29th week of 2015 patent applcation highlights part 36 |
Patent application number | Title | Published |
20150199501 | System and Method for Creating a Core Cognitive Fingerprint - A system and method for creating a core cognitive fingerprint are provided. A core cognitive fingerprint can be used to capture and summarize the evolution of a system state and potentially respond with a predetermined action if the fingerprint falls within a defined threshold. The method includes: identifying a set of time frames, each time frame corresponding to a respective data source, within which data is extracted; providing a plurality of pattern recognizers each having an assigned heuristic specific to a type of content; processing the extracted data through the plurality of pattern recognizers to generate an initial set of elements, each element corresponding to the output of the heuristic assigned to each pattern recognizer; extracting identified relationships amongst the initial set of elements; modifying the initial set of elements to include the identified relationships to create an intermediate set of elements; comparing the intermediate set of elements against assigned values to emphasize or deemphasize each element in the intermediate set of elements to create a final set of elements; and using the final set of elements as a cognitive fingerprint representing a signature of the data extracted from the time frame, so that the signature can be compared to other cognitive fingerprints for further analysis. | 2015-07-16 |
20150199502 | Image Authenticity Verification Using Speech - Verifying the identity of a person claiming to be represented by a picture by way of providing a string of text (randomly generated or generated by another person seeking verification of same) to be recited by the claimant. The string of text is recited in a video which is received by an intermediary server at a network node, or by a person seeking such verification. Automated processes may be utilized to compare the audio and video received to the picture and string of text sent. Further, comparisons to previously received audio, video, and strings of text, as well as the same available from third parties, may be used to determine fraud attempts. Viewers of the person's profile may also vote on the authenticity of a profile, thereby raising or lowering a certification confidence level, with their votes weighted more heavily towards those who have high confidence levels. | 2015-07-16 |
20150199503 | METHOD AND APPARATUS FOR PROVIDING SECURITY WITH A MULTI-FUNCTION PHYSICAL DIAL OF A COMMUNICATION DEVICE - A method, apparatus and computer program product are provided to facilitate controlled access to a communication device in accordance with predefined security levels in an independent manner that does not require a network connection. In the context of a method, a combination lock code is associated with a predefined security level for the communication device. The method also includes receiving input indicative of rotation of a multi-function physical dial carried by the communication device. The method also determines whether the input corresponds to the combination lock code and, in an instance in which the input does correspond to the combination lock code, permits access to the communication device in a manner consistent with the predefined security level. | 2015-07-16 |
20150199504 | MULTI-TOUCH LOCAL DEVICE AUTHENTICATION - An embodiment provides a method, including: detecting, at a touch sensitive surface of an information handling device, user input including at least one multi-touch input; said detecting comprising detecting two or more substantially simultaneous user inputs to the touch sensitive surface; associating, using a processor, a number with the at least one multi-touch input; determining, using the processor, if the user input matches expected user input; and responsive to determining a match, authenticating a user. Other embodiments are described and claimed. | 2015-07-16 |
20150199505 | Obscuring Usernames During a Login Process - In general, the subject matter described in this document can be embodied in methods, systems, and program products. A computing system receives a token that was specified during a process for logging into an account. The computing system determines whether the token matches any of a plurality of tokens that are assigned to a respective plurality of accounts. The computing system identifies, in response to determining that the token matches a particular token that is assigned to a particular one of the plurality of accounts, a username for the particular one of the plurality of accounts. The computing system provides information to cause a computer display to present the username and multiple other usernames in an obscured manner. The computing system receives an indication that user input selected the username. The computing system receives a password. The computing system provides authorization to log into the account. | 2015-07-16 |
20150199506 | POLICY UPDATE SYSTEM AND POLICY UPDATE APPARATUS - According to one embodiment, a policy update system includes a server apparatus configured to be able to provide a plurality of services to a user, the server apparatus including storage device for storing a first user ID; a policy storage device configured to store a plurality of policies, each policy being composed of condition describing user attribute information in which a plurality of items including a second user ID corresponding to the first user ID are associated, and each policy specifying a use privilege of each service; a policy update apparatus configured to be able to update each stored policy; and a user attribute information storage device configured to store post-change user attribute information, and a change content for each second user ID. | 2015-07-16 |
20150199507 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIUM FOR ACTIVE MONITORING, MEMORY PROTECTION AND INTEGRITY VERIFICATION OF TARGET DEVICES - Methods, systems, and computer readable media for active monitoring, memory protection, and integrity verification of a target device are disclosed. For example, a normal world virtual processor and a secure world virtual processor are instantiated on a target device. A target operating system is executed on the normal world virtual processor. An integrity verification agent is executed on the secure world virtual processor. One or more predetermined operations attempted on the normal world virtual processor are trapped to the secure world virtual processor. The integrity verification agent is used to determine the effect of the execution of the trapped operations on the target device. | 2015-07-16 |
20150199508 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, MONITORING DEVICE, MONITORING METHOD - An information processing system in which a monitoring device can detect illegal and/or abnormal operations in a system to be monitored, without using detailed information of the system, is provided. In a target device | 2015-07-16 |
20150199509 | DATA PROCESSING DEVICE, METHOD FOR EXECUTING AN APPLICATION AND COMPUTER PROGRAM PRODUCT - There is disclosed a data processing device for executing an application, the data processing device comprising a processing unit for controlling access to at least one user interface comprised in the data processing device, and a secure element for facilitating secure execution of the application, wherein executing the application comprises receiving input data from and/or sending output data to the user interface, and wherein the secure element is arranged to cause the processing unit to restrict the access to the user interface during execution of the application. Furthermore, a corresponding method for executing an application and a corresponding computer program product are disclosed. | 2015-07-16 |
20150199510 | FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS - Methods, systems, and machine-readable storage medium are described wherein, in one embodiment, identifiers, such as bookmarks, are used to allow access to files or folders in a sandboxed environment. One or more applications are restricted by an access control system, which can be, for example, a trusted software component of an operating system. In one embodiment, the bookmarks or other identifiers allow an application to have access to a file even if the file is renamed or moved by a user while the application has been terminated. In one embodiment, a resource manager, or other trusted access control system, can interact with an application to allow for the use of bookmarks in an environment in which a sandbox application controls access to the files such that each application must make a request to the sandbox application in order to obtain access to a particular file or folder. | 2015-07-16 |
20150199511 | CHANGE CONVERGENCE RISK PLANNING AND AVOIDANCE - Disclosed is a change convergence risk mitigation system. The change convergence risk mitigation system typically includes a processor, a memory, and a risk mitigation module stored in the memory. The change convergence risk mitigation system is typically configured for: receiving information associated with a plurality of events; determining an event risk score for each of the plurality of events; aggregating the event risk scores of the plurality of events and, based on the event risk scores, determining a risk level for each of the plurality of time periods; identifying a risk mitigation event; determining a risk mitigation time period from the plurality of time periods such that the risk mitigation time period would not have a predefined level if the risk mitigation event occurred during the risk mitigation time period; and providing a recommendation that the risk mitigation event occur during the risk mitigation time period. | 2015-07-16 |
20150199512 | APPARATUS AND METHOD FOR DETECTING ABNORMAL BEHAVIOR - Provided are abnormal behavior detecting apparatus and method and the abnormal behavior detecting apparatus, includes: a behavior analyzing unit which analyzes a behavior which occurs for resources of a system based on data collected from a process while the process is executed on the system; a behavior modeling unit which models a behavior analysis result for the resources of the system on a coordinate which is generated based on the behavior for the resources of the system to create a process behavior model corresponding to the resources of the system; a suspicious behavior determining unit which determines a suspicious behavior of the process in accordance with the type of the process behavior model which is implemented on the coordinate; and a process detecting unit which detects a process in which the suspicious behavior occurs as an abnormal behavior process. | 2015-07-16 |
20150199513 | THREAT-AWARE MICROVISOR - A threat-aware microvisor is configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing on a node of a network environment. The microvisor may be embodied as a module disposed or layered beneath (underlying) an operating system kernel executing on the node to thereby control privileges (i.e., access permissions) to kernel resources, such as one or more central processing units (CPUs), network interfaces, memory, and/or devices, of the node. Illustratively, the microvisor may be configured to control access to one or more of the resources in response to a request by an operating system process to access the resource. | 2015-07-16 |
20150199514 | Computer Security Systems And Methods Using Virtualization Exceptions - Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A hypervisor exposes a virtual machine on the host system. In some embodiments, the hypervisor further configures a processor of the host system to generate a virtualization exception in response to detecting a memory access violation, and to deliver such exceptions to a computer security program operating within the virtual machine. The hypervisor may further set access permissions to a section of memory containing a part of a function targeted for hooking, so that an attempt to execute the respective target function triggers a virtualization exception. Some embodiments thus achieve hooking of the target function without resorting to conventional methods, such as patching, inline hooking, and MSR hooking. | 2015-07-16 |
20150199515 | EVALUATING APPLICATION INTEGRITY - Methods, systems, computer-readable media, and apparatuses for evaluating application integrity are presented. In one or more embodiments, an application store, which may be provided by one or more computing devices, may analyze one or more aspects of an application. Subsequently, the application store may determine, based on the one or more analyzed aspects of the application, an integrity score for the application. Based on the integrity score, the application store may determine whether to publish the application in the application store. In response to determining to publish the application in the application store, the application store then may publish the application in the application store. Alternatively, in response to determining not to publish the application in the application store, the application store may generate a notification indicating that the application has an insufficient integrity score. | 2015-07-16 |
20150199516 | EXECUTION PROFILE ASSEMBLY USING BRANCH RECORDS - Technologies for assembling an execution profile of an event are disclosed. The system and method may include recording a plurality of branch records, generating a first test event substantially identical to the event, verifying legitimacy of an owner of a code segment associated with the event, establishing an initial point of an execution chain associated with the event, establishing a final point of the execution chain associated with the event, analyzing branch records for an address associated with the code segment, installing a plurality of primary monitors within the execution chain associated with the event, and triggering the plurality of primary monitors. | 2015-07-16 |
20150199517 | UNIVERSAL EXTENSIBLE FIRMWARE INTERFACE MODULE IDENTIFICATION AND ANALYSIS - The present disclosure provides a network architecture and verification platform for analyzing the various modules of a Unified Extensible Firmware Interface (UEFI) firmware image. In one embodiment, the disclosed network architecture and verification platform obtains various UEFI firmware images, such as UEFI firmware image residing on a client device or a UEFI firmware image hosted by a hardware manufacturer. The network architecture and verification platform may then segregate the various UEFI firmware modules that make up the UEFI firmware image, and subject the modules to different types of analysis. By analyzing the UEFI firmware modules individually, the network architecture and verification platform builds a repository of Globally Unique Identifiers (GUIDs) referenced by a given UEFI firmware module, which may then be referenced in future analyses to determine whether any changes, and the extent of such changes, have been made to an updated version of the given UEFI firmware module. | 2015-07-16 |
20150199518 | IMAGE FORMING APPARATUS THAT PERFORMS UPDATE OF FIRMWARE, AND CONTROL METHOD THEREFOR - An image forming apparatus which is capable of properly updating firmware. Update firmware is downloaded into a download area of an HDD and expanded and stored in a temporary expansion area of the HDD. A CPU determines whether or not the update firmware expanded and stored in the temporary expansion area has been tampered with. The update firmware stored in the temporary storage area is applied to the image forming apparatus when the CPU determines that the update firmware has not been tampered with. | 2015-07-16 |
20150199519 | MANAGING FIRMWARE UPDATE ATTEMPTS - Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure counter for each update or update attempt. The value of the counter can be determined every time the validity of the firmware is confirmed, and this value can be stored to a secure location. At subsequent times, such as during a boot process, the actual value of the counter can be determined and compared with the expected value. If the values do not match, such that the firmware may be in an unexpected state, an action can be taken, such as to prevent access to, or isolate, the hardware until such time as the firmware can be validated or updated to an expected state. | 2015-07-16 |
20150199520 | MEDIATED SECURE BOOT FOR SINGLE OR MULTICORE PROCESSORS - A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented, wherein upon power-on-reset, the first boot step uses a secure boot device comprising of a programmable device or an FPGA which boots up first, validates its configuration file and then validates the processor(s) configuration data before presenting the configuration data to the processor(s). This enables validation of ‘pre-boot’ information, such as the Reset Control Word and pre-boot processor configuration data. The second and third boot steps validate the internal secure boot code and external boot code respectively using one or more of secure validation techniques, such as encryption/decryption, Key mechanisms, privilege checking, pointer hashing or signature correlation schemes. This results in an end-to-end secure boot process for a variety of architectures, such as single processor systems, synchronous and asynchronous multiprocessing systems, single core systems and multi-core processing systems. | 2015-07-16 |
20150199521 | SECURE BOOT ADMINISTRATION - Firmware in a computing device is used to administer and alter a Secure Boot process for the computing device while continuing to provide protection from unauthorized third-party code. | 2015-07-16 |
20150199522 | ENGINE CONTROL UNIT CONFIGURATION SECURITY - An engine control unit configuration security system receives a request with a serial number associated with an engine control unit and a requested engine control unit change. The system determines that the requested engine control unit change is approved and in response generates a code including a serial number associated with the engine control unit and an instruction that causes the engine control unit to implement the requested engine control unit change. | 2015-07-16 |
20150199523 | PRIVACY-BASED DEGRADATION OF ACTIVITY SIGNALS AND AUTOMATIC ACTIVATION OF PRIVACY MODES - Methods, systems, and computer program products are provided that address issues related to data privacy by enabling users to elect various levels of data sharing. A user of a user device is enabled to indicate their comfort level with sharing, transmitting, or otherwise exposing individual activity records (data entities) with respect to various activity categories. The exposure of activity records may be controlled with respect to on-device and off-device components. Furthermore, privacy profiles may be automatically generated for the user, and the privacy profiles may be automatically activated in corresponding situations. | 2015-07-16 |
20150199524 | SYNCHRONIZED VIRTUAL TRUSTED PLATFORM MODULES (VTPM) AND VIRTUAL MACHINE (VM) ROLLBACKS - In at least one embodiment, a method for secured rollback of a virtual Trusted Platform Module (vTPM) that renders available functionalities offered by Trusted Platform Module (TPM) on a computer to a virtual machine (VM) is provided. The method includes taking and saving a snapshot of current state of a virtual machine as well as a snapshot of the corresponding vTPM, upon receiving a request for taking a snapshot of the virtual machine. The method further includes converting the snapshots into the current state of the virtual machine and the current state of the vTPM, respectively, upon receiving a request to roll back the virtual machine. | 2015-07-16 |
20150199525 | OPERATION TARGET MANAGEMENT APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An operation target management apparatus includes a detector, a determination unit, and a registration unit. The detector detects deletion of a first management-right holder, who has been registered as a person having management rights for an operation target, the management rights being rights to manage plural types of operational right. The determination unit determines, in a case where deletion of the first management-right holder is detected, a second management-right holder, who is to newly have management rights for the operation target from among plural operational-right holders having at least either an operational right or management rights for at least one of the operation target and another operation target associated with the operation target. The registration unit registers the second management-right holder as a person having management rights for the operation target. | 2015-07-16 |
20150199526 | Systems and Methods for Signaling Content Rights Through Release Windows Life Cycle - Systems and methods for controlling the use of audio, video and audiovisual content are provided. A data structure includes content usage rights for multiple release windows. The usage rights may be encoded in the content or otherwise bound to the content. Playback devices are configured to access the appropriate usage rights and control usage in accordance with the usage rights. | 2015-07-16 |
20150199527 | METHOD OF INPUTTING CONFIDENTIAL DATA ON A TERMINAL - The invention relates to a method of inputting confidential data on a terminal including an input interface, at least one processor for running a trusted program and a display screen, the method including the following steps applied before the input:
| 2015-07-16 |
20150199528 | Supporting the use of a secret key - A first installation stores key identifications with allocation to a respective user and a second installation stores secret keys which each can be found by means of a key identification. The first installation authenticates a user who logs onto the first installation via a user device, creates a temporary identifier, allocates the identifier to the user and transmits the identifier to the user device. The second installation receives a request for a secret key from the user device together with the identifier and requests a key identification from the first installation, wherein the received identifier is transmitted. The first installation determines a user allocated to the received identifier, identifies a key identification stored for the determined user and transmits the key identification to the second installation. This second installation determines a secret key based on the received key identification and transmits the secret key to the user device. | 2015-07-16 |
20150199529 | SYSTEM, METHOD, AND APPARATUS FOR USING A VIRTUAL BUCKET TO TRANSFER ELECTRONIC DATA - A system that enables a first computing system to transfer data to a second computer system using communication data read from the second computing system. The first system transfers the data which is temporarily held in a location of a third computing system associated with the communication data until the second device removes or is provided the data. Once the data is removed, the location in the third computing system where the data was temporarily held is emptied. | 2015-07-16 |
20150199530 | Systems and Methods With Cryptography and Tamper Resistance Software Security - Provided is an arbitrary automation system for secure communications. The system includes a utility device configured for processing critical data associated with the arbitrary automation system, the critical data being structured in accordance with utility device access levels. Also included is a key management module for (i) providing a data protection key (DPK) for protecting the critical data in accordance with each of the utility device access levels and (ii) generating a user key encryption key (UKEK) for encrypting the DPK based upon the device access levels. The system additionally includes a software module configured for masking an execution state of software within the utility device and the key management module via principles of evasion and resistance. | 2015-07-16 |
20150199531 | EXPLOIT DETECTION SYSTEM WITH THREAT-AWARE MICROVISOR - An exploit detection system deploys a threat-aware microvisor to facilitate real-time security analysis, including exploit detection and threat intelligence, of an operating system process executing on a node of a network environment. The microvisor may be organized as a main protection domain representative of the operating system process. In response to the process attempting to access a kernel resource for which it does not have permission, a capability violation may be generated at the main protection domain of the microvisor and a micro-virtual machine (VM) may be spawned as a container configured to encapsulate the process. The main protection domain may then be cloned to create a cloned protection domain that is representative of the process and that is bound to the spawned micro-VM. Capabilities of the cloned protection domain may be configured to be more restricted than the capabilities of the main protection domain with respect to access to the kernel resource. The restricted capabilities may be configured to generate more capability violations than those generated by the capabilities of the main protection domain and, in turn, enable further monitoring of the process as it attempts to access the kernel resource. | 2015-07-16 |
20150199532 | MICRO-VIRTUALIZATION ARCHITECTURE FOR THREAT-AWARE MICROVISOR DEPLOYMENT IN A NODE OF A NETWORK ENVIRONMENT - A micro-virtualization architecture deploys a threat-aware microvisor as a module of a virtualization system configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing in a memory of a node in a network environment. The micro-virtualization architecture organizes the memory as a user space and kernel space, wherein the microvisor executes in the kernel space of the architecture, while the operating system processes, an operating system kernel, a virtual machine monitor (VMM) and its spawned virtual machines (VMs) execute in the user space. Notably, the microvisor executes at the highest privilege level of a central processing unit of the node to virtualize access to kernel resources. The operating system kernel executes under control of the microvisor at a privilege level lower than a highest privilege level of the microvisor. The VMM and its spawned VMs execute at the highest privilege level of the microvisor. | 2015-07-16 |
20150199533 | CORRECTING ACCESS RIGHTS OF FILES IN ELECTRONIC COMMUNICATIONS - A method for modifying access rights to electronically stored tiles linked in a draft electronic communication stored at a client device includes receiving, at a server from the client device, information relating to a plurality of recipients of the draft electronic communication, information relating to a sender of the draft electronic communication, and a first link, where the first link represents a first file. The method further includes determining, at the server, for the sender and for each recipient in the plurality of recipients, the access rights to the first file. The method further includes generating, at the server, a plurality of options for the sender to modify the access rights for the plurality of recipients, where the plurality of options is based on the access rights to the first file, and sending the plurality of options from the server to the client device. | 2015-07-16 |
20150199534 | Secure Storage System and Uses Thereof - The invention described herein provides a data storage system useful for secure access, sharing, storage and archival of electronic documents, such as private, sensitive, proprietary, privileged, and/or otherwise confidential documents, including legal, medical, financial, personal documents. The invention also provides methods of using such data storage system for secure access, sharing, storage and archival of such electronic documents. | 2015-07-16 |
20150199535 | ORGANIZATION-BASED POLICIES - Techniques for representating, managing and storing data related to an organization are provided. An identity management system is disclosed that is configured to manage, represent and store data related to an organization. The identity management system reads data pertaining to an organization from a directory and generates a data model of the organization. The identity management system performs operations to manage the data related to an organization using the data model. The operations include adding logical organizations to the data model and defining user-membership policies associated with entities and logical organizations in the data model. The operations may further include identifying policies to be applied to the users of the organization. In some embodiments, the operations include re-assigning a logical organization and its associated user membership policies to different entities within in the data model while maintaining user-membership policies associated with the logical organization. | 2015-07-16 |
20150199536 | AUTOMATIC FOLDER ACCESS MANAGEMENT - Methods and systems are provided for decentralizing user data access rights control activities in networked organizations having diverse access control models and file server protocols. A folder management application enables end users of the file system to make requests for access to storage elements, either individually, or by becoming members of a user group having group access privileges. Responsibility for dealing with such requests is distributed to respective group owners and data owners, who may delegate responsibility to authorizers. The application may also consider automatically generated proposals for changes to access privileges. An automatic system continually monitors and analyzes access behavior by users who have been pre-classified into groups having common data access privileges. As the organizational structure changes, these groups are adaptively changed both in composition and in data access rights. | 2015-07-16 |
20150199537 | METHOD AND APPARATUS FOR CORRECTLY BINDING FORM OBJECTS TO ENCRYPTED XML DATA - A method and apparatus for correctly binding form objects to encrypted XML data is described. In one embodiment, the method includes examining at least one data description stored in a set of replacement properties for a set of encrypted XML data, wherein each data description is associated with an encrypted data element from the set of encrypted XML data and binding form objects to encrypted data elements of the set of encrypted XML data using the at least one data description. | 2015-07-16 |
20150199538 | Confidential Information Delivery In A Multi-Device Environment - An automated technique for delivering confidential information in a multi-device environment may include receiving confidential information at a first computing device associated with a first user from a second computing device associated with a second user, masking the confidential information on the first computing device while displaying non-confidential information received from the second computing device (if any), and forwarding the confidential information for display on a third computing device that is capable of displaying the confidential information more securely than the first computing device, the third computing device being associated with the first user or a third party authorized to view the confidential information. | 2015-07-16 |
20150199539 | Remote Data Viewer - A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and visualization purposes by users unconstrained by geography. Medical images and data are stored on one or more servers running application service provider software along with meta-data such as access control information, origin of information and references to related data. A set of medical data consisting of related information is sent as an encrypted stream to a viewing station running client software in a secure execution environment that is logically independent of the viewing station's operating system. | 2015-07-16 |
20150199540 | SECURE ACCESS FOR SENSITIVE DIGITAL INFORMATION - Sensitive pieces of information stored on an individual's device can be protected using a device identification system that applies, for each sensitive piece of information, a function that integrates an identifier of the individual with a respective sensitive piece of information to create a respective identity element. Each identity element can be signed with a signature to create a trust group. The identity element and signature can be uploaded to the individual's device using an application that is configured to provide a subset of the sensitive pieces of information in response to a query. | 2015-07-16 |
20150199541 | METHOD AND SYSTEM FOR SECURED COMMUNICATION OF PERSONAL INFORMATION - A method and system for securely communication of personal information is disclosed. In one embodiment, when a user wishes to instantly populate web form ( | 2015-07-16 |
20150199542 | COMMUNICATION DEVICE AND ANTI-LOSS METHOD - A communication device providing assistance to a user when the communication device is lost or misplaced includes a display panel, a processing module, an image capturing module, and a transmission module. When the display panel displays a locked interface, and the locked interface is not unlocked within a preset time period, the processing module sends a capture image signal to the image capturing module. The image capturing module captures a front image in response and sends the image to a preset email address via the transmission module. The invention also provides a method of providing clues for finding a lost or misplaced communication device. | 2015-07-16 |
20150199543 | METHOD AND APPARATUS FOR DETECTING AN OUTPUT POWER OF A RADIO FREQUENCY TRANSMITTER - A power detection circuit configured to detect an output power of a radio frequency transmitter. The power detection circuit includes a multiplier circuit configured to multiply a first differential input signal and a second differential input signal. The first differential input signal corresponds to a radio frequency signal to be amplified by the radio frequency transmitter. The second differential signal corresponds to an output signal as amplified by an amplifier of the radio frequency transmitter. A bias circuit is configured to generate a bias signal. A differential amplifier is configured to generate, based on the bias signal and the first differential signal and the second differential signal as multiplied by the multiplier circuit, an indication of the output power of the amplifier of the radio frequency transmitter. | 2015-07-16 |
20150199544 | MODIFIED BEGGS & BRILL MULTIPHASE FLOW CORRELATION WITH FUZZY LOGIC FLOW REGIME PREDICTION - An improved method using fuzzy logic for predicting liquid slip holdup in multiphase flow in pipes. The method improves the Beggs and Brill multiphase flow correlation. Fuzzy sets are defined for all variables in the Beggs Brill liquid-slip holdup equation horizontal multiphase flow. Fuzzy logic is used to calculate the Beggs Brill a, b, and c coefficients from known values for Froude number and the no-slip holdup. Using the Minami and Brill data set and the Abdul Majeed data set the fuzzy logic prediction of liquid slip holdup is compared to the Beggs Brill correlation, the modified Beggs Brill correlation, and several other multiphase correlations. Using a variety of error metrics the fuzzy logic predictions perform better than all other multiphase correlations. | 2015-07-16 |
20150199545 | Two-Dimensional Code Authenticating Device, Two-Dimensional Code Generating Device, Two-Dimensional Code Authenticating Method, and Program - A two-dimensional code authenticating device reads a self-authentication two-dimensional code to obtain an RS bit string, and detects a bit string c′ as an error using the RS bit string. Next, an exclusive OR between a bit string l included in the RS bit string and the bit string c′ detected as an error is calculated to obtain a bit string c′, and a bit string md is obtained by decrypting the bit string c′ through a scheme corresponding to the encryption. Subsequently, it is determined whether or not the decrypted bit string md matches the bit string m included in the RS bit string, thereby authenticating the self-authentication two-dimensional code. | 2015-07-16 |
20150199546 | MEMORY DEVICE INCLUDING WIRELESS ANTENNA - According to one embodiment, a memory device includes a memory, a first controller, a wireless antenna, a memory unit, and a second controller. The first controller controls the memory. The memory unit is capable of operating by the wireless antenna. The second controller is capable of operating by the wireless antenna, reads data from the memory unit when receiving a read instruction, and outputs the data using the wireless antenna. | 2015-07-16 |
20150199547 | METHOD, SYSTEM AND APPARATUS FOR ADAPTING THE FUNCTIONALITIES OF A CONNECTED OBJECT ASSOCIATED WITH A USER ID - In accordance with one example embodiment of the present invention a method is provided for adapting and customizing the attributes and the functionalities of a connected object according to preferences, settings and permissions associated with a user paired with said connected object. In some implementations, at least part of the inputs and adjustments imparted by said user to said connected object via an input/output user interface could seamlessly translate into other connected objects that belong to the same class and are paired with said user. In other implementations, the pairing of connected target objects with user IDs provides novel functionalities. | 2015-07-16 |
20150199548 | Method and Apparatus Involving Global Positioning and Long-Range Wireless Link - A tag has a transmitter for transmitting first wireless signals, and a receiver for receiving second wireless signals from which the tag can determine its current physical location. A different embodiment includes a tag having a transmitter for transmitting wireless signals, and a reader having a receiver for receiving the wireless signals, the receiver in the reader being an ultra-sensitive receiver. | 2015-07-16 |
20150199549 | BARCODE-READING CAPABILITIES OF A PORTABLE, HAND-HELD COMPUTING DEVICE THAT COMPRISES A CAMERA - This patent specification describes an attachment for a mobile device. The attachment may have an attachment feature designed to be attached to a mobile device such as a smartphone, tablet, or smartphone/tablet with a camera. The attachment may also include an optics system and/or an illumination system that cooperates with the camera to facilitate the capture of decodable barcodes. The illumination system may include a targeting illumination system that facilitates proper positioning of the article and/or an exposure illumination system that helps illuminate the article during capture. The optics system may include a lens that modifies the depth of field and/or the size of the field of view of the camera, an aperture that helps define the field of view, a filter that prevents light of undesired wavelengths from reaching the camera, and/or a mirror that redirects the camera's optical pathway. | 2015-07-16 |
20150199550 | USE OF INVISIBLE INK TO CREATE METADATA OF IMAGE OBJECT - Provided are techniques for the placement of a code on an object that does not interfere and is not displayed in a captured visual image of the object. Also provided are techniques for capturing a first image of an object in the visual light spectrum; capturing a second image of the object in a non-visual light spectrum; extracting metadata, stored in the non-visual light spectrum corresponding to the object from the second image: and storing the first image in conjunction with the metadata. Also provided are techniques for storing the metadata in conjunction with the object in the non-visual light spectrum, wherein the metadata is stored in a quick response (QR) code or a bar code and the non-visible light spectrum is ultraviolet light or infrared light. | 2015-07-16 |
20150199551 | USE OF INVISIBLE INK TO CREATE METADATA OF IMAGE OBJECT - Provided are techniques for the placement of a code on an object that does not interfere and is not displayed in a captured visual image of the object. Also provided are techniques for capturing a first image of an object in the visual light spectrum; capturing a second image of the object in a non-visual light spectrum; extracting metadata, stored in the non-visual light spectrum corresponding to the object from the second image; and storing the first image in conjunction with the metadata. Also provided are techniques for storing the metadata in conjunction with the object in the non-visual light spectrum, wherein the metadata is stored in a quick response (QR) code or a bar code and the non-visible light spectrum is ultraviolet light or inferred Light. | 2015-07-16 |
20150199552 | SENSOR IDENTIFICATION - Techniques described here use variations in the sensor to generate an identifier for the sensor. Each sensor may be comprised of sub-sensing units, called pixels that may demonstrate variation in their sensing capability from one pixel to another. Embodiments of the invention, describe a method for using the relative variance of each pixel (relative to the whole sensor or/and a portion of the sensor) in generating an identifier for the sensor. In one embodiment, the method may obtain information associated with a plurality of pixels from a sensor, detect variations in the information associated for each of the pixels from a subset of the plurality of pixels and generate an identifier for the sensor using the detected variations in the information associated with each of the pixels from the subset of plurality of pixels. | 2015-07-16 |
20150199553 | METHOD FOR RECOGNIZING FINGERPRINT AND MOBILE TERMINAL SUPPORTING THE SAME - A method for recognizing a fingerprint in a portable terminal includes, if a touch input is sensed via a fingerprint scanning sensor, determining whether a touch input event is detected on an object displayed on a screen, deactivating a function corresponding to the detected touch input event on the object if the touch input event is sensed, and performing a function corresponding to the sensed touch input via the fingerprint scanning sensor. A portable terminal includes a display unit configured to display at least one object on a screen, a fingerprint scanning sensor configured to sense a touch input, and a processor configured to deactivate a function corresponding to the detected touch input event on the at least one object if the touch input is sensed, and to perform a function corresponding to the sensed touch event via the finger scanning sensor. | 2015-07-16 |
20150199554 | Finger Print State Integration with Non-Application Processor Functions for Power Savings in an Electronic Device - A system includes a fingerprint sensor, an application processor, and an auxiliary processor. The application processor is operable to arm the fingerprint sensor prior to the application processor entering a low power or sleep mode. The auxiliary processor is to receive a state output from the fingerprint sensor. The state output is to cause activation of one or more functions of the auxiliary processor upon fingerprint authentication while leaving the application processor in the low power or sleep mode. | 2015-07-16 |
20150199555 | METHOD FOR PROCESSING INPUT AND ELECTRONIC DEVICE THEREOF - A method for operating an electronic device is provided. The method includes obtaining input information input to a display screen and fingerprint information input to a fingerprint sensor. The method also includes executing a command matching a combination of the obtained screen input information and fingerprint information. | 2015-07-16 |
20150199556 | METHOD OF USING IMAGE WARPING FOR GEO-REGISTRATION FEATURE MATCHING IN VISION-AIDED POSITIONING - Systems and methods for using image warping to improve geo-registration feature matching in vision-aided positioning is provided. In at least one embodiment, the method comprises capturing an oblique optical image of an area of interest using an image capturing device. Furthermore, digital elevation data and at least one geo-referenced orthoimage of an area that includes the area of interest are provided. The area of interest in the oblique optical image is then correlated with the digital elevation data to create an image warping matrix. The at least one geo-referenced orthoimage is then warped to the perspective of the oblique optical image using the image warping matrix. And, features in the oblique optical image are matched with features in the at least one warped geo-referenced orthoimage. | 2015-07-16 |
20150199557 | Systems and Methods for Refining Building Alignment in an Aerial Image - Systems, apparatuses, and methods are provided for refining building alignment in an aerial image. At least one candidate shifting vector and matching score value are determined for a local building. At least one dominant shifting vector is determined for at least one random group of neighboring buildings of the local building. At least one optimized matching score is calculated using the at least one candidate shifting vector for the local building and the at least one dominant shifting vector for the at least one random group of the neighboring buildings. A final shifting vector for the local building is found using the at least one optimized matching score. | 2015-07-16 |
20150199558 | SYSTEMS AND METHODS FOR AUTOMATICALLY MODIFYING A PICTURE OR A VIDEO CONTAINING A FACE - Systems and methods for automatically adjusting a picture or a video containing a face, by detecting the face in a picture, constructing a face-structure mask for the face, obtaining a set of model face-structure masks and modification instructions, and modifying the face. The disclosure further provides for displaying the modified picture, receiving user feedback regarding the modifications, and processing the user feedback. | 2015-07-16 |
20150199559 | SYSTEMS AND METHODS OF LIGHT MODULATION IN EYE TRACKING DEVICES - An image of a user's eyes and face may be analyzed using computer-vision algorithms. A computing device may use the image to determine the location of the user's eyes and estimate the direction in which the user is looking. The eye tracking technology may be used in a wide range of lighting conditions and with many different and varying light levels. When a user is near a light source, an automatic exposure feature in the camera may result in the user's face and eyes appearing too dark in the image, possibly reducing the likelihood of face and eye detection. Adjusting attributes such as the camera exposure time and the intensity and illumination interval of the light sources based on motion and light levels may improve detection of a user's features. | 2015-07-16 |
20150199560 | TECHNIQUES FOR ENABLING OR ESTABLISHING THE USE OF FACE RECOGNITION ALGORITHMS - Embodiments described herein facilitate or enhance the implementation of image recognition processes which can perform recognition on images to identify objects and/or faces by class or by people. | 2015-07-16 |
20150199561 | SYSTEM AND METHOD FOR EVALUATING FACE RECOGNITION PERFORMANCE OF SERVICE ROBOT USING ULTRA HIGH DEFINITION FACIAL VIDEO DATABASE - Provided are a system and method for evaluating the face recognition performance of a service robot using an ultra high definition (UHD) facial video database. The system includes a video output unit configured to output a registration-purpose or test-purpose UHD facial video, a robot test controller configured to control transmitting identification (ID) information on a video currently being output to a service robot having a face recognition function when the video currently being output is a registration-purpose video, and control performing evaluation of the face recognition function of the service robot using a recognition result received from the service robot when the video currently being output is a test-purpose video, and a wired/wireless communication unit configured to transmit the ID information and usage information indicating whether the video currently being output is a registration-purpose video or a test-purpose video to the service robot. | 2015-07-16 |
20150199562 | SCALE INDEPENDENT TRACKING PATTERN - In one aspect, a computer implemented method of motion capture, the method includes tracking the motion of a dynamic object bearing a pattern configured such that a first portion of the patterns is tracked at a first resolution and a second portion of the pattern is tracked at a second resolution. The method further includes causing data representing the motion to be stored to a computer readable medium. | 2015-07-16 |
20150199563 | IMAGE PROCESSING SYSTEM, IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND PROGRAM - An image processing system includes a storing section that stores a database in which specific pose data representing each of specific poses of a human, and effect manipulation data specifying each of manipulations applied to an image are registered in association with each other, a human region detecting section that detects a human region that is a region where a human appears in an image on which to perform image processing, a human pose recognizing section that recognizes a pose of the human in the human region detected by the human region detecting section, a matching section that finds the specific pose data matching the pose recognized by the human pose recognizing section, by referencing the database, and a manipulating section that applies a manipulation to the image on the basis of the effect manipulation data associated with the specific pose data found by the matching section. | 2015-07-16 |
20150199564 | IMAGE GESTURES FOR EDGE INPUT - An aspect provides a method, including: capturing, using an image sensor, an image of a user; detecting, using a processor, a user gesture forming an edge within the image; capturing, using the image sensor, at least one additional image of the user; detecting, using the processor, a user gesture relating to the edge of the image; and committing, using the processor, a predetermined action according to the user gesture relating to the edge of the image. Other aspects are described and claimed. | 2015-07-16 |
20150199565 | FACILITATING HANDWRITING DEVELOPMENT - Facilitating the development of handwriting can include a presentation medium and a user writing area. The user writing area can be presented by the presentation medium. The user writing area can include a plurality of zones. At least a portion of one or more of the zones can include an associated color. The color of at least one of the zones can be different from the color of the other zones. The colors of the zones can be selected and arranged according to a predetermined logical relationship. | 2015-07-16 |
20150199566 | SMART NECKLACE WITH STEREO VISION AND ONBOARD PROCESSING - A wearable neck device and a method of operating the wearable neck device are provided for outputting optical character recognition information to a user. The wearable neck device has at least one camera, and a memory storing optical character or image recognition processing data. A processor detects a document in the surrounding environment and adjusts the field of view of the at least one camera such that the detected document is within the adjusted field of view. The processor analyzes the image data within the adjusted field of view using the optical character or image recognition processing data. The processor determines output data based on the analyzed image data. A speaker of the wearable neck device provides audio information to the user based on the output data. | 2015-07-16 |
20150199567 | DOCUMENT CLASSIFICATION ASSISTING APPARATUS, METHOD AND PROGRAM - According to one embodiment, a document classification assisting apparatus includes an input unit, an extracting unit, an amount calculator, a setting unit, a calculator, and a storage. The input unit inputs documents including stroke information. The extracting unit extracts, from the stroke information, at least one of figure, annotation and text information. The amount calculator calculates, from the information extracted, feature amounts that enable comparison in similarity between the documents. The setting unit sets clusters including representative vectors that indicate features of the clusters and each include the feature amounts, and detects to which one of the clusters each of the documents belongs. The calculator calculates, as a classification rule, at least one of the feature amounts included in the representative vectors and characterizing the representative vectors. The storage stores the classification rule. | 2015-07-16 |
20150199568 | AUTOMATED DOCUMENT RECOGNITION, IDENTIFICATION, AND DATA EXTRACTION - A method for automated document recognition, identification, and data extraction is described herein. The method comprises receiving, by the processor, an image of a document associated with a user. The image is analyzed using optical character recognition to obtain image data, wherein the image data includes text zones. Based on the image data, the image is compared to one or more document templates. Based on the comparison, a document template having the highest degree of coincidence with the image is determined. The text zones of the image are associated with text zones of the document template to determine a type of data in each text zone. The data is structured into a standard format to obtain structured data. | 2015-07-16 |
20150199569 | APPARATUS AND METHOD FOR MEASURING MAIL SIZE AND ACQUIRING MAIL INFORMATION - Provided are an apparatus and method for measuring a mail size and acquiring mail information. The apparatus and method measure a mail size, recognize or read out specific information extracted from image information of a photographed mail, and acquire information necessary for receiving and delivering the mail. Accordingly, a height and length of a mail can be efficiently measured a narrow space, and an accuracy of the measurement can be enhanced. When specific information is extracted from photographed mail image information, information necessary for receipt and delivery of a mail can be more easily acquired by using a method of reading out or recognizing the extracted specific information. | 2015-07-16 |
20150199570 | INTERACTIVE OBJECT AND TRACK ARRAY BASED IMAGE ANALYSIS METHOD - A computerized interactive image analysis method that generates a displayed object region, track region or object sequence array to enable efficient interactive analysis to verify, edit and create a subpopulation of objects, tracks or object region sequences. It enables statistical test applying to a single or a plurality of subpopulation data acquired from a single or a plurality of input images and a single or a plurality of interactive analysis steps. | 2015-07-16 |
20150199571 | POS TERMINAL APPARATUS AND CUSTOMER INFORMATION ACQUISITION METHOD - In accordance with an embodiment, a POS terminal apparatus comprises a display section and a control section. The control section calculates the feature amount of the people contained in the image data captured by an image capturing section. The control section specifies the age group and the gender of the people in the image data based on the data stored in a storage section and associating the age group information and the gender information of a people with a pre-calculated feature amount and the calculated feature amount. The control section displays the specified age group information and gender information on a display section. | 2015-07-16 |
20150199572 | OBJECT TRACKING USING OCCLUDING CONTOURS - Embodiments disclosed pertain to object tracking based, in part, on occluding contours associated with the tracked object. In some embodiments, a 6 Degrees of Freedom (6-DoF) initial camera pose relative to a tracked object in a first image may be obtained. A 6-DoF updated camera pose relative to the tracked object for a second image subsequent to the first image may then be obtained based, at least, on the initial camera pose and one or more features associated with the tracked object and an occluding contour associated with the tracked object in the second image. The occluding contour associated with the tracked object in the second image may be derived from a closed form function. | 2015-07-16 |
20150199573 | Global Scene Descriptors for Matching Manhattan Scenes using Edge Maps Associated with Vanishing Points - A method constructs a descriptor for an image of a scene, wherein the descriptor is associated with a vanishing point in the image by first quantizing an angular region around the vanishing point into a preset number of angular quantization bins, and a centroid of each angular quantization bin indicates a direction of the angular quantization bin. For each angular quantization bin, a sum of magnitudes of pixel gradients for pixels in the image at which a direction of the pixel gradient is aligned with the direction of the angular quantization bin is determined, wherein the steps are performed in a processor. | 2015-07-16 |
20150199574 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - An apparatus includes a first acquisition unit configured to acquire main object information specifying a main object in generation of a layout image, a second acquisition unit configured to acquire object correlation information specifying an object having a correlation with the main object, an extraction unit configured to extract at least one image including the main object and at least one image including the object having the correlation with the main object from a plurality of images based on the acquired main object information and the acquired object correlation information acquired, and a generation unit configured to generate, using a layout template, a layout image in which the at least one image extracted by the extraction unit and including the main object and the at least one image extracted by the extraction unit and including the object having the correlation with the main object are laid out therein. | 2015-07-16 |
20150199575 | COUNTING AND MONITORING METHOD USING FACE DETECTION - Video is often used to count and identify people entering and exiting an area, such as a store. This information may be used to determine the number and amount of time people are in the area, and other statistics and characteristics. These variables may be skewed by the associates employed or working in the area, instead of patrons or others. The present disclosure is directed to method for eliminating associates from video by facial analysis and the application of analytics. | 2015-07-16 |
20150199576 | IMAGE GENERATION APPARATUS AND PAVER OPERATION ASSISTANCE SYSTEM - An image generation apparatus includes a processor that generates an output image based on input images captured by multiple imaging units mounted on a paver including a hopper, a tractor, and a screed. The output image includes a hopper image representing a downward view of the hopper, a left-side surrounding image representing a downward view of a surrounding area on the left side in a movement direction of the paver, a right-side surrounding image representing a downward view of a surrounding area on the right side in the moving direction of the paver, and an illustration image of the tractor. The processor arranges the hopper image, the left-side surrounding image, the right-side surrounding image, and the illustration image such that the output image represents a downward view of the paver. | 2015-07-16 |
20150199577 | SYSTEM AND METHOD FOR FRONT DETECTING OF VEHICLE - The present invention provides automotive forward-looking system and method. According to an aspect of the present invention, there is provided an automotive forward-looking system including: a forward-looking sensor that has a field of view in a predetermined range of angle and monitors a forward area of a vehicle; a controller that calculates a turning angle of the forward-looking sensor by estimating the curvature of a curved road; and a sensor turning unit that turns the forward-looking sensor by being controlled to operate by the controller, in which the controller estimates the curvature of a curved road on the basis of a guardrail installed at a side of the curved road. | 2015-07-16 |
20150199578 | VEHICLE AND MOBILE DEVICE TRAFFIC HAZARD WARNING TECHNIQUES - A computer-implemented method includes monitoring an environment external to a vehicle via a sensor of the vehicle or a mobile device. The monitoring includes recording audio or video signals based on an output of the sensor. Audio or image recognition is performed via the mobile device based on the audio or video signals. Based on results of the audio or image recognition, objects in an area through which the vehicle is to pass are detected. The method includes determining which ones of the detected objects satisfy a predetermined criteria. The predetermined criteria includes object features that are indiscernible or marginally discernible to a vehicle operator with a perception deficiency. Selected ones of the detected objects that satisfy the predetermined criteria are monitored. The vehicle operator is alerted of the selected ones of the detected objects with an alert predetermined to be discernible to the vehicle operator. | 2015-07-16 |
20150199579 | COOPERATIVE VISION-RANGE SENSORS SHADE REMOVAL AND ILLUMINATION FIELD CORRECTION - A method of creating a shadow-reduced image from a captured image. An image of a scene exterior of a vehicle is captured by a vehicle-based image capture device. A first object profile of an object in the captured image is identified by a processor. A second object profile of the object is detected using a non-vision object detection device. Shadows in the captured image are removed by the processor as a function of the first object profile and the second object profile. A shadow reduced image is utilized in a vehicle-based application. | 2015-07-16 |
20150199580 | ACQUIRING IDENTITY SIGNATURES FROM BIOLOGICAL STRUCTURES - A method includes aligning a transmitter and receiver to transmit signals through a body part of a person and transmitting, by the transmitter and through the body part, analog signals of known transmission signal strengths. The method also includes receiving, by the receiver, the analog signals after the analog signals have passed through the body part, and identifying the received signal strengths of the analog signals at the receiver. The method calculates attenuation values between the transmission signal strengths and the received signal strengths to generate an identity signature based on biometry. | 2015-07-16 |
20150199581 | DETECTING A LABEL FROM AN IMAGE - Determining a label from an image is disclosed, including: obtaining an image; determining a first portion of the image associated with a special mark; determining a second portion of the image associated with a label based at least in part on the first portion of the image associated with the special mark; and applying character recognition to the second portion of the image associated with the label to determine a value associated with the label. | 2015-07-16 |
20150199582 | CHARACTER RECOGNITION APPARATUS AND METHOD - According to one embodiment, a character recognition apparatus includes a first generation unit, an estimation unit, a second generation unit and a search unit. The first generation unit generates a user dictionary that a preferred character is registered. The estimation unit estimates a first separation between characters based on one or more of a layout of a target text and marking information. The second generation unit generates a lattice structure, by estimating character segments being expressed by strokes based on the first separation. The search unit searches, if the lattice structure includes the path corresponding to the preferred character, the lattice structure for a path to obtain a character recognition result. | 2015-07-16 |
20150199583 | Matching Process Device, Matching Process Method, and Inspection Device Employing Same - An inspection device that performs pattern matching on a searched image performs matching between a template image of an inspection object and the searched image by using: a feature region extraction process unit that extracts a feature quantity from the template image acquired for learning; a feature quantity extraction process unit that extracts a feature quantity from the searched image acquired for learning; a mutual feature quantity calculation process unit that calculates a mutual feature quantity of the template image and the searched image from the feature quantity extracted from the template image and the feature quantity extracted from the searched image; a learning process unit that calculates, using a plurality of the mutual feature quantities, a discrimination boundary surface that determines matching success or failure; a process unit that calculates a plurality of the mutual feature quantities from an image acquired from the inspection object; and the plurality of mutual feature quantities and the discrimination boundary surface. Thus, an inspection device can be provided that outputs an accurate matching position in template matching even when there is a large apparent image discrepancy between the template and the searched image. | 2015-07-16 |
20150199584 | EDGE DETECTION IN IMAGES - An edge detection engine operates to scan an image to identify edges within the image. An annular aperture is used to locate the edges in the image. An output image is generated by the edge detection engine that identifies the locations of the edges found in the image. | 2015-07-16 |
20150199585 | METHOD OF SAMPLING FEATURE POINTS, IMAGE MATCHING METHOD USING THE SAME, AND IMAGE MATCHING APPARATUS - A method of sampling feature points, an image matching method using the same, and an image matching processor are disclosed. The method of sampling feature points for image matching includes: dividing a first image into a plurality of regions corresponding to a number of feature points to be sampled; extracting a sampled feature point from each of the regions such that a distance between a sampled feature point of one region and a sampled feature point of another region satisfies a predetermined condition; and estimating a homography on the basis of the extracted sampled feature points and corresponding sampled feature points of a second image to be matched with the first image. | 2015-07-16 |
20150199586 | IMAGE PROCESSING DEVICE, METHOD, AND PROGRAM - A region setting unit and a specific region extracting unit are included. The region setting unit sets, within an input image that is photographed at a reference time point out a first region estimated as highly probable to be a specific region and a second region estimated as highly probable to be a background region, which is a region other than the specific region. The specific region extracting unit extracts the specific region within the input image based on a first histogram which is a histogram of density values in the first region and a second histogram which is a histogram of density values in the second region. The specific region extracting unit extracts a specific region from the input image that is photographed at a time point different from the reference time point, based on the first histogram and the second histogram. | 2015-07-16 |
20150199587 | IMAGE PROCESSING DEVICE, IMAGE PROCESSING METHOD, AND IMAGE PROCESSING PROGRAM - Based on a long diameter of a set specific region, a first region estimated as the specific region and a second region estimated as a background region are set within an input image. Based on a density histogram of each pixel in the first region and a density histogram of each pixel in the second region, a first evaluation value which indicates a likelihood that a density value represents the specific region is calculated for each density value. For each pair of two adjacent pixels within the input image, based on the first evaluation values, a second evaluation value which indicates a likelihood that the two adjacent pixels represent a contour is calculated. Based on the second evaluation value, connection costs between a plurality of nodes respectively representing each pair of the two adjacent pixels are set. The plurality of nodes are connected based on the connection costs. | 2015-07-16 |
20150199588 | STEREO IMAGE PROCESSING USING CONTOURS - A computer-implemented stereo image processing method which uses contours is described. In an embodiment, contours are extracted from two silhouette images captured at substantially the same time by a stereo camera of at least part of an object in a scene. Stereo correspondences between contour points on corresponding scanlines in the two contour images (one corresponding to each silhouette image in the stereo pair) are calculated on the basis of contour point comparison metrics, such as the compatibility of the normal of the contours and/or a distance along the scanline between the point and a centroid of the contour. A corresponding system is also described. | 2015-07-16 |
20150199589 | MOVING IMAGE RECOGNITION APPARATUS AND MOVING IMAGE RECOGNITION METHOD - According to an embodiment, a moving image recognition apparatus includes a moving object detection unit, a data code reading unit, a label recognition unit, an association unit, and an output unit. The moving object detection unit detects moving objects from a moving image stored in a buffer unit and identifies each of the moving objects. The data code reading unit detects a data code from each frame of the moving image and decodes the detected data code. The label recognition unit detects and recognizes a label from each frame of the moving image. When the recognized label and the decoded data code exist on the same object, the association unit associates them. The output unit outputs together the decoding result of the data code and the recognition result of the label associated with the decoding result. | 2015-07-16 |
20150199590 | IMAGE PROCESSING DEVICE, INFORMATION STORAGE DEVICE, AND IMAGE PROCESSING METHOD - An image processing device includes: an image sequence acquisition section that acquires an image sequence that includes a plurality of constituent images; and a processing section that performs an image summarization process that deletes some of the plurality of constituent images included in the image sequence to generate a summary image sequence, the processing section detecting an observation target area from each of the plurality of constituent images, selecting a reference image and a determination target image from the plurality of constituent images, calculating deformation information about a deformation estimation target area included in the reference image and the deformation estimation target area included in the determination target image, and determining whether or not the determination target image can be deleted based on the observation target area included in the reference image, the observation target area included in the determination target image, and the deformation information. | 2015-07-16 |
20150199591 | Trainable Handheld Optical Character Recognition Systems and Methods - A handheld scanner incorporates vision software to allow the handheld scanner to be trained for OCR. The handheld scanner can include a user interface to allow a user to associate an image of a mark with electronic data for the mark. The user interface, along with a range finder, can also be used to influence variables that affect the quality of an image scan, thereby improving the quality of results for the image scan and/or decode process. | 2015-07-16 |
20150199592 | CONTOUR-BASED CLASSIFICATION OF OBJECTS - Described herein is a contour-based method of classifying an item, such as a physical object or pattern. In an example method, a one-dimensional (1D) contour signal is received for an object. The one-dimensional contour signal comprises a series of 1D or multi-dimensional data points (e.g. 3D data points) that represent the contour (or outline of a silhouette) of the object. This 1D contour can be unwrapped to form a line, unlike for example, a two-dimensional signal such as an image. Some or all of the data points in the 1D contour signal are individually classified using a classifier which uses contour-based features. The individual classifications are then aggregated to classify the object and/or part(s) thereof. In various examples, the object is an object depicted in an image. | 2015-07-16 |
20150199593 | CLASSIFYING DEVICE, CLASSIFYING PROGRAM, AND METHOD OF OPERATING CLASSIFYING DEVICE - When each pixel forming image data is classified into one of N labels (where N>2) which are ordered from 0 to N−1, a binary graph setting unit sets a binary graph where the i-th layer i is a boundary between the label i−1 and the label i of the N labels, a class to which a label equal to or higher than i is assigned corresponds to a virtual label 0, and a class to which a label equal to or smaller than i−1 is assigned corresponds to a virtual label 1, a layer-by-layer labeling unit performs a graph cut operation on the binary graph of each layer, and then a label determining unit determines which of the N labels each pixel belongs to based on the virtual labels assigned to all the binary graphs. | 2015-07-16 |
20150199594 | LABEL PRINTER, AND METHOD OF SEARCHING OPTIMAL COMMUNICATION POSITION - According to an embodiment, there is provided a label printer including a conveying mechanism, an RFID reader and writer, a communication intensity information acquisition unit, and a maximum communication intensity position determination unit, and an optimal communication position calculation unit. If communication with the plurality of RFID tags occurs simultaneously in the RFID reader and writer while conveying the mount by the conveying mechanism along the conveying route, the communication intensity information acquisition unit acquires information indicating a communication intensity between each of a plurality of the RFID tags and the RFID reader and writer in correlation with identification information of each of the RFID tags. The maximum communication intensity position determination unit determines a maximum communication intensity position, at which a communication intensity capable of being correlated with the identification information of each of the RFID tags becomes the maximum, on the basis of a tendency of a variation in the communication intensity of each of the plurality of RFID tags which accompanies the conveyance along the conveying route, and a conveying distance of the mount by the conveying mechanism. The optimal communication position calculation unit calculates an optimal communication position with the RFID tags of the plurality of labels adhered to the label paper on the basis of the maximum communication intensity position determined with respect to each of the plurality of RFID tags. | 2015-07-16 |
20150199595 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing apparatus includes a receiving unit configured to receive a pattern indicating positions of non-transparent pixels of a semi-transparent object; a multivaluing processing unit configured to perform multivaluing processing on the received pattern; a scaling processing unit configured to perform scaling processing on the multivalued pattern, and an applying unit configured to apply a screen to the scaled pattern. | 2015-07-16 |
20150199596 | RECORDING DATA GENERATION APPARATUS, RECORDING SYSTEM, PROGRAM, RECORDING DATA GENERATION METHOD AND IMAGE DATA DISPLAY METHOD - Included are a display portion that displays image data; a selection portion that allows selection of a partial pixel from amongst the pixels of image data; a color range setting portion that allows setting a color range on the basis of a color of the partial pixel; a determination portion that determines whether or not an image pixel constituting falls within the color range; a determination practice portion that sequentially performs this determination until the pixel adjacent to a determination-completed pixel becomes a pixel not falling within the color range; a pixel designation portion that designates at least one pixel as falling within the color range; a color conversion portion that converts a color of each pixel designated by the pixel designation portion; and a recording data generation portion that generates recording data on the basis of image data resulting from the color conversion. | 2015-07-16 |
20150199597 | DEVICE MOVEMENT DETECTION WHEN POWERED DOWN - Systems and methods detect a power supply device of an apparatus being disconnected from an external AC power source and control a DC power storage element of the apparatus to supply power to a processor and directional force sensor of the apparatus. Such systems and methods record directional force measurements output by the directional force sensor and a measure of time output by a clock device of the apparatus while the processor detects that the power supply is disconnected from the external AC power source to store directions, magnitudes, and time durations of the directional force measurements in a non-transitory computer-readable storage medium of the apparatus. These systems and methods calculate and output a path of movement of the apparatus that occurred while the apparatus was disconnected from the external AC power source based on the directions, magnitudes, and time durations of the directional force measurements using the processor. | 2015-07-16 |
20150199598 | Apparatus and Method for Grading Unstructured Documents Using Automated Field Recognition - A machine has a processor and a memory storing instructions executed by the processor to receive a semi-structured work product with question number indicia and answer indicia. Optical recognition techniques are employed to identify the question number indicia and answer indicia. Results are recorded in a database. | 2015-07-16 |
20150199599 | TRANSACTION CARD - The present invention relates to a process for producing an opaque, transparent or translucent transaction card having multiple features, such as a holographic foil, integrated circuit chip, silver magnetic stripe with text on the magnetic stripe, opacity gradient, an invisible optically recognizable compound, a translucent signature field such that the signature on back of the card is visible from the front of the card and an active thru date on the front of the card. The invisible optically recognizable compound is preferably an infrared ink comprising an infrared phthalocyanine dye, an infrared phosphor, and a quantum dot energy transfer compound. The infrared ink can be detected by a sensor found in an ATM or card assembly line. | 2015-07-16 |
20150199600 | BEAUTIFYING METHOD FOR QUICK RESPONSE CODE AND APPARATUS THEREOF - A beautifying method for quick response code (QR code) is provided herein and includes the following steps: a step of setting an image in a QR code; a step of determining an ideal value of a correction code for the QR code; a step of calculating an energy function related to vision beauty condition in accordance with the image, the correction code and the ideal value and a step of optimizing the energy function to obtain a minimum procedure of the energy function of the ideal value. | 2015-07-16 |