12th week of 2020 patent applcation highlights part 50 |
Patent application number | Title | Published |
20200089867 | SYSTEM AND METHOD FOR AUTHENTICATION - An authentication system and method are provided. The authentication method in accordance with one embodiment includes: storing a first authentication request message received from an authentication server, generating a new challenge using a previous challenge used in a previous authentication process when a network connection to the authentication server is not possible, generating a second and newer authentication request message by replacing a challenge included in the first authentication request message with the new challenge, generating an authentication assertion by performing biometric authentication using the second authentication request message and storing the generated authentication assertion. | 2020-03-19 |
20200089868 | System for Preventing Single Point of Failure in Accessing Encrypted Data - A method, system and computer-usable medium for preventing a single point of failure in accessing encrypted data. In certain embodiments passwords of multiple system administrators are encrypted with a master key to generate encrypted master keys respectively associated with each system administrator. In certain embodiments, the passwords of the multiple system administrators are also one-way hashed to generate multiple one-way hashed passwords respectively associated with each system administrator. In certain embodiments, the user identifiers and plain text passwords may be used to decrypt the master key based on the encrypted master keys and one-way hashed passwords. | 2020-03-19 |
20200089869 | DETERMINING A SECURITY STATE DESIGNATION FOR A COMPUTING DEVICE BASED ON A SOURCE OF SOFTWARE - For increased security, a source is determined for software to be installed on a computing device. In one approach, an application identifier is received from the computing device for an application to be installed. A source identifier of the application is determined. The application identifier and the source identifier are sent over a network to a server. A first state designation for the first application is received from the server. The first state designation represents a trusted state or an untrusted state. In response to receiving the first state designation, a second state designation is set. The second state designation is sent to the computing device. | 2020-03-19 |
20200089870 | INTRUSION DETECTION SYSTEMS - An intrusion detection system, comprising a monitor to receive messages from a target over a low-latency communication link comprising a controlled access memory structure logically positioned between the target and the monitor using point-to-point interconnects, the controlled access memory structure to receive a message from the target indicating that the target has entered a controlled mode of operation. | 2020-03-19 |
20200089871 | PROCESSOR EXTENSIONS TO PROTECT STACKS DURING RING TRANSITIONS - A processor implementing techniques for processor extensions to protect stacks during ring transitions is provided. In one embodiment, the processor includes a plurality of registers and a processor core, operatively coupled to the plurality of registers. The plurality of registers is used to store data used in privilege level transitions. Each register of the plurality of registers is associated with a privilege level. An indicator to change a first privilege level of a currently active application to a second privilege level is received. In view of the second privilege level, a shadow stack pointer (SSP) stored in a register of the plurality of registers is selected. The register is associated with the second privilege level. By using the SSP, a shadow stack for use by the processor at the second privilege level is identified. | 2020-03-19 |
20200089872 | ENCLAVE POOL SHARED KEY - In one example, an enclave pool is formed. The enclave pool may include a plurality of enclaves. Each enclave may have a private enclave key and a public enclave key. A shared enclave pool key may be generated from or otherwise based on the public enclave key of each enclave of the enclave pool. A first enclave may be allocated from the enclave pool to a first cryptlet. A payload of the first enclave is received. The payload of the first enclave may be signed with a first digital signature by the private enclave key of the first enclave. A payload of the second enclave may be received. The payload of the second enclave may be signed with a second digital signature by the private enclave key of the second enclave. The first digital signature and the second signature may be validated via the shared enclave pool key. | 2020-03-19 |
20200089873 | DYNAMIC CODE EXTRACTION-based AUTOMATIC ANTI-ANALYSIS EVASION AND CODE LOGIC ANALYSIS APPARATUS - A dynamic code extraction-based automatic anti-analysis evasion and code logic analysis apparatus, includes: a recognition module that extracts a DEX file and a SO file by unpacking an execution code of an application and recognizes an analysis avoidance technique by comparing a signature which is included in the extracted DEX file and SO file; a instrumentation module that extracts a code to be analyzed from a byte code configuring the DEX file and a native code configuring the SO file, compares the extracted code with the data stored in a database, and outputs a code excluding an anti-analysis technique as a log file; and a deobfuscation module that deobfuscates an obfuscated code which is included in the APK on the basis of the output log file and generates an APK file in which an obfuscation technique is released on the basis of the deobfuscated code. | 2020-03-19 |
20200089874 | LOCAL AND GLOBAL DECISION FUSION FOR CYBER-PHYSICAL SYSTEM ABNORMALITY DETECTION - Monitoring nodes may generate a series of current monitoring node values over time representing current operation of a cyber-physical system. A decision fusion computer platform may receive, from a local status determination module, an indication of whether each node has an initial local status of “normal”/“abnormal” and a local certainty score (with higher values of the local certainty score representing greater likelihood of abnormality). The computer platform may also receive, from a global status determination module, an indication of whether the system has an initial global status of “normal”/“abnormal” and a global certainty score. The computer platform may output, for each node, a fused local status of “normal” or “abnormal,” at least one fused local status being based on the initial global status. The decision fusion computer platform may also output a fused global status of “normal” or “abnormal” based on at least one initial local status. | 2020-03-19 |
20200089875 | OBSERVATION AND CLASSIFICATION OF DEVICE EVENTS - Systems and methods observe and classify device events. A model containing a set of features to be observed can be determined based on machine learning and training methods. A client application can issue a transaction request to an operating system service. A determination can be made whether the operating system service, a method associated with the transaction request, and the client application are currently being observed. In response to determining that the operating system service, a method associated with the transaction request, and the client application are being observed, a behavioral vector associated with the client application can be modified to indicate that the feature represented by the method is associated with the client application. The behavioral vector can be used to determine if the client application is malware. | 2020-03-19 |
20200089876 | PREVENTING RANSOMWARE FROM ENCRYPTING FILES ON A TARGET MACHINE - Techniques for preventing ransomware from encrypting files on a target machine are disclosed. In some embodiments, a system/process/computer program product for preventing ransomware from encrypting files on a target machine includes monitoring file system activities on a computing device; detecting an unauthorized activity associated with a honeypot file or honeypot folder; and performing an action based on a policy in response to the unauthorized activity associated with the honeypot file or honeypot folder. | 2020-03-19 |
20200089877 | MALICIOUS EVENT DETECTION DEVICE, MALICIOUS EVENT DETECTION METHOD, AND MALICIOUS EVENT DETECTION PROGRAM - A playback device reads a traffic file which is a dump file of traffic when malicious or benign traffic is generated and generates traffic based on the traffic file on a network having a security instrument that generates an event in accordance with the traffic. In addition, a determination device collects an event generated by the security instrument for the generated traffic and. on the basis of a feature extracted from the collected event, determines whether the event to be determined is for malicious traffic or benign traffic. | 2020-03-19 |
20200089878 | RADIAL DATA VISUALIZATION SYSTEM - A computer-implemented method for interactive visualization of a risk assessment for an entity on a graphical user interface of a computer system includes receiving, by the computer system, unstructured risk data associated with an entity, parsing, by the computer system, the unstructured risk data to produce risk information elements during a time period, combining, by the computer system, the risk information elements that comprise a single event, categorizing, by the computer system, each event in a category, generating, by a computer processor, a risk assessment for the entity from the categorized events for each time period, and displaying, on the graphical user interface, the risk assessments for each time period on a risk timeline that includes a timeline and a numerical risk scale. | 2020-03-19 |
20200089879 | DEACTIVATING EVASIVE MALWARE - A computer-implemented method, a computer program product, and a computer system. The computer system installs and configures a virtual imitating resource in the computer system, wherein the virtual imitating resource imitates a set of resources in the computer system. Installing and configuring the virtual imitating resource includes modifying respective values of an installed version of the virtual imitating resource for an environment of the computer system, determining whether the virtual imitating resource is a static imitating resource or a dynamic imitating resource, and comparing a call graph of the evasive malware with patterns of dynamic imitating resources on a database. The computer system returns a response from an appropriate element of the virtual imitating resource, in response to a call from the evasive malware to a real computing resource, return, by the computer system. | 2020-03-19 |
20200089880 | METHOD AND SYSTEM FOR DETECTING MALICIOUS PROGRAMS INTEGRATED INTO AN ELECTRONIC DOCUMENT - The present invention relates to the detection of malicious software in electronic documents and comprises: detecting an executable code in the electronic document provided to a client module; extracting information from the electronic document comprising the executable code and metadata of the electronic document; creating a binary vector associated with the electronic document; comparing, in a classifier module ( | 2020-03-19 |
20200089881 | NATIVELY MOUNTING STORAGE FOR INSPECTION AND SANDBOXING IN THE CLOUD - Systems and methods for continuously scanning and/or sandboxing files to protect users from accessing infected files by natively mounting public cloud file stores are provided. According to one embodiment, a determination is made by a network security device that is protecting the enterprise network regarding whether an untrusted file stored within a first repository of a public cloud file store, which is natively mounted on the network security device, is a clean file that is free of malicious content by applying one or more security checks to the untrusted file. When a result of the determination is affirmative, the network security device makes the clean file accessible to the users by copying the clean file from the first repository to a second repository that is accessible to the users. | 2020-03-19 |
20200089882 | SYSTEM AND METHOD FOR MACHINE BASED DETECTION OF A MALICIOUS EXECUTABLE FILE - A system for training a file classification model for classifying malicious software comprising at least one hardware processor adapted to: computing a plurality of datasets, each for one of a plurality of executable files, each file having a label, each dataset is computed by: receiving a respective file; detecting a plurality of binary functions in the respective file; translating each of the respective plurality of binary functions to produce a plurality of disassembled functions; clustering a plurality of operation-codes identified in the plurality of disassembled functions into a plurality of clusters according to respective operation-code; computing a plurality of statistical values of the plurality of disassembled functions and the plurality of clusters; and associating the plurality of statistical values with the file's label to produce a dataset; and training a file classification model using the plurality of datasets to compute at least one classification score of an input file. | 2020-03-19 |
20200089883 | DETECTING MALWARE BASED ON ADDRESS RANGES - Techniques are disclosed relating to detecting potential malware. A computer system may access process information identifying a set of software modules stored in a memory space allocated for a computer process. The computer system may determine address ranges that are respectively associated with a software module and define a segment in the memory space where program instructions are stored corresponding to that software module. The computer system may access thread information specifying, for each of a set of threads, a start address that identifies a location from which an initial program instruction is to be retrieved to begin execution of that thread. The computer system may make a determination that a thread is associated with a start address identifying a location outside of all address ranges, but within the memory space. Based on the determination, the computer system may classify the thread as being associated with malicious activity. | 2020-03-19 |
20200089884 | Method and apparatus for ransomware detection - Methods, apparatus and computer software products implement embodiments of the present invention that include storing a set of malware detection rules for a set of respective storage entities, each given rule indicating, when applied to a request to write to a given respective storage entity, whether the request originates from one or more malware applications that corrupt the storage entities. Upon receiving a new request to write data to a given storage entity, a given malware detection rule corresponding to the given storage entity is identified from the set of malware detection rules, and the identified malware detection rule is applied to the received new request so as to detect that the computer is infected with a given malware application. A responsive action can be initiated upon detecting the given malware application infection. | 2020-03-19 |
20200089885 | INDUSTRIAL SYSTEM EVENT DETECTION AND CORRESPONDING RESPONSE - Systems and methods of providing industrial system cybersecurity event detection and corresponding response are described. The systems and methods utilize various end point sensors already available in an industrial control system and an associated monitoring process to detect cybersecurity and other security threats based on data collected by the sensors. The cybersecurity monitoring process may be trained with sensor data patterns and behaviors for known threats to recognize potentially malicious activity. Such a process may also learn to recognize and be trained on new threats and may incorporate each new threat to stay current with evolving industrial threats. This allows an enterprise to utilize its existing industrial infrastructure to detect and act upon a variety of threats to an industrial system with little or no interference or interruption of existing industrial processes. | 2020-03-19 |
20200089886 | BIT-LEVEL DATA GENERATION AND ARTIFICIAL INTELLIGENCE TECHNIQUES AND ARCHITECTURES FOR DATA PROTECTION - Techniques and architectures for representing data with one or more n-dimensional representations and/or using one or more models to identify threats associated with the one or more n-dimensional representations are described herein. For example, the techniques and architectures may determine one or more coordinates for one or more points based on one or more sets of bits in the data and generate an n-dimensional representation for the data based on the one or more points. The techniques and architectures may evaluate the n-dimensional representation with one or more machine-trained models to detect a threat associated with the data, such as malware or another threat. | 2020-03-19 |
20200089887 | CROWDSOURCED, SELF-LEARNING SECURITY SYSTEM THROUGH SMART FEEDBACK LOOPS - Systems are provided for utilizing crowdsourcing and machine learning to improve computer system security processes associated with user risk profiles and sign-in profiles. Risk profiles of known users and logged sign-ins are confirmed by user input as either safe or compromised. This input is used as crowdsourced feedback to generate label data for training/refining machine learning algorithms used to generate corresponding risky profile reports. The risky profile reports are used to provide updated assessments and initial assessments of known users and logged sign-ins, as well as newly discovered users and new sign-in attempts, respectively. These assessments are further confirmed or modified to further update the machine learning and risky profile reports. | 2020-03-19 |
20200089888 | SECURE BOOT ORCHESTRATION DEVICE IN A VIRTUAL DESKTOP INFRASTRUCTURE - Methods, systems, and computer programs encoded on computer storage medium, for identifying a virtual desktop infrastructure (VDI) that includes a plurality of components; identifying a secure boot state of each of the components; aggregating the secure boot state of each of the components to define an aggregated secure boot state of the VDI; comparing the aggregated secure boot state of the VDI with a secure boot lookup table to identify a measure of trust of the VDI; identifying access control policies for the VDI for the identified measure of trust of the VDI; and enabling access to one or more resources based on the identified access control policies for the VDI. | 2020-03-19 |
20200089889 | MEMORY SYSTEM AND OPERATION METHOD THEREOF - A memory system includes: a memory device suitable for storing an encrypted first boot image including first firmware, an encrypted second boot image including second firmware, and a second authentication key for decrypting the encrypted second boot image, and a controller suitable for controlling the memory device and including a boot memory provided with a boot loader and a first authentication key for decrypting the encrypted first boot image, one or more first processing blocks each of which includes a first core, one or more second processing blocks each of which includes a second core, and a buffer memory. | 2020-03-19 |
20200089890 | DEVICE UNIT SUITABLE FOR OPERATION IN A PROTECTED AND/OR OPEN OPERATING STATE AND ASSOCIATED METHOD - Provided is a device unit, including a module, which can configure the device unit with an operating state from among different operating states during the start-up process and/or during ongoing operation of the device unit, wherein a first protected operating state of the different operating states is designed to allow the execution of at least one operating process which can be predefined and to optionally protect the operating process by means of defined cryptographic means, wherein at least one second operating state of the different operating states is designed to deactivate the first protected operating state and to allow at least one other changeable operating process and to optionally protect the operating process by means of specifiable cryptographic means. | 2020-03-19 |
20200089891 | SOFTWARE POLICY ENGINE IN VIRTUAL ENVIRONMENT - Methods, systems, and computer-readable mediums for detection of policy violations in an unmodified binary in a virtual environment include receiving the unmodified binary in an executable and linkable format (ELF). The unmodified binary is executed, via an emulator, within the virtual environment. The executing includes determining, by an instruction set emulator, a symbol that is referenced during the executing of the unmodified binary. The symbol, a current state, and a global state is sent to a software policy engine. The software policy engine determines an assertion associated with the symbol. The assertion verifies a policy is enforced. A previous state is updated based on the symbol. The assertion is executed based on the current state, the previous state, and the global state. The assertion is determined to have failed based on the executing the assertion. A warning is logged indicating the failed assertion. | 2020-03-19 |
20200089892 | POLICY-BASED USER DEVICE SECURITY CHECKS - A collaboration system manages a plurality of content objects that are shared by multiple users at corresponding user devices in corresponding computing environments. Policies that govern interactions over the plurality of content objects are established. A content object upload request from a first user belonging to a first enterprise is processed by the collaboration system and then the content object is shared with a second user of a second enterprise. Security characteristics pertaining to the second user, and/or the second enterprise, and/or the second user's devices are initially unknown or unverified. As such, upon receiving interaction events raised by a user device of the second user, a set of interaction attributes associated with the interaction events are gathered. One or more trust policies are applied to the interaction attributes to evaluate security conditions that correspond to the interaction events. A response is generated based on the evaluated security conditions. | 2020-03-19 |
20200089893 | Firmware Verification - A method, apparatus and product for firmware verification. The method comprises obtaining a list of libraries utilized by a firmware. The method comprises determining a set of vulnerabilities of the firmware by identifying vulnerabilities corresponding to each library of the list of libraries. The method further comprises determining a set of remedial actions for the set of vulnerabilities, the set of remedial actions including an offline remedial action and an online remedial action. The method further comprises determining for the set of vulnerabilities a combination of remedial actions based on estimated costs and estimated runtime overheads of the set of remedial actions. The method further comprises providing an output based on the combination of remedial actions. | 2020-03-19 |
20200089894 | DATA-PROCESSSING DEVICE AND DATA-PROTECTION METHOD THEREOF - A data-processing device is provided. The data-processing device includes: a flash memory, a computation unit, and a flash-memory controller. The flash-memory controller is electrically connected to the computation unit, and configured to control access to the flash memory. The flash-memory controller allocates a first execute-only memory (XOM) setting and a second XOM setting in a first memory bank and a second memory bank of the flash memory, respectively. The flash-memory controller allocates one or more XOM spaces in the flash memory according to the first XOM setting or the second XOM setting. | 2020-03-19 |
20200089895 | PROOF OF TICKET CONSENSUS PROCESSING ON A CONFIDENTIAL BLOCKCHAIN NETWORK - A transaction is communicated to each node in a permissioned blockchain that stores an access level block corresponding to a user that is associated with the transaction. At each node that stores the access level block corresponding to the user that is associated with the transaction, a real-time determination is made as to whether the user has requisite security credentials for the transaction. In response to generating a consensus among each node that stores the access level block corresponding to the user that is associated with the transaction, an approval for the transaction is provided. At each access level block in the permissioned blockchain that is associated with the transaction, cryptographic details of the transaction are stored as a nanoblock in the access level block. The nanoblock is an encrypted database. | 2020-03-19 |
20200089896 | ENCRYPTED LOG AGGREGATION - Disclosed are various examples for threat detection and security for edge devices in communication with Internet-of-Things (IoT) devices. In one example, a profile is associated with a virtual machine of a gateway device. The profile includes an expected behavior for the virtual machine. The virtual machine is executed by a hypervisor of the gateway device. An actual behavior for the virtual machine is determined. A remedial action is performed. The remedial action is based on an anomaly between the expected behavior and the actual behavior. | 2020-03-19 |
20200089897 | Community Governed End to End Encrypted Multi-Tenancy System to Perform Tactical and Permanent Database and Communication Operations - A multi-tenancy system to perform tactical and permanent database and communication operations to include but not limited secure handling of personally identifiable information (PII), data management, credentialing, RFID/barcoding, social networking, biometrics, registration, secure communications, geo-location and geo-fencing, reporting, data analytics, physical security information management, mobile applications and document sharing. The system includes a security platform meeting stringent data protection mandates including a firewall with extensive security protocols, encrypting communications between various components of the system (in transit) and information within each of the components (at rest). PII information is further encrypted and is only visible with appropriate decryption key. The system utilizes a low code/no code database platform to address increasing demand for rapid, iterative and collaborative application development. The system includes a collaborative database development with a community structure approach of “who” data is needed from rather than “what” data is needed. | 2020-03-19 |
20200089898 | SYSTEMS AND METHODS FOR INTEGRATING HTML BASED APPLICATION WITH EMBEDDED BROWSER - Embodiments described include systems and methods for using an HTML-based application integrated with an embedded browser on a client device, for trusted data transfer for instance. An HTML-based application within an embedded browser of a client device can provide access to a network application and its resources. The HTML-based application can establish a secure session for the network application between a server and the HTML-based application. The embedded browser can determine that the HTML-based application is a trusted application via application of one or more policies. With the secure session established and responsive to determining that the HTML-based application is a trusted application, the embedded browser may establish at least one virtual channel between the embedded browser and the HTML-based application. Using the at least one virtual channels, the embedded browser can transfer data between the secure session of the network application and the operating system (OS) of the client device. The operating system of the client device may include a file system, a clip board, and/or input and output (I/O) devices. | 2020-03-19 |
20200089899 | METHOD AND SYSTEM FOR BIOMETRIC TEMPLATE PROTECTION - Biometric templates (template) are used to store biometric data of one or more users. As biometric data of each user is unique and non-replaceable, template security is a major concern. This disclosure relates generally to template protection, and more particularly to a method and system for biometric template protection. The system generates a final perturbation value for data in the template, based on a first binary code (BC), a second binary code (BC′), feature vectors corresponding to data in the template, and an initial random perturbation. The final perturbation and the feature vectors are mapped to the first binary code. The first binary code represents the template. Every time the first binary code is compromised, the value of first binary code is updated, and the whole process is repeated to generate corresponding final perturbation and then the mapping is done. | 2020-03-19 |
20200089900 | SEGMENTING, REDACTING, AND TRANSPORTING SECURE DOCUMENTS IN A MIXED SECURITY ENVIRONMENT - Segmentation and classification of documents in a mixed security environment includes receiving a document including a plurality of subcomponents. A security classification level of each of the plurality of subcomponents is determined using a first classification model. The security classification level of each subcomponent includes one of a first classification level and a second classification level. A first subcomponent having the first classification level is routed to a first environment having a first security level. A second subcomponent having the second classification level is routed to a second environment having a second security level. A pointer for the second subcomponent is determined in which the pointer references a portion of the first subcomponent. | 2020-03-19 |
20200089901 | UNIFIED SYSTEM FOR AUTHENTICATION AND AUTHORIZATION - A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. Whether the client application is authorized to access the trusted application is determined in view of the request. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication. | 2020-03-19 |
20200089902 | SYSTEM AND METHOD OF ENCRYPTING FOLDER IN DEVICE - Provided are a system and method of encrypting a folder in a device. The device for controlling access to the folder includes a communication part configured to transmit, to a server, an encryption key generation request with respect to the folder, and receive, from the server, an encryption key associated with the folder that is generated in response to the encryption key generation request, wherein the encryption key generation request includes an identification of the folder and authentication data of a user who accesses the folder is an authorized user; and a controller configured to authenticate the user by using the encryption key. | 2020-03-19 |
20200089903 | DATA MASKING - Data masking is provided by, for at least one predetermined data item in data to be sent, applying a one-way function to that data item to produce a first value, producing a masked data item by encrypting the first value via a deterministic encryption scheme using a current encryption key for a current epoch, and replacing that data item by the masked data item. A data-provider computer sends the masked data to the data-user computer. On expiry of the current epoch, the data-provider computer generates a new encryption key for the encryption scheme in a new epoch, produces mask-update data, dependent on the current and new encryption keys, and sends the mask-update data to the data-user computer. The mask-update data permits updating, at the data-user computer, of masked data items produced with the current encryption key into masked data items produced with the new encryption key. | 2020-03-19 |
20200089904 | WEBPAGE CONTENT SELF-PROTECTION METHOD AND ASSOCIATED SERVER - A webpage content self-protection method includes: running a set of webpage elements of at least one webpage through a browser, wherein at least one portion of webpage elements within the set of webpage elements includes webpage contents of the aforementioned at least one webpage; monitoring a target webpage element within the set of webpage elements to determine whether any content variation event associated to the target webpage element occurs; when the content variation event occurs, storing previous data of the target webpage element, and generating a first password, wherein the first password is a one-time password; trying extracting a second password from the target webpage element, in order to perform password verification; and when failure of extracting the second password occurs or the first password and the second password are different from each other, recovering the target webpage element according to the previous data. An associated server is also provided. | 2020-03-19 |
20200089905 | FACILITATING ENTITY RESOLUTION VIA SECURE ENTITY RESOLUTION DATABASE - In some aspects, an entity-resolution computing system for entity resolution is provided. The entity-resolution computing system includes an entity resolution computing device configured as an interface between a client computing device and an encrypted identity data repository that contain resolved entity dataset. The entity resolution computing device is configured for servicing a resolution request from the client computing device by matching encrypted indexes generated from identity data objects stored in a client identity database to encrypted data objects stored in the encrypted identity data repository. The resolution computing device retrieves and transmits a common entity identifier associated with the encrypted data objects so that the client computing device can link the identity data objects stored in a client identity database via the common entity identifier. | 2020-03-19 |
20200089906 | PERFORMING SECURE QUERIES FROM A HIGHER SECURITY DOMAIN OF INFORMATION IN A LOWER SECURITY DOMAIN - A method generates, in a higher security domain (SD), public and secret keys using a first homomorphic encryption scheme (HES), passes the public key to a first shared security zone (SSZ) between the higher SD and a lower SD and through the first SSZ to a second entity in the lower SD, passes a plain text query from the higher SD to the first SSZ, encrypts the plain text query using a second HES, passes the encrypted plain text query to the second entity, performs an oblivious query to generate an encrypted result, and passes that from the lower SD to a second SSZ located between the higher and lower SDs, passes the secret key from the higher SD to the second SSZ, and decrypts the encrypted result using the secret key to generate a plain text result, and passes the plain text result to the higher SD. | 2020-03-19 |
20200089907 | SECURE DATA SHARING IN A MULTI-TENANT DATABASE SYSTEM - Systems, methods, and devices for implementing secure views for zero-copy data sharing in a multi-tenant database system are disclosed. :A method includes generating a share object in a first account comprising a share role. The method includes associating view privileges for the share object such that an underlying detail of the share object comprises a secure view definition. The method includes granting, to a second account, cross-account access rights to the share role or share object in the first account. The method includes receiving a request from the second account to access data or services of the first account and providing a response to the second account based on the data or services of the first account. The method is such that the underlying detail of the share object that comprises the secure view definition is hidden from the second account and visible to the first account. | 2020-03-19 |
20200089908 | System, Method, and Apparatus for Digitally Managing Personal Data - A computer implemented method for digitally managing personal data comprises a data storage system and the steps of receiving a variety of digital and photographic copies of personal data, prompting manual input of certain personal data, prompting categorization of the received personal data, and permitting access to such personal data upon receipt of authenticating credentials. The personal data may be stored on a blockchain, in the cloud, or locally on a person's mobile computing device, such as a smart phone. A corresponding computer program product and computer system are also disclosed. | 2020-03-19 |
20200089909 | PERSONAL INFORMATION PROTECTION DEVICE FOR VEHICLE AND PERSONAL INFORMATION PROTECTION MEHTOD THEREOF AND VEHICLE INCLUDING THE SAME - A personal information protection device includes a communication unit connected to control devices of a vehicle for communication, and a controller configured to determine whether to approve data communication of a control device which intends to perform data communication with an outside device. The controller extracts first unique data stored when previous last data communication is performed from a first control device, extracts second unique data stored when previous last data communication is performed from a second control device, determines approval of data communication of the first control device if the extracted pieces of data are consistent with each other, and updates the first unique data on the basis of second unique data acquired at a data communication start time. | 2020-03-19 |
20200089910 | MESSAGE PRIVACY - The disclosure provides a method for privately annotating a thread of a conversation between a participant and at least one other participant in a computer-based chat function. The disclosure also provides a method for hiding one or more messages in an existing thread of a chat conversation. | 2020-03-19 |
20200089911 | INFORMATION PROCESSING SYSTEM - An information processing system is provided that publicizes individual-related information so that the individual cannot be identified. The information processing system includes: a database for storing individual-related publicized information; an information publicizing server; and a person meta data generator. In the information processing system connected to the outside via a network, a database is configured to store each piece of individual related publicized information together with a flag showing whether or not the information is publicized so that the individual cannot be identified. The person meta data generator is configured to generate person meta data based on the publicized information to be publicized so that the individual cannot be identified. The information publicizing server is configured to separately publicize, among the publicized information stored in the database, the publicized information that is not shown to be publicized so that the individual cannot be identified and the generated person meta data. | 2020-03-19 |
20200089912 | TOKENIZATION AND ENCRYPTION OF SENSITIVE DATA - A method and system for anonymizing data are disclosed. The method and system include receiving, at the wrapper, a request to store data in a data source. The wrapper includes a dispatcher and at least one service. The dispatcher receives the communication and is data agnostic. The method and system also include providing the request from the dispatcher to the at least one service and anonymizing, at the service(s), the data to provide anonymized data. | 2020-03-19 |
20200089913 | DATA MANAGEMENT LEVEL DETERMINING METHOD - A non-transitory computer-readable recording medium stores therein a program for causing a computer to execute a process that includes: obtaining data in which a value is set to at least a part of one or a plurality of items from a device coupled to the computer via a network; determining a management level to be applied to the data among a plurality of management levels of different information protection measure strengths based on an item name of each of the one or the plurality of items of the data and presence or absence of a setting of a value to each of the one or the plurality of items; and storing the data in a memory in association with management information indicating the management level applied to the data. | 2020-03-19 |
20200089914 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, an information processing device includes a prior verifying unit, and an execution control unit. The prior verifying unit is configured to verify integrity of software registered in a whitelist at a timing which does not depend on an execution start of software and generate an execution permission list in which software which is successfully verified is registered as execution-permitted software. The execution control unit is configured to permit execution of the software if the software is registered in the execution permission list as the execution-permitted software when the execution start of the software is detected. | 2020-03-19 |
20200089915 | METHOD AND APPARATUS FOR TAMPER-PROOF STORAGE OF INFORMATION IN RESPECT OF OBJECT-RELATED MEASURES - Provided is a method and a system for the tamper-proof storage of information about object-related measures which are contained as transactions in transaction blocks that are interlinked in a transaction block chain of the object to which the measures relate, the transaction block chain being stored in an object data memory allocated to the object. | 2020-03-19 |
20200089916 | BINDING A HARDWARE SECURITY MODULE (HSM) TO PROTECTED SOFTWARE - Aspects of the present disclosure relate to binding a hardware security module to a software component. A secret can be cryptographically linked to the software component. The secret linked to the software component can be protected such that the secret is only accessible by a trusted firmware. The software component can then be installed in a secure software context. The protected secret can be transferred to the trusted firmware. A control block can be maintained by the trusted firmware in the secure software context, wherein the control block comprises the secret. The hardware security module can then be configured by the trusted firmware such that the hardware security module only responds to requests from a component having access to the secret. | 2020-03-19 |
20200089917 | PROVIDING DIFFERENTIAL PRIVACY IN AN UNTRUSTED ENVIRONMENT - A computer-implemented method according to one embodiment includes obtaining, at an untrusted environment, encrypted data from a storage location, initiating, within the untrusted environment, a performance of one or more secure computations on the encrypted data, and providing, within the untrusted environment, results of performing the one or more secure computations on the encrypted data. | 2020-03-19 |
20200089918 | SECURE WORLD ACCESS METHOD, APPARATUS, AND SYSTEM - A Secure World access method includes creating a first virtual machine (VM) in a Normal World, loading a plurality of programs in the Normal World to the first VM, where the plurality of programs include a kernel and at least one user program, the kernel runs in a first-level mode, the at least one user program runs in a second-level mode, and the first level is higher than the second level, when it is determined that a first user program in the at least one user program needs to access a Secure World, creating, in the Normal World, a second VM running in the first-level mode, and stripping the first user program from the first VM, and loading the first user program to the second VM such that the first user program accesses the Secure World using the second VM. | 2020-03-19 |
20200089919 | METHOD FOR EXECUTING A POLYMORPHIC MACHINE CODE OF A PREDETERMINED FUNCTION BY A MICROPROCESSOR - A method for executing a polymorphic machine code, wherein: for each branching address at which a base block of a flow of generated instructions starts, the microprocessor automatically adds, in the generated flow of instructions, a renewal instruction suitable, when it is executed, for triggering the renewal of an initialization vector of a module for decryption by flow with a specific value associated with this branching address, then a flow encryption module encrypts the flow of instructions as it is generated and, during this encryption, each base block is encrypted using a specific value associated with the branching address at which it starts. Only the instruction flow encrypted in this way is recorded in the main memory. During execution of the encrypted instruction flow, the added renewal instructions are executed as they are encountered. | 2020-03-19 |
20200089920 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING CONNECTION OF EXTERNAL DEVICE USING THE SAME - A method and electronic device are disclosed herein. The electronic device includes at least one connector, at least one switch electrically connected to the at least one connector, a sensor, a memory, and a processor electrically connected to the at least one connector, the at least one switch, the sensor, and the memory. The processor implements the method, including detecting insertion of an external device into the at least one connector based on an electrical signal input through the at least one connector, receiving biometric information using the sensor after detecting the insertion of the external device, and controlling a switch electrically connected to the connector to be connected to the connector into which the external device is inserted when the received biometric information matches biometric information stored in the memory. | 2020-03-19 |
20200089921 | TAMPER-RESISTANT COMPONENT NETWORKS - According to various aspects, systems and methods are provided for improving a computer system's resistance to tampering. A PUF may be one component of a system. Other components of the system may not have the same level of protection against tampering as the PUF. According to one aspect, tamper protection provided by the PUF may be extended to one or more other components of the system, thus creating a network of tamper-resistant components. The system may include a tamper detection circuit that receives signals from the component(s). The tamper detection circuit generates an output signal based on the received signals that indicates whether any of the components has been tampered with. The PUF may be configured to use the output signal to generate secret information. If the output signal indicates that one of the components has been tampered with, the PUF may prevent generation of the correct secret information. | 2020-03-19 |
20200089922 | COEXISTENCE OF WIRELESS TECHNOLOGIES ON AN ANTENNA - A device implementing a system for NFC communication with a second device includes an antenna and a processor configured to transmit a pulse signal for detection of another device within proximity of the device, and to detect, in conjunction with transmission of the pulse signal, that a first value of a measurement parameter of the antenna satisfies an initial detection factor. The processor is further configured, in response to the detection, to set a confirmation detection factor for the measurement parameter of the antenna based at least in part on the first value of the measurement parameter of the antenna, to transmit a confirmation pulse signal, and to initiate a second polling for reception of data from the other device when a second value of the measurement parameter of the antenna detected in conjunction with transmission of the confirmation pulse signal satisfies the confirmation detection factor. | 2020-03-19 |
20200089923 | ORE TAG ASSEMBLY AND SYSTEM AND METHOD RE SAME - An ore tag assembly including a tube subassembly having one or more tubes extending between first and second ends thereof and defining a cavity therein, and a RFID device located in the cavity. The ore tag assembly includes plugs positioned in the respective first and second ends of one of the tubes, to prevent ingress of liquids or other materials into the cavity. | 2020-03-19 |
20200089924 | READER, PROGRAM, AND UNIT - A reader includes a smartphone configured to read information from an image of a symbol included in a photographed image created by a camera module, and a unit attached to the smartphone. The unit includes a semiconductor laser to display a marker in a photographing range of the camera module. A user simply adjusts the orientation of the reader so that the marker overlaps on the symbol for reading processing of the smartphone, whereby information can be read from the symbol. | 2020-03-19 |
20200089925 | A TEMPERATURE-MEASURING SCAN HEAD AND ITS USE METHOD - This invention discloses a temperature-measuring scan head, comprising an enclosure, and its use method. There are supplementary lamp, image sensor and temperature sensor embedded on the end surface of the enclosure. The present scan head is as small as the existing scan heads on the market, but it has high-precision temperature sensor with built-in temperature-calibration module that promises temperature information collection. and accurate temperature measurement. Technically, the operator should use the scan head to scan the barcode of the objects or living things to be measured, and the scan head will read identity information and conduct temperature measurement. As such, temperature of the objects or living things corresponds to their respective identity, thereby guaranteeing the accuracy of data. | 2020-03-19 |
20200089926 | BURNING CONTROL SYSTEM AND METHOD - A burning control system includes a capturing unit, a storing unit, a controlling unit, a processing unit, and a displaying unit. The capturing unit acquires product barcode information and burned barcode information relating to printed circuit board assembly (PCBA). The storing unit can store a program file corresponding to the burned barcode information. The controlling unit obtains product barcode information and the burned barcode information and outputs the burned barcode information to the processing unit. The processing unit writes the program file to a storage chip of the PCBA board. The displaying unit can display one of several prompts for a user's information. A burning control method is also provided. | 2020-03-19 |
20200089927 | IMAGE CAPTURING APPARATUS - An image capturing apparatus includes a light guide plate, a first light transmissive layer, a second light transmissive layer, a third light transmissive layer, a light source and an image capturing device. The light guide plate has a first surface and a second surface opposite to the first surface. The first light transmissive layer is disposed on the first surface. The second light transmissive layer is disposed on the second surface, wherein the second light transmissive layer is overlapped with a light transfer region of the light guide plate and not overlapped with a light penetration region of the light guide plate. The third light transmissive layer is disposed on the second surface and overlapped with the light transfer region and the light penetration region. Refractive indices of the third light transmissive layer and the light guide plate are higher than those of the first and second light transmissive layers. | 2020-03-19 |
20200089928 | OPTICAL IMAGE CAPTURING UNIT, OPTICAL IMAGE CAPTURING SYSTEM AND ELECTRONIC DEVICE - Embodiments of the present application disclose an optical image capturing unit, an optical image capturing system, and an electronic device. The optical image capturing unit includes: a micro lens; a light shielding layer disposed under the micro lens, where the light shielding layer is provided with a window; and a photosensor disposed under the light shielding layer, where the micro lens is configured to converge an optical signal from above the micro lens to the window, and the optical signal is transmitted to the photosensor via the window. Technical solutions of embodiments of the present application could enhance performance of an optical image capturing product. | 2020-03-19 |
20200089929 | SYSTEM AND METHOD OF CAPTURING AND PRODUCING BIOMETRIC-MATCHING QUALITY FINGERPRINTS AND OTHER TYPES OF DACTYLOGRAPHIC IMAGES WITH A MOBILE DEVICE - An optical module includes a housing with a lighting mechanism, an aperture formed therein, and a window that frames a transparent surface adapted to contact a skin surface of a person, for example, a fingertip. The lighting mechanism provides light to illuminate the skin surface placed upon the transparent surface. A prism has a first side facing the lighting mechanism, a second side at the window, and a third side through which a dactylographic image exits the prism. One or more light reflecting surfaces are disposed within the housing to reflect the dactylographic image towards the housing aperture. The optical module is coupled to a mobile device having a camera, with the aperture of the housing aligning with a lens of the camera. The camera acquires the dactylographic image, and the mobile device adjusts this dactylographic image to produce a dactylographic image suitable for biometric matching. | 2020-03-19 |
20200089930 | SYSTEM FOR SIMPLIFIED GENERATION OF SYSTEMS FOR BROAD AREA GEOSPATIAL OBJECT DETECTION - A system for simplified generation of systems for analysis of satellite images to geolocate one or more objects of interest. A plurality of training images labeled for a study object or objects with irrelevant features loaded into a preexisting feature identification subsystem causes automated generation of models for the study object. This model is used to parameterize pre-engineered machine learning elements that are running a preprogrammed machine learning protocol. Training images with the study are used to train object recognition filters. This filter is used to identify the study object in unanalyzed images. The system reports results in a requestor's preferred format. | 2020-03-19 |
20200089931 | SYSTEMS AND METHODS FOR AUTONOMOUS PERPENDICULAR IMAGING OF TEST SQUARES - An assessment and reporting system may utilize one or more scanning techniques to provide useful assessments and/or reports for structures and other objects. The scanning techniques may be performed in sequence and optionally used to further fine-tune each subsequent scan. The system may receive or determine a pitch of a surface of a structure or otherwise orthogonally align an optical axis of a camera with respect to a planar surface. An imaging system may capture perpendicular images of sample regions that have a defined area-squared. | 2020-03-19 |
20200089932 | ON-LINE OIL AND FOREIGN MATTER DETECTION SYSTEM AND METHOD EMPLOYING HYPERSPECTRAL IMAGING - A method for removing foreign matter from an agricultural product stream of a manufacturing process. The method includes conveying a product stream past an inspection station; scanning a region of the agricultural product stream as it passes the inspection station using at least one light source of a single or different wavelengths; generating hyperspectral images from the scanned region; determining a spectral fingerprint for the agricultural product stream from the hyperspectral images; comparing the spectral fingerprint obtained in step (c) to a spectral fingerprint database containing a plurality of fingerprints using a computer processor to determine whether foreign matter is present and, if present, generating a signal in response thereto; and removing a portion of the conveyed product stream in response to the signal. A system for detecting foreign matter within an agricultural product stream is also provided. | 2020-03-19 |
20200089933 | METHOD OF ACCESSING A FINGERPRINT RECOGNITION PROCESS - In a method of accessing a fingerprint recognition process of an electronic device having a display region, it executes the steps of: sensing a contact area of a finger touching the display region; comparing the contact area with a predetermined area; and accessing the fingerprint recognition process when the contact area is greater than the predetermined area. | 2020-03-19 |
20200089934 | Identifying Video Content via Color-Based Fingerprint Matching - Systems and methods of identifying unknown video content are described. An example method may include receiving a first fingerprint and a second fingerprint. The first fingerprint may be a color-based fingerprint derived from colors in a portion of the unknown video content, and the second fingerprint may be at least partially based on a feature other than the colors of the unknown video content. A reference database of reference fingerprints may then be queried using one of the first fingerprint or the second fingerprint to obtain a candidate group of fingerprints. The candidate group of fingerprints may then be queried using the other of the first fingerprint and the second fingerprint to identify at least one query fingerprint. The unknown video content may then be identified using the at least one query fingerprint. | 2020-03-19 |
20200089935 | BODY INFORMATION ANALYSIS APPARATUS CAPABLE OF INDICATING SHADING-AREAS - A body information analysis apparatus capable of indicating shading-areas includes: an image capturing module ( | 2020-03-19 |
20200089936 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND IMAGE PROCESSING PROGRAM - An image processing apparatus, an image processing method, and an image processing program capable of selecting an image having common characteristics with a previously selected image, and a recording medium storing the program are provided. | 2020-03-19 |
20200089937 | FACE RECOGNITION METHOD AND ELECTRONIC DEVICE USING SAME - The application provides a face recognition method and an electronic device using the method. The method includes: obtaining face information from an image frame in a video stream; determining whether a first similarity between pre-registration information and the face information is higher than a first similarity threshold; determining that face recognition is successful if the first similarity is higher than the first similarity threshold, and updating real-time registration information with the face information; and determining that face recognition fails if the first similarity is lower than the first similarity threshold, and then determining whether a second similarity between the real-time registration information and the face information is higher than a second similarity threshold, where the second similarity threshold is higher than the first similarity threshold. | 2020-03-19 |
20200089938 | AUTOMATIC EMOTION RESPONSE DETECTION - A computer-implemented method, system, and computer program product for determining a valence indication, the computer-implemented method comprising: selecting a number of areas, a number of thresholds, a number of points, a number of emotion models, a number of expression models, a number of algorithms; using the number of areas, the number of thresholds, the number of points, the number of emotion models, the number of expression models, and the number of algorithms to form a valence formula; retrieving a video stream from a camera in the particular area in the location; using the video stream, calculating a valence indication for each of a number of individuals having images in the video stream; and wherein the valence indication represents a predominant emotion of a number of individuals at a point in time in the particular area. | 2020-03-19 |
20200089939 | CROWD DISRUPTOR MITIGATION - Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining one or more data feed that includes data of individuals within a crowd, wherein the crowd comprises a plurality of individuals gathered within an area; examining data of the one or more data feed to return behavior parameter values for respective individuals of the plurality of individuals; identifying, using values of the behavior parameter values, a disrupted group of a plurality of the individuals of the crowd, wherein the identifying is in dependence on a first one or more criterion being satisfied; detecting, using values of the behavior parameter values, a disruptor individual within the disrupted group, the detecting in dependence on a second one or more criterion being satisfied; and providing, by machine logic, one more disruptor mitigation output to mitigate disruptive behavior of the disruptor individual. | 2020-03-19 |
20200089940 | HUMAN BEHAVIOR UNDERSTANDING SYSTEM AND METHOD - A behavior understanding system and a behavior understanding method are provided. The behavior understanding system includes a sensor and a processor. The sensor senses a motion of a human body portion for a time period. A sequence of motion sensing data of the sensor is obtained. At least two comparing results respectively corresponding to at least two timepoints within the time period are generated according to the motion sensing data. The comparing result are generated through comparing the motion sensing data with base motion data. The base motion data is related to multiple base motions. A behavior information of the human body portion is determined according to the comparing results. The behavior information is related to a behavior formed by at least one of the base motions. Accordingly, the accuracy of behavior understanding can be improved, and the embodiments may predict the behavior quickly. | 2020-03-19 |
20200089941 | SYSTEMS AND METHODS FOR CAPTURING ELECTRONIC SIGNATURES - Methods and systems for generating electronic signatures are disclosed. In some embodiments, the method includes: storing pixel features of a signing device; capturing, via an imaging device, a plurality of image frames including the pixel features of the signing device; identifying in the plurality of image frames, by a processor, first pixels matching the stored pixel features of the signing device; generating, by the processor, a first image including the identified pixels; and connecting, by the processor, the identified pixels to form at least one line drawing representing a signature. | 2020-03-19 |
20200089942 | NEURAL NETWORK-BASED RECOGNITION OF TRADE WORKERS PRESENT ON INDUSTRIAL SITES - A computer-implemented method and system for neural network-based recognition of trade workers present on industrial sites is presented. In an embodiment, a method comprises: using a computing device, receiving a plurality of digital images depicting a particular worker; using the computing device, based on the plurality of digital images, determining a plurality of key-point sets of the digital images, each of the plurality of key-point sets comprising location information of key points identified within a depiction of the particular worker in a particular digital image; using the computing device, based on the plurality of key-point sets, determining a plurality of trade-specific activities that appear to be performed by the particular worker; using the computing device, based on the plurality of trade-specific activities, determining a plurality of trade probabilities, each trade probability among the trade probabilities indicating a likelihood that the particular worker belongs to a particular trade from among a plurality of different trades. | 2020-03-19 |
20200089943 | LIVING BODY SEARCH SYSTEM - A living body search system includes an unmanned moving body and a server connected to the unmanned moving body through a communication network. The unmanned moving body includes a camera, a moving means, and an image data processor. The image data processor is configured to detect a presence of a face of the living individual in an observation image taken by the camera, retrieve image data of the observation image, and transmit the retrieved image data to the server for facial recognition. The server includes a database configured to store individual identification information of the searched-for object, and an individual identifying means configured to compare the image data with the individual identification information to determine whether the living individual in the image data is the searched-for object. | 2020-03-19 |
20200089944 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a receiving unit and a controller. The receiving unit receives an extraction-area image indicating an extraction area. The extraction area includes a fill-in area in which a writer handwrites information. When an instruction to correct a recognition result for the information written in the fill-in area indicated by the extraction-area image is given, the controller causes a display unit to display a different extraction-area image similar to the extraction-area image. | 2020-03-19 |
20200089945 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes an acquiring unit, a confirming unit, and a controller. The acquiring unit acquires a text recognition result with respect to a first image showing a document and a certainty factor indicating a certainty of the text recognition result. The confirming unit confirms the text recognition result if the certainty factor is above or equal to a threshold value. The controller controls an output of a warning for the text recognition result with respect to the first image in a case where the text recognition result and a text recognition result with respect to a second image showing a relevant document related to the document do not match even when the certainty factor is above or equal to the threshold value. | 2020-03-19 |
20200089946 | SYSTEM AND METHOD FOR EXTRACTING TABULAR DATA FROM ELECTRONIC DOCUMENT - Disclosed is system for extracting tabular data from electronic document, system having data processing arrangement comprising: tabular data detection module that is operable to: (i) receive electronic document; (ii) determine location of tabular data within electronic document; and (iii) extract image of tabular data from electronic document; and tabular data extraction module that receives extracted image of tabular data from tabular data detection module, wherein tabular data extraction module is operable to: (i) convert received image of tabular data into greyscale image; (ii) extract grid structure from greyscale image; (iii) remove grid structure from greyscale image; (iv) determine position for placement of horizontal and vertical lines in greyscale image; (v) generate horizontal and vertical lines on greyscale image; (vi) perform optical character recognition of text associated with tabular data from received image; and (vii) extract tabular data by combining information of grid structure with text, to generate tabular data. | 2020-03-19 |
20200089947 | METHOD AND SYSTEM FOR ASSESSING SIMILARITY OF DOCUMENTS - Systems and methods for assessing similarity of documents are provided. Embodiments of the systems and methods include extracting a reference document text from a reference document, extracting an archived document text from an archived document, and quantifying the reference document and the archived document. The systems and methods may also include determining a document similarity value of the quantified reference document and the archived document. Determining the document similarity value includes calculating a set of vector similarity values for a set of combinations of a reference document text vector and an archived document text vector, and calculating the document similarity value, including a sum of the plurality of vector similarity values. | 2020-03-19 |
20200089948 | Waveform Signal Processing Method and Apparatus - A method includes obtaining a filtered waveform signal, marking the waveform signal as K signal line segments based on monotonicity, extracting line segment data of each signal line segment, and determining a line segment matching template of the waveform signal based on the line segment data of each signal line segment, where the line segment matching template includes M consecutive signal line segments, and M is an integer less than K. The method further includes matching each of the K signal line segments with the M signal line segments included in the line segment matching template, and determining a target wave group of the waveform signal based on a matching result of each signal line segment. The method further includes determining periodic signal data of the waveform signal based on line segment data of the target wave group. | 2020-03-19 |
20200089949 | MODEL UPDATE SUPPORT SYSTEM - According to one embodiment, a model update support system supports an update of a first model trained using a training data group. The training data group includes a plurality of labeled data and includes a plurality of labels respectively labeling the plurality of labeled data. The system includes a processor. The processor is configured to output first information or second information based on a classification certainty and a plurality of similarities. The classification certainty is calculated using the first model and indicates a sureness of a classification of first data. The plurality of similarities respectively indicates likenesses between the first data and the plurality of labeled data. The first information indicates that the training of the first model is insufficient. The second information indicates that one of the plurality of labels is inappropriate. | 2020-03-19 |
20200089950 | IRIS CAPTURE APPARATUS, IRIS CAPTURE METHOD, AND STORAGE MEDIUM - The present invention provides a technology that acquires a high resolution iris image more quickly than before. An iris capture apparatus according to one example embodiment of the present invention includes a rotatable movable mirror; a control unit that controls rotation of the movable mirror; a capture unit that captures different regions of a face of a user via the movable mirror and outputs a group of images every time the control unit rotates the movable mirror by a predetermined angle; and an iris image acquisition unit that acquires an image of an iris of the user from the group of images. | 2020-03-19 |
20200089951 | IRIS RECOGNITION SYSTEM, IRIS RECOGNITION METHOD, AND STORAGE MEDIUM - An example embodiment includes: a determination unit that, based on an image including an eye of a recognition subject, determines whether or not a colored contact lens is worn; and a processing unit that, when it is determined by the determination unit that the colored contact lens is worn, performs a process of improving accuracy of iris matching on the recognition subject. | 2020-03-19 |
20200089952 | MITIGATION OF AUGMENTED REALITY MARKUP BLINDNESS - Embodiments of the present invention disclose a method, computer program product, and system for avoiding augmented reality blindness during an augmented reality session via an augmented reality device used by a user. In the method, computer program product, and system a set of visual representations within the augmented reality session is detected. A set of labeling objects is applied to the set of visual representations within the augmented reality session. A subset of labeling objects and associated visual representation within a display view of the augmented reality device are recorded in a history table. A blindness quotient based on the history table of recorded labeled objects and associated visual representation is calculated. In response to the calculated blindness quotient exceeding a threshold, the set of labeling objects within the display view of the augmented reality device are modified. | 2020-03-19 |
20200089953 | AUGMENTED REALITY MAPPING SYSTEMS AND RELATED METHODS - The disclosed computer-implemented method may include receiving, from devices in an environment, real-time data associated with the environment. The method may also include determining, from the real-time data, current mapping and object data. The current mapping data may include coordinate data for the environment and the current object data may include both state data and relationship data for objects in the environment. The method may also include determining mapping deltas between the current mapping data and baseline map data and determining object deltas between the current object data and an event graph. The event graph may include prior state data and prior relationship data for objects. The method may also include updating the baseline map data and the event graph based on the deltas and sending updated baseline map data and event graph data to the devices. Various other methods, systems, and computer-readable media are also disclosed. | 2020-03-19 |
20200089954 | GENERATING SYNTHETIC DIGITAL ASSETS FOR A VIRTUAL SCENE INCLUDING A MODEL OF A REAL-WORLD OBJECT - The disclosure herein describes training a machine learning model to recognize a real-world object based on generated virtual scene variations associated with a model of the real-world object. A digitized three-dimensional (3D) model representing the real-world object is obtained and a virtual scene is built around the 3D model. A plurality of virtual scene variations is generated by varying one or more characteristics. Each virtual scene variation is generated to include a label identifying the 3D model in the virtual scene variation. A machine learning model may be trained based on the plurality of virtual scene variations. The use of generated digital assets to train the machine learning model greatly decreases the time and cost requirements of creating training assets and provides training quality benefits based on the quantity and quality of variations that may be generated, as well as the completeness of information included in each generated digital asset. | 2020-03-19 |
20200089955 | METHOD AND APPARATUS FOR PRELOAD DISPLAY OF OBJECT INFORMATION - A method and an apparatus for preload display of object information are provided. The method includes following steps: capturing an external object information on a side of the transparent display opposite to a user by using the first information capturing device; pre-identifying at least one object in the external object information and tracing the at least one object according to an identification result; capturing information of the user by using the second information capturing device for pre-identifying and tracing a pointing range of the user, and determining whether the traced objects appear within the pointing range; and preload displaying object information of the objects appearing within the pointing range on the transparent display. | 2020-03-19 |
20200089956 | TECHNOLOGIES FOR ACTING BASED ON OBJECT DETECTION - This disclosure is enables various technologies involving various actions based on an object detecting a defined area and the defined area detecting the object. | 2020-03-19 |
20200089957 | IMAGE GENERATING DEVICE - The present disclosure provides an image generating device configured to acquire an image captured by an imaging device to be installed in a water-surface movable body, generate a synthesized image where a graphic rendering a three-dimensional virtual reality object indicative of additional display information is synthesized with the captured image based on positional information, posture information, and the additional display information, estimate a position of the target object at a timing later than a timing at which the additional display information is acquired the latest, based on a speed of the target object included in the additional display information, or a speed of the target object estimated from the additional display information, and update the rendering of the virtual reality object of the target object in the synthesized image based on a result of the estimation. | 2020-03-19 |
20200089958 | IMAGE RECOGNITION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND READABLE STORAGE MEDIUM - Embodiments of the present disclosure provide an image recognition method and apparatus, an electronic device, and a readable storage medium. The method for image recognition includes the steps of obtaining a to-be-recognized feature of a to-be-recognized image, the to-be-recognized image comprising a target person; obtaining a preset body model feature of a body frame image, the body model feature comprising locations of joints in the body frame image; inputting the to-be-recognized feature and the body model feature to a pre-constructed joint prediction model, the joint prediction model being obtained through training a neural network by using minimum respective differences between real locations of joints in a sample image and predicted locations of the corresponding joints as a training objective; and obtaining predicted locations of joints of the target person in the to-be-recognized image based on the joint prediction model. | 2020-03-19 |
20200089959 | MONITORING SYSTEMS AND METHODS - A processor may process a video feed of a monitored area. The processing may include attempting to decrypt the video feed using a temporally-varying digital rights management key in a state corresponding to a time at which the encrypted video feed was received and encountering a decryption error during the attempting. The processing may include comparing the video feed with an output feed from a secondary sensor to determine that at least one object is indicated in the monitored area by the output feed and not visible in the video feed. The processor may indicate a problem with the video feed. For example, the processor may indicate that the encrypted video feed has been altered prior to the receiving of the encrypted video feed due to the decryption error and/or that the video camera is malfunctioning due to the at least one object being not visible in the video feed. | 2020-03-19 |
20200089960 | MOVIE CONTENT RATING - An approach is provided in which an information handling system trains a classifier using rated content segments that each has a first content type rating corresponding to a content type. Then, the information handling system uses the trained classifier to classify unrated content segments corresponding to an unrated content and generates second content type ratings for each of unrated content segments accordingly that identify a corresponding content type. In turn, the information handling system generates an overall content rating of the unrated content based on a combination of the second content type ratings. | 2020-03-19 |
20200089961 | METHOD FOR EVALUATING SOCIAL INTELLIGENCE AND APPARATUS USING THE SAME - Disclosed herein are a method for evaluating social intelligence and an apparatus for the same. The method includes creating multiple segmented video clips by segmenting, based on behavior recognition, an observation video sequence that captures the social interaction behavior of the target to be evaluated; and evaluating the social intelligence of the target by calculating an evaluation score based on the similarities between ground truth, created based on social interaction analysis, and the multiple segmented video clips. | 2020-03-19 |
20200089962 | CHARACTER RECOGNITION - Examples of a character recognition system are provided. In an example, the system may receive an object detection requirement pertaining to a video clip. The system may identify a visual media feature map from visual media data to process the object detection requirement. The system may implement an artificial intelligence component to segment the visual media feature map into a plurality of regions, and identify a plurality of image proposals therein. The system may implement a first cognitive learning operation to allocate a human face identity for a human face and an object name for an object present in the video clip. The system may determine a face identity model for the human face present in the plurality of image proposals and generate a tagged face identity model. The system may implement a second cognitive learning operation to assemble the plurality of frames with an appurtenant tagged face identity model. | 2020-03-19 |
20200089963 | ELECTRONIC APPARATUS, CONTROL METHOD THEREOF AND ELETRONIC SYSTEM - An electronic apparatus is provided. The electronic apparatus includes a communicator; and a processor configured to: receive multimedia data from an external apparatus through the communicator; identify a plurality of objects in a first frame among a plurality of frames included in the multimedia data; obtain content information corresponding to the plurality of objects in the first frame; obtain a first fingerprint based on the first frame; and control the communicator to transmit the content information and the first fingerprint to a server. | 2020-03-19 |
20200089964 | System and Method for Searching Video - A system and method for searching a video stream collected by a camera in a video surveillance system for an object's placement or displacement is disclosed. The searching includes an interactive question/answer approach that allows for a video snippet including the object's placement or displacement to be found quickly without the need for complicated video analytics. During the search, frames from algorithmically selected points in the video stream are presented to a user for review. The user reviews each frame and indicates if he/she sees the object. Based on the user's response the searching algorithmically reduces the portion video stream that is searched until a snippet of a video is found that includes the object's placement or displacement. | 2020-03-19 |
20200089965 | Predictive Security Camera System - A predictive security camera system includes a camera, an object recognizer for detecting an object in a current frame of the camera, a convolutional encoder for generating a feature representation of the current frame, a primary clustering module for clustering the feature representation in primary clusters of the detected object, a vector generation module for generating an information vector that includes a set of variables such as primary class, sub-class, and one or more external factors associated with the feature representation, an anomaly clustering module for clustering each information vector into one or more secondary clusters wherein each variable in the information vector is a clustering dimension, and a predictive analysis module for receiving at least one variable of an information vector as an input, and predicting at least one another variable of the information vector based on one or more previous secondary clusters formed by the anomaly clustering module. | 2020-03-19 |
20200089966 | RECOGNIZING FINE-GRAINED OBJECTS IN SURVEILLANCE CAMERA IMAGES - Systems and methods for recognizing fine-grained objects are provided. The system divides unlabeled training data from a target domain into two or more target subdomains using an attribute annotation. The system ranks the target subdomains based on a similarity to the source domain. The system applies multiple domain discriminators between each of the target subdomains and a mixture of the source domain and preceding target domains. The system recognizes, using the multiple domain discriminators for the target domain, fine-grained objects. | 2020-03-19 |