30th week of 2020 patent applcation highlights part 47 |
Patent application number | Title | Published |
20200233952 | MOBILE BEHAVIOMETRICS VERIFICATION MODELS USED IN CROSS DEVICES - A method for calibrating user behavior based models, in order to enable user validation across different devices (i.e. known and unknown devices), comprising: receiving device usage data generated by monitoring user-device interactions on one or more user devices; employing a user behavior model based on the device usage data and a plurality of values of technical parameters of the one or more devices; receiving a plurality of values of technical parameters of an additional device; receiving device usage data by monitoring user-device interactions on the additional device; and analyzing the device usage data of the additional device by employing the user behavior model to validate an action held using the additional device. | 2020-07-23 |
20200233953 | ENCLAVE HANDLING ON AN EXECUTION PLATFORM - There are provided mechanisms for handling instances of enclaves on an execution platform. The execution platform comprises a secure component. The secure component serves as a trusted interface between a trusted platform module of the execution platform and enclaves of an enclave environment on the execution platform. Only a single enclave, denoted base enclave, in the enclave environment is enabled to communicate with the secure component. A method comprises receiving, by the base enclave, an indication from another enclave in the enclave environment upon start-up of a new instance of the so-called another enclave. The method comprises determining, by the base enclave, to enable continued running of the new instance only when number of currently running instances of the so-called another enclave is within an interval of allowed number of running instances of the so-called another enclave. | 2020-07-23 |
20200233954 | SYSTEMS AND METHODS FOR AUTOMATED DETECTION AND ANALYSIS OF SECURITY THREATS - Systems and methods for automated detection and analysis of security threats are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for automated detection and analysis of security threats may include the following: (1) receiving an item from an asset; (2) inspecting the item using at least one rule; (3) determining an exposure related to the item to determine an exposure to the item; (4) enriching the item with additional data; (5) calculating a total score for the item based on the inspection, the exposure, and the enriching; and (6) generating an alert for the item based on the total score exceeding a threshold. | 2020-07-23 |
20200233955 | RISK SCORE GENERATION UTILIZING MONITORED BEHAVIOR AND PREDICTED IMPACT OF COMPROMISE - A method includes monitoring user behavior in an enterprise system, identifying a given user of the enterprise system associated with a given portion of the monitored user behavior, determining a predicted impact of compromise of the given user on the enterprise system, generating a risk score for the given user based on the predicted impact of compromise and the given portion of the monitored user behavior, and identifying one or more remedial actions to reduce the risk score for the given user. The method also includes implementing, prior to detecting compromise of the given user, at least one of the remedial actions to modify a configuration of at least one asset in the enterprise system, the at least one asset comprising at least one of a physical computing resource and a virtual computing resource in the enterprise system. | 2020-07-23 |
20200233956 | FRAMEWORK FOR CYBER-PHYSICAL SYSTEM PROTECTION OF ELECTRIC VEHICLE CHARGING STATIONS AND POWER GRID - Some embodiments provide a system to protect an electric vehicle charging infrastructure. An electric vehicle charging site may receive AC power from a power grid and provide DC power to electric vehicles. The charging site may include a plurality of monitoring nodes each generating a series of current monitoring node values over time that represent a current operation of the electric vehicle charging infrastructure. A supply equipment communication controller may receive an access request from an access requestor associated with an electric vehicle, the access request being associated with a platform certificate. A secondary actor policy decision point at the charging site may evaluate the access requestor's identity and respond with an action message allowing high-level communication with the access requestor to proceed. Note that information associated with the current monitoring node values and/or the access request may be stored in a secure, distributed transaction ledger (e.g., an attestation blockchain). | 2020-07-23 |
20200233957 | Method for the Protection Against Cavitation in Cyber Attacks and Unit for Carrying Out the Method - A method and device for protecting a flow-conducting device of an installation against cavitation initiated by cyber attacks. At least one signal relating to an operating state of the installation is evaluated by an evaluation unit in order to detect a cyber attack by comparison with at least one reference value. If the evaluation unit detects a willfully brought-about irregular operating mode of the installation based on the evaluation, the unit passes on signals to components of the installation to bring about an installation operating mode which is in compliance with regulations and during which generation of cavitation is avoided, and produces a state in which the flow-conducting device is protected against the current cyber attack and/or against future cyber attacks. | 2020-07-23 |
20200233958 | METHOD AND SYSTEM FOR ACTIVE RISK CONTROL BASED ON INTELLIGENT INTERACTION - A method for active risk control based on an intelligent interaction comprises: acquiring contact information of a risk implementer; actively interacting with the risk implementer based on the contact information of the risk implementer and generating a record of the active interaction; processing the record of the active interaction and extracting risk characteristics from it; categorizing risks according to the risk characteristics; and implementing different risk controls on the risks. | 2020-07-23 |
20200233959 | DATA PROTECTION AUTOMATIC OPTIMIZATION SYSTEM AND METHOD - A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository. | 2020-07-23 |
20200233960 | Automatic Malware Signature Generation for Threat Detection Systems - Deriving malware signatures by training a binary decision tree using known malware and benign software samples, each tree node representing a different software feature set and having one descending edge representing samples that are characterized by the node's software feature set and another descending edge representing samples that are not characterized thusly, selecting multiple continuous descending paths for multiple subsets of nodes, each path traversing a selected one of the edges descending from each of the nodes in its corresponding subset, deriving, based on the nodes and edges in any of the paths, a malware-associated software feature signature where the malware samples represented by leaves that directly or indirectly descend from an end of the continuous descending path meets a minimum percentage of the total number of samples represented by the leaves, and providing the malware signatures for use by a computer-based security tool configured to identify malware. | 2020-07-23 |
20200233961 | CONTAINER ANOMALY DETECTION BASED ON CROWD SOURCING - Generally discussed herein are devices, systems, and methods for secure container operation. A behavior profile of normal container operation can be generated, such as by using crowd sourced data. A container monitor can provide container actions of an application in a deployed container. The container action can be compared to a behavior profile that indicates normal behavior of the container. A communication can in response to the container actions being inconsistent with the normal behavior of the behavior profile. The container can be halted to stop the abnormal behavior. | 2020-07-23 |
20200233962 | DETECTING OBFUSCATED MALWARE VARIANTS - A threat management facility analyzes a plurality of instructions in computer code for redundancy. When redundancy is found, the threat management facility determines whether the redundancy has characteristics of deliberate obfuscation consistent with malware techniques such as server-side polymorphism. Measures of redundancy, such as one or more of a degree of redundancy or a pattern of redundancy, may inform this process, and my usefully aid in distinguishing legitimate code redundancies from malware. Where an inference of malware is supported, the threat management facility may initiate remediation of the computer code. Further, or instead, the type of remediation applied to the computer code may be based on one or more aspects of the detected obfuscation. | 2020-07-23 |
20200233963 | ATTESTATION SYSTEM, ATTESTATION METHOD, AND ATTESTATION PROGRAM - An attestation system | 2020-07-23 |
20200233964 | TROJAN DETECTION IN CRYPTOGRAPHIC HARDWARE ADAPTERS - A cryptographic hardware security module (HSM) includes a memory storage device and an immutable hardware unit in signal communication with the memory storage device. The memory storage device is configured to store firmware. The immutable hardware unit is configured to perform a hash operation on targeted firmware stored in the memory storage device to determine an authenticity of the targeted firmware based at least in part on results of the hash operation. | 2020-07-23 |
20200233965 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, SECURITY ASSESSMENT METHOD, AND SECURITY ASSESSMENT PROGRAM - To implement a security assessment system capable of assessing an attack path including an air gap path, there is provided an information processing apparatus including a system configuration detector that detects at least two hosts included in a system and a communication link between the at least two hosts, an air gap path detector that detects, among the at least two hosts, a pair of hosts between which there is no communication link but data movement can occur, and a security assessment unit that performs security assessment using a detection result by the system configuration detector and a detection result by the air gap path detector. | 2020-07-23 |
20200233966 | PROVIDING SMART CONTRACTS INCLUDING SECRETS ENCRYPTED WITH ORACLE-PROVIDED ENCRYPTION KEYS USING THRESHOLD CRYPTOSYSTEMS - Providing smart contracts including secrets encrypted with oracle-provided encryption keys using thresholding cryptosystems is disclosed. In one example, a contract creator encrypts sensitive data necessary for executing a smart contract into ciphertext with multiple symmetric cryptographic keys using a threshold cryptosystem, such that a subset of at least size R of the symmetric cryptographic keys are required to decrypt the ciphertext. The symmetric cryptographic keys are encrypted into wrappers using a public cryptographic key of a contract executor. Envelopes are generated using public cryptographic keys of corresponding contract oracles, where the envelopes include the wrappers encrypted using the public cryptographic keys, and policies that specify condition(s) precedent and are authenticated using the public cryptographic keys. The smart contract, including the envelopes, the ciphertext, and R, is then deployed to the contract executor. In this manner, the sensitive data is protected from unauthorized access within the smart contract. | 2020-07-23 |
20200233967 | MEMORY DEVICES WITH CRYPTOGRAPHIC COMPONENTS - An apparatus, such as a memory system (e.g., a NAND memory system), can have a controller with a first error correction code component and a memory device (e.g., a NAND memory device) coupled to the controller. The memory device can have an array of memory cells, a second error correction code component coupled to the array and configured to correct data from the array, and a cryptographic component coupled to receive the corrected data from the second error correction code component. | 2020-07-23 |
20200233968 | DATA SHARING ARCHITECTURE - Techniques are disclosed relating to sharing data. A first computer system may receive data shared by a second computer system to permit the first computer system to perform processing of the data according to a set of policies. The first computer system may instantiate a verification environment in which to process the shared data. The first computer system may process a portion of the shared data by executing a set of processing routines to generate a result based on the shared data. The verification environment may verify whether the result is in accordance with the set of policies. The verification environment may determine whether to output the result based on the verifying and may send an indication of an outcome of the determining to the second computer system. The indication may be usable to determine whether to provide the first computer system with continued access to the shared data. | 2020-07-23 |
20200233969 | INTERNET OF THINGS TERMINAL AND METHOD OF FILTERING CONTENT INCLUDING PRIVACY INFORMATION IN THE SAME - A method of filtering content including privacy information in an Internet of things (IoT) terminal includes generating, by the processor, content management data prescribing a mapping relationship between pieces of content, a kind of a network, and a plurality of applications and storing the content management data in a content management data storage unit, based on a user input, the content management data prescribing a security policy associated with external transmission of the pieces of content, and when an external transmission request message corresponding to specific content of the pieces of content is received from the specific application, determining, by the processor, whether to allow external transmission of the specific content in response to the external transmission request message, based on the security policy prescribed in the content management data. | 2020-07-23 |
20200233970 | MICROPROCESSOR ATOMIC SECURE ENCRYPT AND SEND INSTRUCTION - Various embodiments of the disclosed subject matter provide systems, methods, architectures, mechanisms, apparatus, computer implemented method and/or frameworks configured for guaranteeing that a payload portion of every data packet provided to a secure/encrypted output port of a processor such as a microprocessor is encrypted. | 2020-07-23 |
20200233971 | Data Breach Detection and Mitigation - A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions. | 2020-07-23 |
20200233972 | INFORMATION PROCESSING SYSTEM, METHOD FOR PROVIDING SERVICE DATA, AND METHOD FOR BUILDING INFORMATION PROCESSING SYSTEM - An information processing system | 2020-07-23 |
20200233973 | SELECTIVE DATA ACCESS AND DATA PRIVACY VIA BLOCKCHAIN - Methods and systems for managing access to a data location associated with a vehicle. The method includes detecting, by one or more sensors of the vehicle, vehicle data. The method also includes recording, by an electronic control unit (ECU) of the vehicle, the vehicle data to the data location. The method also includes storing, by a smart contract located on a blockchain, an access state associated with the data location, the access state indicating one or more devices having access to the data location. The method also includes communicating, by the ECU, an instruction to the smart contract to change the access state associated with the data location to grant access to a third-party device or revoke access from the third-party device. | 2020-07-23 |
20200233974 | Parental Control Systems and Methods For Detecting An Exposure of Confidential Information - Some embodiments use text and/or image processing methods to determine whether a child is transmitting confidential information to a conversation partner via an electronic messaging service. Some embodiments detect whether an image transmitted as part of an electronic message shows a bank card, a social security card, or an identity document, among others. When detecting such a situation, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.) | 2020-07-23 |
20200233975 | SECURE MANAGEMENT OF USER INFORMATION USING TOKENIZATION AND TOKEN STATES - A technique smartly manages user information. The technique involves receiving, using an input device, an input value from the user during a user transaction. The technique further involves applying, using electronic circuitry, an algorithm to generate a token on behalf of the user. The algorithm is arranged to provide tokens in a non-reproducible manner to prevent discovery of input values based on the tokens. The technique further involves associating the token value with the input value and collecting user information and associating the user information with the token during a time range which includes periods of transaction inactivity and further transaction activity by the user. Along these lines, the technique is capable of implementing mutually exclusive token states (e.g., “active”, “inactive”, “deactivated” and “compromised”) to smartly coordinate and maintain certain user information. | 2020-07-23 |
20200233976 | DATA PROCESSING SYSTEMS AND METHODS FOR AUDITING DATA REQUEST COMPLIANCE - A privacy management system that is configured to process one or more data subject access requests and further configured to: (1) enable a data protection officer to submit an audit request; (2) perform an audit based on one or more parameters provided as part of the request (e.g., one or more parameters such as how long an average request takes to fulfill, one or more parameters related to logging and/or tracking data subject access requests and/or complaints from one or more particular customer advocacy groups, individuals, NGOs, etc.); and (3) provide one or more audit results to the officer (e.g., by displaying the results on a suitable display screen). | 2020-07-23 |
20200233977 | CLASSIFICATION AND MANAGEMENT OF PERSONALLY IDENTIFIABLE DATA - A computing system comprises a dataset including a plurality of data entries, at least some which include personally identifiable information (PII). A personal data oversight machine of the computing system is configured to receive an indication that a particular data entry includes PII, and based on the contents of the data entry, classify the data entry as including one or more of a plurality of types of PII by applying one or more data classification tags of a set of candidate data classification tags to the data entry. Based on the data classification tags applied to the data entry, the personal data oversight machine applies one of a set of data management tags to the data entry, the set of data management tags including deletion, retention, and anonymization tags, and based on the data management tag, applies a data management operation to the data entry. | 2020-07-23 |
20200233978 | MULTIPLE SIGNATURES IN METADATA FOR THE SAME DATA RECORD - Aspects include accessing, by a processing system, one or more data records and a metadata record. The metadata record includes a first digital signature associated with the one or more data records. One or more additional digital signatures associated with the one or more data records are generated, where the first digital signature and the one or more additional digital signatures are generated based on applying at least one different digital signature generation aspect with respect to the one or more data records. The one or more additional digital signatures are stored in the metadata record. | 2020-07-23 |
20200233979 | MACHINE LEARNING MODEL VALIDATION AND AUTHENTICATION - The present disclosure is directed to methods and apparatus for validating and authenticating use of machine learning models. For example, various techniques are described herein to limit the vulnerability of machine learning models to attack and/or exploitation of the model for malicious use, and for detecting when such attack/exploitation has occurred. Additionally, various embodiments described herein promote the protection of sensitive and/or valuable data, for example by ensuring only licensed use is permissible. Moreover, techniques are described for version tracking, usage tracking, permission tracking, and evolution of machine learning models. | 2020-07-23 |
20200233980 | SECRET INFORMATION GENERATION APPARATUS AND METHOD FOR OPERATING THE SAME - A secret information generation apparatus and a method for operating the secret information generation apparatus. The secret information generation apparatus includes a resistor-capacitor circuit, and a microcontroller unit including a first pin connected to an input terminal of the resistor-capacitor circuit and a second pin connected to an output terminal of the resistor-capacitor circuit, wherein the microcontroller unit is configured to transmit a digital value corresponding to a challenge to the resistor-capacitor circuit through the first pin, receive an output value of the resistor-capacitor circuit corresponding to the digital value through the second pin, convert the received value into a digital value using an analog-to-digital converter, extract one or more valid bits from the converted digital value, and then generate a response. | 2020-07-23 |
20200233981 | Method to Identify Consumer Electronics Products - Systems and methods for identifying consumer electronic products using a playback device with a product identifier in accordance with embodiments of the invention are disclosed. In one embodiment, a playback device includes a processor and memory configured to store a product identifier, where the product identifier is associated with a specific product and is associated with cryptographic information, wherein the processor is configured by a client application to request content from a server, communicate the product identifier to a server, and receive encrypted content accessible using cryptographic information including the cryptographic information associated with the product identifier. | 2020-07-23 |
20200233982 | FPGA DEVICE AND CLOUD SYSTEM BASED ON FPGA DEVICE - A device including a management logic unit and a user logic unit, where the management logic unit comprises a Peripheral Component Interconnect Express (PCIe) module, and the PCIe module comprises a first physical functional unit and a second physical functional unit. The first physical functional unit is configured to receive a user logic loading request initiated by the second physical functional unit, where the user logic loading request carries a user logic identifier; obtain a user logic file based on the user logic identifier; and burn the user logic file into the user logic unit via a PCIe configuration channel. The present disclosure solves the technical problem that an existing FPGA cannot be deployed in the cloud due to the need for connecting to a JTAG cable when being remotely configured or debugged. | 2020-07-23 |
20200233983 | AUTHORIZATION CONTROL FOR HARDWARE MANAGEMENT - A user or a provider of an IHS (Information Handling System) may prefer to disable, on a temporary or permanent basis, hardware components of the IHS. For instance, a user may prefer to prevent all microphone inputs through disabling of the microphone device of the IHS. Disabling hardware components via the operating system of IHS is cumbersome, especially for temporary hardware configurations. Embodiments provide the capability for securely managing certain hardware components of an IHS without reliance on the operating system of an IHS, while providing assurances that a hardware component is actually disabled. Embodiments assure disabling of a hardware component by providing the ability to terminate power to the component, where the power is terminated based on commands transmitted by a trusted resource via an out-of-band signal pathway to the hardware component. | 2020-07-23 |
20200233984 | SECURING ACCESSORY INTERFACE - Techniques are disclosed relating to securing an accessory interface on a computing device. In various embodiments, a computing device detects a connection of an accessory device to an accessory interface port and, in response to the detected connection, evaluates a policy defining one or more criteria for restricting unauthorized access to the accessory interface port. Based on the evaluating, the computing device determines whether to disable the accessory interface port to prevent communication with the connected accessory device. In some embodiments, the computing device includes an interconnect coupled between the processor and the accessory interface port, and the interconnect includes a hub circuit configured to facilitate communication between a plurality of devices via the interconnect. In some embodiments, the computing device, in response to determining to disable the accessory interface port, instructs the hub circuit to prevent traffic from being conveyed from the accessory interface port. | 2020-07-23 |
20200233985 | System and Method for Intrusion Detection - An information handling system includes an intrusion detection circuit having two inductors and an amplifier circuit. The amplifier circuit is configured to identify an increase in inductive coupling between the inductors in response to a change in position of a cover. | 2020-07-23 |
20200233986 | DESIGN TOOLS AND METHODS FOR DESIGNING INDOOR AND OUTDOOR WAVEGUIDE SYSTEM NETWORKS - Design tools and methods of use for designing, ordering, and providing manufacturing and installation instructions for waveguide system networks include a system design tool including a location selection module to determine a selected location, a satellite imagery component to provide an image based on the selected location, an overlay module to overlay a design on the image, and a customization module to customize the design. The system design tool includes one or more design modules to at least one of automatically output and build via user input one or more design options based on the image, and a design customization module to select the design from the one or more design options. The system design tool includes a positioning module to set a pair of connectivity points such that a cable length may be automatically calculated based on a calculated distance between the pair of connectivity points. | 2020-07-23 |
20200233987 | SYSTEM, METHOD, AND PROGRAM PRODUCT FOR DIGITAL PRODUCTION MANAGEMENT - Systems, methods, and program products for managing digital production from one or more production devices with one or more sources providing inputs of production designs and/or production options are disclosed. | 2020-07-23 |
20200233988 | SCALABLE AND PRECISE FITTING OF NURBS SURFACES TO LARGE-SIZE MESH REPRESENTATIONS - One embodiment of the invention disclosed herein provides techniques for fitting a mesh representation that includes a plurality of mesh points with a NURBS surface. A subdividing engine subdivides the mesh representation into a plurality of patches in a parametric domain. A vertex solving engine computes one or more vertex boundary continuity constraints for each vertex included in a plurality of vertices associated with the plurality of patches. An edge solving engine computes one or more edge boundary continuity constraints for each edge included in a plurality of edges associated with the plurality of patches. A patch solving engine fits a first patch included in the plurality of patches with at least one partial NURBS surface based on the vertex boundary continuity constraints and the edge boundary continuity constraints. | 2020-07-23 |
20200233989 | METHOD FOR MEASURING WRINKLES WITH REFERENCE TO TARGET SURFACE - A method for generating a quantitative representation of material wrinkles in a computer-aided design (CAD) model, performed by a data processing system includes receiving in a CAD model a definition of a shape of a part and a material to be applied to the part. One or more parameters relating to the material are received and one or more of a plurality of quantifiable methods for modeling wrinkles resulting from the combination of part shape and material properties are selected. An output file is provided in a predetermined format summarizing the quantified result. | 2020-07-23 |
20200233990 | ESTABLISHMENT OF A DESIGN-BASIS SPECIFICATION FOR A DEVICE FOR A TURBOMACHINE STRUCTURE - Method for establishing a sizing specification for an equipment intended to be mounted on a turbomachine structure such as a casing, the method comprising the following steps:
| 2020-07-23 |
20200233991 | STACKING OF ROTOR BLADE AEROFOIL SECTIONS TO ADJUST RESONANT FREQUENCIES - A method of designing a modified aerofoil shape, the method comprising the steps of: determining a plurality of resonant frequencies of a baseline aerofoil shape; determining that one of the resonant frequencies falls within a predetermined range of frequencies; providing a plurality of aerofoil sections defining the baseline aerofoil shape; and defining a modified aerofoil shape by displacing at least one of the plurality of aerofoil sections relative to its baseline position in the baseline aerofoil shape until one of the plurality of resonant frequencies previously falling within the range of frequencies is shifted outside the range of frequencies. | 2020-07-23 |
20200233992 | VEHICLE TRAVELING SIMULATION SYSTEM, VEHICLE TRAVELING SIMULATION METHOD AND ACTIVATION DEVICE - In a vehicle traveling simulation system, a multimedia device has at least a test target function among in-vehicle media functions. An activation device activates the multimedia device. A plurality of external terminal devices is respectively provided at different positions from the multimedia device. A data acquisition unit of the activation device is able to acquire vehicle state data simulating a vehicle state when a vehicle is traveling from the plurality of external terminal devices. An input unit inputs, to the multimedia device, activation data corresponding to the vehicle state data. The multimedia device is activated based on the input activation data. | 2020-07-23 |
20200233993 | GRAPHICAL USER INTERFACE FOR UNCERTAINTY ANALYSIS USING MINI-LANGUAGE SYNTAX - A table including a record can be displayed within a graphical user interface display space. The record can include an attribute. Data characterizing a user input can be received. The user input can specify an input parameter of an entry associated with the attribute of the record. A predefined syntactical rule set can be used to parse the user input. The parsing can include determining one or more simulation attributes associated with executing a simulation. The one or more simulation attributes can be provided. The result of the executed simulation can be processed. The result of the executed simulation can be displayed within a graphical user interface display space. Related apparatus, systems, techniques, and articles are also described. | 2020-07-23 |
20200233994 | Knit Simulation Method and a Knit Simulation System - The virtual shape of knit product comprising plural parts and mutually divided in the knit data is simulated. The connection information regarding how said parts are mutually connected is obtained based upon the knit data or the pattern data of the knit product, and the plural parts are mutually based upon the obtained connection information. The virtual shape of the knit product is deformed by deforming the plural parts according to the forces acting on the plural parts. At least one of the plural parts is stretched automatically or according to at least an instruction by a user, and then, the virtual shape of the knit product is re-deformed to a natural shape by re-deforming the plural parts according to the forces acting on the plural parts. Then, stitches are allocated within the plural parts, and the allocation of the stitches is smoothed within the plural parts. | 2020-07-23 |
20200233995 | CAD SYSTEM AND METHOD OF GENERATING DESIGN DATA - A CAD system generating design data corresponding to structural parts of a microfluidic device formed of a material: includes a coordinate value setter to a coordinate value for each of the structural parts of the microfluidic device, and a design data generator to generate the design data by setting, for each of the structural parts to which the coordinate value has been set, attribute information according to material data representing information specifying a material and including a depth, a thickness, and a cross-sectional shape of the material. | 2020-07-23 |
20200233996 | COHERENT PLACEMENT OF SLOTLINE MODE SUPPRESSION STRUCTURES IN COPLANAR WAVEGUIDES FOR QUANTUM DEVICES - A system includes a memory that stores computer executable components, and a processor executes the computer executable components stored in the memory. The computer executable components comprise: an assessment component that determines locations for mode suppression structures on a coplanar waveguide of a quantum chip having qubits; a simulation component that simulates performance of the quantum chip based on a subset of the locations for the mode suppression structures and parameters of the quantum chip, and generates a mode suppression structures placement model. A template component generates a template of specific coordinates for placement of a subset of the mode suppression structures on the quantum chip based on the mode suppression structures placement model; and a driver component employs the template to drive an auto-bonder to install the subset of the mode suppression structures on the quantum chip at the specific coordinates. | 2020-07-23 |
20200233997 | IMAGE PROCESSING APPARATUS CAPABLE OF MERGING CHARACTER STRINGS WITH ORIGINAL IMAGE, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An image processing apparatus which is capable of merging character strings with an original image without causing garbling. A first storage unit stores first character codes corresponding to a first language in accordance with administrator's input. A second storage unit stores a second character codes corresponding to a second character in accordance with login user's input. A reading unit reads an original image in accordance with login user's input. A generation unit generates a first character image corresponding to the first language on the basis of the first character codes and generates a second character image corresponding to the second language on the basis of the second character codes. A printing unit carries out a printing process based on the first character image, the second character image and the original image. | 2020-07-23 |
20200233998 | PRE-CHILDREN IN A USER INTERFACE TREE - The described technology is directed towards a pre-child user interface element in a user interface tree that draws before the parent element draws, (and thus before any conventional child element of the parent draws). For example, based upon current state data such as whether the parent element has focus, the pre-child may draw a highlight or the like before (so as to be beneath) drawing the representation of the parent element, to indicate the focused state (or and/or other current state or states). The user interface tree maintains a property that it is composable because the parent user interface element code is independent of what any of its pre-child element or pre-children elements do when invoked. | 2020-07-23 |
20200233999 | ENHANCING DOCUMENTS PORTRAYED IN DIGITAL IMAGES - The present disclosure is directed toward systems and methods that efficiently and effectively generate an enhanced document image of a displayed document in an image frame captured from a live image feed. For example, systems and methods described herein apply a document enhancement process to a displayed document in an image frame that result in an enhanced document image that is cropped, rectified, un-shadowed, and with dark text against a mostly white background. Additionally, systems and method described herein determine whether a stored digital content item includes a displayed document. In response to determining that a stored digital content item does include a displayed document, systems and methods described herein generate an enhanced document image of a displayed document included in the stored digital content item. | 2020-07-23 |
20200234000 | SYSTEMS AND METHODS FOR PROVIDING ADAPTIVE SURFACE TEXTURE IN AUTO-DRAFTED PATENT DOCUMENTS - Systems and methods for providing adaptive surface texture in auto-drafted patent documents are disclosed. Exemplary implementations may: obtain a plurality of style attributes, a given style attribute being descriptive of a type of document characteristic that is often-repeated or habitual in patent documents; obtain values for the plurality of style attributes, a given value of a style attribute being descriptive of a specific document characteristic that is often-repeated or habitual in one or more sample patent documents; and provide an auto-drafted patent document exhibiting the values for the plurality of style attributes. | 2020-07-23 |
20200234001 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR EDITING WEB PAGES IN-CONTEXT OF A PRODUCTION VIEW - Systems and methods for in-context editing of web pages in which the production format of a web page is visible while the web page is being edited, and the editable image is not distorted by the editing tools. In one embodiment, a system includes a server computer, a client computer and a transmission channel coupled between them. The server computer receives a request for a web page from the client computer and responsively transmits a web page containing in-context editing tools to the client computer. The client computer operate alternately in a first mode in which the in-context editing tools are superimposed on a web page image, or a second mode in which the web page image is displayed, but the in-context editing tools are hidden. The tools overlay in the first mode does not alter the production format of the web page image as displayed in the second mode. | 2020-07-23 |
20200234002 | OPTIMIZATION TECHNIQUES FOR ARTIFICIAL INTELLIGENCE - Methods, apparatuses and computer readable medium are presented for generating a natural language model. A method for generating a natural language model comprises: selecting from a pool of documents, a first set of documents to be annotated; receiving annotations of the first set of documents elicited by first human readable prompts; training a natural language model using the annotated first set of documents; determining documents in the pool having uncertain natural language processing results according to the trained natural language model and/or the received annotations; selecting from the pool of documents, a second set of documents to be annotated comprising documents having uncertain natural language processing results; receiving annotations of the second set of documents elicited by second human readable prompts; and retraining a natural language model using the annotated second set of documents. | 2020-07-23 |
20200234003 | METHOD, SYSTEM AND APPARATUS FOR GENERATING, EDITING, AND DEPLOYING NATIVE MOBILE APPS AND UTILIZING DEEP LEARNING FOR INSTANT DIGITAL CONVERSION - Cloud based mobile app building platform, or Snappii, that enables rapid development, testing, deployment, new version distribution and analysis of all apps facilitating app development, updates and changes. Apps can be published and distributed with a click of a button. Platform also enables real time, or nearly instant, conversion of written document or form to an app or electronic format with fillable fields or other interactive and/or I/O features. OCR and other tools can be deployed to facilitate app creation from written documents and/or forms and/or digital images thereof. AI, including neural networks, and/or blockchain technologies and methodologies facilitate efficient and/or secure storage and/or authentication and/or data collection and/or object recognition. | 2020-07-23 |
20200234004 | ELECTRONIC DOCUMENT AUTHOR IDENTIFICATION - A method on a client device is described. First document content information that corresponds to a first plurality of document elements of an electronic document is received from a data server. A graphical user interface that represents the first plurality of document elements is generated based on the first document content information. First author identifiers that indicate most recent authors for the first plurality of document elements are received. The first document content information and the first author identifiers correspond to a first timestamp. Visual identifiers for the first author identifiers are selected based on the graphical user interface. The visual identifiers are generated to indicate which of the first author identifiers correspond to the first plurality of document elements represented by the graphical user interface. | 2020-07-23 |
20200234005 | DATA ANALYTICS SYSTEM AND METHODS FOR TEXT DATA - Aspects of the subject disclosure may include, for example, a process that performs a statistical, natural-language processing analysis on a group of text documents to determine a group of topics. The topics are determined according to parameters obtained by training on a sample of documents. One or more topics in a subset of topics are associated to each document, resulting in topic-document pairs. A bias is identified for each topic-document pair, and clusters of topics are created from the subset of topics. Each cluster of topics is determined from a value for each bias of each topic-document pair and from a frequency of occurrence of each topic. Each cluster is presentable according to a corresponding image configuration based on all or a subset of the bias dimensions and the frequency of occurrence of topics in a cluster that distinguishes the cluster from other clusters. Other embodiments are disclosed. | 2020-07-23 |
20200234006 | PERFORMING CHEMICAL TEXTUAL ANALYSIS - A computer-implemented method according to one embodiment includes identifying a textual document, determining chemical data within the textual document, performing an analysis of the chemical data to identify a chemical pathway, and calculating a probability score for the chemical pathway, including predicting an outcome of a chemical reaction, utilizing the chemical data. | 2020-07-23 |
20200234007 | NATURAL LANGUAGE INTENT AND LOCATION DETERMINATION METHOD AND APPARATUS - Methods, apparatus, and system to parse an unstructured, natural language input of a user, infer a semantic meaning of an intent of the user, and determine a present or future user state, including a location and a time, in which the intent can be fulfilled. | 2020-07-23 |
20200234008 | INFORMATION PROCESSING METHOD AND DEVICE - Disclosed is an information processing method, an information processing device, a terminal device and a storage medium. The method includes: determining whether input information on a current application interface includes a named entity; if it is detected that the input information includes the named entity, acquiring and displaying entity content corresponding to the named entity on the current application interface; and acquiring a transmitting instruction and transmitting the entity content to a target user. | 2020-07-23 |
20200234009 | WORD SEMANTIC RELATION ESTIMATION DEVICE AND WORD SEMANTIC RELATION ESTIMATION METHOD - The following units are included: a word search unit searching a database for each of words included in an input word pair; a word vector extracting unit extracting a word vector corresponding to each of the searched words from a word vector database; a character vector converting unit converting characters included in the word pair into a character vector; a feature amount acquiring unit acquiring a feature amount by combining the extracted word vector of each of the words and the character vector generated by converting the characters; and an estimation unit estimating a semantic relation between the words from the acquired feature amount. | 2020-07-23 |
20200234010 | STRUCTURED NATURAL LANGUAGE KNOWLEDGE SYSTEM - In a structured natural language (SNL) knowledge system capable of storing SNL sentences in a database. The structured natural language sentence composition module composes an SNL (Structured Natural Language) sentence, and the sentence translator translates an SNL descriptive sentence or an SNL question sentence to SQL (Structured Query Language) queries, and translates the components stored in the database back to the SNL sentence. | 2020-07-23 |
20200234011 | GENERATING NEURAL NETWORK OUTPUTS USING INSERTION OPERATIONS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating network outputs using insertion operations. | 2020-07-23 |
20200234012 | MAGNETIC RECORDING MEDIUM PROCESSING DEVICE AND CONTROL METHOD - A card reader for processing an inserted magnetic card may be equipped with a front sensor arranged in the vicinity of an insertion opening for a magnetic card to detect the insertion of the magnetic card, a rear sensor for detecting the magnetic card when the magnetic card is fully inserted, a magnetic field generating unit for generating a magnetic field in the vicinity of the insertion opening for a magnetic card, and a control unit for controlling a magnetic field to be generated by said magnetic field generating unit at a first strength or at a second strength weaker than the first strength. The control unit may control the strength of the magnetic field to be generated by the magnetic field generating unit at the second strength while the first time period elapses after the rear sensor has detected the magnetic card and then has stopped sensing it. | 2020-07-23 |
20200234013 | TAG, RELATED METHOD AND SYSTEM FOR IDENTIFYING AND/OR AUTHENTICATING OBJECTS - A tag adapted to be applied to an object is disclosed. The tag includes a wireless communication interface, a processor and a memory. A univocal code, a cipher key and a count value are store in the memory. The tag generates a dynamic code as a function of the cipher key and the count value. Next, the tag varies the count value according to a determined operation, and stores the varied count value in the memory. The tag transmits the univocal code and the dynamic code to a reader device. The tag may transmit the univocal code and the dynamic code in a URL. | 2020-07-23 |
20200234014 | IDENTITY CARD HOLDER AND SYSTEM - An identity card holder with a processor, a memory, an antenna, an interface for communicating with an identity card, positioning circuitry for obtaining position data of the identity card holder and communications circuitry for communicating with a remote server apparatus. The processor being configured to receive identification data from the identity card via the interface to identify a user, to cause a credential of the user associate with the identity card to be determined, to obtain position data of the identity card holder from the positioning circuitry and to cause restricted information related to a location to be provided to the user, where the restricted information has an access requirement related to the credential of the user and wherein the restricted information is provided to the user only if the user credential meets the access requirement and the position of the identity card holder is proximate the location. | 2020-07-23 |
20200234015 | NETWORKED COMPUTER SYSTEM FOR REMOTE RFID DEVICE MANAGEMENT AND TRACKING - A networked computer system for remote RFID device management and tracking provides a means for quickly deploying and managing RFID based technologies, serving both large and small use cases. The remote management and auditing tools significantly reduce labor force requirements by removing the physical interaction requirement, and permit new possibilities since clients can manage devices from any internet connected locale. The low entry and operational costs permit solutions which provide RFID devices to end users and their devices. | 2020-07-23 |
20200234016 | OBJECT STORING APPARATUS AND OBJECT ACCESS METHOD - The present invention provides an object storing apparatus, an object access method, an object obtaining service method, and an object indication method thereof. The object storing apparatus includes a cabinet body and a cabinet door, and storing positions are disposed inside the cabinet body. The object access method includes the following steps. Whether the cabinet door is opened is determined. In response to the cabinet door being opened, whether a scanning operation for a first external object is activated is determined. The first external object being not an existing external object at a storing position. In response to the scanning operation being activated, object storing is determined. In response to the existing external object being moved, object obtaining is determined. Accordingly, an automatic and convenient storing function can be provided. | 2020-07-23 |
20200234017 | Generic Shape Quality Verification Process for a Mark and Read System - A generic shape quality verification process that allows the generalization of Association for Automatic Identification and Mobility (AIM) Direct Part Mark (DPM)/International Organization for Standardization (ISO)/International Engineering Consortium (IEC) (ISO/IEC) 29158 quality metrics for a generic shape marked or marked with a generic technique, wherein the AIM-DPM/ISO-IEC 29158 quality metrics, e.g., Cell Contrast, Cell Modulation, Grid Non Uniformity, Axial Non Uniformity, Fixed Pattern Damage, Unused Error Correction, and Print Growth are generalized to permit verification of a generic shape, are generalized to permit verification of a generic shape, where the process in accordance with the invention consists of the following three steps, i.e., (i) configuration, (ii) calibration and iii) work such that based on computed AIM-DPM/ISO-IEC 29158 metrics, it is possible to verify whether quality of the printed layout is acceptable. | 2020-07-23 |
20200234018 | Modular Camera Apparatus and Method for Optical Detection - A modular camera apparatus is provided having a common control and evaluation unit and having at least one camera module that has a reception optics and an image sensor that determine a module viewing zone of the camera module, wherein the module viewing zones together produce a monitored zone of the camera apparatus. The monitored zone is here adaptable by a common setting of the module viewing zones. | 2020-07-23 |
20200234019 | TWO DIMENSIONAL BARCODE WITH DYNAMIC ENVIRONMENTAL DATA SYSTEM, METHOD, AND APPARATUS - Methods, systems, and apparatus for combining preprinted information together with coded sensor information within a two-dimensional barcode. The sensor information may be of an environmental, physical or biological nature, and records a cumulative change in status of the environmental or biological condition to which the labeled product has been exposed. A sensor dye chemistry is employed that undergoes a continuous chemical or physical state change in response to the occurrence of the environmental condition. The continuous change is between an initial state and an end state causing a change in the color state of the sensor dye embedded within the sensor-augmented two-dimensional barcode, encoding sensor digital information. Sensor information is recovered utilizing the error-correction feature during barcode decoding. | 2020-07-23 |
20200234020 | ELECTRONIC DEVICE AND METHOD FOR RECOGNIZING FINGERPRINT BASED ON DRAG INPUT - An electronic device includes a display, a memory configured to store instructions, a fingerprint sensor configured to obtain first fingerprint information regarding a finger contacting the display, and a processor, and when executing the instructions, the processor is configured to while displaying a first screen on the display, receive a first drag input from a user's finger contacting the display; obtain the first fingerprint information regarding the finger by using the fingerprint sensor while the first drag input is maintained; and, based on it being identified that the fingerprint information matches first reference fingerprint information, display a second screen converted from the first screen at least partially on the display. | 2020-07-23 |
20200234021 | ULTRASONIC FINGERPRINT SENSOR WITH ELECTRICALLY NONCONDUCTIVE ACOUSTIC LAYER - An ultrasonic fingerprint sensor system of the present disclosure may be provided with a thick electrically nonconductive acoustic layer and thin electrode layer coupled to a piezoelectric layer of an ultrasonic transmitter or transceiver. The thick electrically nonconductive acoustic layer may have a high density or high acoustic impedance value, and may be adjacent to the piezoelectric layer. The thin electrode layer may be divided into electrode segments. The ultrasonic fingerprint sensor system may use flexible or rigid substrates, and may use an ultrasonic transceiver or an ultrasonic transmitter separate from an ultrasonic receiver. | 2020-07-23 |
20200234022 | Capacitive fingerprint recognition unit, capacitive measurement circuit of fingerprint sensor, and fingerprint recognition device having same - A capacitive fingerprint recognition unit using a thin-film transistor (TFT) sensor array to sense a user's fingerprint in a capacitive manner, a capacitance measurement circuit of a fingerprint sensor, and a fingerprint recognition device having the capacitance measurement circuit are disclosed. A capacitive fingerprint recognition unit includes a thin-film transistor (TFT) sensor array, a gate driver, an upper switch and a lower switch. The TFT sensor array includes a plurality of gate lines, a plurality of sensing lines, a plurality of TFTs connected to the gate line and the sensing line, and a fingerprint recognition pattern connected to each of the TFTs. The gate driver sequentially supplies a gate signal to the gate line. The upper switch is connected to a first end of each of the sensing lines and the lower switch is connected to a second end of each of the sensing lines. | 2020-07-23 |
20200234023 | INTEGRATED FINGERPRINT AND FORCE SENSOR - Described herein is a ruggedized microelectromechanical (“MEMS”) sensor including both fingerprint and force sensing elements and integrated with complementary metal-oxide-semiconductor (“CMOS”) circuitry on the same chip. The sensor employs either piezoresistive or piezoelectric sensing elements for detecting force and also capacitive or ultrasonic sensing elements for detecting fingerprint patterns. Both force and fingerprint sensing elements are electrically connected to integrated circuits on the same chip. The integrated circuits can amplify, digitize, calibrate, store, and/or communicate force values and/or fingerprint patterns through output pads to external circuitry. | 2020-07-23 |
20200234024 | UNDER-SCREEN FINGERPRINT RECOGNITION SYSTEM, LIQUID CRYSTAL DISPLAY FINGERPRINT RECOGNITION APPARATUS AND ELECTRONIC DEVICE - The present disclosure provides an under-screen fingerprint recognition system, an LCD fingerprint recognition apparatus and an electronic device. The under-screen fingerprint recognition system includes a fingerprint light source, a reflection unit and a fingerprint sensor; the reflection unit is disposed between the liquid crystal panel and the backlight module in the display module; a reflection surface of the reflection unit is toward the liquid crystal panel to receive the light that is emitted by the fingerprint light source. The present disclosure can realize under-screen fingerprint recognition for an LCD. | 2020-07-23 |
20200234025 | IMAGE ANALYSIS SYSTEM AND METHOD OF USING THE IMAGE ANALYSIS SYSTEM - A system and method for analyzing images using a non-transitory programmable device is disclosed. A user interface generator operating on the non-transitory programmable device receives specifications of a first image of a biological sample and a first image analysis step. A sequencer operating on the non-transitory programmable device applies the first image analysis step to the first image to develop annotated training data, and a machine learning system trainer operating on the non-transitory programmable device trains an untrained machine learning system to develop a trained machine learning system. When the trained machine learning system is presented with the first image as an input, the trained machine learning system develops a prediction of the annotated training data. In addition, the sequencer receives a specification of a workflow that comprises a second image analysis step that specifies operating the trained machine learning system and the sequencer undertakes the workflow on a second image to analyze the second image. | 2020-07-23 |
20200234026 | FINGERPRINT IDENTIFICATION APPARATUS AND ELECTRONIC DEVICE - The embodiments of the present application provide a fingerprint identification apparatus, which has a smaller thickness and a better imaging effect at the same time. The fingerprint identification apparatus includes: a light path directing structure disposed between a display screen and an optical fingerprint sensor for directing a light signal that is obliquely incident on a finger above the display screen at a preset angle and reflected by the finger to the optical fingerprint sensor; and the optical fingerprint sensor disposed below the light path directing structure for detecting the received light signal. | 2020-07-23 |
20200234027 | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR MANIPULATING USER INTERFACES BASED ON UNLOCK INPUTS - An electronic device with a display and a fingerprint sensor displays a fingerprint enrollment interface and detects, on the fingerprint sensor, a plurality of finger gestures performed with a finger. The device collects fingerprint information from the plurality of finger gestures performed with the finger. After collecting the fingerprint information, the device determines whether the collected fingerprint information is sufficient to enroll a fingerprint of the finger. When the collected fingerprint information for the finger is sufficient to enroll the fingerprint of the finger, the device enrolls the fingerprint of the finger with the device. When the collected fingerprint information for the finger is not sufficient to enroll the fingerprint of the finger, the device displays a message in the fingerprint enrollment interface prompting a user to perform one or more additional finger gestures on the fingerprint sensor with the finger. | 2020-07-23 |
20200234028 | OPTICAL FINGERPRINT RECOGNITION CHIP PACKAGE AND PACKAGING METHOD - An optical fingerprint recognition chip package and a packaging method are provided. In the optical fingerprint recognition chip package, a cover plate is arranged on a front surface of an optical fingerprint recognition chip, the cover plate includes a substrate and a light shielding layer. The light shielding layer is arranged on a surface of the substrate facing away from the optical fingerprint recognition chip. The substrate is provided with multiple first through holes for exposing photosensitive pixels of the optical fingerprint recognition chip. The light shielding layer is provided with multiple second through holes in one-to-one correspondence with the first through holes. During fingerprint recognition, light reflected by a finger is split through the first through holes and the second through holes, such that crosstalk among different photosensitive pixels is reduced, and the accuracy of fingerprint recognition is improved. | 2020-07-23 |
20200234029 | SCREEN PROTECTOR SYSTEM FOR USE WITH A DISPLAY SCREEN - A kit for protecting a display screen of an electronic device having an in-screen fingerprint sensor is provided. The kit includes a screen protector at least partially formed from a transparent material and an interface coupler configured to be positioned between the screen protector and the display screen proximate the in-screen fingerprint sensor. The interface coupler includes a transparent carrier layer, a first adhesive layer, and a second adhesive layer. The first adhesive layer is positioned on a first surface of the transparent carrier layer and configured to be affixed to the display screen of the electronic device, the first adhesive layer comprising a silicone adhesive or a gel or a gel-like material. The second adhesive layer is positioned on a second surface of the transparent carrier layer and configured to be affixed to the screen protector. | 2020-07-23 |
20200234030 | User Authentication Using mm-Wave Sensor for Automotive Radar Systems - In an embodiment, a method for authenticating a user of a car includes: transmitting a plurality of radiation pulses through a predetermined portion of a surface of the car towards a portion of a hand of the user using a millimeter-wave radar; receiving a reflected signal from the portion of the hand using the millimeter-wave radar; generating a fingerprint signature based on the reflected signal; comparing the fingerprint signature to a database of authorized fingerprint signatures; and authorizing the user based on whether the fingerprint signature matches an authorized fingerprint signature of the database of authorized fingerprint signatures. | 2020-07-23 |
20200234031 | LATENT FINGERPRINT DETECTION - In a method for operating a fingerprint sensor, a fingerprint capture operation is performed on a fingerprint of a finger contacting the fingerprint sensor. A finger lift action is detected. It is determined whether a latent fingerprint remains on a contact surface of the fingerprint sensor subsequent the finger lift action. If it is determined that a latent fingerprint remains on the contact surface of the fingerprint sensor subsequent the finger lift action, instruction on addressing the latent fingerprint is provided. | 2020-07-23 |
20200234032 | CULTURE INFORMATION PROCESSING DEVICE - A culture information processing device includes: a feature value computing unit that computes growth feature values indicating features of growth characteristics of cells from data acquired in a particular first subculturing process selected from among a plurality of subculturing processes included in a culture period of the cells; a condition setting unit that sets culturing conditions of a second subculturing process one process after the first subculturing process; and an information computing unit that computes, on the basis of the growth feature values computed by the feature value computing unit and the culturing conditions set by the condition setting unit, characteristics-related information related to growth characteristics in the second subculturing process. | 2020-07-23 |
20200234033 | PROCESSING UNCERTAIN CONTENT IN A COMPUTER GRAPHICS SYSTEM - An example method includes: obtaining, from computer memory, information from a three-dimensional (3D) graphical model that represents an object; identifying, based on the information, a first part of the object having an attribute; performing a recognition process on the object based on features of the object, where the recognition process attaches more importance to a second part of the object than to the first part, with the second part either not having the attribute or having less of the attribute than the first part; and providing data for rendering content on a graphical user interface based, at least in part, on recognition of the object performed by the recognition process. | 2020-07-23 |
20200234034 | SYSTEMS AND METHODS FOR FACE REENACTMENT - Provided are systems and a method for photorealistic real-time face reenactment. An example method includes receiving a target video including a target face and a source video including a source face. The method includes determining, based on the target face, a target facial expression. The method includes determining, based on the source face, a source facial expression. The method includes synthesizing, using the parametric face model, an output face. The output face including the target face wherein the target facial expression is modified to imitate the source facial expression. The method includes generating, based on a deep neural network, mouth and eyes regions, and combining the output face, the mouth, and eyes regions to generate a frame of an output video. | 2020-07-23 |
20200234035 | DISPLAYING A SUBJECT COMPOSITION - For displaying a subject composition, a method determines a subject number, a subject age category, and a subject size for one or more subjects of an image. The method further calculates a subject distribution that indicates a position for a face of each subject. In addition, the method determines a subject pose for each subject that indicates a body position for the subject. The method further displays the subject composition comprising the subject distribution and the subject poses overlaying a display image. | 2020-07-23 |
20200234036 | Multi-Camera Multi-Face Video Splicing Acquisition Device and Method Thereof - The present invention discloses a multi-camera multi-face video splicing acquisition device, comprising a plurality of cameras for successively capturing video or images with faces, at least one splicing server for face tracking, face recognition, face cutting, face sorting and face splicing of face videos or images captured by cameras; and at least one time synchronizer for calibrating the time of at least one camera and splicing server; the above devices are interconnected through a network to achieve data interaction with each other. By serially splicing the face images of the same person acquired by multiple cameras, a face sequence of a longer period of time can be formed, and the face sequences sorted by time series could be used to further extract feature information for various time series analysis, and the longer the length of time of the face sequence, the more valid information can be extracted after time-series analysis. | 2020-07-23 |
20200234037 | SIMILAR IMAGE SEARCH SYSTEM - A similar image search system is provided and searches for images similar to a search key image, where a number of searched images of person are classified into a number of groups based on a similarity between the respective images. A grouping display is performed in which at least one of the images that belongs to each group is displayed in a display region that is provided for each group. The grouping display is performed in such a manner that the order of the similarity between each group and the search key image can be visually recognized. | 2020-07-23 |
20200234038 | TECHNIQUES FOR DOCUMENT CREATION BASED ON IMAGE SECTIONS - In an embodiment, an image reception system is communicatively coupled to an image analysis system and is configured to receive a digital image and analyze the pixels of the digital image to determine one or more regions in the digital image. For each region in the one or more regions in the digital image, the image analysis system recognizes the content in the region. A document creation system communicatively coupled to the image analysis system is configured to create a digital document based on the recognized content for the one or more regions. In some embodiments, the image analysis system is further configured to analyze the digital image to detect one or more of the following: region markers, tables, headers. | 2020-07-23 |
20200234039 | SYSTEMS AND METHODS FOR COMPARING DOCUMENTS - The present invention relates to a system and a method for comparing information contained on at least two documents belonging to an entity. The present invention includes at least one device configured to receive information from at least one first document and at least one second document; then, compare at least one first document information and at least one second document information; and determine whether at least one second document contains at least one first document information. The present invention then outputs a result of whether the at least one second document contains at least one first document information. | 2020-07-23 |
20200234040 | REMOTE BIOMETRIC IDENTIFICATION AND LIGHTING - A biometric capture device is operative to adjust one or more environmental parameters to enhance a range (e.g., distance) at which a biometric may be captured from a subject. For example, a sample biometric capture device may be, include, or otherwise incorporate a retinal or iris scanner configured to capture an image of the retina or iris (e.g., a biometric) when the retina or iris is illuminated by infrared light. Generally, the amount of infrared light required to accurately image the retina or iris increases with the distance of the subject's retina or iris from the image capture device. The biometric capture device may capture a facial image using a first image sensor, identify a face in the facial image, capture an iris image using a second image sensor guided by the facial image, and identify a person using the iris image. | 2020-07-23 |
20200234041 | IRIS RECOGNITION SYSTEM, IRIS RECOGNITION METHOD, AND STORAGE MEDIUM - An example embodiment includes: a determination unit that, based on an image including an eye of a recognition subject, determines whether or not a colored contact lens is worn; and a matching unit that, when it is determined by the determination unit that the colored contact lens is worn, performs matching of the iris by using a feature amount extracted from a region excluding a predetermined range including an outer circumference of the iris out of a region of the iris included in the image. | 2020-07-23 |
20200234042 | LOCATING A CLIENT DEVICE USING GROUND TRUTH IMAGE RENDERING - Systems and methods are disclosed herein for determining a location of a device, for example, by receiving, from a client device, a rendering of an image captured by the client device. The systems and methods compare the received rendering to entries in a database of renderings, each respective entry including a respective rendering and a respective associated location, and determine, from the comparing whether the received rendering matches a respective rendering included in a respective entry in the database of renderings. The systems and methods, in response to determining that the received rendering matches the respective rendering included in the respective entry, determine the location associated with the matching rendering, and transmit the location to the client device. | 2020-07-23 |
20200234043 | UNMANNED AERIAL VEHICLE GROUND LEVEL INSPECTION SYSTEM - A computing system obtains a first infrared image of the structure captured by a first unmanned aerial vehicle (UAV) at an image capture location. The image capture location is independent of the structure such that any change in a position of the structure does not change the image capture location. Additionally, the computing system obtains a second infrared image of the structure captured by the first UAV or a second UAV at the image capture location. The computing system determines, based on an angle between the beam from the laser as shown in the first image and the beam from the laser as shown in the second image, a score for the second infrared image. The computing system determines, based on the score for the second infrared image, whether a position of the structure has changed during a time interval between capture of the first infrared image and capture of the second infrared image. | 2020-07-23 |
20200234044 | Image Signal Processing Method, Apparatus, And Device - The present disclosure relates to image signal processing methods, apparatus, and devices. One example image signal processing method includes obtaining an image signal, where the image signal is derived based on a sensor signal collected by an image sensor, recognizing, by using a neural network, a scene to which the image signal belongs, determining, by using attribute information of the image signal, whether the scene is accurate, and in response to determining that the scene is accurate, performing enhancement processing on the image signal based on the scene to generate an enhanced image signal. | 2020-07-23 |
20200234045 | Visual Menu - An augmented reality (AR) overlay augments traditional menu items with corresponding photos, thereby facilitating a decision-making process of a user ordering from the menu. In addition to providing imagery of the menu items listed, other information may also be supplied, such as ratings, reviews etc. In this regard, users can visualize what to expect before ordering, and can order with a greater degree of confidence that they will enjoy the menu item they select. | 2020-07-23 |
20200234046 | INFORMATION PROVIDING SYSTEM, INFORMATION PROVIDING METHOD AND MANAGEMENT APPARATUS FOR INFORMATION PROVIDING SYSTEM - An information providing system includes: a memory unit configured to store an image data acquired by an imaging unit a robot in association with a position data and a time data acquired by an information acquisition portion; a data extraction portion configured to extract an image data corresponding to a time and a position instructed by the user from among the stored image data; and a display unit configured to display an image based on the extracted image data. The memory unit stores the image data acquired by the imaging unit of a first robot moving with a first user and the image data acquired by the imaging unit of a second robot moving with a second user. The data extraction portion extracts an image data corresponding to a time and a position instructed by the first user from among the image data acquired by the second robot stored in the memory unit when the image data corresponding to the time and the position instructed by the first user is not present among the image data acquired by the first robot stored in the memory unit. | 2020-07-23 |
20200234047 | SYSTEMS AND METHODS FOR IMAGE-FEATURE-BASED RECOGNITION - Methods and systems are described herein that allow a user to capture a single image snapshot from video, print, or the world around him or her, and obtain additional information relating to the media itself or items of interest displayed in the snapshot. A fingerprint of the snapshot is used as a query and transmitted to the server. Image Feature-Based Recognition, as described herein, uses a feature index to identify a smaller set of candidate matches from a larger database of images based on the fingerprint. Novel methods and systems using a distance metric and a radical hash table design exploit probabilistic effects and allow distinct image features to be preferred over redundant ones, allowing only the more distinctive data points to remain resident within the index, yielding a lean index that can be quickly used in the identification process. | 2020-07-23 |
20200234048 | RIDER-DRIVER LOCALIZATION FOR DETERMINING PLACEMENT OF AR CONTENT FOR PASSENGER - Systems and methods are disclosed herein for determining placement of Augmented Reality (AR) content. In some embodiments, a processor detects input at a first client device of a first user that a transportation session between the first user and a second user has begun. In response to detecting the input, the processor determines a first location of the first client device based on an image captured by the first client device, and determines a geospatial offset of a second client device of the second user from the first client device. The processor determines a second location of the second client device based on the first location of the first client device and the geospatial offset, and generates for display by the second client device AR content, the AR content being selected based on an orientation of the second client device and the second location. | 2020-07-23 |
20200234049 | MIXED REALITY SIMULATOR FOR PROFESSIONAL TRAINING - The present disclosure relates to computer-based training utilizing simulation, and more specifically to mixed and augmented reality simulation software for professional training purposes, including but not limited to mechanical training. | 2020-07-23 |
20200234050 | OPPORTUNITY TO VIEW AN OBJECT IN IMAGE PROCESSING - Image processing of an image is used to determine the opportunity to view an object. Rather than relying on simple numbers passing an object, the opportunity to view the object is weighted based on attention, which is derived from other objects competing for attention. For the processor to more accurately determine opportunity to view as compared to using geometric information alone, a machine-learned network is used. To deal with changes in obstructions, another machine-learned network may extract obstructions from camera images. Trace data is used to allow for daily variation in base counts of viewers, allowing greater temporal resolution and determination based on information more recently acquired than counts. | 2020-07-23 |
20200234051 | ROOM LAYOUT ESTIMATION METHODS AND TECHNIQUES - Systems and methods for estimating a layout of a room are disclosed. The room layout can comprise the location of a floor, one or more walls, and a ceiling. In one aspect, a neural network can analyze an image of a portion of a room to determine the room layout. The neural network can comprise a convolutional neural network having an encoder sub-network, a decoder sub-network, and a side sub-network. The neural network can determine a three-dimensional room layout using two-dimensional ordered keypoints associated with a room type. The room layout can be used in applications such as augmented or mixed reality, robotics, autonomous indoor navigation, etc. | 2020-07-23 |