52nd week of 2015 patent applcation highlights part 50 |
Patent application number | Title | Published |
20150371032 | Method to Securely Authenticate Management Server Over Un-Encrypted Remote Console Connection - A Virtual network computing (VNC) server receives a client launch request from a VNC client and provides a log-in page for display at the VNC client. The log-in page includes a graphical representation of a keyboard having a plurality of keys. Individual key designations at the keyboard are unique and are generated randomly in response to the client launch request. The VNC server receives pointing device movement coordinates from the VNC client; the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client. | 2015-12-24 |
20150371033 | String and Password Generation from Regular Expressions - Technologies are described herein for generating uniformly random passwords by the use of regular expressions. One or more regular expressions are used to define a constraint on a string or password. The regular expressions are processed into one or more symbolic finite automata (SFA). The one or more SFAs are exposed to a combination of operations to produce a determinized, minimized SFA. Provided techniques generate probability data associated with individual state transitions of the SFA, and optionally, probability data is generated for one or more binary decision diagrams (BDD). Passwords or strings can be generated by traversing the SFA using the probability data. In some embodiments, the process for selecting characters at each state transition of the determinized, minimized SFA may utilize a binary decision diagram (BDD). Techniques disclosed herein also minimize SFAs by use of an over-approximation method. | 2015-12-24 |
20150371034 | Trust Agents - Systems and techniques are provided for trust agents. Trust agents may be enabled. A state determination may be received from each of the enabled trust agents. The state determination may indicate either a trusted state or an untrusted state. The received state determinations may be combined to determine a security state. A security measure may be enabled or disabled based on the determined security state. | 2015-12-24 |
20150371035 | INTERCEPTING INTER-PROCESS COMMUNICATIONS - Intercepting inter-process communications by determining a first computer memory location of an inter-process communications function of an instance of a virtual machine and causing an interception function at a second computer memory location to be called when a computer software application calls the inter-process communications function. | 2015-12-24 |
20150371036 | DEVICE SIMULATION IN A SECURE MODE SUPPORTED BY HARDWARE ARCHITECTURES - A secure mode of a computer system is used to provide simulated devices. In operation, if an instruction executing in a non-secure mode accesses a simulated device, then a resulting exception is forwarded to a secure monitor executing in the secure mode. Based on the address accessed by the instruction, the secure monitor identifies the device and simulates the instruction. The secure monitor executes independently of other applications included in the computer system, and does not rely on any hardware virtualization capabilities of the computer system. | 2015-12-24 |
20150371037 | Secure IF Antecedent - Hostile attacks against a computer program are prevented when the program is executed in a computing environment that is controlled by the attacker. A preposition is run in a secure computing environment instead of the original call site, i.e. the IF antecedent, which has a TRUE consequence and a FALSE consequence are run in a secure computing environment. Embodiments of the invention also allow an insecure call site to detect modifications by a hostile attacker surreptitiously. In embodiments of the invention, a script is generated by a script generator from the IF antecedent and TRUE and FALSE consequence source code, for example relative to a call site. The original source code is modified to call the script engine, rather than the preposition. At run-time a script engine executes this script. | 2015-12-24 |
20150371038 | LOCATING A WIRELESS COMMUNICATION ATTACK - A technique for locating a wireless communication attack includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device. If the communication attempt by the suspected criminal device is detected by the analysis, a communication to the criminal device is controlled so as to delay completion of the communication to the criminal device in order to provide time to locate the criminal device. | 2015-12-24 |
20150371039 | Improved Malware Detection - A method of detecting suspicious code that has been injected into a process. The method includes identifying suspicious executable memory areas assigned to the process and, for each thread in the process, inspecting a stack associated with the thread to identify a potential return address; determining whether or not the potential return address is located within a suspicious memory area; and, if the potential return address is located within a suspicious memory area, determining whether or not the instruction at the address preceding the potential return address is a function call and, if yes, determining that the potential return address is a true return address and identifying the thread and associated code as suspicious. | 2015-12-24 |
20150371040 | Method, Device And System For Processing Notification Bar Message - Disclosed are a method, device and system for processing notification bar message, the method comprising: triggering an interception program pre-injected in a notification bar message process; and the interception program, when capturing a notification bar message satisfying a preset rule, intercepting the notification bar message satisfying the preset rule, and sending a prompt message. The disclosure can timely recognize and block a notification bar advertisement. | 2015-12-24 |
20150371041 | DEFENSIVE TECHNIQUES TO INCREASE COMPUTER SECURITY - Among other disclosed subject matter, a computer-implemented method includes changing access permission level associated with a descriptor table responsive to request to update the descriptor table. In some implementation, before receiving the request to update, the descriptor table is maintained in a read-only state; and changing the access permission level comprises: allowing write access to the descriptor table responsive to determining that the update request is authorized. | 2015-12-24 |
20150371042 | Systems and Methods Involving Features of Hardware Virtualization, Hypervisor, Pages of Interest, and/or Other Features - Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or memory access. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a detection mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or notification of, and action by a monitoring guest upon access by a monitored guest to predetermined physical memory locations. | 2015-12-24 |
20150371043 | Controlling a Download Source of an Electronic File - A method and apparatus for controlling a download source for an electronic file. The method includes at a server, receiving from a user device an identity of a first source from which the user device wishes to obtain the electronic file. The received identity of the first source is compared with an identity of a known reputable source associated with the electronic file. If the first source and the known reputable source do not match, a message is sent to the user device that includes the identity of the reputable source. | 2015-12-24 |
20150371044 | TARGETED SECURITY ALERTS - Providing a targeted security alert can include collecting participant data from a plurality of participants within a threat exchange community, calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants within the threat exchange community using the collected participant data, and providing, from the threat exchange server to the participant, the targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community. | 2015-12-24 |
20150371045 | METHODS, SYSTEMS AND MACHINE-READABLE MEDIA FOR PROVIDING SECURITY SERVICES - Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed. | 2015-12-24 |
20150371046 | PREVENTING CODE MODIFICATION AFTER BOOT - The subject disclosure is directed towards protecting code in memory from being modified after boot, such as code used in a dedicated microprocessor or microcontroller. Hardware, such as in logic or in a memory protection unit, allows a range of memory to be made non-writeable after being loaded, e.g., via a secure boot load operation. Further, startup code that is used to configure the hardware/memory may be made non-executable after having run once, so that no further execution may occur in that space, e.g., as a result of an attack. A function in the runtime code may allow for a limited, attack-protected reconfiguration of sub-regions of memory regions during the runtime execution. | 2015-12-24 |
20150371047 | DETERMINING COVERAGE OF DYNAMIC SECURITY SCANS USING RUNTIME AND STATIC CODE ANALYSES - Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code. | 2015-12-24 |
20150371048 | APPARATUS AND METHOD FOR COMMUNICATIONS IN A SAFETY CRITICAL SYSTEM - A safety communication scheme for a safety-critical system which includes two or more higher level units that have voting capabilities and one or two sets of lower level units that do not have voting capabilities, involves using one channel between the high and low level units for safety and two channels for redundancy. | 2015-12-24 |
20150371049 | SYSTEMS, METHODS AND DEVICES FOR PROVIDING VISUAL PRIVACY TO MESSAGES - At least one of the embodiments described herein relate generally to a method of providing visual privacy for a message sent to at least one device. The method may include the acts of: receiving the message at the at least one device, the message including content and a privacy indicator; converting the content to a content image; applying a blur function to the content image to generate a blurred content image, generating an obscured layer from the blurred content image; partitioning the content image into one or more segments to generate a content layer, the one or more segments each having one or more segment attributes; aligning the obscured layer with the content layer, wherein selecting an area on the obscured layer corresponding to the one or more segments removes the obscured layer for the one or more segments based on the one or more segment attributes. | 2015-12-24 |
20150371050 | METHOD AND END DEVICE FOR SECURELY INPUTTING ACCESS CODE - The invention provides a method for securely inputting an access code to an input interface of a mobile end device. During an input time period covering the process of inputting the access code, at least one or some sensors of the end device that are uninvolved in the input of the access code, said sensors being respectively arranged for capturing sensor variables by sensor, are hindered from capturing and/or passing on the respective sensor variable. Possible sensors are acceleration sensors or a digital camera. The method prevents the access code from being spied out by means of the deactivated sensors. | 2015-12-24 |
20150371051 | METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENT USING DEVICE AUTHENTICATION - A user device may strengthen the protection level of a digital content by dividing the security and normal modes and performing an operation. In order to further strengthen the protection level of the digital content, the user device may determine whether the main operating system is hacked or not, and blocks the operation in the secure mode. Otherwise, the device authorization information indicating the device security level of the user device is authorized by the content service server, and the user device blocks the operation in the secure mode according to the result. | 2015-12-24 |
20150371052 | ENCRYPTION OF USER DATA FOR STORAGE IN A CLOUD SERVER - Disclosed are systems, methods and computer program products for encryption of user data for storage on a remote network server. In one aspect, an example method includes collecting, by a software client, one or more sets of user authentication data from a user device; performing user authentication using one or more sets of user authentication data; when user authentication is successful, calculating a hash of at least one set of the user authentication data; generating an encryption key from the hash of the user authentication data; encrypting the user data using the generated encryption key; and transmitting the encrypted user data to the remote network server for storage. | 2015-12-24 |
20150371053 | ANTI-IDENTITY-THEFT METHOD AND HARDWARE DATABASE DEVICE - A hardware device (TCK) for securing data in a database accessed through an Internet server is presented. The TCK controls access to its internal database through two physically separate access channels. Through at least one “unprivileged channel (port)” the TCK provides access to its individual records, one at a time, subject to stringent security provisions. Through at least one physically separate “privileged channel” not reachable by the Internet server through the unprivileged channel, the TCK provides access to administrative operations, and facilitates more complete access to the database, thus allowing, for example, retrieval or listings of stored keys and values, multi-record access, and/or the ability to run other computer programs. Thus, the TCK system can provide extra security protection for data needed by Internet servers that are utilized by multiple known and/or anonymous users. | 2015-12-24 |
20150371054 | SHUTTER GLASSES, DISPLAY DEVICE, DISPLAY SYSTEM AND DISPLAY METHOD - The present invention provides shutter glasses comprising lenses and a shutter configured to control on-state or off-state of the lenses, wherein, the shutter is capable of turning on the lenses of the shutter glasses according to a predetermined first timing. The present invention further provides a display device, a display system and a display method. The shutter glasses provided by the present invention and the display device provided by the present invention are operated cooperatively, only a wearer wearing the shutter glasses can view coherent target images, while a person who does not wear the shutter glasses cannot identify contents of the target images, and cannot obtain contents of target images even when the display screen of the display device is photographed. With the shutter glasses and the display device provided by the present invention, security can be improved when operating confidential files. | 2015-12-24 |
20150371055 | HOST CONTROLLER AND SYSTEM-ON-CHIP - A host controller that controls a storage device includes an encryption unit that is selectively configured in response to file encryption information and disk encryption information to encrypt data. The encryption unit encrypts the data using a file encryption operation based on the file encryption information and/or a disk encryption operation based on the disk encryption information. | 2015-12-24 |
20150371056 | SYSTEM AND METHOD FOR ENHANCING USABILITY OF APPLICATIONS RUNNING ON DEVICES THAT SECURELY STORE DATA - The technique relates to a system and method for enhancing usability of devices that securely store data. The method involves receiving a plurality of client related context information from a client on a server, in response to invocation of a client application on a device then obtaining data and a plurality of data related context information from the server thereafter determining decision on data storage request on the device based on the client related context information and the data related context information and finally communicating the data and the decision to the client. | 2015-12-24 |
20150371057 | FILE SHARING SYSTEM AND METHOD - A file sharing system and method for sharing media files facilitates sharing of media without permitting the media to be downloaded, or stored on web servers. The file sharing system may further enable lists of files to be shared and responses to be delivered to the media owner during playback by a user. A communication function exists within the system to enable users to communicate with other users within the system. Sharing of digital content may be accepted or rejected by users of the system, and a local device may be utilized to enable the storing and sharing of media that is hosted off the cloud. Streaming from the file sharing system or the local device is facilitated through the system. | 2015-12-24 |
20150371058 | META-COMPLETE DATA STORAGE - The invention described herein generally relates to systems and methods of securely storing data so that the data contains information about the data and/or the encryption of the data, systems and methods of providing secure access to real world data through data transformations, and systems and methods of managing security parameters for data. | 2015-12-24 |
20150371059 | PRIVACY-SENSITIVE RANKING OF USER DATA - One embodiment of the present invention provides a system for privacy-sensitive ranking of aggregated data. During operation, the system distributes secret keys to a plurality of devices. The system then generates a plurality of probability density functions in a privacy-preserving way using encrypted data received from a subset of the plurality of devices. The encrypted data is data that has been encrypted with one or more of the secret keys by the subset of devices. The system then generates a plurality of probability mass functions, each probability mass function associated with a corresponding probability density function. Subsequently, the system computes a plurality of distance values, each respective distance value being a measure of distance from a probability mass function to a second distribution. The system then ranks the probability mass functions and/or associated attributes according to their respective distance from the second distribution. | 2015-12-24 |
20150371060 | SYSTEM ON CHIP - In a system on chip responder units comprise one or more responder elements and is associated with one or more protection units. A request analysis unit is arranged to receive from a requesting requestor unit a request for access to one or more target responder elements among responder elements within a target responder unit among the responder units. The request analysis unit determines relevant protection data based on the request and an authorization list, which comprises one or more entries. For each entry of the authorization list: taking access requirements specified by the respective entry into account if one or more of the target responder elements are part of the group of responder elements specified by the respective entry. The request analysis unit provides the relevant protection data to one or more target protection unit(s) associated with the responder unit(s), and located in a hierarchical path between the requesting requestor unit requestor unit and the target responder unit. The target protection unit(s) are arranged to perform a protective action for the target responder elements based on relevant protection data. | 2015-12-24 |
20150371061 | ENCRYPTION KEY GENERATION IN ENCRYPTED STORAGE DEVICES - A system and method of generating an encryption key in a self-encrypting mass storage device that includes using a manual input device as input for a micro-controller that contains a cyclic counter. An input device event triggers the micro-controller to read the current state of the cyclic counter. An accumulation of cyclic counter values is used as a source of entropy to seed a deterministic random number generator. The output of the deterministic random number generator is used as an encryption key for encryption/decryption processes within the mass storage device. | 2015-12-24 |
20150371062 | SERVER DEVICE, CONCEALED SEARCH PROGRAM, RECORDING MEDIUM, AND CONCEALED SEARCH SYSTEM - A server device | 2015-12-24 |
20150371063 | Encryption Method for Execute-In-Place Memories - Encryption/decryption techniques for external memory are described herein. In an example embodiment, a device comprises an internal memory and an external memory controller. The internal memory is configured to store a key. The external memory controller is configured to encrypt, with the key, an address for an access operation to an external memory device to obtain an encrypted address, and to encrypt or decrypt a block of data for the access operation based on the encrypted address. | 2015-12-24 |
20150371064 | Security Adjustments In Mobile Devices - Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events. | 2015-12-24 |
20150371065 | RADIO-FREQUENCY IDENTIFICATION READER DEVICE - A radio-frequency identification reader device including a plurality of antennas, a switch module, a coaxial cable, and a reader is provided. The switch module is electrically connected to the antennas. The coaxial cable is electrically connected to the switch module. The reader transmits a DC voltage, a control signal, and a radio-frequency signal to the switch module through the coaxial cable. The switch module generates an operation voltage by the DC voltage and the control signal. The switch module selects one of the antennas as a preset antenna by the control signal and drives the preset antenna by the radio-frequency signal. | 2015-12-24 |
20150371066 | RADIOFREQUENCY TRANSPONDER CIRCUIT - The invention relates to radiofrequency transponder circuits, and in particular to such transponder circuits having a unique identifier. Embodiments disclosed include a radiofrequency transponder circuit ( | 2015-12-24 |
20150371067 | RFID Systems with Low Complexity Implementation and Pallet Coding Error Correction - Systems and methods for decoding data transmitted by RFID tags are disclosed. One embodiment of the invention includes an analyzer and equalizer configured to filter an input signal, an estimation block configured to obtain a baseband representation of the modulated data signal by mixing the filtered input signal with the carrier wave, and a coherent detector configured to perform phase and timing recovery on the modulated data signal in the presence of noise and to determine a sequence of data symbols. | 2015-12-24 |
20150371068 | Tag Powersave - A tag includes a communication interface that is configured to receive and transmit wireless transmissions, a movement detector and a digital logic circuit configured to perform operations. The operations may include broadcasting wireless transmissions comprising a tag ID of the tag from the communication interface according to a transmission pattern. A stationary movement pattern of the tag may be detected with the movement detector. The operations may further include adjusting the transmission pattern responsive to detecting the stationary movement pattern. A confirmation from a computing device indicating that information for the tag ID has been received by a server tracking the tag. The adjustment to the transmission pattern may also be responsive to receiving the confirmation, The tag broadcasts wireless transmissions according to the adjusted transmission pattern. | 2015-12-24 |
20150371069 | SYSTEM AND METHOD FOR MONITORING MEDICAL ASSET BY GENERATING FINGERPRINT ASSOCIATED WITH VIBRATION PATTERN - Disclosed is a method for executing one or more algorithms for monitoring one or more medical assets within a Bluetooth low energy enabled wireless network, wherein the method comprises of identifying and classifying one or more medical assets to be monitored. Further, the method generates fingerprint based on the vibration pattern using a vibration sensor determined for one or more medical assets. Further, the method associates the generated fingerprint with wireless Radio Frequency Identification (RFID) tags and Real Time Locating System (RTLS) tags and executes the algorithm for monitoring one or more medical assets using the RFID and RTLS tags. | 2015-12-24 |
20150371070 | EFFICIENT OPTICAL ILLUMINATION SYSTEM AND METHOD FOR AN IMAGING READER - A target to be read by image capture is illuminated with an illumination light pattern by an illuminating light assembly having an enhanced optical coupling efficiency. The assembly includes a hybrid lens component having a first lens portion centered on an optical axis, and a second total internal reflection (TIR) lens portion surrounding the first lens portion about the optical axis. Both lens portions intercept, bend and collimate illumination light emitted from a light emitting diode. The collimated light is incident on a lenslet component having an array of lenslets generally arranged in a plane that is generally perpendicular to the optical axis. | 2015-12-24 |
20150371071 | OPTICAL INFORMATION ACQUISITION DEVICE - An optical information acquisition device that comprises a main body and a connector assembly associated with said main body and comprising three connectors. The connector assembly can be rotated with respect to said main body between a first operating position wherein said connectors extend substantially perpendicularly to a first side of said main body and a second operating position in which said connectors extend substantially perpendicularly to a second side of said main body. The three connectors are positioned at the vertices of an acute-angled triangle, more preferably at the vertices of an equilateral triangle. | 2015-12-24 |
20150371072 | MOBILE BARCODE INFORMATION READING SYSTEM - A mobile barcode information reading system is composed of a mobile electronic device and a portable barcode scanning device. After the mobile electronic device completes information linking with the portable barcode scanning device, an operator can operate the portable barcode scanning device directly on the mobile electronic device. Therefore, the implementation of the present invention is not restricted by application site. Furthermore, a barcode information obtained can be saved and displayed directly on the mobile electronic device. | 2015-12-24 |
20150371073 | METHOD OF PROCESSING FINGERPRINT AND ELECTRONIC DEVICE THEREOF - A electronic device and method are disclosed herein. The electronic device includes a display, a fingerprint recognition sensor configured to recognize a fingerprint received through the display, and a processor. The processor is configured to implement the method, which includes detecting a fingerprint using a fingerprint recognition sensor of the electronic device through a display of the electronic device; and controlling the display to display at least one object based on the fingerprint. | 2015-12-24 |
20150371074 | INTEGRATED OPTICAL SENSOR AND METHODS FOR MANUFACTURING AND USING THE SAME - An integrated optical sensor and methods for forming and using the same is provided. The integrated optical sensor comprising: a light source; a transparent substrate, having a first surface and a second surface opposite to each other; a first pixel cell array region, located on the first surface and adapted to receiving lights emitted from the light source and reflected by an external object; a second pixel cell array region, located on the first surface and adapted to receiving lights emitted from the light source and reflected by the fingerprint; and a third pixel cell array region, located on the first surface and adapted to receiving visible lights from outside. The integrated optical sensor has simplified structures, the forming method thereof has improved processes, and the using method thereof has more applications. Besides, production costs may be reduced. | 2015-12-24 |
20150371075 | ARRAY SENSOR APPARATUS AND FORMING METHOD THEREOF - An array sensor apparatus and forming method thereof, wherein the array sensor comprises: a driving circuit and a sensor circuit, wherein the driving circuit and the sensor circuit are formed on the same substrate surface, the sensor circuit comprises a pixel cell array including pixel cells and driving lines connected with the pixel cells, output ends of the driving circuit are connected to the driving lines of the sensor circuit, the driving circuit comprises a first transistor, and the pixel cell comprises a second transistor. In the array sensor apparatus of the present disclosure, the driving circuit and the sensor circuit are formed on the same substrate surface, thus occupying less area. Reliability may be improved. Besides, the forming processes can be implemented simultaneously without additional processing steps. | 2015-12-24 |
20150371076 | TOUCH PANEL WITH FUNCTION OF FINGERPRINT IDENTIFICATION - A touch panel includes a substrate, a touch sensing structure and a fingerprint identification module. The touch sensing structure is disposed on the substrate. The fingerprint identification module is directly adhered to the substrate. The touch sensing structure and the fingerprint identification module are located at the same side of the substrate. | 2015-12-24 |
20150371077 | FINGERPRINT RECOGNITION FOR LOW COMPUTING POWER APPLICATIONS - A method and apparatus are provided for improved fingerprint recognition. A fingerprint image associated with an authorized user can be captured with a sensor. Direction vectors for a plurality of pixels of the first fingerprint image are then calculated. Next, characteristic points of the fingerprint image are located in first coordinate system. The fingerprint central nucleus is determined based on the calculated direction vectors, and is expressed in the first coordinate system. Subsequently, a second coordinate system having an origin located relative to the fingerprint central nucleus is determined. Thereafter, the characteristic points of the fingerprint image are mapped to the second coordinate system. Finally, the fingerprint central nucleus and fingerprint characteristic points expressed in the second coordinate system are saved as a fingerprint template. | 2015-12-24 |
20150371078 | ANALYSIS PROCESSING SYSTEM - An analysis processing system | 2015-12-24 |
20150371079 | USER AUTHENTICATION VIA IMAGE MANIPULATION - Various systems and methods for authenticating users via image manipulation are described herein. In various embodiments, an initial image associated with a stored profile of the user is presented on a display device. Input including a manipulation of the initial image to transform the initial image to a manipulated initial image is received on an input device. The user is authenticated in response to the manipulated initial image sufficiently matching a target manipulated image associated with the stored profile of the user. In various embodiments, prior to presenting the initial image, a facial image of the user is captured. The user is identified by applying a facial recognition technique to the captured facial image of the user. The display device is arranged to present the initial image in response to identifying the user as having a stored profile. | 2015-12-24 |
20150371080 | REAL-TIME HEAD POSE TRACKING WITH ONLINE FACE TEMPLATE RECONSTRUCTION - Provided are methods and apparatus for tracking a head pose with online face template reconstruction. The method comprises the steps of retrieving a plurality of frames of images of the user; comparing each of the retrieved frames with a predetermined face template to determine one or more head poses that are monitored successfully and obtain head pose information of the determined one or more head poses; and reconstructing, during the step of comparing, the face template from the obtained head pose information; wherein the reconstructed face template is compared with subsequently retrieved images such that the head poses of the user are tracked in time. | 2015-12-24 |
20150371081 | INFORMATION PROCESSING METHOD FOR ELECTRONIC DEVICE WITH FACIAL RECOGNITION FUNCTION - The present invention discloses an information processing method for an electronic device with a facial recognition function, an information processing device for an electronic device with a facial recognition function, and an information processing method for an electronic device with an iris recognition function. The present invention detects a face or iris of an operating user, and determines whether it matches the facial image or iris image which is stored in the electronic device in advance. If it is determined that the face of the user who is operating the electronic device does not match the facial image stored in the electronic device, the user interface of the electronic device is switched to a user preset state. The present invention can effectively protect user's privacy. | 2015-12-24 |
20150371082 | ADAPTIVE TRACKING SYSTEM FOR SPATIAL INPUT DEVICES - An adaptive tracking system for spatial input devices provides real-time tracking of spatial input devices for human-computer interaction in a Spatial Operating Environment (SOE). The components of an SOE include gestural input/output; network-based data representation, transit, and interchange; and spatially conformed display mesh. The SOE comprises a workspace occupied by one or more users, a set of screens which provide the users with visual feedback, and a gestural control system which translates user motions into command inputs. Users perform gestures with body parts and/or physical pointing devices, and the system translates those gestures into actions such as pointing, dragging, selecting, or other direct manipulations. The tracking system provides the requisite data for creating an immersive environment by maintaining a model of the spatial relationships between users, screens, pointing devices, and other physical objects within the workspace. | 2015-12-24 |
20150371083 | ADAPTIVE TRACKING SYSTEM FOR SPATIAL INPUT DEVICES - An adaptive tracking system for spatial input devices provides real-time tracking of spatial input devices for human-computer interaction in a Spatial Operating Environment (SOE). The components of an SOE include gestural input/output; network-based data representation, transit, and interchange; and spatially conformed display mesh. The SOE comprises a workspace occupied by one or more users, a set of screens which provide the users with visual feedback, and a gestural control system which translates user motions into command inputs. Users perform gestures with body parts and/or physical pointing devices, and the system translates those gestures into actions such as pointing, dragging, selecting, or other direct manipulations. The tracking system provides the requisite data for creating an immersive environment by maintaining a model of the spatial relationships between users, screens, pointing devices, and other physical objects within the workspace. | 2015-12-24 |
20150371084 | Method for Estimating a Number of Objects - A method for estimating a number of objects is to be implemented by a processing module, and is utilized to estimate a number of a plurality of objects having elongated shapes based on an image of the objects that contains substantially-circular end faces of the objects. The method includes steps of generating a characteristic image based on the image of the objects, the characteristic image containing a plurality of characteristic patterns which are associated with the end faces of the objects, calculating a number of the characteristic patterns based on the characteristic image, and obtaining an estimated number of the objects based on at least the number of the characteristic patterns thus calculated. | 2015-12-24 |
20150371085 | METHOD AND SYSTEM FOR IDENTIFYING BOOKS ON A BOOKSHELF - A method and system for identifying books located on a bookshelf. Photographs of the bookshelf are captured and processed to identify individual books. Processing involves segmenting the photograph into individual book spines and extracting and analyzing features of the book spines. Analysis may include database matching and/or optical character recognition. | 2015-12-24 |
20150371086 | EXTRACTING CARD DATA FROM MULTIPLE CARDS - Extracting financial card information with relaxed alignment comprises a method to receive an image of a card, determine one or more edge finder zones in locations of the image, and identify lines in the one or more edge finder zones. The method further identifies one or more quadrilaterals formed by intersections of extrapolations of the identified lines, determines an aspect ratio of the one or more quadrilateral, and compares the determined aspect ratios of the quadrilateral to an expected aspect ratio. The method then identifies a quadrilateral that matches the expected aspect ratio and performs an optical character recognition algorithm on the rectified model. A similar method is performed on multiple cards in an image. The results of the analysis of each of the cards are compared to improve accuracy of the data. | 2015-12-24 |
20150371087 | OBJECT IDENTIFICATION AND INVENTORY MANAGEMENT - A method/apparatus for identifying an object based on a pattern of structural features located in a region of interest wherein the pattern of features comprises at least one fingerprint feature. The region may be recognized and used to identify the object. A first feature vector may be extracted from a first image of the pattern and may be mapped to an object identifier. To authenticate the object, a second feature vector may be extracted from a second image taken of the same region later in time than the first image. The two feature vectors may be compared and differences between one or more feature vector values determined. A match correlation value may be calculated based on the difference(s). The differences may be dampened if associated with expected wear and tear. Thus the impact on the match correlation value of such differences may be reduced. The differences may be enhanced if associated with changes that are not explainable as wear and tear. Thus the impact on the match correlation value of such differences may be increased. | 2015-12-24 |
20150371088 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE MEDIUM - An information processing apparatus including a memory storing instructions, and at least one processor configured to process the instructions to obtain an orientation, size, and position of a first subject in a first image, and an orientation, size, and position of a second subject in a second image, generate an estimated position of the first subject in the second image based on the orientation, size, and position of the first subject in the first image and the orientation and size of the second subject in the second image, calculate a distance between the estimated position of the first subject in the second image and the position of the second subject in the second image; and determine whether or not the first subject is the second subject based on the distance. | 2015-12-24 |
20150371089 | AUTOMATED REMOTE CAR COUNTING - A system for automated car counting comprises a satellite-based image collection subsystem; a data storage subsystem; and an analysis software module stored and operating on a computer coupled to the data storage subsystem. The satellite-based image collection subsystem collects images corresponding to a plurality of areas of interest and stores them in the data storage subsystem. The analysis module: (a) retrieves images corresponding to an area of interest from the data storage subsystem; (b) identifies a parking space in an image; (c) determines if there is a car located in the parking space; (d) determines a location, size, and angular direction of a car in a parking space; (e) determines an amount of overlap of a car with an adjacent parking space; (f) iterates steps (b)-(e) until no unprocessed parking spaces remain; and (g) iterates steps (a)-(f) until no unprocessed images corresponding to areas of interest remain. | 2015-12-24 |
20150371090 | IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - An image processing apparatus comprises a motion vector detection unit, a generation unit for generating information regarding the motion vector as metadata, a recording unit for recording each frame image in association with the metadata; and a control unit for causing the motion vector detection unit to perform motion vector detection by using an image signal on which reduction processing or thinning processing was performed, and causing the motion vector detection unit to determine an image area based on the metadata and to perform motion vector detection by using an image signal on which reduction processing or thinning processing was not performed or on which reduction processing was performed using a smaller reduction ratio than that used during the image capturing operation or thinning processing was performed using a smaller thinning ratio than that used during the image capturing operation. | 2015-12-24 |
20150371091 | SYSTEM AND METHOD FOR IDENTIFYING A CLOTHING ARTIFACT - A system and method for identifying metadata for clothing artifacts that appear in multimedia content items are presented. The method includes generating at least one signature for a received multimedia content item; identifying at least one matching concept to the multimedia content item, wherein the identification is based on signature matching between the at least one generated signature and a plurality of concept signatures representing a concept; matching each concept signature to previously generated signatures associated with clothing artifacts; and identifying, for each clothing artifact signature, metadata associated with the clothing artifact signature. | 2015-12-24 |
20150371092 | LOW-SPEED IMPACT DETECTION SENSOR ARRAY - A vehicle system has a sensor array and a processing device. The sensor array includes a first group of sensors and a second group of sensors. The sensors of the first group are offset relative to the sensors in the second group. The processing device is configured to determine a general shape of an impact object based at least in part on signals received from the sensor array. | 2015-12-24 |
20150371093 | IMAGE PROCESSING APPARATUS - For a lane line search range set in a captured image obtained through imaging of the travel direction of a vehicle, a first lane line detection process detects a lane line based on a luminance image for more than half of rows within the search range, and detects a lane line based on a color difference image for the other rows, while a second lane line detection process detects a lane line based on the color difference image for a greater number of rows than in the first process. Then, a mode switchover control process performs mode switchover determination between the first and second modes based on the number of rows where a lane line of a predefined width or wider has been detected, from among the rows where a lane line has been detected, and performs mode switchover control based on the determination result. | 2015-12-24 |
20150371094 | A ROAD MARKING ANALYSER AND A METHOD OF ANALYSIS OF ROAD MARKINGS AND AN APPARATUS AND METHOD FOR DETECTING VEHICLE WEAVE - An apparatus is provided that is operable as a road marking analyser, comprising a light source arranged to illuminate a road, a camera directed or arranged to view vertically downward in a direction substantially perpendicular to a surface of the road and arranged to capture an image of one or more road markings on the road and a processor arranged to output the captured image to a memory and/or process the image to determine a condition of the one or more road markings. | 2015-12-24 |
20150371095 | Method and Apparatus for Determining a Road Condition - This invention relates to a method and apparatus for determining a road condition using a vehicle camera ( | 2015-12-24 |
20150371096 | HAZARD DETECTION FROM A CAMERA IN A SCENE WITH MOVING SHADOWS - Computerized methods are performable by a driver assistance system while the host vehicle is moving. The driver assistance system includes a camera connectible to a processor. First and second image frames are captured from the field of view of the camera. Corresponding image points of the road are tracked from the first image frame to the second image frame. Image motion between the corresponding image points of the road is processed to detect a hazard in the road. The corresponding image points are determined to be of a moving shadow cast on the road to avoid a false positive detection of a hazard in the road or the corresponding image points are determined not to be of a moving shadow cast on the road to verify detection of a hazard in the road. | 2015-12-24 |
20150371097 | IMAGE RECOGNITION SYSTEM FOR VEHICLE FOR TRAFFIC SIGN BOARD RECOGNITION - The present invention can improve the recognition performance of a traffic sign board, improve the recognition performance of a reflective traffic sign board and a light emitting type traffic sign board by adjusting an exposure of a camera, improve the recognition performance of the reflective traffic sign board and the light emitting type traffic sign board by adjusting gain of an image signal, and improve the recognition performance of the reflective traffic sign board and the light emitting type traffic sign board by simultaneously adjusting the exposure of the camera and the gain of the image signal. In an image recognition system for a vehicle for traffic sign board recognition according to the present invention, an exposure time of a camera lens or gain of an image output from an image sensor is adjusted to generate at least one image group including a plurality of frames in which the exposure time and the gain are different from each other, sign board regions of the plurality of frames are compared with each other, and an image nearest to a predetermined set value is selected. | 2015-12-24 |
20150371098 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD AND PROGRAM STORAGE MEDIUM - The purpose of the present invention is to prevent a reduction in authentication accuracy caused by identity fraud. A score calculation unit compares each of a plurality of types of biological information, acquired as acquired biological information from a target person of identity verification, to the same type of registered biological information registered in advance. Based on the comparison, the score calculation unit calculates an authentication score that expresses the degree of similarity between the acquired biological information and the registered information, for each type of acquired biological information. For each type of the acquired biological information, a probability calculation unit calculates as an identity fraud probability using the calculated authentication score to. A determination unit determines whether the target person of identity verification is the registered person, and/or determines whether the target person of identity verification is fraudulently pretending to be the registered person. | 2015-12-24 |
20150371099 | ROBOTIC DEVICE TESTER - A system, method, and device may include software and hardware which simplify and quicken configuration of the system for testing a device, enhance testing procedures which may be performed, and provide data via which to easily discern a cause and nature of an error which may result during testing. A camera may capture still images of a display screen of a tested device and another camera may capture video images of the tested device and a partner device. A wizard may be used to generate a configuration file based on one previously generated for a similar device. A mount for a tested device may be structured so that: it is suitable for mounting thereon a plurality of differently structured devices; and adjustments in a vertical direction and a horizontal direction in a plane and adjustments of an angle of the device relative to the plane may be easily made. | 2015-12-24 |
20150371100 | CHARACTER RECOGNITION METHOD AND SYSTEM USING DIGIT SEGMENTATION AND RECOMBINATION - Method and systems are provided for recognizing characters in an original image. The images received in the system as a set of pixels representing the original image as a character skeleton and a chaincore representation thereof. A skeleton intersection points are identified using a basis for determining a cutting points in the chaincore contours compared to the cutting points are then used to define cutting lines for segleg the original image into distinct segments. The segments are analyzed with respect to their geometric properties individually and relative to adjacent to other segments for determination that select ones of the segments may be combined wherein the combination is expected to have a high probability of conformance to a likely a digit or character. Verification that the combined string is a recognizable digit or character is accomplished using a convolutional neural network digit recognizer. | 2015-12-24 |
20150371101 | APPARATUS FOR GENERATING DATA, METHOD FOR GENERATING DATA, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - An apparatus for generating data includes a display unit that displays an area object the contour of which is extracted from an image to be processed by an image processing application, an operating unit that receives selection conditions for selecting an area object that is intended by a user out of the area objects displayed by the display unit, and a contour extracting unit that extracts a contour of an area object selected based on the selection conditions received by the operating unit. When the contour extracting unit extracts a contour of a selected area object, the display unit displays the selected area object and an unselected area object in a distinguishable manner. | 2015-12-24 |
20150371102 | METHOD FOR RECOGNIZING AND LOCATING OBJECT - A method for recognizing and locating an object includes an offline mode process and an online mode process. In the offline mode process, plural sampled edge points of a template image of the object and respective gradient angles and a gravity position of the plural sampled edge points are obtained, and plural similarity score tables are obtained according to the plural sampled edge points, a predetermined detecting distance range and a predetermined gradient angle difference range. In the online mode process, plural edge points of a live image and respective gradient angles are obtained, plural predictive gravity positions are calculated, and plural similarity scores corresponding to the plural predictive gravity positions are summed up. The predictive gravity position with the local maximum of the similarity scores higher than a threshold value is correlated with the gravity position of the template image so as to recognize and locate the object. | 2015-12-24 |
20150371103 | SYSTEM AND METHOD FOR IDENTIFICATION OF PRINTED MATTER IN AN IMAGE - A system and method of identifying a printed matter in an image that includes the printed matter by rectifying the image, identifying a series of pre-defined areas in the image relative to a frame or other form in the printed matter in the image, and comparing a characteristic of the pre-defined area in the printed matter in the image, to a characteristic of a corresponding pre-defined area from a sample of printed matters. | 2015-12-24 |
20150371104 | METHOD, SYSTEM AND PROCESSOR FOR INSTANTLY RECOGNIZING AND POSITIONING AN OBJECT - The invention provides a method for instantly recognizing and positioning an object, comprising steps of: a) wirelessly searching a wireless identification of the object; b) capturing a plurality of images of the object for each image capture; c) determining a 2D center coordinate (x, y) of the object based on a center coordinate (x | 2015-12-24 |
20150371105 | SYSTEM AND METHOD FOR FREQUENCY-BASED 3D RECONSTRUCTION OF OBJECTS - Various embodiments are described herein for a system and method for performing 3D reconstruction of an object. In at least one example embodiment, the method may comprise obtaining image data of the object while projecting frequency-based light patterns on the object; locating candidates for correspondence points in the image data; selecting reflection points by applying a labeling method to the located candidates; and generating the 3D reconstruction of a surface of the object using the selected reflection points. | 2015-12-24 |
20150371106 | KEYPOINT DESCRIPTOR GENERATION BY COMPLEX WAVELET ANALYSIS - The present application relates to a method of generating a keypoint descriptor for identifying an object in an image or a sequence of images, the keypoint descriptor being substantially invariant to a transformation of the object in the image. The present application further relates to a method of identifying an object in an image using a keypoint descriptor; and processing apparatus and computer program products for implementing a method of the present application. | 2015-12-24 |
20150371107 | MATERIAL CLASSIFICATION USING BRDF FEATURE VECTOR - Feature vector representations are computed for BRDF image slices in a database of known materials captured under a relatively large number of incident illumination directions. Low-level features of each image slice are clustered into at least two clusters. An intermediate feature vector representation is computed for each image slice with entries that are weighted means of the clusters. | 2015-12-24 |
20150371108 | IMAGE PROCESSING METHOD, IMAGE PROCESSING DEVICE, AND RECORDING MEDIUM - An image processing method separates an input image into a skeleton component, and residual component. In the method a local variation amount, which is a variation amount between a target pixel and a pixel adjacent to the target pixel, is calculated; a skeleton component extraction filter weight is calculated based on the local variation amount; an image feature amount of a gradient direction of a pixel value around the target pixel, and an image feature amount of a gradient strength of the pixel value around the target pixel, are calculated; the skeleton component extraction filter weight is corrected based on these image feature amount; a skeleton component extraction filter coefficient is calculated based on the corrected skeleton component extraction filter weight; and the skeleton component is extracted by applying skeleton component extraction filtering to the target pixel using the calculated skeleton component extraction filter coefficient. | 2015-12-24 |
20150371109 | AUTOMATED VEHICLE RECOGNITION - A system for identifying a vehicle. A camera obtains at least one image of a vehicle. An image processor derives from the image a first sub-image and a second sub-image distinct from the first sub-image, extracts from the first sub-image a first set of image features, and extracts from the second sub-image a second set of image features. The image processor matches the first set of image features to corresponding image features derived from a previously obtained image of a vehicle to produce a first matching score, and also matches the second set of image features to corresponding image features derived from a previously obtained image of a vehicle to produce a second matching score. The image processor then fuses the first matching score and the second matching score to produce a fused score which indicates whether the at least one image is of the same vehicle as the previously obtained image. | 2015-12-24 |
20150371110 | METHOD AND APPARATUS FOR EXTRACTING FEATURE REGIONS FROM POINT CLOUD - An apparatus and method for extracting a feature region from a point cloud are provided. The apparatus may divide the point cloud into a plurality of regions, and may extract at least one feature region from among the regions. | 2015-12-24 |
20150371111 | SYSTEMS AND METHODS FOR OBTAINING STRUCTURAL INFORMATION FROM A DIGITAL IMAGE - A method for obtaining structural information from a digital image by an electronic device is described. The method includes obtaining a digital image. The method also includes determining a gradient vector for each pixel in a region of interest of the digital image. The method further includes transforming each pixel in the region of interest in accordance with a transform. Transforming each pixel includes determining, for each pixel, a first set of pixels. The first set of pixels includes any pixel along a line that is collinear with or perpendicular to the gradient vector and passes through a pixel location. Transforming each pixel includes incrementing with signed integer values, for each pixel, a first set of values in a transform space corresponding to any of the first set of pixels that are in a first direction of the line. | 2015-12-24 |
20150371112 | BUILDING MATERIAL CLASSIFICATIONS FROM IMAGERY - Imagery is used to identify architectural elements that have known architectural patterns. Feature sets associated with a surface and architectural elements in a building model image are compared with known architectural standards of materials to determine the surface building materials and architectural details of a textured building model. In addition, specific texture patterns can assist final material selections for a repair/replacement. | 2015-12-24 |
20150371113 | METHOD AND APPARATUS FOR GENERATING TEMPORALLY CONSISTENT SUPERPIXELS - A method and an apparatus for generating superpixels for a sequence of images. A cluster assignment generator generates a cluster assignment for a first image of the sequence of images, e.g. by clustering pixels of the first image into superpixels or by retrieving an initial cluster assignment for the first image and processing only contour pixels with regard to their cluster assignment. A label propagator initializes subsequent images based on a label propagation using backward optical flow. A contour pixel processor then processes only contour pixels with regard to their cluster assignment for subsequent images of the sequence of images. | 2015-12-24 |
20150371114 | CLASSIFYING AND ANNOTATING IMAGES BASED ON USER CONTEXT - Annotating and classifying an image based on a user context includes determining a location data of an object captured in an image, determining an attribute data of the object, obtaining sensor data from sensors that are associated with the location data based on the attribute data, determining a recommended user context from one or more predefined user contexts based on a comparison of the location data, the attribute data, and the sensor data with location data, attribute data, and sensor data of one or more images associated with the one or more predefined user contexts, determining a recommended class of the captured image based on the recommended user context, selecting one or more annotation data from the location data, the attribute data, and the sensor data based on the recommended class or the recommended user context, and annotating the image with the one or more annotation data. | 2015-12-24 |
20150371115 | CLASSIFICATION OF LAND BASED ON ANALYSIS OF REMOTELY-SENSED EARTH IMAGES - Land classification based on analysis of image data. Feature extraction techniques may be used to generate a feature stack corresponding to the image data to be classified. A user may identify training data from the image data from which a classification model may be generated using one or more machine learning techniques applied to one or more features of the image. In this regard, the classification module may in turn be used to classify pixels from the image data other than the training data. Additionally, quantifiable metrics regarding the accuracy and/or precision of the models may be provided for model evaluation and/or comparison. Additionally, the generation of models may be performed in a distributed system such that model creation and/or application may be distributed in a multi-user environment for collaborative and/or iterative approaches. | 2015-12-24 |
20150371116 | IMAGE FORMING APPARATUS - Provided is an image forming apparatus, including an image forming unit that forms a test image for correction of a position of an image on the recording medium, a reading unit that reads an image from the recording medium on which the test image is formed, a transport unit that transports the recording medium, and a correction unit that corrects the position of the image, wherein the test image includes a first mark that is provided at a distance determined from the first reference line, a second mark that is provided at the distance from a second reference line set with respect to a second side, and a code image that is provided at a position determined with respect to the first mark and the second mark, and that indicates information for correction of the position of the image by the correction unit. | 2015-12-24 |
20150371117 | PRINTING CONTROL APPARATUS, CONTROL METHOD FOR THE PRINTING CONTROL APPARATUS, AND PRINTING SYSTEM - A printing control apparatus connected to a printing apparatus operated in a standby state and a power saving state includes a reception unit that receives a printing request for causing the printing apparatus to execute printing, a generation unit that generates printing data in accordance with the printing request received by the reception unit, a determination unit that determines whether or not the printing apparatus is in the power saving state, and a transmission unit that transmits return data for returning the printing apparatus from the power saving state to the standby state before the printing data generated by the generation unit is transmitted in a case where the determination unit determines that the printing apparatus is in the power saving state, and does not transmit the return data in a case where the determination unit determines that the printing apparatus is not in the power saving state. | 2015-12-24 |
20150371118 | IMAGE FORMING APPARATUS, METHOD FOR CONTROLLING IMAGE FORMING APPARATUS, AND STORAGE MEDIUM - An image forming apparatus includes a storage unit that stores a plurality of print jobs, an acquisition unit that acquires, when a desired print job is selected from the plurality of print jobs stored in the storage unit, a print setting of the selected print job, a determination unit that determines whether a print-cost-reducing print setting exists that reduces a print cost more than a print cost of the print setting acquired by the acquisition unit, and a changing unit that, if it is determined that the print-cost-reducing setting exists, enables changing the print setting of the selected print job to the print-cost-reducing print setting. | 2015-12-24 |
20150371119 | IMAGE FORMING APPARATUS, METHOD OF CORRECTING IMAGE MAGNIFICATION, AND COMPUTER-READABLE RECORDING MEDIUM - An image forming apparatus includes: an expansion/contraction ratio calculation unit that calculates a value of a ratio of expansion or contraction of a printing medium at a time of printing a second surface as compared with a time of printing a first surface; a storage control unit that causes an NVRAM to hold the calculated value of the ratio of expansion or contraction; and a magnification correcting unit that corrects magnification of an image on the second surface using a newly calculated value of the ratio when a difference between the newly calculated value and a value that has been held by the NVRAM until the new value is calculated is within a predetermined range, and corrects the magnification of the image on the second surface using a value closer to 0 than the newly calculated value when the difference exceeds the predetermined range. | 2015-12-24 |
20150371120 | VISUAL AXIS OPTIMIZATION FOR ENHANCED READABILITY AND COMPREHENSION - While the printed text is vertically aligned at 90 degrees, the visual axis of the reader is not aligned with the printed or displayed axis of text resulting in difficulties in readability and comprehension of text and images that can be obviated by printing or displaying text and images at an angle to align with the axis of the eye. | 2015-12-24 |
20150371121 | IMAGE FORMING APPARATUS AND IMAGE PROCESSING METHOD - In image forming apparatus includes a binarization unit, a line thinning unit, and an output unit. The binarization unit binarizes each pixel of image data. The line thinning unit performs line thinning on pixels that are line thinning targets. The output unit outputs pixels that have been subjected to the line thinning by the line thinning unit. | 2015-12-24 |
20150371122 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD FOR CORRECTING A LINE IMAGE - An image processing apparatus increases, in the case of a low-density line, the density of a pixel included in the line to increase the density of the line, and increases, in the case of a high-density line, the density of a pixel adjacent to the pixel included in the line to increase the width of the line. | 2015-12-24 |
20150371123 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD AND PROGRAM - An image processing apparatus includes a target value calculation unit configured to calculate a target value to be output in a predetermined region in input image data based on pixel values of pixels included in the region, a distribution order determination unit configured to determine a distribution order of output values for distributing output values corresponding to the target value in the region based on a pixel value of each pixel included in the region and a threshold value in the threshold matrix corresponding to the pixel, and an output value determination unit configured to determine an output value of each pixel included in the region by allocating the target value to at least one pixel included in the region in the distribution order. | 2015-12-24 |
20150371124 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING PROGRAM - An image processing apparatus, which generates data for reproducing a color of a dot image formed by a printer using a first color material, in an image forming apparatus, includes a grayscale data generation unit that generates input grayscale data in which a grayscale value corresponding to a dot area ratio is stored in a peripheral part of a dot, and a grayscale value corresponding to a color of a dot portion of the dot image is stored in a core part surrounded by the peripheral part, on the basis of dot data indicating the dot image, and a color conversion unit that converts the input grayscale data into output grayscale data indicating a usage amount of a second color material used in the image forming apparatus. | 2015-12-24 |
20150371125 | IMAGE FORMING METHOD, IMAGE FORMING SYSTEM AND IMAGE FORMING APPARATUS - An image forming method using plural types of developers includes: step for performing a designation relating to a change of a type of developer to be used; step for inputting first image data including a first image of a first color that is different from the type of developer designated by the change of the type; step for receiving second image data including a second image of the first color that is designated; step of changing at least the first color of the first image data to a developer designated by the change of the type; and step for printing the first image data of which the first color is changed and the second image data expressing the first color without changing the first color on a same medium. | 2015-12-24 |
20150371126 | IMAGE FORMING APPARATUS AND METHOD - An image forming apparatus includes an image forming unit, a detector, an avoidance process memory, a print data memory, and an acceptor. The image forming unit receives a print instruction including print data and a print setting and forms an image on a sheet. The detector analyzes the print data and/or the print setting in the print instruction, and detects an error that is an unprocessable or invalid instruction. The avoidance process memory stores an error avoidance process of avoiding the error and enabling execution of image formation, in association with the print instruction including the error. The print data memory stores the print data in the print instruction including the error. The acceptor accepts an instruction to avoid the error and to execute image formation, in accordance with the stored error avoidance process and the stored print data. | 2015-12-24 |
20150371127 | CODED LIGHT PATTERN HAVING HERMITIAN SYMMETRY - A method includes identifying one or more codewords of a bit sequence that fail to satisfy at least one codeword constraint. The method also includes removing the one or more codewords from the bit sequence to generate a punctured bit sequence. The method further includes determining whether the punctured bit sequence is symmetric. The method includes, in response to determining that the punctured bit sequence is symmetric, generating a hermitian symmetric codebook primitive based at least in part on the punctured bit sequence, where the hermitian symmetric codebook primitive is useable to form a diffractive optical element (DOE) of a structured light depth sensing system. | 2015-12-24 |
20150371128 | METHODS AND APPARATUS FOR BARCODE READING AND ENCODING - The present invention is directed towards methods and apparatus for barcode reading and encoding. In accordance with an embodiment, a method of reading and encoding barcode information is provided. A one-dimensional barcode image is decoded using an electronic device to obtain data encoded by the one-dimensional barcode image. The data is encoded into a two-dimensional barcode image. The two-dimensional barcode image is displayed in a manner suitable for reading by a scanner configured for reading two-dimensional barcodes. | 2015-12-24 |
20150371129 | Configuring Signal Devices in Thermal Processing Systems - In some aspects, consumables for a material processing head can include a body that is substantially axially symmetric about a central longitudinal axis; and a ring-shaped data tag attached to the body, the data tag having a central axis that is substantially coaxial to the central longitudinal axis of the body, the data tag having a conductive coil formed around the central axis of the data tag. | 2015-12-24 |
20150371130 | POSITION-DETECTING RADIO FREQUENCY IDENTIFICATION DEVICE AND METHOD THEREOF - Provided is a position-detecting radio frequency identification (RFID) device, including a pair of radio frequency antennas transmitting and receiving a radio frequency signal, a RFID chip electrically connected to and corresponding to the pair of first radio frequency antennas, storing a signal, and stimulating the pair of radio frequency antennas into transmitting and receiving the signal, a pair of electronic switches provided between the pair of radio frequency antennas and the RFID chip, and a switch control device controlling the pair of electronic switches. Moreover, if the pair of electronic switches is in the on state, the pair of radio frequency antennas and the RFID chip are electrically connected, and if the pair of electronic switches is in the off state, the pair of radio frequency antennas and the RFID chip are electrically disconnected. Further, the present invention also provides a position-detecting RFID method. | 2015-12-24 |
20150371131 | EVENT-DRIVEN UNIVERSAL NEURAL NETWORK CIRCUIT - The present invention provides an event-driven universal neural network circuit. The circuit comprises a plurality of neural modules. Each neural module comprises multiple digital neurons such that each neuron in a neural module has a corresponding neuron in another neural module. An interconnection network comprising a plurality of digital synapses interconnects the neural modules. Each synapse interconnects a first neural module to a second neural module by interconnecting a neuron in the first neural module to a corresponding neuron in the second neural module. Corresponding neurons in the first neural module and the second neural module communicate via the synapses. Each synapse comprises a learning rule associating a neuron in the first neural module with a corresponding neuron in the second neural module. A control module generates signals which define a set of time steps for event-driven operation of the neurons and event communication via the interconnection network. | 2015-12-24 |