17th week of 2016 patent applcation highlights part 44 |
Patent application number | Title | Published |
20160117493 | WORKING METHOD OF SMART KEY DEVICE - A working method of a smart key device, in which it includes: power on the smart key device; the smart key device reads Bluetooth module parameters, and determines whether the Bluetooth module parameters are read successfully, if the parameters are read successfully, switch the Bluetooth module to connection state, and execute a next step; if the parameters are not read successfully, execute the next step directly; the smart key device determines whether working voltage is lower than a preset value, if yes, prompt low voltage state, and the device is turned off after a first preset time; if no, the device tests working voltage and waits for an interrupt trigger signal; when the device receives the interrupt trigger signal, enter corresponding interruption according to the interrupt trigger signal, after execute corresponding interrupt processing, exit corresponding interruption and continue to test the working voltage. The present invention can unify interfaces of mobile devices, so as to make mobile payment safer and more convenient. | 2016-04-28 |
20160117494 | KEYBOARD NEUTRAL AUTHENTICATION - A method of performing user authentication including the steps of receiving a password comprising a sequence of characters, accessing one or more alternative keyboard layout definitions, generating one or more additional passwords from applying the alternative keyboard layout definitions to the sequence of characters, and using the received password and the additional passwords in the user authentication process. | 2016-04-28 |
20160117495 | ACCESS BLOCKING FOR DATA LOSS PREVENTION IN COLLABORATIVE ENVIRONMENTS - Data loss prevention (DLP) systems may be implemented in conjunction with collaborative services that may be integrated with or work in coordination with productivity services. Administrators may be enabled to configure DLP policies in the collaborative service to mitigate their organization's information disclosure risks, along with the detection and remediation of sensitive information. Access blocking may be one feature of the DLP system, where provision of access blocking may include determining if a detected action associated with content processed by the collaborative service matches access blocking criteria defined by DLP policy rules. In response to the determination that the action matches at least one access blocking criterion defined by the DLP policy rules, a block access tag associated with the content may be activated, previously defined permissions associated with the content may be ignored or altered, and access to the content may be restricted to a number of predefined users. | 2016-04-28 |
20160117496 | INTELLIGENT ACCESSORIES FOR MEDICAL DEVICES - An accessory for a host medical device that is capable of authenticating itself to the host medical device. The accessory includes an onboard facility for authenticating the accessory to the host medical device. Various embodiments of the accessory enable it to validate itself to the host medical device without the host medical device reading any stored information from the accessory. | 2016-04-28 |
20160117497 | COMPUTING PLATFORM SECURITY METHODS AND APPARATUS - Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution. | 2016-04-28 |
20160117498 | COMPUTING PLATFORM SECURITY METHODS AND APPARATUS - Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution. | 2016-04-28 |
20160117499 | System and Method for Password Recovery - A method and system for password recovery in computer applications is disclosed. Passwords in the same computer application may be recovered according to different criteria. Criteria for password recovery vary according to the sensitivity of the password-protected material. Criteria for recovery of a password protecting sensitive information have more stringent criteria than criteria for recovery of passwords protecting less sensitive information. In certain embodiments, passwords may be recovered through the use of third party agents. Recovered passwords are associated with unique identifiers, such as email addresses and phone numbers that facilitate communication with a user. Recovered passwords may be transmitted to users via email, phone, and text message or by any other means associated with the unique identifier. Biometric data may also be used to recover a password. | 2016-04-28 |
20160117500 | DEVICE SECURITY USING USER INTERACTION ANOMALY DETECTION - A mobile device security system can include circuitry configured to receive first user-interaction information associated with the mobile device. The first user-interaction information can be indicative of first sensed interactions of a user with the mobile device during a first period of time. The system can also include circuitry configured to receive second user-interaction information associated with the mobile device. The second user-interaction information can be indicative of second sensed interactions of a user with the mobile device during a second period of time that is subsequent to the first period of time. The system can also include circuitry configured to compare the first and second user-interaction information. The system can also include circuitry configured to report anomaly information to a security service of the mobile device and/or a remote system, where a difference between the first and second user-interaction information exceeds a threshold. | 2016-04-28 |
20160117501 | SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME - A pipelined processor comprising a cache memory system, fetching instructions for execution from a portion of said cache memory system, an instruction commencing processing before a digital signature of the cache line that contained the instruction is verified against a reference signature of the cache line, the verification being done at the point of decoding, dispatching, or committing execution of the instruction, the reference signature being stored in an encrypted form in the processor's memory, and the key for decrypting the said reference signature being stored in a secure storage location. The instruction processing proceeds when the two signatures exactly match and, where further instruction processing is suspended or processing modified on a mismatch of the two said signatures. | 2016-04-28 |
20160117502 | Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems - Procedures are described for enhancing target system execution integrity determined by power fingerprinting (PFP): by integrating PFP into the detection phase of comprehensive defense-in-depth security; by deploying a network of PFP enabled nodes executing untrusted devices with predefined inputs forcing a specific state sequence and specific software execution; by embedding module identification information into synchronization signaling; by combining signals from different board elements; by using malware signatures to enhance PFP performance; by automatic characterization and signature extraction; by providing secure signature updates; by protecting against side-channel attacks; performing real-time integrity assessment in embedded platform by monitoring their dynamic power consumption and comparing it against signatures from trusted code, including pre-characterizing power consumption of the platform by concentrating on trace sections carrying the most information about the internal execution status; by using PFP from sequence of bit transitions to detect deviations from authorized execution of software in a digital processor. | 2016-04-28 |
20160117503 | Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems - Procedures are described for enhancing target system execution integrity determined by power fingerprinting (PFP): by integrating PFP into the detection phase of comprehensive defense-in-depth security; by deploying a network of PFP enabled nodes executing untrusted devices with predefined inputs forcing a specific state sequence and specific software execution; by embedding module identification information into synchronization signaling; by combining signals from different board elements; by using malware signatures to enhance PFP performance; by automatic characterization and signature extraction; by providing secure signature updates; by protecting against side-channel attacks; performing real-time integrity assessment in embedded platform by monitoring their dynamic power consumption and comparing it against signatures from trusted code, including pre-characterizing power consumption of the platform by concentrating on trace sections carrying the most information about the internal execution status; by using PFP from sequence of bit transitions to detect deviations from authorized execution of software in a digital processor. | 2016-04-28 |
20160117504 | IDENTITY THEFT COUNTERMEASURES - In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing. | 2016-04-28 |
20160117505 | LARGE-SCALE, TIME-SENSITIVE SECURE DISTRIBUTED CONTROL SYSTEMS AND METHODS - Large-scale, time-sensitive secure distributed control systems and methods are disclosed. According to an aspect, a method includes detecting an anomaly at a module among a plurality of modules in a network. The method also includes adjusting a reputation level of the module associated with the detected anomaly. Further, the method includes controlling interaction of the module associated with the detected anomaly within the network based on the adjusted reputation level. | 2016-04-28 |
20160117506 | Security Controlled Multi-Processor System - Embodiments of the present disclosure provide systems and methods for implementing a secure processing system having a first processor that is certified as a secure processor. The first processor only executes certified and/or secure code. An isolated second processor executes non-secure (e.g., non-certified) code within a sandbox. The boundaries of the sandbox are enforced (e.g., using a hardware boundary and/or encryption techniques) such that code executing within the sandbox cannot access secure elements of the secure processing system located outside the sandbox. The first processor manages the memory space and the applications that are permitted to run on the second processor. | 2016-04-28 |
20160117507 | Evaluating Customer Security Preferences - Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer. | 2016-04-28 |
20160117508 | SIO DEVICE WITH SPI BUS GATEWAY CONTROLLER FOR WRITE PROTECTION - A serial input/output (SIO) device with a serial peripheral interface (SPI) bus gateway controller. The gateway controller retrieves operation code (opcode) from a signal from the SPI bus and an address number from the signal; the gateway controller further compares the retrieved opcode with a restrict opcode, the retrieved address number with a restrict address number. When either the retrieved opcode matches the restrict opcode, or the retrieved address number matches the restrict address number, the gateway controller blocks the signal. | 2016-04-28 |
20160117509 | METHOD AND SYSTEM FOR KEEPING DATA SECURE - The present disclosure provides a method and system for keeping data secure. The method includes: acquiring at least one audio signal and assigning the segment to an audio frame having a predetermined size; partitioning the data to be kept into a plurality of portions with a maximum capable bit the data kept in each of the sampled points; | 2016-04-28 |
20160117510 | Computer Security System and Method to Protect Against Keystroke Logging - Static security credentials are replaced by pseudonyms and session-specific passwords to increase security associated with user login attempts, and specifically to defeat keylogging attacks. For each login event, the system generates unique, session-specific credentials by randomly replacing characters within a given username and password. The random character generation ensures that system login attempts use different combinations of characters, thereby producing a new username and password for every user session. The client side of the system requires only the capability to display an image file, with specialized software/hardware limited to the server side, thereby facilitating the use of the system by a wide range of client devices. | 2016-04-28 |
20160117511 | DIGITAL CONTENT EXECUTION CONTROL MECHANISM - The present disclosure provides a method and system for generating digital content for a computing device which will function on the computing device only after successful validation. The system installs one or more checks in the digital content that restrict the execution of the digital content to a specific device for which the digital content is generated. The checks pertain to at least one or more parameters of a device including without limitation, a device ID, a device model, or any device specific feature. In addition, the system generates a protected version of the digital content with the one or more installed checks to be transmitted to a client. | 2016-04-28 |
20160117512 | COMPUTING SYSTEM WITH INFORMATION PRIVACY MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: a control unit configured to: obtain an information release setting for a raw user information, the raw user information including an information attribute; determine an information format for the information attribute of the raw user information; determine a privacy notion based on the information release setting; generate perturbed user information from the information attribute based on the privacy notion, wherein the information format for the raw user information is preserved in the perturbed user information; and a communication unit, coupled to the control unit, configured to transmit the perturbed user information. | 2016-04-28 |
20160117513 | APPLICATION EXECUTING METHOD AND DEVICE, AND RECORDING MEDIUM THEREOF - A system and method for setting windows to either a traceable mode or a non-traceable mode, and selectively executing an application in a window to restrict data storage related to the application execution is provided. The method includes selecting at least one window displayed by a device based on a user input sensed by the device, setting the selected window to a non-traceable mode, executing an application in the window and restricting storage of data generated according to the execution of the application in the window set to the non-traceable mode. | 2016-04-28 |
20160117514 | DATA ACCESS CONTROL SYSTEMS AND METHODS - Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a computer includes a main motherboard card coupled to all input/output devices connected to the computer, and a trusted operating system operates on the main motherboard which includes an access control module for controlling access to the protected data in accordance with rules. The trusted operating system stores the protected data in an unprotected form only on the memory devices on the main motherboard. The computer may also have a computer card coupled to the main motherboard via a PCI bus, on which is operating a guest operating system session for handling requests for data from software applications on the computer. A tamper detection mechanism is provided in the computer for protecting against attempts to copy the unprotected form of the protected data onto memory devices other than the one or more memory devices used by the motherboard or computer card. | 2016-04-28 |
20160117515 | Establishing and Maintaining an Authenticated Connection Between a Smart Pen and a Computing Device - A system and method establishes a connection between a smart pen and a computing device, and establishes a privilege level that regulates data requests for specific data from the smart pen. The smart pen determines whether a connection should be established between the smart pen and a computing device, based on device information received from the computing device. If a connection is established, a privilege level is established for an application executing on the computing device based on the device information, which determines whether a request from the application for specific data from the smart pen is allowed or denied. | 2016-04-28 |
20160117516 | METHOD AND APPARATUS FOR ENCRYPTING AREA OF ELECTRONIC DOCUMENT - A method and apparatus for encrypting an area of an electronic document are provided. The method includes displaying the electronic document, receiving an input signal including information about a first point and a second point of the electronic document, shifting an area adjacent to the first point toward the second point in response to the input signal, displaying only an area of the electronic document other than an encrypted area determined according to a result of the shifting, and enabling a lock mode that maintains a state of displaying the area other than the encrypted area. | 2016-04-28 |
20160117517 | PROVIDING POLICY TIPS FOR DATA LOSS PREVENTION IN COLLABORATIVE ENVIRONMENTS - A policy tip or end user notification is provided for data loss prevention in collaborative environments. A document interactivity application detects an action or trigger by an end user that affects a document. The document is processed, through a classification engine and a unified policy engine, with policies based on the action to detect a matched policy. A policy tip associated with the matched policy is identified and displayed on the display device in association with the document. | 2016-04-28 |
20160117518 | File Encryption/Decryption Device And File Encryption/Decryption Method - Provided are a file encryption and decryption device and file encryption and decryption method. The encryption device comprises: one or more non-transitory computer readable medium configured to store computer-executable instruction; at least one processor to execute the computer-executable instruction to cause: selecting important data in a source file to be encrypted; receiving the important data selected by the selector and encrypting the important data according to a pre-set encryption algorithm; receiving the encrypted important data provided by the encryptor and storing the encrypted important data at a specified first location; a deletion component for deleting the unencrypted important data in the source file; generating encryption information according to the above encryption procedure and storing the encryption information at a specified second location, the encryption information at least including the original location of the important data in the source file. | 2016-04-28 |
20160117519 | MULTI-LEVEL SECURITY SYSTEM FOR ENABLING SECURE FILE SHARING ACROSS MULTIPLE SECURITY LEVELS AND METHOD THEREOF - A multi-level security system includes a storage medium partitionable into a plurality of partitions, a file system coupleable to the plurality of partitions, and a plurality of enclaves. Each enclave is assigned a security classification level. Each enclave resides in a different storage partition of the storage medium. Data stored on the storage medium is cryptographically separated at rest on a per-enclave basis. Cryptographic separation occurs at the disk block level, allowing individual blocks to be read and decrypted. The system also includes a reference monitor that enforces a system security policy that governs access to information between the enclaves. The reference monitor allows an enclave having a first classification level to securely read-down to an enclave having a second classification level lower than the first classification level and to write to another enclave having the first classification level. | 2016-04-28 |
20160117520 | METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK - A method and system of distributing files among devices is described. The method and system permits users and authors to create customized channels for filtering the automatic distribution of content. Each content item can have an associated plurality of tags, and each user's device can define a channel as a set of tag values. The channel definition and filtering may also be used to control, restrict or monitor distribution of content through the system. | 2016-04-28 |
20160117521 | COMPUTER SYSTEM FOR STORING AND RETRIEVAL OF ENCRYPTED DATA ITEMS, CLIENT COMPUTER, COMPUTER PROGRAM PRODUCT AND COMPUTER-IMPLEMENTED METHOD - The invention relates to a computer system comprising a client computer ( | 2016-04-28 |
20160117522 | PROBABILISTIC SURFACING OF POTENTIALLY SENSITIVE IDENTIFIERS - Probabilistic surfacing of potentially sensitive identifiers is provided. In one embodiment of the present invention, a method of and computer program product for surfacing of potentially sensitive identifiers are provided. An input string is read. The input string has a length. The input string is divided into a plurality of tokens. Each of the tokens has a predetermined length. A score is determined for each of the plurality of tokens. A composite score is determined based on the scores of each of the plurality of tokens. Whether the input string comprises an identifier is determined by comparing the composite score to a predetermined threshold. | 2016-04-28 |
20160117523 | System and Method for Selectively Sharing Information - Disclosed is a system and method for selectively sharing information among users of a computer application. Specific utility in healthcare applications is disclosed, but the scope of the invention is not limited to healthcare applications. The method involves selecting specific users, with whom information will be shared, a method for selecting such users' restrictions on the information that can be accessed by such users. Also disclosed is a system and method through which certain users can transmit communications on behalf of other users. | 2016-04-28 |
20160117524 | ENHANCED VIEW COMPLIANCE TOOL - An apparatus comprises a network interface and a processor communicatively coupled to the network interface. The network interface communicates with a database comprising a plurality of columns and a plurality of views. Each view is associated with at least one column of the plurality of columns. The processor receives a request to determine one or more noncompliant views of the database. For each view and each column associated with the view, the processor determines whether the column is associated with a privacy indicator that indicates that the column should be masked and whether the view masks the column. The processor then determines that the view is noncompliant if the view does not mask at least one column that should be masked, and generates a report that indicates whether each view of the database is noncompliant. The network interface communicates the report. | 2016-04-28 |
20160117525 | Mobile Privacy Information Proxy - An approach is provided for managing data being transmitted from a mobile device. The mobile device receives a request from a user to initiate a transmission of data. The mobile device determines whether the data includes person or business-related sensitive information based on a format of the data, and if so, the mobile device determines a country in which the mobile device is currently located, determines a privacy policy of the country in which the mobile device is currently located, and determines whether the privacy policy applies to a type of the data corresponding to the format of the data; and if so, the mobile device notifies the user of the privacy policy of the country, identifies to the user the type of the data for which the privacy policy applies, and queries the user whether to transmit the data as requested by the user. | 2016-04-28 |
20160117526 | INFORMATION PROCESSING DEVICE, METHOD FOR VERIFYING ANONYMITY AND METHOD - The present invention provides an information processing device that enables a reduction in the processing cost of verifying anonymity during anonymization when multi-dimensional data is the subject of anonymization. The information processing device is provided with: a unit which generates information indicating the correspondence between a record contained in a data set and a class specifying a unique combination of quasi-identifier attribute values; a unit which verifies the anonymity of each record on the basis of the class thereof indicated in the information; and a unit which, on the basis of the results of verifying the anonymity, updates the information in a manner such that whether or not the record satisfies the anonymity can be identified and outputs the record-class correspondence information. | 2016-04-28 |
20160117527 | COMPACT CMOS CURRENT-MODE ANALOG MULTIFUNCTION CIRCUIT - The compact CMOS current-mode analog multifunction circuit is based on an implementation using MOSFETs operating in a sub-threshold region and forming two overlapping translinear loops capable of performing multiplication, division, controllable gain current amplifier, current mode differential amplifier, and differential-input single-output current amplifier. | 2016-04-28 |
20160117528 | SYSTEM HAVING AN IMPROVED USER INTERFACE FOR READING CODE SYMBOLS - A system for reading code symbols includes a camera, a user interface system, and a processor communicatively coupled to the camera and the user interface system. The user interface system includes a visual display. The processor is configured for (i) capturing an image including a code symbol, (ii) displaying the image on the visual display, (iii) determining whether the code symbol in the image is readable by the processor, and (iv) displaying on the visual display a positive indicator overlaying the code symbol in the image when the processor determines that the code symbol in the image is readable by the processor. The processor is further configured for reading the code symbol in the image in response to a selection input received from the user interface system. | 2016-04-28 |
20160117529 | LOW-PROFILE CARD READER - A low-profile card reader, including: a carriage; a single support arm including a first end statically mounted to the carriage, a second end, free from the carriage, a body tapering from the second end toward the first end, wherein the body is free from the carriage, such that the support arm freely deflects along a support arm length relative to the carriage, and a set of strengthening channels extending along the support arm length; and a magnetic reading head statically connected to the second end of the support arm. | 2016-04-28 |
20160117530 | METHODS FOR SCANNING AND ENCODING A PLURALITY OF RFID TAGGED ITEMS - Methods are provided for scanning and/or encoding a plurality of RFID tagged items. Such methods may involve inserting a plurality of RFID tagged items into an interior of an enclosure. A scanning or encoding signal is emitted within the enclosure and reflected off of an internal surface of the enclosure to contact at least one of the RFID tagged items. If an encoding signal is emitted, an RFID reader may transmit encoding information to the signal source (which may be an antenna) prior to emitting the encoding signal. On the other hand, if a scanning signal is emitted, information regarding the RFID tagged items may be transmitted to the RFID reader after the items have been scanned. According to one method, the same system may be used to either scan or encode a plurality of RFID tagged items. | 2016-04-28 |
20160117531 | METHOD FOR DETERMINING EXISTENCE OF WIDEBAND IMPEDANCE MATCHING CIRCUIT IN A WIRELESS IC DEVICE SYSTEM - An accessory device to be mounted on a main device is provided with a wireless IC device. The main device is provided with a reader/writer that is an interrogator that communicates with the wireless IC device of the accessory device. When the accessory device is mounted on or about to be mounted on the main device, the reader/writer selects two or more frequencies in a frequency band in which an authentic wireless IC device can communicate to perform communication with the wireless IC device. With this configuration, even if the identification code written in an RFID tag is read and the RFID tag is duplicated, the duplicated RFID tag can be accurately and effectively determined as being counterfeit. | 2016-04-28 |
20160117532 | Using Unique Identifiers to Retrieve Configuration Data for Tag Devices - Methods and systems for using unique identifiers to retrieve configuration data for tag devices are described herein. An example method may involve obtaining a unique identifier associated with a tag device. The tag device may include an antenna and a sensor configured to obtain sensor readings that can be wirelessly transmitted to a reader device via the antenna. The method may also involve determining configuration parameters associated with the tag device based on the unique identifier. The method may further involve storing, in at least one memory, at least a portion of the configuration parameters in association with the unique identifier. | 2016-04-28 |
20160117533 | ELECTRONIC DEVICE AND BACK COVER THEREOF - An electronic device and a back cover thereof are provided. The electronic device comprises a body and the back cover. The back cover includes a near field communication chip, a controller, an antenna and a first security terminal. The body includes a security chip and a second security terminal. The controller is coupled to a first security terminal, and the controller is coupled to an antenna via the NFC chip. The controller is communicated with a body of the electronic device via the first security terminal. | 2016-04-28 |
20160117534 | HIGH DENSITY READ CHAMBERS FOR SCANNING AND ENCODING RFID TAGGED ITEMS - High density read chambers are provided for scanning and/or encoding a plurality of RFID tagged items. Such chambers may include an enclosure with an interior defined by upper and lower surfaces, with a sidewall extending therebetween. An access (such as a door) may be associated with at least one of the surfaces or the sidewall, with the access being at least partially opened to access the interior of the enclosure from an outside location. The chamber further includes an antenna positioned within the interior of the enclosure and an RFID reader associated with the antenna. The RFID reader receives signals from and/or transmits signals to the antenna, while the antenna emits a scanning or encoding signal within the interior of the enclosure, with at least a portion of at least one of the surfaces or the sidewall including a signal-reflective material facing the interior of the enclosure. | 2016-04-28 |
20160117535 | NON-CONTACT COMMUNICATION METHOD DETERMINATION CIRCUIT, NON-CONTACT COMMUNICATION CIRCUIT, AND IC CARD - A non-contact communication method determination circuit includes a determiner which determines whether or not a binary signal of a received radio signal is a binary signal of a radio signal with any of a plurality of first non-contact communication methods, wherein the determiner is configured to detect a time interval between edges of the binary signal, and compares the detected time interval with a predetermined time interval between edges of a binary signal in the plurality of first non-contact communication methods, so as to determine whether or not the binary signal of the received radio signal is the binary signal of the radio signal with any of the plurality of first non-contact communication methods, and the time interval between the edges of the binary signal is a time interval between falling edges of the binary signal, or a time interval between raising edges of the binary signal. | 2016-04-28 |
20160117536 | AIRCRAFT CARGO MONITORING SYSTEM AND METHOD FOR WIRELESSLY MONITORING AIRCRAFT CARGO - An aircraft cargo monitoring system includes a controller installed in an aircraft, the controller having a transceiver module configured to transceive wireless communication and a cargo compartment information module configured to gather information about cargo loaded into a cargo compartment of the aircraft, and a wireless mobile control station having an input/output module and being connected to the transceiver module via a wireless communication link, the wireless mobile control station configured to receive information about cargo loaded into the cargo compartment of the aircraft via the wireless communication link and to display the information via the input/output module. | 2016-04-28 |
20160117537 | Apparatus for Machine Vision and Recognition and Associated Methods - An apparatus includes a system for processing of an object that has at least one surface. The object has a machine readable code on the at least one surface of the object. The apparatus further includes a reading device. The reading device is positioned to read the machine readable code on the at least one surface of the object independently of the system for processing of the object. | 2016-04-28 |
20160117538 | SYSTEMS AND METHODS FOR DETECTING AND DECODING BARCODES WITH BAR DILATION - Systems and methods for detecting and decoding 4-state barcodes with extreme bar dilation are disclosed. The method is implemented in a computing device and includes: separating an extracted image of a barcode into a top half and a bottom half; estimating bar positions and then sampling heights of the top and bottom images at each position; using adjacent bar height differences to determine the top and bottom of the tracker portion for each bar position; removing the tracker contribution to the top and bottom heights at each bar position; sending the resulting sequence of bars with ascender and descender information to a decoder for decoding processes. | 2016-04-28 |
20160117539 | IMAGE VISUALIZATION - A method includes at least a portion of an image displayed on a video screen or film, and generating a signal indicative thereof, wherein the at least a portion of the image includes encoded information identifying at least one of a visualization tool or information that are not available without the encoded information, identifying and reading the encoded information, and at least one of invoking the visualization tool or displaying the information identified and read from the encoded information. | 2016-04-28 |
20160117540 | ELECTRONIC DEVICE AND CONTROL METHOD THEREOF - A method for controlling an electronic device is provided. The electronic device has a child mode and an adult mode. The method includes capturing a touch image of a finger contacting with a touch screen when a touch operation is applied to unlock the touch screen. An area value of a touch image of the finger contacting with the touch screen is calculated based on the captured touch image and compared with one or more predefined area values. The user is determined to be a child or an adult according to the comparison result. The electronic device is controlled to alternatively enter the adult mode or the child mode based on the determination result. | 2016-04-28 |
20160117541 | MUT FINGERPRINT ID SYSTEM - MEMS ultrasound fingerprint ID systems are provided. Aspects of the systems include the capability of detecting both epidermis and dermis fingerprint patterns in three dimensions. Also provided are methods of making and using the systems, as well as devices that include the systems. | 2016-04-28 |
20160117542 | METHODS AND SYSTEMS FOR INVOKING FUNCTIONS BASED ON WHETHER A PARTIAL PRINT OR AN ENTIRE PRINT IS DETECTED - Systems and methods are described herein for expanding the functionality of a print scanner. The scanner may be programmed to invoke a different function if only a portion of a print is detected rather than a full print. In this manner, it would be possible for a user to share a user equipment device such as a smartphone with a friend. The user may wish to share his or her smartphone, and may activate access to the browser that does not include any of the cookies, private passwords, or other login information during a session by using just the tip of the user's finger on a fingerprint scanner, as opposed to the user's full fingerprint. When the user wishes to again have his or her personal information accessible in the browser, the user may activate the browser using the user's full fingerprint. | 2016-04-28 |
20160117543 | PRESS SHEET FOR FINGERPRINT READER AND FINGERPRINT READER - A press sheet for fingerprint reader and a fingerprint reader are provided. The press sheet includes a transparent substrate, a microstructure layer, and a diffusion layer. The transparent substrate has a first surface and a second surface, and the first surface faces towards an optical imaging apparatus. The microstructure layer is disposed on the first surface of the transparent substrate, and the diffusion layer contains diffusion particles. | 2016-04-28 |
20160117544 | SYSTEMS AND METHODS FOR PERFORMING IRIS IDENTIFICATION AND VERIFICATION USING MOBILE DEVICES - Technologies are presented herein in support of a system and method for performing iris identification and verification using mobile devices. Embodiments of the present invention concern a method for authenticating a user with a mobile device that includes steps for capturing imagery of a user's face, analyzing the imagery to identify the portion of the image depicting the user's eyes and segmenting the eye image to isolate the iris image data and encoding the iris image data in iris template. The present disclosure further describes authenticating the user based on the encoded iris template and additional techniques for preventing erroneous authentication caused by spoofing. In some examples, the anti-spoofing techniques may include capturing one or more images of a user's eyes and analyzing the captured images for indications of liveness based on reflection characteristics depicted in the imagery. | 2016-04-28 |
20160117545 | METHOD AND ELECTRONIC DEVICE FOR GENERATING FINGERPRINT ENROLLMENT DATA - A method and electronic device for generating fingerprint enrollment data are provided. The method includes the steps of capturing first input data, wherein the first input data is divided into a plurality of first blocks and each of the first blocks has an index value; capturing second input data, wherein the second input data is divided into a plurality of second blocks and each of the second blocks has the index value; comparing and combining the first input data with the second input data to generate a comparison result; accumulating the index values of the first blocks and the second blocks in an area of overlapping between the first input data and second input data; and generating prompting information according to the comparison result. | 2016-04-28 |
20160117546 | METHOD FOR DRIVER FACE DETECTION IN VIDEOS - A method for use with a stream of images defining a video. The method includes the steps of periodically conducting a face finding operation on an image in the stream. In respect to the last image in the stream preceding the image in which one or more faces was found, a tracker based upon wavelet decomposition is used to find a face for each face found in the last image for which no counterpart was found in the image. | 2016-04-28 |
20160117547 | METHOD AND APPARATUS FOR IDENTIFICATION - A method and system for de-identifying a video sequence are provided. The method may include the steps of capturing a video sequence, comprising a number of individual frames, including one or more users performing one or more actions, and using activity recognition to recognize one of the one or more actions. One or more of the plurality of frames may be defined as comprising the recognized one or more actions, and a portion of the one or more of the plurality of frames may be identified to remain visible. The non-identified portions of the one or more of the plurality of frames and the non-defined frames may be de-identified. This method may be applied to the determine of whether a user has ingested a medication pill. | 2016-04-28 |
20160117548 | ELECTRONIC APPARATUS, METHOD AND STORAGE MEDIUM - According to one embodiment, a method includes receiving data associated with a first group of strokes and a second group of strokes of handwriting, associating first content with the first group of strokes, the first content determined based on information associated with the first group of strokes, and associating second content with the second group of strokes, the second content determined based on information associated with the second group of strokes. The first content is displayable or reproducible by a selection of the first group of strokes. The second content is displayable or reproducible by a selection of the second group of strokes. | 2016-04-28 |
20160117549 | METHODS OF PROCESSING DATA FROM MULTIPLE IMAGE SOURCES TO PROVIDE NORMALIZED CONFIDENCE LEVELS FOR USE IN IMPROVING PERFORMANCE OF A RECOGNITION PROCESSOR - A method comprises receiving from a first data source first recognition results which are associated with the first data source, and receiving from a second data source second recognition results which are associated with the second data source. The method further comprises electronically by a processor, processing a first set of confidence levels associated with the first recognition results to provide a first set of normalized confidence levels associated with the first data source, and electronically by a processor, processing a second set of confidence levels associated with the second recognition results to provide a second set of normalized confidence levels associated with the second data source. The method also comprises storing the first set of normalized confidence levels associated with the first data source in a first table of normalized confidence levels and the second set of normalized confidence levels associated with the second data source in a second table of normalized confidence levels. | 2016-04-28 |
20160117550 | SYSTEM AND METHOD FOR MULTI-VIEW PATTERN MATCHING - A method for matching a pattern to a multi-view sequence includes receiving a multi-view sequence which includes a plurality of sequences. Each sequence includes symbols drawn from a respective alphabet. A pattern to be matched on the multi-view sequence is received. The pattern includes a sequence of symbols drawn from a plurality of the alphabets. Offsets are assigned to the symbols as a function of a latest position of the symbol in the pattern or a length of the pattern otherwise. The multi-view sequence is traversed with the pattern to identify index positions in the sequence at which the pattern matches the corresponding part of the multi-view sequence. The pattern is shifted between index positions by a shift which is based on a minimum of the offsets for those of the symbols of the plurality of sequences that are aligned with a last of the symbols in the pattern. | 2016-04-28 |
20160117551 | Methods for Automatic Structured Extraction of Data in OCR Documents Having Tabular Data - Methods to select and extract tabular data among the optical character recognition returned strings to automatically process documents, including documents containing academic transcripts. | 2016-04-28 |
20160117552 | AUTOMATED METRIC INFORMATION NETWORK - A Metric Information Network (MIN) with a plurality of Ground Control Points (GCPs) that are selected in an automated fashion. The GCP selection includes clustering algorithms as compared to prior art pair-wise matching algorithms. Further, the image processing that takes place in identifying interest points, clustering, and selecting tie points to be GCPs is all performed before the MIN is updated. By arranging for the processing to happen in this manner, the processing that is embarrassingly parallel (identifying interest points, clustering, and selecting tie points) can be performed in a distributed fashion across many computers and then the MIN can be updated. | 2016-04-28 |
20160117553 | Method, device and system for realizing visual identification - Provided are a method, device and system for realizing visual identification. A visual identification device learns a visual identification feature of an identified device, and performs visual identification on the identified device accordingly. Thus automatic identification of the device is realized in a visual manner, and the unified manipulation on multiple identified devices can be easily realized. | 2016-04-28 |
20160117554 | APPARATUS AND METHOD FOR EYE TRACKING UNDER HIGH AND LOW ILLUMINATION CONDITIONS - An eye tracking apparatus is operable in both first and second illumination environments where the second illumination is associated with a higher illumination environment than the first illumination. The apparatus includes an image capturer configured to capture an image of a user, an image processor configured to detect an eyepoint of the user in the captured image, and an optical source configured to emit infrared light to the user in a first illumination mode. The image capturer includes a dual bandpass filter configured to allow infrared light and visible light to pass. | 2016-04-28 |
20160117555 | APPARATUS AND METHOD FOR ROBUST EYE/GAZE TRACKING - At least one image registering unit records at least one series of images representing a subject. A control unit controls an operation sequence for the at least one image registering unit in such a manner that a subsequent data processing unit receives a repeating sequence of image frames there from, wherein each period contains at least one image frame of a first resolution and at least one image frame of a second resolution being different from the first resolution. Based on the registered image frames, the data processing unit produces eye/gaze tracking data with respect to the subject. | 2016-04-28 |
20160117556 | TECHNIQUES FOR GROUPING IMAGES - Techniques for grouping images are disclosed. In some situations, the techniques include identifying at least one event-based image group among a plurality of images based on an event that is associated with each identified image, receiving a selection of one or more objects in a first image of the identified event-based image group, identifying other images in the identified event-based image group that each include at least one of the selected one or more objects, and associating the identified images with the first image. In one instance, the selected objects include individuals captured in the image. | 2016-04-28 |
20160117557 | APPARATUS FOR DETECTING FAULTS IN VIDEO FRAMES OF VIDEO SEQUENCE - A fault detection circuit for detecting faults in a video sequence includes a multiple input signature register (MISR) with a linear feedback shift register (LFSR) that receives pixel data for pixels in a frame region for video frames of a video sequence and receives a read signal to read the pixel data and shift the MISR; a multiple signature storage buffer (MSSB) that stores frame signatures; and a signature comparator that compares current and reference frame signatures to determine if a fault condition exists in the video sequence. The MISR holds a frame signature for the frame region of the video frame while receiving a frame end signal. The MSSB stores a current frame signature held by the MISR after receiving the frame end signal. The MSSB also stores a reference frame signature. A display processing circuit includes the fault detection circuit. An integrated circuit includes the display processing circuit. | 2016-04-28 |
20160117558 | METHOD AND APPARATUS FOR SECURING COMPUTER VIDEO AND AUDIO SUBSYSTEMS - In general, embodiments of the invention include methods and apparatuses for securing otherwise unsecured computer audio and video subsystems. Embodiments of the invention perform watermarking of video and/or audio data streams output by a computer system. Additional security features that are included in embodiments of the invention include fingerprinting, snooping, capturing streams for local or remote analytics or archiving, and mixing of secure system content with local audio and video content. | 2016-04-28 |
20160117559 | THUMBNAIL MANAGEMENT - Thumbnail management for video content may include detecting scene change points from video content, prioritizing each frame in each analysis window, selecting a frame in each analysis window based on a respective prioritization score for each frame, and storing the selected frame as the thumbnail for the respective analysis window. | 2016-04-28 |
20160117560 | SYSTEMS AND METHODS FOR OBJECT DETECTION - Systems and methods for detecting objects from a moving platform are provided. The method includes receiving, from a camera coupled to the moving platform, first and second image frames, wherein the second image frame is subsequent in time to the first image frame. Within the first image frame, a first target is defined characterizing the location of an object detected in the first image frame. A first score associated with the first target and a second score associated with the second target are determined, and a first predicted target is determined based on a tracking process applied to the first target. A third score associated with the first predicted target is determined. The method determines a merged target corresponding to the second target when the second score is greater than the third score and a proximity measure between the second target and the first predicted target is above a threshold. | 2016-04-28 |
20160117561 | DISTANCE SENSOR - In one embodiment, a distance sensor includes an image capturing device positioned to capture an image of a field of view and a first plurality of projection points arranged around a first lens of the image capturing device, wherein each projection point of the first plurality of projection points is configured to emit a plurality of projection beams in different directions within the field of view. | 2016-04-28 |
20160117562 | TRAFFIC SIGN RECOGNIZING APPARATUS AND OPERATING METHOD THEREOF - Disclosed are an apparatus for recognizing a traffic sign and an operating method thereof. The apparatus for recognizing a traffic sign according to an exemplary embodiment of the present invention includes: an image obtaining unit configured to obtain an image from a vehicle to a predetermined range; a region of interest designating unit configured to recognize a traffic sign within the image, and designate an area including the traffic sign as a region of interest; a valid area extracting unit configured to extract a valid area except for an area of a first color from the region of interest, and calculate valid area data; and a similarity calculating unit configured to calculate similarity of the traffic sign by using the valid area data. | 2016-04-28 |
20160117563 | METHOD AND APPARATUS FOR AUTHENTICATING USER USING VEIN PATTERN - A method and apparatus for authenticating a user using a vein pattern are provided that project a near infrared (NIR) ray toward a skin of the user using a light emitting diode (LED), where the user is adjacent to a terminal including the LED. An image sensor receives a light reflected by the skin, generates a vein pattern of the skin based on an image generated using the received light, and authenticates the user as a registered user of a pre-stored vein pattern when the generated vein pattern matches the pre-stored vein pattern. | 2016-04-28 |
20160117564 | SCANNING WINDOW IN HARDWARE FOR LOW-POWER OBJECT-DETECTION IN IMAGES - An apparatus includes a hardware sensor array including a plurality of pixels arranged along at least a first dimension and a second dimension of the array, each of the pixels capable of generating a sensor reading. A hardware scanning window array includes a plurality of storage elements arranged along at least a first dimension and a second dimension of the hardware scanning window array, each of the storage elements capable of storing a pixel value based on one or more sensor readings. Peripheral circuitry for systematically transfers pixel values, based on sensor readings, into the hardware scanning window array, to cause different windows of pixel values to be stored in the hardware scanning window array at different times. Control logic coupled to the hardware sensor array, the hardware scanning window array, and the peripheral circuitry, provides control signals to the peripheral circuitry to control the transfer of pixel values. | 2016-04-28 |
20160117565 | Analysis of Electrophoretic Bands in a Substrate - A method and system to enhance analysis of electrophoretic bands by overlaying only the pixels of interest. The overlaid pixels are superimposed as a layer above, i.e., in the foreground of, the overlaid image, i.e., in the background. A user employs the superimposed pixels for molecular weight determination and is still able to generate densitometry analysis of the remaining pixels in the overlaid image. | 2016-04-28 |
20160117566 | SCREENSHOT DATABASE FOR APPLICATION VERIFICATION - Methods, systems, and computer-readable mediums are presented that process and store images efficiently in a memory system. When a new image is received, it is compared to a plurality of reference images. The most similar reference image is located, and a delta image is generated representing a difference between the reference image and the new image. Instead of storing the entirety of the new image, the delta image can be stored along with a reference to the corresponding reference image, such that the new image can be restored from the delta image and the reference image. The total number of reference images and delta images can be dynamically balanced such that predetermined ratios of image numbers or image sizes can be maintained. | 2016-04-28 |
20160117567 | METHOD FOR MAINTAINING DETECTION CAPABILITY WHEN A FRAME IN A MULTISPECTRAL IMAGE IS CORRUPTED - Exemplary embodiments provide a method, a system, and a computer readable medium for maintaining detection capability when a frame is corrupted. A plurality of data points of a multispectral gain in a frame is monitored. It is determined that the frame is corrupted by analyzing the plurality of data points. When the frame is corrupted, a single spectrum threat detection system is used instead of a multispectral threat detection system. | 2016-04-28 |
20160117568 | System and Method of Adjusting the Color of Image Objects Based on Chained Reference Points, Gradient Characterization, and Pre-stored Indicators of Environmental Lighting Conditions - The invention relates to a system and method for adjusting the color of image objects based on chained reference points and/or light gradients to account for the effects of lighting conditions that can vary across different environments, according to an implementation of the invention. To chain reference points and/or characterize light gradients, the system may determine a color shift value, which represents the effects of lighting conditions of a target environment (in which the lighting conditions may be unknown) relative to a reference environment (in which the lighting conditions may be known). The chained reference points, gradient characterization, color shift values, and/or other information may be used to store a delta map that characterizes the lighting conditions of an environment so that it may be reused for subsequent color shifts without re-characterizing the environment. | 2016-04-28 |
20160117569 | EFFICIENT FEATURE POINT SELECTION - Systems and methods are provided for selecting feature points within an image. A plurality of candidate feature points are identified in the image. A plurality of feature points are selected for each of the plurality of candidate feature points, a plurality of sets of representative pixels. For each set of representative pixels, a representative value is determined as one of a maximum chromaticity value and a minimum chromaticity value from the set of representative pixels. A score is determined for each candidate feature point from the representative values for the plurality of sets of representative pixels associated with the candidate feature point. The feature points are selected according to the determined scores for the plurality of candidate feature points. | 2016-04-28 |
20160117570 | NOTE RECOGNITION AND MANAGEMENT USING COLOR CLASSIFICATION - This disclosure describes techniques for creating and manipulating software notes representative of physical notes. For example, techniques are described for recognizing physical notes present within a physical environment, capturing information therefrom and creating corresponding digital representations of the physical notes, referred to herein as digital notes or software-based notes. At least some aspects of the present disclosure feature system and methods for note recognition using color classification. The system receives a visual representation of a scene having one or more notes, where each note has a color. The system generates indicators indicative of color classes of pixels in the visual representation. The system further determines a general boundary of one of the notes based on the indicators. | 2016-04-28 |
20160117571 | DETECTION OF OBJECTS IN AN IMAGE USING SELF SIMILARITIES - An image processor ( | 2016-04-28 |
20160117572 | EXTRACTION OF IMAGE FEATURE DATA FROM IMAGES - An apparatus and method for obtaining image feature data of an image are disclosed herein. A color histogram of the image is extracted from the image, the extraction of the color histogram including performing one-dimensional sampling of pixels comprising the image in each of a first dimension of a color space, a second dimension of the color space, and a third dimension of the color space. An edge map corresponding to the image is analyzed to detect a pattern included in the image. In response to a confidence level of the pattern detection being below a pre-defined threshold, extracting from the image an orientation histogram of the image. And identify a dominant color of the image. | 2016-04-28 |
20160117573 | METHOD AND APPARATUS FOR EXTRACTING FEATURE CORRESPONDENCES FROM MULTIPLE IMAGES - A method and an apparatus for extracting feature correspondences from images are described. An image dataset, feature points of the images and preliminary correspondences of the feature points are acquired ( | 2016-04-28 |
20160117574 | Tagging Personal Photos with Deep Networks - Techniques and constructs to facilitate automatic tagging can provide improvements in image storage and searching. The constructs may enable training a deep network using tagged source images and target images. The constructs may also train a top layer of the deep network using a personal photo ontology. The constructs also may select one or more concepts from the ontology for tagging personal digital images. | 2016-04-28 |
20160117575 | IMAGE FORMING APPARATUS AND PRINTING INSPECTION SYSTEM - An image forming apparatus includes: an image forming section that forms an image on a recording medium using color material having color and transparent color material; a reading section that reads the image formed on the recording medium by the image forming section; and a reference data calculation section that calculates reference data based on read data obtained when the reading section reads a first color sample which is formed using only the color material having color by the image forming section and a second color sample which is formed using the color material having color and the transparent color material by the image forming section; and in which an image on the recording medium, which is an inspection target and is read by the reading section, is inspected by an inspection section based on the reference data calculated by the reference data calculation section. | 2016-04-28 |
20160117576 | THRESHOLD VALUE DATA SETTING DEVICE, METHOD AND PROGRAM, AND IMAGE FORMING SYSTEM - Disclosed are a threshold value data setting device, method, and program and an image forming system capable of, even if the number of types of printing devices and printing materials is enormous, simply and easily determining threshold value data suitable for any combination thereof. A change in dot shape occurring in an image forming process from the creation of a binary image signal | 2016-04-28 |
20160117577 | GAMMA CORRECTION TABLE GENERATION METHOD OR IMAGE PROCESSING METHOD USING GAMMA CORRECTION TABLE AND CONTROL METHOD THEREOF - A gamma correction table generation method includes: obtaining density information by reading, with a reading sensor, a density patch output by an image forming device in a range wider than a cell, the density patch including a plurality of cells disposed such that a part of the cells as a unit representing a tone overlaps with each other and dots included in each of the cells are separated from each other to an extent that no influence is exerted on each other on a recording medium which the image forming device outputs; correcting the density information according to a number of the cells in the density patch; and generating a gamma correction table based on the corrected density information. | 2016-04-28 |
20160117578 | TRANSACTION CARD - This invention relates to a transparent or translucent transaction card having a base comprising a core of substantially transparent or translucent material with a plurality of coats, including optically recognizable ink comprising one or more infrared blocking dyes and other nanoparticles, such as rare earth nanophosphors and other metal nanoparticles, and/or optically recognizable film comprising nanoparticles, such as rare earth nanophosphors, and other metal oxide and/or non-oxide complexes, and methods for their preparation. | 2016-04-28 |
20160117579 | WEIGHTED TRANSACTION CARD - Weighted transaction cards and methods of manufacturing the same. The weighted transaction cards may include a tungsten member that comprises at least a portion of a layer of the transaction card. The tungsten member may be encapsulated and/or disposed in an opening of a surround to define and inlay. The inlay may be laminated with one or more additional layers according to traditional card manufacturing techniques (e.g., a hot lamination process). The weighted transaction cards may have a weight significantly greater than traditional plastic transaction cards such that the weighted transaction cards. | 2016-04-28 |
20160117580 | METHOD AND SYSTEM FOR TRANSMITTING DATA USING VISUAL CODES - A method for transmitting data using a barcode is described. The method is implemented by a diagnostic computing device coupled to a display device. The method includes generating, by the diagnostic computing device, diagnostic data regarding at least a first machine. The method additionally includes encoding at least a portion of the diagnostic data in at least one barcode and displaying the at least one barcode using the display device. | 2016-04-28 |
20160117581 | METHOD AND SYSTEM FOR TRANSMITTING DATA USING VISUAL CODES - A method for transmitting data using a barcode is described. The method is implemented by a diagnostic computing device coupled to a display device. The method includes generating, by the diagnostic computing device, diagnostic data regarding at least a first machine. The method additionally includes encoding at least a portion of the diagnostic data in at least one barcode and displaying the at least one barcode using the display device. | 2016-04-28 |
20160117582 | PERSISTENT NODES FOR RFID - An RFID transponder in one embodiment comprises a radio frequency (RF) transceiver, processing logic coupled to the RF transceiver, a switch coupled to the processing logic, a tunneling device coupled to the switch and a differential sensing circuit having a first input coupled to the tunneling device and a second input coupled to a predetermined reference voltage. In one embodiment, the tunneling device can discharge to a voltage below the predetermined reference voltage. | 2016-04-28 |
20160117583 | RADIO FREQUENCY IDENTIFICATION TAG WITH HARDENED MEMORY SYSTEM - In embodiments of the present invention improved capabilities are described for RFID tags with hardened memory, where the memory comprises a plurality of one time programmable (OTP) non-volatile memory locations for storing data, wherein the plurality of OTP non-volatile memory locations are configured to emulate a hardened memory system that retains data stored in the OTP non-volatile memory locations, wherein the data stored is retained after exposure of the RFID tag to an ionizing radiation exposure with an exposure level greater than 25 kGy. | 2016-04-28 |
20160117584 | Semiconductor Device, Wireless Sensor, and Electronic Device - To provide a semiconductor device that is capable of displaying data even when a radio signal is not supplied. The semiconductor device includes an antenna, a battery, a sensor, a nonvolatile memory, a first circuit, and a second circuit. Power supplied from the antenna is converted into first power via the first circuit. The battery stores the first power and supplies second power. The sensor performs sensing with the second power. The nonvolatile memory stores analog data acquired by the sensor. The second power is used to store the analog data. The second circuit converts the analog data into digital data with the use of the first power. The nonvolatile memory preferably includes an oxide semiconductor transistor. | 2016-04-28 |
20160117585 | RFID Tag and Method of Securing Same to Object - A method for securing an RFID tag to an object includes providing an RFID tag and placing the RFID tag on the object. The RFID tag has an RFID chip and an antenna electrically connected to the RFID chip. The RFID tag also has a first and second opening extending through the RFID tag. The object has a first and second protrusion extending from a surface of the object. The first and second protrusions extend through the first and second openings when the RFID tag is placed on the object. The method also includes melting the first and second protrusions to create a single integral boss that covers at least a portion of the RFID tag and secures the RFID tag to the object. The chip may be nonfunctional prior to the securement process. | 2016-04-28 |
20160117586 | AUGMENTING NEURAL NETWORKS WITH EXTERNAL MEMORY - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for augmenting neural networks with an external memory. One of the methods includes providing an output derived from a first portion of a neural network output as a system output; determining one or more sets of writing weights for each of a plurality of locations in an external memory; writing data defined by a third portion of the neural network output to the external memory in accordance with the sets of writing weights; determining one or more sets of reading weights for each of the plurality of locations in the external memory from a fourth portion of the neural network output; reading data from the external memory in accordance with the sets of reading weights; and combining the data read from the external memory with a next system input to generate the next neural network input. | 2016-04-28 |
20160117587 | HIERARCHICAL DEEP CONVOLUTIONAL NEURAL NETWORK FOR IMAGE CLASSIFICATION - Hierarchical branching deep convolutional neural networks (HD-CNNs) improve existing convolutional neural network (CNN) technology. In a HD-CNN, classes that can be easily distinguished are classified in a higher layer coarse category CNN, while the most difficult classifications are done on lower layer fine category CNNs. Multinomial logistic loss and a novel temporal sparsity penalty may be used in HD-CNN training. The use of multinomial logistic loss and a temporal sparsity penalty causes each branching component to deal with distinct subsets of categories. | 2016-04-28 |
20160117588 | PREDICTION FUNCTION CREATION DEVICE, PREDICTION FUNCTION CREATION METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - The prediction function creation device according to the present invention for creating a prediction function to derive an objective variable by using a set of samples that include explanatory variables and an objective variable, the device includes: a clustering unit that clusters the respective samples by giving labels, and assigns weights to each label in accordance with patterns of missing values for the explanatory variables in labeled samples; a child model creation unit that makes portions of the training data partial training data on the basis of the weights, and determines an explanatory variable that constitutes the prediction function on the basis of patterns of missing values for the explanatory variables in the samples; and a mixture model creation unit that creates the prediction function with respect to each pattern of missing values by using the explanatory variable and the determined partial training data. | 2016-04-28 |
20160117589 | SYSTEM AND METHOD FOR AUTOMATIC DOCUMENT CLASSIFICATION IN EDISCOVERY, COMPLIANCE AND LEGACY INFORMATION CLEAN-UP - A system, method and computer program product for automatic document classification, including an extraction module configured to extract structural, syntactical and/or semantic information from a document and normalize the extracted information; a machine learning module configured to generate a model representation for automatic document classification based on feature vectors built from the normalized and extracted semantic information for supervised and/or unsupervised clustering or machine learning; and a classification module configured to select a non-classified document from a document collection, and via the extraction module extract normalized structural, syntactical and/or semantic information from the selected document, and generate via the machine learning module a model representation of the selected document based on feature vectors, and match the model representation of the selected document against the machine learning model representation to generate a document category, and/or classification for display to a user. | 2016-04-28 |
20160117590 | AUTOMATICALLY TRANSLATING A LIST OF BUSINESS PROCESSES INTO AN EXPERT-SYSTEM KNOWLEDGEBASE - A method and associated systems for automatically generating an ontology and a set of axioms from a business-process model that represents the operations of a business. This ontology and set of axioms may be used to create the knowledgebase of an artificially intelligent expert system that emulates the business operations. A processor parses a representation of business processes stored in the business-process model, deriving a set of axioms and a set of entity classes from the parsed data. The processor uses these axioms and classes to identify concept nodes and process nodes, which it organizes into the ontology of the knowledgebase. The processor further identifies information derived from the parsed data to create a set of triple data items, each of which represents the information represented by one or more of the derived axioms. These triples are stored in the knowledgebase a triple store data structure. | 2016-04-28 |
20160117591 | Dynamic Business Rule Creation Using Scored Sentiments - A method for analyzing and implementing sentiments includes sorting data from the data stream into sorted data by using a corpus builder. The sorted data is then input into an opinion mining platform where selected content is obtained based on the identification of keywords present in the sorted data. A sentiment extraction program generates sentiment metrics based on analysis of the selected content. A rules extractor program determines, based on the sentiment metrics satisfying rules, if actions are to be performed by a business rules engine. | 2016-04-28 |
20160117592 | EFFECTIVE RESPONSE PROTOCOLS RELATING TO HUMAN IMPAIRMENT ARISING FROM INSIDIOUS HETEROGENEOUS INTERACTION - Structures and protocols are presented for using an identification of a first entity (an individual) or a second entity (a device or individual, e.g.), and an indication of the first entity not reacting positively (apparently taking offense, e.g.) to an action or expression of the second entity, for triggering one or more decision such as (1) whether or not to discard a recorded data component of a communicative expression of the second entity or (2) whether or not to facilitate a communication to a third entity or (3) whether or not to adjust a performance evaluation of the second party or of content from the second party or (4) whether or not to signal a disruptive emission in a vicinity of the second party. | 2016-04-28 |