the data modules in the database and is provided with a search result from the data modules in response to broadcasting and thereafter provides the provided search result to the user terminal, and
wherein the data module, if receiving the transmission protocol structure, extracts a top 64-bit data in the received transmission protocol structure and checks whether the extracted data coincides with its hash code, if the extracted data coincides with its hash code, creates a search result structure including the user ID, search word, sentence number and registers the created search result structure in queue in the service server, and if, as a result of checking, the extracted data does not coincide with its hash code, does not create the search result structure.

US Pat. No. 10,248,725

METHODS AND APPARATUS FOR INTEGRATING SEARCH RESULTS OF A LOCAL SEARCH ENGINE WITH SEARCH RESULTS OF A GLOBAL GENERIC SEARCH ENGINE

Gartner, Inc., Stamford,...

1. A computerized method for simultaneously searching public and private information sources, comprising:implementing, by a user, a key word search of a public search engine via a web browser;
simultaneously automatically implementing the key word search of a private external information source to locate at least one of user contacts and documents relevant to the key word search;
scoring the at least one of the user contacts and the documents returned from the private external information source for relevancy to the key word search;
returning public search results to the user in a main section of a web browser display based on the key word search of the public search engine;
modifying the web browser display to comprise a side bar viewing window adjacent the main section of the web browser display; and
returning a predetermined number of most relevant of the at least one of the user contacts and the documents obtained from the private external information source to the user in the side bar viewing window of the web browser display adjacent to the public search results displayed on the main section of the web browser display;
wherein:
the scoring of the user contacts and the documents returned from the private external information source further comprises ordering the user contacts and the documents by relevancy to key words or topics derived from at least one of the key word search or the public search results;
the private external information source comprises a recommendation system comprising at least one of a document recommendation engine comprising a document database for the documents and an expert recommendation engine comprising an expert database identifying experts and corresponding areas of expertise; and
identifying information for the experts from the expert database which are relevant to the key word search is displayed in the side bar viewing window.

US Pat. No. 10,248,724

PLAYBACK QUEUE CONTROL CONNECTION

Sonos, Inc., Santa Barba...

1. A playback device comprising:a network interface;
an audio output interface;
a processor;
a non-transitory computer-readable medium; and
program instructions stored on the non-transitory computer-readable medium that are executable by the processor to cause the playback device to perform functions comprising:
while the playback device does not have an existing connection session with any mobile device, playing back media in a first playback queue;
receiving a request to connect with a given mobile device in a communication range of the playback device; and
after receiving the request, entering into a new connection session with the given mobile device during which the playback device either (i) continues playing back media items in the first playback queue if the given mobile device had a prior connection session with the playback device using the first playback queue that was terminated due to the given mobile device moving outside of the communication range of the playback device or (ii) otherwise begins playing back media items in a second playback queue that is associated with the given mobile device at the time of the request.

US Pat. No. 10,248,723

METHOD AND DEVICE FOR GENERATING FINGERPRINTS OF INFORMATION SIGNALS

Teletrax B. V., Eindhove...

1. A method of generating a fingerprint representing an information signal, the method comprising the steps of:decomposing a portion of the information signal into plural frequency sub bands at a decomposition level;
calculating a spectral property of the portion for each of the plural frequency sub bands;
comparing each spectral property against a criterion, thereby generating a comparison result;
combining each comparison result for constituting the fingerprint; and
repeating, at least once, the decomposing, calculating, comparing and combining, wherein
for each repetition the decomposing is performed using a decomposition level different from a previous decomposition level.

US Pat. No. 10,248,722

MULTI-LANGUAGE SUPPORT FOR DYNAMIC ONTOLOGY

PALANTIR TECHNOLOGIES INC...

1. A method comprising:at one or more computing devices comprising one or more processors and storage media storing one or more computer programs executed by the one or more processors to perform the method, performing operations comprising:
storing an ontology for a data store, wherein the ontology comprises a plurality of data types; and
for each data type of the plurality of data types, storing, in the ontology, one or more display values in association with a respective locale identifier, wherein each display value indicates how the data type is displayed in a graphical user interface;
for at least a particular data type of the plurality of data types, storing, in the ontology, one or more parsers in association with a respective locale identifier;
determining a particular locale associated with a user computing device;
determining a locale identifier corresponding to the particular locale;
determining one or more data types of the plurality of data types to be displayed in a graphical user interface at the user computing device;
for each data type of the one or more data types, determining a display value corresponding to the particular locale using the locale identifier, and displaying the data type at the user computing device using the display value corresponding to the particular locale;
receiving, from the user computing device via the graphical user interface, input data corresponding to the particular data type;
determining, based on the locale identifier, a particular parser of the one or more parsers corresponding to the particular locale;
parsing the input data using the particular parser.

US Pat. No. 10,248,721

MANAGEMENT, EVALUATION AND VISUALIZATION METHOD, SYSTEM AND USER INTERFACE FOR DISCUSSIONS AND ASSERTIONS

1. A system for evaluating a plurality of statements transmitted amongst a plurality of geographically-distributed users interactively participating in a topic of an online discussion, the system comprising:a first user device operated by a first user of the geographically distributed users configured for:
generating for display, a graphical representation of the plurality of statements according to a tree-like structure;
receiving a statement from the first user for inclusion into the tree-like structure, wherein each statement in the plurality of statements comprises:
a contents portion,
an assigned classification, wherein the assigned classification is selected from a set of at least two classifications, each classification of said set of at least two classifications specifies a relationship of an associated statement to another statement in said tree-like structure, the set of at least two classifications including a supporting assertion and an opposing assertion, and
one or more associated quality designations, wherein the one or more associated quality designations include an impact value based on a veracity value and a relevance value of each statement,
wherein at least one of said plurality of statements includes (i) at least a first veracity value and a second veracity value and (ii) at least a first relevance value and a second relevance value, the first veracity value and the first relevance value associated with a first contextual parameter, and the second veracity value and the second relevance value associated with a second contextual parameter,
wherein the display of the tree-like structure to the first user includes generation of a user perspective driven layout based on the first contextual parameter and the second contextual parameter;
a second user device operated by a second user of the geographically-distributed users configured for:
displaying the tree-like structure including the statement of the first user;
receiving from the second user, a voting value representative of approval of the second user to the statement of the first user; and
a collaboration system configured for:
generating the display of the tree-like structure to the first user and the second user; and
modifying the voting value of the second user based on one or more criteria.

US Pat. No. 10,248,719

SYSTEM AND METHOD FOR ANALYSING TEMPORAL TEXT DATA

Tata Consultancy Services...

1. A method for analyzing temporal text data to provide visualization of content evolution of the temporal text data, the method performed by a hardware processor and comprising:collecting the temporal text data as an input from voluminous data sources using an input module;
implementing text analysis on the collected temporal text data for information extraction and determination of top concepts using a text analytics module;
writing, at regular intervals, the analysed text to a shared file system for storage purpose;
clustering the analysed text as per frequency distribution of top users, concepts and tag clouds using a visualisation module, wherein the visualisation module performs the clustering of the analysed text as per frequency distribution of top users, concepts and tag clouds using a concept wise frequency distribution module, a user wise frequency distribution module and tag-cloud wise distribution module; and
presenting the results post the clustering in the form of a visualization dashboard.

US Pat. No. 10,248,717

COMPUTER-BASED MEDIA CONTENT CLASSIFICATION AND DISCOVERY SYSTEM AND RELATED METHODS

1. An e-book media content classification and discovery method comprising the steps of:providing a plurality of e-book files;
associating a plurality of content representative identifiers with each of the e-book files, wherein each of the plurality of content representative identifiers corresponds to at least one of a plurality of author-based, content-centered literary criteria elements assigned within literary criteria categories, wherein the plurality of author-based, content-centered literary criteria elements are identified by an author of the each of the plurality of e-book files, respectively, wherein the literary criteria categories comprise: a rating factor of the e-book file; a setting of the e-book file; a style of the e-book file; a theme of the e-book file; and a main character characteristic of the e-book file;
wherein author-based, content-centered literary criteria elements of the rating factor of the e-book file comprise: violence, language, sexual content, and target audience,
wherein author-based, content-centered literary criteria elements of the setting of the e-book file comprise: time period, setting type, and realism,
wherein author-based, content center literary criteria elements of at least one of the style of the e-book file and the theme of the e-book file comprise: physical action, pacing, romance, mysteries and puzzles, humor, inspiration of reader, and political and social commentary,
wherein author-based, content centered literary criteria elements of the main character characteristic of the e-book file comprise: gender, age, race, sexual preference, and religion;
determining a user selection of at least one of a plurality of selectable fields based on a selection of the literary criteria categories and the author-based, content-centered literary criteria elements thereof, using at least one input selection field displayed on a graphical user interface (GUI) of a computerized device of the user, wherein the at least one input selection field has the plurality of selectable fields, wherein each of the plurality of selectable fields matches at least one of the plurality of author-based, content-centered criteria elements;
filtering the author-based, content-centered literary criteria elements based on the determined user selection, whereby author-based, content-centered literary criteria elements matching the determined user selection are populated in a results list and author-based, content-centered literary criteria elements not matching the determined user selection are omitted from populated results list;
filtering the e-book files based on the filtered author-based, content-centered literary criteria elements;
assigning a point value to each of the filtered author-based, content-centered literary criteria elements;
ranking, based on the point value, the plurality of e-book files having the filtered author-based, content-centered literary criteria elements within one of the literary criteria categories against all other e-book files within that literary criteria category, wherein e-book files in different literary criteria categories are not ranked against each other;
displaying a result of the filtered plurality of selectable fields on the GUI of the computer device of the user, wherein the result has at least a portion of the plurality of e-book files keyed to the plurality of author-based, content-centered literary criteria elements; and
saving the result of the filtered plurality of selectable fields and associating a name with the saved result, enabling the user to retrieve the same result at a later point of time.

US Pat. No. 10,248,715

MEDIA CONTENT RECOMMENDATION METHOD AND APPARATUS

Tencent Technology (Shenz...

1. A media content recommendation method executed by a computer system, comprising:receiving an input entry parameter;
performing word segmentation on the entry parameter to obtain a word sequence, the word sequence comprising multiple sequentially sorted words;
combining adjacent words in the word sequence to generate a mixed word sequence, the mixed word sequence comprising multiple sequentially sorted phrases;
acquiring phrases comprised in the word sequence and the mixed word sequence;
for each of the phrases, allocating a matching weight coefficient to each phrase, the matching weight coefficient of a phrase being used to represent a percentage of the phrase in a meaning expressed by the whole entry parameter, searching for media content comprising the phrase;
calculating a matching weight coefficient sum of phrases comprised in the found media content; and
sorting the found media content in a descending order of matching weight coefficient sums, and recommending media content whose matching weight coefficient sum is sorted in the first place.

US Pat. No. 10,248,714

PROTECTING DOMAIN-SPECIFIC LANGUAGE OF A DIALOGUE SERVICE

International Business Ma...

1. A system to protect domain-specific language of a dialogue service having a set of protected terms, each protected term being associated with a domain and a substitute term, wherein the system executes on a data processing system within a distributed prediction system, the distributed prediction comprising a storage unit, the data processing system communicating with the storage unit via a network, the system comprising:a query processing unit adapted to identify the presence of a protected term in a received domain-specific query based on the domain that is specific to the query, the domain that is specific to the query corresponding to a particular company, the domain having an associated company dialogue service, the protected term corresponding to a term inappropriate for use with a different dialogue service, the protected term being stored within a table along with information associated with the protected term, the information associated with the term comprising replace with information, domain information, source term information, owner information, reverse translate information, alternate term information and part of speech information; and
a language substitution unit adapted to substitute the identified protected term with its associated substitute term, the language substitution unit using the information from the table to substitute the identified protection term with its associated substitute term.

US Pat. No. 10,248,712

GENERATING A SET OF REPRESENTATIVE ITEMS USING A MAXIMUM-SET-COVERAGE SELECTION STRATEGY

Amazon Technologies, Inc....

1. A computing system comprising:a memory configured to store processor-executable instructions; and
a processor in communication with the memory and configured to execute the processor-executable instructions to perform operations comprising:
receiving, from another computing device, a value indicative of the number of reviews desired for presentation on the other computing device;
deriving an associated collection of elements from a set of reviews, wherein each element in the associated collection of elements is related to a review in the set of reviews;
for each review of the set of reviews, identifying a set of elements related to the review based at least in part on the associated collection of elements;
for each review of the set of reviews, determining a marginal utility value of the review based at least in part on the set of elements, in the associated collection of elements, that is related to the review;
selecting, from the set of reviews, a set of representative reviews based at least in part on the value indicative of the number of reviews desired for presentation and the marginal utility values of the reviews in the set of reviews;
determining that the number of reviews in the set of representative reviews corresponds to the value indicative of the number of reviews desired for presentation; and
providing the set of representative reviews to the other computing device for presentation via a user interface.

US Pat. No. 10,248,711

REPRESENTATION OF TIME-SENSITIVE AND SPACE-SENSITIVE PROFILE INFORMATION

INTERNATIONAL BUSINESS MA...

1. A profile-management system comprising a computer processor, a memory coupled to the processor, a computer-readable hardware storage device coupled to the processor, and a multidimensional information repository that comprises a profile set of user-profile records that each identifies a user profile of a plurality of user profiles, a geospatial-map set of location records that each identifies a location of a plurality of locations, a time-graph set of time-period records that each identifies a time period of a plurality of time periods, and a subject-dictionary set of subject-matter records that each identifies a subject of a plurality of subjects, wherein the storage device stores program code configured to be run by said processor via the memory to implement a method for managing dynamic time-sensitive and space-sensitive user characteristics, the method comprising:the system receiving an inbound event that is associated with a first user profile, a first location, a first time period, and a first subject;
the system searching the profile set for a user-profile record associated with the first user profile and adding such a record to the profile set if none already exists;
the system decreasing a first confidence level of the record if unable to identify the record in the profile set that exactly matches the first user profile associated with the inbound event;
the system searching the geospatial map for a location record associated with the first location and adding such a record to the geospatial map if none already exists;
the system zooming out the geospatial map and decreasing a second confidence level of the location record if unable to identify the location record that exactly matches the first location associated with the inbound event;
the system searching the time graph for a time-period record associated with the first time period and adding such a record to the time graph if none already exists;
the system searching the subject dictionary for a subject-matter record associated with the first subject and adding such a record to the subject dictionary if none already exists;
the system creating a set of space-sensitive and time-sensitive linkages, wherein the linkages link the record associated with the first user profile to the record associated with the first location, the record associated with the first time period, and the record associated with the first subject;
the system continuously self-learning by recognizing the set of space-sensitive and time-sensitive linkages in user behaviors represented by objects and the linkages and using self-learned observations to infer user behavioral patterns in the user-profile records;
the system dynamically and automatically updates the set of space-sensitive and time-sensitive linkages in response to a modification of the inbound event; and
the system increasing a confidence factor of query results by adding space-sensitive context and time-sensitive context to a query.

US Pat. No. 10,248,710

PARALLEL BOOTSTRAP AGGREGATING IN A DATA WAREHOUSE APPLIANCE

International Business Ma...

1. A computer-implemented method of creating bootstrap samples from a dataset, comprising:generating, with a process node, a series of random integers;
creating, with the process node, an assignment map, the assignment map includes a row identifier for each row of the dataset;
assigning, with the process node, a plurality of bootstrap sample identifiers defined by the series to at least one row identifier; and
creating, with the process node, an output table, rows of the output table include each instance of the bootstrap sample identifiers, the row identifier assigned with the bootstrap sample identifier, and data of a row of the dataset.

US Pat. No. 10,248,709

PROMOTED PROPERTIES IN RELATIONAL STRUCTURED DATA

Microsoft Technology Lice...

1. A method of managing data coherency among partitioned data storage spaces, the method comprising:storing sets of structured data records among the partitioned data storage spaces, with data fields of the structured data records correlated among the sets by one or more relational associations;
maintaining data fields in at least a first set of structured data records, the data fields comprising promoted data fields that reference properties of data fields of at least a second set of structured data records;
responsive to a user instruction to update at least a data field of a first structured data record in the partitioned data storage spaces, determining if the update relates to a promoted data field;
when the update does not relate to the promoted data field, implementing the update and propagating the update to any associated ones of the structured data records;
when the update relates to the promoted data field, implementing a portion of the update in the second set of structured data records and propagating the update to associated promoted data fields in the first set of structured data records along with any intervening changes received for the associated promoted data fields.

US Pat. No. 10,248,708

STORAGE AND REPLICATION IN DISTRIBUTED COMPUTING ENVIRONMENTS

Universita della Svizzera...

1. A computer-implemented method, comprising: providing, by one or more processors, an application program interface to an application to submit a value; based on obtaining the value through the application program interface (API), initiating, by the one or more processors, an instance of a consensus protocol, wherein the initiating comprises sending a message comprising the value to one or more hardware components communicatively coupled to the one or more processors; obtaining, by logic executed in the one or more hardware components, the message and appending the message with a sequence number, wherein the sequence number identifies the instance; accepting, by additional logic executed in the one or more hardware components, the value and supplying the value to the one or more processors; and replicating, by the one or more processors, the value for the instance and returning the value to the application via a callback.

US Pat. No. 10,248,706

REPLICATING DATABASE UPDATES WITH BATCHING

INTERNATIONAL BUSINESS MA...

1. A system comprising:a memory having computer readable instructions; and
one or more processors for executing the computer readable instructions to perform:
determining a minimum batching percentage for a source table;
determining a change threshold based on the minimum batching percentage;
detecting a source update applied to the source table, wherein the source table comprises a plurality of columns, and wherein the source update modifies a first subset of columns of the plurality of columns;
determining a second subset of columns of the plurality of columns, wherein the determining the second subset of columns comprises determining which of the plurality of columns were updated most recently, and wherein a respective tracking count of each column in the second subset of columns is less than or equal to the change threshold;
including the second subset of columns in a set clause of an update statement for updating a target table, wherein the second subset of columns included in the set clause comprise more columns than the first subset of columns modified by the source update, wherein the second subset of columns comprise fewer columns than the plurality of columns in the source table, and wherein the target table comprises a replica of the source table;
wherein the change threshold is a number of times a column that has been updated at least once is allowed to be unchanged by an update before the column is not included in the set clause; and
updating one or more columns of the target table responsive to the source update at the source table by applying the update statement to the target table to achieve at least the minimum batching percentage within a plurality of update statements;
wherein the applying the update statement comprises batching the update statement with a set of one or more previous update statements applicable to the target table, and wherein the minimum batching percentage is a guaranteed minimum percentage of update statements batched together when the plurality of update statements are performed in sequence, uninterrupted by other database operations.

US Pat. No. 10,248,705

STORAGE CONSTRAINED SYNCHRONIZATION OF SHARED CONTENT ITEMS

Dropbox, Inc., San Franc...

1. A computer-implemented method comprising:storing, by a client device, a shadow item representing a content item on the client device, wherein 1) the content item includes content data and metadata, 2) the content data is stored on a host device that is remote to the client device without the content data of the content item being stored on the client device, and 3) the shadow item only stores the metadata on the client device, and wherein the metadata corresponds to file attributes of the content item stored on the host device including at least a size of the content item;
receiving a request to view the file attributes in a file system interface of the client device, the request associated with a selection of the shadow item;
retrieving the metadata associated with the shadow item in response to the request; and
displaying the retrieved metadata including the size of the content item as the file attributes in the file system interface of the client device, wherein at least some of the displayed metadata attributes correspond to the metadata attributes of the content item represented by the shadow item.

US Pat. No. 10,248,701

EFFICIENT DISTRIBUTED QUERY EXECUTION

International Business Ma...

1. A method for query execution in multiple nodes of a distributed database system, said method comprising:receiving a database query in a first node of the distributed database system, the database query including a first constraint and at least one additional constraint;
identifying data in the first node that satisfies the first constraint with a first processor;
encoding the data with an encoder to generate encoded data;
sending the encoded data to a second node of the distributed database system with a first communications device, wherein each node of the nodes includes a data field, a predicate field, and an object field;
encoding a predicate in the second node to generate an encoded predicate; and
encoding an object in the second node to generate an encoded object;
identifying at least one encoded data of the encoded data that is in a mapping table in the second node with a second processor;
identifying at least one missing identifier with the second processor, the at least one missing identifier including at least one encoded data of the encoded data that is not in the mapping table in the second node;
sending the missing identifier to the first node with a second communications device;
decoding the missing identifier to retrieve the value of the missing identifier;
mapping the missing identifier to the retrieved value;
sending the mapping of the missing identifier and the retrieved value to the second node with the first communications device;
querying a dictionary in the second node with the retrieved value to identify an identification number for the retrieved value;
rewriting the database query to include:
the identification number for the retrieved value; and
at least one identification number for the at least one encoded data of the
encoded data that is in the mapping table in the second node; and
mapping the missing identifier to the identification number for the retrieved value.

US Pat. No. 10,248,695

EXTREME VALUE COMPUTATION

International Business Ma...

1. A computer-implemented method for storing a data table, wherein the data table has at least one attribute, and wherein a first data block of the data table comprises a set of data rows of the data table, and wherein a current data block being the first data block, the method comprising:providing a plurality of synopsis techniques for determining a plurality of attribute value information indicative of the at least one attribute;
determining a data characteristic describing the plurality of data rows of the current data block;
selecting, based on the determined data characteristic, at least one synopsis technique of the provided plurality of synopsis techniques suitable for generating the plurality of attribute value information for the at least one attribute of the current data block;
determining the plurality of attribute value information for the at least one attribute of the plurality of data rows of the current data block using the at least one selected synopsis technique, wherein determining the plurality of attribute value information further comprises:
scanning the current data block to identify a fixed number j from a plurality of first distinct values of the at least one attribute for indicating a value range of the at least one attribute in the current data block;
dividing the value range into a plurality of sub-ranges; and
creating a distribution of a plurality of buckets, wherein each bucket is associated with a respective sub-range of the plurality of sub-ranges;
storing the determined plurality of attribute value information for the current data block to be used for query processing against the data table;
further scanning the current data block;
determining a bucket within the plurality of buckets is available for each further current value j+1 of the at least one attribute;
marking the bucket as a non-empty bucket;
providing the plurality of attribute value information as comprising a plurality of extremum values of the at least one attribute in the current data block, the distribution of the plurality of buckets, and the value range in each of the distribution of the plurality of buckets;
receiving a query of the at least one attribute of the data table;
determining a plurality of empty buckets within the distribution of the plurality of buckets;
comparing the determined plurality of empty buckets with a predetermined maximum number; and
using one of the distribution of the plurality of buckets and the plurality of extremum values to decide to scan or not to scan the current data block for evaluating the received query based on the compared plurality of empty buckets.

US Pat. No. 10,248,688

ANNOTATIONS FOR PARALLELIZATION OF USER-DEFINED FUNCTIONS WITH FLEXIBLE PARTITIONING

SAP SE, Walldorf (DE)

1. A method implemented at least in part by a computing system, the method comprising:receiving one or more source code annotations for a user-defined function appearing in source code, wherein the source code defines an executable program comprising both one or more relational operations and one or more user-defined functions, and wherein a source code annotation of the one or more source code annotations specifies at least one property for parallelized instances of the user-defined function, the at least one property comprising a partitioning pre-condition specifying a range of a plurality of permitted partition arrangements for input tables of the parallelized instances of the user-defined function, wherein the range of the plurality of permitted partition arrangements is specified as:
an upper bound specified in an annotation of the one or more source code annotations and selected as at least one selected from the group consisting of (i) a designation that partitioning is not supported; (ii) a designation that any degree of partitioning is supported; and (iii) identifiers for one or more columns which may be included in partition calculation; and
a lower bound specified in the annotation of the one or more source code annotations and selected as at least one selected from the group consisting of (i) a designation that partitioning is not required; (ii) a designation that any degree of partitioning is supported; and (iii) identifiers for one or more columns which must be included in partition calculation;
wherein at least one of the upper bound and the lower bound specifies identifiers for one or more columns and wherein the upper bound and the lower bound are not the same;
receiving a relational operation out of the relational operations; and
based at least in part on the relational operation, the source code annotation, and the user-defined function, generating a query execution plan optimized, according to an optimization algorithm, for parallel execution, the generating comprising choosing and avoiding partition or merge operations during query execution plan optimization based on what partition arrangements are permitted for input tables of tables of the parallelized instances of the user-defined function, and wherein, for the optimized query execution plan, a partition arrangement is selected that is within the range of permitted partition arrangements.

US Pat. No. 10,248,687

EXPANDED SEARCH AND FIND USER INTERFACE

MICROSOFT TECHNOLOGY LICE...

1. A method for providing an expanded search and find email functionality comprising:displaying, by a computing device, a user interface including a list pane and a search pane, the list pane initially including an unfiltered listing of email items, the search pane initially being in a simplified form and including a first textbox;
receiving, by the computing device, entry of a free form alphanumeric first search query in the first textbox;
receiving, by the computing device, a request to initiate the first search query;
executing the first search query and displaying a first results list in the list pane, the first results list including one or more of the email items that match the first search query;
receiving, by the computing device, a request to display an expanded form of the search pane that includes the first textbox and a plurality of additional textboxes, each of the additional textboxes being associated with a pre-selected property of the email items that defines a search criteria associated with the additional textbox, each pre-selected property being represented by a label adjacent to its associated additional textbox;
receiving, by the computing device, entry of a search string in at least one of the additional textboxes;
receiving, by the computing device, a request to initiate a second search query that includes the search string entered in the at least one additional textbox;
removing the expanded form of the search pane and redisplaying the simplified form so that the first textbox is displayed without the additional textboxes, wherein the first textbox is populated with a syntax and structure of the second search query in response to removing the expanded form of the search pane and redisplaying the simplified form; and
executing, by the computing device, the second search query and displaying a second results list in the list pane, the second results list including one or more of the email items having instances of the pre-selected property matching the search string in the second search query.

US Pat. No. 10,248,674

METHOD AND APPARATUS FOR DATA QUALITY MANAGEMENT AND CONTROL

JIANGXI ELECTRIC POWER CO...

1. A method for data quality management and control, comprising:receiving, by a system for data quality management and control, application information transmitted by a service sub-system, wherein the application information comprises a service sub-system identifier, datasheet operation information and datasheet operation trigger information;
resolving, by the system, the datasheet operation trigger information to obtain datasheet flow information;
receiving, by the system, user information transmitted by the service sub-system and a target datasheet transmitted by the service sub-system;
if the datasheet operation information is adding a datasheet, then querying, by the system, pieces of history information according to the service sub-system identifier to obtain a plurality of datasheet names corresponding to the service sub-system identifier; if a name of the target datasheet is different from the plurality of datasheet names, then instructing, by the system, the service sub-system to store the target datasheet into a data center;
if the datasheet operation information is updating a datasheet, then querying, by the system, pieces of history information according to the name of the target datasheet to obtain a datasheet name that is the same as the name of the target datasheet, and instructing, by the system, the data center to replace datasheet contents corresponding to the datasheet name with contents of the target datasheet;
wherein the pieces of history information at least comprise the service sub-system identifier and the datasheet name.

US Pat. No. 10,248,670

METHOD AND SYSTEM FOR MIGRATING CONTENT BETWEEN ENTERPRISE CONTENT MANAGEMENT SYSTEMS

Open Text Corporation, W...

1. A system for migrating content between enterprise content management systems, the system comprising:a processor; and
a processor-based application that is executable by the processor to:
based on a migration job definition, execute a first remote procedure call to a source database management system associated with a source enterprise content management system to directly interact with a source database at a level of the source database to identify a source object identifier that is a primary key that uniquely identifies a plurality of source metadata tables stored in the source enterprise content management system for content stored in the source enterprise content management system;
retrieve the plurality of source metadata tables from the source enterprise content management system, based on using the source object identifier as the primary key that uniquely identifies the plurality of source metadata tables;
execute a second remote procedure call to a target database management system associated with a target enterprise content management system to identify a target object identifier based on the plurality of source metadata tables and the migration job definition, wherein the target object identifier is a placeholder object identifier in the target enterprise content management system for the source metadata tables to be migrated;
create an object identifier map that maps the source object identifier that functions, at the source enterprise content management system, as the primary key that uniquely identifies the plurality of source metadata tables to the target object identifier that is the placeholder object identifier in the target enterprise content management system for the source metadata tables to be migrated;
store the plurality of source metadata tables to the target enterprise content management system, based on the object identifier map;
retrieve the content for the source enterprise content management system; and
store the content as content for the target enterprise content management system.

US Pat. No. 10,248,668

MAPPING DATABASE STRUCTURE TO SOFTWARE

International Business Ma...

1. A computer-implemented method for determining a software identity based on a database structure, the method comprising:receiving, by a computing device and via a network, a first set of metadata that includes structural information about a first database;
comparing, by the computing device, the structural information with one or more software signatures, each software signature including a first field specifying a software identity and one or more second fields specifying one or more associated database structure features such that the software identity is mapped to the one or more associated database structure features;
generating, by the computing device, a first match estimate based on the comparing of the structural information with the one or more software signatures; and
inferring, by the computing device, that the first database is likely included in a first software product based on the generating of the first match estimate.

US Pat. No. 10,248,665

METHOD AND SYSTEM FOR COLLECTING, AND GLOBALLY COMMUNICATING AND EVALUATING DIGITAL IMAGES OF SPORTS FANS, PUBLIC DISPLAYS OF AFFECTION AND MISCELLANEOUS GROUPS FROM ENTERTAINMENT VENUES

1. A contest method comprising the steps of:a sponsor displaying an advertisement accompanied by a contest invitation in association with a spectator event, said contest invitation relating to a contemporaneously operating digital contest relating to the spectator event;
providing a network, including data transmission, storage mechanisms and a computer processor, for permitting a plurality of contest participants to communicate within an electronically geofenced perimeter of said spectator event, wherein said spectator event occurs at least one or venue wherein said contest participants may dynamically and interactively respond to predetermined aspects of said spectator event;
said network further providing input means for said contest participants to electronically submit a plurality of affection-demonstrating digital images for contest participation, said plurality of affection-demonstrating digital images comprising at least one still image selected from a personal photograph, a family photograph, and a pet photograph portraying demonstrations of kissing, hugging, or otherwise conveying personal affection between at least two individuals or pets;
providing through said network a plurality of data elements and instructions for permitting said contest participants to communicate with said digital contest, by generating a digital image utilizing a camera, a cellular phone with a built-in camera, a scanner, or a kiosk and electronically submitting said affection-demonstrating digital images representing demonstrations of kissing, hugging, or otherwise conveying personal affection between at least two individuals or pets, as well as participant information, to said network, for contest participation, said digital images being electronically submitted utilizing an MMS message or an internet connection, said digital images being stored on contest servers;
selecting a subset of said affection-demonstrating digital images from said contest participants located within said electronically geofenced perimeter of said spectator event as candidates for entry into a voting stage of said digital contest;
broadcasting said selected subset of said affection-demonstrating digital images to a global of community of spectators both located at the spectator event and watching the spectator event via a media outlet;
inviting all spectators of the spectator event to vote for at least one of said affection-demonstrating digital images from said selected subset of said affection-demonstrating digital images and communicating a vote to a contest server;
electronically receiving and tallying said votes from all said spectators within a predetermined time limit and prior to the end of the spectator event;
electronically encrypting said affection-demonstrating digital images and contestant information, utilizing software provided on said contest participants' computer or mobile devices or upon receipt of said affection-demonstrating digital images by a contest server of said contest provider, to form a plurality of information capsules comprising a plurality of affection-demonstrating digital images, each said affection-demonstrating digital images corresponding to an individual entrant of said contest;
entering said plurality of affection-demonstrating digital images into an electronic batch of a plurality of affection-demonstrating digital image entrants;
selecting an affection-demonstrating digital image from said electronic batch of said plurality of affection-demonstrating digital images and designating such selected affection-demonstrating digital image as a winning entry of said contest according to the selected affection-demonstrating digital image having received a predetermined qualifier from the group comprising the most votes, a random/chance variable, or a management decision from within the spectator event geofenced perimeter and outside the spectator event geofenced perimeter;
decrypting said digital image and contestant information and identifying a single winner of said contest by using said digital image and said contestant information; and
wherein because said winning digital is accomplished electronically by submitting said digital images via said MMS message or said internet connection, new digital images can be initiated and completed in compressed time periods associated with the duration for said spectator event.

US Pat. No. 10,248,663

GEO-VISUAL SEARCH

Descartes Labs, Inc., Sa...

1. A system, comprising:one or more processors configured to:
receive a query feature vector associated with a query tile;
determine distance measures between the query feature vector and a previously selected set of exemplar feature vectors, wherein the set of exemplar feature vectors was previously selected from a corpus of feature vectors, and wherein a distance measure between the query feature vector and an exemplar feature vector comprises an indication of an amount of difference in features between the query feature vector and the exemplar feature vector;
wherein each exemplar feature vector is associated with a corresponding list of candidate feature vectors;
wherein the list of candidate feature vectors corresponding to a given exemplar feature vector comprises a list of feature vectors in the corpus previously determined to be visual neighbors of the given exemplar feature vector, wherein the candidate feature vectors in the corresponding list were previously determined to be visual neighbors of the given exemplar feature vector based at least in part on a first threshold and on distance measures determined between the given exemplar feature vector and the candidate feature vectors in the corresponding list;
based at least in part on the distance measures determined between the query feature vector and the previously selected set of exemplar feature vectors, select an exemplar feature vector from the previously selected set of exemplar feature vectors;
receive a list of candidate feature vectors corresponding to the selected exemplar feature vector;
determine distance measures between the query feature vector and the list of candidate feature vectors corresponding to the selected exemplar feature vector;
based at least in part on the distance measures determined between the query feature vector and the list of candidate feature vectors corresponding to the selected exemplar feature vector, determine a tile that is visually similar to the query tile, wherein the determined tile corresponds to a feature vector in the list of candidate feature vectors, and wherein the tile is determined to be visually similar to the query tile based at least in part on a second threshold and a distance measure determined between the query feature vector and the feature vector corresponding to the determined tile; and
provide the determined tile as output; and
a memory coupled to the one or more processors and configured to provide the one or more processors with instructions.

US Pat. No. 10,248,659

CONSISTENT HASHING CONFIGURATIONS SUPPORTING MULTI-SITE REPLICATION

International Business Ma...

1. A computer-implemented method, comprising:creating a namespace in a central storage location;
dividing the namespace into more than one cell, wherein a first cell is a common cell, wherein the common cell is configured to store management data received from remote storage locations coupled to the central storage location, and each of the remaining cells are configured to store object data received from a respective one of the remote storage locations;
receiving management data from the remote storage locations, wherein the management data corresponds to object data stored in the remote storage locations;
storing the received management data in the common cell of the central storage location;
receiving object data corresponding to the management data received from the remote storage locations; and
storing the received object data in the respective cells of the central storage location.

US Pat. No. 10,248,657

DATA OBJECT STORE AND SERVER FOR A CLOUD STORAGE ENVIRONMENT, INCLUDING DATA DEDUPLICATION AND DATA MANAGEMENT ACROSS MULTIPLE CLOUD STORAGE SITES

Commvault Systems, Inc., ...

1. A method for storing a secondary copy, of an original data set, on a cloud storage site using a cloud gateway, wherein the cloud gateway is coupled between multiple computers and one or more cloud storage sites via a network, the method comprising:identifying data blocks within a cache of the cloud gateway that satisfy certain criteria,
wherein the original data set comprises data blocks, and
wherein the certain criteria are from a storage policy;
performing block-level deduplication of the identified data blocks to create a deduplicated set of data,
wherein the block-level deduplication includes—
determining a size for a container file to utilize when deduplicating the identified data blocks; and
deduplicating at least some of the identified data blocks to create one or more container files containing deduplicated data,
wherein at least one of the container files has the determined size; and
storing the deduplicated set of data on the cloud storage site by:
buffering data, to a data buffer, for transmission to the cloud storage site;
repeating the following steps while the data buffer is not full:
receiving a file system request to write a group of data to the cloud storage site; and
adding the group of data to the buffer;
converting a file system request to one or more application program interface calls associated with the cloud storage site; and
transmitting contents of the data buffer to the cloud storage site using the one or more application program interface calls associated with the cloud storage site.

US Pat. No. 10,248,651

SEPARATING TRANSLATION CORRECTION POST-EDITS FROM CONTENT IMPROVEMENT POST-EDITS IN MACHINE TRANSLATED CONTENT

Amazon Technologies, Inc....

1. An apparatus, comprising:one or more processors; and
one or more non-transitory computer-readable storage media having instructions stored thereupon which are executable by the one or more processors and which, when executed, cause the apparatus to:
receive a source language string expressed in a source language;
receive a target language string comprising a machine translation of the source language string into a target language generated by a machine translation system;
receive a post-edited target language string comprising the target language string following post-editing by one or more post-editors;
utilize one or more unsupervised machine learning models to identify one or more post-edits performed by the one or more post-editors on the target language string and, to identify for the one or more post-edits, whether the one or more post-edits are corrective post-edits or content improvement post-edits, the corrective post-edits indicating an incorrect translation of the source language string in the post-edited target language string and the content improvement post-edits indicating a refinement of a correct machine translation of the source language string;
utilize the corrective post-edits to modify labels associated with strings used to train a translation quality estimation system; and
automate a modification of content that is stored in a content database and that is submitted to the machine translation system for translation, the modification based on the content improvement post-edits.

US Pat. No. 10,248,648

DETERMINING WHETHER A COMMENT REPRESENTED AS NATURAL LANGUAGE TEXT IS PRESCRIPTIVE

Microsoft Technology Lice...

1. A method for classifying comments, the method comprising:receiving, by an online system, a plurality of comments provided by users associated with an organization;
inputting a first comment of the plurality of comments and a second comment of the plurality of comments to a model trained using machine learning, the model configured to assign a classification to an input comment received from a user;
determining, using the model, that the first comment is a conditionally prescriptive comment representing a prescriptive comment provided in response to a question presented to the user, and responsively assigning the first comment to a first category, wherein the prescriptive comment is a comment that specifies an action to be performed;
determining, using the model, that the second comment is an unconditionally prescriptive comment representing a prescriptive comment that is not associated with a question presented to the user, and responsively assigning the second comment to a second category;
receiving output from the model, the output comprising indicia that the first comment is assigned to the first category and the second comment is assigned to the second category;
generating a report based on the output; andsending for presentation, results of the report.

US Pat. No. 10,248,642

POPULATING DOCUMENTS WITH USER-RELATED INFORMATION

Microsoft Technology Lice...

1. A method, implemented on a computing device, comprising:searching a template to identify information identifiers comprised in the template and associated with information fields of the template, the information identifiers associated with respective types of user-based information;
connecting to a social network by providing authorization information to the social network using an application programming interface (API);
retrieving user-based information corresponding to the types of user-based information associated with the information identifiers from a user profile of a single individual identified in the social network using the API;
generating an electronic document specific to the single individual by populating information fields of the template using the user-based information; and
providing, for display via a client-agnostic platform, the electronic document to one or more individuals associated with the single individual.

US Pat. No. 10,248,638

CREATING FORMS FOR HIERARCHICAL ORGANIZATIONS

FUJI XEROX CO., LTD., Mi...

1. An information input system comprising:at least one hardware processor configured to implement:
an information input field display section that displays an information input field for inputting information for each of a plurality of persons inputting information;
a specified problem input field display section that displays a specified problem input field for inputting a character string indicating a specified problem with respect to the input information for a problem-specifying person who is different from the plurality of persons inputting information, wherein the specified problem input field display section is configured to receive the character string in the specified problem input field of a user interface in a same window also displaying previously input information in the information input field;
a recording section that associates and records character string information with the information input field in response to an input of the character string being received from the problem-specifying person; and
a guidance display section that controls display, as input guidance, of at least one character string information item, which is recorded by the recording section, along with the information input field, in response to a request for display of the information input field being received from any one of the plurality of persons inputting information,
wherein the specified problem input field display section displays the specified problem input field side by side with the previously input information in the same window.

US Pat. No. 10,248,635

METHOD FOR INSERTING CHARACTERS IN A CHARACTER STRING AND THE CORRESPONDING DIGITAL SERVICE

MYSCRIPT, Nantes (FR)

1. A character input method performed by a computing device comprising:a processor; and
a touchscreen display device that is operably connected to the processor, the touchscreen display device comprising an interactive user interface including:
an input surface for inputting characters; and
an output surface for displaying characters, the output surface comprising a recognition area and an insertion area that are adjacent to each other, the method comprising:
firstly displaying, by the processor, a string of characters using the recognition area and the insertion area as a display region for the firstly displaying;
in response to detecting, by the touchscreen display device, an interaction of a user with the input surface, selecting a position within the string of characters between a first character and a second character displayed on the output surface, the second character being consecutive to the first character within the string of characters;
secondly displaying, by the processor, in the recognition area, a first part of the string of characters ending with the first character, while masking, in the insertion area, a second part of the string of characters starting with the second character;
detecting, by the touchscreen display device, at least one input stroke entered manually in the insertion area;
converting, by the processor and using handwriting recognition, the at least one input stroke into at least one recognised character;
inserting, at the selected position within the string of characters, the at least one recognised character; and
firstly scrolling, by the processor, the string of characters in the recognition area by moving the string of characters in a first direction to display, in the recognition area, at least part of the at least one recognised character that was inserted into the string of characters.

US Pat. No. 10,248,632

OPTIMIZATION FOR RENDERING WEB PAGES

International Business Ma...

1. A method for rendering a web page, comprising:parsing a Hypertext Markup Language (HTML) document for a web page to generate a Document Object Model (DOM) tree;
caching data for rendering a first portion of a plurality of elements in the DOM tree based on an analysis of user operations on the web page;
rendering the plurality of elements in the DOM tree in a higher-to-lower sequence based on their z-index attributes from a style sheet corresponding to the HTML document, wherein rendering the plurality of elements includes using the cached data to perform layout computing and painting of the first portion of the plurality of elements; and
skipping rendering for an element with a lower z-index attribute than an element with a higher z-index attribute if the element with the lower z-index attribute is below the element with the higher z-index attribute and would not be seen by a user viewing the web page.

US Pat. No. 10,248,631

SYSTEM AND METHOD OF PRESENTING MEDIA DATA

Amazon Technologies, Inc....

1. A system comprising:a processor; and
memory storing computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising:
causing display of one or more first items offered by an online retailer via a graphical user interface (GUI), the one or more first items being identified responsive to a search query;
causing display of media data having content and being associated with a time index for playback of the media data via the GUI;
causing the media data to be played via the GUI;
receiving a first event message associated with a first time of the time index;
based at least in part on the first event message, modifying the GUI by:
removing the one or more first items from display via the GUI at the first time and causing display of one or more second items via the GUI, the one or more second items associated with the content of the media data at the first time of the time index;
receiving a second event message associated with a second time of the time index;
after causing the one or more second items to be displayed and based at least in part on the second event message, modifying the GUI by removing the search results of the one or more second items from display via the GUI;
in response to removing the one or more second items, causing display of the one or more first items via the GUI; and
causing the media data to be played via the GUI at a third time of the time index.

US Pat. No. 10,248,625

ASSURANCE-ENABLED LINDE BUZO GRAY (ALBG) DATA CLUSTERING

Tata Consultancy Services...

1. A method for Assurance-enabled Linde Buzo Gray (ALBG) data clustering-based segmentation, the method comprising:obtaining, by a processor, a user model data from a database available to the processor, the user model data having data elements represented by a plurality of data points in a multi-dimensional space, wherein the data elements correspond to features and feature values associated with users;
obtaining, by the processor, a segmented data output comprising clusters of the user model data of the users, wherein the data elements that belong to a same cluster are as similar as possible and the data elements of each cluster are as dissimilar as possible to the data elements of other clusters;
determining, by the processor, validity of the segmented data output against pareto validity check;
in response to determining the validity of the segmented data output, iteratively segmenting, by the processor, the data elements of the user model data into segmented clusters based on an accuracy cluster criterion, till the segmented clusters are determined valid against pareto validity check;
storing, by the processor, the segmented clusters resulting from the iteratively segmenting as the segmented data output in the database;
performing, by the processor, qualitative assurance of the segmented data output to ensure that each of the data elements is correctly assigned to the segmented clusters; and
storing, by the processor, the qualitative assured segmented data output as a result of the qualitative assurance.

US Pat. No. 10,248,620

DATABASE TABLE COLUMN ANNOTATION

ENTIT SOFTWARE LLC, Sunn...

1. A method for database constraint generation, the method comprising:receiving data related to a table in a database;
analyzing the data to determine a row count for a column of the table;
analyzing the data to determine a number of distinct values for the column of the table;
determining a comparison value by comparing the row count to the number of distinct values;
determining if the comparison value is within a threshold; and
if the comparison value is within the threshold, adding, by a processor, an annotation to the column specifying a soft-unique constraint for the column,
wherein the soft-unique constraint indicates the column is considered unique during a cardinality estimation process involving the table, and further indicates to restrict enforcement of a unique property of the column upon data insertions or updates to the column.

US Pat. No. 10,248,618

SCHEDULING SNAPSHOTS

EMC IP Holding Company LL...

1. A computer-implemented method, comprising:receiving statistics data representing historic performance statistics over a predetermined period of time by a storage system, the historic performance statistics including resource consumption of a plurality of resources including at least one of a processor, memory, input-output (IO) transactions, and network bandwidth;
performing an analysis, by an analysis module executed by a processor, on the historic performance statistics to determine an optimal time window within the predetermined time period for taking a snapshot of data stored on the storage system based on the analysis, wherein performing an analysis on the historic performance statistics comprises assigning a weight factor for each resource for each point in time over the predetermined time period during which the historic performance statistics were collected, ranking each resource based on its resource consumption in view of its corresponding weight factor for each point in time over the predetermined time period, calculating a standard mean value and a standard deviation value based on resource rankings of sample points in time for each of a plurality of time window candidates, and selecting a time window from the time window candidates for taking snapshot, such that during the selected time window the standard mean value is within a first predetermined range while the standard deviation is within a second predetermined range; and
scheduling, by a scheduler executed by the processor, the snapshot according to the optimal time window.

US Pat. No. 10,248,615

DISTRIBUTED PROCESSING IN A NETWORK

Harman International Indu...

1. A computing system comprising:a main host processor including multiple processing cores and a shared on-chip memory accessible by each of the multiple processing cores; and
an Ethernet hardware subsystem communicatively coupled to the main host processor via a direct memory access (DMA) subsystem, the DMA subsystem configured to route data from the Ethernet hardware subsystem to one or more of the multiple processing cores,
wherein the main host processor includes a digital signal processing core and an Audio/Video Bridging (AVB) audio processing core, and wherein the digital signal processing core is adapted to maintain a media clock and send precision time protocol (PTP) data to the AVB audio processing core; and
wherein the main host processor includes an application processor and one or more sub-processors, and wherein the AVB audio processing core is adapted to send the precision time protocol (PTP) data to the application processor.

US Pat. No. 10,248,614

GENERATING SEGMENTED NOTIFICATIONS IN A VIRTUAL SPACE

Kabam, Inc., San Francis...

1. A system for facilitating segmented notifications based on user parameters in a virtual space in which an online game takes place, the system comprising:one or more physical processors configured by machine-readable instructions to:
execute an instance of a virtual space in which the online game takes place, facilitate presentation of views of the virtual space to users through client computing platforms that are associated with the users and operatively linked to the system via a network, and enable user interactions with the virtual space and/or other users by receiving and executing commands from the users, wherein interactions between the users are supported through communications exchanged within the virtual space;
manage user accounts associated with the individual users, the user accounts including:
(i) external communication media preferences, wherein the external communication media preferences define one or more electronic communication media external to the virtual space through which individual users prefer to receive notifications, and wherein the external communication media preferences are associated with the individual users, and
(ii) user parameters related to the individual users such that the user accounts include accounts associated with a first set of one or more users having a first user parameter value for a first user parameter, and accounts associated with a second set of one or more users having a second user parameter value for the first user parameter,
wherein the first user parameter represents spending information related to spending by an individual user within the virtual space, wherein the spending information includes one or more of a spend rate by the individual user that reflects an average amount spent by the individual user within the virtual space per a real-world unit of time, a total spend amount by the individual user, average spending by the individual user during one or more predetermined periods, and spending by the individual user during certain events within the virtual space,
wherein the first and second user parameter values are distinct and separate from each other;
automatically generate the notifications that convey information to encourage the users to participate in the virtual space and include information about events and/or activities within the virtual space that the users could have participated in without receiving the notification, the notifications being generated based on user parameter values of the user parameters related to the individual users the notifications are intended for and will be transmitted to, such that a first notification is generated for the first set of one or more users based on the first user parameter value, and a second notification is generated for second set of one or more users based on the second user parameter value, wherein the first and second notifications are separate and distinct from each other in content; and
effectuate transmissions of the notifications through the one or more electronic communication media external to the virtual space such that the first notification is transmitted to the first set of one or more users and the second notification is transmitted to the second set of one or more users, wherein transmissions of the notifications to the individual users use the one or more electronic communication media external to the virtual space in accordance with the external communication media preferences per individual user.

US Pat. No. 10,248,612

INTERNAL SERIAL INTERFACE

Skyworks Solutions, Inc.,...

1. A communications interface device comprising:a radio frequency front end configured to receive input data signals and a first clock signal;
a serial interface configured to receive data signals from the radio frequency front end and that includes a transmit block that provides data and enable signals to at least one receive block, the receive block being associated with a component other than the radio frequency front end; and
a clock generator configured to be enabled by the radio frequency front end to provide a second clock signal when data is to be transmitted via the interface so that the transmit block of the serial interface receives the second clock signal, the clock generator being activated by the radio frequency front end when data received by the radio frequency front end indicates that the data being provided to the at least one receive block has changed, the clock generator configured to provide a clock signal and a transmit signal to the transmit block of the interface when enabled by the radio frequency front end, and the clock generator and the transmit block being disabled when the data has been transmitted.

US Pat. No. 10,248,607

DYNAMIC INTERFACE PORT ASSIGNMENT FOR COMMUNICATION TRANSACTION

Amazon Technologies, Inc....

1. A device comprising:a first interface port and a second interface port for communication with a plurality of processors; and
a controller communicatively coupled to the first interface port and to the second interface port and configured to:
determine, for a transaction with at least a first processor of the plurality of processors, at least one of a function or a transaction attribute;
assign the first interface port and the second interface port to the at least one of the function or the transaction attribute; and
transmit, based on the assignment, a request for the transaction using at least one of the first interface port or the second interface port to the first processor of the plurality of processors.

US Pat. No. 10,248,595

VIRTUAL MACHINE MONITOR INTERRUPT SUPPORT FOR COMPUTER PROCESSING UNIT (CPU)

Infineon Technologies AG,...

1. A system, comprising:a processor component comprising a plurality of virtual machines (VMs) and a virtual machine monitor (VMM)/hypervisor configured to control the plurality of VMs, wherein the processor component is configured to:
receive a plurality of interrupt requests that correspond to one or more of: the VMM/hypervisor or the plurality of VMs; and
determine whether to grant an interrupt request of the plurality of interrupt requests to the VMM/hypervisor and the plurality of VMs based on a set of predetermined criteria,
wherein the processor component is further configured to determine current statuses of interrupt priority schemes at the VMM/hypervisor and the plurality of VMs as part of the set of predetermined criteria.

US Pat. No. 10,248,593

TECHNIQUES FOR HANDLING INTERRUPTS IN A PROCESSING UNIT USING INTERRUPT REQUEST QUEUES

International Business Ma...

1. A processing unit for a multithreaded data processing system, the processing unit comprising:an interrupt source controller (ISC); and
an interrupt presentation controller (IPC) coupled to the ISC, wherein the IPC is configured to:
receive an event notification message (ENM), wherein the ENM specifies an event target number and a number of bits to ignore;
in response to a slot being available in an interrupt request queue of the data processing system,
enqueue the ENM in the slot; and
in response to the ENM being dequeued from the interrupt request queue, determine a group of virtual processor threads that may be potentially interrupted based on the event target number and the number of bits to ignore specified in the ENM, wherein the event target number identifies a specific virtual processor thread and the number of bits to ignore identifies a positive, integer number of lower-order bits to ignore with respect to the specific virtual processor thread when determining a group of virtual processor threads that may be potentially interrupted.

US Pat. No. 10,248,588

FRAME RECEPTION MONITORING METHOD IN SERIAL COMMUNICATIONS

LSIS CO., LTD., Anyang-s...

1. A frame reception monitoring method in serial communications, the method comprising:when a plurality of sub-frames constituting a frame is each entered into a reception buffer at certain time intervals, assigning timestamps to the plurality of sub-frames respectively, and allowing the respective sub-frames to be stored on a temporal buffer;
allowing the plurality of sub-frames stored on the temporal buffer to be entered into a service buffer within a predetermined inter-sub-frames time-out time;
using the plurality of sub-frames entered into the service buffer to generate a combined frame; and
using the combined frame to execute a control.

US Pat. No. 10,248,587

REDUCED HOST DATA COMMAND PROCESSING

SanDisk Technologies LLC,...

1. A storage system comprising:a buffer configured to store host data responsive to the host data being received from a host over a bus;
a backend memory for data storage;
a processor; and
a Direct Memory Access (DMA) circuit configured to copy data to the backend memory independently of the processor, the DMA circuit comprising:
a data generator configured to generate the host data responsive to the host data not being received from the host, wherein the DMA circuit is configured to:
copy the host data generated by the data generator to the backend memory independently of the processor responsive to the host data not being received from the host; and
copy the host data in the buffer to the backend memory independently of the processor responsive to the host data being received from the host; and
a metadata generator configured to:
generate the metadata from the host data that is in the buffer responsive to the host data being received from the host; and
generate the metadata from the host data that is generated by the data generator responsive to the host data not being received from the host.

US Pat. No. 10,248,586

INFORMATION PROCESSING APPARATUS AND DATA TRANSFER METHOD

Canon Kabushiki Kaisha, ...

1. An information processing apparatus comprising:a first chip;
a second chip; and
a third chip,
wherein the first chip, the second chip, and the third chip are connected in series, wherein the second chip includes
a receiving unit configured to receive, from the first chip, data and address information attached to the data,
a register configured to store address translation information,
a determination unit configured to determine whether the address information attached to the data received by the receiving unit corresponds to an address translation area based on the address translation information set to the register,
an address translation unit configured to translate the address information attached to the data received by the receiving unit and output the translated address information to an internal bus with the data received by the receiving unit,
a controller unit configured to control to store, in a memory for the second chip, data to which address information corresponding to an address area set for the second chip is attached among the data received from the address translation unit via the internal bus, and
a transmission unit configured to transmit, to the third chip, data to which address information corresponding to an address area set for transfer to the third chip is attached among the data received from the address translation unit via the internal bus,
wherein the address translation unit translates address information corresponding to an address area set for the second chip into an address destination in the second chip.

US Pat. No. 10,248,585

SYSTEM AND METHOD FOR FILTERING FIELD PROGRAMMABLE GATE ARRAY INPUT/OUTPUT

Oracle International Corp...

1. A method comprising:receiving a Field Programmable Gate Array (FPGA) program bitstream;
generating, based at least in part on the FPGA bitstream, FPGA programming logic segments;
modifying, based at least in part on the FPGA programming logic segments, an FPGA to comprise a core logic layer and a filtering layer;
receiving, by the filtering layer, Input/Output (I/O) associated with the core logic layer;
modifying, based at least in part on the filtering layer, the I/O associated with the core logic layer;
that the
sampling the I/O associated with the core logic layer to generate a sampled I/O;
receiving, at a processor, a timestamp from the FPGA associated with the sampled I/O;
receiving, at the processor, an interrupt signal associated with the FPGA; and
in response to receiving the interrupt signal, correlating the sampled I/O and the timestamp with an Epoch time of the processor.

US Pat. No. 10,248,567

CACHE COHERENCY FOR DIRECT MEMORY ACCESS OPERATIONS

Hewlett-Packard Developme...

1. A non-transitory computer readable storage medium comprising instructions that, when executed, cause a processor to at least:receive, from a direct memory access controller, an interrupt associated with a direct memory access operation; and
handle the interrupt via the processor to maintain cache coherency based on a direction of the direct memory access operation, the interrupt generated by the direct memory access controller and comprising the direction, wherein the direction of the direct memory access operation includes:
a direct memory access operation from a memory to a peripheral; or
a direct memory access operation from the peripheral to the memory;
wherein the direct memory access controller is to execute the direct memory access operation.

US Pat. No. 10,248,557

SYSTEMS AND METHODS FOR DELAYED ALLOCATION IN CLUSTER STORAGE

Veritas Technologies LLC,...

10. A system for delayed allocation in cluster storage, the system comprising:a delegation module, stored in memory, that delegates, to a node attached to a storage cluster comprising at least one storage device that comprises a plurality of allocation units, a subset of the allocation units on the storage cluster to be held as a delayed allocation pool;
a communication module, stored in memory, that receives, from the node, a request to allocate a number of allocation units on the storage cluster;
an adjustment module, stored in memory, that deducts the number of allocation units from a number of available allocation units in the delayed allocation pool, wherein the adjustment module:
maintains, for the node, a measurement of a rate at which the node requests allocation units on the storage cluster;
compares the allocation request rate for the node to the number of allocation units held in the delayed allocation pool; and
adjusts the number of allocation units in the delayed allocation pool by delegating additional allocation units to the delayed allocation pool or relinquishing a delegation of allocation units to the delayed allocation pool based at least in part on the comparison;
an allocation module, stored in memory, that satisfies the allocation request by allocating allocation units not included in the delayed allocation pool before allocating allocation units included in the delayed allocation pool, wherein the adjustment module recalculates, based on the number of allocation units in the delayed allocation pool used to satisfy the allocation request, the number of available allocation units in the delayed allocation pool; and
at least one physical processor configured to execute the delegation module, the communication module, the adjustment module, and the allocation module.

US Pat. No. 10,248,555

MANAGING AN EFFECTIVE ADDRESS TABLE IN A MULTI-SLICE PROCESSOR

International Business Ma...

8. A computing system, the computing system including a multi-slice computer processor for managing an effective address table (EAT), the multi-slice computer processor configured for:receiving, by EAT management logic of an instruction fetch unit from an instruction sequence unit, a next-to-complete instruction tag (ITAG);
obtaining, from the EAT, a first ITAG from a tail-plus-one EAT row, wherein the EAT comprises a tail EAT row that precedes the tail-plus-one EAT row, and wherein each EAT row comprises a starting effective address, an ending effective address, and a first ITAG in a range of ITAGs assigned to internal operations generated from processor instructions stored at a range of effective addresses defined by the starting effective address and the ending effective address;
determining, based on a comparison of the next-to-complete ITAG and the first ITAG, that the tail EAT row has completed; and
retiring the tail EAT row based on the determination, thereby retiring one or more effective addresses of the tail EAT row, wherein retiring the tail EAT row further comprises freeing a range of ITAGs associated with the tail EAT row for reassignment to newly decoded instructions.

US Pat. No. 10,248,554

EMBEDDING PROFILE TESTS INTO PROFILE DRIVEN FEEDBACK GENERATED BINARIES

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:specifying, by a processor, one or more test cases to be embedded into a compiled binary file, wherein the one or more test cases relate to at least a portion of a computer program representing a compilation unit and further wherein the compiled binary file is generated by a profile driven feedback compiler;
executing, by the processor, the one or more embedded test cases under the computer program;
gathering, by the processor, performance data associated with the computer program as the one or more embedded test cases are executed, wherein the gathered performance data associated with the computer program includes histograms for basic blocks executed and branches taken by the computer program;
recompiling, by the processor, the compilation unit based on the performance data; and
linking, by the processor, the computer program based on the performance data.

US Pat. No. 10,248,551

SELECTIVE OBJECT TESTING IN A CLIENT-SERVER ENVIRONMENT

International Business Ma...

1. A method for testing objects in a client-server environment, the method comprising:receiving, by one or more computer processors, a plurality of proposed modifications to a baseline set of objects stored in a repository collectively submitted by a plurality of members of a first group of users and a plurality of members of a second group of users, wherein the baseline set of objects includes a set of server modules comprising at least one application server node;
registering, by one or more computer processors, each modification of the plurality of proposed modifications with a user identifier corresponding to the user proposing the modification;
receiving, by one or more computer processors, instructions to test the baseline set of objects with modifications that correspond to the first group of users, wherein receiving includes determining whether any of the users in the first group of users previously registered at least one of the plurality of proposed user modifications to the baseline set of objects by inspecting a unique folder associated with each user in the first group of users to determine whether any users previously submitted the proposed user modifications;
determining, by one or more computer processors, which of the baseline set of objects stored in the repository are subject to the modifications that correspond to the first group of users; and
executing, by one or more computer processors, the baseline set of objects and incorporating the modifications that correspond to the first group of users without incorporating modifications that correspond to the second group of users and without committing the plurality of proposed modifications to the baseline set of objects stored in the repository and;
instantiating, by one or more computer processors, an instance of the at least one application server node having at least one modification not made to the at least one application server node of the baseline set of objects, wherein the instance is inaccessible to the second group of users.

US Pat. No. 10,248,550

SELECTING A SET OF TEST CONFIGURATIONS ASSOCIATED WITH A PARTICULAR COVERAGE STRENGTH USING A CONSTRAINT SOLVER

Oracle International Corp...

1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of a set of operations, comprising:identifying a set of test parameters for testing a target application;
identifying, for each test parameter of the set of test parameters, a respective set of candidate values for the test parameter;
identifying a set of candidate test configurations, each associated with a respective combination of candidate values for the set of test parameters;
identifying a desired coverage strength;
identifying subgroups of test parameters, from the set of test parameters, each of the subgroups of test parameters including a number of test parameters that is equal to the desired coverage strength;
identifying a set of interactions, wherein:
each interaction is associated with one of the subgroups of test parameters;
each interaction is associated with a respective combination of candidate values for the associated subgroup of test parameters; and
the set of interactions covers every possible combination of candidate values for each of the subgroups of parameters;
specifying a selection variable, indicating which of the set of candidate test configurations have been selected;
specifying a set of one or more constraints that:
minimizes a cost of testing the target application using a subset of the set of candidate test configurations that is selected based on the selection variable; and
requires each of the set of interactions to be covered by at least one of the subset of the set of candidate test configurations that is selected based on the selection variable;
storing a data model, applicable to a constraint solver, comprising:
the selection variable; and
the set of constraints;
wherein the target application is executed using at least one of the subset of the set of candidate test configurations that is selected based on the selection variable.

US Pat. No. 10,248,541

EXTRACTION OF PROBLEM DIAGNOSTIC KNOWLEDGE FROM TEST CASES

International Business Ma...

1. A method comprising:identifying a first set of log entries generated during a first execution of an application code in a first scenario, wherein each log entry in the first set of log entries corresponds to a set of lines of code in the application code;
creating a first rule based, at least in part, on a first order of the first set of log entries, wherein the first order is based on a first chronological order;
identifying a second set of log entries generated during a second execution of the application code in a second scenario; and
determining the second set of log entries partially satisfies the first rule;
wherein:
at least determining the second set of log entries partially satisfies the first rule is performed by computer software running on computer hardware.

US Pat. No. 10,248,540

BIFURCATING A MULTILAYERED COMPUTER PROGRAM PRODUCT

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for debugging a computer program product, the method comprising:receiving an identifier of a portion of code from a first module of the computer program product, wherein the portion of code contains a defect, the computer program product comprising a plurality of modules, each module being associated with a development team identifier that indicates which development team developed the module;
determining, based on the development team identifier, and displaying a list of execution scenarios that invoke the portion of code from the first module, an execution scenario in the list invokes computer code only from a set of modules that are associated with the development team identifier of the first module; and
in response to receipt of a selection of a first execution scenario from the list of execution scenarios, executing the computer program product according to the first execution scenario by executing only the computer code from the set of modules that are associated with the development team identifier of the first module.

US Pat. No. 10,248,539

MANAGING SOFTWARE PERFORMANCE TESTS BASED ON A DISTRIBUTED VIRTUAL MACHINE SYSTEM

INTERNATIONAL BUSINESS MA...

1. A method, comprising:in response to determining a debugging state of a software system running on a virtual machine (VM), controlling timing of a system clock of the VM;
intercepting a data packet sent to the VM from another VM, and extracting from the data packet an added system time and a reference time indicative of when the data packet is sent by the other VM;
based on the system time and the reference time of when the data packet is sent out by the other VM and a reference time of when the data packet is intercepted, calculating a timing at which the data packet is expected to be received by the VM; and
forwarding the data packet to the VM as a function of a comparison result of the timing at which the data packet is expected to be received by the VM and a system time of the VM when the data packet is intercepted;
wherein in response to intercepting a data packet sent from the VM to the other VM, parsing an address of the VM from the data packet sent to the other VM from the VM;
obtaining a system time and a reference time of the VM when sending the data packet to the other VM according to the address of the VM; and
adding the system time and the reference time of the VM when sending the data packet to the other VM in the data packet sent to the other VM from the VM.

US Pat. No. 10,248,538

CONTROLLER OF SEMICONDUCTOR MEMORY DEVICE FOR DETECTING EVENT AND STORING EVENT INFORMATION AND OPERATING METHOD THEREOF

SK hynix Inc., Gyeonggi-...

1. A controller for controlling a semiconductor memory device, the controller comprising:an event occurrence detection unit configured to detect whether an event occurs;
an event information generation unit configured to generate event information, in response to the detected result; and
a command generation unit configured to generate a command for storing the event information in the semiconductor memory device,
wherein the semiconductor memory device includes a memory cell array configured to perform a program operation of storing data,
wherein the event includes a time-out event that occurs when the program operation is performed in the semiconductor memory device, and is detected when a monitoring signal does not exist for a time-out time and a value of a data length counter is not a predetermined value, and
wherein the monitoring signal periodically inputted for every set time is continuously inputted for the time-out time, and the value of the data length counter is a value for counting data input to the semiconductor memory device.

US Pat. No. 10,248,537

TRANSLATION BUG PREDICTION CLASSIFIER

Microsoft Technology Lice...

1. A translation system, comprising:a memory configured to store a translation bug prediction model and a translation resource; and
a processing core having at least one processor configured to apply a translation bug prediction model to the translation resource to calculate a successful score for the translation resource, calculate an unsuccessful score for the translation resource, identify a potential error source based on the successful score and the unsuccessful score, and execute an automatic translation of the translation resource to create a translation target,
wherein the successful score for the translation resource and the unsuccessful score for the translation resource are based on whether a previous translation was corrected.

US Pat. No. 10,248,534

TEMPLATE-BASED METHODOLOGY FOR VALIDATING HARDWARE FEATURES

International Business Ma...

1. A method comprising:creating a workload pool including a plurality of workloads;
receiving a definition of a test thread including: (i) a test block of instructions for testing functionality of a processor, and (ii) a first workload hook in the form of a callback function identifying a first workload of the plurality of workloads;
executing, by the processor, a test thread according to the test thread definition, with the execution of the test thread including:
responsive to encountering the first workload hook, performing the callback function of the first workload hook,
responsive to performance of the callback function, retrieving the first workload from the workload pool,
responsive to the retrieval of the first workload, performing the first workload by executing the test block of instructions to obtain first test results; and
communicating the test results to a user to test at least some of the functionality of the processor;
wherein the use of the callback function of the first workload hook and the retrieval of the first workload from the workload pool decouples a definition of the test thread from the first workload performed by the test thread to obtain the first test results.

US Pat. No. 10,248,532

SENSITIVE DATA USAGE DETECTION USING STATIC ANALYSIS

Amazon Technologies, Inc....

1. A system, comprising:a plurality of computing devices configured to implement a sensitive data detection system and a service-oriented system, wherein the service-oriented system comprises a plurality of services including a particular service, and wherein the sensitive data detection system is configured to:
retrieve a service model specifying one or more operations exposed by the particular service, wherein the service model is retrieved based at least in part on a name of the particular service;
extract names of the one or more operations from the service model;
extract names of one or more parameters of the one or more operations from the service model;
identify one or more sensitive operations among the one or more operations, wherein the names of the one or more operations and the names of the one or more parameters are checked against a dictionary of sensitive terms;
identify one or more consumers of the particular service using a metadata repository, wherein the metadata repository specifies a dependency of the one or more consumers on one or more client-side packages of the particular service;
identify one or more of the sensitive operations called by the consumers in source code for the one or more consumers, wherein the source code for the one or more consumers is retrieved from a source code repository; and
responsive to identification of a particular called sensitive operation, implement one or more security measures to enhance security of data to be processed by the particular called sensitive operation, wherein the one or more security measures include at least one of:
generation of a directed graph representing flow of sensitive data through one or more of the services, wherein the data to be processed by the particular sensitive operation comprises the sensitive data,
modification of source code of the service, or
migration of the service from a current deployment environment to another deployment environment that is more secure than the current deployment environment.

US Pat. No. 10,248,524

INSTRUCTION AND LOGIC TO TEST TRANSACTIONAL EXECUTION STATUS

Intel Corporation, Santa...

1. A system comprising:a plurality of processors comprising a plurality of multithreaded cores, wherein one or more of the multithreaded cores are to perform out-of-order instruction execution for a plurality of threads, and wherein the one or more of the multithreaded cores comprise:
instruction fetch logic to fetch a plurality of instructions of one or more of the threads,
an instruction decode unit to decode the instructions,
register renaming logic to rename one or more registers for the instructions within a register file,
an instruction cache to cache one or more of the instructions to be executed,
a data cache to cache data for the instructions,
a level 2 (L2) cache unit to cache one or more of the instructions and data for the instructions,
checkpoint logic to checkpoint an architectural state responsive to a first instruction among the instructions to initiate a transactional execution region comprising transactional memory operations,
transaction tracking logic to determine whether the transactional memory operations of the transactional execution region result in a conflict, wherein the transaction tracking logic is to adjust one or more flags responsive to a determination that a conflict exists,
an execution unit to execute a second instruction among the instructions to test a status of the transactional execution region, wherein, to execute the second instruction to test the status of the transactional execution region, the execution unit is further to determine that the second instruction is within a context of the transactional execution region and, in response, set a flag register to a value indicating that the second instruction is within the context of the transactional execution region, and
logic to atomically commit the transactional memory operations following a determination that no conflict exists or to roll back to the checkpointed architectural state following the determination that the conflict exists;
a processor interconnect to communicatively couple two or more of the processors; and
a system memory comprising a dynamic random access memory communicatively coupled to one or more of the processors.

US Pat. No. 10,248,520

HIGH SPEED FUNCTIONAL TEST VECTORS IN LOW POWER TEST CONDITIONS OF A DIGITAL INTEGRATED CIRCUIT

Oracle International Corp...

1. A method for functional testing of a microelectronic circuit, the method comprising:loading an initial test value into the microelectronic circuit through one or more inputs to the microelectronic circuit, the microelectronic circuit comprising a plurality of logic stages;
conducting a first portion of a functional test by transmitting a first clock signal to the microelectronic circuit, the first clock signal comprising one or more pulses of a first clock signal and one or more first delay periods, the first clock signal configured to test a first subset of the plurality of logic stages at an operational frequency of the microelectronic circuit;
storing a result of the first portion of the functional test in a memory device;
initializing the microelectronic circuit by reloading the initial value into the microelectronic circuit through the one or more inputs;
conducting a second portion of the functional test by transmitting a second clock signal to the microelectronic circuit, the second clock signal comprising at least one offsetting clock pulse, one or more pulses of a second clock signal and one or more second delay periods, the second clock signal configured to test a second subset of the plurality of logic stages at the operational frequency of the microelectronic circuit, the second subset of the plurality of logic stages different than the first subset, the one or more first delay periods of the first clock signal and the one or more second delay periods of the second clock signal causing a charge for one or more components of the microelectronic circuit to replenish; and
comparing the stored result from the first portion and a result from the second portion to an expected result.

US Pat. No. 10,248,519

INPUT DEVICE TEST SYSTEM AND METHOD THEREOF

PRIMAX ELECTRONICS LTD., ...

1. A mouse device test system, configured to test a mouse device having a plurality of functional elements and the functional elements comprise a left key, a right key, a capacitance detector, or an optical detector, wherein the mouse device test system comprises:a test host, configured to execute a test program and a message interception program, and output a test message by means of the test program, wherein the test message comprising testing the left key, the right key, or the optical detector; and
a test platform, configured to receive the test message and operate the mouse device according to the test message, wherein the mouse device outputs a response message to the test host in response to the operation, wherein the test platform is a mechanical arm or a striking head, and when the test message comprises testing the left key or the right key, the striking head strikes the left key or the right key and when the test message comprises testing the optical detector, the mechanical arm moves the mouse device towards a preset direction at a preset speed, wherein
the message interception program is used to intercept the response message and convert the response message into at least one code, and the test program determines whether the at least one code is consistent with the test message.

US Pat. No. 10,248,513

CAPACITY MANAGEMENT

International Business Ma...

1. A computer-implemented method comprising:receiving system information, pertaining to a storage backup environment, wherein the storage backup environment comprises a client computer system and a backup server;
calculating a compression ratio of the storage on the backup server and a backup ratio between an amount of data on the client computer system and an amount of data on the backup server;
calculating an average amount of storage consumed on the backup server per unit of storage on the client computer system based, at least in part, on the calculated backup ratio and the calculated compression ratio; and
determining an existing backup capacity for the storage backup environment by identifying an amount representing the actual capacity of data capable of being stored on the backup server and reducing the amount representing the actual capacity according to the calculated average amount of storage consumed on the backup server.

US Pat. No. 10,248,508

DISTRIBUTED DATA VALIDATION SERVICE

Amazon Technologies, Inc....

1. A system, comprising:a relational data store configured to store respective data sets that are received from respective ones of a plurality of network-based services of a provider network, wherein each of the respective data sets comprises service usage metrics for a respective one of the plurality of network-based services; and
a plurality of hardware compute nodes that together implement a distributed data validation service that provides a service interface for a plurality of clients;
wherein the distributed data validation service is configured to:
receive, via the service interface from each of multiple clients of the plurality of clients, a respective validation project indicating respective one or more service metric validation rule sets corresponding to a respective one or more of the data sets;
automatically apply each of the respective one or more service metric validation rule sets to validate the service usage metrics of the respective ones of the one or more data sets according to a dynamically determined schedule for the automatic application of each of the respective one or more service metric validation rule sets,
wherein the one or more service metric validation rule sets comprise one or more rules for identifying one or more errors in the service usage metrics included in the data set being validated, wherein the one or more errors comprise corrupt data, lost data, or erroneously modified data,
wherein the distributed data validation service is configured to assign different ones of the service metric validation rule sets to different task workers implemented on different ones of the hardware compute nodes of the distributed data validation service according to the dynamically determined schedule to validate the one or more data sets;
detect at least one reporting event based on identifying one or more errors in the service usage metrics included in one or more of the respective ones of the data sets being validated, wherein the at least one reporting event corresponds to a particular service metric validation rule set of the respective one or more service metric validation rule sets, wherein the one or more errors comprise corrupt data, lost, data, or erroneously modified data;
in response to the detection of the at least one reporting event, perform a responsive action as indicated by the particular service metric validation rule set,
wherein the system is configured to perform subsequent analysis, aggregation, or reporting of the service usage metrics included in the one or more data sets that have been validated.

US Pat. No. 10,248,505

ISSUE ESCALATION BY MANAGEMENT UNIT

INTERNATIONAL BUSINESS MA...

1. A method for use in a distributed storage network (DSN) including at least one DSN memory including a plurality of storage units storing encoded data slices, the method comprising:monitoring a health status of the DSN using at least one processor and associated memory included in the DSN, wherein monitoring the health status includes:
obtaining first status information indicating a first operational status of the at least one DSN memory at a first point in time, the first operational status indicating one or more first operational issues;
obtaining second status information indicating a second operational status of the at least one DSN memory at a second point in time, the second point in time being later than the first point in time, the second operational status indicating one or more second operational issues;
comparing the first operational status to the second operational status to identify outstanding operational issues, wherein an outstanding operational issue is an operational issue indicated in both the first status information and the second status information;
mapping each of the outstanding operational issues to an impact category;
monitoring a health status of one or more management units included in the DSN;
determining a number of remaining management units capable of monitoring the health status of the DSN;
determining an escalation level for particular outstanding operational issues based, at least in part, on the impact category mapped to the particular outstanding operation issues;
in response to determining that there is at least one remaining management unit capable of monitoring the health status of the DSN, issuing one or more notifications for the particular outstanding operational issues from the at least one remaining management unit, the one or more notifications based, at least in part, on the escalation level determined for the particular outstanding operational issues; and
in response to determining that there are no remaining management units capable of monitoring the health status of the DSN, issuing one or more notifications for the particular outstanding operational issues from the at least one DSN memory.

US Pat. No. 10,248,503

DATA STORAGE DEVICE AND OPERATING METHOD THEREOF

SK hynix Inc., Gyeonggi-...

1. A data storage device comprising:a nonvolatile memory device including a first page group coupled to a first word line and a second page group coupled to a second word line, which is subsequent to the first word line in order of a write operation; and
a controller suitable for, after an abnormal power-off during or after a write operation to the first page group, copying a first data stored in a weak page of the first page group to a stable page of the second page group when a first error correction operation to data stored in the first page group is a success, wherein the stable page is a different type of page than the weak page.

US Pat. No. 10,248,502

CORRECTING AN ERROR IN A MEMORY DEVICE

International Business Ma...

1. A method of correcting an error in a memory device, the method comprising:using a temperature sensor to determine a temperature profile associated with a region of a memory device, wherein the temperature profile is one of a plurality of temperature profiles each associated with a respective region of a plurality of regions of the memory device; and
using a controller in communication with the memory device and the temperature sensor to determine a correction capability based on the thermal profile;
generating a bias vector indicative of the correction capability and communicating the bias vector to an error-correcting code (ECC) decoder; and
using the controller to correct an error in the memory region using the determined correction capability.

US Pat. No. 10,248,501

DATA STORAGE APPARATUS AND OPERATION METHOD THEREOF

SK hynix Inc., Gyeonggi-...

1. An operation method of a data storage apparatus, the method comprising:performing a first read operation using an optimal read voltage on read-failed memory cells;
performing an error correction code (ECC) decoding operation on read data read through the first read operation;
performing a second read operation using an oversampling read voltage on the read-failed memory cells when the ECC decoding operation to the read data fails;
determining whether or not potential error memory cells which are turned on through the optimal read voltage and are turned off through the oversampling read voltage are present in the read data;
determining whether or not neighboring memory cells which share a bit line with the potential error memory cells and are coupled to neighboring word lines are in an erased state by performing a read operation on the neighboring memory cells when the potential error memory cells are present; and
inverting bit values corresponding to the potential error memory cells in the read data read from the read-failed memory cells through the first read operation when the neighboring memory cells are in the erased state.

US Pat. No. 10,248,495

EVENTUAL CONSISTENCY INTENT CLEANUP IN A DISPERSED STORAGE NETWORK

INTERNATIONAL BUSINESS MA...

1. A method for execution by a dispersed storage (DS) cleanup unit of a dispersed storage network (DSN) that includes a processor, the method comprises:determining a dead session of the DSN;
generating a subset of a plurality of eventual consistency intent names by identifying ones of the plurality of eventual consistency intent names that include a session identifier corresponding to the dead session in a prefix of the ones of the plurality of eventual consistency intent names, wherein the subset of the plurality of eventual consistency intent names corresponds to all eventual consistency intents of the dead session;
determining a subset of storage units responsible for storing the all eventual consistency intents of the dead session based on the prefix of the eventual consistency intent names in the sub set;
retrieving the all eventual consistency intents of the dead session from the subset of storage units; and
facilitating execution of eventual consistency updates indicated in the all eventual consistency intents of the dead session.

US Pat. No. 10,248,491

QUANTUM COMPUTING IN A THREE-DIMENSIONAL DEVICE LATTICE

1. A method comprising:encoding information in data qubits in a three-dimensional device lattice, the data qubits residing in multiple layers of the three-dimensional device lattice, each layer comprising a respective two-dimensional device lattice;
by operation of a control system, applying a three-dimensional color code in the three-dimensional device lattice to detect errors in one or more of the data qubits residing in the multiple layers; and
by operation of the control system, applying a two-dimensional color code in the two-dimensional device lattice in each respective layer to detect errors in one or more of the data qubits residing in the respective layer,
wherein a signal delivery system transfers signals between the three-dimensional device lattice and the control system.

US Pat. No. 10,248,486

MEMORY MONITOR

Intel Corporation, Santa...

1. An integrated circuit to monitor main memory, the integrated circuit and the main memory disposed in a computer system, the integrated circuit comprising:a detection circuit to detect that the computer system enters a sleep state;
a test circuit to test whether the main memory is still installed in the computer system by attempting to read from a memory address in the main memory and determining that the main memory is no longer installed in the computer system by detecting that the memory address is inaccessible; and
a recovery circuit to perform a recovery process when the test indicates that the main memory is no longer installed in the computer system.

US Pat. No. 10,248,485

DUAL PHYSICAL-CHANNEL SYSTEMS FIRMWARE INITIALIZATION AND RECOVERY

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:operating, by a processor, first and second physical channel identifier (PCHID) devices comprised of a plurality of functional logic components, wherein one or more of the functional logic components are specific to one or more of the first and second PCHIDs and wherein one or more of the functional logic components are in common and not specific to one or more of the first and second PCHIDs;
determining, by the processor, that an error condition exists in the first PCHID or the second PCHID;
executing, by the processor, a recovery method to remove the error condition from the first PCHID or the second PCHID in which the error condition exists; and
executing, by the processor, an initialization method for both of the first and second PCHIDs.

US Pat. No. 10,248,476

EFFICIENT COMPUTATIONS AND NETWORK COMMUNICATIONS IN A DISTRIBUTED COMPUTING ENVIRONMENT

SAS INSTITUTE INC., Cary...

1. A non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to:receive an instruction to determine a measurement from observations distributed among a plurality of nodes in a distributed environment, the observations associated with a plurality of variables;
at each node of the plurality of nodes, count node-specific observations;
combine the observations across the plurality of nodes, the combining comprising, at each of the plurality of nodes:
determining a node-specific sketch for each of the variables associated with the node-specific observations, the node-specific sketch representing a summary of the observations stored at the respective node as those observations relate to each of the variables and generated by mapping the respective node's observations into a sketch vector that records frequency information relating to the respective node's observations, wherein the sketches are determined by:
(1) dividing, at the respective node, a number of the node-specific observations stored at the respective node into a number of subsets,
(2) forking, at the respective node, a plurality of threads, a number of the plurality of threads corresponding to the number of subsets,
(3) on each of the plurality of threads, reading a next observation from among the subset of node-specific observations assigned to the thread,
(4) on each of the plurality of threads, updating each sketch associated with the respective node by mapping the next observation into a sketch vector that records frequency information relating to the next observation, and
(5) repeating (3) and (4) in parallel across the plurality of threads on the respective node until each observation of the node-specific observations is read, and
storing the node-specific sketches in a node-specific sketch array;
receive a plurality of node-specific sketch arrays, each node-specific sketch array originating at a respective node in the distributed environment;
for each of the node-specific sketch arrays:
access each node-specific sketch from the node-specific sketch array, each node-specific sketch associated with a variable,
access sketch merging logic that defines how to combine multiple sketches for the variable, and
apply the sketch merging logic to merge the current node-specific sketch for the variable with a summary sketch for the variable; and
generate an approximation of the measurement using the summary sketches for the one or more variables.

US Pat. No. 10,248,472

RECURSIVE MODULARIZATION OF SERVICE PROVIDER COMPONENTS TO REDUCE SERVICE DELIVERY TIME AND COST

1. A computer-readable storage medium having instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:encapsulating a first module with a second module, wherein the first module is a virtual network function module, wherein the first module comprises service module implementation logic encapsulated behind a set of application programming interfaces of the first module and behind a set of user interfaces of the first module through which the set of application programming interfaces of the first module are callable, wherein the set of application programming interfaces of the first module comprises a first application programming interface and a second application programming interface, and wherein the second module leverages the set of application programming interfaces of the first module and the set of user interfaces of the first module to offer a set of application interfaces of the second module and a set of user interfaces of the second module in response to encapsulating the first module with the second module;
exposing, via a module controller, the set of application programming interfaces of the second module and the set of user interfaces of the second module; and
receiving, via the set of user interfaces of the second module, input to call at least a portion of the set of application programming interfaces of the second module to instantiate a module instance of the first module encapsulated by the second module, wherein the first application programming interface comprises a configuration application programming interface that collects a configuration for the module instance, and wherein the second application programming interface comprises an instance provisioning application programming interface that instantiates the module instance based upon the configuration.

US Pat. No. 10,248,471

LOCKLESS EXECUTION IN READ-MOSTLY WORKLOADS FOR EFFICIENT CONCURRENT PROCESS EXECUTION ON SHARED RESOURCES

Oracle International Corp...

1. A method for lockless access to a resource in a computing environment, comprising:exposing at least one shared resource to be accessed by two or more processing entities in the computing environment;
forming a data structure associated with the shared resource wherein the data structure comprises:
a consecutive read count value that indicates a number of consecutive read access requests to the shared resource, wherein the consecutive read access requests are successful contiguously-successive read-only access requests for the shared resources by the two or more processing entities, and
a state variable to hold a plurality of state values;
receiving, from a first one of the two or more processing entities, a shared access request to read the shared resource, the shared access request corresponding to a read-only access request;
incrementing, responsive to receiving the shared access request, the consecutive read count value; and
changing the state variable from a first state value to a second state value based at least in part on a comparison of the consecutive read count value to a threshold value, wherein the first state value indicates locks are needed to facilitate the shared access request and the second state value indicates locks are not needed to facilitate the shared access request.

US Pat. No. 10,248,464

PROVIDING ADDITIONAL MEMORY AND CACHE FOR THE EXECUTION OF CRITICAL TASKS BY FOLDING PROCESSING UNITS OF A PROCESSOR COMPLEX

INTERNATIONAL BUSINESS MA...

1. A method, comprising:maintaining a plurality of processing entities of a processor complex, wherein each processing entity has a local cache and the processor complex has a shared cache and a shared memory;
allocating one of the plurality of processing entities for execution of a critical task;
in response to the allocating of one of the plurality of processing entities for the execution of the critical task, folding other processing entities of the plurality of processing entities by stopping processing operations in the other processing entities and releasing the local cache of the other processing entities for use by the processing entity allocated for execution of the critical task, wherein prior to folding the other processing entities, currently scheduled tasks on the other processing entities are temporarily suspended;
utilizing, by the critical task, the local cache of the other processing entities that are folded, the shared memory, additional resources that are freed by folding the other processing entities, and the shared cache, in addition to the local cache of the processing entity allocated for the execution of the critical task;
in response to completion of the critical task in the processing entity that is allocated, performing an unfolding of the other processing entities to make the other processing entities operational; and
in response to performing the unfolding of the other processing entities, resuming any suspended tasks and dispatch queued tasks.

US Pat. No. 10,248,462

MANAGEMENT SERVER WHICH CONSTRUCTS A REQUEST LOAD MODEL FOR AN OBJECT SYSTEM, LOAD ESTIMATION METHOD THEREOF AND STORAGE MEDIUM FOR STORING PROGRAM

NEC Corporation, Tokyo (...

1. A management server that is connected to at least one object system, the management server comprising:a memory configured to store instructions; and
a processor configured to process the instructions to:
generate a request load model in which load information for the object system is correlated with a classification of request into which request information for the object system is classified; and
select, in a process of the classification of the request information, the classification of request to be an object for sub-classification when a reference value that is calculated from estimation distribution information about the load information for each of the classification of request is equal to or greater than a fixed value.

US Pat. No. 10,248,454

INFORMATION PROCESSING SYSTEM AND APPARATUS FOR MIGRATING OPERATING SYSTEM

FUJITSU LIMITED, Kawasak...

1. An information processing system comprising:a first server;
a second server; and
an information processing apparatus, the information processing apparatus including:
a processor configured to manage a process of causing OS (Operating System) running on the first server to run on the second server, and the first server including:
a driver configured to acquire an address of a first physical memory area allocated for running Booting OS to boot the OS on the first server during an operating status of the first server; and
a controller configured to notify the processor of the address of the first physical memory area,
the first server is a physical server,
the processor causes the Booting OS to run at a pseudo physical address corresponding to the address of the first physical memory area of the first server,
the processor causes the Booting OS to acquire control information of the processor from the OS running on the first server and to re-run the OS as a virtualized quest OS on the first server based on the control information,
the processor equalizes an address of a second physical memory area allocated for running the Booting OS on the second server to the address of the first physical memory area, and
the processor causes the OS to run on the second server by transferring the OS to the second server from the first server.

US Pat. No. 10,248,450

VIRTUAL MACHINE MIGRATION USING A PREDICTION ALGORITHM

FUJITSU LIMITED, Kawasak...

6. A virtual machine control device, comprising:a memory; and
a processor coupled to the memory and the processor configured to:
acquire usage information stored in the memory, the usage information including an actual usage value of respective virtual machines operating on each of information processing apparatuses during each of past periods, the actual usage value being an amount of a resource used by the respective virtual machines during each of the past periods;
create prediction information for each of the information processing apparatuses on basis of the acquired usage information, the prediction information including a prediction usage value of the respective virtual machines during each of periods corresponding to the past periods, the prediction usage value being an amount of the resource to be used by the respective virtual machines operating on each of the information processing apparatuses during each of the periods;
determine, upon detecting a first virtual machine whose actual usage value is not included in the usage information, whether a first period exists, in which a sum of the actual usage value of the first virtual machine and prediction usage values of virtual machines operating on a first apparatus of the information processing apparatuses exceeds a criterion for the first apparatus, the first virtual machine operating on the first apparatus; and
issue, upon determining that the first period exists, an instruction to move one of virtual machines operating on the first apparatus to a second apparatus of the information processing apparatuses before the first period, the second apparatus being different from the first apparatus.

US Pat. No. 10,248,437

ENHANCED COMPUTER PERFORMANCE BASED ON SELECTABLE DEVICE CAPABILITIES

INTERNATIONAL BUSINESS MA...

1. A method, comprising:determining a total number of the hardware devices having a capability indicating one or more performance aspects capable of being rendered by a hardware device of a computer system;
upon determining that a total number of hardware devices in the system matches the total of the hardware devices having the capability, enabling the capability for each of the hardware devices of the computer system with respect to a corresponding performance aspect; and
upon determining that the total number of hardware devices in the computer system does not match the total number of hardware devices having the capability, and upon determining that a high availability profile of the computer system is to be maintained, and upon determining that the identified capability cannot be dynamically enabled on a per-request basis, enabling a different capability attributed to respective hardware devices, the different capability based on an earlier version of the respective hardware device.

US Pat. No. 10,248,436

ELECTRONIC APPARATUS CONTROLLING CONNECTION WITH ACCESSORY DEVICE, ACCESSORY DEVICE, CONTROL METHODS THEREFOR, AND STORAGE MEDIUMS STORING CONTROL PROGRAMS THEREFOR

CANON KABUSHIKI KAISHA, ...

1. An electronic apparatus capable of communicating with an accessory device connected, the electronic apparatus comprising:a detection unit configured to detect whether the accessory device supports both a first communication method and a second communication method of which communication speed is higher than communication speed of the first communication method; and
a setting unit configured to set the second communication method during communication between the electronic apparatus and the accessory device and to set the first communication method during no communication between the electronic apparatus and the accessory device, when said detection unit detects that the accessory device supports both the first communication method and the second communication method.

US Pat. No. 10,248,433

NETWORK MANAGEMENT APPARATUS AND METHOD FOR REMOTELY CONTROLLING STATE OF IT DEVICE

ELECTRONICS AND TELECOMMU...

1. A network management apparatus for remotely controlling a state of an information technology (IT) device connected to the network management apparatus, the network management apparatus comprising:a detection pattern generator configured to generate a detection pattern containing an Address Resolution Protocol (ARP) bit pattern and a Wake-on-LAN (WOL) bit pattern as a detection target;
a remote state controller configured to, even when the IT device is in an inactive state, analyze a data bit stream received over a network connected to the IT device to determine whether the data bit stream includes a bit pattern that is the same as the detection pattern, and generate an interrupt including information regarding the same bit pattern to wake up the IT device when the same bit pattern is determined to be present in the data bit stream; and
a wake-up cause analyzer configured to, after the wake-up of the IT device caused by the interrupt, analyze a cause of the wake-up according to the bit pattern included in the interrupt to activate a central processing unit (CPU) of the IT device or maintain the inactive state of the IT device.

US Pat. No. 10,248,426

DIRECT REGISTER RESTORE MECHANISM FOR DISTRIBUTED HISTORY BUFFERS

International Business Ma...

1. A method for restoring register data, comprising:receiving an instruction to flush one or more general purpose registers (GPRs) in a processor;
determining history buffer entries of a history buffer to be restored to the one or more GPRs;
creating a mask vector that indicates which history buffer entries will be restored to the one or more GPRs and also indicates whether each history buffer entry is in a Level 1 (L1) storage or a Level 2 (L2) storage;
restoring the indicated history buffer entries to the one or more GPRs; and
as each indicated history buffer entry is restored, updating the mask vector to indicate which history buffer entries have been restored.

US Pat. No. 10,248,420

MANAGING LOCK AND UNLOCK OPERATIONS USING ACTIVE SPINNING

Cavium, LLC, Santa Clara...

1. A method for managing instructions on a processor comprising a plurality of processor cores, the method comprising:executing a plurality of threads on the processor cores, each thread having access to a stored library of operations including at least one lock operation and at least one unlock operation; and
managing instructions that are issued on a first processor core of the plurality of processor cores, for a first thread executing on the first processor core, the managing including:
for each instruction included in the first thread and identified as being associated with a lock operation corresponding to a particular lock, determining if the particular lock has already been acquired for another thread executing on a processor core other than the first processor core, and if the particular lock has already been acquired, continuing to perform the lock operation for a plurality of attempts using a hardware lock operation different from the lock operation in the stored library, and if the particular lock has not already been acquired, acquiring the particular lock for the first thread, wherein the hardware lock operation performs a modified atomic operation that changes a result of the hardware lock operation for failed attempts to acquire the particular lock relative to a result of the lock operation in the stored library, and
for each instruction included in the first thread and identified as being associated with an unlock operation corresponding to a particular lock, releasing the particular lock from the first thread.

US Pat. No. 10,248,418

CLEARED MEMORY INDICATOR

INTERNATIONAL BUSINESS MA...

1. A system comprising:a memory having computer readable instructions; and
one or more processing devices for executing the computer readable instructions, the computer readable instructions comprising:
receiving an instruction from a requesting device for access to an amount of memory;
selecting a memory space in the memory corresponding to the amount of memory, the memory space including one or more memory blocks, each memory block of the one or more memory blocks having an address;
inspecting a clear indicator associated with each memory block, the clear indicator stored as at least one bit in a field that is separate from contents of a respective memory block, the clear indicator indicating whether the respective memory block is in a cleared state, wherein the cleared state is a state of the respective memory block in which the respective memory block does not have any data stored therein;
determining based on the clear indicator whether each memory block in the memory space is in the cleared state;
based on determining that a first set of one or more memory blocks in the memory space is not in the cleared state while a second set of one or more memory blocks in the memory space is in the cleared state, clearing the memory space by clearing only the first set of one or more memory blocks;
assigning the memory space to the requesting device;
in response to the requesting device finishing its use of the memory space, accessing the clear indicator for each memory block and determining based on the clear indicator whether (1) each memory block in the memory space used by the requesting device is in the cleared state or (2) a third set of one or more memory blocks in the memory space is not in the cleared state while a fourth set of one or more memory blocks in the memory space is in the cleared state;
based on determining that a third set of one or more memory blocks in the memory space used by the requesting device is not in the cleared state while a fourth set of one or more memory blocks in the memory space used by the requesting device is in the cleared state, clearing the memory space by clearing only the third set of one or more memory blocks; and
making the memory space available for subsequent requests.

US Pat. No. 10,248,417

METHODS AND APPARATUSES FOR CALCULATING FP (FULL PRECISION) AND PP (PARTIAL PRECISION) VALUES

VIA ALLIANCE SEMICONDUCTO...

1. A method for calculating FP (Full Precision) and PP (Partial Precision) values, performed by an ID (Instruction Decode) unit, the method comprising:decoding an instruction request from a compiler; and
executing a loop m times to generate m microinstructions for calculating first-type data, or n times to generate n microinstructions for calculating second-type data according to an instruction mode of the instruction request, thereby enabling a plurality of ALGs (Arithmetic Logic Groups) to execute a plurality of lanes of a thread;
wherein m is less than n and a precision of the first-type data is lower than a precision of the second-type data;
wherein each ALG comprises:
a first-type computation lane; and
a plurality of second-type computation lanes,
wherein when the instruction mode is a first mode, each of the first-type computation lane and the second-type computation lanes completes calculations for a set of the first-type data independently; and, when the instruction mode is a second mode, each of the second-type computation lanes calculates a portion of a set of the second-type data to generate a partial result and the first-type computation lane combines the partial results by the second-type computation lanes, outputs a combined result and uses the combined result to complete calculations for the set of the second-type data.

US Pat. No. 10,248,412

SHARING APPLICATIONS BY MODIFYING ATTRIBUTES

Microsoft Technology Lice...

1. A computing system comprising:one or more processors;
one or more computer-readable media having stored thereon instructions that are executable by the one or more processors to configure the computer system to provide bundles of application components for different applications, including instructions that are executable to configure the computer system to perform at least the following:
at an application framework, identify a bundle comprising portions, each portion being an application component, including components from at least two different applications, and having values for attributes in the portion defined for a first user where one or more portion are configured to obtain data from one or more data sources;
at the application framework, receive a request for the bundle from a second user;
at the application framework, identify within the bundle one or more values for attributes that apply to the first user, but not to the second user;
as a result of identifying within the bundle one or more values for attributes that apply to the first user, but not to the second user, the application framework, modify the one or more values for attributes that apply to the first user, but not to the second user before the bundle is consumed by the second user, but not modifying one or more other values used to obtain data from the one or more data sources; and
at the application framework provide the bundle to the second user with the modified values for attributes that apply to the first user, but not to the second user and the unmodified values used to obtain data from the one or more data sources to allow the second user to efficiently implement the application components as the bundle.

US Pat. No. 10,248,410

IMPLEMENTATION DECISION TO PROVIDE ADAS FUNCTION UPDATE FOR A VEHICLE

1. A method that improves performance of a vehicle by implementing a function update for an Advanced Driver Assistance System (“an ADAS system”) of the vehicle by modifying a Field-Programmable Gate Array (“FPGA”) of the vehicle by determining that it is time effective as compared to implementing the function update using a software update, the method comprising:receiving a Dedicated Short Range Communication message (“a DSRC message”) on a 5.9 gigahertz band, wherein the DSRC message includes digital data that describes a driving situation of one or more other vehicles in relation to the vehicle;
determining a set of conditions for implementing the function update of the ADAS system by modifying the FPGA instead of the software update that includes that a first time for the software update is within an update deadline, a second time for an FPGA update is within the update deadline, an estimated software execution time fails to be within an execution deadline, an estimated FPGA execution time is within the execution deadline, an estimated FPGA power consumption is within an FPGA maximum power consumption, and an estimated FPGA area is within an FPGA maximum area;
determining, based on the driving situation described by the digital data and system data describing a current situation of the vehicle, to implement the function update for the ADAS system of the vehicle which is operable to control an operation of the ADAS system when the determined set of conditions are met; and
in response to the determination that the determined set of conditions are met, modifying the FPGA of the vehicle to implement the function update so that the FPGA controls the operation of the ADAS system in a manner that conforms to the function update.

US Pat. No. 10,248,408

HANDLING TABLE DELTAS DURING ZERO DOWNTIME UPGRADE

SAP SE, Walldorf (DE)

1. A method comprising:initiating a zero downtime upgrade of a source system to a target system, the upgrade procedure preparing software for the target system in parallel to operation of the source system by selectively (i) cloning, for the target system, tables and associated database triggers used by the source system according to a source database schema, (ii) generating new target tables comprising updated software content for use by a bridge database schema, and (iii) selectively sharing tables between the source database schema and the bridge database schema, the source system and the target system operating in a language layer and a database layer, the language layer including a source language layer and a target language layer, and the database layer including a source database layer and a target database layer, the source language layer including a first mapping of data types between the source database layer and the source language layer, and the target language layer including a second mapping of data types between the target language layer and the target database layer;
computing a first difference in structure and/or database type between a first data element in a source table in the source system and a second data element in a target table in the target system, in the database layer;
computing a second difference in structure and/or database type between a third data element in the source table and a fourth data element in the target table, in the language layer,
wherein the third data element is generated from the first data element in the source table by the first mapping of data types between the source database layer and the source language layer;
migrating, using the first and second computed differences, the first data element and third data element from the source table to the target table in the database layer, the first and second computed differences used to add, delete, and/or change field type of the migrated data; and
terminating the upgrade procedure after completion of the migration of the data; wherein at least one of the initiating, the computing, the migrating, and the terminating are implemented by at least one data processor forming part of at least one computing system.

US Pat. No. 10,248,405

METHOD AND DEVICE FOR THE ROBUST UPDATING OF FIRMWARE OF A VEHICLE VIA AN AIR INTERFACE

ROBERT BOSCH GMBH, Stutt...

1. A method for updating firmware of a vehicle via an air interface, comprising:exchanging data with a backend via the air interface through a connection module;
managing the data by a data management module inside the vehicle;
coordinating the connection module and the data management module by a coordination layer, the coordinating including:
receiving, by the coordination layer from the connection module, an indication of a required memory space for download of an update for the firmware,
triggering, by the coordination layer, (i) a check at the data management module for availability of the required memory space and (ii) a reservation at the data management module of memory space corresponding to the required memory space,
providing, by the coordination layer to the connection module, information of how and where the update for the firmware is to be stored in the reserved memory space, and
delegating, by the coordination layer to the connection module, downloading of the update for the firmware from the backend via the air interface, wherein the connection module carries out the delegated downloading using the information provided to the connection module from the coordination layer and independently from the coordination layer;
monitoring the connection module and the coordination layer by a monitoring layer; and
requesting the data as needed by the coordination layer for an installation.

US Pat. No. 10,248,395

ENERGY-FOCUSED RE-COMPILATION OF EXECUTABLES AND HARDWARE MECHANISMS BASED ON COMPILER-ARCHITECTURE INTERACTION AND COMPILER-INSERTED CONTROL

1. A method, comprising:identifying a first binary executable generated by a source-level complier from a source file;
generating an intermediate object from the first binary executable;
running one or more general analyses on the intermediate object to obtain input information for one or more power-specific analyses, wherein the input information includes disambiguated symbolic information;
updating the intermediate object with the input information for the one or more power-specific analyses;
identifying information relating to micro-operations of components of a microprocessor by running the one or more power-specific analyses on the updated intermediate object;
wherein the one or more power-specific analyses predict inactive periods of resources in the microprocessor using static information produced through a compilation of a computer program;
generating control instructions based on the information relating to the micro-operations of the components of the microprocessor, the control instructions comprising instructions that contain control data that renders unnecessary at least one of the micro-operations, wherein the control instructions are configured to control the resources during the inactive periods so as to reduce energy consumption of the resources during the inactive periods; and
combining the generated control instructions with at least one of instructions of the intermediate object to generate a second binary executable to consume less energy at runtime than the first binary executable.

US Pat. No. 10,248,394

UTILIZING CREATED CHARACTER INDEX FOR SWITCH STATEMENTS

International Business Ma...

1. A computer system, comprising:one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage medium, and program instructions stored on at least one of the one or more tangible storage medium for execution by at least one of the one or more processors via at least one of the one or more memories, wherein the computer system is capable of performing a method comprising:
receiving a plurality of target strings, wherein each target string of the plurality of target strings comprises a sequence of characters;
creating a character index for the plurality of target strings having a plurality of entries corresponding to the sequence of characters;
prioritizing the plurality of entries;
determining an evaluation method for the plurality of target strings based on the prioritized plurality of entries;
generating an action table including an action for each possible outcome of the evaluation method;
receiving a variable string; and
performing the evaluation method for the plurality of target strings, wherein the performed evaluation method is performed with respect to the variable string.

US Pat. No. 10,248,393

SYSTEM AND METHOD FOR GENERATING A USER INTERFACE BY AUCTIONING SPACE ON THE USER INTERFACE TO SELF-DETERMINING, CONTENT-PROVIDING MODULES

CloudMade Limited, Londo...

1. A method for displaying a dynamic user interface (UI) on a computing device, wherein the user interface has a plurality of modes and displays information for a plurality of categories of content, the method comprising:executing a plurality of UI modules on the computing device, wherein each UI module is a software component that provides content within a particular category for display in the user interface and wherein each UI module determines its own content by ranking data relevant to its category based at least in part on past user behavior and the current location of the computing device and selecting the highest-ranked data in its category, determines a priority level of the highest-ranked data in its category, and bids for user interface space using the determined priority level of the highest-ranked data in its category; and
executing a UI controller on the computing device, wherein the UI controller is a software component that receives bids from the UI modules, determines the number of available spots for UI modules in the user interface based on the current mode of the user interface and adjusts the number of available spots for UI modules in response to a change in mode for the user interface, and selects UI modules associated with the highest priorities for display in the available user interface spots.

US Pat. No. 10,248,391

SYSTEM AND METHOD FOR SOFTWARE DEVELOPMENT USING GRAPHICAL TREE STRUCTURES

1. A method for building a software application for execution on a computer, the method comprising:creating a plurality of data fields based on input from a user and storing said plurality of data fields in a computer memory;
grouping the plurality of data fields into a plurality of node data structures, each node data structure having a list of data fields contained therein;
assigning respective node data structures of the plurality of node data structures to a plurality of container data structures in the computer memory, respectively, wherein each container data structure stores information about conditions, actions and action results to operate on one or more data fields;
creating one or more tree data structures by linking the plurality of container data structures in a specific hierarchical manner; and
linking the tree data structures in an ordered sequence to create a computer executable code for executing the software application, wherein the plurality of node data structures, the plurality of container data structures, and the one or more tree data structures are created independent of any programming language.

US Pat. No. 10,248,390

RESOURCE SHARING WORKFLOWS WITHIN EXECUTABLE GRAPHICAL MODELS

The MathWorks, Inc., Nat...

1. A method comprising:storing, in a memory, a first intermediate representation of at least a portion of an executable source model including a plurality of model blocks arranged on data paths;
automatically revising, by a processor coupled to the memory, the first intermediate representation to produce a second intermediate representation of the at least a portion of the executable source model, the second intermediate representation optimized for a hardware implementation of the at least a portion of the executable source model, the automatically revising resulting in one or more delays being introduced into the second intermediate representation;
automatically modifying, by the processor, the second intermediate representation to correct for the one or more delays introduced into the second intermediate representation, the automatically modifying including:
identifying a join point in the second intermediate representation where two of the data paths merge;
computing sums of delays for the two data paths at the join point;
comparing the sums of delays for the two data paths; and
when the sums of delays are unequal, inserting a first delay element into one of the two data paths, the first delay element configured such that the sums of delays are equal, the automatically modifying producing a third intermediate representation of the at least a portion of the executable source model;
generating from the third intermediate representation a hardware description language (HDL) description of the at least a portion of the executable source model; and
configured one or more target hardware elements based on the HDL description.

US Pat. No. 10,248,387

INTEGRATED SYSTEM FOR SOFTWARE APPLICATION DEVELOPMENT

1. A method to develop a software application, the method executed by software instructions stored in a memory and executed by a hardware processor, comprising the steps of:a. managing communications among several groups who are working on a common software application by providing an interactive subsystem among the team members;
b. defining a process workflow for a plurality of software application features;
c. defining a plurality of user interface (UI) details including UI widgets associated with each step of the process workflow;
d. defining a plurality of requirements specific details associated with a plurality of UI widgets;
e. defining a plurality of business rules, associated with each step of the process workflow;
f. defining a plurality of re-usable technical design patterns for the software application, each design pattern comprising attributes including:
i. name and description;
ii. a plurality of visually organized design components;
iii. a plurality of visually organized program flow steps, each flow step comprising a step number and step description;
iv. a plurality of visually organized arrow shapes depicting program logic invocation;
v. a plurality of file attachments allowing users to add additional data for each pattern; and
g. producing the finished software application by programming and testing the software application according to said requirements and design specifications.

US Pat. No. 10,248,386

GENERATING A SOFTWARE COMPLEX USING SUPERORDINATE DESIGN INPUT

Symphore, LLC, Atlanta, ...

1. A computer-implemented method, comprising:receiving data specifying selections of design aspects as superordinate design inputs for a software complex that will include a group of software members including at least one executable, the design aspects including a software as a service design aspect that specifies that the software complex will include one or more software as a service features;
generating an in-memory model of the software complex including identifying and configuring, based on the superordinate design inputs, a set of software implements that each specify an implementation of one or more software features of the software complex in one or more types of software members of the software complex, the set of software implements including one or more software implements for implementing the one or more software as a service features;
selecting, based on the superordinate design inputs and the in-memory model, a plurality of software member emitters, each software member emitter being arranged to emit a software member of a defined type, wherein each type is different from each other type; and
for each selected software member emitter, generating a software member of the defined type of the selected software member emitter, wherein at least one of the selected software member emitters generates a software member that implements at least one of the one or more software as a service features.

US Pat. No. 10,248,385

EXTRACTING MOBILE APPLICATION WORKFLOW FROM DESIGN FILES

INTERNATIONAL BUSINESS MA...

1. A computer-implemented workflow extraction method, the method comprising:extracting functional elements from a design file to create a database of design screens;
generating a flow graph of the design screens and the functional elements in the design file;
creating a transition graph that details how to move from one of the design screens to another by analyzing a difference of the one of the design screens to the another of the design screens,
the difference between the design screens being how to move from the one of the design screens to the another;
analyzing, for each of the design screens, a relatability of one design screen to a previously analyzed design screen in the database and generating a tag that represents a workflow;
creating a database linking the tag to a sequence of design screens from the transition graph; and
receiving the tag from the database.

US Pat. No. 10,248,384

ARITHMETIC PROCESSING DEVICE AND CONTROL METHOD FOR ARITHMETIC PROCESSING DEVICE

FUJITSU LIMITED, Kawasak...

1. An arithmetic processing device comprising:a storage unit that has a plurality of registers;
a processing execution unit that performs a convolution operation by executing a predetermined number of multiply add operations in parallel by one command, by using an image data stored in a plurality of first registers of the storage unit and a filter data stored in a plurality of second registers of the storage unit, when the processing unit acquires a switching completion notice;
a route selection unit that selects a route connecting the processing execution unit and the first and the second registers of the storage units; and
a switching control unit that controls the route selection unit so as to switch the route to be selected, based on a switching instruction from the processing execution unit, and issues the switching completion notice to the processing execution unit.

US Pat. No. 10,248,383

DIALOGUE HISTORIES TO ESTIMATE USER INTENTION FOR UPDATING DISPLAY INFORMATION

Kabushiki Kaisha Toshiba,...

10. A dialogue support method comprising:receiving input information indicating a user's intention;
determining at least one target dialogue state among dialogue histories related to dialogue states indicating dialogue results between a user and a dialogue system which estimates the user's intention and performs processing in accordance with the user's intention, the target dialogue state being a target of instructions from the user;
acquiring a processing result from the dialogue system by inputting the input information and the target dialogue state into the dialogue system;
generating first update information to update a display of the processing result, and
storing, in a storage, dialogue information which includes an identifier of a dialogue state and a display flag indicating whether the dialogue state is in a normal display or in a thumbnail display,
wherein the determining determines a dialogue state for which the display flag indicates the normal display as the target dialogue state.

US Pat. No. 10,248,381

AUDIO CONTROL SYSTEM AND RELATED METHODS

iZotope, Inc., Cambridge...

1. A method for use with an audio system comprising at least one amplifier, the method comprising acts of:(A) receiving, at the audio system, audio input produced by at least one audio source;
(B) determining a gain level associated with the audio input;
(C) automatically, without intervention by a user of the audio system, adjusting a gain level of the at least one amplifier, so that subsequent output of the at least one amplifier falls within a dynamic range delimited by a lower gain level and an upper gain level;
wherein the at least one audio source comprises at least one musical instrument, the act (A) comprises identifying the at least one musical instrument from the received audio input, and the act (C) comprises adjusting the gain level of the at least one amplifier in a manner corresponding to the identified musical instrument; and
wherein the act (A) comprises identifying the at least one musical instrument as a guitar, voice, bass or drum, and the act (C) comprises setting the gain level of the at least one amplifier to be a different gain level if the at least one musical instrument were identified as a guitar or voice than if the at least one musical instrument were identified as a bass or drum.