40th week of 2015 patent applcation highlights part 66 |
Patent application number | Title | Published |
20150278490 | Systems and Methods for Detecting Copied Computer Code Using Fingerprints - Systems and methods of detecting copying of computer code or portions of computer code involve generating unique fingerprints from compiled computer binaries. The unique fingerprints are simplified representations of the compiled computer binaries and are compared with each other to identify similarities between the compiled computer binaries. Copying can be detected when there are sufficient similarities between at least portions of two compiled computer binaries. | 2015-10-01 |
20150278491 | SOFTWARE SELF-DEFENSE SYSTEMS AND METHODS - Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image. | 2015-10-01 |
20150278492 | METHOD FOR USER AUTHENTICATION IN A DEVICE COMPRISING A TOUCH SCREEN - A method for user authentication in a device comprising a touch screen is provided. In operation, the device stores a user authentication code corresponding to a user. When a trigger for user authentication is detected, the device randomly selects one or more character positions in the sequence of characters. The device further requests the user to enter a character corresponding to each of the selected one or more character positions in the sequence of characters. When the device detects a user entry made using a keypad on the touch screen, the device determines whether the user entry matches a character corresponding to each of the selected one or more character positions. When the user entry matches a character corresponding to each of the selected one or more character positions in the sequence of characters, then the user is successfully authenticated to the device. | 2015-10-01 |
20150278493 | MANAGING A PASSWORD - A computer implemented method for managing a password is disclosed. The method can include generating a first hash value corresponding to a first password. The method can also include determining whether the first hash value corresponds with a second hash value included in the set of hash values. Further, the method can include suppressing storage of the first password in the set of passwords in response to determining that the first hash value corresponds with a second hash value included in the set of hash values. | 2015-10-01 |
20150278494 | SYSTEMS AND METHODS FOR VALIDATING LOGIN ATTEMPTS BASED ON USER LOCATION - A computer-implemented method for validating login attempts based on user location may include (1) detecting a login attempt by a user to log into a user account, where the login attempt originates from an atypical location, (2) determining that the atypical location is inconsistent with a pattern of past login locations for the user, (3) retrieving location information that indicates a current location of the user from at least one third-party Internet resource, (4) determining, based on the location information, that the atypical location of the login attempt matches the current location of the user, and (5) trusting that the login attempt legitimately originates from the user based at least in part on the atypical location matching the current location of the user. Various other methods, systems, and computer-readable media are also disclosed. | 2015-10-01 |
20150278495 | FINGERPRINT PASSWORD - Various systems and methods for authenticating a user are described herein. A system to includes a biometric scanner to scan an input sequence of biometric identifiers; a storage device to store a biometric identifier database; an input module to receive the input sequence of biometric identifiers; an access module to access the biometric identifier database and retrieve a secret sequence of biometric identifiers; a comparator module to compare the input sequence of biometric identifiers to the secret sequence of biometric identifiers to obtain a result; and an authorization module to, based on the result, allow access to a resource provided by the system. | 2015-10-01 |
20150278496 | METHOD, DEVICE AND SYSTEM FOR IDENTITY VERIFICATION - Provided is a method for identity verification that includes receiving an access request, generating a corresponding verification code and returning the verification code. The method acquires voiceprint information and semantic information corresponding to the access request. Then executes an identity verification according to the voiceprint information and semantic information. | 2015-10-01 |
20150278497 | BIOMETRIC DATA APPARATUS - The present disclosure provides a cover for an electronic device and a biometric data apparatus for communication with an electronic device, wherein the biometric data apparatus comprises: a body; and a biometric data input element formed on the body; wherein at least part of the body is configured such that the biometric data apparatus may be releasably coupled to the electronic device when the cover for the electronic device is fitted to the electronic device. | 2015-10-01 |
20150278498 | MOBILE TERMINAL AND METHOD FOR CONTROLLING THE SAME - A mobile terminal and a control method thereof are disclosed. According to the embodiments of the present disclosure, a mobile terminal may include a mobile terminal body, a wireless communication unit configured to receive an information input request for user authentication from an external server connected to the body, and a controller configured to transmit a wireless signal for sensing the wearing of a second mobile terminal formed to be paired with the body and wearable on a specific portion of a human body to the second mobile terminal in response to the request, wherein the controller performs wearer authentication for the second mobile terminal in response to receiving at least one of a response signal to the wireless signal from the second mobile terminal and a wearer's biometric signal sensed through the second mobile terminal, and controls the authentication method of the user authentication or processing for an information input corresponding to the authentication method to be determined in a different manner based on at least one of the execution result of the wearer authentication and the analysis result of the received biometric signal. | 2015-10-01 |
20150278499 | Motion-Triggered Biometric System for Access Control - A system and method for regulating access to a computing device, wherein a motion detector detects motion near the computing device and triggers an imaging device to receive an image, which is then analyzed to identify any people in the image. If at least one person in the image is not an authorized user, the computing device is locked or disconnected from the Internet. | 2015-10-01 |
20150278500 | PERSONAL AUTHENTICATION AND ACCESS - A user of a system defines a limited use access token for an external user for that external user to access defined resources of the system based on the user's account with the system. An access control system validates the access token when the external user attempts to access the defined resources and grants the external principal access to the defined resources. | 2015-10-01 |
20150278501 | CONTROLLING USER ACCESS TO ELECTRONIC RESOURCES WITHOUT PASSWORD - Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed. | 2015-10-01 |
20150278502 | Methods and Devices for Granting Access To and Enabling Passcode Protection for a File - Methods and electronic devices configured to grant access to a file, and of enabling passcode protection for a file. The methods may include displaying file icons corresponding to the files. Upon receiving a selection of one of the displayed files, a request for the passcode is presented to the user if the selected application is protected. If the application is not protected, the file is accessed without receiving the passcode. The file icons may be displayed in a manner indicating that certain ones of the files require a passcode for access. | 2015-10-01 |
20150278503 | TOUCHSCREEN UNLOCKING METHOD AND APPARATUS - A touchscreen unlocking method and apparatus are disclosed. The method includes receiving an unlocking instruction triggered by a user by sliding a control on a touchscreen; reading a corresponding user-defined screen locking configuration file according to the unlocking instruction; and performing an unlocking operation on the touchscreen according to the corresponding user-defined screen locking configuration file. In the present disclosure, when a user triggers unlocking, an unlocking operation is performed on a touchscreen according to a user-defined screen locking configuration file; and an unlocking control on the touchscreen can be self-defined and randomly set by the user, and different effects such as animation, sound, and vibration may be displayed in different states, thereby greatly improving unlocking convenience and fun, and meeting the requirement that the user hopes to self-define an unlocking manner according to the preference of the user. | 2015-10-01 |
20150278504 | USER AUTHENTICATION BASED ON ESTABLISHED NETWORK ACTIVITY - A device may determine that a user device should be authenticated; and determine a confidence measurement based on an established activity pattern of the user device. The confidence measurement may relate to a likelihood that an authorized user of the user device is in possession of the user device. The device may authenticate the user device based on the confidence measurement. | 2015-10-01 |
20150278505 | AUTHENTICATION METHOD USING PHYSICAL UNCLONABLE FUNCTIONS - A method of authenticating a target device using a reader and a data store comprising: sending a selected challenge data value from the reader to the target device multiple times; receiving at the reader the respective response data value generated by the target device in response to each instance of the challenge data value sent by the reader; determining a representative response data value from the response data values received by the reader; comparing the representative response data value against the response data values in the respective challenge-response data set; and determining that the target device is authentic if the representative data value matches any one of the response data values from a respective challenge-response data set. | 2015-10-01 |
20150278506 | AUTHENTICATION OF A DEVICE - Pairing data associated with a second device may be received at a first device. The pairing data may be received from a server. A first authentication proof may be generated based on the pairing data received from the server. A second authentication proof may be received from the second device. Furthermore, an authentication status of the second device may be updated based on a comparison of the first authentication proof that is based on the pairing data received from the server and the second authentication proof that is received from the second device. | 2015-10-01 |
20150278507 | METHODS FOR ENABLING REAL-TIME DIGITAL OBJECT AND TANGIBLE OBJECT INTERACTIONS - A method for authorizing an electronic device includes: detecting, with a capacitive touch sensor, a first set of interaction data from an interaction between the electronic device and a capacitively interactive hardware tool; computing a first set of parametric descriptors from the first set of interaction data; transmitting the first set of parametric descriptors to a remote database system; generating, on the remote database system, a first set of identity data from a comparison of the first set of parametric descriptors with a known set of parametric descriptors; and authorizing, in response to the first set of identity data, the electronic device to perform the action. | 2015-10-01 |
20150278508 | TRANSMISSION OF AN APPLICATION DOWNLOAD VIA AN ENCODED IMAGE - Disclosed are various embodiments for transmitting an application download to a recipient. The sender defines parameters for transferring the application download. Parameters are encoded in an identifier that may be decoded by the recipient's client device or that may be imaged and sent to a server providing the application download service. The recipient scans or captures an image of the displayed encoded identifier using a client device. | 2015-10-01 |
20150278509 | MANAGING A PASSWORD - A computer implemented method for managing a password is disclosed. The method can include generating a first hash value corresponding to a first password. The method can also include determining whether the first hash value corresponds with a second hash value included in the set of hash values. Further, the method can include suppressing storage of the first password in the set of passwords in response to determining that the first hash value corresponds with a second hash value included in the set of hash values. | 2015-10-01 |
20150278510 | Credential Sharing - A credential can be shared by one user with other users when sharing conditions are met. Sharing conditions can include a time, time range, date, date range and the geographic location of a user with whom the credential is to be shared. The credential can be shared so that it is not visible or accessible in plaintext to the shared-with user. Sharing conditions can include conditions that, when met, result in the revocation of a shared credential. | 2015-10-01 |
20150278511 | MONITORING AN APPLICATION IN A PROCESS VIRTUAL MACHINE - An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first minor class containing a minor entry point to the application. A mirror target class is loaded in response to a request to load the target class. The minor target class contains a minor entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application. | 2015-10-01 |
20150278512 | VIRTUALIZATION BASED INTRA-BLOCK WORKLOAD ISOLATION - Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package. | 2015-10-01 |
20150278513 | HOSTED APPLICATION SANDBOXING - This specification describes technologies relating to software execution. A sandboxing computer system accesses at least one application file and instantiates a sandbox environment. The sandbox environment does not having allocated, when instantiated, a memory buffer for use by a running application. The application file is run in the sandbox environment to produce an application output. A memory buffer is for use by the running application after the application has begun running, and a client computer system is provided with the application output. | 2015-10-01 |
20150278514 | Entry/Exit Architecture for Protected Device Modules - The entry/exit architecture may be a critical component of a protection framework using a secure enclaves-like trust framework for coprocessors. The entry/exit architecture describes steps that may be used to switch securely into a trusted execution environment (entry architecture) and out of the trusted execution environment (exit architecture), at the same time preventing any secure information from leaking to an untrusted environment. | 2015-10-01 |
20150278515 | MONITORING AN APPLICATION IN A PROCESS VIRTUAL MACHINE - An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first mirror class containing a mirror entry point to the application. A mirror target class is loaded in response to a request to load the target class. The mirror target class contains a mirror entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application. | 2015-10-01 |
20150278516 | RETURN-TARGET RESTRICTIVE RETURN FROM PROCEDURE INSTRUCTIONS, PROCESSORS, METHODS, AND SYSTEMS - A processor includes a decode unit to decode a return target restrictive return from procedure (RTR return) instruction. A return target restriction unit is responsive to the RTR return instruction to determine whether to restrict an attempt by the RTR return instruction to make a control flow transfer to an instruction at a return address corresponding to the RTR return instruction. The determination is based on compatibility of a type of the instruction at the return address with the RTR return instruction and based on compatibility of first return target restrictive information (RTR information) of the RTR return instruction with second RTR information of the instruction at the return address. A control flow transfer unit is responsive to the RTR return instruction to transfer control flow to the instruction at the return address when the return target restriction unit determines not to restrict the attempt. | 2015-10-01 |
20150278517 | METHOD AND SYSTEM FOR COMPARING DIFFERENT VERSIONS OF A CLOUD BASED APPLICATION IN A PRODUCTION ENVIRONMENT USING SEGREGATED BACKEND SYSTEMS - An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment. | 2015-10-01 |
20150278518 | SYSTEMS AND METHODS FOR IDENTIFYING A SOURCE OF A SUSPECT EVENT - A computer-implemented method for identifying a source of a suspect event is described. In one embodiment, system events may be registered in a database. A suspicious event associated with a first process may be detected and the first process may be identified as being one of a plurality of potential puppet processes. The registered system events in the database may be queried to identify a second process, where the second process is detected as launching the first process. | 2015-10-01 |
20150278519 | Computer Devices and Security Management Device Communicationally-Connected to the Same - A mechanism is provided for executing an action selected by a security management device identified from an available-action list provided by the computer device. A management program module in the computer device identifies a set of actions capable of being performed on the computer device based on a state of the computer device. The management program module stores the available-action list indicative of at least one action the management program module is allowed to execute on the computer device. The management program module sends the available-action list to the security management device for a security analysis to be performed such that an action is selected from the available-action list to be executed on the computer device. Responsive to receiving the selected action from the security management device, the management program module executes the selected action on the computer device. | 2015-10-01 |
20150278520 | SYSTEM AND METHOD FOR INTEGRITY ASSURANCE OF PARTIAL DATA - A system is disclosed for assuring the integrity of file segments. A first server has an associated file repository storing a plurality of files and transfers a file segment on an output upon request. A second server also has an associated file repository and receives and stores the file segment in the associated file repository. The second server identifies if there are additional segments of the same file in the associated file repository and processes the received file segment together with the additional identified file segments to identify the presence of malware. Finally, the second server transfers the received file segment on an output as a scanned file segment only if no malware is identified. A third server has an associated file repository and is configured to receive and store the scanned file segments in the associated file repository and to transfer a received scanned file segment to a client. | 2015-10-01 |
20150278521 | DETECTING MALWARE-RELATED ACTIVITY ON A COMPUTER - Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a process, where the process is an instance of a computer software application that resides in a computer memory and that is executed by a computer, and where the data object is configured to persist after termination of the process, determining a string that identifies the data object, searching for a portion of the string that identifies the data object within any areas of the computer memory storing static portions of the computer software application, and performing a computer-security-related remediation action responsive to determining that the portion of the string that identifies the data object is absent from the searched areas of the computer memory. | 2015-10-01 |
20150278522 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 2015-10-01 |
20150278523 | METHOD AND SYSTEM FOR TESTING CLOUD BASED APPLICATIONS AND SERVICES IN A PRODUCTION ENVIRONMENT USING SEGREGATED BACKEND SYSTEMS - An application is implemented in the production environment in which the application will be used. Two or more backend systems are provided. Actual user data is received. The actual user data is routed and processed in the production environment using a first backend system of the two or more backend systems. Fabricated user data is generated, routed, and also processed in the production environment but using a second backend system of the two or more backend systems. Results data from the processing of the fabricated user data is then analyzed to evaluate the production environment and/or operation of the application in the production environment. | 2015-10-01 |
20150278524 | System and Method for Secure Information Handling System Flash Memory Access - Firmware updates at an information handling system flash memory device, such as provisioning information stored on a USB device, are securely performed by using a buffer memory and a secured code. An application running on a CPU generates a firmware update and a security code, such as a ciphered hash code based on the firmware update, stores the firmware update and security code in a buffer, and informs a management processor of the update. The management processor analyzes the firmware update to authorize copying of the update from the buffer to the flash memory device. For instance, the management processor creates the security code from the firmware update and compares the created code with the security code stored in the buffer to validate the firmware update. | 2015-10-01 |
20150278525 | SYSTEMS AND METHODS FOR COMMAND-BASED ENTRY INTO BASIC INPUT/OUTPUT SYSTEM SETUP FROM OPERATING SYSTEM - In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system. | 2015-10-01 |
20150278526 | COMPUTERIZED SYSTEMS AND METHODS FOR PRESENTING SECURITY DEFECTS - Systems, methods, and computer-readable media for presenting and mitigating security defects in a systems development process. An example method is provided. The method comprises receiving a set of security defects, each of which may be associated with a severity level and a development stage. The method further comprises applying at least one rule to one of the received security defects to determine whether a risk associated with the at least one defects is reduced. Each rule may be associated with a weight representative of the probability that the rule correctly predicts that the risk is reduced. The method further comprises determining which of the rules applied to the at least one defect and appropriately modifying the associated severity level. The method further comprises presenting the received security defects, based on the severity level associated with each defect and the weight associated with a rule applied to each defect. Systems and computer-readable media are also provided. | 2015-10-01 |
20150278527 | Self-Test of a Physical Unclonable Function - The invention relates to a circuit unit ( | 2015-10-01 |
20150278528 | OBJECT ORIENTED MARSHALING SCHEME FOR CALLS TO A SECURE REGION - A system is disclosed and includes a processor to automatically execute enclave initialization code within a host application at run time of the host application. The enclave initialization code includes marshaling code to create a secure enclave separate from the host application. The marshaling code is generated at build time of the host application. The system also includes a dynamic random access memory (DRAM) including a dedicated DRAM portion to store the secure enclave. Other embodiments are described and claimed. | 2015-10-01 |
20150278529 | DISPLAYING METHOD OF ELECTRONIC DEVICE AND ELECTRONIC DEVICE THEREOF - A displaying method of an electronic device and an electronic device are provided. The electronic device may detect opening or closing of a cover, determine whether the cover is partially opened by measuring the degree of opening of the cover when opening of the cover is detected, and display a partial screen at a specified position in the screen when the degree of opening is determined to be partial opening. In addition, thereto, other embodiments may be included. | 2015-10-01 |
20150278530 | METHOD AND APPARATUS FOR STORING REDEEM CODE, AND METHOD AND APPARATUS FOR VERIFYING REDEEM CODE - Implementation manners of the present disclosure provide a method and an apparatus for storing a redeem code and a method and an apparatus for verifying a redeem code. The method for storing a redeem code includes: generating a random value, and determining an index of the random value according to an order in which the random value is generated; generating a number pair according to the random value and the index of the random value, mapping the number pair to a string, and generating a redeem code according to the string; and determining a storage location of the random value according to the index of the random value, and saving the random value at the determined storage location. | 2015-10-01 |
20150278531 | METHODS AND APPARATUS TO SECURELY SHARE DATA - Methods and apparatus to securely share data are disclosed. An example includes generating, at a first device of a first user of cloud services, an archive file representative of a drive of the first device; encrypting, via a processor, the archive file to form an encrypted archive file; and conveying the encrypted archive file to a cloud service provider, the encrypted archive file to be decrypted by a second device of a second user of the cloud services, the decrypted archive file to be mounted to an operating system of the second device. | 2015-10-01 |
20150278532 | INFORMATION PROCESSOR - Disclosed herein is an information processor that allows for manipulation of raw data to a certain extent with an application program while protecting the content of raw data. The information processor acquires encrypted media data, decodes the encrypted media data to generate raw data, scrambles the raw data to generate scrambled data, descrambles the scrambled data to generate the raw data, and outputs the raw data to a player. | 2015-10-01 |
20150278533 | METHOD FOR REDIRECTING OF KERNEL DATA PATH FOR CONTROLLING RECORDING OF MEDIA - A method of preventing unauthorized recording of electronic media according to one embodiment is described. The method comprises activating a compliance mechanism in response to a client system receiving media content. The compliance mechanism is coupled to the client system. The client system has a media content presentation application operable thereon and is coupled to the compliance mechanism. The method further comprises controlling a data path of a kernel-mode media device driver of the client system with the compliance mechanism upon detection of a kernel streaming mechanism operable on the client system. The present method further comprises directing the media content from the kernel-mode media•device driver to a media device driver coupled with the compliance mechanism, via the data path, for selectively restricting output of the media content. | 2015-10-01 |
20150278534 | ELECTRONIC COMMUNICATION WITH SECURE SCREEN SHARING OF SENSITIVE INFORMATION - A customer support application provides screen sharing of the user's computing device with a remote customer support agent, thereby enabling the customer support agent to view the content displayed on the user's device. Sensitive information that is displayed on a user's computing device is obfuscated from the computing device of the remote customer support agent, and a notification of that obfuscation is displayed on the user's computing device. Information can be determined to be sensitive based on a sensitive indicator tag or a heuristic. | 2015-10-01 |
20150278535 | METHODS, SYSTEMS, AND DEVICES FOR OBSCURING ENTITIES DEPICTED IN CAPTURED IMAGES - Computationally implemented methods and systems include acquiring an image that includes a depiction of a feature of one or more entities, attaining identification of a particular entity of the one or more entities for which the depiction of the feature is present in the image, and obtaining relationship data that indicates whether the particular entity has a relationship with a device that facilitated acquisition of the image. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2015-10-01 |
20150278536 | APPARATUS AND METHOD FOR CONTINUOUS DATA PROTECTION IN A DISTRIBUTED COMPUTING NETWORK - A system for secure data storage and transmission is provided. The system comprises a first security module for protecting data in a first data at rest system and a second security module for protecting data in a second data at rest system. At least one encryption parameter for the second data at rest system differs from at least one encryption parameter for the first data at rest system so that a datum is reencrypted when the datum is transferred from the first data at rest system to the second data at rest system. | 2015-10-01 |
20150278537 | Automated Attended Self-Service Terminal (SST) Operations - A security level for an attendant at a Self-Service Terminal (SST) is automatically resolved. An operation is automatically processed on behalf of the attendant based on the resolved security level and a condition associated with the SST. | 2015-10-01 |
20150278538 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR LOCATING NETWORK FILES - A system, method, and computer program product for accessing web pages on a network are provided. In use, different users are provided access to a plurality of sections of a file selected by the different users based on a community value for at least one community dimension assigned to each section of the file selected by the different users. In particular, a user is conditionally provided access to a section of a file selected by the user, based on a comparison of a user value indicating a community with which the user is associated to the community value for the at least one community dimension assigned to the section of the file selected by the user. | 2015-10-01 |
20150278539 | LOCATION-BASED DATA SECURITY SYSTEM - An apparatus for protecting data stored within a storage device from being accessed outside of previously defined geographic areas can comprise a storage module for storing data within a storage device. The apparatus can also comprise a location module for detecting a geographic location of the storage device. The device can further comprise a processing module for determining whether a detected geographic location is within a previously defined geographic area. Further still, the apparatus can comprise a first data security module in communication with the processing module. The first data security module can be configured to allow access to data stored within the storage module when the processing module determines that the detected geographic location is within the previously defined geographic area. | 2015-10-01 |
20150278540 | JOURNALING SYSTEM WITH SEGREGATED DATA ACCESS - A journaling system provides access to subsets of user information in a segregated fashion. This permits its users to define access settings for their user information thereby limiting which other users may access the user information. In one or more embodiments, the journaling system may include a server or other computing device and one or more storage devices used to store the user information, associated access settings, or both. The access settings may define particular criteria which must be met before a subset of user information may be accessed, and may identify particular users that may access the subset of user information. | 2015-10-01 |
20150278541 | MULTI-IDENTITY GRAPHICAL USER INTERFACE FOR SECURE FILE SHARING - In the approaches described herein, a data file storage service may control access to file system objects using corresponding “personal” or organization-related “work” identity information which may include encryption keys or passwords. To assist the user with identifying respective file system objects, the user is presented with a corresponding graphical user interface (GUI) which displays a corresponding personal or work identity icon next to a visual rendering of the file system objects. Keys that control access to work identity files and folders are purged from a local key store as soon as user authorization changes are detected. In this way, even a user who originated a data file will not be able to decrypt files stored in a folder shared using a work identity once that identity is canceled by the organization, while at the same time, the user's access to their personal files may continue. | 2015-10-01 |
20150278542 | DATABASE ACCESS CONTROL - A method for database access control includes receiving an access request from a requesting user, the access request identifying one or more data entries stored in a base table storing a plurality a data entries each associated with a data category. The identified one or more data entries from the base table are retrieved and a security table including one or more data categories to which the requesting user is authorized to access is generated based on an identity of the requesting user. The data entries associated with a data category included in the security table are outputted as a result table. | 2015-10-01 |
20150278543 | System and Method for Optimizing Storage of File System Access Control Lists - Embodiments are provided for improving storage of file ACLs. A plurality of ACLs are assigned corresponding unique ACL IDs and are stored in an indexed list. The indices of the ACLs in the list are mapped to the ACL IDs, which have a fixed defined size. The ACL ID for a given ACL is stored in a file or directory metadata structure. The ACL ID is then used to obtain the stored ACL, to determine for a user, access permission to the file or directory. The ACLs are stored once in the file system and their ACL IDs are duplicated, instead of the ACLs, in files as needed. Duplicating the ACL IDs instead of the ACLs in the files preserves storage space. Further, duplicating the ACL IDs instead of the ACLs in the files reduces the files sizes, which further improves file system efficiencies. | 2015-10-01 |
20150278544 | METHOD AND COMPUTER PROGRAM PRODUCT FOR ORDER PRESERVING SYMBOL BASED ENCRYPTION - Techniques for sorting encrypted data within a software as a service (SaaS) environment. Data is encrypted on a per symbol basis with a symbol based encryption module. Sort and search functionality preserving encryption that allows other modules to sort tokens and to search for tokens is provided. Encrypted tokens that have been encrypted by the symbol based encryption module are stored in a database. Access to the encrypted tokens is provided through the SaaS environment. | 2015-10-01 |
20150278545 | ANONYMIZATION OF CLIENT DATA - The present disclosure discloses a method and network device for providing anonymization of client data in a wireless local area network. Specifically, a network device adds a first client device identifier containing private personal data (e.g., a Media Access Control (MAC) address and/or an Internet Protocol (IP) address) into a large data file, and sends at least a portion of the large data file as input to a one-way hash function to generate a second client device identifier for the client device. The network device then provides to a third party client context information with the second client device identifier without providing the first client device identifier. No private personal data can be derived from the second client device identifier. Thus, the disclosed system protects wireless clients' privacy while facilitating analytics of client data by an external third party. | 2015-10-01 |
20150278546 | INFORMATION DISCLOSURE SYSTEM, INFORMATION DISCLOSURE SERVER, COMMUNICATION TERMINAL, INFORMATION DISCLOSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - An information disclosure system includes: an information disclosing unit; a setting unit; a history storage unit; and an interaction frequency calculating unit. The information disclosing unit discloses at least part of user's information as disclosure information to a communicating party. The setting unit sets a disclosure range for disclosing the user's information as the disclosure information. The history storage unit stores a history of communication between the user and the communicating party. The interaction frequency calculating unit calculates an interaction frequency between the user and the communicating party based on the history of the communication. The setting unit sets the disclosure range based on the interaction frequency calculated by the interaction frequency calculating unit. | 2015-10-01 |
20150278547 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - There is provided an information processing apparatus including a first computation protocol generation unit configured to generate a first computation protocol that does not include a confidentiality securing protocol that is executed in order to maintain confidentiality of a plurality of input values on the basis of a secure computation protocol in which a plurality of operation processing apparatuses compute an output value on the basis of the input values, and a second computation protocol generation unit configured to generate a second computation protocol by arranging the confidentiality securing protocol to a position at which the confidentiality is secured in the first computation protocol. | 2015-10-01 |
20150278548 | NFC-BASED AUTHORIZATION OF ACCESS TO DATA FROM A THIRD PARTY DEVICE - There is described a method of authorizing a third party device to access data associated with a user account at a service provider, wherein the third party device and a user device are in data communication with the service provider, and wherein the third party device and the user device are both NFC-enabled. The method comprises (a) obtaining a request token generated by the service provider, (b) transmitting (6) the request token from the third party device to the user device via NFC, (c) authorizing the request token at the user device, (d) transmitting ( | 2015-10-01 |
20150278549 | Anonymization of Streaming Data - Techniques are provided for anonymizing streamed data. In various embodiments data are anonymized by receiving a data element (p | 2015-10-01 |
20150278550 | PRIVACY LEAKAGE PROTECTION - A client device securely transfers personal information to a third-party website. The client device stores personal information of a user and encrypts personal information requested by the third-party website, so that the third-party website can decrypt and retrieve the personal information, and so that a remote proxy server facilitating the transfer of personal information from the client device to the third-party website cannot read the encrypted personal information and has no access to unencrypted personal information. | 2015-10-01 |
20150278551 | PHYSICALLY UNCLONABLE FUSE USING A NOR TYPE MEMORY ARRAY - A method for identifying an unclonable chip uses hardware intrinsic keys and authentication responses employing intrinsic parameters of memory cells invariant and unique to the unclonable chip, wherein intrinsic parameters that characterize the chip can extend over its lifetime. The memory cells having a charge-trap behavior are arranged in an NOR type memory array, allowing to create a physically unclonable fuse (PUF) generation using non-programmed memory cells, while stringing non-volatile bits in programmed memory cells. The non-volatile memory cell bits are used for error-correction-code (ECC) for the generated PUF. The invention can further include a public identification using non-volatile bits, allowing hand shaking authentication using computer with dynamic challenge. | 2015-10-01 |
20150278552 | INFORMATION HANDLING OF ACCESS SECURITY - A method of effectuating access security includes sending authentication data with a specific lifetime from a mobile device to an information handling system. The information handling system includes a controller and a housing. The housing includes a chassis and a latch component, with the controller electrically coupled to the latch component. The method includes determining by the controller in accordance with the authentication data whether the mobile device is authorized to activate the latch component and activating the latch component by the controller to lock or unlock the housing in response to a determination that the mobile device is authorized to activate the latch component. | 2015-10-01 |
20150278553 | DATA DECRYPTION DEVICE, ATTRIBUTE-BASED ENCRYPTION SYSTEM, RANDOM NUMBER ELEMENT REMOVING DEVICE, RANDOMIZED SECRET KEY GENERATION DEVICE, DATA DECRYPTION METHOD, AND DATA DECRYPTION PROGRAM - A device and method enhancing security of encrypted data by dividing a decrypting process of an attribute-based encryption scheme into plural stages. A KEM key partly decrypting part generates an r-KEM key mask value including a random number element, by performing a decrypting process for an encrypted KEM key being a common key encrypted using an attribute conditional expression, using an r-user secret key obtained by including the random number element into a user secret key generated in accordance with the attribute-based encryption scheme. A random number element removal requesting part requests an IC card to remove the random number element from the r-KEM key mask value, and acquires a KEM key mask value from the IC card. A mask removing part generates a KEM key using the KEM key mask value. A data decrypting part decrypts an encrypted data main body into target data using the KEM key. | 2015-10-01 |
20150278554 | ENCRYPTION DEVICE OF A SUBSTITUTION-BOX TYPE, AND CORRESPONDING ENCRYPTION METHOD AND COMPUTER PROGRAM PRODUCT - A device of the Substitution-Box (S-Box) type, which is suitable for operating in a symmetric-key encryption apparatus, in particular an AES (Advanced Encryption Standard) encryption apparatus, and includes at least one module configured for carrying out a non-linear operation in a finite field (GF(2 | 2015-10-01 |
20150278555 | METHOD FOR PERFORMING AN ENCRYPTION WITH LOOK-UP TABLES, AND CORRESPONDING ENCRYPTION APPARATUS AND COMPUTER PROGRAM PRODUCT - An encryption method includes accessing a look-up table (LUT) to implement countermeasures against side-channel attacks, such as embedding masks. The LUT is initialized by writing initialization values in the LUT by applying an address-mask to input data that identify a location of said LUT and a data-mask to data to be stored at a location of the LUT. The method includes carrying out an initialization of the LUT that includes providing at least one second address-mask and one second data-mask; and computing corresponding initialization values as a function of a logic combination of the aforesaid first address-mask and second address-mask and of a logic combination of the aforesaid first data-mask and second data-mask. In the resulting table the address data are masked only by the second address-mask and the data are masked only by the second data-mask. The structure of the LUT may allow convenient implementation by initializing all the values of the LUT in parallel in one cycle. | 2015-10-01 |
20150278556 | CENTRALIZED SECURITY FOR A COMPUTING DEVICE - A security procedure may be triggered in response to a detected activation event to release a lock securing a computing device, initiate the security procedure responsive to the activation event, enable a secure computing mode on the computing device, request authentication data, verify the authentication data and send a command to release the lock responsive to verification of the authentication data. | 2015-10-01 |
20150278557 | SETTLEMENT TERMINAL DEVICE - Provided is a settlement terminal device including a housing that includes a first face which has an operation display face, a second face which is disposed on an opposite side to the operation display face, and a step portion which is formed on one end side of the second face so as to be substantially parallel to an edge side of the one end side. A length of the housing in a thickness direction on the one end side adjacent to the step portion is larger than a length of the housing in the thickness direction which is located closer to the other end side than the step portion. An insecure region that does not have tamper resistance is formed on one end side of the housing. A secure region that has tamper resistance is formed on the other end side of the housing. | 2015-10-01 |
20150278558 | Methods, Systems and Apparatus to Secure Devices Via Physical and/or Virtual Locking - Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to determine when the device is within a threshold proximity to a platform, a device locking manager to initiate a locking service for the device when within the threshold proximity, and a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering. | 2015-10-01 |
20150278559 | CARD CONTACT-MAKING APPARATUS - The invention relates to a card contact-making apparatus for a card, wherein the card contact-making apparatus has a flat contact carrier support with side edges and also has a flexible contact carrier, and wherein the contact carrier support forms several holding means which project through recesses in the contact carrier in order to mechanically connect the flexible contact carrier to the contact carrier support. | 2015-10-01 |
20150278560 | Apparatus for Transmission of Signals from a Metal Housing - An apparatus for transmission of signals from a housing formed at least partially of metal for identification with the assistance electromagnetic waves (RFID), comprising at least a first housing opening, and a coil arrangement arranged in the housing for producing a magnetic field, wherein the magnetic flux density, which enters or leaves the coil arrangement has a vector ( | 2015-10-01 |
20150278561 | COEXISTENCE OF RF BARCODES AND OTHER NFC DEVICES - An NFC-enabled device ( | 2015-10-01 |
20150278562 | ONE-TOUCH INPUT INTERFACE - Some demonstrative embodiments include a one-touch input interface. For example, a one-touch input interface may include a hybrid Body-Area-Network (BAN) Near-Field-Communication (NFC) module to receive NFC information from a NFC device via a body of a user; and a fingerprint sensor to sense a fingerprint of the user, wherein the hybrid BAN NFC module and the fingerprint sensor are to receive the NFC information and to sense the fingerprint during a touch of the one-touch interface by the user. | 2015-10-01 |
20150278563 | LOCALLY-POWERED, POLARIZATION-INSENSITIVE ANTENNA FOR RFID READER, AND RFID SYSTEM FOR, AND METHOD OF, SCANNING ITEM TAGS WITH ONE OR MORE SUCH ANTENNAS - A reader antenna for a radio frequency (RF) identification (RFID) reader operative for scanning RFID item tags that are oriented at different orientations and that are associated with items contained in a controlled area, includes a pair of mutually orthogonal dipoles for radiating electromagnetic waves with mutually orthogonal polarizations, an electrically energizable RF switch for switching between the dipoles, and an RFID antenna tag mounted adjacent the dipoles, and operative for receiving the radiated wave from either dipole, for locally generating electrical power to supply power to the RF switch, and for energizing the RF switch to switch between the dipoles. | 2015-10-01 |
20150278564 | PRINTING SYSTEM, INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM - An information processing apparatus on which a non-contact IC tag can be mounted transmits information to a terminal apparatus when a state of the information processing apparatus changes. The information is the changed information which should be written to the non-contact IC tag. | 2015-10-01 |
20150278565 | SYSTEM FOR AND METHOD OF RAPIDLY DETERMINING TRUE BEARINGS OF RADIO FREQUENCY IDENTIFICATION (RFID) TAGS ASSOCIATED WITH ITEMS IN A CONTROLLED AREA - An RFID tag reading system and method accurately and rapidly determine true bearings of RFID tags associated with items in a controlled area. An RFID reader has an array of antenna elements and a plurality of RF transceivers. A controller controls the transceivers by steering a primary transmit beam over the controlled area to each tag, by steering a primary receive beam at a primary steering angle from each tag, by steering a plurality of secondary receive beams at different secondary steering angles that are offset from the primary steering angle by receiving secondary receive signals from each tag, and by processing the secondary receive signals to determine a true bearing for each tag. Bidirectional communication between the reader and a tag is conducted over a single inventory round in which the tag is read a plurality of times by the primary and the secondary receive beams. | 2015-10-01 |
20150278566 | IMAGING BARCODE SCANNER WITH MULTIPLE INDEPENDENT FIELDS OF VIEW - A barcode scanner which uses different wavelengths of light to produce different fields of view. An example barcode scanner includes a plurality of light devices each having a different wavelength of light and each associated with a different field of view for illuminating an item with a barcode, a plurality of waveband mirrors each reflecting one of the different wavelengths of light from the light devices and transmitting other wavelengths of light, an imager for receiving the different wavelengths of light reflected from the waveband mirrors and for producing corresponding images, and a controller configured to sequentially activate the light devices and the imager and to decode the barcode in an at least one of the images received from the imager. | 2015-10-01 |
20150278567 | OPTICAL LENS FOR USING IN ILLUMINATION SYSTEM OF IMAGING SCANNER - An imaging scanner includes an illumination light source and a hybrid illumination lens. The hybrid illumination lens includes a first Fresnel surface facing the illumination light source and a second surface having a microlens array thereon. The first Fresnel surface is configured to direct light received from the illumination light source towards the second surface to generate illumination light towards a target object through the microlens array on the second surface. | 2015-10-01 |
20150278568 | BARCODE READER, BARCODE READING METHOD, AND BARCODE READING PROGRAM - There is provided a barcode reader that decode of a barcode is possible with easy processes even in a case where reflectivity around the barcode is higher than reflectivity at bright portions of the barcode. The barcode reader comprises: an edge deleter configured to delete the position information and polarity information on an unnecessary edge which arises due to a difference between a strength of a reflected light from a quiet zone of the barcode and a strength of a reflected light from an adjacent portion of the quiet zone, wherein, on detecting two successive edges which have the same polarity, the edge deleter determines an edge which is closer to an end portion of a scan as the unnecessary edge and deletes the position information and polarity information on the unnecessary edge. | 2015-10-01 |
20150278569 | DECODING INDICIA WITH POLARIZED IMAGING - A method of decoding one or more barcodes on a target object with an imaging scanner is described. The imaging scanner comprises an image sensor and a dynamic linear polarizer. The method includes the following: (1) capturing at least one image of the target object through the dynamic linear polarizer with the imaging sensor while the dynamic linear polarizer is set to a different defined polarization during each of N time periods; and (2) processing at least N images of the target object to decode the one or more barcodes on the target object. At least one image that is captured during each of the N time periods. Here, N is an integer that can be three, four, five, six, or other natural numbers. | 2015-10-01 |
20150278570 | HAND-MOUNTED INDICIA-READING DEVICE WITH FINGER MOTION TRIGGERING - A wearable indicia reader is worn on the back of a user's hand such that the act of pointing the user's index finger is sufficient to align the indicia reader and trigger the indicia-reading process. Triggering is achieved by sensing the user's finger in an image or by breaking a light path in a photogate. | 2015-10-01 |
20150278571 | METHOD AND SYSTEM FOR DETECTING 2D BARCODE IN A CIRCULAR LABEL - The present disclosure relates to a method and system for identifying and reading a barcode on a circular label. Such method and system, in the embodiment discussed, is concretely addressed to a specific example in the engineering of a barcode reader in an electromechanical system for biological analyses which uses cone-shaped tubes and corresponding strips of fluid containers. It is a requirement of the system that the right cone matches with the right strip. In order to avoid any human error, barcode reading system is implemented, by placing a barcode (e.g. a 2D barcode) on the cone-shaped tube and a barcode on the strip: however the particular shape of the cone poses some problems in the automatic localization and reading of the barcode on the circular label on top of the cone. An additional difficulty of the present system is that of the inclination of barcode reader with respect to the circular label carrying the code, due to the relative positioning of the various components of the machine which does not allow a straight alignment between the reader and the target. With the method according to a preferred embodiment of the present disclosure the circular label is scanned to detect the 2D barcode and it is then read, with a simplified algorithm requiring limited power and hardware resources. | 2015-10-01 |
20150278572 | INFORMATION PROCESSING DEVICE, PROGRAM, AND INFORMATION PROCESSING METHOD - There is provided an apparatus including an imaging unit configured to capture a current image including an information code, the information code being arranged at an arrangement position corresponding to a location within the captured current image, and a control unit configured to determine a difference between a predetermined position and the arrangement position, wherein, when the determined difference is greater than a predetermined threshold, a notification is output to a user, based on the determined difference, to notify of the difference as a guide for adjusting a capturing position of the current image to thereby move the information code to a new arrangement position corresponding to a location of the predetermined position. | 2015-10-01 |
20150278573 | METHOD OF RECOGNIZING QR CODE IN IMAGE DATA AND APPARATUS AND METHOD FOR CONVERTING QR CODE IN CONTENT DATA INTO TOUCHABLE OBJECT - Provided are a method of recognizing a quick response (QR) code in image data, and an apparatus and method for converting a QR code in content data into a touchable object. The method of converting a QR code in content data into a touchable object includes a step in which a computer device receives content data including a QR code, a step in which the computer device recognizes the QR code in the content data, and a step in which the computer device converts an image in which the QR code is shown into a touchable object for executing a command included in the QR code. The converting step includes interpreting, at the computer device, the command included in the recognized QR code, and modifying, at the computer device, a code of the content data to convert the image into the touchable object for executing the command. | 2015-10-01 |
20150278574 | Processing a Fingerprint for Fingerprint Matching - Processing a fingerprint can include determining one or more optimal weights based on ridge flow angles or ridge flow angle differences. Determination of the optimal weight(s) can be based on predicting a ridge flow angle for each cell in a ridge flow map using one or more neighboring cells. The optimal weights may be estimated so as to minimize error between the predicted and actual ridge flow angles. Alternatively, the optimal weight(s) may be determined using a predicted ridge flow angle difference for each cell in a difference map that is based on an actual ridge flow angle difference for one or more neighboring cells. The optimal weights can be estimated to minimize the error between predicted and actual angle differences. Additionally, a correlation penalty may be determined based on an extent of spatial correlation in the ridge flow angle differences in the difference map. | 2015-10-01 |
20150278575 | BIO-IMAGING METHOD - A method for defining an isolation area around an object of interest in a cell culture vessel, the method comprising the steps of: obtaining one or more images of the cell culture vessel using one or more of a plurality of illumination sources, each illumination source being capable of illuminating the vessel from a different direction; selecting an image or combination of images for further processing; applying a circular object detection transformation to identify one or more objects of interest being substantially circular objects in the cell culture vessel, which circular objects of interest are representative of isolated colonies in the cell culture vessel and determining the center of an object of interest; applying a binarizing step to obtain a binarized image of the object of interest and other objects, wherein the center of the binarized image corresponds to the center of the object of interest; iteratively forming concentric circles with increasing radius, wherein the concentric circles are centered on the center of the binarized image; identifying coronas, wherein a corona is delimited by two circles having successive radius values; for each corona: determining the presence and the location of any other object located in the corona to determine the presence and the location of other objects; determining a clearance angle defining an angular sector free of other objects around the object of interest to define the isolation area around the object of interest. | 2015-10-01 |
20150278576 | COMPUTATIONAL ARRAY CAMERA WITH DYNAMIC ILLUMINATION FOR EYE TRACKING - Methods and systems for eye tracking are disclosed. One such method obtains a plurality of images of the eye from an array camera and detects glint positions and a pupil edge of the eye in the plurality of the images. A distance from the array camera to the pupil edge may be estimated based on the glint positions. A pupil image may be generated based on selected ones of the plurality of images, the glint positions, and the estimated distance to the pupil edge. A pupil center position may be determined based on the pupil image and the glint positions. | 2015-10-01 |
20150278577 | FINGERPRINT IDENTIFYING METHOD AND ELECTRONIC DEVICE THEREOF - A method of operating an electronic device is provided. The method includes detecting a plurality of fingerprint drags after a touch on a portion of the electronic device, wherein each of the plurality of fingerprint drags is a consecutive drag from a previous drag and each of the plurality of fingerprint drags has a different orientation from each other; and identifying a fingerprint based on a plurality of images acquired from the plurality of fingerprint drags, wherein each of the plurality of images is compared with corresponding portion of a reference image. | 2015-10-01 |
20150278578 | Object Detection Device and Object Detection Method - To provide an object detection device and an object detection method in which incorrect grouping based on a range image can be prevented, processing is implemented including: generating a range image based on a pair of gray-scaled images (S | 2015-10-01 |
20150278579 | USING A PROBABILISTIC MODEL FOR DETECTING AN OBJECT IN VISUAL DATA - A probabilistic model is provided based on an output of a matching procedure that matches a particular object to representations of objects, where the probabilistic model relates a probability of an object being present to a number of matching features. The probabilistic model is used for detecting whether a particular object is present in received visual data. | 2015-10-01 |
20150278580 | IMAGE RECOGNIZING APPARATUS AND METHOD - An image recognizing apparatus comprises: an extracting unit extracting a partial feature quantity from an object in each of a registration image and an input image; a compressing unit reducing a dimension of the extracted partial feature quantity; a storing unit storing the partial feature quantity of the object in the registration image of which the dimension has been reduced; and a calculating unit calculating similarity between the object in the input image and the object in the registration image, using the partial feature quantity of the object in the input image of which the dimension has been reduced and the partial feature quantity of the object in the stored registration image. The compressing unit switches the reduction of the dimension of the partial feature quantity using a preset dimension compression parameter and the reduction of the dimension of the partial feature quantity by dynamically generating a dimension compression parameter. | 2015-10-01 |
20150278581 | CENTRAL PERSON DETERMINING SYSTEM, INFORMATION TERMINAL USED IN THE SAME, CENTRAL PERSON DETERMINING METHOD, AND RECORDING MEDIUM FOR CENTRAL PERSON DETERMINING PROGRAM - A central person determining system includes an information terminal having a plurality of image data; and a server; wherein the information terminal performs face detection processing and generates a face detection result for each of a plurality of images based on the plurality of image data, generates a plurality of face image data by cropping, on the basis of the face detection result, a face image from the plurality of images based on the plurality of image data, and transmits the plurality of face image data to the server; and wherein the server performs central person determining processing on the basis of the plurality of face image data acquired from the information terminal, generates the central person determining result, and transmits the central person determining result to the information terminal. | 2015-10-01 |
20150278582 | Image Processor Comprising Face Recognition System with Face Recognition Based on Two-Dimensional Grid Transform - An image processing system comprises an image processor having image processing circuitry and an associated memory. The image processor is configured to implement a face recognition system utilizing the image processing circuitry and the memory, the face recognition system comprising a face recognition module. The face recognition module is configured to identify a region of interest in each of two or more images, to extract a three-dimensional representation of a head from each of the identified regions of interest, to transform the three-dimensional representations of the head into respective two-dimensional grids, to apply temporal smoothing to the two-dimensional grids to obtain a smoothed two-dimensional grid, and to recognize a face based on a comparison of the smoothed two-dimensional grid and one or more face patterns. | 2015-10-01 |
20150278583 | INFORMATION PROCESSOR - Provided is an information processor which readily permits operation input to be made so as to point a position on a screen when an operation input is received from a user using a captured image obtained by imaging the user. The information processor acquires a captured image including a user's face, identifies the position of the user's face included in the acquired captured image, sets an operation area at a position on the captured image determined in accordance with the identified face position, detects a detection target within the operation area, and receives, as a user-pointed position, a position on the screen corresponding to a relative position of the detected detection target within the operation area. | 2015-10-01 |
20150278584 | OBJECT DISCRIMINATING APPARATUS AND METHOD - An object discriminating apparatus is provided with an obtaining unit configured to obtain an input image including an object; an extracting unit configured to extract a feature from the input image; a calculating unit configured to calculate, by collating the feature extracted from the input image and a feature of a previously registered registration image with each other, similarity between the object included in the input image and an object included in the registration image; a deriving unit configured to derive a difference between a variation in the input image and a variation in an output image; a converting unit configured to convert the calculated similarity on the basis of the derived difference between the variations; and a deciding unit configured to decide, on the basis of the converted similarity, whether or not the object included in the input image is identical with the object included in the registration image. | 2015-10-01 |
20150278585 | VIDEO PROCESSING SYSTEM FOR VIDEO SURVEILLANCE AND METHODS FOR USE THEREWITH - Aspects of the subject disclosure may include, for example, a system that includes a signal interface configured to receive a plurality of video signals from a corresponding plurality of video cameras. A surveillance processor is configured to process the plurality of video signals and to recognize at least one person in at least one of the plurality of video signals and an emotional state corresponding to the at least one person and that generates surveillance data corresponding to the at least one person, based on the emotional state corresponding to the at least one person. Other embodiments are disclosed. | 2015-10-01 |
20150278586 | SYSTEM AND METHOD FOR GUIDED CONTINUOUS BODY TRACKING FOR COMPLEX INTERACTION - A method, non-transitory computer readable medium and apparatus that provides feedback to a user for interacting continuously without any disconnect. It gives real time visual clues and gestures based on application need. This solves the problem of a disconnected user found in current system and applications as user will be continuously aware whether and how much he is being tracked by the application that will allow him to continuously interact with the application. The requirements from various applications like FBT (Full body Tracking), HBT (Half Body Tracking), LTO (Leg Tracking Only), HTO (Hand Tracking Only), STO (Specific Tracking only) is sent to the CFBTE (Continuous Full Body Tracking Engine). The CFBTE process the requirements and generates the visual clues and gesture events. In visual clues the tracking level/intensity is continuously displayed, which will guide the user on system readiness and effectiveness for interaction. | 2015-10-01 |
20150278587 | APPARATUS AND METHOD FOR CALCULATING ENERGY CONSUMPTION BASED ON THREE-DIMENSIONAL MOTION TRACKING - An apparatus and method calculate an energy consumption based on 3D motion tracking. The method includes setting at least one specific portion of an analysis target as a reference point, analyzing the reference point before and after the lapse of a predetermined time, and determining an energy consumption of the analysis target on the basis of the analyzed reference point. | 2015-10-01 |
20150278588 | PERSON COUNTING DEVICE, PERSON COUNTING SYSTEM, AND PERSON COUNTING METHOD - A person counting device is provided to count the number of persons passing through a counting area set in a monitoring area, and includes: a counting condition setter that sets a non-walkable area and the counting area; a traffic line acquirer that acquires a traffic line for each person; a passing-person counter that counts the number of persons passing through the counting area based on the traffic line; a traffic line determinator that determines whether or not the traffic line passes through the non-walkable area; a correction area selector that estimates the counting area existing on an avoidance route that does not pass through the non-walkable area based on the state of the traffic line, and selects the counting area as a correction target; and a passing-person counting corrector that corrects the number of passing persons with regard to the counting area selected as the correction target. | 2015-10-01 |
20150278589 | Image Processor with Static Hand Pose Recognition Utilizing Contour Triangulation and Flattening - An image processing system comprises an image processor having image processing circuitry and an associated memory. The image processor is configured to implement a gesture recognition system utilizing the image processing circuitry and the memory. The gesture recognition system implemented by the image processor comprises a static pose recognition module. The static pose recognition module is configured to identify a hand region of interest in at least one image, to determine a contour of the hand region of interest, to triangulate the determined contour, to flatten the triangulated contour, to compute one or more features of the flattened contour, and to recognize a static pose of the hand region of interest based at least in part on the one or more computed features. | 2015-10-01 |