38th week of 2015 patent applcation highlights part 47 |
Patent application number | Title | Published |
20150261939 | METHODS AND SYSTEMS OF PLAYING MULTI-LICENSE MEDIA CONTENT - Methods and systems described herein play multi-license media contents. A multi-license media content includes digital assets, at least one of which is encrypted and requires one or more licenses to be decrypted when being played. The digital assets may include a video digital asset, an audio digital asset, or a textual digital asset. The digital assets may be played by using licenses from multiple sources such that various components (e.g., a video component, an audio component, or a textual component) of a media content are synchronized. The media content may be played without downloading those licenses that already exist in the domain. Licenses may be retrieved adaptively when the licenses or the license segments required for playing the requested digital asset are incomplete. A related digital asset rather than the digital asset that is requested may be played thereby ensuring an uninterrupted media content delivery. | 2015-09-17 |
20150261940 | SYSTEMS AND METHODS FOR DETECTING INFORMATION LEAKAGE BY AN ORGANIZATIONAL INSIDER - A computer-implemented method for detecting information leakage by an organizational insider may include (1) identifying a set of organizational insiders of an organization, (2) identifying a set of public forums used by one or more organizational insiders, (3) identifying a set of messages posted to one or more public forums, (4) creating a message record corresponding to each message, with the record including a message summary, and a set of message metadata fields, (5) consolidating message records with common metadata fields into a message summary record, and (6) identifying, based on the message summary record, an information leakage threat. Various other methods, systems, and computer-readable media are also disclosed. | 2015-09-17 |
20150261941 | RECORDING DEVICE, AND CONTENT-DATA PLAYBACK SYSTEM - A recording device configured to store content data in an encrypted manner, the recording device comprises a memory unit which stores various data, and a controller which controls the memory unit. The controller possesses a controller key and unique identification information, and is configured to generate a controller-unique key unique for each controller in accordance with the controller key and the identification information. The memory unit stores an MKB generated by encrypting a medium key with a device key set that is a collection of a plurality of device keys, an encrypted device key set generated by encrypting the device key set with the controller-unique key, and a device-key-set index which uniquely identifies the device key set. | 2015-09-17 |
20150261942 | ELECTRONIC SYSTEM FOR THE PROTECTION AND CONTROL OF LICENSE TRANSACTIONS ASSOCIATED WITH THE ALTERATION OF REPLICATED READ ONLY MEDIA AND ITS BOUND LICENSED CONTENT - Distribution of content stored on read only media, and a system and method by which a consumer who purchased content stored on read only media implements a process in the field by which they alter the storage media. A system and tools are used by the consumer to identify, authenticate, disable, and confirm alteration in exchange for compensation, the acquisition of new usage rights to content, or the ability to restore access to or copy content to new media. The process may be conducted by the consumer in the field without assistance and or visual inspection, or be partially conducted in conjunction with an authorized intermediary. Furthermore, the process may restore access to content stored on new media without the need to transfer copies of content. | 2015-09-17 |
20150261943 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO ENCODE AUXILIARY DATA INTO TEXT DATA AND METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO OBTAIN ENCODED DATA FROM TEXT DATA - Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An example method includes detecting, using a processor, a first symbol present in first text data, the first symbol including a white space character; mapping the first symbol to first data using the processor; detecting, using the processor, a second symbol present in the first text data by detecting a white space character or a flow control character; mapping, using the processor, the second symbol to a first bit position of the first data in encoded data; and determining the encoded data, using the processor, based on placing the first data in the first bit position. | 2015-09-17 |
20150261944 | UNOBTRUSIVE VERIFICATION OF USER IDENTITY - Techniques for unobtrusively verifying the identity of a user of a computing device are provided. In one embodiment, the computing device can establish one or more verification models for verifying the user's identity, where at least a subset of the one or more verification models is based on enrollment data that is collected in an unobtrusive manner from the user. The computing device can then verify the user's identity using the one or more verification models. | 2015-09-17 |
20150261945 | BEHAVIOR-BASED IDENTITY SYSTEM - Disclosed are various embodiments for a behavior-based identity system that recognizes and/or authenticates users based at least in part on determining stored behavioral events. For example, stored behavioral events may have been observed previously at a client or have been predefined by an authenticated user. Multiple behavioral events expressed by the client relative to a network site are recorded. The behavioral events may correspond to data that a user has elected to share, and the user may opt-in or opt-out of the behavior-based identity system. A comparison is performed between the multiple observed behavioral events and the stored behavioral events associated with a user identity. An inverse identity confidence score as to whether the user identity does not belong to a user at the client is generated based at least in part on the comparison. | 2015-09-17 |
20150261946 | APPARATUS AND METHOD FOR AUTHENTICATING USER - An apparatus and method for authenticating a user in an electronic device are provided. The method for controlling, by an electronic device, a wearable electronic device to authenticate a user includes receiving biometric information of the user from the wearable electronic device, determining whether the user has been registered in the wearable electronic device, based on the biometric information and stored authentication information, and controlling the wearable electronic device to authenticate the user according to a result of the determination. | 2015-09-17 |
20150261947 | ELECTRONIC DEVICE, SYSTEM AND METHOD - According to one embodiment, an electronic device attachable to a user includes a sensor, a first controller and a second controller. The sensor detects the movement of the electronic device. The first controller wirelessly communicates with a terminal device. The second controller controls the terminal device based on a signal state of the sensor and a communication state of the first controller. | 2015-09-17 |
20150261948 | TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS - A method and system for two-factor authentication used to provide a user access to a target system. After receiving an initial login for a user, a notification is sent to a user device to confirm the transaction. The user may confirm or deny the transaction, alerting the user in real time of any possible fraudulent transactions. | 2015-09-17 |
20150261949 | ELECTRONIC APPARATUS AND AUTHENTICATION METHOD - According to one embodiment, an electronic apparatus sets a first password corresponding to a first input method and a second password corresponding to a second input method. The apparatus performs authentication processing for determining whether a password input by the first input method or the second input method is correct by comparing the password with a registered password. The apparatus determines which of the first input method and the second input method is used, and changes the registered password either to the first password or to the second password based on a result of the determination of the input method. | 2015-09-17 |
20150261950 | SYMMETRIC KEYING AND CHAIN OF TRUST - The present disclosure is directed to sealing data using chain of trust key derivation. In at least one embodiment, a chain of trust may be used to derive sealing keys for sealing data on a device. The device may comprise, for example, at least a memory and processor. The processor may be to at least load code modules from the memory. Following the loading of a code module, the processor may further be to measure the code module, determine a sealing key corresponding to the code module, wherein the sealing key is determined based at least on a prior sealing key corresponding to a previously loaded code module and the measurement of the code module, and seal data corresponding to the loaded code module using the sealing key. Since the sealing keys are state dependent, a method for authorized migration of sealed data during software upgrades is also disclosed. | 2015-09-17 |
20150261951 | SECURITY INFORMATION SHARING BETWEEN APPLICATIONS - A system and method for sharing data and a risk assessment of the data comprises receiving data in a first application and obtaining a risk level of the data, performing an action in the first application necessitating passing a message comprising at least the data and the risk level to a second application, passing the message from the first application to the second application, receiving, at the second application, the message, determining by said second application whether the risk level exceeds a predetermined threshold, when the risk level exceed the predetermined threshold, implementing a protocol to perform actions in the second application using the data in accordance with the protocol, and when the risk level does not exceed the predetermined threshold, running the second application using the data. | 2015-09-17 |
20150261952 | SERVICE PARTITION VIRTUALIZATION SYSTEM AND METHOD HAVING A SECURE PLATFORM - A secure platform system and method for a host computing device. The system includes an ultraboot application that operates in the less privileged user memory and divides the host computing device into a resource management partition, at least one virtual service partition and at least one virtual guest partition. The virtual guest partition provides a virtualization environment for at least one guest operating system. The virtual service partition provides a virtualization environment for the basic operations of the virtualization system. The resource management partition maintains a resource database for use in managing the use of the host processor and the system resources. The virtual service partition is a secure virtualization platform (s-Platform) having at least one isolated secure partition for executing at least one secure application therein. The system also includes at least one monitor that operates in the most privileged system memory. The monitor maintains guest applications in the virtual guest partition within memory space allocated by the virtual service partition to the virtual guest partition. The system also includes a context switch between the monitor and the respective virtual guest partitions and the virtual service partition. The context switch controls multitask processing in the partitions on the at least one host processor. | 2015-09-17 |
20150261953 | Recording Activity-Triggered Computer Video Output - An application that is capable of monitoring Internet or network traffic and performing recordings of computer video output based on one or more violations of network activity policies. The recording application can be installed on the computer to be recorded or another computer or server that is connected through the network to the computer to be recorded. The monitoring application contains a configuration interface that allows a user to set thresholds for certain types of network policy violations. When the one or more violations are detected, the recording application will begin recording video of the computer's video activity. The application can be configured to include settings such as the length of the recording. In a typical environment, the application is a hardware appliance that is capable of monitoring web activity and network traffic and can connect to the computer over the network in order to perform the recording. | 2015-09-17 |
20150261954 | SYSTEMS AND METHODS FOR PRE-INSTALLATION DETECTION OF MALWARE ON MOBILE DEVICES - A computer-implemented method for pre-installation detection of malware on mobile devices may include intercepting one or more communications of an application installation agent that installs applications on a mobile computing device. The method may further include identifying, based on the one or more intercepted communications, an application that has been at least partially downloaded by the application installation agent. The method may also include, in response to identifying the application, and before the application is installed on the mobile computing device, scanning the application for malware. The method may additionally include determining, based on the scan, that the application contains malware. The method may finally include performing a security action in response to determining that the application contains malware. Various other methods, systems, and computer-readable media are also disclosed. | 2015-09-17 |
20150261955 | BEHAVIOR PROFILING FOR MALWARE DETECTION - Provided herein are systems and methods for behavior profiling of targets to determine malware presence. The method includes, in various embodiments, applying a domain specific language to a target, observing a set of temporal sequences and events of the target; determining presence of markers within the set of temporal sequences and events indicative of malware, and identifying the target as being associated with malware based on the markers. In some embodiments, a malware detection system is provided for creating a behavioral sandbox environment where a target is inspected for malware. The behavioral sandbox environment can include forensic collectors. Each of the collectors may be configured to apply a domain specific language to a target; observe a set of temporal sequences and events of the target; determine presence of markers within the set of temporal sequences and events indicative of malware; and detect malware presence based on the markers. | 2015-09-17 |
20150261956 | CONTROLLING TASKS PERFORMED ON COMPUTER SYSTEMS TO SAFEGUARD THE SYSTEMS - An approach is provided for controlling a task. A change ticket is received. A task to perform the change ticket is correlated with command(s) to perform the task, user(s) who are authorized to initiate execution of the command(s), and an authorized location to initiate the execution of the command(s). A request is made by a requestor to execute one of the command(s). It is determined whether (a) the requestor is currently located at the authorized location correlated with the task and (b) the requestor is one of the user(s) correlated with the task. Based in part on (a) and (b) being true, the requested command is executed. If (a) or (b) is false, then execution of the requested command is prevented. | 2015-09-17 |
20150261957 | PROVISIONAL ADMINISTRATOR PRIVILEGES - A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally. | 2015-09-17 |
20150261958 | COMPLIANCE METHOD FOR A CYBER-PHYSICAL SYSTEM - The present invention provides for analysis of cyber-physical systems with relation to compliance requirements such as regulatory compliance, maintenance compliance and safety compliance. Generally, the invention provides for a set of paths from an initial state to an end state, and analyzing the paths to determine which ones contain a violation state. Based on the resultant paths test scripts are generated. Additionally, other compliance related procedures can be performed utilizing the path analysis. | 2015-09-17 |
20150261959 | PRIVACY MEASUREMENT AND QUANTIFICATION - System(s) and method(s) to provide privacy measurement and privacy quantification of sensor data are disclosed. The sensor data is received from a sensor. The private content associated with the sensor data is used to calculate a privacy measuring factor by using entropy based information theoretic model. A compensation value with respect to distribution dissimilarity is determined. The compensation value compensates a statistical deviation in the privacy measuring factor. The compensation value and the privacy measuring factor are used to determine a privacy quantification factor. The privacy quantification factor is scaled with respect to a predefined finite scale to obtain at least one scaled privacy quantification factor to provide quantification of privacy of the sensor data. | 2015-09-17 |
20150261960 | METHOD AND APPARATUS PROVIDING PRIVACY BENCHMARKING FOR MOBILE APPLICATION DEVELOPMENT - A method operates, during development of an application program intended to be run on a mobile user device, to perform a computer assisted analysis of the application program to determine at least one user privacy-related aspect of the application program; and to present the determined at least one user privacy-related aspect. The determined at least one user privacy-related aspect may be presented to a developer of the application program An apparatus and system for performing the method are also disclosed. | 2015-09-17 |
20150261961 | SCENARIO-BASED SECURITY METHOD AND SYSTEM - A scenario-based security method and system are provided. The scenario-based security method includes a) establishing a correspondence table, the correspondence table records an account related to a first feature code and a second feature code; b) programming a standard process and a scenario-based process, the first feature code is assigned to the standard process, and the second feature code is assigned to the scenario-based process; c) a security processing module connected to the correspondence table; and d) the standard process is performed after the security processing module receiving the first feature code, or the scenario-based process is performed after the security processing module receiving the second feature code. The present invention is to provide at least one of two scenario-based feature codes related with a single account to perform a part of normal process, thereby preventing a person held the account is maliciously attacked by a ruffian. | 2015-09-17 |
20150261962 | SYSTEMS, METHODS, AND COMPUTER MEDIUM TO SECURELY TRANSFER LARGE VOLUMES OF DATA BETWEEN PHYSICALLY ISOLATED NETWORKS HAVING DIFFERENT LEVELS OF NETWORK PROTECTION - Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are provided to transfer contents of transactional database records associated with a data historian between two or more networks configured to have different levels of network protection. Generated data barcodes can be decoded to produce contents of transactional database records to be transmitted between two or more networks having different levels of network security protection. Decoded contents of the transactional database records can then be securely communicated back to the sender for comparison by generating validation barcodes to be decoded by the sender. Generated verification barcodes can then be decoded to produce verification data. Verification data can confirm success of the transmission of contents of transactional database records encoded in the data barcodes. Decoded contents of transactional database records can then be stored responsive to an indication of successful transmission. | 2015-09-17 |
20150261963 | SYSTEM AND METHOD FOR DETECTING SENSITIVITY CONTENT IN TIME-SERIES DATA - A system and method for detecting sensitivity content in time-series data is disclosed. The method comprises receiving the time-series data from a source. The data is received for one or more instances. The method further comprises detecting the sensitivity content in the time-series data. The sensitivity content indicates presence of an anomaly. The detecting comprises determining a kurtosis value corresponding to the time-series data. The detecting further comprises comparing the kurtosis value with a reference value. The detecting further comprises processing the data using a first filtering means or a second filtering means. The first filtering means is used when the data distribution of the time-series data is either of a platykurtic distribution or a mesokurtic distribution. The second filtering means is used when the data distribution of the time-series data is a leptokurtic distribution. | 2015-09-17 |
20150261964 | METHODS FOR DYNAMIC DESTRUCTION OF DATA IN A REMOTE DATA STORAGE PLATFORM AND DEVICES THEREOF - The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period. | 2015-09-17 |
20150261965 | DYNAMIC ENCRYPTION KEYS FOR USE WITH XTS ENCRYPTION SYSTEMS EMPLOYING REDUCED-ROUND CIPHERS - One feature pertains to encrypting data to improve data confidentiality. In one aspect, a modified form of XTS encryption is provided for use with reduced-round block ciphers. A data unit index of data to be applied to the reduced-round cipher is encrypted under a secret key to generate or otherwise obtain a modified secret key for applying to the reduced-round cipher. That is, data to be encrypted by the reduced-round cipher is not encrypted under a static key but is instead encrypted under a dynamic key that varies according to the index of the data. If an attacker were to derive the value of the key applied to the reduced-round cipher by analyzing data encrypted by the cipher, the attacker would only obtain the dynamic key corresponding to one particular data unit index, rather than a global static key applied to an entire address space. Decryption procedures are also described. | 2015-09-17 |
20150261966 | SECURE FACTORY DATA GENERATION AND RESTORATION - In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an electronic device are described, in which calibration and provisioning data for an electronic device are generated in a distributed manner and stored on a storage system. The calibration data can be retrieved from the storage system during device assembly and finalized calibration and provisioning data for each electronic device can be stored to the storage system. In one embodiment, a sealing server, to attest to the authenticity of the factory-generated data, seals the finalized calibration data. In one embodiment, an electronic device can access a data store containing the factory-generated data and can update or restore calibration or provisioning data for the device from the data store. | 2015-09-17 |
20150261967 | METHODS AND SYSTEMS FOR CONCEALING INFORMATION - A retrieving system for retrieving information concealed within a sequence of symbols. The system includes a decoder configurable using rule information and operable when so configured to retrieve the information concealed within the sequence of symbols by applying to the sequence of symbols at least one decoder rule determined by the configuration of the encoder. | 2015-09-17 |
20150261968 | VISUALIZING RANDOM CHARACTERS FOR KEYBOARD-LESS DEVICES - In various example embodiments, a system and method are provided for visualizing a set of random characters which may be used to communicate private user information by voice input to a client device. In example embodiments, a request to communicate private user information is received from a client device. In response to the request, a set of random characters is generated, and at least one random character from the set of random characters corresponds to a character from a set of standard characters. An image with the set of standard characters and the set of random characters may be created and displayed on the client device. The client device may be a wearable device in example embodiments. | 2015-09-17 |
20150261969 | Image Analysis and Management - Systems, methods and apparatuses are described herein that allow an enterprise to analyze and manage work product images that are stored on a mobile device. Employees of an enterprise may use a mobile device to store both work product images (e.g., images of sensitive or proprietary information) and non-work product images (e.g., personal images). An enterprise may desire to enforce security protocols on the work product images, but the employee may not want the security protocols applied to the non-work product images. In some embodiments, by installing and executing an image manager that is able to analyze and manage images, the enterprise can enforce security protocols on only the work product images. Such security protocols may include the prevention of unauthorized viewing of the work product image (e.g., by encrypting the work product image) or deleting any work product image from the mobile device when the employee's employment has ended. | 2015-09-17 |
20150261970 | SYSTEMS, METHODS, AND COMPUTER MEDIUM TO SECURELY TRANSFER BACKUP DATA BETWEEN PHYSICALLY ISOLATED NETWORKS HAVING DIFFERENT LEVELS OF NETWORK PROTECTION - Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are provided to transfer data between two or more networks configured to have different levels of network security protection. Large data backup files to be transmitted between the two or more networks can be partitioned into smaller partitioned files, contents of which can be encoded as data barcodes. Generated data barcodes can then be decoded to produce contents of the partitioned files. Decoded contents of the partitioned files can then be securely communicated back to the sender for comparison by generating validation barcodes to be decoded by the sender. Generated verification barcodes can then be decoded to confirm success of the transmission of contents of the partitioned files from the sender. Decoded contents of the partitioned files can be merged and stored responsive to an indication of successful transmission. | 2015-09-17 |
20150261971 | USER-AGNOSTIC BACKEND STORAGE FOR CLOUD-BASED APPLICATIONS - A data storage service is provided in the cloud agnostically to any user account or identity through the use of data storage containers, which are accessed using unique identifiers and independently of any user-based context. The data storage service runs in a backend system and creates a data storage container along with a unique ID that identifies the data storage container from among multiple such containers. Once a cloud-based application receives the unique ID, the cloud-based application may itself assign the data storage container to any user, or to no user, in accordance with the cloud-based application's own programming. | 2015-09-17 |
20150261972 | SYSTEM AND METHOD OF ENCRYPTING FOLDER IN DEVICE - Provided are a system and method of encrypting a folder in a device. The device for controlling access to the folder includes a communication part configured to transmit, to a server, an encryption key generation request with respect to the folder, and receive, from the server, an encryption key associated with the folder that is generated in response to the encryption key generation request, wherein the encryption key generation request comprises an identification of the folder and authentication data of a user who accesses the folder is an authorized user; and a controller configured to authenticate the user by using the encryption key. | 2015-09-17 |
20150261973 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. | 2015-09-17 |
20150261974 | REQUESTING MODIFICATION RIGHTS TO A LINKED FILE SET - A computer implemented system and method of sharing files between a link sharer and a link recipient over a network. The method comprises generating, in response to a request by a link sharer, a file sharing link to a file set, where the link does not provide a link recipient the ability to modify the contents of the linked file set. In response to receiving an indication that the generated link has been activated by a link recipient, displaying a representation of the linked file set with a display element configured to send a request for modification rights to the linked file set when activated by the link recipient. In response to receiving the request for modification rights, either automatically granting modification rights to the linked file set or sending notice to the link sharer indicating that the link recipient is requesting modification rights to the linked file set. | 2015-09-17 |
20150261975 | DATA INTEGRITY PROTECTION FROM ROLLBACK ATTACKS FOR USE WITH SYSTEMS EMPLOYING MESSAGE AUTHENTICATION CODE TAGS - One feature pertains to an efficient procedure for storing data units in a storage device that allows for authentication of data units to prevent rollback attacks and other attacks such as cut-and-paste attacks. In one aspect, a message authentication code (MAC) is generated or otherwise obtained based on a primary key, a data unit to be stored, a corresponding index for the data unit (such as a page index) and a secondary key for the corresponding data unit, which is generated for each new write operation. The MAC and the corresponding data unit are stored in a bulk storage device such as a relatively insecure off-chip storage. Secondary keys are stored in a separate storage device such as a more secure on-chip storage. In some examples, new secondary keys are generated upon each data write based on a non-zero random or pseudorandom value. | 2015-09-17 |
20150261976 | METHOD AND APPARATUS FOR REMOTELY PROVISIONING SOFTWARE-BASED SECURITY COPROCESSORS - A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed. | 2015-09-17 |
20150261977 | METHOD AND APPARATUS FOR REMOTELY PROVISIONING SOFTWARE-BASED SECURITY COPROCESSORS - A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed. | 2015-09-17 |
20150261978 | METHOD AND APPARATUS FOR REMOTELY PROVISIONING SOFTWARE-BASED SECURITY COPROCESSORS - A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed. | 2015-09-17 |
20150261979 | METHOD FOR MONITORING AN ARITHMETIC UNIT - A method is provided for monitoring a control unit having a monolithically integrated processor arrangement including a processor unit and a security processor unit, the processor unit and the security processor unit respectively including one or multiple processor core(s) and a local memory and are designed monolithically, the processor unit carrying out different processes, the security processor unit monitoring whether the different processes carried out by the processor unit are carried out according to certain process criteria and the security processor unit carrying out a safety measure when one of the processes is not carried out according to the certain process criteria. | 2015-09-17 |
20150261980 | Computer Recovery or Return - A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the processor automatically causes to appear during or after boot-up of the processor on the display. that displays information concerning an owner who owns the computer, concerning user information about who the user is who the computer is assigned to for use, and return information for returning the computer to the owner from data stored in the memory. A method for displaying information to assist with returning a computer to its owner. | 2015-09-17 |
20150261981 | MAGNETIC SENSOR DEVICE - A magnetic sensor device includes magnetic detection elements arrayed along a line intersecting the relative movement direction of a medium, and a magnet applying a bias magnetic field to the magnetic detection elements with a line of magnetic force in the constant direction. The magnetic sensor device detects a magnetic field change when a medium with a magnetic pattern passes through the bias magnetic field as an electric signal through the magnetic detection elements and reads the magnetic pattern of the medium. A plurality of reading switches is connected to the respective magnetic detection elements and an output line common to the magnetic detection elements. The magnetic sensor device includes a shift register closing the reading switches sequentially one by one to transfer the outputs from the magnetic detection elements sequentially one by one to the output line. | 2015-09-17 |
20150261982 | COMMUNICATION APPARATUS AND METHOD FOR CONTROLLING THE SAME - There is provided a communication apparatus comprising an antenna. A communication unit is able to use external power that is generated by receiving a signal from an external apparatus via the antenna, thereby transmitting a response to the signal that is received from the external apparatus to the external apparatus. A deactivation unit deactivates, in a case where the external power is generated by receiving the signal from the external apparatus via the antenna, supply of the external power to the communication unit. A control unit performs control so as to interrupt deactivation of supply of the external power to the communication unit by the deactivation unit. | 2015-09-17 |
20150261983 | ANTENNA DEVICE FOR RFID READER/WRITER - An antenna device that includes a pair of antenna elements for an RFID reader/writer to communicate information with an RFID tag is provided. The antenna elements are movably connected to each other so that one of the antenna elements is configured to intensify the other of the antenna elements to radiate radio wave. The antenna device has at least operation modes, where the antenna elements are in parallel to each other and where the antenna elements are orthogonal to each other. The RFID reader/writer device includes such a pair of antenna elements. | 2015-09-17 |
20150261984 | NEAR FIELD COMMUNICATION DEVICE AND ELECTRONIC SYSTEM HAVING THE SAME - A Near Field Communication (NFC) device, system, and method are provided. The NFC device includes a resonance unit configured to emit a first electromagnetic wave to communicate with an external NFC card in a reader mode, and an NFC chip configured to measure an antenna voltage generated by the resonance unit while the resonance unit emits the first electromagnetic wave, and configured to control the resonance unit to stop emitting the first electromagnetic wave when a magnitude of the antenna voltage oscillates. | 2015-09-17 |
20150261985 | RFID READER DEVICE AND ANTENNA DEVICE - An RFID reader device and an antenna device have a first antenna implemented as a near-field antenna, wherein the first antenna has a first dual strip line. The first antenna has a first strip line and a second strip line. The first strip line and the second strip line may be implemented in the form of open loops. The first strip line may be implemented inside the open loop of the second strip line. | 2015-09-17 |
20150261986 | WIRELESS SEARCH - Methods, systems, and devices are described that provide for wireless searching in a location tracking environment. The methods, systems, and/or devices may include tools and techniques that provide for analyzing requests for location data of an entity and preparing a response set based on the request and the available tags. Response sets may include location data for the requested entity, location data for a second entity different from the requested entity, a clarifying question, or a null value. Multiple requests may be received and an order of evaluation will be determined. Results may be adjusted for individual users. Categories as well as individual entities may be searched. Upon receiving a response set, a mobile device may display directions to the identified entity. | 2015-09-17 |
20150261987 | IMAGING SYSTEM - An imaging system includes an optical system, an optical element, a lighting, and an imaging device. The optical system has different focus positions for different wavelengths of light. The optical element extends depth of field of the optical system. The lighting irradiates an object with illumination light of a wavelength that is designated from among multiple wavelengths. The imaging device captures an image of the object that is irradiated with the illumination light and is formed by the optical system. | 2015-09-17 |
20150261988 | BARCODE READER HAVING MULTIPLE ILLUMINATION SYSTEMS AND MULTIPLE SETS OF IMAGING OPTICS - A barcode reader comprises a first lens assembly with a first field of view and a first optical path for first illumination from the first field of view to project to a first image sensor section. The barcode reader further comprises a second lens assembly with a second field of view and a second optical path for second illumination from the second field of view to project to a second image sensor section. The barcode reader further comprises a first illumination system positioned outside of the first field of view projecting the first illumination into the first field of view at a first angle from the first optical path. The barcode reader further comprises a second illumination system positioned between the second lens assembly and a point from which the first illumination system projects the first illumination into the first field of view. | 2015-09-17 |
20150261989 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - An image processing apparatus includes an acquisition unit, a determination unit, and a conversion unit. The acquisition unit acquires from a read image including a machine-readable code at least one of a position of the machine-readable code and character information included in the machine-readable code. The determination unit determines, based on the information acquired by the acquisition unit, a conversion method for a character code included in the machine-readable code. The conversion unit performs conversion of the character code in accordance with the conversion method determined by the determination unit. | 2015-09-17 |
20150261990 | METHOD AND APPARATUS FOR COMPRESSING DNA DATA BASED ON BINARY IMAGE - Provided are a method and apparatus for compressing DNA data based on a binary image. The method for compressing DNA data based on a binary image includes splitting DNA data including adenine (A), thymine (T), guanine (G), cytosine (C), and an indefinite base (N) into a plurality of binary images, determining a coding mode of each of the binary images according to characteristics of each of the binary images, and first coding each of the binary images based on the determined coding mode. | 2015-09-17 |
20150261991 | COMPACT BIOMETRIC AUTHENTICATION DEVICE AND ASSOCIATED METHODOLOGY OF IMAGING AND DETECTING LIVING-TISSUE PATTERNS - The apparatus enables biometric authentication without the risk of forgery or the like and enables living-tissue discrimination. The roughness distribution pattern of deep-layer tissue of the skin covered with epidermal tissue is detected, thereby extracting a unique pattern of the living tissue. Biometric authentication is performed based upon the detected pattern. The roughness distribution pattern of the deep-layer tissue of the skin is optically detected using difference in optical properties between the epidermal tissue and the deep-layer tissue of the skin. Long-wavelength light, e.g., near-infrared light, is used as illumination light cast onto the skin tissue. A fork structure of a subcutaneous blood vessel is used as the portion which is to be detected, for example. The portion which is to be detected is determined based upon the structure of the fork structure. The living-tissue discrimination may be made using the subcutaneous blood vessel. | 2015-09-17 |
20150261992 | HAND-BASED BIOMETRIC ANALYSIS - Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation. | 2015-09-17 |
20150261993 | METHOD FOR DETECTING THE REALITY OF VENOUS NETWORKS FOR THE PURPOSES OF IDENTIFYING INDIVIDUALS, AND BIOMETRIC RECOGNITION METHOD - A method of detecting a venous network in a portion of a human body, the method comprising the steps of capturing an infrared image of said human body portion in order to reveal a venous network of said human body portion; analyzing contrast in the infrared image in order to determine contrast characteristics of the infrared image; and determining whether the human body portion is real on the basis of contrast characteristics determined in the infrared image and of contrast characteristics determined from reference human body portions. A method of biometric recognition with a prior stage of detecting whether a portion of a human body is real. | 2015-09-17 |
20150261994 | IMAGE PROCESSOR, IMPORTANT PERSON DETERMINATION METHOD, IMAGE LAYOUT METHOD AS WELL AS PROGRAM AND RECORDING MEDIUM - An image processor is provided which is configured to detect face images from a plurality of image data, to perform same person determination processing based on the detected face images to classify the face images into image groups each including face images of a single person, thereby identifying persons corresponding to the respective image groups, to determine at least one person as a main person from among the identified persons, and to determine at least one person highly related to the main person as an important person from among persons except the main person. | 2015-09-17 |
20150261995 | Stymieing of Facial Recognition Systems - For surreptitiously stymieing a recognition of facial characteristics by a facial recognition system using a camera, a user wears an object in front of at least one eye, where the object includes a light displacer. The light displacer optically displaces light radially relative to the original light direction, but still parallel to the original light direction so that a view by the eye through the light displacer is not distorted. With the light displacer, there is an apparent position of the eye perceived by the camera which is shifted relative to other features of the face and relative to the actual position of the eye. Consequently, an image of the face obtained by the camera locates the eye at the apparent position which is substantially different from an image which would have been obtained with the actual position of the eye, so that the facial recognition system is stymied. | 2015-09-17 |
20150261996 | ELECTRONIC APPARATUS FOR PROVIDING HEALTH STATUS INFORMATION, METHOD OF CONTROLLING THE SAME, AND COMPUTER-READABLE STORAGE MEDIUM - Provided is a device and method of providing health status information. The device includes: a device including: a storage configured to store a first image including a face of a user and first health status information extracted from the first image; an imager configured to capture an image; a controller configured to control the imager to capture a second image including the face of the user and to extract second health status information from the captured second image; and a display configured to output the second image and information other than the stored first health status information from among the extracted second health status information. | 2015-09-17 |
20150261997 | APPARATUS AND METHOD FOR RECOGNIZING IMAGE - A method for recognizing an image in an electronic device is provided so as to determine whether or not a specific object is actually within the presence of immediate photographable vicinity) of the electronic device based on certain characteristics of one or more images of the specific object. Images of the specific object which is focused and shot at different magnifications are obtained. Characteristics of an object region and a background region between the obtained images are compared. Whether the object is real is determined depending on the comparison result. An apparatus hardware configured for operation of the method in electronic devices including but limited to mobile terminals. | 2015-09-17 |
20150261998 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - An image processing apparatus includes an image obtaining unit that obtains an image of a face, an edge enhancer that performs edge enhancement on the image and forms an edge-enhanced image, a binarizer that performs binarization on the edge-enhanced image and forms a binary image, and an area identifying unit that identifies an eyelash area in the image on the basis of the binary image. | 2015-09-17 |
20150261999 | METHOD FOR DETECTING A TRUE FACE - Detecting a true face includes: capturing a parallel image of a face captured by a camera having a filter polarising parallel to a polarisation direction and an orthogonal image of the face captured by a camera's filter polarising orthogonally to the polarisation direction; computing a difference image from difference between the parallel and orthogonal images; filtering the difference image in wavelet packets on 5 levels, eliminating “low” resolution levels; dividing the filtered image into sub-images; the filtered image and each sub-image undergoes: a Fourier or discreet cosine transformation; and modelling during which the frequency decrease profile is modelled by a model of the power type (a.x̂b+c); extracting, from the filtered image and each sub-image, texture characteristics of face surface specularities; analysing, for each face region, coefficient “b” and the texture characteristics extracted regarding the model corresponding to said face region; and deciding the veracity of the face from the analysis. | 2015-09-17 |
20150262000 | METHOD AND APPARATUS FOR SUMMARIZATION BASED ON FACIAL EXPRESSIONS - A method, apparatus, computer program product and system are provided for facilitating video and/or image summarization based on facial expressions. In this regard, a method is provided that includes receiving one or more first frames and one or more second frames, determining information regarding one or more facial expressions contained in the one or more second frames, and causing the information regarding the one or more facial expressions to be associated with at least one of the one or more first frames. | 2015-09-17 |
20150262001 | Body Scan - A depth image of a scene may be received, observed, or captured by a device. The depth image may then be analyzed to determine whether the depth image includes a human target. For example, the depth image may include one or more targets including a human target and non-human targets. Each of the targets may be flood filled and compared to a pattern to determine whether the target may be a human target. If one or more of the targets in the depth image includes a human target, the human target may be scanned. A skeletal model of the human target may then be generated based on the scan. | 2015-09-17 |
20150262002 | GESTURE RECOGNITION APPARATUS AND CONTROL METHOD OF GESTURE RECOGNITION APPARATUS - A gesture recognition apparatus acquiring a gesture performed by an operator and generating an instruction corresponding to the gesture, the gesture recognition apparatus comprises an imaging unit configured to capture an image of a person who performs a gesture; a posture determining unit configured to generate posture information representing a posture of the person who performs a gesture in a space, based on the captured image; a gesture acquiring unit configured to acquire a motion of an object part that performs the gesture from the capture image and to identify the gesture; and an instruction generating unit configured to generate an instruction corresponding to the gesture, wherein the gesture acquiring unit corrects the acquired motion of the object part, based on the posture information. | 2015-09-17 |
20150262003 | MOTION ESTIMATION DEVICE, ROBOT, AND MOTION ESTIMATION METHOD - A motion estimation device includes an acquisition unit configured to acquire a distance between a sensor and an object and a situation estimation unit configured to estimate a person's reaction based on a distance acquired by the acquisition unit at a first time that is set based on a time when a person is being urged to stop raising his/her hand. | 2015-09-17 |
20150262004 | INFORMATION INPUT APPARATUS, INFORMATION INPUT METHOD, AND COMPUTER PROGRAM - An information input apparatus includes an observation unit that observes an environment including a user and one or more apparatuses to be controlled and includes a sensor; a learning unit that separates a foreground including the user and the one or more apparatuses to be controlled and a background including the environment except for the foreground from observation data obtained by the observation unit and learns three-dimensional models of the foreground and the background; a state estimation unit that estimates positions and postures of already modeled foregrounds in the environment; a user recognition unit that identifies fingers of the user from the foreground and recognizes a shape, position, and posture of the fingers; and an apparatus control unit that outputs a control command to the one or more apparatuses to be controlled on the basis of the recognized shape, position, and posture of the fingers. | 2015-09-17 |
20150262005 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing includes processing circuitry configured to generate data to control a display device to superimpose on a displayed image a control object associated with a voice input, wherein the displayed image is a feedback image of a gesture operation performed by a user, and the displayed image is an image derived from a camera-captured image. | 2015-09-17 |
20150262006 | MONITORING SYSTEM AND MONITORING METHOD - A monitoring system includes a number-of-people counting unit that is provided inside a railway vehicle and counts the number of deboarding passengers who deboard the railway vehicle, a first camera that is provided in a stop of the railway vehicle and captures images of deboarding passengers who deboard the railway vehicle which has arrived in a home of the stop or has arrived at the stop, and a server that stores information regarding the number of deboarding passengers counted by the number-of-people counting unit and video data regarding the deboarding passengers captured by the first camera in correlation with each other. | 2015-09-17 |
20150262007 | DETECTING AND EXTRACTING IMAGE DOCUMENT COMPONENTS TO CREATE FLOW DOCUMENT - One or more components of an image document may be detected and extracted in order to create a flow document from the image document. Components of an image document may include text, one or more paths, and one or more images. The text may be detected using optical character recognition (OCR) and the image document may be binarized. The detected text may be extracted from the binarized image document to enable detection of the paths, which may then be extracted from the binarized image document to enable detection of the images. In some examples, the images, similar to the text and paths, may be extracted from the binarized image document. The extracted text, paths, and/or images may be stored in a data store, and may be retrieved in order to create a flow document that may provide better adaption to a variety of reading experiences and provide editable documents. | 2015-09-17 |
20150262008 | DETECTION OF THE PRESENCE OF AN ITEM USING REFLECTION CHARACTERISTICS - The present invention provides an apparatus for detecting presence or otherwise of an item comprising at least two regions having different optical characteristics, said apparatus comprising: an emitter operative to illuminate a measuring region of said apparatus with electromagnetic radiation; and a detector located and operative to receive electromagnetic radiation reflected from said measuring region of said apparatus and operative to output a signal corresponding to a measured characteristic of said electromagnetic radiation reflected from said measuring region, wherein said apparatus is operative to compare said measured characteristic with a set of pre-defined characteristics, and further wherein if said measured characteristic is consistent with at least one of said pre-defined characteristics, the apparatus is operative to output a signal indicative of presence or otherwise of one of said at least two regions of said item in said measuring region. | 2015-09-17 |
20150262009 | Apparatus for, a Method of, and a Network Server for Detecting Data Patterns in a Data Stream - An apparatus ( | 2015-09-17 |
20150262010 | APPARATUS AND METHOD FOR ROBUST EYE/GAZE TRACKING - At least one image registering unit records at least one series of images representing a subject. A control unit controls an operation sequence for the at least one image registering unit in such a manner that a subsequent data processing unit receives a repeating sequence of image frames there from, wherein each period contains at least one image frame of a first resolution and at least one image frame of a second resolution being different from the first resolution. Based on the registered image frames, the data processing unit produces eye/gaze tracking data with respect to the subject. | 2015-09-17 |
20150262011 | IMAGE PROCESSING FOR LAUNCH PARAMETERS MEASUREMENT OF OBJECTS IN FLIGHT - An example embodiment includes a method of measuring launch parameters of an object in flight. The method includes capturing images of an object in flight. A radius of the object and a center of the object are identified in each of the images. A velocity, an elevation angle, and an azimuth angle are calculated based on the radius of the object, the center of the object, and pre-measured camera alignment values. The method further includes cropping the images to a smallest square that bounds the object and flattening the images from spherical representations to Cartesian representations. The method also includes converting the Cartesian representations to polar coordinates with a range of candidate centers of rotations. Based on a fit of the polar image pair, the spin axis and spin rate are measured. | 2015-09-17 |
20150262012 | OBJECT PICKING SYSTEM, OBJECT DETECTING DEVICE, OBJECT DETECTING METHOD - The present invention relates to a device and a method of detecting arbitrarily piled objects, and a device and a method for picking a detected object. The present invention may provide a device and a method of detecting an object, which extract a unique local characterized part of the object by using a visual sensor, detect an object region, and estimate a posture from the detected object region. Also the present invention may provide an object picking system capable of being applied to an actual production process, such as assembling or packaging, in a cell producing method. | 2015-09-17 |
20150262013 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD AND PROGRAM - There is provided an image processing apparatus including a detection unit configured to detect a marker to be a mark for attaching an image, from a captured image captured by an imaging apparatus, a determination unit configured to determine a change in state of the marker, and an image processing unit configured to generate a first image obtained by attaching a marker corresponding image corresponding to the marker to a position of the marker in the captured image, and change the first image to a second image according to the change in state of the marker. | 2015-09-17 |
20150262014 | IMAGE INTERPRETATION REPORT CREATING APPARATUS AND IMAGE INTERPRETATION REPORT CREATING SYSTEM - According to one embodiment, an image interpretation report creating apparatus that creates an image interpretation report including a finding and is associated with a key image, includes a key image selecting unit, a position detecting unit, a first local structure information generating unit, and a display. A key image selecting unit selects a sub-image as the key image from among a plurality of sub-images comprising a medical image. A position detecting unit detects a position of a characteristic local structure in a human body from the medical image. A first local structure information generating unit identifies a local structure in the key image or in a vicinity of the key image and generates information on the identified local structure as first local structure information. A display displays the first local structure information as a candidate to be entered in an entry field for the finding. | 2015-09-17 |
20150262015 | EXTRACTION METHOD AND DEVICE - An extraction device includes a processor that executes a procedure. The procedure includes: from captured images obtained by capturing a sports game having a match style of attack toward a goal provided in territory of an opposing team, identifying a portion of captured images in which the captured images change over time toward a direction of one or other goal; and extracting a scene in which one or other team is attacking based on the portion of captured images. | 2015-09-17 |
20150262016 | COMPUTING DEVICE FOR ENHANCING COMMUNICATIONS - A computing device for enhancing communications is disclosed. The computing device includes a memory configured to store data, a video camera configured to receive video input data, and a microphone configured to receive audio input data. The computing device also includes a processor that is configured to analyze the received video input data, the received audio input data, and the data stored in the memory. The computing device further includes a visual display device that is configured to output a visual display based on the processor analysis, and a speaker output device that is configured to output an audio signal based on the processor analysis. | 2015-09-17 |
20150262017 | EXTRACTION METHOD AND DEVICE - An extraction device includes a processor that executes a procedure. The procedure includes identifying, as a video data portion including a scene of interest in a sports game, a portion of, or all of, captured images of the sports game that correspond to a period in which audio data obtained by collecting sound from the sports game exhibits relatively loud sound, or a period in which the audio data exhibits sound louder than a specific loudness. | 2015-09-17 |
20150262018 | DETECTING MOVING VEHICLES - A method of detecting at least one moving vehicle includes receiving ( | 2015-09-17 |
20150262019 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - Provided are an information processing system, an information processing method, and a program capable of favorably estimating the association between persons appearing in pictures. This information processing system includes: a correspondence relationship estimation unit for determining a scale indicating a possibility that one or more persons appearing in pictures captured respectively at a first time by a plurality of video cameras, and one or more persons appearing in pictures captured respectively at a second time, which is later than the first time, by the plurality of video cameras, are respectively associated with each other, and estimating a correspondence relationship between the person appearing at the first time and the person appearing at the second time in consideration of all scales relating to at least one person appearing at one of the first time and the second time, and all persons appearing at the other time; and a person-to-be-tracked registration unit for receiving an input of correspondence information to the effect that at least a part of one or more persons captured at the first time corresponds, or does not correspond, with at least a part of one or more persons captured at the second time. | 2015-09-17 |
20150262020 | MARKING LINE DETECTION SYSTEM - A marking line detection system includes an imaging device, a marking line candidate detection unit, a marking line correction unit, a center line determination unit and a validity determination unit. The marking line candidate detection unit detects first and second vehicle's marking line candidates. The marking line correction unit corrects a position of the second vehicle's marking line candidate based on a position of the first vehicle's marking line candidate. When the first vehicle's marking line candidate is the valid center line, the marking line correction unit performs a correction of the position of the second vehicle's marking line candidate based on the position of the first vehicle's marking line candidate. When the first vehicle's marking line candidate is not the valid center line, the marking line correction unit does not perform the correction based on the position of the first vehicle's marking line candidate. | 2015-09-17 |
20150262021 | SYSTEMS AND METHODS FOR AUTOMATING CUSTOMER PREMISES EQUIPMENT REGISTRATION - A system for automating customer premises equipment (CPE) registration has CPE located at a customer premises. The CPE has a product identifier, such as a serial number or barcode, located on a housing of the CPE for identifying the CPE, and a data storage element is located in a network for storing customer data, including customer premises location information. A technician uses a mobile communication device to automatically detect the product identifier, and the mobile communication device has a location sensor configured to determine the location of the device. The mobile communication device is configured to transmit a message indicative of the product identifier and the location of the device to the data storage element via a cellular network, and the data storage element is configured to automatically associate the product identifier with a customer based on the customer data and the location of the device. | 2015-09-17 |
20150262022 | METHOD AND APPARATUS FOR PROCESSING IMAGES, AND STORAGE MEDIUM STORING THE PROGRAM - An image processing method improves the extraction accuracy of objects other than symbols. The image processing method may include four processes. In the first process, an image is input. In the second process, a symbol in the image is read. In the third process, a mask area including the symbol is set. In the fourth process, an object located in an area other than the mark area in the image is recognized. | 2015-09-17 |
20150262023 | SYSTEMS AND METHODS FOR NOTE RECOGNITION - At least some aspects of the present disclosure feature systems and methods for note recognition. The note recognition system includes a sensor, a note recognition module, and a note extraction module. The sensor is configured to capture a visual representation of a scene having one or more notes. The note recognition module is coupled to the sensor. The note recognition module is configured to receive the captured visual representation and determine a general boundary of a note from the captured visual representation. The note extraction module is configured to extract content of the note from the captured visual representation based on the determined general boundary of the note. | 2015-09-17 |
20150262024 | SYSTEMS AND METHODS FOR FACE AUTHENTICATION OR RECOGNITION USING SPECTRALLY AND/OR TEMPORALLY FILTERED FLASH ILLUMINATION - A face authentication or recognition system embodiment includes a processing unit; a flash illumination drive circuit; a flash illumination unit having a flashlamp configured to generate a set of flash illumination pulses; a set of spectral filters configured to pass a set of spectrally filtered flash illumination pulses; a lens; an image sensor configured to receive a set of filtered flash illumination pulses reflected from a subject's face and generate a corresponding facial image dataset; and a memory or data storage device configured to store facial image datasets, enrolment datasets, and query datasets, and which includes a face authentication or recognition module. Spectrally filtered flash illumination pulses have an intensity at least approximately equal to the intensity of ambient sunlight, essentially regardless of an outdoor environment under consideration upon or proximate to the surface of the earth. Spectrally filtered flash illumination reflected from the subject's face can be readily distinguished from ambient light, regardless of the environment in which the subject's facial image was captured, providing surprisingly robust facial authentication and/or recognition performance essentially regardless of ambient lighting conditions. | 2015-09-17 |
20150262025 | APPARATUS FOR CONTROLLING IMAGING OF CAMERA AND SYSTEM PROVIDED WITH THE APPARATUS - In a camera control apparatus, an imaging control unit controls imaging operations of a camera. This camera is able to capture an image of a license plate of a vehicle entering a premises from an entrance thereof. A detection area setting unit sets a planar detection area for detecting a position of the vehicle. A vehicle detecting unit detects the position of the vehicle based on the detection area. The camera is capable of changing the imaging direction thereof. The detection area setting unit sets detection area groups, each of which are composed of a plurality of detection areas aligned in a width direction of the entrance, in multiple stages from the entrance towards the inside of the premises. The imaging control unit performs imaging while changing the imaging direction of the camera based on the position of the vehicle detected by the vehicle detecting unit. | 2015-09-17 |
20150262026 | IMAGE PROCESSING APPARATUS, AND OPERATION METHOD AND PROGRAM THEREFOR - For assigning a binary label representing belonging to a target region or not to each pixel in an image: a predicted shape of the target region is set; a pixel group including N pixels is selected, where N is a natural number of 4 or more, which have a positional relationship representing the predicted shape; and an energy function is set, which includes an N-th order term in which a variable is a label of each pixel of the pixel group, so that a value of the N-th order term is at a minimum value when a combination of the labels assigned to the pixels of the pixel group is a pattern matching the predicted shape, and increases in stages along with an increase in a number of pixels to which a label different from the pattern is assigned. The labeling is performed by minimizing the energy function. | 2015-09-17 |
20150262027 | DETECTION DEVICE AND DETECTION METHOD - A device for generating heartbeat information of an object, includes circuitry configured to acquire a plurality of images of the object, the plurality of images being captured in a time series and including a first image and a second image, generate a luminance difference between a first segment in the first image and a second segment in the second image, the first segment and the second segment corresponding to a specific part of the object, execute a determination process for the first segment in the first image when the luminance difference is less than a threshold value, the determination process determining a value indicating a state of the object at a time when an image is captured based on luminance information of a segment in the image, and generate the heartbeat information based on a first value of the first image and other values of other images. | 2015-09-17 |
20150262028 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD AND IMAGE PROCESSING PROGRAM - An image processing apparatus serves to estimate a rotation amount between first and second images, at least one of which has a rectangular shape. The image processing apparatus includes a CPU having an angle estimation unit. The angle estimation unit includes: an amplitude component derivation unit for frequency-converting the images to derive an amplitude component of each of the images; an adjustment unit for adjusting the image having a rectangular shape for increasing a size of a shorter side so as to be equal to a size of a longer side on a frequency space; a conversion unit for performing polar coordinate conversion of the amplitude component of the first image and the amplitude component of the second image after adjustment; and a matching unit for outputting the rotation amount between the images by calculating an amount of deviation between positions of polar coordinate conversion images. | 2015-09-17 |
20150262029 | SENSOR-BASED CAMERA MOTION DETECTION FOR UNCONSTRAINED SLAM - Techniques are presented for monocular visual simultaneous localization and mapping (SLAM) based on detecting a translational motion in the movement of the camera using at least one motion sensor, while the camera is performing panoramic SLAM, and initializing a three dimensional map for tracking of finite features. Motion sensors may include one or more sensors, including inertial (gyroscope, accelerometer), magnetic (compass), vision (camera) or any other sensors built into mobile devices. | 2015-09-17 |
20150262030 | IMAGE PROCESSING DEVICE, IMAGE PROCESSING METHOD, AND IMAGE PROCESSING PROGRAM - Disclosed is an image processing device that includes: a matching processing unit that performs matching processing on an input image based on one or a plurality of preregistered templates; an interaction unit that outputs a result indicating a range of each region extracted from the input image assuming that the region matches one of the templates, and that receives from a user an input regarding whether an extraction result of each region is proper; and a control unit that executes optimization processing of a parameter to be used for the matching processing when there has been an input that the extraction result is not proper, and that executes update processing of the template according to success or failure of the matching result of each extracted region when there has been an input that the extraction result is proper. | 2015-09-17 |
20150262031 | Method And Apparatus For Identifying Picture - A picture of a web page is a two-dimensional code picture and is determined when the picture is triggered. A user is prompted to determine whether to identify the two-dimensional code picture when the picture of the web page is the two-dimensional code picture. The two-dimensional code picture is parsed after receiving an instruction of identifying the two-dimensional code picture from the user. Two-dimensional code information is obtained, and processing is performed according to the two-dimensional code information. | 2015-09-17 |
20150262032 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - In an information processing apparatus, an object recognition process is performed on each image of a multi-viewpoint image group based on focal length information and information about objects. Objects are specified in each image. A target object is determined based on relationship information indicating a relationship between the objects. An image that contains the determined target object is generated. | 2015-09-17 |
20150262033 | METHOD AND TERMINAL DEVICE FOR CLUSTERING - Embodiments of the present disclosure disclose a method and a terminal device for clustering. The method includes: obtaining a weighted distance between two classes according to a weight coefficient corresponding to an inter-object distance with respect to all classes to be combined; determining whether there are classes that can be combined according to the weighted distance between the two classes and a preset distance threshold; combining all of the classes that can be combined respectively, when the classes that can be combined exist; returning to perform the step of obtaining the weighted distance between the two classes until the number of the classes after combined is the same as the number of the classes before combined; and obtaining a clustering result. The present disclosure improves accuracy of the clustering result. | 2015-09-17 |
20150262034 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND STORAGE MEDIUM STORING PROGRAM - An image processing apparatus acquires a read image which has been obtained by reading one or a plurality of originals by a reading apparatus and includes an original region corresponding to each of the one or plurality of originals, and specifies an object corresponding to contents of the original in the read image based on a group of pixels corresponding to luminance values smaller than a predetermined luminance value in the acquired read image. If a plurality of objects are specified, it is determined whether the plurality of objects are included in one original region, thereby deciding a candidate region corresponding to each of the one or plurality of original regions. | 2015-09-17 |
20150262035 | AUTOMATED FEATURE ANALYSIS, COMPARISON, AND ANOMALY DETECTION - Novel methods and systems for automated data analysis are disclosed. Data can be automatically analyzed to determine features in different applications, such as visual field analysis and comparisons. Anomalies between groups of objects may be detected through clustering of objects. | 2015-09-17 |
20150262036 | GLOBAL VISUAL VOCABULARY, SYSTEMS AND METHODS - Systems and methods of generating a compact visual vocabulary are provided. Descriptor sets related to digital representations of objects are obtained, clustered and partitioned into cells of a descriptor space, and a representative descriptor and index are associated with each cell. Generated visual vocabularies could be stored in client-side devices and used to obtain content information related to objects of interest that are captured. | 2015-09-17 |
20150262037 | VISUAL RECOGNITION USING SOCIAL LINKS - System, method and architecture for providing improved visual recognition by modeling visual content, semantic content and an implicit social network representing individuals depicted in a collection of content, such as visual images, photographs, etc. which network may be determined based on co-occurrences of individuals represented by the content, and/or other data linking the individuals. In accordance with one or more embodiments, using images as an example, a relationship structure may comprise an implicit structure, or network, determined from co-occurrences of individuals in the images. A kernel jointly modeling content, semantic and social network information may be built and used in automatic image annotation and/or determination of relationships between individuals, for example. | 2015-09-17 |
20150262038 | Creating Defect Classifiers and Nuisance Filters - Methods and systems for setting up a classifier for defects detected on a wafer are provided. One method includes generating a template for a defect classifier for defects detected on a wafer and applying the template to a training data set. The training data set includes information for defects detected on the wafer or another wafer. The method also includes determining one or more parameters for the defect classifier based on results of the applying step. | 2015-09-17 |