45th week of 2017 patent applcation highlights part 44 |
Patent application number | Title | Published |
20170323050 | STRUCTURAL ANALYSIS OF PROTEINS BY STRUCTURAL REPRESENTATION AND COMPARISON OF PROTEINS - The present invention is directed to systems and methods for fast and accurate structural representation and comparison of proteins. Specifically, the present invention provides a method for retrieval of a candidate set of near structural neighbors or structurally similar proteins of a query protein. The method is based on a representation of a protein structure as a “bag of words”—a collection of small disjoint backbone protein fragments. The representation allows quick comparison procedures of the query protein structure to a large number of known protein structures obtained for example, from a repository or database of proteins. | 2017-11-09 |
20170323051 | DEVICES, SYSTEMS, AND METHODS FOR HIGH-RESOLUTION MELT ANALYSIS - Devices, systems, and methods for automatic genotyping obtain high-resolution melt data from a test sample defining a melting curve for a target nucleic acid in the test sample; obtain high-resolution melt data from a control sample defining a melting curve for a wild type of the target nucleic acid in the control sample; calculate melting curve derivatives of the melting curves for the test sample and the control sample, respectively, wherein each melting curve derivative represents a negative derivative of a fluorescence emitted from a nucleic acid sample as a function of temperature affecting nucleic acid denaturation; calculate parameters defining differences between features of the test sample and the control sample melting curve derivatives; and assign a genotype to the test sample based on a comparison of the calculated parameters to predetermined thresholds and boundaries defining genotypes. | 2017-11-09 |
20170323052 | Compressing, storing and searching sequence data - The redundancy in genomic sequence data is exploited by compressing sequence data in such a way as to allow direct computation on the compressed data using methods that are referred to herein as “compressive” algorithms. This approach reduces the task of computing on many similar genomes to only slightly more than that of operating on just one. In this approach, the redundancy among genomes is translated into computational acceleration by storing genomes in a compressed format that respects the structure of similarities and differences important to analysis. Specifically, these differences are the nucleotide substitutions, insertions, deletions, and rearrangements introduced by evolution. Once such a compressed library has been created, analysis is performed on it in time proportional to its compressed size, rather than having to reconstruct the full data set every time one wishes to query it. | 2017-11-09 |
20170323053 | EFFICIENT MANAGEMENT OF VISIBLE LIGHT STILL IMAGES AND/OR VIDEO - A visible light imaging system includes acquisition circuitry, an image generator that generates at least one of a visible light image and a visible light video with light sensed by the acquisition circuitry, a memory, and a controller. The controller, in response to executing instructions of the memory: launches a scan application, visually presents a first soft tool that retrieves an identification of a subject of interest to an imaging study based on a user input, obtains at least one of a visible light image and a visible light video, which is generated by the acquisition circuitry and the image generator for the subject, associates the retrieved identification of the subject and the at least one of the image and the video, and transfers the at least one of the image and the video, the identification of the subject, and the association to a data repository. | 2017-11-09 |
20170323054 | ANALYZING EFFICIENCY BY EXTRACTING GRANULAR TIMING INFORMATION - A system and method determines efficiency data of a technician performing a Medical Data Acquisition Procedure (MDAP), using a Medical Data Acquisition System (MDAS). The method includes receiving timing data including Digital Imaging and Communications in Medicine (DICOM) metadata obtained during the MDAP by the MDAS. The DICOM metadata includes time duration information relating to each of a plurality of stages of the MDAP. The method includes determining the efficiency data of the technician as a function of the timing data and predetermined efficiency data defined for the MDAP using the MDAS. | 2017-11-09 |
20170323055 | CHARTING LOGIC DECISION SUPPORT IN ELECTRONIC PATIENT CHARTING - Techniques for charting a medical event are disclosed. In one embodiment, the techniques may be realized as a system for charting a medical event, comprising a processor communicably coupled to a database and to a patient charting system. The processor may be configured to during the medical event: receive charting data from the patient charting system; query the database with the charting data to obtain additional data that is associated with at least some of the charting data; and send the additional data to the patient charting system to populate a patient chart during the medical event. | 2017-11-09 |
20170323056 | PATIENT CARE RECORD CONVEYANCE - Media, method, and system are described for creating and operating software capable of performing steps to capture, collect, analyze, transfer, and present patient care information recorded in a patient care record. Particularly, mobile electronic devices of patients may be leveraged to support transfer of care data records from one care location to another. | 2017-11-09 |
20170323057 | WEARABLE DEVICE - A wearable device comprising a memory storing a database of product codes and associated product recommendations derived from personalised biological information, a product code reader for reading a product code or data from a product, and a processor for using a read product code or read data to perform a look-up in the database to obtain a product recommendation for the associated product. The wearable device further comprises an indicator for providing an indication of the obtained product recommendation to a wearer of the device | 2017-11-09 |
20170323058 | METHOD AND SYSTEM FOR PREDICTING CONTINOUS CARDIAC OUTPUT (CCO) OF A PATIENT BASED ON PHYSIOLOGICAL DATA - The various embodiments of the present invention disclose a method and system for predicting a physiological condition of a patient during post-surgery recovery in Intensive Care Unit (ICU). The physiological condition is the Continuous Cardiac Output (CCO) of a patient ahead of time based on past physiological data. The method comprises of developing a clinical database containing a clinical data captured from a plurality of historical patients having similar patient profiles, the clinical data comprising physiological data, vital signs, demographic details, pretreatment symptoms, and treatments, of historical patients, identifying recovery patterns for the similar patient profiles which exhibits likewise response to a selected treatment regime, utilizing the recovery patterns for learning the behavioral response of a physiological parameter of a patient and creating a prediction model to enable automated classification of similar patient profiles from existing recovery patterns of known symptoms and known responses to at least one treatment regime. | 2017-11-09 |
20170323059 | EXAMINATION WORK SUPPORT SYSTEM - An examination item management unit manages an examination item and the maximum number of modalities that can acquire an examination order including the examination item in association with each other. An order retrieval unit extracts an examination order to be transmitted from a plurality of examination orders. When the number of the modalities that have acquired an examination order reaches the maximum number that can acquire the examination order, the order retrieval unit does not extract the examination order as an examination order to be transmitted to the modality; on the other hand, when the number of the modalities that have acquired an examination order is less than the maximum number, the order retrieval unit extracts the examination order as an examination order to be transmitted to the modality. | 2017-11-09 |
20170323060 | USER INTERFACES FOR MEDICAL DOCUMENTATION SYSTEM UTILIZING AUTOMATED NATURAL LANGUAGE UNDERSTANDING - In a system with a display and an input device, a graphical user interface (GUI) may be presented via the display. A natural language understanding engine may be applied to a free-form text documenting a clinical patient encounter, to automatically derive one or more engine-suggested medical billing codes, which may be presented in the GUI. User input may be accepted to modify the engine-suggested codes in the GUI, resulting in an unfinalized set of user-approved codes for the patient encounter. The natural language understanding engine may be adjusted using the user modification of the engine-suggested codes as feedback, and the adjusted natural language understanding engine may be applied to automatically derive a second set of engine-suggested medical billing codes for the patient encounter, which may be presented for user review in the GUI before finalizing coding of the encounter. | 2017-11-09 |
20170323061 | USER INTERFACES FOR MEDICAL DOCUMENTATION SYSTEM UTILIZING AUTOMATED NATURAL LANGUAGE UNDERSTANDING - In a system with a display and an input device, a graphical user interface (GUI) may be presented via the display. A natural language understanding engine may be applied to a free-form text documenting a clinical patient encounter, to automatically derive one or more engine-suggested medical billing codes, which may be presented in the GUI. User input may be accepted to approve at least one of the engine-suggested codes and/or to enter one or more user-added codes in the GUI, resulting in a set of user-approved codes. The set of user-approved codes may be automatically correlated to a diagnosis related group (DRG) for the patient encounter, which may be displayed. In response to user input changing the set of user-approved codes by approving or removing approval of an engine-suggested code in the GUI, the DRG may be automatically updated, and the updated DRG for the patient encounter may be displayed. | 2017-11-09 |
20170323062 | USER GUIDANCE SYSTEM AND METHOD, USE OF AN AUGMENTED REALITY DEVICE - The present disclosure relates to an augmented reality based user guidance system for multi-step medical procedures, the system comprising an augmented reality device ( | 2017-11-09 |
20170323063 | IDENTIFYING AND RANKING RISK FACTORS USING TRAINED PREDICTIVE MODELS - Embodiments are directed to methodologies, systems and computer program products for generating, for each of a plurality of risk factors in a patient database containing information of a plurality of patients, an index of input values for the risk factor. For each patient P of the plurality of patients, a series of local impact scores is computed for the patient. Computing the series of local impact scores for the patient includes calculating a risk score for the patient with respect to each of the indexed input values for each of the plurality of risk factors. For at least one of the plurality of patients, at least some of the plurality of risk factors are ranked based at least partly on the computed local impact scores for each of the at least some risk factors, and an indication of the ranked risk factors for the at least one patient is provided. | 2017-11-09 |
20170323064 | SYSTEMS AND METHODS FOR AUTOMATED MEDICAL DIAGNOSTICS - Presented are systems and methods that provide patients with diagnostic measurement tools and clear and concise audio/video guidance to reliably and accurately perform clinical grade diagnostic measurements of key vital signs. In various embodiments, this is accomplished by using an automated remote (or local, e.g., in the form of a kiosk) end-to-end medical diagnostic system that monitors equipment usage for accuracy. The diagnostic system analyzes patient responses, measurement data, and patient-related information to generate diagnostic and/or treatment information that may be shared with healthcare professionals and specialists, as needed. Automation provides for timely, hassle-free, and cost-effective health care management that takes the stress out of doctor visits, while delivering personalized health care. The high accuracy of generated diagnostic data improves health care to patients and reduces the risk of medical malpractice for treating physicians. | 2017-11-09 |
20170323065 | ANALYSING TEXT-BASED MESSAGES SENT BETWEEN PATIENTS AND THERAPISTS - A computer-implemented method comprising: obtaining text from text-based messages sent between a patient and a therapist providing psychological therapy; determining at least one feature of the text; and determining a characteristic of the patient and/or the therapist using the at least one feature. | 2017-11-09 |
20170323066 | HEALTHCARE PROVISION SYSTEMS AND METHODS - Aspects and embodiments are generally directed to systems and methods for generating and organizing the development of healthcare cases between at least a patient device and a physician device. In one example, a method includes receiving a healthcare request from a patient device, the healthcare request being associated with a healthcare case and including a request for a medical diagnosis, assigning the healthcare case to a physician, routing the healthcare request to a physician device of the physician, receiving a response to the healthcare request from the physician device, the response including at least a healthcare module that specifies one or more healthcare service operations that require approval by the patient device prior to execution, transmitting the response including the healthcare module to the patient device, and holding the one or more healthcare service operations in abeyance until the approval is received from the patient device. | 2017-11-09 |
20170323067 | METHOD AND APPARATUS FOR GUIDING PATIENTS TOWARD HEALTHCARE GOALS - System and method for guiding patients toward completion of recommended healthcare actions based on the individual patient's profile, as well as incorporating aggregate patient population data (e.g., generally accepted or current best practices) in one or more healthcare fields for driving the recommendations to the patient population most likely to benefit from such practices. In addition, the system/method allows different providers (e.g., healthcare providers, insurance providers, and other providers) to establish their own rules for their own subsets of patients. The system/method may include monitoring and tracking patient completion of the recommended actions. | 2017-11-09 |
20170323068 | WEARABLE DEVICE FOR REAL-TIME MONITORING OF PARAMETERS AND TRIGGERING ACTIONS - A system provides healthcare monitoring and actuation of a user. The system establishes, via the distributed network, an operative communication channel with a wearable device of a user; generates and transmit a healthcare application to the wearable device via the operative communication channel; authenticates the wearable device at a first time based on at least receiving the indication that the user is in possession of the wearable device; determines that the user continues to remain in possession of the wearable device; identifies one or more trigger events associated with the user, wherein the one or more trigger events comprise healthcare trigger events, activity trigger events and location trigger events; and initiates one or more proactive response actions in response to the one or more trigger events. | 2017-11-09 |
20170323069 | SYSTEMS AND METHODS FOR MEDICAL INSTRUMENT PATIENT MEASUREMENTS - Presented are systems and methods that provide diagnostic measurement tools that enable even laymen to reliably and accurately perform clinical-grade diagnostic measurements of key vital signs with little or no intervention by a health care professional. In various embodiments, this is accomplished by using an automated medical diagnostic system that provides clear and concise audio/video guidance to the patient and monitors the patient's equipment usage to generate high-accuracy measurement data that may be analyzed locally and shared with health care professionals and specialists, as needed. | 2017-11-09 |
20170323070 | System and Method for Integration of Telemedicine into Mutlimedia Video Visitation Systems in Correctional Facilities - A system and method for integration of telemedicine into multimedia video visitation systems of correctional facilities is disclosed herein. The system includes a telemedicine center that communicates with a medical center located at a correctional facility and a physician kiosk remote to the correctional facility. The medical center includes an inmate kiosk and a medical assistant station. The inmate kiosk and physician kiosk participate in a secure video call as part of an appointment between the inmate and physician. The inmate kiosk coordinates with the telemedicine center to verify an identity of the inmate. The inmate kiosk interfaces with a number of medical sensors and communicates data collected from the sensors to the physician kiosk. | 2017-11-09 |
20170323071 | SYSTEMS AND METHODS FOR GENERATING MEDICAL DIAGNOSIS - Presented are systems and methods that provide diagnostic measurement tools that enable even laymen to reliably and accurately perform clinical-grade diagnostic measurements of their key medical instrument measured data with little or no intervention by a health care professional and to engage in some level of self-diagnosis to detect acute conditions, previously the exclusive domain of health care professionals. In various embodiments, this is accomplished by using an automated remote (or local, e.g., in the form of a kiosk) medical diagnostic system that provides clear and concise audio/video guidance to the patient and monitors the patient's equipment usage to generate high-accuracy measurement data that utilizes a diagnostic engine to provide an output of potential diagnosis that may be analyzed locally and shared with health care professionals and specialists, as needed. | 2017-11-09 |
20170323072 | METHOD FOR EXTRACTING HEART INFORMATION BASED ON MICRO MOVEMENTS OF HUMAN BODY - A method of extracting heart information from a body micro-movement is provided. The method includes a face tracking step, a frame difference averaging step, smoothing filtering step, and a sliding peak detection step. | 2017-11-09 |
20170323073 | METHOD AND SYSTEM FOR ESTABLISHING NETWORK CONNECTION TO A WEARABLE EEG MONITORING MODULE - A system and a method for providing a network connection for a computer device ( | 2017-11-09 |
20170323074 | On-Demand All-Points Telemedicine Consultation System and Method - An on-demand all-points telemedicine (APTM) system for a patient presenting site (PPS) includes a patient data server configured to store encrypted patient electronic medical records, a web server configured to store web pages of a web portal, and APTM equipment disposed in patient presenting sites. The APTM equipment includes a microprocessor executing an APTM application, a communication interface configured to interface with the patient data server and the web server, a video camera that captures video and still images and sound, a display screen that displays video and still images and electronic medical record data, patient examination/monitoring devices, and a user interface device that receives user input. The APTM system employs an application for execution on a computing device and configured for communicating with the plurality of APTM equipment and the patient data server to exchange electronic medical records, still and video data, messages, and control data. | 2017-11-09 |
20170323075 | IDENTIFYING AND RANKING RISK FACTORS USING TRAINED PREDICTIVE MODELS - Embodiments are directed to methodologies, systems and computer program products for generating, for each of a plurality of risk factors in a patient database containing information of a plurality of patients, an index of input values for the risk factor. For each patient P of the plurality of patients, a series of local impact scores is computed for the patient. Computing the series of local impact scores for the patient includes calculating a risk score for the patient with respect to each of the indexed input values for each of the plurality of risk factors. For at least one of the plurality of patients, at least some of the plurality of risk factors are ranked based at least partly on the computed local impact scores for each of the at least some risk factors, and an indication of the ranked risk factors for the at least one patient is provided. | 2017-11-09 |
20170323076 | SOCIAL HEALTH RISK ESTIMATION - A method, a processing device, and a computer program product are provided. In various embodiments, one or more processing devices retrieves one or more network communications. The one or more network communications are analyzed, by the at least one processing device, and identifies objects referred to in the network communications having frequent physical contact with different entities. A resulting health risk is produced by aggregating the health risk for each identified object. Based on the resulting health risk, a modified course of action for an entity is advised. | 2017-11-09 |
20170323077 | PRIVACY-COMPLIANT ANALYSIS OF HEALTH BY TRANSACTION DATA - Health-related data is accessed; as is a database of payment card transaction data. At least a portion of the health-related data is linked to at least a portion of the payment card transaction data to obtain linked data. Statistical analysis is carried out on the linked data, and the results of the statistical analysis are made available to at least one appropriate party. Privacy is protected, for example, via an opt-in approach or through data aggregation. | 2017-11-09 |
20170323078 | Automated Systems and Methods for Obtaining, Storing, Processing and Utilizing Immunologic Information of an Individual or Population for Various Uses - A system and method for assessing the immunological status of one or more individuals in a patient population is presented. The method includes establishing a database comprising a plurality of records of information each representative of the immune status of an individual in the population, each of said records including (1) current information from one or more assays for the presence of a biochemical, and (2) individual specific information comprising one or more of said individual's medical history, said individual's doctors' observations and historical, demographic, lifestyle, and familial information relating to said individual. The method further includes processing the information in said database to find trends or patterns relating to the immune status of individuals in said patient population; and using the said trends or patterns as part of a health care related decision making process. | 2017-11-09 |
20170323079 | METHOD FOR PROCESSING AN INPUT FOR CONTROLLING AN INFUSION OPERATION - A method for processing an input into a control device ( | 2017-11-09 |
20170323080 | DISEASE THERAPY GAME TECHNOLOGY - A video game in possession of and/or in the proximity of a patient. The patient computing system receives an indication that it is to begin a game, and executes the game using identified game parameters that are associated with the patient by a clinician as part of a disease therapy program. As the game executes, game state progresses in response to physical activity of the patient, causing the patient to exercise. The physical activity is received as input into the patient computing system. Such input causes game state to be progressed dependent on the identified game parameters that are associated with the game. Thus, the game is tailored for the patient by a clinician in order to motivate physical activity that is medically beneficial to the patient in order to advance through the disease therapy program. | 2017-11-09 |
20170323081 | GRAPHICAL USER INTERFACES RECOMMENDING CARE - Media, method, and system are described for generating a graphical user interface reflecting patient experience data. Particularly, embodiments describe behavior and satisfaction data from a hospital used to generate a prioritized task list graphical user interface. The graphical user interface may be presented at a separate location of care from the location at which behavior data was recorded. | 2017-11-09 |
20170323082 | SYSTEM TO DYNAMICALLY COLLECT AND SYNCHRONIZE DATA WITH MOBILE DEVICES - The invention enables bi-directional mobile communication by researchers, clinicians or counselors with their patients and study participants. An exemplary application is ecological momentary assessment of psychological and physical status related to weight management. The system may be combined with objective information to trigger a communication and enhance responses assessed on food choices, dietary intake, physical activity, exertion, mood and companions. | 2017-11-09 |
20170323083 | SYSTEMS AND METHODS FOR DRUG DEVELOPMENT - Systems and methods are provided for drug development under a fully transparent development model. The model is configured to provide transparency to the patients, the researchers, clinicians, physicians, and any other registered users of the system who wish to contribute. According to various embodiments, the system and model enable drug development that leverage the combined wisdom and insight of the user population eliminating many of the drawbacks of conventional development approaches. In one embodiment, the system includes drug development engine configured to manage execution of parameters of a clinical trial, including collection of health and treatment information from a patient population. The development engine can publish collected execution data for review and analysis. | 2017-11-09 |
20170323084 | Determining an Apparent Molecular Weight for a Depth Interval for a Wellbore - An initial value is set for an apparent molecular weight. Iterating occurs on calculations to determine a converged value for the apparent molecular weight, including the following. A specific gas gravity is determined. Pseudo-critical gas properties are determined. A pseudo-reduced gas pressure and temperature are determined. A gas deviation factor is determined using the pseudo-reduced gas properties. An average pressure, an average temperate, and a pressure gradient are determined for each depth interval. A new apparent molecular weight is determined. The absolute value of a relative error between a current value of the apparent molecular weight and the new apparent molecular weight is determined. If the absolute value of the relative error has converged to a constant, the iterating is terminated. | 2017-11-09 |
20170323085 | FRESH WATER ACUTE CRITERIA PREDICTION METHOD BASED ON QUANTITATIVE STRUCTURE-ACTIVITY RELATIONSHIP FOR METALS - The present invention relates to a fresh water acute criteria prediction method based on a quantitative structure-activity relationship for metals. An unknown toxic endpoint of a metal is predicted according to a quantitative relationship between structural characteristics of heavy metal ions and acute toxicity effects of aquatic organisms, and hazard concentrations for protecting the aquatic organisms of different proportions are derived from sensitivity distribution analysis on different species. The fresh water acute criteria prediction method is a method for establishing a metal toxicity predictive model by integrating physicochemical structural parameters of heavy metals and toxic mechanisms of different aquatic organisms and applying the metal toxicity predictive model to prediction of an unknown criteria reference value. | 2017-11-09 |
20170323086 | GROUP-BASED EXTERNAL SHARING OF ELECTRONIC DATA - A computing system that provides access to electronic content includes a processor, a data store, and a user interface component. The data store is coupled to the processor and configured to store the electronic content. The user interface component is coupled to the processor and configured to generate a user interface allowing an internal user to generate a sharing request to share electronic content with an external user. The processor is configured to determine whether the internal user is a member of a group that is allowed to externally share content and to inhibit external sharing of the electronic content if the internal user is not a member of the group that is allowed to externally share the electronic content. | 2017-11-09 |
20170323087 | METHODS AND APPARATUS FOR DEVICE AUTHENTICATION AND SECURE DATA EXCHANGE BETWEEN A SERVER APPLICATION AND A DEVICE - In some embodiments, a method includes sending an authentication request to a client device to obtain a utilization code in response to a request from the client device to access data. The utilization code is uniquely associated with the client device. The method includes obtaining an authentication response including the utilization code from the client device and authenticating the client device if the utilization code matches a utilization identifier stored in a database. The method includes generating an encryption key using a seed based at least in part on the utilization code and encrypting the data with the encryption key to generate encrypted data and sending, when the utilization code matches the utilization identifier stored in the database, the encrypted data to the client device without requiring a user of the client device to login. | 2017-11-09 |
20170323088 | DIGITAL MEDIA REPRODUCTION AND LICENSING - Systems and methods for monetizing the reproduction of digital media content for the rights-holders of the digital media content. Embodiments of the present disclosure relate to determining whether a user of a media content item has a license to reproduce the media content item. In one embodiment, the media content item may be reproduced when the user is licensed. The user is prompted to select to acquire a license to reproduce the media content item or to decline the license to reproduce the media content item when the user is not licensed. Further embodiments determine whether a user may receive a license when the user wishes to acquire a license. In an embodiment, the user is declined a license when not approved for the license. | 2017-11-09 |
20170323089 | SYSTEMS AND METHODS FOR DOMAIN-DRIVEN DESIGN AND EXECUTION OF MODULAR AND DYNAMIC SERVICES, APPLICATIONS AND PROCESSES - A context of one or more interactions is determined. Base objects are transformed into interpreted objects by interpreting the base objects based on evaluation of the context, and by resolving references of the base objects relative to domain model types and concepts, each of the base objects modeled using a same declarative modeling language, the same declarative modeling language enabling transitions between the interpreted objects, at least one of the interpreted objects including at least one post-condition providing hooks for transition policies which allow the at least one of the interpreted objects to be logically chained in a non-linear process. Transitioning between at least two of the interpreted objects by chaining the at least two interpreted objects based on a particular post-condition of a particular interpreted object to create at least a portion of a particular non-linear process. At least a portion of the particular non-linear process is executed. | 2017-11-09 |
20170323090 | Dynamic Authentication Method - The present invention provides a dynamic authentication method ( | 2017-11-09 |
20170323091 | OPERATING DEVICE AND OPERATING METHOD - When a user's finger is pressed on a fingerprint reading region in which fingerprint information of the user's finger is read, a user authentication unit ( | 2017-11-09 |
20170323092 | METHOD AND SYSTEM OF USING SPATIALLY-DEFINED AND PATTERN-DEFINED GESTURING PASSWORDS - Exemplified herein is a system and method to accept password on a touch-screen HMI (human-machine interface) device. The system and method uses a combination of tactile gestures that are each received at predefined quadrants (or regions) or the touch-screen. The combination of such tactile gestures and quadrant information are used as an authentication sequence to allow or enable access to control screens that manages operations of a nearby subsystem. | 2017-11-09 |
20170323093 | VERIFICATION METHOD AND APPARATUS FOR DISTINGUISHING MAN FROM MACHINE - The present disclosure provides a verification method for distinguishing a man from a machine, wherein the method comprises: S1: receiving trajectory information input by a terminal; S2: comparing the trajectory information with a preset trajectory; S3: judging whether verification passes at least from dimensionality of a comparison result of the trajectory information and the preset trajectory. As compared with the prior art, the verification method and apparatus for distinguishing a man from a machine in the present disclosure may recognize user identity through simpler operation, and particularly applied to the mobile device, may bring about better user experience, and meanwhile exhibit very high security and difficulty in cracking the machine. | 2017-11-09 |
20170323094 | INCORPORATING MULTIPLE AUTHENTICATION SYSTEMS AND PROTOCOLS IN CONJUNCTION - Embodiments of the disclosure provide a method of incorporating multiple authentication systems and protocols. The types of authentication systems and protocols can vary based on desired assurance levels. A Centralized Authentication System together with an authentication policy dictates acceptable authentication systems. Authorization data for each authorization system are captured and packaged into a single Object Data Structure. The authorization data can be compared to data stored in an identity store for authentication. The authorization data can also be used for user and device registration and for transferring an authentication or registration token from a previously authenticated and registered device to a new device. | 2017-11-09 |
20170323095 | METHOD AND SYSTEM FOR ENTERPRISE NETWORK SINGLE-SIGN-ON BY A MANAGEABILITY ENGINE - A manageability engine (ME) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (KDC), indicating that the user has successfully authenticated to the PC. The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key (KEK). The KEK may later be used by the PC to obtain a credential used to establish secure access to Enterprise servers. | 2017-11-09 |
20170323096 | METHODS, MEDIA, AND SYSTEMS FOR DETECTING ATTACK ON A DIGITAL PROCESSING DEVICE - Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program. | 2017-11-09 |
20170323097 | DISPLAY APPARATUS AND METHOD FOR CONTROLLING DISPLAY APPARATUS THEREOF - A display apparatus which determines a screen to be displayed when a power-on command is input, and method thereof, is provided. The display apparatus includes a display configured to display a content; an input unit configured to receive a command; and a controller configured to: in response to a power-off command being input while a content is displayed, determine whether or not the displayed content is appropriate to be subsequently displayed when a power-on command is input; in response to determining that the displayed content is not appropriate to be subsequently displayed when the power-on command is input, store a predetermined initial screen; in response to determining that the displayed content is appropriate to be subsequently displayed when a power-on command is input, store the displayed content; and in response to a power-on command being input, control the display to display the predetermined initial screen or the displayed content. | 2017-11-09 |
20170323098 | INFORMATION ASSURANCE SYSTEM FOR SECURE PROGRAM EXECUTION - An enhanced information assurance system may comprise an improved computer including a central processing unit (CPU) emulator configured to extend the available machine instruction set. The CPU emulator may be configured to emulate machine language instructions taken from a nonnative set of secure opcodes. The CPU emulator may ensure that instructions and data in random access memory (RAM) remain encrypted at all times when in RAM, for example by storing the instructions and data in CPU registers when decrypted on an as-needed basis. | 2017-11-09 |
20170323099 | Device, System, and Method of Obfuscating an Un-obfuscated Visual Content Displayed on a Mobile Device - A message is received via a first mobile device. The message is sent from a second mobile device. The message contains unobfuscated visual content. The un-obfuscated visual content is displayed on a screen of the first mobile device. A detection is made via the first mobile device that a first user of the first mobile device made one or more engagements with the first mobile device. Based on the detecting, a determination is made that the first user is attempting to screenshot the un-obfuscated visual content via the first mobile device. In response to the determining, the un-obfuscated visual content displayed on the screen of the first mobile device is obfuscated. | 2017-11-09 |
20170323100 | METHOD, APPARATUS AND STORAGE MEDIUM FOR DEFENDING AGAINST MALICIOUS CLICKS - The present invention discloses a method, apparatus and a storage medium for defending against malicious clicks. The method includes: acquiring a shielding policy corresponding to promotional content; determining a user in a shielding policy list as the user to be shielded based on the shielding policy and historical click information of users; and performing shielding processing on the promotional content for the user to be shielded, if the user to be shielded in the shielding policy list conducts a retrieval. According to the technical solution provided by the embodiments of the present invention, malicious clicks are prevented at the stage of displaying promotional content in a front end of a server. On one hand, it is possible to determine malicious clicks based on real-time click information and provide a timely and effective defense, improving the timeliness of the defense; on the other hand, the shielding policy may be set by the businesses, enhancing the independence of the business in preventing malicious clicks. | 2017-11-09 |
20170323101 | DYNAMICALLY OPTIMIZING PERFORMANCE OF A SECURITY APPLIANCE - A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat prediction model associated with a set of security functions, a set of predicted threat scores. The device may determine, based on the set of predicted threat scores, a set of predicted utility values. The device may determine a set of costs corresponding to the set of security functions. The device may determine a set of predicted efficiencies, associated with the set of security functions, based on the set of predicted utility values and the set of costs. The device may identify, based on the set of predicted efficiencies, a particular security function, and may cause the particular security function to be executed on the unknown object. The device may determine whether another security function is to be executed on the unknown object. | 2017-11-09 |
20170323102 | DNS BASED INFECTION SCORES - Systems and methods associated with domain name system (DNS) based infection scores. One example method includes maintaining query profiles for members of a set of clients in a network. The query profiles may be maintained based on DNS queries sent from the members of the set of clients, and on DNS responses received by the members of the set of clients. The method also includes generating infection scores for the members of the set of clients based on their respective query profiles. The method also includes prioritizing a vulnerable member of the set of clients for remedial action. The vulnerable member may be prioritized based on infection scores of members of the set of clients. | 2017-11-09 |
20170323103 | METHOD AND APPARATUS FOR SELECTIVELY ENABLING A MICROPROCESSOR-BASED SYSTEM - A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value. In this manner, the designer or distributor of the system can determine, at the time of manufacture or distribution, the conditions and circumstances under which the system may be operated. | 2017-11-09 |
20170323104 | SECURELY BOOTING A COMPUTER FROM A USER TRUSTED DEVICE - A method for allowing a computer to boot from a user trusted device is provided. The computer includes a long-term data storage device storing operating system (OS) services. The user trusted device is connectable to the computer and stores a boot loader detectable and executable by a firmware of the computer, an OS loader designed to load an OS of the computer, and one or more crypto drivers designed for allowing access to the OS and data stored encrypted on the data storage device. The method comprises letting the boot loader be executed to cause to transfer the OS loader from the user trusted device to the computer and executing the transferred OS loader to cause to execute the one or more crypto drivers for the OS and the data stored encrypted on the data storage device to start the OS services and complete booting of the computer. | 2017-11-09 |
20170323105 | VIRTUAL MACHINE CREATION METHOD AND APPARATUS - A virtual machine creation method and apparatus are disclosed. The method includes: acquiring a first installation package of a first application; determining essential environmental data corresponding to the first installation package; obtaining a simplified operating system via compilation according to the essential environmental data; packaging the simplified operating system and the first installation package to obtain a virtual machine installation package; and running the virtual machine installation package to create a virtual machine. | 2017-11-09 |
20170323106 | SYSTEM AND METHOD FOR ENCRYPTING DATA IN ELECTRONIC DOCUMENTS - A system and method for encrypting data in an electronic document. The method includes analyzing the electronic document determine at least one transaction parameter for the electronic document, wherein the electronic document includes at least partially unstructured data; creating a template for the analyzed electronic document, wherein the template is a structured dataset including the determined at least one transaction parameter; determining, based on the template, at least one portion of the electronic document to be encrypted; and customizing the electronic document by encrypting the determined at least one portion. | 2017-11-09 |
20170323107 | PROGRAM MANAGEMENT SYSTEM - The invention relates to a system for providing an automated program management framework for an enterprise based on the enterprise's operations, infrastructure, and user-based processes, as well as industry-specific rules and regulations associated with the enterprise. The system is configured to generate recommendations or instructions based on correlation of enterprise's operations, infrastructure, and user-based processes with industry-specific rules and regulations. The recommendations or instructions are then provided to a user associated with the enterprise so as to facilitate actions to be taken to address a potential threat, hazard or risk. | 2017-11-09 |
20170323108 | METHODS, DEVICES AND SYSTEMS FOR CONTROLLING ACCESS TO DATA - The present invention provides a method of notifying a user of a request for data controlled by a server, the method including the steps of: monitoring, at the server, requests for data controlled by the server; and if a data request is detected which corresponds to a predetermined type of data request, notifying the user of the detected data request via a haptic feedback mechanism provided on a wearable device which is communicably coupled with the server. Embodiments of the invention relate to a wearable device and a system including the server and the wearable device. Embodiments of the invention allow users to be informed non-obtrusively of a potential privacy breach in real-time and may also allow a user to control in a non-intrusive (e.g. eyes-free) manner whether access is given to personal data. | 2017-11-09 |
20170323109 | DIGITAL PAYLOAD SHARING PROTECTION - A computing device includes a network interface, a storage controller, a sharing tool and a protection service. The network interface communicatively couples the computing device to one or more computing devices. The storage controller is configured to access a plurality of digital payloads. Each of the digital payloads is associated with a plurality of access tags including content tags and context tags. The sharing tool is configured to share, with a recipient computing device via the network interface, a selected digital payload. The protection service configured to automatically control sharing of the selected digital payload with the recipient computing device based on determining that a prospective recipient associated with the recipient computing device has a work designation or a personal designation that is inconsistent with one or both of a context indicated by the context tags and a content indicated by the content tags. | 2017-11-09 |
20170323110 | DYNAMICALLY EXCLUDING SENSITIVE INFORMATION FROM SYSTEM SNAPSHOT - Technical solutions are described for generating a secured system snapshot of a system. An example computer-implemented method includes receiving an instruction to generate a system snapshot. The system snapshot captures data from a computer executable object loaded in a memory. The method also includes accessing metadata that is associated with the computer executable object from a mapping list. The method also includes capturing the secured system snapshot by. Capturing the secured system snapshot includes determining sensitivity of the computer executable object by comparing the metadata with a predetermined criteria, and excluding a capture of sensitive data from the computer executable object into the system snapshot in response to the metadata of the computer executable object matching the predetermined criteria. The method also includes storing the secured system snapshot. | 2017-11-09 |
20170323111 | DATA MANAGEMENT FOR A MASS STORAGE DEVICE - Disclosed aspects relate to data management for a mass storage device. The mass storage device may be structured to include an encrypted file system to store a set of data and a token analyzer to manage access to the encrypted file system. A connection between the mass storage device and a computing device may be sensed. In response to sensing the connection, a token corresponding with the computing device may be detected. Based on the token, the token analyzer may determine to provide the computing device a set of selected permissions to the encrypted file system. The set of selected permissions to the encrypted file system may be provided by the mass storage device to the computing device. | 2017-11-09 |
20170323112 | EXTERNAL ACCESS TO DATABASE CONTAINER ARTIFACTS - A database includes a run-time database container, which provides an isolated computing environment for a database object deployed therein. The database further includes a public synonym object outside the run-time database container in the database. The public synonym object is associated with the database object deployed inside the run-time database container and provides external access to the database object deployed inside the run-time database container independent of the location of the run-time database container. | 2017-11-09 |
20170323113 | AUTOMATED DEPLOYMENT AND SECURITIZATION OF MODEL-BASED COMPOSITE APPLICATIONS - A computer implemented method of deploying a software application in a virtualized computing environment, comprising: receiving a description of the software application including an identification of a set of one or more application software resources; determining one or more types of security facility required for the set of application software resources and determining a security requirement for each of the determined types of security facility; selecting a security software resource for each of the determined types of security facility; determining a security configuration for each of the selected security software resources, the security configuration being based on a security requirement associated with a type of security facility for the security software resource; and generating a deployment specification for the software application specifying the application software resources and the security software resources for deployment of the application in the virtualized computing environment, each of the security software resources having associated the determined security configuration. | 2017-11-09 |
20170323114 | ENCRYPTION FOR DISTRIBUTED STORAGE AND PROCESSING - Provided is a process of securing data in a distributed storage and processing application, the process including: obtaining a cluster of computing nodes, wherein: the cluster stores a plurality of ciphertexts; accessing a transformation key with a first computing node; transforming the ciphertext with the first computing node based on the transformation key into a transformed ciphertext configured to be decrypted with a temporary access key; decrypting the transformed ciphertext with the second computing node based on the temporary access key to obtain plaintext data. | 2017-11-09 |
20170323115 | METHOD AND APPARATUS FOR REMOTELY DELETING INFORMATION - The present application relates to the field of communications. A method and apparatus for remotely deleting information are provided. In some embodiments, the method includes: when a user logs in to a terminal and requests enabling a remote deletion function, acquiring a permission for deleting all information; receiving an all information deletion command sent by a server after the user performs remote login; and performing, according to the command and the permission, an operation of deleting all information in the terminal. In some embodiments, the apparatus includes an acquiring module, a reception module, and a deletion module. | 2017-11-09 |
20170323116 | USE OF AKA METHODS AND PROCEDURES FOR AUTHENTICATION OF SUBSCRIBERS WITHOUT ACCESS TO SIM CREDENTIALS - Systems and methods which enable an authentication procedure to be used within the standard network security architecture to authenticate third party applications that are forbidden access to a particular secret key are disclosed. Third party smartphone applications that are unable to use SIM-based authentication due to being forbidden access to a SIM-based key are provided an alternate secret key for use in an EAP-AKA or EAP-SIM type procedure according to embodiments. An authentication server or other backend authentication infrastructure of embodiments requests authentication vectors from a backend system sharing the alternative secret key. Accordingly, the backend authentication platform of embodiments is adapted to know or detect that an application is using an alternative secret key (e.g., a secret key other than the SIM-based secret key) and to perform the appropriate procedure for the key type. | 2017-11-09 |
20170323117 | SHARED IDENTITY MANAGEMENT (IDM) INTEGRATION IN A MULTI-TENANT COMPUTING ENVIRONMENT - Techniques are disclosed for enabling tenant hierarchy information to be migrated directly between different multi-tenant system (e.g., from a shared IDM system to a Nimbula system, or vice versa). A corresponding new tenant is created in a Nimbula system based on a combination of the tenant information and the service information from the shared IDM system. The Nimbula system extracts the tenant name and the service name from a request and asks the shared IDM system to verify that the user actually is a member of the tenant identified by the extracted tenant name. Upon successful authentication of the user, the Nimbula system requests the IDM system for roles that are associated with both the user and the extracted service name. The Nimbula system enable access to the service upon determining whether the requested operation can be performed relative to the specified service based on the roles. | 2017-11-09 |
20170323118 | Apparatus and Method for Private Information Retrieval - Apparatuses and methods for private information retrieval are provided. One example method may include receiving a query state machine that is an encoding of a search pattern. The query state machine may include a plurality of states and a transition function that defines a plurality of transitions based on the search pattern. The example method may also include performing a private query against a target query string of a target query record by applying the query state machine to the target query string to develop a private encoding. The method may further include transmitting query results based on the private encoding. | 2017-11-09 |
20170323119 | SYSTEMS AND METHODS FOR DYNAMIC MASKING OF DATA - Embodiments disclosed herein may be useful for controlling access to data, and particularly to data intended for restricted access. In at least one embodiment, a system and method for dynamic data masking intercepts input/output (I/O) read requests for data in external memory, determines if the data to be read should be masked, and appropriately, dynamically masks data before the requested data is written into system memory. The system and method for dynamic data masking provides a technical improvement to computing systems by, for example, avoiding the need to create an entirely separate database with scrubbed data and, thus, resource and costs associated with creating a separate, scrubbed database. | 2017-11-09 |
20170323120 | METHOD AND APPARATUS FOR DYNAMIC EXECUTABLE VERIFICATION - A method and apparatus for Dynamic Executable Verification (DEV) is disclosed that includes a random prefix of functions of a binary application, a check function for at least a subset of the functions and a jump table for at least a subset of the functions. DEV provides low-impact dynamic integrity protection to applications that is compatible with standard code signing and verification methods, and ensures that software cannot be tampered with either statically or dynamically without detection. | 2017-11-09 |
20170323121 | STORAGE DEVICE TAMPERING DETECTION - Apparatus ( | 2017-11-09 |
20170323122 | LOW-PROFILE CARD READER - A low-profile card reader, including: a carriage; a single support arm including a first end statically mounted to the carriage, a second end, free from the carriage, a body tapering from the second end toward the first end, wherein the body is free from the carriage, such that the support arm freely deflects along a support arm length relative to the carriage, and a set of strengthening channels extending along the support arm length; and a magnetic reading head statically connected to the second end of the support arm. | 2017-11-09 |
20170323123 | TAG-BASED LOCATING - Methods and apparatus relating to processing a low-energy data packet are provided. A method includes receiving, using a receiver in a portable wireless device, a low-energy data packet from a low-energy tag. The portable wireless device is stationary. The low-energy data packet includes data identifying the low-energy tag. The method can also include determining at least an approximate distance between the low-energy tag and the portable wireless device. The method can also include transmitting, via an intermediate wireless device and to a central device, the data identifying the low-energy tag, the data identifying the at least approximate distance, or both. | 2017-11-09 |
20170323124 | METHOD FOR PREVENTING UNAUTHORIZED DIVERSION OF NFC TAGS - A method, system and apparatus for pairing authorized NFC enabled RFID devices with an intended object or product. The method, system and apparatus can include a primary RFID with a radio frequency identification chip, a coil antenna, a bridge and a substrate; an association of the at least primary RFID device with an object; an integration of a material into one of the at least primary RFID device and the object that provides the RFID device with a predetermined resonant frequency; and the detuning of one or more secondary communication devices located proximate the RFID device. | 2017-11-09 |
20170323125 | Method and Device for Performing Spatial Positioning on Electronic Tag, 3D Signing and Human-Computer Interaction - Provided are a method and a device for performing spatial positioning on an electronic tag, 3D signature and human-computer interaction. The method for performing spatial positioning on an electronic tag includes: arranging at least three sets of three-dimensionally distributed array antennas on an electronic device, each set of array antennas including multiple antenna array elements extending in one dimension; turning on an electronic tag reader to generate a radio frequency electromagnetic field when spatial positioning is performed on an electronic tag; acquiring induced voltage generated on each antenna array element in each set of array antennas when it is sensed that there is an electronic tag in the radio frequency electromagnetic field; and determining spatial position information of the electronic tag according to the induced voltage. | 2017-11-09 |
20170323126 | METHOD AND APPARATUS FOR TRACKING ONE OR MORE PLANTS AND/OR PLANT BASED PRODUCTS AND/OR TRACKING THE SALE OF PRODUCTS DERIVED FROM THE SAME, UTILIZING RFID TECHNOLOGY - This invention is for tracking at least one plant. A method of this invention comprises: putting at least one seed or at least one stem in a corresponding at least one pot; positioning a corresponding at least one RFID tag with respect to the seed or stem in a manner, wherein the RFID tag comprises a strap; packaging a harvested material into a packaged product and attaching the RFID tag from the potted plant, or a product RFID tag that is associated with the plurality of tags to the packaged product; confirming a request for authorization by a RFID buy card; and after confirming ID information, transferring at least one product. | 2017-11-09 |
20170323127 | ADAPTIVE PROCESSING OF RADIO FREQUENCY IDENTIFICATION - Embodiments of the present disclosure relate to adaptive RFID communication. A tag device includes a storage configured to store content that is executable by a proxy device associated with a reader device. The tag device includes a communication component configured to transmit the content to the reader device, the content, when executed by the proxy device, causing an action associated with the tag device to be performed. | 2017-11-09 |
20170323128 | ARRANGEMENT FOR, AND METHOD OF, PROCESSING PRODUCTS ASSOCIATED WITH RFID TAGS AND BAR CODE SYMBOLS AT THE SAME WORKSTATION - A workstation has a metallic housing for supporting an electro-optical reader for reading bar code symbols. A radio frequency (RF) antenna of an RF identification (RFID) reader for reading RFID tags is mounted in a metallic container that is connected to the housing. The RF antenna radiates RF energy at a frequency greater than 900 MHz through RF excitation slots formed between the container and the housing. | 2017-11-09 |
20170323129 | Navigation Using Self-Describing Fiducials - In one embodiment, a self-describing fiducial includes a communication element that optically communicates navigation-aiding information. The navigation-aiding information may include a position of the self-describing fiducial with respect to one or more coordinate systems and the communication element communicates the navigation-aiding information to one or more navigating objects in the vicinity of the self-describing fiducial. | 2017-11-09 |
20170323130 | BIDIRECTIONAL ULTRASONIC SENSOR SYSTEM FOR BIOMETRIC DEVICES - An apparatus may include an ultrasonic receiver array, an ultrasonic transmitter and a control system capable of controlling the ultrasonic transmitter to transmit first ultrasonic waves in a first direction and to simultaneously transmit second ultrasonic waves in a second direction that is opposite the first direction. The control system may be capable of distinguishing first reflected waves from second reflected waves, the first reflected waves corresponding to reflections of the first ultrasonic waves that are received by the ultrasonic receiver array and the second reflected waves corresponding to reflections of the second ultrasonic waves that are received by the ultrasonic receiver array. The control system may be capable of determining first image data corresponding to the first reflected waves and of determining second image data corresponding to the second reflected waves. | 2017-11-09 |
20170323131 | BIOMETRIC SYSTEM WITH PHOTOACOUSTIC IMAGING - A biometric system may include an ultrasonic sensor array, a light source system and a control system. Some implementations may include an ultrasonic transmitter. The control system may be capable of controlling the light source system to emit light and of receiving signals from the ultrasonic sensor array corresponding to acoustic waves emitted from portions of a target object in response to being illuminated with the light emitted by the light source system. The control system may be capable of performing a user authentication process that is based, at least in part, on the signals from the ultrasonic sensor array. | 2017-11-09 |
20170323132 | BIOMETRIC SYSTEM WITH PHOTOACOUSTIC IMAGING - An apparatus may include an ultrasonic sensor array, a light source system and a control system. Some implementations may include an ultrasonic transmitter. The control system may be operatively configured to control the light source system to emit light that induces acoustic wave emissions inside a target object. The control system may be operatively configured to select a first acquisition time delay for the reception of acoustic wave emissions primarily from a first depth inside the target object. The control system may be operatively configured to acquire first ultrasonic image data from the acoustic wave emissions received by the ultrasonic sensor array during a first acquisition time window. The first acquisition time window may be initiated at an end time of the first acquisition time delay. | 2017-11-09 |
20170323133 | DEVICE MOUNTABLE PACKAGING OF ULTRASONIC TRANSDUCERS - An electronic device including an array of ultrasonic transducers for generating and receiving ultrasonic signals, and an acoustic coupling layer overlying the array of ultrasonic transducers, where the ultrasonic signals are propagated through the acoustic coupling layer. | 2017-11-09 |
20170323134 | CHARGE TRANSFER CIRCUIT FOR CAPACITIVE SENSING AND APPARATUS FOR DETECTING FINGERPRINT HAVING THEREOF - A charge transfer circuit for capacitive sensing according to an embodiment of the present disclosure includes a variable capacitor defined through a sensor plate connected to one end of a drive line and one end of an X-drive line, an X-drive part disposed between a voltage input terminal and another end of the X-drive line opposing the variable capacitor, a switched capacitor integrator disposed between a voltage output terminal and another end of the drive line of which the one end is connected to the variable capacitor, and a shielding plate connected to a first input terminal of the switched capacitor integrator, wherein the first input terminal is connected to the other end of the drive line. | 2017-11-09 |
20170323135 | METHOD AND ELECTRONIC DEVICE FOR DRIVING FINGERPRINT SENSOR - An electronic device includes: a wireless communication module configured to perform wireless communication in a first state; a fingerprint sensor configured to sense a fingerprint in a second state; and at least one processor electrically connected to the wireless communication module and the fingerprint sensor, wherein the processor changes the first state or the second state based on at least part of an operating state of the wireless communication module or the fingerprint sensor. | 2017-11-09 |
20170323136 | Fingerprint Detecting Circuit and Fingerprint Identification System - The present invention, belonging to a field of fingerprint detecting technology, relates to a fingerprint detecting circuit including: a first conductive layer; a second conductive layer; an inverting amplifier, comprising a single input terminal coupled to the first conductive layer; and an output terminal coupled to the second conductive layer; and a switching unit, configured for establishing a DC operating point of the inverting amplifier, wherein a terminal of the switching unit is coupled to the input terminal, and another terminal of the switching unit is coupled to the output terminal. The present invention utilizes the inverting amplifier with single input single output and the switching unit to quickly and correctly establish the DC biasing point of the inverting amplifier, and convert the sensing capacitance into the output signal. No need for another biasing circuit. The circuit structure thereof is simple and the accuracy is high. | 2017-11-09 |
20170323137 | METHOD AND SYSTEM FOR CALIBRATION OF A FINGERPRINT SENSING DEVICE - There is provided a method of initiating a calibration operation of a fingerprint sensing device comprising an array of sensing elements for sensing a fingerprint pattern, the method comprising acquiring information indicative of a change of an environmental parameter influencing the operation of the fingerprint sensing device; and if the change is larger than a predetermined threshold value, performing a calibration operation of the fingerprint sensing device. There is also provided a method of initiating a calibration operation of a fingerprint sensing device comprising an array of sensing elements for sensing a fingerprint pattern, the method comprising: receiving information indicative of an event in a device in which the fingerprint sensing device is arranged; if the event is one of a group of predetermined events, performing a calibration operation of the fingerprint sensing device. | 2017-11-09 |
20170323138 | METHOD AND SYSTEM FOR CALIBRATION OF A FINGERPRINT SENSING DEVICE - There is provided a method of initiating a calibration operation of a fingerprint sensing device comprising an array of sensing elements for sensing a fingerprint pattern, the method comprising acquiring information indicative of a change of an environmental parameter influencing the operation of the fingerprint sensing device; and if the change is larger than a predetermined threshold value, performing a calibration operation of the fingerprint sensing device. There is also provided a method of initiating a calibration operation of a fingerprint sensing device comprising an array of sensing elements for sensing a fingerprint pattern, the method comprising: receiving information indicative of an event in a device in which the fingerprint sensing device is arranged; if the event is one of a group of predetermined events, performing a calibration operation of the fingerprint sensing device. | 2017-11-09 |
20170323139 | FINGERPRINT IDENTIFICATION METHOD AND DEVICE THEREOF - A fingerprint identification method is provided. The method includes steps as follows: having a finger press on a photoelectronic sensor module; respectively emitting an invisible light beam reflected to a photoelectronic sensor module after passing through the finger and a visible light beam reflected to the photoelectronic sensor module via a surface of the finger; generating, by the photoelectronic sensor module, photocurrent signals based on the visible light beam and the invisible light beam; respectively generating, by an analog/digital converter module, a first digital signal and a second digital signal based on the photocurrent signals; and outputting, by a processor module, the first digital signal as a gray-scale fingerprint image and a second digital signal as a colored fingerprint image. The invention also provides a fingerprint identification device performing the fingerprint identification method. | 2017-11-09 |
20170323140 | OPTICAL SENSING MODULE AND FINGERPRINT SENSING DEVICE - An optical sensing module is configured to sense a fingerprint of a finger. The optical sensing module includes an image sensor, a light transmissive layer, and an image selecting layer. The light transmissive layer is disposed on the image sensor, and the image selecting layer is disposed on the light transmissive layer. When the finger touches a side of the optical sensing module adjacent to the image selecting layer, air in valleys of the fingerprint contacts the optical sensing module, so that the image selecting layer has a first transmittance for light from the valleys; ridge of the fingerprint contact the optical sensing module, so that the image selecting layer has a second transmittance for light from the ridges. The first transmittance is not equal to the second transmittance. A fingerprint sensing device is also provided. | 2017-11-09 |
20170323141 | WEARABLE DEVICE AND CONTROLLING METHOD THEREOF - Disclosed are a wearable device and controlling method thereof. The present invention includes a flexible surface light source, a photo panel located on a top surface of the flexible surface light source, and a controller coupled with the flexible surface light source and the photo panel. The controller is configured to detect a first biometric image by controlling the flexible surface light source and identify a user by comparing the detected first biometric image to a second biometric image previously saved in a memory. | 2017-11-09 |
20170323142 | FINGERPRINT SENSOR APPARATUS AND METHOD FOR SENSING FINGERPRINT - A fingerprint sensor apparatus including a fingerprint sensor and a processor circuit is provided. The fingerprint sensor is configured to capture a plurality of local fingerprint images of a fingerprint. The plurality of local fingerprint images include at least one first local fingerprint image and at least one second local fingerprint image. The processor circuit is electrically connected to the fingerprint sensor. The processor circuit is configured to identify the fingerprint according to the at least one first local fingerprint image of the local fingerprint images. The local fingerprint images form a global fingerprint image of the fingerprint. In addition, a method for sensing a fingerprint is also provided. | 2017-11-09 |
20170323143 | COMPACT SYSTEM FOR REGISTERING PAPILLARY RIDGE PATTERNS - The invention relates to the field of biometric identification. The technical result consists in decreasing the overall dimensions and increasing the reliability of a system for registering papillary ridge patterns, while providing for reduced cost, high image quality, rapid operating speed and reduced energy consumption. The present system comprises a light source, an element which defines the position of a reading surface, an optical system, and a multi-element image receiver, wherein the reading surface is optically linked to the image receiver by rays passing through a guiding optical element, comprising a refractive surface and a reflective surface, by means of consecutive refraction on the refractive surface, reflection on the reflective surface and total internal reflection on the refractive surface | 2017-11-09 |
20170323144 | FINGERPRINT IDENTIFICATION MODULE - A fingerprint identification module including a cover plate, a fingerprint identification sensor, a first adhesive layer, and at least one light source is provided. The cover plate has an inner surface, an outer surface opposite to the inner surface, and a plurality of microstructures located at the inner surface. The fingerprint identification sensor is located under the microstructures and attached to the microstructures through the first adhesive layer, wherein the first adhesive layer is adhered between a portion of the microstructures and a portion of the fingerprint identification sensor, and an air gap is located between the other portion of the microstructures and the other portion of the fingerprint identification sensor. The at least one light source is located under the inner surface and adjacent to the fingerprint identification sensor. | 2017-11-09 |
20170323145 | METHOD AND APPARATUS FOR AUTOMATICALLY RECOGNIZING INPUT AUDIO AND/OR VIDEO STREAMS - A method and system for the automatic identification of audio, video, multimedia, and/or data recordings based on immutable characteristics of these works. The invention does not require the insertion of identifying codes or signals into the recording. This allows the system to be used to identify existing recordings that have not been through a coding process at the time that they were generated. Instead, each work to be recognized is “played” into the system where it is subjected to an automatic signal analysis process that locates salient features and computes a statistical representation of these properties. These features are then stored as patterns for later recognition of live input signal streams. A different set of features is derived for each audio or video work to be identified and stored. During real-time monitoring of a signal stream, a similar automatic signal analysis process is carried out, and many features are computed for comparison with the patterns stored in a large feature database. For each particular pattern stored in the database, only the relevant characteristics are compared with the real-time feature set. Preferably, during analysis and generation of reference patterns, data are extracted from all time intervals of a recording. This allows a work to be recognized from a single sample taken from any part of the recording. | 2017-11-09 |
20170323146 | METHOD FOR ENCRYPTING APPLICATION AND TERMINAL - A method for encrypting an application and a related terminal may be provided. The method may include the follows. A pressure force of a touch operation performed on an icon of a target application is detected. First fingerprint information is obtained when the pressure force is greater than a preset pressure value. The target application is encrypted with the first fingerprint information. | 2017-11-09 |
20170323147 | FINGERPRINT DETECTION CIRCUIT AND FINGERPRINT RECOGNITION SYSTEM - The present invention provides a fingerprint detecting circuit applied in a fingerprint identification system, wherein the fingerprint identification system transmits a first signal to finger. The fingerprint detecting circuit includes a conductive layer to couple a touch from the finger; and an amplifier including a first input terminal coupled to the conductive layer; a second input terminal to receive a second signal; and an output terminal, wherein a first capacitance is between the output terminal and the first input terminal; wherein a phase of the first signal is inverse to a phase of the second signal. The present invention utilizes the two signals with the inverse phases to drive the fingerprint detecting circuit, so as to enhance strength of the output signal and lower hardness of fingerprint detecting. Power consumption and production cost are reduced, and the requirement of conventional voltage for the portable electronic device is satisfied. | 2017-11-09 |
20170323148 | DOT DETECTION, COLOR CLASSIFICATION OF DOTS AND COUNTING OF COLOR CLASSIFIED DOTS - The present disclosures relates to a method of detecting, classifying, and counting dots in an image of a tissue specimen comprising detecting dots in an image of the tissue sample that meet criteria for absorbance strength, black unmixed image channel strength, red unmixed image channel strength, and a difference of Gaussian threshold, wherein the detected dots correspond to in situ hybridization signals in the tissue samples; classifying the detected dots as belonging to a black in situ hybridization signal or to a red in situ hybridization signal; and calculating a ratio of those dots belonging to the black in situ hybridization signal and those belonging to the red in situ hybridization signal. | 2017-11-09 |
20170323149 | ROTATION INVARIANT OBJECT DETECTION - A method, including receiving a two-dimensional (2D) image of a three-dimensional (3D) object recorded at a first angle of rotation of the object, and identifying, in the 2D image, a set of image descriptors, each of the image descriptors including an image keypoint and one or more image features. The set of image descriptors are compared against sets of template descriptors for respective previously captured 2D images, each of the template descriptors comprising a template keypoint and one or more template features. Using a threshold, a given set of template descriptors matching the set of image descriptors are identified, the given set of template descriptors corresponding to a given previously captured 2D image of the 3D object recorded at a second angle of rotation of the object. Any of the image descriptors not in the given set of the template descriptors are added to the given set of template descriptors. | 2017-11-09 |