45th week of 2020 patent applcation highlights part 44 |
Patent application number | Title | Published |
20200349256 | SELF-HELP FOR DID CLAIMS - Embodiments disclosed herein are related to computing systems and methods for providing a self-help mechanism to DID owners. The computing system and methods are implemented in the decentralized network that implements a distributed ledger that backs one or more decentralized identities (DID) for one or more users of the computing system. One or more DID-related data such as a DID-related intent or attestation is received from a third party entity. The received DID-related data is analyzed to determine a meaning of the DID-related data and/or the implications of providing information that is requested in the DID-related data to the third party entity or to another entity. A report based on the analysis is provided to the DID owner. The report includes information about the meaning of the DID-related data and/or the implications of providing the data to the third party entity or to another entity. | 2020-11-05 |
20200349257 | DETECTING AND MITIGATING MALICIOUS SOFTWARE CODE EMBEDDED IN IMAGE FILES USING MACHINE LEARNING TECHNIQUES - Techniques are provided for detecting malicious software code embedded in image files, using machine learning. One method comprises obtaining metadata for an image file; applying the obtained metadata to at least one machine learning technique to classify the image file into at least one of a plurality of predefined classes, wherein the plurality of predefined classes comprises at least one malicious file class; and determining whether the image file comprises malicious software code based on the classification. The machine learning technique is trained using image files classified into at least one of the plurality of predefined classes. The machine learning technique employs a deep neural network and/or a convolutional neural network to classify the image file into the at least one predefined class. | 2020-11-05 |
20200349258 | METHODS AND SYSTEMS FOR PREVENTING UTILIZATION OF PROBLEMATIC SOFTWARE - Embodiments for managing the utilization of software releases are provided. Information associated with a software release and at least one early adopter of the software release is analyzed to calculate a severity score for the software release. A time to utilize the software release is determined based on the calculated severity score. | 2020-11-05 |
20200349259 | Identifying hard-coded secret vulnerability inside application source code - A source code analysis tool is augmented to support rule-based analysis of code to attempt to identify certain lexical information indicative of hard-coded secret (e.g., password) support in the code. The tool takes the source code as input, parses the content with a lexical analyzer based on language grammar, and processes the resulting data through preferably a pair of rule-based engines. Preferably, one engine is configured to identify variables explicitly intended to be used as a hard-coded secret, and the other engine is configured to identify data strings that could potentially support such a secret. The outputs of these rules engines are consolidated and evaluated to identify a likelihood that the code under examination includes support for a hard-coded secret. The result is then provided to the developer for further action to address any potential security vulnerability identified by the analysis. | 2020-11-05 |
20200349260 | IN-PLACE GUEST-AGNOSTIC ENCRYPTION OF A RUNNING VIRTUAL MACHINE - Systems and methods are described for encrypting the virtual disk in a virtual machine (VM). The virtual disk can be encrypted by a background process executing on the host machine that hosts the VM. Input/output operations (I/Os) to the virtual disk issued by a guest operating system (OS) executing on the VM can be intercepted on the hypervisor of the host machine and processed during the background encryption. Processing of the I/Os occurs independently and separately of background encryption of the virtual disk. Processing an I/O can include decrypting or encrypting data involved in the I/O depending on the location on the virtual disk targeted by the I/O. | 2020-11-05 |
20200349261 | DATABASE PRIVATE DOCUMENT SHARING - An example operation may include one or more of generating, by a first blockchain client, a transaction to a blockchain network to transfer a document, transferring over a private channel, by a second blockchain client, a first key to the first blockchain client, the private channel providing a point-to-point connection between the first and second blockchain clients, encrypting the document using a shared key, transferring, by the first blockchain client, the encrypted document over the private channel, generating, by the second blockchain client, a transaction to acknowledge receipt of the encrypted document, and transferring the shared key encrypted with the first key. | 2020-11-05 |
20200349262 | TERMINAL APPARATUS AND CONTROL METHOD OF TERMINAL APPARATUS - A control method of a terminal apparatus is disclosed. A control method of a terminal apparatus comprises the steps of: determining the number of different ciphertexts, into which behavior data generated according to operation of the terminal apparatus by a user is to be encrypted, for each data type of the behavior data; generating ciphertexts by encrypting behavior data of an identical type in a unit of the determined number of the different ciphertexts so that the behavior data can be encrypted into different ciphertexts; transmitting the generated ciphertexts to an external server; when a model of the behavior data having been used to acquire learning on the basis of the transmitted ciphertexts is received, monitoring an operation of the terminal apparatus on the basis of the received model. Here, the model may be obtained through acquisition of learning according to at least one of a machine learning algorithm, a neural network algorithm, and a deep learning algorithm. | 2020-11-05 |
20200349263 | SYSTEMS AND METHODS FOR DISTRIBUTED COMPLAINT ADDRESSING LEDGER IN VIRTUAL DISTRIBUTED LEDGER NETWORKS - The disclosed embodiments relate to virtual distributed ledger networks provisioning using distributed ledger technology. In one embodiment, a system is disclosed, comprising a hardware processor and a memory device storing instructions executable by the hardware processor to perform operations. The operations comprise creating one or more virtual machines, and executing a plurality of microservices via the one or more virtual machines. At least two of the plurality of microservices are associated with different distributed ledger technology networks. The plurality of microservices include an event routing manager microservice configured to receive a smart contract microservice request and to route events between microservices, a smart contract execution microservice configured to execute a smart contract associated with the smart contract microservice request, and a transaction resource manager microservice configured to commit an outcome of the smart contract execution microservice to a distributed ledger associated with one of the different distributed ledger technology networks. | 2020-11-05 |
20200349264 | DATA DECRYPTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE - The present invention relates to the field of data decryption technologies, and in particular, to a data decryption method and apparatus, and an electronic device. The method includes: obtaining, by a control module, a file of an encrypted application and encrypted control data; sending the obtained file of the encrypted application to an encryption module; and decrypting, by the encryption module, the encrypted control data to obtain decrypted control data. This implementation improves the difficulty and costs for decrypting data, and there will be no delay in the response and processing of other functions with high real-time requirements, thus ensuring smooth running of all functions. | 2020-11-05 |
20200349265 | TECHNOLOGIES FOR TRUSTED I/O WITH A CHANNEL IDENTIFIER FILTER AND PROCESSOR-BASED CRYPTOGRAPHIC ENGINE - Technologies for trusted I/O include a computing device having a processor, a channel identifier filter, and an I/O controller. The I/O controller may generate an I/O transaction that includes a channel identifier and a memory address. The channel identifier filter verifies that the memory address of the I/O transaction is within a processor reserved memory region associated with the channel identifier. The processor reserved memory region is not accessible to software executed by the computing device. The processor encrypts I/O data at the memory address in response to invocation of a processor feature and copies the encrypted data to a memory buffer outside of the processor reserved memory region. The processor may securely clean the processor reserved memory region before encrypting and copying the data. The processor may wrap and unwrap programming information for the channel identifier filter. Other embodiments are described and claimed. | 2020-11-05 |
20200349266 | Cryptographic Memory Ownership Table For Secure Public Cloud - A processor executes an untrusted VMM that manages execution of a guest workload. The processor also populates an entry in a memory ownership table for the guest workload. The memory ownership table is indexed by an original hardware physical address, the entry comprises an expected guest address that corresponds to the original hardware physical address, and the entry is encrypted with a key domain key. In response to receiving a request from the guest workload to access memory using a requested guest address, the processor (a) obtains, from the untrusted VMM, a hardware physical address that corresponds to the requested guest address; (b) uses that physical address as an index to find an entry in the memory ownership table; and (c) verifies whether the expected guest address from the found entry matches the requested guest address. Other embodiments are described and claimed. | 2020-11-05 |
20200349267 | SHREDDING SYSTEM AND METHOD - A method, computer program product, and computing system for maintaining an application stack for use within a virtualized space. A shredding process is effectuated on the application stack. | 2020-11-05 |
20200349268 | WHOLE APPARATUS HAVING AN AUTHENTICATION ARRANGEMENT, AND METHOD FOR AUTHENTICATION - An apparatus includes an authentication arrangement for a communication connection, using a communication protocol, between two data processing devices of the apparatus. The data processing devices each have an interface unit for the communication connection and a computation unit. The interface units each have an encryption/decryption device, where the encryption/decryption device is at least partially produced by hardware for encrypting at least some of the user data to be transmitted via the communication connection as part of the authentication arrangement. The encryption/decryption device can be applied in a communication layer of the communication protocol to the user data prepared for the physical user data transmission or to the physically received user data. Each data processing device has a security unit, implemented as dedicated hardware that the computation unit cannot access and/or in a manner logically isolated from the computation unit. The security unit produces a trusted execution environment, of the authentication arrangement with in each case at least one piece of a hardware-encoded key information, on the basis of which the user data are encrypted by the encryption/decryption device. | 2020-11-05 |
20200349269 | COMPUTER-IMPLEMENTED METHODS AND SYSTEM FOR PREVENTING UNAUTHORIZED FILE MODIFICATION BY MALICIOUS SOFTWARE AND THE LIKE - In some embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: receiving a first access request from a program, the first access request having a first instruction set for modifying data of the file; determining if the file is associated with the authorized handler; processing the first instruction set to produce first modification data; and generating an initial virtual file object comprising the first modification data. In further embodiments, a cyber security method for preventing unauthorized file modification by malicious software and the like, the file accessible to an authorized handler may include: processing an instruction set for modifying a file to produce modification data; generating a virtual file object comprising the modification data; and associating the virtual file object with the file by identifying the file as a sparse file. | 2020-11-05 |
20200349270 | COMMUNITY-BASED DATA SECURITY - A method by one or more electronic devices implementing a system for providing community-based data security, where the system is communicatively coupled to a plurality of database security analyzers, where each of the plurality of database security analyzers is configured to analyze data accesses to one or more databases associated with that database security analyzer. The method includes obtaining, for each of the plurality of database security analyzers, learning metadata generated by that database security analyzer, generating security parameters based on the learning metadata generated by the plurality of database security analyzers, and providing the security parameters to one or more of the plurality of database security analyzers to cause the one or more of the plurality of database security analyzers to apply the security parameters when analyzing data accesses to detect security incidents. | 2020-11-05 |
20200349271 | DATABASE ENTITY SENSITIVITY CLASSIFICATION - There is a need for solutions that perform entity sensitivity classification for a database entity associated with plurality of database elements. This need can be addressed by, for example, for each database element, generating element tokens for the database element based on a textual identifier for the database element, generating token combinations for the database element based on the element tokens for the database element and a token order associated with the textual identifier, generating a token-combination document for the database element based on the token combinations for the database element, and generating element feature data for the database element based on the token-combination document for the database element, and determining the entity sensitivity classification on each element feature data associated with a database element of the plurality of database elements and using a sensitivity classification model. | 2020-11-05 |
20200349272 | PRIORITIZED LINK ESTABLISHMENT FOR DATA TRANSFER USING TASK SCHEDULING - A system and method for scheduling data transfers between systems. One or more data requesting systems may request access to particular data. The request for access to the particular data may correspond to a request that a task to be performed. The task may be to exchange the particular data between a data accessing system having access to the particular data and a data requesting system requesting access to the particular data. The communication exchange may be scheduled for processing. In some embodiments, the communication exchange may be initiated based on a parameter included in the request that the task be performed. | 2020-11-05 |
20200349273 | SECURE CONTENT ACCESS SYSTEM - A method for communicating between a client application and a license-governing application. The method includes receiving a request at a content application from the client application to access media content from the license-governing application, generating a message at the content application to the license-governing application to request client authentication, and receiving at the content application a client authorization token from the license-governing application. A message is generated at the content application to the client application to request user authentication, and the content application receives an authorization code from the client application. The method further includes generating a message at the content application to the license-governing application with the authorization code to request an access token, receiving the access token at the content application from the license-governing application, and granting access at the content application to the media content based on the access token. | 2020-11-05 |
20200349274 | BLOCKCHAIN-BASED REQUEST FULFILLMENT - A system includes profile control circuitry that may receive a sovereign onboarding command. The sovereign onboarding command may be issued on behalf of a sovereign associated with a profile. The sovereign onboarding command may update a status value in the profile. The profile may be recorded on a data-tamper-protected distributed ledger. Arbitration circuitry may review the recorded profile status value and ensure that status values are enforced against the sovereign during exchanges. | 2020-11-05 |
20200349275 | USER AVAILABILITY IN PERSONAL INFORMATION MANAGEMENT SERVICE - A computing device includes a processor and associated memory. The processor is configured to execute a personal information management service stored in memory to send a first calendar entry for display on a calendar interface for a user. The first calendar entry is for a first account of the user of a first domain. The processor sends a second calendar entry for display on the calendar interface. The second calendar entry is for a calendar of a second account of the user of a second domain. The processor receives a request for an availability of the user from a requesting user having a third account of the first domain. In response to the request, the processor sends to the requesting user the first calendar entry including first calendar entry details, and the second calendar entry without second calendar entry details. | 2020-11-05 |
20200349276 | STORING AND EXECUTING AN APPLICATION IN A USER'S PERSONAL STORAGE WITH USER GRANTED PERMISSION - Storing and executing an application in a personal storage with a user-granted permission in a decentralized network that implements a distributed edger. First, receiving a request from an entity for storing an application in a data storage that is associated with a DID owner. The application is configured to use data stored in the data storage as one or more inputs to generate one or more results. Next, one or more characteristics of the application associated with the entity is identified. Based on identified one or more characteristics, a write permission is to be granted to the entity, and the application is stored in the data storage. Thereafter, the application stored in the data storage is executed using data stored in the data storage. | 2020-11-05 |
20200349277 | PRIVACY PRESERVING DATA COLLECTION AND ANALYSIS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for preserving user privacy when collecting and analyzing user data. Methods include discarding user data after generating a privacy enhanced representation of user data and storing this privacy enhanced representation in a probabilistic data structure. Methods further preserve user privacy by inserting false negatives in the probabilistic data structure. Methods also include storing continuous value attributes in the data structure. Methods include storing date values associated with one or more user attributes. The date values may specify the date when one or more user attributes was last received. | 2020-11-05 |
20200349278 | SYSTEM FOR PROVIDINIG QUERY PROCESSING SERVICE BASED ON PERSONAL INFORMATION PROTECTION - A system for providing a query processing service based on personal-information protection, includes: a client terminal configured to allow a user to input and send query content for solving a problem; a relaying and processing server configured to extract and process personal information contained in the query content received from the client terminal, transmit processed query content the processed personal information to a cloud service server, and transmit an answer to a query received from the cloud service server to the client terminal; and the cloud service server configured to generate the answer to the query by analyzing the processed query content received from the relaying and processing server, and transmit the answer to the query to the relaying and processing server. | 2020-11-05 |
20200349279 | SYSTEM AND METHOD FOR DYNAMIC GENERATION OF URL BY SMART CARD - Embodiments of a smart card and systems and methods for secure data access using a smart card are described. The smart card may be formed a substrate and may include a microprocessor, a memory containing an applet, a counter, and a unique identifier. The smart card may dynamically generate a unique uniform resource location (URL) and transmit the URL to via a contactless communication interface to securely facilitate data access from other devices. | 2020-11-05 |
20200349280 | PRIVACY POLICY RATING SYSTEM - A system includes a processor and a memory accessible to the processor. The memory stores instructions that, when executed by the processor, cause the processor to determine a privacy policy score for one of an application and a website and provide the privacy policy score to a device. | 2020-11-05 |
20200349281 | DYNAMIC MANAGEMENT OF DATA WITH CONTEXT-BASED PROCESSING - Techniques for using contextual information to manage data that is subject to one or more data-handling requirements are described herein. In many instances, the techniques capture or depend upon the contextual information surrounding the creation and/or subsequent actions associated with the data. The contextual information may be updated as the data is handled in various manners. The contextual information may be used to identify data-handling requirements that are applicable to the data, such as regulations, standards, internal policies, business decisions, privacy obligations, security requirements, and so on. The techniques may analyze the contextual information at any time to provide responses regarding handling of the data to requests from requestors, such as administrators, applications, and others. | 2020-11-05 |
20200349282 | MULTI-PERSONA ENROLLMENT MANAGEMENT - Examples of multi-persona account management in client devices are described. A client device can host a personal workspace, such as for personal data and applications of a user, along with a separate alternate persona workspace for work-related data and applications of the user. The client device interfaces with a management computing environment to enroll in device management services and establish the alternate persona workspace on the client device. In one example, the client device queries a management computing environment to establish an alternate persona workspace in the client device. The client device then creates the alternate persona workspace in the client device based on a response from the management computing environment, associates an alternate persona account with the alternate persona workspace, and receives a notification to install at least one application in the alternate persona workspace from an account administration environment of the alternate persona account. | 2020-11-05 |
20200349283 | CONFLICT RESOLUTION FOR BLOCKCHAIN STORAGE STRUCTURE - An example operation may include one or more of receiving a content request to add a content to a blockchain storage structure implemented on a blockchain database, temporarily storing the content of the content request in a queue implemented via the blockchain database based on when the request is received, receiving a request to flush the queue which is invoked by chaincode, and in response to the flush request, removing the content from the queue and adding the content to the blockchain storage structure. | 2020-11-05 |
20200349284 | PRIVACY-PRESERVING ANOMALOUS BEHAVIOR DETECTION - An example operation may include one or more of storing a tree structure via a blockchain storage, the tree structure comprising anonymous behavior data of a plurality of blockchain participants stored in a plurality of nodes in a hierarchical structure, receiving a request to add new anonymous behavior data to the tree structure, the request comprising a zero-knowledge proof generated by a blockchain participant, identifying an active leaf on the tree structure which stores previously recorded anonymous behavior data of the blockchain participant associated with the request based on the zero-knowledge proof, generating a new active leaf for the blockchain participant based on the new anonymous behavior data and the previously recorded anonymous behavior, and storing the new active leaf as a leaf node on the tree structure in the blockchain storage. | 2020-11-05 |
20200349285 | VEHICLE INFORMATION INQUIRY METHOD - Disclosed is a vehicle information inquiry method including a logging step of acquiring an event ID for sharing anonymized vehicle information and vehicle travel information corresponding to the event ID from an external device, by a central server, a query step of receiving an inquiry about the event ID and the vehicle travel information corresponding to the event ID from an inquiry server, by the central server, and a responding step of transmitting the vehicle travel information corresponding to the event ID received from the inquiry server to the inquiry server, by the central server. | 2020-11-05 |
20200349286 | ASCERTAINING NETWORK DEVICES USED WITH ANONYMOUS IDENTIFIERS - Techniques for identifying certain types of network activity are disclosed, including parsing network traffic to automatically recognize anonymous identifiers. Such techniques may be used to identify and eliminate malicious and/or undesirable network traffic, and to identify topics relevant to a user of a particular network device so that communications to such a user are more likely to relate to a topic of interest to the user. | 2020-11-05 |
20200349287 | SYSTEM AND METHOD FOR SCRUBBING DATA TO BE SHARED BETWEEN ORGANIZATIONS - A system and method for scrubbing data to be shared between organizations to test a joint solution, and for preventing the introduction of unscrubbed data. Each organization captures a subset of data, which may be customer data from a line of business. The first organization scrubs its data according to scrubbing rules, and then passes the scrubbed data to its test environment, while the second organization passes its unscrubbed data to its test environment. The scrubbed data is communicated to the second organization and is applied to the unscrubbed data in order to scrub it, and then communicate it to the first organization. Both organizations use the scrubbed data in their respective test environments to test the joint solution or joint testing. Scrubbing the data may involve scrubbing only specific data fields containing sensitive information. | 2020-11-05 |
20200349288 | DYNAMIC DATA PROTECTION - Methods, systems and computer program products for health data protection. Embodiments commence upon receiving a data access request message from a participant in a health ecosystem. The data access request message comprises an indication of one or more health data sets that are held by or at least potentially of interest to the participant. System components are configured to receive the message and to identify the participant. Based on parameter values corresponding to a data protection policy of the participant, a data protection scheme is generated. The scheme includes parameter values derived from the data protection policy. The parameter values of the scheme are used to generate a variation of the health data set that is formed by applying one or more data anonymization, data obfuscation or other data protection techniques to the health data set. A balance among the parameters is calculated so as to achieve a desired outcome. | 2020-11-05 |
20200349289 | PRIVACY FRIENDLY COMMUNICATION BY OPERATION OF CLOAKED/DECLOAKED EMAIL - The disclosed tools include are tools to efficiently protect privacy for end users and others on the Internet when communicating with others. Specifically, tools disclosed include tools to enable an end user's device to communicate via email with others such as relying-parties such as merchants without revealing her information to the relying-party such as her email address, name or any other information she desires to keep confidential while still being able to have commercially useful transactions with the relying parties and others. | 2020-11-05 |
20200349290 | HIGHLY SECURE NETWORKED SYSTEM AND METHODS FOR STORAGE, PROCESSING, AND TRANSMISSION OF SENSITIVE PERSONAL INFORMATION - A highly secure networked system and methods for storage, processing, and transmission of sensitive information are described. Sensitive, e.g. personal/private, information is cleansed, salted, and hashed by data contributor computing environments. Cleansing, salting, and hashing by multiple data contributor computing environments occurs using the same processes to ensure output hashed values are consistent across multiple sources. The hashed sensitive information is hashed a second time by a secure facility computing environment. The second hashing of the data involves a private salt inaccessible to third parties. The second hashed data is linked to previously hashed data (when possible) and assigned a unique ID. Data dictionaries are created for particular individuals provided access to the highly secure information, e.g. researchers. Prior to a data dictionary being accessible by a researcher computing device, the data dictionary undergoes compliance and statistical analyses regarding potential re-identification of the source unhashed data. The data dictionaries are viewable by researchers as certified views via a secure VPN. | 2020-11-05 |
20200349291 | DATA BUNDLE GENERATION AND DEPLOYMENT - The present disclosure provides a method, system, and device for distributing a software release. To illustrate, based on one or more files for distribution as a software release, a release bundle is generated that includes release bundle information, such as, for each file of the one or more files, a checksum, meta data, or both. One or more other aspects of the present disclosure further provide sending the release bundle to a node device. After receiving the release bundle at the node device, the node device receives and stores at least one file at a transaction directory. After verification that each of the one or more files is present/available at the node device, the one or more files may be provided to a memory of a node device and meta data included in the release bundle information may be applied to the one or more files transferred to the memory. | 2020-11-05 |
20200349292 | DATA BUNDLE GENERATION AND DEPLOYMENT - The present disclosure provides a method, system, and device for distributing a software release. To illustrate, based on one or more files for distribution as a software release, a release bundle is generated that includes release bundle information, such as, for each file of the one or more files, a checksum, meta data, or both. One or more other aspects of the present disclosure further provide sending the release bundle to a node device. After receiving the release bundle at the node device, the node device receives and stores at least one file at a transaction directory. After verification that each of the one or more files is present/available at the node device, the one or more files may be provided to a memory of a node device and meta data included in the release bundle information may be applied to the one or more files transferred to the memory. | 2020-11-05 |
20200349293 | SYSTEMS AND METHODS FOR AUTHENTICATING PHOTOGRAPHIC IMAGE DATA - The present disclosure provides systems and methods for authenticating photographic data. In one embodiment, a method comprises providing an image authentication application for use on a client device, the application configured to control image capture and transmission; receiving an image data file from the application at the authentication server comprising a photographic image captured by the application and metadata associated therewith; applying a watermark to the photographic image to create a watermarked image; applying date and time information to the tagged image; applying location information to the tagged image; creating a web address associated with the image data file; uploading the photographic image, the tagged image, or both to the web address; and transmitting an authenticated image file to the client device, the authenticated image file comprising one or more of: the watermarked image, the photographic image, the date and time information, geographic information, and the web address. | 2020-11-05 |
20200349294 | METHOD FOR THE EXECUTION OF A BINARY CODE OF A SECURE FUNCTION BY A MICROPROCESSOR - A method for executing a binary code includes for each item of data to be recorded: executing an algorithm for constructing a data line containing a cryptogram of this item of data constructed using an initialization vector iv | 2020-11-05 |
20200349295 | TAMPER DETECTION COUNTERMEASURES TO DETER PHYSICAL ATTACK ON A SECURITY ASIC - Various embodiments of the present invention relates generally to an integrated circuit, and more particularly, to systems, devices and methods of incorporating a tamper detection countermeasure into a security ASIC to deter physical attacks. The tamper detection countermeasure architects an active mesh to cover a sensitive area in the security ASIC. A plurality of time-varying random numbers is generated by a random number generator (RNG), and the active mesh is driven and configured according to these random numbers. During tamper detection cycles, the active mesh is monitored with respect to the plurality of random numbers that is directly provided by the RNG. Upon a tampering attempt, a flag signal is generated and used to initialize subsequent anti-tampering actions. The active mesh may be controlled and monitored based on time-varying codes, and therefore, an adversary may not easily bypass the active mesh and attack the sensitive area. | 2020-11-05 |
20200349296 | SYSTEM FOR REAL-TIME AUTHENTICATED OBFUSCATION OF ELECTRONIC DATA - A system for real-time authenticated obfuscation of electronic data provides real-time visual obfuscation of the data by transforming displayed data into undecipherable data when viewed by an unauthorized user while maintaining access for an authorized user. The system may further provide application-level obfuscation of electronic data via cryptographic keys such that only authorized applications may decrypt the encrypted data. In this way, the system provides secure access control of electronic data within a networked environment. | 2020-11-05 |
20200349297 | INTRUSION SWITCH - Examples herein relate to intrusion switch. In particular, implementations herein relate to a computer system including a housing enclosing at least one electronic component therein. The housing includes a base and a removable cover. The cover is movable between engaged and disengaged positions relative to the base and extends over at least a portion of the base and is secured to the base in the engaged position. The cover is removable from the base when the cover is in the disengaged position. The computer system further includes an intrusion switch configured to detect access to an interior of the computer system. A portion of the cover extends through a slot in one of the sidewalls of the base and contacts the intrusion switch when the cover is in the engaged position. Contact between the cover and the intrusion switch is released when the cover is in the disengaged position such that the intrusion switch can detect when the cover is moved to the disengaged position. | 2020-11-05 |
20200349298 | DATA LOSS PREVENTION USING MACHINE LEARNING - A data loss prevention device that includes a data loss prevention engine implemented by a processor. The data loss prevention engine is configured to receive data in transit to a target network device and to identify content within the data. The data loss prevention engine is configured to determine the content of the data comprises an image and to determine an image type for the image based on objects within the image, and to determine whether the image type matches a restricted image type from a set of restricted image types. The data loss prevention engine is further configured to block transmission of the data to the target network device in response to determining that the image type matches a restricted image type and forward the data to the target network device in response to determining that the image type does not match a restricted image type. | 2020-11-05 |
20200349299 | Extracting Grasping Cues From Tool Geometry For Digital Human Models - Grasping remains a complex topic for simulation. Embodiments provide a method to automatically determine grasping cues for tools. An example embodiment scans a CAD model representing a real-world tool to generate a series of sections from the CAD model. In turn, properties of each section are extracted and one or more regions of the CAD model are identified based upon the extracted properties and a tool family to which the tool represented by the CAD model belongs. To continue, a respective classification for each of the one or more identified regions is identified and grasping cues for the CAD model are generated based upon the determined respective classification for each of the one or more regions. | 2020-11-05 |
20200349300 | Systems And Methods For Determining Digital Model Positioning For Grasping - Embodiments determine positioning of a mannequin. One such embodiment begins by determining a frame of a grasping element of a mannequin represented by a computer-aided design (CAD) model and determining a frame of an object to be grasped, where is object is also represented by a CAD model. To continue, degrees of freedom of the mannequin are specified and limits on the specified degrees of freedom are set. In turn, using an inverse kinematic solver, positioning of the mannequin grasping the object is determined based upon: (i) the determined frame of the grasping element, (ii) the determined frame of the object, (iii) the specified degrees of freedom, and (iv) the set limits on the specified degrees of freedom. | 2020-11-05 |
20200349301 | Importance-Directed Geometric Simplification System and Method - The present invention relates to the importance-directed geometric simplification of complex mesh-based representations of objects in virtual environments for radiosity-based global illumination simulations. By means of simplification, the time needed to solve the radiosity equation and so generate an accurate physically-based simulation can be markedly reduced. Further, geometric simplification is performed during the global illumination simulation process rather than as a preprocess step. | 2020-11-05 |
20200349302 | METHOD FOR STRUCTURAL OPTIMIZATION OF OBJECTS USING A DESCRIPTOR FOR DEFORMATION MODES - A computer-implemented method for a structural optimization of a geometric shape of a physical object with respect to a deformation comprises a step of representing the geometric shape of the physical object in a spectral design representation in the spectral domain, and a step of determining a deformation mode and of generating a spectral descriptor of the deformation mode on the basis of the spectral design representation and spectral representation of the deformed object. The method then performs a structural optimization of a set of design variables using the generated spectral descriptor as a parameter in an objective function of the structural optimization or in at least one constraint of the structural optimization to generate an optimized set of design variables of the physical object. The method outputs the optimized set of design variables of the physical object. | 2020-11-05 |
20200349303 | AUTOMATED DESIGN DRAWING ANALYSIS FOR QUOTING AND MANUFACTURING FEEDBACK - The disclosed embodiments include a method for automatic analysis of design drawings to increase accuracy of quoting and generating manufacturing feedback as part of the manufacturing process of a product or mechanical part. A design drawing depicting a product can be automatically inspected to identify and classify characters included in the design drawing. The classified characters can then be processed by one or more tasks included in a rule engine to modify at least one of a quote or manufacturing feedback relating to the manufacturing process of the product. | 2020-11-05 |
20200349304 | METHOD, APPARATUS, DEVICE, AND MEDIUM FOR IMPLEMENTING SIMULATOR - According to example embodiments of the present disclosure, a method, an apparatus, a device, and a medium for implementing a simulator are provided. The method may include reading a first piece of data for a first analog module of the simulator from a unified storage file, then writing a second piece of data into the unified storage file, the second piece of data being generated based on processing on the first piece of data by the first analog module. The method further includes reading the second piece of data for a second analog module in the simulator from the unified storage file, and then writing a third piece of data into the unified storage file, the third piece of data being generated based on processing on the second piece of data by the second analog module. | 2020-11-05 |
20200349305 | UNIFIED MATHEMATICAL MODEL IN PROCESS SIMULATION - A system simulates a process. Software instructions stored on a memory device and executable by a processor represent a process entity with a model. Instructions configure the model to function in a plurality of modes, the modes comprising a process mode, a fluid flow mode, and a dynamic mode. Additionally, instructions simulate the function of the process entity with the model in a first mode from the plurality of modes and then switch the model to a second mode from the plurality of modes. | 2020-11-05 |
20200349306 | General Scattered Field Simulator - A general field simulator for generating scattered fields arising from an incident field interacting with a physical body. A general field simulator generates a patch data structure from a logical representation of a physical object, generates an approximation mesh, deforms the approximation mesh to generate approximators associated with a target point, and generates a surface field component based on approximators and a guess density. A general field simulator may generate an edge deformed mesh based on an edge deformation change of variables when a patch includes an edge. | 2020-11-05 |
20200349307 | ADVANCED MODEL MAPPING AND SIMULATIONS - The invention relates to a system for performing a method for performing computer-aided simulations. The system loads an input dataset which is based on user interactions of a user indicating a manipulation of a representation of a component, provides a tracking dataset indicating changes in the representation through the manipulations by evaluating the input dataset, provides an output dataset which is based on evaluation of the tracking dataset by means of machine learning, where the output dataset assigns a model to the representation, and outputs the output dataset. | 2020-11-05 |
20200349308 | Predictive Modeling Platform for Serial Casting to Correct Orthopedic Deformities - A system and method are provided herein for modelling of force vectors for serial casts to correct orthopedic deformities includes a camera configured to capture a three-dimensional image of the deformity, a computing device programmed to generate a three-dimensional model of the deformity based on the image of the deformity, determine the boundary conditions for the deformity based on the three-dimensional image of the deformity, and generate force vectors for a series of casts to correct the deformity. In exemplary embodiments, the system can print a series of casts to correct the deformity. | 2020-11-05 |
20200349309 | INCREMENTAL GENERATION OF QUANTUM CIRCUITS - A method includes detecting submission of a first quantum circuit for compilation, the first quantum circuit comprising a first set of quantum logic gates; generating a first gate index, the first gate index comprising an ordered table of a subset of the set of quantum logic gates, each quantum logic gate of the subset of quantum logic gates including a corresponding set of qubits acted on by the quantum logic gate; comparing the first gate index with a second gate index to determine a structural equality of the first quantum circuit and the second quantum circuit; and parameterizing, in response to determining a structural equality of the first quantum circuit and the second quantum circuit, a first set of parameters of a second set of quantum logic gates of the second quantum circuit with a second set of parameters of the first set of quantum logic gates. | 2020-11-05 |
20200349310 | LOGIC REPOSITORY SERVICE - The following description is directed to a logic repository service. In one example, a method of a logic repository service can include receiving a first request to generate configuration data for configurable hardware using a specification for application logic of the configurable hardware. The method can include generating the configuration data for the configurable hardware. The configuration data can include data for implementing the application logic. The method can include receiving a second request to download the configuration data to a host server computer comprising the configurable hardware. The method can include transmitting the configuration data to the host server computer in response to the second request so that the configurable hardware is configured with the host logic and the application logic. | 2020-11-05 |
20200349311 | Automated Root-Cause Analysis, Visualization, and Debugging of Static Verification Results - Disclosed herein are system, method, and computer-readable storage device embodiments for implementing automated root-cause analysis for static verification. An embodiment includes a system with memory and processor(s) configured to receive a report comprising violations and debug fields, and accept a selection of a seed debug field from among the plurality of debug fields. Clone violations may be generated by calculating an overlay of a given violation of the violations and a seed debug field, yielding possible values for a subset of debug fields. A clone violation may be created for a combination of the at least two second debug fields, populating a projection matrix, which may be used to map violations and clone violations to corresponding numerical values in the projection matrix and determine a violation cluster based on the mapping having corresponding numerical values and score(s) satisfying a threshold, via ML. Clustering may further be used to generate visualizations. | 2020-11-05 |
20200349312 | Core-Only System Management Interrupt - An apparatus, including: a deterministic monitored device; an interconnect to communicatively couple the monitored device to a support circuit; a super queue to queue transactions between the monitored device and the support circuit, the super queue including an operational segment and a shadow segment; a debug data structure; and a system management agent to monitor transactions in the operational segment, log corresponding transaction identifiers in the shadow segment, and write debug data to the debug data structure, wherein the debug data are at least partly based on the corresponding transaction identifiers. | 2020-11-05 |
20200349313 | DETECTING OUT-OF-BOUNDS VIOLATIONS IN A HARDWARE DESIGN USING FORMAL VERIFICATION - A hardware monitor arranged to detect out-of-bounds violations in a hardware design for an electronic device. The hardware monitors include monitor and detection logic configured to monitor the current operating state of an instantiation of the hardware design and detect when the instantiation of the hardware design implements a fetch of an instruction from memory; and assertion evaluation logic configured to evaluate one or more assertions that assert a formal property that compares the memory address of the fetched instruction to an allowable memory address range associated with the current operating state of the instantiation of the hardware design to determine whether there has been an out-of-bounds violation. The hardware monitor may be used by a formal verification tool to exhaustively verify that the hardware design does not cause an instruction to be fetched from an out-of-bounds address. | 2020-11-05 |
20200349314 | SEMICONDUCTOR DEVICE - A semiconductor device includes a first standard cell and a second standard cell. A single diffusion break region extending in a first direction is formed in the first standard cell, and a first edge region extending in the first direction and having a maximum cutting depth in a depth direction perpendicular to the first direction is in the first standard cell. A double diffusion break region extending in the first direction is formed in the second standard cell, and a second edge region extending in the first direction and having the maximum cutting depth in the depth direction is formed in the second standard cell. | 2020-11-05 |
20200349315 | METHOD AND SYSTEM FOR CONTROLLING LAYOUT OF PAGE ELEMENT FOR VIDEO AND STORAGE MEDIUM - The present disclosure discloses a method and a system for controlling a layout of a page element for a video and a non-transitory machine-readable storage medium. The method includes: configuring a layout of a page element for a preset time period of the video, the layout of the page element being adaptive to a video content played during the preset time period; and acquiring a current playing time of the video, and displaying the layout of the page element corresponding to the preset time period that matches the current playing time. | 2020-11-05 |
20200349316 | Direct Rendering of a Web Application from a Database to a Web Browser - A method includes selecting a database on a system and selecting a style format on the system. The database contains data information for the web application, and the style format is applied to the web application. The method also includes selecting a validation rule for the web application, selecting a business rule for the web application, dynamically rendering the web application from a database to a web browser, and dynamically editing the web application. The web application incorporates the selected database and the selected style format instantaneously upon dynamic rendering. | 2020-11-05 |
20200349317 | SUMMARIZATION AND PROCESSING OF EMAIL ON A CLIENT COMPUTING DEVICE BASED ON CONTENT CONTRIBUTION TO AN EMAIL THREAD USING WEIGHTING TECHNIQUES - Systems, methods, and computer-readable media are disclosed for enhancing an email application to automatically analyze an email thread and generate a compact content summary. The content summary is based on relative content contributions provided by the constituent email messages in the email thread. The content summary may be presented in a special window without disturbing or modifying the email thread or its constituent email messages. The distinctive content summary disclosed herein comprises certain sentences that are automatically gleaned from the email thread, analyzed relative to other sentences, and presented in a chronological sequence so that the user can quickly determine what the email thread is about and/or the current status of the conversation. The content summary is based on email weights, word weights, and intersecting sentence pairs. | 2020-11-05 |
20200349318 | METHOD AND SYSTEM TO TRANSMIT DATA - Methods and systems for transmitting data are disclosed. In one embodiment a portable electronic device comprises a processor-implemented user interface module to cause the presentation of a first information field to a user as part of a graphical user interface in the portable electronic device, and to receive information entered or data identification in the first information field. A data transmitting module commences transmitting the information entered or the data identified over a network in response to the user interface module detecting that the user has navigated away from the first information field. | 2020-11-05 |
20200349319 | EDOC UTILITY USING NON-STRUCTURED-QUERY-LANGUAGE DATABASES - A database management system for processing large volumes of data in a key-value store database is provided. The system may be configured to receive a plurality of filled fillable request forms where each request form may include a request including a plurality of field labels and a plurality of fillable text fields corresponding to each of the plurality of the field labels. The system may be configured to extract each set of inputted data from each fillable text field. The system may be configured to store, in the key-value store database, for each request form, each of the plurality of field labels and the corresponding set of inputted data as a combination key-value pair. The combination key may be equal to a WIP ID number, form ID number and field ID number. The corresponding value may be equal to the set of data of the corresponding field ID number. | 2020-11-05 |
20200349320 | UI Enabling Mapping Engine System and Process Interconnecting Spreadsheets and Database-Driven Applications - The present invention relates to a new method to create a new User Interface to Database Data. A Spreadsheet is used as a UI, and the Data presented to the End User is into the Spreadsheet in a repeatable manner A Record serves as the basis of the Data to be presented and the Lists from the List Views are mapped into Managed Regions in the Spreadsheet as in the combination of the Form View and List View. This provides a new means to create Applications. An existing Spreadsheet can be used to create a new Application. The Spreadsheet mappings are created. These mappings are then used to create the Tables in the Database to store the required data and relationships. The End User UI is now complete, because the Spreadsheet is now the UI for the End User using the Mapping Engine to Process User Action. | 2020-11-05 |
20200349321 | METHODS AND APPARATUS FOR COMPRESSING DATA STREAMS - Methods and apparatus for compressing data streams. In an embodiment, a method includes calculating a decomposition of matrix data to generate eigenvectors and associated eigenvalues, determining clusters of the eigenvectors based on weighting the eigenvalues, calculating an eigenvector centroid for each cluster so that a dictionary of centroids is generated, and tagging the eigenvectors with tags, respectively, that identify an associated eigenvector centroid for each eigenvector. The method also includes counting a number of eigenvectors associated with each eigenvector centroid to construct a probability distribution function (PDF) of centroids, matching the PDF of centroids to PDF templates to determine a closest matching PDF template, determining an encoder corresponding to the closest matching PDF template wherein a corresponding encoder identifier is identified, encoding the tags with the encoder to generate an encoded data stream, and transmitting the encoded data stream, the encoder identifier, the dictionary of centroids, and the eigenvalues. | 2020-11-05 |
20200349322 | METHOD AND SYSTEM FOR SUGGESTING REVISIONS TO AN ELECTRONIC DOCUMENT - A method for suggesting revisions to a document-under-analysis from a seed database, the seed database including a plurality of original texts each respectively associated with one of a plurality of final texts, the method for suggesting revisions including selecting a statement-under-analysis (“SUA”), selecting a first original text of the plurality of original texts, determining a first edit-type classification of the first original text with respect to its associated final text, generating a first similarity score for the first original text based on the first edit-type classification, the first similarity score representing a degree of similarity between the SUA and the first original text, selecting a second original text of the plurality of original texts, determining a second edit-type classification of the second original text with respect to its associated final text, generating a second similarity score for the second original text based on the second edit-type classification, the second similarity score representing a degree of similarity between the SUA and the second original text, selecting a candidate original text from one of the first original text and the second original text, and creating an edited SUA (“ESUA”) by modifying a copy of the first SUA consistent with a first candidate final text associated with the first candidate original text. | 2020-11-05 |
20200349323 | TECHNIQUE FOR GENERATING AND UTILIZING VIRTUAL FINGERPRINT REPRESENTING TEXT DATA - According to an embodiment of a present disclosure, a method for generating and utilizing a text fingerprint performed by a computing device is disclosed. The method comprises the steps of: dividing text data into one or more segments based on a predetermined text segmentation algorithm; determining a mapping value assigned to one or more subsegments that form the divided segment based on a predetermined mapping algorithm; generating a coordinate value for each of the one or more segments based on the determined mapping value; and generating the virtual fingerprint having a phonetic feature for the text data based on the generated coordinate value. That is, whether a plurality of the text data are similar to each other can be easily determined, when the text data also has a unique virtual fingerprint based on a pronunciation, in the same way every person has a unique fingerprint. | 2020-11-05 |
20200349324 | SYSTEM AND METHOD FOR ANALYSIS AND NAVIGATION OF DATA - Systems and methods for analyzing structured data are described. A device may receive a table of structured data and create a Raw Pair Distance (RPD) table. The device then selects a set of nodes from the elements in the RPD table and outputs a nodes table. The device may also output a node-node distance (NND) matrix using the RPD table and run an energy reduction algorithm on the NND matrix in order to create an NSPACE matrix including n-dimensional coordinates for each node. The device may display (e.g., via a 3D visualizer) a graphical representation of selected nodes and coordinated relationships between the selected nodes. The systems and methods may enable a user to quickly search and understand relationships within a large structured data set. | 2020-11-05 |
20200349325 | METHOD AND SYSTEM FOR AUTOMATED INTENT MINING, CLASSIFICATION AND DISPOSITION - An agent automation system includes a memory configured to store a corpus of utterances and a semantic mining framework and a processor configured to execute instructions of the semantic mining framework to cause the agent automation system to perform actions, wherein the actions include: detecting intents within the corpus of utterances; producing intent vectors for the intents within the corpus; calculating distances between the intent vectors; generating meaning clusters of intent vectors based on the distances; detecting stable ranges of cluster radius values for the meaning clusters; and generating an intent/entity model from the meaning clusters and the stable ranges of cluster radius values, wherein the agent automation system is configured to use the intent/entity model to classify intents in received natural language requests. | 2020-11-05 |
20200349326 | SYSTEMS AND METHODS FOR IMPROVING PERFORMANCE OF AN ANALOG PROCESSOR - In a hybrid computing system including at least one analog processor and at least one digital processor an embedded problem is repeatedly run or executed on the analog processor(s) to generate a first plurality of candidate solutions to the computational problem, the candidate solutions are returned to the digital processor(s) which determine a value for at least one statistical feature of the candidate solutions, at least one programmable parameter of the plurality of analog devices in the analog processor(s) is adjusted to at least partially compensate for deviations from an expected value of the at least one statistical feature, the expected value of the at least one statistical feature inferred from the structure of the embedded problem, the embedded problem is again repeatedly run or executed on the analog processor(s) to generate a second plurality of candidate solutions to the computational problem. | 2020-11-05 |
20200349327 | CARD READER - A card reader is provided which is capable of detecting a skimming magnetic head attached to a front side of a card insertion member formed with a card insertion port and a skimming magnetic head attached to an inclined face of the card insertion port with a simple structure. The card reader includes a card insertion member | 2020-11-05 |
20200349328 | WIRELESS DEVICE AND SELECTIVE USER CONTROL AND MANAGEMENT OF A WIRELESS DEVICE AND DATA - A wireless transponder configured to generate or activate data and next step data actions for use with an appliance/device or network, and a method of using the wireless transponder. | 2020-11-05 |
20200349329 | WIRELESS MONITORING AND PROFILING OF REACTOR CONDITIONS USING PLURALITY OF SENSOR-ENABLED RFID TAGS AND MULTIPLE TRANSCEIVERS - Disclosed is a system and method for wirelessly monitoring 5 process conditions within a reactor vessel. A plurality of sensor-enabled radio frequency identification (RFID) tags are disposed at unspecified or random locations throughout a catalyst bed of a vessel and are used to measure various conditions within the vessel. The sensor-enabled RFID tags are encoded with individual identification codes and are wirelessly linked to multiple 10 transceivers. The use of multiple transceivers allows for the application of triangulation methods to identify the location of each of the sensor-enabled RFID tags in threedimensional space and for the interrogation of each sensor-enabled RFID tag to receive responsive transponder signals that carry information representative of the sensed condition within the reactor. | 2020-11-05 |
20200349330 | Reader Apparatus For Upconverting Nanoparticle Ink Printed Images - An improved system and method for reading an upconversion response from nanoparticle inks is provided. A is adapted to direct a near-infrared excitation wavelength at a readable indicia, resulting in a near-infrared emission wavelength created by the upconverting nanoparticle inks. A short pass filter may filter the near-infrared excitation wavelength. A camera is in operable communication with the short pass filter and receives the near-infrared emission wavelength of the readable indicia. The system may further include an integrated circuit adapted to receive the near-infrared emission wavelength from the camera and generate a corresponding signal. A readable application may be in operable communication with the integrated circuit. The readable application receives the corresponding signal, manipulates the signal, decodes the signal into an output, and displays and/or stores the output. | 2020-11-05 |
20200349331 | EXAMINING OBJECTS USING ELECTRIC FIELDS - Non-biological objects, biological specimens and living tissues are examined using electric fields to identify regions of differing permittivity and conductivity. Substantially parallel electrodes are deployed in capacitive alignment with an object and energization pulses are generated for application to any of the electrodes as a transmitter. Output signals from any remaining electrode are monitored, in which a peak value of an output signal is indicative of permittivity and a decay rate of an output signal is indicative of conductivity. A first set of n electrodes (one to fifteen) is selected, each of which is capacitively coupled with a second set of m electrodes (two to eight) that are the nearest neighbouring electrodes to an electrode selected from the first set. | 2020-11-05 |
20200349332 | HYBRID OPTICAL AND CAPACITIVE SENSOR - A hybrid capacitive and optical fingerprint sensor system includes: capacitive sensor electrodes; an optical image sensor having a plurality of image sensor pixels; light conditioning elements, configured to condition light from a sensing region of the hybrid capacitive and optical fingerprint sensor for detection by the optical image sensor; and a processing system having one or more controllers, configured to operate the capacitive sensor electrodes in a low-power mode of operation for the hybrid capacitive and optical fingerprint sensor, and to operate the optical image sensor to acquire an image from the sensing region of the hybrid capacitive and optical fingerprint sensor. | 2020-11-05 |
20200349333 | Fingerprint Identification Apparatus, Display Apparatus, and Electronic Device - An electronic device includes: a cover glass, including a first side and a second side; an ultrasonic wave transmitter and an ultrasonic wave receiver, arranged on the second side of the cover glass. Orthographic projections of the ultrasonic wave transmitter and the ultrasonic wave receiver onto the cover glass may be at two opposing ends of the cover glass. The ultrasonic wave transmitter is configured to emit an ultrasonic wave, the ultrasonic wave is able to enter the cover glass from an end, reflected between the first side and the second side for a plurality of times, emitted out of the cover glass from another end, and received by the ultrasonic wave receiver. | 2020-11-05 |
20200349334 | DISPLAY PANEL, DISPLAY APPARATUS, TEXTURE RECOGNITION METHOD AND ELECTRONIC DEVICE - A display panel has a light-exit side and a non-light-exit side opposite to the light-exit side. A direction pointing to the non-light-exit side from the light-exit side is a first direction. In the first direction, the display panel includes a coded aperture mask layer and an optical sensing layer. The coded aperture mask layer includes a plurality of first light-transmission portions and a plurality of first light-shielding portions. The coded aperture mask layer is configured to form at least one part of a coded aperture array. The optical sensing layer includes a plurality of optical sensors. The optical sensing layer is configured to receive texture recognition light passed through the coded aperture array and convert optical signals of the texture recognition light into electrical signals. The texture recognition light is light carrying information about a texture to be recognized. | 2020-11-05 |
20200349335 | FINGERPRINT SENSING DEVICE - The invention provides a fingerprint sensing device. A control circuit controls a part of point light sources to irradiate a fingerprint of a user. Reflected light generated by using the plurality of point light sources to irradiate the fingerprint of the user forms a light-emitted pattern including a plurality of reflected light patterns on a sensing layer, wherein each of the reflected light patterns is provided by a corresponding point light source, and each of the sensing units senses the reflected light patterns corresponding to at least two point light sources. | 2020-11-05 |
20200349336 | ELECTRONIC DEVICE - An electronic device includes a display panel, a fingerprint sensing unit and an integrated circuit, wherein the integrated circuit is for driving the display panel and the fingerprint sensing unit. | 2020-11-05 |
20200349337 | EMOTION SENSING ARTIFICIAL INTELLIGENCE - Systems, apparatuses, and methods are directed toward determining emotional states of a subject. For example, the systems, apparatuses, and methods determine one or more previous characteristics of a pupil of an eye based on image data from eye tracking sensors, determine one or more current characteristics of the pupil based on image data from the eye tracking sensors, where the one or more current characteristics include one or more of a current position of the pupil or a current size of the pupil, track movements, based on image data from the eye tracking sensors, in a position of the pupil and changes in a size of the pupil over a time period, automatically predict an emotional state based on a comparison between the one or more previous characteristics and the one or more current characteristics, the tracked movements and the tracked changes in the size and adjust a parameter of one or more hardware devices based on the predicted emotional state. | 2020-11-05 |
20200349338 | REFLECTIVE CABLE LOCATING SYSTEM - A reflective cable system for a geophysical survey system includes a reflective cable that includes a conductive wire surrounded by an electrically insulating sheath and an exterior surface. The reflective cable includes reflective material that is on or visible through the exterior surface and that is configured to reflect a complete spectrum of light provided by a light source back to the light source. The reflective cable system also includes a connector electrically coupled to at least one end of the reflective cable and configured to couple to a geophysical survey system. The reflective cable may be used to locate the reflective cable in a physical environment and used to determine a position of the reflective cable using lidar or photogrammetry for generating geophysical survey models. | 2020-11-05 |
20200349339 | STRUCTURE FROM MOTION FOR DRONE VIDEOS - Aspects of the subject disclosure may include, for example, a method comprising obtaining, by a processing system including a processor, first and second models for a structure of an object, based respectively on ground-level and aerial observations of the object. Model parameters are determined for a three-dimensional (3D) third model of the object based on the first and second models; the determining comprises a transfer learning procedure. Data representing observations of the object is captured at an airborne unmanned aircraft system (UAS) operating at an altitude between that of the ground-level observations and the aerial observations. The method also comprises dynamically adjusting the third model in accordance with the operating altitude of the UAS; updating the adjusted third model in accordance with the data; and determining a 3D representation of the structure of the object, based on the updated adjusted third model. Other embodiments are disclosed. | 2020-11-05 |
20200349340 | AUTOMATED ANALYSIS OF CELLULAR SAMPLES HAVING INTERMIXING OF ANALYTICALLY DISTINCT PATTERNS OF ANALYTE STAINING - Systems and methods discussed herein include, among other things, a method comprising quantifying analyte staining of a biological compartment in a region in which said staining is intermixed with analyte staining of an analytically-distinct distinct biological compartment. Disclosed systems and methods include, for example, a system and method for identifying membrane staining of an analyte of interest in regions where diffuse membrane staining is intermixed with cytoplasmic staining and/or punctate staining is disclosed. Disclosed systems and methods include, for example, a system and method for quantifying membrane staining of an analyte of interest in tissue or cytological samples having regions in which membrane staining is intermixed with cytoplasmic staining and/or punctate staining. | 2020-11-05 |
20200349341 | PERFORMING AN ITERATIVE BUNDLE ADJUSTMENT FOR AN IMAGING DEVICE - A method of performing an iterative bundle adjustment for an imaging device is described. The method comprising implementing a plurality of functions in performing a bundle adjustment. Predetermined functions of the plurality of functions may be started using a processor for a second iteration in parallel with a first iteration of the plurality of functions. A result of the predetermined functions started during the first iteration may be used in a second iteration. An output of the bundle adjustment may then be generated for successive iterations. | 2020-11-05 |
20200349342 | ULTRASOUND FACE SCANNING AND IDENTIFICATION APPARATUSES AND METHODS - An electronic face-identification device, which performs face scanning with ultrasonic waves, includes a housing and an ultrasound device disposed within the housing. The ultrasound device may be configured to transmit ultrasonic waves through air to a face and scan the face with the ultrasonic waves, to receive reflected waves through the air corresponding to reflections of the ultrasonic waves from the face, and to perform a recognition process for the face based on reflections of the ultrasonic waves from the face. The ultrasound device may include a plurality of ultrasound transducers, and electronic circuitry configured to transmit signals to the ultrasound transducers and receive signals from the ultrasound transducers. The face-identification device may be incorporated into various electronic equipment, such as hand-held equipment in the form of smartphones and tablet computers, as well as in larger scale installations at airports, workplace entryways, and the like. | 2020-11-05 |
20200349343 | INFORMATION PROCESSING APPARATUS, PROGRAM, AND INFORMATION PROCESSING METHOD - Provided is an information processing apparatus capable of preventing unauthorized collation. | 2020-11-05 |
20200349344 | FACIAL RECOGNITION FOR MULTI-STREAM VIDEO USING HIGH PROBABILITY GROUP - Techniques are provided for facial recognition using a high probability group database. One method comprises maintaining (i) a first database of facial images of individuals, and (ii) a second database of facial images comprising a subset of the individuals from the first database based on a probability of individuals appearing in sequences of image frames at a given time; applying a face detection algorithm to sequences of image frames to identify one or more faces in the sequences of images; and applying a facial recognition to at least one sequence of image frames using at least the second database to identify one or more individuals in the at least one sequence of image frames. The second database is comprised of facial images of: (i) individuals from multiple angles; (ii) individuals that appeared in prior image frames; and/or (iii) individuals that appeared in an image frame generated by a plurality of cameras. | 2020-11-05 |
20200349345 | CAMERA ENHANCED RIDE SHARING - In a system for video data capture and sharing client devices may include one or more video cameras and sensors to capture video data and to generate associated metadata. A cloud-based component may receive metadata from the client devices and requests for sharing video data captured by other client devices. The system can be used to implement a ridesharing method to connect a rider to a driver. Information about the driver and rider is accessed when a driver accepts a ridesharing request. Camera devices in the pickup area can detect the license plate of the driver's vehicle to confirm its arrival and a client device in the vehicle can facially recognize the driver at the wheel. Similarly, the location of the rider in the pickup area can be verified, for example through a face recognition scan. Once both driver and rider are verified, they are notified of their presence in the pickup area and linked, for example by identifying the rider in an augmented reality display in the driver's vehicle and by displaying an image of the rider on a side-facing display. | 2020-11-05 |
20200349346 | FACIAL RECOGNITION FOR MULTI-STREAM VIDEO USING HIGH PROBABILITY GROUP AND FACIAL NETWORK OF RELATED PERSONS - Techniques are provided for facial recognition using a high probability group database and a facial network of related persons. One method comprises maintaining a probability-based database of facial images comprising a subset of individuals from a first database of facial images of a plurality of individuals based on a probability of individuals appearing in sequences of image frames at a given time; applying a face detection algorithm to at least one sequence of image frames to identify one or more faces in the sequences of image frames; maintaining a facial network of related persons associated with the probability-based database by obtaining facial images of one or more additional individuals from the first database that satisfy a predefined related person criteria with respect to individuals identified in at least one sequence of image frames; and applying a facial recognition to at least sequence of image frames using at least the probability-based database and the facial network of related persons to identify individuals in the sequence of image frames. | 2020-11-05 |
20200349347 | SYSTEMS AND METHODS FOR MONITORING AND RECOGNIZING HUMAN ACTIVITY - A monitoring and analysis system can display the movements of a person to be monitored using stick figures and without reveling the pictures or identity of the person. The stick figures can be analyzed to detect an unusual or potentially dangerous activity undertaken by the person. | 2020-11-05 |
20200349348 | METHOD FOR PERSON RE-IDENTIFICATION IN ENCLOSED PLACE, SYSTEM, AND TERMINAL DEVICE - The present disclosure provides a method, system, and terminal device for re-identifying a person in a closed place, relating to the field of video processing technologies. The method comprises: dividing a closed place into a plurality of regions comprising an entrance region, any of the regions comprising at least one camera for photographing; confirming a person first entering based on a trajectory tracking of the person in the entrance area, and assigning a unique identity number to the person, acquiring and recording feature information thereof and binding the identity number with the feature information; and when re-identification of a person in the closed place is performed, matching person's feature information captured by the camera of the region where the person is, with recorded feature information selecting the identity number bound with recorded feature information that best matches the feature information of the person as the identity number of the person. | 2020-11-05 |
20200349349 | Human Body Recognition Method And Apparatus, And Storage Medium - The present disclosure provides a human body recognition method and apparatus, and a storage medium, the method comprising: determining a coordinate of a target person in a three-dimensional space according to images containing the target person collected by at least two cameras; calculating back-projection errors of the target person under different cameras respectively according to the coordinate of the target person in the three-dimensional space; determining whether the cameras have a human body recognition error according to the back-projection errors of the cameras; when a camera has the human body recognition error, performing re-recognition of the target person under the camera by using person re-identification ReID, until the back-projection errors of all the cameras containing the target person are not greater than a preset threshold. The present disclosure can improve accuracy of the human body recognition result effectively. | 2020-11-05 |
20200349350 | METHODS AND APPARATUS FOR VENUE BASED AUGMENTED REALITY - In one general aspect, a method can include receiving a representation of a real-world scene captured by a user using a mobile device where the real-world scene is a portion of a real-world physical area. The method can include associating a location of the mobile device with an AR anchor based on a comparison of the representation of the real-world scene with a portion of a model of the real-world physical area. The method can include triggering display of an AR object associated with the model of the real-world physical area within the mobile device based on the location of the mobile device. | 2020-11-05 |
20200349351 | DERIVING INFORMATION FROM IMAGES - The described implementations relate to images and depth information and generating useful information from the images and depth information. One example can identify planes in a semantically-labeled 3D voxel representation of a scene. The example can infer missing information by extending planes associated with structural elements of the scene. The example can also generate a watertight manifold representation of the scene at least in part from the inferred missing information. | 2020-11-05 |
20200349352 | SYSTEM AND METHOD FOR QUANTIFYING AUGMENTED REALITY INTERACTION - Systems, methods, and computer-readable storage media for quantifying augmented reality interaction. An exemplary system can be configured to capture, via a camera of a mobile computing device, a video feed, and extract, via a processor of the mobile computing device, an image from the video feed. The system can then determine, via the processor, that the image corresponds to a stored image in a plurality of stored images stored in an image database, resulting in a determination, and retrieve, via the processor and based on the determination, interactive content associated with the stored image. The system can then display, via a display of the mobile computing device, the interactive content as an augmented reality overlay. | 2020-11-05 |
20200349353 | METHOD AND APPARATUS FOR IDENTIFYING A DAMAGED PART OF A VEHICLE, SERVER, CLIENT AND SYSTEM - Disclosed in the embodiments of the present application are method and apparatus for identifying damaged part of vehicle, server, client and system. The method comprises: pre-establishing identifiable vehicle feature library including vehicle parts and feature correspondence library including relative positional relationships of these parts. During the loss assessment image capturing procedure, the user manually delineates the damage location on the client. The identifiable vehicle features in the image can be identified by the server, the relative positions of the identifiable features and the mark delineated by user are determined according to these identifiable features. This relative position is matched in the feature correspondence library to determine the damaged part, enables assisted locating of the damage location by manual and simple operations by the user at the scene, assists insurance companies in locating damaged part of vehicle, thereby improving the accuracy and processing efficiency of identifying damaged part in loss assessment. | 2020-11-05 |
20200349354 | COGNITIVE LOAD REDUCING PLATFORM FOR FIRST RESPONDERS - A platform comprises one or more sensors that collect information about an environment as sensor data. A processor is in communication with the one or more sensors, wherein the processor executes enhancement engines that processes the sensor data into enhanced characterization data having a reduced amount of data compared to the sensor data. An output device electronically communicate the enhanced characterization data to a user, wherein the sensor and the output device comprise an assisted perception module worn by the user during an incident. A command interface device remote from the user to enable a person of authority to manage the incident and the user by receiving and displaying the enhanced characterization data, and by transmitting data and commands back to the assisted perception module. | 2020-11-05 |
20200349355 | METHOD FOR DETERMINING REPRESENTATIVE IMAGE OF VIDEO, AND ELECTRONIC APPARATUS FOR PROCESSING THE METHOD - Provided are a method for determining a representative image of a video with reference to a representative object, and an electronic apparatus for processing the method. A method for determining a representative image of a video may comprise acquiring a video, determining a representative object of the video from at least one object appearing in the video, and determining a representative image of the video on the basis of an image score representing visual importance of the representative object. Accordingly, an image in which a representative object is the most visually conspicuous may be determined as a representative image of a video. | 2020-11-05 |