Patents Issued in January 9, 2020
  • Publication number: 20200012737
    Abstract: Techniques for efficient data correlation are provided. A first data partition is received, and a first hash table of a plurality of hash tables is selected based on a timestamp associated with the first data partition. Additionally, a first hash bucket in the first hash table is identified based on the first data partition. It is determined that the first hash bucket includes a second data partition. Upon determining that the first hash bucket satisfies a predefined criterion, the second data partition is removed from the first hash bucket, and the first and second data partitions are associated.
    Type: Application
    Filed: October 11, 2018
    Publication date: January 9, 2020
    Inventors: Joshith RAYAROTH KODERI, Manickavasagan JAYARAMAN, Ateet Kumar K. SHETTY
  • Publication number: 20200012738
    Abstract: A knowledge data management system (KDMS) implements data refinement orchestration, resolution, and refinement to provide a reusable and generic solution to ingest and link data via relationships and properties when constructing a knowledge graph. The KDMS thus operates to break down existing data storage silos by normalizing and integrating data with a uniform semantic schema, which results in more accurate and faster knowledge graph construction.
    Type: Application
    Filed: November 21, 2018
    Publication date: January 9, 2020
    Applicant: Accenture Global Solutions Limited
    Inventors: Teresa Sheausan Tung, Colin Anil Puri, Zhijie Wang, Matthew Bernard Kujawinski
  • Publication number: 20200012739
    Abstract: A system, method and computer-readable medium for data transformation pipeline optimization including storing a transformation pipeline comprising data transformation components having associated input buffers and associated output buffers and being configured to apply data transformations to data in the associated input buffers and output results of the data transformations to the associated output buffers, receiving a data set comprising data fields, identifying satellite data fields for at least one transformation component, each satellite data field comprising data that is not utilized during the data transformations of the transformation component, and processing, by the data transformation engine, the data set through each transformation component in the transformation pipeline, the processing including removing satellite data fields from the input buffers, linking the removed satellite data fields to the remaining data in the input buffers, and applying the data transformations to data in input buffers
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Valentin MOSKOVICH, Kanika Dhuria
  • Publication number: 20200012740
    Abstract: The disclosure facilitates management of a plurality of related data stores by tracking metadata changes across the data stores, detecting the impact of the tracked metadata changes, and generating alerts based on the detected impact. Metadata change data from a plurality of data stores are received by a change impact engine and recorded to a centralized metadata change data structure. At least one change impact rule is applied to the recorded metadata change data and, upon detection of an impact based on the applied change impact rule, an alert based on the applied impact rule is generated. Consolidating the metadata change data from multiple data stores and detecting metadata changes that will significantly impact the operation of the associated system provide advance opportunities to manage and/or mitigate the impact of the metadata changes.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Samuel Gerald Bish, David C. Youngberg, Chrystal J. Sander, Richard William Wallen, Katie Marie Reece
  • Publication number: 20200012741
    Abstract: Techniques and solutions are described for determining, evaluating, and selecting data retrieval pathways. A plurality of database objects, such as tables, can be retrieved, and relationships between them determined. The relationships are between various attributes of the database objects. A plurality of pathways are determined between at least two target database objects, where the path determination does not consider attribute-level relationship information. After a path is determined, the relationship-level information can be added. A summary of the path, and relationship information, can be displayed to a user. A user can select paths to remove from the display, and can indicate one or more database objects that are required for a valid path, one or more database objects that are prohibited from valid paths, or combinations thereof. A user can select a path, and a query language statement to implement the path can be generated and displayed to the user.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Applicant: SAP SE
    Inventors: Sandra Bracholdt, Volker Saggau, Jan Portisch
  • Publication number: 20200012742
    Abstract: portable recording devices digitize audio signals and store the resulting digital audio samples locally. A master device periodically communicates a time marker and index value. Upon receiving a time marker from the master device, the recording devices latch their sample recording address occurring at that time, and store this latched address along with the received index value. Since the same index value is associated with recorded sample addresses occurring at the same time across all units, the shared index value provides a coordination means to later align the individual recordings, emulating a central multi-track recorder. Optionally, one of the portable recording devices can assume the additional role of master.
    Type: Application
    Filed: July 6, 2018
    Publication date: January 9, 2020
    Inventor: Blaine Clifford Readler
  • Publication number: 20200012743
    Abstract: As a web browser application executing on a computing renders a web application that contains a plurality of objects, the web browser application carries out, respectively for each object, a set of resource-consumption actions involving use of resources of the client device. Further, the web browser application dynamically manages operational states of the objects based on a cumulative resource-consumption of the web application, including (i) determining that the cumulative resource-consumption of the web application exceeds a defined limit, and (ii) responsive to the determining, transitioning at least one of the objects from a first operational state to a second operational state, where the object contributes less to the cumulative resource-consumption of the web application in the second operational state than in the first operational state.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Christopher Tucker, Qian Zhang, Yaron Guez, Sha He
  • Publication number: 20200012744
    Abstract: In an embodiment, a set of data visualization preferences for a plurality of directories in a target domain is received, along with a keyword landscape for a target domain. The keyword landscape is parsed according to the target domain's website structure, providing a structured landscape. Search volume data for a plurality of keywords in the keyword landscape is also received, the search volume data including a plurality of search volume data points calculated periodically for a predetermined number of time periods. A search trend is then calculated for at least a subset of the website structure in the target domain over the predetermined number of time periods, and a data aggregation is then calculated, the data aggregation based on the structured, landscape, the received search volume data, the calculated search trend, and the received set of data visualization preferences. Finally, the calculated aggregated data is displayed in graphical form.
    Type: Application
    Filed: July 7, 2018
    Publication date: January 9, 2020
    Applicant: BrightEdge Technologies, Inc.
    Inventor: Ken Shults
  • Publication number: 20200012745
    Abstract: A system and method for secure data management and access using field level encryption and natural language understanding. The system includes a component for securely managing queries to a database by pushing the encryption and data access responsibilities to the individual fields in the database. Dynamically allocated ports are further used to separate the functions of query processing from the requestor. The system uses a standard SQL front-end but all access control, encryption, and data management are handled by the field. The actual data may not reside in the field but may be pointed to by a data pointer. The system also includes a natural language understanding component that processes queries similarly to how people process language, by maintaining context to disambiguate terms and by allowing the use of new terms by learning which known terms they may refer to and then executing the query and returning the response in natural language form expected by the user.
    Type: Application
    Filed: July 9, 2018
    Publication date: January 9, 2020
    Inventor: Simon I. Bain
  • Publication number: 20200012746
    Abstract: Systems and methods for models utilizing siloed data are disclosed. For example, data stored with and/or available to one or more systems may be siloed such that it may not be aggregated and/or shared with other systems. The presently-disclosed systems and methods generate and utilize predictive layers and models to allow each system to predict outcomes using its own data and then models are shared between systems to allow each associated system to gain the benefits of the data of other systems without aggregating such data or otherwise sharing the data.
    Type: Application
    Filed: July 6, 2018
    Publication date: January 9, 2020
    Inventors: Ian Blumenfeld, Brian Johnson, Brian Lucena
  • Publication number: 20200012747
    Abstract: An information processing apparatus includes an acquisition unit that acquires recycle information regarding a recycle process of a product, a change recognition unit that recognizes change information regarding a design change of the product, and an output unit that outputs non-copable information in a case where a recycle treatment on a product after the design change is not able to be coped with by the recycle process on the basis of the recycle information and the change information.
    Type: Application
    Filed: June 26, 2019
    Publication date: January 9, 2020
    Applicant: FUJI XEROX CO., LTD.
    Inventor: Atsuo KAZAMA
  • Publication number: 20200012748
    Abstract: In one embodiment, a service maintains a plurality of machine learning-based client behavioral models. Each behavioral model models wireless client behavior of a particular client type and configuration. The service selects one or more of the behavioral models to emulate the modeled one or more wireless client behaviors in a wireless network. The service controls, by using the selected one or more behavioral models, one or more emulation points in the wireless network to generate wireless client traffic in the wireless network that exhibits the modeled one or more wireless client behaviors. The service obtains performance metrics from the wireless network associated with the generated wireless client traffic.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Karthikeyan Ganesan, Anand Gurumurthy, Vishal Satyendra Desai, Jerome Henry, Pooya Monajemi
  • Publication number: 20200012749
    Abstract: A qualification system for gas turbine engine components includes a computer system configured to receive a set of measured parameters for each gas turbine engine component in a plurality of substantially identical gas turbine engine components, and determine a variation model based on the set of measured parameters. The computer system includes at least one simulated engine model configured to determine a predicted operation of each gas turbine engine component in the plurality of substantially identical gas turbine engine components, a correlation system configured to correlate variations in the set of parameters for each of the gas turbine engine components with a set of the predicted operations of each gas turbine engine, thereby generating a predictive model based on the variations. The computer system also includes a qualification module configured to generate a qualification formula based on the predictive model.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Daniel A. Snyder, David J. Yudichak, Kurt R. Heinemann, Perry Bowes, Evan Selin
  • Publication number: 20200012750
    Abstract: An exemplary method for qualifying a gas turbine engine component includes creating a first set of substantially identical gas turbine engine components via a uniform manufacturing procedure, determining a set of as-manufactured parameters of each gas turbine engine component in the first set of substantially identical gas turbine engine components, determining a variance model of the first set of substantially identical gas turbine engine components, and determining a plurality of predicted response models based at least in part on the variance model, each of the predicted response models corresponding to one of an engine type and an engine assembly, and each of the predicted response models being configured to determine a predicted response of including a gas turbine engine component from the first set of substantially identical gas turbine engine components in the corresponding one of the engine type and the engine assembly.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Daniel A. Snyder, Kurt R. Heinemann
  • Publication number: 20200012751
    Abstract: A method for qualifying a gas turbine engine component includes creating a first set of substantially identical gas turbine engine components via a uniform manufacturing procedure, determining a set of as-manufactured parameters of each gas turbine engine component in the first set, and determining a variance model of the first set. The variance model includes a representative parameter profile, which includes a plurality of component parameter profiles. The sum of each of the component parameter profiles is the representative parameter profile.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Daniel A. Snyder, Kurt R. Heinemann, Glenn Levasseur
  • Publication number: 20200012752
    Abstract: Systems and methods for models utilizing siloed data are disclosed. For example, data stored with and/or available to one or more systems may be siloed such that it may not be aggregated and/or shared with other systems. The presently-disclosed systems and methods generate and utilize predictive layers and models to allow each system to predict outcomes using its own data and then models are shared between systems to allow each associated system to gain the benefits of the data of other systems without aggregating such data or otherwise sharing the data.
    Type: Application
    Filed: July 6, 2018
    Publication date: January 9, 2020
    Inventors: Ian Blumenfeld, Brian Johnson, Brian Lucena
  • Publication number: 20200012753
    Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: obtaining service life data of a part including a maintenance operation count of the part. The life expectancy of the part is formulated as a function of a life span of the part and the maintenance operation count at a point in time based on the obtained service life data and data interpolated therefrom. A life expectancy model is built based on the function and a plurality of life expectancies are predicted by applying simulated inputs to the life expectancy model. The life expectancies are produced after verification to indicate when to replace the part.
    Type: Application
    Filed: July 9, 2018
    Publication date: January 9, 2020
    Inventors: Michihiro YOKOYAMA, Junya SHIMIZU
  • Publication number: 20200012754
    Abstract: A method and system for forming a dynamic model for the behavior of machines from sensed data.
    Type: Application
    Filed: September 16, 2019
    Publication date: January 9, 2020
    Inventor: Wallace LARIMORE
  • Publication number: 20200012755
    Abstract: A method and an apparatus for generating a road network are disclosed. The method for generating a road network comprises: aggregating a plurality of grid cells partitioned in advance on a trajectory map based on trajectories in each grid cell of the plurality of grid cells to form level-1 regions; and generating a link of the road network by merging a level-1 region having two valid neighbors with its neighbor level-1 regions having two valid neighbors.
    Type: Application
    Filed: September 19, 2019
    Publication date: January 9, 2020
    Inventors: Guoqiang Hu, Jiandong Ding, Peng Ji, Ning Duan, Jun Zhu
  • Publication number: 20200012756
    Abstract: A method includes obtaining state data of a movable platform, scene data of an environment within which the movable platform is simulated, and parameters of one or more imaging sensors borne on the movable platform, varying one or more of the state data, the scene data, and the parameters to obtain varied data, and simulating visual data captured by the one or more imaging sensors based on the varied data for the one or more of state data, the scene data, and the parameters.
    Type: Application
    Filed: September 20, 2019
    Publication date: January 9, 2020
    Inventors: Yuewen MA, Kaiyong ZHAO, Shizhen ZHENG
  • Publication number: 20200012757
    Abstract: A circuit module includes a model circuit and a look-up table (LUT). The model circuit generates an output signal based on one or more input signals, and corresponds to a digital circuit. The LUT stores one or more control signals and one or more operation parameters that are to be used to implement the model circuit. The one or more control signals and the one or more operation parameters correspond to an index determined by a combination of the one or more input signals and the output signal.
    Type: Application
    Filed: June 24, 2019
    Publication date: January 9, 2020
    Inventors: Seuk SON, Seungheon BAEK, Youngjun KIM, Jaeha KIM
  • Publication number: 20200012758
    Abstract: This application discloses a computing system to merge a first form board design describing a configuration for use in manufacturing a first wire harness with a second form board design describing a configuration for use in manufacturing a second wire harness. The computing system places the first form board design into a merged form board design, matches portions of the second form board design to portions of the first form board design, and aligns the second form board design with the merged form board design based on the matches. The computing system places an unmatched portion of the second form board design in the merged form board design based on the alignment of the second form board design with the merged form board design. The merged form board design describes a form board configuration for use in manufacturing both the first wire harness and the second wire harness.
    Type: Application
    Filed: July 8, 2019
    Publication date: January 9, 2020
    Inventors: Alexander Sumner, Frank Hemmersbach, Mohamed El-Morsy, Adam Bedford, Vikas Maddukuri
  • Publication number: 20200012759
    Abstract: In a part procurement system including a control device performing procurement of a part required by a customer, to the control device, customer's requirements information about the procured part inputted via a data input device, and at least BOM information that is part table information, CAD information that is computer-aided design information and part compatibility information, which are stored in a file server, are inputted; and the control device extracts candidate parts including candidates for the part required by the customer and alternatives for the part, based on the BOM information, the CAD information and the part compatibility information that have been inputted, and outputs a signal for displaying the extracted candidate parts on a display device.
    Type: Application
    Filed: September 18, 2018
    Publication date: January 9, 2020
    Inventors: Mika SARUYAMA, Ayato IWASAKI
  • Publication number: 20200012760
    Abstract: A method comprises securing a first component of a lockable adjustment assembly to an end A of a first rigid tube via a first releasable coupling assembly. The method also comprises securing a second component of the lockable adjustment assembly to an end C of a second rigid tube via a second releasable coupling assembly. Further, the method comprises moving the first component and the second component, loosely coupled with each other, relative to each other with only three degrees of freedom to position the first rigid tube and the second rigid tube in a selected orientation with respect to each other. The method also comprises, with the first rigid tube and the second rigid tube in the selected orientation relative to each other, locking the lockable adjustment assembly so that the first component and the second component have zero degrees of freedom relative to each other.
    Type: Application
    Filed: August 27, 2019
    Publication date: January 9, 2020
    Applicant: THE BOEING COMPANY
    Inventor: Michael John Shinners
  • Publication number: 20200012761
    Abstract: Systems and methods for diagnosing prostate cancer. Image sets (e.g., MRI collected at one or more b-values) and biological values (e.g., prostate specific antigen (PSA)) have features extracted and integrated to produce a diagnosis of prostate cancer. The image sets are analyzed primarily in three steps: (1) segmentation, (2) feature extraction, smoothing, and normalization, and (3) classification. The biological values are analyzed primarily in two steps: (1) feature extraction and (2) classification. Each analysis results in diagnostic probabilities, which are then combined to pass through an additional classification stage. The end result is a more accurate diagnosis of prostate cancer.
    Type: Application
    Filed: July 9, 2018
    Publication date: January 9, 2020
    Applicant: University of Louisville Research Foundation, Inc.
    Inventors: Ayman S. El-Baz, Ahmed Shalaby, Fahmi Khalifa, Islam Abdelmaksoud
  • Publication number: 20200012762
    Abstract: A system or method for providing price transparency for healthcare or medical procedures or services and/or financing. Users are allowed to search by desired attributes (e.g., cost, procedure, location, etc.) to obtain pricing information for medical care. The system or method provides comparison of the costs of in-network and out-of-network medical services and cash-only payments. The user can choose medical care at a desired location, and schedule an appointment. Bundled packages of medical services and ancillary services can be offered to enable the user to compare bundled costs based on in-network and out of network medical services and cash-only payments. Any costs calculated by the system or method can account for copayments and deductibles and can enable a user to compare total out-of-pocket expenses with a cash-only payment option. Financing may be included. Advertisement revenue can be obtained on a click-through basis based on a healthcare provider profile.
    Type: Application
    Filed: October 20, 2015
    Publication date: January 9, 2020
    Inventors: Marc A. Grossman, Dante Panella
  • Publication number: 20200012763
    Abstract: This disclosure aims to overcome at least some of the drawbacks associated with today's content sharing applications. In one aspect, this disclosure enables decentralized sharing of content based on crypto protocols and distributed database technology (e.g., blockchain technology). In one aspect, the content to be shared is encrypted and included in a session document that is stored in a distributed database that can be shared without requiring a central administrator.
    Type: Application
    Filed: December 15, 2016
    Publication date: January 9, 2020
    Applicant: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Tommy ARNGREN, Johan KRISTIANSSON
  • Publication number: 20200012764
    Abstract: Disclosed are systems and methods for improving interactions with and between computers in content providing, generating, securing and/or hosting systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the security and quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide added security features and functionality to media files through computerized, automated encoding and decoding of portions of media file content such that identified portions of the content are obfuscated upon display and communication to other users. The disclosed systems and methods provide a novel, computerized security feature(s) that protects data of media files from unintended exposure to third parties.
    Type: Application
    Filed: September 19, 2019
    Publication date: January 9, 2020
    Inventors: Bart THOMEE, Lyndon KENNEDY, Ioannis KALANTIDIS
  • Publication number: 20200012765
    Abstract: A software and/or hardware facility that can be used by content owners to assert ownership of content so that copyright friendly websites and services can take action against copyright piracy effectively, efficiently and is scalable is disclosed. The facility makes available to all content owners watermarking/fingerprinting technology so an identifier (e.g., a unique code) can be embedded in the content (e.g., video/audio portion of each video content asset). The facility utilizes blockchain technology to add information related to each unique identifier in a database and allows an authorized user (e.g., the owner) to update the information through a blockchain transaction.
    Type: Application
    Filed: July 9, 2018
    Publication date: January 9, 2020
    Inventors: Mohammed Artin Smaiely, Alex Seth Fonoroff
  • Publication number: 20200012766
    Abstract: A method for automatically giving an alarm after an encrypted document is leaked includes establishing a unique identifier for each protected document, and setting the unique identifier in the document. The unique identifier is uploaded to a cloud server, and the cloud server stores encrypted information corresponding to each document using the unique identifier as an index. When a third-party DRM system encrypts the document, the third-party DRM system uploads the unique identifier and current encrypted information to the cloud server, and the cloud server updates the encrypted information. When a user opens the document in a document reading client, the unique identifier is automatically uploaded with the encrypted information to the cloud server.
    Type: Application
    Filed: April 1, 2017
    Publication date: January 9, 2020
    Inventor: Peng Huang
  • Publication number: 20200012767
    Abstract: Method and apparatus for a system to harden digital consents. The system uses an evaluation of geographic locations, transaction times, and device identities to control the upload of consent data. Evaluations occur using numerous techniques including MAC address evaluation, IP address evaluation, meta-data evaluation, and physical location of restricted equipment such as ATMs and kiosks. Reliability of consent data entered into the system may be enhanced by strictly evaluating geographic locations, transaction times, and/or device identities.
    Type: Application
    Filed: September 16, 2019
    Publication date: January 9, 2020
    Inventors: Elizabeth S. Votaw, David J. Smiddy, FNU Sidharth, Stephen T. Shannon, James Alexander
  • Publication number: 20200012768
    Abstract: Method and apparatus for a system to harden digital consents. The system uses an evaluation of geographic locations, transaction times, and device identities to control the upload of consent data. Evaluations occur using numerous techniques including MAC address evaluation, IP address evaluation, meta-data evaluation, and physical location of restricted equipment such as ATMs and kiosks. Reliability of consent data entered into the system may be enhanced by strictly evaluating geographic locations, transaction times, and/or device identities.
    Type: Application
    Filed: September 16, 2019
    Publication date: January 9, 2020
    Inventors: Elizabeth S. Votaw, David J. Smiddy, FNU Sidharth, Stephen T. Shannon, James Alexander
  • Publication number: 20200012769
    Abstract: In various embodiments, a method comprises detecting a removable media device coupled to a digital device, authenticating a password to access the removable media device, injecting redirection code into the digital device, intercepting, with the redirection code, a request for data, determining to allow the request for data based on a security policy, and providing the data based on the determination. The method may further comprise selecting the security policy from a plurality of security policies based, at least in part, on the password and/or filtering the content of the requested data. Filtering the content may comprise scanning the data for malware. Filtering the content may also comprise scanning the data for confidential information.
    Type: Application
    Filed: September 17, 2019
    Publication date: January 9, 2020
    Applicant: CUPP Computing AS
    Inventors: Shlomo Touboul, Sela Ferdman, Yonathan Yusim
  • Publication number: 20200012770
    Abstract: System and method of collecting and processing data in electronic devices. A sensors data collector collects measurements from at least an accelerometer and a gyroscope of an electronic device. A data-loss prevention module operates to pass these measurements, immediately upon their collection, to a supplemental locally-running processing thread which retains the measurements even after a refresh of a web-page in which the measurements were collected, and which transmits the measurements to a remote server even after refresh of the web-page in which the measurements were collected. Non-global scope of functions is utilized, to reduce security exposure. An asynchronous SharedWorker module is utilized, to alleviate congestion of computing resources of the electronic device. Data obfuscation and encoding is utilized to maintain anonymity of user-entered data while still allowing a remote server to ensure the integrity of data received from the electronic device.
    Type: Application
    Filed: September 15, 2019
    Publication date: January 9, 2020
    Inventors: Avi Turgeman, Yehuda Sabag, Leonid Karabchevsky
  • Publication number: 20200012771
    Abstract: We propose a method that uses sequence of biometric identities, gestures, voice input, characters, symbols and pictures, for user authentication and verifications. So user credential would be combination of “What he/she is and what he/she knows”. Examples of biometric identities are finger prints, toe prints, knee scan, iris scan, palm vein and any other body parts' image or scan that uniquely identifies a person. User may use gestures of same or different types as part of the credential. Examples of characters are alphabets in any language, numbers and special characters like @, #, $, ˜, ! and any other available for input. Examples of Symbols and Picture are emoticons, emoji's, image, photo or drawing. Characters can be plain or formatted using formatting options of color, shading, font styles—bold, italic, underline, strikeout, superscript, subscript, font name, font size and other available formatting options.
    Type: Application
    Filed: July 9, 2018
    Publication date: January 9, 2020
    Inventors: DHAVALKUMAR SHAH, NEHAL MEHTA
  • Publication number: 20200012772
    Abstract: Described herein are systems and methods that may identify a personal and their activities in a facility where the access is limited to members. Matching transaction information and readily accessible personal identifier information such as biometric and/or non-biometric information provides an identification process without requiring user to cooperate in information acquisition. A method may comprise: collecting a timestamp of a transaction of a member; collecting readily accessible personal identifier information of the member with their associated transaction information; computing one or more similarity scores based on the collected readily accessible personal identifier information and historical readily accessible personal identifier information; and determining if there is a match between transaction information and the collected readily accessible personal identifier information based on the one or more similarity scores.
    Type: Application
    Filed: July 1, 2019
    Publication date: January 9, 2020
    Applicant: TINOQ Inc.
    Inventors: Young Geun CHO, Chan Soo HWANG, Daxiao YU
  • Publication number: 20200012773
    Abstract: Provided is a system for authenticating a user based on a lock screen and a method thereof, and more particularly, to a system for authenticating a user and a method thereof, which operates a user terminal even in a locked state of the user terminal in order to perform user authentication more easily. A system for authenticating a user based on a lock screen may include a push server receiving identification information of a user who accesses an authentication request server and identification information of the authentication request server and generating a push message based on the identification information and transmitting the push message to the user terminal corresponding to the identification information of the user.
    Type: Application
    Filed: August 29, 2017
    Publication date: January 9, 2020
    Inventor: Ji Min PARK
  • Publication number: 20200012774
    Abstract: Systems, methods and apparatus for enabling access to secure data. A first module is arranged to generate a limited use passcode and make the passcode available to a user. A second module and a third module are arranged to communicate whereby to enable detection of the third module being in proximity to the second module. A fourth module is arranged to receive a passcode via user input. The apparatus is arranged to enable access to secure data in dependence on the fourth module receiving a valid passcode generated by the first module and the third module being in proximity to the second module.
    Type: Application
    Filed: September 19, 2019
    Publication date: January 9, 2020
    Inventor: Boris Taratine
  • Publication number: 20200012775
    Abstract: An authentication operation of a communication device is facilitated without making an outer appearance of an image forming apparatus complicated. An image forming apparatus 1 includes an image reading portion 41 for reading an original image, an image forming portion 44 for forming the image on a recording material, communication devices 32 and 33 capable of communication with a storing device 52 for storing information through rear-range wireless communication, and a mounting portion 23 to which the communication devices are mounted, and the mounting portion is provided between the image reading portion and the image forming portion.
    Type: Application
    Filed: September 20, 2019
    Publication date: January 9, 2020
    Inventors: Daiju Yoshino, Shigeharu Kurita
  • Publication number: 20200012776
    Abstract: Systems and methods for authenticating a user via a customized image-based challenge are disclosed. In embodiments, a computer-implemented method comprises: receiving an access request from a user requesting access to content; generating a list of items recommended for the user based on computer-based user behavior data; selecting from the list of recommended items: a first set of items and a second set of items, wherein the first set of items are associated with a characteristic and the second set of items are not associated with the characteristic; generating an image-based challenge comprising a test question to be answered by the user and a plurality of selectable images including images of each of the first set of items and images of each of the second set of items; and providing the image-based challenge to a user computer device of the user.
    Type: Application
    Filed: July 6, 2018
    Publication date: January 9, 2020
    Inventors: Lisa Seacat DELUCA, Jeremy A. GREENBERGER
  • Publication number: 20200012777
    Abstract: Systems and methods for authenticating a user to access a public terminal are described. Disclosed embodiments may include reading, using the physical credential reader, a user identifier from the physical credential device. Disclosed embodiments may also include transmitting the public terminal identifier and the user identifier to a secure server. Further, disclosed embodiments may include receiving, after completing the transmission, a unique code from the secure server. Disclose embodiments may additionally include displaying the unique code on the display device. Disclosed embodiments may include receiving, after displaying the unique code, an authentication message from the secure server. Disclosed embodiments may further include, responsive to receiving the authentication message, authorizing the user to use a terminal command at the public terminal.
    Type: Application
    Filed: July 10, 2018
    Publication date: January 9, 2020
    Inventors: Jeremy GOODSITT, Fardin ABDI TAGHI ABAD, Austin WALTERS
  • Publication number: 20200012778
    Abstract: Systems and methods for authenticating a user to access a public terminal are described. Disclosed embodiments may include reading, using the physical credential reader, a user identifier from the physical credential device. Disclosed embodiments may also include transmitting the public terminal identifier and the user identifier to a secure server. Further, disclosed embodiments may include receiving, after completing the transmission, a unique code from the secure server. Disclose embodiments may additionally include displaying the unique code on the display device. Disclosed embodiments may include receiving, after displaying the unique code, an authentication message from the secure server. Disclosed embodiments may further include, responsive to receiving the authentication message, authorizing the user to use a terminal command at the public terminal.
    Type: Application
    Filed: May 1, 2019
    Publication date: January 9, 2020
    Applicant: CAPITAL ONE SERVICES, LLC
    Inventors: Jeremy GOODSITT, Fardin ABDI TAGHI ABAD, Austin WALTERS
  • Publication number: 20200012779
    Abstract: A system and method for tracking and authenticating software code transition during various phases of software development and deployment in a DevOps platform is provided. The present invention provides for creating, modifying and deleting one or more code authentication elements including respective policies within a distributed ledger. The code authentication elements are mapped with one or more event types in respective one or more tools of a DevOps platform. Information associated with occurrence of an event in one or more tools of the DevOps platform are retrieved. The retrieved event information is parsed to extract event type and a code authentication element is invoked based on the identified event type. The invoked code authentication element authenticates software code transition to appropriate tool of DevOps platform based on one more defined policies. A result representative of authentication success or failure is stored in the distributed ledger for tracking and auditing.
    Type: Application
    Filed: August 28, 2018
    Publication date: January 9, 2020
    Inventors: Rajkumar Chandrasekaran, Karthikeyan Vedagiri
  • Publication number: 20200012780
    Abstract: One embodiment provides a method, including: receiving at least two challenge test mechanisms of different challenge test modalities, wherein a challenge test mechanism comprises a challenge portion of a challenge-response test for distinguishing between a human operator and a computer; receiving challenge test operators for combining the at least two challenge test mechanisms; generating a composite challenge task by combining the at least two challenge test mechanisms using the identified challenge test operators; identifying any errors in the composite challenge task by running the composite challenge task; evaluating the composite challenge task to determine (i) a challenge difficulty for a human operator and (ii) a challenge difficulty for a computer; and implementing the composite challenge task if (i) no errors are identified at the composite challenge task analyzer, (ii) the challenge difficulty for a human operator is below a predetermined threshold, and (iii) the challenge difficulty for a computer
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Padmanabha Venkatagiri Seshadri, Vijay Ekambaram, Arvind Kumar, Bidhu Ranjan Sahoo
  • Publication number: 20200012781
    Abstract: Techniques for rendering an object using multiple versions of an application in a single process for dynamic malware analysis are disclosed. In some embodiments, a system, process, and/or computer program product for rendering an object using multiple versions of an application in a single process for dynamic malware analysis includes receiving a sample at a cloud security service, in which the sample includes an embedded object; detonating the sample using a browser executed in an instrumented virtual machine environment; and rendering the embedded object using a plurality of versions of an application in a single process during a dynamic malware analysis using the instrumented virtual machine environment.
    Type: Application
    Filed: September 17, 2019
    Publication date: January 9, 2020
    Inventors: Jiangxia Liu, Bo Qu, Tao Yan, Zhanglin He
  • Publication number: 20200012782
    Abstract: A method is provided for shuffling an order of a plurality of data blocks. In the method, a random number is generated, the random number corresponding to an index for a data block of the plurality of data blocks, where each data block of the plurality of data blocks has an index that uniquely identifies each data block of the plurality of data blocks. The increment function with a parameter is applied to the random number to generate a new index, the new index corresponds to a data block of the plurality of data blocks. The data block corresponding to the new index is selected as the next data block of a reordering of the plurality of data blocks. The method is iterated until the reordering of the plurality of data blocks is complete.
    Type: Application
    Filed: July 5, 2018
    Publication date: January 9, 2020
    Inventors: MIROSLAV KNEZEVIC, NIKITA VESHCHIKOV
  • Publication number: 20200012783
    Abstract: A computing device can include a comparator coupled to an I/O pin of the computing device; a storage unit coupled to the comparator; and a counter coupled to receive an output of the comparator, an output of the counter being coupled to a computation engine to provide a limit-exceeded signal to the computation engine, wherein the counter comprises a volatile counter and a nonvolatile storage, wherein the nonvolatile storage stores a bit for each top volatile count number of events identified by the volatile counter. The computing device can further include a backup power source coupled to the volatile counter; and readout circuitry and control logic coupled to the volatile counter and to the nonvolatile storage, the readout circuitry and control logic being configured to control operations of the volatile counter during an error event and determine a total number of events. The computing device can be a smart card.
    Type: Application
    Filed: May 10, 2019
    Publication date: January 9, 2020
    Inventors: Carl Wayne VINEYARD, Christopher Neal HINDS, Subbayya Chowdary YANAMADALA, Asaf SHEN
  • Publication number: 20200012784
    Abstract: A global profile generation unit acquires a profile including, as an entry, information on parameter values for a combination of path parts and parameter names included in a normal HTTP request to a web server. When entries, in which the path parts are different but the parameter names are the same, are present in the acquired profile, the global profile generation unit generates a global profile in which the entries of the parameter names are aggregated in the acquired profile.
    Type: Application
    Filed: February 16, 2018
    Publication date: January 9, 2020
    Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Shingo ORIHARA, Tohru SATO, Yohsuke SHIMADA, Yang ZHONG, Yuta IWAKI
  • Publication number: 20200012785
    Abstract: Systems and methods for providing visibility in application transactions between users and an application. In some embodiments, an application security microscope is deployed at network locations to capture and analyze application transaction data and to identify API call data. The application security microscope includes an API classifier to classify captured API call data. The API classifier generates API specifications which are then used to aid in the capture and identification of API call data in the application transaction data, thereby improving the capture efficiency and accuracy of policy actions.
    Type: Application
    Filed: September 16, 2019
    Publication date: January 9, 2020
    Inventor: Robert Dykes
  • Publication number: 20200012786
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry to detect anomalous activity. One of the methods includes accessing data describing a telemetry tree that includes a plurality of nodes and edges; querying, for each of the edges in the telemetry tree using at least one value for the edge from a number of values, historical telemetry data that quantifies an anomaly score for each value to determine whether a relationship indicated by the edge in the telemetry tree represents a potentially malicious relationship; and performing an action using a result of the querying of the historical telemetry data that indicates whether one of the anomaly scores indicates that the relationship indicated by the edge in the telemetry tree represents a potentially malicious relationship.
    Type: Application
    Filed: September 18, 2019
    Publication date: January 9, 2020
    Inventor: Maxime Lamothe-Brassard