51st week of 2017 patent applcation highlights part 48 |
Patent application number | Title | Published |
20170364646 | METHOD AND SYSTEM FOR ANALYZING AND DISPLAYING OPTIMIZATION OF MEDICAL RESOURCE UTILIZATION - A computer implemented method and system for optimization of medical resource utilization within a set of physicians in order to calculate a potential cost savings opportunity is described. Input classified discharge data directed to cost information for service items grouped by a Diagnosis Related Group (DRG) is assigned to a physician which was most responsible for the resource utilization in treating the patient while the patient was hospitalized. For each DRG in the classified data, the responsible physicians are dynamically clustered based on resource utilization to identify the factors that are consistently different across the clustered physicians as a difference index value. The difference index value can be analyzed for determining potential cost savings opportunities. An interactive user interface can be used for entering discharge data, dynamically displaying resource utilization by the difference index value and potential cost savings opportunities. | 2017-12-21 |
20170364647 | AUTOMATED DERIVATION OF QUALITY ASSURANCE RULES - A system and method generates a rule set. The method being performed by a rule generating device includes receiving a plurality of previously generated reports where each of the previously generated reports includes respective analysis content of a respective image. The method includes generating a candidate rule based upon the analysis content where the candidate rule is configured to increase a quality assurance of future reports. The method includes generating a respective score for each candidate rule based upon the candidate rule and the previously generated reports. The method includes including the candidate rule into the rule set when the score is above a predetermined threshold. | 2017-12-21 |
20170364648 | MONITORING THE EXPOSURE OF A PATIENT TO AN ENVIRONMENTAL FACTOR - The invention suggests a system for monitoring the exposure of a patient ( | 2017-12-21 |
20170364649 | APPARATUS, PROCESS AND SYSTEM FOR MONITORING A PLURALITY OF PATIENTS AFFECTED BY KIDNEY FAILURE - An apparatus, a process and a system for monitoring a plurality of patients (P) affected by kidney failure over a time frame (T) are disclosed. The system includes blood treatment units, laboratory storage units, at least one hub module, and client units. The system collects values (VM) of a plurality of session parameters, set values (VS) of a plurality of prescription parameters, values (VL) of a plurality of laboratory parameters and the hub module stores values (KPVi) of selected parameters (KPi) which are a subclass of the collected values (VM, VS, VL) and which are transferred to the client units. Each client unit may define, for each of said patients, a number of indicators (IDk) based on the values (KPVi,k) taken by a respective subclass (KPi,k) of said selected parameters (KPi) and to operate the respective display according to various display modes. | 2017-12-21 |
20170364650 | MANAGING A THERAPEUTIC STATE BASED ON COGNITIVE, CONTEXTUAL, AND LOCATION-BASED ACTION RECOGNITION - Disclosed is a novel system, computer program product, and method for managing a therapeutic state of a subject of interest. A combination of location-based information, contextual-based information, and cognitive-based information is accessed for the subject of interest. A machine learning algorithm calculates a therapeutic state of the subject of interest using as inputs the location-based information, contextual-based information, and cognitive-based information. A predefined policy associated with the therapeutic state of the subject of interest. Based on the policy, the vital signs of the subject of interest are monitored. | 2017-12-21 |
20170364651 | Intelligent Patient Monitor Mount - Data that is derived from a medical device connected to or communicating with, a patient monitor mount, is detected by the patient monitor mount. The data is monitored for events associated with the medical device. The patient monitor mount then determines that the monitored event corresponds to an event. The patient monitor mount generates at least one command for a visualization device to change the data displayed on the visualization device. The command is then transmitted to the visualization device. Related apparatus, systems, methods and articles are also described. | 2017-12-21 |
20170364652 | METHOD FOR MANAGING THE PROTOCOLS USED BY DEVICES FOR DIAGNOSTIC AND CLINICAL ANALYSIS AND RESULTS OBTAINED FROM SUCH DEVICES - The present invention relates to a method for the management of the protocols used by devices for clinical-diagnostic analyses and the results obtained by said devices. The present invention further relates to the systems apt to perform such method. | 2017-12-21 |
20170364653 | MEDICAL DATA EXTRACTION AND MANAGEMENT FOR EFFICIENT, SECURE SUPPORT OF VARIOUS INFORMATION SYSTEMS - At a first computer connected to a medical monitoring device, first data are received from the monitoring device repetitively. The first computer is within a first local network, the monitoring device is configured to monitor characteristics of a patient, and the first data represent monitored characteristic(s) of the patient or associated metadata. The first data are sent from the first computer to a second computer via the local area network and a public network. The second computer is outside the first local area network and connected to the public network, and the first data is sent from the first computer to the second computer based on an IP address stored at the first computer. A value of one of the monitored characteristics is determined as within a predetermined range, and a polling frequency for each of the monitored characteristics is set to a common frequency based on that determination. | 2017-12-21 |
20170364654 | METHOD AND SYSTEM FOR FACILITATING PROVISIONING OF HEALTH DATA DURING EMERGENCIES - Disclosed is a method for facilitating provisioning of health data during emergencies. The method includes receiving a health data associated with an individual from an individual device. Further, the method includes storing the health data in association with an identifier associated with the individual. Yet further, the method includes receiving an indication of a medical emergency associated with the individual. Further, the method includes retrieving the health data associated with the individual based on receipt of the indication of the medical emergency. Further, the method includes receiving a location of the individual from a mobile device, wherein the mobile device is configured to detect the location. Moreover, the method includes identifying at least one professional device based on the location. Further, the method includes transmitting the health data to the at least one professional device. | 2017-12-21 |
20170364655 | MONITORING ADHERENCE TO A HEALTHCARE PLAN - Various aspects and embodiments relate to a healthcare adherence monitoring system (HAMS) that can be used to monitor adherence of a healthcare recipient to a healthcare plan (e.g., a medication, exercise, and nutrition regimen). The HAMS may receive a personalized prescription including one or more pre-coded prescription components and/or customized recommendations of the healthcare plan from a healthcare provider device via a communication network. The HAMS may then incorporate the received personalized prescription for the healthcare recipient into a healthcare mobile application that a healthcare recipient device can access via the communication network. The HAMS may further dynamically update the personalized prescription based on configuration parameters received from the healthcare mobile application on the healthcare recipient device via the communication network and communicate with the healthcare mobile application on the healthcare recipient device via the communication network to monitor the healthcare recipient's adherence to the dynamically updated personalized prescription. | 2017-12-21 |
20170364656 | COMMUNICATIVE WATER BOTTLE AND SYSTEM THEREOF - A communicative water bottle includes communication logic and wireless transmission logic technology electronically connected with a variety of sensors either on the water bottle or located remote from the water bottle. The sensors on the bottle create digital data associated with amount of fluid in the bottle and change thereof. The sensors remote from the bottle, which can be on an activity tracker, create digital data associated with an activity being performed by a user, such as running, or the absence of activity, such as remaining sedentary. A display on the bottle can indicate to the user the amount of fluid consumed or a reminder that fluid should be consumed. The fluid consumption data syncs with other remote devices such as mobile applications executable on smartphones. | 2017-12-21 |
20170364657 | METHOD FOR EVALUATING A SCORE REPRESENTING THE HEALTH OF A PATIENT AND PRODUCTS IMPROVING THE SCORE - A method for determining a numerical score representative of a patient's health, is characterized by the following steps. At an initial calibration step, a database is established from a series of indicators relating to the state of health of the patient, each indicator being assigned a numerical value, and afterwards a statistical analysis of this database is performed so as to establish for each of said indicators a score depending on a measured value of the indicators of the state of health with respect to reference values, and to establish at least four groups constituted by said indicators, each of said groups representing information corresponding respectively to oxidative stress, hereinafter Group 1; to functions of the digestive brain, hereinafter Group 2; to functions of the reptilian brain, hereinafter Group 3; and to physical abilities of the patient coupled to his information on his general state of health, hereinafter Group 4. Furthermore, a value is assigned to each group, then a health score S specific to the patient is calculated using the formula: | 2017-12-21 |
20170364658 | VASCULAR FLOW ASSESSMENT - A method for vascular assessment is disclosed. The method includes receiving a plurality of medical images of a portion of a vasculature of a subject and processing the medical images to produce a model of the vasculature. The method further includes obtaining a flow characteristic of the model and calculating an index indicative of vascular function, based, at least in part, on the flow characteristic in the model. | 2017-12-21 |
20170364659 | METHOD FOR DENTAL IMPLANT PLANNING, APPARATUS FOR SAME, AND RECORDING MEDIUM HAVING SAME RECORDED THEREON - The present invention relates to a method of dental implant treatment planning, a device and a recording medium therefore. The device for dental implant treatment planning according to the present invention can move or rotate the grouped objects together in 2D or 3D model about teeth arrangement for implant treatment planning with grouping function of the implant objects. So, it decreases complexity of manipulation of the implant objects, provides users with convenience to easily modify position or size of the implant objects, and improves the accuracy of the modification. | 2017-12-21 |
20170364660 | MEDICAL DEVICES AND RELATED EVENT PATTERN TREATMENT RECOMMENDATION METHODS - Infusion devices and related patient management systems and methods are provided. An exemplary method of presenting information pertaining to operation of an infusion device to deliver fluid to a body of a patient involves identifying a plurality of event patterns within different monitoring periods based on measurement values for the patient's condition, prioritizing the identified event patterns based on one or more prioritization criteria, filtering the prioritized list of identified event patterns based on one or more filtering criteria, and then providing a respective pattern guidance display for each identified event pattern remaining in the filtered prioritized list. In exemplary embodiments, a respective pattern guidance display includes graphical indicia of one or more remedial actions, such as recommended therapy modifications for addressing the respective event pattern. | 2017-12-21 |
20170364661 | HEALTH MONITORING - Technical solutions are described for monitoring health of a user by a healthcare system. An example computer-implemented method includes accessing a current image of the user. The computer-implemented method also includes determining a healthcare routine for the user. The computer-implemented method also includes generating a modified image of the user, where the modified image includes a predicted effect of the healthcare routine. The computer-implemented method also includes displaying, for viewing by the user, the modified image, and information about the healthcare routine. | 2017-12-21 |
20170364662 | ORTHODONTIC TREATMENT SIMULATION HAVING IMPROVED GRAPHICS PROCESSING FOR VIRTUAL MODELING - According to embodiments of the disclosed subject matter, a server can include processing circuitry configured to receive a virtual modeling file encoded with an orthodontic treatment plan such that the encoded information of the virtual modeling file format allows all steps of the orthodontic treatment plan to be displayed without a separate file for each treatment step. Additionally, the processing circuitry can be configured to download a first treatment step of the virtual modeling file format, receive gingiva and teeth geometries corresponding to the first treatment step, and display the first treatment step. Further, a selected treatment step can be displayed based on information encoded into the orthodontic virtual modeling file format. | 2017-12-21 |
20170364663 | GROUP PERFORMANCE MONITORING SYSTEM AND METHOD - The present invention provides group performance monitoring systems and methods. In one exemplary embodiment, a system for monitoring a plurality of individuals engaged in an activity includes a base station, a plurality of individual monitors configured to communicate wirelessly with the base station, a plurality of sensors, each sensor in communication with an individual monitor, each configured to be coupled to an individual, and each configured to sense a characteristic of the individual and to transmit, during the activity, data indicative of the characteristic to the individual monitor, and a group monitoring device configured to communicate wirelessly with the base station, wherein each individual monitor is configured to transmit, during the activity, the data to the base station, wherein the base station is configured to receive the data and to transmit, during the activity, a metric based on the data to the group monitoring device, and wherein the group monitoring device is configured to display a representation of the metric. | 2017-12-21 |
20170364664 | METHOD FOR STRATIFYING AND SELECTING CANDIDATES FOR RECEIVING A SPECIFIC THERAPEUTIC APPROACH - The disclosure concerns a method for patient stratification and selection of patients who are candidates for a specific therapy is described which is based on quantifying one or more digital image analysis feature distributions from stained tissue. The method extends beyond the abilities of a manual observer and a microscope, and generally comprises: acquiring digital images of stained tissue sections from patients submitted for evaluation, applying an algorithm process to said images with a computer to extract the morphometric and staining features of image pixels and tissue objects, deriving one or more distribution function for one or more image analysis features, calculating a summary statistic of the one or more distribution functions, and using said summary statistic along with an associated predefined patient stratification paradigm to separate a patient cohort into distinct strata which correspond to a decision to include or exclude a patient for a specific therapy. | 2017-12-21 |
20170364665 | Modifying a Cosmetic Product Based on a Microbe Profile - Systems and methods are described for modifying a cosmetic product based on a microbe profile including an ingredient-microbe interaction dataset including information associated with interactions between reference cosmetic ingredients and types of reference microbes; and a computing device including circuitry configured to receive information associated with the microbe profile of an individual, receive information associated with an ingredient list of the cosmetic product, compare the microbe profile of the individual and the ingredient list of the cosmetic product to the ingredient-microbe interaction dataset, identify an interaction between at least one cosmetic ingredient in the ingredient list of the cosmetic product and at least one of the one or more types of microbes in the microbe profile of the individual, recommend a modification to the ingredient list in response to an identified interaction, and report to a user the recommended modification. | 2017-12-21 |
20170364666 | K-MER BASED STRAIN TYPING - At least one of the disclosed embodiments describes a computer system that enables efficient strain typing by comparing strain k-mer profiles to generate a strain typing relationship mapping. The system may include one or more processors, and one or more hardware storage devices with stored computer-executable instructions. The instructions may cause the computer system to receive a set of nucleotide sequence data. The nucleotide sequence data may include a plurality of nucleotide sequence data structures each corresponding to a separate microbial strain to be analyzed. For each nucleotide sequence data structure, a k-mer profile may be generated. K-mer profiles may be compared to determine a similarity score between the k-mer profiles, which may indicate a relationship mapping of the respective microbial strains corresponding to the k-mer profiles. | 2017-12-21 |
20170364667 | PREMISES COMPOSITION & MODULAR RIGHTS MANAGEMENT - A multi-tired, modular, electronic system which utilizes restricted usage management. In a multi-tiered environment, lower tiered systems contain, based on configuration, mobile units that are capable of performing simple tasks such as lawnmowers, vacuum cleaners, mobile audio/video players to more complex ones capable of performing as human assistants such as robots. Higher tiered systems typically reside in the cloud. Lower tiered mobile units contain modular sensors such as temperature sensor and image/video cameras that generate vast amount of data. The lower tiered mobile units also contain modular emitters that consume vast amount of data. Restrictions for the usage of these mobile units are sent, in the form of metadata, to the lower tiered mobile units, from an intermediate to higher tiered control devices and the rendering app may limit the usage. The intermediate tiered renderer can interact to make sure rules have been followed. | 2017-12-21 |
20170364668 | METHOD FOR PROCESSING DATA - Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. | 2017-12-21 |
20170364669 | RESTRICTED ACCOUNTS ON A MOBILE PLATFORM - Systems and techniques are provided for restricted accounts on a mobile platform. A request to create a restricted account may be received. The restricted account may be a user account with a restriction. Credentials for the restricted account may be received. A restriction for the restricted account may be received. The restriction may include an access restriction or a lifetime restriction. An access restriction may prevent an application from accessing the restricted account and a lifetime restriction may limit the lifetime of the restricted account. The restricted account may be stored with the credentials and the restriction. A request may be received for a list of user accounts from an application. The restricted account may be determined to include an access restriction that prevents the application from accessing the restricted account. The list of user accounts may be sent to the application and without an identifier for the restricted account. | 2017-12-21 |
20170364670 | ELECTRONIC DEVICE AND WORKING MODE SELECTING METHOD THEREOF - A method for an electronic device to restrict functionality according to working mode is provided. The method establishes a fingerprint database, wherein the fingerprint database stores at least one fingerprint of each authorized user for unlocking the electronic device, a finger type corresponding to each fingerprint stored in the fingerprint database, and a preset finger area corresponding to each finger type stored in the fingerprint database. A fingerprint of a user is obtained through a sensor. The fingerprint is matched against database for authorized status and size of fingerprint currently obtained is also analyzed and compared to a preset size of the type corresponding to the obtained fingerprint. The electronic device is unlocked for an authorized user and controlled to enter into an unrestricted working mode for an adult or into a restricted working mode for a child, according to the comparison. | 2017-12-21 |
20170364671 | MOBILE WIRELESS HAND-HELD IDENTIFICATION SYSTEM AND BREATHALYZER - A mobile, wireless biometric identification system includes a biometric capture device which enables a smartphone, using a commercially established wireless communication networks, to capture a digital image of a human biometric (iris, fingerprint, etc.) for transmission to a central server. The biometric capture device captures a high quality image for encoding and comparison, while the overall system leverages the existing cellular communication network. The device can be used as an interface to medical databases and devices used to diagnose and treat patients. | 2017-12-21 |
20170364672 | METHOD AND MOBILE TERMINAL FOR CONTROLLING SCREEN LOCK - A method of controlling screen lock and a mobile terminal employing the same is provided. The mobile device includes a User Interface (UI) for setting a screen unlock mode using a wireless device other than the mobile terminal and stores IDentifier (ID) information of the wireless device designated by the UI corresponding to the screen unlock mode. The mobile terminal is capable of detecting a wireless device. After the ID information of the wireless device is stored, if the wireless device is detected by the mobile terminal and ID information of the detected wireless device is identical to the stored ID information, the mobile terminal controls not to display an unlock requesting screen when the display unit of the mobile terminal is turned on. | 2017-12-21 |
20170364673 | DEVICE SECURITY VIA SWIPE PATTERN RECOGNITION - One embodiment provides a method for ensuring device security via swipe pattern recognition, the method comprising: utilizing at least one processor to execute computer code that performs the steps of: receiving, using a touch device, at least one swipe input of a user; determining, using the at least one processor, if the at least one swipe input matches a known swipe pattern of the user, the match requiring exceeding a match confidence level; and responsive to said determining, executing an action associated with the touch device. Other aspects are described and claimed. | 2017-12-21 |
20170364674 | METHODS AND SYSTEMS FOR ACCESSING A SECURE SYSTEM - Systems and methods are described for accessing a secure system requiring multi-point authentication by receiving an optical image, wherein the optical image includes at least a portion of an identification badge; determining a plurality of characteristics from the optical image of at least a portion of the identification badge; comparing one or more of the plurality of characteristics to a database of characteristics of authorized users; assigning a confidence factor based on the comparison; and prompting for a second form of authentication if the confidence factor meets or exceeds a threshold or denying access to the secure system if the confidence factor does not meet or exceed the threshold. | 2017-12-21 |
20170364675 | Methods for User Authentication - Methods and systems for authenticating a user include presenting a list of themes on a user interface of a client device for user selection. Images of a plurality of objects and query prompts are presented on a client device for a theme selected from the list. Images of objects selected in response to the query prompts are received and verified to determine that the objects that are selected are theme-based objects and correspond to the query prompts. The selected objects are stored as answers to the query prompts identified for the theme and are used for authenticating the user during subsequent requests received from an application that is used to access a sensitive, digital asset. | 2017-12-21 |
20170364676 | AUTHENTICATION AND CONTROL OF ENCRYPTION KEYS - An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded. | 2017-12-21 |
20170364677 | USB STACK ISOLATION FOR ENHANCED SECURITY - Disclosed is a computer and method in a computer that detects attachment of an external device. A determination may be made whether the external device is trusted or untrusted. When the external device is deemed to be trusted, a first device stack may be instantiated in a first OS executing on the computer to conduct interactions with the external device. When the external device is deemed to be untrusted, a second device stack may be instantiated in a second OS executing on the computer to conduct interactions with the external device. | 2017-12-21 |
20170364678 | COGNIZANT ENGINES: SYSTEMS AND METHODS FOR ENABLING PROGRAM OBSERVABILITY AND CONTROLABILITY AT INSTRUCTION LEVEL GRANULARITY - The present invention is directed to system for and methods of real time observing, monitoring, and detecting anomalies in programs' behavior at instruction level. The hardware assist design in this invention provides fine grained observability, and controllability. Fine grained observability provides unprecedented opportunity for detecting anomaly. Controllability provides a powerful tool for stopping anomaly, repairing the kernel and restoring the state of processing. The performance improvement over pure software approach is estimated to be many orders of magnitudes. This invention is also effective and efficient in detecting mutating computer viruses, where normal, signature based, virus detection is under performing. | 2017-12-21 |
20170364679 | INSTRUMENTED VERSIONS OF EXECUTABLE FILES - Examples described herein include receiving a loading request of an executable file from a requester. The executable file may include original content. Examples described herein also include determining an instrumented version of the executable file to provide to the requester based on a security policy, determining an existence of the instrumented version of the executable file on a storage, and providing the instrumented version of the executable file to the requester. The instrumented version may include protective content in addition to the original content of the executable file. | 2017-12-21 |
20170364680 | DETECTING ATTACKS BY MATCHING OF ACCESS FREQUENCIES AND SEQUENCES IN DIFFERENT SOFTWARE LAYERS - A number of events are counted in different layers of a computing environment during execution of a software application. The number of counted events can be compared to a previously generated cluster set to determine that at least one of the counted events is an outlier. Data can then be provided that characterizes the at least one of the counted events determined to be an outlier. In some cases, some or all of the functionality of the software application can be selectively disabled. Related apparatus, systems, techniques and articles are also described. | 2017-12-21 |
20170364681 | METHODS OF PRESERVING AND PROTECTING USER DATA FROM MODIFICATION OR LOSS DUE TO MALWARE - Methods of preserving and protecting user data from modification or loss due to malware are disclosed, as well as systems and computer program products related to the same. | 2017-12-21 |
20170364682 | APPARATUS, SYSTEM, AND METHOD FOR PROTECTING AGAINST KEYLOGGING MALWARE - An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself. | 2017-12-21 |
20170364683 | COMPUTING DEVICE SECURE BOOT - A device includes a processor, a hardware component, a communication channel between the processor and the hardware component, and a secure memory that stores a baseline value of an electrical characteristic of the connection. The processor is configured to determine, during a boot process of the computing device, a value of the electrical characteristic, the electrical characteristic being one or more of impedance, inductance, capacitance, or frequency response, determine whether the value is within a threshold amount of the baseline value, and, responsive to determining that the value of the electrical characteristic is within the threshold amount, complete the boot process, and, responsive to determining that the value of the electrical characteristic is not within the threshold amount, prevent the computing device from completing the boot process. | 2017-12-21 |
20170364684 | IN-MEMORY ATTACK PREVENTION - Examples relate to in-memory attack prevention. The examples disclosed herein enable obtaining, in response to a first boot command, a first encryption key generated based on a randomization process. The examples further enable determining whether first information of a page table indicates that a memory page is intended to be secure, the page table storing mapping between a virtual address of the memory page and a physical address of the memory page. In response to determining that the first information indicates that the memory page is intended to be secure, the examples further enable determining whether second information of the page table indicates that the memory page is encrypted. In response to determining that the second information indicates that the memory page is not encrypted, the examples further enable encrypting the memory page in a physical memory using the first encryption key. | 2017-12-21 |
20170364685 | PROVIDING SECURITY TO COMPUTING SYSTEMS - Described herein are methods, device, and systems that provide security to various computing systems, such as, smartphones, tablets, personal computers, computing servers, or the like. Security is provided to computing systems at various stages of their operational cycles. For example, a secure boot of a base computing platform (BCP) may be performed, and security processor (SecP) may be instantiated on the BCP. Using the SecP, an integrity of the OS of the BCP may be verified, and an integrity of a hypervisor may be verified. A virtual machine (VM) may be created on the BCP. The VM is provided with virtual access to the SecP on the BCP. Using the virtual access to the TAM, an integrity of the guest OS of the VM is verified and an integrity of applications running on the guest OS are verified. | 2017-12-21 |
20170364686 | AUTO-INJECTION OF SECURITY PROTOCOLS - A method for automatically enhancing security and fixing security vulnerabilities in the source code of a computer program in an object oriented run time environment includes evaluating the source code file of a monitored computer program. The source code file includes a plurality of class files. Each session includes two or more session segments. A security assessment on each of the plurality of class files is performed to identify one or more potential security issues associated with the plurality of class files. One or more security controls configured to address the identified potential security issues are automatically injected into a source code of one or more class files identified as having potential security issues. The automatically modified source code file of the monitored computer program is deployed to the run-time environment. | 2017-12-21 |
20170364687 | SEALED NETWORK INITIALIZATION - Embodiments are provided for initializing a sealed network. A sealed network does not require administrators and may run on hardware and software that has been stripped of privileged capabilities. In one embodiment, an obfuscator generates a root, which is the first instance of a sealed network, and the root presents a control panel allowing an authorized operator to further guide the network. In one embodiment, a new instance is added to a sealed network via the control panel. In one embodiment, a unique identifier is found in a network. | 2017-12-21 |
20170364688 | TECHNOLOGIES FOR TRUSTED I/O PROTECTION OF I/O DATA WITH HEADER INFORMATION - Technologies for trusted I/O include a computing device having a hardware cryptographic agent, a cryptographic engine, and an I/O controller. The hardware cryptographic agent intercepts a message from the I/O controller and identifies boundaries of the message. The message may include multiple DMA transactions, and the start of message is the start of the first DMA transaction. The cryptographic engine encrypts the message and stores the encrypted data in a memory buffer. The cryptographic engine may skip and not encrypt header data starting at the start of message or may read a value from the header to determine the skip length. In some embodiments, the cryptographic agent and the cryptographic engine may be an inline cryptographic engine. In some embodiments, the cryptographic agent may be a channel identifier filter, and the cryptographic engine may be processor-based. Other embodiments are described and claimed. | 2017-12-21 |
20170364689 | TECHNOLOGIES FOR SECURELY BINDING A PLATFORM MANIFEST TO A PLATFORM - Technologies for securely binding a manifest to a platform include a computing device having a security engine and a field-programmable fuse. The computing device receives a platform manifest indicative of a hardware configuration of the computing device and a manifest hash. The security engine of the computing device blows a bit of a field programmable fuse and then stores the manifest hash and a counter value of the field-programmable fuse in integrity-protected non-volatile storage. In response to a platform reset, the security engine verifies the stored manifest hash and counter value and then determines whether the stored counter value matches the field-programmable fuse. If verified and current, trusted software may calculate a hash of the platform manifest and compare the calculated hash to the stored manifest hash. If matching, the platform manifest may be used to discover platform hardware. Other embodiments are described and claimed. | 2017-12-21 |
20170364690 | TECHNIQUE FOR POSITION CALCULATION OF A RECEIVER VIA USE OF ENCRYPTED SIGNALS OF A PUBLIC REGULATED SERVICE - A method for determining a position of a receiver via use of encrypted signals of a public regulated service. The method comprises transmitting PRN code chips to the receiver by an assistance server. The method further comprises storing the transmitted PRN code chips to be used before a designated time interval by the receiver. The method further comprises receiving the encrypted signals during the designated time interval by the receiver from satellites in line-of-sight to the receiver. The method further comprises determining the position of the receiver via use of the encrypted signals and the stored PRN code chips by the receiver. | 2017-12-21 |
20170364691 | Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal - The present document discloses methods, systems and terminals for controlling encryption of information and analyzing information. The method for controlling encryption of information includes: determining a content of a message required to be encrypted when it is detected that the message needs to be encrypted and transmitted; combining and encrypting the content of the message required to be encrypted and a time parameter indicating a decryption time limit of the message to generate an encrypted data block; and sending the message in which the encrypted data block is carried. | 2017-12-21 |
20170364692 | ELECTRONIC FILE SHARING LINK GRANULARITY - An electronic file sharing system includes a data store, a processor, and memory. The memory is coupled to the processor and stores instructions that when executed by the processor, provide electronic file storage relative to the data store. The processor is configured to detect a first sharing operation from a first entity to share a selected electronic file with a second entity to allow the second entity to interact with the selected electronic file in a way set by the first entity. The processor is further configured to generate a first sharing link for the second entity to access the selected electronic file in the way set by the first entity. The processor is also configured to detect a second sharing operation from an entity other than the first entity to share the selected electronic file with a third entity in the way set by the first entity and to generate a second sharing link for the third entity to access the selected electronic file in the way set by the first entity. The first sharing link is different than the second sharing link. | 2017-12-21 |
20170364693 | SYSTEMS AND METHODS FOR EFFICIENT ACCESS CONTROL - An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data files from the non-transitory memory medium; and sending the data files to the user, if the access is granted. | 2017-12-21 |
20170364694 | PLATFORM MANAGEMENT OF INTEGRATED ACCESS OF PUBLIC AND PRIVATELY-ACCESSIBLE DATASETS UTILIZING FEDERATED QUERY GENERATION AND QUERY SCHEMA REWRITING OPTIMIZATION - Various techniques are described for platform management of integrated access of public and privately-accessible datasets utilizing federated query generation and query schema rewriting optimization, including receiving at a dataset access platform a query formatted according to a first data schema, generating a copy of the query, saving the query and the copy to a datastore, parsing the copy of the query in the first schema using an inference engine, determining whether the query comprises data associated with an access control condition associated with accessing the dataset, the access control condition being configured to indicate whether the query is permitted to access the dataset, and rewriting, using a proxy server, the copy of the query in a second schema, and optimizing the rewriting by identifying a database engine to execute the query and including other data converted into another triple associated with an attribute of the query. | 2017-12-21 |
20170364695 | SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING CROSS-ORGANIZATIONAL DATA SHARING - In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing cross organizational data sharing including, for example, means for storing customer organization data in a database of the host organization; allocating at least a sub-set of the customer organization data to be shared as shared data; configuring a hub to expose the shared data to a proxy user and configuring the proxy user at the hub with access rights to the shared data; configuring one or more spokes with access rights to the shared data of the hub via the proxy user; receiving a request from one of the hubs for access to the shared data of the customer organization via the proxy user at the hub; and returning a response to the hub having made the request. Other related embodiments are disclosed. | 2017-12-21 |
20170364696 | METHOD FOR FILTERING DOCUMENTS AND ELECTRONIC DEVICE - Embodiments of the present disclosure relate to a method and apparatus for document retrieval. The method comprises: determining, in response to receiving a request to retrieve a document from a user, information for the user; obtaining, based on the determined information, ACL information for the user from an ACL index, the ACL index indicating access right of at least one user to the document; and determining, based on the ACL information of the user, a document to be provided to the user from retrieved documents in response to the request. According to the embodiments of the present disclosure, the retrieval efficiency may be enhanced. | 2017-12-21 |
20170364697 | DATA INTERWORKING METHOD AND DATA INTERWORKING DEVICE - A data interworking method and a data interworking device are provided. The implementation of the method comprises: receiving first data and second data, wherein the first data are associated with a first user identity of a first platform, and the second data are associated with a second user identity of a second platform; generating a uniform user identity of a user corresponding to the first user identity and/or the second user identity in response to a request of the user, and obtaining result data corresponding to the uniform user identity of the user according to the first data and the second data; and storing the result data and the uniform user identity. The method can realize data interworking of associated users under account number systems of different platforms so as to realize data fusion. | 2017-12-21 |
20170364698 | FRAGMENTING DATA FOR THE PURPOSES OF PERSISTENT STORAGE ACROSS MULTIPLE IMMUTABLE DATA STRUCTURES - Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields; segmenting a first value in the first subset; instructing a first computing device to store a first subset of segments among the plurality of segments in memory; and instructing a second computing device to store a second subset of segments among the plurality of segments in memory. | 2017-12-21 |
20170364699 | TRANSPARENT CLIENT APPLICATION TO ARBITRATE DATA STORAGE BETWEEN MUTABLE AND IMMUTABLE DATA REPOSITORIES - Provided is a process including: receiving a first write request from an application requesting to write data to a first remote database via a network; classifying the second value as higher-security; and in response to classifying the second value as higher-security, redirecting the second value from a destination specified by the application in the received first write request, wherein an attacker with full access to the first database does not have access to the second value classified as higher security, and wherein code of the application is not modified to interface with two databases in place of the first remote database. | 2017-12-21 |
20170364700 | IMMUTABLE LOGGING OF ACCESS REQUESTS TO DISTRIBUTED FILE SYSTEMS - Provided is a process including: receiving a request to access a distributed data store, wherein the distributed data store stores a plurality of units of content that are each distributed among multiple computing entities hosting different subsets of data of the distributed data store; and causing, with one or more processors of a computing device configured to participate in combining the information from the plurality of computing entities to access units of content, logging of the request in an entry in a tamper-evident log. | 2017-12-21 |
20170364701 | STORING DIFFERENTIALS OF FILES IN A DISTRIBUTED BLOCKCHAIN - Provided is a process including: receiving a request to write a new version of a document to a tamper-evident, immutable data repository; determining that the new version of the document is different from the previous version of the document; and in response to determining, storing a difference between the previous version of the document and the new version of the document in the tamper-evident, immutable data repository. | 2017-12-21 |
20170364702 | INTERNAL CONTROLS ENGINE AND REPORTING OF EVENTS GENERATED BY A NETWORK OR ASSOCIATED APPLICATIONS - Provided is a process including: obtaining, with a network controls engine, network traffic, wherein: the network traffic is sent across the network between source computing devices and destination computing devices; at least one of the source or destination computing devices are on a network carrying the network traffic; and the network has a plurality of computing devices causing the network traffic and which are assigned addresses on the network; applying, with the network controls engine, a plurality of rules to the network traffic to identify rules with criteria satisfied by the network traffic; and causing, with the network controls engine, one or more actions prescribed by one or more identified rules with criteria satisfied by the network traffic. | 2017-12-21 |
20170364703 | MANAGEMENT OF COLLABORATIVE DATASETS VIA DISTRIBUTED COMPUTER NETWORKS - Various embodiments relate generally to data science and data analysis, computer software and systems, and wired and wireless network communications to provide an interface between repositories of disparate datasets and computing machine-based entities that seek access to the datasets, and, more specifically, to a computing and data storage platform that facilitates consolidation of one or more datasets, whereby a collaborative data layer and associated logic facilitate, for example, efficient access to, and implementation of, collaborative datasets. In some examples, a method may include receiving a dataset and dataset attributes and identifying a first version of the dataset. The method may include identifying data that varies from a first version of the dataset, and generating a second version of the dataset to include a first subset and a second subset of atomized data. The method may include storing subsets of atomized data points as an atomized dataset. | 2017-12-21 |
20170364704 | PER-VOLUME TENANT ENCRYPTION AND EXTERNAL KEY MANAGER - A server node with one or more processors is configured to receive a request to write data to a storage medium and compress the data to yield compressed data. The one or more processors are further configured to encrypt the compressed data according to an encryption key to yield compressed and encrypted data. The one or more processors are further configured to hash the compressed and encrypted data to yield one or more block identifiers that uniquely represent the compressed and encrypted data. | 2017-12-21 |
20170364705 | METHOD AND SYSTEM FOR OBFUSCATION OF GRANULAR DATA WHILE RETAINING DATA PRIVACY - A method for obfuscating granular transaction data via the introduction of noise includes: storing transaction data entries, each including transaction data values including at least a transaction amount and merchant identifier; receiving a data request including selection criteria and desired metrics; identifying a subset of transaction data entries based on the selection criteria; identifying a metric value for each desired metric based on the corresponding transaction data value in each of the transaction data entries in the subset; inserting noise to modify the subset by (i) adjusting the transaction data values included in at least two of the transaction data entries, and/or (ii) adding at least one transaction data entry to and removing at least one transaction data entry from the subset, where the inserted noise adjusts the metric values within a predetermined range; and transmitting the modified subset. | 2017-12-21 |
20170364706 | File Protection Method and Apparatus - A file protection method, to resolve a problem that privacy of a file cannot be ensured by manually hiding the file or manually encrypting the file, is presented. The method includes obtaining, by a terminal device, a target file; determining, by the terminal device, whether the target file satisfies a preset file condition; when the target file satisfies the preset file condition, determining, by the terminal device, whether the target file satisfies a corresponding preset protection condition; and when the target file satisfies the preset protection condition, applying, by the terminal device, a corresponding protection solution to the target file. The embodiments of the present disclosure further provide a corresponding file protection apparatus. | 2017-12-21 |
20170364707 | TECHNOLOGIES FOR TRUSTED I/O WITH A CHANNEL IDENTIFIER FILTER AND PROCESSOR-BASED CRYPTOGRAPHIC ENGINE - Technologies for trusted I/O include a computing device having a processor, a channel identifier filter, and an I/O controller. The I/O controller may generate an I/O transaction that includes a channel identifier and a memory address. The channel identifier filter verifies that the memory address of the I/O transaction is within a processor reserved memory region associated with the channel identifier. The processor reserved memory region is not accessible to software executed by the computing device. The processor encrypts I/O data at the memory address in response to invocation of a processor feature and copies the encrypted data to a memory buffer outside of the processor reserved memory region. The processor may securely clean the processor reserved memory region before encrypting and copying the data. The processor may wrap and unwrap programming information for the channel identifier filter. Other embodiments are described and claimed. | 2017-12-21 |
20170364708 | PEER INTEGRITY CHECKING SYSTEM - A distributed file integrity checking system is described. The described peer integrity checking system (PICS) may negate an attack by storing a properties database amongst nodes of a peer-to-peer network of hosts, some or all of which co-operate to protect and watch over each other. | 2017-12-21 |
20170364709 | RELIABILITY ENHANCEMENT METHODS FOR PHYSICALLY UNCLONABLE FUNCTION BITSTRING GENERATION - A Hardware-Embedded Delay Physical Unclonable Function (“HELP PUF”) leverages entropy by monitoring path stability and measuring path delays from core logic macros. Reliability and security enhancing techniques for the HELP PUF reduce bit flip errors during regeneration of the bitstring across environmental variations and improve cryptographic strength along with the corresponding difficulty of carrying out model building attacks. A voltage-based enrollment process screens unstable paths on normally synthesized (glitchy) functional units and reduces bit flip errors by carrying out enrollment at multiple supply voltages controlled using on-chip voltage regulators. | 2017-12-21 |
20170364710 | Apparatus and Method for Obfuscating Power Consumption of a Processor - An apparatus for obfuscating power consumption associated with one or more operations of a logic circuitry of a processor. The apparatus comprises counterbalance circuitry configured to provide a second power consumption to directly counterbalance the power consumption associated with the one or more operations of the logic circuitry. The second power consumption varies inversely with the power consumption associated with the one or more operations of the logic circuitry. The apparatus further comprises header circuitry configured to enable a common node to vary in voltage corresponding to the one or more operations of the logic circuitry. The counterbalance circuitry and the header circuitry are each coupled to the logic circuitry at the common node. | 2017-12-21 |
20170364711 | SECURE ELEMENT - The invention relates to a secure element device comprising at least one processor, at least one communication interface, at least one memory RAM and NVM and at least one bus access controller, wherein the bus access controller defines at least a first area PBL, a second area SBL and a secure area MZ. The first area comprises a first loader program capable of loading a program package in the second area. The secure area comprises an authentication key capable of authenticating the program package loaded in the second area. After authentication of the program package loaded in the second area, the access right of the first loader program is changed in such a way that a program in the first area can no more access the second area. | 2017-12-21 |
20170364712 | TECHNOLOGIES FOR SECURE INPUT/OUTPUT DEVICE ACTIVATION - Technologies for secure input/output device activation include a compute device to identify an attempt to activate an input/output device of the compute device, notify a controller of the compute device of the attempt to activate the input/output device via a communication channel that is out-of-band relative to an operating system of the compute device, determine whether to authorize activation of the input/output device based on a security policy, and allow the input/output device to resume activation in response to a determination that the security policy authorizes the activation. The security policy indicates whether one or more applications are authorized to access the input/output device. | 2017-12-21 |
20170364713 | COMPUTING SYSTEMS AND METHODS - A security device for a local computer, said security device comprising a locked-down system environment that includes a remote-access connector and an authenticator facility. The remote-access connector initiates a remote connection request with a virtual-computer service. The authenticator facility provides first authentication-data to the remote-access connector for ensuring that the security device has permission to be allocated a virtual computer from the virtual-computer service. | 2017-12-21 |
20170364714 | COMBINED READING APPARATUS FOR IDENTIFYING PRODUCT - Disclosed herein is a combined reading apparatus for identifying a product. According to a first aspect of the present invention, a combined reading apparatus may include: a plate panel configured to recognize Radio Frequency Identification (RFID) tag information, configured such that an antenna adapted to transmit and receive a Radio Frequency (RF) signal to and from an RFID tag is included therein, and formed in a plate shape having predetermined lengths in a horizontal direction and a height direction; a connection bar coupled to one side of the plate panel, configured to support the plate panel, and configured to extend from the plate panel in the horizontal direction; a grip formed in a bar shape so as to be held by a hand, spaced apart from the plate panel, and coupled to the connection bar; and a control unit configured to control the RF transmission and reception of the antenna. | 2017-12-21 |
20170364715 | Methods for Recovering RFID Data Based Upon Probability Using an RFID Receiver - RFID data signals from RFID tags may be recovered by determining the probabilities of transitions between data states between a series of a pairs of signal samples using a set of predetermined probabilities related to data, timing, baud rate and/or phase variables affecting the received signal and processing those determined probabilities to determine the sequence of such transitions that has the highest probability of occurrence. A second set of predetermined probabilities related to transitions in the opposite direction may be used to sequence in a reverse direction. The determination of the sequence representing the RFID tag data may be iterated in both directions until further iterations do not change the determined probabilities. | 2017-12-21 |
20170364716 | METHOD FOR RETRIEVING A SHUT STATE AND/OR A LOCATION OF A CLOSABLE CONTAINER AND WELL AS CLOSABLE CONTAINERS - The invention relates to a method for retrieving a shut state and/or a location of a closable container as well as closable containers, wherein a transition between an open position and a closed position is achieved by a relative movement at least of a first container part with respect to a second container part, wherein the container has at least one RFID chip having a connected near field antenna and a far field antenna and the RFID chip having the connected near field antenna is arranged at the first or at the second container part and the far field antenna is arranged at the other one of the first and second container part, respectively, and the near field antenna, which is connected to the RFID chip, is arranged, as compared to the far field antenna, such that, in the closed position of the container, a noncontact electromagnetic coupling takes place between the near field antenna and the far field antenna. In the context of the method, due to the interaction of a sending unit and a receiving unit, a response signal can by generated by means of the RFID chip and can be transmitted, the range of said response signal depending on the shut position of the container. | 2017-12-21 |
20170364717 | Wireless User Authentication System - A wireless user authentication system uses an AIDC device and a wireless reader to verify the identity of an individual. The AIDC device is a key fob that contains the user's credentials. The wireless reader is a device that wirelessly interrogates the AIDC device to ascertain the user's credentials. The wireless reader has a casing an interface window, a component cavity, a control panel, multiple antenna spacers, an antenna, and a processing unit. The casing is an enclosure that houses the components of the wireless reader within the component cavity. The interface window is hole that enables the user to access the control panel. the antenna spacers are rigid beams that retain the processing unit in a position that is offset from the control panel. Additionally, the antenna is wound around the antenna spacers and retained in a configuration that facilitates wirelessly communicating with the AIDC device. | 2017-12-21 |
20170364718 | SYSTEMS AND METHODS FOR COMPENSATION OF INTERFERENCE IN RADIOFREQUENCY IDENTIFICATION (RFID) DEVICES - Systems and methods for compensating for interference in radiofrequency identification (RFID) devices are provided. One system includes an RFID antenna structure having a fixed antenna having a plurality of loops, one or more additional inductive loops and a switching arrangement coupled with the one or more additional inductive loops. The RFID antenna structure further includes a controller configured to control the switching arrangement to selectively switch the one or more additional inductive loops to change an inductance of the fixed antenna. | 2017-12-21 |
20170364719 | SYSTEMS AND METHODS FOR UNIVERSAL TOLL MODULE - A system includes a communication device and a user interface. The communication device includes a universal toll module configured to transmit a toll signal that includes at least one electronic toll code to be communicated to an electronic toll system. The universal toll module is communicatively coupled to a vehicle bus of the vehicle. The user interface is communicatively coupled to the vehicle bus. | 2017-12-21 |
20170364720 | DETERMINING A LOCATION BASED ON RADIO FREQUENCY IDENTIFICATION (RFID) READ EVENTS - Techniques for determining an item location based on multiple RFID parameters from multiple read events are described. In an example, a computer system may access a first read event. A first RFID reader located within a first zone may have generated the first read event at a first time. The first read event may identify an RFID tag and may include first RFID parameters. The computer system may access a second read event. A second RFID reader located within a second zone may have generated the second read event at a second time within a predefined amount of time from the first time. The second read event may identify the RFID tag and include second RFID parameters. The computer system may determine whether the item location falls within the first zone or the second zone based on two or more first RFID parameters and two or more second RFID parameters. | 2017-12-21 |
20170364721 | DATA COLLECTION SYSTEM HAVING RECONFIGURABLE DATA COLLECTION TERMINAL - There is provided in one embodiment a data collection system including a data collection terminal having an encoded information reader device and a computer spaced apart from the data collection terminal. The data collection terminal in one embodiment can be configured to be responsive to configuration data expressed in an extensible markup language. | 2017-12-21 |
20170364722 | EYE GAZE DETECTION CONTROLLED INDICIA SCANNING SYSTEM AND METHOD - By tracking a user's eyes, an indicia scanning system can make educated guesses as to what the user is interested in. This insight could be useful in dynamically configuring a camera system, configuring an indicia decoding process or even as a method to select data that the user is interested in. | 2017-12-21 |
20170364723 | POSITION SPECIFYING APPARATUS AND POSITION SPECIFYING METHOD - A measurement apparatus includes an image acquisition part that acquires a captured image obtained by imaging a partial area on a two-dimensional scale on which a plurality of two-dimensional codes having a first code, which is specified by a combination pattern of a first pixel value image and a second pixel value image, and a second code, which is specified by a pattern of a type different from the combination pattern, are arranged, a code specification part that specifies the first code and the second code corresponding to the two-dimensional code included in the captured image, and a position specification part that specifies position information on the two-dimensional scale of the two-dimensional code including the first code and the second code on the basis of the first code and the second code. | 2017-12-21 |
20170364724 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND IMAGE PROCESSING SYSTEM - An image processing apparatus includes an acquisition unit that acquires setting information acquired from a captured image, a setting unit that performs, based on the acquired setting information, setting regarding image analysis processing to be performed on a captured image obtained by capturing an image of a predetermined monitoring target range. | 2017-12-21 |
20170364725 | CLUSTER COMPUTING OF BAR CODE DATA - A reading system including: a primary reader for reading an information bearing device (IBD) having encoded IBD data provided therein for packetizing the encoded data and processing a first data packet of the packetized encoded data and transmitting a second data packet of the packetized encoded data; at least one auxiliary reader for receiving and processing the second data packet and the transmitting the processed second data packet; and wherein the processed first and second data packets are combined to produce decoded IBD data. | 2017-12-21 |
20170364726 | FINGERPRINT SENSOR DEVICE AND METHODS THEREOF - A fingerprint sensor device includes a sensor substrate, a plurality of sensor circuits over a first surface of the sensor substrate, and a transceiver layer located over the plurality of sensor circuits and the first surface of the sensor substrate. The transceiver layer includes a piezoelectric layer and a transceiver electrode positioned over the piezoelectric layer. The piezoelectric layer and the transceiver electrode are configured to generate one or more ultrasonic waves or to receive one or more ultrasonic waves. The fingerprint sensor device may include a cap coupled to the sensor substrate and a cavity formed between the cap and the sensor substrate. The cavity and the sensor substrate may form an acoustic barrier. | 2017-12-21 |
20170364727 | DISPLAY DEVICE - A display device, including a display panel and a transparent cover plate disposed on the display panel, a first side of the transparent cover plate close to the display panel is provided with a full-screen fingerprint sensor and a fingerprint identification alarm circuit. The full-screen fingerprint sensor is configured to acquire fingerprint information at a surface of a second side of the transparent cover plate opposite to the first side, including a receiving unit, an extracting unit, a comparison unit and an alarming unit which are connected successively. | 2017-12-21 |
20170364728 | APPARATUS FOR DETECTING CUTANEOUS IMPRINTS - An apparatus for detecting false fingerprints, comprising: an optical element having a detection surface on which at least one body is intended to be positioned, of which cutaneous imprints are intended to be detected, an anti-fake illuminator configured to generate at least one bright zone and at least one dark zone on said detection surface, an optical sensor arranged to capture light radiation reflected/diffused by said detection surface. | 2017-12-21 |
20170364729 | DISPLAY APPARATUS AND DISPLAY CONTROL METHOD FOR DISPLAYING IMAGES - A display apparatus performs predetermined image processing on at least one image data item among the plurality of image data items, does not perform the predetermined image processing on at least another one image data item among the plurality of image data items, and to cause a display unit to display the plurality of image data items, if (A) it is determined, on the basis of meta-information associated with the plurality of image data items, that the plurality of image data items are image data items that have been output from a single image output apparatus, or if (B) it is determined that a display mode is set in which a plurality of image data items are to be displayed, the plurality of image data items including a first image data item and a second image data item generated by duplicating the first image data item. | 2017-12-21 |
20170364730 | FINGERPRINT ENTRY PROMPTING METHOD AND DEVICE - A fingerprint entry prompting method, includes: obtaining an i | 2017-12-21 |
20170364731 | ADAPTIVE SIGNAL DETECTION AND SYNTHESIS ON TRACE DATA - Systems and methods for detecting, decoupling and quantifying unresolved signals in trace signal data in the presence of noise with no prior knowledge of the signal characteristics (e.g., signal peak location, intensity and width) of the unresolved signals. The systems and methods are useful for analyzing any trace data signals having one or multiple overlapping constituent signals and particularly useful for analyzing data signals which often contain an unknown number of constituent signals with varying signal characteristics, such as peak location, peak intensity and peak width, and varying resolutions. A general signal model function is assumed for each unknown, constituent signal in the trace signal data. In a first phase, the number of constituent signals and signal characteristics are determined automatically in a parallel fashion by executing multiple simultaneous evaluations iteratively starting with an initial set of trial signals. Making simultaneous evaluations and systematically reducing the number of trial signals allows for convergence to an optimal, final set of signals in a very fast and efficient manner. | 2017-12-21 |
20170364732 | EYE TRACKING VIA PATTERNED CONTACT LENSES - A method includes sensing one or more pattern elements on a patterned contact lens on the eye of a person. Movement or direction of the person's eye is assessed based on the sensing of the one or more pattern elements. The pattern elements may be sensed using a single-pixel sensor. The pattern may include, for example, a pattern of elements having different colors. | 2017-12-21 |
20170364733 | SYSTEM FOR SIMPLIFIED GENERATION OF SYSTEMS FOR BROAD AREA GEOSPATIAL OBJECT DETECTION - A system for simplified generation of systems for analysis of satellite images to geolocate one or more objects of interest. A plurality of training images labeled for a study object or objects with irrelevant features loaded into a preexisting feature identification subsystem causes automated generation of models for the study object. This model is used to parameterize pre-engineered machine learning elements that are running a preprogrammed machine learning protocol. Training images with the study are used to train object recognition filters. This filter is used to identify the study object in unanalyzed images. The system reports results in a requestor's preferred format. | 2017-12-21 |
20170364734 | SYSTEMS AND METHODS FOR AUTOMATED METER READING - Systems and methods are provided for optically reading data from metering equipment by using a camera to record images of a meter, and converting the displayed data measurement regions of the images into alphanumeric data for reporting over a wireless network to a database system for storage, analysis and reporting. One implementation of the device is a water meter reading device integrated into a form factor that replaces the lid of a water meter box. The device captures images of the meter face, converts the images using optical character recognition software into usage data, meter identification and date/time of the data capture and sends the data to a database over a wireless data network. | 2017-12-21 |
20170364735 | FLIGHT VEHICLE AND FLIGHT VEHICLE TRACKING METHOD - A flight vehicle and a tracking method are disclosed. The method includes: collecting the flight vehicle's geographic location information and image data of the areas over which the flight vehicle flies; establishing a correspondence between the geographic location information and the image data collected at a same moment; and sending the foregoing data between which the correspondence is established. A receive end receives the geographic location information and the image data between which the correspondence is established; draws a flight path of the flight vehicle by using the geographic location information; obtains geographic location information corresponding to a location selected on the flight path, and displays image data corresponding to the geographic location information. Therefore i's convenient to obtain a geographic location corresponding to each frame of video image, which provides a basis for tracking the trajectory of the flight vehicle, and monitoring the flight status of the flight vehicle. | 2017-12-21 |
20170364736 | COMBINED BIOMETRICS CAPTURE SYSTEM WITH AMBIENT FREE IR - An apparatus for a combined camera system is described herein. The apparatus includes an adjustable infrared (IR) pass filter. A passband of the adjustable infrared (IR) pass filter is electrically adjusted. The apparatus also includes a rolling shutter sensor. An adjustable filter is to implement a global shutter and a rolling shutter sensor global reset. | 2017-12-21 |
20170364737 | GROUPING AND RANKING IMAGES BASED ON FACIAL RECOGNITION DATA - Technologies for grouping images, and ranking the images and the groupings, based on entities shown in the images. Images may be grouped based on faces shown in the images. Different images with faces that indicate the same entity (e.g., Adam) may be automatically grouped together. Different images with faces that indicate the same multiple entities (e.g., the people in my family) may also be automatically grouped together. Such automatic grouping may be based on facial recognition technologies. Further, images and groups of images may be automatically ranked based on the faces shown and entities represented. Such rankings may also be influenced by adjacent data that indicates family and friends and the like, and that can be used to identify such entities in the images. | 2017-12-21 |
20170364738 | METHOD AND APPARATUS FOR DETECTING GLASSES IN A FACE IMAGE - This application discloses a method and a terminal for detecting glasses in a face image. The method includes: obtaining a face image; determining a nose bridge region in the face image; detecting an image change in the nose bridge region to obtain an image change result of the nose bridge region; and determining whether there are glasses in the face image according to the image change result of the nose bridge region. The terminal for detecting glasses in a face image matches the method. | 2017-12-21 |
20170364739 | FACIAL STRUCTURAL SHAPING - An eyebrow shaping method includes providing an image of a face. Multiple guidelines are determined on the image and points and areas are located via the guidelines. A face is shaped with contouring and lightening to have Golden Ratio proportions via the different points and zones. | 2017-12-21 |
20170364740 | SIGNAL PROCESSING - A computer-implemented method is provided for classifying an input signal against a set of pre-classified signals. A computer system may calculate, for each of one or more signals of the set of pre-classified signals, a parallelism value indicating a level of the parallelism between that signal and the input signal. The computer system may calculate, for a first subset of the set of pre-classified signals, a sparse vector, wherein each element of the sparse vector serves as a coefficient for a corresponding signal of the first subset. The computer system may determine, for each of the signals in the set of pre-classified signals, a similarity value indicating a level of similarity between that signal and the input signal. | 2017-12-21 |
20170364741 | COMPUTER-BASED MICRO-EXPRESSION ANALYSIS - A computer-implemented method of digital image analysis includes obtaining first digital video of a human subject that indicates facial expressions of the human subject; performing micro-expression analysis on the human subject using the first digital video; comparing results of the performed micro-expression analysis with content of a presentation determined to have been provided to the human subject at the same time that particular portions of the digital video were initially captured; and modifying a manner of performing interaction with the human subject or other human subjects based on the comparing of results. | 2017-12-21 |
20170364742 | LIP-READING RECOGNITION METHOD AND APPARATUS BASED ON PROJECTION EXTREME LEARNING MACHINE - Disclosed are a lip-reading recognition method and apparatus based on a projection extreme learning machine. The method includes: obtaining a training sample and a test sample that are corresponding to the projection extreme learning machine PELM, where the training sample and the test sample each include n videos, n is a positive integer greater than 1, the training sample includes a category identifier corresponding to each video in the training sample; training the PELM according to the training sample, and determining a weight matrix W of an input layer in the PELM and a weight matrix β of an output layer in the PELM, to obtain a trained PELM; and identifying a category identifier of the test sample according to the test sample and the trained PELM. The lip-reading recognition method and apparatus based on the projection extreme learning machine can improve lip-reading recognition accuracy. | 2017-12-21 |
20170364743 | OBJECT REJECTION SYSTEM AND METHOD - A system and method for detecting human intruders while rejecting/ignoring an occupant's registered pet. An object detection system is configured to detect an object that is present in a monitored area and generate a signal output relative to the type of object. A signature processor is configured to receive the generated signal output and produce an object signature, and compare a threshold signature to the object signature, wherein the threshold signature is generated using a photograph of a reserved object, and wherein the object detection system rejects the detected object when the object signature is determined to be similar to the threshold signatures. | 2017-12-21 |
20170364744 | NEURAL NETWORK BASED RECOGNITION OF MATHEMATICAL EXPRESSIONS - Provided are methods and system for recognizing characters such as mathematical expressions or chemical formulas. An example method comprises the steps of receiving and processing an image by a pre-processing module to obtain one or more candidate regions, extracting features of each of the candidate regions by a feature extracting module such as a convolutional neural network (CNN), encoding the features into a distributive representation for each of the candidate regions separately using an encoding module such as a first long short-term memory (LSTM) based neural network, decoding the distributive representation into output representations using a decoding module such as a second LSTM-based recurrent neural network, and combining the output representations into an output expression, which is outputted in a computer-readable format or a markup language. | 2017-12-21 |
20170364745 | DELIVERY HANDLING APPARATUS, DELIVERY HANDLING METHOD, AND DELIVERY HANDLING PROGRAM - According to one embodiment, a delivery handling apparatus includes a recognition portion which performs an image recognition processing to an image imaged by an imaging portion to image a delivery object, to recognize information including an address given to the delivery object and a parameter selecting portion which sequentially selects parameter sets from a plurality of the parameter sets previously stored in a storage portion and a control portion which makes the parameter selecting portion sequentially select parameter sets from a plurality of the parameter sets, and the recognition portion perform an image recognition processing to an image with the parameter sets selected by the parameter selecting portion, and the parameter selecting portion select the parameter set satisfying a prescribed condition, based on a result of the image recognition processing corresponding to the respective parameter sets. | 2017-12-21 |