Patents Issued in May 9, 2024
  • Publication number: 20240152632
    Abstract: A blockchain management method includes transmitting one or more contents from a first node to a second node, validating, by the second node, whether the one or more contents received from the first node are truthful, and in response to validating that the one or more contents received from the first node are truthful, registering the one or more contents in a block. In particular, the first node and the second node are associated by a predetermined relationship such that they are permitted to validate personal information.
    Type: Application
    Filed: January 16, 2024
    Publication date: May 9, 2024
    Inventor: Young Sik BAE
  • Publication number: 20240152633
    Abstract: Point-in-Time data access authorization is realized by a data access broker and data access security manager that provide for a data owner/authorizer to provide access consent at the point in time at which a specific data access request is made, without the need for the data owner to share their service-specific access credentials with the third-party entity/data requester. As a result, the data owner has control over the authorization of each data access request and has knowledge as to when the third-party entity is accessing the data. Further, by not having to share access credentials with the third-party entity/data requester security issues related to exposure and/or misuse of the access credentials are avoided.
    Type: Application
    Filed: November 4, 2022
    Publication date: May 9, 2024
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Gregory Allen Burkett, Brady Prentice Merkel, David E. Strommer
  • Publication number: 20240152634
    Abstract: A method at a first communication device for providing a second communication device access to content, the method comprising: providing an offer to the second communication device, offering the second communication device conditional access to the content, wherein access to the content at the second communication device is adaptable based on sensor data of at least one of the first and the second communication device; acquiring sensor data of at least one of the first and the second communication device; providing the second communication device full access to the content in case it is that the sensor data of at least one of the first and the second communication device indicates that the second communication device shall be grated full access to the content, or determining that access to the content is to be restricted at the second communication device, and providing the second communication device restricted access to the content, in case it is determined that sensor data of at least one of the first and
    Type: Application
    Filed: March 16, 2021
    Publication date: May 9, 2024
    Applicant: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Tommy ARNGREN, Bemard SMEETS, Peter ÕKVIST
  • Publication number: 20240152635
    Abstract: Systems and methods are provided for use in securing open service connections. One example computer-implemented method includes initiating communication between a user and an account host as part of a request for an open service connection by the user, whereby the user provides login credentials to the account host for an account issued by the account host to the user. In response to the request, the method includes receiving access tokens for the open service connection from the account host and identifying data for the user and/or the account. The method also includes performing an assessment of the open service connection based on the identifying data, wherein the assessment is based on current and prior usage of the identifying data, and returning the access token and a result of the assessment to the open service customer.
    Type: Application
    Filed: November 8, 2023
    Publication date: May 9, 2024
    Inventors: Przemek Praszczalek, Farzana Chilwan
  • Publication number: 20240152636
    Abstract: According to an embodiment, an electronic device includes a memory, a first processor coupled to the memory and configured to control the electronic device in a normal execution environment (REE), and a second processor coupled to the memory and configured to control the electronic device in a secure execution environment (TEE). The first processor in the REE may be configured to transfer, to the second processor in the TEE, a request for generating a block including verification data of a data chunk. The second processor may be configured to generate the verification data of the data chunk by using key information of the electronic device, sign the verification data, and transmit, to an external electronic device, the block including the signed verification data.
    Type: Application
    Filed: November 3, 2023
    Publication date: May 9, 2024
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Kyungsun CHO, Woochul SHIM
  • Publication number: 20240152637
    Abstract: A method can include instantiating a computational framework responsive to authentication of a credential of an entity; via the computational framework, accessing secure data registered on a blockchain ledger pursuant to a permission constraint of the entity; processing the data using the computational framework for generation of derivative data; and responsive to the generation of the derivative data, automatically transmitting an indicator for registration of the derivative data on the blockchain ledger.
    Type: Application
    Filed: December 29, 2022
    Publication date: May 9, 2024
    Inventors: Christophe Lallement, Alexandra-Violeta Iepure, Sebastien Roche
  • Publication number: 20240152638
    Abstract: A method is provided that includes receiving a data request from a requesting device requesting data from a data source, looking up, in a blockchain ledger, a transaction corresponding to the data request to validate the data request, forwarding the validated data request to a data server, receiving a data response from the data server in response to the data request, wherein the data response comprises the requested data from the data source, and forwarding the data response to the requesting device.
    Type: Application
    Filed: November 3, 2022
    Publication date: May 9, 2024
    Inventors: Gordon Yong LI, Xuemin CHEN, Philippe KLEIN, Abbas SAADAT, Shee-Yen TAN, Rui Pedro DE MOURA ALVES PIMENTA
  • Publication number: 20240152639
    Abstract: Persistence can be enabled in a volatile secure workspace. A management service may be configured to provide a managed application image containing a managed application to a host agent on a user computing device. When a secure workspace is deployed on the user computing device, the host agent can attach the managed application image to the secure workspace to create an injected volume. The host agent can also provide image details of the managed application image to a file system filter in the secure workspace. The file system filter may cause the managed application to be loaded from the managed application image and may then redirect I/O performed by the managed application to the injected volume which in turn will cause such I/O to be persisted in the managed application image. In this way, the managed application, any files it creates or modifies, and any state will be persisted even though the secure workspace is volatile.
    Type: Application
    Filed: November 3, 2022
    Publication date: May 9, 2024
    Inventors: Gokul Thiruchengode Vajravel, Ramanujam Kaniyar Venkatesh, Ramanaa H V, Jyothi Bandakka, Curtis J. Schwebke
  • Publication number: 20240152640
    Abstract: A method for managing access to data stored on a terminal device, the method at the terminal device including: receiving, from a first application executing on the terminal device, a request for access to a first type of stored data; receiving, as a user input, a first indication of whether the first application is to be allowed: full access to the first type of stored data, partial access to the first type of stored data, or no access to the first type of stored data; and providing the first application full, partial or no access to the first type of stored data according to the first indication.
    Type: Application
    Filed: March 3, 2021
    Publication date: May 9, 2024
    Inventors: Saket RUSTAGI, Vishal GARG, Yukti KAURA
  • Publication number: 20240152641
    Abstract: A method of creating a secure collaborative analysis system for securely using a dataset from a plurality of laboratories (150) while ensuring confidentiality, integrity, and authenticity of input and result data among the plurality of collaborating laboratories (150) is presented. The plurality of laboratories (150) are communicatively connected to an execution environment. The method comprise creating a secure enclave (110) within the execution environment for data exchange and analysis, attestation of the execution environment and the secure enclave (110) to verify integrity and authenticity of the system, generating a random 12-byte character inside the secure enclave (110) to provide integrity protection for storing records in a database (130), and building a communication component to provide a means of secure communication between the plurality of laboratories (150) and the execution environment.
    Type: Application
    Filed: February 28, 2022
    Publication date: May 9, 2024
    Inventor: Kumar Roshan MEHTA
  • Publication number: 20240152642
    Abstract: A media playback system for presenting to a user a composition of a plurality of media streams. It has a media selection component configured to receive a scenario dataset, to receive user input for selecting viewing times defining segments of media and composition selections, and to output a list of segments of media from the scenario dataset that are authorized to be viewed by the user. The system has a playback control component configured to retrieve from media storage at least the segments of media from the output list of segments, to decode the segments of media, and to compile composition instructions. The system has a media playback component configured to receive the rendered media and the composition instructions.
    Type: Application
    Filed: November 8, 2023
    Publication date: May 9, 2024
    Inventors: Pierre RACZ, Frederic RIOUX
  • Publication number: 20240152643
    Abstract: Embodiments of this specification provide a differential privacy-based feature processing method and apparatus. The method relates to a first party and a second party, the first party stores a first feature portion of a plurality of samples, the second party stores a plurality of binary classification labels corresponding to the plurality of samples, and the method includes: The second party separately encrypts the plurality of binary classification labels corresponding to the plurality of samples, to obtain a plurality of encrypted labels. The first party determines, based on the plurality of encrypted labels and a differential privacy noise, a positive sample encrypted noise addition quantity and a negative sample encrypted noise addition quantity corresponding to each bin in a plurality of bins. The plurality of bins are obtained by performing binning processing on the plurality of samples for a feature in the first feature portion.
    Type: Application
    Filed: December 22, 2023
    Publication date: May 9, 2024
    Inventors: Jian DU, Pu DUAN, Benyu ZHANG
  • Publication number: 20240152644
    Abstract: Systems and methods disclosed herein securely provide confidential information associated with a user during an active voice call conducted using the user's mobile device. The confidential information may be provided by generating the information in spoken form and inserting the spoken information into an audio stream of the voice call. For example, a customer may be on a phone call with a customer agent. The customer agent may ask the customer for a credit card number in order to process a financial transaction. The customer may select the credit card number via an application executing on the customer's mobile phone. The application may cause the credit card number to be spoken out loud during the voice call. A voice sample of the spoken credit card number in inserted into the audio stream of the voice call and is therefore, audible to the customer and the customer agent without being overheard by a third party.
    Type: Application
    Filed: January 12, 2024
    Publication date: May 9, 2024
    Inventors: Leeyat Bracha Tessler, Kyle Johnson, Latika Gulati
  • Publication number: 20240152645
    Abstract: A system, method, and data registry system for registering a claim of ownership rights. Data associated with an asset is received in a data registry system. A unique identifier is automatically assigned for the data. The data is automatically identified and classified. The data, the asset, and a potential claim associated with the asset is authenticated and verified. A digital representation of the asset including at least a claim is created in the data registry system. The claim is stored in a digital ledger of the data registry system. Requests for information associated with the claim are answered.
    Type: Application
    Filed: January 12, 2024
    Publication date: May 9, 2024
    Applicant: Data Vault Holdings, Inc.
    Inventors: Alfred Blair Blaikie, III, Nathaniel T. Bradley, Joshua S. Paugh, Douglas M. DePeppe
  • Publication number: 20240152646
    Abstract: A system includes a processor and a memory accessible to the processor. The memory stores instructions that, when executed by the processor, cause the processor to determine a privacy policy score for one of an application and a website and provide the privacy policy score to a device.
    Type: Application
    Filed: October 6, 2023
    Publication date: May 9, 2024
    Inventor: Michael Cook
  • Publication number: 20240152647
    Abstract: Systems and methods are described herein for graphically representing an information management system based on the characteristics of within the system. The systems and methods interface with various components of the system (e.g., administrative components, index components, and so on) to identify data having certain characteristics (e.g., personal data), and generate or render information (e.g., a heat map or other visual display) that represents areas or locations within the system storing the data. Thus, the systems and methods, in some embodiments, generate or create a data-specific view into the information management system.
    Type: Application
    Filed: December 4, 2023
    Publication date: May 9, 2024
    Inventors: Manas Bhikchand MUTHA, Prosenjit SINHA
  • Publication number: 20240152648
    Abstract: A system for privacy preserving artificial intelligence (AI) comprising: a first and second device interoperability system (DIS) coupled to an artificial intelligence analysis subsystem (ALAS). The first and second DIS receive a first and second plurality of data sets from coupled first and second pluralities of user devices respectively. The first and second DIS create first and second aggregated data sets based on the received first and second pluralities of data sets. The first and second DIS determine first and second subsets of model parameters for an AI model based on the first and second aggregated data sets; then transmit first and second sets of information based on the model parameter subsets to the AIAS. The AIAS creates a set of model parameters for the AI model based on the transmitted sets of information, and transmits the set of model parameters to the first and second DIS for deployment.
    Type: Application
    Filed: March 28, 2022
    Publication date: May 9, 2024
    Inventors: Artem BOHDAN, Ievgen KRUTOV, Ramesh RAJADURAY
  • Publication number: 20240152649
    Abstract: The disclosure provides a data privacy protection method, a server device, and a client device for federated learning. A public dataset is used to perform model training on a machine learning model by a server device to generate a gradient pool including multiple first gradients. The gradient pool and the machine learning model are received by a client device. The client device uses a local dataset to perform model training on the machine learning model to obtain a second gradient. A local gradient is selected from the first gradients in the gradient pool according to the second gradient using a differential privacy algorithm by the client device. An aggregated machine learning model is generated by performing model aggregation based on the local gradient by the server device.
    Type: Application
    Filed: December 8, 2022
    Publication date: May 9, 2024
    Applicant: Industrial Technology Research Institute
    Inventors: Ming-Chih Kao, Pang-Chieh Wang, Chia Mu Yu, Kang Cheng Chen
  • Publication number: 20240152650
    Abstract: Computer-implemented methods, apparatuses, and computer program products are provided for frequency based operations. An example computer-implemented method includes receiving a request for data transfer of a plurality of data elements of a production data environment to a non-production data environment. The method includes determining an access frequency associated with each data element and grouping each data element into a first set of data elements or a second set of data elements based upon the determined access frequency. The method further includes refreshing the first set of data elements according to a first refresh protocol defining a first refresh rate and refreshing the second set of data elements according to a second refresh protocol defining a second refresh rate less than the first refresh rate. The method also includes outputting the plurality of data elements to the non-production data environment.
    Type: Application
    Filed: January 12, 2024
    Publication date: May 9, 2024
    Inventors: Ananya Bandyopadhyay, Shalini Jha
  • Publication number: 20240152651
    Abstract: A document execution engine receives a training set of data including training documents that each include one or more passages associated with a passage type and a level of risk. The document execution engine trains a machine learned model based on the training set. The trained machine learned model, when applied to subsequently identified passages within documents in the document execution environment, can identify a passage with above threshold levels of risk (e.g., a high-risk passage) based on a passage type of the passage. The trained machine learned model can then provide for display the high-risk passage and a related passage of the same passage type from a second document within the document execution environment to the user via a document passage comparison interface. Differences between the passages can be highlighted, enabling a user to quickly compare and contrast the passages.
    Type: Application
    Filed: January 16, 2024
    Publication date: May 9, 2024
    Applicant: DocuSign, Inc.
    Inventors: Matt Thanabalan, Roshan Satish, Brian Delegan, Bilal Aslam
  • Publication number: 20240152652
    Abstract: Disclosed herein are technologies (including computing systems) for data processing and enhancement as well as for user engagement with the enhanced and processed data. In some embodiments, the technologies include processes for maintaining anonymity. And, in some examples, the data is structured in a hypergraph system. In some examples, a method includes generating, by a computing system, an anonymous user profile for engaging anonymously with user interfaces provided by the computing system. The generating of the anonymous user profile includes retrieving, by the computing system, detailed user profile information associated with an anonymous individual user. The method also includes associating, by the computing system, the user profile information with non-personally identifiable information.
    Type: Application
    Filed: January 19, 2024
    Publication date: May 9, 2024
    Inventor: BENNET HARVEY
  • Publication number: 20240152653
    Abstract: The present disclosure is directed to handling secure deployment of applications to devices. In some embodiments, the secure deployment includes uploading a mobile application that is configured to perform a process for handling transactions on mobile devices; automatically scanning the mobile application to determine whether the mobile application is secure and compliant; cryptographically signing, via a signing service, the mobile application in response to determining the mobile application is secure and compliant; and enabling deployment of the mobile application to the mobile devices based on the cryptographically signing the mobile application.
    Type: Application
    Filed: November 9, 2022
    Publication date: May 9, 2024
    Inventors: Jack DeLoach, Mark Fielbig, Nicole DeBickes, Vinay Padma, Rustem Muslimov, Atul Bhatia, Shanshan Chen, Michael Shafrir, Nate Barnett
  • Publication number: 20240152654
    Abstract: A node associated with an organization may receive a storage identifier for new credit data associated with an individual. A distributed ledger and distributed data sources may be used to share the new credit data with a network of nodes. The node may update a smart contract with the storage identifier for the new credit data. The node may receive, from a particular device associated with the organization, a request for the new credit data. The node may obtain the storage identifier for the new credit data from the smart contract. The node may obtain the new credit data by using the storage identifier to search the distributed data sources. The node may provide the new credit data to the particular device. The node may perform actions to obtain additional new credit data from the distributed data sources or provide the additional new credit data to the distributed data sources.
    Type: Application
    Filed: January 16, 2024
    Publication date: May 9, 2024
    Inventors: Jonathan LEE, Steve FRENSCH, Ethan GREIG, Anna-Maria NALEPA, Zheng JIAN
  • Publication number: 20240152655
    Abstract: Aspects and implementations include systems and techniques for efficient protection of secret data against replay attacks, including updating a unit of data of a plurality of units of data, updating an individual portion of a counter for the unit of data, the counter including an individual portion and a common portion, accessing a pointer value that distinguishes counters corresponding to a first epoch from counters corresponding to a second epoch, selecting, based on at least the pointer value and a value of the individual portion of the counter, an update value, and modifying the pointer value using the update value.
    Type: Application
    Filed: November 2, 2023
    Publication date: May 9, 2024
    Inventor: Michael Alexander Hamburg
  • Publication number: 20240152656
    Abstract: In an approach to detecting hardware anomalies, a Radio Frequency (RF) signal emitted by a target device is received. The received signal from the target device is decomposed into a plurality of windows, where each window is a time slice. At least one hardware anomaly condition is determined for the target device based on a first hardware anomaly model and the plurality of windows. At least one predetermined action is determined based on the at least one hardware anomaly condition.
    Type: Application
    Filed: March 11, 2022
    Publication date: May 9, 2024
    Inventors: Giancarlo Canales Barreto, Nicholas L. Lamb
  • Publication number: 20240152657
    Abstract: Aspects of the disclosure are directed to combining an information technology services management (ITSM) controller with one or more processing units into a single integrated circuit via chiplets. An ITSM chiplet can connect to one or more processing unit chiplets via one or more respective die-to-die (D2D) interconnects that physically isolate the ITSM chiplet from the processing unit chiplet. Including the ITSM chiplet with the processing unit chiplets in an integrated circuit can save cost, increase reliability, and reduce assembly time.
    Type: Application
    Filed: November 8, 2022
    Publication date: May 9, 2024
    Inventors: Benjamin James Ogden Kerr, Rohit Mittal
  • Publication number: 20240152658
    Abstract: A system may include a plurality of processing cores, a target shared among the plurality of processing cores and coupled to the plurality of processing cores via a shared bus, and access control logic configured to, based on access configuration settings associated with the target, control access of requests from each of the plurality of processing cores based on a privilege level of each of the plurality of processing cores, in order to dynamically allocate and re-allocate the target among the plurality of processing cores in accordance with the privilege levels and to dynamically utilize the target in accordance with the privilege levels.
    Type: Application
    Filed: November 2, 2023
    Publication date: May 9, 2024
    Applicant: Cirrus Logic International Semiconductor Ltd.
    Inventors: Younes DJADI, Xingdong DAI, Nathan BUCHANAN, Nariankadu D. HEMKUMAR
  • Publication number: 20240152659
    Abstract: A method of modifying a CAD system model performed on a data processing system includes receiving a dataset of co-ordinates representing an article in 2d, or in 3d and receiving 2d or 3d constraints respectively, to be applied to any changes to the dataset of co-ordinates for the article. A modification to be applied to the dataset is received and combined with the relevant 2d and 3d constraints to produce a constrained modification for each of the article and associated article. The constrained modification is solved in 2d and in 3d to determine whether a solution exists in which all constraints are met. If the solve is successful, the constrained modification is applied to each dataset simultaneously and, updated datasets are stored. If the solve fails, the constraints may be reduced and the solve step repeated, or the process is terminated.
    Type: Application
    Filed: January 15, 2024
    Publication date: May 9, 2024
    Applicant: Siemens Industry Software Inc.
    Inventors: Michael John Gibbens, Douglas Joseph King, Howard Charles Duncan Mattson
  • Publication number: 20240152660
    Abstract: Processing scan data provided by a 3D surveying device to provide a digital model of an environment, wherein the processing of the scan data is distributed among a group of processing participants by deriving a scan task to be currently executed by the 3D surveying device and deriving an associated model type of the digital model of the environment to be provided by the scan data. Minimal processing units of the processing of the scan data are determined to provide a display of a representation of a preview of the digital model in a way that it fulfils visualization criteria associated to the model type of the digital model.
    Type: Application
    Filed: November 6, 2023
    Publication date: May 9, 2024
    Applicant: HEXAGON TECHNOLOGY CENTER GMBH
    Inventors: Johannes MAUNZ, Henk TRIEGEL, Tobias BÖSCH BORGARDS
  • Publication number: 20240152661
    Abstract: Techniques are provided for automatically transforming textual data, representing an image, into P&ID components. In an embodiment, a text file may represent an image of a plant and include a plurality of image objects representing plant components. A text class identifier corresponding to each image object may be identified in the text file. An insertable P&ID component may be identified for each image object based on determining that the text class identifier is included in an application hierarchical data structure. An ordered insertion may be performed to insert each insertable P&ID component into a P&ID schematic drawing utilizing an ordered hierarchy. Additionally, P&ID data may be generated for each P&ID component inserted into the P&ID schematic drawing. As a result, a P&ID or intelligent P&ID is generated from textual data that represents an image that is simply a pictorial representation of a plant.
    Type: Application
    Filed: November 8, 2022
    Publication date: May 9, 2024
    Inventors: Stephen Morrow, Salman Abeed, Qarib Raza Kazmi
  • Publication number: 20240152662
    Abstract: A method for reckoning the environmental background water temperature and calculating the temperature rise in a temperature rise area of a newly-built coastal power plant is provided. The reckoning method includes: S01, before an operation of the newly-built coastal power plant, building a water temperature reference station; S02, continuously observing and recording water temperature data of the water temperature reference station and other water temperature observation stations; S03, analyzing the water temperature data obtained in S02; and S04, reckoning a sea surface natural water temperature of the other water temperature observation stations.
    Type: Application
    Filed: January 16, 2024
    Publication date: May 9, 2024
    Applicants: FIRST INSTITUTE OF OCEANOGRAPHY, MINISTRY OF NATURAL RESOURCES, QINGDAO GUOHAIHAOHAN OCEAN ENGINEERING CONSULTING CO. LTD
    Inventors: Yongzhi WANG, Shuangwen SUN, Peng JI, Jun DU, Ziwen TIAN, Huifeng SUN
  • Publication number: 20240152663
    Abstract: An acoustic model determination approach for a real-time locating system is disclosed. The system includes one or more transmitting devices and one or more mobile devices. The acoustic model may be determined by deriving an acoustic representation of sub-structures within the building, and then forming the acoustic model based on the acoustic representation and the location and orientation of the static acoustic transmitting device. In another embodiment, an acoustic signal is transmitted from a static acoustic transmitting device, with the reflected signals received by the same static acoustic transmitting device in a receiving mode. Based on these received acoustic signals, the acoustic model is formed based on the reflected signals and the location and orientation of the static acoustic transmitting device.
    Type: Application
    Filed: January 16, 2024
    Publication date: May 9, 2024
    Applicant: Sonitor Technologies AS
    Inventors: Wilfred Edwin BOOIJ, Knut WELLE, Mattheus Franciscus Albertus TEN VELDHUIS, Fritjof Boger ENGELHARDTSEN
  • Publication number: 20240152664
    Abstract: A singular material detection apparatus (2000) acquires, for each of a plurality of materials (60), material specification information (10) representing material specifications of the material (60) and physical property information (20) indicating physical properties of a product (70) that can be generated by using the material (60). The singular material detection apparatus (2000) generates a self-organizing map (30) by using the physical property information (20). The singular material detection apparatus (2000) assigns each of pieces of material specification information (10) to one of nodes based on the physical property information (20) corresponding to that piece of the material specification information (10). Then, the singular material detection apparatus (2000) detects, from among the nodes to which the pieces of material specification information (10) are assigned, a singular node located at a singular position in a map space.
    Type: Application
    Filed: February 14, 2022
    Publication date: May 9, 2024
    Applicants: NEC CORPORATION, TOHOKU UNIVERSITY
    Inventors: Naoki KUWAMORI, Akihiro MUSA, Yohei TAKIGAWA, Yuka KAZAMA, Yoshihiko SATOU, Hiroaki KOBAYASHI, Gota KIKUGAWA, Tomonaga OKABE, Kazuhiko KOMATSU
  • Publication number: 20240152665
    Abstract: A method for evaluating a three-dimensional (3D) model of a desired object based on casting system manufacturing constraints, the method may include (i) obtaining the 3D model of the desired object; wherein the 3D model comprises vertexes and angular information regarding angular relationships between the vertexes; (ii) virtually partitioning the 3D model to slices; (iii) generating a 3D model of a casting system-compliant object; wherein the generating comprises determining for each slice, based on casting system manufacturing constraints and on the 3D model of the desired object, (a) one or more mold regions associated with the slice, and (b) one or more object regions defined by the one or more mold regions, to be formed by molten metal processing; and (iv) responding to the generating of the 3D model of the casting system-compliant object
    Type: Application
    Filed: November 9, 2022
    Publication date: May 9, 2024
    Applicant: Magnus Metal Ltd.
    Inventors: Yoav Miller, Ido Holcman
  • Publication number: 20240152666
    Abstract: A computer-implemented method of simulating the effect of noise on an artificial accelerometer signal, the artificial accelerometer signal indicative of a body movement of an organism, includes the steps of: obtaining artificial acceleration data indicative of the body movement of the organism; obtaining noise characteristics of the accelerometer; and generating a simulated accelerometer signal based on the obtained artificial simulated acceleration data and obtained noise characteristics.
    Type: Application
    Filed: February 21, 2022
    Publication date: May 9, 2024
    Inventors: Jan Guy BOGAARTS, Adrian DERUNGS, Mattia ZANON
  • Publication number: 20240152667
    Abstract: A selection device is for selecting, when operation simulation is to be performed, positional data of an observation object to be used. The selection device includes a position acquisition unit that acquires positional data including coordinate values that indicate the position of the observation object, a state acquisition unit that acquires the state of the observation object including an operation command and at least one item of data not based on the operation command, a worst change amount calculation unit that calculates, based on the state of the observation object, a worst change amount in accuracy of operation simulation between the case where the positional data is used for a calculation process relating to the operation simulation and the case where the data is not used, and a selection unit that selects positional data to be used for the operation simulation, based on the calculated worst change amount.
    Type: Application
    Filed: April 6, 2021
    Publication date: May 9, 2024
    Inventor: Toshihiro WATANABE
  • Publication number: 20240152668
    Abstract: Disclosed herein is a method of generating a 3D conformation of a molecule used in in-silico drug discovery. The method includes obtaining a 2D graph of the molecule. A first tensor including molecular graph information and a second tensor including graph, coordinate and distance information of atoms of the molecule are generated. A first set of feature vectors corresponding to the first tensor and a second set of feature vectors corresponding to the second tensor are further generated. The first set of feature vectors are fed to a first encoder of a generative model to generate a first output. The second set of feature vectors are fed to a second encoder of the generative model to generate a second output. The first output and the second output are combined to form an input in a decoder of the generative model to generate the 3D conformation of the molecule.
    Type: Application
    Filed: November 2, 2023
    Publication date: May 9, 2024
    Inventors: Hongyang Yu, Hongjiang Yu
  • Publication number: 20240152669
    Abstract: Surrogate training can include receiving a parameterization of a physical system, where the physical system includes real physical components and the parameterization having corresponding target property in the physical system. The parameterization can be input into a neural network, where the neural network generates a different dimensional parameterization based on the input parameterization. The different dimensional parameterization can be input to a physical model that approximates the physical system. The physical model can be run using the different dimensional parameterization, where the physical model generates an output solution based on the different dimensional parameterization input to the physical model. Based on the output solution and the target property, the neural network can be trained to generate the different dimensional parameterization.
    Type: Application
    Filed: November 8, 2022
    Publication date: May 9, 2024
    Inventors: Raphael Pestourie, Youssef Mroueh, Payel Das, Steven Glenn Johnson, Christopher Vincent Rackauckas
  • Publication number: 20240152670
    Abstract: An information processing device acquires, based on a set including a plurality of samples in which a first value and a second value are associated with each other, a first distribution that is a probability distribution of a first function for calculating the second value from the first value. The information processing device acquires, based on a second distribution having an average different from an average of each argument of the first function in the first distribution, a second function for calculating an evaluation value for an argument value of the first function. The information processing device determines, based on the evaluation value by the second function, an argument value for sampling a function value of the first function.
    Type: Application
    Filed: February 2, 2022
    Publication date: May 9, 2024
    Applicant: NEC Corporation
    Inventors: Keiichi Kisamori, Yuto Komori, Takashi Washio
  • Publication number: 20240152671
    Abstract: A violation checking method includes generating a violation log report for a design, classifying violation logs in the violation log report into high-risk logs and low-risk logs by a machine learning model, reviewing the high-risk logs, and modifying the design if at least one bug is identified in the high-risk logs.
    Type: Application
    Filed: November 3, 2023
    Publication date: May 9, 2024
    Applicant: MEDIATEK INC.
    Inventors: Chi-Ming Lee, Chung-An Wang, Cheok Yan Goh, Chia-Cheng Tsai, Chien-Hsin Yeh, Chia-Shun Yeh, Chin-Tang Lai
  • Publication number: 20240152672
    Abstract: A method and system for predicting water flooding recovery of fault block reservoirs considering a whole process optimization includes: determining influencing factors in water flooding recovery of fault block reservoirs; screening master parameters of the water flooding recovery of the fault block reservoirs; determining a single-factor correlation between the water flooding recovery of the fault block reservoirs and the master parameters; designing multi-factor orthogonal experimental schemes; performing a whole-process water flooding optimization for each of the experimental schemes including separate-layer injection and production, well-type conversion, and injection and production adjustment, to obtain the maximum water flooding recovery; and determining a prediction model of the water flooding recovery of the fault block reservoirs using least square method based on results of the whole process optimization of orthogonal experiments, further obtaining a prediction model of the water flooding recovery of
    Type: Application
    Filed: December 19, 2022
    Publication date: May 9, 2024
    Inventors: Jian Hou, Kang Zhou, Shuai Liu, Zhibin An, Qingjun Du, Bei Wei, Yongge Liu
  • Publication number: 20240152673
    Abstract: A method of evaluating a mixing protocol may include identifying a domain of mixing protocol parameters for a multivariate model and identifying an evaluation criterion for the multivariate model. The method may further include using predictor screening to determine a set of mixing protocol parameters from the domain of mixing protocol parameters, wherein the set of mixing protocol parameters account for a threshold observed variance in the evaluation criterion. The method may include generating the multivariate model, wherein the multivariate model relates the set of mixing protocol parameters to the evaluation criterion. The method may also include generating an estimated value of the evaluation criterion for the mixing protocol, using the multivariate model.
    Type: Application
    Filed: November 7, 2023
    Publication date: May 9, 2024
    Applicant: Regeneron Pharmaceuticals, Inc.
    Inventors: Ross KENYON, Saber MEAMARDOOST, Thomas MADDEN
  • Publication number: 20240152674
    Abstract: A quick simulation method and apparatus for an integrated circuit, and a storage medium, are provided, wherein, by dividing a large-scale integrated circuit into a plurality of sub-circuit, then performing simulation on each sub-circuit, generating a corresponding function correspondence relation formula for each of those sub-circuits for which a simulated waveform is a periodic waveform, and then, when performing simulation on the large-scale integrated circuit, directly performing simulation on each of those sub-circuits for which the waveform is not a periodic waveform, and performing calculation by using the function correspondence relation formula corresponding to each of those sub-circuits for which the simulated waveform is a periodic waveform to complete a corresponding simulation thereof, so as to realize a simulation for the whole large-scale integrated circuit.
    Type: Application
    Filed: August 5, 2022
    Publication date: May 9, 2024
    Inventor: Zhen Li
  • Publication number: 20240152675
    Abstract: A method includes receiving feature data defining a plurality of features of a virtual substrate. The method further includes preparing the virtual substrate for display on a graphical user interface (GUI). The method further includes receiving one or more first inputs via the GUI. The one or more first inputs are associated with one or more locations of the virtual substrate. The method further includes defining a three-dimensional measurement probe based on the one or more first inputs. The method further includes outputting a measurement of the measurement probe. The measurement is associated with a characteristic of the virtual substrate measured by the three-dimensional measurement probe.
    Type: Application
    Filed: November 7, 2022
    Publication date: May 9, 2024
    Inventors: Dheeraj Kumar, Samit Barai, Pardeep Kumar, Sundar Narayanan, Anantha Sethuraman
  • Publication number: 20240152676
    Abstract: A process is described to allow an early power estimate where switching activity provided by a simulation of a logical hierarchy in a chip design is accomplished by mapping ports in the physical hierarchy to ports in a logical hierarchy after hierarchy manipulation has been done. Power estimation is done using the switching activity from the simulation of the logical hierarchy mapped to the ports of the physical hierarchy. Early power estimation using results of the hierarchy manipulation is better than power estimation on the logical hierarchy because blocks and signals in the logical hierarchy may be replicated or merged during the hierarchy manipulation.
    Type: Application
    Filed: November 9, 2022
    Publication date: May 9, 2024
    Inventors: Ali S. El-Zein, Robert James Shadowen, Gabor Bobok, Edward Armayor McQuade
  • Publication number: 20240152677
    Abstract: Provided are a method for optimizing a circuit structure based on an FPGA carry chain, a computer device and a non-transitory computer-readable storage medium, in which logic synthesis is performed, by a logic synthesis tool, on a target logic operation, and a synthesis netlist is obtained through the logic synthesis; a critical path is obtained in the synthesis netlist; and in response to the number of actual inputs of a look-up table in the critical path being not greater than a preset threshold, and at least one of elements adjacent to two ends of a reference path in the critical path being a carry chain, the look-up table in the critical path is converted into a carry chain, where the reference path includes the look-up table, and only one look-up table or multiple adjacent look-up tables compose the reference path.
    Type: Application
    Filed: January 3, 2024
    Publication date: May 9, 2024
    Inventors: BO DENG, BIAO KONG, MIN ZHANG
  • Publication number: 20240152678
    Abstract: The present disclosure relates to an element search method and apparatus, a computer device, a storage medium and a computer program product. The method includes: acquiring an element search instruction carrying an element identifier information of a target element; determining an element prediction type matching the target element based on the element identifier information; searching for the target element on a search panel according to the element prediction type to acquire element attribute information of the target element; determining a target layer of the target element in a Printed Circuit Board (PCB) layout based on the element attribute information, opening the target element at the target layer, and highlighting the opened target element. Accordingly, the efficiency of searching for the element can be improved.
    Type: Application
    Filed: July 26, 2023
    Publication date: May 9, 2024
    Inventor: Yuan JIANG
  • Publication number: 20240152679
    Abstract: Systems, methods, and devices are described herein for integrated circuit (IC) layout validation. A plurality of IC patterns are collected which include a first set of patterns capable of being manufactured and a second set of patterns incapable of being manufactured. A machine learning model is trained using the plurality of IC patterns. The machine learning model generates a prediction model for validating IC layouts. The prediction model receives data including a set of test patterns comprising scanning electron microscope (SEM) images of IC patterns. Design violations associated with an IC layout are determined based on the SEM images and the plurality of IC patterns. A summary of the design violations is provided for further characterization of the IC layout.
    Type: Application
    Filed: January 17, 2024
    Publication date: May 9, 2024
    Inventors: Rachid Salik, Chin-Chang Hsu, Cheng-Chi Wu, Chien-Wen Chen, Wen-Ju Yang
  • Publication number: 20240152680
    Abstract: Embodiments are disclosed for real-time copyfitting using a shape of a content area and input text. A content area and an input text for performing copyfitting using a trained classifier is received. A number of remaining characters in the content area is computed in real-time using the input, the computing performed in response to receiving additional input text, wherein computing, in real-time, the number of remaining characters in the content area using the input text includes generating, by the trained classifier, a set of weights including a first set of one or more weights for the input text and a second set of one or more weights for the content area. The first set of one or more weights, the second set of one or more weights, the input text, and the additional input text, and a copyfitting parameter indicating a number of additional characters to be fitted into the content area are determined based on the content area.
    Type: Application
    Filed: November 9, 2022
    Publication date: May 9, 2024
    Applicant: Adobe Inc.
    Inventors: Rishav AGARWAL, Vidisha Rama HEGDE, Vasu GUPTA, Sanyam JAIN
  • Publication number: 20240152681
    Abstract: Some embodiments provide a non-transitory machine-readable medium that stores a program. The program may receive from a client device a request for a graphical user interface (GUI) for a form. The program may in response to the request, retrieving a set of metadata defining the GUI for the form. The program may, based on the set of metadata, generating the GUI. The program may provide the GUI to the client device.
    Type: Application
    Filed: November 7, 2022
    Publication date: May 9, 2024
    Inventors: Snigdhaman Chatterjee, Sunny Yadav, Nitin, Jinata Kumari Rout, Chandresh Parmar