Patents Issued in April 30, 2020
  • Publication number: 20200134218
    Abstract: A computer-implemented method includes receiving a respective indication of each of two or more clouds. The two or more clouds are added to a user account. A first file is received for storage in the user account. The first file is split into a plurality of data blocks. The plurality of data blocks of the first file are distributed across the two or more clouds. An indication of a respective location of each data block of the first file is saved.
    Type: Application
    Filed: October 30, 2018
    Publication date: April 30, 2020
    Inventors: SU LIU, WU SONG FANG
  • Publication number: 20200134219
    Abstract: Methods and systems for securely sharing files with user devices based on location are described herein. A computing device may receive, from a user device, a request to share a file. The computing device may determine other user devices at the location of the user device desiring to share a file. Unique tokens and/or unique session identifiers may be generated to facilitate secure sharing of the file, and each token and/or session identifier may correspond to a different user device. The computing device may send, to each different user device, the device's corresponding token and/or session identifier. The computing device may also send, to the user device desiring to share the file, the tokens and/or session identifiers for the other user devices. The user device may securely send the file to one or more of the other user devices using the tokens and/or session identifiers.
    Type: Application
    Filed: October 30, 2018
    Publication date: April 30, 2020
    Inventors: Praveen Raja Dhanabalan, Saurabh Pant
  • Publication number: 20200134220
    Abstract: Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute service, a notification that a sensitive file comprising sensitive data has been received at a file receipt location, the sensitive file being sent by a client device; generating, by the cloud compute service, a container instance in response to the notification; retrieving, by the container instance, the sensitive file from the file receipt location; generating, by the container instance, a stripped file by stripping the sensitive data from the sensitive file based on a configuration file; transmitting, by the container instance, the stripped file to a storage location; deleting the sensitive file and associated file pointers from the file receipt location; and terminating the container instance, wherein terminating the container instance comprises deleting files comprising sensitive data and associated file pointers.
    Type: Application
    Filed: November 22, 2019
    Publication date: April 30, 2020
    Applicant: Capital One Services, LLC
    Inventors: Nathal L. FONSEKA, Ankit PANSARI
  • Publication number: 20200134221
    Abstract: A system and method for blockchain document access and distribution control includes a processor, associated memory and a network interface for data communication with a server system. An interface receives a query for access to an electronic document associated with a blockchain ledger, which query is routed to the server system via the network interface. The processor receives the identified electronic document from a storage location when access permission is granted and a corresponding update of the blockchain ledger is made.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: William SU, Jia ZHANG
  • Publication number: 20200134222
    Abstract: In response to determining that a graphical user interface displayed on the display device of a mobile device at the time a screenshot capture request is received is being generated at least in part by an enterprise application executing within a protected workspace container in the mobile device, a secure screenshot save operation is performed. The secure screenshot save operation includes i) storing, within the mobile device, a screenshot image of the graphical user interface displayed on the display device of the mobile device at the time the screenshot capture request is received, and ii) preventing the screenshot image from being accessed by any personal application executing on the mobile device outside of the protected workspace container.
    Type: Application
    Filed: October 30, 2018
    Publication date: April 30, 2020
    Inventor: James Robert Walker
  • Publication number: 20200134223
    Abstract: A system is provided for data object encryption. The system includes an encryption framework available across a plurality of runtime environments. The system is configured to receive a data object in one of the plurality of runtime environments, wherein the data object is capable of being encrypted using a content encryption key and determine an encryption module implemented in the encryption framework that is compatible with the one of the plurality of runtime environment, wherein the encryption module comprises a key service provider that provides a master key and a key wrapping algorithm for the content encryption key in the runtime environment. The system is further configured to encrypt the data object using the content encryption key, encrypt the content encryption key using the master key and key wrapping algorithm, and write the encrypted data object to networked database storage.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Lei YE, David Baiyor MURRAY, Vineet Deokaran CHAUDHARY, Xiongjian FU
  • Publication number: 20200134224
    Abstract: An apparatus is described that includes an execution unit to execute a first instruction and a second instruction. The execution unit includes input register space to store a first data structure to be replicated when executing the first instruction and to store a second data structure to be replicated when executing the second instruction. The first and second data structures are both packed data structures. Data values of the first packed data structure are twice as large as data values of the second packed data structure. The execution unit also includes replication logic circuitry to replicate the first data structure when executing the first instruction to create a first replication data structure, and, to replicate the second data structure when executing the second data instruction to create a second replication data structure.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: ELMOUSTAPHA OULD-AHMED-VALL, ROBERT VALENTINE, JESUS CORBAL, BRET L. TOLL, MARK J. CHARNEY
  • Publication number: 20200134225
    Abstract: An apparatus is described that includes an execution unit to execute a first instruction and a second instruction. The execution unit includes input register space to store a first data structure to be replicated when executing the first instruction and to store a second data structure to be replicated when executing the second instruction. The first and second data structures are both packed data structures. Data values of the first packed data structure are twice as large as data values of the second packed data structure. The execution unit also includes replication logic circuitry to replicate the first data structure when executing the first instruction to create a first replication data structure, and, to replicate the second data structure when executing the second data instruction to create a second replication data structure.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: ELMOUSTAPHA OULD-AHMED-VALL, ROBERT VALENTINE, JESUS CORBAL, BRET L. TOLL, MARK J. CHARNEY
  • Publication number: 20200134226
    Abstract: An apparatus is described that includes an execution unit to execute a first instruction and a second instruction. The execution unit includes input register space to store a first data structure to be replicated when executing the first instruction and to store a second data structure to be replicated when executing the second instruction. The first and second data structures are both packed data structures. Data values of the first packed data structure are twice as large as data values of the second packed data structure. The execution unit also includes replication logic circuitry to replicate the first data structure when executing the first instruction to create a first replication data structure, and, to replicate the second data structure when executing the second data instruction to create a second replication data structure.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: ELMOUSTAPHA OULD-AHMED-VALL, ROBERT VALENTINE, JESUS CORBAL, BRET L. TOLL, MARK J. CHARNEY
  • Publication number: 20200134227
    Abstract: Example implementations are described that include displaying a graphical element related to privacy risk information for an application. A processor of a computing device may determine, for the application, a privacy attention score based on first privacy risk information. The processor may determine, for the application, an aggregated privacy assessment score from a plurality of privacy risk scores that are based on second privacy risk information. The processor may cause a graphical element representing a combination of the privacy attention score and the aggregated privacy assessment score to be displayed via a display device.
    Type: Application
    Filed: December 22, 2015
    Publication date: April 30, 2020
    Inventors: Gabi Bar Joseph, Tomer Gershoni, Yaniv TOLEDANO
  • Publication number: 20200134228
    Abstract: This disclosure relates generally to consent management, and more particularly to a method and system for generating consent recommendation. The system determines a user aspect indicating consent preferences of the user, and identifies/predicts a reference privacy profile as matching the user aspect. The system uses a machine learning model to process the user aspect and to predict the matching reference privacy profile. Further, based on the matching reference privacy profile, the system generates one or more consent recommendations. The system can also be configured to obtain feedback for the generated consent recommendations and re-recommends consents based on the obtained feedback.
    Type: Application
    Filed: March 12, 2019
    Publication date: April 30, 2020
    Applicant: Tata Consultancy Services Limited
    Inventors: Rosni KOTTEKULAM VASU, Vijayanand Mahadeo BANAHATTI, Sachin Premsukh LODHA
  • Publication number: 20200134229
    Abstract: A system and method are disclosed for storing, processing and retrieving information. A data store, a data recipient and a data processing machine are provided, the data store and the data recipient both being connectable to each other and to the data processing machine via a potentially insecure communications network, and the data store being adapted to selectively provide information to the data processing machine and to the data recipient on receipt of one or more suitable instructions from the data processing machine, and the data processing machine being adapted to provide instructions to the data store based on a set of pre-determined rules, so that information is provided by the data store to the data recipient only when pre-determined conditions are met.
    Type: Application
    Filed: March 19, 2018
    Publication date: April 30, 2020
    Inventors: JULIAN RANGER, Gavin Ray, Ben Hogan, Martin O'Neal
  • Publication number: 20200134230
    Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.
    Type: Application
    Filed: December 23, 2019
    Publication date: April 30, 2020
    Applicant: Intel Corporation
    Inventors: Lawrence A. Booth, JR., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent Thomas
  • Publication number: 20200134231
    Abstract: Methods, systems and computer program products for layered masking of data are described. A system receives content including personally identifiable information (PII). The system redacts the content by masking the PII. The system identifies the PII in multi-layer processing, where in each layer, the system determines a respective confidence score indicating a probability that a token is PII. If the confidence score is sufficiently high, the system masks the token. Otherwise, the system provides the token to a next layer for processing. The layers can include regular expression based processing, lookup table based processing, and machine learning based processing.
    Type: Application
    Filed: December 23, 2019
    Publication date: April 30, 2020
    Inventors: Vunnava Praveen, Syed Abid Hussain
  • Publication number: 20200134232
    Abstract: An information processing apparatus includes a memory storing a program, a system bus, a first control unit configured to read the program via the system bus and judge whether the read program is altered, a second control unit configured to read the program judged as not being altered, from the memory via the system bus and execute the program, and a clock control unit configured to control a frequency of a clock to be supplied to a module included in the first control unit, wherein the clock control unit controls the frequency of the clock in such a manner that the frequency of the clock from a time point at which the first control unit starts reading the program to a time point at which the reading is finished is higher than the frequency of the clock after the judgement about the program.
    Type: Application
    Filed: October 24, 2019
    Publication date: April 30, 2020
    Inventor: Yoshihisa Nomura
  • Publication number: 20200134233
    Abstract: A self-powering tamper detection system architecture includes a power source, a tamper detector configured to mechanically actuate a tamper switch when a tamper event occurs, a tamper switch electrically connected to the power source and mechanically connected to the tamper detector, a tamper unlock system configured to provide a tamper unlock signal when an authorized maintenance condition exists, a tamper controller configured to produce a tamper response when the tamper event is identified, and to not produce the tamper response when the tamper unlock signal is provided, and program memory configured to store program data. The tamper response produces a disruption of the program data.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Kirk A. Lillestolen, William E. Villano
  • Publication number: 20200134234
    Abstract: A processor comprising a first register to store a wrapping key, a second register to store a pointer to a handle stored in a memory coupled to the processor, the handle comprising a cryptographic key encrypted using the wrapping key, and a core to execute a decryption instruction. The core is to, responsive to the decryption instruction, identify, in the decryption instruction, a pointer to ciphertext stored in the memory, retrieve the ciphertext and the handle from the memory, decrypt the cryptographic key of the handle based on the wrapping key, and decrypt the ciphertext based on the decrypted cryptographic key.
    Type: Application
    Filed: December 20, 2019
    Publication date: April 30, 2020
    Applicant: Intel Corporation
    Inventors: Michael LeMay, David M. Durham, Jason W. Brandt
  • Publication number: 20200134235
    Abstract: An attack resilient distributed proactive polymorphic hardware, the including: at least one polymorphic core including at least one polymorphic logic, the at least one polymorphic logic adapted to adjust an implementation of a proactive polymorphic model without changing the contextual functionality of the proactive polymorphic model; a framework list defining at least one policy to be executed by the proactive polymorphic model; and a graph designating a historical description of each of the at least one policy executed by the proactive polymorphic model.
    Type: Application
    Filed: October 31, 2019
    Publication date: April 30, 2020
    Applicant: KameleonSec Ltd.
    Inventors: Efi SASSON, Jorge MYSZNE, Ronen TANNE
  • Publication number: 20200134236
    Abstract: A method for an audiovisual receiver to request an audiovisual transmitter to reset a communication link includes requesting the reset when the audiovisual receiver determines that the communication link is unlocked. The communication is determined to be unlocked when the active geometry of successive audiovisual frames transmitted from the transmitter to the receiver is determined by the receiver to be inconsistent. The communication is also determined to be unlocked when the interval between control bits of the successive audiovisual frames is inconsistent. When one or both of the inconsistencies is determined, the receiver sets an error bit in a register of the receiver that is accessible by the transmitter to determine from the receiver that the communication link is unlocked.
    Type: Application
    Filed: December 27, 2019
    Publication date: April 30, 2020
    Applicant: Intel Corporation
    Inventors: Boon Hong Oh, Yeong Liang Low, Laila Ahmed Saad Ahmed Ahmed
  • Publication number: 20200134237
    Abstract: Systems and methods for an interface device that is configured to locally generated encrypted data and also receive encrypted data from a host computer, locally decrypt the data, and present the decrypted data independently from the host computer.
    Type: Application
    Filed: October 30, 2019
    Publication date: April 30, 2020
    Inventor: Jason Allen Rexilius
  • Publication number: 20200134238
    Abstract: The method, computer program product and computer system may include computing device which may detect a first user within a defined area of a display device and the first user may have a first security level. The computing device may display data on the display device and the data may be associated with a security parameter defining a security level for viewing the data. The computing device may detect a second user within the defined area of the display device and the second user may have a second security level. The computing device may determine that the second security level of the second user does not meet the security parameter for viewing the data and redact the data in response to determining that the second user does not meet the security parameter for viewing the data.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Vijaya Balakrishna, Ambal Balakrishnan, Brian Clarke, Andrew R. Jones, Linda Zimmer
  • Publication number: 20200134239
    Abstract: A display unit is present in a space different from an input and output screen displayed in a three-dimensional space, and a control unit displays the input and output screen as an optical image formation of light progressing in a direction of a user so that no one other than the user is able to photograph the input and output screen.
    Type: Application
    Filed: June 28, 2019
    Publication date: April 30, 2020
    Applicant: Hitachi-Omron Terminal Solutions, Corp.
    Inventors: Hideto INAGAKI, Noriaki FUJIMURA
  • Publication number: 20200134240
    Abstract: The method, computer program product and computer system may include computing device which may detect a first user within a defined area of a display device and the first user may have a first security level. The computing device may display data on the display device and the data may be associated with a security parameter defining a security level for viewing the data. The computing device may detect a second user within the defined area of the display device and the second user may have a second security level. The computing device may determine that the second security level of the second user does not meet the security parameter for viewing the data and redact the data in response to determining that the second user does not meet the security parameter for viewing the data.
    Type: Application
    Filed: July 17, 2019
    Publication date: April 30, 2020
    Inventors: Vijaya Balakrishna, Ambal Balakrishnan, Brian Clarke, Andrew R. Jones, Linda Zimmer
  • Publication number: 20200134241
    Abstract: A self-powering tamper detection system architecture includes a power source, a tamper detector configured to identify a tamper event, a tamper switch electrically connected to the power source and mechanically connected to the tamper detector, a tamper controller configured to produce a tamper response when the tamper event is identified, and program memory configured to store program data. The tamper detector is configured to mechanically actuate the tamper switch when a tamper event occurs, and the tamper response provides a disruption of the program data. The tamper detector and the tamper switch can include printed circuit board and embedded transformer, whereby the embedded transformer includes an axially-moveable ferromagnetic core.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Kirk A. Lillestolen, William E. Villano, David J. Manna
  • Publication number: 20200134242
    Abstract: A multifunctional printer (MFP) which has a first transceiver circuit which is configured to receive wireless broadcast signals from a second transceiver circuit, where the wireless broadcast signal identifies the second transceiver, where the first transceiver circuit is powered by the MFP, and where the first transceiver circuit is configured to determine a first distance that the second transceiver circuit is away from the first transceiver circuit.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Eric Pugh, Duc Phu Truong
  • Publication number: 20200134243
    Abstract: Disclosed systems and methods relate to generating and optimizing an architectural design. According to embodiments, a method can include receiving metadata of digital communications and collaboration between members of an organization. The method can also include generating a target network model indicating a work style of the members of the organization; a level of interaction between the members of the organization; a spatial clustering of the members; or a number, a size, and an allocation of rooms with a specialized purpose. The method can further include selecting at least one criterion for the architectural design, where the criterion can include: cost, wellness, community, work style, choice, privacy, or vibrancy. The method can further include determining criteria scores for one or more architectural design prototypes. Moreover, the method can include selecting the architectural design based on the criterion scores.
    Type: Application
    Filed: October 31, 2019
    Publication date: April 30, 2020
    Inventors: Guy VARDI, Danil NAGY, Daniel GOLDSTERN
  • Publication number: 20200134244
    Abstract: A platform for design of a lighting installation generally includes an automated search engine for retrieving and storing a plurality of lighting objects in a lighting object library and a lighting design environment providing a visual representation of a lighting space containing lighting space objects and lighting objects. The visual representation is based on properties of the lighting space objects and lighting objects obtained from the lighting object library. A plurality of aesthetic filters is configured to permit a designer in a design environment to adjust parameters of the plurality of lighting objects handled in the design environment to provide a desired collective lighting effect using the plurality of lighting objects.
    Type: Application
    Filed: December 3, 2019
    Publication date: April 30, 2020
    Inventors: Benjamin James Harrison, Shruti Koparkar, Mark Reynoso, Paul Pickard, Raghuram L.V. Petluri, Gary Vick, Andrew Villegas
  • Publication number: 20200134245
    Abstract: The disclosure notably relates to a method for designing a 3D modeled object that represents a mechanical part. The method includes obtaining, at a CAD system, a B-Rep skin which represents the mechanical part. The B-rep skin has a B-rep portion which includes a boundary face. The method also includes defining, by graphical user-interaction with the CAD system, a surface, and constructing, automatically by the CAD system, a B-rep replacement. The method further includes replacing, in the B-Rep skin, the B-rep portion by the B-rep replacement. This offers a “replace face” functionality when designing a B-Rep skin.
    Type: Application
    Filed: October 28, 2019
    Publication date: April 30, 2020
    Applicant: DASSAULT SYSTEMES
    Inventor: Vincent BOUVIER
  • Publication number: 20200134246
    Abstract: A GROMACS cloud computing process control method includes the following steps. Step (1): acquire crystal structures having energy ranked at the top by cluster ranking, and then obtain a GROMACS structural file. Step (2): acquire optimal force field parameters, and then automatically convert the optical force field parameters into a GROMACS force field parameter file. Step (3): import the yoda library function to automatically generate a corresponding GROMACS simulation parameter file according to simulation types in different stages. Step (4): import a mixc library function to submit GROMACS computation and analysis tasks to a task scheduling platform called Majorana. Step (5): add a corresponding monitor task for the same batch of tasks for each structure, and acquire the execution status of the tasks in real time. Step (6): acquire corresponding analysis results from ArangoDB after all the tasks are executed, and directly plot corresponding curves in Jupyter.
    Type: Application
    Filed: May 10, 2018
    Publication date: April 30, 2020
    Applicant: SHENZHEN JINGTAI TECHNOLOGY CO., LTD.
    Inventors: Guangxu SUN, Chunwang PENG, Mingjun YANG, Hui XIAO, Yang LIU, Jian MA, Lipeng LAI, Shuhao WEN
  • Publication number: 20200134247
    Abstract: A system simulates a process entity. Software instructions stored on a memory device and executable by a processor create a plurality of entity type objects that generically represents a type of process entity. Instructions store the plurality of entity type objects in a shared repository. Additionally, instructions enable a plurality of users to access the plurality of entity type objects in the shared repository simultaneously.
    Type: Application
    Filed: December 31, 2019
    Publication date: April 30, 2020
    Inventors: Ian H. Boys, Douglas Paul Kane, David H. Jerome, Cal Depew
  • Publication number: 20200134248
    Abstract: Methods for debugging a processor based on executing a randomly created and randomly executed executable on a fabricated processor. The executable may execute via startup firmware. By implementing randomization at multiple levels in the testing of the processor, coupled with highly specific test generation constraint rules, highly focused tests on a micro-architectural feature are implemented while at the same time applying a high degree of random permutation in the way it stresses that specific feature. This allows for the detection and diagnosis of errors and bugs in the processor that elude traditional testing methods. The processor Once the errors and bugs are detected and diagnosed, the processor can then be redesigned to no longer produce the anomalies. By eliminating the errors and bugs in the processor, a processor with improved computational efficiency and reliability can be fabricated.
    Type: Application
    Filed: December 20, 2019
    Publication date: April 30, 2020
    Applicant: Advanced Micro Devices, Inc.
    Inventor: Eric W. Schieve
  • Publication number: 20200134249
    Abstract: A true random metastable flip-flop (TRMFF) compiler generates an electrical architecture for a TRMFF chain. The compiler selects components for the TRMFF chain from a library of standard cells and logically connects these components in accordance with a primitive polynomial to generate the electrical architecture. The TRMFF chain provides a sequence of random numbers from one or more physical processes in accordance with the primitive polynomial. During operation, one or more microscopic phenomena inside and/or outside of the TRMFF chain can cause one or more low-level, statistically random entropy noise signals to be present within the TRMFF chain. The TRMFF chain advantageously utilizes the one or more low-level, statistically random entropy noise signals to provide the sequence of random numbers.
    Type: Application
    Filed: December 26, 2019
    Publication date: April 30, 2020
    Applicant: Taiwan Semiconductor Manufacturing Co., Ltd.
    Inventors: Charlie ZHOU, Tze-Chiang HUANG, Jack LIU
  • Publication number: 20200134250
    Abstract: A semiconductor device includes a first active fin on a substrate; a second active fin on the substrate and separate from the first active fin; and a first fin stub on the substrate, wherein the first fin stub connects a first end of the first active fin and a first end of the second active fin, wherein the fin stub is lower than both the first and the second active fins in height, wherein from a top view the first active fin is oriented lengthwise in a first direction, and the first fin stub is oriented lengthwise in a second direction that is different from the first direction.
    Type: Application
    Filed: December 23, 2019
    Publication date: April 30, 2020
    Inventors: Chung-Ming Wang, Chih-Hsiung Peng, Chi-Kang Chang, Kuei-Shun Chen, Shih-Chi Fu
  • Publication number: 20200134251
    Abstract: A method for reducing chemo-epitaxy directed-self assembly (DSA) defects of a layout of a guiding pattern, the method comprising expanding a shape of the guiding pattern by a predetermined distance in both lateral directions to form a fin keep mask, where the fin keep mask comprises a stand-alone mask
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: Michael A. Guillorn, Kafai Lai, Chi-Chun Liu, Ananthan Raghunathan, Hsinyu Tsai
  • Publication number: 20200134252
    Abstract: Computer architecture including an add-in for linking document creation application with a cloud-based structured database management system and for and integrating a social network media feeds. Integrating social network media feeds and calibration tools into a word processing application linked with a contract creation and contract lifecycle management application. Integrating social network media feeds and calibration tools of a social network that runs on the same platform as the structured database management system and that shares log-in credentials with the structured database management system. The integrated social network media feeds include media feeds related to information feeds corresponding to a portion of a document open in said document creation application.
    Type: Application
    Filed: October 3, 2019
    Publication date: April 30, 2020
    Inventors: Kirk Krappe, Neehar Giri
  • Publication number: 20200134253
    Abstract: The present invention provides solutions to the potential undesirable effects the insertion and removal of information elements and documents may have on axes of elements using a collation function and collation units and further allows for displaying the elements with a first layout until the number of elements to be displayed in the collation unit exceeds a maximum number of elements displayable with the first layout, the elements displayed in the collation unit being displayed with a second layout when the number of elements to be displayed in the collation unit exceeds the number of elements displayable with the first layout. The invention can be effectuated as a method, a device and an apparatus carrying out the method described herein.
    Type: Application
    Filed: December 22, 2019
    Publication date: April 30, 2020
    Inventors: Mathieu Audet, Francois Cassistat
  • Publication number: 20200134254
    Abstract: A method compares text strings having Unicode encoding. The method receives a first string S=s1s2 . . . sn and a second string T=t1t2 . . . tm, where s1, s2, . . . , sn and t1, t2, . . . , tm are Unicode characters. The method computes a first string weight for the first string S according to a weight function ƒ. When S consists of ASCII characters, ƒ(S)=S. When S consists of ASCII characters and some accented ASCII characters that are replaceable by ASCII characters, ƒ(S)=g(s1)g(s2) . . . g(sn), where g(si)=si when si is an ASCII character and g(si)=s?i when si is an accented ASCII character that is replaceable by the corresponding ASCII character s?i. The method also computes a second string weight for the second text string T. Equality of the strings is tested using the string weights.
    Type: Application
    Filed: December 24, 2019
    Publication date: April 30, 2020
    Inventors: Thomas Neumann, Viktor Leis, Alfons Kemper
  • Publication number: 20200134255
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for dynamic document annotations. In some implementations, a keyword is identified in a first view of a document, the first view being provided on a user interface. An annotation for the keyword is provided for display at a first location with the first view provided on the user interface. An adjustment to the first view is detected that causes a second view of the document on the user interface, where a position of the keyword in the second view is different from a position of the keyword in the first view. In response to detecting the adjustment to the first view, the annotation is hidden from the user interface, and, after hiding the annotation, the annotation for the keyword is provided for display at a second location with the second view of the document.
    Type: Application
    Filed: December 20, 2019
    Publication date: April 30, 2020
    Inventors: Jose Nocedal, Jiande Yu, Raul de Leon, Hunter Edward Harris
  • Publication number: 20200134256
    Abstract: A method of processing an interactive document is enclosed.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: Daniel J. Kloiber, Davis L. Marksbury, Christopher J. Heinz, Robert C. Guekenberger, Ronald L. Heiney, Kenneth E. Gibbs
  • Publication number: 20200134257
    Abstract: Examples of the disclosure provide for modifying an application from a mobile device. An instruction to modify an application including one or more documents is received at the mobile device. It is determined at the mobile device whether the received instruction is associated with a first type of modification and/or a second type of modification. In response to determining that the received instruction is associated with the first type of modification, a local instance of the document stored at the mobile device is modified at the mobile device. In response to determining that the received instruction is associated with the second type of modification, a remote instance of the document stored at a server device is modified at the server device. Aspects of the disclosure enable a mobile device to strategically modify an application to facilitate managing local resources.
    Type: Application
    Filed: December 26, 2019
    Publication date: April 30, 2020
    Inventors: Barath BALASUBRAMANIAN, Evan COHEN, Olivier COLLE, Irina KOULINITCH, Shrey SANGAL
  • Publication number: 20200134258
    Abstract: This disclosure generally covers systems and methods that, in some embodiments, provide an electronic survey template for creating a user customizable electronic survey including authentication features. Those authentication features include, in some embodiments, authenticating questions with elements that capture a digitally drawn signature, digital image, fingerprint, or voiceprint. Certain embodiments of the disclosed systems and methods provide a graphical user interface comprising an electronic survey template with a menu of survey question types, including an option to create authenticating questions within the electronic survey template. Some embodiments of the disclosed systems and methods also provide functions and features that allow users to preview a customized electronic survey template as an interactive electronic survey or to preview individual electronic survey questions as interactive electronic survey questions.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: Milind Kopikare, Larry Dean Cheesman, Daryl R. Pinkal, Cameron James Holiman
  • Publication number: 20200134259
    Abstract: A dimensionality analysis method, system, and computer program product, include conducting a search that determines which valid expressions in a data set satisfies a defined free-form grammar that describes the data set.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: Oki Gunawan, Lior Horesh, Giacomo Nannicini, Wang Zhou
  • Publication number: 20200134260
    Abstract: A system and method for implementing a proficiency-driven feedback and improvement platform is disclosed. A particular embodiment includes: establishing a data connection with a learner; generating a distribution of questions to determine the learner's level of proficiency on a topic, the topic being composed of a set of codes and counter-codes; determining the learner proficient on the topic after the learner has demonstrated proficiency on each code and counter-code within the topic; and distributing questions to the learner on codes and counter-codes within the topic until the learner has demonstrated proficiency on each code and counter-code within the topic. A particular embodiment further includes: providing the learner feedback on work according to a set of criteria; and ensuring that only users who have first demonstrated proficiency on one or more criteria in the set of criteria can give feedback on those criteria.
    Type: Application
    Filed: December 31, 2019
    Publication date: April 30, 2020
    Inventors: Jeff Scheur, Jocelyn Karlan, Joshua Leven
  • Publication number: 20200134261
    Abstract: At least two processing device-implemented company name recognition components, operating upon a body of text in a document, identify at least one company name occurrence in the body of text based at least in part on a company identifier list. The company name recognition techniques implemented by each of the at least two company name recognition components are different from each other. The at least one company name occurrence is used to update the company identifier list. The updated company identifier list is then used by the at least two company name recognition components to identify at least one additional name occurrence in the same body of text. This process of repeatedly identifying occurrences of company names in the body of text and updating the company identifier list is performed until such time that no further company name occurrences are identified in the body of text.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: David A. COOK, Andrzej H. JACHOWICZ, Phillip Karl JONES
  • Publication number: 20200134262
    Abstract: A word vector processing method is provided. Word segmentation is performed on a corpus to obtain words, and n-gram strokes corresponding to the words are determined. Each n-gram stroke represents n successive strokes of a corresponding word. Word vectors of the words and stroke vectors of the n-gram strokes are initialized corresponding to the words. After performing the word segmentation, the n-gram strokes are determined, and the word vectors and stroke vectors are determined, training the word vectors and the stroke vectors.
    Type: Application
    Filed: September 30, 2019
    Publication date: April 30, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Shaosheng Cao, Xiaolong Li
  • Publication number: 20200134263
    Abstract: A question answering device includes: a general word vector converter converting a question and an answer to semantic vectors in accordance with general context; a general sentence level CNN 214, in response to similarities of semantic vectors between words in question and answer and to strength of causality between the words, for weighting each semantic vector to calculate sentence level representations of the question and the answer; a general passage level CNN 218, in response to similarity between sentence level representations of question and answer, and to strength of relation of vectors in the sentence level representations viewed from causality, for weighting the sentence level representation to calculate a passage level representation for the question and answer passage; and a classifier determining whether or not an answer is a correct answer, based on the similarities between outputs from CNNs 214 and 218.
    Type: Application
    Filed: June 14, 2018
    Publication date: April 30, 2020
    Inventors: Jonghoon OH, Kentaro TORISAWA, Canasai KRUENGKRAI, Ryu IIDA, Julien KLOETZER
  • Publication number: 20200134264
    Abstract: A mechanism is provided updating a knowledge base of a sentiment analysis system, the knowledge base being operable for storing natural language terms and a score value related to each natural language term, the score value characterizing the sentiment of the natural language term. Messages comprising natural language are received. Using content of the knowledge base, a decision is made as to whether at least one message of the received messages has a positive sentiment or a negative sentiment. A term is extracted from the message that is not present in the knowledge base. Based on a frequency of occurrence of the term in the received messages and the sentiment of the messages in which the term occurs, a score value of the term is calculated, and the term and the calculated score value are stored into the knowledge base.
    Type: Application
    Filed: November 19, 2019
    Publication date: April 30, 2020
    Inventors: Michele Crudele, Antonio Perrone
  • Publication number: 20200134265
    Abstract: An ontology management method includes receiving, by a machine-to-machine (M2M) platform, an ontology mapping request sent by a first application entity, where the ontology mapping request carries a first ontology identifier, a second ontology identifier, and mapping method description information, determining, by the M2M platform, a first ontology and a second ontology based on the first ontology identifier and the second ontology identifier, determining, by the M2M platform, a mapping manner based on the mapping method description information, and creating mapping between the first ontology and the second ontology according to the determined mapping manner, and storing, by the M2M platform, the mapping between the first ontology and the second ontology in an ontology mapping resource, and returning an identifier of the ontology mapping resource to the first application entity.
    Type: Application
    Filed: December 27, 2019
    Publication date: April 30, 2020
    Inventors: Feng Zhang, Yongjing Zhang
  • Publication number: 20200134266
    Abstract: Various implementations provide context-based action recommendations based on an incoming communication. To provide the context-based action recommendation, a computing device collects information associated with a user that can be used to generate context information. Upon receiving an incoming communication, the computing device identifies various characteristics associated with the incoming communication. In turn, the computing device analyzes the context information, using the identified characteristics, to identify context information relevant to the incoming communication. Some implementations generate an action recommendation based on the identified context information, and notify the user of the action recommendation. In one or more implementations, when an audio control mode is enabled, the computing device the user of the action recommendation using an audible notification.
    Type: Application
    Filed: December 31, 2019
    Publication date: April 30, 2020
    Applicant: Motorola Mobility LLC
    Inventor: Amit Kumar Agrawal
  • Publication number: 20200134267
    Abstract: A method, computer program product, and a system where a processor(s), monitors multilingual switches performed on a client on behalf of a given user. Based on the monitoring, the processor(s) identifies switch patterns of the given user to generate a service profile for the user of machine learned multilingual switch patterns for the given user. The processor(s) determines a priority order for languages comprising the voice input streams, for the given user. The processor(s) obtains a new translation request initiated by the client, on behalf of the given user and applies the priority order to identify one or more languages spoken in a voice input stream of the new translation request. The processor(s) transmits indicators of the identified one or more languages to the client, where upon receiving the indicators, the client translates the voice input stream from the identified one or more languages to one or more target languages.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: Su Liu, Inseok Hwang, Eric Rozner, Chungkuk Yoo