05th week of 2016 patent applcation highlights part 52 |
Patent application number | Title | Published |
20160034655 | MEDICAL DEVICES AND CONFIGURATION UPDATE MANAGEMENT - A configuration management resource keeps track of incremental updates to a locally stored copy of configuration information (such as drug library information) used by a medical device to administer treatment to patients. The medical device retrieves a copy of the configuration information from a configuration management resource. Unbeknownst to a user of the medical device, to ensure that the medical device has most up-to-date configuration information, the medical device communicates a request for updates to the configuration management resource. To service the received request for updated configuration information, the configuration management resource forwards incrementally available configuration update information to the requesting medical device. The medical device uses the received configuration update information from the configuration management resource to update its local version of configuration information stored in the medical device. | 2016-02-04 |
20160034656 | PROGRAM FOR VIRTUAL MEDICAL VISITS UTILIZING CELLPHONES - A program enabling the doctor to provide the patient with instant diagnosis of medical conditions through the use of sensors within cell phones and other devices during virtual or remote office visits unlike any other programs used solely for referrals to provide the user an instant diagnose of symptoms in real time and to collect data for immediate treatment options, billing, prescribing, retrieving, transferring, and storing patient medical records in an encrypted file for HIPPA compliance through the use of video, audio, and sensors available through cell phones | 2016-02-04 |
20160034657 | REMOTE MEDICAL EVALUATION - A consult coordination center (CCC) computer may comprise a database and a processor. A scheduling module executed by the processor may schedule a patient assessment session for a facility, the patient assessment session comprising an assessment of at least one patient in the facility by a remote health care professional to determine whether the at least one patient should be given more immediate care. An assignment module executed by the processor may assign the scheduled patient assessment session to a health care professional computer. A connection module executed by the processor may create a remote connection between the health care professional computer and a computer at the facility via a network to facilitate the patient assessment session, the remote connection comprising a video feed from the computer at the facility to the health care professional computer. A data module executed by the processor may retrieve a report of a previous patient assessment session at the facility from the database, send the report of the previous patient assessment session at the facility to the health care professional computer, receive a report of the patient assessment session, and store the report of the patient assessment session in the database. | 2016-02-04 |
20160034658 | SAFETY MITIGATIONS FOR HOSTING A SAFETY CRITICAL APPLICATION ON AN UNCONTROLLED DATA PROCESSING DEVICE - Methods and systems for validating safety critical applications (SCAs) on uncontrolled data processing devices (UDPDs) are provided. Various combinations of checks including validation of safety critical features, validation of SCA-UDPD compatibility, and resource management are executed at various times to ensure the SCA operates properly on the device. The operation of the SCA on the UDPD may be controlled accordingly. | 2016-02-04 |
20160034659 | ANALYZING DATA FROM A SENSOR-ENABLED DEVICE - An approach for analyzing data collected by a sensor-enabled device over a network is provided. Specifically, in a typical embodiment, a set of usage data will be received from a device over a network. The set of usage data may be collected via at least one sensor integrated with the device, and the set of usage data may pertain to use of the device by a user. Regardless, the set of usage data will be compared to a set of diagnostic information stored in at least one computer storage device. The set of diagnostic information typically pertains to a condition (e.g., medical) treated by use of the device (e.g., dental, cardiac, renal, etc.). Based on the comparison, at least one determination (e.g., diagnosis, treatment plan, level of compliance with applicable standards, etc.) will be made and a set of reports will be generated based thereon. | 2016-02-04 |
20160034660 | UTILIZATION OF RESOURCES IN A SUPPORT PLAN FOR A PATIENT - Embodiments of the invention include a system and a method for determining which portion of a care team should be contacted in response to an event regarding a patient, and contacting the portion of a care team that is determined to be the appropriate portion to be contacted. Other embodiments are disclosed herein. | 2016-02-04 |
20160034661 | ACCESSING CONTENT BASED ON A HEALTH ASSESSMENT - Systems and methods directed to accessing content based on a health assessment are described herein. A health indicator of a user may be received from a device associated with the user. A health assessment is performed based on the received health indicator of the user. A determination that the received health indicator of the user indicates at least a pre-defined condition of health is performed. Content that corresponds to the performed health assessment is accessed. The accessed content is then presented to the device associated with the user. | 2016-02-04 |
20160034662 | SYSTEMS, METHODS, AND APPARATUS FOR IDENTIFYING AND MITIGATING POTENTIAL CHRONIC PAIN IN PATIENTS - Systems, apparatus, methods, and articles of manufacture provide for identifying and/or managing patients and/or claims in order to prevent the development of chronic pain conditions. | 2016-02-04 |
20160034663 | METHOD TO INCREASE EFFICIENCY, COVERAGE, AND QUALITY OF DIRECT PRIMARY CARE - A healthcare and wellness management system, which can be used to collect and analyze data related to a user's health. Using software applications and sensors embedded on a hardware platform, the system collects psychological and physiological data regarding a subject such as mood or stress level, food intake, and vital signs. The system may generate a health parameter based on the collected data. The system may initiate actions based on the gathered data. Multiple users may be ranked relative to one another based on their health parameters. | 2016-02-04 |
20160034664 | SYSTEMS, METHODS, AND APPARATUS FACILITATING HEALTH CARE MANAGEMENT AND PREVENTION OF POTENTIAL CHRONIC PAIN IN PATIENTS - Systems, apparatus, methods, and articles of manufacture provide for identifying and/or managing patients and/or claims in order to prevent the development of chronic pain conditions. | 2016-02-04 |
20160034665 | SYSTEM AND METHOD FOR PERSONALIZED HEMODYNAMICS MODELING AND MONITORING - The present invention relates to a system and a method for evaluating cardiac parameters and forming a personalized cardiac model, and in particular, to such a system and method in which a personalized cardiac model is abstracted and utilized for monitoring cardiac parameters. | 2016-02-04 |
20160034666 | METHODS AND ALGORITHM FOR SELECTING ALLOGENIC HEMATOPOIETIC CELL DONOR BASED ON KIR AND HLA GENOTYPES - This disclosure is directed to a method for scoring and ranking candidate HLA-compatible unrelated hematopoietic cell donors (URD) for patients with AML or myelodysplastic syndrome. Candidate donors are scored based on KIR/HLA allele and genotype combinations. The method disclosed herein permits ranking and selection of advantageous donors that predict improved clinical outcomes of hematopoietic stem cell transplantation. | 2016-02-04 |
20160034667 | TAILORED DRUG THERAPIES AND METHODS AND SYSTEMS FOR DEVELOPING SAME - Several embodiments disclosed herein relate to methods of providing an optimized drug therapy that is specialized or customized for an individual subject or a group of subjects based, at least in part, on one or more of the genetic profile of the subject, the pharmacogenomic profile of the subject, and/or evaluation of possible drug-drug interactions. In several embodiments, systems specialized for performing one or more aspects of the methods are provided. | 2016-02-04 |
20160034668 | HEALTHCARE FULFILLMENT METHODS AND SYSTEMS - Systems for filling and managing a patient's healthcare needs are provided. Some systems and methods described herein relate to a total healthcare fulfillment system. The healthcare fulfillment system of various embodiments is a central portal which coordinates with multiple parties, for example, with physicians, retail pharmacies, mail-order pharmacies, specialty providers, and patients in order to address all of a patient's prescription drug needs or other healthcare needs. | 2016-02-04 |
20160034669 | METHOD, SYSTEM AND APPARATUS FOR CONTROLLING DISPENSING OF MEDICATION - A method, system and apparatus for controlling dispensing of medication is provided. The system comprises: a device comprising: a sensor for detecting opening and closing of a dispenser; a memory storing a dispensing schedule; an alert device for providing alerts; a short range wireless communication interface; and a processor configured to: control the alert device to provide alerts according to the schedule; and communicate sensor data using the interface; and, a communication device comprising a processor, a memory storing a dispensing application, a short range wireless communication interface; and a long range communication interface, the processor configured to: receive the dispensing schedule using the application; and transmit the dispensing schedule to the device using the respective communication interface and the application, and transmit data associated with the application using the long range interface, the data comprising one or more of the schedule and the sensor data. | 2016-02-04 |
20160034670 | INFORMATION-GATHERING DEVICE - To provide a user-friendly information-gathering device enabling users to select buttons easily. An information-gathering device has a plurality of selection buttons, a communication module, and a cancel button. The communication module has an IC chip and a button cell. The IC chip has a storage which stores information for identifying the pressed selection button and information about the time of the press, in chronological order, a controller which performs control to store the information in the storage, and a wireless communication unit. When the cancel button is pressed, the controller stores, in the storage, information requesting to cancel press information about the selection button pressed immediately before the cancel button is pressed. | 2016-02-04 |
20160034671 | Method and Apparatus for Designating Patients According to Sleep Patterns - A method and apparatus can include a patient profile module configured to process input data specific to at least one patient under the care of a health care facility to generate patient profile data, where a patient profile can include a sleep profile. The apparatus can further include a service delivery module configured to process input data specific to a facility or location and patient profile data to generate output data including information associated with delivery of services to patients. The apparatus can further include a resource allocation module configured to process input data specific to a facility and patient profile data to generate output data including information associated with one or more allocations of facility resources. The apparatus can further include a data controller configured to communicate output data to a user. | 2016-02-04 |
20160034672 | DYNAMIC SELECTION OF AUTHORIZATION PROCESSES - Technology is disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process. | 2016-02-04 |
20160034673 | ALLOWING ACCESS TO APPLICATIONS BASED ON USER CAPACITANCE - Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data. The user or the device terminates the first user session and subsequently receives an input of the user to initiate a second user session. The device communicates a request for second user authentication data from the authentication technology and compares the first user authentication data and the second user authentication data. The device identifies a match of one or more features of the first user authentication data and one or more features of the second user authentication data and authorizes the user to conduct the second user session. | 2016-02-04 |
20160034674 | ALLOWING ACCESS TO APPLICATIONS BASED ON USER HANDLING MEASUREMENTS - Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data. The user or the device terminates the first user session and subsequently receives an input of the user to initiate a second user session. The device communicates a request for second user authentication data from the authentication technology and compares the first user authentication data and the second user authentication data. The device identifies a match of one or more features of the first user authentication data and one or more features of the second user authentication data and authorizes the user to conduct the second user session. | 2016-02-04 |
20160034675 | ALLOWING ACCESS TO APPLICATIONS BASED ON USER AUTHENTICATION - Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data. The user or the device terminates the first user session and subsequently receives an input of the user to initiate a second user session. The device communicates a request for second user authentication data from the authentication technology and compares the first user authentication data and the second user authentication data. The device identifies a match of one or more features of the first user authentication data and one or more features of the second user authentication data and authorizes the user to conduct the second user session. | 2016-02-04 |
20160034676 | ELECTRONIC SYSTEM, ELECTRONIC DEVICE AND METHOD CAPABLE OF ERASING PASSWORD FROM BASIC INPUT/OUTPUT SYSTEM AUTOMATICALLY - A method capable of erasing a password from a BIOS automatically includes steps of the BIOS determining whether a password erasing flag has been set when an electronic device is booting; the BIOS erasing the password if the password erasing flag has been set; the BIOS displaying a password input window if the password erasing flag has not been set; inputting a comparison data in the password input window; the electronic device transmitting the comparison data to a server; the server comparing the comparison data with a registration data, generating a comparison result, and transmitting the comparison result to the electronic device; the BIOS determining whether the comparison result is correct; the BIOS setting the password erasing flag and rebooting the electronic device if the comparison result is correct; and the BIOS rebooting the electronic device directly if the comparison result is wrong. | 2016-02-04 |
20160034677 | METHOD AND SYSTEM FOR VERIFICATION OF HUMAN PRESENCE AT A MOBILE DEVICE - A method and system is provided for verifying human presence at a mobile device. The method includes receiving a request for verification. Further, the method includes sending a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) challenge to the mobile device. Further, the method includes receiving a response to the CAPTCHA challenge. Finally, the method includes verifying the human presence by matching the response received to the CAPTCHA challenge sent. | 2016-02-04 |
20160034678 | ALLOWING ACCESS TO APPLICATIONS BASED ON CAPTURED IMAGES - Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data. The user or the device terminates the first user session and subsequently receives an input of the user to initiate a second user session. The device communicates a request for second user authentication data from the authentication technology and compares the first user authentication data and the second user authentication data. The device identifies a match of one or more features of the first user authentication data and one or more features of the second user authentication data and authorizes the user to conduct the second user session. | 2016-02-04 |
20160034679 | WEARABLE DEVICE AND METHOD OF OPERATING THE SAME - A wearable device includes: a sensor configured to capture a vein image of a user; and a processor configured to control the sensor to capture the vein image of the user wearing the wearable device when a function or an application is selected, identify the user by comparing the captured vein image with at least one registered vein image, and execute the function or the application when the user has execution authority. | 2016-02-04 |
20160034680 | CREDENTIAL-FREE IDENTIFICATION AND AUTHENTICATION - A method of authenticating a user so that the user can access a website without entering a unique user credential. A user accesses a target and is presented with an authentication code and an address, and the user sends a message containing the authentication code to that address. Alternatively, the user is pre-supplied with an address and is presented only with an authentication code when the user accesses the target. The user's identity is authenticated by comparing an aspect of the metadata of the message with known metadata aspects, and the user is authenticated by comparing the authentication key presented to the user with the one received in the message. Both the user and the user's identity are authenticated in a single step without requiring the user to input any unique user credential. | 2016-02-04 |
20160034681 | ELECTRONIC APPARATUS, SECURITY PROCESSING METHOD AND STORAGE MEDIUM - According to one embodiment, an electronic apparatus includes a first detector, a second detector, a third detector and a security controller. The first detector detects a speed of movement of the electronic apparatus. The second detector detects a direction of the movement. The third detector detects whether the electronic device is located in a first area. The security controller updates position information wherein the position information is indicative of a first position in the first area, and executes a monitoring process based on the position information, detection information of the first detector and detection information of the second detector. | 2016-02-04 |
20160034682 | VISUAL IMAGE AUTHENTICATION - Methods and systems described herein perform a secure transaction. A display presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a universal identifier is represented by images recognizable by a person, but difficult for malware to recognize. | 2016-02-04 |
20160034683 | MEMORY CARD AND STORAGE SYSTEM HAVING AUTHENTICATION PROGRAM AND METHOD FOR OPERATING THEREOF - A memory card includes a nonvolatile memory and a device controller. The nonvolatile memory stores data. The device controller divides the nonvolatile memory into a plurality of logical units and stores an authentication program at a partial area the plurality of logical units. When connected with a host, the device controller enables the authentication program to be executable on the host. | 2016-02-04 |
20160034684 | Automated Password Generation and Change - An identity management system detects the occurrence of a trigger event, such as a time period expiration, or an action on the identity management system. The identity management system accordingly generates a new password for an account of a user on a third-party service and causes the account of the user on the third-party service to use the new password. The identity management system can also detect a manual user change of a password for a third-party service and cause configuration of client devices of the user to reflect the new password. | 2016-02-04 |
20160034685 | Sending a Password to a Terminal - A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network. | 2016-02-04 |
20160034686 | PASSWORD CONFIGURATION AND LOGIN - Password characters input by a user as an account password are obtained. A password table including the password characters and a preset number of supplemental characters is randomly generated. An indication table indicating the password characters as the account password in the password table is generated. The password table and the indication table are stored. The techniques of the present disclosure improve password security. | 2016-02-04 |
20160034687 | TRANSPARENT DETECTION AND EXTRACTION OF RETURN-ORIENTED-PROGRAMMING ATTACKS - Systems and methods for detection and prevention of Return-Oriented-Programming (ROP) attacks in one or more applications, including an attack detection device and a stack inspection device for performing stack inspection to detect ROP gadgets in a stack. The stack inspection includes stack walking from a stack frame at a top of the stack toward a bottom of the stack to detect one or more failure conditions, determining whether a valid stack frame and return code address is present; and determining a failure condition type if no valid stack frame and return code is present, with Type III failure conditions indicating an ROP attack. The ROP attack is contained using a containment device, and the ROP gadgets detected in the stack during the ROP attack are analyzed using an attack analysis device. | 2016-02-04 |
20160034688 | METHOD FOR PROTECTING AN AUTOMATION COMPONENT AGAINST PROGRAM MANIPULATIONS BY SIGNATURE RECONCILIATION - In a method for determining a threat situation for an automation component of the controller or field level, wherein the automation component has at least one essentially cyclic program behavior, a number of required program behaviors is established in a learning phase in a processor, and the determined required program behaviors are stored and compared cyclically with actual program behaviors, that are established in operation of the automation component. The result of the comparison is logically linked with results of other security components for verification as to whether a threat situation exists. | 2016-02-04 |
20160034689 | APPLICATION-LEVEL SIGNAL HANDLING AND APPLICATION-LEVEL MEMORY PROTECTION - A processor receives a signal and determines whether an application has registered a signal handler therewith for handling the signal. In response to determining that the application has registered the signal handler, the processor transmits the signal directly to the signal handler of the application for handling the signal, without an operating system in relation to which the trusted application is running intervening. In response to determining that the trusted application has not registered the signal handler, the processor transmits the signal to a signal handler of the operating system for handling the signal. | 2016-02-04 |
20160034690 | Unused Parameters of Application Under Test - Example embodiments disclosed herein relate to unused parameters. A request to a web page of an application under test is made. It is determined whether the web page includes one or more unused parameter fields. Another request to the web page of the application under test is made using one or more parameters corresponding to the unused parameter fields. | 2016-02-04 |
20160034691 | GLOBAL PLATFORM HEALTH MANAGEMENT - The use of one or more device health values to indicate the health status of a computing device may enable operating system developers to directly manage the security configuration of the computing device. The generation of a device health value involves initializing hardware components of a computing device and loading the operating system according to configuration settings during boot up of the computing device. The device health value is then generated based on a state of the hardware component and/or a state of a software stack that includes the operating system at boot up. The device health value may be compared to a reference health value to determine whether the computing device is in a secured state. | 2016-02-04 |
20160034692 | AUTOMATED CONTACT LIST MATCHING WITH IMPROVED PRIVACY - A method and system for matching a first plurality of private data sets with a second plurality of data sets stored on a server-based communication system. A method including the steps of a) the server computer computing ( | 2016-02-04 |
20160034693 | CERTIFICATE AUTHORITY OPERATION APPARATUS AND METHOD - A certificate authority operation apparatus includes a storage unit that retains a plurality of private keys that correspond to a plurality of cryptosystems with different generations, respectively, encryption strength of each of the plurality of cryptosystems being different according with the generations, and a processor which executes a process. The process includes, when acquiring an issuance instruction, performing a control so as to issue a public key certificate by utilizing a first private key that corresponds to a cryptosystem of a generation whose encryption strength is highest. | 2016-02-04 |
20160034694 | SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR FACILITATING LOGIC ENCRYPTION - Exemplary systems, methods and computer-accessible mediums for encrypting at least one integrated circuit (IC) can include determining, using an interference graph, at least one location for a proposed insertion of at least one gate in or at the at least one IC, and inserting the gate(s) into the IC(s) at the location(s). The interference graph can be constructed based at least in part on an effect of the location(s) on at least one further location of the IC(s). | 2016-02-04 |
20160034695 | Displaying Different Levels of Personal Information on a Screen - Various embodiments provide notifications with respect to various communications that are received by a computing device. Privacy concerns associated with the notifications can be addressed by ascertaining the user of a particular device and, based on the user, surfacing notifications that have been filtered accordingly. In this manner, various different levels of personal information can be presented, through notifications, based on the current device user. | 2016-02-04 |
20160034696 | Data Permission Management for Wearable Devices - Methods and apparatus for providing rule-based access to data stored on wearable devices are provided. A wearable computing device can store data that includes data about a wearer of the wearable computing device. The wearable computing device can receive a request for a portion of the stored data. The wearable computing device can determine a designated role associated with the request for the portion of the stored data. The wearable computing device can determine one or more rules regarding access to the portion of the stored data based on the designated role. The wearable computing device can determine a response to the request for the portion of the stored data by at least: determining whether the request is validated by at least applying the one or more rules to the request, and after determining that the request is validated, providing the requested portion of the stored data. | 2016-02-04 |
20160034697 | INFORMATION PRIVACY SYSTEM AND METHOD - The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to: determine whether factors associated with the environment are triggered; and obscure access or provide access to data or a program associated with the factors based on determining that the factors are triggered. Factors can be based on the time and the location or network connectivity of a device associated with the system, the detected presence or absence of an authorized person other than the user logged into the device or the privacy state of the user logged into the device. Motion detectors, cameras, biometric sensors and other devices can be employed in the determination of whether to provide or obscure access to the information. | 2016-02-04 |
20160034698 | Static Redirection for Objective C - Particular embodiments establish static redirection of a function that is a member of a class to an alternate implementation of the function. A software tool executing on a computer server receives an executable file for an application and a location for an alternate implementation of the function. The function may be written in Objective C. The software tool can be used to locate a structure for the function by traversing serialized metadata in the executable file. The software tool can then be used to modify the metadata in the executable file by updating the value of a selector indicating the location of a current implementation of the function to indicate a location of the alternate implementation. The selector may be included in a element of the structure for the class method. Finally, the application may provide the modified executable file for installation on client devices. | 2016-02-04 |
20160034699 | MOBILE DEVICE, INFORMATION MANAGEMENTSYSTEM AND STORAGE MEDIUM - A location information acquisition unit ( | 2016-02-04 |
20160034700 | SEARCH PERMISSIONS WITHIN HIERARCHICALLY ASSOCIATED DATA - A server computer system can receive a database query directed towards returning information from one or more locations within a hierarchically organized data structure. A user identification can be associated with a particular entry within the hierarchically organized data structure. The system can then access an ordered flat file database that comprises the information stored within the hierarchically organized data structure. The stored information can include information associating each entry within the hierarchically organized data structure with the entry's relative position within the hierarchically organized data structure. The system can also return a query response that excludes particular information based upon a permission attribute applied to sequential entries within the ordered flat file database. | 2016-02-04 |
20160034701 | MONETIZING PRODUCT FEATURES AS PART OF ENFORCING LICENSE TERMS - Control access features include the use of a number of validation rules and capabilities of a target as part of proving license control and revenue generating functionalities, but the embodiments are not so limited. An exemplary role-based computing architecture includes the use of feature to command mappings and one or more validation rules to determine if a target of a command has a proper set of capabilities as part of allowing the command to execute. A computing method of one embodiment operates to provide a validation mechanism that performs a validation evaluation as part of a scope check to ensure that a target command is within the command issuer's scope along with a validation rule check for a particular service feature. | 2016-02-04 |
20160034702 | Apparatus For And Method Of Preventing Unsecured Data Access - Shown and depicted is preventing sensitive information from being exfiltrated from an organization using hypervisors. A Data Loss Prevention system is composed using virtual machines or domains to segment memory between domains which are assumed to be untrusted and domains which are known to be trusted. Sensitive information is cypher text when observed by software in Untrusted Domains, and clear text when observed by software in Trusted Domains. Sensitive information is unencrypted when it is in the address space of a protected process running inside a trusted domain. | 2016-02-04 |
20160034703 | DATA PRIVACY EMPLOYING A K-ANONYMITY MODEL WITH PROBABALISTIC MATCH SELF-SCORING - According to one embodiment of the present invention, a system for protecting data determines a desired duplication rate based on a level of desired anonymity for the data and generates a threshold for data records within the data based on the desired duplication rate. The system produces a data record score for each data record based on comparisons of attributes for that data record, compares the data record scores to the threshold, and controls access to the data records based on the comparison. Embodiments of the present invention further include a method and computer program product for protecting data in substantially the same manners described above. | 2016-02-04 |
20160034704 | METHOD OF MODIFYING IMAGE INCLUDING PHOTOGRAPHING RESTRICTED ELEMENT, AND DEVICE AND SYSTEM FOR PERFORMING THE METHOD - Provided is a user device including: a storage configured to store data; and a controller configured to recognize a person included in an image captured by the user device or received by the user device from an external source, and change a part of the image corresponding to the recognized person to be unrecognizable in response to a degree of closeness between the recognized person and a user of the user device being lower than a predetermined level based on the data stored in the storage. | 2016-02-04 |
20160034705 | STOCHASTIC PRIVACY - A stochastic privacy service provider may provide users with a guaranteed upper bound on a probability that personal data will be accessed while enabling the services to collect data that can be used to enhance its services. Users may receive incentives to become participants in a stochastic privacy program. The stochastic privacy provider may employ one or more probabilistic and decision-theoretic methods to determine which participants' personal data should be sought while guaranteeing that the probability of personal data being accessed is smaller than the mutually agreed upon probability of access. The probability of access may be on a per time basis. The stochastic privacy provider mayaccess coalescenses of the personal data of sets of multiple people, where a maximum probability is given for accessing statistical summaries of personal data computed from groups of people that are of at least some guaranteed size. | 2016-02-04 |
20160034706 | DEVICE AND METHOD OF ANALYZING MASKED TASK LOG - A method of analyzing a masked task log obtained by masking part of a task log, which is a record of a task performed in a workflow system, the method includes: acquiring a plurality of pieces of disclosed information that are viewable to a plurality of users based on unmasked information in the masked task log; specifying relevance between the plurality of pieces of disclosed information and a plurality of tasks performed in the workflow system, the plurality of tasks including the task; and calculating an index based on the relevance by a processor, the index indicating a possibility that content of the masked task log is determined from the plurality of pieces of disclosed information. | 2016-02-04 |
20160034707 | METHOD AND DEVICE FOR ENCRYPTING OR DECRYPTING CONTENT - A wearable device includes a user information obtainer configured to obtain user information, a controller configured to selectively generate, in response to a user being authenticated based on the user information, an encryption key for encryption of content of an external device; and a communicator configured to transmit the encryption key to the external device. | 2016-02-04 |
20160034708 | DEVICE AND METHOD OF SETTING OR REMOVING SECURITY ON CONTENT - A device for removing security on content using biometric information includes a memory configured to store content on which security has been set based on first biometric information of a user; and a controller configured to obtain second biometric information of the user, which is of a different type than the first biometric information, and remove the security on the content based on the second biometric information, in response to a user input for executing the content. | 2016-02-04 |
20160034709 | METHODS AND APPARATUS FOR MULTIGENERATIONAL FAMILY STORAGE VAULT - The present invention relates to apparatus and methods for receiving one or both of documents and artifacts that may include mages, medical records and other information (Family Docs) from Family Members and storing the information and heirlooms in an organized and secure manner according to Family Member Profiles. | 2016-02-04 |
20160034710 | MESSAGING SYSTEMS AND METHODS - A messaging system for providing messaging service between or among user accounts includes a message database server. The message database server includes an account module to maintain user accounts and an upload module to receive message data from a user communication device associated with a user account. The message data may include a message and a share list that authorizes identified user accounts in which the message is to be shared. A single instance storage module may store the message as a single instance. A share module may share the message with the identified user accounts and delete the message at a predetermined time as specified in the share list. | 2016-02-04 |
20160034711 | CLOUD BASED REAL TIME APP PRIVACY DASHBOARD - A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device. | 2016-02-04 |
20160034712 | SYSTEM AND METHOD FOR EVENT-RELATED CONTENT DISCOVERY, CURATION, AND PRESENTATION - A method for event detection and content surfacing, including: receiving a plurality of posts from a plurality of social networking systems; indexing each post; detecting an event within a geofence based on the post parameter values; identifying an event of interest based on the event parameter values; notifying a user account of the detected event when the detected event is determined to be of interest to the user account; aggregating event posts into a content stream for the user account; and facilitating user account interaction with and use of the event posts. | 2016-02-04 |
20160034713 | Decentralized Systems and Methods to Securely Aggregate Unstructured Personal Data on User Controlled Devices - A privacy-preserving decentralized computer-implemented system and method for securely aggregating an individual's personal data by extracting, redacting, normalizing, and linking data from a plurality of the individual's personal accounts and services. | 2016-02-04 |
20160034714 | APPARATUS AND METHOD FOR DATA MATCHING AND ANONYMIZATION - A method includes receiving a plurality of data sets. Each data set includes a customer identifier field specifying a unique customer identifier associated with each entry in each data set. The plurality of data sets includes a first group of data sets and a second group of data sets. The method further includes storing the plurality of data sets, and generating a key map including the customer identifier field including unique customer identifiers of the first group of data sets of the plurality of data sets, and an anonymous identifier field including unique anonymous identifiers. Each anonymous identifier corresponds to a customer identifier of the key map. The method further includes replacing each unique customer identifier in the second group of data sets with the corresponding anonymous identifier. | 2016-02-04 |
20160034715 | DATA PRIVACY EMPLOYING A K-ANONYMITY MODEL WITH PROBABALISTIC MATCH SELF-SCORING - According to one embodiment of the present invention, a system for protecting data determines a desired duplication rate based on a level of desired anonymity for the data and generates a threshold for data records within the data based on the desired duplication rate. The system produces a data record score for each data record based on comparisons of attributes for that data record, compares the data record scores to the threshold, and controls access to the data records based on the comparison. Embodiments of the present invention further include a method and computer program product for protecting data in substantially the same manners described above. | 2016-02-04 |
20160034716 | USER SEARCH BASED ON PRIVATE INFORMATION - In one embodiment, a method includes receiving, from a first user, a query specifying one or more criteria; accessing a data store comprising information associated with one or more users of a social-networking system; identifying a second user from a plurality of users of the social-networking system based on private information stored in the data store and the one or more criteria, wherein the private information is not viewable by the first user; and sending, to the first user, substitute information associated with the second user in place of the private information, the substitute information being information that is viewable by the first user. | 2016-02-04 |
20160034717 | Filtering Transferred Media Content - An approach is provided in which an information handling system identifies areas of sensitive content in a digital image that is intended to be sent to a recipient. The information handling system retrieves rules corresponding to both the intended recipient and the sensitive content, and modifies the digital image based upon the identified rules. The modification of the digital image includes protecting the sensitive content, such as blurring a person's face on the digital image. In turn, the information handling system sends the modified digital image to the intended first recipient. | 2016-02-04 |
20160034718 | METHOD AND APPARATUS FOR COMMUNICATING PRIVATE MESSAGES WITH PARTIALLY OBSCURED CONTENT TO LIMIT OR PREVENT UNAUTHORIZED USE OF DATA TO IMPEDE PRIVACY VIOLATIONS - Some embodiments described herein relate to receiving a content portion of a message during a first time period. The content portion of the message can be presented during the first time period without a sender identifier. During a second time period after the first time period, a user can request the sender identifier. The sender identifier can be presented during the second time period without presenting the content portion of the message. In this way, the sender identifier and the content portion of the message may not be presented simultaneously. | 2016-02-04 |
20160034719 | STORAGE SYSTEM AND METHOD FOR CONTROLLING STORAGE SYSTEM - The storage system according to the present invention has a function to encrypt write data from the host and store the same in a storage media. Further, validation information of write data is added to the write data during storage thereof, and the data having the validation information added thereto is encrypted and stored in the storage media. When starting the storage system or restoring the encryption key information, the encrypted data stored in the storage media is read from the disk and decrypted prior to receiving a data access request from the host, and validation of data is performed using the validation information added to the decrypted data, so as to determine whether the encryption key stored in a storage controller is valid or not. | 2016-02-04 |
20160034720 | PROCESSING INFORMATION - A method and system for processing information. An apparatus divides target information into N pieces of divided data using a secret sharing scheme in which a predetermined number (K) of pieces of the N pieces of divided data is required to restore the target information, wherein N>K. The apparatus is an information processing device or an external storage device. The apparatus selects M pieces from the N pieces (KM−K). | 2016-02-04 |
20160034721 | STORAGE SYSTEM AND STORAGE SYSTEM CONTROL METHOD - The present invention curbs encryption key information used in a virtual logical volume and improves security. A storage management function | 2016-02-04 |
20160034722 | DETECTING WINDOW DETERIORATION ON BARCODE SCANNING WORKSTATION - A method of operating a workstation includes capturing multiple monitoring images each being captured with the imaging sensor while the illumination light source is energized during one of multiple short exposure-time-periods, and detecting a checkup-condition that includes analyzing the multiple monitoring images to determine the presence of any adverse feature on workstation's window. Each of the multiple short exposure-time-periods is shorter than four times of a threshold exposure-time-period but no shorter than 25% of the threshold exposure-time-period. The threshold exposure-time-period is a minimal exposure-time-period needed for the imaging sensor to capture recognizable patterns of a barcode that is in directing contacting with the window while the illumination light source is energized. | 2016-02-04 |
20160034723 | TEST AUTOMATION FOR AUTOMATED FARE MANAGEMENT SYSTEMS - A test robot may receive a test scenario for testing a fare management system. The test robot may program a fare card to store card information based on the test scenario. The test robot may provide an instruction to an actuator component to cause the actuator component to move the fare card within communicative proximity of a card reader device. The fare card, when moved within communicative proximity of the card reader device, may cause the card reader device to read the stored card information from the fare card and to provide updated card information, based on the stored card information, for storage by the fare card. The test robot may read the updated card information from the fare card. The test robot may provide test result information, based on the updated card information, to a test management device. | 2016-02-04 |
20160034724 | RFID APPARATUS CALIBRATION - Calibrating an RFID apparatus includes: positioning the RFID apparatus within a distance of an RFID tag array, the RFID apparatus having an RFID antenna to detect RFID tags and at least one motion sensing device; aligning the RFID apparatus with the RFID tag array using the motion sensing device; acquiring (i) RFID tag information including signal strength using the RFID antenna to generate an RFID antenna radiation pattern that includes a region of at least one RFID tag exceeding a signal strength, and (ii) position information of the RFID tag in the RFID tag array; and determining calibration values of the RFID apparatus based on a one or more alignment differences between the acquired region of the RFID tag information and the position information of the motion sensing device; adjusting the RFID apparatus scan path data acquired from the at least one motion sensing device using the determined calibration values. | 2016-02-04 |
20160034725 | TRANSACTION TERMINAL DEVICE - In a transaction terminal device, a magnetic head module that supports a magnetic head which reads a magnetic card, and a plurality of communication antennas used for communications according to different standards are arranged at the same end within a housing. The magnetic head module includes a line-shaped metal urging member that exerts urging force to a magnetic head in a passing path direction of the magnetic card. Even though a communication antenna is arranged close to the magnetic head, a reradiated radio wave generated from the metal urging member of the magnetic head receiving a radio wave radiated from an adjacent communication antenna is reduced, and communication quality is secured. Accordingly, even though the communication antenna is arranged close to the magnetic head that reads the magnetic card, the transaction terminal device can normally complete the transaction using the read magnetic card. | 2016-02-04 |
20160034726 | CARD READER AND METHOD OF USE THEREOF - An integrated circuit that communicates with a host device via audio channels includes an interfacing circuit that receives and transmits analog signals on the audio channels. Such audio channels are designed for audio speakers and microphones and the interfacing circuit transmits digital data based on the received analog signals. The integrated circuit includes a processing device that is electrically coupled to the interfacing circuit. The processing device receives the digital data from the interfacing circuit and adjusts at least one parameter of the interfacing circuit based on the received digital data. The interfacing circuit receives the digital data from the processing device and transmits analog signals on at least one of the audio channels based on the at least one adjusted parameter. | 2016-02-04 |
20160034727 | COMPACT MOBILE-READER SYSTEM FOR TWO-WAY WIRELESS COMMUNICATION, TRACKING AND STATUS MONITORING FOR TRANSPORT SAFETY AND SECURITY - A system for monitoring a plurality radio frequency identification tags is described. The system uses at least one set of radio frequency identification tags. Each tag is attached to a container and includes several sensors for detecting physical conditions of said container. The system includes at least one autonomous intermediate reader in wireless communication with the frequency identification tags. The intermediate reader includes external wireless communication system, intermediate reader logic controller, and a self-contained rechargeable power supply. The system uses a central status reporting system in communication the intermediate reader. | 2016-02-04 |
20160034728 | RFID TAG AND READER CHARACTERISTIC DETERMINATION USING GROUP KEYS - An RFID tag possesses a group key issued by an authorized entity. When a reader requests some information from the tag, such as an identifier, the tag transmits a random number to the reader. The tag then determines one or more reader characteristics based on a response received from the reader. In one embodiment, the tag generates a verification value based on the random number and the group key and compares the verification value to the received response. If the comparison succeeds, the tag may treat the reader as possessing particular functionality, authorized to implement a particular feature, and/or authorized to receive information from the tag. If the comparison fails, the tag may treat the reader as lacking particular functionality, not authorized to implement a particular feature, and/or not authorized to receive information from the tag. The tag may request additional response(s) from the reader before determining the reader characteristic(s). | 2016-02-04 |
20160034729 | RFID INTEGRATED ANTENNA SYSTEM - An RFID system includes at least one host controller and at least one antenna module coupled to the host controller. The antenna module may include a plurality of antenna elements, at least one multiplexer (MUX) module integrated in the antenna module, and an RFID reader integrated in the antenna module. The outputs of the MUX module may be coupled to the plurality of antenna elements, respectively, for selecting at least one active antenna element at a given time from among the plurality of antenna elements during a scanning operation. The RFID reader may be coupled to an input of the MUX module, and may be operable to conduct, based on control information received from the host controller, RFID scans via the plurality of antenna elements. | 2016-02-04 |
20160034730 | ASSET LOCATION ON CONSTRUCTION SITE - Methods and systems are disclosed for identifying and locating an object in an environment. Identification data for an object is received from an identity sensor, the data received at a central computer system. Location data is received from a lifting device at the central computer system. Load data is received at the central computer system that the object has been loaded onto the lifting device. A location of the object is tracked based on the identification data, the location data, and the load data for the object at the central computer system. | 2016-02-04 |
20160034731 | PERSON POSITIONING AND HEALTH CARE MONITORING SYSTEM - A person positioning and health care monitoring system includes a monitoring center, a RFID tag device, and a tracking module. The monitoring center includes positioning data corresponding to a target. The RFID tag device is located on the target and includes a memory storing a target identification (ID) number and an infrared LED. Each tracking module includes infrared cameras and an RFID device. The tracking module uses the RFID device to communicate with the RFID tag device so as to receive the target identification (ID) number. The tracking module communicates with the monitoring center so as to provide the target identification (ID) number and orientation data corresponding to the target for the monitoring center. The monitoring center determines coordinates of the target according to coordinates of the tracking module and the orientation data corresponding to the target. | 2016-02-04 |
20160034732 | ELECTRONIC SHELF LABEL TAG AND ELECTRONIC SHELF LABEL GATEWAY WITH ADJACENT CHANNEL REMOVAL FEATURE - An electronic shelf label tag may include a second antenna receiving a radio signal from an electronic shelf label gateway, a second wireless communications unit processing the radio signal received from the second antenna, and a second neighboring channel removal unit connected between the second antenna and the second wireless communications unit to remove a neighboring channel signal having a frequency lower than a frequency of a communications channel signal by a preset frequency interval. A signal having a frequency lower than that of the communications channel by a preset amount among signals of wireless communications networks different from a currently used communications network may be removed, whereby reception sensitivity of the electronic shelf label tag may be improved. | 2016-02-04 |
20160034733 | SMART POWER SOURCE - An article having a conductive body, a magnetic diverter, and a communication device is described. The magnetic diverter is positioned on an outer surface of the conductive body. The magnetic diverter covers a substantial portion of the outer surface of the conductive body. A communication device is positioned on the outer surface of the diverter or may be recessed therein. The communication device is capable of signal coupling with a reader. | 2016-02-04 |
20160034734 | Optical Information Reading Device - Provided is an optical information reading device that can reduce an installation load on a user, and can accurately read a code provided to each of various workpieces. A polarized illumination light source includes light emitters that irradiate the workpiece with illumination light through a polarization filter. A non-polarized illumination light source includes light emitters that irradiate the workpiece with illumination light without through a polarization filter. An imaging element is provided with a polarization filter having a polarization direction different from a polarization direction of the polarization filter of the light emitters. Either of the polarized illumination light source and the non-polarized illumination light source is used in accordance with the workpiece. | 2016-02-04 |
20160034735 | DIFFUSE BRIGHT FIELD ILLUMINATION SYSTEM FOR A BARCODE READER - One aspect of the present disclosure is related to a barcode reader that includes a bright field illumination system, a dark field illumination system, and an additional illumination system that is better able to illuminate an area of the reader's field of view between the far zone (where bright field illumination is optimal) and the close zone (where dark field illumination is optimal). In this “center zone,” the dark field illumination may not be bright enough and the bright field illumination may not be diffuse enough for reading a barcode. | 2016-02-04 |
20160034736 | Optical Information Reading Device - Provided is an optical information reading device that displays, as an image, information that can be conveniently checked in setting work and in maintenance work. A decoding unit decodes image data acquired by an imaging element, and an arithmetic operation unit arithmetically operates a matching level indicating easiness of the decoding of a code, stability of the decoding, a margin of the decoding or pixel-per-cell in the decoding unit. Furthermore, a UI management unit and an image display device display, as an image, at least one of the matching level, the image data acquired by the imaging element, and an average success rate (reading success rate) of the decoding obtained by decoding a plurality of pieces of image data obtained by capturing an image of the code a plurality of times. | 2016-02-04 |
20160034737 | SYSTEM FOR, AND METHOD OF, CONTROLLING TARGET ILLUMINATION FOR AN IMAGING READER - An imaging reader has an illuminating light assembly for illuminating a target with illumination light, and a solid-state image sensor with a rolling shutter for sequentially exposing an array of pixels to capture an image from the illuminated target. Target illumination is controlled by controlling an exposure time and a gain of the sensor, and by controlling an output power of the illumination light. The output power is maintained at a maximum level when the exposure time and/or the gain exceed a minimum threshold, and is lowered when the exposure time and/or the gain does not exceed the minimum threshold, while concomitantly maintaining the exposure time and/or the gain constant at the minimum threshold. | 2016-02-04 |
20160034738 | METHOD USING A TOUCHPAD FOR CONTROLLING A COMPUTERIZED SYSTEM WITH EPIDERMAL PRINT INFORMATION - Methods of processing touchpad data are disclosed. The touchpad data indicates one or more areas of the touch pad contacted by a user, and indicates print information indicating a pattern of epidermal ridges of the user in the contacted areas. The methods may also include analyzing the touchpad data in accordance with a model of a human hand. The methods may also include associating the content areas with particular anatomical portions, such as fingers, where the associating is based at least in part on the model, the contact areas, and the print information. The methods may also include modifying one or more parameters of the model based on the print information. The methods may also include obtaining print information from contact areas selected based on features associated with the contact areas. | 2016-02-04 |
20160034739 | BIOMETRIC IDENTIFICATION DEVICE HAVING SENSOR ELECTRODES WITH MASKING FUNCTION - A biometric identification device includes a substrate, plural sensor electrodes; plural selectors, plural selection traces, plural sensing signal readout lines, and a control unit. The sensor electrodes disposed on the substrate. Each selector corresponds to one sensor electrode and has a first terminal, a second terminal and a third terminal. The first terminal is connected to a corresponding sensor electrode. Each selection trace is connected to the second terminal of at least one selector. Each sensing signal readout line is connected to the third terminal of at least one selector. The control unit is connected to the selectors through the selection traces and the sensing signal readout lines, so as to read sensed signals of the sensor electrodes. The selectors, the selection traces, and the sensing signal readout lines are disposed below and masked by the sensor electrodes. | 2016-02-04 |
20160034740 | SIGNAL STRENGTH ENHANCEMENT IN A BIOMETRIC SENSOR ARRAY - A biometric imager may comprise a plurality of sensor element traces formed in or on a sensor substrate which may comprise at least a portion of a display screen defining a biometric sensing area and forming in-active pixel locations; an auxiliary active circuit formed in or on the sensor substrate on the periphery of the biometric sensing area and in direct or indirect electrical contact with the sensor element traces; and providing a signal processing interface to a remotely located controller integrated circuit. The sensor element traces may form a portion of one dimensional linear sensor array or pixel locations in a two dimensional grid array capacitive gap biometric imaging sensor. The auxiliary circuit may provide pixel location selection or pixel signal amplification. The auxiliary circuit may be mounted on a surface of the display screen. The auxiliary circuit further comprising a separate pixel location selection controller circuit. | 2016-02-04 |
20160034741 | CONTROL METHOD FOR FINGERPRINT RECOGNITION APPARATUS - An electronic device is provided. The electronic device includes: a processor; a fingerprint recognition apparatus comprising a plurality of fingerprint sensing cells and a plurality of touch sensing cells; and a housing, wherein the processor is installed inside the housing. When an application executed by the processor does not utilize the fingerprint recognition apparatus, the processor controls the fingerprint recognition apparatus to enter a power-down mode to turn off the fingerprint sensing cells and the touch sensing cells. When the processor receives a fingerprint recognition request signal from the application, the processor further controls the fingerprint recognition apparatus to enter a power-saving mode to capture a first sensed image. When the processor determines that the first sensed image is a fingerprint image, the processor further controls the fingerprint recognition apparatus to enter an operation mode. | 2016-02-04 |
20160034742 | RING-TYPE MOBILE TERMINAL - A ring-type terminal including a main body configured to be placed on and surround a user's finger and including an insertion region in which the finger is inserted; a fingerprint sensor provided on at least one region of an inner circumferential surface of the main body and configured to recognize a fingerprint of the finger; a guide module provided on the inner circumferential surface such that the finger comes in contact with the fingerprint sensing module while the finger is inserted in the insertion region; and a controller configured to execute a function based on the fingerprint sensed by the fingerprint sensing module. | 2016-02-04 |
20160034743 | METHOD FOR REQUESTING IMAGES FROM EARTH-ORBITING SATELLITES - A method for consumer-direct requesting of images from an Earth-orbiting satellite system having online Earth and Space maps with image location selection tools. The consumer may select image from map, specify a desired image time or use a computer algorithm to match Earth or space coordinates. The consumer may place an order, send an order to computer database, and generate Earth or space pointing coordinates for satellite(s) selected to record the image. The system may automatically select a ground station in order to command, record, or transmit selected image from satellite. The system may store and/or retrieve selected image into computer database as well as deliver selected image to consumer. | 2016-02-04 |
20160034744 | FINGERPRINT RECOGNITION METHOD AND DEVICE THEREOF - A fingerprint recognition method includes the following steps: obtaining a to-be-recognized fingerprint image of a to-be-recognized finger; extracting to-be-recognized data of the to-be-recognized fingerprint image, the to-be-recognized data including a to-be-recognized minutiae data set and a to-be-recognized skeleton; loading a minutiae-skeleton array of a registered finger, the minutiae-skeleton array including a plurality of elements, each of the plurality of elements including a registered minutiae data set and a registered skeleton; performing minutiae-skeleton verification on the to-be-recognized data and the minutiae-skeleton array to generate a verification result. | 2016-02-04 |
20160034745 | HIGH SENSITIVITY FLAT PANEL MICROBIOLOGY DETECTION AND ENUMERATION SYSTEM - A flat panel imaging system for imaging cells provided on a cell medium is disclosed. The system includes a housing having a base portion and a lid that collectively form a closed environment to exclude external sources of light, and a flat panel detector encased in the base portion and having an array of pixels each including a photodiode and transistor. The system also includes a first light source that illuminates cells on the cell medium to excite at least a portion of the cells and cause those cells to generate photons that are captured by the array of pixels and a second light source to illuminate cells on the cell medium with a light different from the light from the first light source and that provides for a capturing of photons representative of photons transmitted through the cells on the cell medium. | 2016-02-04 |
20160034746 | CONTROL SYSTEM, ROBOT SYSTEM, AND CONTROL METHOD - A control system includes a projection section that projects predetermined patterned light on a target object, a first imaging section that captures an image of the target object on which the predetermined patterned light is projected by the projection section, a second imaging section that is disposed in a position different from a position where the first imaging section is disposed and captures an image of the target object on which the predetermined patterned light is projected by the projection section, and a calculation section that calculates a three-dimensional shape of the target object based on a first point in a first captured image captured by the first imaging section and a second point in a second captured image captured by the second imaging section. | 2016-02-04 |
20160034747 | RECORDING MEDIUM, IMAGE PROCESSING METHOD, AND INFORMATION TERMINAL - An information terminal includes acquiring an image of a first subject that is captured by a first sensor provided on a back surface of a surface on which a screen of the information terminal is disposed, and when displaying the image on the screen, changing a degree of scaling up/down of the image and a position at which the image is displayed in accordance with a position of a second subject that is imaged by a second sensor provided to the information terminal. | 2016-02-04 |
20160034748 | Computerized Prominent Character Recognition in Videos - Techniques for identifying prominent subjects in video content based on feature point extraction are described herein. Video files may be processed to detect faces on video frames and extract feature points from the video frames. Some video frames may include detected faces and extracted feature points and other video frames may not include detected faces. Based on the extracted feature points, faces may be inferred on video frames where no face was detected. The inferring may be based on feature points. Additionally, video frames may be arranged into groups and two or more groups may be merged. The merging may be based on some groups including video frames having overlapping feature points. The resulting groups each may identify a subject. A frequency representing a number of video frames where the subject appears may be determined for calculating a prominence score for each of the identified subjects in the video file. | 2016-02-04 |
20160034749 | Facial Image Bucketing with Expectation Maximization and Facial Coordinates - Facial image bucketing is disclosed, whereby a query for facial image recognition compares the facial image against existing candidate images. Rather than comparing the facial image to each candidate image, the candidate images are organized or clustered into buckets according to their facial similarities, and the facial image is then compared to the image(s) in most-likely one(s) of the buckets. The organizing uses particular selected facial features, computes distance between the facial features, and selects ones of the computed distances to determine which facial images should be organized into the same bucket. | 2016-02-04 |
20160034750 | ASSET SECURITY MANAGEMENT SYSTEM - Systems and methods for monitoring assets at a premises on a utility grid. Face print information is extracted from image data received . The face print information comprises an amount of data less than the amount of data comprising the image data of the face. Asset management information from an asset management system is also received. Multiple image data may be received and vector information is determined that corresponds to the trajectory of movement of a face. A security alert is generated by correlating the asset management information with the face print information and/or the vector information and transmitting in real time the security alert to a monitoring center. A security alert may also be generated from image data reflecting abnormal running conditions of a device. Security alerts would be of a size and format necessary for transmission on any existing network, including a narrow band network. | 2016-02-04 |
20160034751 | OBJECT TRACKING AND BEST SHOT DETECTION SYSTEM - A method and system using face tracking and object tracking is disclosed. The method and system use face tracking, location, and/or recognition to enhance object tracking, and use object tracking and/or location to enhance face tracking. | 2016-02-04 |
20160034752 | HANDWRITING INPUT SYSTEM AND HANDWRITING INPUT METHOD - A handwriting input system includes a handwriting pen, a handwriting plate and a processing unit. The handwriting pen includes a pen body, a first sensing unit and a first communication unit. The first sensing unit senses an action of the pen body to generate a sensing data. The handwriting plate includes a touch unit, a display unit and a second communication unit. The touch unit senses a contact trajectory and a contact time while the handwriting pen contacts the handwriting plate. The processing unit is selectively disposed in one of the handwriting pen and the handwriting plate. The processing unit calculates a tilt angle of the pen body according to the sensing data, determines a contact shape according to the tilt angle, determines an ink output amount according to the contact time, and determines a handwriting image according to the contact trajectory, the contact shape and the ink output amount. | 2016-02-04 |
20160034753 | IMAGE PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM STORING AN IMAGE PROCESSING PROGRAM - In an image processing apparatus, a character recognizing unit identifies a character image in a document image. A font matching unit determines a character code and a font type corresponding to the identified character image. A fore-and-background setting unit sets the document image as a background image and sets a standard character image based on the determined character code and the determined font type. A background image correcting unit (a) deletes a deletion area in the background image, the deletion area taking a same position as the character image or the standard character image, (b) interpolates a differential area between the character image and the standard character image in a specific neighborhood area that contacts with the deletion area on the basis of the background image, and (c) interpolates the deletion area on the basis of the back ground image. | 2016-02-04 |
20160034754 | AUTOGENERATING VIDEO FROM TEXT - A method of converting user-selected printed text to a synthesized image sequence is provided. The method includes capturing a first image of printed text and generating a model information associated with the text. | 2016-02-04 |