Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Technical Disclosure Commons

Series

2020

Articles 1 - 30 of 1097

Full-Text Articles in Entire DC Network

Detecting Dangling Pointers Using Embedded Metadata, Kentaro Hara, Benoît Lizé Dec 2020

Detecting Dangling Pointers Using Embedded Metadata, Kentaro Hara, Benoît Lizé

Defensive Publications Series

When the memory for an object is deallocated, pointers to that object become invalid. Such pointers, known as dangling pointers, can be exploited by attackers to cause undesirable or malicious program behavior. A pointer that points to memory that has been reused (reallocated) is known as a use-after-free pointer; these, too, are gateways to exploits. This disclosure describes techniques to detect the presence of dangling and use-after-free pointers in runtime and, upon detection, forestall security breaches due to such pointers by causing a program crash accompanied by a bug report. Per the techniques, both pointer and pointed-to object are augmented …


Proximity-Based Triggering Of Screen Restrictions To Avoid Eye Strain, Eric Liu Dec 2020

Proximity-Based Triggering Of Screen Restrictions To Avoid Eye Strain, Eric Liu

Defensive Publications Series

Viewing device screens in close proximity can cause eye strain. Some devices use front-facing cameras to detect and recognize faces in order to personalize the user experience (UX) to the user close to the device. However, such personalized operation does not include functionality that depends on the user’s proximity to the device screen. Proximity sensing within devices is used to turn the screen off in situations when the device is held against the user’s head. Such capacitive proximity sensing operates at distances from the screen that are relatively short. This disclosure describes techniques to change the operation of a device …


Robotic Forensic Analysis Tool For Multiple Parameter Sensing, Anonymous Dec 2020

Robotic Forensic Analysis Tool For Multiple Parameter Sensing, Anonymous

Defensive Publications Series

This disclosure describes a robotic forensic tool that includes sensing probes for performing automated forensic analysis. The robotic tool can support multiple sensing probes that are mounted such that they can hover over the device under test (DUT) and perform measurements. Tools are mounted on the robotic cantilever which enables navigation across a device under test to provide measurements of different physical properties of the device with minimal human intervention. Measurements can provide statistical analysis to drive regions of confidence and to provide inferences regarding the devices under forensic investigation. This setup includes a probe holder that enables its attachment …


Predictive Road Safety Alert System, N/A Dec 2020

Predictive Road Safety Alert System, N/A

Defensive Publications Series

This disclosure describes techniques to automatically provide alerts to users driving a vehicle when unsafe driving conditions may soon occur. An alert is determined based on vehicle speed and road conditions such as tight curves, pavement conditions, and weather, and with user permission, based on an ascertained skill of the user driving the vehicle as indicated by past driving occurrences. Safe speeds to handle upcoming road conditions can also be output. Described features provide information and guidance regarding appropriate driving speeds based on road conditions, vehicle characteristics, and driver ability.


Keyboard And Mouse Input For Controlling A Remote Machine Via A Mobile Device, Erik Jensen Dec 2020

Keyboard And Mouse Input For Controlling A Remote Machine Via A Mobile Device, Erik Jensen

Defensive Publications Series

Controlling a remote machine via a mobile device can be difficult due to the challenges in capturing touchscreen input from the mobile device in a manner that can support the various functionalities of a full external keyboard and mouse/ trackpad. Directly relaying a character corresponding to the touchscreen text input to the remote machine does not support mobile input techniques such as swiping, gliding, or flicking across the keyboard, handwriting recognition, voice input, etc., and fails for languages that require multiple key presses to generate a single character. This disclosure describes techniques to provide users of mobile devices the full …


Operating System And Method Providing For Virtual Desks, Elle Zadina, Trevor James Claiborne, Gary Hyun Jin Kim, Nikhil Siva Subash, Ahmed Fakhry, Mike Ho Dec 2020

Operating System And Method Providing For Virtual Desks, Elle Zadina, Trevor James Claiborne, Gary Hyun Jin Kim, Nikhil Siva Subash, Ahmed Fakhry, Mike Ho

Defensive Publications Series

A system and method include an operating system (OS) that provides for the creation, saving and restoration of multiple virtual desks associated with a user. Related resources, applications, windows, tabs, files and the like can be assigned to each virtual desk, thus improving organization and efficiency, and facilitating user focus. The OS stores the multiple virtual desks at the end of a session, including, for example at logout, shutdown, in the event of a system crash, and the like. The multiple virtual desks are restored to a configuration corresponding to the state at the end of the session and/or at …


Finding Out How Close Source Code Files Are To Files In The Git Version Control System., Armijn Hemel Dec 2020

Finding Out How Close Source Code Files Are To Files In The Git Version Control System., Armijn Hemel

Defensive Publications Series

A lot of popular software is developed using a version control system. Historically systems such as RCS, CVS and Subversion were used, but a lot of developers have moved to Git. These systems have a lot of information available about the history of a file. When software is distributed, it is often distributed without this history information. In some situations it is important to find out how close a certain piece of software is to any given version in a version control system, for example for assessing copyright, security research or other provenance issues.

keywords: Git, software engineering, security, defect …


Optimized Decision Making In The Power Industry Using Machine Learning, Yixin Wang, Xin Li Dec 2020

Optimized Decision Making In The Power Industry Using Machine Learning, Yixin Wang, Xin Li

Defensive Publications Series

To supply power to customers, a power company procures fuel from suppliers while also holding an inventory of such fuel and/or storing a very limited amount of excess power in a battery. Additionally, a power company may directly sell renewable energy sources to customers and exchange power with a neighboring grid to ameliorate shortages. The standard techniques of optimizing profit entail a tedious, human-driven decision-making procedure that results only in local optima. This disclosure optimizes the profit of a power company by automatically making intelligent procurement and selling decisions using machine learning. The decisions are treated as an end-to-end supply-chain …


Use Of Machine Learning To Generate Estimates Of Code Review Time And Effort, Marko Ivanković, Goran Petrovic Dec 2020

Use Of Machine Learning To Generate Estimates Of Code Review Time And Effort, Marko Ivanković, Goran Petrovic

Defensive Publications Series

Providing accurate estimates of time required to perform code reviews can enable practitioners to prioritize reviews and can help improve productivity. Currently, factors such as the number of lines of code to be reviewed, or the number of code files, are provided to the reviewer. Such factors are relatively poor predictors of the actual effort required. This disclosure describes the use of machine learning techniques to generate effort estimates of the actual human time required to perform a code review. The machine learning model is trained on a dataset that is generated based on historical code modifications and corresponding reviews. …


Identification Of Low-Value Code To Improve Efficiency Of Automated Code Analysis, Marko Ivanković, Goran Petrovic Dec 2020

Identification Of Low-Value Code To Improve Efficiency Of Automated Code Analysis, Marko Ivanković, Goran Petrovic

Defensive Publications Series

Certain software testing techniques such as mutation testing are often not utilized due to the relatively high proportion of testing activity that is not deemed useful. Such techniques can benefit from identification of high-value code. This disclosure describes the classification of different parts of a codebase into high and low value code. The techniques utilize an abstract syntax tree (AST) generated from the codebase on which predefined heuristics are applied to identify low-value code. A propagation algorithm is applied to mark low value branches. Additionally, machine learning techniques are applied to classify portions of code as high or low value. …


Secure Communication Using Deterministic Key Rotation Over Elliptic Curves, Ismail Turk Dec 2020

Secure Communication Using Deterministic Key Rotation Over Elliptic Curves, Ismail Turk

Defensive Publications Series

This disclosure describes techniques for using deterministic key rotation in encryption to secure communication of data between clients in a server-client configuration. A unique encryption key is generated by a client for each client message without exchanging the key between clients. The server can translate a message encryption key from one client to a form usable by other clients and send the encrypted message to other clients without performing re-encryption. Described techniques reduce per-message cryptographic load on a server while maintaining communication security, integrity, and privacy.


Application Of Ultrafast And Co2 Lasers For Cutting Waveguides, Moez Haque, Saeid Rezaei, Victor Isbrucker Dec 2020

Application Of Ultrafast And Co2 Lasers For Cutting Waveguides, Moez Haque, Saeid Rezaei, Victor Isbrucker

Defensive Publications Series

Techniques for the cutting of waveguides from patterned glass wafers are described. Translation of an ultrafast laser beam across a wafer is performed to mark the wafer by forming a filament curtain that is aligned to the waveguide edge profile. Chucks are used to secure the wafer during marking and subsequent separation of the waveguides. The chucks include vacuum ports placed at selected locations for debris control around the cut edges. After marking, thermal shock is induced by CO2 laser absorption for breakage along the filament curtain and waveguide separation (singulation). An optical imaging system is used to calibrate the …


Sponsored Next Steps In Search Engine, Lakshmi Kumar Dabbiru, Hinali Marfatia, Ramakrishnan Kandhan, Chalmers Wang, Gang Wu, Senthil Hariramasamy, Abhineet Bhardwaj Dec 2020

Sponsored Next Steps In Search Engine, Lakshmi Kumar Dabbiru, Hinali Marfatia, Ramakrishnan Kandhan, Chalmers Wang, Gang Wu, Senthil Hariramasamy, Abhineet Bhardwaj

Defensive Publications Series

Search engines can be accessed by client devices to improve search experiences, return on investment for content providers, and monetization of the search engine. A data processing system can construct a journey for a client device by suggesting subsequent steps for the client device to follow. The data processing system can generate search queries associated with a search query input by the client device, where each search query can include a statistical conversion rate. A subset of the search queries can be selected based on their statistical conversion rate. Consequently, the data processing system can transmit a search result including …


An Integrated Antenna Design Nearby The Laptop Computer Click Pad, Hp Inc Dec 2020

An Integrated Antenna Design Nearby The Laptop Computer Click Pad, Hp Inc

Defensive Publications Series

Consider about the modern laptop computer antenna design, the trend of

the platform development is to have more antennas module have to design

in the electric device for the multiple radio feature and increased spectrum

in electric devices. In this invention, there will be a solution to integrate

the components of the electric device when there is a lighting decoration

with the antenna integration. In this document, we will use an example of

the computer and there are 9 antennas in the laptop computer. 2 of these 9

antennas will be integrated by the click pad module and there will …


A Novel Inter-Personal Area Network Communication Mechanism For Large-Scale Low-Power And Lossy Networks, Huimin She, Harbor Dong, Chuanwei Li, Feiliang Wang Dec 2020

A Novel Inter-Personal Area Network Communication Mechanism For Large-Scale Low-Power And Lossy Networks, Huimin She, Harbor Dong, Chuanwei Li, Feiliang Wang

Defensive Publications Series

For large-scale Low-Power and Lossy Networks (LLNs), communications between nodes in different Personal Area Networks (PANs) (i.e., inter-PAN communications) typically have to traverse long routing paths, even for cases in which two nodes may be located physically close to each other. Techniques herein provide a novel mechanism to improve inter-PAN communications by utilizing the nodes that are located at the boundary of PANs.


Mechanism To Speed Up Secure Communication Handshakes In Constrained Conditions, Panos Kampanakis, Rupak Chandra Dec 2020

Mechanism To Speed Up Secure Communication Handshakes In Constrained Conditions, Panos Kampanakis, Rupak Chandra

Defensive Publications Series

It is desirable to speed up secure tunnel negotiations in constrained mediums where numerous clients are "competing" to form secure connections to destination servers or endpoints. In support of that objective, techniques are presented herein that minimize the authentication data that is transferred within encrypted tunnel handshakes under constrained conditions where the data can introduce unacceptable slowness or failures. The techniques may apply to Internet of Things (IoT) constrained environments in which bandwidth is sparse and multiple devices are competing for bandwidth. The techniques may also be used on the Internet with post-quantum algorithms, which can introduce unnecessary slowness due …


Enhanced Network Slicing For Industrial And Energy Protocols, Pascal Thubert, Patrick Wetterwald, Jonas Zaddach, Eric Levy-Abegnoli Dec 2020

Enhanced Network Slicing For Industrial And Energy Protocols, Pascal Thubert, Patrick Wetterwald, Jonas Zaddach, Eric Levy-Abegnoli

Defensive Publications Series

With the development of industry 4.0 and the recent evolution of the substation automation, as prescribed at least by the International Electrotechnical Commission (IEC) 61850 Standard, the network is becoming one of the key element of these trends. Network design and network architecture are becoming more and more complex and leading to challenging problems and issues, such as network security, multiplication of unmanaged broadcast domains, and bandwidth limitations. Recent tools have been introduced to help network engineers visualize different industrial Internet of Things (IIoT) protocol flows and characterizations for devices connected to the network. However, visualization is not enough and …


Adaptive Models For Next Generation Wide Area Networks, Balaji Sundararajan, Brandon Lynch, Gayathri Chandrasekaran, Reuel Gatus, Zaheer Aziz Dec 2020

Adaptive Models For Next Generation Wide Area Networks, Balaji Sundararajan, Brandon Lynch, Gayathri Chandrasekaran, Reuel Gatus, Zaheer Aziz

Defensive Publications Series

A software-defined wide area network (SD-WAN) controller in a cloud service delivery architecture may encounter a number of challenges including, for example, timeouts, download or push failures, etc. To address challenges of these types techniques are presented herein that support a holistic solution. Aspects of the solution comprise, among other things, understanding a device’s ability to process configuration in a real-time network and staggering a configuration push based on, for example, a device’s ability to process and consume configurations. Aspects of the solution employ, for example, the use of bandwidth knowledge to force a centralized network management system control connection …


Individualized Lifelong Learning And Career Portal, Krishna Chytanya Ayyagari Dec 2020

Individualized Lifelong Learning And Career Portal, Krishna Chytanya Ayyagari

Defensive Publications Series

This disclosure describes a career portal that provides career and job related information to a user based on insights into the learning style, aptitude, and career goals of the user. A recommendation engine includes modules for learning style determination and aptitude determination that utilize user-permitted data, e.g., from the user’s online activity and other data sources, to provide individualized course and career recommendations. A dominant learning style for the user is determined and is utilized together with their career goals to suggest coursework for the user to upgrade their skills. The recommendation engine also suggests suitable job opportunities. The described …


Novel Polymorphs Of Lorlatinib And Their Processes For The Preparation Thereof, Msn Laboratories Private Limited, R&D Center Dec 2020

Novel Polymorphs Of Lorlatinib And Their Processes For The Preparation Thereof, Msn Laboratories Private Limited, R&D Center

Defensive Publications Series

The present invention provides novel polymorphs of Lorlatinib and their processes for the preparation thereof


A Process For The Preparation Of Indoximod, Srinivasan Thirumalai Rajan Dec 2020

A Process For The Preparation Of Indoximod, Srinivasan Thirumalai Rajan

Defensive Publications Series

The present invention relates to a process for the preparation of Indoximod.


Docking Station With On-Demand Physical Memory (Ram) Enhance Processing Power And User Experience, Hp Inc Dec 2020

Docking Station With On-Demand Physical Memory (Ram) Enhance Processing Power And User Experience, Hp Inc

Defensive Publications Series

Notebook computers conventionally operate on volatile memory that is RAM for accessing multiple

programs at once with Speed and efficiency, as RAM is significantly faster than hard disk. When

operating a device with multiple heavy application that requires heavy usage of volatile memory to

process information immediately, RAM helps to succeeded with the task when there is enough of

memory available with the device’s RAM.

In designing notebook computers, there is trade‐off between the size of the RAM to be fitted for

performing better operations. Often devices have limited RAM and the applications that are being

used/ operated needs more …


Lateral Skew Compensation Diagnostic Plot For Printer Sheet Feeder Accessory, Hp Inc Dec 2020

Lateral Skew Compensation Diagnostic Plot For Printer Sheet Feeder Accessory, Hp Inc

Defensive Publications Series

In current printing systems, lateral skew is a critical parameter when

printing in single- sheet mode and has a noticeable impact on image quality.

In this disclosure, it is described a procedure to compensate this defect by

printing a diagnostic plot, measuring it and applying a correction.


Dynamic Memory Management With Reduced Fragmentation Using The Best-Fit Approach, Hp Inc Dec 2020

Dynamic Memory Management With Reduced Fragmentation Using The Best-Fit Approach, Hp Inc

Defensive Publications Series

This disclosure relates to the field of Dynamic memory management in general. Disclosed idea makes use of the

Best fit approach which makes use of the balanced trees with nodes sorted based on key values corresponding to

free memory portion sizes. Also disclosed is the method to efficiently coalesce the freed memory.

This idea addresses the disadvantages of sequential search mechanism of finding the available free space and firstfit

approach of memory management in the current flat memory-based allocators that are based on [1] approach.

The current mechanism for dynamic memory management in use in most of the systems follows …


Print Your Beauty, Hp Inc Dec 2020

Print Your Beauty, Hp Inc

Defensive Publications Series

This is an idea to enable a person to print their makeup/tattoo (cosmetics such as primer, color

correction, concealer, foundation, powder etc. applied to the face, used to enhance or alter the

appearance) quickly for any given occasion using Artificial intelligence. This saves time in this busy world.

This is a concept where a printer prints a face mask which could be applied on your face quickly to

enhance your facial beauty. This is more like have a personal beautician in your own home 24/7. The

crux of the idea is to print personalized beauty masks which could be easily …


Docking And Bridging Devices, Amelia Schladow, Philip Dam Roadley-Battin, Tyler John Gough, Seth Ryan Benson, Matthew Sibigtroth Dec 2020

Docking And Bridging Devices, Amelia Schladow, Philip Dam Roadley-Battin, Tyler John Gough, Seth Ryan Benson, Matthew Sibigtroth

Defensive Publications Series

This disclosure describes core devices, like a phone, tablet, or other screen, and how they could be docked to a second device, like a speaker or charger, to take on a new role. This disclosure describes a system that offers more flexibility and allows users to benefit from different combinations of devices. The techniques allow an object to be docked to effectively create a new device, e.g., a tablet docking to a speaker would be like a home hub, and/or to alter their function, e.g., a phone can be placed in a stand or on a charging mat to default …


A New Method For Provenance Determination Of Metals By Analyzing Samples Using Process Of Electromigration, Anonymous Dec 2020

A New Method For Provenance Determination Of Metals By Analyzing Samples Using Process Of Electromigration, Anonymous

Defensive Publications Series

This invention has direct application to Conflict Minerals programs and due diligence strategy to comply with Section 1502 of the Dodd Frank Wall Street Reform and Consumer Protection Act. It provides a novel method for establishing the provenance determination of certain metals and traceability of their mineral origins. A method for analyzing a sample by passing a very high current density into a sample, introducing the process of electromigration in the sample, recording electromigration parameters, determining the electromigration activation energy from the parameters and comparing the measured activation energy of the sample to a reference library wherein each reference sample …


Document-Level Contextual Help For Terms And Abbreviations, Muralidharan Sundararajan Dec 2020

Document-Level Contextual Help For Terms And Abbreviations, Muralidharan Sundararajan

Defensive Publications Series

This disclosure describes techniques for automatically providing additional information about selected words in-place where the words occur in a document. Per techniques of this disclosure, a list is created of selected content (terms) that may not be readily understood by a reader. Corresponding explanatory text and/or expansions are obtained. The content is suitably highlighted at their point of occurrence in the document. Upon user input selecting the content, e.g., via a mouseover or hover action, a tap on the words, etc., a pop-up or floating window is displayed in-place that includes additional contextual information for the highlighted content. The additional …


Combined Aluminum Roll-Formed Profiles, Axel Arthur Foerderreuther, Alexander Gaida, Thorolf Gerhard Schulte Dec 2020

Combined Aluminum Roll-Formed Profiles, Axel Arthur Foerderreuther, Alexander Gaida, Thorolf Gerhard Schulte

Defensive Publications Series

Aluminum roll-formed profiles in various shapes can act as various straight or bent hollow vehicle body structures, include but not limited to front bumpers, rear bumpers, roof rails, upper A-pillars, front and/or rear longitudinals, and/or seat cross-members, among others, and may be use for various vehicles, including but not limited to commercial vehicles, trucks, busses, vans, and/or railway cars, among others. Aluminum roll-formed profiles may provide strength and/or energy absorption in case of crash events, and may be particularly useful for structures with high crash load requirements. In addition, relatively small bending radii (depending on alloy choice, temper during forming …


Novel Secured Inter-Personal Area Network Group Management In Low-Power And Lossy Networks, Nan Yi, Wenjia Wu, Huimin She, Lele Zhang Dec 2020

Novel Secured Inter-Personal Area Network Group Management In Low-Power And Lossy Networks, Nan Yi, Wenjia Wu, Huimin She, Lele Zhang

Defensive Publications Series

Low-power and Lossy Network (LLN) environments may comprise, possibly among other things, different personal area networks (PANs) resulting in, for example, node communication challenges across or between PANs. To address these types of challenges, techniques are presented herein that support a novel secure group management method to self-solve the inter-PAN problem that is both low-cost and customer-friendly. Aspects of the techniques presented herein encompass establishing a secure node-to-node (N2N) communication link between involved inter-PAN nodes, automatically looking for the relay neighbors between different PANs (as the inter-PAN node can help with forwarding the local the Routing Protocol for LLN (RPL) …