37th week of 2017 patent applcation highlights part 47 |
Patent application number | Title | Published |
20170262619 | Portion-Level Digital Rights Management in Digital Content - Portion-level digital rights management (DRM) in digital content is described. In one or more embodiments, a selection of a portion of the digital content is received at a computing device. Then, a policy is assigned to the selected portion by adding a markup element with an identifier to the selected portion. Based on the assigned policy, the selected portion is encrypted without encrypting another portion of the digital content. Subsequently, access to the selected portion is controlled based on the policy independently of the other portion. In this way, different portions of a single document can be protected with different policies. Different users may then have access to different portions of the digital content based on their user ID being associated with a particular policy, which improves security and management of distributable digital content. | 2017-09-14 |
20170262620 | ELECTRONIC APPARATUS AND CONTROL METHOD THEREOF - An electronic apparatus operated based on an OS is provided. The electronic apparatus includes a storage to store the OS, a virtual device program capable of generating a virtual device executed based on the OS, and at least one program; and at least one processor to execute the virtual device program to generate the virtual device, and to execute the OS to determine whether a first program having an administration authority assigned by the OS from among the at least one program has access authority to data about the virtual device in response to an attempt to access the data from the first program and to selectively permit the access to the data based on the determined access authority. With this, the electronic apparatus may restrain the access to the virtual device or the data thereabout according to a presence of the access authority, thereby safely protecting the virtual device or the data. | 2017-09-14 |
20170262621 | METHODS AND SYSTEMS FOR DYNAMICALLY MANAGING ACCESS TO DEVICES FOR RESOLUTION OF AN INCIDENT TICKET - In one embodiment, an access management system for dynamically managing access to one or more devices for resolution of an incident ticket associated with the one or more devices is disclosed. The access management system comprises a processor and a memory communicatively coupled to the processor. The memory stores processor instructions, which, on execution, causes the processor to identify an incident ticket type by analyzing data associated with the incident ticket. The processor is caused to determine one or more access parameters based on the incident ticket type. The one or more access parameters comprises a device type, an application software run on a device, a system software run on a device, a security privilege to access the device, and time duration to access the device. Further, the processor is caused to provide the access to the one or more devices based on the one or more access parameters. | 2017-09-14 |
20170262622 | PROVIDING MULTI-FACTOR SECURITY FOR ELECTRONIC DEVICES THROUGH BODY AREA NETWORK AND RADIOFREQUENCY NETWORK COMMUNICATIONS - A method performed by a processor of a first electronic device includes transmitting first authentication information through a Body Area Network (BAN) interface circuit that communicates with a second electronic device using electrical signals conducted through electrodes contacting a body of a user extending between the first and second electronic devices. Second authentication information is received through a radiofrequency transceiver circuit that communicates via an antenna through an air-interface with the second electronic device. A command to control an operation of the second electronic device is communicated responsive to determining that a combination of the first authentication information and the second authentication information satisfies an authentication rule. | 2017-09-14 |
20170262623 | PHYSICS-BASED CAPTCHA - Disclosed are various embodiments for generating a physics-based CAPTCHA. In a physics-based CAPTCHA, an object is placed within a scene so that a visually observable change occurs to the object. The scene is animated so that the visually observable change occurs to the object. Before and after imagery can be captured and used as a challenge and a response. Incorrect responses can be generated by altering the scene or object. | 2017-09-14 |
20170262624 | ACCESS CONTROL SYSTEM - Various systems and methods for providing access control are described herein. A system comprises a display; a processor; and a memory, including instructions, which when executed on the processor, cause the processor to: present a limited lock screen on a display of the user device, wherein the limited lock screen only provides a non-personalized access mechanism; receive user input via the limited lock screen; correlate the user input with an operating context, wherein the user input is uniquely correlated with the operating context; and unlock the user device with access to the operating context. | 2017-09-14 |
20170262625 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - An information processing apparatus is provided that includes a processor configured to execute one or more programs to implement an authentication unit that performs an authentication process with respect to identification information based on a first program, an activation unit that communicates the identification information to a second program, which is distinct from the first program, while the authentication process is being performed based on the first program, and requests for activation of the second program, and a determination unit that receives a response from the second program and determines whether to restrict use of the information processing apparatus based on the response from the second program. | 2017-09-14 |
20170262626 | METHOD AND SYSTEM FOR AUTHENTICATION OF A STORAGE DEVICE - A method for authenticating a storage device includes sending encrypted host device data from a host device to the storage device for a current authentication session, receiving encrypted storage device specific data and an encrypted first output string from the storage device based on the encrypted host device data sent to the storage device, and authenticating the storage device based on the encrypted storage device specific data and the encrypted first output string from the storage device. | 2017-09-14 |
20170262627 | SITUATIONAL AWARENESS BASED LOGIN APPARATUS AND METHOD - A situational awareness based login apparatus and method. The situational awareness based login apparatus includes a situation information collecting unit configured to collect situation information around a device, a situational awareness processing unit configured to identify and store a user from the collected situation information, and a device authenticating unit configured to compare the situation information and pre-stored device operation policy information and calculate a satisfaction rate, and configured to provide different login processes based on the calculated satisfaction rate. | 2017-09-14 |
20170262628 | MANAGEMENT DEVICE, MANAGEMENT METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A management device includes: a processor configured to: store, in a storage, request history information indicating a history of an Application Programming Interface (API) request transmitted by an application and an access-number management table representing number of times API access of the application is able to be made in each unit time; calculate, upon reception of the API request, as for an application having transmitted the API request, a stability based on transition of contents of the API request from the application and the request history information; change the number of times API access of the application is able to be made according to the stability; and upon reception of the API request from the application, compare number of times of access of the application and the number of times API access of the application is able to be made, and determine whether acceptance of the API request is made. | 2017-09-14 |
20170262629 | COOKIES WATERMARKING IN MALWARE ANALYSIS - Techniques for cookies watermarking in malware analysis are disclosed. In some embodiments, a system, process, and/or computer program product for cookies watermarking in malware analysis includes receiving a sample at a cloud security service; detonating the sample in an instrumented virtual environment; and determining that the sample is malware based on detecting an attempt to access a watermark cookie during an automated malware analysis using the instrumented virtual environment. | 2017-09-14 |
20170262630 | PROTECTION FROM SIDE-CHANNEL ATTACKS BY VARYING CLOCK DELAYS - A system, comprising a logic circuit and delay circuitry, is described. The logic circuit is configured to perform a plurality of instances of a particular computation that is based on a plurality of inputs. The delay circuitry is configured to vary a power-consumption profile of the logic circuit over the plurality of instances, by applying, to the inputs, respective delays that vary over the instances, at least some of the delays varying independently from each other. Other embodiments are also described. | 2017-09-14 |
20170262631 | SYSTEM AND METHOD OF CONTROLLING FILE ACCESS OF APPLICATIONS BASED ON VULNERABILITIES OF APPLICATIONS - Disclosed are systems and methods for controlling opening of computer files by vulnerable applications. An example method includes: responsive to detecting creation by a source software application of a computer file on the user computer, determining a file access policy associated with the computer file based on one or more parameters of the computer file; responsive to detecting a request from a consumer software application to open the computer file, determining an application launching policy associated with the consumer software application based on one or more vulnerabilities identified for the consumer software application; determining a file opening policy associated with the computer file and the consumer software application based on the file access policy, the application launching policy, and respective priorities amongst the policies; and controlling opening of the computer file by the consumer software application according to the determined file opening policy. | 2017-09-14 |
20170262632 | SECURE DOCUMENT IMPORTATION VIA PORTABLE MEDIA - System, method and medium for securely transferring untrusted files from a portable storage medium to a computer. The invention can filter, scan and detonate untrusted files to be transferred to a computer from a portable storage medium. First, the types of files which are eligible to be selected for transfer are limited, by file type and/or content. Second, each file selected for transfer is scanned against a collection of signatures of known malware. Thus, files contain malware which has been previously identified as such can be blocked from ever being transferred to the computer. Finally, each file to be transferred is detonated by opening it in a controlled, sterile environment to determine if it adversely impact the operation of that sterile environment. Malware detected in this way can then be added to the collection of malware that can be detected by the second step. | 2017-09-14 |
20170262633 | SYSTEM AND METHOD FOR AUTOMATED MACHINE-LEARNING, ZERO-DAY MALWARE DETECTION - Improved systems and methods for automated machine-learning, zero-day malware detection. Embodiments include a system and method for detecting malware using multi-stage file-typing and, optionally pre-processing, with fall-through options. The system and method receive a set of training files which are each known to be either malign or benign, partition the set of training files into a plurality of categories based on file-type, in which the partitioning file-types a subset of the training files into supported file-type categories, train file-type specific classifiers that distinguish between malign and benign files for the supported file-type categories of files, associate supported file-types with a file-type processing chain that includes a plurality of file-type specific classifiers corresponding to the supported file-types, train a generic file-type classifier that applies to file-types that are not supported file-types, and construct a composite classifier using the file-type specific classifiers and the generic file-type classifier. | 2017-09-14 |
20170262634 | ANALYSIS SYSTEM, ANALYSIS METHOD AND PROGRAM - Analysis system, analysis method and program. The system includes: trace means for acquiring a command issued by software executed in an information processing system and a physical address of a memory used by the command as trace data, and recording the trace data to storage means; event detecting means for detecting an event caused to occur by the software and acquiring event information; conversion means for converting the event information to a memory access pattern configured with a plurality of commands for accessing the memory and a plurality of physical addresses; and memory accessing means for accessing the memory using the converted memory access pattern, causing the trace means to acquire trace data and record the trace data to the storage means. | 2017-09-14 |
20170262635 | SAMPLING CONTENT USING MACHINE LEARNING TO IDENTIFY LOW-QUALITY CONTENT - An online system obtains risk scores determined by a machine learning model for a content item provided by a user of an online system for display to users of the online system, where the risk scores indicate the likelihood of content items violating a content policy. The online system uses the risk scores to determine sampling weights used to select content items for inclusion in a sampled subset of content items. The sampling weights are determined from risk score counts indicating the relative frequency of the obtained risk scores and impression counts indicating the number of times content items have been presented to the users of the online system. The online system presents the selected content items for evaluation by a human reviewer using a quality review interface. Using the results of the quality review, the online system determines quality performance metrics of the machine learning model. | 2017-09-14 |
20170262636 | INFORMATION PROCESSING APPARATUS, METHOD OF DISTINGUISHING MOUNTING OF ENCRYPTION UNIT IN INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus, equipped with a processor for controlling the information processing apparatus and a storage device, has an encryption unit that encrypts or decrypts data stored in the storage device and data read from the storage device, and determines whether or not the encryption unit is mounted on the same circuit board as a control unit, and changes processing for detecting whether or not a connection between the encryption unit and the control unit is disconnected in accordance with the determination result. | 2017-09-14 |
20170262637 | CABLE MODEM ANTI-CLONING - Methods, systems, and computer readable media can be operable to facilitate the encryption of a device identifier using an identification property of a SoC. A unique identifier of a cable modem may be encrypted using a unique key or other unique property of a SoC associated with the cable modem. When an authentication process is initiated at the cable modem, the encrypted unique identifier of the cable modem may be decrypted using the unique key or other unique property of the SoC, thereby producing the unique identifier of the cable modem. The decrypted unique identifier of the cable modem may be output from the cable modem to an upstream controller during the authentication process. In embodiments, an obfuscation key may be used to encrypt and decrypt the unique identifier of the cable modem, and the obfuscation key may be generated using a unique identifier of the SoC. | 2017-09-14 |
20170262638 | DISTRIBUTED DATABASE SYSTEMS AND METHODS WITH ENCRYPTED STORAGE ENGINES - Methods and systems are provided for selectively employing storage engines in a distributed database environment. The methods and systems can include a processor configured to execute a plurality of system components, that comprise an operation prediction component for determining an expected set of operations to be performed on a portion of the database; a data format selection component for selecting, based on at least one characteristic of the expected set of operations, and at least one storage engine for writing the portion of the database in a selected data format. According to one embodiment, the system includes an encryption API configured to initialize callback functions for encrypting and decrypting database data, a storage API for executing the call back functions, a database API configured to manage database operations (e.g., read and write requests), wherein the database API calls the storage API to access data on a stable storage medium. | 2017-09-14 |
20170262639 | CLOUD KEY ESCROW SYSTEM - Embodiments are directed to storing encrypted data in a data store and to securely providing access to the encrypted data according to a predefined policy. A data storage system receives encrypted data. The data is encrypted using a private key. The data storage system stores the received encrypted data according to a predefined policy. The encryption and the policy prevents the storage system from unencrypting the encrypted data, while the policy allows the encrypted data to be released upon receiving a threshold number of requests from verified third parties. The data storage system implements a verifiable secret sharing scheme to verify that the encrypted data can be reconstituted without the data storage system decrypting the encrypted data. The data storage system can acknowledge that the received encrypted data has been verified and successfully stored. | 2017-09-14 |
20170262640 | DATABASE OPERATION METHOD AND DEVICE - Disclosed are a database operation method and device. The method includes: receiving a read/write request to an open source database of a first terminal; generating a first key for accessing the open source database under triggering of the read/write request; comparing and determining whether the first key is consistent with a second key, wherein the second key is a key generated by the first terminal based on a feature code of the first terminal when creating the open source database; and determining whether to allow a read/write operation to the open source database according to a comparison result, wherein the read/write operation to the open source database is permitted when the comparison result indicates that the first and second keys are consistent; and the read/write operation to the open source database is prohibited when the comparison result indicates that the first and second keys are inconsistent. | 2017-09-14 |
20170262641 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - According to an aspect of the invention, an information processing apparatus includes a monitoring unit and a control unit. The monitoring unit monitors movement of each document being correlated with a score indicating how much the document includes pieces of personal information. The control unit controls the movement of the document monitored by the monitoring unit when a relationship among an importance degree of personal information of a movement source, an importance degree of personal information of a movement destination, and the score of the document which is a target to be moved corresponds to a predetermined relationship in a case where the document having the score larger than a predetermined threshold value or greater than or equal to the predetermined threshold value is set to the target to be moved. | 2017-09-14 |
20170262642 | COMPOSITE DOCUMENT ACCESS - According to an example of accessing a composite document, a request to access a composite document is received. A key associated with a group is fetched, and the key is used to decrypt a part of the composite document comprising an attribute. In the event that the attribute is verified, access to the composite document is provided. | 2017-09-14 |
20170262643 | System, apparatus and method for License Key permutation - A system and method of dynamically altering the encoding, structure or other attribute of a cryptographic key, typically a license activation key, to render useless keys that have been created by illegal key generation “cracks”. An encoding/decoding engine provides a plurality of key obfuscation algorithms that may alter the structure, encoding or any other attribute of a given key. A changeable combination code is supplied to the encoding/decoding engine that specifies a subset of the algorithms to apply during the encoding or decoding phase. The encoding engine is used during key generation and the decoding engine used during key usage. The same combination code must be used during decoding as was used during encoding to recover the original key or a valid key will not be recovered. Thus, a system can be rapidly re-keyed by selecting a new combination of encoding/decoding algorithms. The selection of algorithms comprises a combination code. The new combination code will result in keys that are incompatible with any existing illegal key generators. | 2017-09-14 |
20170262644 | SOFTWARE HANDLING DEVICE, SERVER SYSTEM AND METHODS THEREOF - The present invention relates to a software handling device and a server system. The software handling device comprises a processor and a transceiver, wherein the transceiver is configured to transmit varies requests and to receive varies verifications and encryption keys to and from a server system. The server system comprises an authentication server, a licensing server and a software application server, wherein the server system is configured to receive varies requests and to transmit varies verifications and encryption keys from and to a software handling device. Furthermore, the present invention also relates to corresponding methods, a computer program, and a computer program product. | 2017-09-14 |
20170262645 | DATA ENCRYPTION IN A MULTI-TENANT CLOUD ENVIRONMENT - Various embodiments of systems, computer program products, and methods for encrypting data in a multi-tenant cloud environment are described herein. In an aspect, an encryption time frame to encrypt data associated with a user in a multi-tenant cloud environment may be retrieved. Based on the encryption time frame, a list of object types to be encrypted may be identified. A batch encryption period may be determined for encrypting data corresponding to the list of object types. Further, batches are sequentially selected based on the batch encryption period, for a selected batch: one or more data records may be retrieved based on the batch encryption period and the one or more data records may be encrypted in groups based on at least one throttling value. | 2017-09-14 |
20170262646 | COMPUTING SYSTEM WITH NON-ORTHOGONAL DATA PROTECTION MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: an interface circuit configured to provide access to a data block including an arrangement of multiple individual data; and a processing circuit, coupled to the interface circuit, configured to generate a non-orthogonal protection data corresponding to instances of the individual data along a non-orthogonal direction within the data block for correcting the one or more of the corresponding instances of the individual data. | 2017-09-14 |
20170262647 | DATA SECURITY MANAGEMENT BASED ON DEVICE LOCATIONS AND CONNECTION STATES - A mobile storage device includes first and second memory regions in one or more semiconductor memory devices, a positioning system configured to generate positional information indicating a position of the mobile storage device, and a controller. The controller is configured to allow access to the first memory region and prohibit access to the second memory region when the positional information indicates that the position of the mobile storage device is within a first area, and prohibit access to the first memory region and allow access to the second memory region when the positional information indicates that the position of the memory storage device is within a second area, which is different from and does not overlap with the first area. | 2017-09-14 |
20170262648 | PARTIAL-CONTEXT POLICY ENFORCEMENT - Techniques for making preliminary authorization determinations based on partial contextual information are disclosed. In one or more embodiments, an API receives an authorization request and partial contextual information associated with the authorization request. The API submits the partial contextual information to an authorization service, without submitting complete contextual information associated with the authorization request. The API receives, from the authorization service, a preliminary authorization response based on the partial contextual information. The preliminary authorization includes one of (a) denial of the authorization request and (b) non-denial of the authorization request. Based on the authorization request including non-denial of the authorization request, the API further processes the authorization request by obtaining a final authorization result based on the complete contextual information associated with the authorization request and, responsive to the authorization request, providing the final authorization result. | 2017-09-14 |
20170262649 | POLICY STORAGE USING SYNTAX GRAPHS - Techniques for generating syntax graphs corresponding to user-defined policy statement are disclosed. In one or more embodiments, a policy management service receives a user-defined policy statement that includes a requestor variable value, an action variable value, a resource variable value, and a location variable value. The user-defined policy statement describes an authorization policy. The policy authorization service converts the user-defined policy statement to a canonical policy statement, which involves: mapping the requestor variable value to a unique system-wide requestor identifier, and mapping the location variable value to a unique system-wide location identifier. The policy management service generates a syntax graph of the canonical policy statement. The syntax graph is traversable to determine whether the authorization policy is satisfied for a particular authorization request. The policy management service stores the syntax graph for use by an authorization service. | 2017-09-14 |
20170262650 | Cyber Security System and Method for Transferring Data Between Servers Without a Continuous Connection - A cybersecurity system includes a controller that functions as a gateway between an end user device and an offline data storage device. When the end user device wants to access a file on the offline data storage device the controller severs a connection between a temporary storage memory and the end user device, establishes a connection with the offline data storage device, pulls the data from the offline data storage device to a temporary storage memory, then severs the connection with the offline data storage device, then establishes the connection with the end user device and communicates the data from the temporary storage memory to the end user device before overwriting the data in the temporary storage memory. | 2017-09-14 |
20170262651 | Privacy - Preserving Data Querying with Authenticated Denial of Existence - In one embodiment, a tokenized list holder enables privacy-preserving querying with denial of existence functionality. Both an information requester and the tokenized list holder access related (or identical) tokenizing algorithms to generate tokenized terms based on original terms. Prior to receiving a query for information based on a tokenized query term, the tokenized list holder generates sorted tokenized data terms that are associated with a database. Upon receiving the query, the tokenized list holder determines that the tokenized query term is not included in the sorted tokenized data terms. The tokenized list holder then generates a signed response that specifies a gap in the sorted tokenized data terms to indicate that the information is not included in the database. Advantageously, because neither the query nor the response includes original (i.e., untokenized) terms, the privacy of both the information requester and the database is preserved. | 2017-09-14 |
20170262652 | Secure personal content server - A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in communication for connecting the LCS via a network to at least one Secure Electronic Content Distributor (SECD), which SECD is capable of storing a plurality of data sets, is capable of receiving a request to transfer at least one content data set, and is capable of transmitting the at least one content data set in a secured transmission; a rewritable storage medium whereby content received from outside the LCS may be stored and retrieved; a domain processor that imposes rules and procedures for content being transferred between the LCS and devices outside the LCS; and a programmable address module which can be programmed with an identification code uniquely associated with the LCS. The LCS is provided with rules and procedures for accepting and transmitting content data. | 2017-09-14 |
20170262653 | Abstracted Graphs from Social Relationship Graph - A system may generate abstracted graphs from a social relationship graph in response to a query. A query may identify a person for which permission has been obtains to collect their data. The abstracted graphs may include summary statistics for various relationships of the person. The relationships may include other persons, places, things, concepts, brands, or other object that may be present in a social relationship graph, and the relationships may be presented in an abstracted or summarized form. The abstracted form may preserve data that may be useful for the requestor, yet may prevent the requestor from receiving some raw data. When two or more people have given consent, the data relating to the consenting persons may be presented in a non-abstracted manner, while other data may be presented in an abstracted manner. | 2017-09-14 |
20170262654 | SECURE GROUP DATA EXCHANGE - System and techniques secure group data exchange are described herein. A template may be obtained from local store. The template defines data segments and operations on data segments. A data segment definition may be extracted from the template. The data segment definition including a set of demographic values. An external store may be queried for external data segments with a definition including at least one demographic value from the set of demographic values. The data segments include an owner entity. A scenario may be executed in accordance with the template using a local data segment and the external data segments to produce an experimental result. The experimental result may be communicated to the owner entity. | 2017-09-14 |
20170262655 | SECURE FILE SHARING OVER MULTIPLE SECURITY DOMAINS AND DISPERSED COMMUNICATION NETWORKS - System and method of obtaining data in a system in which share volumes of the data are dispersed across a communication network. A first computer requesting the data forwards the request to a second computer. The second computer determines if another computer has reassembled the data, and if so, responds to the first computer that the request cannot be granted. Otherwise, the second computer enables the first computer to access personal information associated only with a user of the first computer that authorizes the user to access the data. The personal information is used to determine reassembly information necessary to reassemble the data. The reassembly information is used to reassemble the data. The personal information may then be destroyed. The reassembled data is dispersed across the communication network. New personal information is created for the user. | 2017-09-14 |
20170262656 | METHOD AND DEVICE FOR PROVIDING VERIFYING APPLICATION INTEGRITY - A device receives an APK file for the application, during which the code is modified. A checksum for the modified code is generated and signed using a signing key of a trusted entity in the OS of the device. The signed checksum and a certificate for the signing key are stored in reserved spaces in memory. The modified application may then be executed during which an integrity verification module in the library of the application can verify the integrity of the modified application. The solution is particularly suitable for devices using the Android OS since the DEX during installation is optimized to an ODEX or compiled to ELF for which there is no signature. | 2017-09-14 |
20170262657 | METHOD AND DEVICE FOR PROVIDING VERIFYING APPLICATION INTEGRITY - During execution of modified code, a device generates a checksum for the modified code, and checks whether the generated checksum matches one of a plurality of stored possible checksums for the modified code, each possible checksum corresponding to a possible code obtained by modification of an original code that was modified to obtain the modified code. In case of a match, the device verifies a signature on the plurality of stored possible checksums, and, if successfully verified, verifies the validity of a certificate for the signing key. The solution is particularly suitable for devices using the Android OS since the DEX during installation is optimized to an ODEX or OAT complied to ELF files for which there is no certified checksum. | 2017-09-14 |
20170262658 | METHOD AND DEVICE FOR PROVIDING VERIFYING APPLICATION INTEGRITY - During execution of a modified application that has been obtained by modification of an unmodified application a device determines that code corresponding to the unmodified application also corresponds to the modified application, generates a checksum for the code corresponding to the unmodified application that is compared with a stored checksum for the unmodified application to determine whether these match, and determines that the integrity of the modified application has been successfully verified in case the modified application corresponds to the code corresponding to the unmodified application and in case the checksum for the code corresponding to the unmodified application matches the stored checksum for the unmodified application. The solution is particularly suitable for devices using the Android OS since the DEX during installation is optimized to an ODEX or OAT compiled to ELF files for which there is no certified checksum. | 2017-09-14 |
20170262659 | Multi-Level Encryption of Tokenized Protected Data - A system uses a multi-level encryption and tokenization mechanism to allow for fields of a larger object to be individually tokenized and encrypted. Protected data is encrypted using an encryption key and a generated token is displayed in its place. The encryption key is then encrypted using a secondary key. To dereference a token, a requesting application provides the token and associated context to a token service, which searches a token store for a record having both the token and the context. If such a record is located, the token service generates a secondary key and decrypts the encryption key. The decrypted encryption key then decrypts the protected data and transmits the data to the requesting application. | 2017-09-14 |
20170262660 | SYSTEMS AND METHODS FOR PROVIDING AND DETECTING THERMAL ENERGY PATTERNS IN ELECTRONIC DEVICES - Systems, apparatuses, and methods for verifying an authenticity of an electronic device are disclosed. An apparatus includes one or more heat generating components coupled to an electronic device and arranged in a particular configuration such that, when selectively activated, the one or more heat generating components emit thermal radiation in a specific heat pattern that corresponds to the particular configuration and the selective activation. The specific heat pattern is readable by a thermal reading device to obtain information regarding the apparatus. | 2017-09-14 |
20170262661 | ANTI-TAMPER SYSTEM AND AN ANTI-TAMPER CIRCUIT OF THE SAME - An anti-tamper system includes a first object, second objects, and an anti-tamper circuit that includes conductive networks and a control unit. Each conductive network includes: conductive modules, each of which is sandwiched between the first object and a corresponding second object; and conductive connection members which are coupled to the conductive modules in such away that at least the conductive modules and the conductive connection members cooperatively form a corresponding electrical path sequentially going through the second objects. The control unit detects damage of each electrical path, and initiates a predetermined action upon detecting the damage. | 2017-09-14 |
20170262662 | Computer Recovery or Return - A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the processor automatically causes to appear during or after boot-up of the processor on the display, that displays information concerning an owner who owns the computer, concerning user information about who the user is who the computer is assigned to for use, and return information for returning the computer to the owner from data stored in the memory. A method for displaying information to assist with returning a computer to its owner. | 2017-09-14 |
20170262663 | SYSTEMS AND METHODS FOR CORRECTION OF ON-STRIP CODING - Systems and methods of making a diagnostic test strip, the method including marking a machine-readable pattern onto the diagnostic test strip which contains information that allows a meter designed to work with the test strip to convert raw signal data from the diagnostic test strip into a meaningful concentration value for an analyte of interest. The method further includes printing the machine-readable pattern having a modified based code that is different from a base code of the diagnostic test strip being produced, wherein the modified based code is based on a strip geometry parameter, a chemistry parameter or both the strip geometry and chemistry parameters that are measured for the diagnostic test strip. | 2017-09-14 |
20170262664 | MULTI-MEDIA READER APPARATUS, SECURE TRANSACTION SYSTEM AND METHODS THEREOF - A multi-media reader (MMR) apparatus, secure transaction system and methods thereof are provided. The MMR apparatus includes a slot to receive a card and a near field communication (NFC) antenna to communicate with other NFC enabled devices and cards. The system is provided for securely sharing information over a network to complete one or more transactions using the MMR apparatus and a mobile device. The shared information may be separated and reassembled using on or more servers to increase security. | 2017-09-14 |
20170262665 | STANDARD CARD READER FOR MOBILE APPLICATION - The invention relates to a card-reading device ( | 2017-09-14 |
20170262666 | MAGNETIC CARD READER - A magnetic stripe reader including a base element defining a first spring seat, a magnetic module support element arranged for limited pivotable motion relative to the base element and defining a second spring seat, a generally truncated conical spring having a first, relatively large diameter end seated in the first spring seat and a second, relatively small diameter end seated in the second spring seat and a magnetic module fixedly mounted onto the magnetic module support element. | 2017-09-14 |
20170262667 | RFID SYSTEM WITH LOCATION CAPABILITY - Provided are RFID systems, methods and RFID tags according to various aspects. An infrared (IR) beam, from an IR transmitter, is outputted in a first direction so that an RFID tag with an IR sensor adds a flag to stored data in the RFID tag in response to the RFID tag's IR sensor detecting the IR beam. An RF interrogation signal is outputted by an RFID reader, and a response is received from the RFID tag to the RF interrogation signal. It is determined whether the flag is contained in the RFID tag's response to the RF interrogation signal, and if so, the RFID tag is determined to be in the first direction relative to the IR transmitter. | 2017-09-14 |
20170262668 | LOCATION TRACKING SYSTEM - A location tracking system includes a tag configured to be uniquely associated with and affixed to an item, and automatically and periodically emit a first signal, a receiving transmitter having a Bluetooth signal reception functionality that is configured to automatically receive the first signal from the tag when the receiving transmitter is within a broadcast range of the tag without requiring pairing of the receiving transmitter and the tag and transmit a second signal, and a data system configured to be remotely accessible to the receiving transmitter and receive the second signal transmitted from the receiving transmitter. The second signal can be transmitted via a network to which the receiving transmitter is connected. An application can be installed in the receiving transmitter that allows the receiving transmitter to automatically receive the first signal and initiate transmission of the second signal from the receiving transmitter to the data system. | 2017-09-14 |
20170262669 | Systems and Methods to Determine Kinematical Parameters using RFID Tags - Systems and methods to determine kinematical parameters of physical objects using radio frequency identification (RFID) tags attached to the objects. In one embodiment, one of a population of RFID tags is selectively instructed by an RFID reader to backscatter the interrogating electromagnetic wave and thus allow the RFID reader to measure the position, speed, acceleration, and/or jerk of the object to which the tag is attached. The RFID reader combines the signal representing the backscattered interrogating electromagnetic wave and the signal representing the interrogating electromagnetic wave transmitted by the RFID reader to determine or monitor one or more of the kinematical parameters of the object. | 2017-09-14 |
20170262670 | DUAL FREQUENCY RFID READER - An antenna system for a dual frequency RFID reader, having: a first antenna | 2017-09-14 |
20170262671 | RFID TRACKING FASTENER - In some embodiments, a tracking fastener may include a plastic tracking fastener. The plastic tracking fastener may include a plastic tracking staple or a plastic tracking nail. The plastic tracking fastener may include at least one elongated member comprising at least one distal end, and a proximal end. The distal end(s) may penetrate, during insertion, a surface of an object. The tracking fastener may include a wireless identification device. The wireless identification device may contain electronically stored information associated with an item to which the plastic tracking fastener is coupled. The plastic tracking fastener may have a primary antenna electrically coupled to the wireless identification device. The plastic tracking fastener may have a secondary antenna electromagnetically coupled to the primary antenna of the wireless identification device. The secondary antenna may provide higher read range/distance relative to the primary antenna itself. The tracking fastener may communicate information to an interrogator. | 2017-09-14 |
20170262672 | SYSTEM FOR IDENTIFYING A LOCATION OF A MOBILE TAG READER - A radio frequency identification (RFID) reader identifies in which room among several rooms the RFID reader is more likely to be located. The RFID reader includes a transmitter for transmitting an interrogating radio frequency (RF) signal. It includes a receiver for receiving RF signals generated in corresponding pairs of RFID tags. The RFID tag pairs are attached to corresponding regions of each of the rooms. Each of said RFID tag pair including a first RFID tag and a second RFID tag that are spaced from each other by a distance that is larger or equal to λ/4 and smaller than or equal to λ/2 with respect to a frequency of a responding RF signal originated in the pair of RFID tags. A processor selects a larger RSSI of the RSSPs of the signal pair. The processor determines a corresponding sum of the RSSI's selected from each signal pair associated with each room. The processor evaluates in accordance with determined sums, the location in which said RFID reader is more likely to be located. | 2017-09-14 |
20170262673 | DEVICES AND METHODS FOR IMAGING TARGETS - In an embodiment, a pair of overhead mirror portions splits a field of view of an imager into first and second subfields of view. An illuminating assembly is energized to illuminate a target. A first part of the imager is exposed to capture return illumination light from the target passing through a horizontal window of a workstation over the first subfield of view, and a second part of the imager is exposed to capture return illumination light from the target passing through the horizontal window over the second subfield of view. | 2017-09-14 |
20170262674 | MACHINE VISION SYSTEMS INCORPORATING POLARIZED LECTROMAGNETIC RADIATION EMITTERS - Machine vision systems are provided. More specifically, machine vision systems are provided that incorporate polarized illumination and detection. Polarized electromagnetic radiation may be used to reduce glare and enable increased flashing speed in machine vision detection systems. Ultra-high power light sources, heat tolerant polarizing media and optical-path systems may be coupled with ultra-high speed flashing systems to enable increased web-speed while maintaining necessary accuracy in web-scanning operations. | 2017-09-14 |
20170262675 | PRESENTATION SCANNER WITH USER INTERFACE TO PROVIDE FEEDBACK ABOUT OBJECT AND CODE INDICIA POSITION RELATIVE TO A SCANNING VOLUME - A method of scanning an object may include determining that an object is proximately positioned relative to a scanning volume of a presentation scanner in response to receiving at least one object presence signal prior to scanning a code indicia positioned on the object. At least one object sensory indicator device may be activated in response to determining that the object is proximately positioned relative to the scanning volume so as to indicate that the object is proximate to the scanning volume to a user. A second level of detection and location feedback may be provided for code indicia within the scanning volume. | 2017-09-14 |
20170262676 | OPTICAL ACCESSORY FOR ATTACHMENT TO MOBILE DEVICE - An attachment for use with a mobile device with an imaging device and a mobile-device light source can include one or more of an attachment base and an attachment body. The attachment base can be configured to secure the attachment body to the mobile device via a case for the mobile device. The attachment body can include at least one optical device for use with the imaging device, and an optical sensor to receive optical control signals from the mobile-device light source. | 2017-09-14 |
20170262677 | INDICIA READER FOR SIZE-LIMITED APPLICATIONS - An indicia-reading module is capable of integration into the smallest face of thin-profile smart device. The module employs chip-on-board packaging and a customized sensor enclosure to eliminate the stack-up height found in conventional packaging. The module also employs a customized frame to reduce volume by integrating circuit subassembly circuit boards into a unique architecture and by serving as the lenses for the illuminator and the aimer, thereby eliminating the need for any extra lenses or holders. | 2017-09-14 |
20170262678 | WIRELESS BARCODE SCANNING APPARATUS AND WIRELESS BARCODE SCANNING SYSTEM INCLUDING THE SAME - A wireless barcode scanning system includes a wireless barcode scanning apparatus and an electronic apparatus, and a Bluetooth connection is established between the wireless barcode scanning apparatus and the electronic apparatus. The wireless barcode scanning apparatus reads a barcode to acquire barcode information of the barcode and the barcode information is transmitted to the electronic apparatus to be stored and/or displayed by the Bluetooth connection. Therefore, the wireless barcode scanning apparatus may be widely applied to the wireless transmission of scanned barcode data because of quick-speed induction and connection and high-volume data transmission. | 2017-09-14 |
20170262679 | SYSTEM AND METHOD FOR IDENTIFYING A GENUINE PRINTED DOCUMENT - A system and method for verifying that a document is included in a document management system is disclosed. This system and method includes scanning of a scan track of a document, generating document data dependently upon the scanning, comparing the generated document data to stored document data, the stored document data generated dependently upon a prior scanning of the scan track of the document, and outputting an indication of the document being included in the document management system as determined by the comparing. | 2017-09-14 |
20170262680 | METHODS AND A COMPUTING DEVICE FOR DETERMINING WHETHER A MARK IS GENUINE - Methods for determining whether a mark is genuine are described. According to various implementations, a computing device (or logic circuitry thereof) receives (e.g., via a camera or via a communication network) an image of a candidate mark (e.g., a one-dimensional or two-dimensional barcode), uses the image to make measurements of a characteristic of a feature of the candidate mark, resulting in a profile for that feature. The computing device filters out, from the feature profile, all spatial frequency components that are indicated to be sibling frequency components. In some embodiments, the computing device carries out the reverse procedure, and filters out all spatial frequency components except for those indicated to be sibling frequency components. | 2017-09-14 |
20170262681 | Feature-Based Matcher for Distorted Fingerprint Matching - In one aspect, methods that use a novel representation, referred to as an octant feature vector (OFV), are used for matching distorted fingerprints. For instance, a feature-based matcher for distorted fingerprint matching may use a two-step local and global matching scheme to compare a set of feature vectors that are derived from minutiae of a reference fingerprint and a search fingerprint. The relative geometric relationships between the reference minutia and nearest minutiae may be derived and encoded into a feature vector based on orientation difference. The OFV is invariant to the rigid transformations and is insensitive to nonlinear distortions since the relative geometric relationships are independent from the rigid transformation. | 2017-09-14 |
20170262682 | FINGERPRINT IDENTIFICATION SYSTEM, A DRIVING CIRCUIT AND A FINGERPRINT IDENTIFICATION METHOD - A fingerprint identification system is provided. The fingerprint identification system includes a sensing panel and a driving circuit. The sensing panel includes a plurality of sensors. Each of the sensors transmits a sensing signal and a reference signal through two signal transmission paths. The driving circuit is coupled to the sensing panel. The driving circuit is configured to drive the sensing panel, and execute a fingerprint identification operation according to the sensing signal and the reference signal. The sensing signal and the reference signal form a differential signal pair. The driving circuit generates a fingerprint identification signal according to the sensing signal and the reference signal. A driving circuit and a fingerprint identification method are also provided. | 2017-09-14 |
20170262683 | MUTUAL-CAPACITANCE TOUCH SENSING PATTERN RECOGNITION DEVICE, FABRICATING METHOD THEREOF, RELATED DISPLAY PANEL, AND RELATED DISPLAY APPARATUS - In accordance with various embodiments, the disclosed subject matter provides a mutual-capacitance touch sensing pattern recognition device, a related fabricating method, a related display panel, and a related display apparatus. The mutual-capacitance touch sensing pattern recognition device can comprise a plurality of sensing electrode lines and a plurality of driving electrode lines, wherein at least one set of the plurality of sensing electrode lines and the plurality of driving electrode lines have curved portions. | 2017-09-14 |
20170262684 | APPARATUS FOR RECOGNIZING BIOMETRIC INFORMATION AND METHOD FOR ACTIVATING A PLURALITY OF PIEZOELECTRIC ELEMENT INDIVIDUALLY - The present invention relates to a biological information recognition apparatus and a method for selectively activating, by the biological information recognition apparatus, a plurality of piezoelectric elements. More particularly, the present invention relates to a biological information recognition apparatus which may be used to identify a user by recognizing biological information, such as the fingerprint, blood vessels, and bones of a finger of the user, and a method of driving the same. More specifically, the present invention relates to a methodology for individually activating a plurality of piezoelectric elements included in the biological information recognition apparatus and scanning biological information using a method different from a conventional method by selectively activating the plurality of piezoelectric elements. Furthermore, the present invention is directed to forming the piezoelectric elements on a substrate in a pattern of a form which is different from a conventional pattern of a matrix form and more efficiently identifying biological information. | 2017-09-14 |
20170262685 | Fingerprint Sensor-Compatible Overlay Material - A fingerprint sensor-compatible overlay material which uses anisotropic conductive material to enable accurate imaging of a fingerprint through an overlay is disclosed. The anisotropic conductive material has increased conductivity in a direction orthogonal to the fingerprint sensor, increasing the capacitive coupling of the fingerprint to the sensor surface, allowing the fingerprint sensor to accurately image the fingerprint through the overlay. Methods for forming a fingerprint sensor-compatible overlay are also disclosed. | 2017-09-14 |
20170262686 | Fingerprint Identifying Device and Fingerprint Identifying System - A fingerprint identifying device and a fingerprint identifying system are provided. The fingerprint identifying device including: a substrate; a transparent cover plate, located right above the substrate; a detection light source, located on a first side of the transparent cover plate; and a photoelectric sensor, located on a side of a lower surface of the transparent cover plate, wherein, a refractive index of the transparent cover plate is less than a refractive index of a skin of a human fingerprint part, the transparent cover plate has a side surface on the first side, and an angle between the side surface and an upper surface of the transparent cover plate is an acute angle, the detection light source is configured to provide a light beam towards the side surface of the transparent cover plate, so that the light beam is incident to the upper surface of the transparent cover plate through the side surface of the transparent cover plate, and the light beam is totally reflected on the upper surface of the transparent cover plate in a case that the upper surface of the transparent cover plate is in contact with air, the photoelectric sensor is configured to receive a light beam reflected from the upper surface of the transparent cover plate. The fingerprint identifying device is capable of improving the identifying accuracy thereof. | 2017-09-14 |
20170262687 | BIOMETRIC CAPTURE DEVICE, BIOMETRIC CAPTURE METHOD, AND COMPUTER-READABLE NON-TRANSITORY MEDIUM - A biometric capture device includes: a first light source configured to emit a light of a first wavelength to a biometric body; a second light source configured to emit a light of a second wavelength different from the first wavelength to the biometric body; a camera configured to capture a reflected light from the biometric body; a memory; and a processor coupled to the memory and the processor configured to execute a process, the process including: acquiring a biometric image based on a component of the first wavelength from an image captured by the camera; acquiring distance information between the biometric body and the camera based on a component of the second wavelength from the image captured by the camera; and correcting the biometric image based on the distance information. | 2017-09-14 |
20170262688 | Enrollment Using Synthetic Fingerprint Image and Fingerprint Sensing Systems - A fingerprint sensing system. The fingerprint sensing system includes: at least one sensor; at least one display device; at least one application processor; and at least one secure enclave processor. The application processor(s) receives fingerprint data from the sensor(s) and provides the fingerprint data to the secure enclave processor(s). The secure enclave processor(s) decodes the fingerprint data and provides a signal indicative of at least one matched node. The application processor(s), responsive to receipt of the signal indicative of the matched node(s), presents at least a portion of a synthetic fingerprint image via at least one display device corresponding to the matched node(s). | 2017-09-14 |
20170262689 | FINGERPRINT SENSING SYSTEM AND METHOD - According to a first aspect of the present disclosure, a fingerprint sensing system is provided, comprising: at least one sensing element configured and arranged to generate a sensing characteristic; a detection unit configured and arranged to detect changes of said sensing characteristic over time; a processing unit configured and arranged to determine if the changes of said sensing characteristic substantially conform to a predefined liveness function. According to a second aspect of the present disclosure, a corresponding fingerprint sensing method is conceived. According to a third aspect of the present disclosure, a corresponding computer program product is provided. | 2017-09-14 |
20170262690 | FINGERPRINT RECOGNITION SYSTEM AND METHOD - A fingerprint recognition system and method are disclosed. The fingerprint recognition system includes: a fingerprint recognition apparatus, a detection electrode, and a contact detection apparatus. The contact detection apparatus includes: an analog to digital converter configured to charge and discharge the detection electrode and to detect a capacitance value of the detection electrode; a determining module configured to determine whether the detection electrode is touched by a finger according to the capacitance value, and to generate finger touch information when determining that the finger touches the detection electrode to start the fingerprint recognition apparatus to perform fingerprint recognition. | 2017-09-14 |
20170262691 | FINGERPRINT AUTHENTICATION SYSTEM, FINGERPRINT AUTHENTICATION PROGRAM AND FINGERPRINT AUTHENTICATION METHOD - An object of the present invention is to provide a fingerprint authentication system, a fingerprint authentication program and a fingerprint authentication method that can achieve high-speed processing. | 2017-09-14 |
20170262692 | CAPACITIVE FINGERPRINT SENSING DEVICE AND METHOD FOR CAPTURING A FINGERPRINT USING THE SENSING DEVICE - The present invention relates to a capacitive fingerprint sensing device for sensing a fingerprint pattern. The sensing device comprises a protective dielectric top layer having an outer surface forming a sensing surface to be touched by the finger; a two-dimensional array of electrically conductive sensing structures arranged underneath the top layer; readout circuitry coupled to each of the electrically conductive sensing structures to receive a sensing signal indicative of a distance between the finger and the sensing structure; and an electroacoustic transducer arranged underneath the top layer and configured to generate an acoustic wave, and to transmit the acoustic wave through the protective dielectric top layer towards the sensing surface to induce an ultrasonic vibration potential in a ridge of finger placed in contact with the sensing surface. | 2017-09-14 |
20170262693 | BIOMETRIC AUTHENTICATION DEVICE, BIOMETRIC AUTHENTICATION METHOD, AND COMPUTER-READABLE NON-TRANSITORY MEDIUM - A biometric authentication device includes: a memory; and a processor coupled to the memory and the processor configured to execute a process, the process comprising: acquiring a plurality of sets of palm images taken under different illumination conditions of an illumination source from one another in obtaining images of a palm with light emitted from the illumination source; adjusting a time interval at which the imaging device acquires the image sets, in accordance with a condition for imaging the palm; extracting a biological feature from each of the image sets; and comparing each biological feature extracted by the extracting with a biological feature registered in advance. | 2017-09-14 |
20170262694 | Point-of-care Sample Analysis and Microscopy for Liquid Samples - Improved colorimetric analysis of liquid samples is provided. A sample holder is used that delivers predetermined volumes of sample individually to each of several colorimetric test patches at the same time with a sliding action. An opaque housing is employed to prevent ambient light from reaching the test patches when color images of the test patches are acquired. Preferably, a mobile electronic device including a camera is attached to the opaque housing to acquire the images. Optical microscopy can be performed in addition to the colorimetric analysis. | 2017-09-14 |
20170262695 | FACE DETECTION, REPRESENTATION, AND RECOGNITION - In an approach to face recognition in an image, one or more computer processors receive an image that includes at least one face and one or more face parts. The one or more computer processors detect the one or more face parts in the image with a face component model. The one or more computer processors cluster the detected one or more face parts with one or more stored images. The one or more computer processors extract, from the clustered images, one or more face descriptors. The one or more computer processors determine a recognition score of the at least one face, based, at least in part, on the extracted one or more face descriptors. | 2017-09-14 |
20170262696 | WEARABLE APPARATUS AND INFORMATION PROCESSING METHOD AND DEVICE THEREOF - A wearable apparatus, including: an image collector ( | 2017-09-14 |
20170262697 | EVENT DETECTION, CONFIRMATION AND PUBLICATION SYSTEM THAT INTEGRATES SENSOR DATA AND SOCIAL MEDIA - Enables integration of sensor data with other information on servers such as social media sites to detect, confirm and/or publish events. Sensors may measure values such as motion, temperature, humidity, wind, pressure, elevation, light, sound, or heart rate, etc. Sensor data and event tags may be utilized to curate text, images, video, sound and post the results to social networks, for example in a dedicated feed. Event tags generated by the system may represent for example activity types, players, performance levels, or scoring results. The system may analyze social media postings to confirm or augment event tags. Users may filter and analyze saved events based on the assigned tags. The system may create highlight and fail reels filtered by metrics and by tags. Recommendations may be provided to a user based on analysis of sensor data and other information; recommendations may include for example recommended friends, purchases, or activities. | 2017-09-14 |
20170262698 | Monitoring Fitness Using A Mobile Device - Athletic performance monitoring and tracking may provide multiple ways in which to track athletic movement and activity. Workouts may also be tagged with various parameters including mood, weather, terrain, athletic equipment, friends used and the like. Workout information may be shared to social messaging and networking outlets. Workout information shared may include map information including images of maps, interactive maps, links to maps, route information and the like and/or combinations thereof. Additionally or alternatively, an application may be configured to execute within a context of a social networking system to facilitate athletic activity data transfer and generation of workout entries in the social networking site. | 2017-09-14 |
20170262699 | Sessions and Groups - Athletic activity may be tracked while providing encouragement to perform athletic activity. For example, energy expenditure values and energy expenditure intensity values may be calculated and associated with a duration and type of activity performed by an individual. These values and other movement data may be displayed on an interface in a manner to motivate the individual and maintain the individual's interest. The interface may track one or more discrete “sessions”. The sessions may be associated with energy expenditure values during a duration that is within a second duration, such as a day, that is also tracked with respect to variables, such as energy expenditure. Other individuals (e.g., friends) may also be displayed on an interface through which a user's progress is tracked. This may allow the user to also view the other individuals' progress toward completing an activity goal and/or challenge. | 2017-09-14 |
20170262700 | INTUITIVE SELECTION OF A DIGITAL STROKE GROUPING - Improved accuracy and user interaction efficiency for selecting a grouping of digital strokes is provided. In response to receiving an indication of a selection input on or in proximity to a digital stroke, a determination is made as to whether the digital stroke is part of an existing group of digital strokes. When the digital stroke is not part of an existing group, an analysis of the digital stroke and other digital strokes within a calculated boundary is performed for determining which strokes should be included in a stroke grouping. A stroke grouping is generated based on the determination. Accordingly, in response to the selection input on or in proximity to the digital stroke, the selection is expanded to the stroke grouping, thus improving the accuracy of the selection gesture and improving computer efficiency. | 2017-09-14 |
20170262701 | SYSTEM AND METHOD FOR COMPARING DOCUMENTS - The present invention relates to a system and a method for comparing information contained on at least two documents belonging to an entity. The present invention includes at least one device configured to receive information from at least one first document and at least one second document; then, compare at least one first document information and at least one second document information; and determine whether at least one second document contains at least one first document information. The present invention then outputs a result of whether the at least one second document contains at least one first document information. | 2017-09-14 |
20170262702 | VIDEO OBJECT CLASSIFICATION WITH OBJECT SIZE CALIBRATION - A camera system comprises an image capturing device, and connected to it are an object classification module and a calibration module. The object classification module is operable to determine whether or not an object in an image is a member of an object class, and the calibration module is operable to estimate representative sizes of the object. The object classification module may determine a confidence parameter that is used by the calibration module, or conversely, the calibration module may produce a size that is used by the classification module. | 2017-09-14 |
20170262703 | HEAD MOUNTED DISPLAY - A head mounted display includes a lens disposed at a position facing a user's cornea; a plurality of infrared light sources disposed in a periphery of the lens that emit infrared light toward the user's cornea; a hot mirror that reflects the infrared light; a camera that captures an image projected into the hot mirror; an output unit that outputs an image captured by the camera to an eyesight direction detection unit that detects an eyesight direction of the user; and a housing, wherein when the periphery of the lens is divided into four regions: a first corresponding to the outer corner side of the eye, a second corresponding to the inner corner side, a third corresponding to the top side of the head, and a fourth corresponding to the jaw side, the plurality of infrared light sources are disposed in any of the first region and the second region. | 2017-09-14 |
20170262704 | FAST RECOGNITION ALGORITHM PROCESSING, SYSTEMS AND METHODS - Systems and methods of quickly recognizing or differentiating many objects are presented. Contemplated systems include an object model database storing recognition models associated with known modeled objects. The object identifiers can be indexed in the object model database based on recognition features derived from key frames of the modeled object. Such objects are recognized by a recognition engine at a later time. The recognition engine can construct a recognition strategy based on a current context where the recognition strategy includes rules for executing one or more recognition algorithms on a digital representation of a scene. The recognition engine can recognize an object from the object model database, and then attempt to identify key frame bundles that are contextually relevant, which can then be used to track the object or to query a content database for content information. | 2017-09-14 |
20170262705 | RECURRENT NETWORKS WITH MOTION-BASED ATTENTION FOR VIDEO UNDERSTANDING - A method of predicting action labels for a video stream includes receiving the video stream and calculating an optical flow of consecutive frames of the video stream. An attention map is generated from the current frame of the video stream and the calculated optical flow. An action label is predicted for the current frame based on the optical flow, a previous hidden state and the attention map. | 2017-09-14 |
20170262706 | SMART TRACKING VIDEO RECORDER - Various systems and methods for processing video are described herein. A system comprises a storage device; a processor; and a memory, including instructions, which when executed on the processor, cause the processor to: receive a time interval, the time interval divided into a plurality of segments; access from the storage device, a plurality of video clips, each of the plurality of video clips including a timestamp; for each of the plurality of segments in the time interval, determine a candidate video clip of the plurality of video clips, the candidate video clip including a subject in the candidate video clip; compose an output video that includes the candidate video clip of each segment of the plurality of segments; and output the output video to a display. | 2017-09-14 |
20170262707 | SYSTEM AND METHOD FOR VIDEO PREVIEW - A method for presenting a preview of a video includes receiving a first version of the video. The first version of the video has a first resolution. The method also includes analyzing the first version of the video and identifying a first preview frame from the first version of the video based on the analysis of the first version of the video. The method further includes obtaining information relating to the identified first preview frame and receiving a second version of the video. The second version of the video has a second resolution, which is greater than the first resolution. The method also includes extracting, from the second version of the video, a second preview frame according to the information relating to the first preview frame. | 2017-09-14 |
20170262708 | Surveillance camera image pan tilt roll zoom (PTRZ) control from a 3D touch user interface apparatus and method of operation - A logic control circuit controls a remote pan tilt zoom (PTZ) camera by transmitting commands and displaying the resulting image on a 3D touch sensitive display. When pressure is measured at two or three locations of the display, a new centerpoint is determined. The relative force applied at the pair of locations causes a determination of desired direction and desired rate of change of zoom or roll. A bounding box is added to the presently displayed image and commands are transmitted to the PTZ camera to fulfill the desired change in orientation and image size. Several limits and interrupts are set to stop the zooming process. The process includes measuring and comparing the force applied incident to a 3D touch user interface integrated with a display at two locations. | 2017-09-14 |
20170262709 | TRAFFIC SIGNAL ANALYSIS SYSTEM - A traffic signal analysis system can receive image data from one or more cameras of an autonomous vehicle, where the image data includes a traffic signaling system located at an intersection. The traffic signal analysis system can determine a pass-through action for the autonomous vehicle through the intersection, and access a matching signal map that includes characteristic information indicating properties of the traffic signaling system. Based on the characteristic information and the image data, the traffic signal analysis system can identify a state of the traffic signaling system for the pass-through action, and generate an output for the autonomous vehicle indicating the state of the traffic signaling system for the pass-through action. | 2017-09-14 |
20170262710 | APPARATUS THAT PRESENTS RESULT OF RECOGNITION OF RECOGNITION TARGET - An apparatus and a method capable of accurately recognizing that a person will appear on a road and certainly notifying the person that an autonomous moving body has recognized a place where the person will appear are disclosed. An apparatus according to an embodiment of the present disclosure detects, as a recognition target, a person appearance area, in which a person will appear, formed by a recognition target presentation apparatus on a road and presents, to the person, a result of recognition indicating that the autonomous moving body has recognized the person appearance area as a result of the detection of the recognition target. | 2017-09-14 |
20170262711 | INFORMATION SYSTEM FOR A MOTOR VEHICLE - In a method, an area surrounding a first motor vehicle is scanned optically on the part of the first motor vehicle; a message is determined on the basis of the scanned information; the message is transmitted from the first motor vehicle to a second motor vehicle, a distance between the first and the second motor vehicle not exceeding a predetermined maximum value; a graphic representation of the area surrounding the first motor vehicle is determined on the basis of the message; and the representation is output on board the second motor vehicle. | 2017-09-14 |
20170262712 | VEHICLE VISION SYSTEM WITH ENHANCED LANE TRACKING - A driver assistance system for a vehicle includes a camera disposed at a vehicle and having a field of view forward of the vehicle. A control includes an image processor that is operable to process image data captured by the camera. Responsive to processing by the image processor of image data captured by the camera, the image processor is operable to determine lane markings demarcating the lane in which the vehicle is traveling. Responsive to processing by the image processor of captured image data and responsive to at least one of (i) a map input and (ii) a location input, the control estimates a path of travel for the vehicle to maintain the vehicle in the lane in which the vehicle is traveling in situations where the lane markings demarcating the lane in which the vehicle is traveling are not readily determinable. | 2017-09-14 |
20170262713 | Method and Device of Lane Departure Warning and Automobile Driving Assistance System - A lane departure warning method includes steps of: collecting a road image by an imaging device; detecting a lane marking in accordance with the road image, so as to extract a position of the lane marking and an angle of the lane marking relative to a running direction of the vehicle; acquiring steering information and a movement speed of the vehicle by an OBD system; judging whether or not the vehicle is unconsciously running on the lane marking in accordance with the position of the lane marking, the angle of the lane marking relative to the running direction of the vehicle and the steering information of the vehicle; in the case that the vehicle is unconsciously running on the lane marking, recording a duration within which the vehicle is unconsciously running on the lane marking; and judging whether or not to send a lane departure warning to the vehicle. | 2017-09-14 |
20170262714 | IMAGE PROCESSING DEVICE AND IMAGE PROCESSING PROGRAM - An imaging device for tracking moving objects includes an image output device outputting first and second images that include a moving object to be tracked. A memory stores image data from the image output device. An image processing device includes local storage and performs a block matching processing comprising evaluating a first block in the first image, dividing the second image into multiple regions, storing image data for a divided region in the local storage unit, determining similarity of the first block to blocks in each of the divided regions in turn, and then determining the similarity of the first and second images according to results obtained for each of the divided regions. | 2017-09-14 |
20170262715 | APPARATUS FOR PRESENTING RESULT OF RECOGNIZING RECOGNITION TARGET - There are provided an apparatus, a method, and an autonomous moving body which allow a recognition target to be notified with certainty that the recognition target is recognized by an autonomous moving body. A recognition result presenting apparatus according to an embodiment of the present disclosure detects a recognition target (person) present within a predetermined range from an automatic driving vehicle and presents, to the detected recognition target (person), the result of recognition indicating that the automatic driving vehicle recognizes the recognition target (person). | 2017-09-14 |
20170262716 | OBJECT RECOGNITION APPARATUS - An object recognition apparatus learns an axis displacement amount of a reference axis of first object detecting means, combines and integrates, as information belonging to a same object, a plurality of pieces of information present within a first combining area and a second combining area, when a positional relationship between the first combining area and the second combining area meets a predetermined combinable condition. The first combining area is set as an area in which pieces of information related to the object acquired by the first object detecting means are combined. The second combining area is set as an area in which pieces of information related to the object acquired by second object detecting means are combined. The object recognition apparatus variably sets sizes of the first combining area and the second combining area based on a learning state of the axis displacement amount of the reference axis. | 2017-09-14 |
20170262717 | CAMERA ARRAY SYSTEM AND METHOD TO DETECT A LOAD STATUS OF A SEMI-TRAILER TRUCK - Disclosed are a method, a device and/or a system of utilizing a camera array system to detect a load status of a semi-trailer truck. A sensor array is affixed to a surface of a trailer of the semi-trailer truck to automatically determine whether a cargo area of the semi-trailer truck is occupied. A set of cameras of the sensor array have each camera embedded in individual recesses of the sensor array. The cargo area is illuminated using at least one light source of the sensor array. A memory and a processor associated with the sensor array are configured to store one baseline image of the cargo area of the trailer in an empty state. The processor is configured to detect a triggering event. The processor determines a cargo status based upon a difference between the current image and the baseline image, and sends the cargo status to a dispatcher. | 2017-09-14 |
20170262718 | INFORMATION PROCESSING APPARATUS AND METHOD OF SEARCHING FOR SIMILAR DATA - An information processing apparatus stores first and second registered feature data respectively expressing first and second features of registered data, generates first and second subject feature data respectively expressing the first and second features of subject data, calculates a first degree of dissimilarity between the first registered feature data and the first subject feature data using a first computational process that exhibits symmetry so that a computational result does not change when two input values are interchanged, calculates a second degree of dissimilarity between the second registered feature data and the second subject feature data using a second computational process that exhibits antisymmetry so that a computational result changes when the two input values are interchanged, and selects the registered data based on the first and second degrees of dissimilarity. | 2017-09-14 |