16th week of 2016 patent applcation highlights part 46 |
Patent application number | Title | Published |
20160110528 | Methods and Systems for Using Behavioral Analysis Towards Efficient Continuous Authentication - A computing device processor may be configured with processor-executable instructions to implement methods of using behavioral analysis and machine learning techniques to identify, prevent, correct, and/or otherwise respond to malicious or performance-degrading behaviors of the computing device. As part of these operations, the processor may perform multifactor authentication operations that include determining one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value, using the one or more of these values to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device, and authenticating the user by evaluating the determined number of authentication factors. | 2016-04-21 |
20160110529 | METHODS, APPARATUS AND SYSTEMS FOR SECURELY AUTHENTICATING A PERSON DEPENDING ON CONTEXT - Methods, apparatus and systems are described for securely authenticating a person at an appropriate level of security depending on context without having to enter any passwords. In some embodiments, a meta-wallet processor receives a request for user authentication from a user device which includes a meta-wallet identifier, an entity identifier, a context identifier and user biometric data and/or user personal assets data, and/or user social media data. The meta-wallet processor determines that the user is registered meta-wallet user and is engaging in a predetermined type of activity, selects an authentication protocol, determines that the user biometric data and/or user personal assets data, and/or user social media data matches stored personal meta-wallet data and satisfies the authentication protocol, and then transmits a user authentication confirmation message to one of the user device and an entity computer associated with the entity identifier. | 2016-04-21 |
20160110530 | METHOD AND A SYSTEM FOR AUTHENTICATING A USER IN TERMS OF A CLOUD BASED ACCESS CONTROL SYSTEM - Aspects extend to methods and systems for authenticating a user in terms of a cloud based access control system. | 2016-04-21 |
20160110531 | INFORMATION PROCESSING APPARATUS, TERMINAL APPARATUS AND INFORMATION PROCESSING METHOD - An information processing apparatus includes an information storage unit configured to store characteristic information representing a characteristic of authentication image data by being associated with user identifying information and a control unit. The control unit executes acquiring image data, the user identifying information and position indicating information from a requester making a request for a process with respect to the image data, extracting image data in position indicated by the acquired position indicating information, and determining whether the requester is identical with a self user identified by the acquired user identifying information by comparing characteristic information representing the characteristic of the extracted image data with the characteristic information stored in the information storage unit and executing the process requested by the requester with respect to the acquired image data when the requester is determined to be the self user identified by the acquired user identifying information. | 2016-04-21 |
20160110532 | User Authorization And Presence Detection In Isolation From Interference From And Control By Host Central Processing Unit And Operating System - An embodiment may include circuitry to be included, at least in part, in a host. The host may include at least one host central processing unit (CPU) to execute, at least in part, at least one host operating system (OS). The circuitry may perform, at least in part, at least one operation in isolation both from interference from and control by the at least one host CPU and the at least one host OS. The at least one operation may include user authorization determination and user presence determination. The authorization determination may be in response, at least in part, to indication of physical presence of at least one user in proximity to the host. The user presence determination may determine, at least in part, whether, after the indication has been provided, the physical presence of the at least one user in the proximity to the host has ceased. | 2016-04-21 |
20160110533 | ENROLLMENT KIOSK INCLUDING BIOMETRIC ENROLLMENT AND VERIFICATION, FACE RECOGNITION AND FINGERPRINT MATCHING SYSTEMS - An enrollment kiosk for collecting personal data includes a slidable main module and at least one modifiable section removably coupled to the main module. The main module includes a processor and one or more biometric sensing devices coupled to the processor. The one or more biometric sensing devices include a right fingerprint sensor coupled to the processor and a left fingerprint sensor coupled to the processor. The right fingerprint sensor is positioned a predetermined distance apart from the left fingerprint sensor. The at least one modifiable section includes at least one first input device coupled to the processor. The kiosk also includes a scene camera configured to record a video of an area surrounding the enrollment kiosk and to transmit the video to a remote operator being located remotely from the enrollment kiosk | 2016-04-21 |
20160110534 | ENABLING ACCESS TO DATA - Systems, methods and apparatus for enabling access to secure data. A first module is arranged to generate a limited use passcode and make the passcode available to a user. A second module and a third module are arranged to communicate whereby to enable detection of the third module being in proximity to the second module. A fourth module is arranged to receive a passcode via user input. The apparatus is arranged to enable access to secure data in dependence on the fourth module receiving a valid passcode generated by the first module and the third module being in proximity to the second module. | 2016-04-21 |
20160110535 | Methods and Apparatus for Setting the Address of a Module Using a Voltage - A method of operating a module is disclosed. The method includes determining if a voltage between a power connection and a ground connection exceeds a predetermined threshold and if so determined then setting a module communication address to a first address, responding to a first serial communication received via the serial communication connection addressed to the module communication address, and not responding to a second serial communication received via the serial communication connection addressed to a different address than the module communication address. Other methods and devices are disclosed. | 2016-04-21 |
20160110536 | ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES - Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets). | 2016-04-21 |
20160110537 | RELEVANCY IMPROVEMENT THROUGH TARGETING OF INFORMATION BASED ON DATA GATHERED FROM A NETWORKED DEVICE ASSOCIATED WITH A SECURITY SANDBOX OF A CLIENT DEVICE - A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device are disclosed. In one embodiment, a system may comprise a networked device, a relevancy-matching server, and a client device. The networked device may be configured to generate a preliminary data and/or a primary data associated with a user and automatically announce a sandbox-reachable service of the networked device to a discovery module. The relevancy-matching server may be configured to match a targeted data with the primary data based on a relevancy factor associated with the user. The client device may be configured to automatically process an identification data of the networked device and/or the sandbox-reachable service of the networked device from the discovery module and to automatically associate with the networked device based on the identification data. | 2016-04-21 |
20160110538 | MULTI- PROFILE MOBILE DEVICE INTERFACE FOR SAME USER - A multi-environment computer device configured for providing a work environment type and a personal environment type via a user interface for a device user, each of the environments having the same persona, the device having: a computer processor coupled to a memory, wherein the computer processor is programmed to coordinate interaction between the device user and the pair of environments presented on the user interface by: configuring the user interface to present the personal environment for facilitating interaction between the device user and personal applications associated with the personal environment, the personal environment having an assigned user name of said persona and a personal password, the personal environment presented using a set of unique personal environment user interface design elements for distinguishing the personal environment from the work environment via the user interface; and responding to a switch environment command generated by a switch mechanism invoked by the device user via the user interface to replace the personal environment with the work environment on the user interface. | 2016-04-21 |
20160110539 | MONITORING ACCESS TO A LOCATION - Devices, methods, and systems for monitoring access to a location are described herein. One or more method embodiments include determining data associated with an access event associated with a location, determining whether the access event is an anomalous access event using the data associated with the access event and a statistical model of data associated with a number of non-anomalous access events associated with the location, and assessing, if the access event is determined to be an anomalous access event, the anomalous access event. In various embodiments, assessing the anomalous access event includes at least one of determining an anomaly type associated with the anomalous access event, determining an anomaly classification confidence associated with the anomalous access event, determining an anomaly severity associated with the anomalous access event, and determining a reliability associated with the statistical model. | 2016-04-21 |
20160110540 | INTERFACE BETWEEN A DEVICE AND A SECURE PROCESSING ENVIRONMENT - Embodiments of an invention for an interface between a device and a secure processing environment are disclosed. In one embodiment, a system includes a processor, a device, and an interface plug-in. The processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to create a secure processing environment. The execution unit is to execute an application in the secure processing environment. The device is to execute a workload for the application. The interface plug-in is to provide an interface for the device to enter the secure processing environment to execute the workload. | 2016-04-21 |
20160110541 | MULTIDIMENSIONAL SANDBOXING FOR FINANCIAL PLANNING - A computer-implemented method can include creating a sandbox responsive to a sandbox creation request from a user, wherein the sandbox represents an alternate version of a base version and is accessible only by the user. The method can also include visually presenting to the user information pertaining to the sandbox and information pertaining to the base version, saving changes to the information pertaining to the sandbox, and publishing the sandbox responsive to a publish request from the user. | 2016-04-21 |
20160110542 | Attack Protection For Valid Gadget Control Transfers - In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a second bound value for the stack; a checker logic to determine, prior to an exit point at a conclusion of a function to be executed on the processor, whether a value of a stack pointer is within a range between the first bound value and the second bound value; and a logic to prevent a return to a caller of the function if the stack pointer value is not within the range. Other embodiments are described and claimed. | 2016-04-21 |
20160110543 | APPARATUS AND METHOD FOR DETECTING MALICIOUS APPLICATION BASED ON VISUALIZATION SIMILARITY - The present invention provides a malicious application detecting apparatus based on a visualization similarity, including: a first storing unit which classifies malicious applications for every group in accordance with characteristics and stores the malicious applications; a second storing unit which stores a target application; an image generating unit which analyzes the malicious applications to generate first visualization images and analyzes the target application to generate a second visualization image; a representative image selecting unit which selects representative images for every group using a similarity of the first visualization images; and a determining unit which compares the representative images with the second visualization image to determine whether the target application is a malicious application. | 2016-04-21 |
20160110544 | DISABLING AND INITIATING NODES BASED ON SECURITY ISSUE - Example embodiments disclosed herein relate to disabling and initiating nodes based on a security issue. Multiple nodes of a cluster are monitored. It is determined that one of the nodes includes a security issue. The node is disabled. Another node is initiated to replace the disabled node. | 2016-04-21 |
20160110545 | CODE POINTER AUTHENTICATION FOR HARDWARE FLOW CONTROL - Techniques for enforcing flow control of a software program in a processor are provided. An example method according to these techniques includes analyzing program code of the software program to identify a code pointer in the program code, generating an authentication tag based on the code pointer, and modifying the code pointer in the program code with the authentication tag to generate a tagged code pointer. | 2016-04-21 |
20160110546 | COMPUTING DEVICE BOOT SOFTWARE AUTHENTICATION - Various embodiments are generally directed to authenticating a chain of components of boot software of a computing device. An apparatus comprises a processor circuit and storage storing an initial boot software component comprising instructions operative on the processor circuit to select a first set of boot software components of multiple sets of boot software components, each set of boot software components defines a pathway that branches from the initial boot software component and that rejoins at a latter boot software component; authenticate a first boot software component of the first set of boot software components; and execute a sequence of instructions of the first boot software component to authenticate a second boot software component of the first set of boot software components to form a chain of authentication through a first pathway defined by the first set of boot software components. Other embodiments are described and claimed herein. | 2016-04-21 |
20160110547 | SYSTEMS AND METHODS FOR ANALYSIS OF CROSS-SITE SCRIPTING VULNERABILITIES - A system for detecting XSS vulnerabilities includes determining the context in which a probe supplied as an input to a webpage or an application exists in a script associated with the webpage or application. A payload is generated based on, at least in part, the context such that during execution of the script, an executable code fragment in the payload can escape out of the context in which the probe exists and into a the global context of the script. The payload may include additional characters that prevent the payload from causing errors in the execution of the script. | 2016-04-21 |
20160110548 | DETERMINING AN ATTACK SURFACE OF SOFTWARE - A method of determining an attack surface of software may include generating a platform for testing at least one deployment of software code, identifying protocols that are used by the at least one deployment, mapping the protocols to at least one port in the at least one deployment, and computing a metric comprising parameters for the at least one deployment. | 2016-04-21 |
20160110549 | ANALYZING TARGET SOFTWARE FOR SECURITY VULNERABILITIES - A method of analyzing target software for security vulnerabilities comprises, with a processor, scanning a codebase of a target software using a static analysis scan to identify a number of security flaws, and calculating a number of code metrics of the codebase of the target software for a number of iterations over a period of time to obtain a number of historical scans. | 2016-04-21 |
20160110550 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, AND SETTING DETERMINATION METHOD - An information processing system determines security setting of an information processing device. The information processing system includes: an evaluating unit that evaluates an incident occurring in an environment that includes the information processing device; a determining unit that determines a setting level, of a plurality of levels, for the security setting corresponding to the incident of the information processing device based on an evaluation result of the incident by the evaluating unit; and a changing unit that changes the security setting corresponding to the incident of the information processing device to security setting corresponding to the setting level determined by the determining unit. | 2016-04-21 |
20160110551 | Computer System Anomaly Detection Using Human Responses to Ambient Representations of Hidden Computing System and Process Metadata - A system and method involve measuring one or more hidden states internal to a computing system related only to a user's active task with the computing system, using one or more deterministic mapping functions to directly map, without interpretation of the hidden states as being benign or malicious, the measurements to a representational output, presenting the representational output in real-time and peripheral to the user's active task with the computing system without label information pertaining to the hidden states, determining the user's behavioral responses and/or physiological responses to the presented representational output, altering one or more display characteristics of the presented representational output based upon one or more behavioral responses and physiological responses, and/or inputting the user's response into a machine learning algorithm configured to detect an anomaly within the computing system using the user's behavioral and physiological responses and/or computing system measurements. | 2016-04-21 |
20160110552 | Method and Apparatus for Transmission of Visually Encoded Data - A method for secured data transmission of visually encoded data from a mobile end device to a processing unit includes supplying on a security element of the end device a datum to be transmitted. The datum is encrypted in session-specific fashion through the security element. From the encrypted datum visually encoded image data are generated in the form of a bar code or a sequence of bar codes. The visually encoded image data are displayed through the end device. | 2016-04-21 |
20160110553 | POLICY ACCESS CONTROL LISTS ATTACHED TO RESOURCES - Methods, storage systems and computer program products implement embodiments of the present invention that include defining, for an entity, a policy access control list including one or more access rules, each of the access rules including one or more user conditions and one or more entity conditions. Upon receiving a request from a user to access a given entity, one or more user attributes associated with the user and one or more entity attributes associated with the given entity are identified. For each of the access rules, the one or more user conditions are applied to the one or more user attributes, the one or more entity conditions are applied to the one or more entity attributes. Access to the given content entity is granted to the user upon determining that a minimum threshold of the one or more user conditions and the one or more entity conditions are met. | 2016-04-21 |
20160110554 | TECHNOLOGIES FOR SECURE INPUT AND DISPLAY OF VIRTUAL TOUCH USER INTERFACES - Technologies for secure input and display of a virtual touch user interface include a computing device having a security monitor that may protect memory regions from being accessed by untrusted code. The security monitor may use hardware virtualization features such as extended page tables or directed I/O to protect the memory regions. A protected touch filter driver intercepts requests for touch input and allocates a transfer buffer. The transfer buffer is protected by the security monitor. A touch screen controller may write touch input data into the protected transfer buffer. The touch input data may be shared by the touch filter driver with authorized applications through a protected communication channel. A graphical virtual user interface may be generated by trusted code and rendered into a hardware overlay surface. The user interface may include a virtual keyboard. The security monitor may protect the overlay surface. Other embodiments are described and claimed. | 2016-04-21 |
20160110555 | RESOURCE SHARING APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF - A resource sharing apparatus and a resource sharing method thereof are provided. The resource sharing apparatus runs a federated resource sharing program to execute a resource sharing method. The resource sharing apparatus can share a selected resource with a remote resource sharing apparatus via a share link of the selected resource, and the remote resource sharing apparatus can create an access point to access the selected resource stored in the resource sharing apparatus according to the share link. | 2016-04-21 |
20160110556 | System, apparatus and method for License Key permutation - A system and method of dynamically altering the encoding, structure or other attribute of a cryptographic key, typically a license activation key, to render useless keys that have been created by illegal key generation “cracks”. An encoding/decoding engine provides a plurality of key obfuscation algorithms that may alter the structure, encoding or any other attribute of a given key. A changeable combination code is supplied to the encoding/decoding engine that specifies a subset of the algorithms to apply during the encoding or decoding phase. The encoding engine is used during key generation and the decoding engine used during key usage. The same combination code must be used during decoding as was used during encoding to recover the original key or a valid key will not be recovered. Thus, a system can be rapidly re-keyed by selecting a new combination of encoding/decoding algorithms. The selection of algorithms comprises a combination code. The new combination code will result in keys that are incompatible with any existing illegal key generators. | 2016-04-21 |
20160110557 | BASE MODULE FOR ELECTRONIC DEVICE - A base module for an electronic device connects an application module in the electronic device to a network. The base module includes a memory unit which stores a program which defines a function of the electronic device. The base module also includes a modification device for modifying settings on the program in accordance with user input via a switch. A specified electric switch state for the base module is required in order to modify at least some of the settings. | 2016-04-21 |
20160110558 | CLIENT IDENTIFYING DATA (CID) TARGET-STATE-COMPLIANT COMPUTER-EXECUTABLE APPLICATIONS - An approach for facilitating client identifying data (CID) target-state-compliant computer-executable applications is disclosed. In some implementations, a CID questionnaire that includes one or more requests for information relating to CID exposure associated with an application may be provided to a first user. One or more inputs to the one or more information requests may be received from the first user. Current state information associated with the application may be determined based on the one or more inputs and one or more CID-related criteria. The current state information may include risk information indicating current CID exposure associated with the application. Target state information associated with the application may be received. Remediation information associated with the application may be provided to one or more users. The remediation information may be determined based on the current statement information and the target statement information. | 2016-04-21 |
20160110559 | IDENTIFYING AND BLOCKING PROHIBITED CONTENT ITEMS IN A CONTENT MANAGEMENT SYSTEM - To identify whether a content item is prohibited, a content management system can generate a content item fingerprint for the content item and then compare the generated content item fingerprint to a blacklist of content item fingerprints for prohibited content items. If the generated content item fingerprint matches any of the content item fingerprints included in the blacklist, the content management system can determine that the content item is prohibited. The content management system can deny requests to share prohibited content items and/or requests to assign prohibited content items to a user account on the content management system. The content management system can generate the content item fingerprint using the content item as input in a fingerprinting algorithm that was used to generate the content item fingerprints on the blacklist. | 2016-04-21 |
20160110560 | AUGMENTED REALITY BASED PRIVACY AND DECRYPTION - A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key. | 2016-04-21 |
20160110561 | TERMINAL AND METHOD FOR HIDING AND PROTECTING DATA INFORMATION - The present invention provides a terminal which includes an an information collection unit configured to acquire subsidiary information added to a current image by a user and collect authentication information relating to the user according to an information hiding command received by the current image, an information processing unit configured to execute the following steps: eliminating the subsidiary information on the current image, and embedding the subsidiary information and the authentication information into a file of the current image from which the subsidiary information is eliminated in a related manner, or eliminating a display identifier of the subsidiary information on the current image, and embedding the subsidiary information, the display identifier, and the authentication information into the file of the current image from which the display identifier is eliminated from in a related manner. The present invention further provides a method for hiding and protecting data information. | 2016-04-21 |
20160110562 | SYSTEM FOR ENCODING CUSTOMER DATA - A system for transforming customer data includes a network interface and a processor. The network interface communicates a request for customer data associated with a determined set of customers. It also receives a customer profile code associated with the customer data, wherein the customer profile code comprises a first code segment and a second code segment. It further receives first and second rules associated with the customer profile code. The processor determines the set of customers, transforms the first and second code segments into customer data using the rules, and analyzes the customer data to determine an operations history for the set of customers. | 2016-04-21 |
20160110563 | SYSTEM FOR ENCODING CUSTOMER DATA - A system for encoding customer data includes a memory, a decision engine, a rules engine and an interface engine. The memory stores customer data associated with service levels and rules. The decision engine receives a request for customer data from a third party, determines that the third party is associated with a first service level, and retrieves the customer data associated with the first service level. The rules engine transforms customer data into first and second code segments by applying the rules. The rules engine combines at least the first code segment and the second code segment to form a customer profile code. An interface engine communicates the customer profile code to the third party. | 2016-04-21 |
20160110564 | HOLOGRAPHIC ENCRYPTION OF MULTI-DIMENSIONAL IMAGES - Cryptographic techniques for encrypting images, and decrypting and reconstructing images, are provided to facilitate preventing unauthorized access to images. A holographic cryptographic component (HCC) can generate a global image comprising a scaled version of a source image and random content, generate a phase hologram representing the global image, and encrypt the phase hologram to generate an encrypted hologram based on a random phase mask, which can be the private encryption key. To reconstruct the source image, an HCC can overlay a phase mask, which can be a conjugate of the random phase mask, on the encrypted hologram to decrypt it, and can illuminate the decrypted hologram with a coherent light source. The source image is only reconstructed properly if the correct phase mask is used. If HCC applies the encryption process repetitively to the same source image, HCC can generate a different encrypted hologram in each run. | 2016-04-21 |
20160110565 | STORAGE SYSTEM SECURITY - Disclosed aspects include managing access to a particular storage unit in a storage facility. The particular storage unit is coupled, in the storage facility, with both a particular storage unit identifier for the particular storage unit and an access management parameter for managing access to data on the particular storage unit. A device is used to identify the particular storage unit for write protection based on the particular storage unit identifier. In embodiments, the device includes an indicator to visually indicate a proper configuration and the particular storage unit identifier can be a world wide name. Aspects of the disclosure include managing the device for connection with the storage facility and access management for the storage facility. | 2016-04-21 |
20160110566 | APPARATUS, SYSTEMS AND METHODS FOR SECURELY STORING MEDIA CONTENT EVENTS ON A FLASH MEMORY DEVICE - Systems and methods are operable to securely store media content events on a flash memory device. An exemplary embodiment receives user-provided authorization information, compares the received user-provided authorization information with authorization information associated with the flash memory device, and permits access to a flash memory of the flash memory device when the received user-provided authorization information corresponds to the authorization information. | 2016-04-21 |
20160110567 | TAMPER RESISTANT MODULE FOR INDUSTRIAL CONTROL SYSTEM - An industrial control system module and methods are described for self-destruction or the destruction and/or erasure of sensitive data within the industrial control system module upon an indication of an unauthorized module access event. In an implementation, a secure industrial control system module includes a circuit board including electrical circuitry; a sealed encasement that houses the circuit board, where the sealed encasement includes a housing having a first housing side and a second housing side, where the housing is configured to house the circuit board when the first housing side and the second housing side are coupled together; and a first sensor component integrated with the sealed encasement, where the first sensor component is communicably coupled to the circuit board and electrical circuitry and is configured to provide an indication of an unauthorized access event. | 2016-04-21 |
20160110568 | LABELING AND AUTHENTICATING USING A MICROTAG - A system for decoding energy peaks of an identifier includes an interface and a processor. The interface is configured to receive a reference peak position associated with an identifier, wherein the identifier comprises a rugate microtag, and receive a set of data pattern peak positions associated with the identifier. The processor is configured to determine a set of adjusted data pattern peak positions based on the reference peak position. | 2016-04-21 |
20160110569 | RFID TAG READING DEVICE, RFID TAG READING PROGRAM, AND RFID TAG READING METHOD - An RFID reading device according to the present invention includes: response requesting unit ( | 2016-04-21 |
20160110570 | RFID READER/WRITER DEVICE - A radio frequency electronic tag reader/writer device including a housing, an antenna, a processing unit connected to the antenna and intended to exchange data with a radio frequency electronic tag presented within the range of the reader/writer device, at least one communication interface intended to be connected to a programmable logic controller and controlled by the processing unit for exchanging data with the programmable logic controller, a signalling unit for indicating one or more operating statuses, the signalling unit being connected to the processing unit, the processing unit being arranged for controlling the signalling unit on the basis of a control frame received from the programmable logic controller. | 2016-04-21 |
20160110571 | RFID TAG AUTHENTICATION SYSTEM - An RFID tag using a physically unclonable function (PUF) generates a response value corresponding to a challenge value, receives an RFID reader ID from an RFID reader, generates a first message authentication code for the RFID reader ID, an RFID tag ID and time information by using, as a secret key, a first response value corresponding to a first challenge value, and transmits, to the RFID reader, the first challenge value, the first message authentication code and the time information of the RFID tag, which are tag identification elements, when the RFID reader ID is received. At this time, the RFID tag shares, with an RFID tag authentication server, the same message authentication code generation function, the RFID tag ID, the first challenge value, and the first response value generated by a PUF module. | 2016-04-21 |
20160110572 | LOW-ENERGY RADIO FREQUENCY TAG FOR PERFORMING A VEHICLE FUNCTION - A low-energy transceiver tag is described, as well as methods of using the low-energy transceiver tag to enable secure communication with a vehicle. The low-energy transceiver tag includes a substrate, and electronic circuitry carried by the substrate having a transceiver circuit coupled to a power circuit. The transceiver circuit may be configured to transmit a preconfigured answer signal in response to receiving a query signal. In addition, the preconfigured answer signal may be a low-energy response associated with a remotely-located trust anchor. | 2016-04-21 |
20160110573 | METHOD OF WRITING AND REPRODUCING MULTIMEDIA SERVICE BY USING TAG AND APPARATUS THEREFOR - Provided are method and apparatus for writing and reproducing a multimedia service using a tag in order to provide an intuitive interface for a user using a multimedia service. The method includes selecting a multimedia service to be written; generating tag information identifying the selected multimedia service; and writing the generated tag information to a tag. Accordingly, multimedia service information and content information can be stored in a tag by being written to tag information using a common format, and thus the user can later execute a service operation by easily writing information of a desired service operation to a tag and then simply connecting the tag to a tag reading device. | 2016-04-21 |
20160110574 | IMAGE READER HAVING IMAGE SENSOR ARRAY - An image reader can include an image sensor array. An image reader in one embodiment can include an optical system capable of directing light reflected from a target onto the image sensor array. An image reader can be used for reading a dataform. | 2016-04-21 |
20160110575 | Dimensioning and Barcode Reading System - A system and method for calibrating a barcode scanning tunnel comprises providing a scanning tunnel having a moveable surface, a camera, and a dimensioning device. Orientations of the dimensioning device and camera are estimated. Instances of a calibration object on the moveable surface are acquired by the dimensioning device and the camera, and a relationship is defined between the two devices. A calibration object is moved along the moveable surface through the devices' fields of view, controlling the camera's focal distance according to the relationship, so that the dimensioning device and the camera acquire instances of the calibration object, and the relationship is revised. | 2016-04-21 |
20160110576 | SEQUENCED ILLUMINATION IN MARK READING DEVICES - A reader operable to read a mark on a substrate, the reader comprising a power source, operable to deliver a variable drive current or voltage, a light source operable to illuminate said mark with a sequence of illumination light pulses of different wavelength spectra, an intensity of said illumination light pulses varying according to the delivered drive current or voltage, a light sensor operable to measure an intensity of light received from said mark and to deliver a corresponding light intensity signal, and a control unit operable to control said power source and light sensor to control timings of said illumination light pulses according to a switching pattern and timings to acquire said light intensity signal for synchronizing acquisition of said light intensity signal with said sequence of illumination light pulses, said control unit being further operable to adjust a duty cycle of said switching pattern so as to maintain heat generation associated to each illumination light pulse below a given threshold value. | 2016-04-21 |
20160110577 | APPARATUS OPERATIVE FOR CAPTURE OF IMAGE DATA - There is set forth an apparatus for capturing image data. In one embodiment, an apparatus is operative for capture of a first frame of image data and a second frame of image data. In one embodiment, an apparatus is operative for processing the first frame of image data and the second frame of image data. | 2016-04-21 |
20160110578 | DECODABLE INDICIA READING TERMINAL WITH OPTICAL FILTER - A decodable indicia reading terminal can comprise a housing including a housing window, a multiple pixel image sensor disposed within the housing, an imaging lens configured to focus an image of decodable indicia on the image sensor, an optical bandpass filter disposed in an optical path of light incident on the image sensor, an analog-to-digital (A/D) converter configured to convert an analog signal read out of the image sensor into a digital signal representative of the analog signal, and processor configured to output a decoded message data corresponding to the decodable indicia by processing the digital signal. | 2016-04-21 |
20160110579 | HAND-MOUNTED DEVICE WITH FINGER MOTION TRIGGERING - A wearable device is worn on the back of a user's hand such that the act of pointing the user's index finger is sufficient to align the device and trigger a process. Triggering is achieved by sensing the user's finger in an image or by breaking a light path in a photogate. | 2016-04-21 |
20160110580 | CODE READING DEVICE AND CODE READING PROGRAM - A code reading device is equipped with a region extracting unit | 2016-04-21 |
20160110581 | FINGERPRINT DETECTING APPARATUS CANCELING OFFSET AND CONTROL METHOD THEREOF - According to an embodiment of the present invention, an apparatus for detecting a fingerprint is provided, which includes a plurality of sensor pads receiving a response signal from a finger applied to a driving signal, a sensing circuit outputting a sensing signal based on the response signal, and a sensing signal adjusting unit sampling the sensing signal outputted from the sensing circuit maintaining the sensing signal, and adjusting an average voltage level of the sensing signal based on a reference voltage | 2016-04-21 |
20160110582 | MEASURING ATMOSPHERIC ATTRIBUTES USING MULTISPECTRAL IMAGES - A mechanism for determining atmospheric conditions from an image is described. A mechanism for determining atmospheric conditions includes determining an intensity value for pixels above and below the horizon in an image, calculating a slope between the intensity values for the pixels above the horizon, and a slope between the intensity values for the pixels below the horizon, and determining a difference between the slopes to determine the atmospheric conditions. | 2016-04-21 |
20160110583 | FINGERPRINT IDENTIFICATION METHOD - The present invention provides fingerprint-based verification system and fingerprint identification method. The fingerprint-based verification system verifies identify by analyzing biometric minutiae including the ridges and pores on a fingerprint. The fingerprint identification method comprises a step for obtaining a first fingerprint, a step for obtaining a second fingerprint, and a step for comparing the first fingerprint and the second fingerprint. The present invention provides effective systems and methods for mitigating identity fraud. | 2016-04-21 |
20160110584 | METHODS AND SYSTEMS FOR CLASSIFYING BIOLOGICAL SAMPLES, INCLUDING OPTIMIZATION OF ANALYSES AND USE OF CORRELATION - Methods, systems, and devices for classifying a biological sample that include receiving an image of a biological sample and applying one or more algorithms from a data repository to the image, generating a classification of the biological sample based on the outcome of the one or more algorithms applied to the image, and transmitting the classification for presentation on a display or via another medium. The methods, systems, and devices may also include features for developing a data master reference and/or other correlation/translation features to enable comparison of data sets from one platform to another or from one machine to another or from the same machine at different points in time. | 2016-04-21 |
20160110585 | DETECTING AN ATTENTIVE USER FOR PROVIDING PERSONALIZED CONTENT ON A DISPLAY - Provided is a method of detecting an attentive user to provide personalized content on a display. People proximate to a display are identified. Upon such identification, a user attentive to the display is detected amongst the people proximate to the display. Identity of the attentive user is determined and personalized content is displayed based on the identity of the attentive user. | 2016-04-21 |
20160110586 | IMAGE RECOGNITION APPARATUS, IMAGE RECOGNITION METHOD AND COMPUTER-READABLE MEDIUM - An image recognition apparatus, method and non-transitory computer-readable storage medium are disclosed. An image recognition apparatus may include a memory storing instructions, and at least one processor configured to process the instructions to, determine an occlusion pattern of a face in a facial image representing the face by comparing the facial image with a standard facial image representing a standard face, and identify the facial image using a region determined by the occlusion pattern in the facial image. | 2016-04-21 |
20160110587 | METHOD AND APPARATUS FOR FACIAL RECOGNITION - A facial recognition method includes identifying a first makeup pattern in a region of interest (ROI) of a first image, applying one of the first makeup pattern and a candidate makeup pattern to a ROI of a second image corresponding to the ROI of the first image to generate a third image and recognizing a face based on the first image and the third image. | 2016-04-21 |
20160110588 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - An information processing device includes: an image acquirer configured to acquire a shot image of a user from an imaging device; a registered user information holder configured to hold face identification data of a registered user; a face authentication section configured to execute authentication processing of a face image in the shot image by using the face identification data held in the registered user information holder; a shooting condition controller configured to adjust a shooting condition to bring a characteristic of the face image close to a characteristic of a face image of an acquisition source of the face identification data and make the imaging device perform shooting in order to improve an authentication result in the face authentication section; and an information processing section configured to execute information processing on the basis of an authentication result of a face image obtained by adjustment. | 2016-04-21 |
20160110589 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - An information processing device includes: an image acquirer acquiring a shot image of a user; a registered user information holder holding face identification data of a registered user; a face authentication carrying out authentication of a face image in the shot image by using the face identification data held in the registered user information holder; an information processing section executing information processing on a basis of an authentication result by the face authentication section; a face identification data registration section updating the face identification data on a basis of a face image extracted from the shot image; and a provisionally-registered data holder temporarily holding data relating to the face image when the face image satisfies a predetermined condition. The face identification data registration section determines whether or not to update the face identification data on the basis of the face image by evaluating the data. | 2016-04-21 |
20160110590 | FACIAL IDENTIFICATION METHOD, FACIAL IDENTIFICATION APPARATUS AND COMPUTER PROGRAM FOR EXECUTING THE METHOD - A facial identification method includes changing an image size for facial identification, converting the image of changed size to an LBP domain, and detecting a face through scanning across the converted image. At least one or more of steps of converting and scanning is executed by a plurality of processing units. | 2016-04-21 |
20160110591 | LARGE VENUE SURVEILLANCE AND REACTION SYSTEMS AND METHODS USING DYNAMICALLY ANALYZED EMOTIONAL INPUT - Certain example embodiments relate to large venue surveillance and reaction systems and/or methods that take into account both subjective emotional attributes of persons having relations to the large venues, and objective measures such as, for example, actual or expected wait times, current staffing levels, numbers of customers to be serviced, etc. Pre-programmed scenarios are run in real-time as events stream in over one or more electronic interfaces, with each scenario being implemented as a logic sequence that takes into account at least an aspect of a representation of an inferred emotional state. The scenarios are run to (a) determine whether an incident might be occurring and/or might have occurred, and/or (b) dynamically determine a responsive action to be taken. A complex event processing engine may be used in this regard. The analysis may be used in certain example embodiments to help improve customer satisfaction at the large venue. | 2016-04-21 |
20160110592 | IMAGE PROCESSING DEVICE, METHOD AND PROGRAM FOR MOVING GESTURE RECOGNITION USING DIFFERENCE IMAGES - An image processing device includes a difference image generation unit which generates a difference image by obtaining a difference between frames of a cutout image which is obtained by cutting out a predetermined region on a photographed image; a feature amount extracting unit which extracts a feature amount from the difference image; and a recognition unit which recognizes a specific movement of an object on the photographed image based on the feature amount which is obtained from the plurality of difference images which are aligned in time sequence. | 2016-04-21 |
20160110593 | IMAGE BASED GROUND WEIGHT DISTRIBUTION DETERMINATION - A sequence of images is processed to interpret movements of a user. The user's contour and center of gravity are determined and tracked. Based on points of contact between the user and the environment, and upon tracked movement of the center of gravity, forces impressed by the user upon the points of contact with the environment may be deduced by constraint analysis. This center-of-mass model of user movements may be used in conjunction with a skeletal model of the user to provide verification of the validity of the skeletal model. The center-of-mass model may also be used alternatively with the skeletal model fails during those times when use of the skeletal model is problematic. | 2016-04-21 |
20160110594 | SCALE INDEPENDENT TRACKING PATTERN - In one aspect, a computer implemented method of motion capture, the method includes tracking the motion of a dynamic object bearing a pattern configured such that a first portion of the patterns is tracked at a first resolution and a second portion of the pattern is tracked at a second resolution. The method further includes causing data representing the motion to be stored to a computer readable medium. | 2016-04-21 |
20160110595 | FAST 3D MODEL FITTING AND ANTHROPOMETRICS USING SYNTHETIC DATA - A large synthetic 3D human body model dataset using real-world body size distributions is created. The model dataset may follow real-world body parameter distributions. Depth sensors can be integrated into mobile devices such as tablets, cellphones, and wearable devices. Body measurements for a user are extracted from a single frontal-view depth map using joint location information. Estimates of body measurements are combined with local geometry features around joint locations to form a robust multi-dimensional feature vector. A fast nearest-neighbor search is performed using the feature vector for the user and the feature vectors for the synthetic models to identify the closest match. The retrieved model can be used in various applications such as clothes shopping, virtual reality, online gaming, and others. | 2016-04-21 |
20160110596 | METHODS OF PROCESSING DATA FROM MULTIPLE IMAGE SOURCES TO PROVIDE NORMALIZED CONFIDENCE LEVELS FOR USE IN IMPROVING PERFORMANCE OF A RECOGNITION PROCESSOR - A method comprises receiving from a first data source first recognition results which are associated with the first data source, and receiving from a second data source second recognition results which are associated with the second data source. The method further comprises electronically by a processor, processing a first set of confidence levels associated with the first recognition results to provide a first set of normalized confidence levels associated with the first data source, and electronically by a processor, processing a second set of confidence levels associated with the second recognition results to provide a second set of normalized confidence levels associated with the second data source. The method also comprises storing the first set of normalized confidence levels associated with the first data source in a first table of normalized confidence levels and the second set of normalized confidence levels associated with the second data source in a second table of normalized confidence levels. | 2016-04-21 |
20160110597 | Method and System for Imaging Documents, Such As Passports, Border Crossing Cards, Visas, and Other Travel Documents, In Mobile Applications - A mobile computing device-implemented method of imaging an object to read information, includes capturing, by running an image capturing thread, a plurality of raw images of the object by an image capturing component of the mobile computing device and placing in an image queue in a first memory location; processing, by running an image processing thread, one or more raw images to extract one or more potential machine readable zone (MRZ) candidates and placing in a MRZ candidate queue in a second memory location; analyzing, by running an image analysis thread, an MRZ candidate to detect an MRZ and placing in an MRZ queue in a third memory location; and creating a composite MRZ if a timer has expired, or the MRZ queue has reached a predetermined threshold. | 2016-04-21 |
20160110598 | DATA PROCESSING SYSTEMS, DEVICES, AND METHODS FOR CONTENT ANALYSIS - Systems, devices and methods operative for identifying a reference within a figure and an identifier in a text associated with the figure, the reference referring to an element depicted in the figure, the reference corresponding to the identifier, the identifier identifying the element in the text, placing the identifier on the figure at a distance from the reference, the identifier visually associated with the reference upon the placing, the placing of the identifier on the figure is irrespective of the distance between the identifier and the reference. | 2016-04-21 |
20160110599 | Document Classification with Prominent Objects - Systems and methods classify unknown documents in a group or not with reference document(s). Documents get scanned into digital images. Applying edge detection allows the detection of contours defining pluralities of image objects. The contours are approximated to a nearest polygon. Prominent objects get extracted from the polygons and derive a collection of features that together identify the reference document(s). Comparing the collection of features to those of an unknown image determine or not inclusion of the unknown with the reference(s). Embodiments typify collections of features, classification acceptance or not, application of algorithms, and imaging devices with scanners, to name a few. | 2016-04-21 |
20160110600 | IMAGE COLLECTION AND LOCATING METHOD, AND IMAGE COLLECTION AND LOCATING DEVICE - Embodiments of the present application provide an image capturing-based positioning method and an image capturing-based positioning apparatus. The method comprises: determining that an eye of a user is gazing at an auxiliary positioning object; photographing the eye of the user and acquiring a distance of the user relative to the auxiliary positioning object; capturing at least one image comprising the auxiliary positioning object; obtaining, according to the at least one image, direction information of the user relative to the auxiliary positioning object and position information of the auxiliary positioning object; and obtaining position information of the user according to the position information of the auxiliary positioning object, the distance of the user relative to the auxiliary positioning object, and the direction information. In the embodiments of the present application, precise positioning is performed by acquiring a distance and a relative direction between a user and an auxiliary positioning object which the user is gazing at, to obtain a position of the user relative to the auxiliary positioning object, thereby improving the precision of image capturing-based positioning. | 2016-04-21 |
20160110601 | USER TERMINAL APPARATUS AND IRIS RECOGNITION METHOD THEREOF - A user terminal apparatus and an iris recognition method thereof are provided. The user terminal apparatus includes an imaging unit configured to generate an image of a user, a display configured to display the generated image, and a controller configured to detect a user eye from the generated image, control the display to display a guide image in a position of the generated image in which the detected user eye is located, and perform iris recognition in response to a difference between a size of an iris included in the detected user eye and a size of the guide image being within a preset range. | 2016-04-21 |
20160110602 | AREA INFORMATION ESTIMATING DEVICE, AREA INFORMATION ESTIMATING METHOD, AND AIR CONDITIONING APPARATUS - An area information estimating device has a camera that photographs an image within a sensing area, a person detector that detects a person from the image from the camera, and a position calculator that calculates an existence position of the person in the sensing area based on a coordinate on the image in which the person is detected by the person detector. The person detector excludes the person in whom a relationship between the coordinate and a size on the image does not satisfy a predetermined condition from a detection target. | 2016-04-21 |
20160110603 | SCANNING WINDOW IN HARDWARE FOR LOW-POWER OBJECT-DETECTION IN IMAGES - An apparatus includes a hardware sensor array including a plurality of pixels arranged along at least a first dimension and a second dimension of the array, each of the pixels capable of generating a sensor reading. A hardware scanning window array includes a plurality of storage elements arranged along at least a first dimension and a second dimension of the hardware scanning window array, each of the storage elements capable of storing a pixel value based on one or more sensor readings. Peripheral circuitry for systematically transfers pixel values, based on sensor readings, into the hardware scanning window array, to cause different windows of pixel values to be stored in the hardware scanning window array at different times. Control logic coupled to the hardware sensor array, the hardware scanning window array, and the peripheral circuitry, provides control signals to the peripheral circuitry to control the transfer of pixel values. | 2016-04-21 |
20160110604 | TRACKING APPARATUS, TRACKING METHOD, AND NON-TRANSITORY STORAGE MEDIUM STORING TRACKING PROGRAM - A tracking apparatus includes a tracking subject setting unit, a tracking subject search unit, an obstructing detection unit, and an obstructing area detection unit. The tracking subject search unit searches for the tracking subject by using at least one of luminance of the image data, color of the image data, a result of face detection, and a result of focus detection. The obstructing detection unit detects that the tracking subject is obstructed by comparing a standard focus detection information with a focus detection information obtained at a tracking position. The obstructing area detection unit detects an obstructing area. The tracking subject search unit exclusively sets a search area around the obstructing area and searches the set search area for the tracking subject by using information different from the result of focus detection, when the obstructing of the tracking subject is detected. | 2016-04-21 |
20160110605 | SYSTEMS AND METHODS FOR IMAGE-FEATURE-BASED RECOGNITION - Methods and systems are described herein that allow a user to capture a single image snapshot from video, print, or the world around him or her, and obtain additional information relating to the media itself or items of interest displayed in the snapshot. A fingerprint of the snapshot is used as a query and transmitted to the server. Image Feature-Based Recognition, as described herein, uses a feature index to identify a smaller set of candidate matches from a larger database of images based on the fingerprint. Novel methods and systems using a distance metric and a radical hash table design exploit probabilistic effects and allow distinct image features to be preferred over redundant ones, allowing only the more distinctive data points to remain resident within the index, yielding a lean index that can be quickly used in the identification process. | 2016-04-21 |
20160110606 | IMAGE RECOGNIZING APPARATUS AND IMAGE RECOGNIZING METHOD - An image recognizing apparatus, including: a camera which outputs at least one of a front image and a rear image of a vehicle; a disturbance estimating unit which outputs an image which is estimated as a disturbance according to a visibility of an image; a disturbance classifying unit which outputs a cause of disturbance according to a brightness of a pixel in the disturbance estimated image; a disturbance result determining unit which determines whether the disturbance is generated in the image in accordance with accumulated cause of the disturbance; and an image recognizing unit which informs the driver that the image is not recognized when it is determined that disturbance occurs in the image. | 2016-04-21 |
20160110607 | SYSTEMS AND METHODS FOR PROCESSING VIDEO CONTENT TO IDENTIFY OBJECTS AND ASSOCIATE INFORMATION WITH IDENTIFIED OBJECTS - Systems and methods for identifying objects, such as advertised items or other content, within video content, which may be sequitur or non-sequitur in nature. The identified objects may then be select from within video content by a user to access metadata associated with the objects. The identified objects may be identified to viewers by cues. Cues may be oral, visual or both oral and visual. One or more frames corresponding to a period of video depicting identified objects are displayed in separate object identifiers that may be viewed by the viewer and from within which the identified objects may be selected by the viewer. | 2016-04-21 |
20160110608 | PHOTO DIARY - A method to create a photo diary includes creating an entry for a time period in the photo diary. Creating the entry includes selecting candidate frames from digital videos created or received in the time period. Selecting the candidate frames includes performing people and pet detection on the digital videos, extract frames with people and pets from the digital videos perform people recognition on the frames with people to identify frames with recognized persons. The method further includes sorting the candidate frames with recognized persons and pets into groups based on criteria, selecting representative frames from the groups, and presenting the representative frames in the entry. | 2016-04-21 |
20160110609 | METHOD FOR OBTAINING A MEGA-FRAME IMAGE FINGERPRINT FOR IMAGE FINGERPRINT BASED CONTENT IDENTIFICATION, METHOD FOR IDENTIFYING A VIDEO SEQUENCE, AND CORRESPONDING DEVICE - A temporal section that is defined by boundary images is selected in a video sequence. A maximum of k stable image frames are selected in the temporal section of image frames having a lowest temporal activity. Image fingerprints are computed from the selected stable image frames. A mega-frame image fingerprint data structure is constructed from the computed fingerprints. | 2016-04-21 |
20160110610 | IMAGE PROCESSOR, IMAGE PROCESSING METHOD, AND COMPUTER PROGRAM - Disclosed herein is an image processor including: a depth image acquisition portion adapted to acquire a depth image for an image frame making up the movie, the depth image representing, as a pixel value on an image plane, a subject distance from an imaging device; an edge extraction portion adapted to generate an edge image for the image frame and identify a picture area of a tracked target in the depth image on the basis of an outline of the tracked target represented by tracking results for the image frame at a previous time so as to extract an edge in an area limited on the basis of the picture area; and a tracking section adapted to compare the extracted edge against an outline candidate for the tracked target to find a likelihood so as to estimate the outline of the tracked target and output the outline as tracking results. | 2016-04-21 |
20160110611 | NUMERICAL CONTROL DEVICE - A numerical control device for recording status information indicating status at machine control includes, a display image generation unit configured to generate a display image, a keyboard image generation unit configured to generate a keyboard image, the keyboard image being generated by imaging acquired key depression state, an image combination unit configured to combine the display image and the keyboard image into a combined image, a moving image generation unit configured to generate a moving image based on the combined image generated periodically. | 2016-04-21 |
20160110612 | METHODS AND SYSTEMS FOR OBJECT-RECOGNITION AND LINK INTEGRATION IN A COMPOSITE VIDEO STREAM - Disclosed herein are methods and systems for object recognition and link integration in a composite video stream. One embodiment takes the form of a process that includes detecting an object of interest in a set of video frames. The process also includes tracking the movements of the detected object of interest across a subset of the video frames in the set of video frames. The process further includes generating a composite video stream from the video frames in the subset. The composite video stream shows the tracked movements of the detected object of interest without showing background data from the video frames in the subset. The process also includes outputting the generated composite video stream. | 2016-04-21 |
20160110613 | SYSTEM AND METHOD FOR CROWD COUNTING AND TRACKING - A video analytic system includes a depth stream sensor, spatial analysis module, temporal analysis module, and analytics module. The spatial analysis module iteratively identifies objects of interest based on local maximum or minimum depth stream values within each frame, removes identified objects of interest, and repeats until all objects of interest have been identified. The temporal analysis module associates each object of interest in the current frame with an object of interest identified in a previous frame, wherein the temporal analysis module utilizes the association between current frame objects of interest and previous frame objects of interest to generate temporal features related to each object of interest. The analytics module detects events based on the received temporal features. | 2016-04-21 |
20160110614 | PERSON DETECTION SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A system for distinguishing a first group of persons from a second group of persons among plural persons who are present inside an area, and the system includes processing circuitry that: detects first positions of the plural persons who are present inside the area based on a heat image; detects second positions of the second group of persons who are present inside the area based on identification signals transmitted from portable wireless terminals of the second group of persons; and determines, as the first group of persons, those who are present at positions different from the second positions based on the first and second positions. | 2016-04-21 |
20160110615 | Methods and Apparatus for Integrated Forward Display of Rear-View Image and Navigation Information to Provide Enhanced Situational Awareness - A situational awareness system is disclosed herein for providing heads-up display to a user on a moving vehicle. The display is focused at an ocular infinity in order to prevent accommodation lag in the user's comprehension. A super wide-angle (e.g., 170 degree to 210 degree) rear-view camera provides rearward looking video imagery to the user, which may be digitally processed and enhanced. Additional information is optionally provided in the display, including maps, turn by turn directions, and visual indicators guiding the user for forward travel. Additional information is optionally provided by audio. One embodiment comprises a full-face motorcycle helmet with a see-through micro-display that projects a virtual image in-line with the helmet-wearer's field of view. A second embodiment comprises a unit that projects a virtual image on a windshield in the operator's field of view. | 2016-04-21 |
20160110616 | APPARATUS FOR RECOGNIZING LANE PARTITION LINES - An apparatus for recognizing lane partition lines on opposite sides of a traveling lane in a processing area of a forward image captured by a camera mounted in a vehicle. In the apparatus, a lane change determiner is configured to determine whether or not there is a lane change made by the vehicle. A processing area changer is configured to, while it is determined by the lane change determiner that there is a lane change, change the processing area from a predefined processing area to a processing area that can accommodate the lane change. | 2016-04-21 |
20160110617 | APPARATUS FOR RECOGNIZING LANE PARTITION LINES - An apparatus for recognizing lane partition lines on opposite sides of a traveling lane of a vehicle based on a forward image captured by a camera mounted in the vehicle. In the apparatus, an allowable range limiter is configured to, based on a learned value of a lane width learned by a lane width learner, limit allowable ranges for the respective lane partition lines, where in the allowable ranges the respective lane partition lines are allowed to be detected in the forward image. A lane change determiner is configured to determine whether or not there is a lane change made by the vehicle. The allowable range limiter is further configured to, if it is determined by the lane change determiner that there is a lane change, enlarge at least one of the allowable ranges limited by the allowable range limiter based on the learned value of the lane width. | 2016-04-21 |
20160110618 | INFORMATION PROCESSING DEVICE, APPROACHING OBJECT NOTIFICATION METHOD, AND PROGRAM - There is provided a system including at least one image capturing device configured to capture an image of an object from a vehicle, and at least one display device configured to display the image of the object to an occupant of the vehicle. The system further includes at least one control unit configured to determine whether to alert the occupant to proximity of the object, and in response to determining to alert the occupant to proximity of the object, superimpose, on the image of the object for display on the at least one display device, a moving pattern through which the image of the object remains visible. | 2016-04-21 |
20160110619 | SMART PARKING ASSIST APPARATUS AND METHOD - A smart parking assist apparatus and method are provided. The smart parking assist apparatus operates a smart parking assist function after a vehicle stops and searches a parking slot using a plurality of imaging devices. In addition, the searched parking slot is set to a target parking slot and parking slot information regarding the target parking slot is output. The apparatus recognizes a parking line of the target parking slot and an object adjacent to the target parking slot and sets a parking reference line based on the recognized information, after the parking slot information is output. The vehicle is then operated to be parked in the target parking slot based on the parking reference line. | 2016-04-21 |
20160110620 | Method for Triggering a Driver Assistance Function Upon Detection of a Stop Light by Means of a Camera - The invention relates to a method for triggering a driver assistance function of a vehicle, in which image data of that part of the surroundings of the vehicle which is in front of the vehicle is generated by means of a camera and supplied to an analyzing unit for the purpose of analysis and the driver assistance function is triggered upon detection of a stop light ( | 2016-04-21 |
20160110621 | SYSTEMS AND METHODS FOR USE AT A VEHICLE INCLUDING AN EYE TRACKING DEVICE - Systems and methods for a vehicle including an eye tracking device. The systems and methods use input from the eye tracking device. The systems and methods are configured to communicate with a driver based on input from the eye tracking device. For example, the systems and methods are configured to generate indicators on a display based on input from the eye tracking device. | 2016-04-21 |
20160110622 | METHOD, COMPUTER PROGRAM PRODUCT, AND SYSTEM FOR PROVIDING A SENSOR-BASED ENVIRONMENT - Method, computer program product, and system of visual identification of an item selected by a person during a transaction within an environment having a plurality of items. The method includes acquiring, using a visual sensor disposed within the environment, image information that includes at least a portion of the selected item, and analyzing the image information to determine a set of possible items for classifying the selected item. The method further includes selecting, based on personal profile information associated with the person, one of the set of possible items to thereby identify the selected item. | 2016-04-21 |
20160110623 | METHOD AND APPARATUS FOR SETTING REGION OF INTEREST - According to a first aspect of the present invention, a method for setting a region of interest may include: detecting a mark in an image frame photographed by a camera; and setting a region of interest using the detected mark. | 2016-04-21 |
20160110624 | Methods and Systems for Detection of a Consumable in a System - A computer-implemented method for detecting a presence of an object-of-interest in a system is provided. The method includes imaging the first object-of-interest including an identifier, wherein the imaging generates a first set of image data and determining the portion of the image data including the identifier based on a predetermined location. The method further includes dividing the portion of the image data including the identifier into at least two segments Next, the presence of the object-of-interest is determined by determining if intensity values within each segment exceed a presence threshold. | 2016-04-21 |
20160110625 | METHOD FOR NEAR-REALTIME WORKSPACE MAPPING - Motorized machinery, such as overhead cranes, are widely used in industries all over the world. It is not easy to move crane payloads without oscillation, increasing the likelihood of obstacle collisions and other accidents. One possible solution to such problems could be aiding the operator with a dynamic map of the workspace that shows the current position of obstacles. This method discloses the use of a camera to take images of the workspace, using imaging blurring to smooth the obtained images, and drawing contours to produce an individual, near real-time map of the workspace. In one or more embodiments, known obstacles may be tagged in a manner which is readable by the camera. This image and historical images of the same workspace are layered on top of one another to produce a map of obstacles on the workspace floor. This imaging and layering can produce a near real-time map of obstacles that can be used to guide heavy motorized machinery around a workspace without incident. | 2016-04-21 |
20160110626 | DEVICE FOR DETECTING PUPIL TAKING ACCOUNT OF ILLUMINANCE AND METHOD THEREOF - The present disclosure relates to a device for detecting a pupil taking account of illuminance and a method thereof, and provides a device for detecting a pupil taking account of illuminance capable of improving detection accuracy of the pupil by detecting a driver's pupil from an image using an adaptive threshold based binarization technique based on a lookup table in which sizes of the pupil corresponding to illuminance are written, and a method thereof. | 2016-04-21 |
20160110627 | SYSTEM AND METHOD FOR DESCRIBING IMAGE OUTLINES - The present invention relates to the field of image processing and methodologies to construct a descriptor from binary silhouette images. The method comprises the steps of receiving a parametric equation of a closed planar curve, choosing nodes on the closed planar curve with equal intervals, generating a continuous scale space of the nodes on the curve by successively convolving the planar curve with a Gaussian filter and down-sampling it after each octave, calculating, orientation vectors and orientation angle values for each sampled point at each interval of each octave, creating a orientation scale space (OSS) which is a matrix obtained from stacking each orientation angle value on top of each other, representing the outline with a descriptor including all the orientation vectors and their respective parameters position and scale. | 2016-04-21 |