45th week of 2019 patent applcation highlights part 48 |
Patent application number | Title | Published |
20190340357 | SECURE CONTROLLER OPERATION AND MALWARE PREVENTION - In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a kernel level security layer that includes a whitelist of permitted processes on the controller, the whitelist being part of a custom security policy for the controller; receiving, at the security layer, a request to run a particular process; determining, by the security layer, a signature for the particular process; identifying, by the security layer, a verified signature for the process from the whitelist; determining, by the security layer, whether the particular process is permitted to he run on the controller based on a comparison of the determined signature with the verified signature from the whitelist; and blocking, by the security layer, the particular process from running on the automotive controller based on the determined signature not matching the verified signature for the process. | 2019-11-07 |
20190340358 | DATA TRACKING IN USER SPACE - A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats. | 2019-11-07 |
20190340359 | MALWARE SCAN STATUS DETERMINATION FOR NETWORK-ATTACHED STORAGE SYSTEMS - Malware scan status determination for network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a data creation component that creates a scan status data structure associated with a network-attached storage (NAS) device, the scan status data structure comprising respective records that indicate a file identifier and a malware scan status for respective files stored on the NAS device, and a data update component that updates a record in the scan status data structure corresponding to a target file stored on the NAS device in response to receiving a malware scan result for the target file. | 2019-11-07 |
20190340360 | METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS TO VERIFY APPLICATION PERMISSION SAFETY - Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety. An example apparatus to identify unsafe permissions associated with a candidate app disclosed herein includes an app classifier interface to retrieve a cluster of apps associated with the candidate app, the candidate app including a requested permission set (RPS), a white knight (WK) identifier to identify a set of WK apps within the cluster, the set of WK apps associated with a designation of trust, a safe permission set (SPS) evaluator to generate an SPS list associated with the set of WK apps within the cluster, and an RPS identifier to determine whether permissions of the RPS are listed in the SPS list, the SPS evaluator further to designate first respective ones of the permissions of the RPS as safe when the first respective ones of the permissions are listed in the SPS list, and designate second respective ones of the permissions of the RPS as unsafe when the second respective ones of the permissions are absent from the SPS list. | 2019-11-07 |
20190340361 | BLOCKCHAIN STATE RELIABILITY DETERMINATION - Disclosed herein is a computer implemented method for receiving code distributed by a base station at a target device via a network, the distribution being made to one or more destination devices including the target device via one or more distribution servers arranged between the base station and the one or more devices on the network, wherein the base station maintains a first blockchain data structure storing one or more blocks and having a state determined by a most recently committed block in the first blockchain. | 2019-11-07 |
20190340362 | A METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER-TO-PEER DISTRIBUTED LEDGER - A computer-implemented method ( | 2019-11-07 |
20190340363 | METHOD FOR PROVIDING AN AUTHENTICATED UPDATE IN A DISTRIBUTED NETWORK - A method for providing an authenticated update in a distributed network is provided. The distributed network has a plurality of nodes coupled to a serial bus. The method begins with transmitting a credential from an external device to a first node. The update data and an authentication code are provided to a processor of a second node from the external device. The processor of the second node provides the update data and the authentication code to the transceiver of the second node. The authenticated update is finalized by the processor of the second node. The authenticated update is closed by the transceiver of the first node. The credential of the authenticated update is provided to the transceiver of the second node. The transceiver of the second node verifies the update data using the credential and the authentication code. After being verified, the authenticated update data is stored. | 2019-11-07 |
20190340364 | SECURE BIOS ATTRIBUTE SYSTEM - A secure Basic Input/Output System (BIOS) attribute system includes a secure server system coupled to a computing device through a network. The computing device receives a first BIOS attribute modification request, and authenticates the first BIOS attribute modification request using a first certificate that was previously stored in the computing device in response to validating the first certificate based on a key provided by the secure server system. In response to authenticating the first BIOS attribute modification request using the first certificate, the computing device modifies at least one BIOS attribute stored in the computing device. | 2019-11-07 |
20190340365 | SECURITY MODULE AUTHENTICATION SYSTEM - A security module authentication system includes a processing system that is configured to authenticate a security module based on a processing system type of the processing system. The system also includes a Basic Input/Output System (BIOS) coupled to the processing system and that includes a BIOS storage device. The BIOS storage stores a plurality of security modules each of which corresponds to a different processing system type. The BIOS is configured to utilize any of the plurality of security modules to perform a secure boot. The BIOS storage also stores an image table that identifies a first location in the BIOS storage of a first security module of the plurality of security modules. The first security module is authenticable by the processing system based on the processing system type of the processing system. | 2019-11-07 |
20190340366 | CYBERSECURITY BY I/O INFERRED FROM EXECUTION TRACES - A method can include for vulnerability analysis based on input or output points inferred from execution traces can include monitoring application access operations to a memory, monitoring responses from the memory to the access operations, generating execution traces based on the monitored access operations and responses, the execution traces including data identifying an instruction to be performed and a corresponding memory location to access in performing the operation, identifying and recording whether the instruction corresponds to an input or an output to the system based on the generated execution traces, and determining vulnerabilities of the application based on the generated execution traces and identification of the instruction corresponding to the input or output. | 2019-11-07 |
20190340368 | METHOD AND SYSTEM FOR TIME WINDOW ENCRYPTION TOKENIZATION OF DATA - A first raw value of a first field from the first set of fields is encrypted to generate a first token using a symmetric key encryption mechanism based on a first cryptographic key associated with a first time window after which the first cryptographic key is no longer valid for tokenization of raw fields of raw log records. After the first time window has elapsed, a second raw value of a second field from the second set of fields is encrypted to generate a second token using the symmetric key encryption mechanism based on a second cryptographic key that is different from the first cryptographic key. The second cryptographic key is associated with a third time window that occurs after the first time window and after which the second cryptographic key is no longer valid for tokenization of raw fields of raw log records. | 2019-11-07 |
20190340369 | SYSTEM AND METHOD FOR SECURING ELECTRONIC DOCUMENT EXECUTION AND AUTHENTICATION - The present embodiments provide an environment where a user first creates or imports a document comprising of fields to be completed by one or more users. All users who have view-only access or can act on a document are considered to be “in the workflow.” All users in the workflow (except view-only users) can take actions in the document by editing, adding or entering values or signatures in those fields. When the document is complete, a computing device adds an encrypted token visualization element to the document that uniquely identifies and secures the document. Thereafter, a copy of the original document, all attachments, authentication, security and validation information, and all other relevant information about the document and users will be available to view in the chain of custody and audit trail by the authorized users by scanning the token visualization element within the platform (web application or mobile application). | 2019-11-07 |
20190340370 | COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS - A content management system for collecting files from one or more authenticated submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions. | 2019-11-07 |
20190340371 | System And Method For Authenticating Computer Access - A system for authenticating computer access includes a local computer having a central processing unit (CPU) and having a memory device. An authentication switch is positioned on the local computer, the switch being in data communication with the CPU and storage unit. An authentication program stored in ROM is operable to detect when an input field in the form of a password box is open on the computer and to detect if the authentication interface is actuated. The authentication program is operable to receive a password input identifier from the input box only if the authentication interface on the computer is actuated while the input box is open. A file saved in RAM on the local computer may only be accessed when the authentication button is pressed at the same time a password authorizing access to the local computer is entered. | 2019-11-07 |
20190340372 | Methods for Restricting Read Access to Supply Chips - An example method for restricting read access to content in the component circuitry and securing data in the supply item is disclosed. The method identifies the status of a read command, and depending upon whether the status disabled or enabled, either blocks the accessing of encrypted data stored in the supply chip, or allows the accessing of the encrypted data stored in the supply chip. | 2019-11-07 |
20190340373 | CONTROL VIEWING ACCESS TO DOCUMENTS IN COLLABORATIVE SCENARIOS USING FACIAL RECOGNITION FROM WEBCAMS - A computing device includes a face detection module coupled to a webcam. The face detection module detects faces of viewers within a field of view of the webcam, provides images of the detected faces to a face identification service, and receives user IDs on the detected faces that have been identified. A document viewer module retrieves a document for display, with the document being retrieved based on a link to the document. A policy enforcement module receives the user IDs on the detected faces that have been identified, uses the link to the document to query metadata associated with the document to determine an access control list for the document, and compares the user IDs of the detected faces that have been identified to user IDs on the access control list to determine authorized viewers of the document. The policy enforcement module obscures display of the document if one of the identified faces is not authorized to view the document. | 2019-11-07 |
20190340374 | LOW LATENCY ACCESS TO PHYSICAL STORAGE LOCATIONS BY IMPLEMENTING MULTIPLE LEVELS OF METADATA - Systems for low-latency data access in distributed computing systems. A method embodiment commences upon generating a first storage area in local storage of a first computing node. Access to the first storage area is provided through the first computing node. A second storage area is generated wherein the second storage area comprises a first set of metadata that comprises local storage device locations of at least some of the local storage areas of the first storage area. A set of physical access locations of the second storage area is stored to a database that manages updates to the second set of metadata pertaining to the second storage area. Accesses to the first storage area are accomplished by querying the database retrieve a location of the second set of metadata, and then accessing the first storage area through one or more additional levels of metadata that are node-wise collocated. | 2019-11-07 |
20190340375 | System and Method of Operating an Information Handling System with a Management Controller - In one or more embodiments, one or more systems, method, and/or processes may receive information from each of multiple components of an information handling system; may associate the information from each of the multiple components with at least one category of multiple categories; may store the information from each of the multiple components; may receive authorization information that includes a digital certificate that indicates authorization to the at least one category; may determine that the authorization information provides access to the at least one category; and in response to determining that the authorization information provides access to the at least one category: may provide the information from at least one component associated with the at least one category to a user; and may provide communications between the at least one component and the user. | 2019-11-07 |
20190340376 | SYSTEMS AND METHODS FOR PROVIDING DATA LOSS PREVENTION VIA AN EMBEDDED BROWSER - Described embodiments provide systems and methods for providing data loss prevention via an embedded browser. An interprocess communication (IPC) manager may interface with an embedded browser to control the transfer of data from a first application to a second application in accordance with a policy. The IPC manager may detect a command to store data accessed on the first application via the embedded browser and store the data onto a secure container. The secure container may be dedicated to the embedded browser. The IPC manager may subsequently detect a command to retrieve data from the secure container and to replicate the data onto the second application. The IPC manager may determine a policy to apply to the data. The policy may specify whether the data from the first application is permitted to be replicated onto the second application. The IPC manager may subsequently replicate the data on the second application. | 2019-11-07 |
20190340377 | SYSTEM, METHOD, AND APPARATUS FOR DATA ACCESS IN A CLOUD COMPUTING ENVIRONMENT - A data access method in a cloud computing environment is disclosed. The method may comprise, in a service object space of the cloud computing environment, receiving a request of a user for accessing a data package, the request including a user identification, determining a service object space of the data package corresponding to the request, and providing the data package to the user according to the service object space of the data package and the user identification. | 2019-11-07 |
20190340378 | TAPE PROCESSING OFFLOAD TO OBJECT STORAGE - A computer-implemented method, according to one embodiment, includes: receiving a data volume having data from multiple tenants therein. Data in the data volume is separated into objects using tenant identifiers from metadata corresponding to portions of the data, where each object corresponds to a respective tenant. The objects are stored in object storage, and the metadata is updated with information pertaining to the object which the data in the data volume was separated into. Moreover, updating the metadata with the information is performed after the data in the data volume has been separated. Other systems, methods, and computer program products are described in additional embodiments. | 2019-11-07 |
20190340379 | IMMUTABLE BOOTLOADER AND FIRMWARE VALIDATOR - Provided is a process, including: accessing, with a processor of an embedded computing device, immutable executable code stored in read-only memory of the embedded computing device; executing, with the processor of the embedded computing device, instructions of the immutable executable code that retrieve, from the read-only memory, a network-layer address of a tamper-evident, immutable data repository and an application-layer address of firmware of the embedded computing device stored in the tamper-evident, immutable data repository; executing, with the processor of the embedded computing device, instructions of the immutable executable code that, using the network-layer address and the application-layer address, download the firmware of the embedded computing device from the tamper-evident, immutable data repository; and executing, with the processor of the embedded computing device, instructions of the immutable executable code that store the downloaded firmware in re-writeable memory of the embedded computing device. | 2019-11-07 |
20190340380 | Secure Intelligent Networked Architecture, Processing and Execution - Provided are exemplary systems and methods for secure intelligent networked architecture, processing and execution. Exemplary embodiments include an intelligent networked architecture comprising an intelligent agent, a secure cloud of a plurality of specialized intelligent historical agents, a plurality of secure cloud based specialized insight servers configured to transform secure digital data into a scrubbed situational deployment trigger, and an intelligent operational agent configured to receive the scrubbed situational deployment trigger. | 2019-11-07 |
20190340381 | Method and System for Search Pattern Oblivious Dynamic Symmetric Searchable Encryption - An oblivious encrypted search and update method includes transmitting encrypted search queries and encrypted file update requests from a trusted client to at least two different untrusted servers, receiving encrypted search entries and encrypted file entries from the untrusted servers, and decrypting the encrypted search entries and encrypted file entries with the trusted client. The trusted client re-encrypts the decrypted entries and transmits re-encrypted entries that were received from a first untrusted server to a second untrusted server and vice versa to provide obliviousness for encrypted keyword searches and encrypted file updates from the trusted client. | 2019-11-07 |
20190340382 | SYSTEM AND METHOD FOR IMPLEMENTING DOMAIN BASED ACCESS CONTROL ON QUERIES OF A SELF-DESCRIBING DATA SYSTEM - A method for implementing access controls for items of data belonging to a self-describing data structure including obtaining a query definition specifying a requested item of data in the self-describing data structure, determining domains associated with the requested item, the domains including a set of items within the self-describing data structure on an execution path of a query executed according to the query definition. For each respective domain associated with the requested item, the method includes determining subdomains associated with the requested item, determining a role of the user for the respective domain, the role is associated with a set of access permissions to items of data within the domain, and generating an output corresponding to whether access to the requested item is granted based on a policy for each of the subdomains associated with the requested item and the role of the user for the domain. | 2019-11-07 |
20190340383 | SYSTEM AND METHOD FOR IMPLEMENTING DOMAIN BASED ACCESS CONTROL ON QUERIES OF A SELF-DESCRIBING DATA SYSTEM - A method for implementing access controls for items of data belonging to a self-describing data structure including obtaining a query definition specifying a requested item of data in the self-describing data structure, determining domains associated with the requested item, the domains including a set of items within the self-describing data structure on an execution path of a query executed according to the query definition. For each respective domain associated with the requested item, the method includes determining subdomains associated with the requested item, determining a role of the user for the respective domain, the role is associated with a set of access permissions to items of data within the domain, and generating an output corresponding to whether access to the requested item is granted based on a policy for each of the subdomains associated with the requested item and the role of the user for the domain. | 2019-11-07 |
20190340384 | KEY PROVIDING METHOD, VIDEO PLAYING METHOD, SERVER AND CLIENT - The present application discloses a key providing method, a video playing method, a server and a client, in which the video playing method includes: sending a download request to the server and receiving an index file of a target video data delivered by the server; constructing an access request based on a specified string in the index file, and sending the access request to the server to acquire from the server a preset key which the access request is directed to; sending to the server a file acquisition request including a file address to acquire from the server encrypted fragmented data which the file address of the fragmented data is directed to; decrypting the acquired encrypted fragmented data by using the preset key, and playing the decrypted fragmented data. The technical solutions provided in the present application can effectively protect copyrights of video data. | 2019-11-07 |
20190340385 | CONTACT DISCOVERY SERVICE WITH PRIVACY ASPECT - This application relates to a client-server architecture that enables user accounts registered with a service to be discoverable to other users of the service. A discovery protocol includes accessing personal information data stored in an address book of a client device, obfuscating the personal information data, transmitting a request to a service to determine if the obfuscated personal information data matches any potential contacts that have registered as discoverable with the service, and comparing information related to the potential contacts with the contacts included in the address book to determine if the contacts in the address book match any of the potential contacts. | 2019-11-07 |
20190340386 | SYSTEM AND METHOD FOR MAINTAINING PRIVACY OF DATA USED AT A SIGNATURE CAPTURE DEVICE - A signature capture device is used to display a targeted message for a customer picking up an ordered item. The targeted message is selected based on an identifier for the ordered item. Personal information used for the display message is managed to maintain security and privacy of the information. In one embodiment, the ordered item is a prescription and the signature capture device is part of a pharmacy management system. | 2019-11-07 |
20190340387 | DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS - Responding to a data subject access request includes receiving the request and validating an identity of the requestor. In response to validating the identity of the requestor, a computer processor determines whether the data subject access request is subject to fulfillment constraints. If so, then the computer processor notifies the requestor that the data subject access request is subject to one or more limitations and the computer processor takes action based on those limitations. Fulfillment constraint data is updated and maintained in a database or server. | 2019-11-07 |
20190340388 | METHOD AND SYSTEM FOR ENABLING LOG RECORD CONSUMERS TO COMPLY WITH REGULATIONS AND REQUIREMENTS REGARDING PRIVACY AND THE HANDLING OF PERSONAL DATA - A method and a system for enabling multiple log record consumers to comply with regulations and requirements regarding privacy and handling of data are described. A determination, based on a log record format being of a first of the log record types, that a first field from a raw log record is to be tokenized based on a first tokenization strategy of multiple tokenization strategies in the first log record type, is performed. Each one of the tokenization strategies identifies a tokenization mechanism from tokenization mechanisms for generating a token from a raw value to enable compliance with a set of regulations and requirements regarding privacy and the handling of data. For a first raw value in the first field a first token is generated that is an anonymized representation of the first raw value using a tokenization mechanism identified by the first tokenization strategy in the log record type. | 2019-11-07 |
20190340389 | SEARCH DEVICE, MONITORING SYSTEM, AND COMPUTER READABLE MEDIUM - In a search device ( | 2019-11-07 |
20190340390 | SYSTEMS AND METHODS FOR DETECTING AND REMEDYING THEFT OF DATA - The present disclosure relates to systems and methods for information security, specifically for automatically detecting theft of personal data. In one implementation, a computer-implemented method for automatically detecting theft of personal data on the Internet may include at least one processor configured to execute instructions, the instructions including receiving from a user, an electronic communication containing a first search term, extracting via pattern recognition one or more patterns corresponding with the first search term, and comparing the one or more patterns with a subset of data scraped from the Internet, with the subset of data scraped from the Internet being indexed by pattern for the first search term. The instructions may also include flagging matches of the one or more patterns with the subset of data based on the comparison and transmitting information associated with the matches in a report that indicates a possible theft of personal data. | 2019-11-07 |
20190340391 | MULTIPLE MESSAGE RETRIEVAL FOR SECURE ELECTRONIC COMMUNICATION - Techniques for multiple message retrieval for secure electronic communication are described. The techniques, for instance, utilize a server and computing devices employing a private information retrieval scheme to allow a receiving device to locate multiple electronic communications on a server, request delivery of the multiple electronic communications without the server being aware of which electronic communication are requested, and receive the electronic communications without the server being aware of which electronic communications were sent. For example, the server may utilize an efficient electronic communication storage structure for storing and retrieving multiple electronic communications. | 2019-11-07 |
20190340392 | ANOMALY DETECTION IN REAL-TIME MULTI-THREADED PROCESSES ON EMBEDDED SYSTEMS AND DEVICES USING HARDWARE PERFORMANCE COUNTERS AND/OR STACK TRACES - An aspect of behavior of an embedded system may be determined by (a) determining a baseline behavior of the embedded system from a sequence of patterns in real-time digital measurements extracted from the embedded system; (b) extracting, while the embedded system is operating, real-time digital measurements from the embedded system; (c) extracting features from the real-time digital measurements extracted from the embedded system while the embedded system was operating; and (d) determining the aspect of the behavior of the embedded system by analyzing the extracted features with respect to features of the baseline behavior determined. | 2019-11-07 |
20190340393 | DEVICE AND METHOD FOR DATA SECURITY WITH A TRUSTED EXECUTION ENVIRONMENT - A computing device includes: a trusted execution environment with access to a memory storing a deletable root key, the memory inaccessible by a second execution environment; and at least one processor operable in the trusted execution environment, wherein when operating in the trusted execution environment, the at least one processor is configured for: based on requests from the second execution environment, performing a root key operation on an encryption key utilized by the second execution environment to secure data the second execution environment; and deleting the root key upon detection of a security event. | 2019-11-07 |
20190340394 | SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SATISFIABILITY ATTACK RESISTANT LOGIC LOCKING - Exemplary embodiment of the present disclosure can include, for example, a logic-locking circuit (“SARLock”), which can include a logic cone(s) receiving a distinguishing input pattern(s) (DIP), a comparator(s) receiving the DIP(s) and a key value(s), and a logic gate(s) connected to an output of the logic cone and to an output of the comparator. A mask(s) can be connected to the comparator(s) and the logic gate(s). The logic gate(s) can be a XOR gate(s). The comparator(s) can be configured to flip a signal(s) based on a combination of the DIP(s) and the key value(s). A mask(s) can be connected to the comparator(s) and the logic gate(s), which can be configured to prevent the flipped signal(s) from being asserted for a correct key value(s). | 2019-11-07 |
20190340395 | CARD READER DEVICE - A card reader device A | 2019-11-07 |
20190340396 | PRODUCT AND EQUIPMENT LOCATION AND AUTOMATION SYSTEM AND METHOD - A system for location of assets on a premises is described. The system uses identifiers attached to a group of one or more assets along with mobile sensor packages. Each mobile sensor package contains components for data processing, data exchange, and storage. The sensor package also contains a sensor for reading identifiers and a location tool. The mobile sensor packages are attached to each mover of assets on the premises. | 2019-11-07 |
20190340397 | INTERFERENCE-REDUCING RFID READER - An RFID reader apparatus designed to limit interference in a role of auditing individual RFID tagged or labeled items in areas of surrounding dense RIFD transponder populations. Such an RFID reader apparatus may include an RFID reader, a specialized antenna, and an enclosure, which may be constructed from ferrous material and which may be configured to hold the RFID reader and the specialized antenna in separate compartments. The enclosure may have one or more shelves, which may also be constructed from ferrous material. The RFID reader apparatus may also have a lid constructed from non-ferrous material. The RFID reader apparatus may be fitted to the bottom of an auditing workstation, for example with screws or other connectors, or may be placed within an auditing workstation specifically equipped to accommodate it. | 2019-11-07 |
20190340398 | IMPROVED IC CHIP CARD - An integrated circuit (IC) chip card includes a card body and an integrated IC chip module located in a recess provided by the card body on one side thereof. The IC chip module includes a substrate having outward-facing and inward-facing surfaces, and a first plurality of contact pads supportably interconnected to the outward-facing surface of the substrate. The IC chip module further includes a first IC chip supportably interconnected to the inward-facing surface of the substrate and electrically interconnected to the first plurality of contact pads for processing a signal received therefrom. The IC chip module may also include a second plurality of contact pads supportably interconnected to the outward-facing surface of the substrate. The IC chip module may further include conductive protrusions supportably connected to the inward-facing surface and having protruding ends that extend in to a thickness of corresponding embedded conductive contacts of the card body. | 2019-11-07 |
20190340399 | CABLE PLUGGING GUIDANCE FACILITY FOR A NETWORK - Methods, systems, and computer program products are provided for facilitating cable plugging in a network by receiving, from a scanner associated with the network, wirelessly read connector identifying information from a tag accompanying a cable connector at one end of a cable to be plugged in the network, and using, by a processor, the connector identifying information to ascertain, from a database, applicable cable rules guidance for where to properly plug the cable connector in the network. Based on ascertaining the guidance, one or more indicators associated with one or more plug locations in the network are illuminated to assist in properly plugging the cable connector in the network. | 2019-11-07 |
20190340400 | System and a Method for Detecting Information of Assets Stored in Communication Tags - Disclosed is a system for detecting information of assets stored in communication tags and communicating assets information over a communication network. The system includes a bi-directional communication reader, a server, a GPS unit, a camera, a communication module, a relay switch, and a battery. The server stores asset information using a software application. The software application includes a front end application module for configuration, an event module, a back end application module, a communication module, a GPS communication module, a relay communication module, a motion detector communication module and a camera communication module. Further, an unlimited number of modules can be added for example extended storage, LCD, and flash. The event module reads the asset information from the database and alerts the user of an event. The communication module receives processed assets information from the communication tags via the bi-directional communication reader from the specific antenna. Further, the communication module communicates the processed assets information over the communication network via a proprietary protocol. | 2019-11-07 |
20190340401 | GRAPHICAL BARCODE READERS THAT ARE CONFIGURED FOR GLARE REDUCTION - A method for glare reduction may be implemented by a graphical code reader. The graphical code reader includes an optic system, a plurality of light sources, and a control system. The control system is configured to determine that glare is present in an image captured by the optic system by identifying reflection from at least one of the plurality of light sources. The control system may take a corrective action to reduce the glare in subsequent images. The control system may be configured to take a first corrective action if a diffraction pattern is present at a periphery of the glare, and take a second corrective action if a diffraction pattern is not present at the periphery of the glare. | 2019-11-07 |
20190340402 | DEVICE FOR CHECKING ACCESS AUTHORISATIONS STORED ON DATA CARRIERS - A device for checking access authorizations stored on data carriers is provided, having a reading unit, arranged in the access region, for the data carrier, said reading unit actuating a signaling means and/or a blocking means, wherein the reading unit includes a housing having an insertion region for the data carrier and the insertion region having an upper first wall with a reading module sensing the insertion region, a lower second wall of the insertion region be fastened detachably and/or pivotably to the housing, that the reading unit can be changed from a first state to a second state in a predefinable manner by pivoting and/or removing the lower second wall, wherein in the first state of the reading unit, the second wall, together with the first wall, forms a U- or V-shaped insertion region and in the second state, the insertion region is L-shaped and open towards the bottom. | 2019-11-07 |
20190340403 | Optical Detection Of An Image On A Container - A container is mounted with respect to a fluid processing device using first and second supports, with the first support engaging a first portion of the container and the second support engaging a second portion of the container. The second support is positioned above or below the first support. The first and second supports cooperate to restrain the container in a fixed orientation, such as aligning an image on the container with an optical detector of a fluid processing device. The first and second supports may be components of a fixture that is separate from a surface of the fluid processing device or may themselves be incorporated into and extend from the surface of the fluid processing device. | 2019-11-07 |
20190340404 | FINGERPRINT SENSING CHIP AND TERMINAL DEVICE - A fingerprint sensing chip and a terminal device are provided. The fingerprint sensing chip includes a first signal, a second signal and a driving signal. The second signal is generated based on the first signal, and the driving signal is generated by performing a ground raise process on the second signal. The driving signal is used to provide a driving voltage for fingerprint sensing. | 2019-11-07 |
20190340405 | Fingerprint Sensor in InFO Structure and Formation Method - A package includes a sensor die, and an encapsulating material encapsulating the sensor die therein. A top surface of the encapsulating material is substantially coplanar with or higher than a top surface of the sensor die. A plurality of sensing electrodes is higher than the sensor die and the encapsulating material. The plurality of sensing electrodes is arranged as a plurality of rows and columns, and the plurality of sensing electrodes is electrically coupled to the sensor die. A dielectric layer covers the plurality of sensing electrodes. | 2019-11-07 |
20190340406 | FINGERPRINT SENSING MODULE AND METHOD FOR MANUFACTURING THE FINGERPRINT SENSING MODULE - There is provided a fingerprint sensing module comprising a fingerprint sensor device having a sensing array arranged on a first side of the device, the sensing array comprising an array of fingerprint sensing elements. The fingerprint sensor device also comprises connection pads for connecting the fingerprint sensor device to external circuitry. The fingerprint sensing module further comprises a fingerprint sensor device cover structure arranged to cover the fingerprint sensor device, the cover structure having a first side configured to be touched by a finger, thereby forming a sensing surface of the sensing module, and a second side facing the sensing array, wherein the cover structure comprises conductive traces for electrically connecting the fingerprint sensor module to external circuitry, and wherein a surface area of the cover structure is larger than a surface area of the sensor device. Moreover, the fingerprint sensor device comprises wire-bonds electrically connecting the connection pads of the fingerprint sensing device to the conductive traces of the cover structure. | 2019-11-07 |
20190340407 | TECHNIQUES FOR CREATING CHARACTERIZATION MATRICES FOR REFLECTANCE, ILLUMINANCE, OR SENSOR RESPONSE - Introduced here are computer programs and associated computer-implemented techniques for determining reflectance of an image on a per-pixel basis. More specifically, a characterization module can initially acquire a first data set generated by a multi-channel light source and a second data set generated by a multi-channel image sensor. The first data set may specify the illuminance of each color channel of the multi-channel light source (which is configured to produce a flash), while the second data set may specify the response of each sensor channel of the multi-channel image sensor (which is configured to capture an image in conjunction with the flash). Thus, the characterization module may determine reflectance based on illuminance and sensor response. The characterization module may also be configured to determine illuminance based on reflectance and sensor response, or determine sensor response based on illuminance and reflectance. | 2019-11-07 |
20190340408 | DISPLAY PANELS AND DISPLAY DEVICES - Display panels and display devices, in order to provide a new full screen solution that can realize fingerprint recognition. The display panel includes a substrate, a display film layer located on a surface of the substrate and a touch film layer located above the display film layer. The display panel further includes a fingerprint recognition film layer including a plurality of image sensing elements arranged in an array, and an orthographic projection of the image sensing element on the substrate is not overlapped with an orthographic projection of the light-emitting sub-pixels in the display film layer on the substrate. | 2019-11-07 |
20190340409 | DISPLAY PANEL AND DISPLAY DEVICE - The disclosure discloses a display panel and a display device to thereby extend an area for recognizing a fingerprint or a palmprint instead of only a fixed area in which a fingerprint can be recognized as in the related art, so as to recognize a fingerprint or a palmprint throughout the screen while improving the precision of recognizing light rays. The display panel according to the disclosure includes: a base substrate; and, infrared light sources, pixel units, and infrared photosensitive sensors on the base substrate. | 2019-11-07 |
20190340410 | ELECTRONIC APPARATUS - An authentication method selecting unit | 2019-11-07 |
20190340411 | METHOD AND SYSTEM FOR ENCODING FINGERPRINT OF THINGS - An encoding method and system for a fingerprint of thing according to the present application is disclosed. Based on images of human fingerprints, at least one characteristic of fingerprint is provided on at least friction ridge lines so as to enable the encodement in the form of numbers and/or alphabets, and thereby a fingerprint image including the specific information are formed and can be used for labelling products with codes. The fingerprint image includes the specific information of a thing, and when attached onto said thing, is also unique similar to a fingerprint of an individual. Such fingerprint image for representing the specific identification information of a thing using minutia of finger can be referred to as fingerprint of thing (FOT). The fingerprint of thing, as a wholly new two-dimensional code which is generated based on images of human fingerprints, includes the more information than that of a one-dimensional barcode, and can be used for represent the information which cannot be represented by a one-dimensional barcode and will be too complicated for a two-dimensional barcode to represent. With an encoding method and system according to the present application, a fingerprint of thing including the unique identification information can be printed or carved onto every product, and can keep unchanged similar to a human fingerprint and can be readily used for query. | 2019-11-07 |
20190340412 | FINGERPRINT READER - A fingerprint reader includes a display screen composed of an array of energy emitting pixels covered by a transparent cover, at least one sensor coupled along an edge of the display screen, a display driver directing the array of energy emitting pixels of the display screen to illuminate in a predetermined sequence, and a microprocessor in communication with the display driver and the at least one sensor. The microprocessor knows the location of the energy emitting pixel being illuminated and the specific time at which the illumination occurs. In use, and when at least one finger is placed on the transparent cover and the display driver is activated, energy from each energy emitting pixel sequentially illuminated is reflected off the fingerprint to the at least one sensor. The energy received at the at least one sensor is at different intensity levels depending upon the ridges and valleys of the at least one fingerprint. The at least one sensor sends a signal to the microprocessor regarding the energy intensity level, from which the microprocessor creates a fingerprint image as the energy emitting pixels are sequentially illuminated. | 2019-11-07 |
20190340413 | Fingerprint Identification Assembly, Fingerprint Identification Method, and Electronic Device - A fingerprint identification assembly, a fingerprint identification method, and a electronic device are disclosed. The fingerprint identification assembly is applied in an electronic device having a charger. The fingerprint identification assembly includes a fingerprint chip, a cover, and a base. The fingerprint chip is configured to emit a charging fingerprint collection signal. The cover is disposed at one side of the fingerprint chip. The base is disposed at the other side of the fingerprint chip away from the cover and is configured to support the fingerprint chip and the cover. The charging fingerprint collection signal is configured to collect data of a user's fingerprint image, a frequency of the charging fingerprint collection signal is greater than a preset frequency, and the preset frequency is a switching frequency of the charger. | 2019-11-07 |
20190340414 | LOCATION MATCHED SMALL SEGMENT FINGERPRINT READER - Electronic fingerprint readers are often used for security such as log-in authentication for the identification of a user for selective access to a computing system. As computing devices shrink in overall size and with downward pressure on device pricing, smaller and less expensive fingerprint readers are increasingly desired. While whole fingerprint readers have the greatest accuracy in user identification, the whole fingerprint is often not required for user identification. Often, only a portion of the user's fingerprint is required to adequately identify the user and thus a small segment fingerprint reader may be sufficient for user authentication. However, the smaller the sensing area of the small-segment fingerprint reader, the more likely that the fingerprint reader misidentifies the user or fails to collect sufficient information to identify the user. Systems and methods for improving identification accuracy of small-segment fingerprint readers are disclosed in detail herein. | 2019-11-07 |
20190340415 | Automated system and method for creating and executing a scoring guide to assist in the analysis of tissue specimen - Systems and methods disclosed herein describe a platform that automatically creates and executes a scoring guide for use in anatomical pathology. The platform can employ a fully-automated workflow for clustering the biological objects of interest and for providing cell-by-cell read-outs of heterogeneous tumor biomarkers based on their stain appearance. The platform can include a module for automatically creating and storing a scoring guide in a training database based on training digital images ( | 2019-11-07 |
20190340416 | ARTIFICIAL NEURAL NETWORK - An apparatus comprises memory configured to store, at least partly, labelling information of a convolutional artificial neural network, and at least one processing core configured to generate, from an input data item, partial feature maps of the convolutional artificial neural network in accordance with the labelling information, generate, from the partial feature maps, inputs to a plurality of weak classifiers to generate a classification decision, wherein the labelling information identifies at least one of the following: elements of the feature maps that generate the inputs, and elements of the feature maps that are used to generate the elements that generate the inputs. | 2019-11-07 |
20190340417 | MONITORING SYSTEM, MONITORING CAMERA, AND MANAGEMENT DEVICE - There is provided a monitoring system which includes a plurality of monitoring cameras and a management device. The management device transmits feature information relevant to a person to one or more first monitoring cameras and receives check results, and transmits time information in which the person is captured to second monitoring cameras based on the check results. The management device specifies the person based on a check result acquired in such a way that the second monitoring cameras perform a check using the time information. | 2019-11-07 |
20190340418 | SINGLE-PIXEL SENSOR - The present disclosure relates to performing facial recognition using a single-pixel sensor that measures the time signature of a light pulse reflected from a subjects face. Due to depth differences between the sensor position and different parts of the subject's face reflections of a short duration illumination pulse from the different parts of the subject's face will arrive back at the sensor at different times, thus providing a time-based one-dimensional signature unique to the individual subject. By analyzing the reflection signature using neural networks or principal component analysis (PCA), recognition of the subject can be obtained. In addition, the same system may also be used to recognize or discriminate between any other objects of known shape in addition to faces, for example manufactured products on a production line, or the like. | 2019-11-07 |
20190340419 | Generation of Parameterized Avatars - Generation of parameterized avatars is described. An avatar generation system uses a trained machine-learning model to generate a parameterized avatar, from which digital visual content (e.g., images, videos, augmented and/or virtual reality (AR/VR) content) can be generated. The machine-learning model is trained to identify cartoon features of a particular style—from a library of these cartoon features—that correspond to features of a person depicted in a digital photograph. The parameterized avatar is data (e.g., a feature vector) that indicates the cartoon features identified from the library by the trained machine-learning model for the depicted person. This parameterization enables the avatar to be animated. The parameterization also enables the avatar generation system to generate avatars in non-photorealistic (relatively cartoony) styles such that, despite the style, the avatars preserve identities and expressions of persons depicted in input digital photographs. | 2019-11-07 |
20190340420 | TECHNOLOGIES FOR EFFICIENT IDENTITY RECOGNITION BASED ON SKIN FEATURES - Technologies for efficient identity recognition based on skin features include a compute device. The compute device includes an image capture device and an image acquisition module to obtain, with the image capture device, an image that depicts the skin of the person. The compute device also includes a skin feature determination module to identify pixels in the obtained image that are associated with the skin of the person, and determine one or more features of the skin based on the identified pixels. Additionally, the compute device includes an identity determination module to generate a feature vector that includes the determined features of the skin, and analyze the feature vector with reference data to determine an identity of the person. Other embodiments are described and claimed. | 2019-11-07 |
20190340421 | FACE RECOGNITION IN LOW LIGHT CONDITIONS FOR UNLOCKING AN ELECTRONIC DEVICE - Certain aspects of the present disclosure provide techniques for performing face recognition in low light conditions using an electronic device. One aspect provides a method including determining if a brightness level within a viewing area of the electronic device satisfies a threshold. The method includes increasing a luminance output of the electronic device from a first luminance level to a second luminance level when the brightness level does not satisfy the threshold. The method includes capturing an image at the second luminance level when the brightness level does not satisfy the threshold. The method includes capturing the image at the first luminance level when the brightness level satisfies the threshold. The method includes detecting a face in the image. The method includes determining if the face corresponds to an authorized user. The method includes unlocking the electronic device when the face corresponds to an authorized user. | 2019-11-07 |
20190340422 | SYSTEM AND METHOD FOR FACILITATING THROUGHPUT USING FACIAL RECOGNITION - Systems and methods are described that include receiving an indication of a scanned document from a scanning device, waiting a delay period in response to receiving the indication of the scanned document, and instructing an image capture device to capture an image of a document holder after waiting the delay period. In this manner, the described systems and methods may increase facial recognition throughput by waiting the delay period after receiving the indication of the scanned document, allowing for sufficient time for the document holder to look up from the scanning device to the image capture device. | 2019-11-07 |
20190340423 | TERMINAL FOR VEHICLE AND METHOD FOR AUTHENTICATING FACE - A vehicle terminal automatically registering a profile image of a user to a vehicle using images stored in a mobile terminal of a user and performing a face authentication includes a communicator that performs a data communication with the mobile terminal of the user, a camera that obtains a face image of the user, and a processor that registers the profile image of the user using an image among the images stored in the mobile terminal. The processor learns a facial feature of the user using the images stored in the mobile terminal as learning data and analyzes the face image obtained through the camera based on the learned facial feature of the user to perform the face authentication of the user. | 2019-11-07 |
20190340424 | OBJECT IDENTIFICATION - The present invention relates to a computer-implemented method of identifying a physical object, comprising the steps of providing image data comprising an image object representing a physical object, analyzing the image data to extract identification data for the image object, providing supplementary data associated with a particular physical object, and determining whether the image object corresponds to the particular physical object based on the identification data and supplementary data. | 2019-11-07 |
20190340425 | IMAGE OBTAINING BASED ON EMOTIONAL STATUS - The present disclosure provides a method, computer system and computer program product for obtaining an image. According to the method, an emotional status of a user is determined, at least one character can be determined based on a preference of the user, and at least one image comprising the at least one character can be obtained based on the emotional status of the user. | 2019-11-07 |
20190340426 | Enhanced Accessibility in Mixed Reality Experience for Collaboration Tools - Described herein is are systems and methods for interpreting gesture(s) and/or sign(s) using a machine-learned model. Information regarding gesture(s) and/or sign(s) is received from a first user. The information can be received via a mixed reality device of the first user and/or a second user. Probabilities that the gesture(s) or sign(s) have particular meanings are calculated using a machine-trained model. The gesture(s) and/or sign(s) are interpreted in accordance with the calculated probabilities. Information regarding the interpreted gesture(s) and/or sign(s) are provided (e.g., displayed as visual text and/or an audible output) to the second user. | 2019-11-07 |
20190340427 | VEHICLE IMAGING SYSTEM, VEHICLE IMAGING METHOD AND DEVICE, PROGRAM, AND RECORDING MEDIUM - A system includes a laser displacement sensor which is provided on a shoulder of a roadway, emits a laser beam which scans a roadway space in a height direction thereof, receives a beam reflected by an object which is present in the roadway space, and measures a distance up to a reflection point on the object, at which the laser beam was reflected; and a vehicle window detection device that detects a window of the vehicle based on the distance measured by the laser displacement sensor. The vehicle window detection device detects the window of the vehicle based on a change in a distance in a horizontal direction from the laser displacement sensor to the reflection point after the vehicle in the roadway space was detected. | 2019-11-07 |
20190340428 | SYSTEM AND METHOD FOR STIPULATION COLLECTION USING A SHORT MESSAGE SERVICE (SMS) AND MOBILE DEVICE CAMERAS WITH REAL-TIME ANALYSIS OF DOCUMENTS - A system and method for stipulation collection using a Short Message Service (SMS) and mobile device cameras with real-time analysis of documents is disclosed. A particular embodiment is configured to: establish, by use of a data processor and a data network, a data connection with at least one dealer/lender platform and at least one applicant platform; receive a transaction application corresponding to a transaction for a particular applicant from the dealer/lender platform via the data network, the transaction application identifying a list of stipulation documents required from the particular applicant at the applicant platform; generate a link to the transaction application received from the dealer/lender platform and send the link to the dealer/lender platform; transmit the transaction application with the list of required stipulation documents as a Short Message Service (SMS) message to a mobile device of the particular applicant at the applicant platform; receive an upload of the required stipulation documents from the applicant platform via the data network, the uploaded stipulation documents including at least one stipulation document image captured with a camera of the mobile device of the particular applicant; perform stipulation document analysis and verification operations on the uploaded stipulation documents, the analysis and verification operations including optical character recognition and the application of one or more machine learning models; transmit at least one link of a verified stipulation document to the dealer/lender platform; and transmit an error message to the particular applicant at the applicant platform if a stipulation document cannot be verified. | 2019-11-07 |
20190340429 | System and Method for Processing and Identifying Content in Form Documents - The present disclosure generally provides a system and method for processing and identifying data in form. The system and method may distinguish between content data and background data in a form. In some aspects, the content data or background data may be removed, wherein the remaining data may be processed separately. Removal of the background data or the content data may allow for more effective or efficient character recognition of the data. In some embodiments, data may be processed on an element basis, wherein each element of the form may be labeled as background data, content data, noise, or combinations thereof. This system and method may significantly increase the ability to capture and extract relevant information from a form. | 2019-11-07 |
20190340430 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR CLASSIFICATION OF DOCUMENTS - Provided herein are systems, methods and computer readable media for classification of documents using a location hierarchy. An example method may include receiving a feature vector r that represents occurrence counts of references in a document's text to each of a group of named entities, and determining whether the document is associated with the particular location by querying, to determine a query result, using feature vector r, at least one location-specific classifier from a group of location-specific classifiers, wherein the location-specific classifier is associated with the particular location, and wherein the location-specific classifier is configured to generate a positive output value in response to receiving an input feature vector representing occurrence count of at least one reference to the particular named entity and determining that the document is associated with the particular location in an instance in which the query result includes data indicating that the positive output value was generated by the location-specific classifier that is associated with the particular location. | 2019-11-07 |
20190340431 | Object Tracking Method and Apparatus - An object tracking apparatus for a sequence of images, wherein a plurality of tracks have been obtained for the sequence of images, and each of the plurality of tracks is obtained by detecting an object in several images included in the sequence of images. The apparatus comprises matching track pair determining unit configured to determine a matching track pair from the plurality of tracks, wherein the matching track pair comprise a previous track and a subsequent track which correspond to the same object and are discontinuous, and combining unit configured to combine the previous track and the subsequent track included in the matching track pair. | 2019-11-07 |
20190340432 | THREE DIMENSIONAL BOUNDING BOX ESTIMATION FROM TWO DIMENSIONAL IMAGES - A three dimensional bounding box is determined from a two dimensional image. A two dimensional bounding box is calculated based on a detected object within the image. A three dimensional bounding box is parameterized as having a yaw angle, dimensions, and a position. The yaw angle is defined as the angle between a ray passing through a center of the two dimensional bounding box and an orientation of the three dimensional bounding box. The yaw angle and dimensions are determined by passing the portion of the image within the two dimensional bounding box through a trained convolutional neural network. The three dimensional bounding box is then positioned such that the projection of the three dimensional bounding box into the image aligns with the two dimensional bounding box previously detected. Characteristics of the three dimensional bounding box are then communicated to an autonomous system for collision and obstacle avoidance. | 2019-11-07 |
20190340433 | SYSTEM AND METHOD OF REPRESENTING AND TRACKING TIME-BASED INFORMATION IN TWO-DIMENSIONAL BUILDING DOCUMENTATION - A system that includes computer executable instructions that, when executed by the processor, cause the processor to perform operations including receiving a first 2D map of a location. The first 2D map was generated at a first time based on first scan data from a coordinate measurement scanner and a portable computing device. The coordinate measurement scanner includes a light source, a first image sensor, and a controller. The portable computing device includes a second image sensor. A second 2D map of the location is received. The second 2D map was generated at a second time based on second scan data from the coordinate measurement scanner and the portable computing device. The first 2D map is aligned with the second 2D map, and their contents are compared. Any differences in the contents of the first 2D map and the second 2D map are output. | 2019-11-07 |
20190340434 | PROACTIVE PATIENT GUIDANCE USING AUGMENTED REALITY - Medical devices and related augmented reality systems and methods are provided. A method of providing guidance to a patient using an electronic device having an imaging device associated therewith involves analyzing one or more images captured by the imaging device to identify image content indicative of a potential activity for the patient, determining, by a control system associated with the electronic device, one or more attributes for the potential activity, determining, by the control system, a predicted physiological response by the patient to the potential activity based at least in part on the one or more attributes, and providing, on a display associated with the electronic device, an augmented reality graphical user interface including a graphical indication influenced by the predicted physiological response. | 2019-11-07 |
20190340435 | AUGMENTED REALITY DISPLAY DEVICE WITH DEEP LEARNING SENSORS - A head-mounted augmented reality (AR) device can include a hardware processor programmed to receive different types of sensor data from a plurality of sensors (e.g., an inertial measurement unit, an outward-facing camera, a depth sensing camera, an eye imaging camera, or a microphone); and determining an event of a plurality of events using the different types of sensor data and a hydra neural network (e.g., face recognition, visual search, gesture identification, semantic segmentation, object detection, lighting detection, simultaneous localization and mapping, relocalization). | 2019-11-07 |
20190340436 | System and method for analyzing graffiti and tracking graffiti vandals - Exemplary embodiments of the present disclosure are directed towards a system for analyzing graffiti content, tracking graffiti vandals who executed graffiti on different surfaces and report the graffiti vandal reports to law enforcement agent or public works departments, comprising: a computing device is configured to allow a user to capture graffiti executed on a plurality of surfaces and uploads the captured graffiti to a graffiti analyzing and tracking module, the graffiti analyzing and tracking module parses out the graffiti content into data points and analyzes, reconfigures, and reports the data points to clearly reveal trends in categories on computing device, and a database configured to store information about graffiti crimes, locations, and allows the user to allocate resources, the computing device enables the graffiti analyzing and tracking module to display graffiti vandals and map the graffiti content to graffiti vandals that have appeared in graffiti renderings from the database. | 2019-11-07 |
20190340437 | VIDEO TO DATA - A method and system can generate video content from a video. The method and system can include a coordinator, an image detector, and an object recognizer. The coordinator can be communicatively coupled to a splitter and/or to a plurality of demultiplexer nodes. The splitter can be configured to segment the video. The demultiplexer nodes can be configured to extract audio files from the video and/or to extract still frame images from the video. The image detector can be configured to detect images of objects in the still frame images. The object recognizer can be configured to compare an image of an object to a fractal. The recognizer can be further configured to update the fractal with the image. The coordinator can be configured to embed metadata about the object into the video. | 2019-11-07 |
20190340438 | INGESTING STREAMING SIGNALS - The present invention extends to methods, systems, and computer program products for ingesting streaming signals. Signal ingestion modules sample a frame from a raw streaming signal. A preliminary severity or possible event type is computed from the sampled frame. A deeper inspection request is triggered of the raw streaming signal or of another raw streaming signal. Segments of content from the raw streaming signal or the other raw streaming signal are inspected. An actual severity or actual event type is computed from the inspected content. The actual severity or actual event type can be included in a normalized signal. | 2019-11-07 |
20190340439 | LIVE VIDEO PROCESSING METHOD AND APPARATUS, AND STORAGE MEDIUM - The present application provides a live video processing method and apparatus, and a storage medium, where the method includes: obtaining first video information corresponding to a first moment; determining according to the first video information, an identifier of a predicted event corresponding to second video information, displaying, according to the identifier of the predicted event, AR data corresponding to the predicted event in a second video live screen of the second moment. The method and apparatus enhance the enjoyability of the live video, improve the viewing experience of the remote audiences, and increase the intensity of the game. | 2019-11-07 |
20190340440 | FISH MEASUREMENT STATION KEEPING - A fish monitoring system deployed in a particular area to obtain fish images is described. Neural networks and machine-learning techniques may be implemented to periodically train fish monitoring systems and generate monitoring modes to capture high quality images of fish based on the conditions in the determined area. The camera systems may be configured according to the settings, e.g., positions, viewing angles, specified by the monitoring modes when conditions matching the monitoring modes are detected. Each monitoring mode may be associated with one or more fish activities, such as sleeping, eating, swimming alone, and one or more parameters, such as time, location, and fish type. | 2019-11-07 |
20190340441 | METHOD FOR MONITORING A PATIENT WITHIN A MEDICAL MONITORING AREA - A method for monitoring a patient ( | 2019-11-07 |
20190340442 | Shape/Object Recognition Using Still/Scan/Moving Image Optical Digital Media Processing - There is provided a system and method for shape/object recognition using still/scan/moving image optical digital media processing. The system may include a user device and a cloud/server. The user device may be configured to capture a reference optical data using a capturing device, transmit the reference data to the cloud/server, capture a subsequent optical data using the capturing device, and transmit the subsequent optical data to the cloud/server. The cloud/server may be configured to receive the reference optical data from the user device, receive the subsequent optical data from the user device, compare the subsequent optical data to the reference optical data, and transmit a notification to the user device. The notification may include similarities and differences between the reference optical data and the subsequent optical data. | 2019-11-07 |
20190340443 | CROWD TYPE CLASSIFICATION SYSTEM, CROWD TYPE CLASSIFICATION METHOD AND STORAGE MEDIUM FOR STORING CROWD TYPE CLASSIFICATION PROGRAM - A crowd type classification system of an aspect of the present invention includes: a staying crowd detection unit that detects a local region indicating a crowd in staying from a plurality of local regions determined in an image acquired by an image acquisition device; a crowd direction estimation unit that estimates a direction of the crowd for an image of a part corresponding to the detected local region, and appends the direction of the crowd to the local region; and a crowd type classification unit that classifies a type of the crowd including a plurality of staying persons for the local region to which the direction is appended by using a relative vector indicating a relative positional relationship between two local regions and directions of crowds in the two local regions, and outputs the type and positions of the crowds. | 2019-11-07 |
20190340444 | CROWD TYPE CLASSIFICATION SYSTEM, CROWD TYPE CLASSIFICATION METHOD AND STORAGE MEDIUM FOR STORING CROWD TYPE CLASSIFICATION PROGRAM - A crowd type classification system of an aspect of the present invention includes: a staying crowd detection unit that detects a local region indicating a crowd in staying from a plurality of local regions determined in an image acquired by an image acquisition device; a crowd direction estimation unit that estimates a direction of the crowd for an image of a part corresponding to the detected local region, and appends the direction of the crowd to the local region; and a crowd type classification unit that classifies a type of the crowd including a plurality of staying persons for the local region to which the direction is appended by using a relative vector indicating a relative positional relationship between two local regions and directions of crowds in the two local regions, and outputs the type and positions of the crowds. | 2019-11-07 |
20190340445 | METHODS AND SYSTEMS FOR GENERATING AND USING A ROAD FRICTION ESTIMATE BASED ON CAMERA IMAGE SIGNAL PROCESSING - Methods and systems for generating and utilizing a road friction estimate (RFE) indicating the expected friction level between a road surface and the tires of a vehicle based on forward looking camera image signal processing. A forward-looking camera image is pre-processed, patch segmented (both laterally and longitudinally, as defined by wheel tracks or the like), transformed into a bird's eye view (BEV) image using perspective transformation, patch quantized, and finally classified. The resulting RFE may be used to provide driver information, automatically control the associated vehicle's motion, and/or inform a cloud-based alert service to enhance driver safety. | 2019-11-07 |
20190340446 | SHADOW REMOVING METHOD FOR COLOR IMAGE AND APPLICATION - Disclosed are a shadow removing method for an image and an application. The shadow removing method comprises a shadow-free feature analysis process, a shadow-free transformation parameter acquisition process and a shadow-free feature imaging process. The application is for road surface detection, a detection method comprising: firstly, using a shadow-free feature extraction method to select a region of interest and extract a feature; next, performing image filtering, segmentation and road surface region selection; lastly, performing image morphology filtering and hole filling. The method may remove shadows in color images, thus serving as a pre-processing step applied in various machine vision fields, and the application in road surface detection may solve the problem of detecting a road surface in dark shadows. The method has the advantages of having low complexity, high processing speed and high accuracy. | 2019-11-07 |
20190340447 | CURB DETECTION BY ANALYSIS OF REFLECTION IMAGES - Disclosed are devices, systems and methods for curb detection using light detection and ranging (LiDAR) sensors. One example of a method for curb detection includes acquiring, based on a scan of an area around a vehicle, a point-cloud frame that includes a description of an intensity of a reflection of the area around the vehicle, selecting a subset of points from the point-cloud frame, seeding each of a plurality of clusters based on the selected points, determining a criterion for each of the selected points, increasing a size of each of the plurality of clusters by including additional points from the point-cloud frame that meet the criterion for the corresponding cluster, identifying a largest cluster of the plurality of clusters upon completion of the increasing step, and detecting a curb based on a boundary of the largest cluster. | 2019-11-07 |
20190340448 | EVENT PREDICTION SYSTEM, EVENT PREDICTION METHOD, PROGRAM, AND RECORDING MEDIUM HAVING SAME RECORDED THEREIN - An event prediction system includes an accumulation unit and a generator. The accumulation unit accumulates a plurality of pieces of learning data each including history information representing a situation of a mobile object upon occurrence of an event associated with driving of the mobile object. The generator generates a prediction model for prediction of relative coordinates of an occurrence place of the event relative to the mobile object by using the plurality of pieces of learning data. Each of the plurality of pieces of learning data further includes label information representing the relative coordinates of the occurrence place of the event relative to the mobile object. | 2019-11-07 |
20190340449 | SYSTEM AND METHOD FOR CAPTURE AND DISTRIBUTION OF INFORMATION COLLECTED FROM SIGNS - Disclosed is a method and apparatus for capturing, collecting, and distributing event information displayed on signs. The method may include capturing, by a mobile device, an image of a sign that displays information for an event. The method may also include extracting information for the event from the captured image of the sign, and determining a location of the mobile device when the image of the sign was captured. Furthermore, the method may include uploading, to a server, a time when the image was captured, the information for the event extracted from the captured image, a location of the event determined from extracted event information, a location of the sign, or a combination thereof. | 2019-11-07 |
20190340450 | Traffic-Light Detection and Classification Using Computer Vision and Deep Learning - A method is disclosed for detecting and classifying one or more traffic lights. The method may include converting an RGB frame to an HSV frame. The HSV frame may be filtered by at least one threshold value to obtain at least one saturation frame. At least one contour may be extracted from the at least one saturation frame. Accordingly, a first portion of the RGB may be cropped in order to encompass an area including the at least one contour. The first portion may then be classified by an artificial neural network to determined whether the first portion corresponds to a not-a-traffic-light class, a red-traffic-light class, a green-traffic-light class, a yellow-traffic-light class, or the like. | 2019-11-07 |
20190340451 | OCCUPANT DETECTION DEVICE - An occupant detection device of an embodiment includes, for example: an acquirer that acquires captured image data output from an image capturer capturing a seat and distance data indicating a distance to an occupant present in a direction of the seat; a seat specifier that specifies a position of a surface of the seat; a trunk surface specifier that specifies a position of a surface representing a trunk of the occupant based on the captured image data and the distance data; and a calculator that calculates a volume of the trunk of the occupant present between the seat and the image capturer based on the position of the surface representing the trunk and the position of the surface of the seat. | 2019-11-07 |
20190340452 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM RECORDING IMAGE PROCESSING PROGRAM - An image processing apparatus performs of: acquiring an image; calculating a feature amount of each pixel of an object in the image; extracting a change region including a background and the object based on difference information in pixels; identifying the image from a start to an end of the partial change in the background; determining whether the calculated feature amount is similar to the feature amount of background model information regarding a feature amount of each pixel constituting the background; when determining dissimilarity and when the pixel determined to be dissimilar is the pixel included in the change region of the image, determining that the pixel is the pixel that corresponds to the background having a change; registering the information of the feature amount of the pixel determined to be dissimilar onto the background model information; and extracting the object from the image using a background difference. | 2019-11-07 |
20190340453 | Streamlined Vehicle Occupancy Verification Utilizing Confirmation - The present invention is a method and system to verify carpool occupancy compliance for access to High Occupancy Vehicle (HOV) lanes, High Occupancy or Toll (HOT) lanes, or other vehicle-occupancy contingent rewards. The present invention uses software and hardware devices with radio-frequency transmitter modules to permit the “check-in” and “check-out” of individuals from a passenger compartment of a vehicle for particular trips for multiple passengers. The passengers are verified as occupying the same vehicle and tracked for each trip to validate the occupancy for any portion of a trip. The validation includes image comparison to determine that the individual a live individual and is the same at the start and end of the trip. Validation reports are provided to authorized users such as transport authorities. | 2019-11-07 |
20190340454 | BUS TRANSLATOR - Disclosed are methods and devices, among which is a device including a bus translator. In some embodiments, the device also includes a core module and a core bus coupled to the core module. The bus translator may be coupled to the core module via the core bus, and the bus translator may be configured to translate between signals from a selected one of a plurality of different types of buses and signals on the core bus. | 2019-11-07 |
20190340455 | METHOD AND APPARATUS FOR PROCESSING DISTORTION OF FINGERPRINT IMAGE - The present invention relates to a method and an apparatus for processing a distortion of a fingerprint image. An electronic device according to various embodiments of the present invention comprises: a housing; a transparent member which forms at least a part of an outer surface of the electronic device and is arranged in at least a part of the housing; a display ( | 2019-11-07 |
20190340456 | INFORMATION PROCESSING APPARATUS, COMPUTER-READABLE RECORDING MEDIUM RECORDING FEATURE-POINT EXTRACTION PROGRAM, AND FEATURE-POINT EXTRACTION METHOD - An information processing apparatus includes: a memory; and a processor coupled to the memory and configured to: acquire feature points from a shot image; calculate, from each of the acquired feature points, with preset conditions, a plurality of context feature amounts that has a success-or-failure vector of a single-attribute; and extract, from among the acquired feature points, feature points of which a product of the plurality of context feature amounts is equal to or greater than a preset threshold. | 2019-11-07 |
20190340457 | METHOD FOR THE RECOGNITION OF OBJECTS FOR AUGMENTED REALITY ENGINES BY MEANS OF AN ELECTRONIC DEVICE - A method for the recognition of real objects, in particular three-dimensional objects, for augmented reality engines comprises the steps of: producing at least one three-dimensional drawing ( | 2019-11-07 |