10th week of 2016 patent applcation highlights part 45 |
Patent application number | Title | Published |
20160070906 | GENERIC PRIVILEGE ESCALATION PREVENTION - An apparatus, method, computer readable storage medium are provided in one or more examples and comprise accessing an application, identifying an access token of the application, determining if the access token is a system token, and responsive to the access token failing to be a system token, enabling a runtime module. | 2016-03-10 |
20160070907 | Malicious Mobile Code Runtime Monitoring System and Methods - Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java TN applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides for monitoring information received, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts. | 2016-03-10 |
20160070908 | NEXT GENERATION OF SECURITY OPERATIONS SERVICE - A security service that detects and handles security breaches in a cloud environment without closing down the whole service is described. A security model for a particular service can be created by defining different types of objects that need to be tracked, defining each object's security states, specifying patterns that trigger security state transitions, providing an automated way to change the security state, and providing an automated response to detection of various states. Suspect objects can be moved from a normal resource pool to a suspect resource pool. Machine learning techniques can be used to learn from processing potential and actual security breaches to improve security for the service. | 2016-03-10 |
20160070909 | SECURE PLATFORM IMPLEMENTING DYNAMIC COUNTERMEASURES - The present invention relates to a secure platform implementing dynamic countermeasures in relation with the execution of a code, said secure platform having at least a security sensor, a countermeasure controller and countermeasure means. According to the invention, said countermeasure controller includes at least one security sensor flag able to take at least two sensor flag values depending on the output of the security sensor, a table storing N possible security configuration for the countermeasures, a random generator to generate a random configuration value, a decision function using the sensor flag value and the random configuration value to determine a security configuration in the table to be executed by countermeasure means. | 2016-03-10 |
20160070910 | PLATFORM BASED VERIFICATION OF CONTENTS OF INPUT-OUTPUT DEVICES - A platform to support verification of the contents of an input-output device. The platform includes a platform hardware, which may verify the contents of the I/O device. The platform hardware may comprise components such as manageability engine and verification engine that are used to verify the contents of the I/O device even before the contents of the I/O device are exposed to an operating system supported by a host. The platform components may delete the infected portions of the contents of I/O device if the verification process indicates that the contents of the I/O device include the infected portions. | 2016-03-10 |
20160070911 | RAPID MALWARE INSPECTION OF MOBILE APPLICATIONS - Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted. | 2016-03-10 |
20160070912 | DATA TRACKING IN USER SPACE - A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats. | 2016-03-10 |
20160070913 | Method for Authenticating Firmware Volume and System Therefor - A first firmware volume of a Unified Extensible Firmware Interface (UEFI) compliant information handling system is accessed. Authentication information is retrieved from the first firmware volume using a UEFI Secure Architecture Protocol. Based on the authentication information, it is determined if the first firmware volume is a first type of firmware volume. If the first firmware volume is the first type of firmware volume, the first firmware volume is authenticated using the first authentication information and an authentication procedure other than Secure Boot authentication. If the first firmware volume is a second type of firmware volume, the second type different than the first type, the first firmware volume is authenticated using the first authentication information and the Secure Boot authentication. | 2016-03-10 |
20160070914 | SECURE EXECUTION OF SOFTWARE MODULES ON A COMPUTER - A system and method for executing software modules on a computer, the method comprising: executing (S | 2016-03-10 |
20160070915 | DYNAMIC QUANTIFICATION OF CYBER-SECURITY RISKS IN A CONTROL SYSTEM - A system and method for analyzing cyber-security risk inter-dependencies in a control system having networked devices. The system includes a central server that has a processor and a memory device in communication with the processor. The memory device stores inter-device dependencies and quantified individual risks for each of the networked devices. The memory device also stores a dynamic quantification of risk (DQR) program. The central server is programmed to implement the DQR program. Responsive to observed cyber behavior, the central server changes one or more of the quantified individual risks to generate at least one modified quantified individual risk. The inter-device dependencies for a first of the networked devices and the quantified individual risk for at least one other of the networked devices reflecting the modified quantified individual risk are used to dynamically modify the quantified individual risk for the first device to generate an inter-device modified quantified individual risk. | 2016-03-10 |
20160070916 | MALWARE-PROOF DATA PROCESSING SYSTEM - A data processing system may have a strict separation of processor tasks and data categories, wherein processor tasks are separated into software loading and initialisation (loading processor) and data processing (main processor) and data categories are separated into address data, instructions, internal function data, target data of the main processor and target data of the loading processor. In this way, protection is provided against malware, irrespective of the transmission medium and of the type of malware, and also against future malware and without performance losses in the computer system. | 2016-03-10 |
20160070917 | TOKENIZATION OF STRUCTURED DATA - Structured data, such as email addresses, social security numbers, and the like is accessed for encoding. A set of encoding rules including one or more encoding actions and/or encoding components corresponding to each of one or more structured data components is accessed. The set of encoding rules can include one or more encoding actions and/or one or more encoding components corresponding to each of one or more structured data components. Encoding actions can include tokenization, encryption, data masking, data modification, and the like. The one or more components of the structured data are encoded based on the accessed set of encoding rules. The encoded structured data is stored, processed, or outputted to an external entity. | 2016-03-10 |
20160070918 | OBFUSCATING ACCESS TO A DATA STORE BY A SOFTWARE APPLICATION - There is described a method of obfuscating access to a data store by a software application. The method comprises accessing the data store using access operations. The access operations comprise real access operations and dummy access operations. Each real access operation is operable to access the data store as part of the execution of the software application. There is also described a computer program which, when executed by a processor, causes the processor to carry out the above method. There is also described a computer readable medium storing the above computer program. There is also described a system configured to carry out the above method. | 2016-03-10 |
20160070919 | ACCESS REVOCATION - Systems, methods and apparatuses for revoking access to one or more applications for one or more individuals or users are provided. In some examples, revocation settings may be received from different business divisions or enterprises or business groups within an entity and may be compiled to form a standardized set of revocation settings that may be applied across the entity. Accordingly, upon receiving an item that may be associated with access and may include one or more applications to which access may be revoked and/or one or more users from which access may be revoked, the system may apply the standardized revocation settings to determine whether access should be revoked. If it is determined that access should be revoked, the system may revoke access to the one or more applications for the one or more users. | 2016-03-10 |
20160070920 | CONSTRAINED ENVIRONMENTAL MONITORING BASED ON DATA PRIVILEGES - A sensor mechanism in an environmental monitoring device provides sensor data that represents an environmental condition in an external environment that includes the environmental monitoring device. Then, a control mechanism in the environmental monitoring device generates subsets of the sensor data based on data privileges of different entities, where the data privileges of at least some of the entities are different from each other, and at least some of the corresponding subsets of the sensor data are different. For example, the data privileges may specify: different spatial extents in the external environment monitored by the sensor mechanism; and/or different types of information associated with the external environment. Next, an interface circuit in the environmental monitoring device provides the subsets of the sensor data to electronic devices associated with the entities. | 2016-03-10 |
20160070921 | ASSET PROTECTION BASED ON REDUNDANTLY ASSOCIATED TRUSTED ENTITLEMENT VERIFICATION - A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and embedding an identifier of the compute subsystem. The system and method, in turn, may receive a request to access an asset of a compute subsystem; verify that a feature of the database is enabled in response to the request, the feature corresponding to the asset; and grant the access to access the asset upon the verifying of the feature. | 2016-03-10 |
20160070922 | MANAGING APPLICATIONS IN NON-COOPERATIVE ENVIRONMENTS - The present invention extends to methods, systems, and computer program products for managing applications in non-cooperative environments. Embodiments of the invention provide the ability to manage non-cooperative applications and operating systems. For example, applications and operating systems at a user's (e.g., an information worker's) personal device (e.g., smartphone) can be appropriately managed to provide more secure access to a corporate IT infrastructure. An IT worker can programmatically repackage an application, deploy it to a user's personal device, and manage the user's ability to use the application through policy. | 2016-03-10 |
20160070923 | SYSTEMS AND METHODS FOR MOTION TWO-DIMENSIONAL CODES - Systems and method of the present solution are directed to a motion QR code. In general a motion QR code is a 2D code that evolves over time. More particularly, the motion QR code is displayed, or “played”, to sequentially reveal a plurality of 2D codes. The 2D codes can include 2D barcodes, QR codes, Aztec codes, data matrix codes, or similar codes and are generically referred to as 2D codes. In comparison the a traditional 2D code, the motion QR code dramatically increases the amount of information displayed. The systems and methods described herein a related to a system and method for generating, transmitting, displaying, and authenticating motion QR codes. The QR motion codes can be displayed on, and scanned by, applications executing on client devices such as smartphones and tablet computers. The QR motion codes can be incorporated into traditional IDs, tickets, passes, or other document management systems | 2016-03-10 |
20160070924 | Virtual-Account-Initiated Communication of Protected Information - Described herein are techniques for receiving a first communication sent to a virtual account address and sending a second communication to a recipient communication address. The virtual account address may include the recipient communication address in a user name part of the virtual account address, and the second communication may invite its recipient to request creation of a secure electronic message account. The recipient may then receive content associated with the first communication via the secure electronic message account. | 2016-03-10 |
20160070925 | METHOD AND APPARATUS FOR USER CREATION OF PRIVATE SOCIAL MEDIA NETWORKS - The system provides a method and apparatus for allowing the creation of customized private social networks through a dashboard interface. A user invokes the social network building interface and selects desired features for the network by selecting one of a plurality of possible features. When a feature is selected, the system guides the user through parameters and metrics to implement that feature as desired by the user. The system is implemented through a cloud based architecture that provides components that are used in the private social network, including services such as database, caching, load balancing, security, encryption, dynamic link control, and others. These services and components are accessed and invoked through a series of function calls through an API that allows the creation of a scalable number of private social networks. | 2016-03-10 |
20160070926 | METHOD AND APPARATUS FOR VARIABLE AND FEE BASED CONTENT RIGHTS AND PERMISSIONS - The system provides a method and apparatus for defining rights and permissions for content that allows for subsequent modification of creator owned content, but restricted to permissions and changes associated with the content. The permissions may be one or more from a plurality of possible modifications, time periods, distribution rights, and the like, and include a fee associated with the right to modify. In one embodiment content is accessed via a dynamic link, and the dynamic link includes rules, controls, and restrictions that limit the ability to modify the content to an agreed upon number and type of changes. | 2016-03-10 |
20160070927 | DISTRIBUTED TOKENIZATION USING SEVERAL SUBSTITUTION STEPS - A method for distributed tokenization of sensitive strings of characters, such as social security numbers, credit card numbers and the like, in a local server is disclosed. The method comprises the steps of receiving from a central server at least one, and preferably at least two, static token lookup tables, and receiving a sensitive string of characters. In a first tokenization step, a first substring of characters is substituted with a corresponding first token from the token lookup table(s) to form a first tokenized string of characters, wherein the first substring of characters is a substring of the sensitive string of characters. Thereafter, in a second step of tokenization, a second substring of characters is substituted with a corresponding second token from the token lookup table(s) to form a second tokenized string of characters, wherein the second substring of characters is a substring of the first tokenized string of characters. Optionally, one or more additional tokenization steps is/are used. | 2016-03-10 |
20160070928 | System for and Method of Controllably Disclosing Sensitive Data - System and method of producing a collection of possibilities that agree on information that must be disclosed (disclosable information) and disagree with a sufficient degree of diversity as defined by a policy to protect the sensitive information. A policy defines: what information is possible, what information the recipient would believe, what information is sensitive (to protect), what information is disclosable (to share) and sufficiency conditions that specify the degree of ambiguity required to consider the sensitive information protected. A formalism is utilized that provably achieves these goals for a variety of structured datasets including tabular data such as spreadsheets or databases as well as annotated graphs. The formalism includes the ability to generate a certificate that proves a disclosure adheres to a policy. This certificate is produced either as part of the protection process or separately using an altered process. | 2016-03-10 |
20160070929 | TRUSTED COMPUTING HOST - A trusted computing host is described that provides various security computations and other functions in a distributed multitenant and/or virtualized computing environment. The trusted host computing device can communicate with one or more host computing devices that host virtual machines to provide a number of security-related functions, including but not limited to boot firmware measurement, cryptographic key management, remote attestation, as well as security and forensics management. The trusted computing host maintains an isolated partition for each host computing device in the environment and communicates with peripheral cards on host computing devices in order to provide one or more security functions. | 2016-03-10 |
20160070930 | Disabling Counterfeit Cartridges - A method for disabling counterfeit cartridge operation is provided. The method includes detecting a cartridge in a blade enclosure. The method includes checking authentication credentials of the cartridge. The method includes determining the cartridge to be counterfeit. The method includes disabling the cartridge in response to determining the cartridge to be counterfeit. | 2016-03-10 |
20160070931 | SM3 HASH ALGORITHM ACCELERATION PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS - A processor includes a decode unit to decode an SM3 two round state word update instruction. The instruction is to indicate one or more source packed data operands. The source packed data operand(s) are to have eight 32-bit state words A | 2016-03-10 |
20160070932 | Providing A Trusted Execution Environment Using A Processor - In an embodiment, a system on a chip includes: a single core to execute a legacy instruction set, the single core configured to enter a system management mode (SMM) to provide a trusted execution environment to perform at least one secure operation; and a memory controller coupled to the single core, the memory controller to interface with a system memory, where a portion of the system memory comprises a secure memory for the SMM, and the single core is to authenticate and execute a boot firmware, and pass control to the SMM to obtain a key pair from a protected storage and store the key pair in the secure memory. Other embodiments are described and claimed. | 2016-03-10 |
20160070933 | PROTECTING CHIP SETTINGS USING SECURED SCAN CHAINS - Some embodiments include a method for processing a scan chain in an integrated circuit, the method comprising receiving, in the integrated circuit, the scan chain, wherein the scan chain includes a secret key pattern; separating the secret key pattern from the scan chain; storing the scan chain in a first plurality of latches; storing the secret key pattern in a second plurality of latches; comparing the secret key pattern to a reference key pattern, the reference key pattern stored in a third plurality of latches; determining, based on the comparing the secret key pattern to the reference key pattern, that the secret key pattern does not match the reference key pattern; and generating a signal indicating that the secret key pattern does not match the reference key pattern. | 2016-03-10 |
20160070934 | MEMORY CONTROLLER - A memory controller used to verify authenticity of data stored in a first memory unit. The memory controller includes a secure memory unit which stores a pre-stored value representative of the authenticity of the data to be written in the first memory unit. A processing system calculates a value which is representative of the data in the first memory unit after a write cycle. The calculation of the calculated value is triggered by the write cycle. The calculated value is compared with the pre-stored value in order to verify whether the data stored in the first memory unit after the write cycle has been altered in accordance with the authenticity. By comparing the calculated value with the pre-stored value authenticity of the data stored in the first memory unit after the write cycle is verified, thus preventing the memory controller from operating in case the data written to the first memory unit is not authentic. | 2016-03-10 |
20160070935 | RESPONSE TO TAMPER DETECTION IN A MEMORY DEVICE - In response to a tamper-attempt indication, a memory device selectively disables one or more memory operations. Disabling can be accomplished by different techniques, including altering bias voltages associated with performing the memory operation, gating off a current needed for performing the memory operation, and limiting the needed current to a magnitude below the threshold magnitude required for the operation. After disabling the memory operation, a mock current can be generated. The mock current is intended to mimic the current normally expended during the memory operation when not disabled, thereby leading a user to believe that the device is continuing to operate normally even though the memory operation that is being attempted is not actually being performed. | 2016-03-10 |
20160070936 | ELECTRONIC APPARATUS - An electronic apparatus includes an authentication unit that executes an authentication process for authenticating a battery connected to the electronic apparatus, a holding unit that holds a value representing a result of the authentication process, wherein the value held by the holding unit is deleted in a case where the battery is removed from the electronic apparatus, or in a case where a voltage of the battery is equal to or less than a predetermined value, and a control unit that performs control to determine whether to cause the authentication unit to execute the authentication process according to the value held by the holding unit. | 2016-03-10 |
20160070937 | ELECTRONIC DEVICE AND METHOD THEREOF FOR UNLOCKING DISPLAY OF ELECTRONIC DEVICE - A method for unlocking a display of an electronic device includes initializing a process of unlocking the display, detecting a first orientation of the electronic device from a number of predefined orientations, detecting a second orientation of the electronic device from the number of predefined orientations, detecting a third orientation of the electronic device from the number of predefined orientations, detecting a fourth orientation of the electronic device from the number of predefined orientations, and unlocking the display after detecting the first, second, third, and fourth orientations in sequence. The first, second, third, and fourth orientations are detected within a first, second, third, and fourth predetermined time duration, respectively. The first, second, third, and fourth orientations are oriented 90 degrees away from each other along a common rotation direction. | 2016-03-10 |
20160070938 | PROGRAM EXECUTION DEVICE - A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an execution unit, a first protection unit, and a second protection unit. The execution unit executes a first program and a second program, and is connected with an external device that is capable of controlling the execution. The first protection unit disconnects the execution unit from the external device while the execution unit is executing the first program. The second protection unit protects the first program while the execution unit is executing the second program. | 2016-03-10 |
20160070939 | METHOD OF SECURING VOLUMES OF SPACE IN CARD READERS - Capacitive sensing electrodes may be placed in strategic locations inside, outside or inside and outside of a card reader, wherein touch sensor circuitry is then used to take mutual capacitance or self-capacitance measurements that are saved in non-volatile memory as a reference intrusion measurement that is not deleted when power is removed, wherein the reference intrusion measurement may then be used during subsequent intrusion measurements to determine if a skimming device has been disposed adjacent to the card reader, and if a skimming device is detected, appropriate action may be taken such as the automatic disabling of the card reader, the display of a message indicating that the card reader should not be used, or any other action that may prevent a financial card from being compromised. | 2016-03-10 |
20160070940 | CARD READER WITH POWER EFFICIENT ARCHITECTURE THAT INCLUDES A POWER SUPPLY AND A WAKE-UP CIRCUIT - These and other objects of the present invention are achieved in a card reader with a read head positioned in a housing. The read head is configured to be coupled to a mobile device and has a slot for swiping a magnetic stripe of a card. The read head reads data on the magnetic stripe and produces a raw magnetic signal indicative of data stored on the magnetic stripe. A power supply is coupled to wake-up electronics and a microcontroller. An output jack is adapted to be inserted in a port of the mobile device and deliver an output jack signal to the mobile device. | 2016-03-10 |
20160070941 | WIRELESS DEVICES FOR STORING A FINANCIAL ACCOUNT CARD AND METHODS FOR STORING CARD DATA IN A WIRELESS DEVICE - A wireless device is enabled to receive a financial account card that is inserted into a card slot of the wireless device. The wireless device reads card data from the financial account card when it is inserted into the slot and programs an RFID (radio frequency identification) tag or a memory included in the wireless device. The wireless device may then be used to provide payment by transmitting the card data via radio frequency to a nearby RFID reader using the RFID tag. The financial account card may also be ejected from the wireless device and swiped by a magnetic card reader. | 2016-03-10 |
20160070942 | MOBILE HANDHELD ANTENNA FOR READING TAGS - A tag reader, including: | 2016-03-10 |
20160070943 | DISTINCTIVE NOTICE FOR DIFFERENT SYMBOLOGY INFORMATION - An indicia reader is adapted for hand held operation to read information bearing indicia (IBI) at a point of transaction (POT) and is operated by: configuring the indicia reader in a store to provide at least one store specific indicia read notice; reading an IBI at a POT with the indicia reader and providing the at least one store specific indicia read notice to a customer when each IBI is read. | 2016-03-10 |
20160070944 | VARIABLE DEPTH OF FIELD BARCODE SCANNER - Generally discussed herein are techniques, software, apparatuses, and systems configured for variable depth of field scanners. In one or more embodiments, a method can include exposing a light sensor of a barcode scanner for a specified time, altering a focal point of a variable focus element situated in the light path of the light sensor from a first focal point to a second focal point in the specified time, and processing an image of a barcode produced by the light sensor to deblur the image. | 2016-03-10 |
20160070945 | MICROSCOPE ACCESSORY - An optical device magnification level reader includes a base configured for attachment to an optical device, such as a microscope, where the base supports other components of the reader including a support arm and an electronic scanner. At least two indicia elements are positioned at different locations along the microscope. The different locations correspond to different respective magnification levels of the microscope. The electronic scanner is coupled to the base via the support arm, and is repositionable relative to the base and indicia elements to achieve proper alignment. The electronic scanner is in electronic communication with a computer associated with the microscope and is operable to detect the indicia element that corresponds to a current selected magnification level of the microscope, so that the electronic scanner is operable to send to the computer a signal indicative of the selected magnification level. | 2016-03-10 |
20160070946 | System for Authenticating Goods - A system for identifying authentic goods. The system including: an illumination source having an output associated with a first wavelength distribution, the first wavelength distribution having a first average wavelength; a viewing filter element, the viewing filter element allowing either (i) only light with wavelength greater than the first average wavelength to pass and cutting out the first energy wavelength and lower or (ii) eliminating light with a wavelength less than the first wavelength distribution and allowing light with the same or greater wavelength distribution as the first wavelength to pass or (iii) allowing a specific bandwidth of radiation with an average wavelength that is longer than the first wavelength distribution to pass; a key for identifying authentic goods utilizing the illumination source and the viewing filter element | 2016-03-10 |
20160070947 | IMAGE ACQUISITION DEVICE AND IMAGE ACQUISITION METHOD - Light is emitted on one side of a paper sheet | 2016-03-10 |
20160070948 | SENSOR SYSTEM AND METHOD FOR RECORDING A HAND VEIN PATTERN - The invention relates to a sensor system for recording a hand vein pattern. The sensor system comprises a first light source, which is designed to emit, during operation, electromagnetic waves in the near infrared range, which are able to be reflected by veins in a hand, over the entire surface, a camera having a camera chip for recording reflection signals for electromagnetic waves and for delivering image data that correspond to the reflection signals, a topography sensor for sensing three-dimensional topographies and a first processor unit, which is connected to the camera chip and to the topography sensor. The first processor unit is designed to generate from the image data from the camera and the three-dimensional topography data from the topography sensor, during operation, a normalized vein pattern for a hand or a feature vector that corresponds to the vein pattern. | 2016-03-10 |
20160070949 | Method And Apparatus - A computer implemented method is provided for determining an amount of tumor cells in a tissue sample. The method includes obtaining first image data describing an image of a tissue sample at a first resolution, obtaining second image data describing the image at a second resolution, wherein the first resolution is lower than the second resolution, selecting a candidate tumor region from the second image data based on texture data determined from the first image data, identifying a tumor structure in the candidate region of the second image data, and determining a number of cells in the tumor structure based on its area and an estimate of tumor cell area to estimate an amount of tumor cells in the tissue sample. | 2016-03-10 |
20160070950 | METHOD AND SYSTEM FOR AUTOMATICALLY ASSIGNING CLASS LABELS TO OBJECTS - A method of automatically assigning class labels to objects is provided. The method uses object data indicative of a plurality of parameters associated with each object. The method comprises (i) identifying, from the object data or from a lower-dimensional encoding of the object data a plurality of cluster centres in a d-dimensional space, each cluster centre corresponding to one of the class labels; (ii) for respective cluster centres, determining a surrounding region based on a nearest neighbour cluster centre, and assigning the respective class label to objects within the surrounding region; (iii) generating a predictive model using the object data, or the lower-dimensional encoding of the object data and the class labels of the assigned objects; and (iv) assigning class labels to unassigned objects using the predictive model. A corresponding system for performing the above method is also provided. | 2016-03-10 |
20160070951 | DYNAMIC HANDWRITING VERIFICATION AND HANDWRITING-BASED USER AUTHENTICATION - Handwriting verification methods and related computer systems, and handwriting-based user authentication methods and related computer systems are disclosed. A handwriting verification method comprises obtaining a handwriting test sample containing a plurality of available parameters, extracting geometric parameters, deriving geometric features comprising an x-position value and a y-position value for each of a plurality of feature points in the test sample, performing feature matching between geometric features of the test sample and a reference sample, determining a handwriting verification result based at least in part on the feature matching, and outputting the handwriting verification result. The geometric features may further comprise values derived from the geometric parameters, such as direction and curvature values. The handwriting verification result can be further based on a count of unlinked feature points. Handwriting-based user authentication methods can employ such handwriting verification methods, or other handwriting verification methods. | 2016-03-10 |
20160070952 | METHOD AND APPARATUS FOR FACIAL RECOGNITION - At least one example embodiment discloses a facial recognition apparatus configured to obtain a two-dimensional (2D) input image including a face region of a user, detect a facial feature point from the 2D input image, adjust a pose of a stored three-dimensional (3D) facial model based on the detected facial feature point, generate a 2D projection image from the adjusted 3D facial model, perform facial recognition based on the face region in the 2D input image and a face region in the 2D projection image, and output a result of the facial recognition. | 2016-03-10 |
20160070953 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND RECORDING MEDIUM - In an image processing apparatus, a degree-of-relevance calculation unit calculates a degree of relevance between each of a plurality of images on the basis of a person's face, determination results of scenes and objects, GPS information, and a degree of similarity. An important image extraction unit extracts images captured over a certain period of time including a reference date for determining a degree of importance of the image, and images captured over a certain period of time including a relevant date relevant to the reference date, as important image, from the plurality of images. A relevant image extraction unit extracts a certain number of images as relevant images from important images in which the degree of relevance for a selected image selected from the plurality of images by an instruction which is input through an instruction input unit is equal to or greater than a threshold. | 2016-03-10 |
20160070954 | TAG SUGGESTIONS FOR IMAGES ON ONLINE SOCIAL NETWORKS - In one embodiment, a method includes accessing an image portraying at least a first person, accessing a social graph, determining a social-graph affinity for a first set of users, determining a facial-recognition scores for the first set of users based on the social-graph affinity for each user and a facial-representation associated with each user, where the facial-representation for each user is compared with the image, and generating one or more tag suggestions for the first person portrayed in the image based on the facial-recognition scores. | 2016-03-10 |
20160070955 | PORTRAIT GENERATING DEVICE AND PORTRAIT GENERATING METHOD - A portrait generating device has an image acquisition unit that acquires a facial image in which an object person is photographed, an image correction unit that generates a corrected facial image by performing correction processing on the facial image, at least a part of the face being corrected in the correction processing, and a portrait generator that generates a portrait of the object person using the corrected facial image. | 2016-03-10 |
20160070956 | Method and Apparatus for Generating Facial Feature Verification Model - A method and an apparatus for generating a facial feature verification model. The method includes acquiring N input facial images, performing feature extraction on the N input facial images, to obtain an original feature representation of each facial image, and forming a face sample library, for samples of each person with an independent identity, obtaining an intrinsic representation of each group of face samples in at least two groups of face samples, training a training sample set of the intrinsic representation, to obtain a Bayesian model of the intrinsic representation, and obtaining a facial feature verification model according to a preset model mapping relationship and the Bayesian model of the intrinsic representation. In the method and apparatus for generating a facial feature verification model in the embodiments of the present disclosure, complexity is low and a calculation amount is small. | 2016-03-10 |
20160070957 | FACIAL RECOGNITION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing facial recognition. In one aspect, a method includes accessing a first digital photograph. A first face template is generated for each face detected in the first digital photograph. Second user identifiers that are associated with a first user identifier are determined. A digital photograph index of photographs, user identifiers, and areas in the digital photographs in which a face of a user identified by user identifier is located is accessed. Second user identifiers are selected, and second face templates are generated from the faces of the user the digital photographs. First face templates that match second face templates are identified, and for each first face template that matches a second face template, data is generated specifying the area in the first digital photograph in which the face of the second user is located. | 2016-03-10 |
20160070958 | OBTAINING METRICS FOR A POSITION USING FRAMES CLASSIFIED BY AN ASSOCIATIVE MEMORY - A method for identifying a motion of interest of an individual. The method includes receiving input data from a non-invasive motion sensor measuring movements of a person. The method also includes collecting motion sensor data for an interval of time. The illustrative embodiments also provide for analyzing the motion sensor input data using an analysis application having a set of classified pre-determined motions. The analysis application classifies a movement captured during the interval of time as a motion corresponding to particular a pre-determined motion among a plurality of pre-determined motions. Classification is performed based on shared relative values among the motion sensor input data and the particular pre-determined motion. The illustrative embodiments also provide for generating an output that provides a translation of the movement for identification of a predetermined motion of interest that represents an undesirable ergonomic aspect. | 2016-03-10 |
20160070959 | Display System With Imaging Unit, Display Apparatus And Display Method - According to one embodiment, a display system includes an imaging unit configured to capture an image of a predetermined area; a determination unit configured to determine a number of persons existing in the area, based on the image captured by the imaging unit; and a selection unit configured to select, in accordance with a determination result in the determination unit, corresponding content data from among a plurality of content data. | 2016-03-10 |
20160070960 | IMAGE PROCESSING APPARATUS - Provided is an image processing apparatus which is connected to and accessible to a database storing a plurality of pieces of previously prepared reference data, and which stores at least one piece of individual data having an image captured by the user in association with the information regarding the food/beverage contained in the captured image. The image processing apparatus compares information of the food/beverage in the captured image with the reference data stored in the database and the individual data, and acquires the food/beverage information included in the reference data together with the reference image similar to the captured image, the food/beverage information associated with the captured image in the individual data, or the food/beverage information in the reference data or the individual data including the food/beverage information relating to the captured image. | 2016-03-10 |
20160070961 | SYSTEM AND METHOD OF PLOTTING SOCIAL NETWORK CONNECTIONS FROM IMAGE DATA - A method of establishing a connection among a plurality of persons according to embodiments of the present invention may include executing instructions by a processor to identify a characteristic that is present in a first image of a portfolio of images and in a second image of the portfolio of images; defining by the characteristic an association of the first image and the second image; and defining a social connection between a first person associated with the first image and a second person associated with the second image. According to some embodiments, a method of identifying a connection between a first person and a second person, may include: receiving, by a computing device, at least one image that may include a data characteristic associated with the first person and with the second person; automatically identifying that the at least one image includes the characteristic; and automatically associating the first person and the second person. Additional methods according to embodiments of the present invention are provided. | 2016-03-10 |
20160070962 | Selecting and Presenting Representative Frames for Video Previews - A computer-implemented method for selecting representative frames for videos is provided. The method includes receiving a video and identifying a set of features for each of the frames of the video. The features including frame-based features and semantic features. The semantic features identifying likelihoods of semantic concepts being present as content in the frames of the video. A set of video segments for the video is subsequently generated. Each video segment includes a chronological subset of frames from the video and each frame is associated with at least one of the semantic features. The method generates a score for each frame of the subset of frames for each video segment based at least on the semantic features, and selecting a representative frame for each video segment based on the scores of the frames in the video segment. The representative frame represents and summarizes the video segment. | 2016-03-10 |
20160070963 | REAL TIME VIDEO SUMMARIZATION - System, apparatus, method, and computer readable media for on-the-fly captured video summarization. A video stream is incrementally summarized in concurrence with generation of the stream by a camera module. Saliency of the video stream summary is maintained as the stream evolves by updating the summary to include only the most significant frames. In one exemplary embodiment, saliency is determined by optimizing an objective function including terms that are indicative of both the diversity of a selection, and how representative the selection is to the processed portion of the video data corpus. A device platform including a CM and comporting with the exemplary architecture may provide video camera functionality at ultra-low power, and/or with ultra-low storage resources, and/or with ultra-low communication channel bandwidth. | 2016-03-10 |
20160070964 | POINT-OF-SALE SYSTEMS AND METHODS FOR MONEY TRANSFER TRANSACTIONS - Systems and methods for easily and quickly performing financial services with a stand-alone unit are disclosed. In one embodiment, a housing comprising a camera is disclosed. A user interface, such as a tablet computer, may be coupled with the housing. An adjustable mount may be coupled to the housing and configured to rotate about various axes to point the camera and/or a screen on the user interface in various directions. A base may be coupled with and support the adjustable mount and may include a delineated portion indicating a desired location for receiving items of various shapes and sizes to be used for the financial service. The item may then be easily and accurately imaged using the camera. In some embodiments, the camera is fixed on a stand separate from the housing. The base may further include multiple delineated portions. | 2016-03-10 |
20160070965 | DETECTION SYSTEM FOR COLOR BLIND DRIVERS - A detection system for vehicle operation according to an exemplary aspect of the present disclosure includes, among other things, at least one camera operable to generate an image and a display unit operable to communicate information on a display. A controller is coupled to the at least one camera. The controller is configured to command the display unit to communicate the information in response to detecting data within the image corresponding to visible light emitted in at least one predetermined frequency range. A controller and a method of detecting a traffic device are also disclosed. | 2016-03-10 |
20160070966 | HEAD-MOUNTED DISPLAY HEAD POSE AND ACTIVITY ESTIMATION - A system may receive head pose indications determined according to movement data from a motion sensor of an optical head-mounted display worn by a vehicle driver, determine, according to the head pose indications, driver activity characteristics indicative of a history of movement of the head of the driver, and send the driver activity characteristics to a driver-aware vehicle system configured to adjust driver notification based on the driver activity characteristics. The system may also receive raw movement data from a motion sensor of an optical head-mounted display worn on a head of a vehicle driver, compute head velocity data based on the raw movement data, compute head displacement data based on the head velocity data, and update head pose indications indicative of head positioning upon determining that the head displacement data exceeds a predetermined threshold displacement. | 2016-03-10 |
20160070967 | Multi-Stage Liveness Determination - A method of determining whether a biometric object is part of a live individual is described. In one such method, image information is acquired from the biometric object by using a sensor, such as an ultrasonic sensor. The image information may be analyzed in at least two analysis stages. One of the analysis stages may be a temporal analysis stage that analyzes changes in the image information obtained during a time period throughout which the biometric object was continuously available to the sensor. For example, a dead/alive stage may analyze differences between image information taken at two different times in order to identify changes from one time to the next. Other stages may focus on aspects of a particular image information set, rather than seeking to assess changes over time. These other stages seek to determine whether an image information set exhibits characteristics similar to those of a live biometric object. | 2016-03-10 |
20160070968 | IMAGE-BASED LIVENESS DETECTION FOR ULTRASONIC FINGERPRINTS - A liveness-detection method and/or system is disclosed. A method of detecting liveness can comprise obtaining a single ultrasonic image of a biometric object. The single ultrasonic image can be subdivided into a plurality of overlapping sample blocks. Feature vectors can be extracted in a spatial domain and a frequency domain from each of the plurality of sample blocks. The feature vectors can be compared from each of the plurality of sample blocks to a classification model. | 2016-03-10 |
20160070969 | METHOD AND SYSTEM FOR ALIGNING AND CLASSIFYING IMAGES - In one embodiment, L dimensional images are trained, mapped, and aligned to an M dimensional topology to obtain azimuthal angles. The aligned L dimensional images are then trained and mapped to an N dimensional topology to obtain 2 | 2016-03-10 |
20160070970 | ARCHITECTURE AND METHOD FOR REAL-TIME PARALLEL DETECTION AND EXTRACTION OF MAXIMALLY STABLE EXTREMAL REGIONS (MSERS) - Architecture for real-time extraction of maximally stable extremal regions (MSERs) is disclosed. The architecture includes a communication interface and processing circuitry that are configured in hardware to receive a data stream of an intensity image in real-time and provide labels for light image regions and dark image regions within the intensity image that match a given intensity threshold during a single processing pass. The communication interface and processing circuitry are also configured in hardware to find extremal regions within the intensity image based upon the labels and to determine MSER ellipses parameters based upon the extremal regions and MSER criteria. In at least one embodiment, the MSER criteria include minimum and maximum MSER areas, and an acceptable growth rate value for MSER areas. In another embodiment, the MSER criteria include a nested MSER tolerance value. | 2016-03-10 |
20160070971 | INSPECTION METHOD - In an inspection method, an inspection region of a sample is divided into a plurality of stripe regions, and is divided into a plurality of groups so that a plurality of continuously arranged stripe regions constitutes one group. An optical image of a graphic pattern arranged in a stripe region of one of the groups is acquired while moving a stage in a longitudinal direction of the stripe region. The stage is then moved in a lateral direction of the stripe region. An optical image of a graphic pattern arranged in a stripe region of a group different from one of the groups in which the optical image is acquired, and in a stripe region not continuous to the stripe region whose optical image is acquired immediately before the movement in the lateral direction, is acquired while moving the stage in the longitudinal direction of the stripe region. | 2016-03-10 |
20160070972 | System and method for determining a pet breed from an image - An image of a pet's face may be processed in order to determine a type of breed of the pet. The processing of the pet's image uses a multi-agent classifier. The multi-agent classifier comprises a plurality of individually trained agents that each classify the image to identify the potential breed or breeds of the image. The predicted breeds from each of the agents are then combined into the final breed prediction. | 2016-03-10 |
20160070973 | CONCURRENT ACTIVE CONTOUR SEGMENTATION - A system and method for active contour segmentation. An image of a first and at least a second structure, a first position for the first structure, and at least a second position for the at least second structure are received, the first and the at least second positions are set as a first and an at least second initial contour, and the first and the at least second initial contours are concurrently and iteratively deformed to respectively expand into a first and at least a second expanded contour matching a shape of the first and the at least second structure by applying constraints to each point of the first and the at least second initial contour, comprising a constraint for preventing the first and at least one of the at least second initial contour from intersecting one another upon being deformed, and the constraints are updated after each iteration. | 2016-03-10 |
20160070974 | Multi-Scale Tone Mapping - Methods, devices and computer readable instructions to generate multi-scale tone curves are disclosed. One method includes finding, for a given input image, a global tone curve that exhibits monotonic behavior. The input image may then be partitioned into a first number of sub-regions. For each sub-region, a local tone curve may be determined that has an output level that is constrained to the global tone curve at one or more first luminance levels so that each sub-region's local tone curve's output follows the global tone curve's monotonic behavior. If the resulting local tone curves provide sufficient control of shadow-boost, highlight-suppression, and contrast optimization the first number of local tone curves may be applied directly to the input image. If additional control is needed, each sub-region may again be partitioned and local tone curves determined for each of the new sub-regions. | 2016-03-10 |
20160070975 | ARCHITECTURE FOR REAL-TIME EXTRACTION OF EXTENDED MAXIMALLY STABLE EXTREMAL REGIONS (X-MSERs) - Architecture for real-time extraction of maximally stable extremal regions (MSERs) is disclosed. The architecture includes communication interface and processing circuitry that is adapted in hardware to receive a data streams of an intensity image and a depth image in real-time and provide intensity labels for image regions within the intensity image that match a given intensity threshold and provide depth labels for image regions within the depth image that match a given depth threshold. The processing circuitry is also adapted in hardware to find intensity extremal regions within the intensity image based upon the intensity labels and to find depth extremal regions within the depth image based upon the depth labels. The processing circuitry determines strong extremal regions based upon significant overlap between the intensity extremal regions and depth extremal regions. The processing circuitry then determines X-MSER ellipses parameters based upon the strong extremal regions and X-MSER criteria. | 2016-03-10 |
20160070976 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND RECORDING MEDIUM - An image processing apparatus includes a first learning unit configured to learn an identifier for identifying a class of a region formed by segmenting an image based on first training data, an evaluation unit configured to evaluate a result of identification of a class of the first training data by the identifier, a generation unit configured to generate second training data from the first training data based on an evaluation result by the evaluation unit, and a second learning unit configured to learn a plurality of identifiers different from the identifier learned by the first learning unit based on the second training data. | 2016-03-10 |
20160070977 | Device And Method For The Classification Of A Food Item Of An Organic Or Irregular Structure - An apparatus for classifying a food item of organic or irregular structure includes an image capture unit, a data input unit, and a data output unit. An evaluation unit is connected to said image capture unit, to said data input unit and to said data output unit. The image capture unit captures the food item as optical data and provides the optical data in transmittable form for transmission to the evaluation unit. The evaluation unit extracts feature values of the food item from the optical data. The feature values are combined to form a feature value tuple for the food item. The feature value tuple is automatically assignable to a feature value tuple range. The feature value tuple range is formed by one or more feature value tuples. The feature value tuple range is assigned a class. The data input unit is used to perform an assignment of the class to the feature value tuple range. | 2016-03-10 |
20160070978 | DIGITAL IMAGE PROCESSING METHOD, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM HAVING RECORDED THEREON A PROGRAM FOR EXECUTING THE DIGITAL IMAGE PROCESSING METHOD, AND DIGITAL IMAGE PROCESSING APPARATUS - A digital image processing method and apparatus eliminates or reduces the temporal delay associated a perspective transform being generated for a region of an captured image. The method includes: receiving a preview image; detecting at least one rectangular region from the preview image and obtaining coordinate information corresponding to the at least one rectangular region; determining a main rectangular region from among the at least one rectangular region detected from the preview image; capturing an image; and generating a perspective-transformed image by performing perspective transform on the captured image by using coordinate information corresponding to the main rectangular region. | 2016-03-10 |
20160070979 | Method and Apparatus for Generating Sharp Image Based on Blurry Image - A method for generating a sharp image based on a blurry image is provided. The method includes acquiring pixel values of pixels in the blurry image, and a convolution kernel of the blurry image, determining a deconvolution kernel of the blurry image based on a preset image gradient operator and the convolution kernel, determining pixel values of pixels in the sharp image based on the deconvolution kernel and the pixel values of the pixels in the blurry image, and generating the sharp image based on the pixel values of the pixels in the sharp image. A deconvolution kernel in the embodiments of the present disclosure is determined based on a gradient operator and a convolution kernel, in other words, the deconvolution kernel introduces the gradient operator as a regularization constraint, which prevents noise from affecting an image recovery process, and improves the quality of a recovered sharp image. | 2016-03-10 |
20160070980 | METHOD AND DEVICE FOR CONTACTLESS BIOMETRICS IDENTIFICATION - The present invention provides a new method and a device for the contactless human identification using biometrics images. The present invention develops a robust feature extraction algorithm to recover three-dimensional (3D) shape information from biometrics images. Further, it provides significantly improved performance than what is possible from the state-of-art methods, adding practicality for real applications on mobile platform, smartphones, and also as add-on system for conventional fingerprint system. The present invention's unique advantages are based on its computational simplicity, efficient matching and requiring least storage. Experiments were conducted to confirm very high accuracy and reliability on a number of biometric modalities including iris, palmprint, and finger knuckle images. | 2016-03-10 |
20160070981 | OPERATING DEVICE, OPERATING SYSTEM, OPERATING METHOD, AND PROGRAM THEREFOR - A technique for efficiently calibrating a camera is provided. Reference laser scan data is obtained by scanning a building | 2016-03-10 |
20160070982 | SUPERPIXEL GENERATION WITH IMPROVED SPATIAL COHERENCY - A method for generating superpixels for an image comprising pixels and an apparatus configured to perform the method. A clustering stage clusters the pixels into initial clusters. A determination stage then selects spatially coherent parts of the clusters and determines unconnected fragments of the clusters. Pixels of these unconnected fragments are iteratively assigned to adjacent clusters by an assignment stage using a contour evolution process. | 2016-03-10 |
20160070983 | DENSITY SAMPLING MAP DATA - Sampling data is disclosed. A region of a map to be rendered is determined. It is determined that a first subregion is included in the region. Data points associated with subregions in a neighborhood of the first subregion are analyzed to determine a regional density of points. Data points associated with the first subregion are sampled based on the regional density of points. | 2016-03-10 |
20160070984 | DENSITY SAMPLING MAP LABELS - Sampling map labels is disclosed. A region of a map to be rendered is determined. It is determined that a first subregion is included in the region. Map labels associated with subregions in a neighborhood of the first subregion are analyzed to determine a regional density of map labels. Map labels associated with the first subregion are sampled based on the regional density of map labels. | 2016-03-10 |
20160070985 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND STORAGE MEDIUM STORING IMAGE PROCESSING PROGRAM THEREON - An image processing apparatus, an image processing method, and an image processing program are provided, in which a template can be set appropriately when a region unsuitable for a template is included in a range subjected to template matching. The image processing apparatus includes an input unit for acquiring an input image to be used for generating a template, an accepting unit for accepting designation of an unsuitable region that is a region inappropriate for a template in the input image, and a generating unit for setting a plurality of regions serving as candidates for a template in the input image and determining a candidate with fewer unsuitable regions in the region of the candidate, as a template, from among the candidates for a template. | 2016-03-10 |
20160070986 | DOMAIN ADAPTATION FOR IMAGE CLASSIFICATION WITH CLASS PRIORS - In camera-based object labeling, boost classifier ƒ | 2016-03-10 |
20160070987 | IDENTIFICATION APPARATUS AND METHOD FOR CONTROLLING IDENTIFICATION APPARATUS - An identification apparatus performs classification using a plurality of classifiers, and calculates the reliability of its classification result. A data obtaining unit obtains input data. A feature quantity obtaining unit obtains a feature quantity corresponding to the input data. A plurality of classifiers receive input of the feature quantity and perform classification based on the input feature quantity. An identification unit inputs the feature quantity into each of the classifiers, and generates a single second classification result based on a plurality of classification results obtained from the classifiers. A reliability generation unit generates a reliability of the second classification result based on variations across the plurality of classification results. | 2016-03-10 |
20160070988 | METHOD OF IMAGE ANALYSIS - A method to analyze an image and determine whether to output image data associated with an area of the image is provided. An object detection algorithm using training image data to detect an object based at least in part on a similarity of appearance of image data to data derived from the training image data is provided. Weakly detected objects are classified based on characteristics associated with the weakly detected object and may be added to the training image dataset for use in further training of the object detection algorithm. The object detection algorithm is trained with a revised dataset, the revised dataset being updated with data generated by the object detection algorithm. | 2016-03-10 |
20160070989 | System and method for pet face detection - Pet faces can be detected within an image using a cascaded adaboost classifier trained to identify pet faces with a high detection rate and a high false positive rate. The identified potential windows are further processed by a number of category aware cascade classifiers, which are each trained to identify pet faces of a particular category with a high detection rate and low false positive rate. The potential pet faces identified by the category aware classifiers may be processed to verify whether a pet's face is present or not. | 2016-03-10 |
20160070990 | CHOOSING IMAGE LABELS - Methods, systems and apparatus for choosing image labels. In one aspect, a method includes receiving data specifying a first image, receiving text labels for the first image, receiving search results in response to a web search performed using at least some of the text labels as queries, ranking the text labels, at least in part, based on a number of resources referenced by the received search results, wherein at least some of the resources each include an image matching the first image, and selecting an image label for the image from the ranked text labels, the image label being selected based on the ranking. | 2016-03-10 |
20160070991 | INTEGRATION OF OPTICAL AREA MONITORING WITH INDUSTRIAL MACHINE CONTROL - An industrial safety system is provided that integrates optical safety monitoring with machine control. The safety system includes an imaging sensor device supporting pixel array processing functions that allow time-of-flight (TOF) analysis to be performed on selected portions of the pixel array, while two-dimensional imaging analysis is performed on the remaining portions of the array, reducing processing load and response time relative to performing TOF analysis for all pixels of the array. The portion of the pixel array designated for TOF analysis can be pre-defined through configuration of the imaging sensor device, or can be dynamically selected based on object detection and classification by the two-dimensional imaging analysis. The imaging sensor device can also implement a number of safety and redundancy functions to achieve a high degree of safety integrity. | 2016-03-10 |
20160070992 | PRUNING AND LABEL SELECTION IN HIDDEN MARKOV MODEL-BASED OCR - Systems and techniques are provided for pruning a node from a possible nodes list for Hidden Markov Model with label transition node pruning. The node may be a label transition node. A frame may be at a predicted segmentation point in decoding input with the Hidden Markov Model. The node may be scored at the frame. The node may be pruned from the possible nodes list for the frame when score for the node is greater than the sum of a best score among nodes on the possible nodes list for the frame and a beam threshold minus a penalty term. A possible nodes list may be generated for a subsequent frame using label selection. A second node may be pruned from the possible nodes list for the subsequent frame with early pruning. | 2016-03-10 |
20160070993 | CARD STORAGE AND EJECTION MODULE - A card storage and ejection module may include a card storage cassette comprising a plurality of card storage parts each of which stores one card; a lifting mechanism structured to lift and lower the card storage cassette; and a support frame which supports the card storage cassette. The plurality of the card storage parts may be disposed so as to be overlapped with each other in an upper and lower direction. The lifting mechanism may include a parallel link mechanism having at least two link arms which connect the support frame with the card storage cassette and are disposed in an aligned state in a horizontal direction so as to be parallel to each other for lifting and lowering the card storage cassette in a state that a horizontal posture of the card storage cassette is maintained. | 2016-03-10 |
20160070994 | METHOD AND APPARATUS FOR GENERATING LABELS - A method including selecting a type of label to be printed, inputting information for the label to be printed, wherein the information includes label data defining content of an image to be printed, and parameter data defining at least one parameter of the label to be printed, saving the information for the label to be printed as a file in a memory, and providing the file with a file extension name indicative of the type of label. | 2016-03-10 |
20160070995 | METHOD FOR GENERATING A PROOF OF A PRINT JOB COMPRISING A DOCUMENT TO BE PRINTED WITH PARAMETERS AND SYSTEM THEREWITH - Method for generation of a proof job from a print job comprising one or more documents and zero or more job parameters, wherein the documents comprise one or more graphical elements, and a printer having setting and a printer state, the method comprising: determining for a graphical element that printing the graphical element will likely involve a print quality issue while taking into account the printer setting and/or the printer state; selecting graphical elements in the vicinity of the determined graphical element; composing a proof job comprising proofing graphical elements, and proof job parameters taken from the print job parameters or the printer settings, wherein the proofing graphical elements comprise at least part of the selected graphical elements, and/or a derived graphical element having an attribute that is equal to an attribute of the determined graphical element, wherein the attribute contributes to the occurrence of the print quality issue. | 2016-03-10 |
20160070996 | PRINTING APPARATUS, PAPER TRANSPORTING DEVICE, AND PRINTING MACHINE MAINTENANCE DEVICE - A printing apparatus includes: a first driving portion transporting a paper sheet; a printing portion being disposed on an upstream side of the first driving portion in a transporting direction of the transported paper sheet, including a plurality of aligned ejection ports ejecting liquid onto the transporting paper sheet to print an image on the paper sheet by the liquid; a drawing portion being disposed on an upstream side of the printing portion in the transporting direction, drawing the paper sheet of which a tip end is placed at a preset position, and feeding the paper sheet to a transporting path via the printing, portion and the first driving portion; and a guiding portion being interposed between the printing portion and the first driving portion in the transporting direction, and when feeding the paper sheet, freely reciprocating between a first position and a second position. | 2016-03-10 |
20160070997 | APPARATUS AND METHOD OF DETECTING DECOLORATION INK IMAGE - According to an embodiment, a detection apparatus for detecting a decoloration ink image includes an image reading unit, a decoloration unit, and a controller. The controller acquires image data using the image reading unit before decoloration that is the image data on the sheet before decoloration processing is executed by the decoloration unit. In addition, the controller determines whether or not there is a difference between the image data to be decolored and the decolored image data, thereby determining whether or not the decoloration ink is used in the sheet. | 2016-03-10 |
20160070998 | PRINTER CONTROL DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A printer control device includes: a rasterized data generation unit that generates rasterized data for a first printer; a setting information obtainment unit that obtains setting information that is related to drawing of a mark image for a second printer in the generated rasterized data and a mark drawing unit that draws the mark image for the second printer in the generated rasterized data on the basis of the setting information. | 2016-03-10 |
20160070999 | METHOD AND APPARATUS FOR PRODUCING A 2D BARCODE ENCODED PART BY MOLDING BEING IDENTIFIABLE USING A SMARTPHONE - A method for producing a part by molding with an embedded 2D barcode defined in the surface of the part and the embedded 2D barcode subsequently being readable using a light source and a camera, the method including providing a mold with an array of individual areas of optical anisotropic surface structures, where at least a number of the individual optical anisotropic structures forms a two-dimensional barcode or data matrix; making a replica of the mold, the replica including the array having the property that the directional reflection coefficient of the individual areas of optical anisotropic surface structures is depending on the illumination angle and detection angle in a way that is not rotational symmetric around the axis normal to the surface of the replica, the array being readable by illumination and detection of reflection intensity of the illumination source under a non-normal angle to the surface of the replica. | 2016-03-10 |
20160071000 | SYSTEM AND METHOD FOR QUALITY MANAGEMENT UTILIZING BARCODE INDICATORS - A quality management system for products including a multiplicity of bar coded quality indicators each operative to provide a machine-readable indication of exceedance of at least one threshold by at least one product quality affecting parameter, a barcode indicator reader operative to read the barcoded quality indicators and to provide output indications, the barcoded quality indicators being readable by the barcode indicator reader at all times after first becoming readable, including times prior to, during and immediately following exceedance of the at least one threshold by the at least one product quality affecting parameter, and a product type responsive indication interpreter operative to receive the output indications and to provide human sensible, product quality status outputs. | 2016-03-10 |
20160071001 | IC CARD, PORTABLE TERMINAL, AND PORTABLE ELECTRONIC APPARATUS - An IC card includes a communication unit and a controller. The communication unit can communicate with one communication destination by a plurality of interfaces including a first interface and a second interface. The controller processes a command received by the communication unit, and makes the communication unit transmit a response to the command. In a case where the first interface becomes unavailable after the communication unit receives the command by the first interface until the communication unit transmits the response to the command, the controller makes the communication unit transmit a response containing discontinuation information indicating that the transmission of the response to the command received by the first interface is discontinued by the second interface. | 2016-03-10 |
20160071002 | RFID TAG - A disclosed RFID tag includes: a base member; a semiconductor chip mounted on the base member; and an island-shaped reinforcing member covering the semiconductor chip and being configured to reinforce the base member. The reinforcing member has a side portion to which a recess is provided. The recess serves as an originating point of a fold line such that the fold line is formed away from the semiconductor chip when the reinforcing member is folded. | 2016-03-10 |
20160071003 | Multilayer Perceptron for Dual SIM Dual Active Interference Cancellation - The various embodiments include methods and apparatuses for cancelling nonlinear interference during concurrent communication of dual-technology wireless communication devices. Nonlinear interference may be estimated using a multilayer perceptron neural network by augmenting aggressor signal(s) by weight factors, executing a linear combination of the augmented aggressor signals, and executing a nonlinear sigmoid function for the combined aggressor signals at a hidden layer of multilayer perceptron neural network to produce a hidden layer output signal. Multiple hidden layers may repeat the process for the hidden layer output signals. At an output layer, hidden layer output signals may be augmented by weight factors, and the augmented hidden layer output signals may be linearly combined to produce an estimated nonlinear interference used to cancel the nonlinear interference of a victim signal. The weight factors may be trained based on a determination of an error of the estimated nonlinear interference. | 2016-03-10 |
20160071004 | METHOD AND SYSTEM FOR PREDICTIVE MAINTENANCE OF CONTROL VALVES - The embodiments herein provide a method and system for performing predictive maintenance of a control valve in an industrial plant. The method comprises monitoring a plurality of parameters using a plurality of sensors, and detecting one or more faults in the control valve using a decision making center. The plurality of the parameters are defined by DAMADICS system. The decision making module utilizes one or more neuro-fuzzy networks for detecting one or more faults in the control valves. The one or more neuro-fuzzy networks simulates each fault with a plurality of strengths. The decision making center detects the one or more faults by comparing outputs of simulated faults, and the actual output values provided by the plurality of sensors. | 2016-03-10 |
20160071005 | EVENT-DRIVEN TEMPORAL CONVOLUTION FOR ASYNCHRONOUS PULSE-MODULATED SAMPLED SIGNALS - A method of processing asynchronous event-driven input samples of a continuous time signal, includes calculating a convolutional output directly from the event-driven input samples. The convolutional output is based on an asynchronous pulse modulated (APM) encoding pulse. The method further includes interpolating output between events. | 2016-03-10 |