07th week of 2016 patent applcation highlights part 39 |
Patent application number | Title | Published |
20160048664 | USER DEVICE AND OPERATING METHOD THEREOF - An apparatus and security method are provided. The apparatus includes at least one communication interface and a controller. The controller is configured to discover, using the at least one communication interface, an external electronic device available for a communication connection with the apparatus, the discovering including receiving information from the external electronic device, adjust a security level for the apparatus based at least in part on the information, and control at least part of the apparatus using the adjusted security level. | 2016-02-18 |
20160048665 | UNLOCKING AN ELECTRONIC DEVICE - Unlocking an electronic device includes displaying, by a security module, a plurality of objects including at least one target object and at least one decoy object, where the at least one target object is obtained from a stored history of viewed objects, detecting, by the security module, a user selection from the plurality of objects, and in response to detecting that the user selection is one of the at least one target objects, unlocking, by the security module, the electronic device. | 2016-02-18 |
20160048666 | Triggering Actions on a User Device Based on Biometrics of Nearby Individuals - Methods, systems, and computer program products for automatically triggering actions on a user device based on biometrics of nearby individuals are provided herein. A method includes capturing, via one or more sensors resident on a first computing device, one or more items of biometric information from one or more individuals located within a given proximity of the first computing device; determining a degree of proximity of the one or more individuals to the first computing device; transmitting, to a second computing device, (i) the one or more captured items of biometric information from the one or more individuals and (ii) the determined degree of proximity of the one or more individuals to the first computing device; and automatically executing one or more actions on the first computing device based on an instruction provided by the second computing device in response to said transmitting. | 2016-02-18 |
20160048667 | METHOD AND DEVICE FOR MANAGING AUTHENTICATION USING AN IDENTITY AVATAR - Aspects of the subject disclosure may include, for example, generating a digital certificate responsive to an authentication of a user according to a dynamic biometric process, associating the digital certificate with a transaction record for the transaction, storing information associated with authentication conditions of the dynamic biometric process, receiving an access request associated with the transaction, and providing access to the transaction record, the information associated with the authentication conditions of the dynamic biometric process or a combination thereof responsive to the access request, where granting of the access is according to transmitting an access acknowledgement to equipment of the user, or obtaining another authentication to allow permission to access or a combination thereof. Other embodiments are disclosed. | 2016-02-18 |
20160048668 | COMPUTING DEVICE CHORDING AUTHENTICATION AND CONTROL - Chording techniques are described that may be utilized in a variety of ways to provide inputs to a computing device. The computing device, for instance, may include sensors disposed on a housing of the computing device such that the sensors are configured to detect fingers of a user when grasping the device. Detection of a likely indexed relative position of the fingers of the user's hand in relation to each other, and even an amount of pressure used by respective ones of the fingers, may be used to define and input chords that may be used to initiate operations of the computing device. | 2016-02-18 |
20160048669 | ACCESS AUTHORIZATION BASED ON SYNTHETIC BIOMETRIC DATA AND NON-BIOMETRIC DATA - A method of selectively authorizing access includes obtaining, at an authentication device, first information corresponding to first synthetic biometric data. The method also includes obtaining, at the authentication device, first common synthetic data and second biometric data. The method further includes generating, at the authentication device, second common synthetic data based on the first information and the second biometric data. The method also includes selectively authorizing, by the authentication device, access based on a comparison of the first common synthetic data and the second common synthetic data. | 2016-02-18 |
20160048670 | SYSTEMS AND METHODS TO GENERATE AUTHORIZATION DATA BASED ON BIOMETRIC DATA AND NON-BIOMETRIC DATA - A method of selectively authorizing access includes obtaining, at an authentication device, first information corresponding to first synthetic biometric data. The method also includes obtaining, at the authentication device, first common synthetic data and second biometric data. The method further includes generating, at the authentication device, second common synthetic data based on the first information and the second biometric data. The method also includes selectively authorizing, by the authentication device, access based on a comparison of the first common synthetic data and the second common synthetic data. | 2016-02-18 |
20160048671 | SLEEP DATA CHAIN OF CUSTODY - A wearable device includes one or more biometric sensors, each of the one or more biometric sensors gathering biological data from a wearer of the wearable device, the wearable device further having a computer processor for receiving the biological data from the one or more biometric sensors and generating biometric information based on the biological data and according one or more biometrical algorithms, the biometric information including validation information to validate the wearer as a source of the biological data gathered by each of the one or more sensors, the biometric information further including sleep information to provide a sleep profile of the wearer. | 2016-02-18 |
20160048672 | HERMA - Heartbeat Microwave Authentication - Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user. | 2016-02-18 |
20160048673 | SECURE ELECTRONIC LOCK - Embodiments are directed to simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock, authenticating the credential, unlocking the lock to provide access to a resource protected by the lock based on having authenticated the credential, determining a security level associated with the lock, and conditionally capturing the credential based on the security level. | 2016-02-18 |
20160048674 | METHOD OF IMPROVING ONLINE CREDENTIALS - The invention comprises a method of providing additional assurance regarding a websites authenticity. The assurance is provided by using a credential that contains an image of the website operator or the website operator's business operations. The assurance is also provided by scanning the website associated with the credential for changes and alerting the website operator or a website visitor of the changes. The invention includes a method of ensuring the proper operation of the credential and a method of protecting the credential from mis-issuance. | 2016-02-18 |
20160048675 | STARTING AN APPLICATION ON A MOBILE DEVICE - The invention relates to management of programs on a mobile device, and in particular, to a method for activating application programs on a mobile device, and a mobile device based on this method. The method for activating application programs on a mobile device according to an embodiment of the invention comprises the following steps: receiving an application request from a device which is located outside the mobile device; identifying a transmission protocol associated with the application request; and if there are a plurality of safety entities in the mobile device which support the transmission protocol and store application programs associated with the application request, activating an application program associated with the application request in a default safety entity. | 2016-02-18 |
20160048676 | APPARATUS AND METHOD THEREOF FOR EFFICIENT EXECUTION OF A GUEST IN A VIRTUALIZED ENVIRONMENT - A method and apparatus for efficiently executing guest programs in a virtualized computing environment are presented. The method includes executing a virtual machine on a computing hardware; executing a single hypervisor in a first security ring on the virtual machine; executing a single guest program on the virtual machine, wherein the single guest program includes a single kernel being executed in the first security ring and at least one application being executed in a second security ring; and executing at least an instruction issued by the at least one application without trapping the single hypervisor. | 2016-02-18 |
20160048677 | Method and System for Executing Applications Using Native Code Modules - Some embodiments provide a system that executes a web application. During operation, the system loads the web application in a web browser and loads a native code module associated with the web application into a secure runtime environment. Next, the system provides input data associated with the web application to the native code module and processes the input data using the native code module to obtain output data. Finally, the system provides the output data to the web application for use by the web application. | 2016-02-18 |
20160048678 | TRUSTZONE-BASED INTEGRITY MEASUREMENTS AND VERIFICATION USING A SOFTWARE-BASED TRUSTED PLATFORM MODULE - A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices. | 2016-02-18 |
20160048679 | Systems And Methods for Exposing A Current Processor Instruction Upon Exiting A Virtual Machine - Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A processor is configured to generate a VM suspend event (e.g., a VM exit or a virtualization exception) when software executing within a guest VM performs a memory access violation. In some embodiments, the processor is further configured to save disassembly data determined for the processor instruction which triggered the VM suspend event to a special location (e.g., a specific processor register) before generating the event. Saved disassembly data may include the contents of individual instruction encoding fields, such as Prefix, Opcode, Mod R/M, SIB, Displacement, and Immediate fields on Intel® platforms. | 2016-02-18 |
20160048680 | Systems And Methods for Exposing A Result Of A Current Processor Instruction Upon Exiting A Virtual Machine - Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A processor is configured to generate a VM suspend event (e.g., a VM exit or a virtualization exception) when a guest instruction executing within a guest VM performs a memory access violation. In some embodiments, the processor is further configured to delay generating the VM suspend event until the execution stage of the pipeline for the guest instruction is complete, and to save results of the execution stage to a specific location (e.g. a specific processor register readable by security software) before generating the event. | 2016-02-18 |
20160048681 | DYNAMIC GRAPH ANOMALY DETECTION FRAMEWORK AND SCALABLE SYSTEM ARCHITECTURE - Machine generated event log data which includes events occurring over a window of time is received where each event includes a first node, a second node, and a timestamp. The events are aggregated into a plurality of aggregated graph snapshots. Communities within the plurality of aggregated graph snapshots are identified and community tracking links are determined between communities in the plurality of aggregated graph snapshots. A community that has an anomalous evolution in the plurality of aggregated graph snapshots compared to the evolution of other communities is identified based at least in part on the community tracking links. The communities are displayed where the display includes the community tracking links and identifies the community that has the anomalous evolution. | 2016-02-18 |
20160048682 | Method and Apparatus for Clearing Malicious Power-Consuming Application, and User Terminal - A method and an apparatus for clearing a malicious power-consuming application, and a user terminal are provided. An application whose background working power consumption is not less than a power consumption threshold is determined as a malicious power-consuming application; and a wakelock occupying time of each application if a screen is turned off is periodically calculated, and if a background working application's wakelock occupying time is not less than a set time threshold, the application is determined as a malicious power-consuming application. | 2016-02-18 |
20160048683 | MALWARE FAMILY IDENTIFICATION USING PROFILE SIGNATURES - A potential malware sample is received from a security device at a server associated with a security cloud service. The sample is executed in a sandbox environment on the server, including by monitoring interaction of the sample with an application program interface (API), provided by the sandbox environment, in order to obtain an API log. It is determined whether the sample is associated with a known malware family including by determining, based at least in part on the API log, if the sample created an executable file and if the sample registered the executable file in a run key. If it is determined that the sample is associated with a known malware family, then an alert is generated. | 2016-02-18 |
20160048684 | SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified. | 2016-02-18 |
20160048685 | PROTECTED SHELL FOR RISK VALIDATION - On a computer system, a shell is invoked, through which a plurality of commands and/or scripts can be executed. Individual ones of the plurality of commands and/or scripts are validated. Given individual ones of the plurality of commands and/or scripts, for which the validation is successful, are executed via the shell. | 2016-02-18 |
20160048686 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AN EXECUTION FLOW OF A FUNCTION - A system, method, and computer program product are provided for monitoring an execution flow of a function. In use, data associated with a function is identified within a call stack. Additionally, a call stack frame is determined from freed memory in the call stack. Further, an execution flow of the function is monitored, utilizing the call stack frame from the freed memory. | 2016-02-18 |
20160048687 | DOCUMENT TAMPER DETECTION - A computer implemented method for identifying tampering of an electronic document, the method comprising the steps of: generating a document digest for the document, the document having associated one or more modification records and the document digest being a copulative digest based on & digest of each of the modification records; receiving a modified version of the document from a document modifier, the modified version of the document having associated one or sore additional modification records; generating a new document digest for the modified document, the new document digest being a cumulative digest based on a digest of each of the modification records and the additional modification records; generating a validation digest, the validation digest being a cumulative digest based on the document digest and a digest of each of the additional modification records; comparing the new document digest and the validation digest to determine if the modified version of the document has been tampered with. | 2016-02-18 |
20160048688 | Restricting System Calls using Protected Storage - Systems and techniques are provided for restricting system calls using protected storage. A system call to a restricted system component may be received from an application. The application may be determined to have permission to make the system call to the restricted system component. A signature associated with the application may be verified using a public key from a protected storage. The public key may be sent to the protected storage by a computing device of a party authorized to modify data in the protected storage. The restricted system component may be permitted to perform a function indicated by the system call when the public key successfully verifies the signature associated with application. | 2016-02-18 |
20160048689 | TAMPER RESISTANT CRYPTOGRAPHIC ALGORITHM IMPLEMENTATION - There is provided a method of performing a cryptographic algorithm in software, the cryptographic algorithm comprising one or more processing steps, wherein each processing step is arranged to process a respective input to the processing step so as to generate an output corresponding to the input, characterized in that, for each of at least one of the one or more processing steps, the method comprises: providing a respective input for the processing step as an input to a plurality of implementations of the processing step, wherein each implementation is arranged to output a corresponding intermediate result represented using a respective predetermined output representation; and using the representation of the intermediate results to generate a result for the processing step that is based on each of the intermediate results, wherein, if each intermediate result is the output that corresponds to the input for the processing step then the result for the processing step is the output that corresponds to the input for the processing step. Additionally provided is a method of enabling a data processor to perform a cryptographic algorithm in software, the method comprising: generating an implementation of the cryptographic algorithm, the implementation being arranged such that execution of the implementation by a processor causes the processor to carry out a method according to any one of the preceding claims; and configuring the data processor to execute the implementation of the cryptographic algorithm. There is further provided a system and computer program for carrying out such methods, as well as a computer readable medium for storing such a computer program. | 2016-02-18 |
20160048690 | GENETIC INFORMATION STORAGE APPARATUS, GENETIC INFORMATION SEARCH APPARATUS, GENETIC INFORMATION STORAGE PROGRAM, GENETIC INFORMATION SEARCH PROGRAM, GENETIC INFORMATION STORAGE METHOD, GENETIC INFORMATION SEARCH METHOD, AND GENETIC INFORMATION SEARCH SYSTEM - An object is to enable to search genetic information in an encrypted state. An encryption apparatus ( | 2016-02-18 |
20160048691 | CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES - A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a successful authentication, a user-specific security code is generated by the encryption unit. The security code is outputted by the encryption unit to the authenticated user. The security code and the user-ID are received by an authentication unit coupled to the analysis system via a user-interface coupled to the authentication unit. The security code is decrypted by the authentication unit. If the decrypted security code matches with the user-ID, the user is authenticated at the authentication unit and an authentication signal is generated by the authentication unit for permitting the user to initialize at least one function of the analysis system. | 2016-02-18 |
20160048692 | TOKEN FOR SECURING COMMUNICATION - A token includes an interface for communicating with a host, a processor communicably coupled to the interface, and to a persistent storage unit. The processor receives, via the interface, a command from the host; determines whether the command is valid for the token and, if not, returns a result to the host indicating the command is not valid; otherwise, if the command is determined to be valid for the token, performs the command and return a result of performing the command to the host. The command is one of: a command to activate the token, a command to begin authentication, a command to authenticate the host, a command to generate an encryption key, and a command to change a token activation code (TAC) stored by the token, said TAC for use in activating the token. | 2016-02-18 |
20160048693 | TEMPORALLY ISOLATING DATA ACCESSED BY A COMPUTING DEVICE - Embodiments of the present invention provide a method to temporally isolate data accessed by a computing device so that the data accessed by the computing device is limited to a single set of data. The method includes removing any data that is accessed by the computing device when operating in different modes so that the data is inaccessible by the computing device when operating in the mode. The method also includes switching to the mode after the data associated with the modes different from the mode have been removed. The method also includes operating in the mode based on a plurality of rules associated with the security policy in temporal isolation from any other mode associated with the computing device. The computing device is limited to operating in the mode and is prevented from accessing any data that is distinct from the single set of data of the mode. | 2016-02-18 |
20160048694 | System and Method for Secure Transport of Data from an Operating System to a Pre-operating System Environment - An information handling system includes a trusted platform module (TPM) and a storage device, the TPM provides boot authentication for the information handling system such that, during a pre-boot phase, the TPM can access a platform configuration register (PCR). During a first instance of the pre-boot phase, the information handling system provides a public/private key pair including a public key and a private key, stores the private key to an encrypted storage of the TPM, seals the private key in the encrypted storage to the PCR, and stores the public key to the storage device. During an operating system phase that is after the first instance of the pre boot phase, the information handling system retrieves the public key from the storage device, encrypts transfer data using the public key, and stores the encrypted transfer data to the storage device. | 2016-02-18 |
20160048695 | METHOD OF PREVENTING ACCESS TO SENSITIVE DATA OF A COMPUTING DEVICE - A technique is provided for controlling access by an application to data or a service supported by a computing system, a computer program product and an access control unit. The technique includes identifying a request from an application for access to data or a service supported by the system, determining whether access has been restricted to the data or service, and, if so, indicating to the application that the request for access has been granted by the system and emulating the data or service when the data or service is accessed by the application. | 2016-02-18 |
20160048696 | ATTESTATION FOR ELECTRONIC SIGNATURES - Techniques for generating a document according to attestation requirements are provided. A method determines attestation requirements for electronically signing an electronic document. The method modifies the document based in part on the requirements, and then provides the modified document to users requested to electronically sign the document, wherein the users are only permitted to electronically sign the document in circumstances satisfying the requirements. An electronic signature service can generate a document whose signing needs to be witnessed and/or recorded according to attestation requirements. The document may be associated with number of signers. The electronic signature service may determine one or more witnesses of the signers and may determine applicable attestation requirements based on the witnesses, the signers, and the document. Further, the electronic signature service may record proceedings associated with collecting signatures for the document and record and/or pause a workflow associated with the document to meet the applicable requirements. | 2016-02-18 |
20160048697 | Enveloping and de-enveloping for Digital Photos via Wavefront Muxing - Data photo files with digital envelops may be used for many new applications for cloud computing. The new applications include games and entertainments featuring additional privacy and survivability on data storage and transport on cloud computing. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying an architecture that utilizes multi-dimensional waveforms has found applications in data storage and transport on cloud. Multiple data sets are preprocessed by WF muxing before stored/transported. WF muxed data is aggregated data from multiple data sets that have been “customized processed” and disassembled into any scalable number of sets of processed data, with each set being stored on a storage site. The original data is reassembled via WF demuxing after retrieving a lesser but scalable number of WF muxed data sets. A customized set of WF muxing on multiple digital files as inputs including at least a data message file and a selected digital envelop file, is configured to guarantee at least one of the multiple outputs comprising a weighted sum of all inputs with an appearance to human natural sensors substantially identical to the appearance of the selected digital envelop in a same image, video or audio format. The output file is a file with enveloped or embedded messages. The embedded message may be reconstituted by a corresponding WF demuxing processor at destination with the known a priori information of the original digital envelope. In short, digital enveloping/de-enveloping can be implemented via WF muxing and demuxing formulations. WF muxed data featured enhanced privacy and redundancy in data transport and storage on cloud. On the other hand, data enveloping is an application in an opposite direction for WF muxing applications as far as redundancy is concerned. Enveloped data are intended only for limited receivers who has access to associated digital envelope data files with enhanced privacy for no or minimized redundancy. | 2016-02-18 |
20160048698 | DATA STORAGE SERVICE FOR PERSONALIZATION SYSTEM - A data storage system or service is provided for the data that is generated by the personalization system. The data storage system can be configured to support storing, retrieving or querying, and updating of data such as user information, personalized content such as personalized business information and collection information, statistics information related to users, collections, businesses, and the like. The data model design of the data storage system may be configured to optimize performance associated with specific features of the personalized system such as following and/or sharing of collections. Additionally, the data storage system may be configured to detect and provide user notifications of trigger events. | 2016-02-18 |
20160048699 | METHODS AND SYSTEMS FOR DELETING REQUESTED INFORMATION - A method of deleting log records may include identifying a plurality of log records generated during a time period, for each identified log record, determining whether a delete request associated with the log record has been made, and, in response to determining that a delete request has not been received, identifying a unique identifier associated with the log record, searching a user activity table for an entry having a key table index associated with the unique identifier, where the entry is associated with a timestamp, using the key table index and the timestamp to identify a key associated with the unique identifier and the timestamp from a key table, encrypting at least a portion of the log record with the identified key to generate an encrypted value, and storing the encrypted value as an entry in the log record database that is associated with the identified log record. | 2016-02-18 |
20160048700 | SECURING PERSONAL INFORMATION - A database containing personal information of a user can be selectively read from and written to by multiple entities. Access level rules determine who gets access to which entries of a user record in the database. Access to some entries and actions taken on some entries may be possible only by producing, in real time, a smartcard-based authorization for such access or actions. | 2016-02-18 |
20160048701 | Enveloping for remote Digital Camera - Remote video data files with digital multimedia envelops may be used for many new cloud computing applications. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying an architecture that utilizes multi-dimensional waveforms has found applications in data storage and transport on cloud. Multiple data sets are preprocessed by WF muxing before stored/transported via cloud. WF muxed data is aggregated data from multiple data sets that have been “customized processed” and disassembled into any scalable number of sets of processed data, with each set being stored on a storage site. The original data is reassembled via WF demuxing after retrieving a lesser but scalable number of WF muxed data sets. A customized set of WF muxing on multiple digital files as inputs including at least a data message file and a selected digital envelop file in a digital video or multi-media format, is configured to guarantee at least one of the multiple outputs comprising a weighted sum of all inputs with an appearance to human natural sensors substantially identical to the appearance of the selected digital envelop in a same image, video or audio format. The output file is a file with enveloped or embedded messages. The embedded message may be reconstituted by a corresponding WF demuxing processor at destination with the known a priori information of the original digital envelope. In short, digital enveloping/de-enveloping can be implemented via WF muxing and demuxing formulations. WF muxed data featured enhanced privacy and redundancy in data transport and storage on cloud. On the other hand, data enveloping is an application in a different dimension for most of conventional WF muxing applications as far as redundancy is concerned. Enveloped data are intended only for limited receivers who has access to associated digital envelope data files with enhanced privacy but with no or minimized redundancy. | 2016-02-18 |
20160048702 | INFORMATION RECEIVING DEVICE, INFORMATION RECEIVING METHOD, AND MEDIUM - An information receiving device according to the present invention includes: a request information generation unit which generates request information including actual behavior information which is behavior information representing an actual behavior of a user, and pseudo behavior information not representing an actual behavior of the user; a distribution information request unit which transmits the request information to an information distribution device, and receives distribution information distributed from the information distribution device on a basis of the transmission of the request information; and a distribution information selection unit which selects distribution information associated with the actual behavior information, out of the distribution information received by the distribution information request unit. | 2016-02-18 |
20160048703 | SECURING INTEGRITY AND CONSISTENCY OF A CLOUD STORAGE SERVICE WITH EFFICIENT CLIENT OPERATIONS - A method for providing integrity and consistency of a cloud storage service to a group of mutually trusted clients may be provided. The cloud storage service may offer a set of operations, such as read, write, update, delete in respect to stored data to the clients, whereby each client only executes its own client operations when consuming one of the set of operations of the cloud storage service, and wherein each client detects data correctness of the cloud storage service based on a protocol providing fork-linearizablity. | 2016-02-18 |
20160048704 | Secure Semiconductor Device Having Features to Prevent Reverse Engineering - An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the plaintext data into encrypted data, wherein at least a portion of the encryption circuit comprises IBG circuitry. A decryption circuit for receiving an input of a second digital key and the encrypted data, the decryption circuit for mathematically manipulating the digital key and the encrypted data to decrypt the encrypted data into the plaintext data, wherein at least a portion of the decryption circuit comprises IBG circuitry | 2016-02-18 |
20160048705 | AUTHENTICATED DEVICE USED TO UNLOCK ANOTHER DEVICE - An electronic device having a user-interface locked state and a user-interface unlocked state may be in the locked state. The locked electronic device may detect, via wireless communication, an external device; receive, from the external device, unlocking information for unlocking the electronic device. The locked electronic device may determine whether the external device is authorized to facilitate its unlocking. The locked electronic device may detect user input. In response to the user input, the received unlocking information, and/or a determination that the external device is authorized, the locked electronic device may unlock and enter a normal operating state wherein application programs may be launched and used. | 2016-02-18 |
20160048706 | METHOD AND DEVICE FOR SECURE VIEWING ON A SCREEN OF AN ELECTRONIC TERMINAL, AND CORRESPONDING TERMINAL - A method for secure viewing on a screen of an electronic terminal includes determining a mode of operation, secured or open, of the terminal; and modifying the displaying of at least one indicator representing the mode of operation of the terminal. The displaying modification is controlled by at least one secure processor of the terminal and takes into account at least one predetermined action of the user on the terminal and/or of an expiration of at least one predetermined time limit. | 2016-02-18 |
20160048707 | LOW NOISE AND LOW POWER PASSIVE SAMPLING NETWORK FOR A SWITCHED-CAPACITOR ADC WITH A SLOW REFERENCE GENERATOR - Certain aspects of the present disclosure provide various sampling networks for switched-capacitor integrators, which may be used in switched-capacitor analog-to-digital converters (ADCs). Rather than having both an input sampling capacitor and a reference sampling capacitor, certain aspects of the present disclosure use a shared sampling capacitor for the reference voltage and the input voltage, thereby reducing ADC input-referred noise, decreasing op amp area and power, and avoiding anti-aliasing filter insertion loss. Furthermore, by sampling the reference voltage during the sampling phase and sampling the input voltage during the integration phase using the shared sampling capacitor, a high-bandwidth reference buffer need not be used for the reference voltage. | 2016-02-18 |
20160048708 | SYNCHRONIZATION OF RADIO FREQUENCY IDENTIFICATION READERS USING INFRARED PULSE - A system and method system for synchronizing Radio Frequency Identification (RFID) readers includes a plurality of RFID readers disposed within an environment. Each RFID reader includes an infrared emitter and an infrared detector. A master controller also includes a master infrared emitter and is operable to emit a master infrared flash from the master infrared emitter for synchronizing the plurality of RFID readers. Any of the RFID readers, upon detecting an infrared flash with their associated infrared detector, is operable to synchronize their dwell timing with the detected infrared flash and emit their own infrared flash from their associated infrared emitter, so as to propagate infrared flashes to all the RFID readers within the environment. | 2016-02-18 |
20160048709 | INFORMATION RFID TAGGING FACILITIES - In embodiments of the present invention improved capabilities are described for a system of information RFID tagging facilities comprising a first radio frequency (RF) tag and a second RF tag, wherein the first RF tag and the second RF tag are adapted to operate using energy received from an RF signal, wherein: (i) at least one of the first RF tag and the second RF tag receives an RF signal from an RF device, (ii) the first RF tag transmits data to the second RF tag, and (iii) the second RF tag stores the transmitted data from the first RF tag in a memory on the second RF tag. | 2016-02-18 |
20160048710 | LONG-RANGE UWB REMOTE POWERING CAPABILITY AT FCC REGULATED LIMIT USING MULTIPLE ANTENNAS - A method and apparatus for remote UWB powering of passive RFID tags, sensors, and other electronic devices at long ranges and still at FCC low emission power limits utilizes a distributed multi-transmitter system configured for spotforming. The UWB powering signal is different from the signal that is used for communication between the tag and its reader. By de-coupling the powering task from the communication task, one is able to increase the range of communication between the tag and the reader, as readers can be designed to have excellent receiver sensitivities, while powering range is increased by use of multiple “spot-forming” antennas over a large area. | 2016-02-18 |
20160048711 | WIRELESS TAG, WIRELESS COMMUNICATION CIRCUIT, AND DEGRADATION DETECTION METHOD - A wireless communication circuit performs a wireless communication with a transmitter-receiver via an antenna. Power to the wireless communication circuit is turned on by electromagnetic waves transmitted from the transmitter-receiver. In the wireless communication circuit, a circuit includes a capacitor for storing electric charge at the time of the power being on, and is configured to pass discharging current based on the electric charge stored in the capacitor along a current path including the antenna at the time of the power being off, a monitoring circuit is configured to be operated by electric power based on the electric charge at the time of the power being off and to determine the presence or absence of degradation on the basis of potential of a node on the current path, and a storage circuit is configured to store the result of a determination by the monitoring circuit. | 2016-02-18 |
20160048712 | OPERATING SYSTEMS FOR AN RFID TAG - In embodiments of the present invention improved capabilities are described for a radio frequency (RF) computing tag comprising mounting an antenna and an RF computing device that is enabled for RF communication and for computing on a single substrate, the RF computing device comprising: (i) an RF and analog block for receiving and transmitting an RF signal through the antenna, wherein the energy from a received RF signal provides power to the RF computing device, (ii) a power management block for managing power requirements of the RF computing device, and (iii) a processor-based data processing and controller block for digital information management, comprising an operating system, a programmable memory, a programmable memory, and a data store, wherein the programmable memory stores an operating system for operation of the RF computing device. | 2016-02-18 |
20160048713 | RECONFIGURABLE RFID ANTENNA ASSEMBLY UTILIZING A COMMON REFLECTOR CODE - A reconfigurable Radio Frequency Identification (RFID) antenna assembly utilizing a common reflector core includes a plurality of antennas, wherein each antenna consists of: a first replaceable antenna element, at least one first replaceable standoff, and a reflector panel, which is configured for a lowest operable frequency of the antenna assembly. The reflector panels of all the plurality of antenna elements are connected together to form a common reflector core housing within the antenna elements disposed outside of the housing. The first replaceable antenna element, the first replaceable standoffs, and the common reflector core are configured for a first operating frequency of the antenna assembly. The first replaceable antenna elements and first replaceable standoffs are replaceable on the common reflector core with second replaceable antenna elements and second replaceable standoffs operable at a second frequency. | 2016-02-18 |
20160048714 | DATA COLLECTION SCHEME - Technologies are generally described for a data collection scheme. In some examples, a method performed under control of an electronic device may include receiving a data submission request from a posting device; determining that data corresponding to the data submission request is stored in a memory of the electronic device; and notifying a user of the electronic device of the data submission request. | 2016-02-18 |
20160048715 | DATA ENTRY DEVICE WITH ENHANCED AIMING - An improvement is made to a scanning device to increase item throughput at the point of sale (POS). The scanning device implements a minor that allows a cashier to see hidden or obscured optical codes or bar codes on items. The mirror can reflect an aiming beam from a camera, which also allows the cashier to correctly scan the optical codes or bar codes. The minor and camera can incorporate different properties to enable both the cashier and a customer to stand on opposite sides of the scanning device and scan items. | 2016-02-18 |
20160048716 | PASSIVE LIGHT-BASED DATA COMMUNICATION - Techniques are disclosed for light-based communication using a passive light-reflective device having specially coded reflective or printed optics. The optics can be mounted to an object and configured to reflect light such that a receiver is able to receive the reflected light. The optics are further configured to alternatively display a number of different patterns that change as the receiver moves with respect to the optics, thus causing the receiver to receive an apparent stream of modulated light, which represents coded information that can be decoded into meaningful information. The optics can be mounted to a traffic control or other roadside device. As a vehicle approaches and passes the traffic control device, light reflects off of the optics in a series of patterns. This reflected light can be received by the vehicle and processed to relay the information to the operator or on-board vehicle system. | 2016-02-18 |
20160048717 | Array Substrate, Driving Method and Display Device - There are disclosed in the present disclosure an array substrate, a driving method of a fingerprint recognition circuit and a display device. The array substrate comprises a substrate. There are formed on the substrate a fingerprint recognition circuit, a fingerprint signal read line, an initialization signal line, a common voltage input terminal and an output control signal line. As such, on one hand, since it is not needed a separate film layer or panel to carry the fingerprint recognition circuit, thickness of a corresponding display device can be reduced; on the other hand, the fingerprint recognition circuit and related signal lines can be formed simultaneously in the process of manufacturing the array substrate, thereby decreasing difficulty in manufacturing the corresponding display device. | 2016-02-18 |
20160048718 | ENHANCED KINEMATIC SIGNATURE AUTHENTICATION USING EMBEDDED FINGERPRINT IMAGE ARRAY - A writing instrument with multiple embedded image sensors. Partial fingerprint images are combined with kinematic sensors to verify or identify a user. | 2016-02-18 |
20160048719 | SYSTEM AND METHOD FOR COMPRESSING ELECTRONIC SIGNATURES - A remote data capture system includes a host computing device. A client computing device is communicatively coupled to the host computing device. A capture device having a sensor is coupled to the client computing device. The capture device is configured to receive an electrical input signal from the sensor, convert the input signal to corresponding input data having a predetermined format, compress the input data to a variable-length bit stream, and convert the bit stream to keyboard codes. The client computing device selectably transmits the keyboard codes to the host computing device. | 2016-02-18 |
20160048720 | FOOD PREPARATION - A container for providing an enclosure for a food item includes a plurality of grading marks and a docking station to dock an electronic device. Yet further, the system includes a processor configured to take one or more pictures of the food item ( | 2016-02-18 |
20160048721 | SYSTEM AND METHOD FOR ACCURATELY ANALYZING SENSED DATA - A system for analyzing sensed data. A triggering mechanism is responsive to the presence of a target. A sensor acquires sensed data of the target, for example, an image. A processor analyzes the sensed data to detect the target. The signals generated by the triggering mechanism and the sensor are reconciled. In the reconciliation of the signals, when a pair of signals each indicate the presence of the target within a predefined time period, a target data set corresponding to the pair of signals is generated. When the presence of the target is indicated by only one of the triggering mechanism and sensor, the detection of target or the failure to detect the target is more reliable is reconciled. If the signal indicating detection of the target is determined to be more reliable, a target data set is generated. A method for analyzing sensed data is also disclosed. | 2016-02-18 |
20160048722 | Embedding Biometric Data From a Wearable Computing Device in Metadata of a Recorded Image - According to an example method implemented by an imaging device, an image is recorded of a subject to which a wearable computing device is secured. Responsive to the recording, the imaging device wirelessly receives data from the wearable computing device. The data includes an identifier of the wearable computing device and biometric data of the subject. The identifier and biometric data are embedded as metadata in the recorded image. | 2016-02-18 |
20160048723 | METHOD AND APPARATUS FOR PROVIDING IMAGE CONTENTS - Disclosed herein is a method for providing image contents. The method for providing image contents includes: dividing the image contents into a plurality of scenes, each scene including a plurality of shots; classifying image frames for each scene depending on each of a plurality of characters appearing in the image contents; receiving a user input for selecting any one of the plurality of characters; and displaying a scene corresponding to the character selected depending on the user input. | 2016-02-18 |
20160048724 | APPARATUS, IMAGE PROCESSING METHOD AND STORAGE MEDIUM STORING PROGRAM - Images of a layout target for a template are acquired. The plurality of acquired images are edited using editing processing corresponding to a category corresponding to a layout. The edited images are arranged on the template corresponding to the category. | 2016-02-18 |
20160048725 | AUTOMOTIVE AND INDUSTRIAL MOTION SENSORY DEVICE - The technology disclosed relates to highly functional/highly accurate motion sensory control devices for use in automotive and industrial control systems capable of capturing and providing images to motion capture systems that detect gestures in a three dimensional (3D) sensory space. | 2016-02-18 |
20160048726 | Three-Dimensional Hand Tracking Using Depth Sequences - In the field of Human-computer interaction (HCI), i.e., the study of the interfaces between people (i.e., users) and computers, understanding the intentions and desires of how the user wishes to interact with the computer is a very important problem. The ability to understand human gestures, and, in particular, hand gestures, as they relate to HCI, is a very important aspect in understanding the intentions and desires of the user in a wide variety of applications. In this disclosure, a novel system and method for three-dimensional hand tracking using depth sequences is described. Some of the major contributions of the hand tracking system described herein include: 1.) a robust hand detector that is invariant to scene background changes; 2.) a bi-directional tracking algorithm that prevents detected hands from always drifting closer to the front of the scene (i.e., forward along the z-axis of the scene); and 3.) various hand verification heuristics. | 2016-02-18 |
20160048727 | METHOD AND SYSTEM FOR RECOGNIZING AN OBJECT - A method, a system, and a non-transitory computer readable medium for recognizing an object are disclosed, the method including: emitting an array of infrared rays from an infrared emitter towards a projection region, the projection region including a first object; generating a reference infrared image by recording an intensity of ray reflection from the projection region without the first object; generating a target infrared image by recording the intensity of ray reflection from the projection region with the first object; comparing the target infrared image to the reference infrared image to generate a predetermined intensity threshold; and extracting the first object from the target infrared image, if the intensity of ray reflection of the target infrared image of the first object exceeds the predetermined intensity threshold. | 2016-02-18 |
20160048728 | METHOD AND SYSTEM FOR OPTICAL CHARACTER RECOGNITION THAT SHORT CIRCUIT PROCESSING FOR NON-CHARACTER CONTAINING CANDIDATE SYMBOL IMAGES - The current document is directed to methods and systems for identifying Chinese, Japanese, Korean, or similar language symbols that correspond to symbol images in a scanned-document image or other text-containing image. In a first processing phase, each symbol image is associated with a set of candidate graphemes. In a second processing phase, each symbol image is evaluated with respect to the set of candidate graphemes identified for the symbol image during the first phase. As candidate graphemes are processed, the currently described methods and systems monitor progress towards identifying a matching grapheme and, when insufficient progress is observed, terminate processing of the candidate graphemes and identify the symbol image as a non-symbol-containing area of the scanned-document image or other text-containing image. | 2016-02-18 |
20160048729 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM STORING PROGRAM - A plurality of regions corresponding to respective attributes in an image are detected, and a target region serving as a thumbnail image out of the plurality of regions is determined. Thumbnail image data is generated from data corresponding to the determined target region. | 2016-02-18 |
20160048730 | IDENTIFICATION METHOD, IDENTIFICATION SYSTEM, MATCHING DEVICE, AND PROGRAM - The present invention addresses the problem of acquiring information regarding a component or product and identifying said component or product easily and inexpensively. The present invention has an image-feature storage, an extracting means, an acquiring means, and an identifying means. The image-feature storage stores image features of texture patterns formed on components or products. The extracting means extracts an n-dimensional-symbol image and a texture-pattern image from a taken image containing at least the following: an n-dimensional symbol (n being a natural number) that represents information regarding a component, a product, or a product comprising said component; and a texture pattern formed on said component or product. The acquiring means acquires, from the extracted n-dimensional-symbol image, the aforementioned information regarding the component or product. The identifying means identifies the component, product, or component-comprising product by matching image features of the extracted texture-pattern image against the image features stored by the image-feature storage. | 2016-02-18 |
20160048731 | MOBILE IDENTITY PLATFORM - The present disclosure is directed towards a compact, mobile apparatus for iris image acquisition, adapted to address effects of ocular dominance in the subject and to guide positioning of the subject's iris for the image acquisition. The apparatus may include a sensor for acquiring an iris image from a subject. A compact mirror may be oriented relative to a dominant eye of the subject, and sized to present an image of a single iris to the subject when the apparatus is positioned at a suitable distance for image acquisition. The mirror may assist the subject in positioning the iris for iris image acquisition. The mirror may be positioned between the sensor and the iris during iris image acquisition, and transmit a portion of light reflected off the iris to the sensor. | 2016-02-18 |
20160048732 | DISPLAYING INFORMATION RELATING TO A DESIGNATED MARKER - A method and system for displaying information relating to a designated marker is provided. An image including the designated marker is acquired. The designated marker is extracted from the acquired image. A type of the designated marker is identified from the extracted marker. The identified type of the designated marker is communicated to a server, and in response, marker information identified from the type of the designated marker is obtained from the server. The marker information relates to the designated marker and identifies at least two other markers. Relative positional information of the device in relation to the extracted marker is determined. A displayed informational image includes the designated marker and at least one other marker of the at least two other markers, which are displayed in accordance with a determined relative position between the designated marker and each marker of the at least one other marker. | 2016-02-18 |
20160048733 | METHOD AND APPARATUS FOR DETECTING LANE OF ROAD - A method for detecting lanes on the road is disclosed. The method including: a phase that generates at least one spatiotemporal image by storing along the time axis at least one line image that contains pixels corresponding to at least one horizontal line established in a road video; a phase that detects, in lane patterns contained in each of the at least one spatiotemporal image, two or more lane points that correspond to the present moment; and a phase that detects lanes by tracing the two or more lane points over time in each of the at least one spatiotemporal image. | 2016-02-18 |
20160048734 | LIGHT SOURCE RECOGNITION SYSTEM OF VEHICLE - Provided is a light source recognition system of a vehicle, including: a camera sensor module which generates raw data for a front image of a vehicle; a light source determining module which analyzes the raw data to determine whether a light source is present in the front image and when the light source is present, sets a region of the front image where the light source is represented as a region of interest; a compressing module which compresses data corresponding to the region of interest among the raw data without losing data and compresses the data corresponding to a region excluding the region of interest, among the raw data, with a loss of data so that the raw data is converted into compressed data; and a control module which decompresses the compressed data to convert the compressed data into the raw data, recognizes the light source from the region of interest set in the front image using the decompressed raw data, generates a control signal corresponding to the light source, and controls the camera sensor module, the light source determining module, and the compressing module. | 2016-02-18 |
20160048735 | EYE OPEN STATE DETERMINATION DEVICE AND EYE OPEN STATE DETERMINATION METHOD - An eye open state determination device includes an eyelid opening degree detector that detects a degree of opening of an eyelid of the subject from an image of an eye of a subject acquired by an image acquirer, a red eye generator that illuminates the subject with light to generate a red eye image on the image of the eye, a red eye detector that detects presence or absence of generation of the red eye image, an operation controller that activates the red eye generator at a timing different from a timing at which the image acquirer acquires the image of the eye, and a determinator that determines an eye open state of the subject based on the degree of opening of the eyelid and the presence or absence of generation of the red eye image. | 2016-02-18 |
20160048736 | FALSE FACE REPRESENTATION IDENTIFICATION - Systems and methods for identifying a false representation of a human face are provided. In one example, a method for identifying a false representation of a human face includes receiving a plurality of different data streams captured by a respective plurality of sensors of differing sensor types sensing a candidate face. In a cascading plurality of stages, one or more of the different data streams are analyzed, wherein each of the stages comprises a different analysis. In one of the cascading plurality of stages, the method determines that one or more of the different data streams corresponds to a false representation of the human face. Based on determining that one or more of the different data streams corresponds to a false representation of a human face, an indication of the false representation is outputted. | 2016-02-18 |
20160048737 | APPARATUS AND METHOD FOR ADAPTIVE COMPUTER-AIDED DIAGNOSIS - An apparatus and method for adaptive computer-aided diagnosis (CAD) are provided. The adaptive CAD apparatus includes an image analysis algorithm selector configured to select an image analysis algorithm based on a speed of a probe or a resolution of a current image frame obtained by the probe; and an image analyzer configured to detect and classify a region of interest (ROI) in the current image frame using the selected image analysis algorithm. | 2016-02-18 |
20160048738 | Method and System for Recognizing User Activity Type - The present invention discloses a method and system for recognizing a user activity type, where the method includes: collecting an image of a location in which a user is located; extracting, from the image, characteristic data of an environment in which the user is located and characteristic data of the user; and obtaining, by recognition, an activity type of the user by using an image recognition model related to an activity type or an image library related to an activity type and the characteristic data. | 2016-02-18 |
20160048739 | PRECISION LUXMETER METHODS FOR DIGITAL CAMERAS TO QUANTIFY COLORS IN UNCONTROLLED LIGHTING ENVIRONMENTS - In one embodiment, a diagnostic system for biological samples is disclosed. The diagnostic system includes a diagnostic instrument, and a portable electronic device. The diagnostic instrument has a reference color bar and a plurality of chemical test pads to receive a biological sample. The portable electronic device includes a digital camera to capture a digital image of the diagnostic instrument in uncontrolled lightning environments, a sensor to capture illuminance of a surface of the diagnostic instrument, a processor coupled to the digital camera and sensor to receive the digital image and the illuminance, and a storage device coupled to the processor. The storage device stores instructions for execution by the processor to process the digital image and the illuminance, to normalize colors of the plurality of chemical test pads and determine diagnostic test results in response to quantification of color changes in the chemical test pads. | 2016-02-18 |
20160048740 | SYSTEM AND METHOD FOR PROCESSING IMAGE DATA - The PLACEMETER PLATFORM APPARATUSES, METHODS AND SYSTEMS (“PM-PLATFORM”) transform sensor data and/or feedback via PM-PLATFORM components into notifications, updates, coupons, promotions, transactions and/or activities notifications, updates, coupons, promotions, transactions and/or activities. In one implementation, the PM-PLATFORM comprises a sensor, a memory, and a processor disposed in communication with the sensor and memory, the memory storing processor-issuable instructions to receive raw environment data at a sensor for at least two discrete points in time, analyze the received raw environment data locally to determine an at least one occupancy metric, store the occupancy metric, receive further raw environment data for a further point in time, process the further raw environment data to determine a further occupancy metric, compare the further occupancy metric to at least one previous occupancy metric, and issue a notification based on the comparison. | 2016-02-18 |
20160048741 | MULTI-LAYER AGGREGATION FOR OBJECT DETECTION - Object detection uses a deep or multiple layer network to learn features for detecting the object in the image. Multiple features from different layers are aggregated to train a classifier for the object. In addition or as an alternative to feature aggregation from different layers, an initial layer may have separate learnt nodes for different regions of the image to reduce the number of free parameters. The object detection is learned or a learned object detector is applied. | 2016-02-18 |
20160048742 | METHOD AND IMAGE PROCESSING APPARATUS FOR IMAGE VISIBILITY RESTORATION USING FISHER'S LINEAR DISCRIMINANT BASED DUAL DARK CHANNEL PRIOR - A method and an image processing apparatus for image visibility restoration are provided. The method includes the following steps. After an incoming hazy image is received, each of the incoming pixels is classified as either belonging to a localized light region or a non-localized light region. The localized light region is partitioned into patches according to each patch size in associated with image sizes in a training data set. Localized light patches are determined based on a FLD model and a designated patch size is accordingly determined. Adaptive chromatic parameters and dual dark channel priors corresponding to the designated patch size and a small patch size are determined. The incoming hazy image is restored according to the adaptive chromatic parameters, atmospheric light and a transmission map determined based on the dual dark channel priors to produce and output a de-hazed image. | 2016-02-18 |
20160048743 | METHOD AND DEVICE FOR AUTOMATIC INSERTION OF PROOF SHEETS IN RUNNING PRINTING APPLICATIONS IN DIGITAL PRINTING SYSTEMS - In a method or controller to execute a proof job of a copy print job, the proof job including a printing of a proof sheet, at a first point in time first raster data for the print sheet of the copy print job is provided. After expiration of a first provisioning time period at least one first job is inserted for printing a plurality of copies of the print sheet into a print buffer. A second point in time is determined at which the print buffer includes a first number of copies of the print sheet that are to be printed, the first number being such that a time period for printing of the first number of copies is greater than or equal to a second provisioning time period for providing of second raster data for the proof sheet of the proof job. After expiration of the second provisioning time period a second job is inserted to print the proof sheet into the print buffer so that copies of the print sheet and the proof sheet are printed according to an order of the first and the second jobs in the print buffer. | 2016-02-18 |
20160048744 | LONG MEDIUM - A plurality of marks ( | 2016-02-18 |
20160048745 | IMAGE FORMING APPARATUS, METHOD OF DRIVING THE SAME, AND COMPUTER READABLE RECORDING MEDIUM - An image forming apparatus is provided. The image forming apparatus includes a master unit configured to detect a data capturing timing by using data information received with being synchronized with an arbitrary clock in response to a request for data information with respect to a slave unit and use the detected data capturing timing to capture data of the slave unit and a slave unit configured to provide the data information which is synchronized with an arbitrary clock in response to a request for data information from the master unit. | 2016-02-18 |
20160048746 | COLOR MANAGED PRINTING SYSTEM - A system and method for color management of a color printer for correcting color drift using a single unified calibration tone reproduction curve (TRC). The unified calibration TRC may be applied to destination profiles for all halftones during printing. When printer drift occurs, only the unified calibration TRC is recalibrated to create a new unified calibration TRC which is subsequently applied to the destination profiles for all color halftones during printing to correct the color output of the color printer. | 2016-02-18 |
20160048747 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND IMAGE PROCESSING SYSTEM - An extractor extracts a gloss control value unused in first gloss control plane data. A conversion table generator generates a conversion table defining a special color density value corresponding to the extracted gloss control value. A second surface effect conversion table generator generates a second surface effect conversion table obtained by registering, in the first surface effect conversion table, definition information for the special color image specified by the special color density value in the conversion table in association with the gloss control values in the conversion table. A second gloss control plane data generator generates second gloss control plane data in which the special color density value in the clear plane data is converted into the corresponding gloss control value in the conversion table. A clear toner plane generator generates the clear toner plane data based on the second surface effect conversion table and third gloss control plane data. | 2016-02-18 |
20160048748 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING SYSTEM, IMAGE PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An image processing apparatus includes a first authentication unit, an accepting unit, and a second authentication unit. The first authentication unit obtains, from a terminal apparatus, information regarding a user who uses the image processing apparatus, and performs first authentication of the user by using the obtained information. The accepting unit accepts an instruction relating to image processing from the terminal apparatus in the first authentication. The second authentication unit accepts information regarding the user for whom the first authentication has been successfully completed, and performs second authentication in order to permit performing of the image processing based on the instruction accepted by the accepting unit. | 2016-02-18 |
20160048749 | CHIP CARD AND CHIP CARD SLEEVE - According to one embodiment, a chip card is provided, having a first contact area and a second contact area, a measuring circuit that is configured to measure an impedance between the first contact area and the second contact area and a control circuit that is configured to take the measured impedance as a basis for configuring a function of the chip card. | 2016-02-18 |
20160048750 | RFID TAG - A disclosed RFID tag includes: a base member; a semiconductor chip mounted over the base member; and an external member covering the base member and the semiconductor chip, a surface of the external member being provided with a groove at a position away from the semiconductor chip. The groove serves as a fold when the external member is folded. | 2016-02-18 |
20160048751 | HIGH TEMPERATURE TOLERANT RFID TAG - Apparatus and associated methods relate to a flexible high-temperature-tolerant RFID tag having an RFID integrated packaged in an SOT package attached with a high temperature solder to a flex circuit defining an RFID antenna. In an illustrative embodiment, the flexible high-temperature-tolerant RFID tag may be encapsulated in a flexible material. For example, the SOT packaged RFID integrated circuit may be encapsulated in rubber. In some embodiments the entire assembled RFID tag may be encapsulated in rubber or another flexible compound. In some embodiments, such flexible high-temperature-tolerant RFID tags may be advantageously used in high-temperature applications. In an exemplary embodiment, flexible high-temperature-tolerant RFID tags may be attached to products that may be flexible and/or deformable. In an exemplary embodiment, a flexible high-temperature-tolerant RFID tag may be molded into a rubber that will be used in a flexible application. | 2016-02-18 |
20160048752 | MEASUREMENT PROBE WITH HEAT CYCLE EVENT COUNTER - A measurement device is disclosed, embodiments of which are adapted to withstand, detect, and record detection of heat cycle events, including autoclave cycles. Embodiments of the measurement device comprise a sensor for measuring a characteristic of a medium and a heat cycle detection unit. Embodiments of the heat cycle detection unit comprise a temperature or atmospheric pressure responsive element, a detection module, data interface, and data memory. In one disclosed embodiment, the temperature or pressure responsive element is configured to respond to a characteristic of a heat cycle event while the heat cycle detection unit is off. In another disclosed embodiment, the detection module is configured to automatically power off the heat cycle detection unit in response to detecting an autoclave cycle. Methods of using the devices are also disclosed. | 2016-02-18 |
20160048753 | Multiplicative recurrent neural network for fast and robust intracortical brain machine interface decoders - A brain machine interface (BMI) to control a device is provided. The BMI has a neural decoder, which is a neural to kinematic mapping function with neural signals as input to the neural decoder and kinematics to control the device as output of the neural decoder. The neural decoder is based on a continuous-time multiplicative recurrent neural network, which has been trained as a neural to kinematic mapping function. An advantage of the invention is the robustness of the decoder to perturbations in the neural data; its performance degrades less—or not at all in some circumstances—in comparison to the current state decoders. These perturbations make the current use of BMI in a clinical setting extremely challenging. This invention helps to ameliorate this problem. The robustness of the neural decoder does not come at the cost of some performance, in fact an improvement in performance is observed. | 2016-02-18 |
20160048754 | CLASSIFYING RESOURCES USING A DEEP NETWORK - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for scoring concept terms using a deep network. One of the methods includes receiving an input comprising a plurality of features of a resource, wherein each feature is a value of a respective attribute of the resource; processing each of the features using a respective embedding function to generate one or more numeric values; processing the numeric values using one or more neural network layers to generate an alternative representation of the features, wherein processing the floating point values comprises applying one or more non-linear transformations to the floating point values; and processing the alternative representation of the input using a classifier to generate a respective category score for each category in a pre-determined set of categories, wherein each of the respective category scores measure a predicted likelihood that the resource belongs to the corresponding category. | 2016-02-18 |
20160048755 | FLOATING-GATE TRANSISTOR ARRAY FOR PERFORMING WEIGHTED SUM COMPUTATION - A weighted sum is a key computation for many neural networks and other machine learning algorithms. Integrated circuit designs that perform a weighted sum are presented. Weights are stored as threshold voltages in an array of flash transistors. By putting the circuits into a well-defined voltage state, the transistors that hold one set of weights will pass current equal to the desired sum. The current flowing through a given transistor is unaffected by operation of remaining transistors in the circuit. | 2016-02-18 |
20160048756 | NEURAL NETWORK BASED CLUSTER VISUALIZATION - A computing device presents a cluster visualization based on a neural network computation. First centroid locations are computed for first clusters. Second centroid locations are computed for second clusters. Each centroid location includes a plurality of coordinate values where each coordinate value relates to a single variable of a plurality of variables. Distances are computed pairwise between each centroid location. An optimum pairing is selected based on a minimum distance of the computed pairwise distances where each pair is associated with a different cluster of a set of composite clusters. Noised centroid location data is created. A multi-layer neural network is trained with the noised centroid location data. A projected centroid location is determined in a multidimensional space for each centroid location as values of hidden units of a middle layer of the multi-layer neural network. A graph is presented for display that indicates the determined, projected centroid locations. | 2016-02-18 |
20160048757 | Systems and Methods for Real-Time Forecasting and Predicting of Electrical Peaks and Managing the Energy, Health, Reliability, and Performance of Electrical Power Systems Based on an Artificial Adaptive Neural Network - A system for utilizing a neural network to make real-time predictions about the health, reliability, and performance of a monitored system are disclosed. The system includes a data acquisition component, a power analytics server and a client terminal. The data acquisition component acquires real-time data output from the electrical system. The power analytics server is comprised of a virtual system modeling engine, an analytics engine, an adaptive prediction engine. The virtual system modeling engine generates predicted data output for the electrical system. The analytics engine monitors real-time data output and predicted data output of the electrical system. The adaptive prediction engine can be configured to forecast an aspect of the monitored system using a neural network algorithm. The adaptive prediction engine is further configured to process the real-time data output and automatically optimize the neural network algorithm by minimizing a measure of error between the real-time data output and an estimated data output predicted by the neural network algorithm. | 2016-02-18 |
20160048758 | SYSTEM AND METHOD FOR PERSISTENT EVIDENCE BASED MULTI-ONTOLOGY CONTEXT DEPENDENT ELIGIBILITY ASSESSMENT AND FEATURE SCORING - A system and method configured to provide persistent evidence based multi-ontology context dependent decision support, eligibility assessment and feature scoring. Decisions are achieved via a probabilistic functional extension of both potentiality and plausibility towards nouns in all data forms. Plausibility refers to the full set of values garnered by the evidence accumulation process while potentiality is a mechanism to set the various match threshold values. The thresholds define acceptable confidence levels for decision-making and wherein both plausibility and potentiality are implemented through statistical applications which model and estimate the distribution of random vectors by estimating margins and copula separately from all data types. Evidence is filtered by margins and copula on a persistent basis from the scoring of newly harvested content and refined results are computed on the basis of partial matching of feature vector elements for separate and distinct feature weightings associated with the given entity and each of the reference entities within the compressed copula. | 2016-02-18 |
20160048759 | METHOD AND SYSTEM FOR PROVIDING INFORMATION VIA AN INTELLIGENT USER INTERFACE - Various aspects of a method and system for providing information via an intelligent user interface are disclosed herein. In an embodiment, in response to the receipt of a request from an electronic device, the method includes determination of a first information response that may correspond to a first functional service. A set of second information responses that corresponds to a set of second functional services may be determined based on the first information response. Each of the determined set of second information responses is associated with a corresponding weight. One or more of the determined set of second information responses are selected based on the corresponding weight. The second information responses are value-added responses. | 2016-02-18 |
20160048760 | NATURAL LANGUAGE MANAGEMENT OF ONLINE SOCIAL NETWORK CONNECTIONS - Natural language management of online social network connections may comprise receiving natural language data associated with a user's social network interactions. The natural language data associated with a user's social network interactions is analyzed and features used in the user's social network interactions are determined based on the analysis. The contexts in which the features are used in the user's social network interactions may be also determined. Point values to the features used in the user's social network interactions are assigned. A fingerprint of the user is created at least based on the features and the point values. The created fingerprint may be compared with information associated with online communities, and based on the comparison, one or more of the online communities may be recommended as user's potential social network connections. | 2016-02-18 |
20160048761 | Healthcare Industry Optimized Cognitive Information Processing System Environment - A cognitive information processing system environment comprising: a plurality of data sources, at least some of the plurality of data sources comprising healthcare relevant data sources; a cognitive inference and learning system coupled to receive a data from the plurality of data sources, the cognitive inference and learning system processing the data from the plurality of data sources to provide cognitively processed healthcare relevant insights, the cognitive inference and learning system further comprising performing a learning operation to iteratively improve the cognitively processed healthcare relevant insights over time; and, a destination, the destination receiving the cognitively processed healthcare relevant insights. | 2016-02-18 |
20160048762 | Hybrid Data Architecture for Use Within a Healthcare Industry Optimized Cognitive Environment - A data architecture for use within a cognitive information processing system environment comprising: a plurality of data sources, the plurality of data sources comprising a public data source and a private data source, the public data source comprising publicly available healthcare information, the private data source comprising privately managed, company specific healthcare information; and, a cognitive data management module, the cognitive data management module accessing information from the plurality of data sources and providing the information to an inference and learning system. | 2016-02-18 |
20160048763 | Method for Using Hybrid Data Within a Healthcare Industry Optimized Cognitive Environment - A method for using hybrid data within a cognitive information processing system environment comprising: receiving data from a plurality of data sources, the plurality of data sources comprising a public data source and a private data source, the public data source comprising publicly available healthcare information, the private data source comprising privately managed, company specific healthcare information; accessing information from the plurality of data sources via a cognitive data management module; and, providing the information to an inference and learning system. | 2016-02-18 |