09th week of 2016 patent applcation highlights part 54 |
Patent application number | Title | Published |
20160063227 | METHODS AND A SYSTEM FOR AUTOMATED AUTHENTICATION CONFIDENCE - Input streams are automatically and continuously evaluated in a passive manner from sensors and resources of a device. The streams are weighted and aggregated to produce single confidence values. A current single confidence value is used to passively authenticate a user for access to the device or to one or more resources of the device when the user attempts access. | 2016-03-03 |
20160063228 | Discrete Password Entry Using Keyboard with Character and Position Carriers - A method and apparatus for password entry, the method comprising: displaying a password inputting keyboard on a display, the keyboard including a character carrier and a position carrier, the character carrier and the position carrier are capable of relative movement between each other so that when the position of a character in the character carrier is corresponding to a position mark on the position carrier, the position of at least one other character in the character carrier is corresponding to at least one other position mark in the position carrier; in response to a user causing relative movement between the character carrier and the position carrier, aligning a character in the character carrier with a position mark in the position carrier; and in response to a lapse of a predetermined time, recording the character and its input order and changing the layout of the password inputting keyboard. | 2016-03-03 |
20160063229 | HYBRID ADAPTIVE AUTHENTICATION SCORING SYSTEM - The present invention relates to a hybrid adaptive authentication scoring system. The system is combination of rules-cases based machine learning and also includes human in the decision making process whenever new cases are not found in system database. Based on defined policy that contains rules and user attributes, the system calculates a score that reflect risk for each request made by the user for completing the system authentication request. This is a continuous learning process and user attributes defines score for each transaction in one or more combination. | 2016-03-03 |
20160063230 | FINGERPRINT GESTURES - User authentication for a user device can leverage one or more fingerprint sensor regions installed in the device capable of detecting and/or recognizing a user's fingerprints. The user can define a fingerprint gesture or sequence of fingerprint gestures as a passcode, with access to a protected function being conditional on the user performing the defined fingerprint gesture or sequence of fingerprint gestures. In some instances, different fingerprint gestures or fingerprint gesture sequences can invoke or authorize different functions of the device. In some instances, fingerprint gestures from two or more users in the same location or in different locations can be used to unlock a protected function of a device. | 2016-03-03 |
20160063231 | USER AUTHENTICATION METHOD AND APPARATUS BASED ON ELECTROCARDIOGRAM (ECG) SIGNAL - An authentication apparatus includes an electrocardiogram (ECG) signal receiver configured to receive a target ECG signal, and a preprocessor configured to filter the target ECG signal. The apparatus further includes an authenticator configured to process the filtered target ECG signal based on a pattern of a reference ECG signal, and determine whether the target ECG signal corresponds to the reference ECG signal based on the processing. | 2016-03-03 |
20160063232 | WEARABLE TERMINAL - There is disclosed a wearable terminal including a main body, a main board provided in the main body, a first touch pad provided in a rear surface of the main body, a flexible board configured to connect the main body and the first touch pad to each other, a band coupled to the main body, wound around a user's wrist to secure the main body to the user's body part, a second touch pad provided in the other surface of one surface contacting with the user's body part when the user wears the band, a flexible board having one end connected to the second touch pad and the other end connected to the main board, and a controller configured to extract an electrocardiogram by measuring a difference of electric potentials of body muscles sensed from the first touch pad and the second touch pad. | 2016-03-03 |
20160063233 | USER AUTHENTICATION METHOD AND APPARATUS BASED ON ELECTROCARDIOGRAM (ECG) SIGNAL - A user authentication apparatus includes an electrocardiogram (ECG) waveform acquirer configured to acquire an authentication ECG waveform of a user to authenticate the user; a filter configured to filter the authentication ECG waveform using a Kalman filter by applying a reference model parameter extracted from a reference ECG waveform to the Kalman filter; and an authenticator configured to compare the filtered ECG waveform and the reference ECG waveform, and determine whether the filtered authentication ECG waveform corresponds to the reference ECG waveform based on a result of the comparing. | 2016-03-03 |
20160063234 | ELECTRONIC DEVICE AND FACIAL RECOGNITION METHOD FOR AUTOMATICALLY LOGGING INTO APPLICATIONS - A method for logging into a number of applications of an electronic device includes obtaining a login facial image of a user when the user opens a first application of the number of applications, determining whether the login facial image matches a preset facial image stored in the electronic device, and logging into the first application when the login facial image matches the preset facial image. The preset facial image is linked to each of the number of applications. The electronic device automatically logs into the rest of the applications when the rest of the applications are opened, after the login facial image matches the preset facial image to log into the first application. | 2016-03-03 |
20160063235 | Facial Recognition Authentication System Including Path Parameters - Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement. | 2016-03-03 |
20160063236 | INFORMATION PROCESSING DEVICE, METHOD FOR CONTROLLING INFORMATION PROCESSING DEVICE, PROGRAM, AND INFORMATION STORAGE MEDIUM - Authentication data indicates a plurality of types of operation which a user should perform in a predetermined order via a touch panel and a number of fingers, as to each one of the plurality of types of operation, with which the user should touch the touch panel when performing an operation corresponding to the one of the plurality of types of operation. An authentication processing execution unit executes authentication processing by determining, based on a result of detection by the touch panel, whether or not an operation corresponding to each of the plurality of types of operation has been performed in the predetermined order by touching the touch panel with a number of fingers set for each of the plurality of types of operation. | 2016-03-03 |
20160063237 | SECURE PERSONAL STORAGE DEVICE - A storage device includes a memory and two physical interfaces. The first physical interface is configured to provide read-only memory access to a connected device. The second physical interface is configured to provide read/write memory access to a connected device. | 2016-03-03 |
20160063238 | METHOD AND SYSTEM FOR USER-DESIGNED APPLICATION DEPLOYMENT - Embodiments of a method and system for utilizing user-designed applications are disclosed. A user-designed application that utilizes at least one high-level API available within a system may be received. The user-designed application may be deployed server-side within the system. A user request may be processed server-side for the user-designed application in the system. | 2016-03-03 |
20160063239 | METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS - The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person. | 2016-03-03 |
20160063240 | MANAGING REGISTRATION OF USER IDENTITY USING HANDWRITING - Embodiments of the present application relate to a method, apparatus, and system for registering a user identity. The method includes receiving handwriting information associated with handwriting entered by a user, computing a degree of complexity of the first handwriting information, and in the event that the degree of complexity of the first handwriting information satisfies one or more preset conditions, associating the first handwriting information with identity registration information corresponding to the user. | 2016-03-03 |
20160063241 | METHOD FOR INPUTTING A SECURE PASSWORD, SHEET, SET OF SHEETS, INPUT UNIT, AND USES THEREOF - Method for generating and using passwords, includes:
| 2016-03-03 |
20160063242 | DATA PROCESSING APPARATUS AND METHOD FOR PROTECTING SECURE DATA AND PROGRAM CODE FROM NON-SECURE ACCESS WHEN SWITCHING BETWEEN SECURE AND LESS SECURE DOMAINS - A data processing apparatus includes processing circuitry and a data store including a plurality of regions including a secure region and a less secure region. The secure region is configured to store sensitive data accessible by the circuitry when operating in a secure domain and not accessible by the circuitry when operating in a less secure domain. The data store includes a plurality of stacks with a secure stack in the secure region. Stack access circuitry is configured to store predetermined processing state to the secure stack. The processing circuitry further comprises fault checking circuitry configured to identify a first fault condition if the data stored in the predetermined relative location is the first value. This provides protection against attacks from the less secure domain, for example performing a function call return from an exception, or an exception return from a function call. | 2016-03-03 |
20160063243 | Malware Detection and Prevention by Monitoring and Modifying a Hardware Pipeline - The various aspects provide a method for recognizing and preventing malicious behavior on a mobile computing device before it occurs by monitoring and modifying instructions pending in the mobile computing device's hardware pipeline (i.e., queued instructions). In the various aspects, a mobile computing device may preemptively determine whether executing a set of queued instructions will result in a malicious configuration given the mobile computing device's current configuration. When the mobile computing device determines that executing the queued instructions will result in a malicious configuration, the mobile computing device may stop execution of the queued instructions or take other actions to preempt the malicious behavior before the queued instructions are executed. | 2016-03-03 |
20160063244 | METHOD AND SYSTEM FOR RECOGNIZING ADVERTISEMENT PLUG-INS - Disclosed are a method and apparatus for recognizing advertisement plug-ins, relating to the field of computer technologies. The method comprises: searching for files related to application plug-ins; based on feature vectors of feature dimensions in a feature vector set of a predetermined advertisement, scanning the files related to the application plug-ins, and calculating feature vector similarity between data in each file and the feature vector in each feature dimension; calculating an advertisement similarity of a current application plug-in according to the feature vector similarity of each feature dimension and a feature recognition weight of the feature dimension; comparing the advertisement similarity with a threshold, and determining whether the application plug-in is an advertisement plug-in according to the comparison result. The method has the advantageous effects that a perfect feature recognition rule is involved, and there is a superior feature matching and recognition capability for obfuscated advertisement software codes. | 2016-03-03 |
20160063245 | Detecting Heap Spraying on a Computer - Detecting heap spraying on a computer by detecting a plurality of requests to allocate portions of heap memory, measuring the plurality of requests to determine a value of a characteristic of the plurality of requests, identifying an activity consistent with heap spraying by determining that the value of the characteristic is consistent with a benchmark value of the characteristic, wherein the benchmark value of the characteristic is associated with heap spraying, and performing a computer-security-related remediation action responsive to determining that the value of the characteristic is consistent with the benchmark value of the characteristic. | 2016-03-03 |
20160063246 | PREVENTING MALICIOUS INSTRUCTION EXECUTION - Systems and techniques for preventing malicious instruction execution are described herein. A first instance of an instruction for a graphics processing unit (GPU) may be received. The instruction may be placed in a target list. A notification that the instruction caused a problem with the GPU may be received. The instruction may be moved from the target list to a black list in response to the notification. A second instance of the instruction may be received. The second instance of the instruction may be prevented from executing on the GPU in response to the instruction being on the black list. | 2016-03-03 |
20160063247 | DETECTING EXECUTABLE CODE WITHIN A DATA ENTITY - A method that includes receiving a data entity by the computer; storing the data entity in a first sector of the memory; wherein the first sector is isolated from another memory sector and executable code in the first sector is prevented from performing a write action to the other memory sector; generating, by the processor, an intermediate representation of the data entity; searching, by the processor, for an executable code that was not expected to be included in the data entity in the intermediate representation of the data entity; and when finding the executable code that was not expected to be included in the data entity then preventing a copying of the data entity to the other memory sector. | 2016-03-03 |
20160063248 | METHOD TO SCAN A FORENSIC IMAGE OF A COMPUTER SYSTEM WITH MULTIPLE MALICIOUS CODE DETECTION ENGINES SIMULTANEOUSLY FROM A MASTER CONTROL POINT - A multi-engine malicious code scanning method for scanning data sets from a storage device is provided. The method includes, among other steps obtaining at least one data set from a storage device and generating a single forensic image of the data set and also applying a recover data application to the data set to generate a single recovered data set. A scanning is initiated of the single forensic image and the single recovered data set using the selected plurality of malware engines, where each of the malware engines, installed on the indepenent operating systems of the virtual operating system may be run concurrently on the single forensic image and the single recovered data set. A report is generated combining each of the malware engines reporting the results of the scans. | 2016-03-03 |
20160063249 | METHOD TO SCAN A FORENSIC IMAGE OF A COMPUTER SYSTEM WITH MULTIPLE MALICIOUS CODE DETECTION ENGINES SIMULTANEOUSLY FROM A MASTER CONTROL POINT - A multi-engine malicious code scanning method for scanning data sets from a storage device is provided. The method includes, among other steps obtaining at least one data set from a storage device and generating a single forensic image of the data set and also applying a recover data application to the data set to generate a single recovered data set. A scanning is initiated of the single forensic image and the single recovered data set using the selected plurality of malware engines, where each of the malware engines, installed on the independent operating systems of the virtual operating system may be run concurrently on the single forensic image and the single recovered data set. A report is generated combining each of the malware engines reporting the results of the scans. | 2016-03-03 |
20160063250 | METHOD TO SCAN A FORENSIC IMAGE OF A COMPUTER SYSTEM WITH MULTIPLE MALICIOUS CODE DETECTION ENGINES SIMULTANEOUSLY FROM A MASTER CONTROL POINT - A multi-engine malicious code scanning method for scanning data sets from a storage device is provided. The method includes, among other steps obtaining at least one data set from a storage device and generating a single forensic image of the data set and also applying a recover data application to the data set to generate a single recovered data set. A scanning is initiated of the single forensic image and the single recovered data set using the selected plurality of malware engines, where each of the malware engines, installed on the independent operating systems of the virtual operating system may be run concurrently on the single forensic image and the single recovered data set. A report is generated combining each of the malware engines reporting the results of the scans. | 2016-03-03 |
20160063251 | METHOD TO SCAN A FORENSIC IMAGE OF A COMPUTER SYSTEM WITH MULTIPLE MALICIOUS CODE DETECTION ENGINES SIMULTANEOUSLY FROM A MASTER CONTROL POINT - A multi-engine malicious code scanning method for scanning data sets from a storage device is provided. The method includes, among other steps obtaining at least one data set from a storage device and generating a single forensic image of the data set and also applying a recover data application to the data set to generate a single recovered data set. A scanning is initiated of the single forensic image and the single recovered data set using the selected plurality of malware engines, where each of the malware engines, installed on the independent operating systems of the virtual operating system may be run concurrently on the single forensic image and the single recovered data set. A report is generated combining each of the malware engines reporting the results of the scans. | 2016-03-03 |
20160063252 | METHOD TO SCAN A FORENSIC IMAGE OF A COMPUTER SYSTEM WITH MULTIPLE MALICIOUS CODE DETECTION ENGINES SIMULTANEOUSLY FROM A MASTER CONTROL POINT - A multi-engine malicious code scanning method for scanning data sets from a storage device is provided. The method includes, among other steps obtaining at least one data set from a storage device and generating a single forensic image of the data set and also applying a recover data application to the data set to generate a single recovered data set. A scanning is initiated of the single forensic image and the single recovered data set using the selected plurality of malware engines, where each of the malware engines, installed on the independent operating systems of the virtual operating system may be run concurrently on the single forensic image and the single recovered data set. A report is generated combining each of the malware engines reporting the results of the scans. | 2016-03-03 |
20160063253 | SECURE RECOVERY APPARATUS AND METHOD - A system and method is disclosed for recovering a boot image. Hardware instructions initiate a loading of a computer operating system on a computing device. During the loading of the operating system, multiple portions of boot code are verified and a determination is made whether each portion is valid. If a portion of boot code is determined to be invalid, a secure portion of the boot code is loaded to repair the invalid code and the loading of the operating system resumed. | 2016-03-03 |
20160063254 | Retrieving System Boot Code from a Non-Volatile Memory - A controller monitors for an indication from core logic indicating that the core logic is in a state in which the core logic does not access a bus. In response to detecting the indication, the controller retrieves the system boot code from a non-volatile memory over the bus. | 2016-03-03 |
20160063255 | Event Data Structure to Store Event Data - An event data structure is stored in a non-volatile memory that is electrically isolated from a bus accessible by a processor. In response to an event relating to operation of a controller that is separate from the processor, the controller adds event data for the event into an entry of the event data structure. | 2016-03-03 |
20160063256 | Methods, Systems, and Apparatuses for Managing a Hard Drive Security System - A system for use with a computer is provided, the computer including a self-encrypting drive (SED), the SED including a nominal space and a pre-boot region, wherein the nominal space can be locked to prevent access to the nominal space. The system includes SED management software configured to be loaded in the pre-boot region of the SED. The SED management software includes a pre-boot operating system (OS) and an unlocking program. The unlocking program is configured (a) to execute within the pre-boot OS, and (b) upon successful authentication of a user, to unlock the nominal space of the SED. Other embodiments are described and claimed. | 2016-03-03 |
20160063257 | DATA DRIVEN SYSTEM FOR RESPONDING TO SECURITY VULNERABILITY - A data-driven system for fast response to security vulnerability, in one example embodiment, comprises a request detector, a content type evaluator, and a presentation module. A request detector may be configured to detect a request to display content. A content type evaluator may be configured to determine a type of the requested content. A presentation module may be configured to selectively display the requested content based on the determined type of the requested content. The content type evaluator and the presentation module may utilize a data file that stores information related to potential vulnerabilities associated with a content viewing application. Example data file may be an XML file. | 2016-03-03 |
20160063258 | METHODS AND SYSTEMS FOR ENFORCING, BY A KERNEL DRIVER, A USAGE RESTRICTION ASSOCIATED WITH ENCRYPTED DATA - A method of providing a restricted set of application programming interfaces includes decrypting, by a secure object information reader executing on a computing device, an encrypted data object using information associated with the encrypted data object to generate a decrypted data object, the information received from an access control management system. The method includes intercepting, by a kernel driver executing on the computing device, from a process executing on the computing device, a request to access the decrypted data object. The method includes identifying, by the kernel driver, using the information associated with the encrypted data object, a usage requirement restricting a set of operations available to the process in accessing the decrypted data object. The method includes providing, by the kernel driver, to the process, a restricted set of application programming interfaces with which to interact with the decrypted data object, as permitted by the restricted set of operations. | 2016-03-03 |
20160063259 | Methods, Systems, and Apparatuses for Managing a Hard Drive Security System - A system for use with a computer is provided, the computer including a self-encrypting drive (SED), the SED including a nominal space and a pre-boot region, wherein the nominal space can be locked to prevent access to the nominal space. The system includes SED management software configured to be loaded in the pre-boot region of the SED. The SED management software includes a pre-boot operating system (OS) and an unlocking program. The unlocking program is configured (a) to execute within the pre-boot OS, and (b) upon successful authentication of a user, to unlock the nominal space of the SED. Other embodiments are described and claimed. | 2016-03-03 |
20160063260 | POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL - A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities. | 2016-03-03 |
20160063261 | Launching A Secure Kernel In A Multiprocessor System - In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example. | 2016-03-03 |
20160063262 | System and Method for Authentication - A multi-functional device is attached to a secure network and includes a control circuit. The control circuit receives indications as to whether a user is authenticated to use the multi-functional device and in response, generates and sends a control signal to the multi-functional device. As long as the multi-functional device continues to receive the control signal, the multi-functional device remains in an operational mode to allow the authenticated user to access the multi-functional device functions. If the multi-functional device ceases to receive the control signal, the multi-functional device deactivates itself. | 2016-03-03 |
20160063263 | DATA STORAGE SYSTEM WITH INFORMATION SECURITY PROTECTION - A data storage system with information security protection includes an SSD and at least one activation device selectively connected to the SSD. The SSD has a device identifier, and includes a data storage unit and a controlling and processing unit. The controlling and processing unit is in information connection with the data storage unit, and is written with at least one set of firmware data that is triggered and activated by an activation key to execute a predetermined task on the data storage unit. The activation device includes a data processing unit which is written with the activation key in advance, and has a pairing mode and an enabling mode. In the pairing mode, the data processing unit accesses and stores the device identifier. In the enabling mode, the data processing unit compares the stored device identifier to output the activation key to the controlling and processing unit. | 2016-03-03 |
20160063264 | METHOD FOR SECURING A PLURALITY OF CONTENTS IN MOBILE ENVIRONMENT, AND A SECURITY FILE USING THE SAME - There is provided a method for protecting a plurality of contents in mobile terminal, the method includes; storing a header portion for storing file names and folder structure of the plurality of contents; and a body portion for storing file binary values of the plurality of contents, when the plurality of contents are stored; wherein the file binary values of the plurality of contents is partially encrypted. | 2016-03-03 |
20160063265 | PHOTOGRAPHIC COPY PREVENTION OF A SCREEN IMAGE - A method for preventing photographic capture of a displayed image on an electronically controlled screen using a photographic capture device is provided. The method includes intercepting an image for display; generating a plurality of subset frames based on the intercepted image; dividing the intercepted image into a plurality of subsections; generating a pseudo random number on each of the subsections within the plurality of subsections using a pseudo random number generator; mapping, on each of the subset frames within the plurality of subset frames, a group of subsections within the plurality of subsections that share a common generated pseudo random number; and determining a frame rate value for displaying the plurality of subset frames, which enables human visualization of the plurality of subset frames as a single perceived frame. | 2016-03-03 |
20160063266 | System Function Invoking Method and Apparatus, and Terminal - A system function invoking method and apparatus, and a terminal are disclosed and are related to the field of computer technologies. The method includes acquiring an installation package of a first application program; granting a first permission of a system to the first application program according to the installation package, where the first permission is used to, when the first application program is in a running state, forbid a second application program from invoking at least one system function; and running the first application program, and forbidding the second application program from invoking the at least one system function. The apparatus includes a first acquiring module, an authorization module, and an invoking module. | 2016-03-03 |
20160063267 | TRI-MODULE DATA PROTECTION SYSTEM SPECIFICATION - The present invention provides a system, method and apparatus for protecting data:
| 2016-03-03 |
20160063268 | SYSTEMS, METHODS, AND DEVICES FOR GATHERING DISPLAY DEVICE USAGE DATA - A display device includes one or more sensors to sense activity in a physical region near the display, as well as a permission component, account component, and a data gathering component. The permission component is configured to determine a permission level corresponding to the display device. The account component is configured to determine an account status that is based on the permission level. The data gathering component is configured to gather usage data for the display device based on the permission level. The usage data includes data from the one or more sensors regarding activity in the physical region near the display device. The transmission component is configured to transmit the usage data to a remote server. | 2016-03-03 |
20160063269 | Outsourcing Document-Transformation Tasks while Protecting Sensitive Information - An outsourcing environment is described herein by which an outsourcing entity may delegate document-transformation tasks to at least one worker entity, while preventing the worker entity from gaining knowledge of sensitive items that may be contained within a non-obfuscated original document (NOD). In one example, the environment may transform the NOD into an obfuscated original document (OOD) by removing sensitive items from the NOD. The worker entity may perform formatting and/or other document-transformation tasks on the OOD, without gaining knowledge of the sensitive items in the NOD, to produce an obfuscated transformed document (OTD). The environment may then allow for the outsourcing entity to view a content-restored version of the OTD. | 2016-03-03 |
20160063270 | PERMISSION COMPARATOR - A permission management system enables a system administrator to more effectively manage the large number of permissions associated with database systems. The permission management system accumulates groups of permissions associated with selected users, profiles, or permission sets. The permission management system then performs selectable comparisons on the different groups of permissions, such as identifying common permissions, unique permissions, and differing permissions. The permission management system also may identify permissions in a first permission group that do not exist in a second permission group and assign the identified permissions to the second permission group. | 2016-03-03 |
20160063271 | ACCESS CONTROL FOR UNPROTECTED DATA STORAGE SYSTEM ENDPOINTS - Various embodiments provide access control to unprotected data storage system endpoints. In one embodiment, an authenticated query request is received. The request includes a query associated with an unprotected data storage system endpoint configured to execute queries anonymously. The query is written in a Resource Description Framework (RDF) query language and requests one or more datasets stored in a relational data storage system. A user parameter within the query is identified. The user parameter uniquely identifies a user requesting the query. The query is automatically rewritten to include a set of access control list properties for one or more subject variables in the query. Each of the set of access control list properties configures the query to return data from the one or more datasets for which the user is authorized to access. | 2016-03-03 |
20160063272 | SECURE VIRTUAL FILE MANAGEMENT SYSTEM - Virtual file management is disclosed. Managed content from multiple separate storage domains is organized into a virtual file system that maintains with respect to each of at least a subset of said separate storage domains information of storage domain specific file system primitives to perform primitive operations with respect to content stored in that storage domain. Policies are determined that apply to the managed content. Each policy indicates primitive operations permitted to be performed with respect to the managed content. Information comprising the virtual file system and the policies is provided to a client application on a mobile device. The client application is configured to provide access to the managed content in the virtual file system in a manner at least in part indicated in the policies, including by allowing the permitted primitive operations to be performed using said storage domain specific file system primitives. | 2016-03-03 |
20160063273 | SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING CROSS ORGANIZATIONAL DATA SHARING - In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing cross organizational data sharing including, for example, means for storing customer organization data in a database of the host organization; allocating at least a sub-set of the customer organization data to be shared as shared data; configuring a hub to expose the shared data to a proxy user and configuring the proxy user at the hub with access rights to the shared data; configuring one or more spokes with access rights to the shared data of the hub via the proxy user; receiving a request from one of the hubs for access to the shared data of the customer organization via the proxy user at the hub; and returning a response to the hub having made the request. Other related embodiments are disclosed. | 2016-03-03 |
20160063274 | Data Processing Device with Light Indicator Unit - This invention comprises an image and audio data processing device that comprises a transceiver to send and receive image and audio data over a network, a camera module which captures and processes image and/or audio data individually or in combination when a user activates the camera module, a camera module sensor which identifies a use operation of capturing the image and audio data, and an indicator unit which includes a light emitting module. When the camera module is capturing and processing the image and audio data and the transceiver sends and receives said data over the network, the camera module sensor identifies the use operation and activates the indicator unit thereby illuminating the light emitting module. | 2016-03-03 |
20160063275 | METHOD OF PROTECTING CARE INFORMATION IN A CARE PROVIDER TERMINAL - A method protects care information in a care provider terminal. The method includes detecting if there is a network disconnection between the care provider terminal and an authorized access point (AP), operating the care provider terminal in an offline mode until a first predetermined time is over after the network disconnection is detected, activating an alarm operation when the first predetermined time is over, and deleting the care information when a second predetermined time is over after the alarm operation is activated. The method may further include determining whether or not the care provider terminal is connected to an unauthorized AP while counting the first predetermined time or the second predetermined time, and deleting the care information if it is determined that the care provider terminal is connected to the unauthorized AP. | 2016-03-03 |
20160063276 | Sharing Content - A method performed in relation to a private conversation conducted over a network between a selected group of two or more users, each of the group of users participating in the conversation from a respective instance of a communication client application run on a respective user device. The private conversation comprises one or more content items, each of these content items being shared by a respective source user of the group with one or more other users of the group internally within the private conversation. The method comprises associating a respective permissions model with each respective one of the content items, the permission model being configured to act on the client application to control permission for the one or more other users to use the respective content item outside of said conversation. | 2016-03-03 |
20160063277 | METHOD, APPARATUS, AND MEDIA FOR CREATING SOCIAL MEDIA CHANNELS - A method, apparatus, and computer-readable media for creating a private social network (PSN). Channels in the PSN can be created based on connections in existing social networks and based on other interactions between the users. Channels can be dynamically managed based on various interactions and attributes. Channels of the PSN are defined by a data structure indicating the users and relationships therebetween. The data structure can be manipulated to change the attributes of the channels. A user interface can be provided to facilitate aggregation of existing channels. | 2016-03-03 |
20160063278 | Privacy Compliance Event Analysis System - This invention relates to a data system that anonymizes personalized event data, by receiving the personalized event data containing an encrypted personal identifier and determining whether an entry exists for the encrypted personal identifier in a key database. The encrypted personal identifier may be associated with a system identifier that uniquely identifies the encrypted personal identifier and is uniquely associated to one system identifier. If no entry is detected in the key database for the received encrypted personal identifier, then a new entry for the key database is generated in which the received encrypted personal identifier is uniquely associated to a new system identifier. The received encrypted personal identifier associated to the new system identifier is stored as the new entry in the key database and the new system identifier associated to the event data contained in the personalized event data in an event database is stored where the event database stores system identifiers in association with the corresponding event data. | 2016-03-03 |
20160063279 | PERIODIC MEMORY REFRESH IN A SECURE COMPUTING SYSTEM - A method of providing security in a computer system includes performing a memory refresh of a window of memory locations in a memory, and in which each memory location stores a version value and a block of ciphertext. The version value may be updated with each write operation at a memory location; and the block of ciphertext may be produced with a key that changes with each write operation and from memory location to memory location. The memory refresh may include performing a periodic read operation followed by a corresponding write operation at each memory location. Between the read and write operations, the version value stored at the memory location may be compared with a chronologically earliest version value stored at any memory location of the window, and validity of the block of ciphertext stored at the memory location may be verified based on the comparison. | 2016-03-03 |
20160063280 | SECURE ACCESS FOR SENSITIVE DIGITAL INFORMATION - Sensitive pieces of information stored on an individual's device can be protected using a device identification system that applies, for each sensitive piece of information, a function that integrates an identifier of the individual with a respective sensitive piece of information to create a respective identity element. Each identity element can be signed with a signature to create a trust group. The identity element and signature can be uploaded to the individual's device using an application that is configured to provide a subset of the sensitive pieces of information in response to a query. | 2016-03-03 |
20160063281 | SYSTEM AND METHOD FOR IMPROVED SECURITY FOR A PROCESSOR IN A PORTABLE COMPUTING DEVICE (PCD) - Systems and methods for improved security for a core in a portable computing device (PCD), such as a core operating a high level operating system (HLOS) are presented. In operation, a monitor module on the SoC is initialized. The monitor module sends a request to the core of the SoC and the monitor module receives a response from the core. A timer in communication with the monitor module is checked. The timer is reset or disabled by the monitor module if the response from the core is received at the monitor module before the expiration of the timer. Otherwise, the monitor module applies at least one security measure to the core as a result of the timer expiring. | 2016-03-03 |
20160063282 | DEPENDENCIES BETWEEN FEATURE FLAGS - An example method for handling dependencies between feature flags can include defining, by a processing resource executing instructions, dependencies between a plurality of feature flags in a process executable by the processing resource. The method can include enforcing, by the processing resource executing instructions, the dependencies during activation of a first feature by a determination of validity of utilization of a feature flag as a switch for a second feature. | 2016-03-03 |
20160063283 | ELECTRONIC DEVICE AND METHOD FOR UNLOCKING THE ELECTRONIC DEVICE - In a method for unlocking an electronic device with a touch screen and a distance sensor, a triggering signal to unlock the electronic device is received. Objects within a predetermined distance of the distance sensor is determined. The touch screen is activated to display an unlocking area if no object is detected within the predetermined distance of the distance sensor. Touch signals are received from the unlocking area to determine whether an unlocking operation is performed. A time duration that the touch screen has been activated is calculated to determine whether the unlocking operation is performed within a preset time period from activation of the touch screen. The electronic device is unlocked if the unlocking operation is performed within a preset time period from activation of the touch screen, and a predetermined application is executed when the electronic device is unlocked. | 2016-03-03 |
20160063284 | MULTIPLICATION OPERATIONS IN MEMORY - Examples of the present disclosure provide apparatuses and methods for performing multi-variable bit-length multiplication operations in a memory. An example method comprises performing a multiplication operation on a first vector and a second vector. The first vector includes a number of first elements stored in a group of memory cells coupled to a first access line and a number of sense lines of a memory array. The second vector includes a number of second elements stored in a group of memory cells coupled to a second access line and the number of sense lines of the memory array. The example multiplication operation can include performing a number of AND operations, OR operations and SHIFT operations without transferring data via an input/output (I/O) line. | 2016-03-03 |
20160063285 | AUTOMATIC SCANNER CONFIGURATION - Various embodiments each include at least one of systems, methods, firmware, and software to automatically configure a scanner, such as a scanner coupled to point-of-sale or self-service terminal. Some embodiments include initializing a scanner that is in an un-configured state and requesting scanner configuration settings from at least one device via a network, such as another scanner. Some embodiments further include receiving scanner configuration settings in response to the request and implementing the scanner configuration settings on the scanner. | 2016-03-03 |
20160063286 | PASSIVE RFID SENSOR TAG - An integrated passive radio frequency identification transponder chip includes a backscatter modulator for communication with a backscattering principle, a tag oscillator generating a backscattering modulation frequency, and a reference load, preferably a reference resonator. Either the reference load or at least one pair of an internal or external resonator and an external sensor element can be selectively connected to load the tag oscillator. Each external sensing element is arranged to sense a predetermined variable. The tag oscillator is capable of generating any one of nominal backscattering modulation frequencies defined for a respective RFID system, when the reference load is connected to load the tag oscillator. The tag oscillator is arranged to generate a predetermined one of nominal backscattering modulation frequencies, when the at least one pair of the internal or external resonator and the external sensor element is connected to load the tag oscillator. | 2016-03-03 |
20160063287 | METHOD FOR RFID TAG-READER ANTENNA ASSOCIATION IN A LABORATORY DEVICE - A method is provided for associating an RFID tag to an RFID reader antenna in a laboratory device with a number N RFID reader antennae ( | 2016-03-03 |
20160063288 | UNIQUE IDENTIFIER INSERT FOR PERISHABLE OR CONSUMABLE TOOLING - A device for tracking a consumable or perishable tool is provided including a connector configured to couple to a body of the consumable or perishable tool such that the connector remains in constant contact with the consumable or perishable tool for a life of the tool. The connector includes an exposed unique identifier configured to provide identification information about the tool when access by an asset management software. | 2016-03-03 |
20160063289 | METHOD AND READ/WRITE DEVICE FOR SELECTING A WIRELESS DATA MEDIUM - A method and a read/write device for selecting at least one wireless data medium from a number of detected wireless data media that are RFID transponders, wherein the data media are registered in a detection area of a read/write device via a plurality of detection cycles, at least one receive parameter is recorded for each of the detected data media, and at least one data medium of the data media is selected based on an evaluation of the recorded receive parameters, a plurality of detection cycles are performed at different antenna polarizations, at least one receive parameter is recorded at each of utilized antenna polarizations for the detected data media, and at least one of the detected data media is selected in each case based on a statistical evaluation of the receive parameters recorded in the different antenna polarizations. | 2016-03-03 |
20160063290 | PORTABLE INFORMATION CODE READER - A portable information code reading apparatus includes an image unit imaging an information code, a processing unit encoding the information code imaged by the imaging unit, a case that holds the imaging unit and the processing unit. An attaching member is produced integrally with the case or produced as a separate member from the case. The attaching member is used to hook the case on a user's ear. | 2016-03-03 |
20160063291 | AUTOMATIC TUNING OF SCANNER LIGHTING - Various embodiments herein each include devices, system, methods, and software for automatic scanner lighting tuning. One method embodiment includes determining a distance from a scanning surface to a surface of an item presented for scanning, determining an illumination setting based on the determined distance, and illuminating a scanning field according to the determined setting. Another embodiment is a scanner including a scanning module with a scanning surface imaged by an imaging device and a lighting module including at least one adjustable lighting element that illuminates according a received illumination setting. The scanner further includes a distance determining module that determines a distance between the scanning surface and a presented item and a lighting controller that receives a determined distance from the distance determining module, determines the illumination setting based on the determined distance, and provides the illumination command to the lighting module. | 2016-03-03 |
20160063292 | SCANNER NOTIFICATIONS - A scanner notification indicates an operational status of the scanner, such as a hand-held scanner used at a point-of-sale or as part of an inventory-tracking system. Among other things, a notification might indicate to a user that a product identifier has been verified, product tracking is occurring, a tag is being deactivated, successful completion of scanning functions, and various other operational states of the scanner. | 2016-03-03 |
20160063293 | PORTABLE SCANNING DEVICE - A portable scanning device includes a first outer shell defining a receiving space therein, a second outer shell configured to couple with the first outer shell to cover the receiving space, a connecting band coupled to the first outer shell and configured to be secured to a body part of a user, and an electronic assembly including a number of electronic components. The number of electronic components includes a battery configured to provide power for the portable scanning device, a printed circuit board, a scanner configured to scan a plurality of codes, a speaker configured to broadcast an audio during a process of scanning the plurality of codes, a connection port configured to couple the battery to an external power source to charge the battery, a number of buttons for operating the portable scanning device, and a number of indication lights configured to indicate statuses of the portable scanning device. | 2016-03-03 |
20160063294 | FINGER/NON-FINGER DETERMINATION FOR BIOMETRIC SENSORS - A fingerprint sensing apparatus may include a fingerprint sensor system and a control system. The fingerprint sensor system may include an ultrasonic sensor array. The control system may be capable of receiving fingerprint sensor data from the fingerprint sensor system and of determining whether an object is positioned proximate a portion of the fingerprint sensor system. The control system may be capable of determining an acoustic impedance of at least a portion of an object that is positioned proximate the fingerprint sensor system. The control system may be capable of determining whether the acoustic impedance is within an acoustic impedance range corresponding to that of skin and of determining, based at least in part on the acoustic impedance, whether the object is a finger. | 2016-03-03 |
20160063295 | FINGERPRINT DETECTION SENSOR AND FINGERPRINT DETECTION SYSTEM COMPRISING THE SAME - Example embodiments disclose a fingerprint recognition sensor and a fingerprint recognition system. The fingerprint recognition sensor may include a pad configured to apply a first wave signal having multi-frequency characteristics to an object, a signal applying electrode configured to transmit the first wave signal having multi-frequency characteristics to the pad and a signal receiving electrode configured to receive a reflection wave signal from the object to the pad based on the first wave signal. | 2016-03-03 |
20160063296 | AIR/OBJECT DETERMINATION FOR BIOMETRIC SENSORS - A fingerprint sensing apparatus may include a fingerprint sensor system and a control system capable of receiving fingerprint sensor data from the fingerprint sensor system. The control system may be capable of determining fingerprint sensor data blocks for at least a portion of the fingerprint sensor data and of calculating statistical variance values for fingerprint sensor data corresponding to each of the fingerprint sensor data blocks. The control system may be capable of determining, based at least in part the statistical variance values, whether an object is positioned proximate a portion of the fingerprint sensor system. | 2016-03-03 |
20160063297 | DISPLAY DEVICE AND METHOD OF CONTROLLING THEREFOR - A display device and a method of controlling therefor are disclosed. A display device includes a main display unit configured to receive an input of at least one fingerprint and display information, a sub display unit configured to be exposed from a stored position and a controller configured to set a mode based on the inputted at least one fingerprint. If an inputted first fingerprint is matched with a fingerprint of a group of registered fingerprints, the controller is configured to set a first mode. If an inputted first fingerprint and a second fingerprint are matched with fingerprints of the group of the registered fingerprints, the controller is configured to set a second mode. | 2016-03-03 |
20160063298 | GUIDED FINGERPRINT ENROLLMENT - Fingerprint enrolment is described. An initial procedure in which the appropriate area of the finger is determined from the size of a user's finger, followed by a guidance procedure where guidance information is provided in a pseudo random manner and further fingerprint data is obtained during the pseudo random guidance. When the appropriate area of the finger has been covered, fingerprint data is used in a calculation of fingerprint enrolment data that can be used in subsequent steps in the enrolment procedure. | 2016-03-03 |
20160063299 | PHOTOELECTRON FINGERPRINT IDENTIFYING APPARATUS - A photoelectron fingerprint identifying apparatus is disclosed. The disclosed photoelectron fingerprint identifying apparatus may include a photoelectron sensor having a light receiving surface on which a finger is placed, wherein the photoelectron sensor receives an optical intensity signal associated with an invisible light penetrating the finger before converting the optical intensity signal to a photocurrent signal, an analog/digital converter electrically coupled to the photoelectron sensor for receiving the photocurrent signal, wherein the analog/digital converter converts the photocurrent signal to a digital signal, and an image processing unit electrically coupled to the analog/digital converter for receiving the digital signal before outputting an fingerprint pattern based on the digital signal. | 2016-03-03 |
20160063300 | LAYERED FILTERING FOR BIOMETRIC SENSORS - A fingerprint sensing apparatus includes a fingerprint sensor system and a control system capable of receiving fingerprint sensor data from the fingerprint sensor system. The control system may determine, according to the fingerprint sensor data, whether an object is positioned proximate a portion of the fingerprint sensor system. If the control system determines that an object is positioned proximate the portion of the fingerprint sensor system, the control system may determine whether the object is a finger or a non-finger object. The control system may determine whether the fingerprint sensor data includes fingerprint image information of at least an image quality threshold. | 2016-03-03 |
20160063301 | CAPACITIVE FINGERPRINT SENSOR AND FINGERPRINT SENSING METHOD THEREOF - A capacitive fingerprint sensor is provided. The capacitive fingerprint sensor includes a sensing array, an insulating surface disposed on the sensing array, and a readout module. The sensing array includes a plurality of sensing units, and each of the sensing units includes a sensing capacitor and a reference capacitor. When a finger contacts the insulating surface, the readout module obtains a sensing time interval corresponding to the sensing capacitor of each of the sensing units and a reference time interval corresponding to the reference capacitor of each of the sensing units during a sensing period. The readout module provides a sensing output according to the sensing time interval and the reference time interval to indicate a fingerprint ridge or a fingerprint valley of the finger. | 2016-03-03 |
20160063302 | METHOD FOR INSERTING FEATURES INTO A THREE-DIMENSIONAL OBJECT AND METHOD FOR OBTAINING FEATURES FROM A THREE DIMENSIONAL OBJECT - A method for inserting features into a three-dimensional object is disclosed, wherein features correspond to original features of the three-dimensional object. The inserting method comprises determining a reference shape using the original features; determining a set of vertices on the three-dimensional original object at the intersection between the reference shape and the three-dimensional object; modifying the local neighborhood of the set of vertices so that their local neighborhood is close to a set of target shapes. A method for obtaining features from a three-dimensional object is further disclosed. The method comprises obtaining anchor vertices whose local neighborhood is close to a set of target shapes; fitting a reference shape onto the anchor vertices; and obtaining the features using the fitted reference shape. A 3D object carrying anchor vertices and devices for implementing the disclosed methods are further disclosed. | 2016-03-03 |
20160063303 | METHOD AND APPARATUS FOR EYE GAZE TRACKING - The invention relates to method and apparatus of an eye gaze tracking system. In particular, the present invention relates to method and apparatus of an eye gaze tracking system using a generic camera under normal environment, featuring low cost and simple operation. The present invention also relates to method and apparatus of an accurate eye gaze tracking system that can tolerate large illumination changes. | 2016-03-03 |
20160063304 | LINE-OF-SIGHT DETECTION APPARATUS - In computation of a line-of-sight direction in a control unit, a first computed line-of-sight direction is obtained from the center of a pupil and a reflection point of cornea reflection light, a second computed line-of-sight direction is obtained by computing the ellipse shape of an iris or the pupil, and a third computed line-of-sight direction is obtained on the basis of a face orientation and the relative position of the iris or pupil in an eye. The line-of-sight direction can be computed over a wide range with high accuracy by selecting one of the computed line-of-sight directions. | 2016-03-03 |
20160063305 | IMAGE PROCESSING DEVICE AND IMAGE PROCESSING METHOD - An image processing device for correcting at least a portion of a face image containing a person's face, includes an image acquisition unit that acquires a face image, a region extractor that extracts a pupil region containing a pupil from the face image, a determination unit that determines a presence or absence of halation in the pupil region, a first template acquisition unit that acquires a first template image which is a correction template image, a reference color acquisition unit that acquires a reference color corresponding to the person from the face image, a second template acquisition unit that generates a second template image using the first template image and the reference color, and a correction unit that composites the second template image with at least the region in the pupil region where the halation occurred to correct the halation. | 2016-03-03 |
20160063306 | System and Method for Utilizing Fingerprints as User Inputs - An information handling system includes a tablet computer, which in turn includes a touch sensor, a sensor detector, and a processor. The sensor detector is configured to communicate with the touch sensor, and to detect a first fingerprint on the touch sensor. The processor is configured to communicate with the sensor detector, to determine that the first fingerprint is within a first zone of the touch sensor, to match the first fingerprint to a stored fingerprint for the first zone of the touch sensor, to determine a first input function associated with the first fingerprint based on the first fingerprint matching the stored fingerprint for the first zone, and to execute the first input function. | 2016-03-03 |
20160063307 | IMAGE ACQUISITION DEVICE AND CONTROL METHOD THEREFOR - The image acquisition device has a stage that supports the sample, and an imaging unit that has an image forming optical system forming an image of the sample and captures the formed image. The image acquisition device further includes a specimen information acquisition unit that acquires information on presence or absence of a specimen included in the sample based on an imaging result of the imaging unit, and a control unit that moves the stage based on the information on the presence or absence of the specimen. | 2016-03-03 |
20160063308 | Learning Pixel Visual Context from Object Characteristics to Generate Rich Semantic Images - Both object-oriented analysis and the faster pixel-oriented analysis are used to recognize patterns in an image of stained tissue. Object-oriented image analysis is used to segment a small portion of the image into object classes. Then the object class to which each pixel in the remainder of the image most probably belongs is determined using decision trees with pixelwise descriptors. The pixels in the remaining image are assigned object classes without segmenting the remainder of the image into objects. After the small portion is segmented into object classes, characteristics of object classes are determined. The pixelwise descriptors describe which pixels are associated with particular object classes by matching the characteristics of object classes to the comparison between pixels at predetermined offsets. A pixel heat map is generated by giving each pixel the color assigned to the object class that the pixelwise descriptors indicate is most probably associated with that pixel. | 2016-03-03 |
20160063309 | Combination of Stereo and Structured-Light Processing - Methods and systems for determining depth information using a combination of stereo and structured-light processing are provided. An example method involves receiving a plurality of images captured with at least two optical sensors, and determining a first depth estimate for at least one surface based on corresponding features between a first image and a second image. Further, the method involves causing a texture projector to project a known texture pattern, and determining, based on the first depth estimate, at least one region of at least one image of the plurality of images within which to search for a particular portion of the known texture pattern. And the method involves determining points corresponding to the particular portion of the known texture pattern within the at least one region, and determining a second depth estimate for the at least one surface based on the determined points corresponding to the known texture pattern. | 2016-03-03 |
20160063310 | BIRD DETECTION DEVICE, BIRD DETECTION SYSTEM, BIRD DETECTION METHOD, AND PROGRAM - A bird detection device equipped with: a captured image acquisition unit that acquires a captured image; a bird candidate image extraction unit that extracts a bird candidate image, which is a candidate bird image, from the captured image; and a bird detection determination unit that, on the basis of the time required for the bird candidate image to move in accordance with the size of the bird candidate image in the captured image, determines whether a bird has been detected. The bird detection determination unit also can determine whether a bird has been detected on the basis of the degree of change in the shape of the bird candidate image for a prescribed time interval. | 2016-03-03 |
20160063311 | FACIAL IMAGE DISPLAY APPARATUS, FACIAL IMAGE DISPLAY METHOD, AND FACIAL IMAGE DISPLAY PROGRAM - The present invention provides a facial image display apparatus that can display moving images concentrated on the face when images of people's faces are displayed. A facial image display apparatus is provided wherein a facial area detecting unit ( | 2016-03-03 |
20160063312 | IMAGE ANALYSIS APPARATUS, IMAGE ANALYSIS METHOD, AND IMAGE ANALYSIS PROGRAM - An image analysis apparatus that analyzes a skin condition from a video of the face of a subject captured with an imaging part includes a tracking part configured to track the amount of changes of multiple tracking points arranged in advance in an analysis region of the face based on a change in the expression of the face included in the video, and obtain the compression ratio of the skin in the analysis region based on the amount of changes, and a skin condition analysis part configured to analyze the skin condition of the subject based on the compression ratio obtained by the tracking part. | 2016-03-03 |
20160063313 | AD-HOC, FACE-RECOGNITION-DRIVEN CONTENT SHARING - Example embodiments relate to ad-hoc, face-recognition-driven content sharing. In example embodiments, a system matches a face in a face image extracted from a video stream from a sharing device to a face profile of a receiving user, where the face profile of the receiving user is generated based on a training face image that is extracted from a training video stream of a training device of the receiving user. In response to generating a temporary token that is associated with the face profile, the system sends the temporary token and an arbitrary handle from the face profile to the sharing device. At this stage, the system receives a context identifier from the sharing device and provides the context identifier to the receiving device of the receiving user. | 2016-03-03 |
20160063314 | IMAGE PROCESSING APPARATUS FOR FACIAL RECOGNITION - An apparatus including an image capture device including a lens, a shutter, an image sensor, and an aperture is provided. The image capture device receives, via the lens, a plurality of images. The apparatus further includes a display, a memory, a receiver, a transmitter, and a processor. The receiver receives facial recognition data. The transmitter transmits an instruction to capture a series of images via the image capture device. The series of images may include a randomly generated pose. The apparatus further includes a processor to analyze the facial recognition data to determine an estimated age of a user. | 2016-03-03 |
20160063315 | METHOD AND APPARATUS FOR CONTROLLING VEHICLE USING MOTION RECOGNITION WITH FACE RECOGNITION - Provided is a vehicle control apparatus including an image obtaining part that obtains an image of outside of a vehicle; a face recognizing part that finds and tracks a face of a person from an image obtained by the image obtaining part based on feature elements human faces and extracts feature information regarding a face of a person; a face authenticating part that compares the feature information extracted by the face recognizing part to feature information regarding faces of persons registered in advance and, if a difference therebetween is less than or equal to a critical value, authenticates that the recognized face as a registered face; the motion recognizing part that, when authentication is completed by the face authenticating part, recognizes a motion; and a control part that recognizes a motion of a face-recognized and face-authenticated person and performs a set function. | 2016-03-03 |
20160063316 | METHODS AND SYSTEMS FOR INCREASING FACIAL RECOGNITION WORKING RANG THROUGH ADAPTIVE SUPER-RESOLUTION - Disclosed herein are methods and systems for increasing facial-recognition working range through adaptive super-resolution. One embodiment takes the form of a process that includes calculating one or more video metrics with respect to an input set of video frames. The process also includes obtaining a metric-specific weighting factor for each of the calculated video metrics. The process also includes calculating a weighted sum based on the obtained metric-specific weighting factors and the corresponding calculated video metrics. The process also includes selecting, based at least in part on the calculated weighted sum, a super-resolution technique from among a plurality of super-resolution techniques. The process also includes outputting an indication of the selected super-resolution technique. | 2016-03-03 |
20160063317 | FACIAL-EXPRESSION ASSESSMENT DEVICE, DANCE ASSESSMENT DEVICE, KARAOKE DEVICE, AND GAME DEVICE - The present invention provides a facial expression grading system that can achieve improved quantitative evaluation of expressiveness of a user by grading a facial expression of the user. The facial expression grading system ( | 2016-03-03 |
20160063318 | SYSTEMS, METHODS, AND DEVICES FOR TRACKING ATTENTION OF VIEWERS OF A DISPLAY DEVICE - An apparatus or system includes a permission management component, a usage component, an attention component, and a report component. The permission management component is configured to determine a permission level corresponding to a display device. The permission level may indicate an amount of data or type of data that can be gathered. The usage component is configured to receive sensor data from one or more sensors observing a viewing area of a display device. The display device may include the one or more sensors, and the sensor data may be received in accordance with the permission level. The attention component is configured to determine, based on the sensor data, an attention level of one or more individuals to the display device. A report component is configured to report the attention level to a content provider. | 2016-03-03 |
20160063319 | METHOD AND APPARATUS FOR TRACKING GAZE - A method for tracking a gaze includes determining a position of a first center point of a cornea by using at least two lighting reflection points detected from an eyeball area of a first face image of a user and calculating a first vector connecting at least two first image feature points detected from the first face image to the position of the first center point of the cornea. A position of a second center point of the cornea is determined using the first vector and a position of the feature point detected from the second face image. A second vector is determined using the position of the second center point of the cornea and a position of a center point of a pupil. The gaze of the user is tracked by using the second vector. An apparatus for tracking a gaze is also disclosed. | 2016-03-03 |
20160063320 | VIRTUAL BODY SCANNER APPLICATION FOR USE WITH PORTABLE DEVICE - A method for performing measurements includes taking a photograph, via a camera having a position association with a device, of any portion of a subject. The method also includes processing the photograph through a thermographic module to discern a measured portion. The method further includes comparing the measurement data to a stored comparison model to derive fitting data. The method also includes transmitting the fitting data from the device to a server. | 2016-03-03 |
20160063321 | SYSTEM AND METHOD FOR TRANSCRIBING HISTORICAL RECORDS INTO DIGITIZED TEXT - A handwriting recognition system converts word images on documents, such as document images of historical records, into computer searchable text. Word images (snippets) on the document are located, and have multiple word features identified. For each word image, a word feature vector is created representing multiple word features. Based on the similarity of word features (e.g., the distance between feature vectors), similar words are grouped together in clusters, and a centroid that has features most representative of words in the cluster is selected. A digitized text word is selected for each cluster based on review of a centroid in the cluster, and is assigned to all words in that cluster and is used as computer searchable text for those word images where they appear in documents. An analyst may review clusters to permit refinement of the parameters used for grouping words in clusters, including the adjustment of weights and other factors used for determining the distance between feature vectors. | 2016-03-03 |
20160063322 | METHOD AND SYSTEM OF EXTRACTING LABEL:VALUE DATA FROM A DOCUMENT - This disclosure provides an exemplary method and system for extracting structured label and value pairwise textual data from a textual document. According to an exemplary method, initially a layout analysis is performed resulting in one or more alternatives for grouping and ordering the textual elements of interest. Next, textual elements are tagged as including a label term, a value term or a label and value term. Finally, a sequence-based method is applied to the tagged elements to generate one or more sequence listings representative of the label and value pairwise data structure(s) and label:value pairwise data is extracted. | 2016-03-03 |
20160063323 | METHODS AND SYSTEMS FOR PROCESSING OF IMAGES OF MATHEMATICAL EXPRESSIONS - The current document is directed to methods and systems that convert document images containing mathematical expression into corresponding electronic documents. In one implementation, an image or sub-image containing a mathematical expression is recursively partitioned into blocks separated by white-space stripes. Horizontal and vertical partitioning are alternately and recursively applied to the image or sub-image containing a mathematical expression until the lowest-level blocks obtained by partitioning correspond to symbols recognizable by character-recognition methods. Graph-based analysis of the recognized symbols provides a basis for encoding an equivalent representation of the mathematical expression contained in the image or sub-image. | 2016-03-03 |
20160063324 | GEOGRAPHICAL AREA CONDITION DETERMINATION - A method and system for mapping the conditions of locations is provided. The method includes retrieving image data associated with a plurality of locations within a specified geographical area. The image data is compared to a plurality of stored image data that includes baseline measurement values associated with an expected condition level of baseline locations within a baseline geographical area. Condition score values associated with the plurality of locations are calculated. The condition score values indicate real time condition values associated with the plurality of locations. An overall condition score value associated with the specified geographical area is generated. A map indicating the overall condition score value is generated. | 2016-03-03 |
20160063325 | HIERARCHICAL CLASSIFICATION IN CREDIT CARD DATA EXTRACTION - Embodiments herein provide computer-implemented techniques for allowing a user computing device to extract financial card information using optical character recognition (“OCR”). Extracting financial card information may be improved by applying various classifiers and other transformations to the image data. For example, applying a linear classifier to the image to determine digit locations before applying the OCR algorithm allows the user computing device to use less processing capacity to extract accurate card data. The OCR application may train a classifier to use the wear patterns of a card to improve OCR algorithm performance. The OCR application may apply a linear classifier and then a nonlinear classifier to improve the performance and the accuracy of the OCR algorithm. The OCR application uses the known digit patterns used by typical credit and debit cards to improve the accuracy of the OCR algorithm. | 2016-03-03 |
20160063326 | ILLUMINATION IMAGING DEVICE AND GAZE DETECTING APPARATUS - An illumination imaging device includes a combination of a polarizing plate, which is a grid polarizer, and a wave plate is provided at the intersection of an optical axis of a first light source that emits light and an optical axis of an imaging member. The light emitted from the first light source is reflected by the polarizing plate, is transmitted through the wave plate, and is fed to an object. The optical axis of the first light source and the optical axis of the imaging member coincide with each other. Therefore, a clear bright-pupil image is acquired by the imaging member. | 2016-03-03 |