49th week of 2015 patent applcation highlights part 57 |
Patent application number | Title | Published |
20150347715 | RETAIL PHARMACY CUSTOMER RECOGNITION AND SALES - A retail pharmacy sales system for identifying a customer and identifying which prescriptions the customer is authorized to pick up is disclosed. The system may include a retail pharmacy sales device in communication with a mobile device. The retail pharmacy sales device is configured to identify the customer, receive acknowledgement for the prescriptions, and process the payments for the prescriptions based on communication with the mobile device. | 2015-12-03 |
20150347716 | Method for Supervising Consumption of a Medical Food for Prevention and/or Management of a Disease or Condition - A method for supervising a patient during prevention and/or management of a disease or condition involving a medical food having greater than 60% pure eicosapentaenoic acid. | 2015-12-03 |
20150347717 | HYBRID PERSONAL TRAINING SYSTEM AND METHOD - Disclosed is a hybrid personal training method and system according to an exemplary embodiment of the system, a personal trainer or physical therapist works remotely or locally with clients in conjunction with an automated self-learning/self-assessing system for supervising the progress of the clients in the absence of the trainer. | 2015-12-03 |
20150347718 | METHOD FOR DETERMINING THE TOTAL ENERGY FOR DESOLVATING AN ANION-CATION PAIR AND INSERTING IT INTO THE ELECTRODE OF A SUPERCAPACITOR - The invention is a device for sampling fluids under pressure from a well which comprises a chamber for retaining the fluid within a sample chamber ( | 2015-12-03 |
20150347719 | DIGITAL RIGHTS MANAGEMENT SYSTEM IMPLEMENTED ON A SCANNER - In a digital rights management system where a scanner is connected to a rights management server, the process of applying digital rights protection is performed by the scanner, rather than the server, so that scanning and document protection can be done even when the server is not available. Upon scanning a document, the operator selects a rights management policy to be applied to the digital document. The scanner generates a document ID, embeds the document ID as metadata in the document, encrypts the document, and stores the document ID, policy ID of the selected policy, and encryption key as an entry in a local document-policy association table on the scanner. The scanner uploads the above information of the digital document to the server, which stores the information in a document-policy association table on server and uses it to perform document access control. | 2015-12-03 |
20150347720 | BONDING CONTENTS ON SEPARATE STORAGE MEDIA - Local storage on player instruments provides the ability for adding further amendments and most recent supplements to the optical disc content. A problem arising with this technically applicable possibility is the protection of copyrights bound to disc and supplement data. The present invention describes a technique to ensure a security framework that is able to handle this, by creating a virtual file system (VFS) by merging optical disc data and local storage data based upon a common identifier. | 2015-12-03 |
20150347721 | SYSTEM AND APPARATUS FOR FAULT-TOLERANT CONFIGURATION AND ORCHESTRATION AMONG MULTIPLE DRM SYSTEMS - A method of updating a common provisioning system (CPS) service is provided that includes: selecting a DRM service level from a DRM provider and a corresponding CPS service for said DRM service level; determining if the CPS service is associated with one or more CPS packages; for each associated CPS package, determining if the association is in a corrupt state, wherein the association is in a corrupt state if at least one package content collection (PCC) for the CPS package does not correctly include or exclude the DRM service level that corresponds to said CPS service; and for each associated CPS package in a non-corrupt state, updating a package content collection (PCC) in the DRM provider. | 2015-12-03 |
20150347722 | Systems and Methods for Binding Content Playback to the Pairing of a Playback Device and Removable Memory Storage Device - Systems and methods for binding content to pairing of a playback device and removable memory storage device are disclosed. In one embodiment, a method for requesting authorization to play content using a playback device and a removable memory storage device includes retrieving a coupon identifier from a removable memory storage device while it is attached to the playback device, generating a coupon code using the coupon identifier, sending a request for storefront token that includes a device match data token and an application identifier, receiving a storefront token associated with a storefront identifier where the storefront identifier identifies a storefront application, sending a request for ticket token that includes the coupon code, the storefront identifier, and a content identifier that identifies the content, sending a request for license file that includes the ticket token, and receiving a license file that grants playback rights to the piece of content. | 2015-12-03 |
20150347723 | SOFTWARE APPLICATION LICENSE ROAMING - A master license entry that links a software application to a user identification can be made. Application licenses to use the software application can be roamed to multiple computing machines. Feature licenses for added features of the software application can be roamed to those computing machines as well. Multiple overlapping license rights for the software application may be linked to the master license entry. A count of how many license rights for the software application are linked to the master license entry can be maintained. Requests for licenses may be refused if the count of license rights has reached zero. | 2015-12-03 |
20150347724 | SECURE EXECUTION OF ENCRYPTED PROGRAM INSTRUCTIONS - Provided are facilities for secure execution of an encrypted executable comprising an encrypted instruction. The secure execution includes obtaining the encrypted instruction, decrypting the encrypted instruction using a decryption key being maintained in a secure location within a processor, and storing the decrypted instruction to a secure storage for execution, where the decryption key remains in the secure location during the decrypting and the storing to facilitate maintaining security of the decryption key. | 2015-12-03 |
20150347725 | Dynamic Authorization - Systems and techniques are provided for dynamic authorization. A signal may be received from a sensor. A concept may be determined from the signal. The concept may be a location of a computing device, an action being performed with the computing device, an identity of a user of the computing device, or a temporal context for the computing device. A current pattern may be determined from the concept. The current pattern may be matched to a stored pattern. The stored pattern may be associated with a security outcome. The security outcome may be sent to be implemented. A security message may displayed indicating the security outcome and part of the stored pattern that was matched to the current pattern. The security outcome may be causing presentation of an authentication prompt or not causing presentation of an authentication prompt. | 2015-12-03 |
20150347726 | MANIPULATOR AUTHENTICATION OPERATING SYSTEM - A manipulator authentication operating system, wherein the mobile terminal has “authentication holding means” for holding unique authentication-information and “a communication section” that transmit the authentication information to the manipulation section and perform information communication relating to an operation and manipulation between the communication section and manipulation section, and manipulation section has “authentication-information decoding means” that decodes authentication information transmitted by the “authentication-information holding means” of the mobile terminal via the “communication section” and, when the decoded authentication information is consistent with collation information held in advance, transmits a signal indicating the consistency to the mobile terminal; and a manipulation of an object to be manipulated in cooperation with the manipulation section by the mobile terminal when the “authentication-information decoding means” has transmitted a signal indicating the unique authentication information transmitted from the mobile terminal is consistent with the collation information to the mobile terminal. | 2015-12-03 |
20150347727 | IN-CIRCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATA - The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, and is secured using industry-established mechanisms for preventing information tampering or eavesdropping, such as the addition of oxygen reactive layers. This invention also incorporates means for establishing security settings, profiles, and responses for the in-circuit security system and enrolled individuals. The in-circuit security system can be used in a variety of electronic devices, including handheld computers, secure facility keys, vehicle operation/ignition systems, and digital rights management. | 2015-12-03 |
20150347728 | Providing a User Access to a Computer System - A method and related electronic apparatus for providing a user access to a computer system, the method comprising: determining at least one object in contact with a surface; generating at least one pulse sequence; actuating the surface based on the at least one pulse sequence; determining an absence of the at least one object from the surface; determining at least one character of a password input based on the at least one pulse sequence. | 2015-12-03 |
20150347729 | SYSTEMS AND METHODS FOR A CREDENTIAL INCLUDING MULTIPLE ACCESS PRIVILEGES - A credential for use in an access control system may include a first sector including first data of a first database type, and a second sector including second data of a second database type. The credential may further include a third sector including third data related to the second data. The first database type and the second database type may he different types. | 2015-12-03 |
20150347730 | Contextual Device Locking/Unlocking - Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device. | 2015-12-03 |
20150347731 | METHOD FOR GENERATING A HUMAN LIKENESS SCORE - One embodiment of the invention is a method utilizing a CAPTCHA to generate a human likeness score including blocks: a) receiving a user solution to the CAPTCHA; b) receiving a user interaction pattern descriptive of an interaction undertaken by the user, through a graphical interface of the CAPTCHA, to achieve the user solution; c) determining the accuracy of the user solution; d) comparing the user interaction pattern against an interaction model generated from interaction patterns of previous users; e) calculating the human likeness score based upon the determination of block c) and the comparison of block d), wherein the human likeness score lies within a continuum of human likeness scores. | 2015-12-03 |
20150347732 | Electronic Device and Method for Controlling Access to Same - An electronic device selects, based the detected position of a user, which sensor it will use to authenticate the user. The device may, for example, select a first sensor based on a first position and motion of the user, grant a first level of access to the user based on an authentication procedure the device carries out using data from the first sensor, select a second sensor based on a second position and motion of the user, and grant a second level of access to the user based on an authentication procedure the device carries out using data from the second sensor. | 2015-12-03 |
20150347733 | EYE-CONTROLLED PASSWORD INPUT APPARATUS, METHOD AND COMPUTER-READABLE RECORDING MEDIUM AND PRODUCT THEREOF - The present invention provides an eye-controlled password input apparatus, which comprises a display device to display a password menu, an image capturing device to capture an user's eye region image, a memory unit to store at least one preset password and a corresponding account number, a control unit to generate the password menu according to the preset password, and an image processing unit. The image processing unit obtains a plurality of reference objects from the eye image so as to recognize the eye movement direction and to confirm password input. After input a character of the password, the display device generates another password selection menu for the user to input another password character until the password input program is completed. | 2015-12-03 |
20150347734 | Access Control Through Multifactor Authentication with Multimodal Biometrics - A system is provided in which a person may use a Cellular (Mobile) Telephone, a PDA or any other handheld computer to make a purchase. This is an example only. The process may entail any type of transaction which requires authentication, such as any financial transaction, any access control (to account information, etc.), and any physical access scenario such as doubling for a passport or an access key to a restricted area (office, vault, etc.). It may also be used to conduct remote transactions such as those conducted on the Internet (E-Commerce, account access, etc.). In the process, a multifactor authentication is used. | 2015-12-03 |
20150347735 | USER AUTHENTICATION METHOD, USER AUTHENTICATION DEVICE, AND PROGRAM - Provided is a user authentication method including reproducing sound data of which a sound source in a first position of a space around a user is virtually localized using a Head-Related Transfer Function (HRTF) of the user toward the user, acquiring a second position of the space around the user, the second position being estimated by the user who has listened to the reproduced sound data as a position of the sound source; and authenticating the user according to a coincidence between the first position and the second position. | 2015-12-03 |
20150347736 | QUANTIFIED IDENTITY - Determination of a quantified identity using a multi-dimensional, probabilistic identity profiles is contemplated. The quantified identity may be used to authenticate a user entity provided to a point-of-sale device or other interface associated with identity requester in order to verify the corresponding users as who they say they are. The user identity may be determined initially as a function of user inputs made to the identity requester and/or as a function of wireless signaling exchange with devices associated with the user. | 2015-12-03 |
20150347737 | SERVICE ACCOUNT ACCESS - A computer system detects an external media device and determines the external media device contains authentication data for the computer system. In response, a first password is generated based on an identifier unique to the computer system. A prompt is displayed for a second password obtained from a service provider. The second password is received through an input device. The computer system provides access to the service account if the second password matches the first password. | 2015-12-03 |
20150347738 | PROXIMITY UNLOCK AND LOCK OPERATIONS FOR ELECTRONIC DEVICES - The described embodiments perform a proximity unlock operation. For the proximity unlock operation, a first electronic device in a locked operating state detects that an authorized second electronic device is in proximity to the first electronic device. Based on detecting the authorized second electronic device in proximity to the first electronic device, the first electronic device transitions from a locked operating state to an unlocked operating state. In the described embodiments, the transition to the unlocked operating state occurs without the user performing a manual authentication step that is performed in existing electronic devices to cause the transition from the locked operating state to the unlocked operating state. | 2015-12-03 |
20150347739 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - A conventional information processing apparatus which allows simultaneous parallel use by a plurality of users includes a plurality of operation units to receive operations of the respective plurality of users, so that the information processing apparatus can be simultaneously used. Such a configuration is wasteful in terms of equipment, resources, and space. According to an exemplary embodiment of the present invention, an information processing apparatus which allows simultaneous parallel use by a plurality of users includes a single display unit configured to be able to input operation instructions to the information processing apparatus, and a control unit configured to perform display control to display an operation input screen corresponding to a first user and an operation input screen corresponding to a second user on the single display unit in a split display mode or in an alternate display mode. | 2015-12-03 |
20150347740 | STEGANOGRAPHIC ACCESS CONTROLS - Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing steganographically encoded access information. The encoded access information may be recognizable by a security system, and the security system may grant access to the secured location when the encoded image is presented to the security system. The authorized user may request the generation of the encoded image on an authorized computing device, and the encoded image may be provided to the guest on a guest computing device. When a monitoring device associated with the security system captures the encoded access information, the security system may, for example, open a door at the secured location. | 2015-12-03 |
20150347741 | METHOD FOR MANAGING SECURITY OF A DATA PROCESSING SYSTEM WITH CONFIGURABLE SECURITY RESTRICTIONS - Techniques for managing security of a data processing system are described herein. According to one embodiment, in response to a request for modifying a security settings of a data processing system, a message is displayed on a display of the data processing system to request a user who operates the data processing system to perform a physical action to prove that the user was physically present to issue the request for modifying the security settings. It is verified whether a user action physically performed by the user conforms to the requested physical action. The security settings of the data processing system is modified, in response to determining that the user action conforms to the requested physical action. | 2015-12-03 |
20150347742 | CONFIGURING IDENTITY FEDERATION CONFIGURATION - A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties. | 2015-12-03 |
20150347743 | METHOD AND APPARATUS FOR INTER PROCESS PRIVILIGE TRANSFER - A method and an apparatus to dynamically distribute privileges among a plurality of processes are described. Each process may have attributes including a privilege to control access to processing resources. A first process may be running with a first privilege prohibited from access to a processing resource. A second process may be running with a second privilege allowed to access the processing resource. The first process may receive a request from the second process to perform a data processing task for the second process. In response, the second privilege may be dynamically transferred to the first process to allow the first process to access the processing resource. The first process may perform operations for the data processing task with the second privilege transferred from the second process. | 2015-12-03 |
20150347744 | Self-Authenticating Intravascular Device and Associated Devices, Systems, and Methods - A method of authorizing a limited use intravascular device can include determining if the intravascular device is in communication with a clinical system; determining if the intravascular device is authorized for clinical operation without providing the clinical system access to intravascular device data stored on the intravascular device; and providing an authorization signal to the clinical system. An intravascular device can include a flexible elongate member including a sensing component at a distal portion and a connector at a proximal portion, the connector including: a memory component configured to store a parameter value; a processing component; and a charge storage component configured to power the memory component and/or the processing component; wherein the processing component is configured to determine if the flexible elongate member is authorized for clinical operation using the parameter value without providing the parameter value to a clinical system. | 2015-12-03 |
20150347745 | METHOD FOR EXTRACTING EXECUTABLE CODE OF APPLICATION USING MEMORY DUMP - Disclosed is a method for extracting an executable code by dumping a working memory on a storage memory at the moment when an Android platform loads an executable code on the working memory after decrypting the executable code. The method includes reading a name of a user-designated process from a dump configuration file of the storage memory; checking a name of an execution process running on the emulator; determining whether the name of the user-designated process is identical to the name of the execution process; determining whether a name of a parent process of the execution process is “zygote”, when the name of the user-designated process is identical to the name of the execution process; and dumping an executable code of the execution process on a designated directory of the storage memory when the name of the parent process of the execution process is “zygote”. | 2015-12-03 |
20150347746 | METHODS FOR RESTRICTING RESOURCES USED BY AN APPLICATION BASED ON A BASE PROFILE AND AN APPLICATION SPECIFIC PROFILE - In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted from the application, where the one or more extended entitlements specify one or more resources the application is entitled to access. One or more security profile extensions corresponding to the one or more extended entitlements are dynamically generated. A security profile specifically for the application is created based on the one or more security profile extensions and a base security profile that has been previously compiled, where the base security profile specifies a list of a plurality of base resources. The application is then launched in a sandboxed operating environment that is configured based on the security profile specifically generated for the application. | 2015-12-03 |
20150347747 | SANDBOXING THIRD PARTY COMPONENTS - A method and apparatus of a device for security management by sandboxing third-party components is described. The device can determine whether a third-party component supports network access. If the third-party component supports network access, the device can request a user input regarding whether to restrict the network access of the component. The device can receive a user input to restrict network access of the third-party component. Upon receiving the user input to restrict network access, the device can construct a sandbox for the third-party component to restrict network access of the component and prevent the component from performing data exfiltration. Other embodiments are also described and claimed. | 2015-12-03 |
20150347748 | METHOD AND APPARATUS FOR HANDLING SECURITY OF AN APPLICATION AND ITS EXTENSION - Techniques for handling security of an application and its extension are described. In one embodiment, an application manager of an operating system running within a data processing system launches an application in a first sandboxed environment based on a first security profile associated with the application. In response to receiving a request from the application for accessing a function of an application extension that is associated with the application, the application manager launches the application extension in a second sandboxed environment based on a second security profile associated with the application extension. The application manager is to individually enforce security and manage resources of the application and the application extension in the first and second sandboxed environments based on the first and second security profiles, respectively. The second security profile specifies resources fewer than the first security profile. | 2015-12-03 |
20150347749 | CONSISTENT EXTENSION POINTS TO ALLOW AN EXTENSION TO EXTEND FUNCTIONALITY OF AN APPLICATION TO ANOTHER APPLICATION - According to one embodiment, in response to an inquiry received from a first application for an extension service associated with a first of a plurality of extension points of an operating system, a list of one or more extensions is identified that have been registered for the first extension point with the operating system, where the first application is executed within a first sandboxed environment. The identified list of extensions is displayed to prompt a user to select one of the extensions to be associated with the first application. In response to a selection of one of the extensions, the selected extension is launched in a second sandboxed environment. The selected extension and the second application were packaged in an application bundle, and when the application bundle was installed, the selected extension and the second application appeared in a registry of the operating system as separate applications. | 2015-12-03 |
20150347750 | METHOD AND APPARATUS FOR A SCORING SERVICE FOR SECURITY THREAT MANAGEMENT - A method and system for providing a security threat scoring service to identify and prioritize potential security threats to an online service. The method and system include determining security threat patterns, comparing traffic to the online system with the security threat patterns, and identifying portions of the traffic as a potential security threat. The method and system include assigning a threat score to the potential security threat, and providing the threat score to the online service to enable the online service to secure against the potential security threat. | 2015-12-03 |
20150347751 | SYSTEM AND METHOD FOR MONITORING DATA IN A CLIENT ENVIRONMENT - Systems and methods are provided which enable client environments, such as corporate and government enterprises, to adopt an integrated, strategic approach to governance, risk and compliance. The systems described herein provide a “cloud-based” information security service that provides such enterprises with round-the-clock visibility into security issues and risks across the enterprise. An advanced security information and event management system, also referred to as an information assurance portal (IAP), is described, which enables client customers to select various services such as threat and vulnerability management, asset classification and tracking, and business threat and risk assessments through a software-as-a-service portal. | 2015-12-03 |
20150347752 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CONDITIONALLY PREVENTING USE OF HARDWARE VIRTUALIZATION - A system, method, and computer program product are provided for conditionally preventing use of hardware virtualization. In use, an attempt to use hardware virtualization is identified. Further, the use of the hardware virtualization is conditionally prevented. | 2015-12-03 |
20150347753 | MALWARE DETECTION SYSTEM AND METHOD FOR MOBILE PLATFORMS - In one example, a management server is configured to provide malware protection for one or more client mobile platforms in communication with the management server via a mobile network. In the example, the management server includes a processor configured to detect malware in the mobile network, select a client mobile platform having a malware scanning agent, and, manage the malware scanning agent of the client mobile platform using a device independent secure management protocol based at least in part on the malware detected in the mobile network. | 2015-12-03 |
20150347754 | WEB MALWARE BLOCKING THROUGH PARALLEL RESOURCE RENDERING - Apparatus and method for transforming Web resources into safe versions such that malicious code on the resources cannot attack the client viewing the resources. The invention separates the processing of insecure code from the processing of benign code. For Web pages, the benign code is displayed immediately to the client while insecure code is processed on a separate machine. Once insecure code is processed, benign outputs of that code are passed to the client for display. The invention safeguards the client against known and zero day exploits without requiring a catalog of malware/virus signatures, heavyweight code checkers, complete page re-writing or highly restrictive access policies. The invention provides the client with complete malware blocking while retaining most of the original functionality of the Web resource. | 2015-12-03 |
20150347755 | ROLLBACK FEATURE - A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file. | 2015-12-03 |
20150347756 | AUTOMATIC LIBRARY DETECTION - The automated, real-time detection of specific blocks of code within a larger body of source code is described. Specific implementations relate to the detection of known code libraries in web page code to improve the efficiency of the generation of polymorphic transformations of the web page code for the purpose of impeding automated cyber-attacks. | 2015-12-03 |
20150347757 | SYSTEM AND METHOD FOR ENCRYPTION OF DISK BASED ON PRE-BOOT COMPATIBILITY TESTING - Disclosed are systems, methods and computer program products for encryption of disk based on pre-boot compatibility testing. An example method includes upon determining, by a processor, no test booting of the computer, performing one or more pre-boot compatibility tests to boot an operating system of the computer; upon detecting a successful test booting, performing booting the operating system of the computer or performing the one or more pre-boot compatibility tests again; upon detecting an unsuccessful test booting, restoring a process of ordinary booting of the operating system and performing an ordinary booting of the operating system; determining one or more encryption policies applicable to a pre-boot execution stage of the computer; and comparing results of the one or more pre-boot compatibility tests with the encryption policies to determine whether to apply a full disk encryption to the boot disk. | 2015-12-03 |
20150347758 | METHODS AND SYSTEMS FOR SECURELY TRANSFERRING EMBEDDED CODE AND/OR DATA DESIGNED FOR A DEVICE TO A CUSTOMER - The invention relates to methods and systems for securely transferring embedded code or data to a customer, in particular to methods and systems for securely transferring embedded code, data files or program files designed for a device to a customer in order to prevent the embedded code, data files or program files from being used on unauthorized devices. | 2015-12-03 |
20150347759 | METHOD AND APPARATUS FOR AUTOMATING THE BUILDING OF THREAT MODELS FOR THE PUBLIC CLOUD - A method and system for automating threat model generation for an application includes identifying components of an application, receiving security information that identifies whether security measures were implemented within the application to secure the application against security threats, determining whether the security measures sufficiently address security risks associated with the security threats, and providing a threat model that includes a report that identifies components of the application that have been sufficiently (or insufficiently) secured from the security threats, according to one embodiment. In one embodiment, determining whether the security measures sufficiently address the security risks can include transmitting first queries, receiving responses to the first queries, and transmitting subsequent queries based at least in part on the responses to the first queries. | 2015-12-03 |
20150347760 | PERTURBATION OF FIELD PROGRAMMABLE GATE ARRAY CODE TO PREVENT SIDE CHANNEL ATTACK - Technologies are provided to automatically vary a structure of a netlist computation arranged to configure a field programmable gate array (FPGA). In an example scenario, an FPGA netlist may be received from a client to configure the FPGA. A perturbation generator may be activated in response to a detection of one or more security risk factors associated with the netlist. The netlist may be altered through schemes designed to repair one or more FPGAs. The repair schemes may be used to repair the FPGAs to work around failed cells and failed sub-cells. The perturbation generator may produce a false map of failed cells. The false map may be used to generate different timings and different intermediate values associated with the netlist to generate an alternate netlist. The alternate netlist may be used to configure the FPGA to prevent side channel attacks. | 2015-12-03 |
20150347761 | AUTOMATIC CORRECTION OF SECURITY DOWNGRADERS - Systems for automatic correction of security downgraders include a security analysis module configured to perform a security analysis that disregards existing user-provided downgraders to detect flows that are vulnerable; and an enhancer module configured to locate candidate downgraders on the flows, to determine whether each of the candidate downgraders protects against all vulnerabilities associated with each downgrader's respective flow, and to transform candidate downgraders that do not protect against all of the associated vulnerabilities such that the transformed downgraders do protect against all of the associated vulnerabilities. | 2015-12-03 |
20150347762 | MECHANISM FOR PROTECTING INTEGRATED CIRCUITS FROM SECURITY ATTACKS - A mechanism for protecting integrated circuits (IC) from security attacks includes an IC having components that may store one or more data items and may perform a number of functions and which produce resulting events. The IC may also include a security module that may modify signals and events provided to the components such that the resulting events are modified in a non-effectual way but that causes the events to be non-deterministic relative to an event that is external to the integrated circuit when the resulting events are viewed externally to the IC. This may result in obscuring the data, and the functions from being observed from external to the IC, particularly when using an IR laser probe. | 2015-12-03 |
20150347763 | IMPLEMENTATION OF SECURE COMMUNICATIONS IN A SUPPORT SYSTEM - A support system negotiates secure connections on behalf of multiple guest systems using a set of credentials associated with the guest systems. The operation of the secure connection may be transparent to the guest system such that guest system may send and receive messages that are encrypted or decrypted by the support system, such as a hypervisor. As the support system is in between the guest system and a destination, the support system may act as a local endpoint to the secure connection. Messages may be altered by the support system to indicate to a guest system which communications were secured. The credentials may be managed by the support system such that the guest system does not require access to the credentials. | 2015-12-03 |
20150347764 | METHODS AND SYSTEMS FOR MODIFYING PARENTAL CONTROL PREFERENCES BASED ON BIOMETRIC STATES OF A PARENT - Methods and systems are described herein for a media guidance application that modifies parental control preferences based on the biometric state of a first user (e.g., a parent) and whether or not a change of the biometric state of the first user is caused by a second user (e.g., a child) that is subject to the parental control preferences. | 2015-12-03 |
20150347765 | SECURE FILE TRANSFER SYSTEMS AND METHODS - Certain example embodiments relate to file transfer systems and/or methods that enable a single provider to offer to different customers customizable file transfer solutions that are secure, scalable to handle enterprise-level amounts of data, and able to meet customer-specific needs even though such needs are not necessarily known in advance. Once initially set up, the file transfer solution of certain example embodiments delegates management of the customer-specific instances of the solution, optionally in a sub-delegatable manner and, thus, the single provider need not be consulted after specific initial instance deployment time (e.g., for security management and/or other routine maintenance issues). | 2015-12-03 |
20150347766 | SECURE RESERVATION MODE FOR LOGICAL UNIT NUMBERS AND PERSISTENT RESERVATIONS - A mapping system and method that enables a secure reservation mode for a plurality of logical unit numbers of a storage system, generates a plurality of secret reservation keys, and instructs a distributed client to utilize at least one of the secret reservation keys to register with the storage system and to issue secure persistent reserves to the plurality of logical unit numbers. | 2015-12-03 |
20150347767 | DIGITAL MULTI-FUNCTION PERIPHERAL AND DATA PROTECTION METHOD OF EXTERNAL MEMORY - In accordance with one embodiment, a digital multi-function peripheral comprises an interface, a data storage section, a memory and a processor. The interface connects an external memory device. The processor holds the authentication information of a user who connects the external memory device, generates a hash value from the information containing the authentication information of the user who connects the external memory device in a case where the state of connection of the external memory device with the interface meets a data saving condition, stores the data obtained by encrypting the data in the external memory device using the generated hash value in the data storage section, and erases the data in the external memory device. | 2015-12-03 |
20150347768 | Policy-Based Trusted Inspection of Rights Managed Content - An embodiment includes a method executed by at least one processor comprising: initializing first and second secure enclaves each comprising a trusted software execution environment that prevents software executing outside the first and second secure enclaves from having access to software and data inside the first and second secure enclaves; the first secure enclave (a)(i) inspecting a policy, (a)(ii) authenticating the second secure enclave in response to inspecting the policy; and (a)(iii) communicating encrypted content to the second secure enclave in response to authenticating the second secure enclave; and the second secure enclave (b)(i) decrypting the encrypted content to produce decrypted content, and (b)(ii) inspecting the decrypted content. Other embodiments are described herein. | 2015-12-03 |
20150347769 | PERMISSION REQUEST - To perform a restricted action, such as access a restricted content item, a subordinate user account can transmit a permission request to an authorizing user account. The permission request can request authorization from the authorizing user account to perform the restricted action. The permission request can be transmitted to one or more client devices of the authorizing user account, and enable to the authorizing user account to remotely select to approve or deny the permission request, thereby either granting or denying the subordinate user account from performing the restricted action. In addition to approving or denying a permission request, an authorizing user account can also be enabled to ignore a permission request, thereby allowing the authorizing user account to respond to the permission request at a later time. Further, in some embodiments, an authorizing user account can select to deny all further permission requests to perform the restricted action. | 2015-12-03 |
20150347770 | Context Based Data Access Control - In some implementations, encrypted data (e.g., application data, keychain data, stored passwords, etc.) stored on a mobile device can be accessed (e.g., decrypted, made available) based on the context of the mobile device. The context can include the current device state (e.g., locked, unlocked, after first unlock, etc.). The context can include the current device settings (e.g., passcode enabled/disabled). The context can include data that has been received by the mobile device (e.g., fingerprint scan, passcode entered, location information, encryption key received, time information). | 2015-12-03 |
20150347771 | ISOLATION AND PRESENTATION OF UNTRUSTED DATA - Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts. | 2015-12-03 |
20150347772 | FAST ACCESS RIGHTS CHECKING OF CONFIGURED STRUCTURE DATA - Methods for product data management and corresponding systems and computer-readable mediums. A method includes receiving a hierarchical data structure that includes a plurality of structure lines referencing persistent data objects and receiving metadata corresponding to persistent data objects referenced by the hierarchical data structure. The method includes computing an access control expression corresponding to each persistent object according to the metadata, wherein the access control expressions are string-representation Boolean expressions, and storing the access control expressions. | 2015-12-03 |
20150347773 | METHOD AND SYSTEM FOR IMPLEMENTING DATA SECURITY POLICIES USING DATABASE CLASSIFICATION - Access to a database is obtained, the database containing data that is potentially of one or more data types and/or data security classifications. The data in the database is scanned to determine the types and/or data security classifications of the data in the database. Then based, at least in part, on the determined types and/or data security classifications of the data in the database a database security classification is associated with the entire database and used to select one or more security measures to be applied to the entire database, at the database level, in accordance with defined data security policies. | 2015-12-03 |
20150347774 | RESTRICTED RESOURCE CLASSES OF AN OPERATING SYSTEM - Techniques for access control of a data processing system are described. In one embodiment, in response to a request from an application for accessing a resource of a data processing system, it is determined a first class of resources the requested resource belongs. A second class of resources the application is entitled to access is determined based on a resource entitlement encoded within the application and authorized by a predetermined authority. The application is allowed to access the resource if the first class and the second class of resources are matched. The application is denied from accessing the resource if the first class and the second class are not matched, regardless an operating privilege level of the application. | 2015-12-03 |
20150347775 | Seamless Upgrade for Network System - In one embodiment, a network system may be upgraded without losing access to write privileges to a network file | 2015-12-03 |
20150347776 | METHODS AND SYSTEM FOR IMPLEMENTING A SECURE LOCK SCREEN - Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content—such as main user interfaces (UIs)—while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements. | 2015-12-03 |
20150347777 | A DATABASE ACCESS SYSTEM AND METHOD FOR A MULTI-TIER COMPUTER ARCHITECTURE - A method for assigning access rights in a database server operating in a multi-tier computer architecture comprises granting a database connection user execution rights to execute a gatekeeper function of the database server. The gatekeeper function is executable to extract session related data and request data from an XML database request message provided by the database convection user. The gatekeeper function is further executable to execute an authentication function for authenticating the session related data. An owner of the authentication function is granted rights to call one or more stored procedures identified by the session related data, responsive to the session related data being successfully authenticated. | 2015-12-03 |
20150347778 | ELECTRONIC APPARATUS AND CONTROL METHOD THEREOF - According to one embodiment, an electronic apparatus includes a processor configured to operate based on a clock, the processor includes a register in which a value added in accordance with the clock is stored, and a memory configured to store first period information indicating a first period in which a file is accessible. The processor is configured to acquire first time and date information indicating a first time and date from an external device, calculate a second time and date indicating a present time and date based on the first time and date information and the value, and restrict access to a resource of the electronic apparatus, when the second time and date does not correspond to the first period. | 2015-12-03 |
20150347779 | METHOD FOR FACILITATING TRANSACTIONS, COMPUTER PROGRAM PRODUCT AND MOBILE DEVICE - There is disclosed a method for facilitating transactions carried out by a mobile device, wherein: the mobile device executes a smart card application; the smart card application receives a cryptographic algorithm from a transaction server external to the mobile device; the smart card application further receives transaction data from said transaction server; the cryptographic algorithm encrypts said transaction data and stores the encrypted transaction data in a storage unit of the mobile device. Furthermore, a corresponding computer program product and a corresponding mobile device for carrying out transactions are disclosed. | 2015-12-03 |
20150347780 | Asymmetric Multi-Apparatus Electronic Information Storage and Retrieval - The present invention provides a system and automated methods to enable a collection of electronic information to be divided into multiple asymmetric scrambled subsets, stored across a plurality of disparate apparatuses, and reconstructed as needed. The present invention provides automated methods to adjust the relative size of the scrambled subsets based upon characteristics such as performance, cost and available space of the apparatuses on which the subsets are stored. The present invention enables the scrambled subsets of electronic information to be created, accessed and manipulated as though they are located on a local device in an integrated and unscrambled state. The present invention enables fault tolerance and enhanced performance through optional redundancy and parity capabilities. The present invention generates an electronic blueprint used to deconstruct the original collection of electronic information and reconstruct it as needed. This electronic blueprint may be encrypted, transferred and shared as required. | 2015-12-03 |
20150347781 | METHODS, SYSTEMS, AND DEVICES FOR SECURING DISTRIBUTED STORAGE - The description relates in particular to a method of secure distributed storage, to a secure access method and to a distributed storage, and to devices, systems, computer programs and storage medium for the implementation of such methods. | 2015-12-03 |
20150347782 | SYSTEMS AND METHODS FOR DATA VERIFICATION AND REPLAY PREVENTION - A system and method are provided for the secure sharing of information stored using cloud storage services and for performing data verification and replay protection for information stored on an open network. | 2015-12-03 |
20150347783 | DATABASE ACCESS CONTROL FOR MULTI-TIER PROCESSING - Embodiments of the disclosure can include a method, a system, and a computer program product for controlling access to a database server in a multi-tiered processing system. The method can include receiving an application request having an identification parameter to an application server at an application layer. The method can also include querying a database objects map that maps the application request to a database object and a database operation in a database layer. The method can also include accessing one or more database access security rules for the identification parameter that specify a security action based on the database object and the database operation. The method can also include comparing the database object and database operation determined from the application request with the database object and database operation from the one or more security rules. | 2015-12-03 |
20150347784 | MANAGING USER INFORMATION - AUTHORIZATION MASKING - Systems, methods, and computer-readable medium are provided for managing user information. For example, data of the user may be stored in a memory. A request for a user to authorize access of at least a portion of the data may be provided. The authorization may be for an application to access the portion of the data. In some examples, a response to the request may be received, and an indication that the request was provided to the user may be provided without indicating whether the user denied the request. | 2015-12-03 |
20150347785 | SOCIAL NETWORK ROUTING - An Ad Hoc social networking environment enables information and device access management between social networking groups and social networking members with or without access restrictions and anonymity. Contact and access information can be exchanged and updated on the fly without requiring users to notify other contacts or contacting devices and can support underlying contact information changes, enable extemporaneous termination or modification of contact access, enable temporary access, and the like. Ad Hoc social networking can utilize unique identifiers, proxy elements, or the like to support various levels of membership anonymity and Ad Hoc social networking. Proxy elements enable SNET tear down or dissolution by retracting the proxy service from a member. Storing social group contact information in shared databases can enable sharing and updating of contact information without the need to inform affected contacts. Some social networks can include various specialized devices and related services. | 2015-12-03 |
20150347786 | SECURE STORAGE OF AN ELECTRONIC SUBSCRIBER IDENTITY MODULE ON A WIRELESS COMMUNICATION DEVICE - A method for secure storage of an embedded Subscriber Identity Module (eSIM) on a wireless communication device including an embedded Universal Integrated Circuit Card (eUICC) and a memory external to the eUICC is provided. The method can include the eUICC determining that an eSIM package including an eSIM is to be stored on the memory. The method can also include the eUICC, in response to determining that the eSIM package is to be stored on the memory, maintaining a single-use session parameter associated with the eSIM package to enable installation of the eSIM on the eUICC if the eSIM package is later loaded onto the eUICC from the memory. | 2015-12-03 |
20150347787 | AUTHENTICATION IN A FLEXIBLE DISPLAY COMPUTING DEVICE - Embodiments of the invention provide for device authentication in a flexible display computing device. In an embodiment of the invention, a method for device authentication in a flexible display computing device includes pre-storing in memory of a computing device, data corresponding to a pattern of folds of a flexible display of the computing device. The method also includes receiving a subsequent authentication request in the computing device and, in response, monitoring a folding of the flexible display and computing data corresponding to a pattern of the monitored folding. The method yet further includes comparing in the memory of the computing device the computed data to the pre-stored data. Finally, the method includes granting access to the computing device if the pattern of the monitored folding compares to the pattern of folds based upon a threshold degree of equality between the computed data and the pre-stored data. | 2015-12-03 |
20150347788 | MOBILE DEVICE AUTO WIPE - In one embodiment, a mobile computing device automatically determines an occurrence of a security event associated with the mobile computing device, and automatically erase all software and data on the mobile computing device. | 2015-12-03 |
20150347789 | Detection of a Transactional Device - A terminal includes first and second communication modules for communicating with a personal device for performing transactions, called a transactional device. The first communication module includes a contact reading interface, and the second communication module includes a contact-free reading interface. The terminal also includes a detection module including: at least one transactional device position sensor, delivering an item of data representative of a position of a transactional device relative to the terminal; and at least one control module for controlling at least one communication module of the first and second communication modules, the at least one control module activating the communication module on the basis of the item of data representative of the position of the transactional device. | 2015-12-03 |
20150347790 | MAGNETIC STRIPE READER WITH CARD SWIPE INFORMATION FEEDBACK - A magnetic card reader module includes a magnetic sensor and an adjacent groove, a micro controller and an application. The magnetic sensor is configured to pick-up an analog magnetic signal generated by swiping a magnetic stripe through the groove. The magnetic stripe is attached to a card and comprises tracks with magnetically encoded data. The microcontroller is configured to convert the analog magnetic signal into a digital signal. The application is configured to analyze the digital signal, and to perform soft-decision decode of the digital signal and to generate an output comprising the magnetically encoded data and side information providing card swipe information feedback. | 2015-12-03 |
20150347791 | RFID TRACKING - An RFID sensor tag includes a processor, a power source, an RF transceiver, one or more sensors accessible to the processor via a sensor interface, and at least one memory device. In one example, the tag is configured to operate in a low power-consumption state, a medium power-consumption state in which sensor measurements are performed, and a high power-consumption state used when engaged in RF communications. In another example, power consumption and memory usage are reduced by configuring the tag to record sensor data only upon satisfaction of a predetermined condition. In a further example, the tag is configured to respond to an RF interrogation signal only when the signal includes an instruction in accordance with a predetermined communications protocol. In another example, the tag is configured, upon interrogation, to confirm whether new recorded sensor data is available, to minimise transmission in the event that no new data is available. | 2015-12-03 |
20150347792 | LOW COST, WIDE AREA RFID SYSTEM - Techniques for radio-frequency identification systems include sensor systems having a sensor unit and one or more sensors and a server. The sensor system includes one or more antennas at a location configured to receive signals from a tag proximate to an antenna and a processor configured to process tag detection signals based on the received signals. The processing may include selectively storing tag detection signals received from one or more antennas and identify an event related to the presence of a tag proximate to an antenna at the location. Sensor system may include a transmitter configured to transmit a message indicating the event over a network to a server. The server may be configured to process the message by analyzing a feature of the signals related to the event. The analysis may evaluate an adjustment of a configuration parameter used to operate an antenna. The configuration parameter may be updated by the server, and the server may transmit a message indicating the configuration parameter to the sensor system. | 2015-12-03 |
20150347793 | EDGE CRACK DETECTION SYSTEM - According to an exemplary embodiment, a method of detecting edge cracks in a die under test is provided. The method includes the following operations: receiving a command signal; providing power from the command signal; providing a response signal based on the command signal; and self-destructing based on the command signal. | 2015-12-03 |
20150347794 | SYSTEM FOR STORING INFORMATION RELATED TO OBJECTS AND FURTHER TRANSMITTING THE OBJECT INFORMATION TO USERS - Disclosed is a system for storing information related to one or more objects and transmitting the object information to one or more users. The system includes first electronic circuitry, second electronic circuitry and third electronic circuitry. The first electronic circuitry interacts with one or more users and one or more objects. The second electronic circuitry capacitvely coupled with first electronic circuitry and transmits the object information to the users via capacitive coupling. The third electronic circuitry capacitvely coupled with first electronic circuitry via one or more users. The system further transmits the user related object information to one or more output devices. | 2015-12-03 |
20150347795 | DEVICE DETECTING SPATIAL VARIATION OF COMPLEX PERMITTIVITY AND SYSTEM DETECTING PRESENCE/ABSENCE OF ARTICLE - Provided are a device detecting the spatial variation of the complex permittivity and an article presence/absence detection system which are capable of detecting the presence or absence of an article by using a UHF-band RFID tag. A device detecting the spatial variation of the complex permittivity includes an RFID tag, a conductor electrode unit, and a dielectric tag base material. The RFID tag performs communication using an electromagnetic wave in a UHF band. The conductor electrode unit communicates with the RFID tag by using the electromagnetic wave in the UHF band. The dielectric tag base material is provided between the RFID tag and the conductor electrode unit and separates the RFID tag from the electrode unit. | 2015-12-03 |
20150347796 | COMPUTATIONS USING A POLYCHRONOUS WAVE PROPAGATION SYSTEM - The present invention relates to a polychronous wave propagation system that is based on relative timing between two or more propagated waves through a wave propagation medium. The relative timing may be associated with interference patterns of energy between the propagated waves. Operational behavior of the polychronous wave propagation system is based on the relative timing of the propagated waves and distances between initiators that transmit the propagated waves and responders that receive the propagated waves. The operational behavior may include arithmetical computations, memory storage, Boolean functions, frequency-based computations, or the like. The polychronous wave propagation system relies on time delays between the propagated waves that result from propagation velocities of the propagated waves through the wave propagation medium. By incorporating the time delays into the system, operational capacity may be greatly enhanced. | 2015-12-03 |
20150347797 | IMAGING BASED ENGINE WITH MULTIPLE ELEMENTS SUPPORTED ON A COMMON PRINTED CIRCUIT BOARD - An apparatus for use in decoding a bar code symbol may include an image sensor integrated circuit having a plurality of pixels, timing, and control circuitry for controlling an image sensor, gain circuitry for controlling gain, and analog to digital conversion circuitry for conversion of an analog signal to a digital signal. The apparatus may also include a printed circuit board for receiving the image sensor integrated circuit. The connection between the image sensor integrated circuit and the printed circuit board characterized by a plurality of conductive adhesive connectors disposed between a plurality of electrode pads and a plurality of contact pads, where the conductive adhesive connectors provide electrical input/output and mechanical connections between the image sensor integrated circuit and the printed circuit board. The apparatus may be operative for processing image signals generated by the image sensor integrated circuit for attempting to decode the bar code symbol. | 2015-12-03 |
20150347798 | POINT-OF-TRANSACTION WORKSTATION FOR, AND METHOD OF, IMAGING SHEET-LIKE TARGETS - A workstation processes a product by imaging an indicium associated with the product in a transaction, and images a sheet-like target associated with the transaction. A window is supported in a window plane in contact with the target during target imaging. An imaging assembly captures light from the indicia during product processing, and from the target during target imaging, over a plurality of fields of view extending along different directions through the window. Each field bounds an area in the window plane that is smaller than the entire target. At least one pair of the fields partially overlaps each other in the window plane. The fields overlap contiguous portions of the target during target imaging. The light from the contiguous portions is captured by the imaging assembly as a plurality of target images. A controller compiles the target images into a single output image indicative of the target. | 2015-12-03 |
20150347799 | EXTENDED DEPTH OF FIELD IN IMAGING MACHINE-READABLE SYMBOL READER USING IMAGE SIDE TELECENTRIC LENS - Systems and methods for providing multiple image fields or regions on a single, two-dimensional imaging sensor array of a data reader. A single sensor array may be divided into two or more imaging regions each of which may be used to render a separate view of an overall read volume. An image-side telecentric optical system may be utilized to divide the sensor array into the two or more imaging regions. A thin, high refractive index focal element (e.g., optical glass) may be positioned over at least one of the two or more imaging regions to provide multiple focus positions using a single telecentric optical system and a single sensor array. The multiple imaging regions may be used to capture images from different regions, and/or may be used produce a longer depth of field by combining overlapping depths of field of the multiple imaging regions. | 2015-12-03 |
20150347800 | POWER SUPPLY TAP - A power supply tap includes: a reading sensor that is provided near an outlet, and reads a color recorded in a color plate; a converter that converts the color read by the reading sensor into corresponding information; a measurer that measures a power consumption value of an electronics device connected to the outlet in which the color plate is read; and a transmitter that transmits the measured power consumption value and the converted information to a management device managing the power consumption value of the electronics device. | 2015-12-03 |
20150347801 | OBJECT RECOGNITION FOR EXCEPTION HANDLING IN AUTOMATIC MACHINE-READABLE SYMBOL READER SYSTEMS - Systems and methods for exception handling in an automated machine-readable symbol reader system having a machine-readable symbol reader that captures machine-readable symbols within a view volume. One or more image capture devices obtain a plurality of images of an exception object in response to an exception generated in the view volume. A processor receives the images, identities visual object recognition features from each image, and compares the features to determine one or more descriptive measures indicative of a likelihood that an operator (e.g., store employee) will be able to identify the exception object by viewing the image. The processor displays at least one of the images (e.g., the most descriptive image) on a display device according to the descriptive measure so that an operator can rapidly identify the identity of the exception object and take steps to resolve the exception. | 2015-12-03 |
20150347802 | SYSTEMS AND METHODS FOR SORTING IMAGE ACQUISITION SETTINGS FOR PATTERN STITCHING AND DECODING USING MULTIPLE CAPTURED IMAGES - Systems and methods are described for acquiring and decoding a plurality of images. First images are acquired and then processed to attempt to decode a symbol. Contributions of the first images to the decoding attempt are identified. An updated acquisition-settings order is determined based at least partly upon the contributions of the first images to the decoding attempt. Second images are acquired or processed based at least partly upon the updated acquisition-settings order. | 2015-12-03 |
20150347803 | CLUSTER COMPUTING OF BAR CODE DATA - A reading system including: a primary reader for reading an information bearing device (IBD) having encoded IBD data provided therein for packetizing the encoded data and processing a first data packet of the packetized encoded data and transmitting a second data packet of the packetized encoded data; at least one auxiliary reader for receiving and processing the second data packet and the transmitting the processed second data packet; and wherein the processed first and second data packets are combined to produce decoded IBD data. | 2015-12-03 |
20150347804 | METHOD AND SYSTEM FOR ESTIMATING FINGERPRINT POSE - A method and system for estimating a fingerprint pose are provided. The method includes following steps. A fingerprint image to be estimated is input, features are extracted from the fingerprint image to be estimated in all possible center positions and directions, each feature is scored via a classifier and a center position and direction corresponding to a feature of a highest score is selected as a fingerprint pose estimation result. | 2015-12-03 |
20150347805 | SYSTEM, METHOD AND APPARATUS FOR ELECTROMAGNETIC DETECTION AND ANALYSIS OF BIOMETRIC INFORMATION - An apparatus, method and system are provided for sensing at least one biometric measure of an individual. An electrical current flows through an electrode to induce an electromagnetic field. The electromagnetic field stimulates and excites the molecules associated with the sweat gland pores and causes molecular compounds to fluoresce. An image of the fluoresced dermal surface is obtained and a biometric function is performed with data derived from the image. Alternatively, sweat gland pore biometric information may be derived from variations, fluctuations or disturbances to the electromagnetic field induced by the electrical current. | 2015-12-03 |
20150347806 | CHIP PACKAGE STRUCTURE AND METHOD FOR MANUFACTURING CHIP PACKAGE STRUCTURE - A chip package structure includes a flexible substrate, a patterned circuit layer, a fingerprint sensor chip, a plurality of bumps, a patterned dielectric layer and an encapsulant layer. The patterned circuit layer disposed on the flexible substrate includes a fingerprint sensing circuit and a plurality of terminals. The fingerprint sensor chip disposed on the flexible substrate is electrically connected to the fingerprint sensing circuit and includes an active surface, a back surface, and a plurality of bonding pads disposed on the active surface. The bumps disposed between the fingerprint sensor chip and the patterned circuit layer electrically connect the bonding pads and the terminals. The patterned dielectric layer including a first surface and a second surface having a fingerprint sensing region at least covers the fingerprint sensing circuit with the first surface. The encapsulant layer is filled between the flexible substrate and the fingerprint sensor chip and covers the bumps. | 2015-12-03 |
20150347807 | ELECTRONIC DEVICE WITH FINGERPRINT SENSING SYSTEM AND CONDUCTING HOUSING - The present invention relates to an electronic device comprising a fingerprint sensing system including a plurality of sensing elements, each being configured to capacitively couple to a finger arranged adjacent to the sensing element and to provide a sensing signal indicative of a response to a time-varying finger excitation signal provided to the finger; and an electrically conducting housing at least partly enclosing an interior of the electronic device. The electronic device further comprises housing connection circuitry connected to the electrically conducting housing, and arranged and configured to at least intermittently allow a potential of the electrically conducting housing to follow the finger excitation signal. Hereby the housing can be used to enhance the functionality of the fingerprint sensing system. | 2015-12-03 |
20150347808 | METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA - A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline image in a stationary position on a display of the device, positioning desired biometric data proximate the device such that the desired biometric data appears as a biometric image on the device display, and monitoring the outline and biometric images shown on the device display. Furthermore, the method includes positioning the device and the desired biometric data to better align the outline and biometric images when the outline and biometric images do not align and capturing the desired biometric data from an individual after approximately aligning the outline image with the biometric image. | 2015-12-03 |
20150347809 | MULTI-LINED SENSOR - A biometric sensor device for measuring structures and properties of an object of organic tissue, especially a fingerprint sensor, includes a plurality of linear sensing arrays adapted to generate a respective plurality of measurement data at a predetermined sampling rate for a predetermined time period, based upon a sliding movement of the organic tissue over the plurality of linear sensing arrays, and a processor adapted to generate a partial image of the organic tissue from each of the respective plurality of measurement data. The processor is further adapted to generate a complete image of the organic tissue by combining the partial image generated from each of the plurality of measurement data, wherein the complete image is larger than each of the partial images, and the predetermined time period is defined so as to measure a section of said organic tissue given by the distance between two linear arrays. | 2015-12-03 |
20150347810 | ELECTRONIC DEVICE FOR REALLOCATING FINGER BIOMETRIC TEMPLATE NODES IN A SET MEMORY SPACE AND RELATED METHODS - An electronic device may include a finger biometric sensor, a memory, and a processor capable of generating a respective finger biometric template node for each finger positioning adjacent the finger biometric sensor. The processor may also be capable of allocating a set space of the memory to store a total number of finger biometric template nodes based upon a first number of fingers and with each finger having a first number of finger biometric template nodes associated therewith. In addition, the processor may reallocate the set space of the memory to store the total number of finger biometric template nodes but with a second number of finger biometric template nodes associated with at least one finger, with the second number of finger biometric template nodes being different than the first number of finger biometric template nodes. | 2015-12-03 |
20150347811 | DISPLAY DEVICE AND METHOD OF CONTROLLING THEREFOR - A display device and a method of controlling therefor are disclosed. The display device includes a fingerprint recognition unit configured to recognize a fingerprint and a movement of the fingerprint, a touch display unit configured to display visual content and a controller configured to control the fingerprint recognition unit and the touch display unit, wherein if a fingerprint contacted with the fingerprint recognition unit is recognized as a registered fingerprint, the controller is configured to switch a screen to a home screen from a lock screen by unlocking the display device, wherein if a notification event is detected the controller is configured to control the touch display unit to display a notification list selection screen together with the switched home screen, and wherein if a continuous movement of the fingerprint maintaining the contact is recognized, the controller is configured to perform a control process on the notification list selection screen. | 2015-12-03 |
20150347812 | ELECTRONIC DEVICE AND FINGERPRINT RECOGNITION METHOD - An electronic device and fingerprint recognition method are provided. The electronic device includes a housing, a lens protection cover, a processing unit, an image capturing unit, a light-source sensor and a visible light source module. The lens protection cover is installed on the housing. The light-source sensor is configured to detect external light which comes into the electronic device through the lens protection cover. The processing unit determines whether the detected external light is less than a threshold. The visible light source module is configured to generate visible light. When the detected external light is less than the threshold, the processing unit activates the visible light source module to generate the visible light, and activates the image capturing unit to capture a fingerprint image of a user's finger which is put on the lens protection cover for fingerprint recognition. | 2015-12-03 |
20150347813 | FINGERPRINT IMAGE CAPTURING DEVICE AND FINGERPRINT IMAGE CAPTURING MODULE THEREOF - A fingerprint image capturing module includes a light-emitting element, a light-splitting element, a first light-reflecting element, a second light-reflecting element, a lens assembly and a fingerprint image sensing element, characterized in that: a projection light beam generated by the light-emitting element is reflected by the light-splitting element and the first light-reflecting element in sequence to form an illumination light beam that passes through a light-transmitting element and is projected onto a fingerprint of a finger, the illumination light beam is reflected by the finger to form an image light beam that is reflected by the first light-reflecting element, the image light beam sequentially passes through the light-splitting element and the lens assembly and is projected onto the fingerprint image sensing element through the second light-reflecting element, and the fingerprint image sensing element receives the image light beam to obtain a fingerprint image of the fingerprint of the finger. | 2015-12-03 |
20150347814 | EFFICIENT FOREST SENSING BASED EYE TRACKING - Methods, systems, computer-readable media, and apparatuses for novel eye tracking methodologies are presented. Specifically, after an initial determination of a person's eyes within a field of view (FOV), methods of the present disclosures may track the person's eyes even with part of the face occluded, and may quickly re-acquire the eyes even if the person's eyes exit the FOV. Each eye may be tracked individually, at a faster rate of eye tracking due to the novel methodology, and successful eye tracking even at low image resolution and/or quality is possible. In some embodiments, the eye tracking methodology of the present disclosures includes a series of sub-tracker techniques, each performing different eye-tracking functions that, when combined, generate a highest-confidence location of where the eye has moved to in the next image frame. | 2015-12-03 |