01st week of 2019 patent applcation highlights part 53 |
Patent application number | Title | Published |
20190005221 | AUTHENTICATION USING PRISM MEMBER - A prism member of an authentication apparatus includes a living body contact surface in contact with a visible light-radiated living body, and an imaging surface opposed to the living body contact surface and formed at a position in generally parallel therewith. The prism member includes a reflection surface in contact with the living body contact surface and the imaging surface, and to totally reflect light reflected off from the living body contact surface toward the imaging surface. The reflection surface is at an angle such that light from an inside of the prism member is totally reflected at the living body contact surface in an optical path running from the imaging surface and reaching the living body contact surface via the reflection surface. A first imaging unit captures an image including at least a part of said body contact surface and at least a part of the reflection surface. | 2019-01-03 |
20190005222 | Face-Controlled Liveness Verification - Techniques for implementing face-controlled liveness verification are provided. In one embodiment, a computing device can present, to a user, a sequential series of targets on a graphical user interface (GUI) of the computing device, where each target is a visual element designed to direct the user's attention to a location in the GUI. The computing device can further determine whether the user has successfully hit each target, where the determining comprises tracking movement of a virtual pointer controlled by the user's gaze or face pose and checking whether the user has moved the virtual pointer over each target. If the user has successfully hit each target, the computing device can conclude that the user is a live subject. | 2019-01-03 |
20190005223 | METHOD TO RECOVER DATA FROM A LOCKED DEVICE FOR UPLOAD TO A SERVICE - A method for recovering a digital file from a locked device is provided. An identity token is received at a recovery app on the locked device. The recovery app retrieves a digital file from the locked device and sends the digital file and the identity token to a service external to the device. | 2019-01-03 |
20190005224 | Trust Based Computing - A method, an apparatus and a computer program product for trust based computing in a network infrastructure including computing resources. In at least one secure element for attesting trust of one or more of the computing resources, is stored one or more criteria for evaluating trust of location information indicating a location of at least one computing resource. Further is obtained, by the at least one secure element, location information indicating a current location of at least one computing resource; and finally is determined, by a management software, whether the location information of the network infrastructure is secure on the basis of the information indicating the current location and the criteria. | 2019-01-03 |
20190005225 | DETECTION OF ATTACKS IN THE CLOUD BY CROWD SOURCING SECURITY SOLUTIONS - Methods are provided for building and tuning a correlation data structure. The correlation data structure includes relationship correlations with relationship scores that reflect the level of correlation between alert conditions and feature set events that occurred in a machine. Each relationship correlation further includes a time of influence associated with the times of occurrence for each alert condition and corresponding feature set event. The correlation data structure is built and tuned using sourcing to leverage the alert conditions and feature set events on each machine for all machines in the network. Methods are also provided to use the correlation data structure to monitor the machines in a network, detect feature set events, and detect if alert conditions correlated with those feature set events are likely to occur. The methods further provide for mitigating those alert conditions. | 2019-01-03 |
20190005226 | AUTOMATIC UNPACKING OF EXECUTABLES - Provided are methods and systems for unpacking and analyzing malware for purposes of identification and investigation. A malicious executable or an application containing malicious code is executed in sandboxed memory to unpack the executable. The memory is then dumped to disk and one or more post-processing operations are performed to generate a new version of the executable, including identifying an initial entry point of the executable, recreating the relocation table, and recreating the import address table, export table, and other tables of the executable. Various types of analyses, such as static analyses, which could not be performed on the malicious executable, are able to be performed on the new version of the executable. | 2019-01-03 |
20190005227 | SANDBOX BASED INTERNET ISOLATION IN A TRUSTED NETWORK - Methods and systems are disclosed for sandbox based internet isolation system in a trusted network. A networked computer system may include a trusted local area network (LAN) and at least one host computer system connected to the trusted LAN. The host computer system may include a host-based firewall, an operating system, a first memory space, and a second memory space. The host-based firewall may be configured to prevent unauthorized communication between the host computer system and one or more other devices on the trusted LAN. The second memory space may be configured to enable storage and/or operation of one or more applications and/or processes associated with a sandboxed computing environment. The host computer system may include a sandbox firewall that enforces a separation of the first and second memory spaces. | 2019-01-03 |
20190005228 | TRUSTED AND UNTRUSTED CODE EXECUTION IN A WORKFLOW - Methods, systems, and computer program products are described herein for implementing a workflow development system that enables users to incorporate custom functionality within a workflow. During runtime execution of the workflow, the custom functionality (e.g., custom code) is executed in a sandboxed environment, thereby ensuring that the custom code consumes only a limited amount of computing resources (e.g., processing power, memory, storage, etc.) that may be shared with other processes. The foregoing may be achieved without requiring the user to be aware that a sandboxed environment is being utilized. Instead, the user simply needs to select and associate a custom function with a particular workflow step, and the workflow development system manages the interactions with the sandboxed environment without any further user involvement. | 2019-01-03 |
20190005229 | MOBILE DEVICE HAVING TRUSTED EXECUTION ENVIRONMENT - A mechanism for securing a mobile app for execution on a mobile device. The mechanism includes loading a non-trusted portion of the mobile app from a non-trusted application provider onto the mobile device, operating a key provisioning server to generate keys associated with a trusted execution environment, transmitting the keys associated with the trusted execution environment to the mobile device and to a key directory server, authenticate the mobile device, and upon authenticating the mobile device, transmitting a trusted portion of the mobile app including a trusted application to the mobile device, and installing the trusted portion of the mobile app on the mobile device thereby providing a trusted execution environment. Other systems and methods are disclosed. | 2019-01-03 |
20190005230 | MITIGATION OF CODE REUSE ATTACKS BY RESTRICTED INDIRECT BRANCH INSTRUCTION - A method, computer program product and/or system is disclosed. According to an aspect of this invention, one or more processors receive an indirect jump instruction comprising a target address offset and a maximal offset value. One or more processors determine whether the target address offset is valid by comparison of the target address offset and the maximal offset value and one or more processors execute a jump operation based on whether the target address offset is valid. In some embodiments of the present invention, the jump operation comprises one or more processors executing an instruction located at a target address referenced by the target address offset if the target address offset is valid. In some embodiments, the jump operation further comprises one or more processors raising an exception if the target address offset is not valid. | 2019-01-03 |
20190005231 | MITIGATION OF CODE REUSE ATTACKS BY RESTRICTED INDIRECT BRANCH INSTRUCTION - A method, computer program product and/or system is disclosed. According to an aspect of this invention, one or more processors receive an indirect jump instruction comprising a target address offset and a maximal offset value. One or more processors determine whether the target address offset is valid by comparison of the target address offset and the maximal offset value and one or more processors execute a jump operation based on whether the target address offset is valid. In some embodiments of the present invention, the jump operation comprises one or more processors executing an instruction located at a target address referenced by the target address offset if the target address offset is valid. In some embodiments, the jump operation further comprises one or more processors raising an exception if the target address offset is not valid. | 2019-01-03 |
20190005232 | ELECTRONIC CONTROL UNIT - An electronic control unit includes: a memory saving a program that has a call/return to/from a function represented as a control flow together with the function itself and a check instruction inserted in a program code of the program for checking whether the program code is executable based on the control flow. The electronic control unit may also include an input unit receiving an input of use frequency information indicative of a use frequency of the function; a measurement unit measuring a load of the electronic control unit; an execution object determiner determining the check instruction to be executed based on the use frequency information and the load; and an arithmetic unit executing the check instruction determined by the execution object determiner at a time of execution of the program. | 2019-01-03 |
20190005233 | SECURE CODE OPTIMIZATION METHOD AND SYSTEM - A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable. | 2019-01-03 |
20190005234 | Discrete Processor Feature Behavior Collection - Examples of the present disclosure describe systems and methods for discrete processor feature behavior collection and analysis. In aspects, a monitoring utility may initialize a set of debugging and/or performance monitoring feature sets for a microprocessor. When the microprocessor receives from software content a set of instructions that involves the loading of a set of modules or code segments, the set of modules or code segments may be evaluated by the monitoring utility. The monitoring utility may generate a process trace of the loaded set of modules or code segments. Based on the process trace output, various execution paths may be reconstructed in real-time. The system and/or API calls made by the microprocessor may then be compared to the process trace output to quickly observe the interaction between the software content and the operating system of the microprocessor. | 2019-01-03 |
20190005235 | Advanced File Modification Heuristics - Examples of the present disclosure describe systems and methods for providing advanced file modification heuristics. In aspects, software content is selected for monitoring. The monitoring comprises determining when the software content performs file accesses that are followed by read and/or write operations. The read/write operations are analyzed in real-time to determine whether the software content is modifying file content. If the monitoring indicates the software content is modifying accessed files, mathematical calculations are applied to the read-write operations to determine the nature of the modifications. Based on the determined nature of the file modifications, the actions of the software content may be categorized and halted prior to completion; thereby, mitigating malicious cyberattacks and/or unauthorized accesses. | 2019-01-03 |
20190005236 | ACCELERATED CODE INJECTION DETECTION USING OPERATING SYSTEM CONTROLLED MEMORY ATTRIBUTES - Methods for accelerated code injection detection using operating system controlled memory attributes are performed by systems and apparatuses. The methods optimize search operations for memory segments in system and virtual memories by searching for segment attributes. A set of memory segments is determined wherein each memory segment in the set includes specific attributes. The memory segments in the set are ranked for a threat level based on segment attribute. The threat level is used to determine subsequent actions including providing indications of the memory segments in the set and initiating execution of an anti-malware application. Relevant segment attributes used for the segment search can be dynamically updated in an attribute list. Segment attributes of a segment can be determined by accessing a memory manager of an operating system via an API. | 2019-01-03 |
20190005237 | METHOD AND APPARATUS FOR IDENTIFYING, PREDICTING, PREVENTING NETWORK MALICIOUS ATTACKS - One embodiment of this invention describes a method and apparatus for identifying, predicting, and preventing malicious attacks against low complexity sensors or devices (sensors/devices) on a network through the use of an Artificial Neural Network (ANN) which is defined as a connectionist system (i.e. interconnected networks) functioning as a computing system inspired by living neural networks (e.g. the human brain). An ANN employs Machine Learning computational models that, without being programmed with any task-specific rules, can “learn” capabilities such as image recognition by simply considering relevant examples. This approach is similar to how a person might learn a new task. There are many forms and types of malicious attacks that are sometimes more commonly referred to as cyber attacks. In one instance of this invention the malicious attacks are identified by organizing and classifying encryption keys and/or messages sent to or received from a sensor/device. Additionally this invention can predict emerging attack techniques against sensors/devices in order to prevent the spread of malicious attacks thereby protecting and securing critical network data. However it should be clear from the description of the invention that the method could easily be adapted to other types of networks to provide comparable levels of analysis and protection against malicious attacks. | 2019-01-03 |
20190005238 | NORMALIZING ENTRY POINT INSTRUCTIONS IN EXECUTABLE PROGRAM FILES - Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each instruction in the scope of instructions, a determination is made if the instruction performs an ineffective operation or if the instruction, in combination with another instruction, renders either or both instructions ineffective. Ineffective instructions are filtered such that they do not appear in an output buffer. | 2019-01-03 |
20190005239 | ELECTRONIC DEVICE FOR ANALYZING MALICIOUS CODE AND METHOD THEREFOR - The present disclosure relates to a method for analyzing a malicious code by an electronic device, the method comprising the steps of: receiving an executable file; before the received executable file is installed, analyzing the executable file so as to collect suspected malicious code data from the executable file; normalizing the collected suspected malicious code data and analyzing the same on the basis of a probability model algorithm, so as to make a determination on the suspected malicious code data; and outputting the result of the determination. | 2019-01-03 |
20190005240 | RESET ATTACK DETECTION - An apparatus has a number of data holding elements for holding data values which are reset to a reset value in response to a transition of a signal at a reset signal input of the data holding element from a first value to a second value. A reset tree is provided to distribute a reset signal received at root node of the reset tree to the reset signal inputs of the data holding elements. At least one reset attack detection element is provided, with its reset signal input coupled to a given node of the reset tree, to assert an error signal when its reset signal input transitions from the first value to a second value. Reset error clearing circuitry triggers clearing of the error signal, when the reset signal at the root node of the reset tree transitions from the second value to the first value. | 2019-01-03 |
20190005241 | MEMORY LAYOUT BASED MONITORING - Techniques for monitoring based on a memory layout of an application are disclosed. A memory layout may be received, obtained, and/or generated from an application executing on a computer. Based on one or more attributes of a plurality of memory regions of the memory layout a memory layout fingerprint is generated. Additionally, memory region fingerprints are generated based on the one or more attributes for respective memory regions. The memory layout fingerprint and the memory region fingerprints are compared to respective previous memory layout fingerprints and the memory region fingerprints in order to determine whether malicious code and/or application drifting has occurred. | 2019-01-03 |
20190005242 | Determining the Similarity of Binary Executables - In some implementations, a computing device can determine the similarity of binary executables. For example, the computing device can receive an application, including a binary executable. The computing device can generate function signatures for the functions called within the binary executable. The computing device can generate a locality sensitive hash value for the application based on the function signatures. The computing device can group applications based on the locality sensitive hash value generated for each application. The computing device can compare the function signatures of the binary executables of the applications within a group to determine the similarity of the applications. If two applications have binary executables that are over a threshold percentage of similarity, the two applications can be identified as clones of each other. | 2019-01-03 |
20190005243 | SEGREGATING EXECUTABLE FILES EXHIBITING NETWORK ACTIVITY - Systems, computer readable media, apparatuses, and methods are disclosed for segregating executable files exhibiting network activity. An example apparatus includes at least one processor and memory including instructions which, when executed, cause the at least one processor to launch an executable file in a segmented portion of a computing system to load one or more dynamically linked libraries (DLLs) associated with the executable file into a process environment block (PEB) of the segmented portion, enumerate the PEB to generate an address list of the one or more DLLs, scan the one or more DLLs to determine whether the one or more DLLs are to perform network activity, and perform malware analysis on the executable file when at least one of the one or more DLLs are to perform network activity. | 2019-01-03 |
20190005244 | EXECUTING ENCRYPTED BOOT LOADERS - A secure boot mechanism is described. The secure boot mechanism can operate in environments not originally designed to support such a mechanism. Downstream boot components can be executed from an encrypted boot partition. A first stage boot loader (FSBL) can load a second stage boot loader (SSBL) from an encrypted disk partition. The FSBL can decrypt and load the SSBL. The FSBL can intercept all I/O initiated by the SSBL so that the SSBL can transparently operate on an encrypted disk partition as though the encrypted disk were unencrypted. | 2019-01-03 |
20190005245 | EXECUTING PROTECTED CODE - In some examples, in response to a reset of an electronic device, a method disables hardware write locking of a first region in a non-volatile memory, and executes a first boot code portion from the first region to begin a boot procedure. The executed first boot code portion checks whether an update code for the first boot code portion exists. In response to determining that no update code for the first boot code portion exists, the executed first boot code portion causes hardware write locking of the first region. After causing the hardware write locking of the first region, the boot procedure continues, the boot procedure comprising verifying an integrity of a second boot code portion. | 2019-01-03 |
20190005246 | System for Virtual Patching Security Vulnerabilities in Software Containers - An example computer-implemented method of preventing exploitation of software vulnerabilities includes determining that a software container is susceptible to a vulnerability, determining one or more soft spots required to exploit the vulnerability, and analyzing runtime behavior of the software container to determine if the software container uses the one or more soft spots. The method includes automatically applying a security policy that prevents the software container from using the one or more soft spots based on the analyzing indicating that the software container does not use the one or more soft spots at runtime. | 2019-01-03 |
20190005247 | CONTENT PROTECTION METHOD - A method for displaying content received from a communication server on a display of a user terminal, receiving an unused terminal confirmation signal from the communication server, and shielding the content displayed on the display in response to the unused terminal confirmation signal. | 2019-01-03 |
20190005248 | SYSTEM AND METHOD FOR SELECTIVE DYNAMIC ENCRYPTION - The invention relates to a computer-implemented system and method for selective dynamic encryption and decryption of data. The method may comprise the steps of identifying confidential data elements in a data table (e.g., confidential columns in a table) that contain confidential information; storing in a metastore behind a firewall the locations of the confidential data elements; intercepting a query to the database to add unencrypted confidential data elements; encrypting the unencrypted confidential data elements in computer memory; and transmitting to the public cloud the data table including the encrypted specific data elements and other data elements that have not been encrypted. The reverse process can be implemented for retrieving and selectively decrypting data stored in the cloud. | 2019-01-03 |
20190005249 | ASSURED COMPUTER ARCHITECTURE -VOLATILE MEMORY DESIGN AND OPERATION - A method and apparatus providing computer system cryptographic protection including a processor, a trusted platform module, trusted bus devices, a first secure memory and a second secure memory, wherein the first and second memory each have a first and second shadow copy, an external bus controller, and a system bus. The system bus contains trusted data and connects with the processor, the trusted platform module, trusted bus devices, the first and second secure memory and the external bus controller. The first and second secure memory separating code and data via physically distinct memory components. The contents of the distinct memory components being replicated into two shadow copies for each component, wherein during a write operation, simultaneously updating the shadow copies with the contents of the distinct components, and during a read operation, sending the two shadow copies and the memory component to a majority function. | 2019-01-03 |
20190005250 | METHODS AND APPARATUS FOR EFFICIENT COMPUTATION OF ONE-WAY CHAINS IN CRYPTOGRAPHIC APPLICATIONS - Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of length shaving positions i=1, 2, . . . s each having a corresponding value v | 2019-01-03 |
20190005251 | PERMISSION MANAGEMENT OF CLOUD-BASED DOCUMENTS - Disclosed herein are system, method, and computer program product embodiments for managing cloud-based document permissions. In an embodiment, a document generation system may generate and/or store a cloud-based document. The document generation system may also generate links to the cloud-based document. The generated links may be associated with different permissions. For example, a first link may allow a first client device accessing the first link to edit the document while a second link may allow a second client device accessing the second link to only view the document. Other permissions may also include generating distinct graphical user interfaces (GUIs) associated with different links. The GUIs may accept input messages and/or comments in a chat panel. The document generation system may facilitate the delivery of these input messages to other client device with document access. | 2019-01-03 |
20190005252 | DEVICE FOR SELF-DEFENSE SECURITY BASED ON SYSTEM ENVIRONMENT AND USER BEHAVIOR ANALYSIS, AND OPERATING METHOD THEREFOR - The present inventive concepts relate to an operating method of a database security apparatus which performs an analysis on a command requested by a user on the basis of a situation of a system and a pattern of the user. The operating method includes receiving a command related to a database managed in a database system from a client, confirming whether a service state of the database system is in a development state or an actual service state, changing a security policy for the database system in accordance with a result of the confirmation, determining whether the command transmitted from the client satisfies the changed security policy, and requesting an administrator client to confirm whether to execute the command in accordance with a result of the determination. | 2019-01-03 |
20190005253 | METHOD FOR SHARING A DIGITAL IMAGE BETWEEN A FIRST USER TERMINAL AND AT LEAST ONE SECOND USER TERMINAL OVER A COMMUNICATIONS NETWORK - A method for sharing a digital image between a first user terminal and at least one second user terminal over a communications network. The method includes: displaying on the second terminal a “degraded image”, the degraded image being obtained from a “first image” by digital processing of the first image, the digital processing visually concealing content of the first image; and following detection of an interaction of a user with the screen of the second terminal: defining a zone of interaction of the degraded image depending on the location of the interaction on the screen; obtaining a portion of the first image corresponding to the determined zone of the degraded image; and displaying on the screen of the second terminal the portion of the first image in the place of the corresponding area of the degraded image, throughout the duration of the interaction of the user with the screen. | 2019-01-03 |
20190005254 | CONTROLLING SECURE PROCESSING OF CONFIDENTIAL DATA IN UNTRUSTED DEVICES - A number of transmissions of secure data communicated between a secure trusted device and an unsecure untrusted device in a DBMS is controlled. The data is communicated for database transaction processing in the secure trusted device. The number of transmissions may be controlled by receiving, from the untrusted device, an encrypted key value of a key and a representation of an index of a B-tree structure, decrypting, at the trusted device, the key and one or more encrypted index values, and initiating a transmission, a pointer value that identifies a lookup position in the index for the key. The index comprises secure, encrypted index values. Other optimizations for secure processing are also described, including controlling available computation resources on a secure trusted device in a DBMS and controlling transmissions of secure data that is communicated between a secure trusted device and an unsecure untrusted device in a DBMS. | 2019-01-03 |
20190005255 | PROTECTING RESTRICTED INFORMATION WHEN IMPORTING AND EXPORTING RESOURCES - Aspects extend to methods, systems, and computer program products for protecting sensitive data when importing and exporting resources. When a user exports resources from a source environment into a package, restricted information (e.g., privacy settings, security settings, resource identifiers, customer information, etc.) from the source environment can be replaced with unrestricted surrogate information. When a user imports resources into a target environment from a package, unrestricted surrogate information can be replaced with restricted information from the target environment. When a user imports resources, suggestions can be provided to help the user select the appropriate resource based on prior import selects. Aspects of the invention can include at least two phases. A first phase can include exporting a package from a source environment and a second phase can include importing the package into a target environment. | 2019-01-03 |
20190005256 | CREATING WORKFLOW INSTANCES - Aspects extend to methods, systems, and computer program products for creating workflow instances. Workflow templates define different functionalities, such as, for example, between fixed and variable functionality or between functionality authored by different co-authors. Different functionalities defined in a workflow template can be configured to interoperate to provide workflow instances. Functionality defined within a workflow template can be instantiated in a workflow instance based on properties corresponding to the functionality. The properties can include connections with credentials for accessing resources used by the functionality. Connections can obscure access to credentials so that processes outside of a workflow instance cannot use the credentials to access resources. | 2019-01-03 |
20190005257 | RESTRICTING PLUG-IN APPLICATION RECIPES - Techniques for restricting plug-in application recipes (“PIARs”) are disclosed. A PIAR management application receives a PIAR restriction via an authenticated user of the PIAR management application. The PIAR restriction is applicable to certain users of the PIAR management application. The PIAR restriction identifies functionality of the PIAR management application that would otherwise be available to a user of the PIAR management application if the user had an active account for a particular plug-in application that, once linked to that user in the PIAR management application and associated with a particular PIAR, would be capable of supplying at least part of the functionality. The PIAR management application stores the PIAR restriction, including information to block the restricted functionality. Based on the PIAR restriction, the PIAR management application blocks the restricted functionality. Many different types of functionality may be restricted, in various ways. | 2019-01-03 |
20190005258 | A METHOD FOR ENCRYPTING DATA AND A METHOD FOR DECRYPTING DATA - The invention concerns a method for decrypting data sent by a first user having at least a first role in a first entity, the first entity comprising at least the first user and a first instance, to a second user having at least a second role in a second entity, the second entity comprising at least the second user and a second instance, the data being encrypted using a symmetric encryption key, the symmetric encryption key being encrypted using a public key of an asymmetric key pair comprising a private key and a public key, wherein the asymmetric key pair is associated with the second role of the second user, and the encrypted data is associated with a transmission ID, the method furthermore involving the use of an element for electronic or digital identification and authentification identifying the second user in his second role and being unique to the second role. The invention also concerns a corresponding method for encrypting data. | 2019-01-03 |
20190005259 | Catheter Authorization System And Method - In the present invention, a medical device authorization system is employed to associate software contained on a medical computing system/computer, such as an EP mapping and recording system, that pertains to a specific medical device, e.g., a catheter, connected to the computer such that the software is only utilized by the computer in conjunction with a catheter that is authorized for use with the computer. The authorization system utilizes an analog authorization waveform/signal that is mixed with the analog device/catheter measured signals transmitted to the computer. The authorization waveform distorts the measured signals in a manner that renders the signals able to be displayed by the system but unusable, unless the computer includes a signal filter operably connected to the device/catheter interface that is configured to remove the interfering authorization waveform from the measured signal. | 2019-01-03 |
20190005260 | METHOD AND SYSTEM FOR ISOLATING APPLICATION DATA ACCESS - Isolating application data access is disclosed including receiving a request from a first application to access data of a second application, determining whether the first application is in a domain that has access authorization to the data of the second application, in response to a determination that the first application is in a domain that has access authorization to the data of the second application, permitting the first application to perform the access operation, and in response to a determination that the first application is not in a domain that has access authorization to the data of the second application, denying the first application permission to perform the access operation. | 2019-01-03 |
20190005261 | SECURE SHARED VAULT WITH ENCRYPTED PRIVATE INDICES - A store-data-object request, which includes a data object and a data identifier, is received from a requesting device. The data object is stored in a shared vault at a shared-vault-data-object address, and an entry in a private index is updated using a private credential associated with the requesting device. The private index includes private information identifying a storage location of the data object in a non-private shared vault. The entry in the private index includes the data identifier. | 2019-01-03 |
20190005262 | FULLY MANAGED ACCOUNT LEVEL BLOB DATA ENCRYPTION IN A DISTRIBUTED STORAGE ENVIRONMENT - A system receives a request to store data at a first layer of servers in a cluster, configured to authenticate and authorize the request. The system compresses the data upon authenticating and authorizing the request and encrypts the compressed data at the first layer of servers when encryption is enabled. The system sends the request and the encrypted data to a second layer of servers in the cluster, configured to store data structures used to manage data storage in a third layer of servers in the cluster, and to distribute the request and the encrypted data to the third layer of servers using the data structures. The system stores the encrypted data in the third layer of servers. Encrypting the data at the first layer of servers reduces latency associated with transferring the data between the first, second, and third layers of servers. | 2019-01-03 |
20190005263 | METHOD AND SYSTEM FOR GRANTING A USER ACCESS TO A MEDICAL SYSTEM - Method includes determining that a personal communication device is within a designated range of a medical system. The personal communication device is configured to transmit and receive data through a telecommunication network. The method also includes receiving an identifying signal from the personal communication device while within the designated range of the medical system for identifying a user associated with the personal communication device. The method also includes determining that the user associated with the personal communication device is permitted to use the medical system. The method also includes opening a session for the user to use the medical system. The method also includes establishing a dedicated link between the personal communication device and the medical system such that other users are unable to use the medical system during the session. The method also includes closing the session, thereby permitting the other users to use the medical system. | 2019-01-03 |
20190005264 | SWITCHING METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM - A switching method, an electronic device, and a storage medium are provided. The switching method includes detecting whether a triggering condition is satisfied in a first mode of an electronic device, and in response to the triggering condition being satisfied, switching from the first mode to a second mode. The first mode enables acquisition and output of analysis data. The second mode enables acquisition of the analysis data and non-output of at least one part of the analysis data. The analysis data are related to historical data of one or more of the electronic device, an application in the electronic device, and an owner of the electronic device. | 2019-01-03 |
20190005265 | DYNAMIC CONTENT REDACTION - Dynamic content redaction though the generation of redaction schemas associated with document, image, media, or other data files is described. A redaction schema can include at least one range of content in a data file to be concealed for a user, a group of users, or operating parameters of various devices, for example. When the data file is opened for display on a device, the redaction schema can be parsed to identify whether masking objects should be added to a masking layer for overlay upon or above the content displayed. The masking layer can be generated based on the redaction schema, a user of the device, or operating parameters of the device, for example. Masking objects in the masking layer can conceal one or more ranges of the content in a data file from view or based on users or operating parameters of various devices. | 2019-01-03 |
20190005266 | METHODS AND SYSTEMS FOR NETWORK-BASED ANALYSIS, INTERVENTION, AND ANONYMIZATION - Systems and method for alerting a user device based on a proposed anonymization of a contribution to a conversation thread via one or several location-based anonymization rules are disclosed herein. The system can include a user device that can have location-determining features that can determine a physical location of the user device; a network interface that can exchange data with a server via a communication network; and an I/O subsystem that can convert electrical signals to user-interpretable outputs in a user interface. The system can include a server that can: receive a contribution from the user device; determine an anonymization level for applying to the contribution; identify a potential identifier in the content of the contribution; anonymize the potential identifier according to the determined anonymization level; and generate and provide an alert to the user device. | 2019-01-03 |
20190005267 | DYNAMIC PRIVILEGE MANAGEMENT IN A COMPUTER SYSTEM - An example method of dynamic privilege management in a computer system includes: detecting launch of an application by a user in a login session of a desktop executing on the computer system; determining identification information for the application; evaluating at least one policy that specifies requirements for privilege elevation using the identification information as parametric input; generating a privilege elevation result for the application, the privilege evaluation result including a positive or negative indication of whether the at least one policy permits privilege elevation of a process created for the application within the login session; and elevating privilege of the process in response to the positive indication in the privilege elevation | 2019-01-03 |
20190005268 | UNIVERSAL ORIGINAL DOCUMENT VALIDATION PLATFORM - The present disclosure relates to a system for detecting tampering of a document. In an aspect, the system can include storage of an original document along with its associated at least one digital certificate from at least one issuing authority at a server, and association of a unique identifier with the original document, wherein the unique identifier is also stored corresponding to the original document at the server. The system can further enable creation of another instance of the original document, wherein the instance of the original document includes the unique identifier such that a user of the instance of the original document verifies source and authenticity of the instance of the original document by transmitting the unique identifier to the server in order to retrieve the associated at least one digital certificate based on the unique identifier, and evaluates the retrieved associated digital certificate. | 2019-01-03 |
20190005269 | Automatic Reset Filter Deactivation During Critical Security Processes - A method, system, and apparatus are provided for preventing glitch attacks by using a glitch processing hardware unit (1) to deactivate a glitch filter connected between the monitored line and a reset processing unit in response to detecting a voltage glitch on a monitored line during a specified security system sequence and (2) to automatically drive a requested reaction in response to the voltage glitch by driving one of a plurality of configurable reactions comprising a device reset reaction and a process restart request, thereby preventing the voltage glitch from maliciously influencing the specified security system sequence. | 2019-01-03 |
20190005270 | METHODS AND SYSTEMS FOR PRIVILEGED EXECUTION SUPPORT FOR FILE SYSTEM COMMANDS ON A STORAGE DEVICE - The present invention relates to a storage device that is able to execute higher level commands, such as network-level, file-system commands, with privileged access to various resources, such as the storage media, hardware, memory, firmware, etc. In one embodiment, the storage device is configured to receive and execute network-level file-system commands, such as Server-Message-Block protocol commands. In particular, the storage device comprises a drive having a storage media and a communications interface, such as a network interface, and a controller. The controller is configured to interpret and execute network-level, file-system commands received from the communications interface on data stored on the storage media. Accordingly, the storage device can service the network-level, file-system commands more efficiently and without the need for user-space applications. | 2019-01-03 |
20190005271 | SECURE ENABLEMENT OF PLATFORM FEATURES WITHOUT USER INTERVENTION - Systems, apparatuses, and methods for secure enablement of platform features without user intervention are disclosed. In one embodiment, a system includes at least a motherboard and a processor. The motherboard includes at least a socket and an authentication component. The authentication component can be a chipset, expansion I/O device, or other component. The processor is installed in the socket on the motherboard. During a boot sequence, the processor retrieves a key value from the authentication component and then authenticates the key value. Next, the processor determines which one or more features to enable based on the key value. Then, the processor programs one or more feature control registers to enable the one or more features specified by the key value. Accordingly, during normal operation of the system, the one or more features will be enabled. | 2019-01-03 |
20190005272 | METHOD OF OPTIMIZING MEMORY WIRE ACTUATOR ENERGY OUTPUT - An apparatus for locking an electronic device includes an actuator, a return mechanism, and an arm. The actuator includes an actuator SMM wire that is configured to apply a contraction force. The return mechanism includes a return SMM wire that is configured to apply a return force opposite the contraction force. The arm is movable toward an unlocked position by the actuator and movable toward a locked position by the return force. The arm has at least one equilibrium position with less than 1 Newton of force on the arm from the actuator and less than 1 Newton of force on the arm from the return mechanism. | 2019-01-03 |
20190005273 | SECURING A HOST MACHINE AGAINST DIRECT MEMORY ACCESS (DMA) ATTACKS VIA EXPANSION CARD SLOTS - Approaches for securing a host machine against security attacks conducted using Direct Memory Access (DMA). Platform firmware does not enable bus mastering during PCI bus enumeration. When the platform firmware determines that an expansion card has been plugged into an expansion card slot of the host machine, the platform firmware determines whether the expansion card slot has been approved by a user of the host machine for permitting Direct Memory Access (DMA) with the host machine. Unless the expansion card slot has been determined to be approved by the user for permitting Direct Memory Access (DMA) with the host machine, the platform firmware does not allow drivers that might enable DMA to connect to the device and does not grant permission to the expansion card slot and any upstream bridges to conduct Direct Memory Access (DMA) with the host machine. | 2019-01-03 |
20190005274 | THEFT AND TAMPER RESISTANT DATA PROTECTION - Systems and methods are provided for adding security to client data by maintaining keys providing access to the client data remotely from the client data. In some circumstances, the systems encrypt a cluster of data using an encryption key, associate the cluster of encrypted data with a unique identifier and send the unique identifier and the decryption key to a server for storage. The decryption key is then received from the server and is used to decrypt the cluster of encrypted data. A server can also perform policy checks or trigger additional authentication such as SMS, phone, or email notification before allowing access to a key. Furthermore, in some instances, the server can also prevent access to the stored keys in response to anomalies, such as decommissioning and other asset management events. | 2019-01-03 |
20190005275 | FRANGIBLE SECURITY DEVICE - The present disclosure pertains to a tamper indicating security device, which indicates unauthorized duplication of and/or access to a variety of secure documents, technologies, products, and/or protected volumes. | 2019-01-03 |
20190005276 | Security Adjustments in Mobile Devices - Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events. | 2019-01-03 |
20190005277 | CARD READER - A card reader may include a main body frame, an IC contact block and a guide shaft for moving the IC contact block between a contact position and a retreated position. The guide shaft may be inserted through and pulled out from the IC contact block. The main body frame includes a first shaft holding part and a second shaft holding part which hold the ends of the guide shaft. The first shaft holding part is formed with an arrangement hole which is a first cam groove structured to move the IC contact block and the second shaft holding part is formed with a second cam groove structured to move the IC contact block. A coming-off prevention member which prevents coming-off of the guide shaft from the first shaft holding part and the second shaft holding part is detachably attached to the guide shaft or the main body frame. | 2019-01-03 |
20190005278 | INTEGRATED CARD SWIPING DEVICE - The present application provides an integrated card swiping device, which includes: a casing, a circuit board, a magnetic head, a card reader, and a card support for positioning a card. The card support defines therein a card slot for allowing the card to be inserted in, the card support is mounted inside the casing, the magnetic head is electrically connected with the circuit board, the card reader is mounted on the card support, the magnetic head is disposed on the card support, and a side of the casing defines a first opening for allowing the card to be inserted into the card slot. | 2019-01-03 |
20190005279 | CARD READER - A card reader may include a main body frame comprising a bag-shaped card holding portion and a partitioning portion; a case body; a locking member; a driving mechanism; and a sealing member. The locking member may be provided on the front side of the partitioning portion. The driving mechanism may include a driving source and a power transmission mechanism. The driving source and the power transmission mechanism or the power transmission mechanism may include a sliding member. An opening may be formed in the partitioning portion. The sealing member may include a seal body portion, and a cylindrical cover portion. A through hole may be formed to penetrate the seal body portion. A first end of the cover portion is connected to the seal body portion. The sliding member may penetrate through the cover portion. The cover portion may extend and contract in the front-rear direction. | 2019-01-03 |
20190005280 | LINE DETERMINATION BASED ON RFID - In some embodiments, apparatuses, systems, and methods are provided herein useful to determining qualities of a line at a POS terminal in a retail establishment. In some embodiments, a systems comprises one or more RFID tags, wherein the one or more RFID tags are located near the POS terminal, an RFID reader configured to read signals transmitted from the one or more RFID tags, and a control circuit communicatively coupled to the RFID reader, the control circuit configured to receive, from the RFID reader, an indication of the signals transmitted from the one or more RFID tags, determine, based on the indication of the signals from the one or more RFID tags, properties of the signals transmitted by the one or more RFID tags, and estimate, based on the properties of the signals transmitted from the one or more RFID tags, a number of people in line at the POS terminal. | 2019-01-03 |
20190005281 | ARTICLE IDENTIFICATION APPARATUS, ARTICLE IDENTIFICATION METHOD, PROGRAM, SERVER, AND ARTICLE IDENTIFICATION SYSTEM - An article identification apparatus ( | 2019-01-03 |
20190005282 | INFORMATION COLLECTION SYSTEM - An information collection system includes a plurality of radio tags and a reading device. Each of the radio tags stores identification information and includes a sensor, an antenna that receives a carrier wave from the reading device, and a data transmission unit that sends measurement data including the identification information and information obtained by the sensor to the reading device after the carrier wave is received by the antenna. The plurality of radio tags send the identification information and the information obtained by the sensor with different natural periods from the data transmission units. The reading device transmits the carrier wave to each of the radio tags, receives data from each of the radio tags, and obtains the data. | 2019-01-03 |
20190005283 | RFID TAG WITH RECONFIGURABLE PROPERTIES AND/OR RECONFIGURING CAPABILITY - A method for reconfiguring an RFID tag or RFID reader is disclosed. The method may include receiving a wireless signal from an RFID reader; processing, by an RFID circuit, the wireless signal received from the antenna; determining if a first sensor or switch that is connected to the RFID circuit is engaged or activated; outputting a first signal to the RFID circuit when the first sensor or switch is engaged or activated; and changing by the RFID circuit, at least one operating parameter of the RFID tag when the RFID circuit receives the first signal | 2019-01-03 |
20190005284 | INTERFACE BETWEEN NEAR FIELD COMMUNICATIONS (NFC) CONTROLLER AND SECURE ELEMENT - Embodiments of an interface system for interfacing between an NFC controller and a secure element are disclosed. In one embodiment, an interface system includes an interface memory, an interface controller, an NFC controller interface configured to exchange data between the interface system and an NFC controller, and a secure element interface configured to exchange data between the interface system and a secure element. | 2019-01-03 |
20190005285 | AUTHENTICATION SYSTEMS AND METHODS - A system includes a first computing device having a first non-transitory machine-readable storage medium, first communication circuitry, and at least one first processor in communication with the first non-transitory machine-readable storage medium and the first communication circuitry. The at least one first processor is configured to execute instructions stored in the first non-transitory machine-readable storage medium to cause the first communication circuitry to receive a first signal from a first transmission medium, calculate a first authentication value for an object based on data included in the first signal, and cause the first communication circuitry to transmit a second signal to the first transmission medium. The second signal identifies whether the object is authentic based, at least in part, on the first authentication value. | 2019-01-03 |
20190005286 | Coded Information Reader - Coded information reader ( | 2019-01-03 |
20190005287 | BARCODE-READING SYSTEM - This patent specification describes operations of a mobile device with barcode-reading capabilities and an application and license server. A mobile device may include a barcode-reading application downloaded from an application server. The barcode-reading application may operate in a base mode or an enhanced mode. In the base mode, the barcode-reading application may establish a network connection to a licensing server to obtain a license code, and determine at least one operating permission authorized by the license code. In the enhanced mode, the barcode-reading application may implement at least one enhanced barcode-reading function which corresponds to the at least one operating permission authorized by the license code. For example, the enhanced barcode-reading function may be a function of decoding a barcode symbology that the decoder is restricted from decoding in the base mode of operation. | 2019-01-03 |
20190005288 | METHODS AND A SYSTEM FOR VERIFYING THE IDENTITY OF A PRINTED ITEM - A method of verifying an identity of a printed item includes capturing an image of the unverified printed item, wherein the unverified printed item includes artifacts and at least some of the artifacts were not controllably producible in producing the unverified printed item; extracting information associated with the artifacts of the unverified printed item; ranking the information associated with the artifacts of the unverified printed item; retrieving stored ranked information associated with artifacts of an original printed item from a storage device; and in each of a first and second range of magnitudes, comparing the ranked information associated with the artifacts of the unverified printed item with the ranked information associated with the artifacts of the original printed item. | 2019-01-03 |
20190005289 | IMAGE CODE RECOGNITION APPARATUS - According to an embodiment, an image code recognition apparatus may include a first light emitting device configured to emit light, in a first region of an electromagnetic spectrum, towards the image code; an optical sensor configured to sense light reflected from the image code; a controller configured to extract the information included in the image code based on the sensed light; a wireless communication device configured to transmit the information to the wireless terminal via wireless communication; a housing configured to accommodate the first light emitting device, the optical sensor, the controller, and the wireless communication device; and a second light emitting device configured to emit light in a second region of the electromagnetic spectrum, wherein the housing includes a coupling portion forming an internal space in which the second light emitting device is inserted and coupled to a front end of the first light emitting device. | 2019-01-03 |
20190005290 | FINGERPRINT SENSOR TO SUPPORT WAKE ON FINGER AND NAVIGATION - An input device for capacitive sensing includes: a plurality of transmitter electrodes and a plurality of receiver electrodes. The input device is configured to: operate in a first mode by driving sensing signals onto each of the transmitter electrodes and receiving separate detected signals corresponding to each of the plurality of receiver electrodes; and operate in a second mode by driving a common sensing signal onto a plurality of the transmitter electrodes and receiving a common detected signal corresponding to at least one receiver electrode selected from the plurality of receiver electrodes. | 2019-01-03 |
20190005291 | CAPACITIVE FINGERPRINT SENSOR - The present invention provides a capacitive fingerprint sensor which images fingerprints by measuring differences between coupling capacitance formed between ridge lines of the fingerprints and corresponding units on planar sensing electrode arrays and that formed between valley lines of the fingerprints and corresponding units on the planar sensing electrode arrays. A conventional “C-Q-T” type capacitive fingerprint sensor employs twice conversion from capacitance to charge quantity and then to integrating time to indirectly measure the capacitance; and the capacitance-charge quantity conversion efficiency can be improved by coupling a human body with a driving signal so as to improve the sensitiveness of the sensor. According to the improved “C-Q-T” type capacitive fingerprint sensor provided by the present invention, coupling a ground potential of the fingerprint sensor with a reversed-phase driving signal equivalently substitutes for coupling the driving signal to the human body, so that the sensitiveness of the sensor is further enhanced. | 2019-01-03 |
20190005292 | INTEGRATION OF TOUCH SCREEN AND FINGERPRINT SENSOR ASSEMBLY - Devices, systems, and techniques are provided for integrating a touch screen with a fingerprint detection module as an assembly for a mobile device. The integrated touch screen/fingerprint sensor assembly includes at least two glass layers bonded together to provide overall mechanical strength for the touch screen display. The upper glass layer is a toughened/hardened cover glass that does not have an opening for fitting the fingerprint detection module through this glass layer. The lower glass layer is a support glass layer underneath the hardened cover glass to provide additional mechanical strength and to include an opening at a location close to an end of the support glass layer. The integrated touch screen/fingerprint sensor assembly also includes a fingerprint detection module positioned within the opening of the support glass layer and directly underneath the hardened cover glass. | 2019-01-03 |
20190005293 | Multiphase Fingerprint Sensor Layout and Construction - A capacitive fingerprint sensor includes a set of capacitive sensor electrodes in a sensing area. The set of capacitive sensor electrodes includes a set of transmit (Tx) sensor electrodes, a set of receive (Rx) sensor electrodes, and a set of compensation electrodes. The fingerprint sensor also includes a multiphase capacitance sensor that is configured to perform a sensing scan of the capacitive sensor electrodes by applying a first Tx signal to a first subset of the Tx sensor electrodes while simultaneously applying a second Tx signal to a second subset of the set of Tx sensor electrodes, and based on a compensation signal received at the set of compensation electrodes, reduce a component of the Rx signal originating from a source other than a contact at the sensing area. | 2019-01-03 |
20190005294 | FINGERPRINT IMAGING MODULE AND ELECTRONIC DEVICE - Fingerprint imaging module and electronic device are provided. The module includes: a light source assembly including first light source for generating first incident light and second light source for generating second incident light; a color layer including a non-opaque region corresponding to interval between the first and second light sources and adapted to transmit the first and second incident light; a sensing surface at a side of the color layer away from the light source assembly, wherein the first and second incident light form first and second reflected light on the sensing surface; an image sensor between the light source assembly and the color layer, including first and second photosensitive regions, and configured to acquire the first and second reflected light to acquire fingerprint images. Fingerprint imaging area of the image sensor and size of fingerprint images are increased, which is favorable for recognition of fingerprint images by fingerprint algorithm. | 2019-01-03 |
20190005295 | Fingerprint Identification Apparatus and Electronic Device - A fingerprint identification apparatus and an electronic device having the fingerprint identification apparatus. The fingerprint identification apparatus includes: a first substrate; a second substrate disposed opposite to the first substrate; and a fingerprint identification sensor disposed between the first substrate and the second substrate, where the fingerprint identification sensor comprises a plurality of photoelectric induction units, and each of the photoelectric induction units comprises a curved photoelectric induction part. | 2019-01-03 |
20190005296 | OLED-ILLUMINATED PRINT SENSOR - A papillary print sensor comprising in superposition a contact surface to which the print to be imaged is intended to be applied, an array optical sensor and illuminating device. The illuminating device is arranged between the contact surface and a detecting surface of the array optical sensor, and consists of a plurality of organic light-emitting diodes, referred to as OLEDs. Each OLED extends uninterruptedly over more than a third of a width (L1) of the detecting surface, and the OLEDs extend together along one or two series of patterns that are parallel to one another and distributed along the length (L2) of the detecting surface. This configuration of the OLEDs allows in particular the transistors for controlling the OLEDs to be placed off the detecting surface ( | 2019-01-03 |
20190005297 | USE FINGERPRINT SENSOR SIGNAL TO PREVENT DEVICE SLEEP - Systems and methods for keeping a display screen active that include a fingerprint sensor coupled to a processing system and configured to perform a check for a presence of a finger. The processing system may be configured to alert an operating system to cause a display screen to be in an active state based on a detection of the finger; perform a future finger sense action to detect that the finger is still interacting with the fingerprint sensor; report to an operating system, based on detecting that the finger is still interacting with the fingerprint sensor, that the display screen should remain in the active state, wherein the operating system causes the display screen to be in the active state based on the report. | 2019-01-03 |
20190005298 | AUTHENTICATION USING PRISM - A prism includes a large surface at least a portion of which is a placing region for a finger, a small surface parallel to the large surface, and first and second inclined lateral surfaces. A light source emits light to the first inclined lateral surface. A first imaging sensor arranged below the small surface receives a light transmitted from the light source through the small surface to obtain a first image. A second imaging sensor receives a light transmitted from the light source through the second inclined lateral surface to obtain a second image of which fingerprint pattern contrast is enhanced more than that of the first image. An infrared light source emits infrared ray light to the finger. The first imaging sensor receives the infrared ray light transmitted from the infrared light source through the small surface to obtain a third image for a blood vessel of the finger. | 2019-01-03 |
20190005299 | AUTHENTICATION USING PRISM - A prism of an approximately quadrangle-frustum shape is arranged so that a bottom side, out of two parallel surfaces of the prism, is a placing surface side for a finger. A first imaging unit arranged below a top surface parallel to the bottom surface images an image of the finger transmitted through the top surface. A light source radiates light to at least one side surface of a first set of side surfaces, out of two sets of side surfaces of the approximately quadrangle-frustum shape that face each other. A second imaging unit images the image of the finger transmitted through a second set of side surfaces, out of the two sets of side surfaces. An infrared ray light source radiates infrared ray light into the finger so that the infrared ray light is scattered inside the finger and is received by the imaging unit. | 2019-01-03 |
20190005300 | IMAGE GENERATION IN AN ELECTRONIC DEVICE USING ULTRASONIC TRANSDUCERS - A method for generating a composite image having an increased image pixel density by an array of ultrasonic transducers having a given spatial density is provided. The method comprises capturing a first set of pixels at an ultrasonic sensor using a first beamforming pattern, wherein the first beamforming pattern comprises a first pattern of ultrasonic transducers of the ultrasonic sensor. The method further comprises capturing a second set of pixels at the ultrasonic sensor using a second beamforming pattern, wherein the second beamforming pattern comprises a second pattern of ultrasonic transducers. The first beamforming pattern and the second beamforming pattern are different. Pixels of the second set of pixels correspond to positions between pixels of the first set of pixels. The method additionally comprises combining the first and second sets of pixels to form the composite image. An electronic device and a method of generating an image of a fingerprint are also provided. | 2019-01-03 |
20190005301 | VASCULAR PATTERN DETECTION SYSTEMS - In the examples provided herein, a vascular pattern recognition system integrated onto a portable card includes a vascular pattern detection system to obtain image data of blood vessels of a finger to be swiped across a detection area on the portable card, wherein the vascular pattern detection system includes a near infrared light source and an image sensor array. The vascular pattern recognition system also includes an image processor to process the image data to generate a scanned vascular pattern and compare the scanned vascular pattern to a pre-stored pattern stored on the portable card to authenticate the image data, and a security processor to generate a transaction code to authorize a transaction upon authentication of the image data. | 2019-01-03 |
20190005302 | DERMAL IMAGE INFORMATION PROCESSING DEVICE, DERMAL IMAGE INFORMATION PROCESSING METHOD, AND PROGRAM - A dermal image information processing device includes a memory; and a hardware component that reads data from the memory and performs: acquiring dermal image information indicating ridge lines in a papillary layer; detecting that the papillary layer includes an abnormal pattern by performing at least one of following determinations: determination of whether there are two or more circular cores; determination of whether there are four or more semicircular cores; determination of whether two or more semicircular cores are present and one or more circular cores are also present; and determination of whether there are four or more deltas; and outputting information of the abnormal pattern. | 2019-01-03 |
20190005303 | DERMAL IMAGE INFORMATION PROCESSING DEVICE, DERMAL IMAGE INFORMATION PROCESSING METHOD, AND PROGRAM - A dermal image information processing device including a memory; and a hardware component that reads data from the memory and is configured to: acquire dermal image information showing ridge lines in a papillary layer; detect an singular region in a pattern of the ridge lines; detect a position that is furthest away from the singular region; determine a region for collation based on the detected position; and perform collation of the pattern of the ridge lines using only feature points that are included in the region for collation. | 2019-01-03 |
20190005304 | SYSTEMS, METHODS, AND APPARATUS FOR IN VITRO SINGLE-CELL IDENTIFICATION AND RECOVERY - Described herein are systems, methods, and apparatus for automatically identifying and recovering individual cells of interest from a sample of biological matter, e.g., a biological fluid. Also described are methods of enriching a cell type of interest. These systems, methods, and apparatus allow for coordinated performance of two or more of the following, e.g., all with the same device, thereby enabling high throughput: cell enrichment, cell identification, and individual cell recovery for further analysis (e.g., sequencing) of individual recovered cells. | 2019-01-03 |
20190005305 | METHOD FOR PROCESSING VIDEO, ELECTRONIC DEVICE AND STORAGE MEDIUM - Embodiments of the present disclosure provide a method and a device for processing a video, an electronic device and a storage medium. The method includes: performing target recognition on each frame in an input video to obtain M frames containing a first face image, in which M is an integer greater than 1; replacing the first face image in the M frames with a target face image to obtain M first output frames; performing feature point locating on the first face image in a first frame in the M frames to obtain a first feature point set; extracting a target feature point set corresponding to a target region from the first feature point set; and performing image synthesis according to the target feature point set and the M first output frames to obtain M second output frames. | 2019-01-03 |
20190005306 | ELECTRONIC DEVICE, IMAGE PROCESSING METHOD AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM - The present disclosure provides an electronic device, an image processing method and a non-transitory computer readable recording medium. The image processing method comprises: adjusting a position of at least one of multiple facial feature points on a facial three-dimensional model according to an adjustment instruction; adjusting the facial three-dimensional model correspondingly according to adjusted facial feature points to generate an adjusted facial three-dimensional model; and displaying the adjusted facial three-dimensional model. | 2019-01-03 |
20190005307 | METHOD AND SYSTEM FOR BIOMETRIC RECOGNITION - High quality, high contrast images of an iris and the face of a person are acquired in rapid succession in either sequence by a single sensor and one or more illuminators, preferably within less than one second of each other, by changing the data acquisition settings or illumination settings between each acquisition. | 2019-01-03 |
20190005308 | FACE AUTHENTICATION DEVICE HAVING DATABASE WITH SMALL STORAGE CAPACITY - Face authentication can easily be performed based on an input image including a mirror region reflected by a mirror without increasing a storage capacity of a database. With the database, for each face of a person to be authenticated, only one real front image is to be registered as a reference face image. A mirror image processing circuitry detects the mirror region from the input image and to subject a detected mirror region to lateral inversion processing to produce a processed image. A face detection processing circuitry detects a face image from the processed image to generate a detected face image. A face authentication processing circuitry compares the detected face image with the reference face image, to thereby perform face authentication. | 2019-01-03 |
20190005309 | METHOD AND SYSTEM FOR IMAGE PROCESSING - Provided is an image processing method and system. More particularly, provided are an image processing method and system that may map a facial expression of a user, a specific event, etc., to a character in real time by mapping an object such as a face of a user included in an input image to a virtual object such as a face of a specific character, and by applying an event corresponding to a combination of components defined for the object to the virtual object, and a non-transitory computer-readable recording medium that, when executed by a processor, cause the processor to implement the image processing method in conjunction with a computer device. | 2019-01-03 |
20190005310 | PUBLIC SERVICE SYSTEM AND METHOD USING AUTONOMOUS SMART CAR - The present invention relates to a system and method for providing a public service using an autonomous smart car, wherein the apparatus and method are able to perform a public service using an autonomous smart car, and the system includes autonomous smart cars and an autonomous smart car managing server managing the autonomous smart cars. | 2019-01-03 |
20190005311 | COMPUTER SYSTEM, DIALOGUE CONTROL METHOD, AND COMPUTER - A computer system that performs in dialogue with a user and provides a prescribed service, comprising: an imaging device; a computer; and a generation device generating dialogue content on a basis of an algorithm for generating dialogue content. The computer couples to a database that stores an authentication image used for an authentication process that uses an image. The computer calculates a distance between the user and the imaging device; executes an attribute estimation process in a case where the distance is larger than a threshold, selects the algorithm on the basis of results of the attribute estimation process, and issues a notification of the selected algorithm to the generation device. | 2019-01-03 |
20190005312 | IMAGE PROCESSING SYSTEM, IMAGE PROCESSING METHOD, PROGRAM, AND RECORDING MEDIUM - In an image processing system, an image processing method, a program, and a recording medium, a person specifying section specifies a plurality of persons appearing in a first composite image owned by a first user. A designated person receiving section receives designation of one or more persons as designated persons among the plurality of persons appearing in the first composite image. An image specifying section specifies images, in which the designated persons appear, from a first image group owned by the first user. A composite image creation unit creates a second composite image using the images in which the designated persons appear. | 2019-01-03 |
20190005313 | Compact Language-Free Facial Expression Embedding and Novel Triplet Training Scheme - The present disclosure provides systems and methods that include or otherwise leverage use of a facial expression model that is configured to provide a facial expression embedding. In particular, the facial expression model can receive an input image that depicts a face and, in response, provide a facial expression embedding that encodes information descriptive of a facial expression made by the face depicted in the input image. As an example, the facial expression model can be or include a neural network such as a convolutional neural network. The present disclosure also provides a novel and unique triplet training scheme which does not rely upon designation of a particular image as an anchor or reference image. | 2019-01-03 |
20190005314 | ONLINE USER VERIFICATION WITHOUT PRIOR KNOWLEDGE OF THE USER - Systems and method verify a user based on facial image data, without prior information about the user. A user name and facial image of the user are received. A search query comprising the user name can be issued to one or more search engines. Images returned as a result of the search query can be filtered to determine a set of candidate images. The images in the set of candidate images can be compared to the facial image of the use to determine a probability of a match. If there is a match, the user can be considered verified. | 2019-01-03 |
20190005315 | METHOD OF EVALUATING PHOTOGRAPHER SATISFACTION - A method of evaluating photographer satisfaction includes capturing a first digital image of a target object using a first digital camera of a smart device. A second digital image of a user of the smart device is captured using a second digital camera of the smart device. The second digital image includes an image of the user's facial expression. A satisfaction index is generated for the first digital image by analyzing the user's sentiment related to the first digital image. Analyzing the user's sentiment related to the first digital image includes evaluating the user's facial expression. The satisfaction index is then associated with the first digital image. | 2019-01-03 |
20190005316 | Method and Module of Gesture Recognition - A gesture recognition method includes determining whether an object stays within a plurality of video frames for more than a specific time; determining a finger number corresponding to the object to generate a finger number determination result, and determining whether or not the object moves away from a light sensing unit to generate an object moving-away determination result, when the object stays within the plurality of video frames for more than the specific time; and determining a gesture of a user according to the finger number determination result and the object moving-away determination result. | 2019-01-03 |
20190005317 | WIRELESS NETWORK WITH AWARENESS OF HUMAN PRESENCE - Network devices (e.g., a modem, router, wireless user device, laptop, personal digital assistant or other similar wireless network devices) can be configured to monitor and detect a biological presence. In response to determining a biological presence (e.g., a human being or other similar being), a network device can alter parameters related to the generation of radio frequency (RF) energy in order to further ensure or guarantee safety from potential radiation as the number and power of network devices within a certain premises or vicinity increases. | 2019-01-03 |
20190005318 | LIVING BODY DETECTION DEVICE, LIVING BODY DETECTION METHOD, AND RECORDING MEDIUM - A living body detection device ( | 2019-01-03 |
20190005319 | ELECTRONIC DEVICE AND RELEASING METHOD OF IMAGE CAPTURING MODULE THEREOF - A releasing method of an image capturing module of an electronic device, including an electronic device, wherein the electronic device includes a first machine body and an image capturing module pivotally connected to the first machine body, and the image capturing module is restrained by the first machine body to approach to the first machine body. Performing a posture estimation procedure includes, sensing a first included angle between the first machine body and a gravity direction for determining whether the electronic device is in a tent position. When the electronic device is determined to be in the tent position, determine whether a release instruction is received, so as to decide whether to perform a release procedure, wherein when the release procedure is performed, the first machine body releases the image capturing module, so that the image capturing module is turned up relative to the first machine body. | 2019-01-03 |
20190005320 | MOBILE DEVICE UTILIZING MULTIPLE CAMERAS - A mobile electronic device may have two rear facing cameras to capture environmental information. A camera and a depth sensor of the mobile electronic device may capture biometric facial data for security verification. Characteristics of the environment may be identified based on the environmental information and results of the security verification. | 2019-01-03 |