-
公开(公告)号:US12087027B2
公开(公告)日:2024-09-10
申请号:US17792841
申请日:2020-01-31
Applicant: NEC Corporation
Inventor: Yu Nabeto , Soma Shiraishi
IPC: G06V10/22 , G06F16/901
CPC classification number: G06V10/22 , G06F16/9014 , G06V2201/07
Abstract: In an object recognition apparatus, a storage unit stores a table in that a plurality of feature amounts are associated with each object having feature points of respective feature amounts. An object region detection unit detects object regions of a plurality of objects from an input image. A feature amount extraction unit extracts feature amounts of feature points from the input image. A refining unit refers to the table, and refines from all objects of recognition subjects to object candidates corresponding to the object regions based on feature amounts of feature points belonging to the object regions. A matching unit recognizes the plurality of objects by matching the feature points belonging to each of the object regions with feature points for each of the object candidates, and outputs a recognition result.
-
2.
公开(公告)号:US20240256692A1
公开(公告)日:2024-08-01
申请号:US18438237
申请日:2024-02-09
Applicant: ALTR Solutions, Inc.
Inventor: Christopher Edward Struttmann
IPC: G06F21/62 , G06F16/901 , H04L9/32
CPC classification number: G06F21/6218 , G06F16/9014 , G06F16/9024 , H04L9/3239 , G06F2221/2107
Abstract: Provided is a process including: receiving one or more write requests to write a plurality of values to a plurality of fields in one or more tuples of a relational database, different ones of the values corresponding to different ones of the fields, detecting duplicates of the values with steps for expediting detection of duplicates, and selecting a first subset of the values based on the first subset of values corresponding to fields in a first subset of the fields, the first subset of fields being designated as higher-security fields than a second subset of fields among the plurality of fields.
-
公开(公告)号:US12045550B2
公开(公告)日:2024-07-23
申请号:US18297350
申请日:2023-04-07
Applicant: Aurora Labs Ltd.
Inventor: Zohar Fox , Carmit Sahar
IPC: G06F8/75 , G06F8/34 , G06F8/65 , G06F8/71 , G06F11/36 , G06F16/901 , G06F17/18 , G06F18/24 , G06F21/52 , G06F21/56 , G06F21/57 , G06F21/62 , G06F30/33 , G06N20/00 , G06F30/15 , G10H1/00
CPC classification number: G06F30/33 , G06F8/34 , G06F8/65 , G06F8/71 , G06F8/75 , G06F11/3604 , G06F11/3612 , G06F11/362 , G06F11/3692 , G06F16/9014 , G06F17/18 , G06F18/24 , G06F21/52 , G06F21/563 , G06F21/57 , G06F21/6218 , G06N20/00 , G06F30/15 , G10H1/0058
Abstract: Disclosed herein are techniques for analyzing software delta changes based on functional line-of-code behavior and relation models. Techniques include identifying a prompt to change a first version of code on a controller to a second version of code; constructing, based on the identified prompt, a line-of-code behavior and relation model representing execution of functions of the controller based on the second version of code; performing a signature operation on the generated line-of-code behavior and relation model to produce a signature value; and sending the signature value to the controller; wherein the controller is configured to compare the signature value to a computed signature value that the controller is configured to compute based on the second version of code and determine, based on the comparison, whether to validate the second version of code.
-
公开(公告)号:US12032548B2
公开(公告)日:2024-07-09
申请号:US16692679
申请日:2019-11-22
Applicant: Advanced Micro Devices, Inc.
Inventor: Alexander D. Breslow
IPC: G06F16/22 , G06F9/50 , G06F16/901 , G06N7/01
CPC classification number: G06F16/2255 , G06F9/5016 , G06F16/9014 , G06N7/01 , G06F2209/504
Abstract: A method of maintaining a probabilistic filter includes, in response to receiving a key K1 for adding to the probabilistic filter, generating a fingerprint F1 based on applying a fingerprint hash function HF to the key K1, identifying an initial bucket Bi1 by selecting between at least a first bucket B1 determined based on a first bucket hash function H1 of the key K1 and a second bucket B2 determined based on a second bucket hash function H2 of the key K1, and inserting the fingerprint F1 into the initial bucket Bi1; and resizing the probabilistic filter. Resizing the probabilistic filter includes incrementing a resize counter value, determining a bucket B′ for the fingerprint F1 based on a value of the fingerprint F1 and the resize counter value, and inserting the fingerprint F1 into the bucket B′ in the probabilistic filter.
-
公开(公告)号:US20240184908A1
公开(公告)日:2024-06-06
申请号:US18439572
申请日:2024-02-12
Applicant: ALTR Solutions, Inc.
IPC: G06F21/62 , G06F16/901 , H04L9/32
CPC classification number: G06F21/6218 , G06F16/9014 , G06F16/9024 , H04L9/3239 , G06F2221/2107
Abstract: Provided is a process including: obtaining criteria to select plain-text values in a lower-trust database; selecting, based on the criteria, a first plain-text value; in response, determining a first reference value; storing the first plain-text value in a higher-trust database in a second entry identified by the first reference value; storing the first reference value in the first entry of the lower-trust database; selecting another instance of the first plain-text value stored requested to be stored in a third entry in the lower-trust database; and in response, storing the first reference value in the third entry.
-
公开(公告)号:US11960807B2
公开(公告)日:2024-04-16
申请号:US17929792
申请日:2022-09-06
Applicant: Aurora Labs Ltd.
Inventor: Zohar Fox , Carmit Sahar
IPC: G06F30/33 , G06F8/34 , G06F8/65 , G06F8/71 , G06F8/75 , G06F11/36 , G06F16/901 , G06F17/18 , G06F18/24 , G06F21/52 , G06F21/56 , G06F21/57 , G06F21/62 , G06N20/00 , G06F30/15 , G10H1/00
CPC classification number: G06F30/33 , G06F8/34 , G06F8/65 , G06F8/71 , G06F8/75 , G06F11/3604 , G06F11/3612 , G06F11/362 , G06F11/3692 , G06F16/9014 , G06F17/18 , G06F18/24 , G06F21/52 , G06F21/563 , G06F21/57 , G06F21/6218 , G06N20/00 , G06F30/15 , G10H1/0058
Abstract: Disclosed herein are techniques for using a line-of-code behavior and relation model to determine software functionality changes. Techniques include identifying a first portion of executable code and a second portion of executable code; accessing a first line-of-code behavior and relation model representing execution of functions of the first portion of executable code; constructing, based on the second portion of executable code, a second line-of-code behavior and relation model representing execution of functions of the second portion of executable code; performing a functional differential comparison of the first line-of-code behavior and relation model to the second line-of-code behavior and relation model; determining, based on the functional differential comparison, a status of functional equivalence between the first portion of executable code and the code portion of executable code; and generating, based on the determined difference, a report identifying the status of functional equivalence.
-
公开(公告)号:US11914653B1
公开(公告)日:2024-02-27
申请号:US18100074
申请日:2023-01-23
Applicant: Pathogenomix, Inc.
Inventor: Oystein Friestad Saebo
IPC: G06F16/906 , G06F16/901 , G06F16/903 , G16B30/00 , G16B40/00 , G16B50/30
CPC classification number: G06F16/906 , G06F16/9014 , G06F16/90344 , G16B30/00 , G16B40/00 , G16B50/30
Abstract: Systems and methods for removing data from strings are disclosed. A system can access a first hash table that stores representations of a first set of strings, where the representations have predetermined number of characters. The system can generate a second hash table that stores a second representations of a string of a second set of strings, where the second representations have the predetermined number of characters. Upon determining that the first hash table includes at least one of the plurality of second representations of the string included in the second hash table, the system can increment a counter associated with the string. The system can generate a third set of strings by removing the string from the second set of strings responsive to determining that the counter satisfies a threshold, and transmit the third set of strings to a computing system.
-
公开(公告)号:US11907379B2
公开(公告)日:2024-02-20
申请号:US16356707
申请日:2019-03-18
Applicant: Dell Products L. P.
Inventor: David Craig Lawson , Michael A Phillips
IPC: G06F21/60 , G06F3/06 , G06F16/901 , H04L9/06
CPC classification number: G06F21/602 , G06F3/0604 , G06F3/067 , G06F3/0635 , G06F16/9014 , G06F16/9017 , H04L9/0643
Abstract: In some examples, a computing device creates an event log when an event occurs. If the event log includes a path comprising one or more components, the computing device may determine a hash, using a hash function and a salt, for each of the components and substitute each component in the path with an index to the hash stored in a dictionary. In this way, the computing device replaces each component of the path with an index to a hash in the dictionary to create a modified path. The resulting modified path can be traversed and searched. For example, a search term may be hashed using the hash function and salt, and the dictionary associated with the logs searched for a match. In this way, a particular file name or a particular folder name can be identified in the modified path.
-
公开(公告)号:US11841736B2
公开(公告)日:2023-12-12
申请号:US17401203
申请日:2021-08-12
Applicant: ALTR Solutions, Inc.
IPC: G06F21/62 , H04L9/32 , G06F16/901
CPC classification number: G06F21/6218 , G06F16/9014 , G06F16/9024 , H04L9/3239 , G06F2221/2107
Abstract: Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields; segmenting a first value in the first subset; instructing a first computing device to store a first subset of segments among the plurality of segments in memory; and instructing a second computing device to store a second subset of segments among the plurality of segments in memory.
-
公开(公告)号:US20230351083A1
公开(公告)日:2023-11-02
申请号:US18346949
申请日:2023-07-05
Applicant: Aurora Labs Ltd.
Inventor: Zohar Fox , Carmit Sahar
IPC: G06F30/33 , G06F11/36 , G06F16/901 , G06N20/00 , G06F8/75 , G06F17/18 , G06F8/34 , G06F8/65 , G06F8/71 , G06F21/52 , G06F21/57 , G06F21/62 , G06F18/24 , G06F21/56
CPC classification number: G06F30/33 , G06F11/3612 , G06F11/3692 , G06F16/9014 , G06N20/00 , G06F8/75 , G06F17/18 , G06F8/34 , G06F8/65 , G06F8/71 , G06F21/52 , G06F21/57 , G06F11/3604 , G06F21/6218 , G06F11/362 , G06F18/24 , G06F21/563 , G06F30/15
Abstract: Disclosed herein are techniques for identifying software dependencies based on functional line-of-code behavior and relation models. Techniques include accessing a first line-of-code behavior and relation model representing execution of functions of a first portion of executable code, the first portion of executable code being associated with a first symbol; detecting a change to the first portion of executable code; constructing, based on the changed first portion of executable code, a second line-of-code behavior and relation model representing execution of functions of the changed first portion of executable code; determining, based on the constructed second model, a dependency between (i) the changed first portion of executable code or the first symbol and (ii) a second symbol; and generating, based on the determined difference, a report identifying the dependency.
-
-
-
-
-
-
-
-
-