25th week of 2017 patent applcation highlights part 59 |
Patent application number | Title | Published |
20170177865 | Industrial Control System Emulator for Malware Analysis - Embodiments of the present invention may provide an Industrial Control System (ICS) Emulator for Malware Analysis. The ICS Emulator may be embodied in a software. The software may be developed by testing and operating thousands of ICS devices that are used every day in critical infrastructure from power to oil & gas. Then, based on the tests and operations, the software may be configured to identify if, when, and how malware may be attacking various industrial control systems. | 2017-06-22 |
20170177866 | METHOD AND APPARATUS FOR DETECTING EXPLOITS - Methods and apparatus are disclosed for detecting if a source of initial content is serving exploits to a target device exposed to initial content. The method includes selecting at least two target devices and dividing the selected target devices into at least two groups, and causing the at least two groups to appear towards the initial content as having different software profiles towards the initial content. Information is obtained regarding at least one of connections and content transmitted/received by the at least two groups as a result of exposure to the initial content. The obtained information between the at least two groups is compared. If the comparison indicates that target devices in one of the at least two groups transmit/receive at least one of additional connections and additional content due to being exposed to the initial content, deciding that a source of the initial content serves exploits. | 2017-06-22 |
20170177867 | SYSTEMS AND METHODS FOR AUTOMATIC SNAPSHOTTING OF BACKUPS BASED ON MALICIOUS MODIFICATION DETECTION - The present disclosure describes systems and methods for detection and mitigation of malicious activity regarding user data by a network backup system. In a first aspect, a backup system receiving and deduplicating backup data from a plurality of computing devices may detect, based on changes in uniqueness or shared rates for files, atypical modifications to common files, and may take steps to mitigate any potential attack by maintaining versions of the common files prior to the modifications or locking backup snapshots. In a second aspect, the backup system may monitor file modification behaviors on a single device, relative to practices of an aggregated plurality of devices. Upon detection of potentially malicious modification activity, a previously backed up or synchronized store of data may be locked and/or duplicated, preventing any of the malicious modifications from being transferred to the backup system. | 2017-06-22 |
20170177868 | DETECTING MALICIOUS CODE BASED ON CONDITIONAL BRANCH ASYMMETRY - A computer-implemented method for detecting malware based on asymmetry includes receiving, via a processor, an application to be tested. The method includes computing, via the processor, a static call graph for the application. The method also includes generating, via the processor, an interprocedural control-flow graph (ICFG) based on the static call graph. The method further includes detecting, via the processor, symbolic path conditions and executable operations along different paths of conditional branches in the ICFG. The method further includes detecting, via the processor, asymmetries based on the symbolic path conditions and the executable operations. The method includes detecting, via the processor, a malicious block based on the detected asymmetries. The method further includes modifying, via the processor, the application based on the detected malicious block. | 2017-06-22 |
20170177869 | CONFIRMING A MALWARE INFECTION ON A CLIENT DEVICE USING A REMOTE ACCESS CONNECTION TOOL, TO IDENTIFY A MALICIOUS FILE BASED ON FUZZ HASHES - A device may receive a trigger to determine whether one or more client devices, of a set of client devices, are infected by a malicious file. The device may generate file identification information associated with the malicious file based on receiving the trigger to determine whether the one or more client devices are infected by the malicious file. The device may obtain remote access to the one or more client devices using a connection tool based on receiving the trigger to determine whether the one or more client devices are infected by the malicious file. The device may obtain information, associated with the one or more client devices, using the remote access. The device may provide information indicating whether the one or more client devices are infected by the malicious file based on the file identification information and the information associated with the one or more client devices. | 2017-06-22 |
20170177870 | Security Mechanisms for Extreme Deep Sleep State - A processor includes logic to generate a wakeup code value for a deep sleep state in which the processor is powered down, store the wakeup code value to a first location in a power domain in which power is maintained in the deep sleep state, store the wakeup code value to a second location in a non-volatile memory device, and initiate entry into the deep sleep state. The processor also includes logic to begin execution of a wakeup sequence upon waking up from the deep sleep state. The wakeup sequence includes a determination of whether a value read from the second location and a value read from the first location match. If they do not match, the processor triggers an exception handling sequence, which may include a secure boot sequence. If they match, the processor continues executing the wakeup sequence without executing a secure boot sequence. | 2017-06-22 |
20170177871 | Technique for secure data loading to a system component - A USB device for secure data loading to a system component, such as of an aircraft. The USB device is operable in a mass storage mode and in a non-mass storage mode. The USB device initially operates in the non-mass storage mode upon startup and comprises a storage for storing data to be loaded to the system component, a processor and a memory, wherein the memory contains instructions executable by the processor such that the USB device is operable to perform a security check on the data to be loaded to the system component, and switch, upon the security check, from the non-mass storage mode to the mass storage mode to provide the data for loading to the system component. | 2017-06-22 |
20170177872 | DERIVED KEYS FOR EXECUTION ENVIRONMENTS IN A BOOT CHAIN - Methods, apparatus, and computer program products for generating a derivative key for an execution environment (EE) are described. An example of a method includes obtaining a device key by a key derivation circuit, obtaining a context string by the key derivation circuit from a one-time writable bit register (OWBR), generating the derivative key for a current EE by the key derivation circuit based on the device key and on the context string from the OWBR. | 2017-06-22 |
20170177873 | COMPUTING DEVICES - Disclosed herein are embodiments related to security in cloudlet environments. In some embodiments, for example, a computing device (e.g., a cloudlet) may include: a trusted execution environment; a Basic Input/Output System (BIOS) to request a Key Encryption Key (KEK) from the trusted execution environment; and a Self-Encrypting Storage (SES) associated with the KEK; wherein the trusted execution environment is to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, and the BIOS is to provide the KEK to the SES to unlock the SES for access by the trusted execution environment. | 2017-06-22 |
20170177874 | SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified. | 2017-06-22 |
20170177875 | Configuring a Trusted Platform Module - A method includes storing configuration data for a Trusted Platform Module (TPM) in a pre-boot environment such as Unified Extensible Firmware Interface (UEFI), reading the configuration data, and automatically configuring the TPM based upon the configuration data. The configuring includes storing values of TPM parameters in non-volatile memory of the TPM. A method includes UEFI firmware of a circuit board on an assembly line configuring a TPM. An information handling system includes UEFI firmware and a TPM. The UEFI firmware configures the TPM from a configuration file stored in memory of the UEFI firmware. | 2017-06-22 |
20170177876 | Self-Service Terminal (SST) Secure Boot - A Basic Input/Output System (BIOS) of a device is modified to: obtain a first value from a medium interfaced to the device, produce a second value from boot data resident on the medium, compare the first value to the second value, and boot from the boot data of the medium when the first value is equal to the second value. | 2017-06-22 |
20170177877 | SOFTWARE CONTAINER REGISTRY INSPECTION - A request to a scan a software image for specified criteria is received, the software image comprising layers stored in a first data store. Metadata in a second data store, different from the first data store, is searched through to obtain information corresponding to the software image. A first set of the layers that matches the specified criteria is determined, based at least in part on the information. The first set of layers is marked as un-referenceable. Asynchronous to fulfillment of the request, a second set of layers of the layers to be deleted is determined, based at least in part on the metadata, the second set of layers including layers marked as un-referenceable, and the second set of layers is deleted. | 2017-06-22 |
20170177878 | COMPUTER-IMPLEMENTED COMMAND CONTROL IN INFORMATION TECHNOLOGY SERVICE ENVIRONMENT - A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer. | 2017-06-22 |
20170177879 | Crowd-sourced security analysis - A cloud-based static analysis security tool that is accessible by a set of application development environments is augmented to provide for anonymous knowledge sharing to facilitate reducing security vulnerabilities. To the end, a crowdsourcing platform and social network are associated with the application development environments. Access to the social network platform by users of the application development environments is enabled. The anonymous access enables users to post messages without exposing sensitive data associated with a particular application development environment. As the static analysis security tool is used, a knowledgebase of information regarding identified security findings, fix priorities, and so forth, is continuously updated. Social network content (e.g., in the form of analytics, workflow recommendations, and the like) is then published from the knowledgebase to provide users with security knowledge generated by the tool from the set of application development environments. The approach provides for secure and anonymous cross-organization information sharing. | 2017-06-22 |
20170177880 | METHOD OF RESTORING SETTINGS OF AN INSTRUMENT FOR PROCESSING A SAMPLE OR A REAGENT AND A SYSTEM FOR PROCESSING A SAMPLE OR REAGENT - A method for saving and/or restoring settings of an instrument for processing a sample or reagent is disclosed. The instrument comprises a control unit and an operating system. A storage medium is provided to the instrument. The storage medium comprises a script. The script restores data for restoring settings of the instrument. The script is encrypted and/or digitally signed. The method verifies an identity and/or integrity of the script and executes the script upon starting the instrument by the operating system with the storage medium when the identity and/or integrity of the script correspond to an identity and/or integrity of the instrument. The control unit provides an input menu for allowing a user to input a saving and/or restoring command. The instrument saves settings on the storage medium and/or restores settings of the instrument from the storage medium by the restoring data corresponding to the saving and/or restoring command. | 2017-06-22 |
20170177881 | DYNAMIC SECURITY QUESTIONS IN ELECTRONIC ACCOUNT MANAGEMENT - Dynamic security questions. In an embodiment of the invention, a security question and one or more rules for generating an answer to the security question are received. The security question and the rules for generating and answer to the security question are associated with security credentials of a user. For authentication, a first answer to a security question associated with a user is received. One or more rules for generating an answer to the security question are retrieved. A second answer to the security question is generated, based on the retrieved rules. The first answer is compared with the second answer, and the user is authenticated, based on the first answer matching the second answer. | 2017-06-22 |
20170177882 | SOFTWARE-AS-A-SERVICE REFERENCE PROCESS EXTENSION VERIFICATION FRAMEWORK - The disclosure describes methods, software, and systems, including a method for providing extension points for core process models. Extension points are provided for a core process model associated with a core process. The extension points are pre-defined and annotated with constraints that specify restricted behavior of extensions plugged into the core process model at the extension points. The extension points are formulated in a process extension constraint definition language and allow a restriction of runtime behavior. The process extension constraint definition language is based on temporal logic and enhances existing property specification patterns with specific support to formulate constraints at an extension task type level for activities included in a process extension. Instructions are received from a user to plug selected extensions into an instance of the core process model. Each selected extension includes user-customized behavior for the extension. The instance of the core process model is validated. | 2017-06-22 |
20170177883 | PROVISIONING OF A SHIPPABLE STORAGE DEVICE AND INGESTING DATA FROM THE SHIPPABLE STORAGE DEVICE - When a client requests a data import job, a remote storage service provider provisions a shippable storage device that will be used to transfer client data from the client to the service provider for import. The service provider generates security information for the data import job, provisions the shippable storage device with the security information, and sends the shippable storage device to the client. The service provider also sends client-keys to the client, separate from the shippable storage device (e.g., via a network). The client receives the device, encrypts the client data and keys, transfers the encrypted data and keys onto the device, and ships it back to the service provider. The remote storage service provider authenticates the storage device, decrypts client-generated keys using the client-keys stored at the storage service provider, decrypts the data using the decrypted client-side generated keys, and imports the decrypted data. | 2017-06-22 |
20170177884 | VERIFIED SOCIAL MEDIA CONTENT - In an example, there is disclosed a computing apparatus, comprising: a psychological state data interface to receive psychological state data; one or more logic elements, including at least one hardware element, comprising a verification engine to: receive a requested user action; receive a psychological state input via the psychological state data interface; analyze the psychological state input; and bar the requested user action at least partly responsive to the analyzing. | 2017-06-22 |
20170177885 | FILE FILTER - Method for transferring files to a destination folder on a computer. At least one rule to a transfer of files to a destination folder on a destination computer system are received. A filter file is generated, wherein the filter file includes the least one rule specific to the transfer of files to the destination folder. During transfer of files to the destination folder on the destination computer, attributes of each file are compared to the at least one rule specific to the transfer of files to the destination folder. Upon attributes of a compared file violating a rule of the at least one rule specific to the transfer of files to the destination folder, transfer of the violating file to the destination folder is prevented. | 2017-06-22 |
20170177886 | Digital Rights Management using Geographic and Temporal Traits - Digital rights management using geographic and temporal traits is described. In one or more implementations, a digital medium environment is configured to control access to at least on item of content by digital rights management functionality embedded as part of the content. Data is collected describing geographical traits of a location or temporal traits associated with a request received from the user to access the content. A determination is made from the data using a digital rights management module embedded as part of the content as to whether the geographical or temporal traits meet specified traits of a geographical behavior of a digital rights management policy enforced by the digital rights management module for the at least one item of the content. Responsive to a determination that the specified traits are met, access is permitted to the least one item of the content by the embedded digital rights management module. | 2017-06-22 |
20170177887 | METHOD FOR MANAGING PRIVACY OF DIGITAL IMAGES - A captured digital image is stored in memory together with metadata derived from a location signal only if the location metadata is determined not to be within one or more predefined exclusion zones. A GPS receiver module can be implemented to obtain the location signal. | 2017-06-22 |
20170177888 | SYSTEMS AND METHODS FOR ACCESS CONTROL OVER CHANGING BIG DATA STRUCTURES - A system may receive a query configured to access a column in a data table. The data table may be in a flat file in a big data storage format. The system may detect the language type of the query and validate the query against the syntax of the language type. The system may also validate an access permission for data in the data table. The access permission may be stored in a permissions database. The system may generate a temporary table including the column with the temporary table configured to support the language type. The system may execute the query against the temporary table to generate a query result based on the temporary table as though it were the underlying data table. The system may enforce column-level or row-level access permissions by excluding columns or rows from the temporary table. | 2017-06-22 |
20170177889 | SECURITY OVERLAY FOR MANAGEMENT OF COMPUTER-AIDED DESIGN FILES - Systems and methods presented herein provide a security overlay that provides project-based security to an existing computer-aided design management system that might not natively include project-based security options. The security overlay defines custom objects for projects and roles. Roles can be defined for users for particular projects and stored as mapping data within instances of project custom objects, the instances corresponding to the projects. Implementers of action event triggers can cause an enforcement method within the security overlay to apply the project-based security to various user actions. To identify the project to which an action object (e.g., file) corresponds, the enforcement method can search for an instance of a project custom object within a file path of the action object. | 2017-06-22 |
20170177890 | SYSTEMS, METHODS, AND DEVICES FOR SECURING DATA STORED IN A CLOUD ENVIRONMENT - Devices, systems, and methods for performing particularized encryption of confidential information within real-world data files that are subsequently stored within a cloud environment are described. Specific rules/logic are executed in a local computing environment to identify the type(s) and/or magnitude(s) of confidential information contained within each real-world data file. The identified type(s) and/or magnitude(s) of confidential information is thereafter specifically encrypted using various encryption processes. Once encrypted, the data is packaged and stored within a cloud environment without the need for further encryption at either the local computing or cloud environments. | 2017-06-22 |
20170177891 | SYSTEMS AND METHODS OF SELECTION AND APPROVAL OF MEDIA CONTENT AND APPLICATIONS - Systems and methods of setting restrictions and pre-approval of selected at least one of a media content and an application are provided that include linking a child account to a parent account, where the parent account includes payment information, setting, a risk tolerance for at least one of a media content and an application selected via the child account, receiving a selection for at least one of a media content and an application via the child account, identifying a risk basis value of the selected at least one of the media content and the application for the child account, and approving the selected at least one of the media content and the application for the child account when the identified risk basis value of the at least one of the media content and the application is equal to or less than the set risk tolerance. | 2017-06-22 |
20170177892 | MULTI-DOMAIN APPLICATION EXECUTION MANAGEMENT - An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed. | 2017-06-22 |
20170177893 | PRIORITIZED LINK ESTABLISHMENT FOR DATA TRANSFER USING TASK SCHEDULING - A system and method for scheduling data transfers between systems. One or more data requesting systems may request access to particular data. The request for access to the particular data may correspond to a request that a task to be performed. The task may be to exchange the particular data between a data accessing system having access to the particular data and a data requesting system requesting access to the particular data. The communication exchange may be scheduled for processing. In some embodiments, the communication exchange may be initiated based on a parameter included in the request that the task be performed. | 2017-06-22 |
20170177894 | Electronic Authorization Device - A method is proposed for authorizing use of at least one object, in particular at least one machine, in particular at least one hand-held power tool, in which at least one evaluation unit of an electronic authorization device provides an item of authorization information at least in dependence on at least one item of use-related information. | 2017-06-22 |
20170177895 | IN-SITU CLOUD DATA MANAGEMENT SOLUTION - A data management solution using data management nodes which in turn are connected to one or more data storage entities. Data management nodes receive access requests from software connector components that run in-situ on application or file servers, and store file system meta-data and custom defined meta-data that may include policies and requirements. An object store, which may be accessible via a database, associates said meta-data with files, file systems, users, application servers, file servers, and file data objects. Data objects containing file data are stored on one more of a heterogeneous set of external data storage entities which may be in the cloud. Requirements may be tracked over time by the data management node, and used to optimize data object placement. Data storage entities may be added or removed in a non-disruptive manner. | 2017-06-22 |
20170177896 | Reach Objects - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a row level security. One of the methods includes receiving, by a computer device executing at least part of a functional logic tier of an application, a request from a user for one or more objects present in the functional logic tier. The method includes determining that a type of the requested objects is associated with an object representative of instance level security. The method includes in response to determining that the type is associated with the object, determining access is authorized to at least some of the objects, determining access comprising accessing, by a computer device executing at least part of a data tier of the application, a link data structure that links the user with at least some of the objects. The method also includes providing the at least some of the objects to the user. | 2017-06-22 |
20170177897 | SENSOR SHARING CONTROL - A mechanism is provided for sensor sharing control dynamically. One or more sensor use permissions are received from one or more sensor provider terminals. For each sensor use permission, a sensor use permission is recorded in an authorization policy thereby forming a set of authorization policies. A use request is recorded for sensor use request information received from a sensor user terminal in a request policy. A search is performed for any authorization policy in the set of authorization policies that matches the request policy. Responsive to identifying the authorization policy that matches the request policy, a list of sensors included in the sensor use permissions of an authorization policy that matches the request policy is created. The list of sensors is transmitted to the sensor user terminal, where the search is performed again dynamically when the request policy or one of the set of authorization policies is changed. | 2017-06-22 |
20170177898 | PERSONAL LEDGER BLOCKCHAIN - A system, method, and computer readable storage medium configured for storing encrypted data in a blockchain. To write additional data in a blockchain, a request is received at a computing node. The request is typically cryptographically signed by a user system to include a new transaction with additional data in the blockchain. The additional data is previously encrypted with an encryption key. A new block that records the new transaction with additional data in the blockchain is added. To read the additional data in a blockchain, a request is received at a computing node with a transaction identifier and a decryption key from a user system to access data journaled as part of the blockchain in the transaction database. The transaction database is searched using the identifier. In response, to finding the corresponding block in the blockchain, the data is decrypted using the decryption key. | 2017-06-22 |
20170177899 | ENCRYPTED DATA DEDUPLICATION IN CLOUD STORAGE - There is provided a method of storing data in a cloud storage system, the method including: generating a file identifier for a data file desired to be stored in the cloud storage system; encrypting the file identifier of the data file using a homomorphic encryption technique to produce an encrypted file identifier of the data file; and transmitting the encrypted file identifier to the cloud storage system for performing data deduplication in relation to the cloud storage system with respect to the data file. There is also provided an associated client device and cloud storage system. | 2017-06-22 |
20170177900 | JOINT OWNERSHIP OF PROTECTED INFORMATION - Disclosed herein is a system and method for managing collaborative electronic data that is owned by two different users who belong to different organizations. Both users are also granted ownership rights of collaborative electronic data created by the users. Users then contribute to the collaborative electronic data by providing information that may be confidential to their organization. The users want to ensure that they can cut off access to the confidential information if and when the relationship between the users or organizations sours. When one of the users with ownership privileges decides to end the cooperation with the other users, that user simply revokes access to the collaborative electronic data to the other user. As a result of the revocation all users are no longer able to see or access at least a portion of the collaborative electronic data to protect confidential information of all the parties. | 2017-06-22 |
20170177901 | Data Breach Detection System - The present disclosure deals with a system and a method to determine if an unauthorized user is attempting to access securely stored data. A user enters and stores sensitive data on a user device using a first computing system. The first computing system gathers sensitive data from the user device and stores the data on a second computing system. If the first computing system detects a potential data breach when trying to access the securely stored data, the first computing system may request the user to enter a subset of the securely stored data to confirm that the user has access to the securely stored data. The second computing system verifies the subset against the securely stored data and the securely stored data is made accessible to the user. If the second computing system is unable to verify the subset the second computing system triggers an event. | 2017-06-22 |
20170177902 | BREACH DETECTION-BASED DATA INFLATION - A method and apparatus for deterring exfiltration of data from are provided. In the method and apparatus, it is determined that data is to be inflated. A request for access to data is received and data responsive to the request is retrieved. Spurious data is also generated and provided together with the responsive data in response to the request. | 2017-06-22 |
20170177903 | WEB SESSION SECURITY TECHNIQUES - Web session security techniques which protect displayed sensitive information. In one example embodiment, the method includes setting, by a processor, a timer following a last user action during use of a web application; determining, by the processor, that a threshold time period since the last user action exceeds a predetermined time period; and making, by the processor, displayed sensitive information unreadable. | 2017-06-22 |
20170177904 | SCRUBBER TO REMOVE PERSONALLY IDENTIFIABLE INFORMATION - A personally identifiable information (PII) scrubbing system. The PII scrubbing system surgically scrubs PII form a log based on a scrubber configuration corresponding to the log. The scrubber configuration includes context information about locations and types of PII in the log and rules specifying how to locate and protect the PII. Scrubber configurations are quickly and easily created or modified as scrubbing requirements change or new scenarios are encountered. The flexibility provided by the scrubber configurations allows only the PII to be scrubbed, even from unstructured data, without having to include surrounding data. Many consumers can use the scrubbed data without needed to expose the PII because less non-personal data is obscured. Surgical scrubbing also retains the usefulness of the underlying PII even while protecting the PII. Consumers can correlate the protected PII to locate specific information without having to expose additional PII. | 2017-06-22 |
20170177905 | AUDIENCE-BASED SENSITIVE INFORMATION HANDLING FOR SHARED COLLABORATIVE DOCUMENTS - A method for providing audience-based redaction of sensitive information in an electronic document may include receiving a request from a computing device to access an electronic document, retrieving the electronic document, identifying the user(s) associated with the computing device, determining an access level for each user associated with the computing device, determining the lowest access level for the user(s) associated with the computing device, generating a rendering of the electronic document for display on the computing device based on the lowest access level for the user(s) associated with the computing device, and providing the rendering of the electronic document to the computing device for display. When generating the rendering of the electronic document for display, sensitive information in the electronic document is typically redacted based on the lowest access level for the user(s) associated with the computing device. | 2017-06-22 |
20170177906 | AUDIENCE-BASED SENSITIVE INFORMATION HANDLING FOR SHARED COLLABORATIVE DOCUMENTS - A method for providing audience-based redaction of sensitive information in an electronic document may include receiving a request from a computing device to access an electronic document, retrieving the electronic document, identifying the user(s) associated with the computing device, determining an access level for each user associated with the computing device, determining the lowest access level for the user(s) associated with the computing device, generating a rendering of the electronic document for display on the computing device based on the lowest access level for the user(s) associated with the computing device, and providing the rendering of the electronic document to the computing device for display. When generating the rendering of the electronic document for display, sensitive information in the electronic document is typically redacted based on the lowest access level for the user(s) associated with the computing device. | 2017-06-22 |
20170177907 | SYSTEM AND METHOD TO REDUCE A RISK OF RE-IDENTIFICATION OF TEXT DE-IDENTIFICATION TOOLS - A computer-implemented system and method to reduce re-identification risk of a data set. The method includes the steps of retrieving, via a database-facing communication channel, a data set from a database communicatively coupled to the processor, the data set selected to include patient medical records that meet a predetermined criteria; identifying, by a processor coupled to a memory, direct identifiers in the data set; identifying, by the processor, quasi-identifiers in the data set; calculating, by the processor, a first probability of re-identification from the direct identifiers; calculating, by the processor, a second probability of re-identification from the quasi-direct identifiers; perturbing, by the processor, the data set if one of the first probability or second probability exceeds a respective predetermined threshold, to produce a perturbed data set; and providing, via a user-facing communication channel, the perturbed data set to the requestor. | 2017-06-22 |
20170177908 | INPUT PERIPHERAL DEVICE SECURITY - An input peripheral agent intercepts input commands on a host machine and enforces policy conditions and whitelist conditions before deciding whether to permit the commands to be processed by an operating system of the host or whether to ignore the commands on the host machine. In an embodiment, the policy conditions and whitelist conditions can be dynamically changed by a remote network manager without changing, stopping, and/or restarting the input peripheral agent and/or the host machine. | 2017-06-22 |
20170177909 | METHOD AND APPARATUS FOR PROTECTING A PCI DEVICE CONTROLLER FROM MASQUERADE ATTACKS BY MALWARE - A technique allows for protecting a PCI device controller from a PCI BDF masquerade attack from Ring-0 and Ring-3 malware. The technique may use Virtualization technologies to create guest virtual machines that can use a hypervisor to allocate ACPI information from ACPI tables to a secure VM and using extended page tables (EPT) and VT-d policies to protect the MMIO memory range during illegal runtime events. | 2017-06-22 |
20170177910 | AUTOMATIC MODE DETECTION IN A DUAL OPERATING MODE RFID TAG - A multi-mode, preferably dual mode, radio frequency identification (RFID) tag is adapted for automatic detection of whether a RFID reader located within communication range of the RFID tag is transmitting a continuous wave (CW) or modulated wave types of RF signal, and accordingly, mandating a response from the tag in read-only (RO) mode or read/write (R/W) mode, respectively. The tag includes means for designating one of the RO and R/W operating modes as a default mode of the tag, and for switching the tag from its default mode to its other operating mode, and vice versa, according to a rule for determining the frequency of occurrence of a selected event related to signal type of the reader. A device-implemented method of this automatic detection, and a method of fabricating the tag, are also disclosed. | 2017-06-22 |
20170177911 | RFID Beam Forming System - A multi-protocol, multi-band array antenna system may be used in Radio Frequency Identification (RFID) system reader and sensory networks. The antenna array may include array elements with an integrated low noise amplifier. The system may employ digital beam forming techniques for transmission and steering of a beam to a specific sensor tag or group of tags in a cell. The receive beam forming network is optimized for detecting signals from each sensor tag. Narrow and wideband interferences may be excised by an interference nulling algorithm. Space division multiplexing may be used by the antenna system to enhance system processing capacity. | 2017-06-22 |
20170177912 | SYSTEM FOR, AND METHOD OF, READING RADIO FREQUENCY IDENTIFICATION TAGS IN A CONTROLLED AREA IN REAL TIME WITH AN ENHANCED PERFORMANCE - A radio frequency identification (RFID) tag reading system and method read RFID tags in a controlled area in real time with an enhanced performance. An RFID reader reads a mixed tag population of interesting RFID tags and of uninteresting RFID tags in the controlled area at a read rate. A controller dynamically and continuously monitors the read rate in real time, dynamically selects the interesting RFID tags, or deselects the uninteresting RFID tags, in real time when the read rate is below a reading threshold, and dynamically controls the RFID reader in real time to only read the interesting RFID tags when the read rate is below the reading threshold. | 2017-06-22 |
20170177913 | METHOD FOR STORING TEMPORARY DATA IN A MEMORY OF AN RFID TAG ASSOCIATED WITH A CONSUMABLE OF A LABORATORY INSTRUMENT AND SYSTEM COMPRISING A LABORATORY INSTRUMENT, CONSUMABLE AND RFID TAG - A method for storing temporary data in a memory of a RFID tag associated with a consumable of a laboratory instrument for processing a reagent or biological sample is disclosed. The method comprises providing the RFID tag associated with the consumable. The RFID tag comprises a memory. The memory comprises a user memory configured to store user data and a system memory configured to store system data. The laboratory instrument writes the temporary data into the system memory. The temporary data are associated with a process to be carried out by the laboratory instrument. Further, a system comprising a laboratory instrument for processing a reagent or biological sample, a consumable and a RFID tag associated with the consumable is disclosed. The laboratory instrument is configured to carry out the method. | 2017-06-22 |
20170177914 | DEVICE DETECTING SPATIAL VARIATION OF COMPLEX PERMITTIVITY AND SYSTEM DETECTING PRESENCE/ABSENCE OF ARTICLE - Provided are a device detecting the spatial variation of the complex permittivity and an article presence/absence detection system which are capable of detecting the presence or absence of an article by using a UHF-band RFID tag. A device detecting the spatial variation of the complex permittivity includes an RFID tag, a conductor electrode unit, and a dielectric tag base material. The RFID tag performs communication using an electromagnetic wave in a UHF band. The conductor electrode unit communicates with the RFID tag by using the electromagnetic wave in the UHF band. The dielectric tag base material is provided between the RFID tag and the conductor electrode unit and separates the RFID tag from the electrode unit. | 2017-06-22 |
20170177915 | MONOLITHIC INTEGRATED FOCAL ARRAY PLANE AND APPARATUS EMPLOYING THE ARRAY - An optical information detecting apparatus is formed as an integrated, solid state monolithic structure. The monolithic structure includes a plurality of light sensors disposed on a substrate and electrically isolated from one another, a plurality of light emitting elements disposed on the substrate and electrically isolated from one another, the light sensors being optically isolated from the light emitting elements, and a circuit connected to the light emitting elements to generate light towards a target and connected to the light sensors to detect reflected light from the target, wherein a signal is generated in response to the detected light. The signal is indicative of an optical characteristic of the target. | 2017-06-22 |
20170177916 | WINDOW-RETAINING, PROTECTIVE CAP FOR SCANNING DEVICE - A protective cap for a scanning device is provided that retains a device exit window in a fixed position relative to a scan engine while reducing the likelihood of a collision between the scan engine and the exit window when the scanning device is subjected to mechanical stress. Also provided are scanning devices having such a protective cap. The protective cap includes first, second and third portions. The first portion is coupled with an outwardly-facing surface of the exit window and operates to retain the exit window against a scan engine support. The second portion is coupled with the scan engine support and operates to keep the scan engine at a fixed distance from the exit window. The third portion is coupled with an enclosure for the scanning device and operates to secure the exit window and the scan engine at a fixed position with respect to the enclosure. | 2017-06-22 |
20170177917 | Biometric Cryptography Using Micromachined Ultrasound Transducers - An embodiment includes an ultrasonic sensor system comprising: a backend material stack including a first metal layer between a substrate and a second metal layer with each of the first and second metal layers including a dielectric material; a ultrasonic sensor including a chamber, having a negative air pressure, that is sealed by first and second electrodes coupled to each other with first and second sidewalls; an interconnect, not included in the sensor, in the second metal layer; wherein (a) a first vertical axis intersects the substrate, the chamber, and the first and second electrodes, (b) a second vertical axis intersects the interconnect and the substrate, (c) a first horizontal axis intersects the chamber, the interconnect, and the first and second sidewalls, and (d) the first and second electrodes and the first and second sidewalls each include copper and each are included in the second metal layer. | 2017-06-22 |
20170177918 | ELECTRONIC DEVICE INCLUDING MOVEMENT BASED ARTIFACT REMOVAL AND RELATED METHODS - An electronic device may include a finger biometric sensor that includes an array of electric field sensing pixels and image data output circuitry coupled thereto and capable of outputting image data from a plurality of sub-arrays of the array of electric field sensing pixels and processing circuitry coupled to the image data output circuitry. The processing circuitry is capable of determining movement of a user's finger across the array of electric field sensing pixels by comparing image data from borders of adjacent sub-arrays, the movement causing artifacts in the image data, and, when movement of the user's finger is determined, remove the artifacts from the image data. | 2017-06-22 |
20170177919 | FINGERPRINT IDENTIFICATION DEVICE, ELECTRONIC DEVICE AND FINGERPRINT IDENTIFICATION METHOD - A fingerprint identification device includes a fingerprint identification element configured to identify fingerprint and a capacitive touch sensor configured to continuously detect whether an object is touching the fingerprint identification element. A controller is electrically connected to the fingerprint identification element and the capacitive touch sensor. The controller is configured to control the capacitive touch sensor to stop detecting and the fingerprint identification element to start working when the capacitive touch sensor detects that an object is touching the fingerprint identification element. | 2017-06-22 |
20170177920 | Capacitive Fingerprint Sensor with Quadrature Demodulator and Multiphase Scanning - A fingerprint sensing circuit, system, and method is disclosed. The fingerprint sensor maybe include a plurality of inputs coupled to a plurality of fingerprint sensing electrodes and to an analog front end. The analog front end may be configured to generate at least one digital value in response to a capacitance of at least one of the plurality of fingerprint sensing electrodes. Additionally, the analog front end may include a quadrature demodulation circuit to generate at least one demodulated value for processing by a channel engine. The channel engine may generate a capacitance result value that is based, in part, on the demodulated value and is stored in a memory. | 2017-06-22 |
20170177921 | FINGERPRINT IMAGING SYSTEMS COMPRISING SELF-WETTING ADHESIVE, FILMS AND METHODS - A fingerprint imaging system is described comprising a film including an optically transparent self-wetting adhesive layer adhered to an imaging surface of an electronic optical image sensor. Also described is a method of use of an optical imaging system, and a film and multilayer film suitable for use with a fingerprint imaging system. | 2017-06-22 |
20170177922 | FINGERPRINT SENSOR AND ELECTRONIC DEVICE HAVING THE SAME - Provided is a fingerprint sensor. The fingerprint sensor according to an embodiment of the inventive concept includes a plurality of transmission lines, a plurality of receive lines, and a sensor array including sensor units connected to the plurality of transmission lines. Each of the sensor units includes a switch transistor having a gate terminal and one terminal, which are commonly connected to a corresponding transmission line of the plurality of transmission lines and a sensor transistor connected between the other end of the switch transistor and a corresponding receive line of the plurality of receive lines. The sensor transistor performs a current suppression on in response to a voltage of a virtual gate that is touched by a fingerprint. | 2017-06-22 |
20170177923 | INTELLIGENT SYSTEMS CAPABLE OF AUTOMATIC LOCALIZATION AND METHODS USING THE SAME - Intelligent systems capable of automatic localization and methods using the same are disclosed. An intelligent system includes an intelligent robot and a plurality of face recognition devices each in a wireless connection with the intelligent robot. Each face recognition device is disposed at the entrance of a room, and is configured to identify face information of people in the room and transmit the face information to the intelligent robot. The intelligent robot thus updates a database according to the face information and automatically identifies a location of a subject to be served based on the database. Thus, the present disclosure can automatically identify the location of the subject to be served. | 2017-06-22 |
20170177924 | ATTRIBUTE FACTOR ANALYSIS METHOD, DEVICE, AND PROGRAM - This invention relates to an attribute factor analysis method, which is a method of analyzing a factor of an attribute based on a training sample set including training samples each being a combination of reference image data and attribute data associated with the reference image data. The attribute factor analysis method includes: a division step of dividing an image region of the reference image data constituting each training sample of the training sample set into parts of a predetermined sample size in a mesh shape; a model construction step of constructing a regression model by performing sparse regression analysis for each of the parts based on the reference sample set; a dependency calculation step of calculating, with use of the regression model, for each training sample of the training sample set, a dependency between an explanatory variable representing a feature quantity of reference image data on each part and an objective variable representing the attribute data, to obtain an attribute factor analyzed result; and a visualization step of visualizing the attribute factor analyzed result to produce the visualized attribute factor analyzed result. | 2017-06-22 |
20170177925 | UNMANNED AERIAL VEHICLE WITH BIOMETRIC VERIFICATION - Disclosed herein are system, method, and computer program product embodiments for locating, identifying, and tracking a known criminal, fugitive, missing person, and/or any other person of interest. An embodiment operates by deploying an unmanned aerial vehicle, determining the mode of operation of the UAV, operating the UAV in accordance with the mode of operation of the UAV, determining whether a subject has been detected, capturing a first voice sample associated with the subject, authenticating the identity of the subject, and transmitting the GPS location of the unmanned aerial vehicle to a computing device. | 2017-06-22 |
20170177926 | IMAGE PROCESSING DEVICE, IMAGE PROCESSING METHOD AND MEDIUM - A control unit | 2017-06-22 |
20170177927 | IMPRESSION ANALYSIS DEVICE, GAME DEVICE, HEALTH MANAGEMENT DEVICE, ADVERTISING SUPPORT DEVICE, IMPRESSION ANALYSIS SYSTEM, IMPRESSION ANALYSIS METHOD, AND PROGRAM RECORDING MEDIUM - Provided are: an impression analysis device with which it is possible to easily obtain a facial image evaluation of a person being evaluated; a game device; a health management device; an impression analysis system; an impression analysis method; a program; and a program recording medium. This impression analysis device ( | 2017-06-22 |
20170177928 | SENTIMENT ANALYSIS IN A VIDEO CONFERENCE - In an approach, a computer determines based, at least in part, on a video of an attendee of a video conference, a first sentiment of the attendee wherein the first sentiment includes at least a sentiment from a sentiment analysis of one or more facial expressions of the attendee and a sentiment from a sentiment analysis of a plurality of the attendee's spoken words. The approach includes a computer receiving an indication of an attendee activity in at least a first application in computing devices accessed by the attendee and determining whether the first sentiment of the attendee is related to the video conference based, in part, on the attendee activity in at least the first application. Responsive to determining that the first sentiment of the attendee is not related to the video conference, the computer discards the first sentiment that is unrelated to the video conference. | 2017-06-22 |
20170177929 | CROWD GESTURE RECOGNITION - Various systems and methods for implementing crowd gesture recognition are described herein. A system for implementing crowd gesture recognition includes an accelerometer; a gyrometer; a gesture detection circuit to: detect an air gesture performed by a user of the system based on data from the accelerometer and gyrometer; and parameterize an intensity of the air gesture; a processor subsystem to determine a transmission frequency band and a transmission strength based on the air gesture and the intensity of the air gesture; and a transducer to transmit a signal on the transmission frequency band with the transmission strength. | 2017-06-22 |
20170177930 | Jump Shot and Athletic Activity Analysis System - Techniques where a computer or mobile device performs video analysis of a person performing a physical activity such as a basketball jump shot are described. The computer or mobile device performs video analysis based on one or more reference skeletons. The reference skeleton may be superimposed over captured video of the person performing the physical activity or compared to a generated player skeleton based on the captured video to determine derivation from the reference skeleton in the physical activity performed by the person. | 2017-06-22 |
20170177931 | WRITING BOARD DETECTION AND CORRECTION - A method for image processing, including: obtaining an image including a writing board and a background external to the writing board; detecting a plurality of lines within the image; determining, based on the plurality of lines, a plurality of corners of the writing board within the image; and correcting a perspective of the writing board by applying a transformation to the image based on the plurality of corners. | 2017-06-22 |
20170177932 | METHOD AND DEVICE FOR CAPTURING A DOCUMENT - A method and device for capturing a positionally corrected image of a document is disclosed. The method comprises the steps of: obtaining a two-dimensional image of the document with a mobile terminal apparatus; performing edge detection within the two-dimensional image to identify edges of the document; determining angles between detected edges; calculating, based on the detected edges and the angles determined, a three-dimensional position of the document relative to a position of the mobile terminal apparatus; calculating correction information to correct, by relative movement, the position of the document relative to the position of the mobile terminal apparatus; providing first guidance information derived from the correction information to a user of the mobile terminal apparatus, guiding the user to perform the relative movement; and capturing a positionally corrected image of the document. Thereby, the document can be captured with a quality sufficient to permit Optical Character Recognition (OCR). | 2017-06-22 |
20170177933 | METHOD AND APPARATUS FOR UPDATING ROAD MAP GEOMETRY BASED ON RECEIVED PROBE DATA - A method is provided for generating and revising map geometry based on a received image and probe data. A method may include: receiving probe data from a first period of time, where the probe data from a first period of time is from a plurality of probes within a predefined geographic region; generating a first image of the predefined geographic region based on the probe data from the first period of time; receiving probe data from a second period of time different from the first period of time, where the probe data from the second period of time is from a plurality of probes within the predefined geographic region; generating a second image based on the probe data from the second period of time; comparing the first image to the second image; and generating a revised route geometry based on changes detected between the first image and the second image. | 2017-06-22 |
20170177934 | FINGERPRINT DETECTION APPARATUS AND METHOD - A fingerprint detection apparatus and a fingerprint detection method employ a collection module and a processing module. The collection module is configured to collect fingerprint information and generate a fingerprint detection signal. The processing module is configured to process the fingerprint detection signal and generate fingerprint image data, and includes a frequency mixer. The frequency mixer is configured to perform quadrature mixing and low pass filtering on the fingerprint detection signal, and to convert an alternating current signal of the fingerprint detection signal into a direct current signal. Therefore, the bandwidth of the fingerprint detection signal can be decreased, noises in the fingerprint detection signal can be filtered out, the signal to noise ratio can be improved, the fingerprint detection sensitivity can be enhanced, and the anti-interference capacity can be increased, so that the adaptability of the fingerprint detecting apparatus to an application environment can be improved. | 2017-06-22 |
20170177935 | MIRROR ASSEMBLY INCORPORATING A SCANNING APPARATUS - The disclosure provides for a scanning apparatus. The scanning apparatus may be disposed in a vehicle mirror assembly. The mirror assembly comprises an electrochromic element comprising a first substrate comprising a first surface and a second surface, and a second substrate comprising a third surface and a fourth surface. The mirror assembly further comprises an image sensor directed toward the fourth surface and configured to capture image data of an object through the electrochromic element. A light source is disposed proximate the fourth surface and configured to transmit an emission through the electrochromic element. The image sensor is configured to capture the image data to identify at least one passenger of the vehicle. | 2017-06-22 |
20170177936 | REFLECTED OPTIC CAMERA MODULE FOR IRIS RECOGNITION IN A COMPUTING DEVICE - The present disclosure describes systems and methods for acquiring iris biometric data. An optical entrance of an optical medium may receive a ray incident on the optical entrance, the ray comprising biometric data. An interface of the optical medium with a second medium may receive the received ray at a first angle greater than a critical angle of the interface to enable total internal reflection of the received incident ray. A reflective coating, prism or other mechanism may be used in place of the interface to redirect the received ray or bend the optical path of the received ray. An optical exit of the optical medium may couple the reflected or redirected ray to a sensor for acquiring the biometric data. The ray may be incident on the optical entrance at a second angle relative to an axis of the sensor that is less than 90 degrees. | 2017-06-22 |
20170177937 | SYSTEMS AND METHODS FOR DYNAMIC OBJECT TRACKING USING A SINGLE CAMERA MOUNTED ON A MOVING OBJECT - A self-contained, low-cost, low-weight guidance system for vehicles is provided. The guidance system can include an optical camera, a case, a processor, a connection between the processor and an on-board control system, and computer algorithms running on the processor. The guidance system can be integrated with a vehicle control system through “plug and play” functionality or a more open Software Development Kit. The computer algorithms re-create 3D structures as the vehicle travels and continuously updates a 3D model of the environment. The guidance system continuously identifies and tracks terrain, static objects, and dynamic objects through real-time camera images. The guidance system can receive inputs from the camera and the onboard control system. The guidance system can be used to assist vehicle navigation and to avoid possible collisions. The guidance system can communicate with the control system and provide navigational direction to the control system. | 2017-06-22 |
20170177938 | AUTOMATED DETECTION OF NITROGEN DEFICIENCY IN CROP - Pixel color values representing an image of a portion of a field are received where each pixel color value has a respective position within the image. A processor identifies groups of the received pixel color values as possibly representing a Nitrogen-deficient plant leaf. For each group of pixel color values, the processor converts the pixel color values into feature values that describe a shape and the processor uses the feature values describing the shape to determine whether the group of pixel color values represents a Nitrogen-deficient leaf of a plant. The processor stores in memory an indication that the portion of the field is deficient in Nitrogen based on the groups of pixel color values determined to represent a respective Nitrogen-deficient leaf. | 2017-06-22 |
20170177939 | METHODS AND SYSTEMS FOR MARKER IDENTIFICATION - A marker tracking system configured to detect light patterns (e.g., infrared light patterns) generated by one or more markers is described. A given marker is configured with a code which identifies the marker in a motion tracking camera field of view. Motion tracking camera(s) record the emitted infrared light and are configured to directly, or in conjunction with an associated computing device, computationally distinguish a given marker with high accuracy and efficiently. | 2017-06-22 |
20170177940 | METHOD FOR DISPLAYING STATUS OF POWER CONSUMPTION AND PORTABLE DEVICE THEREOF - A method and apparatus are provided for displaying electricity use status. The method comprising identifying at least one electronic appliance in an image on a screen captured through a camera; determining the electricity use status of the at least one electronic appliance; and displaying one of a plurality of Graphical User Interfaces (GUIs). Each of the GUIs corresponds to a stage of the electricity use status of the at least one electronic appliance. | 2017-06-22 |
20170177941 | THREAT IDENTIFICATION SYSTEM - A head mounted device (HMD) includes a transparent display, sensors to generate sensor data, and a processor. The processor identifies a threat condition based on a threat pattern and the sensor data, and generates a warning notification in response to the identified threat condition. The threat pattern includes preconfigured thresholds for the sensor data. The HMD displays AR content comprising the warning notification in the transparent display. | 2017-06-22 |
20170177942 | EVENT-BASED IMAGE MANAGEMENT USING CLUSTERING - Managing a plurality of images may include generating, using a processor, clusters of images from a plurality of images having locations and timestamps. The clusters may represent events and may be generated according to a distance metric based upon geographic distance and time difference between consecutive pairs of the plurality of images sorted according to time. Selected clusters may be merged, using the processor, into a merged cluster representing a trip based upon geographic distance between the clusters and unique dates within the clusters. The plurality of images may be displayed, using the processor, organized according to the trip. | 2017-06-22 |
20170177943 | IMAGING SYSTEM AND METHOD FOR CLASSIFYING A CONCEPT TYPE IN VIDEO - A method and associated imaging system for classifying at least one concept type in a video segment is disclosed. The method associates an object concept type in the video segment with a spatio-temporal segment of the video segment. The method then associates a plurality of action concept types with the spatio-temporal segment, where each action concept type of the plurality of action concept types is associated with a subset of the spatio-temporal segment associated with the object concept type. The method then classifies the action concept types and the object concept types associated with the video segment using a conditional Markov random field (CRF) model where the CRF model is structured with the plurality of action concept types being independent and indirectly linked via a global concept type assigned to the video segment, and the object concept type is linked to the global concept type. | 2017-06-22 |
20170177944 | VIDEO GUIDANCE FOR SMART-HOME DEVICE INSTALLATION - Various arrangements for assessing an installation of a smart home device are presented. A video camera device may capture video indicative of a location of the smart home device. The video indicative of the location of the smart home device may be analyzed to determine whether the location of the smart home device prevents the smart home device from operating within specification. An indication may then be output indicative of whether the location of the smart home device prevents the smart home device from operating within specification. | 2017-06-22 |
20170177945 | METHOD FOR VIDEO MONITORING - The invention relates to a method for monitoring a monitored region ( | 2017-06-22 |
20170177946 | METHOD, DEVICE, AND COMPUTER PROGRAM FOR RE-IDENTIFICATION OF OBJECTS IN IMAGES OBTAINED FROM A PLURALITY OF CAMERAS - The present invention relates in particular to a method for re-identification of a target object in images obtained from several image sources, wherein each of the image sources obtains images representing an area associated with the corresponding image source. After having identified a target object in images obtained from one of a pair of image sources, a relative velocity of the target object in comparison with other objects previously identified in images obtained from the one of the pair of image sources is estimated. Then, based on the estimated relative velocity of the target object, a correspondence between the target object identified in images obtained from the one of the pair of image sources and a candidate object represented in images obtained from the other image source of the pair of image sources is established. | 2017-06-22 |
20170177947 | METHODS, DEVICES AND COMPUTER PROGRAMS FOR TRACKING TARGETS USING INDEPENDENT TRACKING MODULES ASSOCIATED WITH CAMERAS - The present invention relates to determining a trajectory of a target from two streams of images obtained from two sources of images, a sub-image of each of the images of the two streams of images representing an overlapping area of a real scene. After having obtained a target path for each of a plurality of targets, from images of the sources of images, for each of the two streams of images, each target path being obtained from a target tracker associated with a source of image, each of the obtained target paths is split into a plurality of target path portions as a function of each potential target switch along the obtained target path. Then, the trajectory is generated as a function of a plurality of the target path portions. | 2017-06-22 |
20170177948 | METHODS AND APPARATUS TO COUNT PEOPLE IN IMAGES - Methods and apparatus to determine a blob people count in images are disclosed. An example method includes forming blobs based on whitened pixels of detected face rectangles in pairs of frames of a plurality of image frame captured over a period of time. The method further calculates locations of the centers of the blobs in each frame of the first one of the pairs of frames. The method further eliminates blobs in a first frame of the first one of the pairs of frames having locations within one or more blobs in the second frame of the first one of the pairs of frames. The method further adds the number of remaining blobs from the first frame to the number of blobs in the second frame of the first one of the pairs of frames to form a blob people count. | 2017-06-22 |
20170177949 | TRAILER TYPE IDENTIFICATION SYSTEM - A trailer type identification system is provided herein. The system includes an imaging device for capturing images of a trailer connected to a vehicle, and a controller for analyzing the captured. The controller identifies vehicle and trailer contours, predicts a trailer type based on detection of a connection between the identified vehicle and trailer contours, and validates the prediction if the identified trailer contour exhibits motion during a vehicle turn event. | 2017-06-22 |
20170177950 | METHOD AND DEVICE FOR CREATING A MAP - A method and devices for creating a map, including the following method steps: recording at least two driving environment data sets; these at least two driving environment data sets representing the driving environment of at least one vehicle; evaluating the at least two driving environment data sets; creating at least two map segments; transmitting the at least two evaluated driving environment data sets and the at least two map segments; receiving the at least two evaluated driving environment data sets and the at least two map segments; and creating a map from the at least two evaluated driving environment data sets and the at least two map segments. | 2017-06-22 |
20170177951 | Lane Detection System And Method - A lane detection system includes a non-volatile memory storing machine-readable instructions and an image processor capable of receiving a road image. The image processor, when executing the machine-readable instructions, is capable of: (i) processing the road image to identify a lane candidate within a lane-existing region of the road image, the lane-existing region having (a) a near subregion including an imaged road region nearer to the vehicle and (b) a far subregion including an imaged road region farther from the vehicle, (ii) verifying the lane candidate as a true lane candidate when a minimum distance between (a) a line fit to a portion of the lane candidate in the near subregion and (b) a predetermined reference point in the road image is less than a neighborhood distance; and (iii) extending the true lane candidate into the far subregion to form a detected lane marker demarcating the lane marker. | 2017-06-22 |
20170177952 | INFORMATION CALCULATION DEVICE - An information calculation device includes an ECU configured to specify right and left lane marker candidate points based on edge points in the captured image, and configured to, when two edge points satisfying separation conditions are included in each of the right and left lane marker candidate points, calculates a lateral position of the vehicle, a pitch angle, a yaw angle, a lane width of a traveling lane, a curvature, and a curvature change rate by Kalman filter processing. The ECU is configured to calculate the pitch angle to be zero and the lane width to be a predetermined value when the two edge points satisfying the separation conditions are included in one of the right and left lane marker candidate points and no edge point is included in the other lane marker candidate points. | 2017-06-22 |
20170177953 | BARRIER AND GUARDRAIL DETECTION USING A SINGLE CAMERA - Driver assistance systems for detecting a structural barrier extending along a road. The driver assistance system may be mountable in a host vehicle. The camera may capture multiple image frames in the forward field of view of the camera. A processor may process motion of images of the barrier in the image frames. The camera may be a single camera. The motion of the images may be responsive to forward motion of the host vehicle and/or the motion of the images may be responsive to lateral motion of the host vehicle. | 2017-06-22 |
20170177954 | Virtual Sensor Data Generation For Wheel Stop Detection - The disclosure relates to methods, systems, and apparatuses for virtual sensor data generation and more particularly relates to generation of virtual sensor data for training and testing models or algorithms to detect objects or obstacles, such as wheel stops or parking barriers. A method for generating virtual sensor data includes simulating a three-dimensional (3D) environment comprising one or more objects. The method includes generating virtual sensor data for a plurality of positions of one or more sensors within the 3D environment. The method includes determining virtual ground truth corresponding to each of the plurality of positions, wherein the ground truth includes information about at least one object within the virtual sensor data. The method also includes storing and associating the virtual sensor data and the virtual ground truth. | 2017-06-22 |
20170177955 | IMAGE PROCESSING DEVICE, DEVICE CONTROL SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM - An image processing device includes a range image acquiring unit configured to acquire a range image; a situation recognizer configured to recognize an external situation indicating a situation of an imaging area corresponding to the range image; and a target recognizer configured to recognize a recognition target from the range image by a recognition method based on a recognition result of the situation recognizer. | 2017-06-22 |
20170177956 | DETECTION APPARATUS AND METHOD FOR PARKING SPACE, AND IMAGE PROCESSING DEVICE - A detection apparatus and method for parking space detection and an image processing device where the detection method includes: performing conversion on a side-view image that is photographed on the parking space and is acquired from a camera, to obtain a top-view image including said parking space; acquiring an edge image including a plurality of edges based on gradient information of said top-view image; performing conversion on said edge image and obtains a voting vector according to said gradient information, and determining marking lines according to peak values of said voting vector; and determining one or more parking spaces based on a plurality of said marking lines. | 2017-06-22 |
20170177957 | SIGN INFORMATION DISPLAY SYSTEM AND METHOD - If a first sign information detector | 2017-06-22 |
20170177958 | Target Detection Apparatus and Target Detection Method - A target detection apparatus acquires an image by imaging the surroundings of a vehicle, detects a self-position of the vehicle based on an amount of movement of the vehicle from an initial position thereof, and estimates a relative position of a target, located around the vehicle, with respect to the vehicle based on the self-position and information on a position of the target on a map. The target detection apparatus sets a detection area for the target within the image based on the relative position of the target with respect to the vehicle, and detects the target from the detection area. The target detection apparatus estimates error contained in the self-position based on the amount of movement of the vehicle from the initial position, and adjusts the size of the detection area for the target according to the error. | 2017-06-22 |
20170177959 | METHOD FOR OUTPUTTING A DROWSINESS WARNING AND CONTROL UNIT - A method for outputting a drowsiness warning. In this method, a degree of drowsiness of a driver of a vehicle is initially read in. A display signal is subsequently generated as a function of the degree of drowsiness. The display signal includes a sequence of images as the drowsiness warning displayable via a display device of the vehicle and including at least one eye area of the driver. | 2017-06-22 |
20170177960 | METHOD FOR DETECTING FRAUD TO AUTHENTICATE A FINGER - A method for detecting fraud to authenticate a finger | 2017-06-22 |
20170177961 | BIOMETRIC IDENTIFICATION METHOD AND DEVICE USING ONE - A biometric identification method includes the steps of comparing a candidate print with a reference print and of validating the identification according to a certain number of characteristics common to both prints and a predetermined validation threshold. The method includes the steps of creating at least one deceiving print and comparing same with a candidate print. An identification device designed for implementing this method is also provided. | 2017-06-22 |
20170177962 | IMAGE RECORDING DEVICE, IMAGE DEFECT DETECTION DEVICE, AND IMAGE DEFECT DETECTION METHOD - An image defect detection device that divides an original print image and a print image printed on the basis of the original print image into corresponding regions, acquires an image feature amount of each divided region, extracts a strength of a difference of each divided region between the original print image and the print image, calculates an image defect detection time indicating a time required to detect a defect of each divided region of the print image from the image feature amount and the strength of the difference of each divided region, calculates an expected image defect value indicating a possibility of presence of a defect in each divided region of the print image from the image feature amount and the strength of the difference of each divided region, determines an order of detection of the image defect of the divided region of the print image. | 2017-06-22 |
20170177963 | ARTICLES CAPABLE OF USE IN ALPR SYSTEMS - The present disclosure relates to optically active sheeting and/or license plates, methods of making and using these; and systems in which these can be used. | 2017-06-22 |
20170177964 | OPTICAL INSPECTION SYSTEM AND OPTICAL INSPECTION METHOD THEREOF - According to embodiments of the disclosure, an optical inspection system and an optical inspection method thereof are provided. The optical inspection system may include a lens group, a light source and a lens controlling module. The light source is configured to illuminate an object. The lens group is configured to project the light from the light source as a collimated rectangular shaped light. The lens controlling module is configured to switch the lens group for changing an irradiance of the collimated rectangular shaped light and adjusting an illuminated area of the collimated rectangular shaped light on an object surface of the object. | 2017-06-22 |