40th week of 2016 patent applcation highlights part 58 |
Patent application number | Title | Published |
20160292423 | HARDWARE CONFIGURATION REPORTING SYSTEMS - Embodiments related to hardware configuration reporting and arbitration are disclosed herein. For example, an apparatus for hardware configuration reporting may include: a processing device having a trusted execution environment (TEE) and a non-trusted execution environment (non-TEE); request service logic, stored in the memory, to operate within the TEE to receive an indication of a request from arbiter logic, wherein the request represents a hardware configuration register; and reporting logic, stored in the memory, to operate within the TEE and to report an indicator of a value of the hardware configuration register represented by the request to the arbiter logic. Other embodiments may be disclosed and/or claimed. | 2016-10-06 |
20160292424 | Inoculator and Antibody for Computer Security - In an embodiment of the invention, a method includes: determining, in a computer, an area where an undesired computer program will reside; and providing a data object in the area, so that the data object is an antibody that provides security to the computer and immunity against the undesired program. Another embodiment of the invention also provides an apparatus (or system) that can be configured to perform at least some of the above functionalities. | 2016-10-06 |
20160292425 | SYSTEM AND METHOD FOR AUTOMATED REMEDYING OF SECURITY VULNERABILITIES - In a binary patching system for alleviating security vulnerabilities in a binary representation of a software application, a binary code portion determined to be associated with a security vulnerability is replaced with a replacement binary code that can avoid such vulnerability without substantially changing the functionality of the code portion that was replaced. The replacement binary code can be selected based on properties and/or context of the code portion to be replaced. | 2016-10-06 |
20160292426 | Method and Apparatus for Scrambling a High Speed Data Transmission - A method of transmitting high speed serial data with reduced levels of radiated emissions is disclosed. A transmitting device scrambles data utilizing a pseudo-random number sequence generator. Scrambling the data eliminates transmission of repeated data sequences. The transmitting device similarly scrambles idle pairs of data between data transmissions to eliminate an additional source of repeated data sequences. The scrambled and encoded data is transmitted to a receiving device. The receiving device also includes a pseudo-random number sequence generator. Synchronization of the two pseudo-random number sequence generators occurs by utilizing control characters of the data frame being transmitted. Each of the pseudo-random number sequence generators is configured to generate the same sequence of numbers and is initialized to start with a first number in the sequence of numbers corresponding to the first byte of data being transmitted or received. | 2016-10-06 |
20160292427 | Database Encryption to Provide Write Protection - An online computer system including a database uses an encrypted table that allows for write protection its contents. Middleware logic operating on the system acts as an interface for access to the database, so that any business logic on the system accesses the database through simple procedural calls to the middleware rather than directly to the database itself. The middleware logic abstracts logic that helps implement write protection with the encrypted table. Data to be encrypted that has been traditionally written to other tables is migrated to the encrypted table, where the data encrypted using an authenticated encryption with additional data (AEAD) algorithm. To implement AEAD, the original table, column, and primary key indicating where the data would have otherwise been stored are together used as additional authenticated data (AAD). This tuple of information is also stored in the encrypted table. | 2016-10-06 |
20160292428 | SYSTEM AND METHOD FOR PROVIDING AN ELECTRONIC DOCUMENT - Systems, methods, and computer-readable media are provided. Some embodiments include initiating a scan operation to generate an electronic document representing a scanned physical document, encrypting the electronic document, storing the encrypted electronic document, and outputting a message. The message may include location information for locating the encrypted electronic document, a key for decrypting the encrypted electronic document, and restriction information indicating a restriction associated with the encrypted electronic document. Some embodiments include receiving the message, using the location information to obtain the encrypted electronic document, decrypting the encrypted electronic document using the key to generate an unencrypted electronic document, presenting an image of the unencrypted electronic document on a display of a computing system, and restricting availability of at least one function or feature of the computing system in accordance with the restriction information. | 2016-10-06 |
20160292429 | SECURE CLOUD-BASED STORAGE OF DATA SHARED ACROSS FILE SYSTEM OBJECTS AND CLIENTS - Techniques to provide secure cloud-based storage of data shared across file system objects and clients are disclosed. In various embodiments, a primary encryption key is determined for an object associated with a plurality of component chunks of file system data. The primary encryption key is used to generate for each of said component chunks a corresponding chunk key, based at least in part on the primary encryption key and data comprising or otherwise associated with the chunk. The respective chunk keys are provided to a file system client configured to create and store the object at least in part by encrypting each chunk included in the plurality of component chunks using the chunk key provided for that chunk to generated encrypted chunk data, and combining the encrypted chunk data to create and store the object. | 2016-10-06 |
20160292430 | COMPUTING ON ENCRYPTED DATA USING DEFERRED EVALUATION - Methods, systems, apparatuses, and computer program products are provided for processing queries. A data server includes a query processor configured to receive a query from a database application, which was received by the database application from a requestor. The query is directed to data stored at the data server. The query processor includes a deferred evaluation determiner and deferred expression determiner. The deferred evaluation determiner is configured to analyze the query, and to designate the query for deferred evaluation by the database application if a predetermined factor is met, such as the query including an operation on encrypted data that is not supported at the data server. The deferred expression determiner is configured to determine expression evaluation information for evaluating at least a portion of the query at the database application. The query processor provides the encrypted data and the expression evaluation information to the database application for evaluation. | 2016-10-06 |
20160292431 | MANAGEMENT OF ENCRYPTION KEYS IN AN APPLICATION CONTAINER ENVIRONMENT - Systems, methods, and software to manage encryption keys in an application container environment are provided. In one example, a method of managing encryption keys comprises identifying a plurality of data objects to encrypt and encrypting the plurality of data objects via a plurality of encryption keys. The method further provides generating supplemental data for each data object, wherein the supplemental data for each data object comprises a key identifier that corresponds to an encryption key used to encrypt each data object. The method further includes associating the supplemental data for each data object with the encrypted version of each data object, and organizing the key identifiers from the plurality of data objects into a data structure with the plurality of encryption keys. | 2016-10-06 |
20160292432 | METHOD OF DISTRIBUTING APPLICATION WITH SECURITY FEATURES AND METHOD OF OPERATING THE APPLICATION - Provided is a method of distributing an application including transmitting, by a distribution server, a signal for requesting metadata to a user terminal where an application is installed; receiving, by the distribution server, a reply including first metadata from the user terminal; determining, by the distribution server, whether the first metadata is valid based on second metadata corresponding to the application; setting a connection with the user terminal to re-install the application on the user terminal if the distribution server determines that the first metadata is not valid; encrypting, by the distribution server, one or more installation files that install the application with a private key; and transmitting the one or more encrypted installation files via the set connection to the user terminal. | 2016-10-06 |
20160292433 | PERMISSION MANAGEMENT METHOD AND APPARATUS - A permission management method and apparatus are provided. In order to overcome inconvenient and error-prone in operations, the permission management method includes: setting a corresponding permission for at least one grouping container; moving an application into the grouping container according to an instruction of a user; and restricting a permission of the application in the grouping container to an intersection of the permission owned by the grouping container and the permission owned by the application. The permission management method and apparatus can improve convenience and usability of permission management. | 2016-10-06 |
20160292434 | METHOD AND APPARATUS FOR POLICY ADAPTION BASED ON APPLICATION POLICY COMPLIANCE ANALYSIS - An approach is provided for policy adaption based on application policy compliance analysis. The compliance platform processes and/or facilitates a processing of one or more policy compliance logs associated with at least one application to determine one or more policy compliance profiles associated with the at least one application. The compliance platform determines one or more contexts under which the at least one application operates. The compliance platform causes, at least in part, an association of the one or more policy compliance profiles with the one or more contexts. The compliance platform then processes and/or facilitates a processing of user contextual information, user application use information, or a combination thereof against the association, the one or more policy compliance profiles, the one or more contexts, or a combination thereof to determine one or more adaptions to one or more policies associated with the at least one application. | 2016-10-06 |
20160292435 | MANAGING ACCESS TO DEVICE CONTENT - A method for managing access to a device includes receiving restriction information and access to a user's calendar, scanning the calendars for entries corresponding to travel, determining if the user is prohibited from accessing content on a device, and accordingly denying the user access to the content on the device in response to determining that the user is not in compliance with the restriction information. The restriction information indicates requirements a user must comply with to access content with a device, as well as which content is regulated by said requirements. The requirements indicated by the restriction information include a timeframe around and including a calendar entry corresponding to travel during which the user is denied access to content. A computer program product and a computer system corresponding to the method are also disclosed. | 2016-10-06 |
20160292436 | METHOD AND SYSTEM FOR SECURE USE OF SERVICES BY UNTRUSTED STORAGE PROVIDERS - A method for encrypting data. The method comprises receiving, from a user, via a client terminal, digital content including at least one textual string for filling in at least one field in a document managed by a network node via a computer network, encrypting the at least one textual string, and sending the at least one encrypted textual string to the network node via the computer network so as to allow filling in the at least one field with the at least one encrypted textual string. The network node is configured for storing and retrieving the at least one textual encrypted string without decrypting. | 2016-10-06 |
20160292437 | TECHNIQUE FOR DATA LOSS PREVENTION FOR A CLOUD SYNC APPLICATION - Techniques describe preventing sensitive data from being misappropriated during an operation performed by a cloud synchronization application. A request from a cloud sync application to upload a file to a cloud storage service is intercepted. The file is currently stored on a client computer of an enterprise network. An account associated with the request is identified. The file is evaluated based on a data loss prevention policy and the account associated with the request. The request is blocked based on the evaluation. | 2016-10-06 |
20160292438 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus includes an update unit configured to update firmware of the information processing apparatus, a determination unit configured to determine whether use of a particular function that is provided by the information processing apparatus is restricted due to the firmware being updated by the update unit, and a display unit configured to provide a warning display if the determination unit determines that the use of the particular function is restricted. | 2016-10-06 |
20160292439 | DEVICES AND METHODS FOR ENCRYPTION AND DECRYPTION OF GRAPHICAL 3D OBJECTS - An asset, which is a graphical 3D object, is protected at a processor of an encryption device that obtains the asset and a proxy including polyhedrons, processes points of the asset to obtain transformed points lying within the polyhedrons of the proxy, and outputs a protected asset including the transformed points. A decryption device including a processor decrypts the protected asset by obtaining the transformed points of the protected asset, processing transformed points using a reverse of the transformation to obtain reconstructed points of the asset, and obtaining a reconstructed asset using the reconstructed points. | 2016-10-06 |
20160292440 | PREVENTING CONTENT DATA LEAK ON MOBILE DEVICES - Preventing enterprise or other protected content data from “leaking” from being under secure management on a device, for example by virtue of being viewed using an untrusted app on the device, is disclosed. An indication is received that a content to be provided to a first mobile application on a mobile device is to be protected against unauthorized access at the mobile device using unauthorized applications other than the first mobile application. The content is encrypted while in transit to the mobile device, using a key associated with a second mobile application authorized to be used to access the content at the mobile device. | 2016-10-06 |
20160292441 | REDACTING RESTRICTED CONTENT IN FILES - Restricted content of a data file is identified. The restricted content is removed from the data file, and a redacted version of the data file is generated. The restricted content is stored separate from the redacted version of the data file. | 2016-10-06 |
20160292442 | PROTECTING STORAGE FROM UNAUTHORIZED ACCESS - Protecting contents of storage in a computer system from unauthorized access. The computer system includes one or more processing units sharing the storage. Each of the processing units has at least one processor cache. Each processing unit respectively encrypts or decrypts, with a protected section key, data transferred between its processor cache and the storage, when data relates to the protected section used by the hypervisor; and each processing unit respectively encrypts or decrypts, with a virtual machine key, data transferred between its processor cache and the storage, when data relates to storage areas used by a virtual machine. | 2016-10-06 |
20160292443 | Nested Namespaces for Selective Content Sharing - Nested namespaces for selective content sharing are provided. In a content management system, content is stored for a plurality of users. The content includes a plurality of content items and a plurality of folders arranged in a plurality of hierarchies. A plurality of root namespaces is established. Each root namespace is rooted to a root folder of an account. A first namespace rooted to a first folder selected from the plurality of folders is established. First permissions are maintained for the first namespace, granting access to a first set of users. A request to share a second folder is received. The second folder is a child of the first folder in a particular hierarchy. A second namespace rooted to the second folder is established. Second permissions are maintained for the second namespace, granting access to a second set of users. | 2016-10-06 |
20160292444 | DATA ACCESSIBILITY CONTROL - A computer implemented method and apparatus for controlling the accessibility of data on a data storage | 2016-10-06 |
20160292445 | CONTEXT-BASED DATA CLASSIFICATION - A method of classifying a digital document may include: identifying, by an automated data processor, a request for access to the digital document for a first user; determining user identifying information for the first user; obtaining, by the automated data processor, according to the user identifying information a first user characteristic including organizational affiliation of the first user or a job function of the first user; generating, by the automated data processor, based on the first user characteristic, a digital document classification for the digital document; associating the digital document classification with the digital document, by embedding the document classification in the digital document or logging the document classification in a log identifying the digital document. A user access determination for the digital document may be made according to the associated digital document classification. | 2016-10-06 |
20160292446 | DATA ENCRYPTION AND COMPRESSION - Techniques are described herein for encrypting data using two encryption processes and compressing the data. In one aspect, a device or service may encrypt data according to a first encryption process using a first key. The device may compress the encrypted data and encrypt the compressed encrypted data according to a second encryption process using a second key. The device may store the double encrypted and compressed data in a data database, for example, separate from the two encryption keys. In one aspect, each encryption process may include an AES_256 or other encryption process, associated with different keys. The device may compress the encrypted data using ZLIB or other compression techniques. | 2016-10-06 |
20160292447 | MULTI-LAYERED ENCRYPTION - Techniques are described herein for encrypting data using a multi-layered encryption process. A service may encrypt data with first and second data keys and store the encrypted data. The system may encrypt the first data key with a first user key and the second data key with a second user key and store the data keys and the user keys in separate locations. The service may associate the user keys with a client device. In one aspect, the user keys may each include and be stored as a set of system keys and a set of ordered pairs of numeric values, with each ordered pair containing a start value and a read length value associated with one of the set of system keys. The service may assemble each user key by combining data from each of the system keys according to the associated ordered pair. | 2016-10-06 |
20160292448 | APPROACH FOR MANAGING ACCESS TO DATA ON CLIENT DEVICES - A system is configured to manage access to electronic documents on mobile wireless devices. An exit system detects when a particular user attempts to remove a particular mobile wireless device from a building. The exit system sends a request to a manager system, via a network, to determine whether the user is authorized to remove one or more electronic documents or information that are on the particular mobile wireless device from the building. In response to determining that the particular user is not authorized, the system renders the one or more electronic documents or information inaccessible on the particular mobile wireless device. | 2016-10-06 |
20160292449 | DOCKING STATION FOR PORTABLE DEVICES PROVIDING AUTHORIZED POWER TRANSFER AND FACILITY ACCESS - A docking station for docking portable electronic devices is disclosed. The docking station is configured to mechanically accept and operatively interface with the portable electronic device for non-contact charging and data transfer. The docking station can provide security features for providing and/or restricting access to computational facilities such as printers, databases, installed programs, etc. Such security features can include installing applications on such portable devices that limit access. | 2016-10-06 |
20160292450 | SYSTEM AND METHOD FOR CONTROLLING ACCESS OF MACHINE CODE TO OPERATING SYSTEM RESOURCES - Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining and forming a correspondence between the native image and the parent assembly based at least upon a template; in response to detecting an update to the native image, generating an updated image of the native image; determining whether there is a correspondence between the updated image of the native image and the parent assembly based at least upon the template; and in response to detecting no correspondence between the updated image of the native image and the parent assembly, restricting an access of the updated image of the native image to the resources of the operating system of the device. | 2016-10-06 |
20160292451 | SECURE TEXT RETRIEVAL - Methods and systems described herein may perform a word-level encryption and a sentence-level encryption of one or more documents. The word-level encryption and the sentence-level encryption may be performed with an encryption key generated by a client device. A document indexer is stored in the one or more storage networks. The document indexer includes encrypted word frequencies and encrypted word position identifiers based on the encrypted words of the one or more encrypted documents. The client device receives search terms and encrypts the search terms with the encryption key. The one or more encrypted documents are identified in the one or more storage networks based on searching with the encrypted search terms and at least one of the encrypted word frequencies and/or the encrypted word position identifiers. | 2016-10-06 |
20160292452 | METHOD AND SYSTEM FOR EMBEDDING INFORMATION IN COMUPTER DATA - Provided is a system for embedding traits in data wherein the data is stored within one or more data storage system(s), comprising: a code generator, the code generator generating a code describing the traits of the data; a rules engine, the rules engine classifying the traits into codes; an encoder coupled to the code generator, wherein the encoder encodes the data with the code describing the traits of the data, to generate encoded data; and a storage unit coupled to the encoder, the storage unit storing the encoded data; wherein the data storage systems are selected from the group consisting of: Microsoft SQL servers, IBM DB2 servers, Oracle servers, and Sybase servers. | 2016-10-06 |
20160292453 | HEALTH CARE INFORMATION SYSTEM AND METHOD FOR SECURELY STORING AND CONTROLLING ACCESS TO HEALTH CARE DATA - A health care information system and method are provided to securely store and control access to health care data. A key management and decryption system includes processing circuitry configured to receive encrypted health care data, representations of a health care context and a time value associated with the health care data, and authorization information associated with a requestor that has requested access to the health care data. The processing circuitry is also configured to determine whether the requestor is authorized to access the health care data based upon an analysis of the authorization information relative to the health care context and the time value associated with the health care data. In an instance in which the requestor is authorized to access the health care data, the processing circuitry is configured to decrypt the health care data and to provide the decrypted version of the health care data. | 2016-10-06 |
20160292454 | TECHNIQUE FOR DATA LOSS PREVENTION THROUGH CLIPBOARD OPERATIONS - Techniques describe preventing sensitive data from being misappropriated during a clipboard operation. A copy operation for data being copied to a clipboard is intercepted. Information describing a first application from which the data was copied is retrieved. The data and the information is stored into the clipboard. A paste operation is evaluated based on the data and the information is evaluated against a policy to determine whether the paste operation should be blocked. | 2016-10-06 |
20160292455 | Database Privacy Protection Devices, Methods, And Systems - A system for reducing the information content of a data stream according to privacy requirements that vary according to referents of the data while maximizing the utility of the data stream in the aggregate. In embodiments, a receiver of data characterizing multiple referents extracts information such as statistics. A filter may reduce the information content of the data to reduce the probability that the receiver could uniquely identify any single referent from the data, according to privacy requirements that vary by the referent. The filter allows this to be done in a way that allows the utility of the data to be maximized when the permitted probability of identification varies among the referents. | 2016-10-06 |
20160292456 | SYSTEMS AND METHODS FOR GENERATING LONGITUDINAL DATA PROFILES FROM MULTIPLE DATA SOURCES - A computer-implemented method for generating a longitudinal data profile from multiple disparate data sources is provided. The method includes storing, at a central data hub, first de-identified data received from a first data source, the first de-identified data including a plurality of data records having encrypted identifying data and an anonymous ID assigned to each record, wherein the anonymous ID is assigned based on a master list that includes a list of identifiers and corresponding anonymous IDs for each identifier. The method further includes storing second de-identified data received from a second data source, and storing third de-identified data received from a third data source. The method further includes processing the first, second, and third de-identified data to link the first, second, and third de-identified data using the anonymous ID, and generating the longitudinal data profile from the linked first, second, and third de-identified data. | 2016-10-06 |
20160292457 | Method for Insertion of Privacy Services into Web Pages that Collect Personal Information - An approach for modifying a web page, which uses a form or forms to collect private data from the user, to insert into the web page source code instructions to invoke multiplicity of web services for privacy purposes prior to the delivery of the page to the client browser and for delivery of privacy related information to the server's of the organization that is using the form to collect private data from the user. As one example, instructions are inserted into the web page source code to invoke a web service to show notice to the user that private data will be collected and seek consent from the user on the collection and use of private data. As another example, instructions are inserted into the web page source code to invoke a web service to authenticate the user. As another example, instructions are inserted into the web page source code to invoke a web service to ensure that communication with the client requesting the page is over a secure communication channel. As another example, instructions are inserted into the web page source code to invoke a web service to ensure that private data collected from the client user are de-identified. As another example, instructions are inserted into the web page sources code to invoke a web service that delivers the consent from the user on collection of private data to the servers of the organization that is using the web page to collect the private data. As another example, instructions are inserted into the web page source code to invoke multiplicity of web services that perform privacy functions and, furthermore, that a web service, that is invoked due to insertion of instructions by the method of invention, may perform a multiplicity of privacy functions—it may: ensure that communication with the client system is over a secure communication channel; and/or authenticate the client user; and/or show notice to the client user that private data will be collected; and/or obtain consent from the user for collection of private data; and/or de-identify particular private data elements. As one example of application of the proposed method, the page modified by the method of invention replaces the original web page and any subsequent requests by user browsers for downloads of the page, which collects private data form the user, results in downloading the page that was modified by the proposed method of invention. As another example of application of the proposed method, each time the web page, which collects private data form the user, is requested by a user browser for download of the page, the proposed method is applied on the web page and it is the modified page that is delivered to the user browser as a result of its request for the page. | 2016-10-06 |
20160292458 | SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA - Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain. The hierarchy culminates with a signed hash that can be used to verify the integrity of other hash values in the hierarchy, and these other hash values can, in turn, be used to efficiently verify the authenticity of arbitrary portions of the content file. | 2016-10-06 |
20160292459 | CONVERGED LOGICAL AND PHYSICAL SECURITY - A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential issuance and incident(s) management. An exemplary aspect of the invention also relates to physical and logical security management and information technology/network security management, with a credential issuance and integrity checking system as well as associated readers and printers of the credential. Still further aspects of the invention relate to obtaining, assembling and analyzing one or more of data, video information, image information, biometric information, sensor information, terrorist information, profile information, and/or other types of information to provide a comprehensive platform for all aspects of security management. A toolkit is also provided that allows complete management, integration, scalability, interoperability and centralized control of all aspects of security including personnel credentialing, personnel management, personnel tracking, task management, security system integration, security information exchange and scalability. | 2016-10-06 |
20160292460 | SYSTEMS, METHODS AND APPARATUS FOR SECURE PERIPHERAL COMMUNICATION - An interface device includes a communication interface and a secure element. The communication interface receives input data and a selection of one of a plurality of secure modes to secure the input data for transmission to a secure external computing device, such as a banking web server. The secure element secures the input data based on the secure mode that was selected. The secured input data is then transmitted to the secure external computing device. | 2016-10-06 |
20160292461 | Differential hierarchical-based password security mechanism for mobile device - Mobile device application access is managing by a hierarchical password protection mechanism. In this scheme, a set of passwords is configured in a hierarchy, wherein a password at a higher level in the hierarchy authorizes greater permissions than a password at a lower level in the hierarchy. Each password in the set of passwords is then associated with a respective application group of a set of application groups, each application group comprising applications having a common security requirement. Thus, a given password in the password hierarchy is associated with a particular application group. When the device detects entry of a given password at a given level in the hierarchy, access to the applications in the application group associated with the given password is then enabled automatically. In addition, access to the applications in each application group associated with passwords that are lower in the hierarchy also is enabled. | 2016-10-06 |
20160292462 | POLICY-DRIVEN DEVICE CONTROL IN OPERATING SYSTEMS - Techniques describe a policy-driven approach to controlling device access. A dummy driver is mapped to the device. The dummy driver receives a request by an operating system to access services provided by the device. The dummy driver determines, based on a policy, whether to block access to the device. If so, the dummy driver prevents services from being accessed via the operating system. | 2016-10-06 |
20160292463 | COMPUTING DEVICE SECURITY LOCK - A base member for a tablet computing device including a fastener to removably couple a tablet computing device to the base. A receptacle can receive a security lock to secure the base, wherein the security lock is to prevent the fastener from releasing the tablet computing device in a first mode and allows the releasing of the tablet computing device in a second mode. | 2016-10-06 |
20160292464 | SECURITY AND PROTECTION DEVICE AND METHODOLOGY - A mobile device includes a security device. The security device determines whether the mobile device is inside or outside security zones defined around a device being carried around by a user and an access point disposed at or near a place where the user regularly visit by detecting presence or absence of the wireless connection therewith. The device further determines whether or not there is an ongoing scheduled event and whether the mobile device is at or near an event location. The device further assesses a risk level of an environment where the mobile device is currently disposed based on determination results, and executes one of preset security action controls in response to the risk level determined to allow the mobile device to perform a security action to alert the user. | 2016-10-06 |
20160292465 | METHODS AND SYSTEMS FOR INSPECTION AND/OR IDENTIFICATION OF PELLET-SHAPED ARTICLES - A conveyer mechanism ( | 2016-10-06 |
20160292466 | WORKING METHOD FOR SMART CARD READER - A working method for a smart card reader, which comprises that: the card reader is powered on and initialized; a system mode is set according to a type of a device which connects to the card reader, and determines the system mode; if the system mode is an Apple mode, determine whether an Apple authenticating operation is required to be re-performed, if the Apple authenticating operation is required to be re-performed, perform the Apple authenticating operation, waiting for receiving Apple data sent by an Apple device, the card reader performs corresponding operation in accordance with a type of an instruction; if the system mode is a USB mode, determine whether a USB data transmission flag is set, enable a USB connection and perform a USB enumeration in a case that the USB data transmission is not set, and when the USB enumeration is finished, the USB data transmission flag is set; waiting for receiving a USB data sent by the upper computer in a case that the USB data transmission flag is set, the card reader performs corresponding operation according to the type of the instruction. The present disclosure realizes that the card reader can communicate with not only an upper computer but an iPhone 5 via a USB interface or a lighting interface respectively. | 2016-10-06 |
20160292467 | SYSTEM AND METHOD FOR PROVIDING USER-ACCESSIBLE CARD SLOT - Systems and methods for reducing problems and disadvantages associated with providing a user-accessible card slot are provided. A removable card carrier a configured to mechanically interface an information handling system may include a body and a cover. The body may be adapted to hold a card. The cover may be movably coupled to the body such that exterior surfaces of the cover and the information handling system are substantially flush with each other when card carrier is disposed in the information handling system. | 2016-10-06 |
20160292468 | ARRANGEMENT FOR AND METHOD OF ASSESSING A CAUSE OF POOR ELECTRO-OPTICAL READING PERFORMANCE BY DISPLAYING AN IMAGE OF A SYMBOL THAT WAS POORLY READ - A reader electro-optically reads symbols by image capture to obtain read data, and a controller processes symbol images of the symbols captured by the reader, and decodes the read data to obtain symbol data indicative of the associated products. The controller also collects time-to-decode metadata by determining the decode time periods that are taken for the symbol data to be successfully decoded, associates the decode time periods with the symbol images, stores the longest decode time period and its associated symbol image, and displays the stored symbol image associated with the stored longest decode time period to determine a cause of the reading performance of the reader. | 2016-10-06 |
20160292469 | TRANSACTION SCHEDULING SYSTEM FOR A WIRELESS DATA COMMUNICATIONS NETWORK - System and method for scheduling and coordinating transmission signals in a wireless data communications network, comprising a master node and at least one tag node. In some embodiments, the network may also include a slave node. The master node divides time into repeating time division blocks comprising a configuration window and at least one transaction window. During the configuration window, the master node provides operating parameters to the tag or slave nodes, including a time slot within the transaction window that is reserved for the tag or slave nodes to broadcast data to the master node. The transaction window is subdivided into multiple reserved time slots, and each slot is assigned to a specific tag or slave node. When a reserved time slot arrives, the tag or slave node will broadcast data signals to the master node. The master periodically adjusts the transmission schedule for each tag or slave node, as needed, to ensure that every tag or slave node continues to broadcast only during its reserved time slot, thereby reducing communication data collisions and optimizing the overall performance and throughput of the data communications network. | 2016-10-06 |
20160292470 | HYBRID TAG FOR RADIO FREQUENCY IDENTIFICATION SYSTEM - RFID (radio frequency identification) systems are provided in which tag and interrogator devices implement a hybrid framework for signaling including an optical transmitter/receiver system and an RF transmitter/receiver system. For instance, an RFID tag device includes: optical receiver circuitry configured to receive an optical signal having an embedded clock signal from an interrogator device, and convert the optical signal into an electrical signal comprising the embedded clock signal; clock extraction circuitry configured to extract the embedded clock signal from the electrical signal, and output the extracted clock signal as a clock signal for controlling clocking functions of the tag device; voltage regulator circuitry configured to generate a regulated supply voltage from the electrical signal, wherein the regulated supply voltage is utilized as a bias voltage for components of the tag device; and data transmitter circuitry configured to wirelessly transmit tag data to the interrogator device. | 2016-10-06 |
20160292471 | RFID COMMUNICATION SYSTEM AND METHOD FOR CONTROLLING SAME - The present disclosure provides a system and method for the continuous operation of an RFID communication system in a user-friendly manner and to ensure the reliability thereof in a cost-effective manner by
| 2016-10-06 |
20160292472 | SECURE SHORT-RANGE RADIO COMMUNICATION DEVICE, SYSTEM AND METHOD - A device for secure short-range point-to-point radiocommunication, comprising: first transceiver apparatus for transmission and/or reception of a first EM beam with a non-zero Orbital Angular Momentum OAM value (l | 2016-10-06 |
20160292473 | Method and System of Managing the Safety of a Plurality of Personal Protection Equipment Items - A system and method are provided for managing the safety of a plurality ( | 2016-10-06 |
20160292474 | CALIBRATION CODED SENSORS AND APPARATUS, SYSTEMS AND METHODS FOR READING SAME - In some aspects, a colored coded analyte sensor is provided. The analyte sensor has a body and a plurality of machine-readable colored codes associated with the body. The colored codes may contain red, green, and blue hues, which are discernable into coded information. The coded information may include the analyte sensor model, analyte sensor calibration constant, expiration or manufacture date of the analyte sensor, analyte sensor counterfeiting codes, warnings, messages to the user, etc. Colored code reading systems, apparatus and methods for reading such color-coded information associated with the analyte sensor are provided, as are numerous other aspects. | 2016-10-06 |
20160292475 | ARRANGEMENT FOR AND METHOD OF ASSESSING EFFICIENCY OF TRANSACTIONS INVOLVING PRODUCTS ASSOCIATED WITH ELECTRO-OPTICALLY READABLE TARGETS - A reader electro-optically reads symbols associated with products to obtain read data, and a controller decodes the read data to obtain symbol data indicative of the associated products. Reading performance is assessed by collecting time-to-decode metadata by determining each decode time period that is taken for each symbol data to be successfully decoded, by associating the collected time-to-decode metadata with the symbol data, by comparing the collected time-to-decode metadata with a predetermined long amount of decode time that is indicative of a slow reading performance, by storing each decode time period that at least equals said predetermined long amount of decode time, and by storing the symbol data associated with each stored decode time period. | 2016-10-06 |
20160292476 | TIME-VARYING BARCODE IN AN ACTIVE DISPLAY - Embodiments of the present invention provide barcode sequences in an active display for information exchange. Specifically, embodiments of the present invention provide a system and method for communicating information between electronic devices via a barcode image sequence. In a typical embodiment, a barcode image sequence is displayed on the display screen of a first electronic device. A second electronic device reads and decodes the barcode image sequence. The second electronic device displays an acknowledgement on the display screen of the second electronic device. The acknowledgement is read by the first electronic device. | 2016-10-06 |
20160292477 | AIMER FOR BARCODE SCANNING - When imaging with a smartphone, a user typically uses the smartphone's display as a viewfinder. The user aligns the smartphone's camera with a target by focusing on the display rather than the target. Traditionally, barcode scanners have used aimers rather than viewfinders for this alignment. An aimer projects a visible pattern onto a target. To scan a barcode, a user aligns and positions this visible pattern with the barcode. This approach to barcode targeting is highly desirable for regular barcode scanning. The present invention embraces an aimer for a smartphone that allows a user to target a barcode with a projected pattern, while using the smartphone's imaging-system and processing to scan the barcode. In some embodiments, the aimer is incorporated in a case for the smartphone. | 2016-10-06 |
20160292478 | INDICIA READING SYSTEM EMPLOYING DIGITAL GAIN CONTROL - A scanning code symbol reading system includes an analog scan data signal processor for producing digitized data signals, wherein during each laser beam scanning cycle, a light collection and photo-detection module generates an analog scan data signal corresponding to a laser scanned code symbol, an analog scan data signal processor/digitizer processes the analog scan data signal to generate digital data signals corresponding thereto, and a synchronized digital gain control module automatically processes the digitized data signals in response to start of scan (SOS) signals generated by a SOS detector. The synchronized digital gain control module generates digital control data which is transmitted to the analog scan data signal processor for use in controlling the gain of a signal processing stage in the light collection and photo-detection module and/or analog scan data signal processor, during the corresponding laser beam scanning cycle. | 2016-10-06 |
20160292479 | INDICIA-READER HAVING UNITARY-CONSTRUCTION - A hand-held indicia-reading device includes a housing and a cable having a unitary-construction. The indicia-reader has a head portion with an indicia-reading system including a printed circuit board. The entire handle portion of the reader is typically over-molded onto a host-connector cable. The host-connector cable includes a circuit board connector on one end and a connector for connecting to a host at an opposite end extending from a base portion of the handle. | 2016-10-06 |
20160292480 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - An information processing method includes a step of capturing a mark attached to a commodity; a step of decoding the mark captured in the capturing step; a step of transmitting a determination request which includes substance information of a substance registered by a user and identification information of the mark obtained in the step of decoding; a step of receiving a determination response to the determination request; and a step of displaying an image based on image information included in the determination response, the image indicating whether the commodity includes an ingredient which matches the substance information. | 2016-10-06 |
20160292481 | TWO-DIMENSIONAL CODE READING DEVICE - A two-dimensional code reading device which can prolong the lifetime of the auxiliary light is provided. A two-dimensional code reading device in the present invention includes an image reading unit to acquire an image of a two-dimensional code printed on a ticket medium, a specific pattern detector to detect a specific pattern to identify the two-dimensional code from the image of the two-dimensional code acquired by the image reading unit, a two-dimensional code decoder to read information recorded in the two-dimensional code detected by the specific pattern detector, an auxiliary light to irradiate light on the ticket medium and an auxiliary light controller to control turning on and off of the auxiliary light, wherein the auxiliary light controller turns on the auxiliary light when the specific pattern is detected by the specific pattern detector and the information recorded in the two-dimensional code cannot be read by the two-dimensional code decoder. | 2016-10-06 |
20160292482 | STACK BARCODE READER AND STACK BARCODE READING METHOD - A stack barcode reader may include an imager configured to image the stack barcode; an image memory configured to store an image datum of the stack barcode; and a data processor including a decoder configured to decode an encoded information expressed as the stack barcode, on the basis of the image datum. The decoder may be configured to measure width of a bar and a space of the stack barcode; measure a T-sequence, being a sequence of numerical values, according to line width of a bar and a space of the stack barcode; obtain a code-word corresponding to the T-sequence; and compare a cluster value obtained from the T-sequence with a theoretical cluster value, and modify the T-sequence by using the theoretical cluster value and the conversion table of T-sequence/code-word if there appears a difference between the two cluster values. | 2016-10-06 |
20160292483 | SYMBOL INFORMATION READER AND SYMBOL INFORMATION READING METHOD - A symbol information reader may include an imager; an image memory configured to save image data of a recording medium; and a position detecting processor configured to retrieve the image data and detect the positions of symbols on the recording medium. The position detecting processor may be configured to calculate the amount of change in luminance value of scanning lines in a predetermined area of the image data and discriminate a provisional area possibly corresponding to the symbol, acquire correlations of the provisional area with neighboring areas and create a map showing an area with high correlation values, search the correlation map for the presence of the symbols and label on areas judged having the symbols, set an area for each of the multiple symbols and makes divisions, and detect positions of the symbols printed on the recording medium. | 2016-10-06 |
20160292484 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND IMAGE PROCESSING SYSTEM - An image processing apparatus includes an acquisition unit that acquires setting information acquired from a captured image, a setting unit that performs, based on the acquired setting information, setting regarding image analysis processing to be performed on a captured image obtained by capturing an image of a predetermined monitoring target range. | 2016-10-06 |
20160292485 | COMPUTER CONFIGURED TO DISPLAY MULTIMEDIA CONTENT - A computer can comprise a housing, a microprocessor disposed within the housing, a display, and a communication interface communicatively coupled to the microprocessor. The computer can be configured, responsive to locating decodable indicia within content viewable on the display, to decode the decodable indicia to produce at least one decoded message. The computer can be further configured to display the content with decoded message data being embedded into the content. The decoded message data can be provided by at least one decoded message, data derived from the decoded message. | 2016-10-06 |
20160292486 | TWO DIMENSIONAL BARCODE WITH DYNAMIC ENVIRONMENTAL DATA SYSTEM, METHOD, AND APPARATUS - Methods, systems, and apparatus for combining preprinted information together with coded sensor information within a two-dimensional barcode. The sensor information may be of an environmental, physical or biological nature, and records a change in status of the environmental or biological condition to which the labeled product has been exposed. A sensor dye chemistry is employed and when a specified condition of the sensed property occurs it causes a change in the color state of sensor dye modules embedded within the sensor-augmented two-dimensional barcode, encoding sensor digital information. Sensor information is recovered utilizing the error-correction feature during barcode reading. | 2016-10-06 |
20160292487 | ARRAY SUBSTRATE, COLOR FILM SUBSTRATE AND TOUCH DISPLAY DEVICE - An array substrate, including: a display area and a non-display area, multiple gate lines, multiple data lines and a drive chip arranged in the non-display area, and a common electrode layer arranged in the display area, where the gate lines are insulated from and intersect with the data lines to define multiple pixel units arranged in an array, each of the multiple pixel units includes a pixel thin film transistor and a pixel electrode; the common electrode layer includes multiple insulated first touch units, each of the multiple first touch units corresponds to multiple the pixel units; and a first fingerprint identification unit is arranged on the array substrate for identifying a fingerprint | 2016-10-06 |
20160292488 | FINGERPRINT DETECTION DEVICE AND MOBILE TERMINAL - Disclosed are a fingerprint detection device and a mobile terminal. The fingerprint detection apparatus comprises a capacitive fingerprint sensor and a capacitive touch control chip which is electrically connected to the capacitive fingerprint sensor; wherein the capacitive fingerprint sensor is configured to collect fingerprint information and convert the fingerprint information to an analog signal; and the capacitive touch control chip is configured to convert the analog signal to a digital signal, and generate fingerprint image information according to the digital signal. As compared with the dedicated control chip in the related art, the capacitive touch control chip has mature design and manufacture technique, and thus the manufacture and application costs are lower. | 2016-10-06 |
20160292489 | FINGERPRINT SENSOR AND SENSING METHOD THEREOF - A fingerprint sensor is provided for sensing fingerprint information of a finger. The fingerprint sensor includes a sensing array, an insulating surface disposed on the sensing array, a readout module, and a processor. The sensing array includes a plurality of sensing units disposed in a plurality of row lines and a plurality of column lines, wherein each of the sensing units includes a sensing electrode. The transmitting electrode transmits a modulating signal. The readout module obtaining a sensing voltage corresponding to the modulating signal coupled to a finger of the user via the sensing electrode of the sensing unit when the user places the finger on the insulating surface and the modulating signal transmitted by the transmitting electrode is coupled to the finger of the user. The processor obtains the fingerprint information according to the sensing voltage. | 2016-10-06 |
20160292490 | FINGERPRINT LOCALIZATION - A method, device and system for generating an enrollment template are provided. The enrollment template is generated by collecting a placement image representing a portion of a biometric object such as a fingerprint. The placement image is localized on the fingerprint by comparing the data in the placement image to data in a floor map representing a larger image of the fingerprint obtained by swiping or rolling the fingerprint over a sensing area of a partial placement sensor. As additional placement images are obtained more information is provided for the enrollment template. The additional placement images are also localized to one another utilizing the floor map. The enrollment template is generated based on a grouping of each placement image to its neighboring placement images. | 2016-10-06 |
20160292491 | SYSTEMS AND METHODS FOR CAPTURING IMAGES USING A PRESSURE SENSITIVE MEMBRANE - A total internal reflection based imaging system may include a light transmitting member having an imaging surface. A pressure sensitive membrane may be arranged on the imaging surface. The pressure sensitive membrane may include a top surface, a bottom surface, and an elastic deformable film forming at least a portion of the top surface. The imaging system may include a textured surface disposed between the pressure sensitive membrane and the imaging surface. An application of pressure on the top surface may deform the deformable film to reduce a distance between the deformable film and the imaging surface. A light source may be configured to emit a light towards the imaging surface such that reduced total internal reflection of the light occurs where the bottom surface of the pressure sensitive membrane contacts the imaging surface. A sensor may be configured to capture the light reflected from the imaging surface. | 2016-10-06 |
20160292492 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR SIGNATURE DETECTION - Methods, systems, and computer program products for signature detection. One example of a method includes: acquiring an article defect density map comprising a plurality of sections corresponding to a first resolution level which is indicative of defect numbers for the sections, and determining a distribution representative of the defect numbers or function thereof; determining a threshold in accordance with said distribution, and identifying sections, out of said plurality of sections in the article defect density map, with defect numbers or function thereof above the threshold; and clustering at least part of adjoining identified sections, into one or more signatures, thus detecting said one or more signatures. | 2016-10-06 |
20160292493 | DETERMINING ACCESS PERMISSION - An access permission level for a first individual may be calculated by utilizing repositories of social network databases. The facial image of a first individual may be captured and compared with a repository of pre-categorized individuals. In response to the facial image of the first individual being absent from the repository of pre-categorized individuals, the repositories of social network databases may be crawled to collect facial images of non-categorized individuals. The first facial image may be compared with the facial images of non-categorized individuals, and a second individual may be identified. In response to identifying, categorization data associated with the second individual may be collected. Utilizing the categorization data, the second individual may be sorted into one of a plurality of categories. Based upon an image match score and the category which the second individual is sorted into, an access permission level may be determined and provided to a user. | 2016-10-06 |
20160292494 | FACE DETECTION AND RECOGNITION - The present invention provides, in at least one aspect, methods and systems that detect at least one face in at least one digital image, determine and store area co-ordinates of a location of the at least one detected face in the at least one digital image, apply at least one transformation to the at least one detected face to create at least one portrait of the at least one detected face, rotate the at least one portrait at least until the at least one portrait is shown in a vertical orientation and a pair of eyes of the at least one face shown in the at least one portrait are positioned on a horizontal plane; and store the rotated at least one portrait. | 2016-10-06 |
20160292495 | ASSISTED PHOTO-TAGGING WITH FACIAL RECOGNITION MODELS - Embodiments of the invention perform assisted tagging of images, including tagging of people, locations, and activities depicted in those images. A batch of images is received comprising images of faces, including at least some faces that have not yet been tagged. A facial recognition algorithm is applied to the faces to determine matching data comprising possible tags for each untagged face. A logic engine applies logic rules to reduce the likelihood that certain matches are correct. The most likely match from among the possible matches is selected for suggestion to the user for verification. Once verified, the metadata of the image indicating the recognized people within the image is updated. | 2016-10-06 |
20160292496 | Operation Event Identification Method and Device and Smart Terminal - The present disclosure provides an operation event identification method and device and a smart terminal. The method includes: obtaining position information of a start sampling point and an end sampling point of a movement of a target object in the space; obtaining correction position information of the end sampling point according to a projection point of the end sampling point on a connecting line of the start sampling point and a coordinate center; and identifying an operation event of the target object according to the position information of the start sampling point and the correction position information of the end sampling point. | 2016-10-06 |
20160292497 | FUSION OF INERTIAL AND DEPTH SENSORS FOR MOVEMENT MEASUREMENTS AND RECOGNITION - A movement recognition system includes an inertial sensor, a depth sensor, and a processor. The inertial sensor is coupled to an object and configured to measure a first unit of inertia of the object. The depth sensor is configured to measure a three dimensional shape of the object using projected light patterns and a camera. The processor is configured to receive a signal representative of the measured first unit of inertia from the inertial sensor and a signal representative of the measured shape from the depth sensor and to determine a type of movement of the object based on the measured first unit of inertia and the measured shape utilizing a classification model. | 2016-10-06 |
20160292498 | DEVICE, METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM FOR IDENTIFYING BODY PART IMAGED BY ENDOSCOPE - In an endoscope system, an insertion amount of an insertion unit is detected based on camera images captured by two cameras provided to a mouthpiece. Then, past images of a predetermined range corresponding to the detected insertion amount are acquired from a past image storage unit. A current image is compared with each of the acquired past images to calculate similarity between the current image and each of the past images. A body part captured in the past image having the highest similarity with the current image is determined to be the body part captured in the current image. | 2016-10-06 |
20160292499 | CHARACTER RECOGNITION APPARATUS, CHARACTER RECOGNITION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A character recognition apparatus includes a stroke extracting unit, a noise-candidate extracting unit, a generating unit, a unit, and a specifying unit. The stroke extracting unit extracts multiple strokes from a recognition target. The noise-candidate extracting unit extracts noise candidates from the strokes. The generating unit generates multiple recognition result candidates obtained by removing at least one of the noise candidates from the recognition target. The unit performs character recognition on the recognition result candidates and obtains recognition scores. The specifying unit uses the recognition scores to specify a most likely recognition result candidate from the recognition result candidates as a recognition result. | 2016-10-06 |
20160292500 | INK FILE OUTPUT METHOD, OUTPUT DEVICE, AND PROGRAM - An ink file output method is provided, which includes: generating M (M is an integer of 1 or more) pieces of stroke data SD on the basis of event data generated as M input devices move, respectively; generating N (N is an integer of 1 or more and M or less) kinds of logical names LN (metadata) identifying the M number of input devices; generating a metadata block associating the M pieces of stroke data SD with the N kinds of logical names LN; and writing the M pieces of stroke data SD and the metadata block to an ink file. | 2016-10-06 |
20160292501 | STORAGE MEDIUM, RECOGNITION METHOD, AND RECOGNITION APPARATUS - A non-transitory computer-readable storage medium stores a recognition program that causes a computer to execute a process. The process includes recognizing a plurality of characters from handwritten characters in input handwritten data; setting reference positions of a specific handwritten character and an adjacent handwritten character included in the handwritten characters based on recognition results of the recognized characters, the specific handwritten character and the adjacent handwritten character corresponding to a specific character and an adjacent character included in the recognized characters, respectively, the adjacent character being located adjacent to the specific character; determining whether a space is present between the specific character and the adjacent character based on the reference positions; and generating space information indicating a result of the determining. | 2016-10-06 |
20160292502 | IDENTIFYING UPDATED CONTENT IN IMAGES - Aspects of the present invention disclose a method, computer program product, and system for analyzing an image. The method includes one or more processors identifying a document that includes (i) at least one image and (ii) unstructured text that is situated proximate to the image, wherein both the image and the unstructured text are concurrently displayed in the document. The method further includes identifying one or more potential locations depicted in the image included in the identified document, based on an analysis of the unstructured text that is situated proximate to the image. The method further includes identifying a set of images of a first potential location from the identified one or more potential locations. The method further includes determining whether an image in the set of images of the first potential location substantially matches the image included in the identified document. | 2016-10-06 |
20160292503 | COMPUTER-READABLE STORAGE MEDIUM STORING IMAGE PROCESSING PROGRAM, IMAGE PROCESSING DEVICE, AND IMAGE PROCESSING METHOD - A first image data, binarized with a first threshold, represent a first image corresponding to a first portion of a specific image. A second image data, binarized with a second threshold different from the first threshold, represent a second image corresponding to a second portion of the specific image. A first area, which is extracted from the first image, includes pixels with a first color. The first color corresponding to a color of an outline of a hole image in the specific image. A second area, which is extracted from the second image, includes pixels with the first color. The first area and the second area are determined as a specific area corresponding to the hole image. | 2016-10-06 |
20160292504 | DATA PROCESSING SYSTEMS, DEVICES, AND METHODS FOR CONTENT ANALYSIS - Systems, devices and methods operative for identifying a reference within a figure and an identifier in a text associated with the figure, the reference referring to an element depicted in the figure, the reference corresponding to the identifier, the identifier identifying the element in the text, placing the identifier on the figure at a distance from the reference, the identifier visually associated with the reference upon the placing, the placing of the identifier on the figure is irrespective of the distance between the identifier and the reference. | 2016-10-06 |
20160292505 | FIELD VERIFICATION OF DOCUMENTS - A system, method and computer program product to validate documents is provided. A processor receives an image of a document. The processor identifies a plurality of fixed contents of the document. The processor identifies a plurality of field contents of the document. The processor determines a type of the document based, at least in part, on the plurality of fixed contents and the plurality of field contents. The processor validates the plurality of field contents of the document based, at least in part, on rules associated with the type of the document. The processor generates a validated document. | 2016-10-06 |
20160292506 | CAMERAS HAVING AN OPTICAL CHANNEL THAT INCLUDES SPATIALLY SEPARATED SENSORS FOR SENSING DIFFERENT PARTS OF THE OPTICAL SPECTRUM - The present disclosure describes cameras having an optical channel that includes spatially separated sensors for sensing different parts of the optical spectrum. For example, in one aspect, an apparatus includes an image sensor module having an optical channel and including a multitude of spatially separated sensors to receive optical signals in the optical channel. The multitude of spatially separated sensors includes a first sensor operable to sense optical signals in a first spectral range, and a second sensor spatially separated from the first sensor and operable to sense optical signals in a second spectral range different from the first spectral range. | 2016-10-06 |
20160292507 | Information Processing System and Method Using Image Recognition - There is provided a method and a system comprising a server adapted to be connected to a mobile application running on a mobile device for receiving an image captured by the mobile device and a user/mobile device location and/or contextual search information, the server being further adapted to be connected to an objects database comprising objects related images and objects related information, the server being further adapted to implement an object identification process and for retrieving landmark information related to the identified object of interest for enabling the users to conduct transactions with a mobile application running on the mobile device using the retrieved landmark information of the object. | 2016-10-06 |
20160292508 | EXTRACTION METHOD AND EXTRACTION DEVICE FOR CRIME SCENE FOOTPRINT THROUGH PHOTOGRAPHING - This application involves a crime scene footprint photography and extraction method and extraction device that can photograph a first image of the footprint in the oblique light from a fixed angle, and a second image of the footprint in the diffuse reflected light from a fixed angle; divide the first image's brightness component V | 2016-10-06 |
20160292509 | SENSOR AND MEDIA EVENT DETECTION AND TAGGING SYSTEM - Enables detection and tagging of events using sensor data combined with data from servers such as social media sites. Sensors may measure values such as motion, temperature, humidity, wind, pressure, elevation, light, sound, or heart rate. Sensor data and event tags may be utilized to curate text, images, video, sound and post the results to social networks, for example in a dedicated feed. Event tags generated by the system may represent for example activity types, players, performance levels, or scoring results. The system may analyze social media postings to confirm or augment event tags. Users may filter and analyze saved events based on the assigned tags. The system may create highlight and fail reels filtered by metrics and by tags. | 2016-10-06 |
20160292510 | DETECT SPORTS VIDEO HIGHLIGHTS FOR MOBILE COMPUTING DEVICES - A solution is provided for detecting in real time video highlights in a sports video at a mobile computing device. A highlight detection module of the mobile computing device extracts visual features from each video frame of the sports video using a trained feature model and detects a highlight in the video frame based on the extracted visual features of the video frame using a trained detection model. The feature model and detection model are trained with a convolutional neural network on a large corpus of videos to generate category level and pair-wise frame feature vectors. Based on the detection, the highlight detection module generates a highlight score for each video frame of the sports video and presents the highlight scores to users of the computing device. The feature model and detection model are dynamically updated based on the real time highlight detection data collected by the mobile computing device. | 2016-10-06 |
20160292511 | Scene and Activity Identification in Video Summary Generation - Video and corresponding metadata is accessed. Events of interest within the video are identified based on the corresponding metadata, and best scenes are identified based on the identified events of interest. A video summary can be generated including one or more of the identified best scenes. The video summary can be generated using a video summary template with slots corresponding to video clips selected from among sets of candidate video clips. Best scenes can also be identified by receiving an indication of an event of interest within video from a user during the capture of the video. Metadata patterns representing activities identified within video clips can be identified within other videos, which can subsequently be associated with the identified activities. | 2016-10-06 |
20160292512 | INFORMATION TRANSFER APPARATUS, LEARNING SYSTEM, INFORMATION TRANSFER METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A learning system ( | 2016-10-06 |
20160292513 | COMPUTER VISION COLLISION AVOIDANCE IN DRILLING OPERATIONS - A system and method for automatically preventing a collision between objects is described. One or more images of a working space may be collected, and a first object may be identified based on the one or more images. Three-dimensional coordinates of the first object may be determined, and a virtual boundary enclosing the identified first object in a three-dimensional coordinate system may be generated based on the three-dimensional coordinates of the first object, wherein the virtual boundary specifies a volume in the working space that a second object in the working space should not occupy. The coordinates in the three-dimensional coordinate system corresponding to the generated virtual boundary may be transmitted to a second processor, and the second processor may control the second object to perform an operation in the working space that includes the first object without contacting the virtual boundary of the first object. | 2016-10-06 |
20160292514 | MONITORING SYSTEM AND METHOD FOR QUEUE - The present invention relates to a system and a method of monitoring a queue that allow for exactly recognizing objects in a queue and exactly monitoring the situation of the queue by tracking the recognized objects, using depth detection device such as a TOF camera. According to the present invention, it is possible to map a space and an image using depth information provided through a depth detection device without mapping a 3D space to an image taken by a camera and exactly measure the actual heights of objects from the ground using depth information of the objects and the background and initial parameters of the depth detection device so that desired objects can be exactly detected and recognized in filtering. Accordingly, the system can be less complicated. Further, waiting time is assigned to recognized objects so that they can be easily tracked. | 2016-10-06 |
20160292515 | Sensor Fusion for Passenger Conveyance Control - A fusion based passenger tracking system includes one or more 2D/3D sensors for capturing 2D/3D data; one or more security sensors for capturing security data; and a processing module in communication with the one or more 2D/3D sensors to receive the 2D/3D data, and the one or more security sensors to receive the security data, the processing module uses the 2D/3D data and the security data to calculate passenger data to generate a passenger tracking list that tracks each individual passenger in the passenger data. | 2016-10-06 |
20160292516 | TWO-WHEEL VEHICLE RIDING PERSON NUMBER DETERMINATION METHOD, TWO-WHEEL VEHICLE RIDING PERSON NUMBER DETERMINATION SYSTEM, TWO-WHEEL VEHICLE RIDING PERSON NUMBER DETERMINATION APPARATUS, AND PROGRAM - The present invention is a two-wheel vehicle riding person number determination system including an imaging means configured to image a two-wheel vehicle that is installed in a predetermined position and travels on a road, and a two-wheel vehicle riding person number determining means configured to process an image of the imaging means, extract a contour shape of an upper position of the two-wheel vehicle that travels on the road, detect humped shapes corresponding to heads of persons who ride on the two-wheel vehicle from the contour shape of the upper position of the two-wheel vehicle, and determine, on the basis of the humped shapes, whether or not the number of the persons who ride on the two-wheel vehicle is at least two persons or more. | 2016-10-06 |
20160292517 | Method for Monitoring the Visual Behavior of a Person - The disclosed embodiments include a method for monitoring the visual behavior of a person. In one embodiment, the method includes a person activity data providing step during which person activity data indicative of an activity of the person are provided; a person visual behavior data providing step during which person visual behavior data indicative of the visual behavior of the person related to said activity of the person are provided; reference visual behavior providing step during which a reference visual behavior data indicative of the reference visual behavior of the person based on said activity of the person are provided; and a comparing step during which the person visual behavior data and the reference visual behavior data are compared so as to deduce whether the person visual behavior is adapted with respect to said activity of the person. | 2016-10-06 |
20160292518 | METHOD AND APPARATUS FOR MONITORING CHANGES IN ROAD SURFACE CONDITION - A method and system for detecting and classifying defects in a paved surface is disclosed. A sequence of images of the paved surface is obtained from at least one imaging device that can be mounted on a vehicle. The images are used to form a three-dimensional reconstruction. A machine learning process is used to train the system to recognize different kinds of defects and defect-free surfaces. Performing a pixel-by-pixel comparison of the images obtained for a particular paved surface with a database of images of surfaces with known defects provides a determination of the locations of defects in that paved surface. The system and method disclosed herein do not require the use of artificial lighting and are unaffected by transient changes in ambient light. | 2016-10-06 |
20160292519 | Verifying A Target Object With Reverse-Parallax Analysis - A vehicle configured to operate in an autonomous mode may engage in a reverse-parallax analysis that includes a vehicle system detecting an object, capturing via a camera located at a first location a first image of the detected object, retrieving location data specifying (i) a location of a target object, (ii) the first location, and (iii) a direction of the camera, and based on the location data and the position of the detected object in the first image, predicting where in a second image captured from a second location the detected object would appear if the detected object is the target object. | 2016-10-06 |
20160292520 | HELMET WEARING DETERMINATION METHOD, HELMET WEARING DETERMINATION SYSTEM, HELMET WEARING DETERMINATION APPARATUS, AND PROGRAM - The present invention is directed to a helmet wearing determination system including a imaging means that is installed in a predetermined position and images a two-wheel vehicle that travels on a road; and a helmet wearing determination means that processes an image imaged by the imaging means, estimates a rider head region corresponding to a head of a person who rides on the two-wheel vehicle that travels on the road, compares image characteristics of the rider head region with image characteristics according to the head at a time when a helmet is worn or/and at a time when a helmet is not worn, and determines whether or not the rider wears the helmet. | 2016-10-06 |
20160292521 | Depth Sensor Based Passenger Detection - A passenger conveyance system includes a depth-sensing sensor within a passenger conveyance enclosure for capturing depth map data of objects within a field of view that includes a passenger conveyance door. A processing module in communication with the depth-sensing sensor to receive the depth map data, the processing module uses the depth map data to determine that the passenger conveyance enclosure is empty. a passenger conveyance controller receives the passenger data from the processing module to control operation of a passenger conveyance door in response to an empty car determination. | 2016-10-06 |
20160292522 | TRAFFIC LIST GENERATION FOR PASSENGER CONVEYANCE - A passenger tracking system includes a multiple of sensors for capturing depth map data of objects. A processing module in communication with the multiple of sensors to receive the depth map data, the processing module uses the depth map data to track an object and calculate passenger data associated with the tracked object to generate a passenger tracking list that tracks each individual passenger in the passenger data from an origin lobby to a destination lobby and through an in-car track between the origin lobby and the destination lobby. | 2016-10-06 |