30th week of 2018 patent applcation highlights part 47 |
Patent application number | Title | Published |
20180210998 | AIRCRAFT RECONFIGURATOR FOR RECONFIGURING AN AIRCRAFT CONFIGURATION - An aircraft reconfigurator for reconfiguring an aircraft configuration includes a storage unit that stores aircraft specific data of a predetermined initial configuration, and an input unit for inputting a mission specific reconfiguration parameter. The aircraft reconfigurator includes a processing unit for reconfiguring the initial aircraft configuration based on the stored aircraft specific data of the predetermined initial aircraft configuration and the predetermined mission specific reconfiguration parameter so as to design several alternative aircraft configurations, each of which has a different variant of a cabin layout. | 2018-07-26 |
20180210999 | CABLE ROUTING IN AIRCRAFT - An aircraft configurator for calculating locations of consumers and routes along which consumers are to be connected to corresponding suppliers of the aircraft. A computing unit can calculate different connection routes and select the connection route where a key performance indicator is optimal and takes into account additional installations that influence the route. Through this it possible to increase the efficiency in the production of the aircraft and the efficiency in the operation of the aircraft. | 2018-07-26 |
20180211000 | Method and System for Genotyping Samples in a Normalized Allelic Space - Aspects of the present invention describe an apparatus and method for generating genotype calls for a sample. The genotyping initially models allelic signal response into an allelic model having one or more model parameters for an identified one or more sources of systematic variation. The model and parameters are then used to transform the allelic signals to a normalized allelic space that serves to compensate for the one or more sources of systematic variation. By compensating for the systematic variation in this manner, the genotype for the sample is readily determined based upon its relationship to the representation of the allelic signals in normalized allelic space and in accordance with the allelic model. | 2018-07-26 |
20180211001 | TRACE RECONSTRUCTION FROM NOISY POLYNUCLEOTIDE SEQUENCER READS - Polynucleotide sequencing generates multiple reads of a polynucleotide molecule. Many or all of the reads may contain errors. Trace reconstruction takes multiple reads generated by a polynucleotide sequencer and uses those multiple reads to reconstruct accurately the nucleotide sequence. The types of errors are substitutions, deletions, and insertions. The location of an error in a read is identified by comparing the sequence of the read to the other reads. The type of error is determined by comparing both the base call of the read at the error location and base calls of the read and other reads in a look-ahead window that includes base calls adjacent to the error location. A consensus output sequence is developed from the sequences of the multiple reads and identification of the error types for errors in the reads. | 2018-07-26 |
20180211002 | SYSTEM AND METHODOLOGY FOR THE ANALYSIS OF GENOMIC DATA OBTAINED FROM A SUBJECT - The present teachings describe a method for determining the presence or absence of a fetal chromosomal aneuploidy in a pregnant female, the method comprising the calculation of a parameter p from sequences obtained from a biological sample from said pregnant female. The present teachings equally provide a method for determining the fetal fraction of said sample. | 2018-07-26 |
20180211003 | SEQUENCING USING CONCATEMERS OF COPIES OF SENSE AND ANTISENSE STRANDS - Methods and systems for single molecule sequencing using concatemers of copies of sense and antisense strands. Concatemers are provided, for example, by carrying out rolling circle amplification on a circular molecule having sense and antisense regions to produce repeated copies of the sense and antisense regions connected by linking regions. The circular molecules can be produced by ligating hairpin adapters to each end of a double-stranded nucleic acid having a sense and antisense strand. The ligations can be carried out, for example using blunt end ligation. In some cases, a single molecule consensus sequence for a single template molecule is obtained. A single read from each template molecule can be obtained by comparing the sequence information of the sense and antisense regions. | 2018-07-26 |
20180211004 | SYSTEM AND METHOD FOR PROVIDING BREAST IMAGE DATA - A system and method for providing breast image data. A transmission request is transmitted from a workstation to an imaging server with identifying characteristics for a mammography image. A pre-determined breast window for the mammography image is identified. An unprocessed image stored on the server that corresponds to the mammography image is identified, and breast image data can be determined for unprocessed image. The breast image data includes a breast window image that can be determined by applying the pre-determined breast window to the unprocessed image. The breast image data is transmitted to the clinician workstation, and the breast window image is displayed at the clinician workstation. | 2018-07-26 |
20180211005 | Implementing Localized Device Specific Limitations on Access to Patient Medical Information - A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement localized device specific limitations on access to patient medical information. An authorizing device receives a request from a requestor device via a close proximity communication protocol requesting to access an electronic medical record (EMR) associated with a patient. The authorizing device receives user input via a user interface specifying conditions for permitting access to the EMR associated with the patient. The authorizing device transmits an access authorization request to a patient registry system requesting the patient registry system to provide access to the EMR associated with the patient in accordance with the conditions for permitting access specified by the user input. The patient registry system generates a temporary access data structure based on the specified conditions. The patient registry system processes a subsequent request from the requestor device to access the EMR associated with the patient in accordance with the temporary access data structure. | 2018-07-26 |
20180211006 | METHOD AND SYSTEM FOR BACKING UP AND MAINTAINING ELECTRONIC MEDICAL RECORDS FOR PERIODS OF TEMPORARY LOSS OF CONNECTIVITY TO AN ELECTRONIC STORAGE FACILITY - A method and system is disclosed for backing up and maintaining electronic medical records for periods of temporary loss of connectivity between a healthcare facility and an eMAR/eTAR provider storing and maintaining medication administration records and treatment administration records for a healthcare facility. | 2018-07-26 |
20180211007 | Assist Selection of Provider/Facility for Surgical Procedures Based on Frequency of Procedure, History of Complications, and Cost - A mechanism is provided in a data processing system comprising at least one processor and at least one memory. The at least one memory comprises instructions executed by the at least one processor to cause the at least one processor to implement a clinical decision support system. The clinical decision support system receives a set of input data about a plurality of patients. The clinical decision support system identifies a target patient within the plurality of patients seeking guidance for a surgical procedure that has been recommended by a physician. A cluster analysis component executing within the clinical decision support system determines a cluster of patients within the plurality of patents that are similar to the target patient based on the set of input data. The cluster analysis component groups the cluster of patients into a plurality of sub-clusters of patients each being associated with a different level of complications. The clinical decision support system generates a user interface providing an output of providers or facilities ranked by history of complications and cost based on the sub-clusters of patients and corresponding data in the set of input data. | 2018-07-26 |
20180211008 | Assist Selection of Provider/Facility for Surgical Procedures Based on Frequency of Procedure, History of Complications, and Cost - A mechanism is provided in a data processing system comprising at least one processor and at least one memory. The at least one memory comprises instructions executed by the at least one processor to cause the at least one processor to implement a clinical decision support system. The clinical decision support system receives a set of input data about a plurality of patients. The clinical decision support system identifies a target patient within the plurality of patients seeking guidance for a surgical procedure that has been recommended by a physician. A cluster analysis component executing within the clinical decision support system determines a cluster of patients within the plurality of patents that are similar to the target patient based on the set of input data. The cluster analysis component groups the cluster of patients into a plurality of sub-clusters of patients each being associated with a different level of complications. The clinical decision support system generates a user interface providing an output of providers or facilities ranked by history of complications and cost based on the sub-clusters of patients and corresponding data in the set of input data. | 2018-07-26 |
20180211009 | PREDICTING AN ADVERSE REACTION TO PHYSIOLOGICAL STRESS - Embodiments of the invention provide a method, system and computer program product for predicting an adverse reaction to physiological stress. In one embodiment, the method detecting elevated levels of physiological stress experienced by an end user and logging a duration of the elevated levels of stress. Utilization data from one or more articles instrumented is received in connection with the end user and a time of utilization of the one or more articles logged. A correlation between the utilization of the one or more articles and the logged duration of elevated levels of stress is recorded in a data store. Finally, in response to a subsequent detection of an elevated level of physiological stress for a particular duration of time, a correlated utilization of the one or more articles is identified and a warning transmitted to the end user of a predicted utilization of the one or more articles. | 2018-07-26 |
20180211010 | METHOD AND SYSTEM FOR PREDICTING REFRACTORY EPILEPSY STATUS - A method of building a machine learning pipeline for predicting refractoriness of epilepsy patients is provided. The method includes providing electronic health records data; constructing a patient cohort from the electronic health records data by selecting patients based on failure of at least one anti-epilepsy drug; constructing a set features found in or derived from the electronic health records data; electronically processing the patient cohort to identify a subset of the features that are predictive for refractoriness for inclusion in a predictive model configured for classifying patients as refractory or non-refractory; and training the predictive computerized model to classify the patients having at least one anti-epilepsy drug failure based on likelihood of becoming refractory. | 2018-07-26 |
20180211011 | ANESTHESIA ASSESSMENT SYSTEM AND METHOD FOR ENHANCED RECOVERY AFTER SURGERY QUALIFICATION - A system for assessing a patient in an enhanced recovery after surgery (ERAS) program includes an ERAS tracking module that receives identification of ERAS monitoring parameters for monitoring whether the patient is on track to qualify for the ERAS program, including at least one drug delivery parameter, adequacy of anesthesia parameter, and vital sign. The ERAS tracking module receives ERAS qualification criteria for postoperative qualification for the ERAS program, and determines intraoperative tracking targets for each ERAS monitoring parameter, wherein the intraoperative tracking target is a desired value for the ERAS monitoring parameter during surgery that indicates postoperative qualification for the ERAS program. The ERAS tracking module receives parameter values for each ERAS monitoring parameter during the surgical procedure and compares each parameter value to the respective intraoperative tracking target, then determines an ERAS tracking indicator based on the comparison of the parameter value to the respective intraoperative tracking target. | 2018-07-26 |
20180211012 | METHOD AND SYSTEM FOR PREDICTING OPTIMAL EPILEPSY TREATMENT REGIMES - A method of building a machine learning pipeline for predicting the efficacy of anti-epilepsy drug treatment regimens is provided. The method includes providing electronic health records data; constructing a patient cohort from the electronic health records data by selecting patients based on a defined target variable indicating anti-epilepsy drug treatment regimen efficacy; constructing a set features found in or derived from the electronic health records data; electronically processing the patient cohort to identify a subset of the features that are predictive for anti-epilepsy drug treatment regimen efficacy for inclusion in predictive models configured for generating predictions representative of efficacy for a plurality of anti-epilepsy drug treatment regimens; and training the predictive computerized model to generate predictions representative of efficacy for a plurality of anti-epilepsy drug treatment regimens for the patients based on the defined target variable indicating anti-epilepsy drug treatment regimen efficacy. | 2018-07-26 |
20180211013 | Patient Communication Priority By Compliance Dates, Risk Scores, and Organizational Goals - A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement a clinical decision support system. A priority calculation component executing within the clinical decision support system receives weighted priority configuration for a health care facility and a set of patients with care gaps. The priority calculation component assigns a priority value to each given patient in the set of patients based on a risk score of at least one condition for the given patient, a number of days out of compliance for the at least one condition for the given patient, and an organizational goal factor associated with the at least one condition for the health care organization. The priority calculation component generates a prioritized communication sequence for the set of patients. A communication engine executing within the clinical decision support system initiates communication with patients within the set of patients based on the prioritized communication sequence. | 2018-07-26 |
20180211014 | METHOD AND SYSTEM FOR PROVIDING, TO PAPER BOOK BUYER, DIGITAL CONTENT COMPLEMENTARY TO PAPER BOOK - The owner (B) of a copy (A) of a specific paper book inputs his/her copy (A) into a machine (C) of a system. (C), for example, a vending machine, acquires the paper book and then requests user authentication to (B). (B) identifies the identification card and his/her fingerprint to the machine. The machine transmits the acquired information to the system server, and the system server recognizes that (B) is the specific system user (B′) registered in the system and (B′) owns (A). Thereafter, the system server allows (B′) access to the digital content associated with (A). Then, the system server creates an “authenticator behavior rule (D)” unique to (A) and presents the same to (C). (C) leaves a physical mark somewhere in (A) and returns the same to (B) according to (D) received. (B) accesses the system server through his/her own client device, requests a system service from the system server after a user/device authentication process, and receives the service (a usage right, an access right, etc. according to a specific usage rule) so as to experience the digital content associated with (A). | 2018-07-26 |
20180211015 | CONTROLLING ACCESS BY CODE - A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (APIs). A digital signature is provided to the requestor. The digital signature indicates authorization by a code signing authority for code of the requestor to access the one or more specific APIs. In one example, the digital signature is provided by the code signing authority or a delegate thereof. In another example, the code signing request may include one or more of the following: code, an application, a hash of an application, an abridged version of the application, a transformed version of an application, a command, a command argument, and a library. | 2018-07-26 |
20180211016 | MEDIA CLIENT DEVICE AUTHENTICATION USING HARDWARE ROOT OF TRUST - A client device for media playback includes a user-installable media client application which implements the client-side of a digital rights management (DRM) system. The client device employs secure boot and verifies the user-installed application. The application is hardened against reverse engineering, and it utilizes a special API provided by the client device to tie into the secure boot, bridging the gap between the secure boot and the client-side of the DRM system contained within the application. | 2018-07-26 |
20180211017 | SOFTWARE DIVERSIFICATION IN EXTERNAL CONTEXTS - The present invention features a system in which dynamic code randomization may be used in concert with enforcement-based mitigation policies to optimally secure a software code. A privileged, external execution context is employed when rewriting (randomizing) the software code. The rewritten code is then reloaded and executed in a less privileged execution context. Finally, the system ensures that the less privileged execution context is authorized to load and execute the code before rewriting. | 2018-07-26 |
20180211018 | MOBILE DEVICE WITH BUILT-IN ACCESS CONTROL FUNCTIONALITY - A mobile device includes an access control unit including a storage module and a control module, a memory unit storing an application program, and a processing unit connected to the aforementioned components. The processing unit executes the application program so as to transmit credential information to the access control unit for verification. When the application program is verified as authentic, the control module allows the processing unit to transmit an asserted user ID and an asserted user password thereto, looks up in a permissions table a user authority based on the asserted user ID, and enables the processing unit to operate the storage module based on the user authority, the asserted user ID, the asserted user password and an ID-password table. | 2018-07-26 |
20180211019 | COMMUNICATION PATTERN RECOGNITION - For communication pattern recognition, an apparatus is disclosed. The apparatus includes a baseline analysis module that samples predefined sources associated with a user and generates a baseline fingerprint for the user. The apparatus includes an active analysis module that re-samples the predefined sources associated with the user after a predefined time interval and generates an active fingerprint for the user. The apparatus includes a verification module that compares the active fingerprint to the baseline fingerprint and determines whether the active fingerprint closely matches the baseline fingerprint. If the active fingerprint closely matches the baseline fingerprint, then the verification module replaces the baseline fingerprint with the active fingerprint. If the active fingerprint does not match the baseline fingerprint, then the verification module performs a predefined action to rectify differences between the baseline fingerprint and the active fingerprint. | 2018-07-26 |
20180211020 | AUTHENTICATION DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND PROGRAM - An authentication device includes: a wearing position determination unit that determines a wearing position, the wearing position being a position at which a wearable article comprising a sensor is being worn on a body; and an authentication unit that performs authentication by using biometric information of the body, the biometric information being detected by the sensor at the wearing position. | 2018-07-26 |
20180211021 | AUTHENTICATION DEVICE, AUTHENTICATION SYSTEM, AND AUTHENTICATION METHOD - The present invention relates to an authentication device that executes an online transaction typified by a transfer process of an online banking service. | 2018-07-26 |
20180211022 | SYSTEM AND METHOD FOR CONDUCTING TRANSACTIONS USING BIOMETRIC VERIFICATION - A biometric verification system is disclosed. The system includes a portable device which stores a biometric reference template and authentication preferences. The portable device can be used with an access device. The access device can prompt the user for a biometric sample. The access device may create a biometric sample template from the biometric sample, and the biometric sample template can be compared to the biometric reference template to determine if a user is authentic. | 2018-07-26 |
20180211023 | An Apparatus Comprising a Biometric Sensor - An apparatus including: a biometric sensor for sensing one or more biometric parameters of a subject; a detector configured to detect one or more subject-dependent parameters; and a controller configured to initially perform a security function using the biometric sensor and subsequently perform the security function, after successful verification of the one or more detected subject-dependent parameters, without using the biometric sensor. | 2018-07-26 |
20180211024 | LOCKING AND UNLOCKING A MOBILE DEVICE USING FACIAL RECOGNITION - In an embodiment of the invention, an unlocked mobile device is configured to capture images, analyze the images to detect a user's face, and automatically lock the device in response to determining that a user's face does not appear in the images. The camera capturing and face recognition processing may be triggered by the device having detected that it has been motionless for a threshold period of time. In another embodiment, a locked mobile device is configured to capture an initial image using its camera, capture a new image in response to detecting movement of the device, determine that the device moved to a use position, capture a subsequent image in response to determining that the device moved to a use position, analyze the subsequent image to detect a user's face, and unlock the device in response to detecting the user's face. Other embodiments are also described and claimed. | 2018-07-26 |
20180211025 | APPARATUS AND METHOD FOR USING A CUSTOMER DEVICE CERTIFICATE ON A DEVICE - An apparatus for using a certificate on a device is proposed, including a processing unit for generating a certificate request and a transmitter-receiver unit for transmitting the generated certificate request to a first external computing unit, which is configured to generate a certificate for the device and to allow a second external computing unit to re-sign the certificate with an additional manufacturer's signature, and for receiving the re-signed certificate from the external computing unit. The processing unit is further configured to check the manufacturer's signature based on information stored in the device and to use the certificate depending on a result of the check. Furthermore, a system and a corresponding method are proposed. | 2018-07-26 |
20180211026 | Interacting with a Computing Device via Identity-Bearing Peripheral Devices - A technique is described herein by which a user may gain access to a target resource via one or more particular peripheral devices that have been associated with the user. The technique performs this task by detecting when a user communicatively couples an identity-bearing component to a hub device. The user may thereafter use any input and/or output peripheral device that is also coupled to hub device to interact with the target resource, in a manner specified by authentication information associated with the user. In another use scenario, two or more users may interact with the same target resource via respective collections of user-associated peripheral devices. | 2018-07-26 |
20180211027 | PASSWORD SETTING METHOD AND DEVICE - The present disclosure provides a password setting method and device. The method includes: displaying a password setting page including a preset number of picture display areas to a user; displaying a picture selected by the user in the picture display area of the password setting page according to a picture selection operation of the user; collecting a touch track of the user with regard to the picture display areas; and setting a password according to identifiers of the picture display areas recorded in collected touch track and the order in which the respective picture display areas appear in the touch track. | 2018-07-26 |
20180211028 | MOBILE APPLICATION, RESOURCE MANAGEMENT ADVICE - Techniques for a resource management advice service are provided. In some examples, resource management advice and/or instructions may be provided for use with mobile devices, mobile applications, cloud applications, and/or other web-based applications. For example a mobile client may request to perform one or more resource management operations associated with a service provider. Based at least in part on the requested operation and/or the particular service provider, advice and/or instructions for managing the resource may be provided. | 2018-07-26 |
20180211029 | ELECTRONIC DEVICE AND METHOD FOR MANAGING DATA IN ELECTRONIC DEVICE - An electronic device is provided. The electronic device includes a memory and at least one processor configured to execute a first application among at least one application stored in the memory, determine whether to permit to provide meta information including information for accessing first data related to a first function of the first application stored in the memory based on first user information with which the first application is executed, and perform control as to whether to provide a virtual file system with the meta information about the first data. | 2018-07-26 |
20180211030 | TERMINAL APPARATUS AND CONTROL METHOD FOR TERMINAL APPARATUS - A terminal apparatus and a control method are disclosed. The terminal apparatus comprises: an input part for receiving a fingerprint; a control part for performing an authentication procedure with respect to the input fingerprint; and a display part for outputting a notification message if fingerprint authentication with respect to the input fingerprint is completed, wherein the control part sets a fingerprint authentication cancellation mode if contact of the fingerprint lasts for a first predetermined time or more after the fingerprint authentication was completed and can cancel authentication of the fingerprint if a predetermined condition is met. | 2018-07-26 |
20180211031 | VIRTUAL MACHINE MALWARE SCANNING - Methods, systems, and computer program products for selecting a virtual machine to perform a task corresponding to a client request and performing the task at the virtual machine. After performing the task at the virtual machine, an indicator corresponding to a shutdown of the virtual machine is detected. After detecting the indicator and prior to the shutdown of the virtual machine, a memory space is preserved corresponding to the virtual machine. The preserved memory space is then scanned for malware. | 2018-07-26 |
20180211032 | LOG INFORMATION GENERATION APPARATUS AND RECORDING MEDIUM, AND LOG INFORMATION EXTRACTION APPARATUS AND RECORDING MEDIUM - A log information generation apparatus includes: a process information generation unit which generates first identification information for temporally and spatially uniquely identifying a process that is an execution subject of an application program at a start of a process behavior constituted by a series of events of the process, in a space of a system including a plurality of computers, and which generates process information including the first identification information; an event information generation unit which generates event type information indicating an event type for each of the events and which generates event information including the event type information; and a log information generation unit which generates, for each of the events, log information including the process information generated by the process information generation unit and the event information generated by the event information generation unit. | 2018-07-26 |
20180211033 | DETECTING THREATS IN BIG DATA PLATFORMS BASED ON CALL TRACE AND MEMORY ACCESS PATTERNS - A runtime attack can be detected on a big data system while processes are executed on various computing devices. A behavior profile can be maintained for tasks or processes running on different computing devices. The existence of a call variance in one of the traces for one of the behavior profiles can be determined. A memory variance can also be detected in one of the behavior profiles. A runtime attack has occurred when both the memory variance and the call variance are determined to exist. | 2018-07-26 |
20180211034 | ENCLAVE CLIENT ABSTRACTION MODEL - Abstraction programming models of enclave security platforms are described, including receiving a request from an enclave client according to a client abstraction protocol, converting the request into a native enclave protocol, and sending the converted request to a native platform. The request may be, for example: a request to instantiate an enclave, verify an attestation report of an enclave, a request to call into an enclave, or a request to allocate memory that is shared with both the enclave and the enclave client. | 2018-07-26 |
20180211035 | ABSTRACT ENCLAVE IDENTITY - An abstract enclave identity is presented. An abstract identity may be a secure identity that may be the same for multiple related, but not identical, enclave instantiations. An enclave identity value may be determined from an abstract enclave identity type with respect to a instantiated enclave. Various enclave operations may be performed with an abstract identity, such as sealing data to an abstract identity, incrementing a monotonic counter, making trusted time measurement. | 2018-07-26 |
20180211036 | TECHNIQUES FOR IMPROVING SEAMLESS USER EXPERIENCE ON AIR-GAPPED ENDPOINTS - A method for performing user experience (UX) functions on an air-gapped endpoint is provided. The method includes monitoring a plurality of security zones, instantiated on the air-gapped endpoint, to detect at least one UX command executed in a first security zone; determining if the detected UX command triggers a UX function effecting a second security zone; determining if the UX function to be triggered maintains compliance with a security policy of the first and second security zones; and executing the UX function across the first and second security zones. | 2018-07-26 |
20180211037 | IDENTIFYING COMPUTER BEHAVIOR USING VISUAL DATA ORGANIZATION AND GRAPHS - Configuration discrepancies, such as server drift among different servers or malicious code installed on one or more servers, can be identified using system attribute information regarding processes, CPU usage, memory usage, etc. The system attribute information can be used to generate an image, which can be compared to other images to determine if a configuration discrepancy exists. Image recognition algorithms can be used to facilitate image comparison for different systems. By identifying configuration discrepancies, downtime and other issues can be mitigated and system performance can be improved. | 2018-07-26 |
20180211038 | RANSOMWARE ATTACK REMEDIATION - A method for processing files as a preemptive measure against a ransomware activity. The method comprises scanning a plurality of file operation requests sent to an operating system (OS) executed on a computing device to detect a guarded file operation request that comprises instructions to process a file managed by a file system used by said OS, delaying an execution of said guarded file operation request, temporarily storing a copy of said file in a backup storage in response to said detection of said guarded file operation request, and stop delaying said execution of said guarded file operation request when said copy is stored in said backup storage. | 2018-07-26 |
20180211039 | RANSOMWARE RESILIENT DATABASES - A system for protecting a database against a ransomware attack includes a database backup handler configured to selectively output database backup data associated with a database to a storage device. A ransomware detector is configured to monitor changes to the database and to detect data changes to the database resulting from a ransomware attack. A ransomware remediator communicates with the ransomware detector and the database backup handler and is configured to restore data in the database to a point prior to the ransomware attack based upon the backup data in the storage device. | 2018-07-26 |
20180211040 | BEHAVIOR-BASED RANSOMWARE DETECTION - An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and detects behaviors that conform to a predefined set of behaviors indicative of ransomware. Responsive to detecting these behaviors, indicators are stored to a log in a storage device. Each of the indicators in the log is associated with respective scores. A running score for each thread is generated by combining the respective scores of the indicators in the log. Responsive to determining that the running score exceeds a predefined threshold score, execution of the thread is terminated. The source ransomware file is then identified and quarantined. | 2018-07-26 |
20180211041 | Detection of Malware Using Feature Hashing - Data to is analyzed using feature hashing to detect malware. A plurality of features in a feature set is hashed. The feature set is generated from a sample. The sample includes at least a portion of a file. Based on the hashing, one or more hashed features are indexed to generate an index vector. Each hashed feature corresponds to an index in the index vector. Using the index vector, a training dataset is generated. Using the training dataset, a machine learning model for identifying at least one file having a malicious code is trained. | 2018-07-26 |
20180211042 | ESCALATED REMEDIATION - Example implementations relate to escalated remediation. In an example implementation, a recovery script for addressing a security threat to the computing system may be received by a recovery service from a triggering entity. The recovery script may be processed by the recovery service to determine a security-related recovery action and a target component of the recovery action. The recovery action may be forwarded by the recovery service to a recovery agent at an abstraction layer immediately above the target component. The recovery agent may execute the recovery action on the target component. In response to a determination by the triggering entity that the recovery action did not address the security threat, the recovery service may receive a next recovery script that is more aggressive. | 2018-07-26 |
20180211043 | Blockchain Based Security for End Points - Systems and methods are provided for distributing security information. The systems and methods include a network having a plurality of nodes for storing a plurality of linearly integrated data records in a distributed file system, each linearly integrated data record including security information, a client installed on each node, each client configured to obtain the security information from at least one other node in the network, and a module contained within each client for delivering the obtained security information to an endpoint security application of the corresponding node. | 2018-07-26 |
20180211044 | METHOD AND APPARATUS FOR UPGRADING EMBEDDED MEMORY AND TERMINAL ASSOCIATED THEREWITH - Embodiments of the present disclosure provide a method and apparatus for upgrading an embedded memory and a terminal associated therewith. The method includes: reading a current embedded memory on a board card of a terminal to obtain embedded memory information; determining a machine type corresponding to the current embedded memory based on the embedded memory information; and selecting for the machine type a partition configuration file that matches with the current embedded memory to upgrade. | 2018-07-26 |
20180211045 | APPLICATION SECURITY ASSESSMENT - Application security assessment is described. A system identifies a first security configuration and a second security configuration associated with an application. The system calculates a security score based on a comparison of the first security configuration to a first baseline security setting and a comparison of the second security configuration to a second baseline security setting. The system generates a security report associated with the application that includes the security score and outputs the security report. | 2018-07-26 |
20180211046 | ANALYSIS AND CONTROL OF CODE FLOW AND DATA FLOW - Technologies are provided in embodiments to analyze and control execution flow. At least some embodiments include decompiling object code of a software program on an endpoint to identify one or more branch instructions, receiving a list of one or more modifications associated with the object code, and modifying the object code based on the list and the identified one or more branch instructions to create new object code. The list of one or more modifications is based, at least in part, on telemetry data related to an execution of corresponding object code on at least one other endpoint. In more specific embodiments, a branch instruction of the one or more branch instructions is identified based, at least in part, on an absence of an instruction in the object code that validates the branch instruction. | 2018-07-26 |
20180211047 | AUTOMATED INTELLIGENCE GRAPH CONSTRUCTION AND COUNTERMEASURE DEPLOYMENT - Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data, obtaining document data, preparing fundamental instance nodes from the fundamental data, preparing document nodes from the document data, preparing edges between at least some of the nodes, storing the nodes and the edges in a manner that reflects a graph structure, and causing to be displayed at least a portion of a graph defined by at least one node and at least one edge. | 2018-07-26 |
20180211048 | OBJECT AND COMMUNICATION PROGRAM - An object includes: a first communication interface unit configured to communicate with a first apparatus; a second communication interface unit configured to communicate with a second apparatus; and a control unit configured to perform control to transmit second information based on first information received from the first apparatus via the first communication interface unit to the second apparatus via the second communication interface unit, and, in a case that communication with the first apparatus via the first communication interface unit ends, perform control to transmit request information for requesting deletion of the second information transmitted to the second apparatus to the second apparatus. | 2018-07-26 |
20180211049 | ENCRYPTION AND DECRYPTION OF DATA OWNED BY A GUEST OPERATING SYSTEM - An apparatus includes one or more processor core, trusted key store, memory controller, and a memory module. The memory controller includes an encryption/decryption module that encrypts data being stored to the memory module for a guest OS being executed by the processor core(s) and that decrypts data being read from the memory module for the guest OS. Data owned by the guest OS is encrypted and decrypted by the encryption/decryption module using an encryption key stored by the trusted key store in association with the guest OS. A method encrypts data owned by the guest OS using the encryption key assigned to the guest OS and stores the encrypted data on a memory module, wherein the encrypted data is stored in association with the process identifier of the guest OS, and decrypts the encrypted data using the guest OS encryption key and provides the decrypted data to the guest OS. | 2018-07-26 |
20180211050 | METHOD AND A COMPUTING DEVICE FOR PROVIDING PRIVACY CONTROL IN A SURVEILLANCE VIDEO - Method and a computing device for providing privacy control in a surveillance video is disclosed. The computing device receives a surveillance video from a video capturing. The computing device also receives an authentication input key from a user of the computing device. Based on the authentication input key, the computing device identifies one or more region of interests (ROIs) in the video surveillance. The identified ROIs are masked by the computing device for providing the privacy control. In the present disclosure, the number of privacy levels achievable are unlimited and not fixed by ROIs at the video capturing device end. The increase in number of privacy levels do not require any changes or complexity/power increase in the video capturing device end and doesn't demand for increase in bandwidth from the video capturing device. Further, it doesn't deteriorate the video quality. | 2018-07-26 |
20180211051 | MANAGING MULTI-TENANT SYSTEMS USING OBJECT-ORIENTED MODELS - Methods, systems, and computer-readable storage media for providing a system that interacts with a plurality of tenant systems, the plurality of tenants including at least a first and a second tenant system, storing tenant-specific content in respective tenant namespaces, the tenant-specific content including first content of the first tenant system stored in a first tenant namespace, and second content of the second tenant system stored in a second tenant namespace, storing shared content in a shared namespace, the shared content including content that is not specific to a tenant in the plurality of tenants, storing an object-oriented data model (OOM) in the shared namespace, the OOM including two or more data objects, and one or more associations between data objects, and processing a request received from one of the first and the second tenant systems based on the OOM, the shared content, and one of the first and second content. | 2018-07-26 |
20180211052 | PROTECTING METHOD FOR ACCESSING MATERIAL DATA OF PRINTER - A protecting method for accessing material data adopted by a printer having a processing unit, a MCU for storing material data, and a transmission interface is disclosed. The method includes following steps of: determining whether to decide a data format at the processing unit once the material data is to be saved or read; generating confirm signal to be transmitted to the MCU through the transmission interface if the data format needs to be decided; looking up a table or performing a calculation according to content of the confirm signal at both the processing unit and the MCU for obtaining a corresponding data format; and, generating and transmitting transmission signal which includes the material data based on the corresponding data format by the processing unit and the MCU. | 2018-07-26 |
20180211053 | ACCESS INFORMATION SETTING SYSTEM, ACCESS INFORMATION SETTING METHOD AND DATA TRANSMISSION DEVICE - An access information setting system includes: a data reception device; a data transmission device that transmits data to the data reception device via a network; and a writing device that writes access information for accessing to the data reception device via the network, in a storing medium. The data transmission device obtains the access information written in the storing medium, and sets a network setting for accessing to the data reception device in accordance with the access information as one network setting which can be used by the data transmission device. | 2018-07-26 |
20180211054 | DEPENDENT ENCLAVE BINARIES - Techniques for instantiating an enclave from dependent enclave images are presented. The techniques include identifying a first set of dependent enclave indicators from a primary enclave image, identifying a first dependent enclave image corresponding to one of the first set of dependent enclave indicators, creating a secure enclave container, and copying at least a portion of the primary enclave image and at least a portion of the first dependent enclave image into the secure enclave container. | 2018-07-26 |
20180211055 | ADAPTIVE PERMISSION TOKEN - Techniques are disclosed relating to generating permission tokens. A first computer system may store permission information for a user that indicates a plurality of permissions for the user for accessing data within a database system. The first computer system may receive, from a user device, a permission request for permissions to perform actions at a second computer system. In response to authenticating the user, the first computer system may create a token with one or more permissions for the user by selecting the one or more permissions from the plurality of permissions stored for the user such that the created token does not exceed a specified size and may provide the token to the user device. | 2018-07-26 |
20180211056 | SYSTEMS AND METHODS FOR SCOPE-BASED ACCESS - An authorization system provides fine grain entitlements to a resource server by retrieving a dynamic constraint graph as a function of an authorization request, and traversing the dynamic constraint graph as a function of the contextual attributes of the request. The contextual attributes can include local contextual attributes specific to the user or user group, and global contextual attributes specific to the current environment of the authorization system. Traversing the dynamic constraint graph provides an access result that can provide fine grain entitlements for a request. | 2018-07-26 |
20180211057 | TRANSMISSION METHOD, APPARATUS AND SYSTEM - A thing information transmission method, apparatus and system in the Internet of Things are for reducing risk of sensitive information leakage when thing information is acquired in the current Internet of Things. In a thing information transmission method of an embodiment, a second device sends thing identification information to a first device, and the first device sends a thing information request message to a third device, the thing information request message including verification information and the thing identification information, the verification information not including device identification information about the second device and also not including identity identification information about a user. The third device sends thing information to the first device when determining that the thing information request message has a permission of the acquired thing information according to the verification information. The leakage of the device identification and user identity can be effectively avoided. | 2018-07-26 |
20180211058 | TRUST BASED ACCESS TO RECORDS VIA ENCRYPTED PROTOCOL COMMUNICATIONS WITH AUTHENTICATION SYSTEM - Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. An example system is configured to authorize and provide selective and secured access to sensitive medical information according to one or more trusted relationships. The system is configured to receive a request for access to a patient's health record from an outside entity. Authentication information associated with the outside entity is determined. Whether the outside entity is authorized to access the requested data is determined. The determination is based on existence of a trust relationship being established between the outside entity and the patient, the trust relationship established by an action of the patient or a patient's representative. Access to the patient's health record is enabled based on a positive determination. | 2018-07-26 |
20180211059 | TRUST BASED ACCESS TO RECORDS VIA ENCRYPTED PROTOCOL COMMUNICATIONS WITH AUTHENTICATION SYSTEM - Systems and techniques are disclosed for trust based access to records via encrypted protocol communications with an authentication system. One of the methods includes maintaining, in one or more databases, health records associated with patients. Each health record including portions of medical information and each portion being separately trustable to one or more outside entities. The trust indicating that an outside entity can access a portion. A request from a user device of a patient is received, the request indicating access to a health record associated with the patient. Requests for information are presented on the user device, the requests indicating features of patients that are usable to identify a specific patient. The patient uniquely corresponding to a particular health record is determined, and user account information for the patient is generated, with the user account information used to identify portions of medical information associated with the particular health record. | 2018-07-26 |
20180211060 | Information Based Life View - A method for enabling a user to customize, prioritize, and view information filtered to align with the user's life state that includes interaction with an online market place. The user provides priority, positioning, and custom information about the user's life state which allows the user to view information in a life view. This information may include at least demographic information, logistical information, ethnic information, social information and psychological information. The partners may use the information about the user's life to filter its information according to the information about the user's life, which is then viewed in a life view by a user, according to the user defined positioning, prioritization, and other custom parameters. The method also enables the user to view partner and user participation in a marketplace to procure the information about the user's life, user ratings according to the user's behavior, and partner ratings according to the partner's information delivery. | 2018-07-26 |
20180211061 | Data Filtering for Data Request Workflow System - A data request workflow system comprises a vehicle operational data. A file processing system receives the vehicle operational data. At least one set of predefined file editing rules automatically applies the at least one set of predefined file editing rules to automatically edit vehicle operational data such that the vehicle operational data cannot be linked to a specific vehicle operator. | 2018-07-26 |
20180211062 | SELECTIVELY OBSCURING REPRESENTATIVE ATTRIBUTES OF FILES - Systems, methods, and software are disclosed herein for obfuscating representative attributes of files. In an implementation, an application identifies a set of files to make available in a file selector view of a user interface to the application. For at least a file of the set of files, the application identifies an obfuscation group(s) to which the file belongs and produces a representative attribute(s) of the file as specified in metadata for the obfuscation group. The representative attribute of the file may be presented in the file selector view in the user interface to the application. | 2018-07-26 |
20180211063 | TRANSMISSION METHOD, APPARATUS AND SYSTEM - A thing information transmission method, apparatus and system in the Internet of Things are for reducing risk of sensitive information leakage when thing information is acquired in the current Internet of Things. In a thing information transmission method of an embodiment, a second device sends thing identification information to a first device, and the first device sends a thing information request message to a third device, the thing information request message including verification information and the thing identification information, the verification information not including device identification information about the second device and also not including identity identification information about a user. The third device sends thing information to the first device when determining that the thing information request message has a permission of the acquired thing information according to the verification information. The leakage of the device identification and user identity can be effectively avoided. | 2018-07-26 |
20180211064 | MEMORY INTEGRITY MONITORING - In one example in accordance with the present disclosure, a system comprises a first memory module and a first memory integrity monitoring processor, embedded to the first memory module, to receive a second hash corresponding to a second memory module. The second hash includes a second sequence number for reconstruction of a final hash value and the second hash is not sequentially a first number in a sequence for reconstruction of the final hash value. The first processor may receive a third hash corresponding to a third memory module. The third hash includes a third sequence number for reconstruction of the final hash value and the third hash is received after the second hash. The first processor may determine if the second hash can be combined with the third hash, combine the second hash and third hash into a partial hash reconstruct the final hash value using the partial hash. | 2018-07-26 |
20180211065 | ASYMMETRICALLY MASKED MULTIPLICATION - Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations can be masked to make squaring operations indistinguishable or less distinguishable from multiplication operations. In general, squaring operations are converted into multiplication operations by masking them asymmetrically. Additional methods and systems are disclosed for defeating DPA, cross-correlation, and high-order DPA attacks against modular exponentiation. | 2018-07-26 |
20180211066 | ACCESSING A PASSENGER TRANSPORTATION DEVICE CONTROL MEANS - The invention refers to a method for accessing an passenger transportation device control means comprising several separated printed circuit boards (PCB), whereby each of these PCBs comprises a unique identifier (ID), and in which method the passenger transportation device control means comprise a matching table which is used by the passenger transportation device control means to perform a matching test to check the identifier of at least two of the PCBs and to put the passenger transportation device control means into normal operation only if their IDs match the IDs of the matching table. A service technician connects via a key to the passenger transportation device control means, which key enables the service technician to set the passenger transportation device control means into a fault finding mode, in which fault finding mode the passenger transportation device control means are initiated to skip the matching test before getting into operation, whereby the fault finding mode is terminated at the latest when the service technician terminates the key-based connection with the passenger transportation device control means. | 2018-07-26 |
20180211067 | CROSS-PLATFORM ENCLAVE IDENTITY - An abstract enclave identity is presented. An abstract identity may be a secure identity that may be the same for multiple related, but not identical, enclave instantiations. An enclave identity value may be determined from an abstract enclave identity type with respect to a instantiated enclave. An abstract identity value may be used to determine equivalence of two enclave instantiations that are not identical, such as two similar enclaves hosted on different computers, two enclaves hosted on different native enclave platforms, and two enclaves instantiated from different versions of the same enclave binary images. | 2018-07-26 |
20180211068 | SYNCHRONIZED HARDWARE-BASED SECURITY FOR A COMMUNICATION SYSTEM - An improved apparatus, method and computer-readable storage medium are provided for implementing a secured communication system via synchronized hardware-based security. The present disclosure thus includes, without limitation, various example implementations directed toward secured data transmission reliant on hardware-based encryption and/or decryption methods. The secured communication system may provide secure real-time communications over networks, such as, but not limited, to computer networks, even when the networks being used are inherently insecure. | 2018-07-26 |
20180211069 | SECURITY CASE - The present invention is a self contained, portable security case or container. The case is secure in its locked condition by locks which are preferably operated by an electronic key. The electronic key can be programmed to open the case or container dependent upon various different conditions, for example, location, time, identification of operator, etc. In addition to the electronic key, a biometric identification device can be employed. The exterior of the case or container is made from different materials which are impermeable and resistant to heat, drilling and ballistic impact. A GPS type of location device located within the case enables the case to be tracked from remote locations. | 2018-07-26 |
20180211070 | EMBEDDING DATA ON OBJECTS USING SURFACE MODULATION - Methods and apparatus are disclosed for embedding static information (such as serial numbers, etc.) on objects by modifying their exterior shape slightly, dubbed surface modulation. Data is embedded when the object is created and can then be read using readers with the appropriate resolution. According to one example of the disclosed technology, a method of embedding data expressed as a binary sequence onto an object surface includes establishing a coordinate system over an object surface, computing a transform of the coordinate system to a frequency domain, mapping the binary sequence to an integer value, replacing the highest frequency coefficient of the transform with the integer value, computing an inverse of the transform, producing a vector expressed in the coordinate system, and fabricating at least a portion of the object surface according to the vector. | 2018-07-26 |
20180211071 | CARD WITH ELECTRICALLY CONDUCTIVE POINTS THAT ARE READABLE - A card that includes an electrically non-conductive substrate and a plurality of conductive points disposed on a bottom surface of the non-conductive substrate. The conductive points are connected with a coupling point disposed on a top surface of the substrate through vias that extend through the substrate. The conductive points form a pattern that represents an identification of the card and activate locations on a touchscreen of an electronic device. At least three of the conductive points form a predetermined shape such that the electronic device determines a location and an orientation of the card when the card is placed on the touchscreen of the electronic device. | 2018-07-26 |
20180211072 | Shopping Cart With an RFID Interface and Associated Systems and Methods - Described in detail herein are systems and methods for interacting with an interactive display using a shopping cart. A user navigate a shopping cart to a computing system including an interactive display and can actuate or press one or more push buttons associated with RFID tags integrated with the handle portion on a shopping cart to interact with the interactive display. A unique identifier can be associated with each RFID tag. A RFID reader disposed with respect to the computing system can detect the unique identifiers associated with the one or more detected RFID tags. The RFID reader can transmit the unique identifiers to the computing system. The computing system can execute the retrieved actions on the interactive display, based on the one or more buttons actuated or pushed and the correlated RFID tags. | 2018-07-26 |
20180211073 | COMBINED PASSIVE TAGS AND ACTIVE SHORT RANGE WIRELESS COMMUNICATIONS - An access control system that utilizes a combination of passive tags and active RFIDs. The system may combine passive and active circuitry in one package or may be separable. The system may incorporate legacy passive access control tags. An access control tag may be associated with a network protocol ID. | 2018-07-26 |
20180211074 | Shopping Cart With an RFID Interface and Associated Systems and Methods - Described in detail herein are systems and methods for interacting with an interactive display using a shopping cart. A RFID reader can read RFID tags integrated with a handle portion of a shopping cart. A unique identifier can be encoded in each of the RFID tags. A user of the shopping cart can the RFID reader from reading one or more of the RFID tags in response to a hand of a user obscuring the one or more RFID tags. The RFID reader can detect which of RFID tag(s) are covered. The RFID reader can transmit the identifier(s) of the covered RFID tag(s) to a computing system. The computing system can include an interactive display. The computing system can retrieve a specified action to be performed on the interactive display. The computing system can control, to perform a specified action on the interactive display. | 2018-07-26 |
20180211075 | Adjustable Bent Housing Actuation Using Radio Frequency Identification - An assembly usable with a bottom hole assembly in a wellbore can include a fixed housing member coupleable to a bent housing member at a housing coupling location. The bent housing member can rotate relative to the fixed housing member and can include an offset opening for receiving a drive shaft. The assembly can include an RFID tag positioned on a piston that is slideably positioned within the fixed housing member. An RFID reader can be positioned on the fixed housing member for detecting the RFID tag in response to the RFID tag being in a detectable range of the RFID reader. The RFID reader can also be for transmitting information about the RFID tag for controlling a motor to rotate and position the drive shaft at a selected angular position. | 2018-07-26 |
20180211076 | APPARATUS AND METHOD FOR PROVIDING A GRAPHIC REPRESENTATION OR GRAPHIC REPRESENTATION SEQUENCE FOR DETECTION BY A DETECTOR - For providing an apparatus and method for providing a graphic representation ( | 2018-07-26 |
20180211077 | SECURITY DEVICE AND SECURITY SYSTEM INCLUDING THE SAME - A security device includes a door handle unit disposed on a door body, a cover layer including a touch sensor and covering the door handle unit, a door locking unit which controls a locking of the door body. The touch sensor may include a plurality of sensor pixels, each including a sensor electrode which forms a second capacitor with a hand of a user when a touch occurs thereon by the user. The touch sensor may generate touch information based on a change in capacitance of the second capacitor corresponding to the touch. | 2018-07-26 |
20180211078 | HYBRID OPTICAL AND CAPACITIVE SENSOR - A hybrid capacitive and optical fingerprint sensor system includes: capacitive sensor electrodes; an optical image sensor having a plurality of image sensor pixels; light conditioning elements, configured to condition light from a sensing region of the hybrid capacitive and optical fingerprint sensor for detection by the optical image sensor; and a processing system having one or more controllers, configured to operate the capacitive sensor electrodes in a low-power mode of operation for the hybrid capacitive and optical fingerprint sensor, and to operate the optical image sensor to acquire an image from the sensing region of the hybrid capacitive and optical fingerprint sensor. | 2018-07-26 |
20180211079 | ARRAY SUBSTRATE, DISPLAY PANEL AND DISPLAY APPARATUS HAVING THE SAME, AND DRIVING METHOD THEREOF - The present application discloses an array substrate including a base substrate; an array of a plurality of pixel units on the base substrate, each pixel unit including at least one subpixel for image display, at least some of the plurality of pixel units including a semiconductor photodetector in at least one subpixel for detecting biometric information; a plurality of first scan lines for driving image display; a plurality of second scan lines, each second scan line being connected to a row of subpixels having the semiconductor photodetector in a row of pixel units; and a plurality of read lines, each read line being connected to each semiconductor photodetector in a column of subpixels having the semiconductor photodetector in a column of pixel units. | 2018-07-26 |
20180211080 | Fingerprint Identification Circuit, Touch Apparatus and Fingerprint Identification Method - A fingerprint identification circuit comprises multiple reading sub-circuits, and multiple fingerprint identification sub-circuits each column of fingerprint identification sub-circuits are connected with one reading sub-circuit, each fingerprint identification sub-circuit comprises a writing sub-circuit, a sensing sub-circuit and a output sub-circuit, the writing sub-circuit is connected with a scan signal input terminal; the sensing sub-circuit senses a fingerprint and transmits a sensing signal to the output sub-circuit, the output sub-circuit outputs the sensing signal upon the writing sub-circuit is turned off each fingerprint identification sub-circuit further comprises: a converting and amplifying sub-circuit provided between the sensing sub-circuit and the output sub-circuit, for converting the sensing signal into a current signal, amplifying the current signal and outputting it to the output sub-circuit, the reading sub-circuit is connected with the output sub-circuit for reading the sensing signal and converting the current signal into a voltage signal to output. | 2018-07-26 |
20180211081 | ULTRASONIC BIOMETRIC SENSOR - An ultrasonic biometric sensor comprises a detection chip. The detection chip includes a substrate, an ultrasonic transducer array and a control circuit. The ultrasonic transducer array is arranged on the substrate, including a plurality of arrayed piezoelectric elements. Each piezoelectric element is disposed on a floating membrane. The floating membrane is suspended in the opening side of a cavity by at least one support arm extending transversely. The control circuit is also arranged on the substrate and electrically connected with each piezoelectric element through the support arm to control the ultrasonic transducer array to generate an ultrasonic signal and read the reflected ultrasonic signal received by the ultrasonic transducer array. The ultrasonic biometric sensor is easy to fabricate and has a high yield. | 2018-07-26 |
20180211082 | HIGH-PERFORMANCE FILM-TYPE TOUCH SENSOR AND METHOD OF FABRICATING THE SAME - The present invention relates to a high-performance film-type touch sensor that has a low sheet resistance and can have a high resolution, a large area, and a small thickness, and a method of fabricating the same. In the high-performance film-type touch sensor which is peeled off from a substrate and to which a base film is bonded, at least a separation layer, an electrode pattern layer, and a protection layer are sequentially stacked on the base film, and one or more of first and second electrode patterns arranged in different directions on the separation layer are formed of a plurality of conductive layers to reduce sheet resistance. | 2018-07-26 |
20180211083 | FINGERPRINT RECOGNITION SENSOR AND TERMINAL DEVICE - Disclosed is a fingerprint identification sensor, which comprises: a sensor unit, comprising a capacitor array formed by a plurality of capacitor induction units and having an output, a power supply and a sensor ground output; a conversion circuit, connected to the device ground of the terminal device, and the output and the sensor ground of the sensor unit, and configured to, upon modulating the driving signal to the modulated signal, output the modulated signal to the sensor ground; an energy storage capacitor, connected between the power supply and the sensor ground, and configured to stabilize an operating voltage of the sensor unit; a high-speed transistor switch, connected to the power supply, and configured to perform synchronous switch-on and switch-off according to status of the conversion circuit power supply; and a power supply, connected to the conversion circuit and the power supply of the sensor unit via the high-speed transistor switch. | 2018-07-26 |
20180211084 | Fingerprint Collecting Method And Apparatus, Terminal - A fingerprint collecting method, an apparatus, and a terminal are provided. The method includes the following. A damaged sensing unit among a plurality of sensing units contained in a fingerprint sensor is determined. When a fingerprint collecting event is detected, the plurality of sensing units is used to collect a fingerprint image, and a fingerprint image value collected by the damaged sensing unit is set to a random image value to form a fingerprint image collected by the fingerprint sensor. | 2018-07-26 |
20180211085 | OPTICAL FINGERPRINT IDENTIFICATION DISPLAY SCREEN AND DISPLAY DEVICE - This disclosure relates to an optical fingerprint identification display screen and a display device. In this disclosure, a plurality of photosensitive elements for fingerprint identification is arranged on an array substrate, such that mesh regions of a mesh-like black matrix layer corresponds to the photosensitive elements. A plurality of light guide members at least covering each of the photosensitive elements is arranged between each photosensitive element and the counter substrate. Since the light guide members and the counter substrate are in contact with each other, light reflected from ridges and valleys of a fingerprint will enter the light guide members maximally after passing through the mesh regions of the black matrix layer, and then directly impinge on the photosensitive elements after refraction within the light guide members. | 2018-07-26 |
20180211086 | ARRAY SUBSTRATE, METHOD FOR DRIVING SAME, DISPLAY PANEL AND DISPLAY APPARATUS - The embodiments of the present disclosure provide an array substrate, a method for driving the array substrate, a display panel and a display apparatus. The array substrate comprises: a plurality of repetition units each comprising a plurality of sub-pixels, one of the plurality of sub-pixels having a palm print recognition unit, each sub-pixel having a display unit connected to a first scan line and a data line and configured to be turned on or off under control of the first scan line, a data signal being inputted to the display unit from the data line while the display unit is on; and a touch control electrode connected to a touch control electrode line and configured to identify a touch control position. The palm print recognition unit is connected to a second scan line, a control voltage terminal and a read signal line, and configured to collect a palm print signal based on the touch control position identified by the touch control electrode under control of the control voltage terminal, and to output the collected palm print signal to the reach signal line under control of the second scan line. | 2018-07-26 |
20180211087 | FINGERPRINT RECOGNITION DEVICE, MANUFACTURING METHOD THEREOF, LIQUID CRYSTAL DISPLAY - The present disclosure provides a fingerprint recognition device, a manufacturing method thereof, and a liquid crystal display comprising a fingerprint recognition device. The fingerprint recognition device comprises: a recognition element; a light-reflecting element arranged above the recognition element; and a temperature-sensitive liquid crystal layer arranged between the recognition element and the light-reflecting element. The recognition element comprises a plurality of recognition units, each of which includes a light-emitting sub-unit and a photosensitive sub-unit. | 2018-07-26 |
20180211088 | ELECTRONIC DEVICE HAVING A BIOMETRIC SENSOR - The present invention relates to an installation structure of a biometric sensor synchronized with a display and a control method thereof. The electronic device may comprise: a light emitting circuitry configured to output light including a predetermined frequency band; a display panel configured to display an image by using one or more pixels, wherein the one or more pixels includes a plurality of sub-pixels; at least one driver circuit configured to drive at least one pixel among the plurality of sub-pixels; and an optical shielding layer formed adjacent to the at least one driver circuit in order to protect the at least one driver circuit from the light including a predetermined frequency band. Further, various embodiments can be implemented according to the present invention. | 2018-07-26 |
20180211089 | AUTHENTICATION METHOD AND AUTHENTICATION APPARATUS USING SYNTHESIZED CODE FOR IRIS - An authentication method and corresponding apparatus includes obtaining iris images, and constituting an enroll set including iris codes and mask codes corresponding to the iris images. The authentication method and corresponding apparatus also include generating a synthesized code including a synthesized iris code and a synthesized mask code based on correlations between the iris codes included in the enroll set in block units. | 2018-07-26 |
20180211090 | Electronic Device - The present invention provides an electronic device comprising an operating circuit, wherein when the electronic device is in a sleep mode, the operating circuit is temporarily off; a display panel, comprising a light-emitting region; a plurality of fingerprint sensing pixel units, disposed within the light-emitting region; and a fingerprint recognition circuit, coupled to the plurality of fingerprint sensing pixel units; wherein when the electronic device is in the sleep mode, the display panel emits light from the light-emitting region, and the display panel does not emit light except other than the light-emitting region. | 2018-07-26 |
20180211091 | FINGERPRINT IDENTIFYING MODULE - The present invention relates to a fingerprint identifying module, including a circuit board, a fingerprint sensing component, a cover plate, and a waterproof sleeve. The fingerprint sensing component is disposed on the circuit board, and the cover plate covers the fingerprint sensing component. The waterproof sleeve partially covers the cover plate and the circuit board, so as to prevent a foreign liquid from entering a space between the fingerprint sensing component and the circuit board. The cover plate includes a cover plate body and an extending portion. The cover plate body covers the fingerprint sensing component. The extending portion surrounds the cover plate body, is located between the waterproof sleeve and the fingerprint sensing component, and may block the foreign liquid from passing. | 2018-07-26 |
20180211092 | BIOMETRIC TEMPLATE SECURITY AND KEY GENERATION - Methods and systems for securing biometric templates and generating secret keys are provided. One or more images are received. Interest points are identified based on the received images, and a plurality of obfuscating data points are generated based on the interest points. An obfuscated template based on the interest points and the obfuscating data points is created and stored. A secret key can be encoded using a subset of at least one of the obfuscating data points and the interest points in the template. | 2018-07-26 |
20180211093 | METHOD OF PROCESSING FINGERPRINT INFORMATION - A method for processing fingerprint information includes dividing an input image that corresponds to at least a portion of a user fingerprint into a plurality of first regions; dividing a registered image that had previously been stored into a plurality of second regions; selecting a first matching region from among the plurality of first regions, and selecting a second matching region from among the plurality of second regions, by comparing the plurality of first regions with the plurality of second regions; and matching the registered image with the input image by comparing the first matching region with the second matching region. | 2018-07-26 |
20180211094 | SYSTEMS AND METHODS FOR BIOMETRICALLY AUTHENTICATING A USER USING AUTHENTICATION DATA AND LIVENESS DATA - Systems and methods for biometrically authenticating a user are disclosed. In one implementation, a biometric authentication system may include a finger scanner for capturing biometric data from a plurality of sections of a finger of a user. The finger may include a distal section, a medial section, and a proximal section. The biometric authentication system may further include one or more processors configured to cause the finger scanner to capture the biometric data from the plurality of sections of the finger of the user. The biometric data may include authentication data and liveness data. The processors may be further configured to access registered authentication data associated with the user, determine whether the captured authentication data matches the authentication biometric data, and determining, using the captured liveness data, whether the finger is a live finger. Additionally, the processors may be configured to authenticate the user after the captured authentication data is determined to match the registered authentication data and after the finger is determined to be a live finger. | 2018-07-26 |
20180211095 | Process and Device for Colony Counting - A device and a process to count a number of colonies present in a set of samples. The colony counting device has a storage device with plural storage locations. A handling system is operative to convey samples to analyze from storage locations to an analysis area and from the analysis area to storage locations. An imaging device is operative to acquire a plurality of images of a sample to analyze, the plurality of images including all or a part of the analysis area. A processing unit is operative to implement, for each sample to analyze, a detection step to detect the presence of colonies by analyzing an image of the plurality of images of the sample and a determination step to determine the number of colonies present in the sample by counting the colonies whose presence have been detected during the detection step. | 2018-07-26 |
20180211096 | LIVING-BODY DETECTION METHOD AND DEVICE AND COMPUTER PROGRAM PRODUCT - Provided are a living-body detection method and device and a computer program product, belonging to the technical field of face recognition. The living-body detection method comprises: detecting a facial movement from a photograph image; according to said detected facial movement, controlling the display of a virtual object on a display screen; and, if said virtual object satisfies predetermined conditions, determining that the face in said photographed image is a living-body face. By controlling virtual-object display on the basis of face movements and performing living-body detection according to virtual-object display, it is possible to effectively prevent an attack using such means as photograph, video, 3D face model, or face mask. | 2018-07-26 |
20180211097 | METHOD AND DEVICE FOR ACQUIRING FEATURE IMAGE, AND USER AUTHENTICATION METHOD - False authentication that is obtained by using a photographic image to impersonate a real human being when being photographed for authentication is prevented by photographing a user's face while illuminated by two different patterns on a display screen to obtain two different images, determining a difference between the two different images to obtain a difference image, and then comparing the difference image to previous images to determine if a real human being is attempting authentication. | 2018-07-26 |