46th week of 2016 patent applcation highlights part 46 |
Patent application number | Title | Published |
20160335405 | METHOD AND SYSTEM FOR ANALYZING DIGITAL ACTIVITY - A method for determining a user's well-being based on a user's digital activity, the method having the steps of: associating said user with a unique identifier; logging each instance said device accesses said digital services or content; determining a type of said digital services or content being accessed by said user; capturing user generated content and device generated content; forming core data associated with said user derived from data associated with each of said steps; and analyzing said core data to determine whether elements within said core data are indicative of distress, and providing an alert when said elements exist. | 2016-11-17 |
20160335406 | SYSTEM AND METHOD FOR SELECTING A BARIATRIC SURGERY - This invention relates to a method and network system for selecting an appropriate bariatric surgery for a patient based upon baseline patient parameters. | 2016-11-17 |
20160335407 | APPARATUS AND METHOD FOR SELECTING HEALTHCARE SERVICES - There is provided an apparatus and method for use in selecting healthcare services for a user, the method comprising: providing ( | 2016-11-17 |
20160335408 | SYSTEMS AND METHODS FOR COMMUNICATING ORTHODONTIC TREATMENT INFORMATION - Systems and methods for communicating orthodontic treatment information are disclosed herein. The methods may include methods of delivering an informational resource corresponding to an orthodontic treatment instruction to a patient of an orthodontist, and optionally to a caretaker of the patient and a dentist of the patient. The methods may further include delivering receipt information to the orthodontist and/or the caretaker, wherein the receipt information is indicative of an interaction between the patient and the informational resource. The systems may include electronic devices and interfaces associated with the orthodontist, the patient, the caretaker, and the dentist that may facilitate the communication methods. | 2016-11-17 |
20160335409 | DISTRIBUTED SYSTEM ARCHITECTURE FOR CONTINUOUS GLUCOSE MONITORING - The present disclosure relates to techniques for receiving glucose data from a continuous glucose sensor and controlling the use and redistribution of that data so it is used in an intended manner. In one aspect, a method includes obtaining one or more data points relating to glucose levels from a transmitter associated with a continuous glucose monitor device; distributing the one or more data points among one or more display devices and one or more servers; identifying a missing data point from among a display device of the one or more display devices or a server of the one or more servers, the missing data point being one of the one or more data points; and providing the missing data point to the display device or the server when the missing data point falls within a defined time period. | 2016-11-17 |
20160335410 | System and Method for Monitoring Activities through Portable Devices - A device and system are provided for notifying a user contact of the status of a user of a portable device. The status is determined by the portable device collecting user provided information and device collected information relevant to a user of portable device. The portable device may then transmit the device collected information and the user provided information to a server that in turn performs an analysis on the device collected information and the user provided information to determine whether a triggering event has occurred. If it is determined that a triggering event has occurred, the server will proceed to send a status update regarding the user of the portable device to preset user contacts. The triggering event is determined to have occurred based on preset user conditions and algorithms and artificial intelligence being executed at the server. | 2016-11-17 |
20160335411 | DEVICE-BASED RISK MANAGEMENT OF A THERAPEUTIC - A risk management system (RMS) device includes a RMS database and a RMS processor. The RMS processor includes a prescriber module to receive a request to enroll a patient in a RMS program of a therapeutic agent associated with multiple indications. The request includes a specification of at least one indication, and a confirmation of a diagnostic test conducted on the patient. The RMS processor also includes a patient module configured to generate a patient profile. The RMS processor also includes a database module configured to store the patient profile in the RMS database. The RMS processor also includes an authorization module configured to generate an authorization code indicating whether the patient is authorized to receive the therapeutic agent. The RMS processor also includes a communication module configured to transmit the authorization code to a pharmacy or a prescriber. | 2016-11-17 |
20160335412 | SYSTEMS AND METHODS FOR PREDICTING AND ADJUSTING THE DOSAGE OF MEDICINES IN INDIVIDUAL PATIENTS - The method and system of this invention provides for the use of the Simcyp Simulator to identify the characteristics of a Virtual Twin to a real patient based on physiological data and demographic characteristics of the real patient. The Virtual Twin can be used to estimate appropriate dosage levels for a real patient undergoing pharmaceutical treatment and to indicate drug interactions that can occur during the administration of multiple drugs. | 2016-11-17 |
20160335413 | SYSTEM AND METHOD FOR MINIMALLY INVASIVE THERMAL ABLATION TREATMENT PLANNING - Various embodiments are described herein for a system and a method for treatment planning for providing ablative therapy to a patient. The treatment planning may involve segmenting images of the patient to define areas to receive treatment, defining trial parameters, simulating treatment of ablative therapy to the patient according to the trial parameters; analyzing a thermal dose distribution resulting from the simulated treatment to determine treatment effectiveness; determining when the treatment effectiveness meets a treatment effectiveness criteria; and providing an indication of the trial parameters when the treatment effectiveness meets the treatment effectiveness criteria. | 2016-11-17 |
20160335414 | AUTOMATED PRESCRIPTION WORKFLOW FOR DEVICE MANAGEMENT - Disclosed are some examples of systems, apparatus, methods and storage media for automated device management, and more specifically, for detecting exceptions in devices and facilitating workflows to resolve the exceptions. In one innovative aspect, a database system is configurable to maintain at least one knowledge database storing a plurality of prescriptions, each prescription defining a respective action-oriented workflow for one or more exceptions. The system is further configurable to receive device data associated with the devices, analyze the received device data, and detect occurrences of exceptions based on the analysis. The system is further configurable to determine whether the knowledge base includes a prescription for a detected exception, and responsive to a determination that the knowledge base includes a prescription for the detected exception, trigger a first workflow for remedying the detected exception based on the prescription. | 2016-11-17 |
20160335415 | Remote Monitoring and Dynamic Document Management Systems and Methods - Systems, methods, and computer-readable media are disclosed for remote monitoring and dynamic document management. Example methods may include receiving a first document from a device driver associated with a hardware device, identifying a clinical trial identifier associated with the first document based at least in part on metadata associated with the first document, and determining a first document type of the first document by analyzing contents of the first document. Methods may include managing user permission to access the first document. Methods may further include identifying a folder associated with the clinical trial identifier at which to store the first document based at least in part on the first document type, and assigning a first document state to the first document based at least in part on the first document type of the first document. | 2016-11-17 |
20160335416 | Process for Determining the Distillation Characteristics of a Liquid Petroleum Product Containing an Azeotropic Mixture - A process for determining the distillation characteristics of a liquid petroleum product that contains an azeotropic mixture of an oxygenated or nitrogen-containing component and at least one petroleum blending component. | 2016-11-17 |
20160335417 | MECHANISM AND APPROACH TO LOCK A LICENSE TO A GIVEN LOCALIZATION - An approach and mechanism relative to a license that is forced or locked to a particular localization. Forcing a license of a product to be localized may be effected with an attribute specifying the locale or language of a particular region, area, or country. The lock-to-locale region or area may be set and thus force a use of localization settings, lexicon files and resources of the particular region, area or country. A hash or code may be developed and embedded as a value of an attribute on the lock-to-locale feature. The hash or code on the files installed may be validated by matching it with the hash or code securely stored within the license file to ensure that the localization files for the region or area have not been tampered with or changed. | 2016-11-17 |
20160335418 | METHOD AND SYSTEM FOR MANAGING STREAM IN HOME MEDIA NETWORK HAVING A HOME GATEWAY AND A PLURALITY OF DEVICES - It is provided a method for managing stream in home media network having home gateway and a plurality of devices comprising; building converged home media index at a home gateway by synchronizing local media index of each of the devices; receiving by a source device a request from a user to play a media stored on the source device at the first render device; assigning a multicast IP and port for streaming of the media by the source device or the home gateway; sending by the source device hash value of the media, the multicast IP and port, and the streaming ID to the first render device, in addition to source device IP and render device IP to the home gateway; checking the media file's metadata and corresponding management policy stored on the converged home media index; notifying the source device that the steam can be transmitted to the first render device when receiving authentication and authorization from the gateway; sending security keys to the source device and the first render device to encrypt and decrypt the stream; and transferring the media from the source device to the first render device. | 2016-11-17 |
20160335419 | APPARATUS AND METHODS FOR RIGHTS-MANAGED CONTENT AND DATA DELIVERY - Methods and apparatus for providing access to content across a plurality of devices and environments. In one embodiment, a downloadable rights profile is utilized in order for a user device to determine whether to provide content to a subscriber. The user device is first registered to content delivery the network; the device then requests a rights profile indicating the rights of the subscriber associated with the device to access content. The rights profile is transmitted to the device. The rights profile may be configured to be valid only for a pre-determined time, thus enabling a subscriber's rights to be updated (including revoked). Security mechanisms may also be utilized to ensure access to content is limited only to authorized subscribers. In another embodiment, a user-based authentication procedure is utilized, thereby making the rights determination and content provision process completely agnostic to the underlying hardware. | 2016-11-17 |
20160335420 | Secure Document Management - Systems and methods for controlling access to digital works are described herein, e.g., including receiving a request for a digital work from a requestor; retrieving the digital work from a repository; incorporating a digital signature throughout the digital work specific to a device, wherein the incorporated digital signature includes information identifying the device having the ability to access to the digital work; providing the identified device with a device key associated with the device; encrypting the digital work, wherein the digital work is decryptable using the device key and the identified device; and providing the requestor with the encrypted digital work. | 2016-11-17 |
20160335421 | Information Handling System License Management Through NFC - A portable information handling system having an NFC device obtains identifier information from information handling systems through NFC and applies the identifier information to obtain license keys for applications stored on the information handling system from a license server through a network interface. NFC transfer of license keys in a secure environment, such as to server information handling system management controller in a data center, provides the convenience of public license servers without the security risk of an open public network access to the management controller. | 2016-11-17 |
20160335422 | APPARATUS AND METHOD FOR MANAGING UNITY FILE IN A MOBILE PLATFORM - The present invention relates to managing a Unity file in a mobile platform in order to forestall a Unity library executable in a mobile platform from being analyzed by reverse engineering and decompiling and provides an apparatus for managing a Unity file in a mobile platform comprising a file extracting section that extracts a Unity library file from a Unity application; an encrypting section that encrypts a programming library file in the Unity library file thus extracted and creates an encrypted programming library file; a file creating section that creates a decrypting library to decrypt the encrypted programming library file and creates a secured Unity application using the decrypting library and the encrypted programming library file; and a file executing section that, upon request to execute the secured Unity application, executes the secured application by decrypting the encrypted programming library file using the decrypting library. | 2016-11-17 |
20160335423 | RESTRICTED ACCESS FOR HOME AUTOMATION SYSTEM - Systems and methods for determining access to a home automation system may include receiving a command from a user to perform a home automation function, and determining a privilege for the user, which may be based on the location of the user. The methods may include comparing the command and the user privilege to an authorization list, where the authorization list defines system access to perform home automation functions based at least on individual commands and associated privileges. The methods may also include determining whether to allow the user access to the home automation system to perform the commanded home automation function. | 2016-11-17 |
20160335424 | Unlocking Time to Non-Educational Content - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for unlocking time to non-educational tasks on devices. In one aspect, a method includes receiving an indication that a user has completed the first educational task; calculating a first educational value score for the first educational task; calculating a first amount of earned non-educational time based on the first educational value score and adding the first amount to a total amount of earned non-educational time maintained in a user profile of the user; identifying a second educational task of the plurality of educational tasks; receiving an indication that the user has completed the second educational task; and in response, updating the total amount of earned non-educational time associated with the user profile of the user. | 2016-11-17 |
20160335425 | CLASSIFIER TRAINING METHOD AND APPARATUS, IDENTITY AUTHENTICATION METHOD AND SYSTEM - Provided is a classifier training method, including: acquiring a training sample set; determining a classification condition at a root node according to a preset classification condition feature, performing classification on training samples in the training sample set according to the classification condition at the root node, and acquiring a classification subset corresponding to a child node of the root node; using the child node of the root node as a current node, circularly implementing the step of determining a classification condition at the current node according to another preset classification condition feature, performing classification on training samples in a classification subset corresponding to the current node according to the classification condition at the current node, and acquiring a classification subset of a child node of the current node, till a leaf node; and determining a user identity classification result at the current node, and obtaining a decision tree classifier. | 2016-11-17 |
20160335426 | PERSONAL IDENTIFICATION SYSTEM AND METHOD - The present invention provides a device ( | 2016-11-17 |
20160335427 | PHYSICAL TOKEN-LESS SECURITY SCREENING USING BIOMETRICS - In physical token-less security screening using biometrics, a person provides biometric data to a security computing device as part of a security screening. The biometric data is used by the security computing device to look up an identifier (such as an airline account identifier or a security status identifier) for the person from a security back end. The identifier is used by the security computing device to obtain electronic pass information (such as an electronic boarding pass or a security screening status indicator) from a third party computing system (such as an airline computing system or a clearinghouse), which may be used to clear the person and/or otherwise facilitate the security screening. In some implementations, these techniques may also be used for physical token-less pass processing (such as boarding pass-less airline processing, confirmation of assigned traveling credentials, or determination of security protocols). | 2016-11-17 |
20160335428 | TERMINAL AND METHOD FOR RELEASING LOCKING STATE OF TERMINAL - Disclosed embodiments relate to a terminal having improved security and a method of releasing a locked state of a terminal. There is provided a terminal, including an input unit configured to receive dragging; a storage unit configured to store a password pattern; a control unit configured to compare the received dragging with the password pattern and release a locked state of the terminal according to the comparison result; and an output unit configured to display at least a part of a user interface including at least two markers arranged in a grid, wherein the user interface includes a first marker and a second marker, and the password pattern includes movement from the first marker to the second marker and movement from the second marker to the first marker. | 2016-11-17 |
20160335429 | Integrity protection of a mandatory access control policy in an operating system using virtual machine extension root operations - Systems, apparatuses and methods may provide for conducting a signature verification of a mandatory access control policy and provisioning the mandatory access control policy into kernel memory if the signature verification is successful. Additionally, the kernel memory may be protected from unauthorized write operations by one or more processes having system level privileges. In one example, the mandatory access control policy is provisioned without a system reboot. | 2016-11-17 |
20160335430 | Apparatus and Method for Detecting Buffer Overflow Attack, and Security Protection System - An apparatus and a method for detecting a buffer overflow attack, and a security protection system. The apparatus for detecting a buffer overflow attack includes a memory storing instructions, a processor configured to execute the instructions stored in the memory to obtain external input data for a target process, determine that the target process decodes the external input data, detect attack code on the decoded external input data, wherein the attack code is a code used for performing an overflow attack on a buffer, where the apparatus or the method facilitates detection of attack code from the data obtained by decoding, and may improve a detection rate of the attack code. | 2016-11-17 |
20160335431 | Method of Securing Non-Native Code - A method to secure a non-native application. The non-native application is processed to obtain an application stub to be triggered within a virtual machine. The processing of the non-native application also provide a native code function upon which the application stub depends. The non-native function is part of a trusted module that extends application security services from the trusted module to the virtual machine. The trusted module is a native code application that creates a trusted zone as a root of trustiness extending to the virtual machine by an execution-enabling mechanism between the application tab and the non-native function. | 2016-11-17 |
20160335432 | Cascading Classifiers For Computer Security Applications - Described systems and methods allow a computer security system to automatically classify target objects using a cascade of trained classifiers, for applications including malware, spam, and/or fraud detection. The cascade comprises several levels, each level including a set of classifiers. Classifiers are trained in the predetermined order of their respective levels. Each classifier is trained to divide a corpus of records into a plurality of record groups so that a substantial proportion (e.g., at least 95%, or all) of the records in one such group are members of the same class. Between training classifiers of consecutive levels of the cascade, a set of training records of the respective group is discarded from the training corpus. When used to classify an unknown target object, some embodiments employ the classifiers in the order of their respective levels. | 2016-11-17 |
20160335433 | INTRUSION DETECTION SYSTEM IN A DEVICE COMPRISING A FIRST OPERATING SYSTEM AND A SECOND OPERATING SYSTEM - Intrusion detection systems dedicated to an operating system, and an intrusion detection system in a device implementing at least a first operating system and a second operating system. The intrusion detection systems includes: a listening module ( | 2016-11-17 |
20160335434 | STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES - Methods for creating a hybrid string representation include determining string components from input string information that may be represented concretely by comparing the one or more components to a set of known concretizations using a processor. The set of known concretizations includes string configurations that cannot be interfered with by an attacker. All string components that could not be represented concretely are abstracted. A hybrid string representation is created that includes at least one concrete string component and at least one abstracted string component. | 2016-11-17 |
20160335435 | AUTOMATIC THREAT DETECTION OF EXECUTABLE FILES BASED ON STATIC DATA ANALYSIS - Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful. | 2016-11-17 |
20160335436 | Kernel runtime integrity using processor assists - Systems, apparatuses and methods may provide for locating operating system (OS) kernel information and user mode code in physical memory, wherein the kernel information includes kernel code and kernel read only data, and specifying permissions for the kernel information and the user code in an extended page table (EPT). Additionally, systems, apparatuses and methods may provide for switching, in accordance with the permissions, between view instances of the EPT in response to one or more hardware virtualization exceptions. | 2016-11-17 |
20160335437 | METHOD AND DEVICE FOR FEATURE EXTRACTION - Provided are a method and device for feature extraction. The method comprises: acquiring a batch of black sample files and white sample files from an application layer of a smart terminal operating system; parsing each file, acquiring information structure of all functions contained in each file, and computing a checksum for each function; determining whether or not the files contain the functions corresponding to the checksums, thus compiling statistics on the number of occurrences of each function in the black sample files and the white sample files; and, extracting a black sample feature on the basis of functions occurring only in the black sample files and not occurring in the white sample files, or extracting a white sample feature on a similar basis. | 2016-11-17 |
20160335438 | MECHANISMS FOR LOCKING COMPUTING DEVICES - Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NEC module, the NEC module comprising an NEC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NEC device via the NEC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated. | 2016-11-17 |
20160335439 | METHOD AND APPARATUS FOR DETECTING UNSTEADY FLOW IN PROGRAM - Disclosed herein is an apparatus and method for detecting unsteady flow of a program to protect against distribution of malicious codes through vulnerabilities of the program by detecting unsteady flow occurring in the program. The apparatus for detecting unsteady flow of a program includes a program flow interrupter for interrupting a flow of a program being performed in a process; a program collector for collecting the program interrupted by the program flow interrupter; an unsteady flow determiner for determining unsteady flow in the program collected by the program collector; and an unsteady flow detector for detecting unsteady flow based on the determination result of the unsteady flow determiner. | 2016-11-17 |
20160335440 | Transferable Multiparty Computation - A method and apparatus are provided for secure multiparty computation. A set of first parties is selected from a plurality of first parties for computation. Inputs for computation associated with each party in the set of first parties are divided into shares to be sent to other parties in the set of first parties. The computation on the shares is performed by the set of first parties using multiparty computation functions. In response to a trigger event, shares of the set of first parties are transferred to a set of second parties selected from a plurality of second parties. The computation is completed by the set of second parties using the transferred shares. Finally, the transferred shares are recombined to reveal an output of the computation. | 2016-11-17 |
20160335441 | SECURITY ENGINE FOR A SECURE OPERATING ENVIRONMENT - The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device. | 2016-11-17 |
20160335442 | ESTABLISHING AND USING A TRUST LEVEL IN MOBILE PHONES - Automatically establishing and/or modifying a trust relationship between devices, including mobile devices, in communication, and customizing a user interface workflow based on the trust relationship. Trust relationships are based on numerous proximity-related factors including automatically gathered proximity data, length of time in proximity, and signals detected from a target communication device as well as other nearby communication devices. | 2016-11-17 |
20160335443 | DATA TRANSMISSION SYSTEM, DATA TRANSMISSION APPARATUS, DATA TRANSMISSION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A data transmission system includes a storage site information transmitter, an access acceptor, and a password information transmitter. The storage site information transmitter transmits storage site information representing a storage site of data to a certain destination. The access acceptor accepts an access accompanied with the storage site information. The password information transmitter transmits, in a case where the access accompanied with the storage site information is accepted, password information for using the data to the destination. | 2016-11-17 |
20160335444 | Proximity based digital rights management method and system - According to an example embodiment of the present invention, there is provided a method of controlling digital user rights on a mobile device comprising the computer implemented steps of running an application having a first set of digital user rights on a mobile device, wherein the first set of digital user rights have predetermined activation criteria associated therewith, obtaining, by the mobile device, proximity data about the proximity of at least one secondary device, determining, based on at least the obtained proximity data and the predetermined activation criteria, a digital user right to be activated, and activating the determined digital user right. | 2016-11-17 |
20160335445 | Owner Controlled Transmitted File Protection and Access Control System and Method - A system that encrypts a protected file embedded with encrypted policy rules. The policy rules are one or more ‘access rules’ and ‘use rules’ that determine how the file is accessed and used. The rules may be changed at any time and may be location, time and date sensitive. The file may be sent to a recipient or stored in a file accessed by the recipient may accessed. The recipient registers with the system and assigned an ID. Using the ‘access rule’, the file owner assigns a particular recipient ID to the file. A reader program generates a request to a management server to access and use the file. The management server reviews the policy rules to determine if they are satisfied. If the rules are satisfied, a digital certificate is assigned to the protected file is then used allowing the protected file to be accessed and used according to the policy rules. | 2016-11-17 |
20160335446 | Detection of Obscured Copying Using Discovered Translation Files and Other Operation Data - Systems and methods that automatically compare sets of files to determine what has been copied even when sophisticated techniques for hiding or obscuring the copying have been employed. The file compare system comprises a file compare program that uses various operational data and user interface options to detect illicit copying, highlight and align matching lines, and to produced a formatted report. A discovered translations file is used to match translated tokens. Other operation data files specify rules that the file program then uses to improve its results. The generated report contains statistics and full disclosures of the discovered translations used and the other methods used in creating the exhibits. The system includes a bulk compare program that automatically detects likely file pairings and candidates for validation as suspected translations, which can be used on iterative runs. The user is given full control in the final output and the system automatically reforms the reports and recalculations the statistics for consistent and accurate final presentation. | 2016-11-17 |
20160335447 | SECURE ENTERPRISE CDN FRAMEWORK - Various embodiments relate to a method, network node, and non-transitory machine-readable storage medium including the following: providing access to an enterprise file system to end user devices via a virtual private network (VPN); encrypting at least a portion of an enterprise file system to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key; transmitting the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and transmitting the decryption key to an end user device via the VPN. | 2016-11-17 |
20160335448 | Collection Folders in a Content Management System - A content management system allows a user to create a collection folder to which a submitting user can add content items without being able to access content items added to the folder by other submitting users. A collection folder is created in a namespace of a collecting user and folder is made available to multiple submitting users to allow the submitting users to add items to the folder. When a submitting user first request to store a content item in the collection folder, the content management system creates a sub-folder associated with the submitting user in the collection folder and stores the content item in the sub-folder. The submitting user is given rights to the sub-folder, but is not given rights to sub-folders created for other submitting users. | 2016-11-17 |
20160335449 | CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA - A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by the computer system for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester by the computer system. | 2016-11-17 |
20160335450 | SEARCHABLE ENCRYPTION PROCESSING SYSTEM AND SEARCHABLE ENCRYPTION PROCESSING METHOD - A searchable encryption processing system includes a server including: a communication device to communicate with another device; a storage device configured to store as search target data, secret data obtained by concealing plaintext data, and a secret index obtained by concealing a plaintext index to classify the plaintext data; and an arithmetic device to execute a process including receiving, from a search client, a secret data query obtained by concealing a plaintext query, and a secret index query obtained by concealing a plaintext index, searching the storage device for a secret index matching the secret index query based on a predetermined searchable encryption technique, searching a secret data group classified by the matching secret index for secret data matching the secret data query, and returning the searched secret data to the search client. | 2016-11-17 |
20160335451 | FIELD LEVEL DATA PROTECTION FOR CLOUD SERVICES USING ASYMMETRIC CRYPTOGRAPHY - Systems, apparatuses, and methods for providing data security for data that is stored in a cloud-level platform. In one embodiment, each session is associated with specific session “keys” for use in encrypting and decrypting data. The session specific keys are generated by a client application and the client public key of a public/private key pair is provided to the cloud platform as part of a user authentication process. If the user is properly authenticated, then the platform creates its own set of keys and sends the server public key of a public/private key pair to the client. When the client requests a data record or document, the platform can determine if the user is authorized to have access to the entire data record or document or only to certain fields or portions of the record or document. Based on that determination, the platform may selectively encrypt certain fields or portions of the record or document with the client public key. | 2016-11-17 |
20160335452 | Dynamic Filtering and Precision Alteration of Query Responses Responsive to Request Load - Embodiments relate to processing a request from a user device for access rights for a resource. An access management system can send a request to query a (e.g., cached or authoritative) data store for available access rights. The query may include an exact-match or fuzzy query. A set of access-right results responsive to the query can be identified. The system may transmit a communication to the user device that identifies the set, or a subset thereof. Upon receiving a selection of a result, the system can facilitate assigning access rights corresponding to the identified result to the user. In some instances, a level of precision at which a characteristic of an access-right result is identified and/or whether or how access rights are held depends on a request load. | 2016-11-17 |
20160335453 | Managing Data - One example discloses a data manager of a data collector (DCDM) | 2016-11-17 |
20160335454 | SYSTEMS AND METHODS FOR ACCESSING COMPUTATIONAL RESOURCES IN AN OPEN ENVIRONMENT - The disclosed embodiments include methods and systems for accessing computation resources, such as information-technology (IT) assets, in an open environment. In certain aspects, an IT system may provide an online portal that presents an IT self-serve store of IT assets that a user may select for access or use. The IT system may, for example, determine that the selected IT assets comply with one or more compliance and permissioning policies, and based on the determination, may assemble the selected IT assets to generate or “spin-up” instances of applications executable by various hardware platforms. The IT system may also establish an enterprise data provisioning platform that maintains data, reporting, and analytical assets in formats accessible to devices and application instances executing across the enterprise, and that provisions the data, reporting, and analytical assets in a timely, accurate, and consistent manner. | 2016-11-17 |
20160335455 | METHOD AND APPARATUS FOR MANAGING ACCESS TO A DATABASE | 2016-11-17 |
20160335456 | VITAL DOCUMENT AND DIGITAL INFORMATION MANAGEMENT PROCESSES AND SYSTEM THAT SECURES AND RELEASES PERSONAL INFORMATION BEFORE AND AFTER A PERSON'S DEATH - A vital document and digital information management system is disclosed that secures and releases personal information before and after a person's death. The vital document and digital information management system is implemented as a web application that is customizable according to a user's liking. The web application volts and releases personal information before and after a person's death. The web application provides a social site that facilitates Internet communication and contact between family members. The web application generates a user profile for each family member using the social site. | 2016-11-17 |
20160335457 | LOCALIZED PIN MANAGEMENT WITH READER VERIFICATION AND NO DISCLOSURE - Mechanisms are provided to manage personal identification numbers and data objects residing in a communication system. In particular, solutions are described which allow a PIN associated with a data object to be stored with the data object for later authentication and verification purposes without disclosing the pin. In at least one embodiment, an operation is performed wherein a signature or digest of a data object is altered utilizing a user's entered pin. The altered signature is then stored. Upon verification and authentication, an operation is performed on the stored altered signature and the result is compared to a signature of the data object. If both signatures match, then the PIN can be used to authenticate and verify the data object. | 2016-11-17 |
20160335458 | APPARATUS AND METHOD FOR PROCESSING DIGITAL VALUE - Provided is an apparatus for testing randomness of a digital value and processing the digital value. The digital value may include first bit sequences generated by a physically unclonable function (PUF). A grouping unit may generate a plurality of groups by segmenting the first bit sequence, and a processing unit may calculate a second bit sequence from the plurality of groups by performing a logical operation. | 2016-11-17 |
20160335459 | MULTI-LEVEL SECURITY DOMAIN SEPARATION USING SOFT-CORE PROCESSOR EMBEDDED IN AN FPGA - A system and method for operating multiple security domains on one circuit card assembly, using a field-programmable gate array (FPGA) with an embedded security domain separation gate providing the MAC between multiple soft-core CPUs also embedded in the FPGA. In one embodiment, the FPGA is segregated into two or more security domains with no data paths between soft-core CPUs in each security domain except through the security domain separation gate. The security domain separation gate applies rules to any information to be transmitted between the security domains to avoid transmission of malicious content and to avoid transmission of information of a certain classification level or type to a security domain at a lower classification level or type. | 2016-11-17 |
20160335460 | RECONFIGURABLE INTEGRATOR/DIFFERENTIATOR CIRCUIT USING CURRENT FOLLOWER BASED SIMULATED INDUCTOR - A reconfigurable integrator/differentiator circuit includes: a first input terminal; a first output terminal; a first current follower having a second input terminal, a second inverting output terminal providing feedback to the first input terminal, a third non-inverting output terminal being connected to the first output terminal, and a fourth inverting output terminal; a second current follower having a third input terminal, a fifth inverting output terminal providing feedback to the first output terminal, and a sixth non-inverting output terminal being connected to the first input terminal; a single capacitor being connected between the fourth inverting output terminal and ground; a first resistor being connected between the first input terminal and the second input terminal; and a second resistor being connected between the fourth inverting output terminal and the third input terminal. | 2016-11-17 |
20160335461 | CARD READER HAVING DISCRIMINATOR CONTACT - A card reader for a point-of-sale system that is configured to accept both magnetic strip-type and integrated circuit (IC) chip-type payment cards. The card reader is a component of a point-of-sale system including a portable computing device in communication with the card reader that is configured to present a first graphical user interface (GUI) when a magnetic stripe-type card is detected and a second GUI when an IC chip-type card is detected in the card reader. The card reader comprises a slot configured to receive the payment card, a magnetic reading device and an IC chip reading device. The card reader also includes a discriminator contact disposed within the slot that is configured to conduct across a surface of a metal pad of the IC chip-type card prior to the CI chip reading device making contact with the IC chip. | 2016-11-17 |
20160335462 | CARD READER HAVING DISCRIMINATOR CONTACT - A card reader for a point-of-sale system that is configured to accept both magnetic strip-type and integrated circuit (IC) chip-type payment cards. The card reader is a component of a point-of-sale system including a portable computing device in communication with the card reader that is configured to present a first graphical user interface (GUI) when a magnetic stripe-type card is detected and a second GUI when an IC chip-type card is detected in the card reader. The card reader comprises a slot configured to receive the payment card, a magnetic reading device and an IC chip reading device. The card reader also includes a discriminator contact disposed within the slot that is configured to conduct across a surface of a metal pad of the IC chip-type card prior to the CI chip reading device making contact with the IC chip. | 2016-11-17 |
20160335463 | Data Carrier with Personalizable Magnetic Authenticity Feature - A data carrier having a magnetizable authenticity feature provided in the data carrier, which feature is personalizable under irradiation with a high-energy beam by changing physical and/or chemical properties. A magnetic feature is provided as a further personalizable second-level feature in a functional layer, which feature is based on an opto-magnetic process which permits writing of information, such that macroscopically measurable magnetism is brought about at the irradiated location, for example, by microscopic spin coupling of the metal-organic compounds which are arranged as complexes and give rise to a macroscopically measurable magnetism, based on supramolecular coupling of the spin of a molecule or a molecule structure. | 2016-11-17 |
20160335464 | RADIO FREQUENCY IDENTIFICATION TAG DELIVERY SYSTEM - A system for operating a downhole tool includes a tag carrier; a RFID tag coupled with the tag carrier; and a control sub having a bore extending therethrough, the control sub comprising: an antenna located adjacent to the bore; and a stop for catching the tag carrier, wherein: the radio frequency identification tag is coupled with the tag carrier in relation to the stop and the antenna such that the radio frequency identification tag is aligned with the antenna when the tag carrier is caught in the stop, and the stop is operable to allow passage of the tag carrier through the stop after the tag carrier is caught by the stop. | 2016-11-17 |
20160335465 | MASTER TRACKING DEVICE - A master tracking device, including a first transceiver for a local area network (LAN) configured to acquire a tag information from a plurality of radio frequency identification (RFID) tags; a global positioning system (GPS) receiver configured to acquire a location information; a microcontroller; a time base; and a second transceiver for a wide area network (WAN) configured to transmit a time stamp and the acquired information to a server. In other aspects, a method of tracking asserts using a master tracking device and a non-transitory computer readable medium are provided. | 2016-11-17 |
20160335466 | COMPACT MIRROR ARRANGEMENT FOR AND METHOD OF CAPTURING LIGHT AND ILLUMINATING TARGETS THROUGH A HORIZONTAL WINDOW OF A POINT-OF-TRANSACTION WORKSTATION - A pair of overhead mirror portions splits a field of view of an imager into first and second subfields of view. An illuminating assembly is energized to illuminate a target. A first part of the imager is exposed to capture return illumination light from the target passing through a horizontal window of a workstation over the first subfield of view, and a second part of the imager is exposed to capture return illumination light from the target passing through the horizontal window over the second subfield of view. | 2016-11-17 |
20160335467 | FULL-SCREEN FINGERPRINT IDENTIFICATION METHOD AND FULL-SCREEN FINGERPRINT IDENTIFICATION DEVICE - A full-screen fingerprint identification method includes disposing a wire mesh on a touch panel. The wire mesh includes a plurality of metal wires. The metal wires are connected to a switch unit. A fingerprint identification area is appointed on the touch panel, and a portion of the switch unit associated with the metal wires in the fingerprint identification area is turned on to make the metal wires in the fingerprint identification area conductive for fingerprint identification. A full-screen fingerprint identification device includes a touch panel and a wire mesh disposed on the touch panel. The wire mesh includes a plurality of metal wires connected to a switch unit. The touch panel includes a fingerprint identification area. A portion of the switch unit associated with the metal wires in the fingerprint identification area can be turned on to make the metal wires in the fingerprint identification area conductive for fingerprint identification. | 2016-11-17 |
20160335468 | FINGERPRINT IDENTIFICATION DEVICE AND MOBILE TERMINAL HAVING SAME - The present disclosure discloses a fingerprint identification apparatus and a mobile terminal using the same. The fingerprint identification apparatus includes: a fingerprint identification module, including a sensing circuit, a control circuit and a base plate, wherein the sensing circuit is arranged on the base plate via a support member and electrically connected to the base plate, and the control circuit is electrically connected to the base plate and located beneath the sensing circuit. a conductor holder, the conductor holder being provided with a through hole, covering the fingerprint identification module and electrically connected to the base plate; and a dielectric cover sheet, the dielectric cover sheet being assembled in the through hole and connected to the sensing circuit. | 2016-11-17 |
20160335469 | Portable Device with Security Module - The present invention provides an electronic device providing with a security mode and an operation mode, wherein the electronic device includes a touch panel having a sensing array. A sample fingerprint is fetched by using the sensing array; a detected fingerprint is fetched by sensing a fingerprint using the sensing array in the security mode. The sample fingerprint is compared with the detected fingerprint in the security mode, followed by unlocking the electronic device if the detected fingerprint matches with the sample fingerprint, and switch the electronic device into the operation mode. A control signal is generated in responsive to a touching event, followed by controlling a virtual object displayed on a display in responsive to the control signal. | 2016-11-17 |
20160335470 | FINGERPRINT SENSOR AND MANUFACTURING METHOD THEREOF - A fingerprint sensor device and a method of making a fingerprint sensor device. As non-limiting examples, various aspects of this disclosure provide various fingerprint sensor devices, and methods of manufacturing thereof, that comprise a sensing area on a bottom side of a die without top side electrodes that senses fingerprints from the top side, and/or that comprise a sensor die directly electrically connected to conductive elements of a plate through which fingerprints are sensed. | 2016-11-17 |
20160335471 | Finger Print Sensor with Passive Proximity Detection for Power Savings in an Electronic Device - An electronic device includes a housing, a user interface, and one or more processors operable with the user interface. The user interface includes a fingerprint sensor proximately located with at least one proximity sensor component. The proximity sensor component can include an infrared signal receiver to receive an infrared emission from an object external to the housing. The proximity detector component is to actuate the fingerprint sensor when the infrared signal receiver receives the infrared emission from the object. | 2016-11-17 |
20160335472 | DEVICE AND METHOD FOR MEASURING THREE-DIMENSIONAL SHAPE - A method for measuring a three-dimensional shape includes the steps of: forming a pattern on a light irradiated to an object from a light source unit installed in an electronic device by a pattern unit installed in the electronic device; generating image data by photographing the object to which the light on which the pattern is formed is irradiated by a camera unit installed in the electronic device; generating phase data for the object using the image data, and generating, using the phase data by a data generation unit, feature value data for a feature value of the object; and determining, by a determination unit, whether the feature value data is identical to pre-stored reference value data using the feature value data and the pre-stored reference value data. | 2016-11-17 |
20160335473 | METHOD FOR PROCESSING MOLECULAR IMAGING DATA AND CORRESPONDING DATA SERVER - A method for processing a plurality of spectral datasets (J1-Jn) intended for being used by a molecular imaging method or a method for recording a plurality of spectral datasets (J1-Jn), each spectral dataset (J1-Jn) being defined by a set of spatial positions (Xi, Yj) each of which is associated with a molecular spectrum with at least two dimensions containing a set of molecular information (S(Xi, Yj)), the method including in particular the following steps: for each dataset (J1-Jn), cutting the molecular spectrum associated with each position (Xi, Yj) into a plurality of spectrum segments (T1-Tm); inserting the segments (T1-Tm) obtained for each position (Xi, Yj) of each dataset (J1-Jn) into a database (BDD); selecting in the database (BDD), following a request relating to molecular information of interest, the one or more segments (T1-Tm) containing the molecular information of interest; and selecting, within each segment (T1-Tm), the molecular information of interest. | 2016-11-17 |
20160335474 | IRIS RECOGNITION VIA PLENOPTIC IMAGING - Iris recognition can be accomplished for a wide variety of eye images by using plenoptic imaging. Using plenoptic technology, it is possible to correct focus after image acquisition. One example technology reconstructs images having different focus depths and stitches them together, resulting in a fully focused image, even in an off-angle gaze scenario. Another example technology determines three-dimensional data for an eye and incorporates it into an eye model used for iris recognition processing. Another example technology detects contact lenses. Application of the technologies can result in improved iris recognition under a wide variety of scenarios. | 2016-11-17 |
20160335475 | 3D IMAGE ANALYZER FOR DETERMINING THE GAZE DIRECTION - A 3D image analyzer for the determination of a gaze direction or a line of sight (having a gaze direction vector and a location vector, which e.g. indicates the pupil midpoint and where the gaze direction vector starts) in a 3D room is configured to receive one first set of image data and a further set of image information, wherein the first image contains a pattern, which displays a three-dimensional object from a first perspective into a first image plane, and wherein the further set contains an image having a pattern, which displays the same three-dimensional object from a further perspective into a further image plane, or wherein the further set has an image information and/or a relation between at least two points in the first image and/or at least a position information. The 3D image analyzer has a position calculator and an alignment calculator and calculates therewith a gaze direction in a 3D room. | 2016-11-17 |
20160335476 | Systems and Methods for Automated Cloud-Based Analytics for Surveillance Systems with Unmanned Aerial Devices - Systems and methods for cloud-based surveillance for a target surveillance area are disclosed. At least two mobile input capture devices (ICDs) are communicatively connected to a cloud-based analytics platform via a data communication device. At least one user device can access to the cloud-based analytics platform. The cloud-based analytics platform automatically analyzes received 2-Dimensional (2D) video and/or image inputs for generating 3-Dimensional (3D) surveillance data and providing 3D display for a target surveillance area. In one embodiment, the at least two mobile ICDs are Unmanned Aerial Vehicles (UAVs). | 2016-11-17 |
20160335477 | APPARATUS AND PROCESSES FOR PHOTOSYNTHETIC ACTIVITY MEASUREMENT AND MAPPING - A method for determining chlorophyll content of a plant comprises capturing a first image comprising light transmitted through a leaf of a plant; capturing a second image comprising light reflected from the leaf of the plant; estimating, from a plurality of pixels in the first image, a transmissive chlorophyll concentration value of the leaf; estimating a reflectance chlorophyll concentration value for the leaf from a plurality of pixels in the second image using bidirectional reflectance parameters for which a variance of the reflectance chlorophyll concentration value across the plurality of pixels in the second image is reduced; and determining an estimated chlorophyll concentration value for the plant based at least on the transmissive chlorophyll concentration value and the reflectance chlorophyll concentration value. | 2016-11-17 |
20160335478 | ADAPTIVE CLASSIFICATION FOR WHOLE SLIDE TISSUE SEGMENTATION - A method of segmenting images of biological specimens using adaptive classification to segment a biological specimen into different types of tissue regions. The segmentation is performed by, first, extracting features from the neighborhood of a grid of points (GPs) sampled on the whole-slide (WS) image and classifying them into different tissue types. Secondly, an adaptive classification procedure is performed where some or all of the GPs in a WS image are classified using a pre-built training database, and classification confidence scores for the GPs are generated. The classified GPs with high confidence scores are utilized to generate an adaptive training database, which is then used to re-classify the low confidence GPs. The motivation of the method is that the strong variation of tissue appearance makes the classification problem more challenging, while good classification results are obtained when the training and test data origin from the same slide. | 2016-11-17 |
20160335479 | METHOD AND APPARATUS FOR COLLECTING AN ELECTRONIC SIGNATURE ON A FIRST DEVICE AND INCORPORATING THE SIGNATURE INTO A DOCUMENT ON A SECOND DEVICE - Disclosed embodiments are directed to systems and methods for linking more than one electronic device together to enable collection of an electronic signature or other information on a first device and incorporation of that signature or information into a document on a second device. | 2016-11-17 |
20160335480 | Video Based Facial Recognition for Customer Verification at Touchless Checkout - Facial recognition method comprises generating an average three-dimensional model from a series of two-dimensional, consecutive, captured video frames and rotating that three-dimensional model to a frontal view. The three-dimensional model may be reduced to a two-dimensional model in order to create a mean reference map. Next, the method includes accessing a facial database to compare the mean reference map to a series of previously-stored reference maps, one for each individual in the database, each of the previously-stored reference maps including a set of previously-stored reference points. Finally, an individual whose previously-stored reference map most closely matches the mean reference map is identified as a match. | 2016-11-17 |
20160335481 | METHOD FOR CREATING FACE REPLACEMENT DATABASE - A method for creating a face replacement database includes steps of creating a face database for storing a plurality of replaced images with a face image rotation angle by using a method for estimating a 3D vector angle from a 2D face image, and defining a region to be replaced in the replaced image. The method for estimating a 3D vector angle from a 2D face image includes the steps of creating a feature vector template; detecting a corner of eye and mouth in a face image; defining a sharp point in a vertical direction of the quadrilateral plane, and converting the vertices into 3D coordinates; computing the four vectors from the sharp point to the four vertices to obtain a vector set, and matching the vector set with the feature vector model to obtain an angle which is defined as a rotation angle of the input face image. | 2016-11-17 |
20160335482 | VECTOR-BASED FACE RECOGNITION ALGORITHM AND IMAGE SEARCH SYSTEM - Systems and methods for performing face recognition and image searching are provided. A system for face recognition and image searching includes an ingestion system, a search system, a user device, and a database of galley files that include feature vectors. The ingestion system crawls the internet starting with a seed URL to scrape image files and generate feature vectors. Feature vectors of images input by a user may be compared by the search system to feature vectors in the gallery files. A method for generating feature vectors includes landmark detection, component aligning, texture mapping, vector computation, comparing cluster centers defined by vectors stored in a database with vectors generated based on an input image, linear discriminant analysis, and principal component analysis. | 2016-11-17 |
20160335483 | FACIAL LIVENESS DETECTION IN IMAGE BIOMETRICS - System and techniques for spoofing detection in image biometrics are described herein. A sequence of images may be obtained from a camera; a first plurality of images in the sequence of images including a representation of a user body part, and a second plurality of images in the sequence of images including a representation of an environment of the user. A marker may be created for the representation of the body part. A feature of the environment of the user present during the second plurality of images may be identified in the sequence of images using a third group of circuits. A correlation between the marker and the feature of the environment in the sequence of images may be quantified to produce a synchronicity metric of the degree to which the marker and the feature of the environment correlate. | 2016-11-17 |
20160335484 | ACCESS POINT STREAM AND VIDEO SURVEILLANCE STREAM BASED OBJECT LOCATION DETECTION AND ACTIVITY ANALYSIS - Methods and systems for co-relating location and identity data available from Access Points (APs) and video surveillance systems are provided. According to one embodiment, data, including a unique identifier of an object and information regarding a first geo-position of the object, is received from an AP of a wireless network of a venue. A video feed captured by a camera system monitoring a portion of the venue and/or information regarding a second geo-position corresponding to the object are also received. The first and second geo-positions are then mapped to a common coordinate system. Based on the unique identifier, information regarding the object as reported by the AP and the camera system or derived therefrom are correlated. Finally, behavioral attributes of the correlated object are assessed based on one or a combination of actions of the object, the first and second geo-positions and the common coordinate system. | 2016-11-17 |
20160335485 | USER INTENTION ANALYSIS APPARATUS AND METHOD BASED ON IMAGE INFORMATION OF THREE-DIMENSIONAL SPACE - Provided are a user intention analysis apparatus and method based on image information of a three-dimensional (3D) space. The user intention analysis apparatus includes a 3D space generator configured to generate a 3D virtual space corresponding to an ambient environment, based on physical relative positions of a plurality of cameras and image information generated by photographing the ambient environment with the plurality of cameras, a 3D image analyzer configured to estimate a relative position between a first object and a second object included in the image information in the 3D virtual space and generate contact information of the first object and the second object, based on the relative positions of the first object and the second object, an action pattern recognizer configured to compare the contact information with a pre-learned action pattern to recognize an action pattern of a user who manipulates the first object or the second object, and a user intention recognizer configured to infer a user intention corresponding to the recognized action pattern, based on ontology. | 2016-11-17 |
20160335486 | DETECTION, TRACKING, AND POSE ESTIMATION OF AN ARTICULATED BODY - Techniques related to pose estimation for an articulated body are discussed. Such techniques may include extracting, segmenting, classifying, and labeling blobs, generating initial kinematic parameters that provide spatial relationships of elements of a kinematic model representing an articulated body, and refining the kinematic parameters to provide a pose estimation for the articulated body. | 2016-11-17 |
20160335487 | HAND MOTION IDENTIFICATION METHOD AND APPARATUS - A hand motion identification method includes: obtaining a to-be-identified video; performing area-locating and tracking of a hand for the to-be-identified video, and extracting a red-green-blue (RGB) video and a depth information video of the hand; detecting the RGB video and the depth information video of the hand, to obtain a feature point; representing the feature point by using a 3D Mesh motion scale-invariant feature transform (MoSIFT) feature descriptor; and comparing the 3D Mesh MoSIFT feature descriptor of the feature point with a 3D Mesh MoSIFT feature descriptor in a positive sample obtained through beforehand training, to obtain a hand motion category in the to-be-identified video. | 2016-11-17 |
20160335488 | SOUND EVENT DETECTION - A system and method for the use of sensors and processors of existing, distributed systems, operating individually or in cooperation with other systems, networks or cloud-based services to enhance the detection and classification of sound events in an environment (e.g., a home), while having low computational complexity. The system and method provides functions where the most relevant features that help in discriminating sounds are extracted from an audio signal and then classified depending on whether the extracted features correspond to a sound event that should result in a communication to a user. Threshold values and other variables can be determined by training on audio signals of known sounds in defined environments, and implemented to distinguish human and pet sounds from other sounds, and compensate for variations in the magnitude of the audio signal, different sizes and reverberation characteristics of the environment, and variations in microphone responses. | 2016-11-17 |
20160335489 | MOVING OBJECT DETECTION APPARATUS AND MOVING OBJECT DETECTION METHOD - A moving object detection apparatus and a moving object detection method that detect a moving object appeared in the photographic image by analyzing the photographic image obtained by an onboard camera ( | 2016-11-17 |
20160335490 | METHOD AND APPARATUS FOR DETECTING PERSONS, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - A method and an apparatus for detecting persons are disclosed. The method includes initially detecting the persons in a height-top-view; dividing the height-top-view into one or more regions, and estimating crowd density in each region; determining, based on the crowd density, visible regions of the initially detected persons in each of the regions; for each of the initially detected persons, extracting a first gradient feature and a second gradient feature of the person from the height-top-view, and a grayscale image or a color image corresponding to the height-top-view, respectively; for each of the initially detected persons, determining, based on the extracted first gradient feature and second gradient feature, using a previously constructed classifier corresponding to the determined visible region of the person, a confidence level of the initially detected person; and correcting, based on the confidence level, a detection result of the initially detected persons. | 2016-11-17 |
20160335491 | METHOD AND DEVICE FOR DETECTING GATHERING OF OBJECTS BASED ON STEREO VISION AS WELL AS NON-TRANSITORY COMPUTER-READABLE MEDIUM - Method, device, and non-transitory computer-readable medium detecting a gathering of objects based on stereo vision are disclosed, and the method comprises steps of obtaining current and prior images and a corresponding depth map; extracting foreground pixels corresponding to detection objects from the current and prior images, and projecting the foreground pixels onto a ground surface to acquire a foreground projection image including foreground projection blocks; conducting, based on image feature differences of the foreground pixels between the current and prior images, projection onto the ground surface to acquire moving foreground projection blocks; utilizing the moving foreground projection blocks to erode the foreground projection blocks to obtain still foreground projection blocks; and determining, based on the still foreground projection blocks, whether the gathering of objects exists. | 2016-11-17 |
20160335492 | OPTICAL APPARATUS AND LIGHTING DEVICE THEREOF - An optical apparatus includes a lighting device and a sensing unit. The lighting device projects a first structured light and a second structured light on an under-test object. Consequently, at least one first pattern of a first pattern set corresponding to the first structured light and at least one second pattern of a second pattern set corresponding to the second structured light are shown on the under-test object. The direction of a second optical axis of the second structured light and the direction of a first optical axis of the first structured light are different. The sensing unit senses the at least one first pattern and the at least one second pattern on the under-test object. According to the relative position relationship between the first pattern and the second pattern, spatial information including a depth distance of the under-test object is obtained. | 2016-11-17 |
20160335493 | METHOD, APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR MATCHING TEXT TO IMAGES - A method and apparatus are provided for acquiring a plurality of images and corresponding text comments that includes a plurality of segments; retrieving, based on a pre-established key-word library, a key word of each segment; and matching a segment, based on the key word retrieved from the segment, to a corresponding image selected from the plurality of images. | 2016-11-17 |
20160335494 | MULTI-PAGE DOCUMENT RECOGNITION IN DOCUMENT CAPTURE - Techniques to capture document data are disclosed. It is determined that a sequence of pages in a stream of document page images comprise a single multi-page document. Data is extracted from two or more different pages included in the sequence. The data extracted from two or more different pages included in the sequence of pages is used to populate a data entry form associated with the multi-page document. | 2016-11-17 |
20160335495 | APPARATUS AND METHOD FOR ACQUIRING IMAGE FOR IRIS RECOGNITION USING DISTANCE OF FACIAL FEATURE - The present invention relates to an apparatus and method for acquiring an image for iris recognition using a distance of a facial feature, the apparatus comprising: a buffer for photographing one or more facial images of a subject being photographed so as to acquire an image for iris recognition and storing the photographed facial images; a facial feature distance calculating unit for calculating a distance of a facial feature from the facial images stored in the buffer; an actual distance estimating unit for estimating an actual distance between the subject being photographed and a camera from the distance of the face feature calculated by the facial feature distance calculating unit, and confirming, from of the estimated distance, that the subject being photographed exists in an iris photographing space; and an iris image acquiring unit for acquiring an eye image from the facial images of the subject being photographed that has been confirmed as existing in the iris photographing space by the actual distance estimating unit, and measuring the quality of the acquired eye image so as to acquire an image for iris recognition, which satisfies a reference level of quality. | 2016-11-17 |
20160335496 | Systems and Methods for Scale Invariant 3D Object Detection Leveraging Processor Architecture - An example method includes receiving a plurality of templates of a plurality of objects, where a template comprises feature values sampled at corresponding points of a two-dimensional grid of points positioned over a particular view of an object and scaled based on a depth of the object at the particular view. The method may further include receiving an image of an environment and determining a matrix representative of the image, where a row of the matrix comprises feature values sampled at a particular point of the two-dimensional grid positioned over one or more locations within the image and scaled based on depths of the one or more locations. The method may additionally include determining at least one similarity vector corresponding to at least one template and using the at least one similarity vector to identify at least one matching template for at least one object located within the image. | 2016-11-17 |
20160335497 | CROWD-SOURCED CREATION AND UPDATING OF AREA DESCRIPTION FILE FOR MOBILE DEVICE LOCALIZATION - A computing system includes a network interface, a first datastore, a second datastore, and a merge module. The merge module is to receive a set of one or more area description files from a set of one or more first mobile devices. Each area description file represents a point cloud of spatial features detected by a corresponding first mobile device at an area. The computing system further includes a localization module and a query module. The localization generation module is to generate a localization area description file for the area from the set of one or more area description files and to store the localization area description file in the second datastore. The localization area description file represents a point cloud of spatial features for the area. The query module is to provide the localization area description file to a second mobile device via the network interface. | 2016-11-17 |
20160335498 | AUGMENTED REALITY INFORMATION SYSTEM - In various example embodiments, a system and method for providing information in an augmented reality display are provided. In example embodiments, an initial continuous stream of image data captured by a client device is received. An object within the continuous stream of image data is initially identified. The continuous stream of image data is further received and comprises additional image data regarding the object. The additional image data provides more visual details and features of the object than the initially received image data. Using the additional visual data, the identification of the object is refined to indicate a specific type of object. Based on the refined identification of the object, a search for information pertaining to the specific type of object is performed. A result is formatted to be displayed with a real-time image of the object on the client device. | 2016-11-17 |
20160335499 | ENTITY BASED TEMPORAL SEGMENTATION OF VIDEO STREAMS - A solution is provided for temporally segmenting a video based on analysis of entities identified in the video frames of the video. The video is decoded into multiple video frames and multiple video frames are selected for annotation. The annotation process identifies entities present in a sample video frame and each identified entity has a timestamp and confidence score indicating the likelihood that the entity is accurately identified. For each identified entity, a time series comprising of timestamps and corresponding confidence scores is generated and smoothed to reduce annotation noise. One or more segments containing an entity over the length of the video are obtained by detecting boundaries of the segments in the time series of the entity. From the individual temporal segmentation for each identified entity in the video, an overall temporal segmentation for the video is generated, where the overall temporal segmentation reflects the semantics of the video. | 2016-11-17 |
20160335500 | METHOD OF AND SYSTEM FOR GENERATING METADATA - Method of and system for generating image metadata, comprising, at an electronic device: receiving an indication of text to be included in an image, the text comprising at least one character, each character being encoded according to a character encoding; generating the image based at least in part on the text, the image including an image representation of the text; generating the image metadata based at least in part on the text; and associating the image metadata with the image. Method of and system for generating video metadata. Method of and system for generating audio metadata. | 2016-11-17 |
20160335501 | SURVEILLANCE DEVICE, SYSTEM AND METHOD THEREOF - A surveillance device including a processing module, a lighting module, a movable module, a first camera module and a second camera module. The lighting module is coupled to the processing module to emit light and illuminate a surrounding environment. The movable module is coupled to the processing module. The first camera module is coupled to the processing module. The second camera module is coupled to the processing module, and is disposed on the movable module. When the processing module determines that the amount of light received by the first camera module is lower than a predetermined value, the processing module controls the lighting module to emit light. The processing module uses the movable module to control the second camera module to face towards a direction to the surrounding environment so that the second camera module acquires an image of the surrounding environment. | 2016-11-17 |
20160335502 | System and Method for Tracking Moving Objects in Videos - A system and method are provided for tracking objects in a scene from a sequence of images captured by an imaging device. The method includes processing the sequence of images to generate sequential images at a plurality of hierarchical levels to generate a set of regions of interest; and, at each of the hierarchical levels: examining pairs of sequential images to link pixels into short tracklets; and grouping short tracklets that indicate similar motion patterns to generate representative tracklets. The representative tracklets are grouped to generate a tracking result for at least one object. | 2016-11-17 |
20160335503 | INSPECTION METHODS AND DEVICES - The present disclosure discloses an inspection method and device. The method comprises steps of acquiring a perspective image of an inspected object; processing the perspective image to obtain a region of interest; and automatically detecting the region of interest using a cigarette model, to determine whether the region of interest of the perspective image belongs to a cigarette. In the present disclosure, cigarette detection is implemented on a scanned image of goods, particularly a container, which can avoid the problem of detection vulnerability and poor effect of manual image judgment for the conventional manner, and is of significance in fighting against cigarette smuggling. | 2016-11-17 |
20160335504 | METHOD FOR DETECTING AND CLASSIFYING EVENTS OF A SCENE - The subject of the invention is a method for detecting and classifying events of a scene by means of a single-pupil imaging system equipped with a VisNIR detector in the | 2016-11-17 |