31st week of 2019 patent applcation highlights part 55 |
Patent application number | Title | Published |
20190236258 | Dynamic User Interfaces For Authentication - Disclosed are systems and methods for dynamic user interfaces for authentication. A user interface comprising a plurality of user interface elements can be generated. The plurality of user interface elements can be generated according to a random placement. The each plurality of user interface elements can comprise a random plurality of attribute values. | 2019-08-01 |
20190236259 | METHOD FOR 3D GRAPHICAL AUTHENTICATION ON ELECTRONIC DEVICES - The invention concerns a three-dimensional graphical authentication method for verifying the identity of a user through an electronic device having a graphical display, comprising the steps of:
| 2019-08-01 |
20190236260 | ELECTRONIC APPARATUS, CONTROL SYSTEM, CONTROL METHOD, AND STORAGE MEDIUM - According to one embodiment, an electronic apparatus carried by a user includes a transceiver and a hardware processor. The transceiver establishes a wired connection or a wireless connection between the electronic apparatus and a wearable device that is worn by the user. While a barcode encoded with information is displayed on a screen of an external electronic device, the hardware processor acquires an image depicting the barcode using a camera provided in the wearable device, determines the information encoded in the barcode from the image of the barcode, and executes processing based on the information determined from the barcode. | 2019-08-01 |
20190236261 | SWIPE UNLOCKING METHOD, SYSTEM, AND ELECTRONIC DEVICE USING THE METHOD - A swipe unlocking method depending on touch pressure as well as swiping direction includes detecting an unlocking request from a user and displaying a swipe unlocking interface on a display in response to the unlocking request; detecting touch points of continuous swipe operation operated on the swipe unlocking interface; determining whether a path of the touch points of continuous swipe operation is identical to a predetermined path and whether a touch pressure of the touch points of continuous swipe operation is identical to a predetermined rule; unlocking the electronic device when the path of the touch points of continuous swipe operation is identical to the predetermined path and the touch pressure of the touch points of continuous swipe operation is different from the predetermined rule; and otherwise remaining in a locking status. A swipe unlocking system and an electronic device are also provided. | 2019-08-01 |
20190236262 | PASSWORD AUTHENTICATING APPARATUS FOR EXECUTING USER AUTHENTICATION USING PASSWORD - Provided is a password authenticating apparatus that can provide a hint for selecting a password without displaying a part of the password. The input-receiving unit receives input of a password as an input password. A password-header-comparing unit compares a header portion of the input password up to a number of header comparison characters with authentication information, and determines whether or not the header portion of the input password up to the number of header comparison characters matches a portion from the start of a registered password up to the number of header comparison characters. A screen-generating unit, when it is determined there is no match, generates a header-error screen providing guidance that the input password already does not match in the header portion as a display screen. A display-control unit causes a display unit to display the display screen generated by the screen-generating unit. | 2019-08-01 |
20190236263 | METHOD AND APPARATUS FOR AUTHORIZED LOGIN - Techniques for processing user logins are described. One example method includes receiving a first user input to zoom out a first application, wherein the first application is displayed on a first area of a screen of a device; zooming out the first application to be displayed on a second area of the screen; and displaying an icon of a second application on a third area of the screen, wherein a user has logged into the second application on the device; receiving a second user input to drag the displayed icon of the second application from the third area to the second area; transmitting login authorization information of the second application to the first application; and submitting, by the first application, the login authorization information to a server of the second application through a server of the first application; and authorizing logging into the first application on the device. | 2019-08-01 |
20190236264 | METHODS AND SYSTEMS FOR AUTHENTICATING A HEADSET FOR A TRANSPORTATION VEHICLE - Methods and systems for a transportation vehicle are provided. For example, one method includes storing a key on a device of a transportation vehicle and a headset; generating a challenge by the device using the key when the headset is connected to the device; presenting the challenge to the headset by the device; creating a response to the challenge by the headset; presenting the response to the device; validating the response by the device; and enabling a data line for the headset by the device when the response is valid. | 2019-08-01 |
20190236265 | Preventing Unauthorized Access to Secure Information Systems Using Dynamic, Multi-Device Authentication - Systems for dynamically authenticating users are provided. A system may receive a request to access functionality. In response to the received request, an authentication grid may be dynamically generated. The authentication grid may include a plurality of fields, each identifiable by a field identifier, and including one or more characters that may be used to authenticate a user. The authentication grid may be transmitted to a computing device of a user. A character for authentication may be identified by the system. In some arrangements, the system may generate a request for user input including a character appearing in the authentication grid. The user may identify the field and input the character appearing in the field. The system may receive the requested character and may compare it to the identified character for authentication. If the received character and the identified character match, functionality may be enabled. If a match does not exist, functionality may be disabled. | 2019-08-01 |
20190236266 | SIGNAL PROCESSING DEVICE, SIGNAL PROCESSING METHOD AND COMPUTER READABLE MEDIUM - A signal modulation unit modulates an actuator control signal for controlling an actuator by using a modulation signal. A correlation calculation unit calculates, when a measurement signal indicating a physical state measured by a passive sensor is received from the passive sensor after a modulated actuator control signal being the actuator control signal having been modulated by the signal modulation unit is transmitted to the actuator, a correlation between the measurement signal received and a modulation signal used for modulation of the actuator control signal by the signal modulation unit. The signal determination unit determines whether or not the measurement signal is a legitimate signal by using a correlation value obtained by the correlation calculation unit. | 2019-08-01 |
20190236267 | DATA RECOVERY THROUGH REVERSAL OF HASH VALUES USING PROBABILISTIC DATA STRUCTURES - Systems and methods for recovering passwords from a hash value input are provided. A password space may be segmented into password sets, and a digest set may be generated for each password set. Probabilistic data structures representing the digest sets may be generated. One of the probabilistic data structures may be queried with the hash value input to determine whether the hash value input is likely included in the digest sets. In response to the hash value input being determined to be likely included in the digest set, the passwords constituting the password set corresponding to the digest set may be regenerated, and the hash values constituting the digest set may be regenerated. The generated hash values may be compared to the hash value input to determine a hash value from the digest set that matches the hash value input to recover the password associated with the matched hash value. | 2019-08-01 |
20190236268 | BEHAVIOR DETERMINING METHOD, BEHAVIOR DETERMINING APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A behavior determining method includes causing a program to operate on a virtual environment including a virtual memory, while the program is operating on the virtual environment, generating access information of the virtual memory for determining a behavior of the program, based on information of at least one of a first flag or a second flag, the first flag indicating whether or not the program has read from a location in a virtual address space, and the second flag indicating whether or not the program has written to the location in the virtual address space, and inferring whether the behavior of the program is normal or abnormal, based on the access information. | 2019-08-01 |
20190236269 | DETECTING THIRD PARTY SOFTWARE ELEMENTS - In some examples, a system for detecting a third party software element can include a processor to generate a software element signature for each software element detected in a plurality of applications in a repository. The processor can also detect third party software elements by identifying software elements that are included in a number of the plurality of applications that exceeds a threshold value. Additionally, the processor can generate a test signature corresponding to at least one software element in an application to be tested and compare the test signature to each of the software element signatures corresponding to the third party software elements. Furthermore, the processor can detect that the test signature matches at least one of the third party software elements with a security vulnerability and modify the application to be tested to prevent execution of the at least one software element corresponding to the test signature. | 2019-08-01 |
20190236270 | PROCESSING CONTROL APPARATUS, PROCESSING CONTROL METHOD, AND NON-TRANSITORY RECODING MEDIUM - Provided is a process control device, etc. capable of more reliably maintaining the soundness of an information processing system with regard to cybersecurity. A processing control device calculates a sum of a value indicating a risk included in processing information that includes one or more processing executed on an information processing apparatus during a certain period; and restricts processing to the information processing apparatus when the calculated sum value for the processing information satisfies a predetermined restriction condition. | 2019-08-01 |
20190236271 | BASEBOARD MANAGEMENT CONTROLLER TO PERFORM SECURITY ACTION BASED ON DIGITAL SIGNATURE COMPARISON IN RESPONSE TO TRIGGER - Examples disclosed herein relate to performing a security action based on a comparison of digital signatures. An intrusion detection mode is initiated by a baseboard management controller. A first digital signature of hardware devices is calculated during the activation of the intrusion detection mode. The first digital signature is stored. Upon detection of a trigger, a second digital signature is calculated for the current hardware devices. The digital signatures are compared. A security action is performed based on the comparison. | 2019-08-01 |
20190236272 | PROBABILISTIC ANTI-ENCRYPTING MALWARE PROTECTIONS FOR CLOUD-BASED FILE SYSTEMS - Disclosed are systems and associated methods for protecting systems against software intended to damage or disable computers and computer systems, commonly called “malware” especially encrypting malware. Both agent-based and agentless implementations allow the identification of malware and the protection of local and cloud-based data by observing changes to filesystem structure and the information content of files, with no need to scan memory or interfere with the processing of individual processes. The data permeability of the protected system can be dynamically changed, allowing user-directed changes to be committed to storage and backed up, while adverse or potentially adverse changes are quarantined. | 2019-08-01 |
20190236273 | METHODS AND APPARATUS FOR DETECTION OF MALICIOUS DOCUMENTS USING MACHINE LEARNING - An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the memory. The processor receives multiple potentially malicious files. A first potentially malicious file has a first file format, and a second potentially malicious file has a second file format different than the first file format. The processor extracts a first set of strings from the first potentially malicious file, and extracts a second set of strings from the second potentially malicious file. First and second feature vectors are defined based on lengths of each string from the associated set of strings. The processor provides the first feature vector as an input to a machine learning model to produce a maliciousness classification of the first potentially malicious file, and provides the second feature vector as an input to the machine learning model to produce a maliciousness classification of the second potentially malicious file. | 2019-08-01 |
20190236274 | DETECTION OF AND RECOVERY FROM RANSOMWARE IN BACKUP DATA - Systems, methods, and computer-readable media can present improved detection of ransomware in a computer system. Embodiments can provide receiving backup data from the computer system. Metadata may be extracted from the backup data. Change rates of the backup metadata against prior backup data may be computed. Ransomware may be then detected by determining that the change rate exceeds a threshold change rate. | 2019-08-01 |
20190236275 | JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTION - Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set. | 2019-08-01 |
20190236276 | Secured master-mediated transactions between slave devices using bus monitoring - A secured device includes an interface and a processor. The interface is configured to connect to a bus, to which a host and a second device are coupled. At least the second device operates over the bus in a slave mode, and the host operates on the bus as a bus master that initiates transactions on the bus, at least on behalf of the secured device. The processor is configured to request the host to initiate, for the secured device, a transaction that accesses the second device over the bus, to monitor one or more signals on the bus, at least within a period during which the host accesses the second device over the bus in performing the requested transaction, and to identify, based on the monitored signals, whether a security violation occurred in performing the requested transaction. | 2019-08-01 |
20190236277 | SYSTEM AND METHOD FOR AUTOMATIC RECOVERY OF FIRMWARE IMAGE - A system and method for automatic recovery of a firmware image is disclosed. The method can include creating a shadow firmware image in a storage device from a firmware image in non-volatile memory. It is determined whether an abnormal event affecting the firmware image has occurred. The shadow firmware image is recovered from the storage device. The shadow firmware image is copied to the non-volatile memory. | 2019-08-01 |
20190236278 | MODIFIABLE POLICY ACTION SECURE BOOT VIOLATION SYSTEM - A secure boot violation system includes a BIOS with an authenticated variables storage storing at least one authorization key and at least one signatures database. The BIOS receives a first policy action entry for association with a first signature in the at least one signatures database, determines that the first policy action entry is signed with the at least one authorization key and, in response, associates the first policy action entry with the first signature in the at least one signatures database. The BIOS then determines, during a boot process and subsequent to the associating the first policy action entry with the first signature, that a first secure boot violation has occurred based on the first signature in the at least one signatures database. In response to determining that the first secure boot violation has occurred, the BIOS performs a first policy action defined by the first policy action entry. | 2019-08-01 |
20190236279 | PERFORM SECURITY ACTION BASED ON INVENTORY COMPARISON - Examples disclosed herein relate to an approach to take a startup inventory of a computing including multiple startup components, where the startup inventory includes information about the at least one processing element, at least one memory device, a system board, and a bus device on a bus. The startup inventory is compared to a stored inventory taken when the computing device was put into a first mode to determine whether the startup inventory and the stored inventory match. A security action is performed in response to the comparison. | 2019-08-01 |
20190236280 | METHOD AND SYSTEM FOR SECURITY VERIFICATION IN A BOOTING PROCESS WITH A MULTI-CORE PROCESSOR - The disclosure is related to a method and a system for security verification in a booting process of a computer system. A multi-core processor of the computer system is utilized to perform a security verification operation initiated by a UEFI BIOS. The security verification operation is configured to test if the computer system is qualified as a secure system for a specific use. In one aspect, the multi-core processor architecture has the benefit of providing a more efficient way to allow each of the multiple cores to perform one verification task for one of the peripherals of the system. An embodiment shows that the multiple cores can be individually assigned to perform different tasks such as verifying security of various medium in parallel processes when the computer system is in the booting process. | 2019-08-01 |
20190236281 | Secure system boot monitor - A security device includes an interface and a processor. The interface is configured for connecting to a bus that serves a host device and a non-volatile memory (NVM) device. The processor is connected to the bus in addition to the host device and the NVM device. The processor is configured to detect on the bus a boot process, in which the host device retrieves boot code from the NVM device, and to ascertain a security of the boot process, based on an authentic copy of at least part of the boot code of the host device. | 2019-08-01 |
20190236282 | APPLICATION COMPONENT AUDITOR - In one embodiment, a process on a computer for dynamic application component auditing is disclosed, the process includes automatically identifying, by an agent, all application components in an application. The process includes determining, by the agent, manifest information for the identified application components. The process includes accessing, by the agent, an alias file to convert the determined manifest information to align with corresponding information in a vulnerability database. The process includes using a Web service to query the vulnerability database to search for a match with the converted manifest information. The process includes responsive to the query, creating an audit report of the application components. | 2019-08-01 |
20190236283 | DATA ANALYSIS IN STREAMING DATA - A method for data analysis in streaming data includes receiving a stream of data, the stream of data including ordered compressed files. The method may also include partitioning the stream of data into portions of the ordered compressed files. The method may also include concurrently filtering each of the portions of ordered compressed files with a filter. The method may further include forward matching portions of the ordered compressed files downstream of the received stream of data. | 2019-08-01 |
20190236284 | ENABLING AND VALIDATING DATA ENCRYPTION - Methods, systems, and devices for enabling and validating data encryption are described. A data storage system (e.g., including a database and validation server) may receive an encryption request indicating a data object or data field. Prior to performing encryption, the validation server may perform one or more validations to determine whether the system supports encrypting the indicated data. The validation server may identify any formula fields that directly or indirectly (e.g., via other formula fields) reference the data object or field, and may determine whether each of these formula fields is encryption compatible. In some cases, the validation process may involve synchronously executing a first set of validators, marking the data as pending encryption, and asynchronously executing a second set of validators. Based on the results of the validation process, the system may or may not encrypt the indicated data, and may transmit an indication of the validation results. | 2019-08-01 |
20190236285 | SYSTEM AND METHOD FOR A PHYSICAL DEVICE AUTHORIZING DIGITAL COPIES - Systems, methods, and computer-readable storage media for a physical device authorizing digital copies. When a request for the generation of a digital copy is received, the computer system first performs a physical verification of a physical key. If the key matches the authorized key(s) on record, a verification of a private or private key (used for asymmetrical cryptography), which is stored in memory in the physical key, is performed. If verification of the physical key and digital verification of the private/public key are confirmed, the duplication process is allowed to proceed, and a hash function output is added to the digital copy. | 2019-08-01 |
20190236286 | SYSTEMS AND METHODS FOR PRIVACY MANAGEMENT USING A DIGITAL LEDGER - A system for securely storing privacy information is provided. The system includes a plurality of nodes configured to maintain a distributed database containing consumer privacy information having a plurality of entries. Each entry of the plurality of entries in the distributed database is (i) encrypted with a unique encryption key associated with a consumer and the distributed database, and (ii) indexed based on a public encryption key associated with the consumer. A most recent entry associated with the consumer includes current personal information about the consumer. A first entry associated with the consumer includes an encrypted version of the unique encryption key. | 2019-08-01 |
20190236287 | SYSTEMS AND METHODS FOR ENTROPY BALANCED POPULATION MEASUREMENT - The present disclosure provides systems and methods for entropy balanced population measurement. Entropy balancing is a statistical technique for preprocessing data to achieve covariate balance. Weighting coefficients may be dynamically adjusted to satisfy balance conditions or constraints to adjust for inequalities in representation, thereby improving covariate moments. Using entropy balancing and linear regression analysis with panel content exposure and results data provides a mechanism to estimate the effects of multiple exposure vectors simultaneously, including instances where panelists are exposed to a vector multiple times. Data may be obfuscated or anonymized for preprocessing via a double-encrypted intersection-based extraction mechanism, allowing both measurement systems and panel providers to retain confidential information. | 2019-08-01 |
20190236288 | Tamper-proof storage using signatures based on threshold voltage distributions - An apparatus includes an interface and storage circuitry. The interface is configured to communicate with a memory including multiple memory cells that store data as respective analog values. The memory is addressable using physical addresses. The storage circuitry is configured to perform a first read operation from a physical address, and determine a first sequence of analog values retrieved by the first read operation, to further perform a second read operation from the physical address, and determine a second sequence of analog values retrieved by the second read operation, to evaluate a variation between the first sequence and the second sequence, and to determine that an unauthorized re-programming to the physical address has occurred between the first read operation and the second read operation, in response to the evaluated variation exceeding a predefined variation level. | 2019-08-01 |
20190236289 | SYSTEM AND METHOD TO REDUCE INAPPROPRIATE EMAIL AND ONLINE BEHAVIOR - A method is provided to reduce inappropriate online behavior. The method includes providing a network service, receiving a request from a user to use the network service, and requesting a usage report about an email account associated with the user. The usage report is based on analysis of usage data representative of usage of the email account, and the analysis is based on at least one of a date that the email account was established, tracked history of emails received by the email account, and a history of IP addresses used when accessing the email account for communicating with multiple other email accounts, and the usage data is unrelated to content included in email messages exchanged by the email account. Either a first level or a second level of the network service available to the user is selected, wherein selection of the first or second level is based on whether the usage report meets selectable criteria. | 2019-08-01 |
20190236290 | CAPTIVE PORTAL THAT MODIFIES CONTENT RETRIEVED FROM REQUESTED WEB PAGE FOR UNAUTHORIZED CLIENT DEVICES - The described captive portal techniques cause client devices to display requested webpage for authorized device and modified content for unauthorized devices. One designated web page may be different than a requested web page such as when a client is not authorized to access the requested webpage and the requested webpage is not one of the walled garden websites. When the requested webpage is within walled garden website, the original content of the requested webpage is modified to include at least some original content. The captive portal may modify the designated web page to ensure that relative links lacking base domains now have specified base domains pointing to an authorized web server. Client web browser security measures related to redirection messages are thereby bypassed and load on the captive portal is minimal. The client device may also be prevented from caching the modified content of the requested web page. | 2019-08-01 |
20190236291 | Network Outage Redundancy Module - A network outage and redundancy module which provides improved security, platform independence and continuity in information between financial hardware and enterprise applications. | 2019-08-01 |
20190236292 | RESTRICTING ACCESS AND EDIT PERMISSIONS OF METADATA - Techniques are disclosed relating to installing and operating applications in a server-based application workspace. A computer system, while operating the server-based application workspace, may store subscription information indicating a user that is a developer for a particular application package, and one or more users that are subscribers for the particular application package. The computer system may further store lock data for the particular application package that indicates user permissions to edit at least one application component for the particular application package. Based on the lock data, the computer system may permit the developer to edit the at least one application component of the particular application package, and deny requests from the one or more users to edit the at least one application component. | 2019-08-01 |
20190236293 | Managing Privilege Delegation on a Server Device - A server device for managing privilege delegation to control execution of commands thereon is described. Execution of a command, according to first privileges, by a remote management (RM) server on the server device is requested from a RM client on a client device. An agent plug-in, chained to a command execution plug-in of the RM server, intercepts the request and forwards related information to an agent service cooperating with an operating system of the server device. The agent service determines whether to execute the command according to second privileges, different from the first privileges and if permitted, delegates the second privileges to the command, and causes, via the agent plug-in chained to the command execution plug-in, the command to be executed according to the second privileges. | 2019-08-01 |
20190236294 | MONITORING USAGE OF AN APPLICATION TO IDENTIFY CHARACTERISTICS AND TRIGGER SECURITY CONTROL - A computing environment for monitoring usage of an application to identify characteristics and trigger security control includes an application system that performs a query configured to identify any application calls performed in a predetermined period of time within the computing environment; for each identified application call, builds a corresponding application characteristics entry in a database; for each identified application call, identifies a plurality of characteristics of the called application including at least one downstream resource; associates the identified plurality of characteristics with the application characteristics entry in the database, thereby creating an application mapping; identifies security controls associated with each of the applications in the application mapping; associates the identified security controls with the associated application characteristics entry in the application mapping; and automatically triggers assessment of an effectiveness of the security controls in response to identifying a future application call. | 2019-08-01 |
20190236295 | METHOD FOR DYNAMIC PSEUDOFS CREATION AND MANAGEMENT IN A NETWORK FILESYSTEM - One example method includes connecting to a fileserver of a data protection system, initiating, at a client, an operation that is associated with a master pseudofs of the fileserver, creating, at the client, a client-specific pseudofs based upon the master pseudofs, and the client-specific pseudofs includes only those nodes of the master pseudofs that the client is authorized to access, and performing the operation using the client-specific pseudofs. | 2019-08-01 |
20190236296 | SPARSE CREATION OF PER-CLIENT PSEUDOFS IN NETWORK FILESYSTEM WITH LOOKUP HINTING - One example method includes transmitting, from a client, a remote procedure call (RPC) to a fileserver of a data protection system, the RPC including information identifying an export, then receiving, at the client, node information concerning the export, and the node information concerns a master pseudofs of the fileserver. Finally, the example method includes creating, at the client, a sparse client-specific pseudofs that is based on the node information received from the fileserver, and the sparse client-specific pseudofs includes fewer than all the master pseudofs nodes that the client is authorized to access. | 2019-08-01 |
20190236297 | MULTI-FACTOR ADMINISTRATOR ACTION VERIFICATION SYSTEM - In various embodiments, a method of verifying a multi-factor administrator action may be performed. The method may include receiving, from a first user, an authentication request that indicates a requested access, where the first user has administrative privileges to perform the requested access. The method may further include identifying a second user that has administrative privileges to approve the requested access. A verification request may be to the second user. In response to receiving an approval message from the second user within a particular amount of time, an authentication response that indicates that the first user is authorized to perform the requested access may be sent to the first user. | 2019-08-01 |
20190236298 | PROOF-OF-APPROVAL DISTRIBUTED LEDGER - A method and system for determining whether a consensus has been achieved for adding a block to a distributed ledger. The system receives a candidate block to add to the distributed ledger and receives block approvals of approving participants for the candidate block. The system calculates a total block approval stake that the approving participants have in the distributed ledger. The system identifies a total stake that participants have in the distributed ledger. When the total block approval stake is at least a threshold fraction of the total skate, the system indicates that the consensus has been achieved for adding the candidate block to the distributed ledger. | 2019-08-01 |
20190236299 | METHOD FOR CONTROLLING SECURITY SYSTEM AND ELECTRONIC DEVICE THEREOF - A portable electronic device, a wearable device and methods for operating the same are provided. The portable electronic device includes a display; a communication interface configured to communicate with a wearable device using wireless short-range communication; a processor; and a memory storing instructions, which when executed by the processor, cause the portable electronic device to establish, via the communication interface, a connection between the portable electronic device and the wearable device, identify a security status of the connected wearable device, limit access to at least one predefined setting item among a plurality of setting items and control the display to display an indication of the identified security status if the identified security status corresponds to a lock status, wherein the at least one predefined setting item relates to a passcode, and allow access to the at least one predefined setting item if the identified security status corresponds to an unlock status. | 2019-08-01 |
20190236300 | SERVICE PROCESSING METHOD AND APPARATUS, DATA SHARING SYSTEM, AND STORAGE MEDIUM - A method, system and computer readable medium are provided. The method includes receiving a service processing request from a user client, the service processing request being generated according to a table structure provided by a data sharing system, and including service data and signature information of the service data. The service data and the signature information are extracted from the service processing request according to the table structure that is prestored. A service data recording request of the data sharing system is generated, the service data recording request including the service data and the signature information. The service data recording request is sent to one or more nodes in the data sharing system for obtaining and storing the service data and the signature information at the one or more nodes. | 2019-08-01 |
20190236301 | MITIGATION OF INJECTION SECURITY ATTACKS AGAINST NON-RELATIONAL DATABASES - For mitigation of injection security attacks against non-relational databases, a database driver layer is integrated with a security layer. A trigger associated with the security layer is set to implement a learning phase of the security layer. In response to enabling the trigger, queries and query parameters associated with the respective queries are received. For the queries, a previously-stored security pattern is identified based on the query and the associated query parameters. The trigger associated with the security layer is reset to implement an execution of the security patterns. In response to resetting the trigger, an additional query and additional query parameters associated with the additional query is received. A particular security pattern is identified that is associated with the additional query and the additional query parameters. At least one of the additional query parameters is determined to not match a corresponding query parameter of the particular security pattern. | 2019-08-01 |
20190236302 | AUGMENTED METADATA AND SIGNATURES FOR OBJECTS IN OBJECT STORES - In an example, a system may modify an object stored in an object store for storing objects to include augmented metadata. The system may encode a signature of the modified object such that the signature is identical to a signature of the object prior to being modified to include the augmented metadata. | 2019-08-01 |
20190236303 | TIMESTAMP ORDER-PRESERVING ENCRYPTION OF NETWORK TRAFFIC TRACES - According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions to cause the processor to access network traffic traces including a plurality of timestamps, the plurality of timestamps having an order with respect to each other. The instructions may also cause the processor to encrypt the plurality of timestamps to anonymize the plurality of timestamps while preserving the order of the plurality of timestamps with respect to each other and to store the encrypted plurality of timestamps in a data store. | 2019-08-01 |
20190236304 | METHOD, SYSTEM, AND DEVICE FOR MANAGING DATABASE PERMISSIONS, AND COMPUTER-READABLE STORAGE MEDIUM - Disclosed is a method for managing database permissions, the method including: obtaining a login account that successfully logs in to a first database, where the first database is a relational database built in with permission management and is pre-configured with an external table that has a mapping relationship with a second database; ascertaining management permissions of the login account based on pre-configured management permission information; determining whether a management operation on the external table by the login account exceeds the management permissions of the login account; and if the management operation by the login account does not exceed its management permissions, permitting the management operation, and synchronizing the management operation to the second database based on the mapping relationship between the external table and the second database. Further disclosed are a system and a device for managing database permissions, as well as a computer-readable storage medium. | 2019-08-01 |
20190236305 | DETECTING UNAUTHORIZED USE OF SENSITIVE INFORMATION IN CONTENT COMMUNICATED OVER A NETWORK - Techniques facilitating automatically detecting unauthorized use of sensitive information in content communicated over a network are provided. A computer-implemented method can comprise receiving, by a system operatively coupled to a processor, from a first entity, data associated with the first entity and one or more rules defining use of the data by a second entity. The data and the one or more rules can be defined by the first entity. The computer-implemented method can also comprise analyzing, by the system, content communicated over a network by the second entity to determine whether the content violates the one or more rules. The computer-implemented method can further comprise generating, by the system, information indicative of one or more violations of the one or more rules based on a determination that the content violates the one or more rules. | 2019-08-01 |
20190236306 | REMOTE TESTING ANALYSIS FOR SOFTWARE OPTIMIZATION BASED ON CLIENT-SIDE LOCAL DIFFERENTIAL PRIVACY-BASED DATA - Methods, systems, apparatuses, and computer-readable storage medium are described herein for remotely analyzing testing results based on LDP-based data obtained from client devices in order to determine an effect of a software application with respect to its features and/or the population in which the application is tested. The analysis is based on a series of statistical computations for conducting hypothesis tests to compare population means, while ensuring LDP for each user. For example, an LDP scheme is used on the client-side that privatizes a measured value corresponding to a usage of a resource of the client. A data collector receives the privatized data from two sets of populations. Each population's clients have a software application that may differ in terms of features or user group. The privatized data received from each population is analyzed to determine an effect of the difference between the software applications of the different populations. | 2019-08-01 |
20190236307 | METHOD FOR MANAGING PERSONAL DATA IN A DISTRIBUTED SYSTEM - A method for managing personal data stored in a distributed system, in which the personal data are transmitted from a terminal device to at least one network node; and in which there is furnished to the user, by the distributed system, a user interface by way of which the personal data are to be managed in respective network nodes of the distributed system which manage the personal data; and in which management instructions furnished via the user interface, for managing the personal data within the distributed system, are transmitted via a predefined interface that is configured at least on the respective network nodes of the distributed system which manage the personal data. | 2019-08-01 |
20190236308 | LIMITING EXPOSURE TO COMPLIANCE AND RISK IN A CLOUD ENVIRONMENT - Minimizing data security risks may be provided. A number and type of confidential data in a computing environment may be determined to generate a metric for the type of confidential data in the computing environment. The metric of the type of confidential data may be compared to a predetermined metric for the type. Responsive to determining the metric for the type of confidential data exceeding a predetermined metric for the type, an action may be performed to prevent more entries of the type of confidential data in the computing environment. | 2019-08-01 |
20190236309 | DATA DE-IDENTIFICATION WITH MINIMAL DATA CHANGE OPERATIONS TO MAINTAIN PRIVACY AND DATA UTILITY - Methods, systems, and computer program products are provided for producing de-identified data from a dataset. A first set of constraints are determined based on anonymity requirements from a privacy model. A second set of constraints are determined based on knowledge hiding requirements. A model is generated to determine minimum loss of analytic utility in the dataset for de-identification while satisfying the first set of constraints and the second set of constraints. The model is applied to the dataset to determine changes to the dataset for de-identification that satisfy the first set of constraints and the second set of constraints. De-identified data is produced by modifying the dataset in accordance with the determined changes. | 2019-08-01 |
20190236310 | SELF-CONTAINED SYSTEM FOR DE-IDENTIFYING UNSTRUCTURED DATA IN HEALTHCARE RECORDS - A method and apparatus for identifying personally identifiable information (PII) and protected health information (PHI) within unstructured data, removing the PII and PHI from the unstructured data, and replacing the removed information with case-type tags that allows the user to understand what information was removed and to tune the level of information removal in future data sets. | 2019-08-01 |
20190236311 | Systems And Methods For Multiple Photo Feed Stories - Techniques to allow for ease of navigation within a photo browsing interface of a social networking system. In one embodiment, a designation of a first image for sharing is received from within at least one of a single-image view and a camera view. Based on the designation, the first image is added to a communication. The designation may be based on a user selection of an option provided by an interface of a mobile device. The first image may be received from within a social networking application or from within a dedicated camera application. In another embodiment, the privacy level of the communication and the designated images is based on the privacy setting of a user. The communication and the designated images may contain tag data identifying one or more people on a social networking system. In an alternative embodiment, the privacy level of the communication and designated images is adjusted according to the one or more people identified in the tag data. | 2019-08-01 |
20190236312 | APPARATUS AND METHOD FOR TRACKING ACCESS PERMISSIONS OVER MULTIPLE EXECUTION ENVIRONMENTS - A computing apparatus includes a processor coupled to a memory. The memory stores a set of permission chains, and each permission chain indicates a prior process accessed a current process and the current process requested access to a next process. The processor receives a permission request including a request for an access permission to allow a first current process to access a first next process and an indication that the first current process was accessed from a first prior process. The processor searches the set of permission chains for a matching permission chain, and when the matching permission chain is not found, the processor receives an input granting or denying the requested permission, and when granted updates the set of permission chains to include the granted permission chain and returns a granted indication. | 2019-08-01 |
20190236313 | AUTHENTICATED BACKPLANE ACCESS - Industrial controller modules are configured with security components that implement backplane-level security protocols, thereby preventing installation of unauthorized modular devices on the backplane of an industrial controller. When a modular device is installed in the controller's chassis and interface with the backplane, security components in the processor module or other supervisory module initiates exchange of authentication data with the modular device via the backplane. The authentication data can comprise one or more security challenges to which the modular device must respond correctly before the modular device is permitted to operate on the backplane. These backplane-level security protocols can prevent installation of rogue modules that may be used to collect proprietary control data or interfere with control processes. | 2019-08-01 |
20190236314 | SECURE PROCESSOR AND A PROGRAM FOR A SECURE PROCESSOR - The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform an encryption processing for the input and output data between the core and the outside. | 2019-08-01 |
20190236315 | Apparatus and Method for Masking Power Consumption of a Processor - An apparatus for masking power consumption associated with one or more operations of a logic circuitry of a processor. The apparatus comprises power-complementing circuitry configured to provide a second power consumption to directly power-complementing the power consumption associated with the one or more operations of the logic circuitry. The second power consumption complements the power consumption associated with the one or more operations of the logic circuitry. The apparatus further comprises header circuitry configured to enable a common node to vary in voltage corresponding to the one or more operations of the logic circuitry. The power-complementing circuitry and the header circuitry are each coupled to the logic circuitry at the common node. | 2019-08-01 |
20190236316 | OBJECT SIGNATURES IN OBJECT STORES - In an example, a system may include an object store for storing objects, wherein each object is identified by an object signature generated according to a first cryptographic function, wherein the objects stored in the object store exhibit a hierarchical relationship from a root object. The system may receive a second cryptographic function for the object store, receive an I/O request affecting an object in the object store, encode the affected object according to the second cryptographic function, and persist the affected object alongside other objects in the object store encoded according to the first cryptographic function. | 2019-08-01 |
20190236317 | Storage Compute Appliance with User Authentication and Memory Allocation Capabilities - Method and apparatus for managing data in a data storage device configured as a storage compute appliance. In some embodiments, the data storage device has a controller circuit and a non-volatile memory (NVM) with an overall data storage capacity. A processor authenticates each of a plurality of authorized users of the NVM via data exchanges between a host device and the processor without reference to an external authentication authority device. Upon authentication, each authorized user is allocated a separate portion of the overall data storage capacity of the NVM using an allocation model. The size of at least one of the separate portions is subsequently adjusted based on an access history of the NVM. The storage device may be a key-value storage device so that a separate set of key values is provided to each authorized user to identify data blocks stored to and retrieved from the NVM. | 2019-08-01 |
20190236318 | Storage Compute Appliance with Internal Data Encryption - Method and apparatus for managing data in a data storage device configured as a storage compute appliance. In some embodiments, the data storage device has a non-volatile memory (NVM) and a controller circuit. The NVM stores a plurality of data sets encrypted by at least one encryption key. The controller circuit performs a storage compute appliance process by locally decrypting the plurality of data sets in a local memory of the data storage device, generating summary results data from the decrypted data sets, and transferring the summary results data across the host interface to an authorized user without a corresponding transfer of any portion of the decrypted data sets across the host interface. | 2019-08-01 |
20190236319 | Computer Recovery or Return - A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the processor automatically causes to appear during or after boot-up of the processor on the display, that displays information concerning an owner who owns the computer, concerning user information about who the user is who the computer is assigned to for use, and return information for returning the computer to the owner from data stored in the memory. A method for displaying information to assist with returning a computer to its owner. | 2019-08-01 |
20190236320 | DEVICE ARCHITECTURE - A device for contactless communication with a terminal, the device comprising: an antenna for receiving a wireless signal emitted by the terminal; an embedded chip configured to generate data for communication to the terminal to perform a first function associated with the device; and a module separate from the chip configured to perform processes as part of a second function associated with the device, the module being connected to the antenna and comprising a power-harvesting unit configured to harvest power from the received wireless signal to power at least the module. | 2019-08-01 |
20190236321 | VOLTAGE REGULATION - A biometric module implemented on a single integrated circuit chip is configured to perform processing as part of a function associated with a device that performs contactless communication with a terminal. The module comprises a power-harvesting unit to induce a voltage from a wireless signal received at an antenna of the device; one or more components configured to process functions in the digital domain; one or more components configured to process functions in the analogue domain; and first and second voltage regulators each having inputs for receiving an input voltage induced by the power-harvesting unit. The first voltage regulator outputs a first voltage to the components processing functions in the analogue domain and the second voltage regulator outputs a second voltage lower than the first voltage to the components processing functions in the digital domain. | 2019-08-01 |
20190236322 | SMART TRAIN - According to one embodiment, a method, computer system, and computer program product for tracking occupancy on a transit system is provided. The present invention may include receiving passenger information for passengers boarding a public transit system comprising one or more cars; counting the passengers within each of the cars of the public transit system based on the location of each of the passengers; identifying, based on the location of each of the passengers, whether each of the passengers is seated or standing; and displaying, based on the counting and identifying of the passengers, the current occupancy of each of the cars. | 2019-08-01 |
20190236323 | SYSTEMS AND METHODS FOR IMPROVED TAG POSITION TRACKING - Systems and methods for determining a tag's position in a given area. The methods comprise: performing, by a tag reader, a standard inventory process to obtain a unique identification code for a first tag in a randomly selected timeslot; assigning, by the tag reader, a local short address to the first tag that is shorter than the unique identification code; wirelessly communicating the local short address from the tag reader to the first tag; performing, by the tag reader, an enhanced inventory process to receive a ping command response signal including the local short address from the first tag in an assigned timeslot; and determining a first position of the first tag in the given area based on the phase of the ping command response signal. | 2019-08-01 |
20190236324 | MECHANICAL HAND LABELER LOADING INSTRUCTIONS - A process of providing user information for a mechanical hand labeler to instruct the user on proper use of the device and how to reorder consumables is disclosed. The mechanical hand labeler would comprise a Quick Response (QR) code that is embedded with Uniform Resource Locators (URLs) for different functions. The embedded URLs in the QR code are read via a smart phone. The smart phone reads the QR code and launches the appropriate website. Specifically, the QR code is placed on an outside of the mechanical hand labeler for providing instructions on loading supplies into the mechanical hand labeler; and the QR code is placed on an inside of the mechanical hand labeler for providing instructions on reordering supplies. | 2019-08-01 |
20190236325 | DISPLAY APPARATUS AND FINGERPRINT IDENTIFICATION METHOD - A display apparatus and a fingerprint identification method are provided. An exemplary display apparatus includes a display region including a fingerprint identification region; a plurality of fingerprint identification pixels disposed in the fingerprint identification region and configured to provide a fingerprint identification light; a fingerprint identification array including fingerprint sensing units disposed in the fingerprint identification region and configured to receive the fingerprint identification light after being reflected by a touching body; and a controller electrically connected to the fingerprint sensing units and configured to obtain a whole image of a to-be-identified fingerprint, determine position coordinates of characteristic points on the display apparatus according to the whole image, control a first number of the fingerprint identification pixels to emit light according to the position coordinates to obtain local images at characteristic points of the to-be-identified fingerprint, and identify the to-be-identified fingerprint according to the local images. | 2019-08-01 |
20190236326 | FINGERPRINT SENSOR AND MANUFACTURING METHOD THEREOF - A fingerprint sensor includes a die, a plurality of conductive structures, an encapsulant, a plurality of conductive patterns, a first dielectric layer, a second dielectric layer, and a redistribution structure. The die has an active surface and a rear surface opposite to the active surface. The conductive structures surround the die. The encapsulant encapsulates the die and the conductive structures. The conductive patterns are over the die and are electrically connected to the die and the conductive structures. Top surfaces of the conductive patterns are flat. The first dielectric layer is over the die and the encapsulant. A top surface of the first dielectric layer is coplanar with top surfaces of the conductive patterns. The second dielectric layer covers the first dielectric layer and the conductive patterns. The redistribution structure is over the rear surface of the die. | 2019-08-01 |
20190236327 | OPTICAL FINGERPRINT IDENTIFICATION DEVICE AND DISPLAY PANEL - Disclosed are an optical fingerprint identification device and a display panel including the same. The optical fingerprint identification device includes a light emitting structure and a photosensitive sensor. The light emitting structure includes a transparent first electrode, an opaque second electrode, an electroluminescent layer between the first electrode and the second electrode, and a through hole penetrating the first electrode, the electroluminescent layer and the second electrode. The photosensitive sensor is disposed on a side of the second electrode facing away from the electroluminescent layer, and is configured to receive light rays transmitted through the through hole and acquire fingerprint information according to the received light rays. | 2019-08-01 |
20190236328 | FINGERPRINT IDENTIFICATION MODULE PACKING METHOD - A fingerprint identification module packing method is provided. Firstly, plural fingerprint identification modules are attached on a supporting plate. Then, plural covering plates are attached on fingerprint sensing chips of the fingerprint identification modules. Then, the fingerprint identification modules are transferred to vacuum adsorption holes of a vacuum adsorption fixture. Then, the fingerprint sensing chips, the corresponding covering plates and corresponding metal terminals are welded by a laser welding process. Afterwards, the vacuum adsorption fixture is disabled. Consequently, the plural fingerprint identification modules are transferred to the packing plate. | 2019-08-01 |
20190236329 | Image Acquisition Apparatus, Terminal Device, Liquid Crystal Terminal Device and Image Acquisition Method - An image acquisition apparatus, a terminal device, a liquid crystal terminal device and an image acquisition method are provided according to the disclosure. The image acquisition apparatus includes an imaging plate and an image sensor disposed to be spaced apart from one side of the imaging plate. The imaging plate is provided with an imaging pinhole corresponding to the image sensor. The liquid crystal terminal device includes an LCD panel and a backlight element. The image acquisition apparatus is disposed at a position corresponding to the LCD panel within the backlight element. The image acquisition method includes acquiring an image of an object to being scanned by the image sensor through the imaging pinhole at a side of the imaging panel. An ultrathin fingerprint scanner can be formed based on pinhole imaging principle in the disclosure, and can be further combined with an LCD screen to accomplish fingerprint acquisition function. Alternatively, an ultrathin image acquisition device can be formed to acquire an image of a general object. This can significantly reduce the size and thickness of an image acquisition module in the device and greatly facilitate the implementation of mobile devices and embedded devices with an image acquisition function. | 2019-08-01 |
20190236330 | SKIN INFORMATION PROCESSING METHOD, SKIN INFORMATION PROCESSING DEVICE, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - A skin information processing method for a skin information processing device that includes a storage portion includes include acquiring an image, and determining a base point that represents a sweat pore on a ridge of skin, from the acquired image and acquiring position information corresponding to a position of the base point on the image. The skin information processing method includes acquiring sample information indicating changes in color information around the determined base point, generating, as frequency information, information associating frequency components of the acquired sample information with the position information. The skin information processing method includes causing the storage portion to store information including the generated frequency information and the position information of the base point, as information used in skin authentication. | 2019-08-01 |
20190236331 | METHOD, APPARATUS, AND STORAGE MEDIUM FOR DATA VERIFICATION - A data verification method is provided. Fingerprint information of N (N being an integer greater than 1) slices of to-be-sent data of a second device is received, the fingerprint information including first fingerprint information corresponding to an i | 2019-08-01 |
20190236332 | METHOD AND APPARATUS FOR CLASSIFYING A SEED AS INBRED OR HYBRID - A apparatus for classifying a seed as inbred or hybrid comprises a terahertz signal source for emitting a terahertz signal towards the seed, a detector for detecting at least part of the terahertz signal having interacted with the seed, a scanner for moving the support relative to the terahertz signal to provide a scan of the seed, a data processing device for forming an image data from the detected terahertz signal as obtained for a plurality of positions during the scan of the seed, and a decision support system for providing a classification from the image data. In an embodiment, the terahertz signal source is arranged for emitting a continuous or pulse wave signal, and wherein the detector is arranged for detecting an amplitude and a phase of the terahertz signal having interacted with the seed. A signal representing an outcome of the classification may control a separator to separate seeds according to their classification. | 2019-08-01 |
20190236333 | REDUCED FALSE POSITIVE IDENTIFICATION FOR SPECTROSCOPIC CLASSIFICATION - A device may receive information identifying results of a set of spectroscopic measurements of a training set of known samples and a validation set of known samples. The device may generate a classification model based on the information identifying the results of the set of spectroscopic measurements, wherein the classification model includes at least one class relating to a material of interest for a spectroscopic determination, and wherein the classification model includes a no-match class relating to at least one of at least one material that is not of interest or a baseline spectroscopic measurement. The device may receive information identifying a particular result of a particular spectroscopic measurement of an unknown sample. The device may determine whether the unknown sample is included in the no-match class using the classification model. The device may provide output indicating whether the unknown sample is included in the no-match class. | 2019-08-01 |
20190236334 | APPLICATION EXECUTION BASED ON OBJECT RECOGNITION - Disclosed are various embodiments for initiating execution of an application based at least in part on an identification of the object in an image, video, or other graphical representation of the object. A graphical representation of an object is obtained using an image capture device. The object in the graphical representation is identified along with a list of applications associated with the identified object. A user interface is then rendered that allows the user to execute or install one or more of the applications associated with the identified object. | 2019-08-01 |
20190236335 | COMPUTER SYSTEMS AND COMPUTER-IMPLEMENTED METHODS SPECIALIZED IN TRACKING FACES ACROSS VISUAL REPRESENTATIONS - Embodiments directed towards systems and methods for tracking a human face present within a video stream are described herein. In some embodiments, the exemplary illustrative methods and the exemplary illustrative systems of the present invention are specifically configured to process image data to identify and align the presence of a face in a particular frame. | 2019-08-01 |
20190236336 | FACIAL RECOGNITION METHOD, FACIAL RECOGNITION SYSTEM, AND NON-TRANSITORY RECORDING MEDIUM - The embodiments of this application provide a facial recognition method and system, and a non-transitory recording medium. The method includes: obtaining a first feature vector of a first face in a first facial image and a first confidence vector having the same dimension as the first feature vector, wherein elements in the first confidence vector are used to indicate credibility of features represented by the corresponding elements in the first feature vector; obtaining a second feature vector of a second face in a second facial image and a second confidence vector having the same dimension as the second feature vector, wherein elements in the second confidence vector are used to indicate credibility of features represented by the corresponding elements in the second feature vector; and determining the first confidence vector, the second feature vector and the second confidence vector, whether the first and second face belong to the same person. | 2019-08-01 |
20190236337 | INFORMATION PROCESSING APPARATUS FOR ESTIMATING AGE AND METHOD THEREOF - An information processing apparatus includes an extraction unit that extracts a feature from an image including a face, a first estimation unit that estimates a likelihood of the face with respect to each generation based on the feature, a storage unit that stores a plurality of samples, the plurality of samples each including a generation-specific combination of likelihoods and a correct age as a pair, a selection unit that selects a sample from the storage unit based on a combination of likelihoods estimated by the first estimation unit, and a second estimation unit that estimates an estimated age of the face and an error range thereof based on the sample selected by the selection unit. | 2019-08-01 |
20190236338 | FACE RECOFNITION IN A RESIDENTIAL ENVIRONMENT - A face recognition system of a residential environment identifies an individual present in the residential environment. The residential environment include a plurality of home devices and is associated with a group of different persons. The face recognition system identifies which person in the group is the individual and generate an operating instruction for a home device based on identity of the individual. For example, the face recognition system captures an image set of the individual's head and face and applies the image set to a machine learning model that is trained to distinguish between the different persons based on images of their heads and faces. The face recognition system can retrieve a personal profile of the identified individual, which includes settings of the home device for the identified individual. The face recognition system generates the operating instruction based on the personal profile. | 2019-08-01 |
20190236339 | DETECTION APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A detection apparatus includes an acquisition unit and a detector. The acquisition unit acquires temperatures respectively corresponding to multiple parts of a subject identified from a visible image from a temperature image in which the temperatures of the parts of the subject are visualized. The detector detects a part not included in a temperature range preset for each of the parts, the part being included in the multiple parts of the subject whose temperatures are acquired by the acquisition unit. | 2019-08-01 |
20190236340 | VIDEO SENTIMENT ANALYSIS TOOL FOR VIDEO MESSAGING - Embodiments of the invention provide a method, system and computer program product for video sentiment analysis in video messaging. In an embodiment of the invention, a method for video sentiment analysis in video messaging includes receiving different video contributions to a thread in a social system executing in memory of a computer and sensing from a plurality of the video contributions a contributor sentiment. Thereafter, a sentiment value for the different video contributions is computed and a sentiment value for a selected one of the video contributions is displayed in a user interface to the thread for an end user contributing a new video contribution to the thread. | 2019-08-01 |
20190236341 | Validating Gesture Recognition Capabilities Of Automated Systems - The present invention extends to methods, systems, and computer program products for validating gesture recognition capabilities of automated systems. Aspects include a gesture recognition training system that is scalable, efficient, repeatable, and accounts for permutations of physical characteristics, clothing, types of gestures, environment, culture, weather, road conditions, etc. The gesture recognition training system includes sensors and algorithms used to generate training data sets that facilitate more accurate recognition of and reaction to human gestures. A training data set can be scaled from both monitoring and recording gestures performed by a humanoid robot and performed by animated humans in a simulation environment. From a scaled training data set, autonomous devices can be trained to recognize and react to a diverse set of human gestures in varying conditions with substantially improved capabilities. Recognition capabilities of an autonomous device can be validated and (re)trained until recognition capabilities are determined to be sufficient. | 2019-08-01 |
20190236342 | FACE CONCEALMENT DETECTION - A monitoring system is configured to monitor a property. The monitoring system includes a camera, a sensor, and a monitor control unit. The monitor control unit is configured to receive image data and sensor data. The monitor control unit is configured to determine that the image data includes a representation of a person. The monitor control unit is configured to determine an orientation of a representation of a head of the person. The monitor control unit is configured to determine that the representation of the head of the person likely includes a representation of a face of the person. The monitor control unit is configured to determine that the face of the person is likely concealed. The monitor control unit is configured to determine a malicious intent score that reflects a likelihood that the person has a malicious intent. The monitor control unit is configured to perform an action. | 2019-08-01 |
20190236343 | GESTURE DETECTION DEVICE - A gesture detection device that detects a gesture of an operator who changes a face direction while visually observing a target display object displayed in a display area, includes: a line-of-sight detection section that detects a line-of-sight direction of the operator according to a captured image of an imaging unit; a face direction detection section that detects a face direction of the operator according to the captured image; and a gesture determination section that compares a first time at which the operator starts changing the face direction with a second time at which the operator starts changing the line-of-sight direction, and determines whether the gesture is performed, according to a delay of the second time relative to the first time in addition to an expansion of a difference between the line-of-sight direction and the face direction. | 2019-08-01 |
20190236344 | METHODS OF DETERMINING HANDEDNESS FOR VIRTUAL CONTROLLERS - In at least one aspect, a method can include generating a respective set of training set of images for each label in a handedness model by: receiving the label at an image capturing device, obtaining a set of captured images by recording a pass-through image of a user placing a target object within an overlay of a bounding area animation, the target object corresponding with the label, and associating the label with each image in the set of captured images. The method includes training, using the training images, the handedness model to provide a correct label for an input image. | 2019-08-01 |
20190236345 | HAND DETECTION METHOD AND SYSTEM, IMAGE DETECTION METHOD AND SYSTEM, HAND SEGMENTATION METHOD, STORAGE MEDIUM, AND DEVICE - A hand detection method, a hand segmentation method, an image detection method and system, a storage medium, and a device are provided. The image detection method includes: determining a first starting point in a connected domain of an image to be detected; determining n farthest extremum points different from the first starting point, wherein an Nth farthest extremum point is a pixel point in the connected domain having a maximum geodesic distance to an Nth starting point, an (N+1)th starting point is the Nth farthest extremum point, and n and N are both positive integers; performing out region growing with the n farthest extremum points as initial points respectively, to acquire n regions in the connected domain; judging whether a relationship between a preset feature of each region and a preset feature of the connected domain satisfies a selection condition, to determine an available region satisfying the selection condition. | 2019-08-01 |
20190236346 | Evidence Management System and Method - A method, system, and computer program product for managing evidence. An evidence management system comprises a computer system that stores information about an incident in evidence records for a witness zones. The evidence records are associated with witness zones for storing evidence for the incident. The witness zones are areas from which the evidence is collected. The computer system collects the evidence for the incident from client devices in the witness zones based on the evidence records. The computer system analyzes the evidence collected for the incident in the evidence records based on the witness zones from which the evidence was collected, enabling the computer system to reduce an amount of time to collect the evidence for the incident. | 2019-08-01 |
20190236347 | SYSTEM AND METHOD FOR IDENTIFICATION OF MISSING DATA ELEMENTS IN ELECTRONIC DOCUMENTS - A system and method for identifying missing required data elements in an electronic document. The method includes analyzing the electronic document to identify at least one data element; determining, based on the identified at least one data element and at least one electronic document requirement, whether there is at least one required data element missing from the electronic document; generating a query based on the identified at least one data element upon determining that there is at least one required data element missing from the electronic document; querying a database using the generated query; and modifying, based on a response to the query, the electronic document to include the at least one missing required data element. | 2019-08-01 |
20190236348 | RAPID LANDMARK-BASED MEDIA RECOGNITION - Various embodiment herein each include at least one of systems, devices, methods, and software for rapid landmark-based media recognition. One such embodiment, in the form of a method includes receiving a document image comprising pixels and processing the pixels of the document image to identify landmarks present therein. The method then selects a document template classification group based on the landmarks identified within the document image and compares the document image to document templates of the selected document template classification group to classify a document type of the received image. Some embodiments of the method further include forwarding the document image and the document type classification to a document type validation process. | 2019-08-01 |
20190236349 | INVALIDATION RECOGNITION AND FRAUD PREVENTION - Various embodiments herein each include at least one of systems, devices, software, and methods for invalidation recognition and fraud prevention. One embodiment, in the form of a method, includes identifying a document-type of a received image as a check and identifying each of at least one area of the received image as a zone of the check. This method continues by processing each zone to locate text or symbols indicating the check is non-negotiable and subsequently outputting a non-negotiable rejection indication to prevent further payment processing of the check image. | 2019-08-01 |
20190236350 | DOCUMENT PROCESSING SYSTEM CAPTURE FLOW COMPILER - A system for document capture comprising a communication interface, a processor coupled to the communications interface, and a computer readable medium coupled to the processor. The computer readable medium stores a set of computer executable instructions that include instructions executable by the processor to receive an input capture flow comprising a first sequence of steps representing configurable code components of a document capture system. A step in the first sequence of steps holds configuration information for a corresponding configurable code component. The instructions further include instructions executable to compile the input capture flow into a capture process that defines a processing order for the configurable code components and setup attribute values for the configurable code components. Compiling the input capture flow into the capture process comprises optimizing the capture flow into a second sequence of steps and compiling the second sequence of steps into the capture process. | 2019-08-01 |
20190236351 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING PROGRAM - Provided are a controller configured to acquire a receipt image having been generated by reading of a receipt and a display section configured to display the receipt image, and the controller recognizes character rows included in the receipt image by performing character recognition processing, specifies an itemized-receipt region inside the receipt image on the basis of the character rows included in the receipt image, omits a region included in the receipt image and located above the upper end side of the itemized-receipt region, and allows a region including a portion or the whole of the itemized-receipt region to be displayed on the display section. | 2019-08-01 |
20190236352 | CLASSIFICATION OF PIPING AND INSTRUMENTAL DIAGRAM INFORMATION USING MACHINE-LEARNING - Systems and methods for identifying patterns of symbols in standardized system diagrams are disclosed. Disclosed implementations obtain or synthetically generate a symbol recognition training data set including multiple training images, generate a symbol recognition model based on the symbol recognition training data set, obtain an image comprising a pattern of symbols, group symbols into process loops based on the logical relationships captured by process loop identification algorithm, apply a character classification model to image contours to identify the characters and group characters into tags via hierarchical clustering, and store the identified tags, symbols and identified process loops in a relational database. | 2019-08-01 |
20190236353 | INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING SYSTEM - An information processing method including the following executed using a computer: obtaining a neural network model that solves a regression problem; obtaining input data and label data corresponding to the input data; compressing a network of the neural network model to obtain a compressed model; transforming the regression problem to be solved by the neural network model into a classification problem, based on information indicating performance of the compressed model, the information being calculated using the label data and output data which is obtained by inputting the input data to the compressed model; and changing a network configuration of the neural network model and transforming the label data, in accordance with the transformation from the regression problem to the classification problem. | 2019-08-01 |
20190236354 | INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING SYSTEM - An information processing method including the following executed using a computer: obtaining a neural network model that solves a regression problem; obtaining input data and label data corresponding to the input data; compressing a network of the neural network model to obtain a compressed model; and changing the label data and the number of nodes in the neural network model, based on information indicating performance of the compressed model, the number of nodes being assigned to the regression problem, the information being calculated using the label data and output data which is obtained by inputting the input data to the compressed model. | 2019-08-01 |
20190236355 | GAZE-TRACKING SYSTEM USING CURVED PHOTO-SENSITIVE CHIP - A gaze-tracking system for use in a head-mounted display apparatus, and a method of tracking a user's gaze, via such a gaze-tracking system. The gaze-tracking system includes illuminators for emitting light pulses to illuminate a user's eye; a camera for capturing an image of reflections of the light pulses from the user's eye, the camera including photo-sensitive elements arranged into a chip, wherein a first surface of the chip bulges inwards in a substantially-curved shape, such that a focal plane of photo-sensitive elements positioned proximally to edges of the chip is farther away than a focal plane of photo-sensitive elements positioned substantially at a center portion of the chip, the first surface facing the user's eye; and a processor being configured to control operations of the illuminators and the camera, and to process the captured image to detect a gaze direction of the user. | 2019-08-01 |
20190236356 | Apparatus and Method for Robust Eye/Gaze Tracking - At least one image registering unit records at least one series of images representing a subject. A control unit controls an operation sequence for the at least one image registering unit in such a manner that a subsequent data processing unit receives a repeating sequence of image frames there from, wherein each period contains at least one image frame of a first resolution and at least one image frame of a second resolution being different from the first resolution. Based on the registered image frames, the data processing unit produces eye/gaze tracking data with respect to the subject. | 2019-08-01 |
20190236357 | IMAGE PROCESSING METHOD AND SYSTEM FOR IRIS RECOGNITION - A method of iris recognition comprises detecting a body region larger than and comprising at least one iris in an image and performing a first eye modelling on the detected body region. If successful, the result of first iris segmentation based on the first eye model is chosen. Otherwise, a first iris identification is performed on the detected body region. If successful, the result of second iris segmentation based on a second eye modelling is chosen. Otherwise, second iris identification is performed on the image, third eye modelling is performed on the result of the second iris identification, and third iris segmentation is performed on the result of the third eye modelling. If successful, the result of third iris segmentation based on a third eye modelling is chosen. An iris code is extracted from any selected iris segment of the image. | 2019-08-01 |