Patents Issued in February 1, 2024
-
Publication number: 20240037248Abstract: In some implementations, a device may register a first set of monitoring sensors associated with monitoring an entity. The device may receive, from the first set of monitoring sensors, and based on registering the first set of monitoring sensors, a set of sensor measurements of the entity during a monitoring period. The device may generate a prediction for an event associated with the entity. The device may transmit a first set of alerts associated with the event. The device may receive a set of tracking updates based on transmitting the set of alerts associated with the event. The device may register a set of attributes in a distributed ledger based on receiving the set of tracking updates. The device may transmit a second set of alerts associated with the distributed ledger based on registering the set of attributes in the distributed ledger.Type: ApplicationFiled: July 27, 2023Publication date: February 1, 2024Inventor: Gnana Geetha GANDHI
-
Publication number: 20240037249Abstract: Techniques, for secure processing of encrypted data on public resources, include receiving first data, indicating a sequence of reversible Boolean function control (BFC) gates, including a first segment for decrypting, a second segment for operating on the decrypted data, and a third segment for encrypting the resulting data. Second data indicates generic BFC gate rules for replacing a first sequence of two gates operating on an input N-bit word with a second sequence of one or more gates that produce the same output N-bit word. The second data is used to propagate: a gate from the first segment a distance into the second segment or beyond; and, a gate from the third segment a distance into the second segment or before. This produces an obfuscated sequence of reversible gates. Obfuscated instructions based on the obfuscated sequence of gates are sent to the public resources.Type: ApplicationFiled: July 23, 2021Publication date: February 1, 2024Inventors: Claudio CHAMON, Jonathan JAKES-SCHAUER
-
Publication number: 20240037250Abstract: Aspects of the disclosure relate to using machine-learning models to determine graduated levels of access to secured data for remote devices. In some embodiments, a computing platform may establish a connection with a mobile device. Subsequently, based on establishing the connection, the platform may identify initial device information, device features, and user information. The platform may input the identified information into an authentication model to compute a baseline authentication score and then may identify an initial level of access to secured resources for the mobile device. Thereafter, the platform may receive from the mobile device, AR/VR device information captured by the mobile device. The platform may input the AR/VR device information into the authentication model to compute an augmented authentication score. Based on the augmented score, the platform may identify an augmented level of access to secured resources for the mobile device.Type: ApplicationFiled: October 5, 2023Publication date: February 1, 2024Inventors: George Anthony Albero, Maharaj Mukherjee, Deborah Mayers, Jinna Kim
-
Publication number: 20240037251Abstract: A content management system for collecting files from one or more authenticated submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions.Type: ApplicationFiled: October 9, 2023Publication date: February 1, 2024Inventors: Mindy Zhang, Pranav Piyush
-
Publication number: 20240037252Abstract: This specification provides example computer-implemented methods and apparatuses for jointly updating a service model based on privacy protection. In an example iteration process, a serving party provides, to each data party, global model parameters and a mapping relationship between the data party and N parameter groups obtained by dividing the global model parameters. Each data party updates a local service model by using the global model parameters, and further updates an updated local service model based on local service data, to upload model parameters in a new service model in a parameter group corresponding to the data party to the serving party. Then, the serving party successively fuses received parameter groups to update the global model parameters.Type: ApplicationFiled: October 12, 2023Publication date: February 1, 2024Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Longfei Zheng, Chaochao Chen, Li Wang, Benyu Zhang
-
Publication number: 20240037253Abstract: A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.Type: ApplicationFiled: March 7, 2023Publication date: February 1, 2024Inventor: Omar Nathaniel Ely
-
Publication number: 20240037254Abstract: In one embodiment, a device may extract, from one or more bodies of text, a data usage restriction for a particular type of data. The device may send, to a user interface, the data usage restriction extracted from the one or more bodies of text for presentation for a user. The device may receive, via the user interface, feedback from the user regarding the data usage restriction. The device may generate a data compliance constraint that controls how an application service handles the particular type of data, based on the data usage restriction and the feedback from the user.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Marcelo Yannuzzi, Arash Salarian, Herve Muyal, Jean Andrei Diaconu, Jelena Kljujic, Carlos Goncalves Pereira
-
Publication number: 20240037255Abstract: A method includes: accessing a corpus of messages previously sent from a user account; correlating sequences of words, in the corpus of messages, with behavior signals; aggregating the behavior signals into a behavioral model representing combinations of behavior signals characteristic of behavior in messages sent from the user account; later, accessing a message outbound from the user account to a recipient account, the message including a document associated with a document tag; correlating sequences of words, in the message, with behavior signals; retrieving a data access policy including a threshold at which access to a document associated with the document tag is restricted; and in response to detecting a difference between the behavioral signals from the message and the behavioral model exceeding the threshold, restricting access, by the recipient account, to the document in the message.Type: ApplicationFiled: August 10, 2023Publication date: February 1, 2024Inventors: Arjun Sambamoorthy, Prashanth Arun, Dhananjay Sampath, Sanjay Singh, Salil Kanetkar
-
Publication number: 20240037256Abstract: An electronic device receives, from a user, a restriction that restricts how sound of a digital asset plays to non-owners of the digital asset that is tokenized as a non-fungible token (NFT). One or more electronic devices tokenize the digital asset as the NFT on a blockchain that stores the restriction how the sound of the digital asset plays to the non-owners of the NFT.Type: ApplicationFiled: October 11, 2023Publication date: February 1, 2024Inventor: Philip Scott Lyren
-
Publication number: 20240037257Abstract: The semiconductor device includes a control unit having redundant processors, a memory storing target data, a secure memory storing a key used for encryption or decryption processing, an cryptographic unit, a secure processor instructing cryptographic processing to the cryptographic unit in response to a request from the control unit, a first bus coupled to the control unit, the memory, the cryptographic unit, and the secure processor, and a second bus coupled to the secure memory, the cryptographic unit, and the secure processor. The control unit communicates with the memory via a predetermined error detection mechanism, the cryptographic unit includes a plurality of cryptographic processors that independently perform cryptographic processing on target data using a key based on an instruction, and each of the plurality of cryptographic processors includes a data transfer unit that performs data transfer with the memory via the error detection mechanism.Type: ApplicationFiled: October 9, 2023Publication date: February 1, 2024Inventors: Kenichi ITO, Akihiro YAMATE, Akira HOSOTANI
-
Publication number: 20240037258Abstract: A transmission device of the disclosure includes a first selector configured to select one of a first signal and a second signal, and output the selected signal; a second selector configured to select one of an inversion signal of the first signal, the second signal, and an inversion signal of the second signal, and output the selected signal; a first control signal generator configured to generate a first control signal, a second control signal, and a third control signal, based on the first signal, the second signal, and a third signal; a first driver configured to set a voltage of a first output terminal, based on an output signal of the first selector and the first control signal; and a second driver configured to set a voltage of a second output terminal, based on an output signal of the second selector and the second control signal.Type: ApplicationFiled: August 24, 2021Publication date: February 1, 2024Applicant: SONY GROUP CORPORATIONInventor: Takanori Saeki
-
Publication number: 20240037259Abstract: An example method for monitoring volume dependencies for security threats comprises: detecting a request to perform an operation with respect to a volume included in a plurality of volumes included in a storage system; determining, based on a dependency mapping that specifies dependencies between the plurality of volumes, that performance of the operation would affect a dependency between the volume and one or more other volumes included in the plurality of volumes; and determining, based on the determining that the performance of the operation would affect the dependency between the volume and the one or more other volumes, that the request is possibly associated with a security threat against data stored by the storage system.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Luis Pablo Pabón, Kshithij Iyer, Chun-Yi Su, Vijayan Satyamoorthy Srinivasa
-
Publication number: 20240037260Abstract: A quantum computing system receives, from a requestor, a first access request that identifies a subject, an action, and a resource. A mapping structure that identifies a plurality of qubits that are in superposition and encoded with a plurality of rules that govern access to the resource is accessed. Based on the mapping structure it is determined that a set of qubits of the plurality of qubits applies to the access request. Data encoded in the set of qubits or a reference to each qubit in the set of qubits is provided to the requestor.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Leigh Griffin, Stephen Coady
-
Publication number: 20240037261Abstract: A communication device may include: a database storing, for each of a plurality of OIDs of MIB, a value in association with the OID; and a controller configured to execute access to a value in the database according to an access request, wherein in a case where the access request includes a first OID and the user of a terminal device is not authenticated as a specific user, the controller executes access to the first value, and in a case where the access request includes a second OID and the user of the terminal device is not authenticated as the specific user, the access to the second value is not executed.Type: ApplicationFiled: July 20, 2023Publication date: February 1, 2024Inventors: Munehisa MATSUDA, Koki IZUMI, Satoshi MATSUSHITA, Satoru YANAGI, Kiyotaka OHARA, Katsunori ENOMOTO, Yuki YADA, Kyohei MORI, Hideki NOGAWA, Tetsuya OKUNO
-
Publication number: 20240037262Abstract: Provided are exemplary systems and methods for secure intelligent networked architecture, processing and execution. Exemplary embodiments include an intelligent networked architecture comprising an intelligent agent, a secure cloud of a plurality of specialized intelligent historical agents, a plurality of secure cloud based specialized insight servers configured to transform secure digital data into a scrubbed situational deployment trigger, and an intelligent operational agent configured to receive the scrubbed situational deployment trigger.Type: ApplicationFiled: September 26, 2023Publication date: February 1, 2024Inventors: Howard M. Getson, Sean Vallie, Robert Jump, Prince Modi, Derek Ainsworth, Daniel Hittler
-
Publication number: 20240037263Abstract: Embodiments of the present disclosure relate to sharing data using database roles. Database roles are generated within a database container of a provider account. Grants to a particular subset of the plurality of data objects of the database container may be assigned to each of the database roles, and each of the database roles are granted to a share object. The share object is mounted within a consumer account to generate an imported copy of each of the database roles. The imported copy of one or more of the database roles is granted to each of one or more account level roles of the consumer account. When a new object is added to a particular database role, it is immediately available for consumption by any account level roles to which the imported copy of the particular database role has been granted.Type: ApplicationFiled: October 10, 2023Publication date: February 1, 2024Inventors: Damien Carru, Pui Kei Johnston Chu, Benoit Dageville, Shreyas Narendra Desai, Subramanian Muralidhar, Bowen Zhang
-
Publication number: 20240037264Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.Type: ApplicationFiled: October 16, 2023Publication date: February 1, 2024Inventors: Lam Tran, James Baker, Lili Yang
-
Publication number: 20240037265Abstract: Based on a credential, an access level of a playback queue for a first control interface and a first subset and second subset of media items in the playback queue may be determined. Media items in the playback queue that were added via a second control interface may be included in the first subset. Media items that were added via a control interface different from the second control interface may be included in a second subset. Information may be provided which identifies the first subset of the media items in the playback queue and the second subset of the media items in the playback queue.Type: ApplicationFiled: August 14, 2023Publication date: February 1, 2024Inventors: Arthur L. Coburn, IV, Andrew J. Schulert
-
Publication number: 20240037266Abstract: Methods, systems and computer program products for content management systems. The techniques of the methods, systems and/or computer program products automatically determine activity-based content object access permissions and/or make a recommendation of activity-based content object access permissions. A machine learning model is formed from observations of user interactions over a plurality of content objects. The model is continually updated based on ongoing observation and analysis of user interaction events. When a collaborative relationship is formed between an invitor and one or more invitees, the activity-based permissions model is accessed to determine a set of access permissions to assign to the collaborative relationship. A single collaborative relationship may cover many collaboration objects. In some cases, a set of access permissions are automatically assigned to the collaborative relationship. In other cases, a set of access permissions is presented to the invitor as a recommendation.Type: ApplicationFiled: August 14, 2023Publication date: February 1, 2024Applicant: Box, Inc.Inventor: Alok Ojha
-
Publication number: 20240037267Abstract: A multi-tenant computer system authenticates access to a shared datastore by a shared service running on the multi-tenant computer system. The shared service is operable to access the shared datastore to execute requests from a plurality of multi-tenant cloud computing services. The requests include an indication of a particular tenant and a particular tenant grouping indicator. Requests are authenticated by cryptographically verifying the request and verifying that the particular tenant is associated with the particular tenant grouping indicator. In response to authenticating a request, the shared service accesses the shared datastore to execute the first request.Type: ApplicationFiled: October 6, 2023Publication date: February 1, 2024Inventors: Helen Kwong, Benjamin Busjaeger
-
Publication number: 20240037268Abstract: A computer device for managing privilege delegation to control creation of processes thereon is described. Creation of a process on a computer device is requested according to first privileges. An agent, cooperating with an operating system of the computer device, intercepts the request. The agent determines whether to create the process according to second privileges, different from the first privileges and if permitted, cause the process to be created accordingly. The agent hooks a query provided by the operating system to identify whether a control service is enabled. The agent enquires of the operating system whether to create the process according to the second privileges whereupon the hooked query is invoked. The agent confirms to the operating system that the control service is enabled, such that checks by the operating system are performed as if the operating system were enabled.Type: ApplicationFiled: October 9, 2023Publication date: February 1, 2024Inventors: John Goodridge, Georgina Shippey
-
Publication number: 20240037269Abstract: A data masking method includes: displaying one or more groups of relational data, where the relational data includes a data subject, privacy data, and a relationship that the data subject and the privacy data meet; obtaining selection of a user for target relational data in the one or more groups of relational data; and performing masking processing on the target relational data in a data source.Type: ApplicationFiled: October 13, 2023Publication date: February 1, 2024Inventors: Zhongliu Zhuo, Xinyu Wang, Quandong Li, Zhonggang Wang, Fei Qu
-
Publication number: 20240037270Abstract: A method, device and memory for providing access to remotely stored data is provided. The method includes providing an interface capable of communicating with a remote computing environment storing a plurality of data sets. The method includes receiving a request, via the interface, to access at data sets according to access parameters. The method includes applying a first set of masking parameters when the data sets are accessed via respective views. The method includes satisfying the request by granting access to the views associated with the data sets, without copying the data sets. The views enable data from the data sets to be viewed as masked according to the first set of masking parameters, and the views are masked according to a second set of masking parameters associated with the access parameters.Type: ApplicationFiled: August 15, 2022Publication date: February 1, 2024Applicant: The Toronto-Dominion BankInventors: Sherman CHUNG, Nikita ISLAMOV, Upal Sayeed HOSSAIN
-
Publication number: 20240037271Abstract: An image processing apparatus 1 includes: a detecting unit 11 that detects an iris area IA including an iris from a person image IMG1 in which at least an eye of the target person is included; an image processing unit 12 that converts the person image to a protected image IMG2 in which an iris information relating to a pattern of the iris is not obtainable by performing an image processing on at least a part of the iris area of the person image; and an adding unit 13 that adds meta data indicating that the image processing is performed on at least a part of the iris area to the protected image.Type: ApplicationFiled: July 7, 2021Publication date: February 1, 2024Applicant: NEC CORPORATIONInventor: Kosuke YOSHIMI
-
Publication number: 20240037272Abstract: Systems and methods for providing algorithm performance feedback to an algorithm developer is provided In some embodiments, an algorithm and a data set are receiving within a secure computing node. The data set is processed using the algorithm to generate an algorithm output. A raw performance model is generated by regression modeling the algorithm output. The raw performance model is then smoothed to generate a final performance model, which is then encrypted and routed to an algorithm developer for further analysis. The performance model models at least one of the algorithm's accuracy, F1 score accuracy, precision, recall, dice score, ROC (receiver operator characteristic) curve/area, log loss, Jaccard index, error, R2 or by some combination thereof. The regression modeling includes linear least squares, logistic regression, deep learning or some combination thereof.Type: ApplicationFiled: July 15, 2023Publication date: February 1, 2024Inventors: Mary Elizabeth Chalk, Robert Derward Rogers, Alan Donald Czeszynski
-
Publication number: 20240037273Abstract: Certain aspects of the present disclosure provide techniques and systems for screening chat attachments. A chat attachment screening system monitors a chat window of a first computing device associated with a first user during an interaction session between the first user and a second user. An upload of an attachment is detected based on the monitoring. Access to the attachment from a second computing device associated with the second user is blocked, in response to detecting the upload. Content from the attachment is identified and extracted. A type of the attachment is determined based on the content. A determination is made as to whether the second user is authorized to access the type of the attachment. An indication of the determination is presented on at least one of the first computing device or the second computing device during the interaction session.Type: ApplicationFiled: July 31, 2023Publication date: February 1, 2024Inventor: Sangeetha Uthamalingam SANTHARAM
-
Publication number: 20240037274Abstract: Techniques for storing health data can include a multi-node data structure. A data node, a category node, and an institution node of a multi-node data structure can be generated in accordance with a configuration file. The data node can include health data and can be identified by a first unique data identifier and encrypted using a first cryptographic key. The category node can include the first unique data identifier and the first cryptographic key. The category node can be identified by a second unique data identifier and encrypted using a second cryptographic key. The institution node can include the second unique data identifier and the second cryptographic key. The institution node can be identified by a third unique data identifier and encrypted using a third cryptographic key. The data node, the category node, and the institution node can be shared with a service provider.Type: ApplicationFiled: October 6, 2023Publication date: February 1, 2024Applicant: Apple Inc.Inventors: Pablo Antonio Gonzalez Cervantes, Mohan Singh Randhava, Jorge F. Pozas Trevino, Samuel A. Mussell, Isaac Pinol Catadau, Steven A. Myers, Dongsheng Zhang, Suhail Ahmad, Zhengjun Jiang, Yannick L. Sierra, Amir H. Jadidi
-
Publication number: 20240037275Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a privacy manager are disclosed. In one aspect, a method includes the actions of receiving, from a client device, an indication of a first setting of the client device. The actions further include receiving, from the client device, an indication of a type of data that the client device is prepared to transmit. The actions further include, based on the first setting and the type of data, generating an instruction to adjust the first setting or a second setting of the client device. The actions further include, before the client device transmits the data, providing, for output to the client device, the instruction to adjust the first setting or the second setting of the client device.Type: ApplicationFiled: October 6, 2023Publication date: February 1, 2024Inventors: Ahmad Arash Obaidi, Eric Yocam
-
Publication number: 20240037276Abstract: In some embodiments, native asset data of an asset corresponding to a cross-platform profile may be monitored, where the cross-platform profile includes a profile linked to an account, for a user, that is used across multiple assets. An incident of the user may be detected via a machine learning model based on telemetry data extracted from the native asset data, where the machine learning model is trained to detect known incidents in training data including labeled telemetry data. A status of the cross-platform profile may be updated based on the incident, and the status may be generated for presentation in a user interface for the account. In response to receiving a user request to provide reconstructed asset data based on the incident, the reconstructed asset data may be generated based on the incident for presentation in the user interface for the account.Type: ApplicationFiled: August 14, 2023Publication date: February 1, 2024Inventor: George NG
-
Publication number: 20240037277Abstract: Cloud-based methods and systems for content sharing are disclosed. In some embodiments, the systems may include one or more processors configured to: receive, from a client device, an instruction for sharing a designated digital asset; retrieve the designated digital asset from a storage device; determine provenance of the designated digital asset based on metadata of the designated digital asset; generate authentication information based on the provenance of the designated digital asset; identify sensitive information in the designated digital asset; generate a redacted version of the designated digital asset by modifying content of the designated digital asset to alter the identified sensitive information; and provide the redacted version and authentication information of the designated digital asset to a recipient of the designated digital asset.Type: ApplicationFiled: October 5, 2023Publication date: February 1, 2024Applicant: Capital One Services, LLCInventor: Jeffrey DAMICK
-
Publication number: 20240037278Abstract: In some embodiments, the present invention provides for an exemplary computer system which includes at least: a graphical user interface client; a dedicated application server; the dedicated application server is configured to connect to the graphical user interface client and an electronic source with electronic data records; where the electronic data records include real identification identifiers of real individuals; where the graphical user interface client is configured to generate at a graphical user interface that is configured to receive user authenticating credential information and to conduct a real-time electronic negotiation querying session between the user and the dedicated application server to generate a plurality of non-reversible synthetic electronic data records of a plurality of synthetic individuals, by utilizing at least one statistical technique so that the plurality of non-reversible synthetic electronic data records cannot be used to identify any real individual in the plurality of elType: ApplicationFiled: October 11, 2023Publication date: February 1, 2024Inventor: Luz Erez
-
Publication number: 20240037279Abstract: Methods and systems are presented for stolen cookie detection. An authentication request is received for a user to access a website using a web browser executable at the user's device. A series of storage locations available on the device for storing web cookies is identified and sorted in order of increasing fraud risk starting from a first storage location. A cookie value for each storage location is retrieved from the device. For each storage location after the first: an expected cookie value is calculated based on the cookie value of a preceding storage location; the expected cookie value is compared with the value retrieved for the storage location; and a score representing a level of fraud risk for the storage location is assigned. The authentication request is processed based on whether the assigned score for at least one of the storage locations exceeds a predetermined risk tolerance for fraud detection.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Matan Marudi, Yuval Bercovich, Yarden Raiskin
-
Publication number: 20240037280Abstract: Biometric information, such as facial recognition technology, can be used to execute a filter to restrict access to digital photographs via a network platform such as a school website, a company portal, or a social network. A user interface screen 200 of a user device may be implemented in connection with allowing a user to control the associated filtering system. The user can use interface element 202 to provide a digital photograph of the protected person. Optionally, the interface 200 may include a further element 204 for identifying the photograph collections to which the filter should be applied. Finally, the interface 200 includes a button 206 for applying the filter. Upon application of the filter, appropriate restrictions are applied with respect to photographs from the selected collections 204 that include the protected person.Type: ApplicationFiled: July 26, 2023Publication date: February 1, 2024Inventor: Andrew John Edwards
-
Publication number: 20240037281Abstract: Provided is a secure communication control system. The secure communication control system comprises a guest control unit provided in a guest operating system for generating a thread requesting arbitrary data from a host application installed in a host operating system; a guest shared key generation unit for generating a guest shared key to be used in the thread; a guest communication unit for transmitting the thread and the guest shared key to the host operating system; a host shared key generation unit for generating a host shared key corresponding to the guest shared key; a host control unit for requesting data according to the thread from the host application to receive the data from the host application, generating a session key from the guest shared key, and generating cipher text by encrypting the data using the session key; and a host communication unit for transmitting the cipher text and the host shared key to the guest operating system.Type: ApplicationFiled: November 27, 2020Publication date: February 1, 2024Applicant: Foundation of Soongsil University-Industry CooperationInventors: Souhwan JUNG, Huy Hoang NGUYEN, Jungsoo PARK
-
Publication number: 20240037282Abstract: A method of identifying an attack comprising receiving an input of one or more images, wherein the one or more images includes a patch size and size, divide the image into a first sub-image and a second sub-image, classify the first sub-image and the second sub-image, wherein classifying is accomplished via introducing a variable in a pixel location associated with the first and second sub-image, and in response to classifying the first and second sub-image and identifying an adversarial patch, output a notification indicating that the input is not certified.Type: ApplicationFiled: July 26, 2022Publication date: February 1, 2024Inventors: Leslie RICE, Huan ZHANG, Wan-Yi LIN, Jeremy KOLTER
-
Publication number: 20240037283Abstract: A computing system includes a BIOS, a BMC coupled to the BIOS, and one or more hardware components. The BMC can receive commands from a user, and transition between a locked state and an unlocked state. When the BMC is in the unlocked state, the BMC responds to commands received from the user. When the BMC is in the locked state, the BMC ignores commands received from the user. The BMC is configured to receive an unlock command from a user that includes an unlock signature. The BMC is further configured to determine whether the unlock signature is authentic. If the unlock signature is authentic and the BMC is in the locked state, the BMC is configured to transition from the locked state to the unlocked state, to allow the user access to the hardware components of the computing system.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Cheng-Han CHEN, Jyun-Jei HUANG
-
Publication number: 20240037284Abstract: Method for registering and updating an electronically stored and versioned alpha digital document (A) in a digital document register by storing, for each version, not the document but a public ownership key; a digital document hash value; and a digital document signature. The invention is characterised by the steps a) providing a first document version, defined in a document description language to have a defined rendered graphic representation; b) registering said first version; c) providing a second document version by adding a reversibly added part to said first document version, said second version comprising a second set of metadata; and d) registering said second version, in that said second metadata is embedded in the second version without affecting said graphic representation, in that at least a part of the reversibly added part can be unambiguously generated based on the second metadata, and in that the registering in step d comprises storing a hash of the second metadata.Type: ApplicationFiled: February 28, 2022Publication date: February 1, 2024Inventors: Hans ALMGREN, Lars HANSÉN, Krisztian MANGOLD, Mats STENGÅRD
-
Publication number: 20240037285Abstract: A memory device includes a non-volatile memory (NVM) and a secure-programming circuit (SPC). The SPC is configured to receive a program-NVM instruction to program a given data word in a given location of the NVM, and, responsively to receiving the program-NVM instruction, to program bits of the given data word in the NVM in a random order.Type: ApplicationFiled: July 31, 2022Publication date: February 1, 2024Inventor: Uri Kaluzhny
-
Publication number: 20240037286Abstract: This disclosure provides techniques for providing or facilitating automatic generation or conversion to geometric designs based on system-level designs. An example method may include receiving a system model from a system modeling environment. The system model describes, represents, or reflects a typology of two or more system components. The topology describes connectivity and performance by the two or more system components. A processing device extracts the topology of the two or more system components from the system model. The topology is represented by two or more connected nodes. The topology describes connectivity and performance by two or more system components. The processing device generates design spaces for the two or more connected nodes. The processing device further generates geometric representations in the design spaces for each of the two or more connected nodes to form the geometric assembly based on the system model.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Randi Wang, John Turner Maxwell, III, Clinton Morris, Morad Behandish
-
Publication number: 20240037287Abstract: Caloribrate@ is a term that can be used in connection with the system and methods disclosed herein, which in some embodiments involves calibrating a building by measuring the physical activity of its inhabitants using biosensing equipment such as activity monitors commercialized under trademarks such as FITBIT®, GARMIN®, APPLE®, OURA®, and WHOOP®. All movements of subjects can be mapped in a physical zone (e.g., building), and the calories consumed, and heartbeats expended in making those movements can be calculated. Then a measure is derived to arrive at a physical zone (e.g., building) rating based on the Caloribrate@ concept and a Caloribration Rating@ process, which can be used to classify physical zones (e.g., buildings) based on how well they support physical activity. This can be used as a predictive tool that indicates the potential for physical activity in a building, thereby indicating its viability to make subjects healthier.Type: ApplicationFiled: July 31, 2023Publication date: February 1, 2024Inventors: Ganapathy Mahalingam, Claire Elise Olson
-
Publication number: 20240037288Abstract: The present invention is for a computer-executed method for the generation or topology optimization of load-bearing trusses. The trusses consist of joints that are connected by linear structural elements, with at least one support and one load that the truss is to support. Based on a finite element analysis of the current state of the truss, the truss is iteratively improved by adjusting its topology, its geometry, and optionally the sizing of its members.Type: ApplicationFiled: July 14, 2023Publication date: February 1, 2024Inventor: Christoph Klemmt
-
Publication number: 20240037289Abstract: Apparatus and methods of artificial intelligent based provision of digital content where and when the digital content is needed based upon where an agent is located and a purpose for accessing the content. A location of a user seeking to access the digital content may be used that enables access to the content. Persistent digital content is linked to location coordinates. A physical onsite location may be linked with digital content to enable provision of a user interface with augmented reality that combines aspects of the physical area with location specific digital content. In addition, access to digital content may be limited to users in defined access areas.Type: ApplicationFiled: October 6, 2023Publication date: February 1, 2024Applicant: Middle Chart, LLCInventors: Michael S. Santarone, Michael Wodrich, Jason E. Duff, Joseph P. Kincart
-
Publication number: 20240037290Abstract: Computer-implemented methods and systems for selecting components to be used in an aircraft system including: a reliability evaluation function, to produce a reliability score, and a complexity evaluation function, to produce a complexity score, are provided; and a multi-objective optimisation function is performed to determine at least one set of candidate components for the aircraft system that satisfy one or more conditions. The multi-objective optimisation function includes selecting a new set of candidate components, performing at least one of the reliability evaluation function and the complexity evaluation function, and evaluating at least one of the reliability score and the complexity score according to the conditions. The new set of candidate components are stored in associated with an indication of the outcome of the evaluation. An aircraft comprising a set of components that have been selected from one or more of the stored sets of components is also provided.Type: ApplicationFiled: July 26, 2023Publication date: February 1, 2024Inventors: George HOWELL, Jonathan COOPER
-
Publication number: 20240037291Abstract: Stiction analysis of a conventional or legacy valve operation in a fluid process plant is described. The method includes receiving a series of setpoint signals, SP, generating, by the controller, a series of controller output signals, OP, driving the valve operation by applying the OP, to the valve, measuring a series of process variable signals, PV, downstream of the valve, receiving the series of process variable signals at the controller, performing inverse modelling on the PV, to estimate a manipulated variable, , receiving and analyzing by a system processor, the SP, the OP, and the , and outputting the estimated stick values, S, the estimated jump values, J, an average of the estimated stick values, an average of the estimated jump values, a confidence interval for the average of the stick values, and a confidence interval for the average of the jump values.Type: ApplicationFiled: July 19, 2022Publication date: February 1, 2024Applicants: KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS, Yokogawa Saudi Arabia CompanyInventors: Sami EL-FERIK, Mustafa ALNASER
-
KNOWLEDGE GRAPH FOR INTEROPERABILITY IN INDUSTRIAL METAVERSE FOR ENGINEERING AND DESIGN APPLICATIONS
Publication number: 20240037292Abstract: System and method enable development of an industrial metaverse used in engineering by computer aided design. A metaverse pipeline includes a plurality of metaverse entities including at least one design application and one simulation application configured to develop a virtual environment metaverse representation of an industrial facility. A metaverse knowledge graph describes semantics and relationships between the metaverse pipeline entities and is configured to exchange information across the software applications of the metaverse pipeline entities of various platforms while developing the virtual environment metaverse. The metaverse knowledge graph enables synchronization across metaverse development platforms, such that updates to one platform are transferrable, whereby the virtual entities and environment can be assimilated according to new edits.Type: ApplicationFiled: July 26, 2023Publication date: February 1, 2024Applicant: Siemens CorporationInventors: Georgia Olympia Brikis, Tongtao Zhang, Utkarshani Jaimini -
Publication number: 20240037293Abstract: Disclosed are a virtual power plant operation risk analysis method and a device. The method comprises: establishing a multi-state model of wind turbine output, analyzing influence of wind speed on wind turbine failure rate based on the multi-state model of wind turbine output, and establishing a wind turbine failure model considering wind turbine time-varying failure rate; establishing a multi-state model of wind turbine output considering the wind speed and the wind turbine time-varying failure rate by an improved general generating function method based on the multi-state model of wind turbine output and the wind turbine failure model considering the wind turbine time-varying failure rate; establishing a multi-state output model of virtual power plant based on the multi-state model of wind turbine output considering wind speed and wind turbine time-varying failure rate; and calculating operation risk indicators of virtual power plant through the multi-state output model of virtual power plant.Type: ApplicationFiled: September 1, 2022Publication date: February 1, 2024Inventors: Dunnan LIU, Heping JIA, Yanbin LI, Xuanyuan WANG, Mingguang LIU, Genzhu LI, Xiaofeng XU, Zhen LIU, Bo NING
-
Publication number: 20240037294Abstract: A simulator includes circuitry and a storage. The storage stores target operation data indicative of a series of target operations, and data relevant to a virtual robot model. The processing circuitry performs: causing the robot model to operate according to the target operation data; outputting image data of the operating robot model to a display; accepting an input of a change in a first operation that is operation of the robot model according to the target operation data and is displayed on the display; associating information indicative of a state of the robot model in a second operation, to which the change is reflected, with information on the first operation included in the target operation data; and storing the associated information in the storage. The circuitry outputs image data indicative of the second operation to the display, when causing the robot model to perform the first operation.Type: ApplicationFiled: August 30, 2021Publication date: February 1, 2024Applicant: KAWASAKI JUKOGYO KABUSHIKI KAISHAInventors: Akinori TANI, Hitoshi NARIAI
-
Publication number: 20240037295Abstract: A method, performed by an authoring system, of authoring content for a high-precision fire-dynamics-simulation (FDS) is provided. The authoring system selects a target object from an object DB storing a three-dimensional model of each object made to correspond to surface information indicating at least one material constituting a surface of the three-dimensional model and material information indicating fire attribute information of each material; arranges the selected target object in a three-dimensional space to author content for the FDS; converts the content for the FDS into an FDS input file used as an input for a simulator for the FDS; and outputs the FDS input file to the simulator.Type: ApplicationFiled: February 16, 2023Publication date: February 1, 2024Applicant: Electronics and Telecommunications Research InstituteInventors: Kyung Ho JANG, Hae Dong KIM, Hong Kee KIM, Su Ran PARK, Hyung Ki SON, Ung Yeon YANG
-
Publication number: 20240037296Abstract: A method for comparing two digital representations of driving situations of a vehicle. The digital representations include occupancy information about an occupancy of the environment of the vehicle by traffic-relevant objects.Type: ApplicationFiled: December 2, 2021Publication date: February 1, 2024Inventor: Patrick Weber
-
Publication number: 20240037297Abstract: The present disclosure relates to the quantification and propagation of orbital state uncertainties and accurately determining an orbit state of an orbiting object using multi-model ensemble analysis. Input data (e.g., solar indices, geomagnetic indices, space weather parameters, temporal parameters, etc.) associated with the solar environment and orbiting object can be provided as inputs to multiple trained density prediction models. The trained density prediction models can be configured to output atmospheric density data associated with the orbiting object (e.g., satellite). Using orbit propagation for the respective atmospheric density data, orbit data (e.g., position, velocity) can be predicted. The predicted orbit data associated with the multiple density prediction models can then be analyzed in an ensemble approach to accurately predict the orbit state of the orbiting object.Type: ApplicationFiled: July 24, 2023Publication date: February 1, 2024Inventors: Piyush M. Mehta, Richard J. Licata, Smriti Nandan Paul