Open Access. Powered by Scholars. Published by Universities.®
- Publication Year
Articles 1 - 30 of 7326
Full-Text Articles in Entire DC Network
Method For Data Exchange Between A Transmitter/Receiver Unit On A Filter Element And A Further Transmitter/Receiver Unit
Defensive Publications Series
The paper is based on the task of enabling secure data exchange between a transmitter/receiver unit on a filter element and another transmitter/receiver fangs unit. This task is solved according to the paper. The method according to the paper is used for data exchange between a transmitter/receiver unit on a filter element and a further transmitter/receiver unit outside the filter element. With the help of the data exchange, in which a data signal is transmitted in encrypted form, a filter element can be identified, for example, so that the installation of a non-matching filter element in a filter housing can …
Retrieval-Augmented Generation (Rag) Classification And Access Control, Assaf Namer, Robert Lagerström, Gopinath Balakrishnan, Brandon Maltzman
Retrieval-Augmented Generation (Rag) Classification And Access Control, Assaf Namer, Robert Lagerström, Gopinath Balakrishnan, Brandon Maltzman
Defensive Publications Series
Retrieval-augmented generation, a technique to improve the accuracy of responses of large language models (LLM), can result in an expanded attack surface for the LLM and an increased potential for exfiltration of sensitive data. This disclosure describes techniques to reduce the attack surface for LLMs that use retrieval-augmented generation. In a data upload phase, access permissions of data resources are recorded and quantified. Implicit permissions granted by the LLMs to different principals are assessed. If a data classification scheme is added to the data resources, a score can measure the risk of a prompt provided to the LLM, thus forestalling …
A Method To Secure A Mobile Payment Application Solution On A Cardholder-Owned Mobile Device, John Markh, Ian Javkin, Yeuxi Chen, Angelito Paca, Victor Tambunan, Marc Kekicheff, Sergey Smirnoff
A Method To Secure A Mobile Payment Application Solution On A Cardholder-Owned Mobile Device, John Markh, Ian Javkin, Yeuxi Chen, Angelito Paca, Victor Tambunan, Marc Kekicheff, Sergey Smirnoff
Defensive Publications Series
Disclosed are methods for securing a mobile application on a cardholder-owned device, including defining principles and minimum security requirements for mobile applications that are designed to capture contactless payment instrument data and perform a cryptographic authentication of the contactless payment instrument. The present disclosure provides a solution that outlines minimum security requirements and evaluation guidance for mobile applications designed to capture data (e.g., a PAN, a cardholder’s name, an expiry data, an EMV cryptogram, etc.) of a contactless payment instrument using short-range communication, such as near-field communication (NFC), and further designed to perform a cryptographic authentication of the payment instrument.
Computationally Efficient Hdr Video Using A Packed Video Gain Map, Na
Computationally Efficient Hdr Video Using A Packed Video Gain Map, Na
Defensive Publications Series
Gain map is a set of techniques that provide a consistent high dynamic range (HDR) appearance of visual content across devices based on an adaptation of the content to the capabilities of the display. When gain maps are applied to video, the reconstructed video frames require two decodes, one for the base frame and another for the gain-map frame, thereby doubling processing requirements. This disclosure describes techniques that reduce the number of decodes in gain-mapped video by scaling down the resolution of the gain-map frames and by packing them together into one frame. Gain map decodes that are conventionally performed …
Method And System For Authenticating Payment Transactions Based On Qr Code Scanning Behavior, Kaushal Kumar Jha, Vaibhav Shukla
Method And System For Authenticating Payment Transactions Based On Qr Code Scanning Behavior, Kaushal Kumar Jha, Vaibhav Shukla
Defensive Publications Series
The present disclosure relates to a method and system for authenticating payment transactions based on the unique way a user scans a QR code using their devices. The camera of the device is used to capture a QR code. Other sensors on the device are used to collect data related to the user's hand movements, including speed, angle, and path of hand movement while the user is scanning the QR code. The collected data is transmitted to an authentication server. The authentication server analyzes the received data and creates a unique, user-specific scanning behavior profile. The scanning behavior profile is …
A Multimodal System And Method For Dynamic Simplification Of Complex Content, Peter Hraška, Marek Šuppa, Andrej Baran, Peter Komorník, Daniela Jašš
A Multimodal System And Method For Dynamic Simplification Of Complex Content, Peter Hraška, Marek Šuppa, Andrej Baran, Peter Komorník, Daniela Jašš
Defensive Publications Series
A multimodal system and method that facilitates the dynamic simplification of complex content is presented herein. The system and method may enable an individual to understand complex information by simplifying the information, in an optimized and personalized manner, so that the amount of knowledge that can be extracted from the information may be maximized for the individual.
Method And System For Seamless Payment Card Transaction Continuity Using Backup Payment Card Retry Mechanism, Alok Roy
Defensive Publications Series
One embodiment includes a method performed by a payment network processor. The method includes identifying a failed transaction. For example, the customer initiates a transaction process which may be rejected by the issuer resulting in a failed transaction. The method includes payment network processor detecting a failed transaction in real time and identifying the reason for a failed transaction. Additionally, if the identified reason for a failed transaction is one of the valid retry reasons, the payment network processor initiates a retry mechanism by retrieving the backup payment card details stored in the database of the payment network processor 106, …
Context-Based, Dynamic User Interface For A Navigation App, Tom Spigland, Ziv Tzur
Context-Based, Dynamic User Interface For A Navigation App, Tom Spigland, Ziv Tzur
Defensive Publications Series
The user interface of digital map and navigation apps can be cluttered with information and alerts and is not personalized to the user. This disclosure describes techniques that dynamically adjust the presentation of various alerts within the user interface of a digital map/navigation application based on the user context and preferences (obtained with user permission) and on the alert type, e.g., point-based alert or segment-based alert. Dynamic adjustment of the presentation of alerts enables the app to tailor the provision of insights and contextually relevant information to the context, effectively reducing distractions and helping drivers make better decisions. Alerts are …
Geothermal Reinjection Apparatus And Method, Baker Hughes Company
Geothermal Reinjection Apparatus And Method, Baker Hughes Company
Defensive Publications Series
A geothermal reinjection apparatus, including a first string, a second string, a side pocket mandrel connected to the first string and connected to the second string, and a recombination valve in the side pocket mandrel to control injection of gasses from the second string into the first string. A method for reinjecting geothermal waste products including pumping water through a first string, pumping gasses through a second string, and combining the gasses and the water by injecting the gasses into the water in a side pocket mandrel connected to both the first string and the second string. A geothermal well, …
Ai Assistant-Supported Calls, Gajen Agrawal, Ramprasad S, Ajay Prasad, Saurabh Drolia
Ai Assistant-Supported Calls, Gajen Agrawal, Ramprasad S, Ajay Prasad, Saurabh Drolia
Defensive Publications Series
This publication describes a system and techniques for artificial intelligence (AI)-enhancement of phone calls by determining a context of the call (e.g., a potential purpose of the incoming call, that one or more events are associated with an incoming call or call member, a request for identity verification, a request for payment information, potential for conversational enhancements, etc.) and providing relevant information that is based on the context to a user prior to and during the phone calls. Described techniques may enable the use of an AI assistant to identify and provide relevant conversational components to a user. Aspects of …
Smooth Carcass For Unbonded Flexible Pipe Of The Type Described By Api 17j
Smooth Carcass For Unbonded Flexible Pipe Of The Type Described By Api 17j
Defensive Publications Series
To address issues of flow induced pulsations (FLIP) and pressure loss reduction for the flowing of fluids through an unbonded flexible pipe
Simulating Authentic User Personas To Generate Analytics For Evaluating Digital Products, Oded Elyada, Oriana Riva, Avia Aharon, Ido Hakimi, Ron Ziv, Danny Karmon
Simulating Authentic User Personas To Generate Analytics For Evaluating Digital Products, Oded Elyada, Oriana Riva, Avia Aharon, Ido Hakimi, Ron Ziv, Danny Karmon
Defensive Publications Series
It is challenging to acquire user data from a diverse set of adequate numbers of suitable real end users for design, evaluation, and improvement of a product. Involving real users in evaluation requires a sufficient level of product maturity. It is difficult to bootstrap and test personalization because it requires personal data. This disclosure describes techniques to overcome these limitations by generating synthetic data that mimics authentic digital and social user practices via simulated personas with local memory. The simulation utilizes the semantic understanding and reasoning capabilities of LLMs and includes interaction between the personas and various digital applications and …
The Composite Projection Configuration That Contains 8 Projection Configurations Which Are Collectively Configured In An Octagonal Configuration., Punarjeewa Abeysekera
The Composite Projection Configuration That Contains 8 Projection Configurations Which Are Collectively Configured In An Octagonal Configuration., Punarjeewa Abeysekera
Defensive Publications Series
This paper describes a composite projection configuration that contains 8 projection configurations which are collectively configured in an octagonal configuration. The composite projection configuration consists of 8 identical projection configurations. Each projection configuration will contain a video projecting display, a convex lens stack and an angled beam splitter. The composite projection configuration, by collectively utilizing the 8 identical projection configurations, will have the capability to project 8 projections onto the field of view of the user. And the composite projection configuration, by collectively utilizing the 8 projections, will have the capability to combine the 8 projections into a one single …
Spherical Radius Hanger
Defensive Publications Series
A surface wellhead assembly having an inner tubular insertable into an outer tubular, is described. A tubing hanger is provided on an outer surface of the tubing head housing for sealing between the hanger and housing. The contact sealing of tubing hanger has a shepherd.
When the inner tubular member is landed, a portion of the shepherd radius adjacent to the outer taper seal of tubing housing tapers radially inward into sealing contact when the tubing hanger or tubing housing is not perfect perpendicular.
Sick Mode Selection For Audio Control, Hp Inc
Sick Mode Selection For Audio Control, Hp Inc
Defensive Publications Series
During the online meeting, sometimes we cough or sneeze suddenly, and the sound will be transmitted to the online meeting through the microphone. To avoid having disruptive coughing sounds, throat clearing noises, and sneeze noise during online meetings, we would like to have a function to eliminate coughing sounds. We hope this function can directly remove the coughing noise from online meetings, allowing all participants to speak smoothly and listen clearly to each other's content.
Digital Ball Of Yarn For Indoor Positioning And Path Tracing, Manasa Babu
Digital Ball Of Yarn For Indoor Positioning And Path Tracing, Manasa Babu
Defensive Publications Series
Navigation through complex indoor environments can be disorienting, a problem that is compounded by limited accuracy of indoor positioning techniques. This disclosure describes techniques that enable users to digitally trace their path and to enable them to retrace their path from the destination back to the start point. With user permission, tracing starts when a user marks their present spot. Tracing the user’s path is based on data from various sensors on a smartphone, wearable device, or other devices. As the user moves, the digital yarn unspools, recording the user’s movement. A visual trail is created and displayed as an …
Multi-Sensor Scheduling And Preconditioning For Remote Temperature Control, Eric Burger, Ernie Yang, Ben Mccanny
Multi-Sensor Scheduling And Preconditioning For Remote Temperature Control, Eric Burger, Ernie Yang, Ben Mccanny
Defensive Publications Series
Smart home devices can support multi-sensor scheduling, monitoring, and adjusting of home heating, ventilation, and air-conditioning (HVAC) based on a schedule set by a user. Schedule-based temperature presets across changing groups of sensors can experience problems arising from stale/offline sensors, preconditioning, and an excessive memory footprint of the schedule. This disclosure describes techniques of multi-sensor, multi-room remote temperature control that can process user-set temperature schedules across changing groups of sensors while gracefully handling stale/offline sensors and preconditioning constraints. The techniques have a low memory footprint. Readings from sensors are weighted based on recency, such that stale/offline sensors are gracefully removed …
Text Steganography Using Large Language Model, N/A
Text Steganography Using Large Language Model, N/A
Defensive Publications Series
While encryption can ensure secure message exchange, the use of encryption can draw attention to the communication because encrypted content is not human readable. While text steganography can embed hidden messages in human-readable text, it is vulnerable to disclosure to unintended recipients. This disclosure describes steganography techniques that leverage machine learning techniques, specifically generative pre-trained transformer (GPT) type large language model (LLM) to generate human-readable natural language text that seamlessly conceals a different message within the text. The use of GPT can enhance the fluency and coherence of the natural language text, thus making it difficult to detect the secret …
A Point-Of-Sale Digital Payment Device For Extending Credit, Ajay Prasad, Gajen Agrawal
A Point-Of-Sale Digital Payment Device For Extending Credit, Ajay Prasad, Gajen Agrawal
Defensive Publications Series
In the absence of credit scores, credit penetration remains low in many regions of the world. This limits economic opportunities for a large portion of the global population that lack credit histories. For many users, traditional sources of credit such as banks or microfinance institutions are difficult to access and cumbersome and are not tailored to their financial needs. This disclosure describes a compact, internet-connected payment device that can be deployed at small and medium-sized business (SMB) outlets. The device serves both as a digital payment terminal as well as an access point for credit discovery and lending. With appropriate …
Traffic Signal Wait Time Estimation Using Machine Learning, Ajay Prasad
Traffic Signal Wait Time Estimation Using Machine Learning, Ajay Prasad
Defensive Publications Series
Urban areas include a large number of traffic intersections and signals. Wait times at traffic signals can be long at times and can lead to user frustration. While digital map applications can provide predictions of overall time of travel for a journey and can also indicate congested parts of the route, these cannot reduce the frustration of waiting at a traffic signal. This disclosure describes the use of machine learning prediction models to automatically generate real-time predictions of wait times at intersections along a route. The predictions are based on historical data as well as on current traffic patterns, weather …
Generating Photorealistic Images Of Physical Products Placed Within A Target Space, Siva Kumar Gorantla, Brendan Driscoll, Ishaan Malhi, Garima Pruthi, Krista Holden, Praneet Dutta, Arunachalam Narayanaswamy
Generating Photorealistic Images Of Physical Products Placed Within A Target Space, Siva Kumar Gorantla, Brendan Driscoll, Ishaan Malhi, Garima Pruthi, Krista Holden, Praneet Dutta, Arunachalam Narayanaswamy
Defensive Publications Series
In many use cases, it is useful to visualize a product within a target environment. This disclosure describes techniques to train and employ image generation artificial intelligence models to generate photorealistic images of one or more products placed within a target physical environment. The user can interact with the generated image to obtain additional views with different placement and/or orientation of the product in different rooms/ room types. The generated images provide the user with a high-quality visualization that enables them to evaluate the fit and aesthetics of the product within the target physical environment. The models are trained to …
Geometric And Perspective Distortion Correction For Videoconferencing Systems, Hp Inc
Geometric And Perspective Distortion Correction For Videoconferencing Systems, Hp Inc
Defensive Publications Series
Wide angle lenses are used in videoconferencing systems for meeting rooms to fit everybody in the picture. But this type of lens cannot mimic human vision since they have geometric and perspective distortion. We propose a method to correct both types of distortion.
Process For The Preparation Of Amorphous Form Of Trisodium Sacubitril Valsartan, Anonymous
Process For The Preparation Of Amorphous Form Of Trisodium Sacubitril Valsartan, Anonymous
Defensive Publications Series
The present publication relates to process for preparation of amorphous form of Trisodium Sacubitril Valsartan of Formula I.
Progressive Audience Reduction For User-Generated Content, Marek Matejka
Progressive Audience Reduction For User-Generated Content, Marek Matejka
Defensive Publications Series
As disclosed herein, a computer-implemented method for progressive audience reduction is provided. The computer-implemented method may include receiving, via a user interface associated with a social media platform, a selection of a group of users to provide with an access to a content associated with a first user of the group of users. The computer-implemented method may include activating an access reduction for the content. The computer-implemented method may include updating, based on the instruction, a metadata of the content. The computer implemented method may include providing, based on the metadata, the access to the content to the group of …
Foil Take-Up Detection In Smt Feeder Modules
Foil Take-Up Detection In Smt Feeder Modules
Defensive Publications Series
A foil catching mechanism that incorporates a detection part connected to a movable stuffing wheel and a movable peeling wheel such that movements of the stuffing wheel and peeling wheel can each be detected by the detection part. In this way, it is possible to detect the foil being caught at both the peeling wheel and the stuffing wheel, indicating successful take-up. Consequently, the system can automatically respond to any catching failures and retry the operation. This set-up allows both detections (foil in peeling wheel and foil in stuffing wheels) to be achieved by a single detector within a very …
Fast Llm Inference By Early Autoregression Abort Based On Query Complexity, D Shin
Fast Llm Inference By Early Autoregression Abort Based On Query Complexity, D Shin
Defensive Publications Series
Deep transformer decoder architectures utilized in large language models (LLMs) perform a series of non-linear operations on input tokens to predict the most likely next tokens. Executing a fixed number of decoder operations to compute the output tokens means that all queries have the same or similar computational cost. This disclosure describes a language model framework that performs autoregressive output at several intermediate layers, with training including a net loss for token completion at all inference layers to allow for early abort for simple queries. An arbiter network is provided that analyzes the input query and outputs a one-hot vector …
Thermal Pads With Curved Surface For Improved Thermal Efficiency, N/A
Thermal Pads With Curved Surface For Improved Thermal Efficiency, N/A
Defensive Publications Series
This disclosure describes a thermal pad that provides high thermal efficiency when affixed to a heat source in electronic components. The thermal pad is pre-shaped into a dome (spherically or contoured) shape that is thicker at the center and thinner at the perimeter. The thermal pad includes a curved (dome shaped) surface. When clamping forces are applied during assembly, a surface of the thermal pad comes into contact with a surface of the heat source, first at the center of the contact area, and then over a progressively greater surface area. The gradual coverage of the surface area, starting at …
Instrumented Payloads For Industrial Mobile Robots And Conveyor Systems, N/A
Instrumented Payloads For Industrial Mobile Robots And Conveyor Systems, N/A
Defensive Publications Series
Industrial mobile robots (IMR) can potentially collect useful data about their operating environments. However, integrating environmental sensors into IMRs can be costly and labor intensive. This disclosure describes a container instrumented with sensor telemetry that can be transported aboard IMR or conveyor systems already in use by operators. The IMR or conveyor systems provide transportation to the instrumented payload and enable operators to collect environmental data while the instrumented payload is in transit. As environmental data within a warehouse is usually collected at periodic intervals, it is economical for robots to pick up an instrumented payload to run a telemetry …
Compact Dual-Sided Thermal Solution Retention For High Component Density, N/A
Compact Dual-Sided Thermal Solution Retention For High Component Density, N/A
Defensive Publications Series
In small form factor devices, mounting for fastening thermal solutions are constrained. This is particularly challenging when surface-mount technology (SMT) components require cooling on both the primary and secondary sides of a two-sided printed circuit board (PCB) assembly. This disclosure describes techniques to optimize the physical stability of thermal solutions by balancing the load across different surface-mount technology (SMT) components that require cooling. Per the techniques, a sliding, spring-loaded captive screw is attached to the primary thermal solution by way of through-travel of a threaded section that is precisely controlled for thread pitch and length such that it can rotate …
Continuously Adjustable Thermal Solution Load Cell, N/A
Continuously Adjustable Thermal Solution Load Cell, N/A
Defensive Publications Series
Mechanical screw-actuated assemblies, referred to as load cells, are used to apply force to a thermal interface material (TIM) layer between an application-specific integrated circuit (ASIC) and a thermal solution, such as a heatsink. The force applied by the load cells is crucial for the performance of the thermal interface and the optimal levels of force loading are unknown at the start of a design process. This disclosure describes techniques that enable the tuning of thermal solution retention forces to optimal levels. The uncertainty in loading force is addressed by including a continuously adjustable spool nut within the load cell …