G06F16/90344

Smart storage container apparatus, system and method thereof
11544235 · 2023-01-03 · ·

A smart storage container apparatus and method, the apparatus comprising at least one storage compartment and a display, and is configured to download basic local configuration information corresponding to the apparatus, locally adjust the downloaded information according to local conditions of content of the at least one storage compartment, and based on the adjusted configuration information, adapt a local configuration database. Additionally, a method comprising downloading basic local configuration information corresponding to a smart storage apparatus comprising, locally adjusting the downloaded information according to local conditions of content of the at least one storage compartment, and based on the adjusted configuration information, adapting a local configuration database.

INFORMATION PROCESSING SYSTEM, METHOD, PROGRAM AND DATA STRUCTURE
20220414160 · 2022-12-29 ·

An information processing system facilitates the extraction of a product relating to a patent or to facilitate the extraction of a patent relating to a product. An information processing system includes a database in which a term associated with a raw material recited in a claim of a patent document and a raw material that corresponds to the term are associated with each other, an acquiring unit configured to acquire patent information, and an extracting unit configured to extract a product containing a raw material that corresponds to a term recited in a claim that is identified by the patent information, with reference to the database and a correspondence between a product and a raw material contained in the product, based on whether the raw material that corresponds to the term and the raw material contained in the product match.

FAST SEARCH FOR SEARCH STRING INSTRUCTIONS

One or more computer processors receive a pattern string comprising a pointer to a pattern search point and a string comprising a pointer to a search point; determine a plausible search point within the string for the pattern character; execute a search string (SRST) instruction with the determined search point and the pattern character; compute a pattern offset comprising a difference between a first occurrence of the determined pattern character located within the pattern string but not in the correct position and a current pattern character position; execute a subsequent SRST instruction with the current pattern character position and the computed offset set as a new search point; and responsive to identifying all pattern characters in the correct position within the string based on the executed subsequent SRST instruction, transmit memory address associated with a substring comprised of the string and corresponding pattern characters in the correct position.

Method and system for providing a user agent string database
11537642 · 2022-12-27 · ·

Method, system, and programs for determining a keyword from user agent strings are disclosed. In one example, a plurality of user agent strings is received. The plurality of user agent strings is grouped into one or more clusters. The one or more clusters comprise a first cluster that includes two or more user agent strings. The two or more user agent strings in the first cluster are compared. Based on the comparing, a keyword is determined from the first cluster. The keyword represents a type of user agent information.

Information processing apparatus, information processing circuit, information processing system, and information processing method

An information processing apparatus according to an aspect of the present invention includes an information processing circuit configured to generate a finite state machine based on a predetermined matching condition with respect to sequence data of an event that is input to the information processing apparatus; to process the sequence data so as to substantially remove data that does not match the matching condition from the sequence data; and to output the processed sequence data.

ENCODING VARIABLE LENGTH CHARACTERS USING SIMULTANEOUS PROCESSING
20220405460 · 2022-12-22 ·

Embodiments are directed to managing character encoding. A plurality characters that are each encoded as code units based on a character code may be provided such that the code units for each character represents a code point of a character encoding scheme. An encoding model may be determined based on the character code, one or more processor features, and a target character code. Process features may be employed to transform the code units into target code units based on the encoding model such that the target code units are based on the target character code and such that the target code units encode the code point for each character. The plurality of target characters may be provided to a target stream such that each target character may be encoded as the target code units.

Systems and methods for identifying personal identifiers in content
11531779 · 2022-12-20 · ·

Provided herein are systems and methods for identifying personal identifiers in content. An entity engine may receive content to identify candidate personal identifiers. The entity engine may determine that a text string in the content matches to a data format specified in entity definitions corresponding to types of personal identifiers and a rule for finding a geographic or linguistic term in the content correlated to the specific type of personal identifier. Each entity definition may specify a data format for finding a specific type of personal identifier in content. The data format corresponds to a type of personal identifier. The entity engine may identify, according to a rule of the first entity definition, a geographic or linguistic term in the content correlated to the type of personal identifier. The entity engine may classify the text string as the type of personal identifier, for preventing data breach or exfiltration.

Messaging controller for anonymized communication
11533298 · 2022-12-20 · ·

A method may include receiving, from a first client, a first message. The first message may be matched to a second user based on a similarity between a first keyword included in the first message and a second keyword included in a profile of a second user. The first keyword may be determined to be similar to the second keyword based on a distance between a first vector representation of the first keyword and a second vector representation of the second keyword not exceeding a threshold value. In response to the first message being matched with the second user, the first message may be sent to a second client associated with the second user. In response to receiving, from the second client, a second message responsive to the first message, the second message may be sent to the first client. Related systems and articles of manufacture are also provided.

Personalized search based on account attributes

A system stores resources such as text articles, videos, and so forth for an organization. During operation, the system receives a query and provides a response. During initial use of the system, there is little or no historical data available to help determine which resource is most relevant to a particular query. In this “cold-start” situation, the system determines attributes associated with a user account of the user making the query. The query is used to search a data store and retrieve a set of resources based on a term match with the query and to find the resources which correspond to the attributes of the user account. This allows the system to provide simplified output that is more likely to be relevant to that particular user in the “cold-start” situation.

Service infrastructure and methods of predicting and detecting potential anomalies at the service infrastructure
11528288 · 2022-12-13 · ·

Methods allow a predicting and detecting potential anomalies at a service infrastructure. A strings table having entries that define character strings and corresponding anomaly probabilities is accessed. A log entry related to an event occurring in the service infrastructure is generated in a database. The log entry includes a character string designating a name of a file or an IP address and a domain name hosted by the service infrastructure. A search is made for the character string in the strings table. The domain name is marked as suspect if the character string is found in the strings table and if an anomaly probability for the character string exceeds a predetermined threshold. The anomaly probabilities may be calculated using a Bayesian filter that accounts for a number of domains hosted by the service infrastructure on which the character string has recently appeared.