35th week of 2015 patent applcation highlights part 49 |
Patent application number | Title | Published |
20150242595 | SECURE DATA STORAGE AND TRANSFER FOR PORTABLE DATA STORAGE DEVICES - A portable data storage device includes a first portable storage identification (PSID) parameter unique thereto, one or more data storage media in which the first PSID parameter is stored, and control logic coupled to the one or more data storage media. The data storage media include a data file section to store therein a data file, which includes data and a rights object. The rights object contains a second PSID parameter. The control logic controls access to the data storage media by a user. The control logic determines whether or not the first PSID parameter and the second PSID parameter are equal. If they are equal, it causes the data in the data file to be provided to the user in response to a request from the user. A method for realizing the device is also provided. | 2015-08-27 |
20150242596 | INFORMATION PROCESSING DEVICE, CONTROL METHOD, AND STORAGE MEDIUM - There is provided an information processing device including a communication unit configured to receive editing information of content data, an accumulation unit configured to accumulate the editing information, and a control unit configured to control whether to return the editing information to an external device in accordance with a right to use content corresponding to a requestor's identification information included in request information for requesting the editing information, the request information being received from the external device via the communication unit. | 2015-08-27 |
20150242597 | TRANSFERRING AUTHORIZATION FROM AN AUTHENTICATED DEVICE TO AN UNAUTHENTICATED DEVICE - A method and system for transferring authorization to play content from an authenticated device to an unauthenticated device, including receiving an indication that a user of a user device wishes to play a content item on a playback device, wherein the indication is associated with a content ID for a content item, a user credential for the user, and a playback device identifier for a playback device, and verifying the content ID and the user credential. Upon verifying the content ID and the user credential, a token for the content ID, the user ID and the playback device identifier is generated and sent to the playback device. | 2015-08-27 |
20150242598 | System and Method for Preventing Unauthorized Use of Digital Media - A method for protecting digital media content from unauthorised use on a client, is described. The method comprising the steps of receiving from a server on the client a list of processes, instructions, activity descriptions or data types that must not be active simultaneously with playback of the digital media content (“the blacklist”). The method further comprising checking, on the client, for the presence of any items on the list; and continuing interaction with the server, key management and playback of protected content only if no items on the list are detected on the client. A system is also described. | 2015-08-27 |
20150242599 | CLUSTER LICENSE SERVER - The present invention is directed to devices, systems, methods, and non-transitory computer-readable media for a license server system. In one embodiment, a system may include a primary license server and a failover license server. The system may further include a cluster license server configured to switch from receiving license information from the primary license server to receiving license information from the failover license server upon failure of the primary license server. | 2015-08-27 |
20150242600 | OFFERING ADDITIONAL LICENSE TERMS DURING CONVERSION OF STANDARD SOFTWARE LICENSES FOR USE IN CLOUD COMPUTING ENVIRONMENTS - A processor receives, from a software vendor system, a rule for converting a software license associated with a software program to a cloud software license associated with using the software program in a cloud computing environment, and receives, from an owner computer of the software license, a request to convert the software license to the cloud software license. The request includes an identifier of the software vendor system and a license identifier. The processor identifies the rule for converting the software license to the cloud software license in view of the received identifier of the software vendor system and the license identifier and converts the software license to the cloud software license in response to the request by changing one or more terms of the software license, in view of the rule, wherein the cloud software license controls usage of a subscription for the software program in the cloud computing environment. The processor transmits the cloud software license to the owner computer. | 2015-08-27 |
20150242601 | TRUST BROKER AUTHENTICATION METHOD FOR MOBILE DEVICES - A mobile device may perform authentication with an authenticating entity. The mobile device may comprise a plurality of sensors and a processor. The processor may be configured to: receive an authentication request from the authenticating entity requesting authentication information; and determine if the authentication request satisfies predefined user privacy preferences. If so, the processor may be configured to: retrieve the authentication information from at least one sensor to form a trust vector in response to the authentication request and to command transmission of the trust vector to the authenticating entity for authentication. | 2015-08-27 |
20150242602 | NETWORK AUTHENTICATION METHOD FOR SECURE USER IDENTITY VERIFICATION USING USER POSITIONING INFORMATION - In a network authentication method, upon receipt of correct user login data from a user terminal, a content-provider server transmits a verification request to a verification server via a communication network. After receiving hardware identification data and positioning information, which are associated with the user terminal and a portable personal electronic device carried by a user, the verification server transmits a verification reply indicating successful authentication of the identity of the user when the hardware identification data is successfully verified while the positioning information indicates that the portable personal electronic device is in close proximity to the user terminal. | 2015-08-27 |
20150242603 | Unauthorized Account Access Lockout Reduction - A method and system for determining unauthorized account access is provided. The method includes receiving a username of a user and a passcode for access to a secure account or device belonging to a user. The passcode is determined to be incorrect. Unauthorized access attempts with respect to the secure account or the device are determined based on based on the incorrect passcode and in response, a quality factor associated with the incorrect passcode with respect to the secure account or device is determined. The quality factor is compared to a threshold value. Security functions associated with the secure account or device with respect to the incorrect passcode and the results of the comparison are performed based on the quality factor and the unauthorized access attempts. | 2015-08-27 |
20150242604 | MULTI-LEVEL PASSWORD AUTHORIZATION - A method and system for using multi-level passwords is provided. The method includes receiving a request for access to a first level of access associated with secure components associated with a device of a user. In response, a portion of a passcode is received. The portion of the passcode does not include an entire portion. The portion of the passcode is compared to security group policy it is determined that the portion of the passcode meets requirements the security group policy. Access is enabled to a group of components of secure components based on the security requirements. The group of components is associated with the first level of security access. | 2015-08-27 |
20150242605 | CONTINUOUS AUTHENTICATION WITH A MOBILE DEVICE - A mobile device may perform continuous authentication with an authenticating entity. The mobile device may include a set of biometric and non-biometric sensors and a processor. The processor may be configured to receive sensor data from the set of sensors, form authentication information from the received sensor data, and continuously update the authentication information. | 2015-08-27 |
20150242606 | DEVICE HAVING SECURE JTAG AND DEBUGGING METHOD FOR THE SAME - A method of debugging a device which includes a plurality of processors is provided. The method includes verifying a request to initiate authentication that is provided to the device to a user; performing a challenge-response authentication operation between the user and the device in response to the request to initiate authentication being a request from a non-malicious user; activating or deactivating an access to a Joint Test Action Group (JTAG) port of each of the processors, based on access control information from the user; and permitting a debugging operation via an access that is activated. | 2015-08-27 |
20150242607 | ANONYMOUS AUTHENTICATION USING BACKUP BIOMETRIC INFORMATION - A method for performing anonymous authentication by an electronic device is described. The method includes obtaining biometric data. The method also includes enrolling biometric information based on the biometric data. The method also includes generating backup biometric information based on the biometric data. The backup biometric information includes a backup biometric template. The method also includes generating a backup public key and a backup private key. The method also includes enrolling the backup biometric information. Enrolling the backup biometric information includes distributing the backup biometric template, the backup public key and the backup private key among different entities. | 2015-08-27 |
20150242608 | CONTROLLING INPUT/OUTPUT DEVICES - An electronic device is provided processor configured to: receive a biological signal of a user; detect whether the electronic device is attached to or detached from the user based on at least the biological signal; and control an I/O device operationally connected to the electronic device based on whether the electronic device is attached to or detached from the user. | 2015-08-27 |
20150242609 | Universal Authenticator Across Web and Mobile - Applications that rely on user authentication information execute within an application container on the computing device. The application container comprises a plug receiver module and a delegate module. When a request for authentication is initiated, the user is prompted to connect a remote identification device to the computing device. The remote identification device stores an encrypted version of a user secret code. The plug receiver module reads the encrypted version of the user secret code and communicates the encrypted information to a remote authentication server. The remote authentication server decrypts the user secret code and uses the decrypted user secret code to identify and communicate corresponding user authentication information to the delegate module. The delegate module establishes an authenticated session by making the user authentication information available to the applications executing in the application container. | 2015-08-27 |
20150242610 | AUTHENTICATION METHOD AND SYSTEM FOR ONLINE GAMING - Embodiments of an authentication technique for online gaming are provided. In one aspect, an authentication method for online gaming includes storing a user identity of a user in a portable data storage device; providing access to the user identity for an authentication server to authenticate the user such that the authentication server allows the user to participate in online gaming when the user is authenticated; and when the online gaming continues, providing access to the user identity for the authentication server to validate the authenticity of the user at a first threshold time after the user identity is accessed previously. | 2015-08-27 |
20150242611 | AUTHENTICATION WITH SECONDARY APPROVER - Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first device transmits an authorization request signal to the second device or to a server in the wireless network. The second device, having received the authorization request, prompts an authorized user to give authorization to the first device by inputting an authentication key such as a password or gesture on the second device. Upon verification of the authentication key, an authorization signal may be wirelessly transmitted to the first device, permitting access to the restricted content or functions on the first device. In some embodiments, the second device may be alerted to an authorization request and may select a request for authorization from a selectable queue of requests. | 2015-08-27 |
20150242612 | HARDWARE TOOLS AND METHODS FOR CAPACITIVE SENSOR ENABLED AUTHENTICATION - A hardware tool for authenticating with a capacitive sensor includes a set of capacitive interaction volumes, each including a conductive capacitive contact area and a capacitive body, a dielectric substrate, coupled to the set of capacitive interaction volume, that provides electrical isolation between the capacitive interaction volumes, and a current coupler, electrically coupled to the set of capacitive interaction volumes. | 2015-08-27 |
20150242613 | DIRECTIONAL TOUCH UNLOCKING FOR ELECTRONIC DEVICES - A system and machine-implemented method for matching input gestures on a touch interface to a security pattern to allow user access to an electronic device or account. The security pattern may correspond to a combination of linear and non-linear input gestures relating to directional changes of the input gestures. A determination of the security pattern may be based on the end motion and speed of each input gesture. | 2015-08-27 |
20150242614 | PROVISIONING OF SECURITY CREDENTIALS - A security component for authenticating a device, within which it is incorporated, with another device, the security component comprising a root identity generator configured to generate a root identity comprising a public root identity and a private root identity for the security component and an output configured to output the public root identity for sharing with the other device and to not output the private root identity. | 2015-08-27 |
20150242615 | METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES - A method for controlling the use of intellectual property (IP) in an individual integrated circuit includes loading data including the IP into the individual integrated circuit, loading an IP license certificate into the individual integrated circuit, the certificate including identification of the IP authorized for the individual integrated circuit, determining inside the individual integrated circuit whether the IP is authorized for the individual integrated circuit, enabling operation of the individual integrated circuit if the IP circuit is authorized for use in the individual integrated circuit, and imposing a penalty on operation of the individual integrated circuit if the IP is not authorized for use in the individual integrated circuit. | 2015-08-27 |
20150242616 | Credential recovery with the assistance of trusted entities - There is disclosed a method for use in credential recovery. In one exemplary embodiment, the method comprises determining a policy that requires at least one trusted entity to verify the identity of a first entity in order to facilitate credential recovery. The method also comprises receiving at least one communication that confirms verification of the identity of the first entity by at least one trusted entity. The method further comprises permitting credential recovery based on the received verification. | 2015-08-27 |
20150242617 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - There is provided an information processing device including a first program execution unit that loads, interprets, and executes code of a computer program created by a procedural language. The program execution unit includes at least one port, and via this port, executes a second computer program created by a procedural language executed by a second program execution unit after authenticating with the second program execution unit. | 2015-08-27 |
20150242619 | SECURITY MANAGEMENT SYSTEM - The invention relates to a system for providing an automated security management framework for an enterprise based on the enterprise's operations, infrastructure, and user-based processes, as well as industry-specific rules and regulations associated with the enterprise. The system is configured to generate recommendations or instructions based on correlation of enterprise's operations, infrastructure, and user-based processes with industry-specific rules and regulations. The recommendations or instructions are then provided to a user associated with the enterprise so as to facilitate actions to be taken to address a potential security threat. | 2015-08-27 |
20150242620 | METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES - A method for controlling the use of intellectual property (IP) in an individual integrated circuit includes loading data including the IP into the individual integrated circuit, loading an IP license certificate into the individual integrated circuit, the certificate including identification of the IP authorized for the individual integrated circuit, determining inside the individual integrated circuit whether the IP is authorized for the individual integrated circuit, enabling operation of the individual integrated circuit if the IP circuit is authorized for use in the individual integrated circuit, and imposing a penalty on operation of the individual integrated circuit if the IP is not authorized for use in the individual integrated circuit. | 2015-08-27 |
20150242621 | Application permission settings - Systems, device and techniques are disclosed for automatically determining a permission setting that indicates whether a permission is granted or denied to the application. The automatic determination may be made based on a previous selection by a user. Alternatively, an indication of a permission may be provided to a user and an indication of a permission setting may be received from the user. The permission setting received from the user may be assigned to a permission to an application. Permissions provided to a user may be ordered in a list based on permission or application popularity or frequency. | 2015-08-27 |
20150242622 | METHOD AND APPARATUS TO SANDBOX RUN-TIME ANDROID APPLICATIONS WITH LIGHTWEIGHT CONTAINER - An apparatus and method for generating an application container are provided. The method includes selecting a target application from among a plurality of applications included in an electronic device, acquiring a policy file corresponding to the target application, determining whether the policy file includes a category of the target application, and executing the application container which includes the target application. | 2015-08-27 |
20150242623 | REAL-TIME RECORDING AND MONITORING OF MOBILE APPLICATIONS - Systems and methods may include monitoring data input to and output from an application on a mobile device. Such systems and methods may include storing meta-data, which describes a behavior of the data input to and output from the application, on the mobile device. Such systems and methods may include determining whether a behavior of the application is anomalous based on the meta-data stored on the mobile device. Such systems and methods may include providing detailed data, which includes the data input to and output from the application, to another device in response to determining that the behavior of the application is anomalous based on the meta-data stored on the mobile device. | 2015-08-27 |
20150242624 | MEMORY ARRANGEMENT AND METHOD FOR DETECTING AN ATTACK ON A MEMORY ARRANGEMENT - According to various embodiments, a memory arrangement is described having a first bit line, a first precharge device for precharging the first bit line to a precharged state, a second bit line, a second precharge device for precharging the second bit line to a precharged state, a memory control apparatus that is set up to interrupt the precharging of the first bit line by the first precharge device for memory access and to interrupt the precharging of the second bit line by the second precharge device for the memory access, a memory access apparatus that is set up to follow the interruption of the precharging of the first bit line and the interruption of the precharging of the second bit line by performing the memory access and reading the state of the second bit line, and a detector that is set up to take the state of the second bit line as a basis for detecting an attack on the memory arrangement. | 2015-08-27 |
20150242625 | Pre-Delegation of Defined User Roles for Guiding User in Incident Response - Incident response systems may benefit from proper organization and handling of responses. For example, incident response systems may benefit from the pre-delegation of defined user roles for guiding one or more users in an incident response. A method can include monitoring, by a computer system, an incident. The method can also include determining, by the computer system, whether each of a plurality of incident response team members is checked in with respect to the incident. The method can further include maintaining, by the computer system, a set of task lists and role type assignments based on the determination. | 2015-08-27 |
20150242626 | METHOD OF GENERATING IN-KERNEL HOOK POINT CANDIDATES TO DETECT ROOTKITS AND THE SYSTEM THEREOF - A method for determining whether a to-be-tested program contains malicious behavior is disclosed. The method includes steps of providing an emulator having a kernel and a plurality of installed hook points, wherein the kernel has a plurality of in-kernel functions; executing the to-be-tested program in the emulator dynamically to invoke the plurality of installed hook points to obtain a specific in-kernel function set from the plurality of in-kernel functions; and determining whether the to-be-tested program contains instructions for malicious behavior based on an invocation sequence of the specific in-kernel function set. | 2015-08-27 |
20150242627 | APPARATUS AND METHOD FOR BLOCKING ACTVITY OF MALWARE - An apparatus and method for blocking the activity of malware are disclosed. The apparatus for blocking the activity of malware includes a storage unit, a posting unit, and a control unit. The storage unit stores an automatic execution permission list and a set security level. The posting unit posts a predetermined control time immediately after user terminal booting and a predetermined control time immediately after user login. The control unit permits or blocks the execution of an execution attempt file for the predetermined control time immediately after the booting and the predetermined control time immediately after the user login based on the automatic execution permission list and the set security level. | 2015-08-27 |
20150242628 | System and Method for Detection of Malicious Hypertext Transfer Protocol Chains - A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object. | 2015-08-27 |
20150242629 | SMART CONTAINERIZATION OF MOBILE COMPUTING DEVICE RESOURCES - A method includes monitoring metrics at a mobile computing device. A substantive change in operating conditions is identified, based upon the monitored metrics. In response to the substantive change in the operating conditions, a smart container is automatically applied to a particular resource of the computing device. The smart container may define an enhanced security access policy. In accordance with a particular embodiment of the disclosure, the enhanced security access policy increases the level of protection to the resource. | 2015-08-27 |
20150242630 | SYSTEMS AND METHODS FOR SECURING BIOS VARIABLES - In accordance with embodiments of the present disclosure, a method may include generating a master cryptographic key for encrypting and decrypting the one or more variables stored in a non-transitory computer-readable medium accessible to a basic input/output system of an information handling system. The method may also include encrypting the master cryptographic key with a system password, such that the master cryptographic key as encrypted with the system password may be decrypted and used to encrypt and decrypt the one or more variables in response to entry by a user of the system password. The method may further include encrypting the master cryptographic key with an administrator password, such that the master cryptographic key as encrypted with the administrator password may be decrypted and used to encrypt and decrypt the one or more variables in response to entry by an administrator of the administrator password. | 2015-08-27 |
20150242631 | METHOD AND SYSTEM FOR PROVIDING A ROBUST AND EFFICIENT VIRTUAL ASSET VULNERABILITY MANAGEMENT AND VERIFICATION SERVICE - A virtual asset testing environment is provided that is distinct from a production computing environment. A virtual asset creation template associated with a class of virtual assets to be verified is identified, each virtual asset of the class of virtual assets being created using the virtual asset creation template. A designated test virtual asset is generated using the virtual asset creation template that is deployed in the virtual asset testing environment. The designated test virtual asset is then analyzed in the virtual asset testing environment to identify any vulnerabilities in the designated test virtual asset. If a vulnerability is identified in the designated test virtual asset, a remedy to the vulnerability is applied to the virtual asset creation template, and/or virtual assets created by the virtual asset creation template deployed in the production environment. | 2015-08-27 |
20150242632 | Computer-based risk signature generation and comparison system - A method of risk assessment of an entity includes converting one or more element of risk information into a character string and combining the character string of each element of risk information into a continuous character string to produce a signature containing the risk information for the entity. | 2015-08-27 |
20150242633 | DETECTION AND PREVENTION OF SENSITIVE INFORMATION LEAKS - Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks comprises computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules. | 2015-08-27 |
20150242634 | METHOD AND SYSTEM FOR PROVIDING AN EFFICIENT VULNERABILITY MANAGEMENT AND VERIFICATION SERVICE - A virtual asset creation template associated with a class of virtual assets is identified and analyzed to identify any vulnerabilities in the virtual asset creation template. If one or more vulnerabilities are identified in the virtual asset creation template, an appropriate remedy for each identified vulnerability identified in the virtual asset creation template is applied. If no vulnerability is identified in the virtual asset creation template, or once each vulnerability identified in the virtual asset creation template is remedied, each virtual asset of the virtual asset class generated using the virtual asset creation template is assigned an initial status of verified virtual asset. | 2015-08-27 |
20150242635 | DuLeak: A Scalable App Engine for High-Impact Privacy Leaks - Systems and methods are disclosed for protecting privacy in an application software (app) by detecting application repacking; detecting application tainting, including: detecting descrying information leakage; detecting vulnerability espial; and detecting a privacy leak. | 2015-08-27 |
20150242636 | SYSTEMS AND METHODS FOR AUTOMATED DETECTION OF APPLICATION VULNERABILITIES - Disclosed are systems and methods for performing automatic, large-scale analysis mobile applications to determine and analyze application vulnerability. The disclosed systems and methods include identifying potentially vulnerable applications, identifying the application entry points that lead to vulnerable behavior, and generating smart input for text fields. Thus, a fully automated framework is implemented to run in parallel on multiple emulators, while collecting vital information. | 2015-08-27 |
20150242637 | AUTOMATED VULNERABILITY INTELLIGENCE GENERATION AND APPLICATION - Techniques for providing computer security vulnerability intelligence are disclosed. The techniques include obtaining distributable vulnerability data that includes, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, where the distributable vulnerability data was derived from an intelligence graph including a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges. The techniques also include identifying installed software packages on a computer system, correlating a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities, ordering at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, such that an ordered plurality of installed software packages and associated vulnerabilities is obtained, and providing mitigation information for the ordered plurality of installed software packages and associated vulnerabilities. | 2015-08-27 |
20150242638 | PRIVACY CONTROL FOR MULTIMEDIA CONTENT - One or more techniques and/or systems are provided for providing and/or applying privacy preferences for an entity. A multimedia device, such as a mobile phone, may capture multimedia content associated with an entity (e.g., a photo of a person at a restaurant). The multimedia device may identify a privacy preference for the entity. In an example, the person may be wearing a privacy object that may be recognized as corresponding to the privacy preference. In another example, a device associated with the person may emit a signal that may specify a privacy preference for the person and/or may be used by the multimedia device to identify the person (e.g., the identity may be used to query a service to obtain a privacy preference specified for the person). The privacy preference may be applied to the multimedia content (e.g., a no photography privacy preference, a no tagging privacy preference, etc.). | 2015-08-27 |
20150242639 | DETECTION AND PREVENTION OF SENSITIVE INFORMATION LEAKS - Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks includes computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules. | 2015-08-27 |
20150242640 | ENCRYPTION KEY SELECTION - Systems and methods are disclosed for encrypting and/or decrypting data in a data storage environment. A data storage device controller is configured to extract parameters from host memory access commands and use key selection circuitry to select an encryption model based on the parameters. Key selection is determined by the selected encryption model. | 2015-08-27 |
20150242641 | VALIDATING A METADATA TREE USING A METADATA INTEGRITY VALIDATOR - A method performed by a processing system includes reconstructing a metadata tree of a patient from a metadata tree journal, the metadata tree including a plurality of references to a corresponding plurality of encrypted electronic health records of the patient in an encrypted data store, and validating the metadata tree by comparing first integrity information of the metadata tree to second integrity information corresponding to the metadata tree journal provided by a metadata integrity validator. | 2015-08-27 |
20150242642 | SYSTEM AND APPROACH TO CONVEY DATA WITH A HANDHELD DEVICE VIA A MULTI-DIMENSIONAL CODE - A system and approach for conveying engineering and license data with a handheld or mobile device via a multi-dimensional code. Engineering data from a page such as a schematic may be generated, formatted, and encoded with a multi-dimensional code. The code in a visual presentation may be embedded in the schematic. A mobile device may scan the code. The device with an appropriate application may decode and un-format the engineering data from the code for a consumer or user. License data may be generated, encrypted, and encoded in a multi-dimensional code. The code in a visual presentation may be scanned and decrypted by the mobile device with an appropriate application, for a consumer or user. | 2015-08-27 |
20150242643 | SECURE FILE TRANSFER SYSTEMS AND METHODS - Certain example embodiments relate to file transfer systems and/or methods that enable a single provider to offer to different customers customizable file transfer solutions that are secure, scalable to handle enterprise-level amounts of data, and able to meet customer-specific needs even though such needs are not necessarily known in advance. Once initially set up, the file transfer solution of certain example embodiments delegates management of the customer-specific instances of the solution, optionally in a sub-delegatable manner and, thus, the single provider need not be consulted after specific initial instance deployment time (e.g., for security management and/or other routine maintenance issues). | 2015-08-27 |
20150242644 | APPARATUS AND METHOD FOR AN ANTITHEFT SECURE OPERATING SYSTEM MODULE - An apparatus and method for a secure operating system module are provided. The method includes receiving an activation signal to enable a secure OS module, in response to the activation signal, securing user data and disabling user control to deactivate a communication module of the portable terminal, and transmitting acquired data related to the operation of the portable terminal via the communication module. | 2015-08-27 |
20150242645 | Incentive-Based App Execution - Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user is presented. Also executing on the mobile computing device is a scheduling manager. The personal daemon executes one or more personal assistance actions on behalf of the associated user. The scheduling manager responds to events in support of the personal daemon. More particularly, in response to receiving an event the scheduling manager determines a set of apps that are responsive to the received event and from that set of apps, identifies at least a first subset of apps for execution on the mobile computing device. The scheduling manager receives feedback information regarding the usefulness of the executed apps of the first subset of apps and updates the associated score of each of the apps of the first subset of apps. | 2015-08-27 |
20150242646 | METHOD AND APPARATUS FOR CONTROLLING AN AGGREGATION SERVER - The present invention provides a method for controlling an aggregate server aggregating content information stored in at least one of an aggregated server, requesting, to the aggregate server, an aggregation restriction for content information of a specific aggregated server; and changing an aggregation restriction state variable according to the requesting, wherein the aggregation restriction state variable represents identification information of the specific aggregated server of which the content information is not allowed to be aggregated by the aggregate server. | 2015-08-27 |
20150242647 | METHOD AND DEVICE TO ACCESS PERSONAL DATA OF A PERSON, A COMPANY, OR AN OBJECT - This invention aims to propose a method and a system allowing to supply certified reliable information without the source of the information being transmitted to the applicant. | 2015-08-27 |
20150242648 | MANAGEMENT OF DATA PRIVACY AND SECURITY IN A PERVASIVE COMPUTING ENVIRONMENT - A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use by a third party transaction. | 2015-08-27 |
20150242649 | ROLE-BASED SECURITY POLICY FOR AN OBJECT-ORIENTED DATABASE SYSTEM - A system for adding security data to a search index comprises a processor and a memory. The processor is configured to select an object in a search index, wherein an entry associated with the object is stored in the search index and add security entity data to an entry of the search index corresponding to the selected object. A memory is coupled to the processor and is configured to provide the processor with instructions. | 2015-08-27 |
20150242650 | DOCUMENT CONTROL BASED ON COPYRIGHT PERMISSION WHEN PRINTING COMPILATION OF WORKS - A method for controlling copyright permissions when assembling multiple copyrighted works into a compiled file. The copyright permission level of each file is analyzed, either based on the copyright permission information present in metadata associated with the file or based on the digital file format of the file which reflects the permission level. The compiled file is assigned a permission level which is the same as or more restrictive than all of the permission level of the files in the compilation, and is generated in a format that enforces the assigned permission level. A notification may be displayed to the user to notify the use of the permission level assigned to the compiled file. | 2015-08-27 |
20150242651 | DISPLAY DEVICE - A method of operating a display device, such as a tablet device, comprises displaying a plurality of covers corresponding to respective different data items, such as financial information, and selecting at least one cover and displaying the corresponding data item or data items | 2015-08-27 |
20150242652 | SHARING INFORMATION ON A NETWORK-BASED SOCIAL PLATFORM - A system and method for sharing information on a network-based social platform is provided. An indication is received from a first user to share information regarding an item on a network-based social platform. The network-based social platform is a platform that allows the first user to communicative couple with other users of the network-based social platform. Profile information of the first user is accessed. A determination of whether the first user is authorized to share the information is made. Based on the first user being authorized, an identifier for the item is added to a list of recommended items that is accessible view the network-based social platform. | 2015-08-27 |
20150242653 | SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR PREDICTING PRIVATE TRAITS FROM DIGITAL INDICATORS - Exemplary systems, methods, and computer-accessible mediums can be provided to manage a preferences associated with a user, which can include receiving information related the preferences of a user(s), determining if an inference(s) about the user(s) can be drawn from the preferences to generate further data, remove a particular preference from the preferences based on the further data, further determining if the inference(s) continues to be drawn. | 2015-08-27 |
20150242654 | Monitoring and Managing User Privacy Levels - Various embodiments pertain to techniques for measuring a user's privacy level as a user interacts with various web services. In various embodiments, entities with which the user interacts are detected and sensitive information shared by the user is logged to determine what a given entity knows about the user. In some embodiments, sensitive information that is shared by a user can be processed using a predictive algorithm to ascertain a user's level of privacy. When a user's identity is predicted by the algorithm, a user can be alerted to the loss of anonymity. In various embodiments, user-defined areas of anonymity can be used to measure a user's definition of privacy. In some embodiments, alerts can also be provided to the user when a new, previously undisclosed, piece of information is shared by the user. | 2015-08-27 |
20150242655 | Apparatus and Method for Software Enabled Access to Protected Hardware Resources - A semiconductor includes a set of protected hardware resources, where at least one protected hardware resource stores a secure key. The semiconductor also includes a computation kernel and a memory to store a resource enablement module executed by the computation kernel. The resource enablement module selectively enables a protected hardware resource in response to a delivered key corresponding to the secure key. | 2015-08-27 |
20150242656 | TRUSTED PLATFORM MODULE SWITCHING - A computer system comprises a Trusted Platform Module System (TPMS). The TPMS comprises a first Trusted Platform Module (TPM) and a second TPM, which comports with a different TPM specification than that followed by the first TPM. A physical presence input device receives a local physical change signal that proves a local physical presence of a user at the computer system. A toggle input device, which requires the local physical change signal, causes the state being output from the GPIO pin on the first TPM to switch from a first state to a second state. This change of state causes a TPM switch to selectively decouple the first TPM from a central processing unit and to couple the second TPM to the central processing unit. | 2015-08-27 |
20150242657 | SELF-ENCRYPTING DRIVE AND USER DEVICE INCLUDING THE SAME - A user device is provided which includes a host providing event indication causing a transition between an authentication state and a non-authentication state. The information storage device of the user device has a nonvolatile storage medium and upon entering the non-authentication state the information storage device provides a part of the storage space of the nonvolatile storage medium as an accessible temporary storage space. | 2015-08-27 |
20150242658 | SYMBOL READING SYSTEM HAVING PREDICTIVE DIAGNOSTICS - A retail information network includes one or more POS scanning and checkout systems, each including (i) a bar code symbol reading subsystem, and (ii) a cash register computer subsystem interfaced with the bar code symbol reading subsystem and a network infrastructure, and each having access to product and price data maintained in a product/price database. The bar code symbol reading subsystem includes a local predictive error event (PEE) data store for logging and storing predictive error events (PEEs) detected within the bar code symbol reading system, wherein said PEEs are subsequently sent to POS information servers used to create predictive error alerts (PEAs) and corresponding instructions to maintain and/or repair certain aspects of the bar code symbol reading system. | 2015-08-27 |
20150242659 | CARD READING DEVICE WITH A PLURALITY OF PROTECTING MESH WIRES - A card reading device with a plurality of protecting mesh wires includes a main board, an outer frame, a first mesh wire and a second mesh wire. The main board includes an electronic member region and a card inserting case. The outer frame is disposed on the main board and includes a first groove and a second groove. The first groove covers the electronic member region. The second groove covers the card inserting case. The first mesh wire is disposed in the first groove and includes a first wire end connected to the electronic member region. The second mesh wire is disposed in the second groove and includes a second wire and connected to the electronic member region. When the outer frame is damaged or destroyed, the first mesh wire or the second mesh wire is triggered to activate a circuit protecting procedure to shortcut or disconnect a signal circuit. | 2015-08-27 |
20150242660 | POINT OF SALE INDUCTIVE SYSTEMS AND METHODS - Systems and methods for the identification, powering and control of products and product packaging. The systems can include a point of sale display having a contactless power supply. The contactless power supply can provide a source of wireless power for products and product packaging. The products and product packaging can include light emitting diodes, e-ink displays and printed speaker circuits that activate as the operating frequency of the contactless power supply varies. Other embodiments include product level sensors, inductive reader networks, printed temperature sensors, product alignment systems, passive identification circuits and methods for controlling operation of the same. | 2015-08-27 |
20150242661 | IDENTIFICATION TAGS AND THEIR MANUFACTURE | 2015-08-27 |
20150242662 | TAMPER DETECTION SYSTEM AND METHOD - A tamper detection system and method which uses a reader and one or more tags to detect tampering near a card reader slot or any other device subject to tampering. An example tamper detection method includes transmitting a signal to a tag adjacent a device susceptible to tampering, and setting an alarm condition when no reply signal or an incorrect reply signal is received in response to the signal. | 2015-08-27 |
20150242663 | WIRELESS CARD READER WITH CONTACTLESS AND CONTACT CARD INTERFACES - Methods, systems, and apparatus, for a payment card reader comprising: a frame, where the frame includes a top surface, a bottom surface, a first side surface, and a second side surface, a second side surface of the side surfaces on an opposite side of the frame from the first side surface, the first side surface including a groove configured to receive a swipe of a magnetic stripe card, the second side surface including a slot configured to receive insertion of a chip card; a magnetic stripe reader interface; a chip card reader interface; circuitry configured to direct signals from the magnetic stripe reader interface and the chip card reader interface to a microcontroller in the card reader; and circuitry configured to communicate wirelessly between the card reader and a computing device. | 2015-08-27 |
20150242664 | SYSTEMS AND METHODS USING SINGLE ANTENNA FOR MULTIPLE RESONANT FREQUENCY RANGES - A radio frequency device utilizing an antenna having a single antenna structure resonant on multiple resonant frequency ranges. The antenna can be configured to operate within multiple frequency ranges for communication according to respective protocols associated with the respective frequency ranges. | 2015-08-27 |
20150242665 | PROXIMITY TAG WITH MULTIPLE ANTENNAS - A wireless device configured to communicate with a mobile communication device in an object tracking system includes a transceiver configured to send and receive messages with the mobile communication device. Each message has a signal strength value. The wireless device also includes a first antenna coupled to the transceiver for sending and receiving the messages, a second antenna coupled to the transceiver for alternatively sending and receiving the messages, and a processor coupled to the transceiver. The processor is operable to switch between using one of the first antenna and the second antenna based on the signal strength value of an associated message. | 2015-08-27 |
20150242666 | SYSTEM FOR RFID COMMUNICATION - A system for RFID communication includes an antenna device for emitting a wireless signal, and a circuit connected to the antenna device. The antenna device, as a near field antenna, has a dual stripline having a first stripline and a second stripline formed parallel to the first stripline. The antenna device further has a termination, and a balancing element for damping a common mode signal. The balancing element is connected to first connections of the dual stripline, and the termination is connected to second connections of the dual stripline. The circuit is connected to the balancing element for symmetrical emission of the wireless signal to the dual stripline. | 2015-08-27 |
20150242667 | RFID SYSTEM AND ASSOCIATED ANTENNA-COUPLER - A RFID system and an associated antenna-coupler are provided. The system may be for selectively communicating with a targeted transponder from among a group of multiple adjacent transponders is provided. The system may include a transponder conveyance, a transceiver, and an antenna-coupler. The transponder conveyance is adapted to transport at least one targeted transponder from a group of multiple adjacent transponders through a transponder operating region. The transceiver is configured to generate one or more electrical signals. The antenna-coupler has first and second microstrips in a cross-like arrangement relative to each other. Each of the first and second microstrips is configured to transmit one or more electro-magnetic fields concentrated in a near-field region of the antenna-coupler based on the one or more electrical signals for communicating with the targeted transponder. | 2015-08-27 |
20150242668 | Frame and App for Smartphone for Audio Reading Coded Text - A small fold-down optical frame holds a smart phone that is provided with reading software that enables those with vision impairment to be able to hear the written word as audible speech. The frame has a tray and a base and legs connecting them. The tray holds the smart phone and positions it so that its camera is placed directly over a coded symbol containing the content of the printed page. One corner of the base is shaped such that a vision-impaired person can place the frame, by feel or touch, at the proper location for the smart phone to pick up the coded symbol. | 2015-08-27 |
20150242669 | OPTIMIZING FOCUS PLANE POSITION OF IMAGING SCANNER - A method includes the following: (1) projecting a light pattern towards a target object; (2) detecting light returned from the target object through an imaging lens arrangement with an imaging sensor to capture a first image with changes in the position of the focus plane of the imaging lens arrangement; (3) processing the first image to determine an optimized position of the focus plane of the imaging lens arrangement; (4) detecting light returned from the target object with the imaging sensor to capture a second image when the position of the focus plane of the imaging lens arrangement is maintained at the optimized position; and (5) decoding a barcode in the second image. | 2015-08-27 |
20150242670 | GRAPHICAL CODE READERS THAT ARE CONFIGURED FOR GLARE REDUCTION - A method for glare reduction may be implemented by a graphical code reader. The method may include illuminating a target area using a plurality of light sources. The method may also include capturing images of the target area using at least one image sensor. The method may also include determining that glare is present in at least one captured image. The method may also include determining glare information that indicates which of the light sources are responsible for the glare. The method may further include taking corrective action to reduce the glare in subsequent images based on the glare information that is determined. | 2015-08-27 |
20150242671 | METHOD AND APPARATUS FOR READING OPTICAL INDICIA USING A PLURALITY OF DATA SOURCES - A system for decoding an encoded symbol character associated with a product is provided. The system includes a scanning apparatus comprising a first scan source disposed within a housing, and a second scan source disposed within the housing. The second scan source comprises an operating technology distinct from an operating technology of the first scan source. The first scan source is adapted to output a first scan data set, and the second scan source is adapted to output a second scan data set. At least one of the first scan data set and the second scan data set comprises product bar code scan data. | 2015-08-27 |
20150242672 | SENSOR EMPLOYING OVERLAPPING GRID LINES AND CONDUCTIVE PROBES FOR EXTENDING A SENSING SURFACE FROM THE GRID LINES - An electronic sensor forms a grid to detect surface features of a proximally located object, such as a fingerprint. The grid includes a plurality of parallel drive lines connectable to a drive source and a plurality of parallel pickup lines oriented substantially perpendicular to the drive lines and overlapping the drive lines. The drive lines are separated from the pickup lines by an insulating dielectric layer. The overlaps where the drive lines and pickup lines cross define impedance-sensitive electrode pairs which act as pixels at which surface features of the proximally located object are detected. One or more conductive probes extend from one or more corresponding impedance-sensitive electrode pairs, through an overlay layer of insulating material, to the sensing surface. | 2015-08-27 |
20150242673 | APPARATUS AND METHOD FOR A BIOMETRIC SENSOR IN A HANDHELD MOBILE WIRELESS COMMUNICATION DEVICE - A smart phone device has a display screen overlaid by a touch screen and a processor and a memory in the device hosting functions to perform display and touch functions. A logic executing in the processor in the device programmed to use a part of the touch screen as a biometric sensor. The logic sets aside a space on the touch screen for that specific space to function as the biometric sensor. The biometric sensor configured to use and uses either a finger of the hand or a thumb and thus captures either a fingerprint or a separate and distinct thumbprint, where a fingerprint and a thumbprint are different biometric samples. | 2015-08-27 |
20150242674 | System and Method for Conflating Datasets - In one aspect, a computer-implemented method for conflating a base dataset with a secondary dataset may generally include defining a locker boundary around each of a plurality of base polylines of the base dataset and identifying a plurality of initial matched segments and a plurality of initial mismatched segments for a plurality of secondary polylines of the secondary dataset, wherein each portion of the secondary polylines that is included within a locker boundary is defined as an initial matched segment and each portion of the secondary polylines that is not included within a locker boundary is defined as an initial mismatched segment. The method may also include identifying an offset parameter defined between a first initial matched segment and its corresponding base polyline using a three-vertex approximation and, if the offset parameter exceeds a predetermined offset threshold, defining the first initial matched segment as a mismatched segment. | 2015-08-27 |
20150242675 | Capacitive Sensor Packaging - An apparatus comprises a fingerprint sensor having a set of capacitive elements configured for capacitively coupling to a user fingerprint. The fingerprint sensor may be disposed under a control button or display element of an electronic device, for example one or more of a control button and a display component. A responsive element is responsive to proximity of the user fingerprint, for example one or both of a first circuit responsive to motion of the control button, and a second circuit responsive to a coupling between the fingerprint and a surface of the display element. The fingerprint sensor is disposed closer to the fingerprint than the responsive element. The control button or display component may include an anisotropic dielectric material, for example sapphire. | 2015-08-27 |
20150242676 | Method for the Supervised Classification of Cells Included in Microscopy Images - A method for supervised classification of cells contained in first and second different microscopy image formats preprocessing carried out on the basis of the first and second different image formats aiming to characterize their cell-related visual content and to transform the content into digital data; and executing a UNN algorithm-related code with the aim of processing the digital data. | 2015-08-27 |
20150242677 | EYEGLASS WEARING IMAGE ANALYSIS DEVICE, EYEGLASS WEARING IMAGE ANALYSIS METHOD, AND STORAGE MEDIUM HAVING EYEGLASS WEARING IMAGE ANALYSIS PROGRAM STORED - An eyeglass wearing image analysis device includes: an acquisition unit that acquires eyeglass frame type information; and a controller that performs a control operation based on the eyeglass frame type information. | 2015-08-27 |
20150242678 | METHOD AND APPARATUS OF RECOGNIZING FACIAL EXPRESSION USING ADAPTIVE DECISION TREE BASED ON LOCAL FEATURE EXTRACTION - A method and apparatus of recognizing a facial expression using a local feature-based adaptive decision tree are provided. A method of recognizing a facial expression by a facial expression recognition apparatus may include splitting a facial region included in an input image into local regions, extracting a facial expression feature from each of the local regions using a preset feature extracting algorithm, and recognizing a facial expression from the input image using the extracted facial expression feature based on a decision tree generated by repeatedly classifying facial expressions into two classes until one facial expression is contained in one class and determining a facial expression feature for a corresponding classification. | 2015-08-27 |
20150242679 | TECHNIQUES FOR EMOTION DETECTION AND CONTENT DELIVERY - Techniques for emotion detection and content delivery are described. In one embodiment, for example, an emotion detection component may identify at least one type of emotion associated with at least one detected emotion characteristic. A storage component may store the identified emotion type. An application programming interface (API) component may receive a request from one or more applications for emotion type and, in response to the request, return the identified emotion type. The one or more applications may identify content for display based upon the identified emotion type. The identification of content for display by the one or more applications based upon the identified emotion type may include searching among a plurality of content items, each content item being associated with one or more emotion type. Other embodiments are described and claimed. | 2015-08-27 |
20150242680 | POLARIZED GAZE TRACKING - Embodiments that relate to determining gaze locations are disclosed. In one embodiment a method includes shining light along an outbound light path to the eyes of the user wearing glasses. Upon detecting the glasses, the light is dynamically polarized in a polarization pattern that switches between a random polarization phase and a single polarization phase, wherein the random polarization phase includes a first polarization along an outbound light path and a second polarization orthogonal to the first polarization along a reflected light path. The single polarization phase has a single polarization. During the random polarization phases, glares reflected from the glasses are filtered out and pupil images are captured. Glint images are captured during the single polarization phase. Based on pupil characteristics and glint characteristics, gaze locations are repeatedly detected. | 2015-08-27 |
20150242681 | System and Method of Image Processing - The disclosure is directed to a system and method of image processing. According to various embodiments of the disclosure, a storage module in communication with a plurality of memory banks stores a plurality of pixels of an image in the memory banks and interleaves the memory banks to enable a plurality of image scanners to access the plurality of pixels. A scanning module scans a selection of pixels in at least four directions relative to a first pixel of the plurality of pixels utilizing the plurality of image scanners. A singular points detection module in communication with the scanning module acquires a depth of each pixel of the selection of scanned pixels and determines a singularity value of the first pixel by comparing the depth of the first pixel with the depth of each pixel of the selection of pixels. | 2015-08-27 |
20150242682 | Systems and Methods of Object Shape and Position Determination in Three-Dimensional (3D) Space - Methods and systems for capturing motion and/or determining the shapes and positions of one or more objects in 3D space utilize cross-sections thereof. In various embodiments, images of the cross-sections are captured using a camera based on edge points thereof. | 2015-08-27 |
20150242683 | System and Method for Detecting and Tracking Multiple Parts of an Object - A system and method of detecting a posture of at least one predetermined part of an object comprising the steps of extracting a first object shape from a first image taken by a first image sensor, computing a characteristic dimension value of the predetermined part within a predetermined region of the first object shape, constructing a mask based on the characteristic dimension value, extracting a profile of the predetermined part from the first object shape by applying the mask on the first object shape, and identifying at least one predefined feature point in the profile of the predetermined part, thereby detecting the posture of the predetermined part is disclosed. | 2015-08-27 |
20150242684 | METHOD AND SYSTEM FOR LINKING PRINTED OBJECTS WITH ELECTRONIC CONTENT - The present invention relates to a method for linking printed objects to electronic content, comprising: a) providing at least one digital copy of a printed object to a server's database, wherein said digital copy represents at least portion of said printed object, wherein the content layout of both the digital copy and the printed object is the same; b) providing association of at least one section at the layout of said digital copy with an electronic content, either by extracting and saving the coordinates of each link in the digital copy or via an external list of links; c) processing said digital copy for distinguishing between two types of objects: text objects and non-text objects, wherein each text object represent at least portion of a word or a combination of at least two or more adjacent words in any orientation with respect to the plane of said printed object; d) coding each object from both types of objects according to its visual shape and its reference location with respect to a defined coordinates on the layout of said printed object, thereby representing said digital copy as an array of vectors in a binary format; e) creating clusters of similar binary vectors and assigning random array of characters to each of said clusters, and saving said array of characters as coded dictionary of “hashwords”, thereby converting said binary vectors into a searchable text form; f) capturing an image of at least portion of said printed object by a mobile device; g) processing said captured image for distinguishing between text objects and image oriented objects, and coding each of said objects according to its visual shape and its reference location with respect to the layout of said printed object, thereby representing said captured digital image as an array of vectors in a binary format; h) sending said array of binary vectors to said server via a communications network; i) converting each clustered vectors to a hashword; j) performing textual search for identifying the corresponding hashwords that essentially best match the hashwords that were coded from the digital copy , wherein the conversion of said array into hashwords is done either locally in the mobile device prior to the sending or remotely at said server after the sending; k) performing a geometrical matching among the best matches over the array of vectors that represent the captured image; l) calculating the location of the captured part on the best match digital copy and extracting the specific link aimed to by captured image; and m) sending the associated electronic content or a corresponding link of it from said server to said mobile device. | 2015-08-27 |
20150242685 | COMPACT BIOMETRIC ACQUISITION SYSTEM AND METHOD - A method of determining the identity of a subject while the subject is walking or being transported in an essentially straight direction is disclosed, the two dimensional profile of the subject walking or being transported along forming a three dimensional swept volume, without requiring the subject to change direction to avoid any part of the system, comprising acquiring data related to one or more biometrics of the subject with the camera(s), processing the acquired biometrics data, and determining if the acquired biometric data match corresponding biometric data stored in the system, positioning camera(s) and strobed or scanned infrared illuminator(s) above, next to, or below the swept volume. A system for carrying out the method is also disclosed. | 2015-08-27 |
20150242686 | METHODS FOR ASSESSING IMAGE CHANGE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and an image analysis computing device that retrieves, based on a captured version of an object in a received image, training images which display related versions of the object and items of data related to the related versions of the object of the training images. Keypoints which are invariant to changes in scale and rotation in the captured version of the object in the received image and in the related versions of the object in the training images are determined. Changes to the object in the received image based on any of the determined keypoints in the related version of the object which do not match the determined keypoints in the captured version of the object are identified. The identified changes in the captured version of the object in the received image are provided. | 2015-08-27 |
20150242687 | FIRE DETECTION METHOD AND APPARATUS - A fire detection method and apparatus accurately detects a fire. The fire detection method includes obtaining RGB data from an image; calculating at least one index related to the attributes of fire using the obtained RGB data; and determining the occurrence of a fire using the index. | 2015-08-27 |
20150242688 | AUGMENTED REALITY APPARATUS AND METHOD - An augmented reality experience is provided to a user of a hand held device, such as a mobile phone, which incorporates an electronic processor, a camera and a display. In particular, images taken from video footage are displayed in a display of a hand held device together with a live camera view, to create the illusion that the subject of the video—ie the virtual moving image—is present in the field of view of the camera in real time. In this context the term “real world” image means an image taken from reality, such as a physical, real-world scenario using an electronic photo-capture technique, e.g. video recording. A camera | 2015-08-27 |
20150242689 | SYSTEM AND METHOD FOR DETERMINING GRAPH RELATIONSHIPS USING IMAGES - A system and method for determining graph relationships using images is disclosed. According to one embodiment, the computer-implemented method includes detecting a first feature from an image, detecting a second feature from the image, matching the first feature with a first identity that is associated with a first reference feature, matching the second feature with a second identity that is associated with a second reference feature, and determining a relationship between the first identity and the second identity based on the first feature co-occurring with the second feature in the image. | 2015-08-27 |
20150242690 | APPARATUS AND METHODS FOR TEMPORAL PROXIMITY DETECTION - A data processing apparatus may utilize an artificial neuron network configured to reduce dimensionality of input data using a sparse transformation configured using receptive field structure of network units. Output of the network may be analyzed for temporally persistency that is characterized by similarity matrix. Elements of the matrix may be incremented when present activity unit activity at a preceding frame. The similarity matrix may be partitioned based on a distance measure for a given element of the matrix and its closest neighbors. Stability of learning of temporally proximal patterns may be greatly improved as the similarity matrix is learned independently of the partitioning operation. Partitioning of the similarity matrix using the methodology of the disclosure may be performed online, e.g., contemporaneously with the encoding and/or similarity matrix construction, thereby enabling learning of new features in the input data. | 2015-08-27 |
20150242691 | METHODS AND APPARATUS FOR ESTABLISHING EXIT/ENTRY CRITERIA FOR A SECURE LOCATION - In some embodiments, a method of monitoring a secure location is provided that includes (1) providing one or more sensors that monitor the secure location, each sensor generating sensor data; (2) establishing a policy region for the secure location employing world coordinates, the policy region establishing one or more alarm criterion for at least one of objects entering the policy region and objects exiting the policy region; (3) tracking an object within the secure location using the sensor data from the one or more sensors; and (4) determining if the sensor data indicates that the object has violated one or more alarm criterion of the policy region. Numerous other embodiments are provided. | 2015-08-27 |
20150242692 | DETERMINATION OF TRAIN PRESENCE AND MOTION STATE IN RAILWAY ENVIRONMENTS - Foreground feature data and motion feature data is determined for frames of video data acquired from a train track area region of interest. The frames are labeled as “train present” if the determined foreground feature data value meets a threshold value, else as “train absent; and as “motion present” if the motion feature data meets a motion threshold, else as “static.” The labels are used to classify segments of the video data comprising groups of consecutive video frames, namely as within a “no train present” segment for groups with “train absent” and “static” labels; within a “train present and in transition” segment for groups “train present” and “motion present” labels; and within a “train present and stopped” segment for groups with “train present” and “static” labels. The presence or motion state of a train at a time of inquiry is thereby determined from the respective segment classification. | 2015-08-27 |
20150242693 | VIDEO SURVEILLANCE DEVICE AND METHOD - A video surveillance method is applied in a video surveillance device which can communicate with a number of image source devices and a number of terminal devices. The method includes receiving a request for images from at least one terminal device. If the request includes information requesting images from more than one image source device, obtaining images captured by each specified image source device in real-time, and grouping the obtained images together and transmitting same. | 2015-08-27 |
20150242694 | OBJECT IDENTIFIER - An object identifier is provided with a data-forming unit and a data-retrieving unit. The data-forming unit forms an integral image having an image region of the same size as an original image and an image to be integrated. The data-retrieving unit obtains compressed data derived by extracting, from a plurality of pixels constituting the integral image, at least every other pixel in at least one direction. | 2015-08-27 |
20150242695 | ON-STREET VEHICLE PARKING OCCUPANCY ESTIMATION VIA CURB DETECTION - A method and system for on-street vehicle parking occupancy estimation via curb detection comprises training a computer system to identify a curb, evaluating image data of the region of interest to determine a region wherein a curb is visible in said region of interest, and estimating a parking occupancy of said region of interest according to said region where said curb is visible. | 2015-08-27 |