Abstract: A method that generally relates to comparing a current dental setup with a series of preset dental setups. More particularly a method where this comparison is used to determine which aligner should be used from a series of dental aligners for proceeding with an orthodontic treatment. Each aligner in the series of previously manufactured aligners is provided for moving the at least one tooth in the patient's teeth from one dental setup to a subsequent dental setup.
Abstract: Computer systems and methods for improving security or performance of one or more client computers interacting with a plurality of server computers. In an embodiment, a computer system comprises a first server computer and a second server computer; wherein the first server computer is configured to: generate a challenge nonce, wherein the challenge nonce corresponds to a challenge state; generate the challenge state based on the challenge nonce, wherein the challenge state corresponds to a response state; send, to a first client computer, the challenge nonce and the challenge state, but not the response state; wherein the second server computer is configured to: receive, from the first client computer, a test nonce and a test response state; determine whether the test response state matches the response state based on the test nonce, without: receiving the challenge state from the first server computer; receiving the challenge state from the first client computer.
Abstract: Methods and apparatus are described for detecting browser extensions. Specific implementations relate to configurable security policies and automated actions performed in response to the detection of browser extensions.
Abstract: A planar imaging sensor is provided. The planar imaging sensor includes a plurality of photo detectors divided into at least a first group of photo detectors and a second group of photo detectors, the first group of photo detectors having a first detection window and the second group of photo detectors having a second detection window, wherein the second detection window is configured to start later in time than the first detection window.
Abstract: Shape-matrix geometric instruments having numerous applications including, but not limited to, anti-counterfeiting, graphical passwording, games, and geometry education. A shape-matrix geometric instrument is a manufacture and/or a method whose design is based on a shape-matrix that, in turn comprises a set of building blocks that are N-dimensional polytopes. Corner shapes are positioned in or near the interior corner spaces of at least ones of the shape-matrix building blocks. At least ones of the corner shapes differ from others in at least one property or aspect including, for example, geometric shape, orientation within the building block, and one or more surface “finishes,” such as color, shading, cross-hatching or real or apparent texture.
Abstract: In an embodiment, a method comprises rendering a first image of a first user interface based on a first set of instructions; rendering a second image of a second user interface based on a second set of instructions; generating a first mask comprising a plurality of points, wherein each point in the first mask indicates whether a first point in the first image and a second point in the second image are different; rendering a third image of a third user interface based on a third set of instructions, wherein the first set of instructions are different than the third set of instructions and the first image is different than the third image; determining that the first image is equivalent to the third image based on the first image, the first mask, and the third image.
Abstract: A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party.
Type:
Grant
Filed:
July 10, 2017
Date of Patent:
January 22, 2019
Assignee:
SHAPE SECURITY, INC.
Inventors:
Justin D. Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock
Abstract: A headset vision system includes a non-transitory computer-readable storage medium having instructions stored thereon that, upon execution by a processor, cause the processor to determine an arrangement of a mirror device, provide a display on a screen of a display device based on the arrangement of the mirror device, and receive inputs from a user of the headset vision system such that the user is able to control the headset vision system absent the user providing a touch input.
Abstract: A method for visualising a 3D dental restoration on a 2D image of the mouth of a patient includes obtaining a 3D dental model of at least a part of the patient's oral cavity, designing the 3D dental restoration, obtaining the 2D image of the mouth of the patient, estimating a virtual camera including at least one virtual camera property corresponding to at least one physical camera property of the physical camera used to obtain the 2D image, viewing the 3D dental restoration using the virtual camera, determining the visible area of the 3D dental restoration, which is not overlapped by surrounding anatomic features when viewed with the virtual camera, imaging the visible area of the 3D dental restoration with the 2D image. This advantageously provides an image which with high accuracy gives the dentist and the patient a visual presentation of the final result of a dental treatment.
Abstract: Presented is an optical coherence tomography system and method to increase imaging depth of optical coherence tomography (OCT) by selective amplification. In a swept-source OCT system with periodically linear wavenumber-vs-time characteristic, the signal in principle is summation of various sinusoidal signals with different frequencies. Each frequency component of the recorded signal carries reflectivity information for a certain depth of the analyzed object. At greater depth inside the analyzed object, the reflectivity information is generally weak due absorption and scattering. An analog or digital electronic circuit selectively filters and amplifies frequencies above some threshold, possibly up to another threshold. In this way, even small signals for relatively larger depths become detectable.
Abstract: Disclosed is an optical coherence tomography scanner and a method for recording sub-surface scans of an object, wherein a position encoder is arranged in the path of the probing beam of an interferometric system. The encoder pattern is detected in a sequence of A scans at generated for different probing beam positions on the scanned object, the probing beam position and/or inclination for at least one A scan of said sequence of A scans is deducing based on the detected encoder pattern, and the sub-surface scan of the object is generated based on the sequence of A scans taking into account the deduced probing beam position and/or inclination.
Type:
Application
Filed:
January 20, 2017
Publication date:
January 10, 2019
Applicant:
3SHAPE A/S
Inventors:
Ashwani Kumar, Deepak Vijayakumar Nair, Erik Ask, Karl-Josef Hollenbeck
Abstract: A radiographic system including a radiation source emitting a radiation beam, a radiation sensor for detecting incident radiation from the radiation beam on a sensor area, at least one collimator arranged between the radiation source and the radiation sensor for masking the radiation beam to irradiate a radiation area on the sensor which is smaller than the sensor area and means for moving the collimator across the radiation beam, whereby the radiation area is moved across the sensor area.
Abstract: Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed.
Abstract: Techniques are provided for secure detection and management of compromised credentials. A first candidate credential is received, comprising a first username and a first password, wherein the first candidate credential was sent in a first request from a first client computer to log in to a first server computer. A first salt associated with the first username in a salt database is obtained. A first hashed credential is generated based on the first password and the first salt. The first hashed credential is transmitted to a set model server computer, wherein the set model server computer is configured to maintain a set model that represents a set of spilled credentials, determine whether the first hashed credential is represented in the set model, and in response to determining that the first hashed credential is represented in the set model, performing additional processing on the first hashed credential.
Type:
Application
Filed:
July 2, 2018
Publication date:
January 3, 2019
Applicant:
SHAPE SECURITY, INC.
Inventors:
Zhipu Jin, Gautam Agrawal, Daniel G. Moen, Weiguo Liang, Xingang Wang
Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.
Type:
Application
Filed:
July 23, 2018
Publication date:
January 3, 2019
Applicant:
SHAPE SECURITY, INC.
Inventors:
Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
Abstract: A method for digitally designing a digital restoration design and a digital reduction coping design, the method includes obtaining a digital 3D representation of the upper jaw and the lower jaw of the patient, the digital 3D representation includes a digital 3D preparation representing at least one preparation targeted for receiving a restoration; digitally determining a reduction surface intersecting the digital 3D preparation, the reduction surface arranged order to meet a minimum thickness requirement for the digital restoration design; and digitally designing the digital restoration design and the digital reduction coping design based at least on the reduction surface and the digital 3D preparation. This allows designing the reduction coping and the restoration at the same time and thereby reduces chair time and visits by the patient.
Abstract: Detecting a movable object in a location includes providing a first 3D representation of at least part of a surface; providing a second 3D representation of at least part of the surface; determining for the first 3D representation a first excluded volume in space where no surface can be present; determining for the second 3D representation a second excluded volume in space where no surface can be present; if a portion of the surface in the first 3D representation is located in space in the second excluded volume, the portion of the surface in the first 3D representation is disregarded in the generation of the virtual 3D model, and/or if a portion of the surface in the second 3D representation is located in space in the first excluded volume, the portion of the surface in the second 3D representation is disregarded in the generation of the virtual 3D model.
Type:
Application
Filed:
June 26, 2018
Publication date:
December 20, 2018
Applicant:
3SHAPE A/S
Inventors:
Rune FISKER, Michael VINTHER, Henrik ÖJELUND
Abstract: A beam article for a vehicle includes a plurality of separate elongated metal sheets attached together to form generally planar walls of an elongated tubular structure. At least one of the plurality of separate elongated metal sheets has a shear wall that is disposed along a hollow interior of the elongated tubular structure and is attached at opposing walls of the elongated tubular structure. At least one of the plurality of separate elongated metal sheets comprises an edge that abuts a side surface of an adjacent one of the plurality of separate elongated metal sheets to define a non-radiused perpendicular weld corner along the elongated tubular structure.
Type:
Grant
Filed:
September 1, 2017
Date of Patent:
December 18, 2018
Assignee:
Shape Corp.
Inventors:
Joseph R. Matecki, Jonathon J. Pothoven
Abstract: Disclosed are methods and digital tools for deriving tooth condition information for a patient's teeth, for populating a digital dental chart with derived tooth condition information, and for generating an electronic data record containing such information.
Type:
Application
Filed:
December 5, 2016
Publication date:
December 13, 2018
Applicant:
3SHAPE A/S
Inventors:
Mike VAN DER POEL, Rune FISKER, Karl-Josef HOLLENBECK
Abstract: An API call filtering system filters responses to API call requests received, via a network, from UEs. The API call filtering system is configured to require personalized API call requests wherein each API call (except for some minor exceptions) includes a unique UE identifier (“UEIN”) of the UE making the request. Using the UEIN, the web service or other service protected by the API call filtering system can be secured against excessive request iterations from a set of rogue UEs while allowing for ordinary volumes of requests of requests the UEs, wherein one or more boundaries between what is deemed to be an ordinary volume of requests and what is deemed to be excessive request iterations are determined by predetermined criteria.