Patents Issued in January 17, 2019
  • Publication number: 20190018911
    Abstract: Systems and methods for designing one or more unified architecture models for architecting digital products and digital services is provided. The traditional systems and methods provide for architecture frameworks or processes for domain specific architectural concerns.
    Type: Application
    Filed: July 13, 2018
    Publication date: January 17, 2019
    Applicant: Tata Consultancy Services Limited
    Inventors: Anand KUMAR, Doji Samson LOKKU, Nikhil Ravindranath ZOPE, Jose Kumar REDDYPOGU
  • Publication number: 20190018912
    Abstract: Quantum circuits include quantum gates that require a certain amount of physical resources. It is desirable to reduce the number of certain quantum gates in order to improve the hardware efficiency of a quantum circuit. A system and a method are provided for synthesizing a quantum circuit that includes the operations of determining an ordered set or vector of phase coefficients and specifying a linear permutation. The operations also include determining a sequence of CNOT and Rz gates using the set of phase coefficients and the linear permutation, such that the number of Rz gates is reduced.
    Type: Application
    Filed: January 25, 2017
    Publication date: January 17, 2019
    Inventor: Michele MOSCA
  • Publication number: 20190018913
    Abstract: A hierarchical power verification system and method creates abstract models of power behavior of modules that it successfully verifies. The abstract models simplify the module definition by omitting internal module details but provide sufficient information for power verification of higher level modules that incorporate this abstracted module. Design blocks are replaced with these abstract power models, resulting in reduced run-time and memory requirements. The power models can include power switches inside the block, related supplies of logic ports, supply power states, system power states, power management devices such as isolation logic and level shifters, feed-through and floating ports. The power model may be expressed either in UPF or as a combination of liberty model and UPF. After replacing modules with abstracted models the HPVS can quickly verify an entire SoC with a small memory footprint.
    Type: Application
    Filed: September 19, 2018
    Publication date: January 17, 2019
    Inventors: Shekaripuram V. Venkatesh, Nitin Sharma, Sanjay Gulati, Parul Bhatia
  • Publication number: 20190018914
    Abstract: Numerical simulation method includes receiving a manufacturing process configuration specification for moving various types of arbitrarily-shaped objects from an egress area onto a lower surface with desired mass flow rate in a predefined time period; creating a FEA model representing the lower surface; creating respective bonded discrete element models (BDEMs) representing the various types of the objects, each BDEM containing discrete elements connected by connection bonds; generating a list of BDEMs each with randomly-chosen types and orientation, such that total mass of the list of BDEMs exceeds a target total mass; and obtaining numerically-simulated physical behaviors of the objects in a time-marching simulation. At each solution cycle of the simulation, placing respective objects into randomly-selected ‘open’ sub-regions by activating next relevant portion of the BDEMs based on the mass flow rate and time-step size; releasing activated BDEMs from the egress area onto the lower surface.
    Type: Application
    Filed: July 17, 2017
    Publication date: January 17, 2019
    Inventor: Boning Zhang
  • Publication number: 20190018915
    Abstract: Methods, systems, computer-readable media, and apparatuses for query-based interest in a simulation are presented. Entities may be simulated on workers, and each entity may comprise one or more components. A simulation system may run bridges on one or more machines, and the bridges may be configured to facilitate data communications between the workers and one or more entity databases. Each worker may be assigned to a different bridge. The system may modify one or more entities to include an interest component, and the interest component may indicate a query subscription to the one or more entity databases, which may affect the communication between bridges and workers. The interest component may also or alternatively indicate a frequency for receiving, from the one or more entity databases, updates for the query subscription.
    Type: Application
    Filed: September 18, 2018
    Publication date: January 17, 2019
    Inventors: Jennifer Harkness, Rok Strnisa
  • Publication number: 20190018916
    Abstract: A method and system (and/or a total simulation) have at least first and second sub-systems. An interconnection network is determined, which couples and determines the first and the second sub-systems at a coupling. First sub-system information of the first sub-system and second sub-system information of the second sub-system are determined. An execution sequence is selected, by which it is determined, in which sequence relative to each other a first and a second parameter outputs are determined. Furthermore, extrapolation methods are determined, by which first and second parameter inputs are determinable during a macro step size (e.g. between the coupling times). The macro step size prescribes-coupling times, at which an exchange of corresponding first and second input parameters and of the first and the second output parameters between the sub-systems is performed.
    Type: Application
    Filed: December 29, 2016
    Publication date: January 17, 2019
    Applicant: Kompetenzzentrum - Das Virtuelle Forschungsgesellschaft MBH
    Inventors: Martin Benedikt, Jost Bernasch, Franz Holzinger, Daniel Watzenig
  • Publication number: 20190018917
    Abstract: The present disclosure provides a hybrid timing analysis method. The method includes: receiving a pre-layout netlist, a post-layout netlist and a configuration file associated with an integrated circuit design; generating a first measurement script and an input stimulus waveform file according to the configuration file; performing a first dynamic timing analysis upon the pre-layout netlist by using the first measurement script and the input stimulus waveform file to generate a pre-layout simulation result; identifying at least one data path and at least one clock path according to the pre-layout simulation result; generating a second measurement script according to the at least on data path and at least one clock path; and performing a second dynamic timing analysis upon the post-layout netlist by using the second measurement script and the input stimulus waveform file to generate a first post-layout simulation result. Associated system and non-transitory computer readable medium are also provided.
    Type: Application
    Filed: July 17, 2017
    Publication date: January 17, 2019
    Inventors: CHUN-JIUN DAI, WEI MIN CHAN, YEN-HUEI CHEN, HUNG-JEN LIAO, JONATHAN TSUNG-YUNG CHANG
  • Publication number: 20190018918
    Abstract: A computerized hydrologic modeling system and method for performing accurate hydrologic determination using disparate weather data sources. Weather observation data are received for a geographical region, the weather observation data comprising data having a first temporal and spatial resolution for a first parameter set. Weather model data are received for the geographical region, the weather model data comprising data having a second temporal and spatial resolution for a second parameter set. Either the weather observation data or the weather model data or both are processed to provide a common scale dataset having a common temporal and spatial resolution for the parameters of the first and second parameter sets. A historical dataset is retrieved comprising historical observation data for the first and second parameter sets. The common scale dataset is bias-corrected to be statistically consistent with the historical observation data.
    Type: Application
    Filed: July 9, 2018
    Publication date: January 17, 2019
    Applicant: THE TRUSTEES OF PRINCETON UNIVERSITY
    Inventors: Eric Franklin WOOD, Justin SHEFFIELD, Ming PAN, Colby Kipp FISHER, Nathaniel Wilkins CHANEY, Jonathan Drew HERMAN, Hylke Edward BECK
  • Publication number: 20190018919
    Abstract: In example implementations, a method executed by a processor is provided. The method receives a simulated photonic data input based on a theoretical photonic design that meets a target specification. A complementary metal-oxide semiconductor (CMOS) circuit design is designed based on the simulated photonic data input using a pre-layout simulation. An experimental photonic data input based on a fabricated photonics device that meets the target specification is received. The CMOS circuit is designed based on the experimental photonic data input using a post-layout simulation. A physical circuit CMOS circuit design and a layout that includes detailed physical dimensions associated with the physical CMOS circuit design that is based on the pre-layout and the post-layout are transmitted to a CMOS foundry.
    Type: Application
    Filed: January 22, 2016
    Publication date: January 17, 2019
    Inventors: Tsung-Ching Huang, Chin-Hui Chen, Aarco Fiorentino, Raymond G. Beausoleil
  • Publication number: 20190018920
    Abstract: A system for simulating reliability of a circuit design includes: a first memory device, arranged to store a technology file, wherein the circuit design comprises a plurality of circuit cells, and the first memory device further stores a plurality of first failure rates corresponding to a first circuit cell in the plurality of circuit cells; a first simulating device, coupled to the first memory device, for generating a first specific failure rate of the first circuit cell according to the plurality of first failure rates and the technology file; and an operating device, coupled to the first simulating device, for generating a total failure rate of the circuit design according to the first specific failure rate.
    Type: Application
    Filed: July 14, 2017
    Publication date: January 17, 2019
    Inventors: CHIN-SHEN LIN, MENG-XIANG LEE, KUO-NAN YANG, CHUNG-HSING WANG
  • Publication number: 20190018921
    Abstract: There is provided a contact force evaluation method for evaluating a contact force against a supporting member of a tube bundle positioned in a fluid and supported by the supporting member, including a contact force setting step of setting a contact force of the tube bundle, a probability density function calculation step of calculating a probability density function of a reaction force received by the supporting member from the tube bundle in response to a predetermined input, using a vibration analysis model of the tube bundle and the supporting member, a probability calculation step of calculating a probability that a reaction force equal to or higher than the set contact force occurs, based on the calculated probability density function, and an evaluation step of evaluating the set contact force, based on the calculated probability.
    Type: Application
    Filed: January 16, 2017
    Publication date: January 17, 2019
    Applicant: MITSUBISHI HEAVY INDUSTRIES, LTD.
    Inventors: Makoto Iwasaki, Kazuo Hirota, Shingo Nishida, Tetsuya Arikawa, Ryoichi Kawakami, Masaaki Katayama, Toshifumi Nariai, Kohei Yamamoto
  • Publication number: 20190018922
    Abstract: The present invention relates to a method and system for dynamically analyzing, determining, predicting and displaying ranked suitable heterologous biosynthesis pathways for a specified host. The present invention addresses the problem of finding suitable pathways for the endogenous metabolism of a host organism because the efficacy of heterologous biosynthesis is affected by competing endogenous pathways. The present invention is called MRE (Metabolic Route Explorer), and it was conceived and developed to systematically and dynamically search for, determine, analyze, and display promising heterologous pathways while considering competing endogenous reactions in a given host organism.
    Type: Application
    Filed: February 2, 2017
    Publication date: January 17, 2019
    Applicant: King Abdullah University of Science and Technology
    Inventors: Xin Gao, Hiroyuki Kuwahara, Meshari Saud Alazmi, Xuefeng Cui
  • Publication number: 20190018923
    Abstract: There are systems and methods for preparing or using prognostic information about opioid maintenance response. The information may include determining patient information, including DNA information, associated with a human subject; determining from the DNA information whether a subject genotype of the human subject includes one or more SNP diploid polymorphisms by detecting, utilizing a detection technology and the DNA information, a presence or absence of the one or more SNP diploid polymorphisms in the subject genotype, wherein each SNP diploid polymorphism of the one or more SNP diploid polymorphisms includes a combination of two SNP alleles associated with one SNP location; and determining an opioid maintenance response associated with the human subject based, at least in part, on the presence or absence of the one or more SNP diploid polymorphisms in the subject genotype.
    Type: Application
    Filed: April 28, 2016
    Publication date: January 17, 2019
    Inventor: Brian MESHKIN
  • Publication number: 20190018924
    Abstract: The invention involves a method for identifying a target protein. The invention involves receiving a request to identify a target protein based on a ligand; identifying, using the ligand, a first protein, where the ligand binds with the first protein to form a ligand-protein complex; generating, a first binding site profile for the first protein, where the first binding site profile describes molecular properties of the first protein; obtaining, from a controlled server, structure data describing molecular properties of surfaces for a multitude of proteins, where the multitude of proteins comprises the target protein; identifying, using the first binding site profile and the structure data, the target protein; and presenting the target protein to a user.
    Type: Application
    Filed: December 31, 2015
    Publication date: January 17, 2019
    Applicant: Cyclica Inc.
    Inventors: Stephen Scott Mackinnon, Leonard David Morayniss, Jason Mitakidis, Fuad G. Gwadry
  • Publication number: 20190018925
    Abstract: One or more sequences are decomposed into one or more fixed length subsequences. The one or more sequences are associated with one or more respective genome samples. One or more contiguous ranges of the one or more fixed length subsequences are identified. A given one of the one or more contiguous ranges is analyzed to identify at least one group of variants of the fixed length subsequences within the given contiguous range. Analyzing the given contiguous range to identify the at least one group of variants comprises comparing the one or more fixed length subsequences of the given contiguous range to each other. It is determined whether the at least one group of variants partitions the one or more genome samples in satisfaction of at least one partitioning criterion.
    Type: Application
    Filed: July 11, 2017
    Publication date: January 17, 2019
    Inventors: Thomas C. Conway, Benjamin Goudey
  • Publication number: 20190018926
    Abstract: Provided herein are systems and methods for generating an immune-oncology profile from a biological sample. The immune-oncology profile can include the proportion or percentage of immune cells, expression of immune escape genes, and/or mutational burden. The immune-oncology profile may allow the generation of classifiers for making prognostic or diagnostic predictions.
    Type: Application
    Filed: August 6, 2018
    Publication date: January 17, 2019
    Inventors: Ryan J. Bloom, Jon R. Armstrong
  • Publication number: 20190018927
    Abstract: The present disclosure is concerned with data evaluation tools, methods for analyzing a dataset, and a computer readable medium comprising a computer program code that when run on a data processing device carries out the method of the disclosure as well as a device for carrying out the method of the disclosure. The methods and devices disclosed herein are used in analytical systems that analyze biological samples.
    Type: Application
    Filed: July 16, 2018
    Publication date: January 17, 2019
    Applicant: Roche Molecular System, Inc.
    Inventor: Rolf Knobel
  • Publication number: 20190018928
    Abstract: Methods and tools for determining the structure of biomacromolecules such as proteins in a sample using mass spectrometry. More particularly the methods allow determining the presence of a biomacromolecule of an organism in a sample by comparing an observed mass spectrum of the sample with a theoretical fragment ion spectrum comprising theoretical fragment ion masses.
    Type: Application
    Filed: December 30, 2016
    Publication date: January 17, 2019
    Applicants: VITO NV, Universiteit Antwerpen
    Inventors: Dirk Valkenborg, Jef Hooyberghs, Kris Laukens
  • Publication number: 20190018929
    Abstract: A method is disclosed for predicting in advance whether a melanoma patient is likely to benefit from high dose IL2 therapy in treatment of the cancer. The method makes use of mass spectrometry data obtained from a blood-based sample of the patient and a computer configured as a classifier and making use of a reference set of mass spectral data obtained from a development set of blood-based samples from other melanoma patients. A variety of classifiers for making this prediction are disclosed, including a classifier developed from a set of blood-based samples obtained from melanoma patients treated with high dose IL2 as well as melanoma patients treated with an anti-PD-1 immunotherapy drug. The classifiers developed from anti-PD-1 and IL2 patient sample cohorts can also be used in combination to guide treatment of a melanoma patient.
    Type: Application
    Filed: January 18, 2017
    Publication date: January 17, 2019
    Inventors: Arni Steingrimsson, Carlos Oliveira, Krista Meyer, Joanna Röder, Heinrich Röder
  • Publication number: 20190018930
    Abstract: The present invention effectively utilizes data reflecting the expression of measurement target genes and non-measurement target genes other than the measurement target genes or functions of the gene products obtained by next generation sequencing analysis or microarray analysis.
    Type: Application
    Filed: January 31, 2018
    Publication date: January 17, 2019
    Applicants: SYSMEX CORPORATION, OSAKA UNIVERSITY
    Inventors: Kazuki KISHI, Kenichi SAWA, Yasuto NAOI, Shinzaburou NOGUCHI
  • Publication number: 20190018931
    Abstract: A medical treatment machine, such as a home dialysis machine, can receive prescription parameters that define parameters of a medical treatment to be administered to a patient. A medical prescription is entered by a clinician into a clinical information system (CIS) that calls a system to evaluate the compatibility of the entered prescription by transmitting the prescription parameters to a server that has access to a database of medical devices and their operational parameters. The server compares the treatment parameters of the medical prescription to the operational parameters of the medical device and generates a prescription compatibility response indicting if the treatment parameters of the medical prescription can be executed by the medical device. The server returns to the CIS the prescription compatibility response to allow the prescription, e.g. in a digital or program form, to be securely transmitted or delivered via a connected health system to the medical device.
    Type: Application
    Filed: July 14, 2017
    Publication date: January 17, 2019
    Inventors: Paul Chamney, Harvey Cohen
  • Publication number: 20190018932
    Abstract: A consumption digestion advice (CDA) tracker computing device includes a processor coupled in communication with a memory. The processor is programmed to receive user transaction data from a payment network for a selected user. In addition, the processor is programmed to retrieve food, medicine, and/or condition contraindication data from a third party database for the selected user. The processor is also programmed to process the transaction data and the food, medicine, and/or condition contraindication data to determine a personalized indicator indicating at least one contraindication relating to the transaction data. Moreover, the processor is programmed to transmit the personalized indicator to a user computing device for display.
    Type: Application
    Filed: July 14, 2017
    Publication date: January 17, 2019
    Inventors: Peter Groarke, Ahmed Hosny, Ross Phelan, Rohit Gupta
  • Publication number: 20190018933
    Abstract: In various embodiments, the systems and methods described herein relate to multimodal generative models. The generative models may be trained using machine learning approaches, using training sets comprising chemical compounds and one or more of biological, chemical, genetic, visual, or clinical information of various data modalities that relate to the chemical compounds. Deep learning architectures may be used. In various embodiments, the generative models are used to generate chemical compounds that satisfy multiple desired characteristics of different categories.
    Type: Application
    Filed: January 13, 2017
    Publication date: January 17, 2019
    Inventors: Kenta Oono, Justin Clayton
  • Publication number: 20190018934
    Abstract: A media storage device includes a media security controller circuit and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller circuit sends a message to the rendering device that causes the rendering device to obtain a portion of data from memory of the media storage device and provide it to the media security controller circuit. The portion is received and transformed by the media security controller circuit. The media security controller circuit sends the transformed portion to the rendering device.
    Type: Application
    Filed: September 5, 2018
    Publication date: January 17, 2019
    Inventors: Paul C. Kocher, Helena Handschuh
  • Publication number: 20190018935
    Abstract: In an aspect of the disclosure, a method, a computer-readable medium, and a system for managing a collection of virtual desktops are provided. The system receives, at a license manager and from a first virtual desktop of the collection of virtual desktops, a first request to validate a license for the first virtual desktop. The system also determines whether a license is available for the first virtual desktop. The system further sends a validation status message to the first virtual desktop to indicate whether a license is available for the first virtual desktop based on the determination.
    Type: Application
    Filed: July 12, 2017
    Publication date: January 17, 2019
    Inventors: Caarthyk Mano Sundar V, Prasath S
  • Publication number: 20190018936
    Abstract: A method for encrypting logic includes generating, by a computing system, locking logic for inclusion in a logic circuit. The locking logic is generated based at least in part on an error rate and an attack complexity. The method also includes inserting, by the computing system, a one-way function into the locking logic. The method further includes applying, by the computing system, obfuscation logic to the logic circuit, where the obfuscation logic is applied on top of the locking logic.
    Type: Application
    Filed: July 11, 2018
    Publication date: January 17, 2019
    Inventor: Hai Zhou
  • Publication number: 20190018937
    Abstract: The present disclosure aims to provide CAPTCHA that meets orthogonal requirements of accessibility, usability and security requirements for users of all abilities to make it practically inclusive. The present disclosure provides CAPTCHA questions based on media files associated with real-world scenario thereby ensuring usability and accessibility. Distortion interference is introduced in the media files to ensure security. The questions relate to a selected theme from a plurality of themes. Each theme is further associated with a plurality of media files based on environment and contextual information. Geographical considerations like language and culture are also taken into account to increase usability. The vast repository of media files, types and combinations add to the security aspect of the CAPTCHA.
    Type: Application
    Filed: March 15, 2018
    Publication date: January 17, 2019
    Applicant: Tata Consultancy Services Limited
    Inventors: Charudatta JADHAV, Sumeet AGRAWAL, Madhu Priyatam Venkata PALADUGU
  • Publication number: 20190018938
    Abstract: A process including: displaying icons used for password entry into an electronic system, in such a way that a hand movement associated with entry of the password into the system is randomized.
    Type: Application
    Filed: September 20, 2018
    Publication date: January 17, 2019
    Inventor: MARK RODNEY ANSON
  • Publication number: 20190018939
    Abstract: A computer implemented method of correlating between detected access events to access client terminals in a monitored location and physical activity of people in the monitored location, comprising detecting one or more access events to access one or more of a plurality of client terminals located in a monitored location and operatively connected to a first network, obtaining sensory activity data from one or more activity detectors deployed in the monitored location to capture physical activity of people in the monitored location wherein the activity detector(s) are operatively connected to a second interconnection isolated from the first network, analyzing the sensory activity data to identify a spatiotemporal activity pattern of one or more persons in the monitored location, correlating between the access event(s) and the spatiotemporal activity pattern(s) to validate the access event(s) and initiating one or more actions according to the validation.
    Type: Application
    Filed: July 13, 2018
    Publication date: January 17, 2019
    Inventors: Tsvi LEV, Doron GONEN, Moshe KARAKO, Yaacov HOCH
  • Publication number: 20190018940
    Abstract: A method and a system for recognizing an input by using an index of a variable grid are disclosed. An input recognition method carried out by an electronic device implemented by a computer comprises the steps of: generating a virtual grid of which the distance between lines is variable, in correspondence with at least a partial region of a display included in or connected to the electronic device; and recognizing, by using an index of the virtual grid, a position selected by a user of the electronic device in the region of the display corresponding to the virtual grid.
    Type: Application
    Filed: September 7, 2018
    Publication date: January 17, 2019
    Inventors: Jungmin Kang, Tae Gyu Kang, Sechun Oh, Ho Jin Lee
  • Publication number: 20190018941
    Abstract: An authentication device that authenticates a user using person specifiable information includes a first storage unit configured to store person specifiable information specifying a registered user, a second storage unit configured to store association information in which the registered user is associated with a predetermined terminal possessed by the registered user, a first acquisition unit configured to acquire person specifiable information from an authentication target user, a second acquisition unit configured to acquire identification information, a user specifying unit configured to specify a user associated with the terminal transmitting the identification information based on the association information and the identification information, and an authentication processing unit configured to authenticate the authentication target user by executing a comparison process between the person specifiable information of the authentication target user and the person specifiable information of the registered
    Type: Application
    Filed: June 4, 2018
    Publication date: January 17, 2019
    Applicant: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventors: Yuya GOTO, Yosuke OHASHI
  • Publication number: 20190018942
    Abstract: An authentication device authenticates a user using biometric information. The authentication device including: a storage unit, a first acquisition unit, a second acquisition unit, a controller, an authentication processing unit, and an update processing unit. When the first acquisition unit acquires identification information, and a combination for which the number of successes for the acquired identification information is greater than or equal to a predetermined number is present in combination information, the controller sets a threshold such that a false acceptance rate for erroneously authenticating a person other than a registered user becomes lower than when the combination is not present.
    Type: Application
    Filed: June 6, 2018
    Publication date: January 17, 2019
    Applicant: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventor: Naoyuki TAKADA
  • Publication number: 20190018943
    Abstract: A method for enabling a biometric recognition pattern and related products are provided, and the method includes the follows. A mapping relationship between a first condition and a target biometric recognition pattern is queried when detecting that a terminal device satisfies the first condition. The target biometric recognition pattern is one or more of at least one biometric recognition pattern with which the terminal device is operable. The target biometric recognition pattern is determined based on the mapping relationship. The target biometric recognition pattern is enabled.
    Type: Application
    Filed: July 11, 2018
    Publication date: January 17, 2019
    Inventors: Haiping Zhang, Yibao Zhou
  • Publication number: 20190018944
    Abstract: A biological data registration support device includes: a control portion configured to acquire a plurality of registration scenarios, each including at least one verification method and associated with respective services, identify a verification method that is commonly included in the plurality of registration scenarios as a common verification method, and acquire one set of biological data for registration regarding the common verification method and one set of biological data for registration regarding the verification method other than the common verification method; and a transmitting portion configured to transmit the biological data for registration and the plurality registration scenarios acquired by the control portion.
    Type: Application
    Filed: March 24, 2017
    Publication date: January 17, 2019
    Applicant: NEC CORPORATION
    Inventors: Shizuo SAKAMOTO, Shigeharu SAKAYORI, Yumiko TOMIZUKA
  • Publication number: 20190018945
    Abstract: A method for fingerprint unlocking is provided. Multiple fingerprint images are obtained, by acquiring fingerprints through adjusting adjustment parameters of a fingerprint acquisition chip of a fingerprint recognition module, in response to detecting that the fingerprint recognition module is pressed. A target fingerprint image with the best image quality is determined from the multiple of fingerprint images. A terminal is unlocked when the target fingerprint image matches a preset fingerprint image successfully. A terminal is also provided.
    Type: Application
    Filed: August 31, 2018
    Publication date: January 17, 2019
    Inventor: Yibao Zhou
  • Publication number: 20190018946
    Abstract: A mobile, wireless biometric identification system includes a biometric capture device which enables a smartphone, using a commercially established wireless communication networks, to capture a digital image of a human biometric (iris, fingerprint, etc.) for transmission to a central server. The biometric capture device captures a high quality image for encoding and comparison, while the overall system leverages the existing cellular communication network. The device can be used as an interface to medical databases and devices used to diagnose and treat patients.
    Type: Application
    Filed: September 1, 2018
    Publication date: January 17, 2019
    Applicant: BI2 Technologies, LLC
    Inventor: Sean Mullin
  • Publication number: 20190018947
    Abstract: Techniques related to login information data processing are described. In one example method, a smart contract is created based on a predetermined smart contract template. The smart contract includes login information corresponding to a user. The created smart contract is stored at a storage address in a blockchain network based on the identifier. A login information query request is received from the user, and the login information query request includes the identifier. At least one smart contract is retrieved from the blockchain network based on the identifier, and the smart contract corresponding to the user is determined from the at least one retrieved smart contract. The smart contract corresponds to the user is executed to obtain at least one login information, and sending the obtained login information to the user.
    Type: Application
    Filed: July 12, 2018
    Publication date: January 17, 2019
    Applicant: Alibaba Group Holding Limited
    Inventor: Hao Li
  • Publication number: 20190018948
    Abstract: A processor may initiate a first verification event. The processor may identify two or more devices that are within a predetermined area of the processor during the initiating of the first verification event. The processor may verify an identity of a verified user based on the two or more devices. The processor may process the first verification event in response to verifying the identity of the verified user.
    Type: Application
    Filed: July 17, 2017
    Publication date: January 17, 2019
    Inventor: Richard C. Johnson
  • Publication number: 20190018949
    Abstract: Systems and methods are disclosed for providing secure access to a data storage device. A user may move the data storage device (e.g., wave, twist, etc.). The data storage device may determine whether the motions valid and may allow access to the data storage device (e.g., to non-volatile memory of the data storage device) when the motions are valid.
    Type: Application
    Filed: July 13, 2017
    Publication date: January 17, 2019
    Inventors: Jun XU, Lei ZHANG, Wei XI, Dean Mitcham JENKINS, David W. CHEW, Jianguo ZHOU
  • Publication number: 20190018950
    Abstract: Various systems, mediums, and methods herein describe aspects of an authentication system. The system may receive a request from a user device to authenticate a user. The system may determine a route travelled by the user. The route can be determined based at least on data retrieved from the user device of the user. The system may determine one or more objects viewable along the route. At least one image of the one or more objects can be selected. The system may communicate the at least one image and at least one other image to the user device to be displayed on the user device. The system may receive a selection of the at least one image by the user through a display of the user device. The authentication of the user can be based, at least in part, on the user selection of the at least one image.
    Type: Application
    Filed: July 17, 2018
    Publication date: January 17, 2019
    Inventors: Michael Charles Todasco, Sumeet Ahuja, Prashanthi Ravanavarapu, Geetha Kuppuswamy, Dushyanth Bharadwaj
  • Publication number: 20190018951
    Abstract: In one embodiment, a security provisioning service automatically establishes trust in a device. Upon receiving a provisioning request, a security provisioning service identifies a verification item that is associated with the provisioning request. The security provisioning service performs one or more verification operations based on the provisioning request to determine whether the provisioning request is authorized. If the provisioning request is authorized, then the provisioning service establishes a verifiable identification for the device that is assured by the secure provisioning service and then executes the provisioning request. By automatically performing the verification operations to establish trust in the device, the provisioning service eliminates manual identification assurance operations that are performed as part of a conventional security provisioning process.
    Type: Application
    Filed: September 5, 2018
    Publication date: January 17, 2019
    Inventors: Stephen D. JAMES, Andrew FREGLY, Andrew CATHROW
  • Publication number: 20190018952
    Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.
    Type: Application
    Filed: September 17, 2018
    Publication date: January 17, 2019
    Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
  • Publication number: 20190018953
    Abstract: A system in which an event manager executes a multitenant computing platform. The event manager obtains a first domain-specific event indicating a user request to perform operations associated with a particular tenant's domain object. Information for the domain object associated with the domain-specific event is retrieved from a tenant database, the information including a domain object definition and instructions defining its behaviors. A protected event execution environment (sandbox) is generated on the multitenant computing platform implementing restrictions on execution of the domain object's behavior instructions. The restrictions are specific to the combination of the user and the domain object. Execution of the instructions is initiated in the protected event execution environment.
    Type: Application
    Filed: July 10, 2018
    Publication date: January 17, 2019
    Inventors: Sachin Gopaldas Totale, Harish Rawat
  • Publication number: 20190018954
    Abstract: Techniques to remotely detect behavior associated with malware and identify compromised user-sessions, regardless of the malware variant or family, and independently of the page structure.
    Type: Application
    Filed: September 18, 2018
    Publication date: January 17, 2019
    Inventors: Ivan Fajardo Verano Dario, Claudio Deiro, Javier Vargas Gonzalez Fernando
  • Publication number: 20190018955
    Abstract: In one embodiment, a device in a network tracks changes in a source port or address identifier indicated by network traffic associated with a particular host in the network. The device detects an operating system start event based on the track changes in the source port or address identifier indicated in the traffic data associated with the particular host. The device provides data regarding the detected operating system start event as input to a machine learning-based malware detector. The device causes performance of a mitigation action in the network when the malware detector determines that the particular host is infected with malware.
    Type: Application
    Filed: July 13, 2017
    Publication date: January 17, 2019
    Inventors: David McGrew, Blake Harrell Anderson, Subharthi Paul
  • Publication number: 20190018956
    Abstract: Systems and methods include: collecting digital event data for the digital account; using a trained machine learning model to extract account takeover (ATO) risk features from the collected digital event data; evaluating the extracted ATO risk features of the collected digital event data of the digital account against a plurality of ATO risk heuristics; identifying one or more of the plurality of ATO risk heuristics that is triggered by the extracted ATO risk features, wherein one or more of the plurality of ATO risk heuristics may be triggered if at least a subset of the extracted ATO risk features matches requirements of the one or more ATO risk heuristics; and generating an ATO risk assessment for the digital account using the one or more triggered ATO risk heuristics.
    Type: Application
    Filed: December 14, 2017
    Publication date: January 17, 2019
    Inventors: Fred Sadaghiani, Keren Gu, Alex Paino, Jacob Burnim, Thomas Schiavone
  • Publication number: 20190018957
    Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.
    Type: Application
    Filed: September 17, 2018
    Publication date: January 17, 2019
    Inventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
  • Publication number: 20190018958
    Abstract: In the embodiments described herein, a malicious code detection module identifies potentially malicious instructions in memory of a computing device. The malicious code detection module examines the call stack for each thread running within the operating system of the computing device. Within each call stack, the malicious code detection module identifies the originating module for each stack frame and determines whether the originating module is backed by an image on disk. If an originating module is not backed by an image on disk, the thread containing that originating module is flagged as potentially malicious, execution of the thread optionally is suspended, and an alert is generated for the user or administrator.
    Type: Application
    Filed: July 13, 2017
    Publication date: January 17, 2019
    Inventor: Joseph W. Desimone
  • Publication number: 20190018959
    Abstract: The purpose of the present invention is to provide a software analysis device which efficiently analyzes a computer environment in which software is capable of running. The software analysis system determines an order of detection devices, generates order information representing the order, and calculate a progression degree of abnormality based on how degree a predetermined order include the order in the order information.
    Type: Application
    Filed: December 6, 2016
    Publication date: January 17, 2019
    Applicant: NEC Corporation
    Inventors: Kazuhiko ISOYAMA, Koji KIDA, Hiroki TAGATO, Yoshiaki SAKAE, Junpei KAMIMURA, Yuji KOBAYASHI, Etsuko ICHIHARA
  • Publication number: 20190018960
    Abstract: Disclosed are systems and methods for machine learning of a model for detecting malicious files. The described system samples files from a database of files and trains a detection model for detecting malicious files on the basis of an analysis of the sampled files. The described system forms behavior logs based on executable commands intercepted during execution of the sampled files, and generates behavior patterns based on the behavior log. The described system determines a convolution function based on the behavior patterns, and trains a detection model for detecting malicious files by calculating parameters of the detection model using the convolution function on the behavior patterns. The trained detection model may be used to detect malicious files by utilizing the detection model on a system behavior log generated during execution of suspicious files.
    Type: Application
    Filed: February 28, 2018
    Publication date: January 17, 2019
    Inventors: Alexander S. Chistyakov, Ekaterina M. Lobacheva, Alexey M. Romanenko