34th week of 2015 patent applcation highlights part 47 |
Patent application number | Title | Published |
20150234998 | System and Method for Providing Healthcare Services via Telecommunication Networks with Enhanced Interaction between Healthcare Providers and Patients - A system for providing healthcare includes an examination room having a controller configured for communication with a remote healthcare provider, such as a primary care physician, via a telecommunications network, a medical examination chair or table for supporting a patient, and a digital display in communication with the controller and facing the medical examination chair or table. The digital display is configured to display the remote healthcare provider to the patient on the digital display in substantially life size and with direct eye-to-eye contact with the patient. A plurality of digital medical instruments is in communication with the controller for selectively providing diagnostic information of the patient to the remote healthcare provider. An input device is in communication with the controller so that a clinical care coordinator, such as a registered nurse, can selectively control communications between the examination room and the remote healthcare provider. | 2015-08-20 |
20150234999 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR DETERMINING A CONSOLIDATED DISEASE RISK SCORE FROM RISK FACTORS AND A LEVEL OF COMPOSITE RISK - Methods, systems and computer program products for assessing a consolidated risk score from two or more risk factors and two or more risk scores are provided. The risk scores include condition-specific composite risk scores based on one or more of the risk factors. One or more of the risk factors are identified as a high risk value factor for a subject. A risk ratio of a combined risk score for a selected subset of the two or more risk scores and a reference combined risk score is determined. A consolidated risk score responsive to the risk ratio and at least one high risk value factor for the subject is assessed. | 2015-08-20 |
20150235000 | DEVELOPING HEALTH INFORMATION FEATURE ABSTRACTIONS FROM INTRA-INDIVIDUAL TEMPORAL VARIANCE HETEROSKEDASTICITY - A method, system, and/or computer program product automatically abstracts and selects an optimal set of variance-related features that are indicative of an individual outcome and personalized plan selection in health care. An abstracted set of candidate variance-related patient features, which comprise temporally heteroskedastic features, is generated. Each patient feature from the abstracted set of candidate variance-related patient features is optimized by identifying a time period in which variances and heteroskedasticity of each patient feature are maximized, where the optimizing creates an optimal abstracted set of variance-related patient features from the time period in which the variances and heteroskedasticity of each patient feature are maximized. The optimal abstracted set of variance-related patient features is then used for a current patient to predict a particular outcome and/or to create a personalized health care treatment plan. | 2015-08-20 |
20150235001 | System and Method for Scoring Health Related Risk - Methods and systems are provided for assigning an individual to a stratum associated with a risk of generating a high level of health care-related costs. An electronic device receives information on the diagnosis of a medical condition for the individual. The device then identifies a gap in the individual's medical care for the diagnosed medical condition and associates the gap with an indexed value related to the severity of the gap in care. The device then assigns the individual to one of a plurality of strata based on a health care profile of the individual, where the health care profile includes the indexed value related to the severity of the gap in care. | 2015-08-20 |
20150235002 | Method and System to Provide Personalized Pharmaceutical Compositions and Dosages - Provided is a method for assessing cardiovascular risk in Metabolic Syndrome and Type 2 Diabetes patients. The method involves obtaining data from a Type 2 diabetes patient or a Metabolic Syndrome patient and determining a Fayad/Schentag index which includes a Glucose Supply Index (S) to an Insulin Demand Index (D) ratio. The Fayad/Schentag index is used in scoring cardiovascular risks of Metabolic Syndrome patients and for recommending and implementing therapeutic interventions that can be shown to lower cardiovascular risk | 2015-08-20 |
20150235003 | MEDICATION REQUISITION FULFILLMENT SYSTEM AND METHOD - A system and associated method are provided for fulfillment of medication requisitions corresponding to contained medication units. Requisition fulfillment logic may be included to provide decision data to a patient care provider for use in selecting one of a plurality of different fulfillment sites to fill a given medication requisition. A requisition router may route the medication requisition to a selected one of the plurality of fulfillment sites. The fulfillment sites may provide medication requisition metadata (e.g., data relating to the preparation and handling of medication units) to a medication requisition database in corresponding relation to the corresponding medication requisitions fulfilled by the fulfillment sites. The medication requisition metadata may be stored in the medication requisition database and accessed to facilitate enhanced management functionalities in relation to medication units dispensed by patient care providers. | 2015-08-20 |
20150235004 | PLATFORM, DEVICE AND METHOD FOR SOCIAL MEDICATION MANAGEMENT - A system, method and platform are herein provided for enabling social medication adherence enhancement. According to one embodiment a system or platform is provided for socially supporting medication adherence management, comprising a user application for managing medication adherence, data servers with memory thereon for storing adherence related data, and web servers running code to enable social medication adherence tracking. | 2015-08-20 |
20150235005 | MANAGEMENT OF PHARMACY KITS - A system for managing pharmacy kits comprises a reading station configured to read tag information from a plurality of radio frequency identification (RFID) tags associated with a pharmacy kit, and an information processing system operatively connected to the reading station and configured to receive the tag information from the reading station and determine a status of the pharmacy kit based on the tag information, a plurality of stored templates defining contents to be included in each of a plurality of pharmacy kits, and a plurality of kit records indicating the current contents of a plurality of pharmacy kits. | 2015-08-20 |
20150235006 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A HEALTHCARE USER INTERFACE AND INCENTIVES - Actively engaging members in managing their own healthcare, improving their health, and reducing healthcare costs to the payer involves providing a unified interface for member engagement. The interface may be communicatively coupled with a healthcare system, may be personalized to the member, and may offer multiple possible rewards to the member to encourage member behavior to effectively reduce healthcare costs and improve the quality of healthcare plans. The interface may provide the member with a pathway guiding the member to engage in activities to achieve short-term, intermediate and long-term goals for which actions are presented. Goals or actions may be predefined and may additionally be selected by the member. When member-engagement in the actions is verified, rewards may be granted to the member's account. In connection with such member engagement, the healthcare system collects member information, applies rules to that information, and generates alerts from those rules. | 2015-08-20 |
20150235007 | SYSTEM AND METHOD FOR GENERATING A REPORT BASED ON INPUT FROM A RADIOLOGIST | 2015-08-20 |
20150235008 | INFORMATION PROCESSING SYSTEM AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM - A combination group includes combinations of elements belonging to items. When an attention location in a medical image is designated, two or more elements corresponding to the attention location and belonging to the first item are identified. When one of the two or more elements is designated, two or more elements belonging to a second item and included in one or more combinations of elements included in the combination group and corresponding to the designated one element are displayed to be distinguishable from the other elements. When one or more of the two or more displayed elements are designated, one or more elements belonging to a third item and included in at least one combination of elements included in the combination group and corresponding to a combination of the one designated element and each of the one or more designated elements are displayed to be distinguishable from the other elements. | 2015-08-20 |
20150235009 | Method and System for Generating a Rate-of-Change Graphical Health Record - An electronic health record is generated using a processor and electronic data storage. Feature descriptions are stored in the data storage. Each feature description defines patient-answerable data queries associated with a health issue. The data storage also stores sets of periodic responses to the data queries with each set being associated with a time period. The processor processes the sets of periodic responses to generate a graphical presentation thereof that orders the sets on a common time scale based on the time period for display on a device. | 2015-08-20 |
20150235010 | METHOD AND SYSTEM FOR ACCESSING PATIENT DATA - Data concerning patients that have received treatment by a drug is stored and accessed to it is provided. One or more storage elements are provided that contain data concerning patients that have received the drug. The data includes data from clinical trials and data from patients prescribed the drug by a physician. A processor is programmed to search the storage elements for data on patients meeting a specified profile and to create a dataset. The dataset includes information on the patients having the specified profile, including a response of the patients to treatment using the drug. | 2015-08-20 |
20150235011 | DRM PROTECTED VIDEO STREAMING ON GAME CONSOLE WITH SECRET-LESS APPLICATION - Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server, which eliminates the need of storing or using any secret information in the client application. Further, an encrypted content key generated by a content packager using a public key can be deployed in the key URI of a playlist file, which is sent to the key server. The key server can be configured to decrypt the content key using a corresponding private key. Further, the content key and unencrypted samples are protected in the game console client application from debugging and replay attacks by using additional security checks at both the client and key server. By storing secret information remotely from the game console and using the SSO model, DRM policies can be enforced on an untrusted client application. | 2015-08-20 |
20150235012 | DIGITAL RESOURCE PROTECTION METHOD AND APPARATUS, AND DIGITAL RESOURCE USING METHOD AND APPARATUS - A digital resource protection apparatus, includes: a configuring module to configure N encryption index values for a digital resource to be encrypted, wherein N is an integer greater than 0; and a digital logic control module configured to perform a logic encryption of the digital resource through a preset digital logic circuit, by using one or more of the N encryption index values and the digital resource as input parameters of the preset digital logic circuit. | 2015-08-20 |
20150235013 | MANAGING SUPPLEMENTAL CONTENT RELATED TO A DIGITAL GOOD - In various example embodiments, a system and method for managing supplemental content relating to a digital good are presented. The supplemental content relating to the digital good may be received, where the supplemental content may be for presentation to a consumer. The supplemental content may be stored in accompaniment with the digital good. Ownership criteria associated with ownership rights of the supplemental content may be determined. The ownership rights corresponding to the supplemental content may be transferred from a first entity to a second entity based, at least in part, on the determined ownership criteria. The second entity may be authorized to access the supplemental content based, at least in part, on the determined ownership criteria. The supplemental content may be caused to be distributed to the second entity. | 2015-08-20 |
20150235014 | TRANSACTION ISOLATION DURING MULTI-TENANT TRANSACTION REQUESTS - Described is a multi-tenant Software as a Service (SaaS) computing environment which provides at least one logical server where two or more sets of tenant data can be processed by the logical server to keep the data from commingling with each other. To prevent data commingling, every tenant transaction request is isolated, via the described system and method, from all other tenant transaction requests by dynamically creating and later destroying unique pluggable components that satisfy the transaction requests. | 2015-08-20 |
20150235015 | Optimized Server for Streamed Applications - An optimized server for streamed applications provides a streamed application server optimized to provide efficient delivery of streamed applications to client systems across a computer network such as the Internet. The server persistently stores streamed application program sets that contain streamed application file pages. Client systems request streamed application file pages from the server using a unique set of numbers common among all servers that store the particular streamed application file pages. A license server offloads the streamed application server by performing client access privilege validations. Commonly accessed streamed application file pages are stored in a cache on the streamed application server which attempts to retrieve requested streamed application file pages from the cache before retrieving them from persistent storage. Requested streamed application file pages are compressed before being sent to a client as well as those stored in the cache. | 2015-08-20 |
20150235016 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD AND PROGRAM - There is provided an authentication device including an extraction unit configured to extract feature data from motion biological information of a person to be authenticated, a calculation unit configured to calculate similarity between the extracted feature data and reference feature data, a determination unit configured to determine whether or not the person to be authenticated is an authorized user on the basis of the calculated similarity, a measurement unit configured to measure a position of the person to be authenticated when an electronic device that expects authentication processing is used as a reference, and an authentication execution unit configured to execute the authentication processing on the basis of the determination result of whether or not the person to be authenticated is the authorized user, and the position of the person to be authenticated. | 2015-08-20 |
20150235017 | SYSTEM AND METHOD FOR VERIFYING STATUS OF AN AUTHENTICATION DEVICE THROUGH A BIOMETRIC PROFILE - A system and method that includes receiving a first biometric profile and associating the first biometric profile with a first application instance that is assigned as an authentication device of a first account; receiving a second biometric profile for a second application instance, wherein the second application instance is making a request on behalf of the first account; comparing the second biometric profile to the first biometric profile; and completing the request of the second application instance according to results of comparing the second biometric profile to the first biometric profile. | 2015-08-20 |
20150235018 | ELECTRONIC DEVICE, METHOD FOR AUTHENTICATING USER, AND COMPUTER READABLE RECORDING MEDIUM - An electronic device, a method of an electronic device authenticating a user and a computer readable recording medium are provided, The electronic device includes a storage configured to store an identifier and attributes of a first object as authentication information, a display configured to display a plurality of authentication objects comprising a second object that has one or more of the attributes of the first object and has a form different from a form of the first object, in response to a request to perform an authentication procedure, and a controller configured to authenticate a user based on an attribute of an authentication object selected by the user from among the plurality of displayed authentication objects and the stored authentication information. | 2015-08-20 |
20150235019 | METHOD AND SYSTEM FOR PROGRAM AUTHENTICATION - A method and a system for authenticating a program are provided. A user system receives a program developed by a developer system and an authentication key, creates an additional authentication key by applying a preset authentication algorithm to the received program, and uses the received program if the received authentication key is matched to the additional authentication key. | 2015-08-20 |
20150235020 | STORAGE DEVICE, STORAGE SYSTEM, AND AUTHENTICATION METHOD - According to one embodiment, a storage device that has a nonvolatile semiconductor memory includes an authentication information storage unit that previously stores first apparatus authentication information to authenticate an authorized host device and first user authentication information to authenticate an authorized user. The storage device executes apparatus authentication on the basis of second apparatus authentication information received from a newly connected host device and the first apparatus authentication information in the authentication information storage unit and executes an invalidation process of user data stored in the nonvolatile semiconductor memory, when the apparatus authentication is failed. | 2015-08-20 |
20150235021 | DISTRIBUTION OF EPHEMERAL EXTENSION TO COMMUNICATION SESSIONS - To allow more non-enterprise communication endpoints to communicate without having to allocate an extension for every non-enterprise communication endpoint, a request is received to communicate with an enterprise communication system from a non-enterprise communication endpoint. A temporary password is associated with a dynamic communication address (e.g., from a group of dynamic extensions). The temporary password and the dynamic communication address are sent to the non-enterprise communication endpoint. The non-enterprise communication endpoint registers with the communication system using the temporary password and the dynamic communication address. A communication session is established between the non-enterprise communication endpoint and an enterprise communication endpoint using the dynamic communication address. The temporary password is then disassociated from the dynamic communication address, thus freeing up the dynamic communication address for use with another non-enterprise communication endpoint. | 2015-08-20 |
20150235022 | SYSTEM AND METHOD FOR SECURE SMI MEMORY SERVICES - In accordance with the present disclosure, a system and method are herein disclosed for providing secure SMI memory services, including the protection of SMM memory from surreptitious attacks by, for example, rootkits. Information handling systems are susceptible to attacks, especially attacks on SMM memory. In one example, an SMI handler corresponding to the SMI Driver associated with an SMI interrupt performs validation of a password. An SSMS driver allocates memory for the SMI handler to use with the validation process and also performs a secure erase of allocated memory blocks upon completion of all secure SMI Memory Services. By controlling the validation and secure erase process through the use of the SMI handler and SSMS driver, information leakage can be prevented resulting in system data integrity. | 2015-08-20 |
20150235023 | Presenting Service Processes - Technical solutions for presenting service processes are provided. In the solutions, operation instructions are received, and in response to the received operation instructions, a page of a first service process is displayed and the first service process is started; when a page of a second service process is displayed instead of the page of the first service process, execution progress of the first service process is presented through an icon of the first service process. | 2015-08-20 |
20150235024 | METHODS AND APPARATUS TO FACILITATE SECURE SCREEN INPUT - Methods, apparatus, systems and articles of manufacture are disclosed to facilitate secure screen input. An example disclosed system includes a user interface (UI) manager to generate a UI comprising a quantity of ordinal entry points, each one of the quantity of ordinal entry points comprising a repeating selectable pattern, an ordinal sequence generator to generate an initial randomized combination of the quantity of ordinal entry points, the randomized combination stored in a trusted execution environment, and an offset calculator to calculate a password entry value by comparing an offset value and direction value retrieved from the UI with the initial randomized combination of the quantity of ordinal entry points. | 2015-08-20 |
20150235025 | PROCESS TO PREVENT MALICIOUS CHANGES TO ELECTRONIC FILES ON AN ELECTRONIC STORAGE DEVICE - Provided herein is a method for detecting significant changes to files on an electronic storage device, determining if those changes meet a configurable threshold to be considered significant changes, and take actions by or on behalf of the user to accept or decline the changes before they are committed to the system. | 2015-08-20 |
20150235026 | MALWARE DROPPER DISCOVERY METHOD AND SYSTEM - A process for finding potentially harmful malware dropper on an infected computer system includes the steps of a) identifying an executable file that is about to run, and b) providing a storage agent that stores a copy of said executable file for a later inspection. | 2015-08-20 |
20150235027 | MALICIOUS CODE DETECTION - A device includes a pipeline and a detector that are both implemented at least in hardware. Data is moved through the pipeline to perform processing of the data unrelated to detection of malicious code. The detector detects the malicious code within the data as the data is moved through the pipeline, in parallel with the processing of the data as the data is moved through the pipeline. The detector detects the malicious code within the data as the data is moved through the pipeline without delaying movement of the data into, through, and out of the pipeline. | 2015-08-20 |
20150235028 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - The hash value for an entire system file partition for storing firmware of an information processing apparatus is calculated. Alteration of the firmware is detected based on the hash value. | 2015-08-20 |
20150235029 | METHOD OF PREVENTING COMPUTER MALFUNCTION, COMPUTER PROGRAM, AND COMPUTER - The malfunction of a system caused by data managed by system firmware is prevented. A firmware ROM | 2015-08-20 |
20150235030 | Method for Processing UEFI Protocols and System Therefor - A Unified Extensible Firmware Interface protocol installer utilizes and modifies a list of global unique identifiers corresponding to Unified Extensible Firmware Interface protocols to determine whether to install a UEFI protocol. | 2015-08-20 |
20150235031 | PORTABLE DESKTOP DEVICE AND METHOD OF HOST COMPUTER SYSTEM HARDWARE RECOGNITION AND CONFIGURATION - A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop. | 2015-08-20 |
20150235032 | EFFICIENT STORAGE OF ENCRYPTED DATA IN A DISPERSED STORAGE NETWORK - A method for storing a data object includes identifying data segments of the data object. The method continues with generating key indexes for the data segments. For a data segment, the method continues with accessing data segment key information based on a corresponding key index of the plurality of key indexes to determine whether an encryption key has been generated for a similar data segment. When the encryption key has been generated for the similar data segment, the method continues with using the encryption key to encrypt the data segment to produce an encrypted data segment. The method continues with compressing the encrypted data segment to produce a compressed and encrypted data segment. The method continues with storing the compressed and encrypted data segment in a storage unit of a dispersed storage network (DSN). | 2015-08-20 |
20150235033 | PROVIDING CONTROL IN A MULTI USER ENVIRONMENT - A method for receiving a policy is provided. The method includes receiving a policy, determining a context based on the received policy, and applying the policy, based at least in part on the determined context, to a user space of an electronic device. | 2015-08-20 |
20150235034 | VERIFYING AUTHORIZATION TO DESTROY A PHYSICAL DOCUMENT BEFORE DESTROYING THE PHYSICAL DOCUMENT - A document processing system allows specifying disposition of a paper document at the time a reservation for the document is created in the document processing system. Quality assurance processing after scanning assures all needed processing is performed for the paper document and the corresponding electronic document. Once the quality assurance processing is complete, the disposition of the paper document is scheduled according to the specified disposition policy for the paper document. When the specified disposition policy for a document indicates the document needs to be destroyed, a user scans the unique identifier on the physical document at a first location, receives verification the document should be destroyed, and places the document in a container for documents to be destroyed. At a second location, a user scans the unique identifier on the document and receives verification the document should be destroyed. The physical document may then be destroyed. | 2015-08-20 |
20150235035 | METHOD AND SYSTEM FOR IMPROVING SECURITY AND RELIABILITY IN A NETWORKED APPLICATION ENVIRONMENT - A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database. The security application scans a distributed computing architecture for the existence of security certificates, places newly discovered security certificates in a database, and deletes outdated security certificates. Advantageously, security and reliability are improved in a distributed computing architecture. | 2015-08-20 |
20150235036 | Method of Producing and Distributing Copyrighted Content - The present disclosure teaches methods for producing and distributing content through a network in a way that is practicable and economical for both the owners of the content and the delivery service providers. The present disclosure teaches methods of using content to drive multiple revenue streams from a website that distributes such content. | 2015-08-20 |
20150235037 | Creating Distinct User Spaces Through User Identifiers - A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform. | 2015-08-20 |
20150235038 | METHOD AND APPARATUS FOR ACCESS CONTROL - An access control apparatus includes an acquisition unit and a changing unit. The acquisition unit divides the data stored in a storage device, which is to be accessed from a plurality of access devices, into a plurality of data groups, and obtains the access frequencies of the individual data groups, which are based on accesses to the data belonging to the data groups. The changing unit changes, on the basis of the access frequencies of the individual data groups, definition of data groups accessible by the individual access devices such as to reduce a difference in total access frequency of accessible data groups among the plurality of access devices. | 2015-08-20 |
20150235039 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM AND STORAGE MEDIUM - To manage results of an application provider and user related to service involving API use, an information processing device issues a service code in response to an API use request The information processing device makes service identification information and use API information correspond to the service code and registers the service identification information, use API information, and service code. According to user-specific information from the application provider, unapproved license information is issued for each application user. Approval of this license information by the application user registers the license approval information. At service execution, authentication is performed using this registration information and API use is permitted. The application provider can be identified by service code and the application user can be identified by license information. Accordingly, result information of API use of the respective application provider and application user is generated. | 2015-08-20 |
20150235040 | INFORMATION PROCESSING APPARATUS AND METHOD, INFORMATION PROCESSING SYSTEM, AND PROGRAM - Provided is an information processing apparatus including a display unit that displays a window that controls an application program, an operation unit that receives a user's operation to the window, an imaging unit that captures an image of a range where the user can view the display unit and operate the operation unit, a recognition unit that recognizes users within the image, an authority information management unit that manages authority information in which the application program is associated with an authorized user of the application program, and a window management unit that makes the application program execute a process according to operation content of the operation unit when the user's operation is received in the operation unit and the window is operated and the user coincides with the authorized user of the application program of the window, on the basis of the authority information. | 2015-08-20 |
20150235041 | ALLOWING FIRST MODULE OF COMPUTER CODE RECEIVED FROM VENDOR TO MAKE USE OF SERVICE PROVIDED BY SECOND MODULE WHILE ENSURING SECURITY OF SYSTEM - A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with one or more sandbox constraints. A computing device may execute the first module within a runtime environment. A module integrator may operate within the runtime environment for receiving a request from the first module to access a service provided by a second module and only allowing the first module to access the service when the first module is authorized to access the service according to a service authorization table. The sandbox validator may ensure the first module correctly identifies itself when requesting a service provide by another module and that the first module includes runtime policing functions for non-deterministic operations. A service authorizer may generate an authorization policy for the first module, which is sent to the computing device along with the first module. | 2015-08-20 |
20150235042 | SYSTEMS AND METHODS FOR AUTHENTICATING AN APPLICATION - A computer-implemented method for authenticating an application is described. In one embodiment, a software package is received and the software package may be authorized based at least in part on an evaluation of the software package. Upon authorizing the software package, a signature file is embedded in a directory of the software package. A request to use a privileged service provided by a service provider is received from a client. In some embodiments, the request includes a custom class loader, the custom class loader being configured to construct a proxy object as an interface to the privileged service. | 2015-08-20 |
20150235043 | DATA PROXY SERVICE - One or more techniques and/or systems are provided for deploying an application according to a data access profile used to sandbox the application. For example, an event planner app may be identified for download from an app store. A deployment mock data configuration interface may be presented to a user prior to or as a preliminary operation of downloading and/or installing the event planner app. A data access profile, specifying that the event planner app has access to user age data, but is blocked from accessing user phone number data, for example, may be received through the deployment mock data configuration interface. The event planner app may thus be deployed in a sandbox mode on the device based upon the data access profile (e.g., real age data may be provided to the event planner app whereas mock phone number data may be provided to the event planner app). | 2015-08-20 |
20150235044 | Dynamic Storlets in Storage System Data Path - Machines, systems and methods for dynamically implementing storlets in a storage data path. The method comprises receiving a request to perform a storage-related function on data stored on a first data storage medium in a data storage system; verifying the request by way of an authentication and authorization mechanism to prevent unauthorized access to data stored on the first data storage medium in the data storage system; and utilizing a storlet to service the request, wherein the storlet is dynamically deployed on a node in the data storage system such that the node has sufficient resources to support the storlet to service the request. | 2015-08-20 |
20150235045 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING A SECURE VIRTUAL RESEARCH SPACE - Methods, systems, and computer readable media for providing a secure virtual research space are disclosed. According to one aspect, a system for providing a secure virtual research space includes: a data grid for storing and managing data to be shared among multiple collaborative partners, the data grid comprising at least one data storage device; at least one virtual network appliance, each virtual network appliance comprising a hardware processor for providing controlled access to shared data on the data grid by a user; and a data leakage protection mechanism for preventing unauthorized transfer of data out of the secure virtual research space. | 2015-08-20 |
20150235046 | OPERATION TERMINAL APPARATUS FOR MANUFACTURING APPARATUS, AND MANUFACTURING SYSTEM INCLUDING THE SAME - The object is to provide a manufacturing system allowing operation of a manufacturing apparatus intended by an operator to operate. A manufacturing system includes a manufacturing apparatus, and an operation terminal apparatus capable of communicating with the manufacturing apparatus, wherein an ID tag including ID information on the manufacturing apparatus is attached to the manufacturing apparatus, and the operation terminal apparatus includes: an ID reader that generates current in the ID tag through a magnetic field and reads the ID information from the ID tag; and a control unit that allows the manufacturing apparatus to be operated only after reading the ID information. | 2015-08-20 |
20150235047 | DELAYED FILE VIRTUALIZATION - Certain applications, especially legacy applications, try to write to areas of the system that require administrator privileges and hence fail to run successfully for users with lessened privileges. The disclosed system redirects certain file writes, i.e., globally impactful file writes to specific locations that require administrator privileges and would otherwise fail for others users, so as to allow the same file writes to succeed by redirecting them to happen in the context of the user, i.e., in a per-user virtualization location. In particular, virtualization only occurs when the application is actually going to write to the file, not just when file access is requested without an intention of writing to or otherwise actually altering the file. Following virtualization, applications are redirected to use the virtualized files. The system thus allows users to run applications that otherwise would not be enabled, and to maintain a higher level of security when doing so. | 2015-08-20 |
20150235048 | SYSTEMS AND METHODS FOR ENHANCED MOBILE PHOTOGRAPHY - Certain embodiments of the disclosed technology allow users who are photographed to control those photographs, even when the photographs are taken from a third party's mobile device. Other aspects of the disclosed technology facilitate candid photographs to be taken of users that want them. | 2015-08-20 |
20150235049 | Maintaining Data Privacy in a Shared Data Storage System - Machines, systems and methods for sanitizing data are provided. The method comprises determining whether a data request is submitted by an authorized user, in response to receiving the data request, wherein the data request is for accessing first data stored on a data storage system; in response to determining that the data request is submitted by an authorized user, analyzing data access history by the user to the data storage system; in response to determining that the user has previously accessed data on the data storage system that in light of the first data reveal confidential information which the user is not authorized to access, restricting user's access to the confidential information. | 2015-08-20 |
20150235050 | CONTEXT-AWARE PRIVACY METER - Technologies are presented that provide context-aware privacy metering regarding establishments, such as consumer establishments. A method of rating privacy of one or more establishments may include receiving a location designation of a user device from the user device (automatically or via user input), obtaining privacy-related information regarding one or more establishments in proximity of the location designation, and generating one or more privacy score vector algorithms for the one or more establishments based on the privacy-related information regarding the one or more establishments. The method may further include obtaining a privacy profile of the user, determining one or more privacy scores for the one or more establishments by applying the privacy profile of the user to the one or more privacy score vector algorithms. The method may further include generating and providing a privacy-related recommendation regarding a particular establishment. | 2015-08-20 |
20150235051 | Method And Apparatus For Privacy-Preserving Data Mapping Under A Privacy-Accuracy Trade-Off - A method for generating a privacy-preserving mapping commences by characterizing an input data set Y with respect to a set of hidden features S. Thereafter, the privacy threat is modeled to create a threat model, which is a minimization of an inference cost gain on the hidden features S. The minimization is then constrained by adding utility constraints to introduce a privacy/accuracy trade-off. The threat model is represented with a metric related to a self-information cost function. Lastly, the metric is optimized to obtain an optimal mapping, in order to provide a mapped output U, which is privacy-preserving. | 2015-08-20 |
20150235052 | ELECTRONIC DEVICE AND METHOD FOR PROTECTING USERS PRIVACY - An electronic device protecting privacy is provided. The electronic device includes a communication module configured to perform wireless communication, and a control module configured to select one of an active scan and a passive scan by controlling the communication module. | 2015-08-20 |
20150235053 | SYSTEM ON CHIP, METHOD OF OPERATING THE SAME, AND DEVICES INCLUDING THE SYSTEM ON CHIP - A method of operating a system on chip (SoC) includes converting plain data into cipher data by using an encryption key and transmitting the cipher data directly to a memory controller which controls an operation of a non-volatile memory. The encryption key may be output by a one-time programmable (OTP) memory. | 2015-08-20 |
20150235054 | METHODS AND APPARATUSES FOR ENCRYPTION AND DECRYPTION - An encryption method includes: obtaining a user feature of a user; performing, using a hardware logic circuit, a logical operation on the obtained user feature to generate a hardware encryption function; and encrypting first application data with the generated hardware encryption function to obtain second application data. | 2015-08-20 |
20150235055 | METHOD AND APPARATUS FOR PROCESSING BIOMETRIC INFORMATION IN ELECTRONIC DEVICE - A method and apparatus for processing biometric information in an electronic device including a processor that operates at a normal mode or at a secure mode, the method comprising, detecting a biometric input event from a biometric sensor module at normal mode, creating biometric data based on sensed data from the biometric sensor module at the secure mode, performing biometric registration or biometric authentication based on the created biometric data at the secure mode, and providing result information of biometric registration or biometric authentication at the normal mode. | 2015-08-20 |
20150235056 | STORAGE DEVICE AND MEMORY CONTROLLER THEREOF - A memory controller controlling a nonvolatile memory is provided. The memory controller includes an encryption key feeder configured to feed a cipher key according to a logical address transferred from a host; and an encryption engine configured to perform an encryption operation on data transferred from the host or a decryption operation on data transferred from the nonvolatile memory device, using the cipher key provided from the encryption key feeder. | 2015-08-20 |
20150235057 | Programmable Device Personalization - A semiconductor device may include a secure memory configured to store a programmable key, an interface for programming the programmable key in the secure memory, and a plurality of configurable features of the semiconductor device that are associated with the programmable key, each configurable feature having a set of multiple selectable configurations, wherein a value of the key defines a selection of one of the multiple configurations for each of the configurable features. For example, the key may include multiple sub-keys, each associated with one of the configurable features, wherein a value of each sub-key defines a selection of one of the multiple configurations for the configurable feature associated with that sub-key. In addition, the full programmable key may enable an additional functionality of the semiconductor device. | 2015-08-20 |
20150235058 | ELECTRONIC APPARATUS AND PROTECTING METHOD THEREOF - An electronic apparatus includes an auxiliary memory storing one of security level values that represent a protection or lost state, an auxiliary battery activated to supply a power when a main battery is separated without performing an ending process in the state where the security level value is in the protection or lost state, and a control unit controlling the electronic apparatus to change the security level value into the lost state, thereby allowing the electronic apparatus to operate in a lost mode, when the main battery is separated without performing the ending process in the state where the security level value is in the protection state. | 2015-08-20 |
20150235059 | METHOD OF TRANSFERRING DATA, COMPUTER PROGRAM PRODUCT AND TAG - There is disclosed a method of transferring data using a tag, said tag comprising an RF interface unit, a host interface unit and a memory, the method comprising: the RF interface unit connects the tag to an RF device; the host interface unit connects the tag to a host device; the tag enters into a pass-through mode; in said pass-through mode, the tag transfers data, either in a first configured transfer direction, from the RF device to the host device, or, in a second configured transfer direction, from the host device to the RF device; in said pass-through mode, the tag buffers said data in the memory. Furthermore, a corresponding computer program product and a corresponding tag are disclosed. | 2015-08-20 |
20150235060 | ACTIVE RFID TAG, APPLICATION SYSTEM AND METHOD THEREOF - The present invention provides an active radio frequency identification (RFID) tag and a system and method thereof. The system includes: a coordinator, configured to uninterruptedly and repeatedly transmit a wakeup instruction on a first channel, and a reader/writer, connected to a control processor, and configured to establish communication with the active RFID tag on a second channel after the active RFID tag receives the wakeup instruction, and transmit an action instruction index to the active RFID tag; wherein the active RFID tag comprises: a receiver, configured to receive the wakeup instruction during a time period of an interception state and receive the action instruction index; a processor, configured to store a preset index-action mapping relationship, be waked up according to the wakeup instruction and search out an action instruction corresponding to the action instruction index from the index-action mapping relationship, and execute an operation in response to the action instruction. | 2015-08-20 |
20150235061 | TAG READING APPARATUS AND METHOD, TAG IDENTIFICATION SYSTEM - An apparatus for reading a tag, includes: a reading module for reading first tag information from the tag; a digital logic control module coupled to the reading module, the digital logic control module including a preset digital logic circuit for performing a logical operation on the first tag information to obtain second tag information, the second tag information including real information of the tag; and an output module coupled to the digital logic control module for outputting the second tag information. | 2015-08-20 |
20150235062 | SYSTEMS AND METHODS FOR COLLISION AVOIDANCE IN A MULTIPLE RFID INTERROGATOR ENVIRONMENT - A method for collision avoidance in a multi-reader environment comprising a plurality of Radio Frequency Identification (RFID) interrogators, the method comprises each of the plurality of interrogators entering a quiet state during which none of the interrogators transmits, each of the plurality of interrogators selecting a transmit time after the quiet period during which each of the interrogator will attempt to transmit, each of the plurality of interrogators monitoring their associated receive path, an interrogator of the plurality of interrogators transmitting an instruction during its selected transmit time indicating the beginning of a session when the interrogator does not detect data on its receive path prior to its select transmit time, the interrogator comparing its receive path to its transmit path when it transmits the instruction, the interrogator returning to the quiet state when the receive path does not match the transmit path, and the interrogator completing the session when the receive path matches the transmit path. | 2015-08-20 |
20150235063 | Object Identification Device with RFID Tag of Small Size - A device for the identification of at least one object includes at least one contactless RFID tag arranged in proximity to the object, the object being present on an object support or a rack, each tag containing an electronic chip and a magnetic antenna connected to the chip. The device also includes an electric antenna is present in the object support and is arranged in the latter in such a way as to establish electromagnetic coupling between the electric antenna and the magnetic antenna of the tag. Thus, the dimensions of the electric antenna, and particularly its length, are not then limited by the dimensions of the tag. | 2015-08-20 |
20150235064 | DEVICE, SYSTEM AND METHOD FOR IDENTIFICATION OF OBJECT IN AN IMAGE, AND A TRANSPONDER - A device and method for identification of at least one object in an image registered with an image registration device, wherein each of the at least one object is provided with a wireless tag, the device comprising at least one sensor for registering a wireless signal from the wireless tag and for registering at least one direction to the wireless tag. The wireless signal comprises information for identification of the object. | 2015-08-20 |
20150235065 | PHYSIOLOGICAL SENSOR SYSTEM WITH AUTOMATIC AUTHENTICATION AND VALIDATION BY MEANS OF A RADIO FREQUENCY IDENTIFICATION PROTOCOL WITH AN INTEGRATED RFID INTERROGATOR SYSTEM - This invention relates to a physiological sensor which acquires pre-programmed data from an electrode or an electrode array using Radio Frequency Identification (RFID) technology. The source of the sensor may be authenticated by means of a wireless interface between an RFID transponder affixed to the electrode array, and an RFID interrogator embedded in the patient interface cable. The criteria for use are then verified to ensure that they are met by the electrode array before beginning signal acquisition. If the criteria are not met, a message is provided to the user via the monitor. | 2015-08-20 |
20150235066 | ARTICLE MANAGEMENT SYSTEM - An article management system according to the present invention includes: a reader antenna ( | 2015-08-20 |
20150235067 | RECEIVING DEVICE WITH RFID DETECTION OF BUILT-IN COMPONENTS HELD THEREIN, AND RFID DETECTION METHOD - The invention relates to a receiving device, in particular a cabinet or rack, having a receiving space ( | 2015-08-20 |
20150235068 | METHOD AND APPARATUS FOR SCANNING WITH CONTROLLED SPHERICAL ABERRATION - A reader obtains image data corresponding to an image of optically encoded information that is received via a lens unit that causes controlled spherical aberration blurring that is precisely known. The reader may perform deconvolution processing on the image data to render it decodable. The deconvolution processing may implement a Weiner filter that uses data corresponding to a near-field point spread function of the lens unit. The depth of field of the reader is greater than that of conventional reader in all lighting conditions. | 2015-08-20 |
20150235069 | METHOD AND APPARATUS FOR STORING AND RETRIEVING DATA EMBEDDED INTO THE SURFACE OF A 3D PRINTED OBJECT - A computer implemented method and apparatus for storing and retrieving data embedded into the surface of a 3D printed object is described. The method and apparatus develops an electronic file used for printing a 3D object which embeds as structure into the 3D object, a 3D symbol matrix representative of data to be printed concurrently with the 3D object, such as a 3D barcode. A selected symbology is used for making the symbol matrix in accordance with the type of printing process to be used to print the 3D object. | 2015-08-20 |
20150235070 | METHOD AND DEVICE FOR MOBILE TERMINAL BIOMETRIC FEATURE IMAGING - A device and method for biometric feature imaging are disclosed. The biometric feature imaging device comprises: an optical lens component adapted for optically imaging a biometric feature of a region of interest, an image sensor adapted for converting an optical image containing the biometric feature into an electronic image, an infrared light source adapted for illuminating the biometric feature of the region of interest with infrared light when the infrared light source is activated, and an optical filter unit; the optical filter unit comprises: a first optical filter adapted for blocking invisible light, a second optical filter adapted for allowing infrared light to pass therethrough, a driving mechanism adapted for moving the first optical filter and the second optical filter, and a driving controller; the driving controller is adapted for generating a first driving signal for driving the driving mechanism to move the first optical filter into an optical path of the optical lens component or a second driving signal for driving the driving mechanism to move the second optical filter into the optical path of the optical lens component. | 2015-08-20 |
20150235071 | Biometrics Sensor Having Flat Contact Surface Formed by Signal Extending Structure and Method of Manufacturing Such Sensor - A biometrics sensor comprises: a base; a biometrics sensing module disposed on the base and comprising a biometrics sensing chip and a signal extending structure, both of which functionally link with each other to sense a fine biometrics characteristic of an organism to obtain a biometrics signal; a signal transmission structure disposed on the base and one side or sides of the biometrics sensing module and having a first connection end electrically connected to the signal extending structure, and a second connection end near the base, so that the biometrics signal is transmitted from the biometrics sensing module to the second connection end; and a molding layer, connected to the base, the biometrics sensing module and the signal transmission structure, with an upper surface of the signal extending structure being exposed from the molding layer. A method of manufacturing the biometrics sensor is also disclosed. | 2015-08-20 |
20150235072 | HYPERSPECTRAL IMAGE PROCESSING - A system and method for hyperspectral image processing receives ( | 2015-08-20 |
20150235073 | FLEXIBLE PART-BASED REPRESENTATION FOR REAL-WORLD FACE RECOGNITION APPARATUS AND METHODS - An automated face recognition apparatus and method employing a programmed computer that computes a fixed dimensional numerical signature from either a single face image or a set/track of face images of a human subject. The numerical signature may be compared to a similar numerical signature derived from another image to acertain the identity of the person depicted in the compared images. The numerical signature is invariant to visual variations induced by pose, illumination, and face expression changes, which can subsequently be used for face verification, identification, and detection, using real-world photos and videos. The face recognition system utilizes a probabilistic elastic part model, and achieves accuracy on several real-world face recognition benchmark datasets. | 2015-08-20 |
20150235074 | Face Detector Training Method, Face Detection Method, and Apparatuses - A face detector training method, a face detection method, and apparatuses are provided. In the present invention, during a training phase, a flexible block based local binary pattern feature and a corresponding second classifier are constructed, appropriate second classifiers are searched for to generate multiple first classifiers, and multiple layers of first classifiers that are obtained by using a cascading method form a final face detector; and during a detection phase, face detection is performed on a to-be-detected image by using a first classifier or a face detector that is learned during a training process, so that a face is differentiated from a non-face, and a face detection result is combined and output. | 2015-08-20 |
20150235075 | PREVENTING DISPLAY CLEARING - For preventing clearing of a display, a method is disclosed that includes receiving input from a non-tactile sensor, determining user activity based on the input from the sensor, and preventing a display from clearing in response to determining the user activity. | 2015-08-20 |
20150235076 | METHOD FOR SHOOTING VIDEO OF PLAYING FIELD AND FILTERING TRACKING INFORMATION FROM THE VIDEO OF PLAYING FIELD - Method and system for tracking objects based on video data, wherein each of a number of objects to be tracked on a playing field has been provided with at least one reflective marking configured to reflect invisible light of predefined wavelength, the method including: shooting video of the playing field utilizing one or multiple cameras sensitive to the invisible light of predefined wavelength, when moving marked objects are on the playing field, which is further illuminated during video shooting with one or multiple lamps transmitting the invisible light so as to capture images incorporating images of the reflective markings, supplying digital video image data to image processing equipment, and filtering tracking information from the digital video image data of a game situation on the playing field, wherein marked objects are searched, recognized and tracked and their movements analyzed based on recognizing the corresponding markings from the image data. | 2015-08-20 |
20150235077 | IMAGE DETERMINING DEVICE TO DETERMINE THE STATE OF A SUBJECT - To determine the state of a subject person with a simple structure, an image determining device includes: an imaging unit that captures an image from a first direction, the image including the subject person; a first detector that detects size information from the image, the size information being about the subject person in the first direction; a second detector that detects position-related information, the position-related information being different from the information detected by the first detector; and a determining unit that determines the state of the subject person, based on a result of the detection performed by the first detector and a result of the detection performed by the second detector. | 2015-08-20 |
20150235078 | INFORMATION PROCESSING METHOD, SYSTEM AND ELECTRONIC DEVICE - An information processing method, system and an electronic device are provided according to the embodiments of the disclosure, and applied to an electronic device having at least a first panel, with a first surface of the first panel being provided with a display unit and at least one image acquisition apparatus, where the at least one image acquisition apparatus is positioned below the display unit in the case that the first panel stands on a plane. After an image for a to-be-recognized object and the plane is acquired by the image acquisition apparatus, whether the object contacts the plane is determined based on the acquired image, and information about position change on the object is detected in the case that it is determined that the object contacts the plane. | 2015-08-20 |
20150235079 | LEARNING DEVICE, LEARNING METHOD, AND PROGRAM - Disclosed is a learning device. A feature-quantity calculation unit extracts a feature quantity from each feature point of a learning image. An acquisition unit acquires a classifier already obtained by learning as a transfer classifier. A classifier generation unit substitutes feature quantities into weak classifiers constituting the transfer classifier, calculates error rates of the weak classifiers on the basis of classification results of the weak classifiers and a weight of the learning image, and iterates a process of selecting a weak classifier of which the error rate is minimized a plurality of times. In addition, the classifier generation unit generates a classifier for detecting a detection target by linearly coupling a plurality of selected weak classifiers. | 2015-08-20 |
20150235080 | APPARATUS FOR AND METHOD OF PROCESSING DOCUMENT IMAGE - An apparatus for and a method of processing a document image are provided. The method comprises: generating a luminance component image from the document image; estimating a luminance image from the luminance component image; and adjusting the luminance component image according to the estimated luminance image. Luminance values of pixels at least in horizontal edge areas of the luminance component image are estimated according to luminance values of pixels in a part of background of the luminance component image. If the estimated luminance values are acceptable according to a predetermined criterion, the luminance image is estimated according to the estimated luminance values. If the estimated luminance values are unacceptable, the luminance image is estimated by using the largest one of the luminance values of the pixels in each column of pixels in the luminance component image as the luminance values of all of the pixels in the column. | 2015-08-20 |
20150235081 | Systems and Methods for Imaging Seismic Data - Systems and methods for imaging seismic data using hybrid one-way wave-equation-migration in tilted transverse isotropic media and/or hybrid two-way reverse-time-migration in tilted transverse isotropic media. | 2015-08-20 |
20150235082 | HAZARD DETECTION FOR ASSET MANAGEMENT - An approach that detects locations of hazardous conditions within an infrastructure is provided. This approach uses satellite imagery, GIS data, automatic image processing, and predictive modeling to determine the location of the hazards automatically, thus optimizing infrastructure management. Specifically, a hazard detection tool provides this capability. The hazard detection tool comprises a detection component configured to: receive visual media containing asset location data about a set of physical assets, and hazard location data about potential hazards within a vicinity of each of the set of physical assets. The detection component further receives graphical information system (GIS) data containing asset location data about each of the set of physical assets. The hazard detection tool further comprises an analysis component configured to: analyze the visual media to determine if a hazardous condition exists for each of the set of physical assets; and apply the GIS data to the visual media to determine a location of hazardous conditions within the infrastructure. | 2015-08-20 |
20150235083 | SYSTEM AND METHOD FOR COMPARING DOCUMENTS - The present invention relates to a system and a method for comparing information contained on at least two documents belonging to an entity. The present invention includes at least one device configured to receive information from at least one first document and at least one second document; then, compare at least one first document information and at least one second document information; and determine whether at least one second document contains at least one first document information. The present invention then outputs a result of whether the at least one second document contains at least one first document information. | 2015-08-20 |
20150235084 | DETECTING USER VIEWING DIFFICULTY FROM FACIAL PARAMETERS - A method to determine whether a user is experiencing difficulty visually resolving content is disclosed. The method includes capturing one or more images of the user while the user is viewing the content. The method also includes obtaining facial parameters related to a visual acuity of the user from the captured one or more images. The method further includes determining whether the user is experiencing difficulty visually resolving the content based on the obtained one or more facial parameters. The method is implemented in a device such as a smartphone, tablet computer, or television. The facial parameters include information about the extent to which the user has their eyes open or closed, whether the user is wearing glasses, and the distance at which the user is viewing the content. | 2015-08-20 |
20150235085 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - In order to provide an image processing apparatus etc. that can precisely recognize multiple regions with density value fluctuation in an image with a simple operation in a process of recognizing a specific region from the image, a CPU performs threshold determination for a target pixel and the multiple pixels surrounding the target pixel (determination range) included in a three-dimensional original image by applying predetermined threshold conditions and specifies the target pixel as a recognized pixel when the threshold conditions are satisfied. The threshold conditions preferably apply different thresholds between a pixel on the same flat surface with the target pixel and a pixel on the other flat surface. By successively moving the target pixel (determination range) and repeating the above-mentioned threshold determination, it is performed also for the entire three-dimensional original image. This allows an operator to more precisely recognize a tissue with density value fluctuation such as a cartilage automatically without setting a starting point. | 2015-08-20 |
20150235086 | IMAGE MONITORING SYSTEM AND IMAGE MONITORING PROGRAM - An image monitoring system includes a recorder that records an image captured by a camera via a network. The system is controlled to display the present image captured by the camera or a past image recorded on the recorder. A moving object is detected from the image captured by the camera, the detector including a resolution converter for generating an image with a resolution lower than the resolution of the image captured by the camera. A moving object is detected from the image generated by the resolution converter and positional information on the detected moving object is output. The positional information of the detected moving object is merged with the image captured by the camera on the basis of the positional information. | 2015-08-20 |
20150235087 | Image Processing Method and Apparatus - An image processing technique includes acquiring a main image of a scene and determining one or more facial regions in the main image. The facial regions are analysed to determine if any of the facial regions includes a defect. A sequence of relatively low resolution images nominally of the same scene is also acquired. One or more sets of low resolution facial regions in the sequence of low resolution images are determined and analysed for defects. Defect free facial regions of a set are combined to provide a high quality defect free facial region. At least a portion of any defective facial regions of the main image are corrected with image information from a corresponding high quality defect free facial region. | 2015-08-20 |
20150235088 | METHOD AND SYSTEM FOR INSERTING RECOGNIZED OBJECT DATA INTO A VIRTUAL WORLD - A waveguide apparatus includes a planar waveguide and at least one optical diffraction element (DOE) that provides a plurality of optical paths between an exterior and interior of the planar waveguide. A phase profile of the DOE may combine a linear diffraction grating with a circular lens, to shape a wave front and produce beams with desired focus. Waveguide apparati may be assembled to create multiple focal planes. The DOE may have a low diffraction efficiency, and planar waveguides may be transparent when viewed normally, allowing passage of light from an ambient environment (e.g., real world) useful in AR systems. Light may be returned for temporally sequentially passes through the planar waveguide. The DOE(s) may be fixed or may have dynamically adjustable characteristics. An optical coupler system may couple images to the waveguide apparatus from a projector, for instance a biaxially scanning cantilevered optical fiber tip. | 2015-08-20 |
20150235089 | APPARATUS FOR VIDEO TO TEXT CONVERSION USING VIDEO ANALYSIS - An apparatus for video to text conversion using video analysis, which analyzes at least one object included in video data input from a video acquisition device and provides motion information and attribution information of the object in the form of a sentence or word arrangement according to patterns. The apparatus includes an analysis unit, a generation unit, a database unit and a production unit. | 2015-08-20 |
20150235090 | LANE-LINE RECOGNITION APPARATUS - An apparatus for recognizing lane lines including a broken line. An image capture unit is configured to acquire an image of the surroundings including a roadway ahead of a subject vehicle. An edge-point extractor is configured to extract edge points in the image. An first-edge-point detector is configured to detect first edge points facing at least one missing section of a broken line in the edge points extracted by the edge-point extractor. A lane-line recognizes is configured to recognize a lane line using the edge points extracted by the edge-point extractor other than all or some of the first edge points. | 2015-08-20 |
20150235091 | LANE-LINE RECOGNITION APPARATUS - An apparatus for recognizing a lane line. In the apparatus, when a three-dimensional object lies in the same lane as a subject vehicle and a distance between the three-dimensional object and the subject vehicle is small in an image acquired by an image capture unit, a masking area setter sets a masking area that is partially truncated at or near a lower end of the three-dimensional object in the image. A degree-of-belief calculator is configured to, for each of the edge points extracted by the edge-point extractor, calculate a degree of belief that the edge point is on the lane line. The degree of belief when the edge point is in the masking area is set less than the degree of belief when the edge point is outside the masking area. A lane-line recognizer is configured to recognize the lane line based on the degrees of belief calculated for the edge points. | 2015-08-20 |
20150235092 | PARTS BASED OBJECT TRACKING METHOD AND APPARATUS - The method and apparatus segment parts from a main target image, represent each part as a vertex in a spanning tree, use a detector to generate a confidence map of a location of each part in a succeeding video frame and apply scale change to detector sliding windows centered about each pixel in the part location image. In the succeeding video frame, the target location is sampled and a tracking probability is generated for each part bounding box, with the tracking probability having the maximum value being selected as the location of the target in the succeeding video frame. | 2015-08-20 |
20150235093 | Moving Object Recognition Apparatus - To provide a moving object recognition apparatus that earlier detects a moving object crossing a road, the moving object recognition apparatus includes a left imaging unit | 2015-08-20 |
20150235094 | VEHICLE IMAGING SYSTEM AND METHOD - An imaging system and method generate image data within a field of view that includes a cab of the vehicle and a portion of a route being traveled on and/or wayside devices disposed along the route. The cab includes a space where an operator of the vehicle is located. The image data generated by the camera is examined to identify route damage, a deteriorating condition of the route, and/or a condition of the wayside devices. The condition of the wayside devices can include damage to the wayside devices, a missing wayside device, deterioration of the wayside devices, or a change in terrain. | 2015-08-20 |
20150235095 | TURNOFF RECOGNITION APPARATUS - An apparatus for determining the presence or absence of a turnoff in a roadway. In the apparatus, a white-line candidate extractor applies image processing to an image of surroundings of a subject vehicle acquired by a vehicle-mounted camera to extract white-line candidates in the roadway. A white-line likelihood calculator calculates, for each of the white-line candidates extracted by the white-line candidate extractor, a likelihood of the white-line candidate. A white-line likelihood calculator calculates, for each of the white-line candidates extracted by the white-line candidate extractor, a likelihood of the white-line candidate. A turnoff determiner calculates a likelihood for one of a plurality of features of the white line selected by the white-line selector, and determines the presence or absence of a turnoff in the roadway based on the likelihood calculated by the turnoff determiner. | 2015-08-20 |
20150235096 | METHODS AND SYSTEMS FOR DETECTING DRIVER ATTENTION TO OBJECTS - Methods and systems are provided for detecting an attention of an occupant of a vehicle. In one embodiment, a method includes calculating, by a processor, a first gaze vector in a three-dimensional space based on a first vehicle location, a first vehicle orientation, and a first gaze direction; calculating, by the processor, a second gaze vector in the three-dimensional space based on a second vehicle location, a second vehicle orientation, and a second gaze direction; and determining the attention of the occupant based on the first gaze vector and the second gaze vector. | 2015-08-20 |
20150235097 | Segmentation of an Input by Cut Point Classification - Techniques are provided for segmenting an input by cut point classification and training a cut classifier. A method may include receiving, by a computerized text recognition system, an input in a script. A heuristic may be applied to the input to insert multiple cut points. For each of the cut points, a probability may be generated and the probability may indicate a likelihood that the cut point is correct. Multiple segments of the input may be selected, and the segments may be defined by cut points having a probability over a threshold. Next, the segments of the input may be provided to a character recognizer. Additionally, a method may include training a cut classifier using a machine learning technique, based on multiple text training examples, to determine the correctness of a cut point in an input. | 2015-08-20 |