Patents Issued in January 18, 2007
  • Publication number: 20070014394
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and excuted by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Application
    Filed: April 3, 2004
    Publication date: January 18, 2007
    Inventors: Wulf Harder, Bernd Peeters, Uwe Resas, Stefan Weber
  • Publication number: 20070014395
    Abstract: Advanced Encryption Standard (AES) is an encryption algorithm for securing sensitive unclassified material by U.S. Government agencies and, as a consequence the de facto encryption standard for commercial applications worldwide. Performing concurrent error detection (CED) for protection of such a widely deployed algorithm is an issue of paramount importance. We present a low-cost CED method for AES. In this method, we make use of invariance properties of AES to detect errors. For the first time, the invariance properties of the AES, which are for the most part used to attack the algorithm, are being used to protect it from fault attacks. Our preliminary ASIC synthesis of this architecture resulted in an area overhead of 13.8% and a throughput degradation of 16.67%.
    Type: Application
    Filed: January 6, 2006
    Publication date: January 18, 2007
    Inventors: Nikhil Joshi, Ramesh Karri
  • Publication number: 20070014396
    Abstract: An encoding/decoding operation portion includes an encoding/decoding operation circuit and an avoiding path for detouring the encoding/decoding operation circuit and can select between encoding or decoding input data in the encoding/decoding operation circuit and detouring the encoding/decoding operation circuit to output the input data without change. Only one wire has to be provided from a selector to a key storage portion and an initialization-vector storage portion. With this construction, it is possible to realize an encoding/decoding circuit which can suppress an increase in the number of wires used to transmit a content of key data to the key storage portion and the initialization-vector storage portion and does not cause complication of circuit layout.
    Type: Application
    Filed: July 11, 2006
    Publication date: January 18, 2007
    Applicant: Renesas Technology Corp.
    Inventors: Shigenori Miyauchi, Atsuo Yamaguchi
  • Publication number: 20070014397
    Abstract: A memory card, which is a storage device connectable to a terminal, includes a buffer memory in which externally-provided data is stored, a flash memory, and a controller which controls reading and writing of data from and to these memories. The controller saves a divided input data in the non-volatile memory in accordance with a result of determination regarding data size information contained in a first divided input data of data externally inputted for a security process and a data management size of the storage device, and the controller reads the saved data to the memory for performing the security process when it receives an n-th divided input data.
    Type: Application
    Filed: July 3, 2006
    Publication date: January 18, 2007
    Inventors: Masaharu Ukeda, Satoshi Yoshida, Yoshinori Mochizuki
  • Publication number: 20070014398
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to symmetric key generation and provide a method, system and computer program product for symmetric key generation using an asymmetric private key. In one embodiment, a symmetric key generation data processing system can include a symmetric key generator configured with a programmatic interface including an input parameter for a seed, an input parameter for an asymmetric private key, and an output parameter for a symmetric key. The symmetric key generator can include program code enabled to generate the symmetric key by encrypting the seed with the asymmetric private key.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Applicant: International Business Machines Corporation
    Inventors: Alan Eldridge, David Kern
  • Publication number: 20070014399
    Abstract: A key management overlay system includes a first key management system that produces a first cryptographic key, a second key management system that produces a second cryptographic key, and a math module that implements a math model that generates a third cryptographic key based at least in part on the first and second cryptographic keys. A key management overlay process includes generating a first cryptographic key according to a first key management system, generating a second cryptographic key according to a second key management system, and generating a third cryptographic key based at least in part on the first and second cryptographic keys.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventors: Edward Scheidt, C. Wack, Wai Tsang
  • Publication number: 20070014400
    Abstract: A cryptographic key split binder includes key split generators that generate cryptographic key splits from seed data and a key split randomizer for randomizing cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Key split generators can include a random split generator for generating a random key split based on reference data, a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data or a biometric split generator for generating a biometric key split based on biometric data. Any key split can further be based on static data, which can be updated. Label data can be read from a storage medium, and can include user authorization data. A cryptographic key can be, for example, a stream of symbols, at least one symbol block, or a key matrix.
    Type: Application
    Filed: June 22, 2006
    Publication date: January 18, 2007
    Inventors: C. Wack, Edward Scheidt, James Kolouch
  • Publication number: 20070014401
    Abstract: In wireless communications, transmission devices require continuous supplies of random data for encryption processes. The invention provides a method for generating a continuos pool of truly random data with hardware that is already available in conventional CDMA phones.
    Type: Application
    Filed: October 18, 1999
    Publication date: January 18, 2007
    Inventor: SANDIP SARKAR
  • Publication number: 20070014402
    Abstract: A method to detect PAL colorstripe utilizing PAL-switch with minimal logic is provided. A first polarity parameter may be generated by adding an averaged U component value of a current PAL line with a first threshold value. The first polarity parameter may be utilized to detect 180-degree inversion or U axis inversion colorstripe protection. A V component of a current PAL line may be averaged and an inverse of the average generated. A PAL-switch signal may be utilized to select between the average V component value and its inverse value. A second polarity parameter may be generated by adding the selected value with a second threshold value. The second polarity parameter may be utilized to detect V axis inversion colorstripe protection. When colorstripe protection is detected, whether based on the first polarity parameter or the second polarity parameter, a colorstripe detection signal may be generated.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Inventors: Wen Huang, Brad Delanghe, Aleksandr Movshovich
  • Publication number: 20070014403
    Abstract: A system for controlling distribution of protected content to portable mass storage media devices (10), the system comprising: a host application (200) for a host device (20) including: collection module (202) to collect predetermined identifiers of a portable mass storage media device (10) connected to the host device (20); a first key generation module (201) to generate an encryption key using a secret key and the collected identifiers; and an encryption module (203) to encrypt protected content using the encryption key when protected content is copied to the media device (10); and a client application (100) for the portable mass storage media device (10) including: a second key generation module (101) to generate the encryption key using a secret key and predetermined identifiers of the portable mass storage media device (10); and a decryption module (102) to decrypt data relating to encrypted protected content in sector buffer memory (12) of the media device (10) using the encryption key after each read o
    Type: Application
    Filed: July 18, 2005
    Publication date: January 18, 2007
    Inventors: Chian Loo, Chee Ang, Chun Lim
  • Publication number: 20070014404
    Abstract: A transport stream reproducing method and a television receiver using the same enable reproduction of a transport stream from a previous reproduction stop point. The television receiver includes a personal video recorder for storing at least one previous reproduction section of the transport stream constructed of a plurality of transport packets and for selectively reproducing the stored transport stream; a flag setting unit for setting a flag in one of the plurality of transport packets, the set flag containing information indicating a stop point of a previous reproduction section of the stored transport stream; and a system controller for controlling the personal video recorder to reproduce the transport stream according to the flag information.
    Type: Application
    Filed: May 10, 2006
    Publication date: January 18, 2007
    Inventor: Youn Cha
  • Publication number: 20070014405
    Abstract: A tag information production apparatus is disclosed which can apply tag information to a main image through a realistic amount of work. A time information acquisition section acquires time information of a main image selected on a working screen, and a key region setting section sets a key region at a position corresponding to a partial region in the main image specified arbitrarily by an operator. An identification information application section applies, to the set key region, region identification information which allows identification between the key region and a peripheral region. A key image production section produces a key image to which time information same as the time information of the main image is applied and in which the region identification information is applied to the key region set through the working screen.
    Type: Application
    Filed: July 5, 2006
    Publication date: January 18, 2007
    Applicant: Sony Corporation
    Inventors: Hiroaki Kikuchi, Hideyuki Imaida
  • Publication number: 20070014406
    Abstract: A cryptographic key split combiner includes a number of key split generators for generating cryptographic key splits from seed data, and a key split randomizer for randomizing the key splits to produce a cryptographic key. The key split generators can include a random split generator for generating random key splits, a token split generator for generating token key splits based on label data, a console split generator for generating console key splits based on maintenance data, a biometric split generator for generating biometric key splits based on biometric data, and a location split generator for generating location key splits based on location data. Label data can be read from storage, and can include user authorization data. A process for forming cryptographic keys includes randomizing or otherwise binding the splits to form the key.
    Type: Application
    Filed: June 22, 2006
    Publication date: January 18, 2007
    Inventors: Edward Scheidt, C. Wack
  • Publication number: 20070014407
    Abstract: A device uses a user authentication factor to generate a symmetric key for use in symmetric cryptography. The user authentication factor is encrypted and stored for authentication during decryption.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventors: Siva Narendra, Prabhakar Tadepalli, Thomas Spitzer
  • Publication number: 20070014408
    Abstract: A device uses a user authentication factor to generate an asymmetric decryption key for use in cryptography. An asymmetric encryption key is generated from the asymmetric decryption key using a one-way function, and the asymmetric encryption key is used to encrypt a symmetric key.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventors: Siva Narendra, Prabhakar Tadepalli, Thomas Spitzer
  • Publication number: 20070014409
    Abstract: A system is provided that includes a first device and a second device. The second device is configured to communicate wirelessly with the first device. The first and second devices selectively reduce an operational range for communications before sharing a secret, the secret related to data encryption.
    Type: Application
    Filed: June 23, 2006
    Publication date: January 18, 2007
    Applicant: Texas Instruments Incorporated
    Inventors: Anuj Batra, Srinivas Lingam
  • Publication number: 20070014410
    Abstract: The present invention provides a method of authenticating a pair of correspondents in a communication system, such as in a mobile phone network by utilizing a blend of public-key cryptography and symmetric cryptography. Each session between the mobile phone and the network consists of public-key based mutual authentication and key exchange followed by symmetric-key secure data exchange.
    Type: Application
    Filed: September 15, 2006
    Publication date: January 18, 2007
    Inventors: Prakash Panjwani, Simon Blake-Wilson
  • Publication number: 20070014411
    Abstract: In one embodiment, a network comprises a plurality of nodes that communicate with one another. A first node included in the plurality of nodes generates a plan comprising a plurality of marker states. Each marker state comprises a value for a property associated with the first node. When the first node broadcasts information indicative of a given marker state included in the plan, at least one node other than the first node verifies the value of the property included in the given marker state.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventor: Subhas Ghosh
  • Publication number: 20070014412
    Abstract: A computing system includes data encryption in the data path between a data source and data storage devices. The data storage devices may be local or they may be network resident. The data encryption may utilize a key which is derived at least in part from an identification code stored in a non-volatile memory. The key may also be derived at least in part from user input to the computer. In a LAN embodiment, public encryption keys may be automatically transferred to a network server for file encryption prior to file transfer to a client system.
    Type: Application
    Filed: September 14, 2006
    Publication date: January 18, 2007
    Inventor: Doug Rollins
  • Publication number: 20070014413
    Abstract: Various embodiments permit policy updates, such as DRM policy updates, to be delivered and updated for a given piece of protected content. In at least some embodiments, various protocols can be extended to permit policy updates to be represented and carried by the protocol. In one embodiment, Hypertext Transport Protocol or HTTP is utilized to carry the policy updates. In another embodiment, Real Time Streaming Protocol or RTSP is used to carry policy updates.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventors: Eduardo Oliveira, James Alkove, Anders Klemets
  • Publication number: 20070014414
    Abstract: Software piracy is inhibited by distributing unique software product keys operable in hardware or a hardware linked device. Software operable on the hardware requires the presence of the key in or accessible via the hardware, and operates only if the hardware product key is present. A method for securing software includes the steps of: providing a plurality of unique product activation keys designed for access by a computer program and delivering the keys to a hardware manufacturer. The computer program seeks at least one of said plurality of unique product activation keys in the read only memory device.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventor: Mark Benedikt
  • Publication number: 20070014415
    Abstract: A quantum key distribution (QKD) method involves the sending of random data from a QKD transmitter to a QKD receiver over a quantum signal channel, and the QKD transmitter and receiver respectively processing the data transmitted and received over the quantum signal channel in order to seek to derive a common random data set. This processing is effected with the aid of messages exchanged between QKD transmitter and receiver over an insecure classical communication channel. The processing concludes with a check, effected by an exchange of authenticated messages over the classical communication channel, that the QKD transmitter and receiver have derived the same random data set. At least some of the other messages exchanged during processing are exchanged without authentication and integrity checking. A QKD transmitter and QKD receiver are also disclosed.
    Type: Application
    Filed: June 16, 2006
    Publication date: January 18, 2007
    Inventors: Keith Harrison, William Munro, Liqun Chen
  • Publication number: 20070014416
    Abstract: A computer system that may include a trusted platform module (TPM) along with a processor hashes a user-supplied password for a predetermined time period that is selected to render infeasible a dictionary attack on the password. The results of the hash are used to render an AES key, which is used to encrypt an RSA key. The encrypted RSA key along with the total number of hash cycles that were used is stored and the RSA key is provided to the TPM as a security key. In the event that the RSA key in the TPM must be recovered, the encrypted stored version is decrypted with an AES key that is generated based on the user inputting the same password and hashing the password for the stored number of cycles.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventors: David Rivera, David Challener, James Hoff
  • Publication number: 20070014417
    Abstract: To realize virtual surround reproduction with small deterioration in the SN ratio of an entire reproduction system, in the case of adding together virtual surround signals and front-channel audio signals in an adder 1300, volume normalization is carried out in a volume normalizing section 1200 before the addition. In the case where the addition is not performed, the virtual surround signals and the front-channel audio signals are output independently of each other without being subjected to volume normalization in the volume normalizing section 1200.
    Type: Application
    Filed: February 24, 2005
    Publication date: January 18, 2007
    Inventors: Takeshi Fujita, Tomoko Sakakibara, Eriko Kanki
  • Publication number: 20070014418
    Abstract: Sound radiation from a region of a vibrating surface is reduced by coupling a stiff structure to the vibrating surface using a first compliant element, such that the region of the vibrating surface is substantially covered. A dynamic force is applied to the stiff structure. The dynamic force reacts against a mass element and is selected to minimize the radiated sound. The dynamic force may be applied using a passive, semi-active or active coupling between the mass element and the stiff structure.
    Type: Application
    Filed: July 11, 2006
    Publication date: January 18, 2007
    Inventors: Graham Eatwell, Ralph Busch
  • Publication number: 20070014419
    Abstract: The invention relates to adaptive directional systems, and more particularly to a method and apparatus for producing adaptive directional signals. The invention may be applied to the provision of audio frequency adaptive directional microphone systems for devices such as hearing aids and mobile telephones. The method involves constructing the adaptive directional signal (46) from a weighted sum of a first signal (42A) having an omni-directional polar pattern and a second signal (42B) having a bi-directional polar pattern, wherein the weights are calculated to give the combined signal a constant gain in a predetermined direction and to minimise the power of the combined signal. The method has particular application in producing signals in digital hearing aids, the predetermined direction being in the forward direction with respect to the wearer.
    Type: Application
    Filed: August 11, 2004
    Publication date: January 18, 2007
    Applicant: DYNAMIC HEARING PTY LTD.
    Inventor: Brenton Steele
  • Publication number: 20070014420
    Abstract: A voice-activated, or voice-operated, remote control is adapted to reduce or eliminate the sound output of one or more entertainment appliances in order quiet the environment and thereby improve the effectiveness and accuracy its voice recognition functions. In one aspect of the present invention, the remote control sends a mute command to an appliance under control and listens for a voice command during an ensuing predetermined time period. In a further aspect of the present invention, the remote control determines which one of a plurality of unmute sequences is to be transmitted.
    Type: Application
    Filed: July 13, 2005
    Publication date: January 18, 2007
    Inventor: William Brown
  • Publication number: 20070014421
    Abstract: An electroacoustic transducer has an cup chamber and a diaphragm made of deformable electrostrictive polymer, which is attached to an opening of the chamber. The electroacoustic transducer also has first and second adaptive electrode layers formed on a front surface and a rear surface of the diaphragm, across which audio signal voltage biased by a direct-current biased voltage is applied. The first and second adaptive electrode layers have shapes that are adjustable according to a change in a shape of the diaphragm. The diaphragm is formed to make maximum a difference in air pressure of the front surface and the rear surface of the diaphragm, thereby forming any one of concave and convex shapes thereof.
    Type: Application
    Filed: July 10, 2006
    Publication date: January 18, 2007
    Applicant: Sony Corporation
    Inventors: Yoshio Ohashi, Jun Kishigami, Masaru Uryu
  • Publication number: 20070014422
    Abstract: Mixing individualized media content. When individualized media content is generated from separate media clips or files, mixing the separate media clips includes controlling the audio. The volume of the audio in each clip is determined and normalized with respect to other media clips as the individualized media content is mixed. This provides a consistent audio experience even when the media content is generated from multiple sources having different properties. When more than one track of audio is present, such as voice audio and background music, the volume of one track is lowered such that the other audio track is audible. The volume of the background music, for example, is reduced such that the subscriber can hear the instructions in the voice audio.
    Type: Application
    Filed: June 29, 2006
    Publication date: January 18, 2007
    Applicant: Podfitness, Inc
    Inventors: Darren Wesemann, Jeffrey Hays
  • Publication number: 20070014423
    Abstract: An auditory device is disclosed. The auditory device includes a behind-the-ear element and an at least partially in-ear element. The behind-the-ear element has a shell shaped to fit behind an outer portion of an ear of a user. The shell has first and second sides that are substantially parallel to each other. The first side faces the outer portion of the ear, and the second side faces a head of the user. The behind-the-ear element also includes sound processing circuitry within the shell. The behind-the-ear element further includes an ear cushion switch operatively connected to the sound processing circuitry. The ear cushion switch is located on the first side of the shell. The at least partially in-ear element includes a microphone, acoustic pickup pillow-pad, sensors, receiver and a cushioned tip. The at least partially in-ear element can include a closed ear detachable cushioned tip and an open ear detachable cushioned tip.
    Type: Application
    Filed: July 18, 2005
    Publication date: January 18, 2007
    Inventors: Alexander Darbut, Thomas Odegard
  • Publication number: 20070014424
    Abstract: Micro-speaker assemblies and mobile terminals including micro-speaker assemblies are provided. The micro-speaker assemblies include a micro-speaker positioned in a housing. A first forward tuning volume is positioned adjacent a front face of the micro-speaker. A passageway extends from the first forward tuning volume to an opening in the housing. A second forward tuning volume in fluid communication with the passageway is positioned at a location between the first forward tuning volume and the opening in the housing. The second forward tuning volume, the first forward tuning volume and the passageway define a double-resonator that tunes a frequency response of the micro-speaker. Methods for tuning micro-speakers are also provided.
    Type: Application
    Filed: September 22, 2006
    Publication date: January 18, 2007
    Inventor: William Eaton
  • Publication number: 20070014425
    Abstract: An acoustic structure of seat back, with an acoustic unit provided in a hole of padding of the seat back. The acoustic unit includes speaker unit (s) and a support box in which the speaker unit (s) is/are supportively received. The support box is accommodated in the afore-said hole of padding, with an opened side thereof facing to a forward side of the padding. A sound-conductive cushion element is supported by that support box so as to lie on a forward side of the speaker unit(s). The support box may include an acoustic hollow portion therein. Those padding and sound-conductive cushion element are covered with a trim cover assembly. A speaker support cushiony element may be provided in the support box to support the speaker unit(s), with a high sound conductivity. The speaker support cushiony element and/or the sound-conductive cushion element may be of network structure.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Applicant: Tachi-S Co. Ltd.
    Inventor: Masahiro Matsuhashi
  • Publication number: 20070014426
    Abstract: A multimedia audio dock is provided to support a portable electronic device so that the portable electronic device can stand on a plane. The multimedia audio dock includes two retractable arms formed by a plurality of sleeved-through tubes so that the length of the two retractable arms can be varied to a predetermined length. A biaxial hinge providing two rotational axes is connected to the two retractable arms, so that the two retractable arms may rotate relative to each other about two rotational axes. Two speakers provided respectively at the ends of the two retractable arms opposite to the ends connected to the biaxial hinge. The speakers receive the audio signals and output sound. And the electronic device is held between the two speakers moved by the two retractable arms, so that the portable electronic device can stand on the plane.
    Type: Application
    Filed: October 24, 2005
    Publication date: January 18, 2007
    Inventors: Cheng-Hsin Sung, Chao-Yang Lin
  • Publication number: 20070014427
    Abstract: A paddle (142) of a diaphragm (118) of a receiver (100) is manufactured using one or more layers of a material selected for their inertial mass and rigidity. The paddle may have a layered structure with stiff outer layers such as aluminum and a less dense inner layer, such as thermoplastic adhesive. The inner and outer layers are selected to give an inertial mass matching that of an armature (124) of the receiver (100) and to give a lowest frequency bending resonance above a desired range, for example, 14 KHz.
    Type: Application
    Filed: September 22, 2006
    Publication date: January 18, 2007
    Applicant: KNOWLES ELECTRONICS, LLC
    Inventors: David Schafer, Mekell Jiles
  • Publication number: 20070014428
    Abstract: Disclosed is a method and system for digital watermarking of multimedia signals. The input multimedia signal is represented using an inverse difference pyramid decomposition. Spectrum coefficients may be calculated for each level of the pyramid using a new kind of complex Hadamard transform, the matrix of which is distinguished from the known ones by the fact that only one-fourth of its coefficients are complex numbers. The phases of a previously selected part of the low-frequency coefficients are modified with the watermark data, limiting the angles of the phase changes in a gap of several degrees only. After an inverse complex Hadamard Transform, the values of the coefficients from all pyramid levels are summed up and the result is the watermarked signal. The watermark can contain multiple independent levels for each level of the pyramid.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Inventors: Roumen Kountchev, Vladimir Todorov, Roumiana Kountcheva, Mariofanna Milanova, Charles Ford
  • Publication number: 20070014429
    Abstract: A watermark embedding method for embedding a secret message sequence in a document. The techniques include obtaining layout information of the document, extracting a digest of the document by using a Hash function, calculating embedded positions where the secret message sequence is embedded in the document, and dispersedly hiding the secret message sequence in each of the calculated embedded positions by altering the layout of the document. Also provided is a watermark embedding apparatus, a corresponding watermark detecting method and apparatus, and a method and system for detecting document integrity. The integrity of documents in various forms can be detected, and secret information to be hidden can be embedded therein and extracted therefrom. The techniques described are not limited to the document either in soft copy or in hard copy and have good robustness.
    Type: Application
    Filed: July 14, 2006
    Publication date: January 18, 2007
    Inventors: Yuan He, Lin Luo, Ming Su, Ling Shao, Zhe Xiang
  • Publication number: 20070014430
    Abstract: Provided are an apparatus and method for providing security for an image signal in a base station or a terminal by detecting face information from the image signal. The apparatus includes a signal receiving unit receiving an image signal transmitted from a terminal, a location discriminating unit detecting a calling location of the terminal and checking if the calling location falls within a security region, and a controller transmitting the image signal when the calling location does not fall within the security region, or when the calling location falls within the security region and the image signal contains face information. Accordingly, it is possible to prevent unauthorized transmission of images without additional big burden of security equipment or an invasion of individual rights of using image communication.
    Type: Application
    Filed: September 21, 2006
    Publication date: January 18, 2007
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: In-myung Cho, Tae-kyun Kim
  • Publication number: 20070014431
    Abstract: A system and method are provided for detecting one or both eyes of the driver of a vehicle. The system includes a video imaging camera oriented to generate images of the driver's face. The system also includes a video processor for processing the images generated with the video imaging camera. Filters are applied to each of potential eye candidates to determine which candidates represent an eye, weighted values are assigned to the filtered eye candidates, and an eye is detected based on the weighting of each eye candidate. According to one aspect, different size patches of potential eye candidates are processed and compared to models.
    Type: Application
    Filed: June 10, 2005
    Publication date: January 18, 2007
    Inventors: Riad Hammoud, Andrew Wilhelm
  • Publication number: 20070014432
    Abstract: A moving-object region is specified on an image captured by an imaging apparatus, and a plurality of calculation points are arranged on the specified region. A group of local motion vectors is determined for the calculation points, and a moving-object motion vector is obtained based on the determined local motion vectors. A group of calculation points whose local motion vectors are the same as or similar to the moving-object motion vector is continuously used to calculate the local motion vectors, and is updated by moving the position of the group of calculation points along the moving-object motion vector, and a calculation point whose local motion vector is different from the moving-object motion vector is rearranged by placing a new calculation point at a position near any of the continuously used calculation points. A movable mechanism including the imaging apparatus is controlled in accordance with the moving-object motion vector.
    Type: Application
    Filed: July 6, 2006
    Publication date: January 18, 2007
    Applicant: Sony Corporation
    Inventor: Nobuhiro TSUNASHIMA
  • Publication number: 20070014433
    Abstract: A luminance image which is formed by luminance components of an image is generated, and a plurality of reduced-scale images by recursively reducing the luminance image are generated. Positions of eye candidate regions from each of the reduced-scale images are detected, it is determined that whether or not a face candidate region which is specified by positions of the detected two eye candidate regions is a face pattern. If the face candidate region is determined not as the face pattern, neighboring regions in the neighborhood of the positions of the eye candidate regions in the face region are set. It is determined whether or not a face candidate region which is specified by a first position in one neighboring region and a second position in the other neighboring region as positions of eye candidate regions, is the face pattern.
    Type: Application
    Filed: July 11, 2006
    Publication date: January 18, 2007
    Applicant: CANON KABUSHIKI KAISHA
    Inventor: KOTARO YANO
  • Publication number: 20070014434
    Abstract: The method and system for vehicular guidance comprises an imaging device for collecting color image data. A definer defines a series of scan line segments generally perpendicular to a transverse axis of the vehicle or of the imaging device. An image parameter evaluator determines scan line image parameter data for each of the scan line segments. An alignment detector (e.g., search engine) identifies a preferential heading of the vehicle that is generally aligned with respect to a crop feature, associated with the image data, based on the determined scan line image parameter meeting or exceeding a maximum value or minimum threshold value.
    Type: Application
    Filed: December 16, 2005
    Publication date: January 18, 2007
    Inventors: Jiantao Wei, Shufeng Han
  • Publication number: 20070014435
    Abstract: A computer-implemented method is provided that automatically characterizes and verifies stationarity of a training image for use in multipoint geostatistical analysis. The stationarity is preferably characterized by statistical measures of orientation stationarity, scale stationarity, and category distribution stationarity.
    Type: Application
    Filed: July 13, 2005
    Publication date: January 18, 2007
    Applicant: SCHLUMBERGER TECHNOLOGY CORPORATION
    Inventors: Piotr Mirowski, Daniel Tetzlaff, David McCormick, Nneka Williams, Claude Signer
  • Publication number: 20070014436
    Abstract: The disclosure presents an embroidery data processing device and a computer program product capable of creating a single unit of tree structure vector data by coupling plural pieces of independent tree structure vector data. A coupling node N22 is added between nodes N2 and N5 of a tree structure vector data (TV1), and a vector data N2 to N22 for coupling nodes N2 and N22, and a vector data N22 to N5 for coupling nodes N22 and N4 are created, and thereby a tree structure vector data (TVa) is created (S1 to S3). In a tree structure vector data (TV2), the node mutual direction is converted so that the node N22 existing at the connecting position may be a root node, and a tree structure vector data (TVb) is created, and this root node N22 is coupled with the coupling node N22 of the tree structure vector data (TVa), and a single tree structure vector data is created (S4 to S6).
    Type: Application
    Filed: June 27, 2006
    Publication date: January 18, 2007
    Applicant: Brother Kogyo Kabushiki Kaisha
    Inventors: Yukiyoshi Muto, Mikitoshi Suzuki, Masahiro Mizuno, Shoichi Taguchi, Akihiro Wakayama
  • Publication number: 20070014437
    Abstract: The present invention provides an information processing apparatus that can improve immediacy. The information processing apparatus emits a plurality of lights whose wavelengths are different from each other to a living body, disperses the respective lights coming from the living body, separates a plurality of image components corresponding to the respective lights from an image pickup signal output as a result of image pickup by an image pickup element for the respective dispersed lights, and carries out processing corresponding to the respective image components. Thus, it becomes possible to concurrently pick up an image pickup subject without the processing of controlling an optical system, which can reduce processing burden at the time of image pickup.
    Type: Application
    Filed: August 22, 2005
    Publication date: January 18, 2007
    Applicant: Sony Corporation
    Inventor: Hideo Sato
  • Publication number: 20070014438
    Abstract: A method of iris recognition using a cumulative-sum-based change point analysis and an apparatus using the same are disclosed. The method includes: transforming an iris image to a polar coordinated image having n×m pixel size and dividing the polar coordinated image into at least one cell; grouping the divided iris images into at least one of first groups having a predetermined number of cells, and at least one of second groups each having more cells than the first group has; performing a cumulative-sum-based change point analysis using a predetermined characteristic pattern value of each cell as a representative value; and generating a pattern vector by assigning a predetermined value to a cell having the change point and assigning a different value to other cells.
    Type: Application
    Filed: April 18, 2006
    Publication date: January 18, 2007
    Inventors: Jong Ko, Youn Gil, Jang Yoo, Kyo Chung
  • Publication number: 20070014439
    Abstract: A suspicious individual can be detected more accurately. A face detecting unit detects a face image of an approaching individual from a monitor image, and a characteristic amount detecting unit detects the characteristic amount of the approaching individual from the face image. A collating unit identifies an approaching individual by collating the characteristic amount of the approaching individual with the characteristic amount of an authorized individual which is recorded in an authorized individual information recording unit and the characteristic amount of a previously detected individual which is recorded in an approach information recording unit.
    Type: Application
    Filed: March 14, 2006
    Publication date: January 18, 2007
    Applicant: OMRON Corporation
    Inventor: Tanichi Ando
  • Publication number: 20070014440
    Abstract: A system and method for automated print identification is described.
    Type: Application
    Filed: December 18, 2002
    Publication date: January 18, 2007
    Inventor: Peter Lo
  • Publication number: 20070014441
    Abstract: A fingerprint identification assembly includes a body having an objective lens mounted on top of the body for receiving thereon a fingertip and a first reflective lens mounted on a bottom of the body to receive reflected light from the objective lens, a light source emitting light to the first reflective lens and a sensing device integrally formed with the body and having a second reflective lens to receive the reflected light from the first reflective lens and a sensor to receive the reflected light from the second reflective lens so as to compare the received reflected light with information stored inside the sensor.
    Type: Application
    Filed: July 13, 2005
    Publication date: January 18, 2007
    Inventors: Jung-Chun Wu, Jyh-Long Chern, Ching-Shan Dai, Yung-Wen Lin, Jyh-Der Hwang
  • Publication number: 20070014442
    Abstract: A processing apparatus capable of improving the degree of security protection without requiring a user to perform any additional operations, the processing apparatus determining whether or not a logged-in user is the same person as a user who pressed input confirmation button to confirm contents of input information by comparing first fingerprint information obtained when the user logged in and second fingerprint information obtained when the input confirmation button was pressed, and carrying out processing based on the contents of the input and confirmed information if the user's identity is confirmed.
    Type: Application
    Filed: May 19, 2006
    Publication date: January 18, 2007
    Applicant: Konica Minolta Business Technologies, Inc.
    Inventor: Kazutoshi Yu
  • Publication number: 20070014443
    Abstract: A biometric secured system grants a user access to a host system by classifying a fingerprint used to verify or authorize the user to the system as real or fake. The classification is based on a probability that fingerprint image data corresponds to characteristics that reliably identify the finger as real. The system includes a fingerprint sensor for capturing fingerprint image data coupled to a spoof detection module. In one embodiment, the spoof detection module is programmed to determine spoof probability based on a combination of metrics that include, among other metrics, pixel gray level average and the variance of pixels corresponding to a fingerprint ridge, pixel gray level average and the variance of pixels corresponding to a fingerprint valley, density of sweat pores, and density of sweat streaks, to name a few metrics.
    Type: Application
    Filed: July 10, 2006
    Publication date: January 18, 2007
    Inventor: Anthony Russo