US Pat. No. 10,796,110

READING DEVICE AND METHOD

TOSHIBA TEC KABUSHIKI KAI...

1. A reading device comprising:a placing table arranged to support an article to which an RFID tag is attached;
an antenna configured to emit a radio wave for communicating with the RFID tag toward the placing table;
a reader configured to read tag information including a tag identifier identifying the RFID tag by communicating with the RFID tag via the antenna while the placing table and the antenna are integrally moved; and
a controller configured to:
extract the tag identifier in which an amount of change in phase information when comparing phases at different reading positions is a settable predetermined value or less, wherein the predetermined value can be a nonzero value, based on a phase difference between a response wave transmitted from the RFID tag in respond to an interrogation wave via the antenna when the tag information is read; and
output the tag information including the tag identifier extracted by the controller.

US Pat. No. 10,796,109

CARD INSERTION STRUCTURE

PEGATRON CORPORATION, Ta...

1. A card insertion structure, for being configured on a portable electronic device, the portable electronic device comprising a housing, the card insertion structure comprising:a base, disposed in the housing;
a pressing member, movably disposed on the base, a portion of the pressing member exposed out of the housing; and
a plastic spring strip disposed on the base and leaning against the pressing member and the base, wherein when an electronic card is being inserted between the base and the housing, the electronic card is passing by the pressing member, and the pressing member is subjected to a force applied by the electronic card and deforms the plastic spring strip, when the electronic card passes by the pressing member and is inserted between the base and the housing, the pressing member is released and restored due to resilience of the plastic spring strip, and the pressing member is exposed out of a portion of the housing to fix the electronic card to the housing.

US Pat. No. 10,796,108

INTEGRATED MACHINE INFORMATION MANAGEMENT WITH APPLICATION INTERACTIVE USER INTERFACE

MTS SYSTEMS CORPORATION, ...

1. A computer implemented method of lab management, comprising:providing machine information on a service tag for a machine, the machine information suitable for uniquely identifying the machine;
storing auxiliary information about the machine on at least one of one or more remote devices, the at least one of the one or more remote devices configured to scan the service tag to retrieve machine information therefrom, and to integrate the auxiliary information with the machine information on the service tag; and
updating a knowledge base for the machine having the service tag containing machine specific information, wherein updating comprises:
reading the machine specific information from the service tag with a computing device;
accessing auxiliary information on the machine from storage of the computing device;
accessing additional information on the machine from storage of a remote server;
combining the machine specific information, the auxiliary information, and the additional information into a new set of machine information; and
updating at least the auxiliary information on the computing device with the new set of machine information.

US Pat. No. 10,796,107

UNIFIED EMBEDDINGS FOR TRANSLATION

SoundHound, Inc., Santa ...

1. A method of training word embeddings, the method comprising:determining a plurality of anchors, each anchor comprising a first word in a first domain and a second word in a second domain;
training (1) a word embedding for the first domain;
training (2) a word embedding for the second domain; and
training (3) a transform for transforming word embedding vectors in the first domain to word embedding vectors in the second domain, wherein:
the training minimizes a loss function that includes an anchor loss for each anchor;
for each respective anchor of the plurality of anchors, the anchor loss for the respective anchor is based on a distance between the respective anchor's second word's embedding vector and the transform of the respective anchor's first word's embedding vector; and
for each respective anchor of the plurality of anchors, the anchor loss for the respective anchor is zero when the distance between the respective anchor's second word's embedding vector and the transform of the respective anchor's first word's embedding vector is less than a specific tolerance.

US Pat. No. 10,796,106

APPARATUS AND METHOD FOR SELECTING SPEAKER BY USING SMART GLASSES

ELECTRONICS AND TELECOMMU...

1. An apparatus for selecting a speaker by using smart glasses, the apparatus comprising:a front angle camera configured to capture a front angle video of a user and track guest interpretation interlocutors in the captured video;
smart glasses configured to display a virtual space map image including the guest interpretation interlocutors tracked through the front angle camera;
a gaze-tracking camera configured to select a target person for interpretation by tracking a gaze of the user so that one of the guest interpretation interlocutors displayed in the video is selected; and
an interpretation target processor configured to provide an interpretation service in connection with the target person selected through the gaze-tracking camera,
wherein the smart glasses display a color barcode showing a host identity (ID) including language information of the user.

US Pat. No. 10,796,105

DEVICE AND METHOD FOR CONVERTING DIALECT INTO STANDARD LANGUAGE

Samsung Electronics Co., ...

1. A method of converting a dialect of a predetermined language into a standard language, the method comprising:obtaining, by at least one processor of an apparatus, a sentence including a dialect word;
identifying, by the at least one processor, at least one common word that is used in identical form and identical meaning in the dialect and the standard language in the sentence including the dialect word;
replacing, by the at least one processor, the identified at least one common word with a predetermined keyword corresponding to an object type of the identified at least one common word to create a dialect hybrid sentence including both the dialect word and the predetermined keyword;
storing, on a memory of the apparatus, mapping information of the predetermined keyword including information mapping the predetermined keyword, the at least one common word, and a position of the at least one common word in the sentence;
obtaining, by the at least one processor, a predetermined vector value corresponding to the predetermined keyword;
obtaining, by the at least one processor, vector values corresponding to remaining words included in the dialect hybrid sentence based on the predetermined vector value;
obtaining, by the at least one processor, a standard language sentence based on an arrangement of vector values that corresponds to the dialect hybrid sentence and includes the obtained predetermined vector value and the vector values corresponding to the remaining words, wherein obtaining the standard language sentence comprises:
obtaining, by the at least one processor, a converted sentence including standard language words corresponding to the remaining words and the predetermined keyword based on the arrangement of the vector values that corresponds to the dialect hybrid sentence,
identifying, by the at least one processor, the predetermined keyword in the converted sentence using the mapping information stored to the memory, and
converting, by the at least one processor, the predetermined keyword included in the converted sentence into the at least one common word again; and
displaying, on a display of the apparatus, the standard language sentence.

US Pat. No. 10,796,104

SYSTEMS AND METHODS FOR CONSTRUCTING AN ARTIFICIALLY DIVERSE CORPUS OF TRAINING DATA SAMPLES FOR TRAINING A CONTEXTUALLY-BIASED MODEL FOR A MACHINE LEARNING-BASED DIALOGUE SYSTEM

Clinc, Inc., Ann Arbor, ...

1. A method of constructing an artificially diverse corpus of training data samples for training a contextually-biased model for a machine learning-based dialogue system, the method comprising:evaluating a corpus of utterance-based training data samples, wherein the evaluating includes:
identifying a slot replacement candidate relating to a slot existing in one or more utterance training samples of the corpus that is suitable for replacement with a randomly-generated slot token value;
deriving one or more distinct skeleton utterances that include the slot replacement candidate based on an input of a plurality of distinct utterance training samples from the corpus, wherein deriving the one or more distinct skeleton utterances includes replacing one or more slots of each of the plurality of distinct utterance training samples with one of a special token and one or more proper slot classification labels;
selecting a subset of the one or more distinct skeleton utterances;
converting each of the one or more distinct skeleton utterances of the subset back to one or more distinct utterance training samples while still maintaining the special token at a position of the slot replacement candidate;
altering a percentage of the one or more distinct utterance training samples by supplanting the special token with a distinct randomly-generated slot token value at the position of the slot replacement candidate;
constructing the artificially diverse corpus of training data samples for training the contextually-biased model based on a collection of the percentage of the one or more distinct utterance training samples;
training one or more machine learning models using the artificially diverse corpus of training data samples;
implementing the one or more machine learning models to predict a classification of one or more slots of an utterance input to the machine learning-based dialogue system; and
generating a response by the machine learning-based dialogue system based on the classification of the one or more slots of the utterance input.

US Pat. No. 10,796,103

WORD-BY-WORD TRANSMISSION OF REAL TIME TEXT

T-Mobile USA, Inc., Bell...

1. A first user equipment (UE) comprising:a processor;
an input device;
a network interface; and
memory storing computer-executable instructions that, when executed by the processor, cause the first UE to, during a real time text (RTT) communication session:
detect, via the input device, character user input requesting to type a text character;
in response to detecting the character user input, start a timer that is to expire after a period of time if no additional user input is detected;
buffer the text character in the memory as a buffered text character;
detect, via the input device and prior to expiration of the timer, delimiter user input requesting to type a word delimiter; and
in response to detecting the delimiter user input prior to the expiration of the timer, send, via the network interface, and over a telecommunications network to a second UE involved in the RTT communication session, one or more RTT packets carrying the buffered text character, wherein the one or more RTT packets are sent without user intervention, at a predetermined frequency.

US Pat. No. 10,796,102

ENABLING RHETORICAL ANALYSIS VIA THE USE OF COMMUNICATIVE DISCOURSE TREES

Oracle International Corp...

1. A computer-implemented method comprising:accessing a sentence comprising a plurality of fragments, wherein at least one fragment comprises a verb and a plurality of words, each word comprising a role of the words within the fragment, wherein each fragment is an elementary discourse unit;
generating a discourse tree that represents rhetorical relationships between the plurality of fragments, wherein the discourse tree comprises a plurality of nodes, each nonterminal node representing a rhetorical relationship between two of the plurality of fragments, each terminal node of the nodes of the discourse tree is associated with one of the plurality of fragments;
matching each fragment that has a verb to a verb signature, thereby creating a communicative discourse tree, the matching comprising:
accessing a plurality of verb signatures, wherein each verb signature comprises the verb of a fragment and a sequence of thematic roles, wherein each thematic role describes a respective relationship between the verb and related words;
determining, for each verb signature of the plurality of verb signatures, a plurality of thematic roles of the respective verb signature, wherein each of the thematic roles matches a role of a word in the fragment;
selecting a particular verb signature from the plurality of verb signatures based on the particular verb signature comprising a highest number of matches of roles; and
associating the particular verb signature with the fragment;
identifying a correspondence between the communicative discourse tree and an additional communicative discourse tree from a plurality of communicative discourse trees; and
sending text associated with the additional communicative discourse tree to an external device.

US Pat. No. 10,796,101

OPTIMIZATIONS OF SEARCH ENGINES FOR MERGING SEARCH RESULTS

Bioz, Inc., Los Altos, C...

1. A method comprising:extracting, by a natural language processor, a plurality of objects from a corpus of text, each object of the plurality of objects is a term within a document of the corpus of text that contextually identifies a usable item;
attaching context data to a first object and a second object of the plurality of objects, the context data including a source associated with each respective object and found within the corpus of text;
integrating the first object and the second object as separate searchable results within a search engine; and
merging the first object and the second object into a single searchable result based on the first object and the second object having corresponding context data.

US Pat. No. 10,796,100

UNDERSPECIFICATION OF INTENTS IN A NATURAL LANGUAGE PROCESSING SYSTEM

Interactions LLC, Frankl...

1. A non-transitory computer-readable storage medium comprising instructions executable by a processor for identifying an intent associated with a natural language utterance, the instructions comprising:instructions for receiving a natural language utterance of a user;
instructions for accessing a domain hierarchy of intents comprising leaf nodes and ancestor nodes;
instructions for accessing a plurality of intent understanding models, wherein each of the intent understanding models of the plurality of intent understanding models is associated with one of the leaf nodes of the domain hierarchy of intents or is associated with one of the ancestor nodes of the domain hierarchy of intents, and wherein each of the plurality of intent understanding models is trained, through supervised machine learning based on a training set of natural language utterances that are labeled with user intents, to determine a confidence score representative of a likelihood that a natural language utterance represents an intent corresponding to the associated ancestor node or the associated leaf node;
instructions for producing a plurality of node confidence scores by applying the plurality of intent understanding models of the leaf nodes to the natural language utterance;
instructions for determining that none of the node confidence scores corresponding to the leaf nodes exceeds a given minimum confidence threshold;
instructions for producing confidence scores for one or more ancestor nodes;
instructions for identifying a most applicable ancestor node based on the one or more produced confidence scores of ancestor nodes; and
instructions for identifying, as a general intent of the natural language utterance, an intent corresponding to the identified most applicable ancestor node.

US Pat. No. 10,796,099

ENABLING AUTONOMOUS AGENTS TO DISCRIMINATE BETWEEN QUESTIONS AND REQUESTS

Oracle International Corp...

1. A system for classifying text as a question or a request, comprising:a linguistic engine configured to:
access an utterance comprising at least one word;
generate a parse tree for the utterance, wherein the parse tree comprises at least one terminal node comprising a word type, wherein each terminal node represents a word or phrase of the utterance and wherein the parse tree identifies syntactic information of the utterance; and
apply, to the parse tree, one or more linguistic templates comprising one or more word types; and
a rule engine configured to generate one or more match results obtained from the linguistic engine and determine a classification of the text by applying rules comprising:
(i) responsive to determining, from the parse tree, that the utterance comprises a first person pronoun followed by a noun, classifying the utterance as a request;
(ii) responsive to determining, from the parse tree, that the utterance comprises an imperative verb as a first word of the utterance by identifying a verb that is (a) in a present tense or in an active voice and (b) neither modal, mental, or a form of the verb “to be,” classifying the utterance as a request;
(iii) responsive to identifying, in the utterance, one or more predefined request keywords, classifying the utterance as a request;
(iv) responsive to identifying, in the utterance, a mental verb, classifying the utterance as a question; and
(v) responsive to determining that the utterance comprises a question intent prefix in a first word position, classifying the utterance as a question,
wherein the system is further configured, based on the classification as the question or the request, to send a message to a user device or adjust a configuration of an external device.

US Pat. No. 10,796,098

INSTRUCTION UNDERSTANDING SYSTEM AND INSTRUCTION UNDERSTANDING METHOD

NATIONAL INSTITUTE OF INF...

1. An instruction understanding system for language understanding of an instruction sentence comprising:at least one of (a) a processor executing a computer program and (b) hard-wired circuit(s), programmed to operate as:
an obtaining engine configured to obtain a linguistic expression of a name of an object to be manipulated and a linguistic expression of a situation where the object corresponding to the name is placed in a real environment; and
a classifier configured to receive input of the linguistic expression of the name and the linguistic expression of the situation and output manipulability of the object corresponding to the name in the real environment, the manipulability of the object expressed as a numerical value or category representing a likelihood that the object can be manipulated in some way,
wherein the classifier has been trained using a set of a linguistic expression of a name of an object in an image obtained from each piece of image data included in an image data set, a linguistic expression of a situation about the object, and a label of manipulability, and
wherein the classifier includes:
an extraction network configured to generate a feature sample upon receiving input of the linguistic expression of the name and the linguistic expression of the situation, and
a discrimination network configured to output, upon receiving input of the feature sample, a first predicted value representing a category of manipulability to which the feature sample is most likely to belong and a second predicted value representing a likelihood of generation of the feature sample by the extraction network,
wherein the discrimination network is configured to receive from a generation network configured to generate a pseudo sample upon receiving input of the category and noise, input of the pseudo sample, and
wherein the discrimination network has been trained using an object function including a cost function about an error in discrimination as to whether an input sample is the feature sample or the pseudo sample and a cost function about an error in discrimination of the category to which the input sample belongs.

US Pat. No. 10,796,097

SYSTEM AND METHOD FOR EVENT PROFILING

Tata Consultancy Services...

1. A processor implemented method for event profiling, the method comprising:receiving, by one or more hardware processors, a set of articles for the event profiling of an event from one or more data sources, wherein the set of articles are multilingual (702 and 704);
aggregating, by the one or more hardware processors, the set of articles to obtain a plurality of groups with each group comprising a plurality of news related to a common event information component, wherein the plurality of news are aggregated across date, sources of information and languages (706);
analysing, by the one or more hardware processors, the plurality of groups to identify relevant linguistic features corresponding to each group among the plurality of groups by utilizing a set of language specific Natural Language Processors (NLPs) to obtain an analysed data set (708);
classifying, by a plurality of classifying agents implemented by the one or more hardware processors, the plurality of groups identified with the relevant linguistic features as class members of a plurality of classes, wherein each class among the plurality of classes is identified by a unique event related factor, wherein the plurality of classifying agents are language specific classifiers (710);
disambiguating, by the one or more hardware processors, class membership of each class member of the plurality of classes to obtain a disambiguated data set, wherein disambiguation is performed based on voting among the plurality of classifying agents for a class of each class member, relationship validity among each class member and corresponding class and relationship validity among each class member and remaining other class members of the class (712);
analyzing, by the one or more hardware processors, the disambiguated data set to obtain linked information for data in the disambiguated data set (714); and
updating an event ontology in an ontology knowledge base using the linked information (718), wherein a semi-supervised technique is utilized for incremental updation of the event ontology.

US Pat. No. 10,796,096

SEMANTIC EXPRESSION GENERATION METHOD AND APPARATUS

Shanghai Xiaoi Robot Tech...

1. A method for generating a semantic expression for a standard question in a knowledge base, wherein the knowledge base comprises multiple standard questions, each standard question has multiple associated similar questions, and the method comprises:a data obtaining step: for each standard question, obtaining multiple similar question segmentation results corresponding to the multiple similar questions of the standard question, wherein each similar question segmentation result comprises word classes to which respective words in a corresponding similar question belong;
a semantic expression creation step: for each standard question, selecting a phrase from an intersection of the multiple similar question segmentation results of the standard question based on phrase occurrence frequencies, to form at least one semantic expression of the standard question, wherein each phrase comprises a predetermined quantity of word classes;
a detection step: for the multiple similar questions of each standard questions, performing standard question matching processing; for each semantic expression created for each standard question, determining whether the semantic expression is matched to at least one similar question of the standard question; and if yes, marking the semantic expression as a first state; or otherwise, marking the semantic expression as a second state; and
a deletion step: deleting all semantic expressions in the second state.

US Pat. No. 10,796,095

PREDICTION OF TONE OF INTERPERSONAL TEXT COMMUNICATIONS

Adobe Inc., San Jose, CA...

1. A computer-implemented method to predict tone of a text communication, the method comprising:receiving, by a tone prediction algorithm, a text communication for which to predict a tone, the text communication comprising a plurality of words;
identifying an analyzed subset of the plurality of words, wherein each word in the analyzed subset is included in a designated lexicon;
for each word in the analyzed subset, extracting from the designated lexicon, a quantity of psycholinguistic values, each of which is associated with a corresponding psycholinguistic feature;
for each psycholinguistic feature, calculating an aggregate psycholinguistic value corresponding to a sum of the psycholinguistic values associated with the psycholinguistic feature;
generating, by a feature computation module, a feature vector for the text communication,
wherein the feature vector has a number of dimensions that is greater than or equal to the quantity of psycholinguistic values extracted from the designated lexicon for each word in the analyzed subset,
wherein each of at least some of the dimensions of the feature vector correspond to one of the corresponding psycholinguistic features, and
wherein the feature vector comprises the aggregate psycholinguistic values for each of the psycholinguistic features;
predicting, by a first trained prediction module, a numerical score for a first tone dimension of the text communication based on the feature vector, wherein the first trained prediction module is trained to quantify the first tone dimension using the psycholinguistic features as extracted from text communications in a training set; and
predicting, by a second trained prediction module, a numerical score for a second tone dimension of the text communication based on the feature vector, wherein the second trained prediction module is trained to quantify the second tone dimension using the psycholinguistic features as extracted from text communications in the training set,
wherein the numerical scores for the first and second tone dimensions characterize the tone of the text communication.

US Pat. No. 10,796,094

EXTRACTING KEYWORDS FROM A DOCUMENT

Amazon Technologies, Inc....

7. A computer-implemented method comprising:determining splitting terms for a document;
extracting one or more candidate keywords from the document based on the determined splitting terms;
determining word scores for one or more words contained in individual candidate keywords of the one or more candidate keywords;
determining a keyword score for individual ones of the one or more candidate keywords by determining a word score for one or more words contained in individual candidate keywords;
selecting, from the one or more candidate keywords, one or more keywords based on the keyword score;
causing the one or more keywords to be stored in a data store; and
adding at least one user interface control representing the one or more keywords to a network page by:
receiving, from a user device, a length limit of keywords to be presented in the network page;
selecting at least one keyword from the one or more keywords that satisfies the length limit of keywords; and
inserting the at least one user interface control representing the at least one keyword into the network page.

US Pat. No. 10,796,093

AUTOMATIC GENERATION OF STATEMENT-RESPONSE SETS FROM CONVERSATIONAL TEXT USING NATURAL LANGUAGE PROCESSING

Elastic Minds, LLC, Enci...

1. A non-transitory computer-readable medium comprising computer-readable instructions which when executed by one or more processors cause said one or more processors to perform a process comprising:access a locator of an online networked resource;
access the online networked resource using the locator;
identify a first item of content of a first type on the accessed online networked resource, the first item of content in a first comment thread;
access a trigger rule, the trigger rule comprising one or more keywords and a sentiment classifier;
use a neural network comprising:
an input layer,
one or more hidden layers, and
an output layer,
to assign a sentiment classification to the first item of content;
identify whether the first item of content includes one or more of the keywords;
determine, using the trigger rule, the assigned sentiment classification generated using the neural network and keywords identified in the first item of content, whether response content is to be posted to the online networked resource;
at least partly in response to determining, using the trigger rule, the assigned sentiment classification generated using the neural network and keywords identified in the first item of content, that response content is to be posted to the online networked resource, determine whether to use a predefined second item of content or to dynamically generate a second item of content, the assigned sentiment classification generated using the neural network and keywords identified in the first item of content;
generate a notification comprising a link to the first item of content on the online networked resource, one or more comments in the first comment thread earlier in time than the first item of content, and timing information corresponding to when the first item of content was posted in the first comment thread;
transmit the notification to a first destination;
enable the predefined second item of content or the dynamically generated second item of content to be posted to the online networked resource in accordance with the determination as to whether to use a predefined second item of content or to dynamically generate a second item of content.

US Pat. No. 10,796,092

TOKEN MATCHING IN LARGE DOCUMENT CORPORA

NETAPP, INC., Sunnyvale,...

1. A method comprising:receiving, by a server, a dictionary comprising a plurality of entities, wherein each entity has a length of between 1 and n tokens;
automatically constructing, by the server, a probabilistic data representation model comprising n Bloom filter (BF) pairs, wherein each BF pair is indexed from 1 to n;
automatically populating, by the server, the probabilistic data representation model with a data representation of the plurality of entities;
receiving, by the server, a text corpus that is segmented into tokens; and
automatically matching, by the server, each token in the text corpus against the populated probabilistic data representation model.

US Pat. No. 10,796,091

ENHANCED PREDICTIVE INPUT UTILIZING A TYPEAHEAD PROCESS

Facebook, Inc., Menlo Pa...

1. A method comprising:locally storing, at a client device of a first user, information associated with a plurality of nodes and a plurality of edges of a social graph received from a social-networking system, the first user being associated with a first node of the social graph;
detecting, by the client device, that the first user is entering an input term;
providing, by the client device, predictive typeahead results as the first user enters the input term, the predictive typeahead results being based on the input term, each predictive typeahead result corresponding to one of the nodes of the social graph stored locally on the client device, each predictive typeahead result including at least one image associated with the corresponding node.

US Pat. No. 10,796,090

QUICK LANGUAGE DETECTION WITH LANGUAGE NEUTRAL FUNCTIONALITY

SAP France, Levallois-Pe...

1. A computer-implemented method for detecting language based on text data, the method being executed by one or more processors and comprising:receiving, by the one or more processors, text data comprising a string of characters;
processing, by the one or more processors, the text data to determine a set of reference scores comprising two or more reference scores, each reference score being associated with a respective language, and being determined based on the text data and a dictionary document provided for the respective language, each dictionary document comprising a compression of a language document provided in the respective language, wherein processing the text data to determine the set of reference scores comprises, for each dictionary document, determining a number of additions to the dictionary document that would be required to add the text data to the dictionary document based on a state of the dictionary document;
selectively determining, by the one or more processors, a language of the text data based on the set of reference scores; and
providing, by the one or more processors, language data representative of the language as output.

US Pat. No. 10,796,089

ENHANCED TIMED TEXT IN VIDEO STREAMING

SLING MEDIA PVT. LTD, Ba...

1. A process executable by a media player device to automatically process timed text received with broadcast television programming, the process comprising:receiving, at the media player device, a television broadcast that comprises video content associated with a particular television program and a timed text stream that comprises textual data associated with the particular television program;
receiving a list of words, wherein the list of words comprises words in the textual data to be replaced and, for each of the words in the textual data to be replaced, an associated replacement word to be inserted in place of the word to be replaced;
processing the received television broadcast by the media player device to thereby extract the video content and the textual data of the timed text stream from the television broadcast;
providing the video content associated with the particular television program in a first window to a display for presentation to the viewer; and
while providing the video content in the first window, the media player device simultaneously providing the timed text stream in a second window different from the first window for presentation to the viewer, wherein the timed text stream is presented by the media player device in the second window to be scrollable such that the viewer is able to scroll back to view dialog occurring prior to a current scene of the particular television program, and wherein the media player device automatically scans the timed text stream to identify occurrences of the words in the list and, upon identifying a word to be replaced, automatically replaces the word to be replaced in the timed text stream with its associated replacement word.

US Pat. No. 10,796,088

SPECIFYING A CONVERSATIONAL COMPUTER AGENT AND ITS OUTCOME WITH A GRAMMAR

International Business Ma...

1. A method of providing a computer conversational agent and outcome, the method performed by at least one hardware processor, the method comprising:receiving an entity grammar specifying the computer conversational agent, the entity grammar including at least rules that define compound entities in terms of tokens, choice, and product and according to which the computer conversational agent is to conduct a dialog with a user, the entity grammar represented by at least non-terminals and repetitions, the entity grammar being a domain-specific programming language that programs the computer conversational agent;
translating the entity grammar into types;
receiving user utterance;
interpreting the user utterance based on the entity grammar;
determining a prompt for the computer conversational agent to pose to the user based on interpreting the user utterance and the entity grammar;
uttering the prompt to the user;
building the outcome by storing words in the user utterance and the prompt that match the tokens in the entity grammar; and
repeating the receiving of user utterance, the determining of a prompt, the uttering of the prompt and the building of the outcome until the dialog ends, the end of the dialog determined based on the grammar,
wherein the entity grammar specifies both a dialog flow of the dialog and data structure of the outcome,
wherein the built outcome is rendered in data-interchange format and the entity grammar can serve a dual role of specifying the dialog flow of the computer conversational agent and validating the built outcome, wherein the types translated from the entity grammar validate the outcome rendered in data-interchange format.

US Pat. No. 10,796,087

METHOD AND APPARATUS FOR OBTAINING WEB CONTENT

HUAWEI TECHNOLOGIES CO., ...

1. A method for obtaining web content, comprising:determining a web view control corresponding to web content to be displayed on a first display interface, wherein the first display interface comprises an interface displayed on a display screen of an electronic terminal when an application runs on the electronic terminal;
determining that an operating system of the electronic terminal invokes a web content loading complete function, wherein the web content loading complete function is registered with the operating system of the electronic terminal, and wherein the operating system invokes the web content loading complete function after the web content to be displayed by the web view control is completely loaded; and
obtaining the web content after the operating system invokes the web content loading complete function.

US Pat. No. 10,796,086

SELECTIVELY CONTROLLING MODIFICATION STATES FOR USER-DEFINED SUBSETS OF OBJECTS WITHIN A DIGITAL DOCUMENT

Microsoft Technology Lice...

1. A computer-implemented method, comprising:causing a display device to render a plurality of objects that are graphically positioned within a digital document in relation to a coordinate reference system of the digital document;
receiving historical modification data defining modification states for individual objects of the plurality of objects, wherein individual modification states of each object are associated with individual times of a plurality of different times;
receiving a first user input that defines a content section boundary of the digital document in relation to the coordinate system reference;
determining, based on the coordinate system reference, a subset of multiple objects, of the plurality of objects, that are enclosed within the content section boundary that is defined in relation to the coordinate system reference, wherein the plurality of objects includes one or more other objects that are excluded from the subset of multiple objects;
receiving a second user input that selects a selective rollback functionality in association with the content section boundary;
responsive to the second user input, exposing a user interface (UI) control that facilitates generation of a third user input that prescribes a first time of the plurality of different times in association with the content section boundary; and
responsive to the third user input, causing the display device to concurrently render:
the subset multiple objects of the plurality of objects based on one or more first modification states that correspond to the first time, and
the one or more other objects that are excluded from the subset based on one or more second modification states that correspond to a second time.

US Pat. No. 10,796,085

SYSTEMS AND METHODS FOR PROVIDING CROSS-DEVICE NATIVE FUNCTIONALITY IN A MOBILE-BASED CROWDSOURCING PLATFORM

CrowdComfort, Inc., Bost...

1. A system for providing cross-device native functionality for a native app, the system comprising:a server configured to communicate with and exchange data with a plurality of mobile devices via a cloud-based service in the form of a crowdsourcing platform and further provide one or more modifications to a native application running on one or more of the plurality of mobile devices;
at least one mobile device comprising a processor coupled to a memory containing instructions executable by the processor to cause the mobile device to:
run a native application, wherein the native application allows a user to provide user-driven data to the crowdsourcing platform, wherein the user-driven data is associated with an environment in which the user is located, the native application is an abstracted native application comprising an application shell, native basic UI elements, and a JSON Translator embedded within the application;
receive, from the server, modification data associated with a modification to the native application;
dynamically translate, via the JSON Translator, in real, or near-real, time, modification data objects associated with the modification to the native application into native user interface (UI) elements, wherein the JSON Translator is a translation layer configured to allow dynamic interpretation of data received from the server into native UI elements compatible with the native application running on the mobile device; and
display the native UI elements to a user associated with the mobile device.

US Pat. No. 10,796,084

METHODS, SYSTEMS, AND ARTICLES OF MANUFACTURE FOR AUTOMATIC FILL OR COMPLETION FOR APPLICATION SOFTWARE AND SOFTWARE SERVICES

INTUIT INC., Mountain Vi...

1. A machine implemented method for automatic fill or completion for application software or software service, the method being performed by at least a computing platform and comprising:identifying, at a computing platform including one or more servers that are communicatively connected via one or more network elements, one or more characteristics of a user accessing an application software or a software service via a user interface;
identifying, at the computing platform, the application software or the software service including at least one field to be filled or completed with a first information, the first information including free-form content to be input into the at least one field;
identifying, at a predictor model functioning on the computing platform in conjunction with at least one microprocessor, a plurality of users separate from the user based at least in part upon the one or more characteristics of the user;
establishing, at the predictor model functioning on the computing platform, a probabilistic distribution predicting the free-form content of the first information for the user based at least in part upon one or more corresponding characteristics of the plurality of users;
determining and presenting, at one or more automatic fill or completion modules that are stored at least partially in memory and function in tandem with one or more computer processors in the computing platform, a list of one or more completion candidates for the first information in the user interface of the application software or a software service based at least in part upon the probabilistic distribution and not based upon any user inputs of the first information; and
populating the application software or the software service with a completion candidate from the list of one or more completion candidates.

US Pat. No. 10,796,083

WIRELESS DEVICE PORTAL APPLICATION IMPLEMENTING A PLURALITY OF TRUNCATED APPLICATIONS

TracFone Wireless, Inc., ...

1. A method for improving user experience with web-based applications on a wireless device comprising:storing instructions for a master application in a memory of the wireless device;
storing instructions for one or more truncated applications in the memory of the wireless device, wherein the one or more truncated applications lack at least one feature of non-truncated counterparts of the one or more truncated applications, wherein the one or more truncated applications interact with a separate processor to provide increased functionality, and wherein the one or more truncated applications are abbreviated versions of full memory counterparts;
displaying an icon representing the master application on a display of the wireless device;
determining with a wireless device processor that a user has selected the master application by detecting the user interacting with the icon representing the master application in a user interface of an initial screen associated with the display of the wireless device;
executing the instructions for the master application in the wireless device processor in response to the detecting the user interacting with the icon representing the master application in the user interface of the initial screen associated with the display of the wireless device;
implementing an interface to said one or more truncated applications and displaying icons representing said one or more truncated applications on the display of said wireless device in a secondary screen in response to executing the master application in the wireless device processor by the detecting a user interacting with the icon representing the master application on the user interface associated with the display of the wireless device;
determining with a wireless device processor that the user has selected at least one of said truncated applications by detecting the user interacting with the icons representing said one or more truncated applications on the display in the secondary screen of said wireless device with the user interface associated with the display of the wireless device;
executing the instructions for the at least one of said truncated applications in the wireless device processor in response to the detecting the user interacting with the icons representing said one or more truncated applications on the display in the secondary screen of said wireless device with the user interface associated with the display of the wireless device;
displaying user input fields on the display of said wireless device in response to execution by the wireless device processor of the instructions for the at least one truncated application;
accessing a database stored in the memory of the wireless device in response to execution by the wireless device processor of the instructions for the master application, the database storing user information;
communicating and interfacing between the master application and the at least one of said truncated applications by the wireless device processor, the communicating and interfacing between the master application and the at least one of said truncated applications by the wireless device processor comprises communicating and interfacing utilizing an application programming interface protocol, wherein the application programming interface protocol includes rules allowing the master application to interface and/or communicate with the at least one of said truncated applications;
populating with the wireless device processor the user input fields of a selected one or more truncated applications with the user information from the database utilizing the application programming interface protocol in response to the communicating and interfacing between the master application and the at least one of said truncated applications by the wireless device processor, and
tracking activity of a usage of the one or more truncated applications by a wireless service provider.

US Pat. No. 10,796,082

METHOD AND APPARATUS FOR CREATING AND FILING FORMS

Aatrix Software, Inc., G...

1. A data processing system, on a digital computer having a memory and a processor for executing a program, for creating and importing data into a form viewable by a user, comprising:(a) a form file, comprising data elements for construction of a template graphical model of the form used by the program to display a replica of the form on a computer display;
(b) a data file comprising data exported from an end user application program;
(c) a set of instructions used by the program to perform calculations and apply rule conditions required to fill in the form template; and
(d) a viewer program capable of executing in the memory and directing the processor to generate the viewable form template from the data elements in the form file and display the form template on the display, to import the exported data to populate one or more data fields in the form template with the imported data, and overlay the data on the form template on the display to display a filled out form, and to allow the user of the data processing system to review and change the imported data.

US Pat. No. 10,796,081

SYSTEM AND METHOD FOR PROCESSING ELECTRONIC FORMS

Tata Consultancy Services...

1. A system for processing electronic forms (e-forms) in an organization, the system comprising:a processor;
an e-form processing module executable by the processor to:
generate an e-form based on a form template, the form template being selected from pre-defined form templates, wherein the e-form includes modular sections arranged in a pre-defined order, each modular section being associated with user privileges, and wherein each pre-defined form template is created by:
providing interactive elements corresponding to available modular sections present in a modular section repository;
receiving user inputs on the interactive elements to generate the form template, wherein the user inputs correspond to selecting the modular sections from the available modular sections;
retrieving data from at least one database to partly populate at least one of the modular sections in the e-form;
interfacing with the at least one database to access information available in one or more organizational databases, and retrieving data from the one or more organizational databases, the one or more organizational databases being run on one or more platforms and wherein the information is enabled to be centrally available to reduce at least one of duplicates and overheads;
providing at least one subset of the modular sections to designated users based on the user privileges and a workflow associated with the e-form after populating with the retrieved data, wherein the user privileges are associated with at least one of data security and confidentiality;
specifying access restrictions for the designated users automatically and associating the at least one subset of the modular sections for a user activity based on one or more business rules;
creating a processed e-form in a parallel manner based on data inputs received from the designated users, wherein the processed e-form comprises the retrieved data and the data inputs, and has at least one external document associated with the processed e-form, wherein the processed e-form is provided to a second designated user after verification of the retrieved data from a first designated user in a sequential manner;
defining the modular sections and the form template by providing one or more applications corresponding to one or more pre-defined data fields over a drag and drop graphical user interface;
generating a processed electronic document including the modular sections populated with the retrieved data, the data inputs, and external data from the external document, wherein the retrieved data, the data inputs, and the external data are arranged in the pre-defined order; and
collating automatically the external data and the retrieved data from the at least one database;
a workflow engine, executable by the processor, to create the workflow for each processed e-form based on user inputs, the workflow comprising system activities and user activities; and
a rules engine, executable by the processor, to integrate rules in the workflow, the rules comprising validation rules, flow rules, and the user privileges.

US Pat. No. 10,796,080

ARTIFICIAL INTELLIGENCE BASED DOCUMENT PROCESSOR

ACCENTURE GLOBAL SOLUTION...

17. A non-transitory storage medium comprising machine-readable instructions that cause at least one processor to:receive a request with information related to a process to be automatically executed;
extract the information for the automatic execution of the process,
the information being extracted from at least two documents of different document formats and associated with the process, and
the information being extracted based on a domain model;
identify an intent conveyed within the information,
the intent enabling identification of the process, and
the intent being determined based at least on textual processing techniques and natural language processing (NLP);
obtain one or more required fields for automatic execution of the process from the at least two documents;
determine if one or more discrepancies exist in the required fields based on a comparison of values contained in the required fields;
build an internal master document based on validation of the one or more required fields, and the internal master document enabling automatic execution of the process if no discrepancies are detected;
resolve the discrepancy if at least one discrepancy is detected;
generate an internal master document with at least one false positive value;
present the internal master document to a user for review and approval; and
generate a report based on the user's review of the internal master document.

US Pat. No. 10,796,079

GENERATING A PAGE LAYOUT BASED UPON ANALYSIS OF SESSION VARIABLES WITH RESPECT TO A CLIENT DEVICE

Amazon Technologies, Inc....

1. A method comprising:obtaining a request to generate a content page on behalf of a user, the request associated with a client device in communication with at least one computing device over a network connection;
generating a request to identify a page layout from a plurality of page layouts for the request, wherein each of the page layouts has a varying complexity associated with a varying transmission time to the client device over the network connection;
generating a score associated with the client device in response to the request to identify the page layout, the user and the network connection, the score being based upon a feature latency which was determined from a timestamp between when a previous request was received and when a recommendation feature embedded in a previous content page was rendered by the client device, the score being further based upon a set of historical latencies associated with a plurality of similar users, wherein the similar users are similar to the user based upon a device type, a network location, an identity of a browser executed by the client device, and an operating system of the client device associated with a session of the user, wherein the recommendation feature generates a plurality of recommended items for the content page;
selecting the page layout based upon the score and a respective arrangement of the page layout for displaying the plurality of recommended items within the recommendation feature, wherein the page layout is selected based upon maximizing a user engagement metric associated with the content page, wherein the user engagement metric is based upon how long the plurality of similar users interacted with a plurality of previous respective content pages generated using the page layout;
generating the content page according to the page layout; and
transmitting the content page to the client device.

US Pat. No. 10,796,077

RULE MATCHING METHOD AND DEVICE

Beijing Gridsum Technolog...

1. A rule matching device, comprising:a first acquiring element, configured to acquire a preset tagging symbol set and a target text, wherein the tagging symbol set comprises a plurality of tagging symbols, the plurality of tagging symbols are symbols which are used for tagging a text according to different business requirements;
a first determining element, configured to determine a plurality of matching rule templates according to the plurality of tagging symbols;
a converting element, configured to convert the target text according to the plurality of tagging symbols to obtain a sequence to be matched; and
a matching element, configured to perform, by using the plurality of matching rule templates, a matching process on the sequence to be matched,
wherein the matching element comprises:
a first determining component, configured to determine a first matching rule template from the plurality of matching rule templates, wherein the first matching rule template comprises a plurality of match items;
a first matching component, configured to match one by one, each match item in the first matching rule template with a corresponding character in the sequence to be matched;
an acquiring component, configured to, when in the sequence to be matched, there is a corresponding character matched one by one with each match item in the first matching rule template, determine that a matching result is True; and
a second matching component, configured to, when in the sequence to be matched, there is not a corresponding character matched one by one with each match item in the first matching rule template, take a second matching rule template in the plurality of matching rule templates as the first matching rule template to be matched with the sequence to be matched until a matching result is True or all matching rule templates are matched with the sequence to be matched respectively.

US Pat. No. 10,796,076

METHOD AND SYSTEM FOR PROVIDING SUGGESTED TAGS ASSOCIATED WITH A TARGET WEB PAGE FOR MANIPULATION BY A USEROPTIMAL RENDERING ENGINE

International Business Ma...

1. A method for providing suggested tags associated with a target web page for manipulation by a user, comprising:generating in memory of a computer a list of keywords associated with a target web page in an original window as suggested tags for the target web page;
adding said keywords as suggested tags for the target web page into said target web page and transforming said target web page bearing said keywords into a hypertext markup language (HTML) file;
creating a new transparent or semi-transparent window;
adding to the new window said transformed page comprising said keywords as a suggestion set of tags for selection by an end user;
rendering the new window with the transformed page overlaying the original window such that ones of the suggested set of tags already existing in the original window are rendered on top of the tags already existing in the original window;
receiving in the new window user input of a new tag; and,
adding the new tag as a suggested tag into the target web page and repeating the transforming of the target web page, adding the transformed target web page to the new window and rendering the new window with the transformed page overlaying the original window.

US Pat. No. 10,796,075

SYSTEM AND METHOD FOR THE GENERATION AND EDITING OF TEXT CONTENT IN WEBSITE BUILDING SYSTEMS

Wix.com Ltd., Tel Aviv (...

1. A tool for a website building system, the tool implemented on at least one processor and a memory, the tool comprising:a database storing a plurality of text options, each text option formed of a hierarchical data structure (HDS) associated with a field role, said text option based on information gathered from said website building system and from sources external to said website building system, each said HDS having nodes and sub-trees representing field content, text paragraphs and sentences;
a role determiner to receive and determine a field role for an editable text field of a website, said website being at least one of: edited and generated with said website building system;
an analysis engine to make at least one text option recommendation from said database for said field role;
an HDS editor to enable a user to select one recommended text option for said text field and to enable editing a local instance of an HDS of said text option including at least editing nodes and sub-trees of said local instance of said HDS; and
a text generator to linearize said local instance and to generate the text for said text field for at least one of: a site generation system and an editor of said website building system.

US Pat. No. 10,796,074

LINKING SOURCES TO COPIED TEXT

International Business Ma...

1. A method for persistently linking sources to text copied from the sources, said method comprising:displaying, by a processor, a first electronic document, said displaying comprising displaying first text appearing in the first electronic document;
said processor obtaining, from a web page differing from the first electronic document, both selected text and an address of a source electronic document that comprises the selected text;
said processor generating a temporary computer object, said generating the temporary computer object comprising:
generating a header in the temporary computer object,
copying the obtained address of the source electronic document into the header of the temporary computer object, wherein the header comprises an identifier of the temporary computer object and an attribute pertaining to the address of the source electronic document, and
copying the obtained selected text into the temporary computer object, wherein the selected text in the temporary computer object is persistently linked with the source electronic document via the address of the source electronic document in the temporary computer object; and
said processor storing the temporary computer object in the first electronic document after the first text.

US Pat. No. 10,796,073

NETWORK ARTICLE COMMENT PROCESSING METHOD AND APPARATUS, USER TERMINAL DEVICE, SERVER AND NON-TRANSITORY MACHINE-READABLE STORAGE MEDIUM

Guangzhou UCWeb Computer ...

1. A network article comment processing method, comprising:detecting, by a client in a process of displaying a current article, an operation gesture of a user for selecting user specified content in the current article;
obtaining coordinates of the user specified content on a current page and coordinates of the current page with respect to all pages of the current article;
according to the coordinates of the user specified content and the coordinates of the current page, positioning, in a DOM tree representing all the pages occupied by the article, a DOM node containing the user specified content, the positioning the DOM node comprising:
searching the DOM tree for an ID of a DOM node containing a sentence of the user specified content; and
in response to the DOM node containing the sentence having no ID, recursively searching one or more parent nodes until a DOM node having an ID is obtained;
displaying, in response to the detection of the operation gesture, comment content at a neighboring location of the user specified content, the displaying comprising:
inserting a new node at a neighboring location of the DOM node containing the user specified content; and
inserting the comment content to the new node;
hiding the comment content in response to the user finishing posting of the comment content; and
sending the comment content and the coordinates of the user specified content to a server.

US Pat. No. 10,796,072

INTELLIGENT WINDOW PLACEMENT WITH MULTIPLE WINDOWS USING HIGH DPI SCREENS

Google LLC, Mountain Vie...

1. A computer-implemented method, comprising:outputting, by a computing device and for display at a display device, a first window containing first graphical content and a second window containing second graphical content, wherein the first window and the second window share a border;
receiving, by the computing device, an input for modifying a size of the first window and a size of the second window by moving the border; and
responsive to receiving the input:
decreasing, by the computing device, the size of the first window;
scaling, by the computing device, the first graphical content for displaying in the first window by increasing a first pixel density setting of the first window that is within a range of settings specified at least in part by a user;
increasing, by the computing device, the size of the second window;
scaling, by the computing device, the second graphical content for displaying in the second window by reducing a second pixel density setting of the second window that is within the range of settings specified at least in part by the user, wherein the first pixel density setting has a different value than the second pixel density setting; and
outputting, by the computing device and for display at the display device, the first graphical content as scaled in the first window based on the first pixel density setting and the second graphical content as scaled in the second window based on the second pixel density setting.

US Pat. No. 10,796,071

ANALYZING DOCUMENT CONTENT AND GENERATING AN APPENDIX

International Business Ma...

1. A method for generating an appendix from document content comprising:executing a zoning and structural analysis phase, wherein the zoning and structural analysis phase comprises program instructions to identify a document structure, and program instructions to store the identified document structure, and wherein the zoning and structural analysis phase utilizes grammatical rules, punctuation rules, and dictionaries to logically decompose a document to the identified document structure;
in response to completing the zoning and structural analysis phase, executing a semantic relationship extraction phase, wherein the semantic relationship extraction phase comprises program instructions to extract semantic relationships from the stored identified document structure, and program instructions to store the extracted semantic relationships, and wherein the semantic relationship extraction phase further comprises:
extracting a semantic relationship from each stored identified sentence, wherein the semantic relationship comprises a subject, a predicate, and an object;
responsive to extracting and identifying the semantic relationship, applying statistical distribution analysis to record a position where the subject and the object appear in the document;
identifying and eliminating a trivial relation, wherein the trivial relation does not relate to a main topic of the document and based on the trivial relation having at least one of:
the subject being evenly distributed within the document as a whole; and
the object being evenly distributed within the document as a whole; and
storing a non-trivial relation in persistent storage, wherein the relation is a semantic relationship that is the main topic of the document or does not have a subject or an object evenly distributed in the document;
in response to completing the semantic relationship extraction phase, executing an analytics and relevance determination phase wherein the analytics and relevance determination phase comprises program instructions to identify candidate appendix topics in the stored extracted semantic relationships based on a degree of interdependency between the semantic relationships and program instructions to store the identified candidate appendix topics;
in response to completing the analytics and relevance determination phase, executing a web mining phase wherein the web mining phase comprises program instructions to calculate a measure of relevance of the mined web page to the stored candidate appendix topics and eliminate non-relevant intermediate results;
based on the web mining phase returning results relevant to a topic of the document, generating the appendix; and
formatting the appendix based on the mined intermediate results.

US Pat. No. 10,796,070

LAYOUT PATTERN SIMILARITY DETERMINATION BASED ON BINARY TURNING FUNCTION SIGNATURES

Mentor Graphics Corporati...

1. A method, executed by at least one processor of a computer, comprising:receiving layout data of layout patterns;
determining one or more binary turning function signatures for each of the layout patterns, the one or more binary turning function signatures comprising binary turning function signatures for polygons in the each of the layout patterns, determination of the binary turning function signature of a polygon comprising:
determining a binary turning function sequence number for the polygon based on assigning a binary digit to each vertex of the polygon or each vertex of a predominant-direction-reduced version of the polygon, the assigning being based on whether edge tracing turns right or left, and
deriving a minimum binary number or a maximum binary number among variants of the binary turning function sequence number generated by circular bit shifting and bit sequence reversing;
determining similar layout patterns in the layout patterns based on the one or more binary turning function signatures; and
storing information of the similar layout patterns in a non-transitory computer-accessible medium.

US Pat. No. 10,796,069

BUMP CONNECTION PLACEMENT IN QUANTUM DEVICES IN A FLIP CHIP CONFIGURATION

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:mapping, within a layout of a first surface in a flip chip configuration, a bump restriction area according to a set of bump placement restrictions, wherein a first bump placement restriction specifies an allowed distance range between a bump and a qubit chip element in a layout of the first surface, and wherein a second bump placement restriction specifies an allowed distance range between the bump and a qubit chip element in a layout of a second surface in the flip chip configuration; and
depositing an electrically conductive material, outside the bump restriction area, to form the bump, wherein the bump comprises an electrically conductive structure that electrically couples a signal between the first surface and the second surface and is positioned according to the set of bump placement restrictions.

US Pat. No. 10,796,068

STANDARD CELL DESIGN SYSTEM, STANDARD CELL DESIGN OPTIMIZATION METHOD THEREOF, AND SEMICONDUCTOR DESIGN SYSTEM

SAMSUNG ELECTRONICS CO., ...

1. A standard cell design system comprising:at least one processor configured to implement:
a control engine configured to determine planar parameters and vertical parameters of elements provided in a target standard cell;
a three-dimensional structure generating engine configured to generate a three-dimensional structure of the target standard cell based on the planar parameters and the vertical parameters;
an extraction engine configured to extract a standard cell model of the target standard cell from the three-dimensional structure;
an assessment engine configured to perform a plurality of assessment operations based on the standard cell model; and
an auto-optimizing engine configured to adjust, based on a machine learning algorithm, the planar parameters and the vertical parameters based on results of the plurality of assessment operations,
wherein the planar parameters include planar layout information of the target standard cell, and
wherein the vertical parameters include a plurality of process information of the target standard cell.

US Pat. No. 10,796,067

EDA CAA WITH LEARNING PHASE

Cadence Design Systems, I...

1. A computerized method comprising:accessing, using one or more hardware processors, a circuit design stored in memory, the circuit design comprising at least a first layer comprising a plurality of circuit elements in a circuit design layer area;
selecting sampling areas of the first layer;
identifying a set of predetermined defect sizes for a preliminary critical area analysis (CAA);
calculating, using the one or more hardware processors, a critical area (CA) value for each defect size of the set of predetermined defect sizes using the sampling areas;
creating, using the one or more hardware processors, an initial CAA estimate for the first layer using the CA value for each defect size of the set of predetermined defect sizes and a defect density (DSD) value for each defect size of the set of predetermined defect sizes;
selecting a set of input parameters using the initial CAA estimate, the set of input parameters comprising a selected defect size that corresponds to an inflection point, and the inflection point being identified using initial CAA estimate; and
calculating, using the one or more hardware processors, a CAA characteristic for the first layer using the set of input parameters.

US Pat. No. 10,796,066

POWER AWARE RESIZING OF CLOCK TREE INSTANCES

Cadence Design Systems, I...

1. A system comprising:one or more processors of a machine; and
a computer storage medium storing instructions, which, when executed by the machine, cause the machine to perform operations comprising:
accessing an integrated circuit design stored in memory, the integrated circuit design comprising a clock tree comprising routes that interconnect a plurality of clock-tree instances;
selecting, from the plurality of clock-tree instances of the clock tree, a first clock-tree instance to evaluate for resizing, the first clock-tree instance initially being of a first size;
determining a baseline power consumption measurement corresponding to a sub-tree of the first clock-tree instance with the first size of the first clock-tree instance, the determining of the baseline power consumption measurement comprising determining a sum of a first internal power consumption, a first switching power dissipation, and a first leakage power dissipation corresponding to the sub-tree of the first clock-tree instance with the first size of the first clock-tree instance;
determining an alternative power consumption measurement corresponding to the sub-tree of the first clock-tree instance with a second size of the first clock-tree instance, the determining of the alternative power consumption measurement comprising determining a sum of a second internal power consumption, a second switching power dissipation, and a second leakage power dissipation corresponding to the sub-tree of the first clock-tree instance with the second size of the first clock tree instance;
based on determining that the alternative power consumption measurement is less than the baseline power consumption measurement, upsizing the first clock-tree instance in the clock tree from the first size to the second size;
selecting a second clock-tree instance in the clock tree to evaluate for resizing based on a position of the second clock-tree instance in the clock tree relative to a position of the first clock tree instance in the clock tree:
downsizing the second clock-tree instance in the clock tree in response to determining that downsizing the second clock-tree instance results in a reduction of power consumption in a sub-tree of the second clock-tree instance;andgenerating a layout instance for the integrated circuit design based on the upsized first clock-tree instance and the downsized second clock-tree instance, the layout instance describing physical layout dimensions of the integrated circuit design.

US Pat. No. 10,796,065

HYBRID DESIGN LAYOUT TO IDENTIFY OPTICAL PROXIMITY CORRECTION-RELATED SYSTEMATIC DEFECTS

KLA-Tencor Corporation, ...

1. A system comprising:a stage configured to hold a wafer;
a detector configured to receive a beam reflected from the wafer; and
a processor in electronic communication with the detector, wherein the processor is configured to:
receive an image of the wafer that includes at least one defect; and
identify the defect on the wafer using a hybrid design layout that includes a printable layer layout formed on the wafer and a non-printed layer layout that includes an artificial layer generated by the processor, wherein at least a portion of the non-printable layer layout is incorporated with the printable layer layout in the hybrid design layout, and wherein the hybrid design layout is a virtual layer.

US Pat. No. 10,796,064

AUTONOMOUS PLACEMENT TO SATISFY SELF-ALIGNED DOUBLE PATTERNING CONSTRAINTS

INTERNATIONAL BUSINESS MA...

1. A system, comprising:a memory that stores computer executable components; and
a processor that executes the computer executable components stored in the memory, wherein the computer executable components comprise:
an optimization component, operatively coupled to the processor, that determines functional placement of a logic gate in a self-aligned double patterning process that forms a periodic circuit row configuration, wherein the optimization component comprises:
a swap component that determines whether the logic gate is placed, by the self-aligned double patterning process, to a functional circuit row of the periodic circuit row configuration based on an operation constraint of the logic gate.

US Pat. No. 10,796,063

MAPPING OF PATTERNS BETWEEN DESIGN LAYOUT AND PATTERNING DEVICE

ASML Netherlands B.V., V...

1. A method comprising:obtaining at least a clip of a design layout; and
determining, by a hardware computer system, a representation of the clip on a patterning device, under a condition that a reduction ratio from the representation to the clip is anisotropic.

US Pat. No. 10,796,062

FULL-CUSTOM VOLTAGE-DEPENDENT DESIGN RULES (VDRC) FLOW

SYNOPSYS, INC., Mountain...

1. A computer-implemented method of performing Voltage-based Design Rule Checking (VDRC) in a full-custom EDA Design and Implementation Platform, the method comprising:receiving a plurality of net voltages from at least a first net and a second net, wherein reception of the plurality of net voltages is from one or more of a simulation, a plurality of simulations, manual override, or direct input;
determining a net voltage range, the net voltage range being a difference between a first net voltage of a first net and a second net voltage of a second net;
causing transfer of the net voltage range to a layout editing process, the layout editing process resulting in generating a layout;
performing VDRC verification, confirming VDRC clean layout; and
accessing a VDRC configuration database, the VDRC configuration database configured to store design intent information comprising information indicating which one of one or more simulation results are to be used and information indicating designer override values.

US Pat. No. 10,796,061

STANDARD CELL AND POWER GRID ARCHITECTURES WITH EUV LITHOGRAPHY

Advanced Micro Devices, I...

1. A standard cell layout comprising:a plurality of transistors comprising at least a first transistor and a second transistor;
a plurality of unidirectional signal routes in each of a metal zero layer and a metal one layer; and
wherein one or more of the first transistor and the second transistor includes at least two tracks of the metal one layer using a minimum width of the metal one layer within a pitch of a single metal gate; and
wherein responsive to a potential being applied to an input node of the standard cell layout, a current is conveyed from the input node to an output node of the standard cell layout through one of the two tracks of the metal one layer within the pitch of the single metal gate.

US Pat. No. 10,796,060

METHOD AND SYSTEM FOR PIN LAYOUT

TAIWAN SEMICONDUCTOR MANU...

1. A computer readable storage medium encoded with program instructions, wherein, when the program instructions is executed by at least one processor, the at least one processor performs a method comprising the steps of:selecting a cell;
determining whether a first pin access of a first pin and a second pin access of a second pin disposed adjacent to the first pin in the cell are on a same patterning track, wherein the patterning track extends along a first direction;
separating the first pin and the second pin from each other along a second direction by a first predetermined distance when the first pin access and the second pin access are determined to not be on a same patterning track;
determining whether a third pin access of a third pin and a fourth pin access of a fourth pin disposed adjacent to the third pin in the cell are on a same patterning track extending along the first direction;
separating the third pin and the fourth pin from each other along the second direction by a second predetermined distance when the third pin access and the fourth pin access are determined to be on a same patterning track, the second predetermined distance being less than the first predetermined distance; and
causing an integrated circuit to be fabricated according to the first pin, the second pin, the third pin, and the fourth pin,
wherein the second direction is parallel with the first direction.

US Pat. No. 10,796,059

INTEGRATED CIRCUIT LAYOUT GENERATION METHOD AND SYSTEM

TAIWAN SEMICONDUCTOR MANU...

1. A method of generating an integrated circuit (IC) layout diagram of an IC device, the method comprising:receiving the IC layout diagram of the IC device, the IC layout diagram comprising:
a gate region having a width across an active region; and
a gate via positioned at a location along the width;
using the location to divide the width into a plurality of width segments;
calculating an effective resistance of the gate region based on the plurality of width segments; and
using the effective resistance to determine whether the IC layout diagram complies with a design specification.

US Pat. No. 10,796,058

PARTIAL RECONFIGURATION OF INTEGRATED CIRCUITS USING SHELL REPRESENTATION OF PLATFORM DESIGN

Xilinx, Inc., San Jose, ...

1. A method, comprising:loading, using computer hardware, a platform design including a module black-box instance, wherein the platform design is a circuit design that is placed and routed and the module black-box instance is empty;
identifying, using the computer hardware, synchronous boundary crossings between the platform design and the module black-box instance, wherein the synchronous boundary crossings include a partition pin of the module black-box instance, a first synchronous circuit element along on a signal path from the partition pin into the platform design, and logic between the partition pin and the first synchronous circuit element;
marking, at least in part and using the computer hardware, objects of the platform design included in the synchronous boundary crossings;
removing, using the computer hardware, unmarked objects from the platform design to generate a shell circuit design; and
implementing, using the computer hardware, a custom circuit design for inclusion in the module black-box instance based on the shell circuit design and timing constraints corresponding to objects remaining in the shell circuit design.

US Pat. No. 10,796,057

SUPPORT APPARATUS AND DESIGN SUPPORT METHOD

FUJITSU LIMITED, Kawasak...

1. A design support apparatus comprising:a memory; and
a processor coupled to the memory and the processor configured to:
store, for each of a plurality of cells, definition information that defines a distance between a cell and a power supply wiring as a condition of an arrangement position recommended for each of the plurality of cells in the memory, the plurality of cells being different from each other, and the definition information that corresponds to each of the plurality of cells being stored in the memory;
obtain an arrangement target cell from the plurality of cells; and
arrange the arrangement target cell at a position that satisfies the condition defined in the definition information for the distance between the arrangement target cell and the power supply wiring of a circuit in which the arrangement target cell is arranged when the arrangement target cell is arranged, based on the definition information stored in the memory that corresponds to the arrangement target cell.

US Pat. No. 10,796,056

OPTIMIZING LIBRARY CELLS WITH WIRING IN METALLIZATION LAYERS

GLOBALFOUNDRIES INC., Gr...

1. A method comprising:positioning an original cell within a second wiring layer to align with connections through an insulator layer to a first wiring layer;
identifying violations occurring when the original cell violates design rules relative to conductors of the second wiring layer, while the conductors are in an original position, wherein the original cell comprises an irregular pattern of conductive circuit elements, and wherein the conductors are in a regular pattern in the second wiring layer separated by areas in the second wiring layer reserved for cells including the original cell;
offsetting the conductors of the second wiring layer into different offset positions;
repeating the identifying violations for each of the offset positions;
generating a first metric for the original cell based on all violations identified for the different offset positions; and
altering the original cell or the second wiring layer to produce alterations;
for each of the alterations, repeating the identifying violations, the offsetting, the repeating the identifying violations for each of the offset positions, and the generating, to produce altered metrics for each of the alterations; and
selecting the original cell or one of the alterations as a selected design feature based on the selected design feature producing a lowest number of violations of the design rules.

US Pat. No. 10,796,055

METHOD FOR COLORING CIRCUIT LAYOUT AND SYSTEM FOR PERFORMING THE SAME

TAIWAN SEMICONDUCTOR MANU...

1. A method of manufacturing a semiconductor device, comprising:identifying a target network in a circuit layout, the target network having two or more linked nodes representing circuit patterns, and the target network being presented in an imaginary X-Y coordinate plane;
determining a starting node in the target network using a coordinate-based method;
(i) assigning a first feature to a first node in the target network;
(ii) assigning the first node assigned with the first feature to a first photomask;
(iii) assigning a second feature to a second node in the target network;
(iv) assigning the second node assigned with the second feature to a second photomask;
repeating (ii)-(v) to remaining nodes in the target network until any two immediately adjacent linked nodes in the target network have different features;
manufacturing the first photomask and the second photomask based on the nodes in the target network; and
manufacturing a semiconductor device using the first and second photomasks.

US Pat. No. 10,796,054

CHIP DESIGN METHOD OF OPTIMIZING CIRCUIT PERFORMANCE ACCORDING TO CHANGE IN PVT OPERATION CONDITIONS

SAMSUNG ELECTRONICS CO., ...

1. A method of designing a chip having an integrated circuit, the method comprising:obtaining delta cell delays and delta net delays according to a process, voltage, and temperature (PVT) corner change with respect to a plurality of cells and a plurality of nets forming the integrated circuit, wherein each of the delta cell delays and the delta net delays comprises a delay change amount based on the PVT corner change;
analyzing sensitivity of a delay with respect to the PVT corner change for a plurality of paths in the integrated circuit, by using the delta cell delays and the delta net delays;
determining N-number of sensitivity critical paths among the plurality of paths based on a result of the analysis, wherein N is an integer greater than or equal to 0; and
performing an engineering change order (ECO) based on a result of the determination.

US Pat. No. 10,796,053

COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR GENERATING A LAYOUT OF A CELL DEFINING A CIRCUIT COMPONENT

Arm Limited, Cambridge (...

1. A method comprising:identifying a first cell layout for a first cell architecture;
identifying a second cell layout for a second cell architecture that is different than the first cell layout of the first cell architecture;
identifying one or more cut lines relative to the first cell architecture; and
transforming the first cell layout of the first cell architecture at the one or more cut lines to match the second cell layout of the second architecture.

US Pat. No. 10,796,052

FORMAL VERIFICATION OF INTEGRATED CIRCUIT HARDWARE DESIGNS TO IMPLEMENT INTEGER DIVISION

Imagination Technologies ...

1. A computer-implemented method of verifying an integrated circuit hardware design to implement an integer divider, the integer divider configured to receive an input pair comprising a numerator N and a denominator D and output an output pair comprising a quotient q and a remainder r, the method comprising, in one or more processors:verifying, for each non-negative input pair in a subset of non-negative input pairs, that an instantiation of the integrated circuit hardware design generates a correct output pair;
formally verifying, for each two non-negative input pairs that have one of one or more predetermined relationships, that an instantiation of the integrated circuit hardware design generates corresponding output pairs that have a predetermined relationship; and
outputting one or more signals indicating whether the verifications were successful.

US Pat. No. 10,796,051

ADAPTIVE MODEL INTERFACE FOR A PLURALITY OF EDA PROGRAMS

CADENCE DESIGN SYSTEMS, I...

1. A non-transitory machine readable medium having machine readable instructions, the machine readable instructions comprising a model impact monitor, the model impact monitor comprising:an electronic design automation (EDA) manager that communicates with a plurality of EDA programs, wherein each EDA program generates a model set for a register-transfer level (RTL) design comprising a list of RTL operations;
an adaptive model interface that records changes to RTL operations in the list of RTL operations of the RTL design and measures a change in performance characteristics of each of the model sets generated by the plurality of EDA programs based on a respective one of the changes in the RTL operations of the RTL design.

US Pat. No. 10,796,050

METHOD FOR GENERATING AGING MODEL AND MANUFACTURING SEMICONDUCTOR CHIP USING THE SAME

Samsung Electronics Co., ...

1. A method for generating an aging model, used in design of a semiconductor chip that includes a plurality of semiconductor elements, the method comprising:extracting a plurality of aging scenarios including a use condition of the semiconductor chip from an aging model library of the semiconductor chip;
calculating a first aging parameter commonly applied to each semiconductor element of the plurality of semiconductor elements from the plurality of aging scenarios, wherein the first aging parameter has a same value for each semiconductor element of the plurality of semiconductor elements; and
generating characteristic deterioration information due to aging of each of the semiconductor elements through simulation using the first aging parameter and a second aging parameter, wherein a value of the second aging parameter corresponds to an individual semiconductor element of the plurality of semiconductor elements.

US Pat. No. 10,796,049

WAVEFORM PROPAGATION TIMING MODELING FOR CIRCUIT DESIGN

Cadence Design Systems, I...

1. A computer-implemented method comprising:accessing, using one or more hardware processors, a circuit design stored in memory, the circuit design comprising a first circuit element coupled to one or more associated circuit elements via one or more wire routes;
generating, using the one or more hardware processors, a gate output waveform for the first circuit element using a gate output waveform model, the gate output waveform model configured to generate the gate output waveform by using a driver input signal waveform and a gate input waveform as input slew value, and the driver input signal waveform comprising a waveform propagated to the first circuit element;
generating, using the one or more hardware processors, a circuit element output waveform using the gate output waveform and an N-pole model of an interconnect with the first circuit element using moment matching;
determining, using the one or more hardware processors, a delay value associated with the first circuit element using the circuit element output waveform;
determining, using the one or more hardware processors, a slew value associated with the first circuit element using the circuit element output waveform; and
generating, using the one or more hardware processors, an updated circuit design from the circuit design based at least in part on the delay value and the slew value.

US Pat. No. 10,796,048

ADDING DELAY ELEMENTS TO ENABLE MAPPING A TIME DIVISION MULTIPLEXING CIRCUIT ON AN FPGA OF A HARDWARE EMULATOR

SYNOPSYS, INC., Mountain...

1. A method of performing hardware emulation of a circuit design, the method comprising:partitioning a first portion of the circuit design to a first configurable logic chip of a hardware emulator;
adding a selection circuit to the circuit design in the first configurable logic chip;
selecting one of a first signal or a second signal during a first clock cycle, wherein the first signal and the second signal are used in the circuit design;
storing a first value associated with the selected signal during a second clock cycle;
sending the first value to an output pin of the first configurable logic chip during a third clock cycle;
storing a second value associated with the selected signal, wherein the first value is associated with the first signal and the second value is associated with the second signal; and
sending the second value to the output pin of the first configurable logic chip during a fourth clock cycle after the third clock cycle.

US Pat. No. 10,796,047

FUNCTIONAL SAFETY SYNTHESIS

Mentor Graphics Corporati...

1. A method comprising:locating, by a computing system, a vulnerable section of an electronic system described in a circuit design;
selecting, by the computing system, safety circuitry configured to monitor the vulnerable section of the electronic system;
modifying, by the computing system, the circuit design by inserting the safety circuitry and control circuitry into the circuit design, wherein the control circuitry and the safety circuitry are configured to detect faults in the vulnerable section of the electronic system; and
generating, by the computing system, a shell module for the modified circuit design, which encapsulates the safety circuitry, the control circuitry, and the vulnerable section of the electronic system.

US Pat. No. 10,796,046

MACHINE LEARNING-BASED PARASITIC EXTRACTION AUTOMATION FOR CIRCUIT DESIGN AND VERIFICATION

Mentor Graphics Corporati...

1. A method comprising:generating, by a computing system implementing a parasitic extraction tool, parasitic netlists from tests cases including test layout models of integrated circuit structures by converting the test layout models into electrical representations having groups of parasitic models, wherein the test cases include reference netlists corresponding to intended parasitic netlists for the test layout models; and
determining, by the computing system, values for scaling coefficients that, when utilized by the parasitic extraction tool to generate the parasitic netlists, allow differences between the parasitic netlists and the reference netlists to fall below threshold levels, wherein the determination of the scaling coefficients is performed by iteratively adjusting the values of the scaling coefficients based on differences between the reference netlists and the parasitic netlists generated with the scaling coefficients having the adjusted values.

US Pat. No. 10,796,045

EFFICIENT BI-DIRECTIONAL PROPERTY-BASED PATH TRACING

Mentor Graphics Corporati...

1. A method for efficient bi-directional property-based path tracing, comprising:reading a data structure corresponding to a circuit;
traversing series chains of similar devices in the circuit to reduce an iteration count and arrive at a circuit stability, wherein the circuit stability is determined when propagated user-specified and computed circuit properties remain unchanged between subsequent iterations of the traversing;
iteratively performing property accounting of properties as voltages propagate across devices in the circuit;
traversing the data structure for the propagated user-specified and computed property violations; and
cataloging and reporting the propagated user-specified and computed violations in human-readable form.

US Pat. No. 10,796,044

INTERFACE CONNECTIVITY FOR PRINTED CIRCUIT BOARD SCHEMATIC

Mentor Graphics Corporati...

1. A method comprising:selecting, by a computing system, a type of communication interface to connect parts in a schematic design of a printed circuit board assembly;
locating, by the computing system, a mapping that describes a connectivity between the parts and the selected type of communication interface by traversing a plurality of mappings stored by the computing system to identify the mapping correlated to at least one of the parts and the selected type of communication interface; and
automatically modifying, by the computing system, the schematic design to connect the parts in the schematic design with the selected type of communication interface based on the mapping.

US Pat. No. 10,796,043

NON-ADAPTIVE PATTERN REORDERING TO IMPROVE SCAN CHAIN DIAGNOSTIC RESOLUTION IN CIRCUIT DESIGN AND MANUFACTURE

Mentor Graphics Corporati...

1. A method, comprising:(a) receiving a set of scan chains and associated test patterns by a computer system;
(b) computing a penalty score for each test pattern in the set of test patterns;
(c) selecting a first pattern of the set of test patterns that has a lowest computed penalty score in the set of test patterns;
(d) removing the first pattern from the set of test patterns and adding the first pattern to a set of ordered patterns;
(e) computing an accumulated penalty score for each remaining pattern in the set of test patterns;
(f) selecting a next pattern of the set of test patterns that has a lowest accumulated penalty score in the set of test patterns;
(g) removing the next pattern from the set of test patterns and adding the next pattern to the set of ordered patterns; and
(h) repeating (e)-(g) until all test patterns have been removed from the set of test patterns and added to the set of ordered patterns,
wherein the penalty score for each test pattern is a sum of squares of lengths of subchains of bits in the set of scan chains that do not include a sensitive bit corresponding to that pattern.

US Pat. No. 10,796,042

PARTIAL SELECTION-BASED MODEL EXTRACTION FROM CIRCUIT DESIGN LAYOUT

Cadence Design Systems, I...

1. A method comprising:receiving, by a hardware processor, a selection of a portion of a layout of a circuit design, a boundary of the selection partitioning a network of the circuit design into a first set of portions of the network and a second set of portions of the network, the selection of the portion of the layout comprising the first set of portions of the network, the circuit design includes a circuit package that comprises a separate circuit design described by a circuit package schematic, and the first set of portions of the network comprises a circuit design portion inside the circuit package and a circuit design portion outside the circuit package;
generating, by the hardware processor, a first set of network fragments for the first set of portions of the network and a second set of network fragments for the second set of portions of the network based on the boundary of the selection, the first set of network fragments falling within the boundary of the selection, the second set of network fragments falling outside the boundary of the selection;
generating, by the hardware processor, network fragment mapping data describing a mapping for coupling the first set of network fragments with the second set of network fragments, the network fragment mapping data comprises a hierarchical name that maps a circuit design layout component to a circuit design schematic component, the circuit design portion outside of the circuit package comprising the circuit design layout component, and the circuit design portion inside the circuit package comprising the circuit design schematic component;
generating, by the hardware processor, a set of models based on the first set of network fragments; and
generating, by the hardware processor, a schematic extracted view of the circuit design based on the set of models and the network fragment mapping data.

US Pat. No. 10,796,041

COMPACTING TEST PATTERNS FOR IJTAG TEST

Cadence Design Systems, I...

1. A computerized method comprising:accessing, using one or more hardware processors, a circuit design stored in memory, the circuit design comprising a plurality of instances of one or more blocks, wherein each block of the one or more blocks is associated with a corresponding block test pattern that comprises one or more test subpatterns, wherein the circuit design is associated with a circuit design test pattern, and wherein the circuit design test pattern is associated with a plurality of test cycles;
processing, using the one or more hardware processors, a first block of the one or more blocks to:
identify a set of independent test subpatterns for the first block, each independent test subpattern in the set of independent test subpatterns being separately executable; and
identify a set of test subpattern types for the set of independent test subpatterns by identifying a test subpattern type for each independent test subpattern in the set of independent test subpatterns;
processing, using the one or more hardware processors, a first instance of the first block to identify, based on the set of independent test subpatterns for the first block, first one or more independent test subpatterns for the first instance;
merging, using the one or more hardware processors, the first one or more independent test subpatterns into the circuit design test pattern by merging, based on the set of test subpattern types, at least one independent test subpattern of the first one or more independent test subpatterns with another independent test subpattern of the circuit design test pattern, the at least one independent test subpattern and the other independent test subpattern being a same test subpattern type, the other independent test subpattern being for another instance in the plurality of instances, the merging being such that the at least one independent test is assigned to a first test cycle that is also assigned to the other independent test subpattern; and
initiating, by the one or more hardware processors, testing of a physical circuit using the circuit design test pattern with the first test cycle assigned to the at least one independent test subpattern and the other independent test subpattern such that the physical circuit is tested using the least one independent test subpattern and the other independent test subpattern during a same time period assigned to the first test cycle, the physical circuit being fabricated based on the circuit design.

US Pat. No. 10,796,040

INTEGRATED CIRCUIT DESIGN AND FABRICATION

ARM LIMITED, Cambridge (...

1. A method comprising:generating, using a computer, an integrated circuit layout including a plurality of data handling nodes interconnected by routing circuitry defining data packet routes between the plurality of data handling nodes;
for a transaction source node configured to generate data packets associated with a data handling translation between that transaction source node and a transaction target node and having one or more routing data fields controlling routing of the data packet, detecting, using the computer, a difference between a first routing controlled by the one or more routing data fields and a selected second routing provided by the integrated circuit layout; and
providing, using the computer, based on the detected difference, or more data mapping nodes in the integrated circuit layout to map an initial value of one or more of the routing data fields of a data packet generated by the transaction source node to a mapped data value, so that the mapped data value controls routing of the data packet using the selected second routing.

US Pat. No. 10,796,039

3D FINITE ELEMENT MESH OF A 3D PART THAT COMPRISES A LATTICE STRUCTURE

Dassault Systemes, Veliz...

1. A computer-implemented method for designing a three-dimensional (3D) finite element mesh of a 3D part that comprises a lattice structure, comprising:obtaining a solid representation of the 3D part, the solid representation being full of material and comprising at least one cavity to be filled by a lattice;
obtaining a regular tiling of cells, each cell comprising a finite element mesh, the cells of the tiling being lattice cells, wherein a lattice cell is partly empty of material;
superposing the regular tiling of cells with the solid representation of the 3D part;
partitioning the cells into two groups:
a first group of cells, each in contact with the solid representation of the 3D part, and
a second group of cells, none in contact with the solid representation of the 3D part;
computing a Boolean union of the first group of cells and the solid representation of the 3D part, the Boolean union forming a volume;
finite element meshing the volume of the computed Boolean union while preserving the set of faces of the first group of cells that are shared with the second group of cells; and
merging the finite element meshes of the cells of the second group and the meshed volume of the computed Boolean union.

US Pat. No. 10,796,038

ESTIMATING THINK TIMES

VMware, Inc., Palo Alto,...

1. A method comprising:obtaining a measured response time, wherein the measured response time is a measurement of an amount of time between a time that a simulated user provided a request to computing resources and a time that the simulated user received a response to that request;
determining a current think time;
determining that the measured response time is greater than a prior measured response time or less than the prior measured response time;
in response to determining that the measured response time is greater than the prior measured response time, increasing the current think time based on a function of the think time and a think time modification value;
in response to determining that the measured response time is less than the prior measured response time, decreasing the current think time based on a function of the think time and the think time modification value; and
using the increased or decreased think time to determine a delay between a time that the simulated user receives a response to a particular request and submits another request.

US Pat. No. 10,796,037

PADE-WEIERSTRASS ANALYTIC CONTINUATION TECHNIQUE FOR THE EFFICIENT ENFORCEMENT OF CONTROL LIMITS IN POWER-FLOW STUDIES

1. A method, comprising:generating a mathematical model of power flow equations for an electrical grid having load (PQ) buses and generator (PV) buses, the PQ buses and PV buses including control devices;
expressing the power flow equations in terms of power series of the functions involved;
embedding the mathematical model of the powerflow equations representing the electrical grid in a holomorphic embedding, the holomorphic embedding having a set of equality constraints for the electrical grid defining a linear system where variables of the powerflow equations are the coefficients at both PQ and PV buses;
transcribing the holomorphic embedding into software for use in a computer processor adapted to execute the software;
using the computer processor to compute an n-order algebraic approximant by means of Padé-Weierstrass approximants;
using the computer processor to evaluate the n-order algebraic approximant for the power series as a solution to the powerflow equations; and
displaying the solution to the powerflow equations as a measure of control of the electrical grid.

US Pat. No. 10,796,036

PREDICTION OF INHALABLE PARTICLES CONCENTRATION

International Business Ma...

1. A computer-implemented method for modeling prediction of inhalable particles concentration comprising:identifying at least one dispersal event indicating a decrease of an inhalable particles concentration over an occurrence period;
identifying at least one accumulation event, a time period of said accumulation event overlapping with a beginning or end of an occurrence period of an identified dispersal event;
generating a dispersal prediction model based on the identified at least one dispersal event, said generating a dispersal prediction model comprising:
establishing a first model representing dependency of occurrence of the dispersal event on at least one key weather element based on a historical weather information during a given time period;
computing a decreased amount of the inhalable particles concentration based on observation values of the inhalable particles concentration during the at least one dispersal event, said inhalable particles concentration observed at a time period spanning several minutes or spanning up to several hours; and
establishing a second model representing a decreased amount of the inhalable particles concentration as a function of the at least one key weather element, wherein the first model and the second model constitutes the dispersal prediction model;
obtaining at least one accumulation level of inhalable particles concentration for the at least one accumulation event;
generating a change prediction model for the accumulation level, the change prediction model representing a variation amount of the accumulation level as a function of the at least one key weather element; and
generating a plurality of accumulation prediction models by dividing a range of the accumulation level into multiple segments; and establishing, for each of the multiple segments, a respective accumulation prediction model representing the inhalable particles concentration as a function of the accumulation level and at least one key weather element.

US Pat. No. 10,796,035

COMPUTING SYSTEM WITH SIMULATED HARDWARE INFRASTRUCTURE TO SUPPORT DEVELOPMENT AND TESTING OF MANAGEMENT AND ORCHESTRATION SOFTWARE

EMC IP Holding Company LL...

1. A system, comprising:a processing platform comprising hardware resources; and
a simulated computing system executing on top of the processing platform using the hardware resources;
wherein the simulated computing system comprises a plurality of simulated elements, the simulated elements comprising:
a simulated compute node, the simulated compute node comprising a simulated hardware processor and a simulated storage device;
a simulated network switch device; and
a simulated power distribution device;
a test control interface configured to enable a user to test the simulated computing system by injecting an error into the simulated computing system, wherein injecting an error comprises at least one of (i) manipulating a behavior of one or more of the simulated elements and (ii) simulating a failure of one or more of the simulated elements; and
a management and orchestration platform executing on top of the simulated computing system, wherein the test control interface is configured to enable a user to inject the error into the simulated computing system to test a functionality of the management and orchestration platform;
wherein the management and orchestration platform is configured to automatically initiate a response upon detection of the error;
wherein the simulated computing system comprises a first hypervisor platform executing on top of the processing platform, and wherein the simulated network switch device comprises a plurality of simulated network switch devices that execute on the first hypervisor platform;
wherein the simulated compute node comprises a second hypervisor platform, wherein the simulated hardware processor and the simulated storage device execute on the second hypervisor platform;
wherein the second hypervisor platform executes on top of the first hypervisor platform; and
wherein the plurality of simulated network switch devices comprises a first set of simulated network switch devices that implement a simulated in-band network, and a second set of simulated network switch devices that implement a simulated out-of-band network.

US Pat. No. 10,796,034

SIMULATION APPARATUS, SIMULATION METHOD, AND SIMULATION PROGRAM RELATING TO RADIATION HEAT TRANSPORT PHENOMENON

JAPAN AGENCY FOR MARINE-E...

1. A simulation apparatus for simulating a radiation heat transport phenomenon, comprising:a view factor calculation means for calculating a view factor (Fkl) related to each pair of two elements (k, l) having corresponding surface areas (Ak, Al) in a virtual three-dimensional space that is defined by a plurality of surface elements and a plurality of volume elements, the view factor calculation means calculating, as a view factor related to each pair of two elements including one or two volume elements, a view factor decreased by a value corresponding to a quantity of radiation heat passing through the one or two volume elements using an effective area (Aeff) and a shield factor including an optical thickness (?) based upon a geometric thickness of each volume element, a permeability (Tkl), and the distance (r) between the two elements, as indicated in the following equation:

a radiation heat quantity calculation means for repeatedly calculating a radiation heat quantity exchanged between each pair of two elements in the virtual three-dimensional space using each view factor calculated by the view factor calculation means,
wherein the virtual three-dimensional space is defined by the plurality of surface elements and the plurality of volume elements so that a plurality of trees in the virtual three-dimensional space are treated as the plurality of volume elements such that each tree of the plurality of trees is separately represented as one or more volume elements of the plurality of volume elements,
wherein the radiation heat quantity exchanged is provided for further use in a simulation of an urban environment.

US Pat. No. 10,796,033

SIMULATION APPARATUS, SIMULATION METHOD, AND SIMULATION PROGRAM RELATING TO RADIATION HEAT TRANSPORT PHENOMENON

JAPAN AGENCY FOR MARINE-E...

1. A simulation apparatus, comprisinga generation means for generating, from data representing a simulation target space in which buildings and trees exist, simulation data for treating the simulation target space as a plurality of elements, between each two elements of which radiation heat is exchanged;
a view factor calculation means for calculating, based on the simulation data generated by the generation means, a view factor (Fkl) related to each pair of two elements (k, l) having corresponding surface areas (Ak, Al) among the plurality of elements, using an effective area (Aeff) and a shield factor of each element, including an optical thickness (?) based upon a geometric thickness of each element and a permeability (Tkl) between each pair of two elements in consideration of their order and the distance (r) between the two elements, as indicated in the following equation:

a first calculation means for calculating net radiation heat absorbed by each element using view factors calculated by the view factor calculation means;
a second calculation means for calculating unsteady spatial distributions of wind speed, temperature and water vapor amount;
a third calculation means for separately calculating temperatures of a plurality of leaves associated with the trees in the simulation target space using net radiation heat absorbed by each leaf, temperature of atmosphere in space where the leaf exists, a partial pressure of the water vapor in the atmosphere, and a saturated vapor partial pressure at a surface of the leaf;
a fourth calculation means for calculating, by making the first to third means function repeatedly, unsteady spatial distributions of wind speed, temperature and water vapor amount in consideration of exchange quantities of heat and water vapor between a separate tree canopy of each tree and the atmosphere; and
a simulation means for simulating an urban environment using the calculated unsteady spatial distributions of wind speed, temperature and water vapor amount.

US Pat. No. 10,796,032

METHOD AND SYSTEM FOR SPACE DESIGN

NORTHWEST INSTRUMENT INC....

1. A method for space design, the method comprising:acquiring first information of a physical space by a ranging and positioning apparatus, the first information including size measurement information of the physical space;
receiving the first information of the physical space by a computing device from the ranging and positioning apparatus through a communication interface of the computing device;
acquiring second information of a target object from a third party by the computing device through the communication interface of the computing device, the second information including size measurement information of the target object;
performing a visual presentation of the first information of the physical space and the second information of the target object on a display interface of the computing device;
calculating construction information of the target object being placed in the physical space by the computing device based on a layout of the target object on the visual presentation according to the first information of the physical space and the second information of the target object;
outputting the calculated construction information through the communication interface of the computing device to the ranging and positioning apparatus; and
guiding a user to position the target object in the physical space using a positioning function of the ranging and positioning apparatus according to the construction information, the size measurement information of the physical space, and the size measurement information of the target object.

US Pat. No. 10,796,031

METHOD AND SYSTEM OF PREPARING ENGINEERING DATA FOR INDUSTRIAL CONTROL SYSTEMS

Yokogawa Electric Corpora...

1. An industrial plant module-based engineering method comprising:duplicating a source engineering template having one or more source child templates to create a duplicated engineering template having one or more duplicated child templates which correspond to the one or more source child templates, respectively, without duplicating any instances with one or more child instances which have been instantiated from the one or more source child templates in the source engineering template, wherein the duplicated engineering template is free of any instances and wherein each of the one or more child instances has an original link to the source engineering template;
selecting at least one child instance among one or more child instances which have been instantiated from the source engineering template, wherein the selected at least one child instance has an original link to the source engineering template; and
changing the original link into a new link between the selected at least one child instance and the duplicated engineering template, wherein the selected at least one child instance has the new link to the duplicated engineering template and is free of the original link to the source engineering template, and wherein unselected one or more child instances remain to have the original link to the source engineering template.

US Pat. No. 10,796,030

DETECTING AN ATTEMPTED THEFT OF INFORMATION STORED IN AN RFID-ENABLED CARD

International Business Ma...

1. A method of detecting an attempted theft of information stored in a Radio Frequency Identification (‘RFID’)-enabled card, the method comprising,by computer program instructions executed by a computer processor:
receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information;
determining, by the theft detection module, that the RFID-enabled card information is mock card information corresponding to an RFID-enabled card security enclosure that is not valid RFID-enabled card information for an RFID-enabled card contained inside an RFID shield of the RFID-enabled card security enclosure, wherein the mock card information is modified at regular intervals to include updated information that is based on a timestamp, wherein the mock card information is provided to an RFID reader by an RFID tag disposed between an exterior of the security enclosure and the RFID shield responsive to an RFID request directed at the security enclosure, wherein the mock card information provided to the RFID reader responsive to the RFID request directed at the security enclosure includes updated timestamp information corresponding to a time period of an attempted theft of the RFID-enabled card information; and
responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions.

US Pat. No. 10,796,029

SOFTWARE CONTROLLED PORT LOCKING MECHANISMS

International Business Ma...

1. A computer-implemented method, comprising:providing a first computer device with a data communication port that includes an electromechanical lock that is movable between at least two positions as follows: (i) a locked position where any mechanically engaged removable data communication object is locked from being removed from mechanical engagement with the data communication port and any uninserted data communication object is locked out from mechanically engaging the data communication port; and (ii) an unlocked position where removable data communication objects are free to be mechanically engaged and disengaged with the data communication port;
after a removable mechanical data communication object has been mechanically engaged with the data communication port, moving, under control of software running on computer(s), the electromechanical lock from the unlocked position to the locked position so that the removable data communication object cannot be removed from the data communication port;
receiving a request, through software running on computer(s), to unlock the data communication port so that the removable data communication object can be removed from the data communication port, with the request being received by a system administrator device that is used by a system administrator who is a human individual;
responsive to the receipt of the request, receiving from the system administrator and through the system administrator device, authorization to unlock the data communication port;
responsive to receipt of the authorization from the system administrator, unlocking the data communication port so that the removable data communication object can be removed; and
responsive to removal of the data communication object, re-locking, by software running on computer(s), the data communication port so that removable data communication objects can not be mechanically engaged with the data communication port.

US Pat. No. 10,796,028

SCREEN PROTECTION FILTER

Right Group Central Co., ...

1. A screen protection filter, comprising:a protection filter body, configured to reduce a viewing angle of light transmitted therethrough;
a plurality of first attracting blocks, one of the first attracting blocks being disposed at a first corner of the protection filter body defined by a first edge and a second edge thereof, and another one of the first attracting blocks being disposed at a second corner defined by the second edge and a third edge thereof, wherein the first attracting block at the first corner has substantially equal distances to the first edge and the second edge, and the first attracting block at the first corner is separated from the first attracting block at the second corner;
a plurality of first shield pieces, disposed at the first and second corners of the protection filter body and configured to cover the entire first attracting blocks to protect an electronic device while the screen protection filter is attached to a display screen of the electronic device, wherein the first attracting blocks are respectively sandwiched between the protection filter body and the first shield pieces, the first shield piece covering the first attracting block at the first corner is separated from the first shield piece covering the first attracting block at the second corner, the first shield piece at the first corner extends directly adjacent to side surfaces of the protection filter body at the first and second edges thereof, and wherein the lengths of the first shield piece disposed at the first corner are equal along the first edge and the second edge, and less than the entire length of the first edge and the second edge, respectively; and
a second attracting block being folded to cover over at least a portion of a fourth edge of the protection filter body.

US Pat. No. 10,796,027

METHODS AND A SYSTEM FOR SECURE DATA STORAGE

1. A digital storage system for storing and retrieving user data, said system comprising:one or more independent digital storage devices, each digital storage device comprising a data storage device configured to store a single user's data;
a switch for controlling data access to each data storage device and for regulating a supply of electrical power to each data storage device to supply electrical power only when each user reads and/or writes to and from a corresponding independent digital storage device of the one or more independent digital storage devices; and
a security module for activating the switch and for storing timing restrictions that define a time window, wherein the switch can only be activated to power the data storage device during the time window, and wherein the switch is operable to physically isolate each data storage device outside the time window.

US Pat. No. 10,796,026

PROCESS AND DETACHABLE DEVICE FOR USING AND MANAGING ENCRYPTION KEYS

Wildfi Proprietary Limite...

1. A data storage system comprising:a detachable data storage device including data storage hardware, an encrypted key being stored on the detachable data storage device; and
an alarm device configured to communicate with the detachable data storage device;
where the data storage system is configured to operate in association with a cryptography module configured to decrypt the encrypted key, and
where the alarm device is configured to initiate an alarm event if a separation distance between the alarm device and the detachable data storage device is determined to be at least a threshold distance, the alarm event including terminating operation of the cryptography module to thereby prevent decryption of the encrypted key.

US Pat. No. 10,796,025

METHOD FOR CONTROLLING AN ELECTRONIC DEVICE AND AN ELECTRONIC DEVICE

Lenovo (Beijing) Limited,...

1. A method comprising:providing a foldable electronic computing device formable between a plurality of physical form states, wherein:
each of the plurality of physical form states is associated with a security level of a plurality of security levels and defines an active operational position of a plurality of active operational positions for the foldable electronic computing device for performing a plurality of sets of computing operations, and
each security level corresponds to a set of computing operations in the plurality of sets of computing operations;
detecting a current physical form state of the foldable electronic computing device;
determining a current security level in the plurality of security levels associated with the detected current physical form state;
determining a set of first computing operations in the plurality of sets of computing operations corresponding to the current security level; and
performing the set of first computing operations in the foldable electronic computing device corresponding to the current security level in response to a user providing an authentication operation of a plurality of authentication operations associated with the current security level,
wherein:
the plurality of security levels comprises at least a first security level associated with a first authentication operation and a second security level associated with a second authentication operation,
the first authentication operation and the second authentication operation are different authentication operations,
the first authentication operation or the second authentication operation comprises an augmented authentication operation, and
the current security level is one of the first security level and the second security level.

US Pat. No. 10,796,024

CRYPTOGRAPHIC ASIC FOR DERIVATIVE KEY HIERARCHY

Blockchain ASICs Inc., S...

1. A cryptographic system for managing operations on an information stream, the system comprising:means for processing an input message from the information stream by:
hashing the input message into a hash using a first one-way function (OWF),
performing a customized transforming of the hash into a transformed hash, with the transforming customized based on a transform key derived from a user passphrase, and
hashing the transformed hash into a second hash as an output result using a second OWF; and
means for creating the information stream based on the transform key,
wherein the cryptographic system controls an information stream knowledge hierarchy and wherein knowledge of the transform key enables replication of the system.

US Pat. No. 10,796,023

TECHNIQUES FOR MAINTAINING IMAGE INTEGRITY IN CONTAINERIZED APPLICATIONS

Twistlock, Ltd, Herzliya...

1. A method for maintaining image integrity in a containerized environment, the containerized environment including a software container composed from a plurality of image layers, the method comprising:indexing metadata of the software container, wherein the indexed metadata includes a unique signature of each image layer, wherein the signature of each image layer is based on contents of the image layer and of each previous image layer of the plurality of image layers;
determining whether each image layer is trusted based on the indexed metadata and a plurality of integrity rules, wherein determining whether each image layer is trusted further comprises:
determining whether the image layer is composed from a trusted image, and
determining whether the image layer meets the plurality of integrity rules when the image layer is above a known trusted image layer of the plurality of image layers; and
pulling each image layer that is not determined as trusted.

US Pat. No. 10,796,022

WEIGHTED SOURCE DATA SECURED ON BLOCKCHAINS

EBAY INC., San Jose, CA ...

1. A computer-implemented method for secure management of evaluation data, the method comprising:receiving an evaluation value signal from a source entity, the evaluation value signal relating to an evaluation entity having an evaluation score secured on an evaluation data blockchain;
defining entries for one or more source entities in trusted source data secured on a trusted source blockchain, wherein the trusted source blockchain is different than the evaluation data blockchain, wherein each source entity in the entries for each of the one or more source entities corresponds to a weight;
verifying whether the source entity is identified in the trusted source data wherein verifying whether the source entity is identified in the trusted source data comprises searching the trusted source blockchain for an entry corresponding to the source entity;
wherein when the source entity is identified in the trusted source data:
obtaining a weight corresponding to the source entity from the entry corresponding to the source entity,
obtaining the evaluation score for the evaluation entity from a first evaluation data block in the evaluation data blockchain, where the first evaluation data block is a most recent evaluation data block in the evaluation data blockchain,
calculating a new evaluation score based on the evaluation score obtained from the first evaluation data block of the evaluation data blockchain and the received evaluation signal weighted according to the weight from the trusted source blockchain, and
securely committing the new evaluation score to the evaluation data blockchain in a second evaluation data block.

US Pat. No. 10,796,021

SYSTEMS AND METHODS FOR AUTOMATICALLY ADJUSTING PARENTAL CONTROLS OF COMPUTING DEVICES TO ACCOMMODATE HOLIDAYS

NortonLifeLock Inc., Tem...

1. A computer-implemented method for automatically adjusting parental controls of computing devices to accommodate holidays, at least a portion of the method being performed by a first computing device comprising at least one processor, the method comprising:identifying, at the first computing device, a geolocation of the first computing device from geolocation information; and
performing, at the first computing device, a security action comprising:
identifying holiday information associated with the geolocation of the first computing device;
determining at least a portion of a current day is a holiday by comparing a current date to the holiday information;
determining a level of parental controls to impose on operation of the first computing device in response to at least a portion of the current day being a holiday, wherein the level of parental controls to impose on the first computing device is different than a level of parental controls imposed on non-holidays; and
imposing the level of parental controls to impose on the first computing device during the at least a portion of the current day.

US Pat. No. 10,796,020

CONSENT RECEIPT MANAGEMENT SYSTEMS AND RELATED METHODS

OneTrust, LLC, Atlanta, ...

1. A data processing consent optimization system comprising:one or more processors;
computer memory; and
a computer-readable medium storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
providing, to a plurality of data subjects, a user interface for initiating a transaction between an entity and each respective data subject of the plurality of data subjects;
at least partially in response to providing the user interface to the plurality of data subjects, receiving one or more requests to initiate the transaction from at least a first portion of the plurality of data subjects;
analyzing, by one or more processors, the one or more requests to identify one or more first factors associated with at least a first portion of the one or more requests, wherein the one or more first factors comprise at least one factor selected from the group consisting of:
a time of day at which each of the plurality of data subjects viewed the user interface;
how purpose-specific the user interface the transaction is; and
whether the user interface for initiating the transaction included an offer;
analyzing, by one or more processors, the one or more first factors of the user interface to determine at least one factor of the one or more first factors that increase a likelihood that a particular data subject will submit a request to initiate the transaction;
storing an indication of the at least one factor in computer memory;
generating a new user interface for initiating the transaction based at least in part on the at least one factor, wherein generating the new user interface comprises determining a layout of the new user interface based at least in part on the at least one factor;
providing the new user interface for initiating the transaction to at least one data subject; and
providing the new user interface to the plurality of data subiects that do not include the at least the first portion of the plurality of data subiects.

US Pat. No. 10,796,019

DETECTING PERSONALLY IDENTIFIABLE INFORMATION (PII) IN TELEMETRY DATA

Dell Products L.P., Roun...

1. A method comprising:determining, by a computing device, that an event occurred on the computing device;
determining, by the computing device, event data associated with the event;
determining, using a first machine learning classifier being executed by the computing device, that the event data includes personally identifiable information;
removing, using a second machine learning classifier being executed by the computing device, the personally identifiable information from the event data to create modified event data;
storing the modified event data in a device data file that includes data associated with the computing device; and
sending, by the computing device, the device data file to a server.

US Pat. No. 10,796,018

METHODS AND APPARATUS TO GENERATE AN OPTIMIZED WORKSCOPE

General Electric Company,...

1. An apparatus comprising:a task generator configured to generate a set of tasks to be performed on a target asset based on workscope drivers including asset information of the target asset and constraint information associated with contract requirements for the target asset;
a workscope mapper configured to: (i) receive the workscope drivers and process the asset information and the constraint information to generate a model of a target asset and a model of a constraint associated with the target asset, map the workscope drivers to a plurality of workscopes using the target asset model and the associated constraint model, each of the plurality of workscopes modeling maintenance of the target asset including the tasks and resources associated with the maintenance of the target asset, and (iii) dynamically adjust mapping of the workscope drivers based on changes to the asset information according to feedback received from the target asset;
a workscope strategy analyzer to evaluate each of the plurality of workscopes using dynamic optimization to determine a maintenance value to the target asset associated with each workscope based on a stage in a remaining life of the constraint at which the evaluation is executed and a state of the target asset, wherein the dynamic optimization is performed to predict the maintenance value based on a probability of a future change in state and an associated workscope value including cost corresponding to each workscope of the plurality of workscopes until an end of the remaining life of the constraint, and the maintenance value as predicted by the dynamic optimization is a minimum sum of the associated workscope values of the plurality of workscopes until the end of the remaining life of the constraint, wherein the probability of a future change in state is determined by forming a time directed discrete probability graph of possible stages and associated states for the remaining life of the constraint; and
a workscope selector to select a workscope from the plurality of workscopes based on the evaluation of the plurality of workscopes by the workscope strategy analyzer including comparison of the maintenance value associated with each workscope of the plurality of workscopes, the workscope selector to trigger maintenance with respect to the target asset according to the selected workscope.

US Pat. No. 10,796,017

ENTERPRISE VALIDATION PROCESS (EVP)

HM Health Solutions Inc.,...

1. A computer-implemented method for communicating authorized data to a destination computer system, the method comprising:receiving, in a data storage medium of a computer system, a data transmission including at least one data stream;
introspecting, by a processor of the computer system, the data stream to find at least one identifier;
matching, by the processor, the located identifier with at least one validation profile;
retrieving, by the processor, at least one reference data set from the matched validation profile;
parsing, by the processor, at least a portion of the data stream to extract at least one key piece of information;
validating, by the processor, the key piece of information extracted from the data stream against the retrieved reference data sets to determine the existence of mismatched data; and
terminating the data transmission to the destination system when validating the key piece of information extracted from the data stream against the retrieved reference determines the existence of mismatched data.

US Pat. No. 10,796,016

UNTETHERED RESOURCE DISTRIBUTION AND MANAGEMENT

Visa International Servic...

1. A computer-implemented method comprising:receiving, at a computing system from a user via a client device, a request for an access code and one or more transaction constraints on a use of the access code, wherein the access code is a payment code and the one or more transaction constraints includes at least a lifespan and an amount, wherein the user is authenticated by the client device;
identifying, by the computing system from the client device, a payment account to be associated with the access code;
obtaining, by the computing system and using the payment account, pre-authorization for one or more potential interactions using the access code from an authorization entity associated with the payment account, wherein the authorization entity is caused to place a hold on the payment account for the lifespan and the amount;
upon obtaining pre-authorization for the one or more potential interactions, generating, by the computing system, the access code, the access code formatted as a credit card number and including at least an identifier that causes an access request that includes the access code be routed to the computing system;
receiving, at the computing system, from an access device, an access request comprising the access code in an interaction, the access code having been manually entered via a manual credit card number input process without authentication of a bearer of the access code; and
upon determining that the interaction complies with the one or more transaction constraints, providing, by the computing system, an indication to the access device that the interaction is authorized, wherein the hold on the payment account is removed by the authorization entity upon determining that no access request has been received in relation to an interaction that complies with the one or more constraints.

US Pat. No. 10,796,015

METHOD AND SYSTEM FOR ANONYMOUS USER DATA STORAGE AND CONTROLLED DATA ACCESS

MyBitchBook, Inc., Las V...

1. A method of anonymously storing and selectively controlling access to a user's data comprising the steps of:receiving, via at least one communication interface of a server comprising a processor and a memory device, a first user private unique identifier from a first user;
transmitting, from said at least one communication interface of said server to a device of said first user, a first user public unique identifier;
receiving, via at least one communication interface of a server comprising a processor and a memory device, a second user private unique identifier from a second user;
transmitting, from said at least one communication interface of said server to a device of said second user, a second user public unique identifier;
receiving, via said at least one communication interface of said server, content from said first user along with said first user private unique identifier, an access designation from said first user of one or more third parties that may access said content, said access designation comprising said second user public unique identifier of said second user, and an encryption key of said first user;
generating, by said server, a content identifier for said content;
storing, at said memory device of said server, said content as encrypted by said first user's encryption key, in association with said content identifier and said access designation;
receiving, via said at least one communication interface of said server, a request to access said content from said second user, said request comprising said second user private unique identifier, said content identifier and the encryption key of said first user;
validating access of said second user to said content at said server by matching said second user private unique identifier provided by said second user to said second user public unique identifier associated with said content; and
when access is validated, decrypting said content using said key of said first user and providing access to said content to said second user.

US Pat. No. 10,796,014

DATA LICENSE MANAGER

International Business Ma...

1. A computer-implemented method, comprising:storing an information asset in a repository implemented by one or more computers, wherein the stored information asset includes a plurality of asset attributes;
registering the information asset in a catalog for the repository implemented by the one or more computers;
associating a data license with the information asset in the catalog, wherein the data license is stored as part of the information asset's metadata in the catalog, wherein the data license includes a scope matrix indicating a license scope for each asset attribute within the plurality of asset attributes, and wherein the scope matrix further indicates if each asset attribute of the information asset can be re-licensed in parts and if each asset attribute of the information asset can be re-sold in parts;
controlling access to the information asset stored in the repository based on the data license, by allowing a user to access the information asset only when the data license permits such access and the user has a proper entitlement under the data license to access the information asset; and
preventing additional checkouts of the information asset once a maximum number of users permitted for the information asset under the data license is reached, until at least one of the users returns the information asset or the maximum number of users permitted is increased.

US Pat. No. 10,796,013

USER PROGRAMMATIC INTERFACE FOR SUPPORTING DATA ACCESS CONTROL IN A DATABASE SYSTEM

Veeva Systems Inc., Plea...

1. A method for responding to a query in a database system, comprising:receiving configuration metadata of a first data record and a second data record in the database system, wherein the configuration metadata comprises information on a first data access control rule of the first data record and a second data access control rule of the second data record;
receiving a first query for data objects in the database system;
obtaining the first data record in response to the first query;
obtaining record properties of the first data record, wherein the record properties describe run-time properties of the first data record and include at least one record user action available on the first data record;
obtaining a query describe object in response to the first query, wherein the query describe object provides information on how to process the first data record; and
displaying the first data record together with the record properties of the first data record, including at least one record user action available on the first data record, on a user interface.

US Pat. No. 10,796,012

UNIFYING INTERFACE FOR CLOUD CONTENT SHARING SERVICES

Intel Corporation, Santa...

1. One or more non-transitory computer-readable media comprising instructions that cause a user device with one or more processor, in response to execution of the instructions by the user device, to:display an user interface (UI) to a user, wherein the UI displays at least a first graphic element to indicate a first object, a second graphic element to indicate a second object, a third graphic element to indicate a first party, a fourth graphic element to indicate a second party, a fifth graphic element to indicate a first cloud content sharing service provided by a first service provider, and a sixth graphic element to indicate a second cloud content sharing service provided by a second service provider different than the first service provider, wherein each of the first, second, third, fourth, fifth, and sixth graphic elements includes one or more of image data or text data, wherein the first object is stored in the first cloud content sharing service with a first access permission graphically represented by relative positions of the first graphic element with respect to the third graphic element and the fifth graphic element, the first access permission including a first read permission or a first write permission being graphically represented, and the second object is stored in the second cloud content sharing service with a second access permission including a second read permission or a second write permission graphically represented by relative positions of the second graphic element with respect to the fourth graphic element and the sixth graphic element that are visible at a same time as the relative positions of the first graphic element with respect to the third graphic element and the fifth graphic element, the second cloud content sharing service is different from the first cloud content sharing service, and the second party is different from the first party;
receive an input from the user, wherein the input is associated with a change of a selected one of the first access permission to the first object or the second access permission to the second object; and
in response to receipt of the input, cause the change to the selected one of the first access permission to the first object or the second access permission to the second object, and graphically represent the change to the first access permission or the second access permission in the UI by displaying of new relative positions of the first graphic element with respect to the third graphic element and the fifth graphic element, or by displaying of new relative positions of the second graphic element with respect to the fourth graphic element and the sixth graphic element.

US Pat. No. 10,796,011

DATA ELEMENT TOKENIZATION MANAGEMENT

Wells Fargo Bank, N.A., ...

1. A method comprising:receiving, by a tokenization service provider computing system, a file and a redaction service call, the redaction service call comprising file content and access information, wherein the file content is contained within a portion of the file to be tokenized;
identifying, by the computing system, a file type of the file, the file type associated with a predetermined tokenization schema and selected file content, the selected file content associated with file content;
generating, by the computing system, a tokenization manifest, the tokenization manifest comprising the selected file content, and the tokenization schema; and
tokenizing, by the computing system, the selected file content using the tokenization schema, the tokenization schema replacing the unrestricted file content into a corresponding restricted token, wherein the restricted token comprises embedded information associated with detokenizing the restricted token.

US Pat. No. 10,796,010

CLOUD-BASED IMAGE ACCESS SYSTEMS AND METHODS

MYMEDICALIMAGES.COM, LLC,...

1. A method comprising:receiving, by a computer using a Digital Imaging and Communication in Medicine (DICOM) protocol, an IP address and a port number;
receiving, by the computer using the DICOM protocol, a sender identifier;
establishing, by the computer using the DICOM protocol, a connection based on the IP address and the port number;
comparing, by the computer using the DICOM protocol, the sender identifier with a table of sender identifiers;
receiving, by the computer using the DICOM protocol, content from the IP address;
storing, by the computer using the DICOM protocol, the content in association with the sender identifier, in response to the sender identifier not being included in the table of sender identifiers;
receiving, by the computer using the DICOM protocol, a registration for the sender identifier, subsequent to the receiving the content and the storing the content; and
transferring, by the computer using the DICOM protocol, the content to an account associated with the sender identifier, in response to the receiving the registration for the sender identifier.

US Pat. No. 10,796,009

SECURITY ENGINE FOR A SECURE OPERATING ENVIRONMENT

Visa International Servic...

1. A method comprising:executing, by a mobile computing device, a secure operating environment on the mobile computing device, wherein the secure operating environment executes on the mobile computing device independently of a host operating environment of the mobile computing device, and wherein the secure operating environment includes a security services engine comprising one or more of the following types of security services: memory management services, data protection services, policy services, access control services, authentication services, privilege escalation detection services, identity management services, or secure connection services;
receiving, by the secure operating environment, a request for a security service, the request received from an application executing in the secure operating environment, the request indicating a type of security service to perform for the application;
determining, by the secure operating environment, a security capability of the mobile computing device to provide the security service, wherein the security capability of the mobile computing device is provided in part by the host operating environment;
selecting, by the security services engine of the secure operating environment based on the security capability of the mobile computing device and the type of security service, a first security capability to provide the security service, wherein the first security capability is selected from one or both of the security capability of the mobile computing device or a security capability of the secure operating environment; and
providing, by the secure operating environment, the security service to the application, wherein the security service is provided based on the first security capability.

US Pat. No. 10,796,008

EXECUTING PRIVILEGED CODE IN A PROCESS

CA, INC., New York, NY (...

1. A method, comprising:a computer system storing privileged data that is accessible via a first access privilege level but not accessible via a second access privilege level;
the computer system instantiating a user computer process, including allocating, within a user address space, a block of memory that stores a first set of program instructions of the user computer process, wherein the first set of program instructions is associated with the second access privilege level that does not permit the user computer process to access the privileged data via execution of the first set of program instructions;
the computer system enabling the user computer process to access the privileged data, wherein the enabling includes:
storing, within the block of memory allocated for the user computer process, a second set of program instructions that is executable to access the privileged data, wherein the second set of program instructions is associated with the first access privilege level that enables the user computer process to access the privileged data via execution of the second set of program instructions, wherein the second set of program instructions enables access to the privileged data without invoking a service process of a service address space; and
communicating, to the user computer process, access information comprising a token that identifies a location of the second set of program instructions within the allocated block of memory to enable the user computer process to invoke execution of the second set of program instructions;
in response to receiving a request from the user computer process to execute the second set of program instructions, the computer system executing the second set of program instructions to access the privileged data, wherein the executing includes configuring a processor to operate in accordance with the first access privilege level, executing the second set of program instructions using the processor, restoring the processor to operate in accordance with the second access privilege level, and returning control of the processor to the user computer process; and
releasing, as part of termination of the user computer process, the block of memory that stores the first and second sets of program instructions.

US Pat. No. 10,796,007

METHOD FOR OPERATING SEMICONDUCTOR DEVICE, CAPABLE OF DUMPING A MEMORY WITH SECURITY

SAMSUNG ELECTRONICS CO., ...

1. A method of operating a semiconductor device, the method comprising:in response to detecting a system failure, encrypting secure data stored in a secure area by using a random key newly generated after booting to generate encrypted secure data;
storing the encrypted secure data in the secure area; and
dumping the secure area and a non-secure area of a memory,
wherein the encrypting the secure data is performed in response to a one-time programmable (OTP) disable bit being disabled.

US Pat. No. 10,796,006

GEOGRAPHICAL TRACK DATA OBFUSCATION

MICRO FOCUS LLC, Santa C...

1. An apparatus comprising:a processor; and
a non-transitory computer readable medium storing machine readable instructions that when executed by the processor cause the processor to:
ascertain geographical data points that include a first data point and subsequent data points;
for each subsequent data point of the subsequent data points, determine a delta degree value as a difference between the subsequent data point and a corresponding previous data point, wherein the delta degree value of each of the subsequent data points includes a longitude value and a latitude value;
apply a first format preserving encryption (FPE) to encrypt longitude and latitude values of the first data point to obfuscate a location of the first data point;
apply a second FPE to encrypt the delta degree value of each of the subsequent data points to change the direction of each of the subsequent data points while maintaining a same distance of the subsequent data point from the corresponding previous data point;
apply a third FPE to a set that includes the encrypted delta degree values of the subsequent data points by reordering an arrangement of the encrypted delta degree values in the set; and
extract at least one of a total distance traveled, a total time, or a total elevation gain from the encrypted first data point and the set that includes the encrypted delta degree values of the subsequent data points,
wherein the delta degree value of each of the subsequent data points of the geographical data points further includes an elevation delta with respect to the corresponding previous data point, and
wherein, to extract the total elevation gain, the instructions are executable to cause the processor to: determine a sum of the elevation delta of each encrypted delta degree value from the set that includes the encrypted delta degree values.

US Pat. No. 10,796,005

METHOD OF APPLICATION SECURITY VULNERABILITY EVALUATION BASED ON TREE BOOSTING, AND READABLE MEDIUM AND APPARATUS FOR PERFORMING THE METHOD

Foundation of Soongsil Un...

1. A method of vulnerability evaluation of an apparatus having a processor and a memory for application security vulnerability evaluation based on tree boosting, the method comprising:generating an API classifier which classifies an input API as benign or malicious using a tree boosting-based algorithm;
assigning a security vulnerability score to the API inputted into the API classifier according to a benign or a malicious classification result of the API and storing in a database, wherein the security vulnerability score indicates security vulnerability in a quantitative value;
calculating the security vulnerability score of the API used in a target application using the security vulnerability score of each of the API stored in the database; and
classifying the target application as a malicious application or a benign application according to the security vulnerability score of the API used in the target application,
wherein the step of generating the API classifier which classifies the input API as benign or malicious using the tree boosting-based algorithm comprises:
extracting the API used in the application classified as the malicious application or the benign application and generating into a training dataset;
performing character string pre-processing on API feature information that constitutes the training dataset; and
vectorizing the training dataset having undergone the character string pre-processing by calculating an importance of each word, and
wherein the step of assigning the security vulnerability score to the API inputted into the API classifier according to the benign or the malicious classification result of the corresponding API and storing in the database comprises:
extracting APIs used in all applications provided at an Android reference site to generate a target dataset;
performing character string pre-processing on API feature information that constitutes the target dataset; and
vectorizing the target dataset having undergone the character string pre-processing by calculating an importance of each word.

US Pat. No. 10,796,004

SPLIT BOOT FOR COMPUTING DEVICES WITH SECURE AND INSECURE STATES

Sequitur Labs Inc., Issa...

1. A system for performing coincident boot of computing devices, said devices having at least one processor and having a non-volatile memory, the system comprising:a packaging tool for combining non-secure and secure boot content into a single encrypted and signed payload having payload components, and having descriptors for each payload component that identify the starting memory locations of each component;
a monitor coupled to the packaging tool for splitting the non-volatile memory into a secure and a non-secure partition and for verifying the integrity and authenticity of the boot payload components prior to loading;
a loader coupled to the monitor for loading the signed boot payload into the non-secure partition of the non-volatile memory; and
an extractor coupled to the loader for extracting secure and non-secure boot portions of the boot payload from the non-secure partition of the memory and for loading the verified payload into the secure partition of the memory, said secure partition of the memory being accessible only from the secure partition of the system.

US Pat. No. 10,796,003

DIVIDED INTEGRITY VERIFICATION USING MEMORY SEGMENT PROTECTION

TOSHIBA MEMORY CORPORATIO...

1. An information processing apparatus comprising:a first memory in which firmware is stored; and
a processor programmed to:
at a time of activating the information processing apparatus, assign a first access right to a verification target region of the first memory, the first access right causing, upon the verification target region being accessed, a violation of an access right of the first memory;
detect an access to the first memory;
check whether the access to the first memory violates the first access right;
upon detecting that the access to the first memory violates the first access right, perform an integrity check with respect to the verification target region of the first memory; and
update the first access right corresponding to the verification target region, to which the integrity check has been performed.

US Pat. No. 10,796,002

METHOD AND APPARATUS FOR ESTABLISHING A ROOT-OF-TRUST PATH FOR A SECURE COMPUTER

Janus Technologies, Inc.,...

1. A secure computer, comprising:a secure processor;
a host processor;
a root-of-trust path between the host processor and BIOS code for the host processor,
wherein the secure processor controls the root-of-trust path, thereby providing authenticated BIOS code for the host processor; and
a secure memory for storing the BIOS code, wherein only the secure processor has access to the secure memory to the exclusion of the host processor.

US Pat. No. 10,796,001

SOFTWARE VERIFICATION METHOD AND APPARATUS

Huawei Technologies Co., ...

1. A software verification method, comprising:obtaining, via a cloud computing network, an installation package of virtual network function (VNF) software and a signature file of the installation package, the installation package comprising installation files of the VNF software and signature files of the installation files, wherein the signature file of the installation package is used to store verification information of the installation package, and wherein the signature files of the installation files are used to store verification information of the installation files;
verifying the installation package according to the signature file of the installation package; and
in response to determining that the verification of the installation package succeeds:
obtaining the installation files and the signature files of the installation files;
verifying the installation files according to the signature files of the installation files, wherein verifying the installation files comprises:
verifying the installation files according to the signature files of the installation files when it is determined that none of the installation files are modified according to a preset rule; and
performing, when it is determined that at least one installation file in the installation files is already modified according to the preset rule, integrity protection verification on the at least one installation file, and respectively verifying corresponding installation files according to signature files of other installation files different from the at least one installation file; and
determining, when the verification of the installation files succeeds, that the VNF software has not been tampered with.

US Pat. No. 10,796,000

BLOCKCHAIN SYSTEM WITH NUCLEOBASE SEQUENCING AS PROOF OF WORK

Intel Corporation, Santa...

1. A sequence verifying platform (SVP) comprising:at least one hardware processor;
a machine-accessible storage medium responsive to the processor; and
a verification module in the machine-accessible storage medium, wherein the verification module, when executed by the processor, enablesthe SVP to:
determine whether a first discovered nucleobase sequence (DNS) from a first sequence mining platform (SMP) and a second DNS from a second SMP include matching segments;
in response to a determination that the first and second DNSs include matching segments, grant sequencing rewards to the first and second SMPs;
enforce a predetermined corroboration threshold, wherein the corroboration threshold specifies a minimum required number of corroborating SMPs; and
grant sequencing rewards based on a determination that (a) DNSs which include matching segments have been received from the minimum required number of corroborating SMPs and (b) blocks with POWs based on matching segments have been generated by the minimum required numberof corroborating SMPs.

US Pat. No. 10,795,999

IDENTIFYING AND PROTECTING AGAINST COMPUTER SECURITY THREATS WHILE PRESERVING PRIVACY OF INDIVIDUAL CLIENT DEVICES USING CONDENSED LOCAL DIFFERENTIAL PRIVACY (CLDP)

NORTONLIFELOCK INC., Tem...

1. A computer-implemented method for identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP), at least a portion of the method being performed by a computer device comprising at least one processor, the method comprising:accessing, at each of multiple local client devices, an actual data value;
generating, at each of the local client devices, a perturbed data value by adding noise to the actual data value, an amount of noise being added to each actual data value being probabilistically computed such that a probability of noise being added decreases as an amount of added noise increases;
sending, from each of the local client devices, the perturbed data value to a remote server device;
aggregating, at the remote server device, the perturbed data values to at least partially cancel out aggregate noise of the aggregated perturbed data values at a population level;
analyzing, at the remote server device, using CLDP, the aggregated perturbed data values to identify a computer security threat to the local client devices while preserving privacy of the actual data values by preventing the remote server device from inferring the actual data value of any of the local client devices; and
in response to identifying the computer security threat, protecting against the computer security threat by performing, at one or more of the local client devices, a remedial action to protect the one or more local client devices from the computer security threat.

US Pat. No. 10,795,998

DYNAMIC ROUTING OF FILES TO A MALWARE ANALYSIS SYSTEM

Cisco Technology, Inc., ...

1. A method comprising:obtaining, at a network security device, a file sent between a first device and a second device, the file having one or more associated attributes;
analyzing, at the network security device, the one or more attributes of the file to determine whether the file includes confidential information;
based on determining that the file includes the confidential information, selecting, at the network security device, a first malware analysis system as a selected malware analysis system for malware analysis of the file;
based on determining that the file does not include the confidential information, selecting, at the network security device, a second malware analysis system as the selected malware analysis system for the malware analysis of the file;
providing the file to the selected malware analysis system; and
based on results from the selected malware analysis system, providing, at the network security device, the file to the first device or to the second device or blocking the file from being provided to the first device or to the second device.

US Pat. No. 10,795,997

HARDENED SAFE STACK FOR RETURN ORIENTED PROGRAMMING ATTACK MITIGATION

INTEL CORPORATION, Santa...

1. A computing device to harden an execution stack, comprising:a processor, the processor comprising a processing core and a first register; and
memory coupled to the processor, the memory storing instructions that when executed cause the processor to:
determine whether a memory address accessed by a write instruction is outside a memory address bounds defined in the first register;
generate a fault based on a determination that the memory address accessed by the write instruction is outside the memory address bounds defined in the first register;
store, to a second register of the processor, a stack pointer value, the stack pointer value to indicate a boundary between stack frames of instrumented code above the boundary and uninstrumented code below the boundary;
determine whether the stack pointer rises to the stack pointer value; and
enable bounds checking based on a determination that the stack pointer rises to the stack pointer value.

US Pat. No. 10,795,996

SYSTEM AND METHOD OF MACHINE LEARNING OF MALWARE DETECTION MODEL

AO Kaspersky Lab, Moscow...

1. A method for machine learning of a model for detecting malicious files, wherein the method comprises:selecting a first file from a database of files as a training sample;
generating a behavior log based on executable commands intercepted during execution of the selected first file;
generating a plurality of behavior patterns based on the behavior log;
determining a hash function by changing parameters of known invertible hash functions and based on types of elements of the behavior patterns such that, when a first result is obtained by applying the hash function to the behavior pattern, a second result is obtained by applying an inverse of the hash function to the obtained first result, and a degree of similarity of the second result and the generated behavior patterns is greater than a specified first value, wherein the types of elements of the behavior patterns include: a first type for strings, a second type for numbers, and a third type for behavior patterns other than strings and numbers;
training a detection model for detecting malicious files by calculating a plurality of parameters of the detection model using the hash function on the behavior patterns; and
detecting that a second file is a malicious file using the trained detection model on a system behavior log generated during an execution of the second file.

US Pat. No. 10,795,995

IDENTIFYING MALICIOUS CREATIVES TO SUPPLY SIDE PLATFORMS (SSP)

CLEAN.IO, INC., McLean, ...

1. A method for feeding identification data of malicious creatives existing in internet advertisements to ad providers, the method comprising:receiving at a feeding computing device from client computing devices malicious code reports of attempted unwanted actions by malicious creatives of internet advertisements (ads) sent by the ad providers to webpages being displayed to users, the internet advertisements promoting goods and/or services,
wherein executing each malicious creative in a browser activates an unwanted action attempt by malicious code;
each malicious code report including a malicious code creative identification, and at least one of a malicious code demand side platform (DSP) identification or a malicious code seat identification;
pre-processing each malicious code report to create pre-processed malicious code reports by:
storing the pre-processed malicious code reports in a searchable database, wherein storing includes:
parsing each pre-processed malicious code report to extract the malicious code creative identification, and an ad provider identification for the malicious code;
storing the parsed pre-processed malicious code reports in the searchable database, each parsed pre-processed malicious code report including the malicious code creative identification, the ad provider identification, and a timestamp of the unwanted action attempt; and
feeding the stored parsed pre-processed malicious code reports to the ad providers based on the ad provider identifications of the stored parsed pre-processed malicious code reports.

US Pat. No. 10,795,994

DETECTING RANSOMWARE

McAfee, LLC, Santa Clara...

1. A ransomware mitigation engine, comprising:a processor;
a convolutional neural network configured to provide file type identification (FTI) services comprising:
identifying an access operation of a file as a write to the file or newly creating the file;
computing a byte correlation factor for the file;
classifying the file as belonging to a file type;
determining with a screening confidence that the file type is correct for the file;
determining that the screening confidence is below a screening confidence threshold; and
circuitry and logic to provide heuristic analysis comprising:
receiving notification that the confidence is below the confidence threshold;
performing a statistical analysis of the file to determine a difference between an expected value and a computed value;
determining from the difference, with a detection confidence, that the file has been compromised; and
identifying the file as having been compromised by a ransomware attack.

US Pat. No. 10,795,993

MEMORY TRACKING FOR MALWARE DETECTION

Juniper Networks, Inc., ...

1. A device, comprising:one or more memories; and
one or more processors to:
load a process under test into virtual memory associated with the device,
wherein the virtual memory includes a plurality of memory pages;
insert a malware inspection element and a memory tracking element into the process under test,
wherein the malware inspection element uses a first set of memory pages of the plurality of memory pages;
provide, using the malware inspection element, a notification of an event associated with the process under test to the memory tracking element;
identify, using the memory tracking element and based on information included in the notification, a second set of memory pages of the plurality of memory pages,
wherein the second set of memory pages are assigned to, and used by, the process under test, and
wherein the second set of memory pages is different than the first set of memory pages; and
generate, using the memory tracking element and based on identifying the second set of memory pages, a memory map associated with the process under test,
wherein the memory map includes information identifying the second set of memory pages as being assigned to, and used by, the process under test, and
wherein the memory map is to be used to determine whether the process under test includes malware.

US Pat. No. 10,795,992

SELF-ADAPTIVE APPLICATION PROGRAMMING INTERFACE LEVEL SECURITY MONITORING

Areca Bay, Inc., Los Alt...

1. A method for monitoring and classifying application transaction data, and enforcing data security policy based on the classification of the application transaction data, the method comprising:receiving application transaction data transferred to an application through application programming interface (API) calls made to an API exposed at an API gateway, the application transaction data comprising API call data, wherein the application or the API exposed at the API gateway is unknown to the API gateway;
identifying API call data in the application transaction data using rules derived from one or more API specifications known by the API gateway and determining that the API call data does not match with any of the one or more API specifications;
in response to determining that the API call data does not match with any of the one or more previously generated API specifications, classifying the API call data using one or more automatic classification methods;
in response to the classifying, generating an API specification for an API call from the API calls corresponding to the API call data and generating a security policy action to implement API security measures for the application transaction data;
updating the one or more known API Specifications by adding the generated API specification for the API call to the one or more known API specifications at the API gateway; and
in response to the generating, processing the application transaction data including the API call for security policy enforcement at the API gateway by applying the security policy action to the application transaction data.

US Pat. No. 10,795,991

ENTERPRISE SEARCH

FireEye, Inc., Milpitas,...

1. A non-transitory storage medium having stored thereon logic, the logic being executable by one or more processors to perform operations, comprising:receiving input information from a user interface via a connection to a network;
generating a query based on the input information;
identifying a set of one or more audits based on attributes included in the query by at least
analyzing the query to determine a plurality of attributes including at least the attributes, and
selecting the set of one or more audits based on the attributes, wherein the selected set of the one or more audits includes a first audit, wherein each audit of the set of one or more audits includes one or more tasks and each of the one or more tasks includes an audit script and the first audit of the one or more audits being identified to or configured for execution on at least a first endpoint device of one or more endpoint devices based on one or more factors including (i) an identifier associated with at least the first endpoint device, (ii) an endpoint device type, (iii) an endpoint device hardware configuration, (iv) an endpoint device software configuration, or (v) an endpoint device compute platform;
providing at least the set of one or more audits to a plurality of endpoint devices including the first endpoint device; and
receiving results associated with the set of one or more audits including a result associated with at least the first audit from the first endpoint device, the result being based, at least in part, on execution of one or more audit scripts associated with the first audit by the first endpoint device.

US Pat. No. 10,795,990

SECURE CODE OPTIMIZATION METHOD AND SYSTEM

ABB Schweiz AG, Baden (C...

1. A method of automatically generating secure code, the method comprising:receiving source code and security constraints for the source code, the security constraints encoding, to what extent a variable of variables in the source code is considered secure;
generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations;
wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable;
wherein the security constraints encode a confidentiality domain for at least one of the variables in the source code;
wherein, when generating secure code, an operation in the source code, which operates on the at least one variable of the variables in the source code with a confidentiality domain is replaced with a confidentiality domain operation;
wherein a confidentiality domain operation comprises the non-secure operation and a corresponding secure operation,
wherein the secure code comprises a client part to be executed on a client, wherein the client part is adapted for receiving input data, updating the input data by encrypting a portion of variables in the input data, which variables are considered as secure, and to send partially encrypted input data to a server,
wherein the secure code comprises a server part to be executed on at least one server, wherein the server part is adapted to receive the partially encrypted input data, to process the partially encrypted input data based on the secure operations and to send the processed data back to the client, and
wherein the client part is adapted for decrypting the processed data into result data.

US Pat. No. 10,795,989

SECURE JUST-IN-TIME (JIT) CODE GENERATION

Fortinet, Inc., Sunnyval...

1. A computer implemented method of securely executing a Just-In-Time (JIT) compiled code in a runtime environment, comprising:using at least one hardware processor for:
receiving, by an application, from a JIT executing process that is executing in a context of the application a request to compile in runtime a code segment;
initiating, by the application, a JIT compiling process to compile said code segment to generate an executable code segment, wherein said JIT compiling process is executed at an application level in the context of the application;
storing said executable code segment in a shared memory; and
providing to said JIT executing process a pointer to said executable code segment in said shared memory, said JIT executing process having read-execute access rights to said shared memory;
wherein said JIT executing process and said JIT compiling process are different processes.

US Pat. No. 10,795,988

DEVICE AND METHOD OF REQUESTING EXTERNAL DEVICE TO EXECUTE TASK

Samsung Electronics Co., ...

1. A first device requesting a second device to execute a task, the first device comprising:a transceiver configured to communicate with the second device; and
at least one processor configured to:
receive an event at the first device for requesting execution of a task which is executable by the first device,
transmit at least one of an application execution file or link information for executing the task to the second device through the transceiver in response to receiving the event,
request the second device to execute the task instead of the first device in a protected region on a memory of the second device based on the at least one of the application execution file or the link information, and
receive result data comprising information about a result generated by executing the task, through the transceiver,
wherein if the at least one of the application execution file or the link information is defective, the received result data includes information that the at least one of the application execution file or the link information is defective,
wherein the task is restricted from access to regions other than the protected region while being executed by the second device,
wherein when the executing of the task in the protected region on the memory is completed, data in the protected region is deleted, and
wherein the task is to execute a diagnosis application based on limited access to private biometric information stored in the second device.

US Pat. No. 10,795,987

RATE-LIMITING API CALLS FOR AN ACCOUNT IN A CUSTOMER-RELATIONSHIP-MANAGEMENT SYSTEM BASED ON PREDICTED ABUSIVE BEHAVIOR

Zendesk, Inc., San Franc...

1. A method for detecting and controlling operations performed by abusive accounts in a customer-relationship-management system, comprising:obtaining account-related information for an account in the customer-relationship-management system;
determining a likelihood that the account is being used for intentionally abusive purposes based on the account-related information by:
using a classification model to classify the account as either good or abusive, and
using a regression model to produce a regression score, which indicates the likelihood that the account is being used for intentionally abusive purposes; and
limiting a rate of processing for application-programming interface (API) calls made from the account to the customer-relationship-management system based on the determined likelihood that the account is being used for intentionally abusive purposes, wherein the API is executing on a processor on the customer-relationship-management system.

US Pat. No. 10,795,986

METHOD AND SYSTEM FOR AUTHENTICATING A COMPONENT IN A POWER CONVERTER

GE ENERGY POWER CONVERSIO...

1. A method for authenticating parts in an electric machine, the method comprising:fetching, using a controller, identification data of each part in a set of parts for the electric machine:
performing a first verification step on the identification data of each part in the set of parts by searching a database for associated manufacturer identification data of each part in the set of parts and performing a comparison there between to determine whether each part in the set of parts is authentic;
performing a second verification step on the identification data for each part in the set of parts to determine whether a combination of the set of parts is authentic, in response to the determination that each part in the set of parts is authentic, and
in response to one of the determination that each part in the set of parts is not authentic or the determination that the combination of the set of parts is not authentic, issuing by the controller, a command to disable the electric machine.

US Pat. No. 10,795,985

APPLICATIONS OF SECURED MEMORY AREAS AND SECURE ENVIRONMENTS IN POLICY-BASED ACCESS CONTROL SYSTEMS FOR MOBILE COMPUTING DEVICES

Sequitur Labs Inc., Issa...

1. A system for securely adjudicating an access request from a requesting client in an untrusted environment to a computing device, the adjudication being completely hidden from the requesting client and residing in a trusted environment, the system comprising:a memory having an untrusted environment and a trusted environment, said trusted environment restricting all access from the untrusted environment;
a set of policy instructions stored only within the trusted environment in the memory;
a decision processor resident in the trusted environment, having a policy decision server configured to adjudicate the access request by applying at least one policy instruction from the set of policy instructions to the access request resulting in an adjudicated decision granting or denying the access request;
a decision cache within the trusted environment, the decision cache being used to store previous decisions made by the decision processor;
an agent resident in the untrusted environment for intercepting the access request to the computing device from the requesting client where the requesting client may not have knowledge of the interception of the access request, what performs the adjudication, where the adjudication is performed, or how the access request is adjudicated, for transmitting the access request including additional parameters needed to adjudicate the request as required by the policy instructions, to the policy-based transaction server, and for receiving and transmitting access request decisions from the policy decision server on the decision processor; and
an encrypted back-channel coupling the agent to the decision processor for transmitting the intercepted access request from the agent to the decision processor and for hiding the policy instructions, the adjudication process, and the conditions utilized by the decision processor in adjudicating the access request from said requesting client.

US Pat. No. 10,795,984

ACTIVE LOCKING MECHANISM USING MACHINE LEARNING

Capital One Services, LLC...

1. A computer-implemented method comprising:defining a plurality of features to unlock a first device, wherein the plurality of features comprises one or more features that verify an identity of a user;
training, by the first device, a machine learning model to recognize a first feature of the plurality of features;
obtaining, by the first device and while training the machine learning model to recognize the first feature, a plurality of secondary features;
training a second machine learning model to recognize a second feature of the plurality of secondary features, wherein the machine learning model transfers the plurality of secondary features to the second machine learning model;
receiving a request to lock the first device, wherein the request to lock the first device comprises identifications of an unlock condition comprising the first feature and the second feature;
locking, based on receipt of the request to lock the first device, the first device;
recognizing, using the machine learning model, the first feature;
recognizing, using the second machine learning model, the second feature;
determining, based on the machine learning model recognizing the first feature and based on the second machine learning model recognizing the second feature, that the unlock condition has been satisfied;
unlocking, based on the determination that the unlock condition has been satisfied, the first device.

US Pat. No. 10,795,983

METHOD AND APPARATUS FOR AUTHORIZED LOGIN

Alibaba Group Holding Lim...

15. A computer-implemented system, comprising:one or more computers; and
one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising:
receiving a user input to drag a displayed icon of a first application from a first area to a second area of a screen of a device, wherein a second application is displayed on the second area of the screen, the first area is outside the second area, and a user has logged into the first application on the device;
in response to the user input:
transmitting login authorization information of the first application to the second application; and
submitting, by the second application, the login authorization information to a server of the first application through a server of the second application; and
authorizing logging into the second application on the device in response to receiving a notification from the server of the first application through the server of the second application, wherein the notification indicates that the login authorization information is verified.

US Pat. No. 10,795,982

CAPTCHA GENERATION BASED ON ENVIRONMENT-SPECIFIC VOCABULARY

International Business Ma...

1. A computer system for restricting access to a locked computing resource in a web browser with a user-tailored Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), the computer system comprising:a memory medium comprising program instructions;
a bus coupled to the memory medium; and
a processor, for executing the program instructions, coupled to a user-tailored CAPTCHA generation engine via the bus that when executing the program instructions causes the system to:
obtain a request for a CAPTCHA from a web browser of a user attempting to access a resource;
select a set of terms associated with the user from a pool of terms collected from an environment of the user within a pre-determined time period;
determine a familiarity value of the selected terms indicating a recognizability of the terms by the user;
generate a CAPTCHA of the selected set of terms having a level of graphic noise corresponding to the familiarity value; and
send the generated CAPTCHA to the web browser.

US Pat. No. 10,795,981

ADD-ON MODEM FOR WIRELESS DEVICES AND METHODS USEFUL IN CONJUNCTION THEREWITH

ELTA SYSTEMS LTD., Ashdo...

1. A system for ex post facto upgrading of at least one legacy personal communication device including a legacy modem and lacking at least one desired wireless communication feature, the system comprising:an upgraded communication device including an auxiliary cellular modem, e.g. a commercially available cellular modem physically connected via an ex post facto physical connection to a legacy personal communication device having at least one legacy wireless output channel which has been neutralized.

US Pat. No. 10,795,980

PREVENTING UNAUTHORIZED ACCESS TO SECURED INFORMATION USING IDENTIFICATION TECHNIQUES

Bank of America Corporati...

1. A method, comprising:identifying, by at least one processor based on first sensor data received from one or more sensors, an identity of a driver of a vehicle, wherein the first sensor data indicates whether a driver seat in the vehicle is occupied;
identifying, by the at least one processor based on second sensor data received from the one or more sensors, an identity of a passenger of the vehicle, wherein the second sensor data indicates whether a passenger seat in a vehicle is occupied;
obscuring, by the at least one processor based on the identity of the passenger, first information on a screen of the vehicle, while displaying second information on the screen; and
sending, to a headset of the driver, audio of a spoken version of obscured first information.

US Pat. No. 10,795,979

ESTABLISHING PERSONAL IDENTITY AND USER BEHAVIOR BASED ON IDENTITY PATTERNS

International Business Ma...

1. A method comprising:receiving, by one or more processors, a set of input images corresponding to a period of time, wherein each input image in the set of input images corresponds to a specific time within the period of time;
identifying, by one or more processors, a first user in the set of input images;
determining, by one or more processors, a user identity pattern based on the set of input images, wherein the user identity pattern includes multiple instances of at least one physical characteristic of the first user over the period of time, and wherein the first user can be uniquely identified based on the user identity pattern; and
associating, by one or more processors, the set of input images and the user identity pattern with a first user profile for the first user, by matching the set of input images and the user identity pattern to the first user profile in a set of user profiles and, in response, updating the first user profile based on the user identity pattern,
wherein the matching comprises:
selecting a current user profile from the set of user profiles for matching the set of input images and the user identity pattern;
comparing the set of input images and the user identity pattern with the current user profile;
determining a combined confidence score from a plurality of images in the current user profile, the user identity pattern, and a user behavior based on the user identity pattern; and
responsive to the combined confidence score being higher or equal to a predetermined threshold, identifying the current user profile as the first user profile for the first user, wherein the predetermined threshold is automatically determined based on a plurality of user identity patterns.

US Pat. No. 10,795,978

METHOD AND DEVICE FOR IDENTITY AUTHENTICATION

Alibaba Group Holding Lim...

1. A method, comprising:collecting a plurality of actions of a user performed on a terminal, wherein the plurality of actions correspond to a specified operation;
determining a plurality of standard value ranges corresponding to the specified operation, wherein the plurality of standard value ranges comprise a standard motion value range and a standard pressure value range;
determining whether a threshold percentage of the plurality of actions falls within the plurality of standard value ranges, by:
determining motion information of the terminal based on the plurality of actions of the user;
determining pressure information of a plurality of taps based on the plurality of actions of the user;
determining whether the threshold percentage of the motion information of the terminal falls within the standard motion value range;
determining whether the threshold percentage of the pressure information falls within the standard pressure value range;
if determining that a threshold percentage of the plurality of actions falls within the plurality of standard value ranges, performing the specified operation corresponding to the plurality of standard value ranges; and
if determining that a threshold percentage of the plurality of actions does not fall within the plurality of standard value ranges, refusing to perform the specified operation corresponding to the plurality of standard value ranges.

US Pat. No. 10,795,977

DIGITAL ASSET TRACEABILITY AND ASSURANCE USING A DISTRIBUTED LEDGER

Oracle International Corp...

1. One or more non-transitory tangible storage media including logic for execution by one or more processors and when executed facilitating digital asset tracing in a networked computing environment, comprising:determining a request to register a digital asset including software, in the networked computing environment;
computing a first hash of an initial source file of the digital asset;
ascertaining a version of the initial source file;
electing one or more nodes of a distributed ledger of the networked computing environment including a blockchain, to commit the first hash to the distributed ledger in association with a version of the digital asset corresponding to the version of the initial source file and storing timestamp information associated with the committing of the first hash;
converting the initial source file into a binary file, resulting in a binary version of the digital asset;
computing a second hash, wherein the second hash is of the binary file;
committing the second hash to the distributed ledger in association with the version of the digital asset;
using version information associated with the second hash and version information associated with the first hash to associate one or more binary file hashes in the distributed ledger with one or more of: source files in a source file repository, a workstation from which the source file originated, or a developer of the source file;
selectively making the binary file available to one or more client devices associated with one or more respective users of the networked computing environment, in accordance with one or more permissions allocated to the one or more respective users, wherein the one or more client devices include one or more computers of one or more respective customers of one or more cloud services provided in the networked computing environment; and
using the timestamp information to establish a first developer to submit the initial source file.

US Pat. No. 10,795,976

PROGRAM RANDOMIZATION FOR CYBER-ATTACK RESILIENT CONTROL IN PROGRAMMABLE LOGIC CONTROLLERS

Siemens Aktiengesellschaf...

1. A method for programmable logic controller (PLC) program randomization, the method comprising:receiving, by an engineering system computer, source code corresponding to a PLC program;
compiling, by the engineering system computer, the source code into a plurality of functionally equivalent intermediate representations of the PLC program, wherein program structure of the PLC program is randomized during compilation such that each intermediate representation is unique among the plurality of intermediate representations; and
transmitting, by the engineering system computer, the plurality of intermediate representations to one or more PLCs;wherein the PLC program comprises a plurality of function blocks, each identified by a triple comprising a numerical identifier and the program structure of the PLC program is randomized by:assigning a random value to each numerical identifier, and
sorting the plurality of function blocks by numerical identifier.

US Pat. No. 10,795,975

VERSION MANAGEMENT PLATFORM

Capital One Services, LLC...

1. A method, comprising:performing, by a device and by accessing a distributed ledger that is used for managing a version control operation of a program, a first verification procedure to determine that a user has not consented to a current version of one or more terms associated with the program;
providing, by the device and to a user device, an indication that the user has not consented to the current version of the one or more terms,
the indication to cause an interface of the user device to provide the current version of the one or more terms in a manner capable of being accepted by the user;
receiving, by the device and from the user device, a message indicating an acceptance of the current version of the one or more terms;
performing, by the device and after receiving the message, one or more additional verifications procedures to determine that the user is valid; and
instructing, by the device, one or more nodes, of a plurality of nodes of a network that have access to the distributed ledger, to update the distributed ledger to include a record indicating that the user consented to the current version of the one or more terms.

US Pat. No. 10,795,974

MEMORY ASSIGNMENT FOR GUEST OPERATING SYSTEMS

Microsoft Technology Lice...

1. A method for memory assignment for a guest operating system supported by a host operating system on a host computing device having a host storage holding records of license information, the method comprising:receiving a request to launch an application in the guest operating system having a range of allocated memory in the host computing device; and
in response to receiving the request, at the host operating system,
generating, based on a record of license information stored in the host storage, a license blob containing data representing a product key copied from the record of license information;
determining a random memory location within a range of memory outside of the range of allocated memory to the guest operating system in the host computing device;
writing the generated license blob from the host operating system to the determined random memory location within the range of memory outside of the range of allocated memory to the guest operating system; and
communicating, from the host operating system to the guest operating system, the determined random memory location outside of the range of allocated memory to the guest operating system such that the guest operating system has access to the written license blob at the determined random memory location to launch the application, thereby preventing relaunching the application in a new guest operating system on a new host computing device using the same license blob when data in the range of memory allocated to the guest operating system on the host computing device is copied to a new range of memory that is allocated to the new guest operating system on the new host computing device.

US Pat. No. 10,795,973

MEDICAMENT TRAINING DEVICE AND SYSTEM

NOBLE INTERNATIONAL, INC....

1. A collateral device for use with one or more medicament devices, the collateral device comprisinga collateral device housing comprising a top portion, a bottom portion for contacting a target surface, and an opening extending there between, the opening configured to receive a portion of the one or more medicament devices each comprising a medicament device housing and an actuation mechanism;
at least a first sensor associated with the collateral device housing for detecting receipt of the portion of the medicament device into the opening;
at least a second sensor associated with the collateral device housing for detecting actuation of the actuation mechanism of the medicament device, said second sensor comprising a microphone or a vibration sensor;
a microprocessor; and
a power source.

US Pat. No. 10,795,969

REMOTE LIFE SCIENCE LABORATORIES AND STORAGE FACILITIES

Microsoft Technology Lice...

1. A system comprising:an automated life science laboratory comprising a robotic system configured to implement at least one biotechnology protocol, wherein the robotic system comprises an automated deoxyribose nucleic acid (DNA) sequencer that implements a biotechnology protocol of the at least one biotechnology protocol and a plate reader that implements a computer vision technique for evaluating a result of the biotechnology protocol, wherein the robotic system carries out most of the at least one biotechnology protocol and human intervention with the automated life science laboratory includes refilling machines with supplies, reconfiguring the robotic system to perform new protocols, and troubleshooting errors;
a data center comprising a plurality of network-accessible computing devices connected to the plate reader, the DNA sequencer, and an external network, wherein the plurality of network-accessible computing devices are programmed to provide, to the automated life science laboratory, instructions for controlling the DNA sequencer and the plate reader of the robotic system; and
a data connection configured to carry data from the automated life science laboratory to the data center by directly connecting the automated life science laboratory with the data center.

US Pat. No. 10,795,968

SERVER DEVICE, IMAGE TRANSMISSION METHOD, TERMINAL DEVICE, IMAGE RECEPTION METHOD, PROGRAM, AND IMAGE PROCESSING SYSTEM

Sony Corporation, Tokyo ...

1. A medical image processing system comprising:a storage configured to store moving medical image data captured by a medical imaging device;
image processing circuitry configured to perform a plurality of processing techniques for use in generating processed medical image data from moving medical image data; and
a network interface configured to:
receive, via at least one network, from a client terminal, a request containing (i) at least one criterion for selecting moving medical image data, and (ii) information identifying at least one processing technique of the plurality of processing techniques for processing the selected moving medical image data, wherein the information identifying the at least one processing technique comprises information identifying a version of an image processing algorithm to be performed to generate the processed medical image data, the identified version of the image processing algorithm being different from a current version of the image processing algorithm that otherwise would be used by the image processing circuitry to process the selected moving medical image data; and
transmit, to the client terminal, the processed medical image data that is generated by applying the identified version of the image processing algorithm identified by the information received from the client terminal to the selected moving medical image data matching the at least one criterion received from the client terminal.

US Pat. No. 10,795,967

MULTIPLE PRECISION INTEGER MULTIPLIER BY MATRIX-MATRIX MULTIPLICATIONS USING 16-BIT FLOATING POINT MULTIPLIER

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:increasing calculation speed of a computing device during processing operations by:
substituting N×N first integer elements, among a plurality of first integer elements obtained by dividing first integer data expressing a first integer in a first digit direction, into a first matrix;
substituting each of one or more second integer elements, among a plurality of second integer elements obtained by dividing second integer data expressing a second integer in a second digit direction, into at least one matrix element of a second matrix;
calculating a third matrix that is a product of the first matrix and the second matrix; and
outputting each matrix element of the third matrix in a calculation of a product of the first integer and the second integer.

US Pat. No. 10,795,966

EXTRACTING DATA SETS FROM EXTERNAL DATA STORES

Quicken Loans, LLC, Detr...

1. A system for routing data requests from internal systems to external data stores, the system comprising:a plurality of internal systems that generate a plurality of data requests to be routed to a plurality of external data stores;
a cloud computing platform comprising one or more processors that are configured to:
receive the plurality of data requests from the plurality of internal systems; and
for each of the plurality of data requests received from the plurality of internal systems:
determine a type associated with the data request;
select a subset of the plurality of external data stores that are capable of fulfilling the data request based at least in part on the type associated with the data request;
select an external data store from the subset of the plurality of external data stores, wherein the external data store is selected based at least in part on:
an identity of an internal system in the plurality of internal systems from which the data request was received; and
one or more thresholds associated with the subset of the plurality of external data stores; and
route an external request based on the data request to the external data store.

US Pat. No. 10,795,965

DISTRIBUTED IN-BROWSER DEEP LEARNING FOR PREDICTIVE PRE-FETCHING

Microsoft Technology Lice...

1. A computer-implemented method performed by a server of an online service, the computer-implemented method comprising:storing a first neural network model;
generating a first message comprising the first neural network model and first initialization instructions, the first initialization instructions being configured to cause a first client device of a first user to:
store the first neural network model in a persistent store of a browser on the first client device;
during a networking session in which the browser on the first client device is accessing a page of the online service, predict at least one link from a plurality of links on the page using the first neural network model stored in the persistent store of the browser; and
fetch content associated with the predicted at least one link from the server of the online service prior to any selection of the predicted at least one link by the first user during the networking session;
transmitting the first message to the first client device via a network;
receiving a second message comprising a second neural network model trained by a second client device of a second user;
modifying the stored first neural network model based on the received second neural network model; and
transmitting the modified first neural network model to another client device of another user.

US Pat. No. 10,795,964

TEXT ADDRESS PROCESSING METHOD AND APPARATUS

ALIBABA GROUP HOLDING LIM...

1. A text address processing method, comprising:determining, according to social relation circles of a plurality of users in a service system, address sets, each address set of the address sets comprising at least two original text addresses, wherein the social relation circles comprises a first social circle of a first user of the plurality of users and a second social relation circle of a second user of the plurality of users, the first social relation circle is based on an established relationship between the first user and one or more users in the first social relation circle, and a second social relation circle is based on an established relationship between the second user and one or more users in the second social relation circle, each social relation circle is associated with one address set of the address sets; and
performing normalization on the original text addresses in the address sets to obtain a target text address.

US Pat. No. 10,795,963

APPARATUS AND METHOD FOR INVITING SUBSCRIPTION TO CONTACT INFORMATION

Samsung Electronics Co., ...

1. A method of sharing contact information in a first converged address book XML Document server (CAB XDMS), the method comprising:receiving, by the first CAB XDMS, a first request for sharing contact information from a first client, the first request including information for allowing a second client to subscribe to a part of the contact information of the first client and a filter value as a condition for allowing the second client to subscribe to a part of the contact information of the first client;
notifying, by the first CAB XDMS, a first CAB server of a reception of the first request, the first CAB server being different from the first CAB XDMS;
storing, by the first CAB XDMS, information on access permission corresponding to the second client, the information being updated by the first CAB server, in response to the notification of the reception of the first request;
receiving, from the first CAB server by the first CAB XDMS, a second request for forwarding contact information;
in response to receiving the second request, generating, by the first CAB XDMS, a third request including uniform resource identifier (URI) information that allows a second CAB XDMS of the second client to fetch the part of the contact information; and
transmitting, by the first CAB XDMS, the third request to a second CAB XDMS of the second client,
wherein the second request includes the URI information by which the part of the contact information is obtainable.

US Pat. No. 10,795,962

METHOD AND DEVICE FOR PAGE DISPLAY

Alibaba Group Holding Lim...

1. A computer-implemented method, comprising:identifying, by a device, a uniform resource locator (URL) identifying a requested web page;
identifying, by the device, a requested location within the requested web page;
receiving, by the device and from a server, a redirect response including a redirection URL, wherein identifying the URL identifying the requested web page includes identifying the redirection URL as the URL identifying the requested web page, wherein the requested location within the requested web page is identified prior to receiving the redirect response, and wherein the server determines that the device needs to log in to the server before accessing the server based on the URL;
in response to receiving the redirect response, generating, by the device and based on a predetermined rule, a modified URL identifying the requested web page and including a URL parameter corresponding to the requested location and configured to enable the server associated with the modified URL to identify the requested location in the requested web page;
sending, by the device, a request including the modified URL including the URL parameter to the server;
receiving, by the device and from the server, a response including the requested web page identified by the modified URL and an identifier of the requested location in the requested web page, wherein the identifier is different than the URL parameter; and
displaying, by the device, the requested location of the requested web page received from the server based on the included identifier.

US Pat. No. 10,795,961

ACCESSING SPECIFIC PORTIONS OF DOCUMENTS ON A NETWORK

International Business Ma...

1. A computer-implemented method for accessing a document, the method comprising:receiving a link to a Hypertext Markup Language (HTML) document, wherein the link comprises one or more display instructions to navigate to a specific position within the document, and wherein the one or more display instructions are generated based on user input or activity that indicates the specific position within a document
navigating to the document specified in the link;
executing one or more display instructions specified by the link to modify the document by embedding the document within an overlay layer, wherein the one or more display instructions comprise instructions to cause the overlay layer to navigate the embedded document to the specific position specified by the link, and wherein the overlay layer is an HTML element; and
present the modified document.

US Pat. No. 10,795,960

MANAGING BOOKMARKS WITHIN A COLLABORATIVE APPLICATION

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method of managing bookmarks within a collaborative application, comprising:receiving a user input specifying a universal resource locator (URL) to be bookmarked in the collaborative application;
determining whether a bookmark record including the URL exists; storing, within a storage hardware device and responsive to determining that the bookmark record including the URL does not exist in the collaborative application, a bookmark record comprising the URL and a network type indication of the URL as part of the bookmark record.

US Pat. No. 10,795,959

CONVERSION LATENCY REDUCTION IN ONLINE CHAT-BASED COMMUNICATION INFRASTRUCTURE

Google LLC, Mountain Vie...

1. A system to reduce latency in online communication infrastructure, comprising:a data processing system comprising one or more processors and memory, wherein the data processing system is configured to:
receive, from a messaging application executed by a first computing device, a first one or more terms of a message to be delivered to a second computing device via the messaging application;
select a first plurality of content items based on and different from the first one or more terms, the first plurality of content items including a first highest ranking content item associated with a first-address;
receive, from the messaging application, subsequent to selecting the first plurality of content items, a second one or more terms of the message to be delivered to the second computing device via the messaging application, the second one or more terms input to the first computing device subsequent to the first one or more terms input to the computing device;
filter the first plurality of content items by:
selecting a second plurality of content items as a subset of the first plurality of content items based on and different from the first one or more terms, the second one or more terms, and data from an online selection auction process, the second plurality of content items including a second highest ranking content item associated with a second address;
replacing the selection of the first highest ranking content item with the selection of the second highest ranking content item based on both the first one or more terms and the second one or more terms; and
provide instructions to the messaging application executed by the first computing device to convert a term of the message to a hyperlink including the second address associated with the second highest ranking content item prior to transmission of the message from the first computing device to the second computing device via the messaging application, the hyperlink to be included in the message transmitted to the second computing device and pointing to the second address, thereby reducing latency over insertion of the second content item directly.

US Pat. No. 10,795,958

INTELLIGENT DISTRIBUTED GEOGRAPHIC INFORMATION SYSTEM

GOOGLE LLC, Mountain Vie...

1. A method for automatically updating digital maps, the method comprising:receiving, by one or more processors in a client device via a communication network from a geographic information systems (GIS) server system, geographic information for generating interactive digital maps;
generating, by the one or more processors in the client device, a digital map of a geographic area using the received geographic information;
receiving, by the one or more processors in the client device via the communication network from the GIS server system, a geospatial description file that includes a designated location and a viewpoint of a virtual camera for viewing the designated location, wherein the viewpoint is unrelated to geometry specified by the designated location, such that the designated location is not within view; and
presenting, by the one or more processors in the client device, an indication of the designated location on the digital map, the digital map presented from the viewpoint of the virtual camera.

US Pat. No. 10,795,957

INFORMATION RECOMMENDING METHOD AND DEVICE

Beijing Sankuai Online Te...

1. An information recommending method, comprising:obtaining, by a computing system, a current time and a current geographical region in which a user is located;
obtaining, by the computing system, historical access logs of the user within a preset time period;
extracting, by the computing system, access time points corresponding to historical access logs;
clustering, by the computing system, the extracted access time points, to obtain a time point set meeting a first density condition, wherein the first density condition comprises
the time point set comprising access time points whose quantity exceeds a first threshold, and
a time interval between every two access time points in the time point set is less than a preset interval;
counting, by the computing system, the access time points in the time point set, to determine an active time range of the user;
determining, by the computing system, location tracks corresponding to the historical access logs;
clustering, by the computing system, track points in the determined location tracks according to longitudes and latitudes, to obtain a track point set meeting a second density condition, wherein the second density condition comprises: track points whose quantity exceeds a second threshold exist in preset coverage centered by any track point in the track point set; and
determining, by the computing system, an unfamiliar region of the user according to the longitudes and latitudes of the track points in the track point set; and
recommending, by the computing system, point of interest (POI) information of the current geographical region to the user when the current time is within the active time range of the user and the current geographical region is the unfamiliar region of the user.

US Pat. No. 10,795,956

SYSTEM AND METHOD FOR IDENTIFYING POTENTIAL CLIENTS FROM AGGREGATE SOURCES

Massachusetts Mutual Life...

1. A server-implemented method comprising:generating, by a server, an interactive electronic message for each potential customer using information associated with a social media profile of each potential customer, the interactive electronic message comprising one or more graphical input elements configured to receive an electronic response from each potential customer, the social media profile of each potential customer comprising a plurality of attributes, wherein the server periodically scans one or more social media websites to retrieve the information associated with each potential customer;
responsive to receiving an indication that at least one potential customer has interacted with at least one graphical input element of the interactive electronic message, updating, by the server, the plurality of attributes associated with the social media profile of each potential customer based on the electronic response received from each potential customer;
executing, by the server, an artificial intelligence model having a forecasting algorithm using the plurality of attributes associated with the social media profile of each potential customer to identify one or more potential customers having a life event, each of the one or more potential customers having at least one attribute that matches an attribute in a customer profile of at least one existing customer;
generating, by the server, a weighted coefficient associated with a forecasted life event for each of the one or more potential customers based on a summation of a weight score value of each attribute in the social media profile of each potential customer that matches with the attribute in the customer profile of the at least one existing customer;
determining, by the server, a subset of potential customers from the one or more potential customers having the weighted coefficient greater than a predetermined threshold;
determining, by the server, a new product corresponding to the forecasted life event of each of the subset of potential customers; and
presenting, by the server, the new product on a user interface of a computing device of each of the subset of potential customers.

US Pat. No. 10,795,955

SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION MANAGEMENT ACROSS DISPARATE INFORMATION SYSTEMS

Open Text SA ULC, Halifa...

1. A system, comprising: a set of integration services embodied on a server machine in a computing environment, the set of integration services residing on an integration tier and having a set of connectors communicatively connected to a plurality of disparate information systems residing on a storage tier, the set of connectors configured for integrating data stored in the plurality of disparate information systems utilizing a common model employed by the set of integration services, the common model comprising a content management interoperability services (CMIS) data model, common property definitions, and a common security model comprising a set of permissions particularly defined for use by the set of integration services;a data collector for collecting information from the plurality of disparate information systems utilizing the set of integration services, the data collector residing on the integration tier and working in collaboration with a processor;
a unified index residing on the integration tier and coupled to the data collector for processing the information collected by the data collector from the plurality of disparate information systems, the unified index including metadata of interest for each of the disparate information systems; and
a visualizer residing on the integration tier and working in collaboration with a processor, the visualizer coupled to the unified index and to a user interface of an application, the application residing on an application tier and running on a user device communicatively connected to the server machine in the computing environment, the visualizer configured for assigning a predetermined visual cue to the metadata of interest for each of the disparate information systems such that the metadata of interest for the disparate information systems is displayed on the user interface according to the predetermined visual cue assigned by the visualizer,
wherein, responsive to a user query to search the plurality of disparate information systems or a subset thereof, the application communicates metadata of interest contained in the user query to a search application programming interface (API) of a search system residing on the integration tier, the search system having a search engine;
wherein the search engine locates, via the metadata of interest and the unified index, requested data from the plurality of disparate information systems or a subset thereof;
wherein the search engine returns, via the search API, search results referencing the requested data to the application;
wherein the application interprets the search results; and
wherein the application displays a visualization of the search results on the client device.

US Pat. No. 10,795,954

INTERACTIVE COMMAND-LINE DATA ANALYSIS

salesforce.com, inc., Sa...

1. A computer-implemented method executing on a processor having a memory, comprising:determining an initial scope of a dataset received at a client from a data source among a plurality of data sources in response to a data query from the client;
causing display of a first user interface element in a data display user interface at the client, wherein the first user interface element comprises an indication of the initial scope of the dataset and wherein the initial scope of the dataset comprises a first set of data received from the data source based on a first dimension;
receiving, in the data display user interface, one or more meta-language commands to apply a function to the initial scope of the dataset;
modifying, by the client, the data query to include the function by generating query language specific to the data source to implement the function in the data query;
determining, at the client, a subsequent scope of the dataset after applying the modified data query to the dataset;
causing display of the one or more meta-language commands used to modify the data query in the data display user interface at the client;
causing display of a second user interface element in the data display user interface at the client,
wherein the second user interface element comprises an indication of the subsequent scope of the dataset.

US Pat. No. 10,795,953

METHODS AND SYSTEMS FOR SOCIAL NETWORK BASED CONTENT RECOMMENDATIONS

eBay Inc., San Jose, CA ...

1. A method comprising:receiving a set of user interactions from a plurality of users, the set of user interactions performed on a set of data objects within a system;
generating a set of associations between the set of data objects based on the set of user interactions, the set of associations being distributed among a plurality of network graphs that include some or all of the set of user interactions performed on the set of data objects within the system, each network graph created for a different one of the plurality of users;
identifying a set of data object clusters indicative of the set of associations, the set of data object clusters forming a categorized global content network;
receiving a query from a first user of the plurality of users;
generating a plurality of recommendations indicative of a plurality of data objects of the set of data object clusters; and
causing presentation of at least a portion of the plurality of recommendations on a user interface of a user device.

US Pat. No. 10,795,952

IDENTIFICATION OF DOCUMENTS BASED ON LOCATION, USAGE PATTERNS AND CONTENT

Microsoft Technology Lice...

1. A computer-implemented method, comprising:obtaining, from a computing device associated with a user, location data;
obtaining, from a user calendar, a current context indicating performance of a first instance of a scheduled activity for the user;
analyzing the location data to determine a location of the user;
identifying that a file was generated or received by the computing device at the determined location of the user during the performance of the first instance of the scheduled activity, wherein the file includes at least one of image data or text data;
storing the determined location of the user and the current context indicating the performance of the first instance of the scheduled activity for the user in association with the file;
determining that a location of the computing device exceeds a predetermined distance from the determined location of the user;
monitoring the location of the computing device after determining that the location of the computing device exceeds the predetermined distance from the determined location of the user;
determining when the location of the computing device returns to the determined location of the user;
in response to determining when the location of the computing device returns to the determined location of the user, determining that the user calendar indicates performance of a second instance of the same scheduled activity for the user; and
automatically generating a file recommendation in accordance with the performance of the second instance of the same scheduled activity for the user, the file recommendation comprising at least an indication of the file that was previously generated or received by the computing device at the determined location of the user during the performance of the first instance of the scheduled activity.

US Pat. No. 10,795,951

METHOD, COMPUTER-READABLE STORAGE DEVICE AND APPARATUS FOR UTILIZING COMPANION AND EVENT INFORMATION

1. A method comprising:receiving, by a processor of a network service provider, privacy information associated with a user, the privacy information comprising location information of the user, traveling companion information of the user, and event information of the user, wherein the traveling companion information indicates the user is traveling with at least one companion, wherein the traveling companion information further indicates that the at least one companion comprises a business companion;
receiving, by the processor and over a communication network associated with the network service provider, a search request;
performing, by the processor, a search responsive to the search request to generate search results, wherein the search results are generated by accounting for the location information, the traveling companion information, and the event information in accordance with at least one setting that is selected by the user for permitting the use of the location information, the traveling companion information, and the event information in connection with a particular search topic of the search request, wherein different settings for permitting the use of the location information, the traveling companion information, and the event information are associated with different search topics; and
providing, by the processor and over the communication network associated with the network service provider, the search results to an endpoint device of the user.

US Pat. No. 10,795,950

NETWORK CONTENT POLICY PROVIDING RELATED SEARCH RESULT

NETSWEEPER (BARBADOS) INC...

1. A method comprising:receiving from a requesting computer a content request for network access to content accessible via a network;
when determining that the content request is subject to a restrictive policy, constructing a search query which conforms to the restrictive policy to which the content request is subject; and
responding to the content request with a network location of a landing page, the landing page configured to display a search result of the search query, wherein the search result includes content which conforms to the restrictive policy, the search result displayed in association with a message indicative of the restrictive policy.

US Pat. No. 10,795,949

METHODS AND SYSTEMS FOR INVESTIGATION OF COMPOSITIONS OF ONTOLOGICAL SUBJECTS AND INTELLIGENT SYSTEMS THEREFROM

Hamid Hatami-Hanza, Thor...

1. A visual investigation system comprising:a first one or more computing or data processing devices, operationally coupled to a first one or more non-transitory computer-readable storage devices;
accessing one or more reference data structures, stored in a second one or more computer-readable non-transitory storage media, corresponding to a previously investigated collection of images, wherein at least one image from said collection of images is at least 100 pixels wide in each image dimension, said one or more reference data structures are built by a system comprising:
i. a second one or more computing or data processing devices, operationally or communicatively accessing to the second one or more non-transitory computer-readable storage devices,
ii. having access to said collection of images,
iii. reading one or more image, from said collection of images, and accessing the one or more images data through the second one or more non-transitory computer-readable storage devices,
iv. partitioning each image of said one or more images into at least two groups of partitions wherein each partition of each of said groups is composed of a predefined number of pixels,
v. accessing one or more sets of image partitions wherein each member of each set of said sets of partitions is composed of a predefined number of pixels, wherein said each set of partitions is premade or is obtained by setting the partitions of at least one of the groups of partitions of the one or more images to form one or more sets of partitions wherein each set is assigned with predefined order and each member of each set is composed of predefined number of pixels,
vi. building one or more participation data structures indicating participations of two or more partitions from one set of partitions, having a first order, into two or more partitions from another set of partitions having a second order,
vii. calculating numerically, by the second one or more computing or data processing devices, association strengths between two or more of the partitions from the set of partitions of the first order or partitions from the set of second order, by processing the data of one or more participation data structures, and build a data structure corresponding to association strength spectrum for at least one of the partitions from one of said sets of partitions, assigned with the first or the second predefined order,
viii. calculating numerically, by the second one or more computing or data processing devices and assigning a value significance number to two or more of the partitions of said first order, said value significance is calculated from combinations of one or more measures of significances comprising:
a. frequency or probability of occurrences of a partition of particular order in one or more images,
b. novelty value significances,
c. associational value significances,
d. relational value significances,
e. relational novelty value significance,
f. intrinsic novelty value significance,
g. association novelty value significance,
ix. recognizing one or more parts of the one or more images based on the value significances and association strength of a number of partitions, having certain range of value significances or association strength to each other,
x. selecting one or more partitions of each recognized parts of the one or more images and build a signature data structure, comprise of association spectrums of said one or more selected partitions, corresponding to said each recognized parts of the one or more images,
xi. grouping or clustering said signature data structures of the one or more recognized parts of the one or more images of said collection of images into one or more clusters of signature data structures, by evaluating association strengths between said one or more signature data structures, and storing at least one of the signature data structure for each of said clusters in the second one or more non-transitory storage media, as the one or more reference data structures,
accessing a given image and recognizing one or more parts of the given image by performing the steps of iii to x,
processing the signature data structure of a recognized part of the given image with said one or more reference data structures, and
outputting an ontological subject corresponding to the one or more recognized parts of the given image, whereby a machine can act upon the one or more recognized parts of the given image, thereby giving the machine the ability to visually become aware of its environment.

US Pat. No. 10,795,948

REMOTE AUTHENTICATION IN A DATABASE SYSTEM

SAP SE, Walldorf (DE)

1. A computer system comprising:a primary database system implemented by a first set of one or more processors; and
a secondary database system implemented by a second set of one or more processors, the secondary database system configured as a hot-standby system for the primary database system, wherein the secondary database manages load balancing by providing at least a minimum amount of essential functionality of the primary database system during a disruption to the primary database system;
wherein the secondary database system is configured by programming instructions, executable on the computer system, to cause the second set of one or more processors to:
accept, by the secondary database system, an authentication request from a client application on a client device to allow user access to the secondary database to execute a query, and
delegate, by the secondary database system, an authentication check to the primary database system using connection credentials received from the client application; and
wherein the primary database system is configured by programming instructions, executable on the computer system, to cause the first set of one or more processors to:
perform, by the primary database system, the authentication check, wherein authentication tokens are bi-directionally exchanged between the secondary database system and the client device; and
provide, by the primary database system, an indication to the secondary database system that encrypted communication between the client device and the secondary database system is authorized for an open connection based on the authentication tokens.

US Pat. No. 10,795,947

UNIFIED MESSAGE SEARCH

GOOGLE LLC, Mountain Vie...

1. A computer-implemented method, comprising:receiving, by one or more processors, a query at a communications device;
obtaining, by the one or more processors, message data responsive to the received query, the message data comprising a plurality of messages, the plurality of messages including messages respectively sent through different messaging platforms;
identifying, by the one or more processors and from among the plurality of messages, multiple first messages that were each sent through a first messaging platform;
determining, by the one or more processors, that a count of the identified first messages satisfies a threshold for a minimum number of messages, wherein the threshold is greater than one;
in response to the determination that the count of the identified first messages satisfies the threshold, generating, by the one or more processors, a summary of the first messages sent through the first messaging platform, wherein the summary includes at least a portion of each of multiple of the first messages that were each sent through the first messaging platform; and
in response to receiving the query, providing, by the one or more processors, the summary to at least one of a display device or an audio interface for presentation to a user.

US Pat. No. 10,795,946

METHOD OF REDIRECTING SEARCH QUERIES FROM AN UNTRUSTED SEARCH ENGINE TO A TRUSTED SEARCH ENGINE

BEESTRIPE LLC, Honolulu,...

1. A method of redirecting search queries from an untrusted search engine to a trusted search engine by executing computer-executable instructions stored on a non-transitory computer-readable medium, the method comprising: providing at least one trusted Uniform Resource Locator (URL) pattern and a plurality of untrusted URL patterns, the at least one trusted URL pattern and the plurality of untrusted URL patterns each comprising a plurality of URLs with wildcards; receiving a search query URL originated from a desired search engine by initiating a search query on the desired search engine, the search query URL corresponding to a search query; comparing the search query URL with the plurality of untrusted URL patterns; permitting the desired search engine to generate search results for the search query in response to the search query URL not complying with each of the plurality of untrusted URL patterns; recognizing the desired search engine as an untrusted search engine and redirecting the search query to a trusted search engine according to the at least one trusted URL pattern in response to the search query URL complying with one of the plurality of untrusted URL patterns;recognizing the desired search engine as the untrusted search engine and redirecting the search query to the trusted search engine according to the at least one trusted URL pattern comprising extracting the search query from the search query URL, passing the search query to the trusted search engine and receiving trusted search results generated by the trusted search engine: providing a user computing device; and rendering the trusted search results on the user computing device;
providing an update server; periodically polling the update server for untrusted pattern updates; retrieving the untrusted pattern updates from the update server; and incorporating the untrusted pattern updates into the plurality of untrusted URL patterns.

US Pat. No. 10,795,945

DIGITAL DOCUMENTS IN A DISTRIBUTED STORAGE ENVIRONMENT

SAP SE, Walldorf (DE)

1. A method comprising:receiving, from a client device, a request to generate a digital document, the request indicating a first contract category;
accessing a set of digital document templates for the first contract category, each digital document template from the set of digital document templates including a set of template terms used for agreements in the first contract category;
causing a listing of the set of digital document templates to be presented on the client device;
receiving, from the client device, an input indicating selection of a first digital document template from the set of digital document templates;
transmitting the first digital document template to the client device;
accessing a digital document configuration file stored in a database and generated using the first digital document template, the digital document configuration file identifying a first entity and a second entity to enter into an agreement, an initial set of terms for the agreement, and a modification to the initial set of terms corresponding to a triggering event;
generating, using one or more hardware processors, a digital document based on the digital document configuration file, the digital document identifying the first entity, the second entity, and the initial set of terms, and including computer readable code to cause the initial set of terms to be modified according to the modification to the initial set of terms in response to occurrence of the triggering event;
causing storage of the digital document to a distributed database that is synchronized across a network of devices, the digital document being invokable from the distributed database by the first entity and the second entity; and
in response to the first entity invoking the digital document from the distributed database, executing, by the one or more hardware processors, the computer readable code included in the digital document, the computer readable code causing the one or more hardware processors to perform operations comprising:
determining whether the triggering event occurred, and
in response to determining that the triggering event did occur, modifying the initial set of terms based on the modification to the initial set of terms.

US Pat. No. 10,795,944

DERIVING USER INTENT FROM A PRIOR COMMUNICATION

Verint Americas Inc., Al...

1. A method for operating a virtual agent, comprising:obtaining, by an electronic computing device, a text string from a speech input received from a user, the text string including a pronoun;
deriving, by the electronic computing device, information from a communication received at the electronic device prior to receipt of the speech input, the information identifying an individual;
deriving, by the electronic computing device, a user intent from the text string and the information, the deriving the user intent including determining that the pronoun refers to the individual;
determining a response to the speech input; and
providing the response to the user via the virtual agent.

US Pat. No. 10,795,943

THREE-DIMENSIONAL NETWORK MAPPING SYSTEM AND METHOD

1. A three-dimensional network mapping system for three-dimensional mapping of data nodes to render data visually navigable and highlight useful relationships in that data, comprising:a database;
a computer configured to execute:
a data gathering system interfacing with the database, the data gathering system adapted to gather data and send that data to the database; and
software code for a user interface interfacing with the database, the user interface adapted to form a three-dimensional (3D) representation of the data by orienting the data in an organized three-dimensional (3D) structure representing a layout of the data in three-dimensional (3D) space;
wherein the user interface comprises a network controller interfacing with the database, software code for a galaxy controller interfacing with the network controller, and a user input controller interfacing with the galaxy controller and the network controller, the galaxy controller adapted to place the three-dimensional (3D) representation of the data as data nodes and three-dimensional (3D) representations of data links between the data into the three-dimensional space and coordinate relationships of the data to each other in the 3D space, wherein the galaxy controller is further adapted to organize the data with respect to each other in the 3D space by using simulated physics forces and facilitating three-dimensional attraction between the data nodes in the three-dimensional space when at least one of the data links is between the data nodes and three-dimensional repelling between non-linked data nodes in the three-dimensional space;
software code for an Interest Value Engine interfacing with the network controller, the Interest Value Engine adapted to monitor usage and maintain a plurality of interest values corresponding to the data that are periodically adjusted based on respective amounts of time the data has been selected by the user;
wherein the Interest Value Engine is further adapted to: determine a first interest value associated with a first set of data based on an amount of time the first set of data has been currently selected by the user, determine a second interest value that is smaller than the first interest value of one or more other sets of data that are linked via one or more of the data links to the first set of data, normalize the first interest value and the second interest value across the first set of data and one or more other sets of data linked to the first set of data such that a total interest value does not exceed a predefined cap, and transmit a request to the network controller to retrieve additional information on one of the first set of data and the one or more other sets of data when the one of the first set of data and the one or more other sets of data accumulates a certain interest value;
software code for a domain concealment component interfacing with the galaxy controller and the Interest Value Engine, the domain concealment component adapted to hide a 3D representation of the first set of data by disabling all display elements associated with the 3D representation of the first set of data, the Interest Value Engine being further adapted to send a message to the domain concealment component to remove all display elements associated with the 3D representation of the first set of data from display when the first set of data falls below a predefined interest value; and
software code for a domain display component interfacing with the galaxy controller, the domain display component adapted to enable at least one display element associated with the 3D representation of the first set of data, the Interest Value Engine being further adapted to send a message to the domain display component to display the 3D representation of the first set of data when the first interest value of the first set of data rises above the predefined interest value.

US Pat. No. 10,795,942

METHOD AND DEVICE FOR RESIDING SHORT MESSAGE VERIFICATION CODE

BEIJING BYTEDANCE NETWORK...

1. A method for residing a verification code in a short message received by a mobile device, the method comprising:by a processor in the mobile device,
determining whether content of the short message comprises a keyword by performing keyword matching on the content of the short message received by the mobile device based on a first regular expression;
extracting a verification code from the content of the short message received by the mobile device by performing verification code matching on the content of the short message received by the mobile device based on a second regular expression, upon determining that the content of the short message comprises the keyword, wherein the verification code comprises a digit, a letter or a combination thereof;
obtaining the extracted verification code; and
displaying the verification code on a verification code input interface of a current application on a screen of the mobile device for preset time,
wherein the short message is received in a short message application of the mobile device, and the current application is different from the short message application,
wherein the first regular expression is a first string for detecting whether the content of the short message comprises the keyword based on a first syntactic rule, and
wherein the second regular expression is a second string for detecting whether the content of the short message comprises the verification code based on a second syntactic rule.

US Pat. No. 10,795,941

PROVIDING FEEDBACK IN AN OPERATING PLAN DATA AGGREGATION SYSTEM

Right90, Inc., Austin, T...

1. A computer-implemented method, comprising:executing a computer program by one or more processors of a computer, wherein for each of multiple organizations, an instance of one of the OLAP cube database structures and a data repository is dedicated to each of the organizations and each of the OLAP cube database structures of a computer database is partitioned into at least a first partition and a second partition and executing the computer program causes the computer to perform:
receiving forecast information including forecast numerical values for at least one time period from one or more first entities in the computer, wherein the forecast information received forms a baseline forecast;
for each organization, storing the forecast information in the first partition of the OLAP cube database structure of the computer database dedicated to the organization;
for each organization, updating the first partition of the OLAP cube database structure of the computer database, wherein updating includes at least data from the second partition;
receiving comments on specific entries of the forecast information in the computer;
receiving changes of the forecast information from one or more second entities in the computer after receiving the forecast information from the one or more first entities;
receiving changes of the forecast information from the one or more second entities in the computer after receiving the forecast information from the one or more first entities, the changes including time based adjustments to the forecast numerical values;
for each organization, storing the changes in the second partition of the OLAP cube database structure of the computer database dedicated to the organization;
for each organization, updating the second partitions of the OLAP cube database structure of the computer database;
integrating the associated forecast information from the first partition, comments, and changes from the second partition into the OLAP cube database structure within the data repository defined in the computer and dedicated to the organization;
propagating the received forecast information from the first partition, the received comments, and the received changes of the forecast information from the second partition in essentially real-time through the OLAP cube database structure dedicated to the organization by the computer to (i) associate the received comments and changes with the received forecast information and (ii) asynchronously update the baseline forecast with the received changes of the forecast information in essentially real-time;
generating a dataset and organization of the dataset from the OLAP cube database structure within the data repository including from the first partition and the second partition, which are dedicated to the organization, in response to a graphical interface based query from an external requestor wherein generating the particular selected dataset includes:
combining data related to the changes from the first partition and the second partition to appear as a single response;
analyzing the changes to determine the magnitude of each change; and
providing a set of impacts to the one or more first entities, the impacts showing the changes based on the magnitude of the changes; and
transmitting data to display the generated particular dataset on a graphical interface device that incorporates the integrated comments and the integrated changes to the forecast information so that the comments and changes are shown and available for review in association with the forecast information including the essentially real-time, asynchronously updated baseline forecast.

US Pat. No. 10,795,940

CHATBOT-BASED CLOUD MANAGEMENT SYSTEM AND METHOD FOR OPERATING THE SAME

Bespin Global Inc., Seon...

1. A chatbot-based cloud management system, comprising:an interface for receiving a query from a client through a plurality of access channels, and delivering a response generated in response to the received query to the client;
a chatbot engine for performing a response processing to the query based on a chat learning model learned in advance and a chat knowledge context, and outputting event occurrence information when a request event from the query occurs; and
a processing engine for confirming failure occurrence situation of an infra where the request event has occurred and providing it to the chatbot engine by generating failure countermeasures corresponding to the failure occurrence situation based on a failure model learned in advance and a failure processing rule, when event occurrence information is received from the chatbot engine,
wherein the chatbot engine comprises:
a DB for storing the chat learning model generated through machine learning of a learning module and the chat knowledge context;
a language processing module for analyzing the query and extracting chat information; and
a first AI module for extracting chat knowledge corresponding to the extracted chat information based on the chat learning model and the chat knowledge context, and generating a response to the query based on the extracted chat knowledge.

US Pat. No. 10,795,939

QUERY METHOD AND APPARATUS

Beijing Baidu Netcom Scie...

1. A query method, comprising:acquiring a target historical query statement from a historical query statement collection;
extending the target historical query statement based on a query log to generate an extended statement fragment associated with the target historical query statement;
adding the extended statement fragment, as a statement fragment characteristic associated with the target historical query statement, into a statement fragment characteristic library of a preset model, the preset model comprising a domain recognition model and/or an intent slot recognition model, the domain recognition model being configured to characterize a corresponding relationship between a query statement and a preset domain to which a semantic meaning of the query statement belongs, the intent slot recognition model being configured to characterize a corresponding relationship between a query statement and a query intent indicated by the query statement, and a corresponding relationship between a query statement and a limiting keyword of the query intent; and
generating a query result corresponding to a query statement based on the statement fragment characteristic library of the preset model in response to receiving the query statement.

US Pat. No. 10,795,938

SPELL CHECKER

Target Brands, Inc., Min...

1. A computer-implemented method for correcting a spelling of a search term, the method comprising:extracting search information from a clickstream database, the clickstream database including search keywords which have been received by a search engine;
comparing, by a server, each of the search keywords as extracted with product information in a product database to identify matching search keywords and non-matching search keywords;
storing the matching search keywords in a database of acceptable terms and the non-matching search keywords in a database of correctable terms;
calculating a ranking score for each of the matching search keywords in the database of acceptable terms, the ranking score based on a weighting of actions performed for the matching search keywords in the clickstream database;
for each of the non-matching search keywords in the database of correctable terms:
identifying a plurality of spell correction candidates;
for each of the plurality of spell correction candidates as identified, determining whether a respective spell correction candidate of the plurality of spell correction candidates is in the database of acceptable terms;
in response to determining the respective spell correction candidate is in the database of acceptable terms, determining a confidence value for the respective spell correction candidate, wherein the confidence value is determined based on a weighting using the ranking score from the database of acceptable terms for the respective spell correction candidate, a length of the respective spell correction candidate, an edit distance of the respective spell correction candidate, and a value representative of a type of edit performed to obtain the respective spell correction candidate; and
storing one of the plurality of spell correction candidates in the database of correctable terms, the one of the plurality of spell correction candidates being stored having a relatively highest confidence value among the confidence values for the plurality of spell correction candidates.

US Pat. No. 10,795,937

EXPRESSIVE TEMPORAL PREDICTIONS OVER SEMANTICALLY DRIVEN TIME WINDOWS

International Business Ma...

1. A computer-implemented method, comprising:identifying, within a knowledge graph pertaining to a given prediction of a value of a variable, a subset of the knowledge graph related to one or more predicted training examples, wherein the subset comprises (i) a set of nodes and (ii) one or more relationships among the set of nodes;
determining, for the identified subset, a plurality of snapshots of the knowledge graph relevant to the given prediction, wherein each of the plurality of snapshots comprises a static copy of the knowledge graph at a given point in time, wherein the plurality of snapshots of the knowledge graph comprise (i) one or more historical snapshots corresponding to historical data and (ii) one or more predicted future snapshots, and wherein said determining comprises: (i) employing a version of the knowledge graph that is enhanced with historic information for each entity in the knowledge graph and each relation among the entities in the knowledge graph and (ii) predicting the one or more future snapshots using at least one link discovery technique given the current state of the knowledge graph, wherein the at least one link discovery technique comprises matrix completion;
quantifying a validity window for the one or more predicted training examples, wherein the validity window comprises a temporal bound for prediction validity, wherein said quantifying the validity window for the one or more predicted training examples comprises employing a time series analysis to the determined plurality of snapshots of the knowledge graph;
computing a validity window for the given prediction based on the quantified validity window for the one or more predicted training examples;
extracting one or more features from the plurality of snapshots of the knowledge graph;
training a prediction model based on the one or more extracted features; and
updating the given prediction based on utilization of the prediction model.

US Pat. No. 10,795,936

SUPPRESSING ENTITY SUGGESTIONS ON ONLINE SOCIAL NETWORKS

Facebook, Inc., Menlo Pa...

1. A method comprising, by one or more computing devices of an online social network:receiving, from a client system of a first user of the online social network, a query inputted by the first user;
accessing a social graph of the online social network, the social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each node corresponding to an entity associated with the online social network, wherein the first user corresponds to a first node of the plurality of nodes, and wherein each entity is associated with social-graph information that is based on its connections within the social graph;
identifying a plurality of entities matching the query, each identified entity having a duplication-value with respect to a canonical-entity, the duplication-values being based on (1) a name similarity between the identified entity and the canonical-entity and (2) one or more prior user interactions with respect to the identified entity and the canonical-entity, wherein the canonical-entity is identified based on its social-graph information;
suppressing one or more entities of the identified entities based on the duplication-value of the entity, with respect to the canonical entity, satisfying a predetermined threshold value and a value associated with the social-graph information associated with the entity, wherein each suppressed entity corresponds to a node that is not connected to the first node corresponding to the first user in the social graph; and
sending, to the client system, a search-results page for display to the first user, wherein the search-results page comprises references to one or more non-suppressed entities of the identified entities.

US Pat. No. 10,795,935

AUTOMATED GENERATION OF JOB FLOW DEFINITIONS

SAS INSTITUTE INC., Cary...

1. An apparatus comprising a processor and a storage to store instructions that, when executed by the processor, cause the processor to perform operations comprising:receive, at the processor, and from a remote device via a network, a request to generate a superset job flow that incorporates multiple job flows, wherein:
each job flow of the multiple job flows is defined by a corresponding job flow definition as a set of tasks to be performed by execution of a corresponding set of task routines;
each performance of a job flow of the multiple job flows is documented by a corresponding instance log that specifies at least one data object used as an input to the job flow and at least one other data object generated as an output of the job flow during the performance;
the multiple job flows comprise an output job flow that has been performed to generate an output data object that the superset job flow is to be capable of re-generating;
the multiple job flows comprise at least one preceding job flow that has been performed to generate at least one mid-flow data object necessary to the performance of the output job flow to generate the output data object; and
for each job flow of the multiple job flows, the job flow definition, the corresponding set of tasks routines, and at least one instance log that documents at least one performance of the job flow are stored within at least one federated area; and
analyze the instance log that documents the performance of the output job flow that generated the output data object to identify the job flow definition of the output job flow and to identify a first subset of the at least one mid-flow data object, wherein each mid-flow data object of the first subset was generated as an output by a preceding job flow and used as input to the output job flow;
use the identification of each mid-flow data object of the first subset to identify at least one instance log that documents a performance of a preceding job flow that generated a mid-flow data object of the first subset;
analyze each instance log of the at least one instance log to identify a job flow definition of the corresponding preceding job flow and to identify a second subset of the at least one mid-flow data object, wherein each mid-flow data object of the second subset was generated as an output by a preceding job flow and used as an input to another preceding job flow;
in response to a lack of identification of a mid-flow data object in the second subset, generate a superset job flow definition that defines the superset job flow as a set of tasks that comprises at least one task specified in the job flow definition of the output job flow and at least one task specified in the job flow definition of each preceding job flow that generated a mid-flow data object of the first subset;
generate a directed acyclic graph (DAG) of the superset job flow based on the superset job flow definition;
store the DAG in the at least one federated area; and
transmit an indication of the generation of the superset job flow to the remote device.

US Pat. No. 10,795,934

AUTOMATICALLY OPTIMIZING BUSINESS PROCESS PLATFORMS

salesforce.com, inc., Sa...

1. A method for automatically determining a mapping between different data formats, the method comprising a computer system automatically performing:receiving, at the computer system, a version of data in a first format;
receiving, at the computer system, a corresponding version of the same data in a second format;
comparing, by the computer system, the corresponding versions of the same data; and
based on the comparison, automatically determining, by the computer system, a mapping between the first format and the second format;wherein:the first format is defined by first fields, the second format is defined by second fields, and the mapping between the first format and the second format is a mapping between the first fields and the second fields;
receiving the version of data in the first format comprises receiving documents containing the data using the first fields;
receiving the corresponding version of the same data in the second format comprises receiving documents containing the same data using the second fields;
comparing the corresponding versions of the same data comprises comparing the data in corresponding versions of the same document; and
automatically determining the mapping between the first format and the second format comprises automatically determining the mapping between the first fields and the second fields based on which fields in corresponding documents contain the same data; and
the method further comprises data processing first additional data received in the first format and second additional data received in the second format, wherein the data processing uses the mapping between the first format and the second format.

US Pat. No. 10,795,933

SYSTEM AND METHOD FOR OBJECT BASED QUERY OF VIDEO CONTENT CAPTURED BY A DYNAMIC SURVEILLANCE NETWORK

FLOCK GROUP INC., Atlant...

1. A method for generating an object based database of video footage captured by a dynamic surveillance network, the method comprising:capturing a first video stream, wherein the first video stream comprises a series of image frames and each image frame comprises content;
determining time data and location data associated with the first video stream;
analyzing the content of one or more image frames of the first video stream to identify objects;
for each identified object in the first video stream, applying one or more neural network algorithms to classify the identified object and aspects of the identified object;
creating a first database record by storing the first video stream in a database, wherein the first database record includes the first video stream in association with:
the time data and location data; and
the object class data and object aspect data;
providing a user interface for the database for receiving one or more search parameters, each search parameter comprising both time data and location data, and at least one of object class data and object aspect data;
receiving one or more search parameters with the user interface;
filtering the database using the one or more search parameters; and
displaying on a display device one or more records from the database matching the search parameters, wherein each of the one or more records from the database comprises a link to a playable video stream containing an object matching the one or more search parameters.

US Pat. No. 10,795,932

METHOD AND APPARATUS FOR GENERATING TITLE AND KEYFRAME OF VIDEO

ELECTRONICS AND TELECOMMU...

1. A method of generating a title and a keyframe of a video, the method comprising:selecting a main subtitle by analyzing subtitles of the video;
selecting the keyframe corresponding to the main subtitle;
extracting content information of the keyframe by analyzing the keyframe;
generating the title of the video using metadata of the video, the main subtitle, and the content information of the keyframe; and
outputting the title and the keyframe of the video,
wherein the main subtitle comprises at least one word of subtitles that includes a morphemic unit having a meaning in at least one sentence, and
wherein the selecting of the main subtitle by analyzing the subtitles of the video comprises:
calculating a first weight of a relation between words; and
calculating a second weight for the subtitles.