Patents Issued in September 27, 2016
-
Patent number: 9454650Abstract: Disclosed herein are a system and method for updating information capable of providing media content, wherein when a service restriction is generated in a DMS in a home network system based on DLNA. The system include a DMS configured to send service limitation information to DMPs when service limitation is generated and to send an unable content list to a specific DMP of the DMPs when a request for the unable content list is received from the specific DMP and the DMPs each configured to request the unable content list from the DMS when receiving the service limitation information from the DMS, receive the unable content list from the DMS, and update a content list by applying the received unable content list to the content list.Type: GrantFiled: October 27, 2014Date of Patent: September 27, 2016Assignee: HUMAX CO., LTD.Inventor: Dong Hwan Kim
-
Patent number: 9454651Abstract: A token contains licensing information for software stored on another computer. The token connects to the computer wirelessly, and transmits the licensing information, preferably automatically. While the token is connected to the computer, at least one factor in a multi-factor authentication scheme is satisfied for licensed use of the software. When the token disconnects from the computer either at will, or by exceeding the range of the wireless connection, the software on the computer becomes unlicensed and then can no longer execute.Type: GrantFiled: August 4, 2015Date of Patent: September 27, 2016Assignee: FLEXERA SOFTWARE LLCInventor: Sai Vedantam
-
Patent number: 9454652Abstract: A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an additional group process within the first process group; performing a first determination by an application programming interface (API) that the additional group process is within the first process group, and as a result of the first determination, causing the additional group process to inherit and duplicate a handle of the process. Process communications and control within isolated groups is permitted freely, whereas process control by an isolated process for non-isolated processes or isolated processes in different groups is constrained or prohibited.Type: GrantFiled: July 7, 2014Date of Patent: September 27, 2016Assignee: Secure Vector, LLCInventors: James B. Kargman, Peter Scott, Jeffrey Bromberger
-
Patent number: 9454653Abstract: A method includes providing a plurality of variables and a variable. The variables differ from each other. The variables differ from the variable. The further method includes providing a lookup table indexing a plurality of characters via a plurality of values based on a first numeral system, converting a message into a first sequence of values based on the table, converting the first sequence into a second sequence of values based on a second numeral system different from the first system and according to a preset format, combining the second sequence into a single sequence via removing the format, generating a first plurality of subsequences from the single sequence based on segmentation of the sequence via alternating the variables, converting the first subsequences into a second plurality of subsequences such that each of the second subsequences is sized according to the variable, and transmitting the second subsequences.Type: GrantFiled: June 18, 2014Date of Patent: September 27, 2016Inventors: Brian Penny, Desmond Penny
-
Multi-server one-time passcode verification on respective high order and low order passcode portions
Patent number: 9454654Abstract: Multi-server one-time passcode verification is provided for respective high order and low order passcode portions. A user is authenticated by receiving an authentication passcode generated by a token associated with the user; and authenticating the user based on the received authentication passcode using at least a first authentication server and a second authentication server, wherein the first authentication server verifies a high-order portion of the received authentication passcode and wherein the second authentication server verifies a low-order portion of the received authentication passcode. The received authentication passcode is based on, for example, at least two protocodes PR,t and PB,t generated by the token and/or pseudorandom information RA,t. A codebook Ct, based on the pseudorandom information RA,t, can be used to embed additional auxiliary information into the authentication passcode.Type: GrantFiled: December 31, 2013Date of Patent: September 27, 2016Assignee: EMC CorporationInventors: Nikolaos Triandopoulos, Ari Juels, Ronald L. Rivest, John Brainard -
Patent number: 9454655Abstract: A method and system for utilizing the biometric factors reflected in the typing as a kind of physiological password, to create a rhythmic password specific to the user, and to authenticate based on the rhythmic password. The method includes providing an original training text to a user, receiving an input training text provided by the user according to the original training text, extracting rhythmic characteristic values between adjacent text units of the input training text, and generating a rhythmic password of the user based on the extracted rhythmic characteristic values between adjacent text units. The invention utilizes the rhythm of a user inputting text can bring multiple advantages, including enhanced security of the password, and saving the user's cost of memorizing the password.Type: GrantFiled: August 30, 2012Date of Patent: September 27, 2016Assignee: International Business Machines CorporationInventors: Chen Hao, Guoqiang Hu, Qi Cheng Li, Li Jun Mei, Jian Wang, Yi Min Wang, Zi Yu Zhu
-
Patent number: 9454656Abstract: A system and method that includes receiving a first biometric profile and associating the first biometric profile with a first application instance that is assigned as an authentication device of a first account; receiving a second biometric profile for a second application instance, wherein the second application instance is making a request on behalf of the first account; comparing the second biometric profile to the first biometric profile; and completing the request of the second application instance according to results of comparing the second biometric profile to the first biometric profile.Type: GrantFiled: May 4, 2015Date of Patent: September 27, 2016Assignee: Duo Security, Inc.Inventors: Jon Oberheide, Douglas Song
-
Patent number: 9454657Abstract: A security system and method is provided. An embodiment includes a security access device that includes a first transmitter for transmitting authentication to a computer and a second transmitter for transmitting verification information to a computer. The first transmitter is typically active and consumes power from the access device, while the second transmitter is typically passive, and consumes less or nil power from the access device. When the security access device is initially brought proximal to the computer and activated, the authentication information is sent to the computer and the user is logged in. Periodically, the computer will query the passive transmitter for verification information, to ensure that the security access device is still proximal to the computer.Type: GrantFiled: December 3, 2004Date of Patent: September 27, 2016Assignee: BCE Inc.Inventors: Tet Hin Yeap, Lou Dafu, William G. O'Brien
-
Patent number: 9454658Abstract: A method of identifying sections of code that can be disregarded when detecting features that are characteristic of malware, which features are subsequently used for detecting malware. The method includes, for each of a multiplicity of sample files, subdividing file code of the sample file into a plurality of code blocks and then removing duplicate code blocks to leave a sequence of unique code blocks. The sequence of unique code blocks is then compared with those obtained for other sample files in order to identify standard sections of code. The standard sections of code identified are then included within a database such that those sections of code can subsequently be disregarded when identifying features characteristic of malware.Type: GrantFiled: December 14, 2010Date of Patent: September 27, 2016Assignee: F-Secure CorporationInventor: Daavid Hentunen
-
Patent number: 9454659Abstract: This invention teaches a system and methods of detecting software vulnerabilities in a computer program by analyzing the compiled code and optionally the source code of the computer program. The invention models compiled software to examine both control flow and dataflow properties of the target program. A comprehensive instruction model is used for each instruction of the compiled code, and is complemented by a control flow graph that includes all potential control flow paths of the instruction. A data flow model is used to record the flow of unsafe data during the execution of the program. The system analyzes the data flow model and creates a security finding corresponding to each instruction that calls an unsafe function on unsafe data. These security findings are aggregated in a security report along with the corresponding debug information, any ancillary information, remediation recommendations and the optional source code information for each instruction that triggered the security finding.Type: GrantFiled: August 15, 2014Date of Patent: September 27, 2016Assignee: SECURISEA, INC.Inventor: Joshua M. Daymont
-
Patent number: 9454660Abstract: The present invention provides a security verification device and a security verification method which are capable of verifying that elements for implementing security measures necessary for a system can be prepared without omission. The security verification device and the security verification method select a verification item on the basis of security requirement information, generate security requirement information of parts specified by the verification item on the basis of a security target model, generate information which indicates a possessed function of security of the parts included in the security target model on the basis of a function item which is extracted on the basis of an implementation method included in the verification item and output a comparison and verification result of the security requirement information of the parts and the information which indicates the possessed function.Type: GrantFiled: November 30, 2012Date of Patent: September 27, 2016Assignee: NEC CorporationInventor: Jun Koizumi
-
Patent number: 9454661Abstract: The subject disclosure is directed towards providing a computing device with access to key that depends on the current software version, e.g., the software version of a security processor. If the software is compromised, another key becomes available with release of each new (non-compromised) software version. Keys for future versions cannot be derived, while keys for earlier versions can be derived from the current key. A secure boot process uses a secret to generate a first key, after which access to the secret is turned off. The first key is used with key blob data to compute a second key used for data decryption (and encryption) as needed. The key blob data may be global for all devices, and/or device specific; a hash stick comprising a set of derivable keys may be used at manufacturing time to generate the device-specific key blob data.Type: GrantFiled: June 30, 2014Date of Patent: September 27, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ling Tony Chen, Felix Stefan Domke, Kenneth D. Ray
-
Patent number: 9454662Abstract: A method for booting a confidential image on a trusted computer system. A trusted computer system loads an encrypted client image key onto a protected area on the trusted computer system. The trusted computer system loads an encrypted boot image onto a secure logical partition on the trusted computer system. The trusted computer system decrypts the encrypted client image key to obtain a client image key in the protected area. The trusted computer system decrypts, with the client image key, the encrypted boot image to obtain a boot image and a client data key. The trusted computer system starts the boot image, and the boot image mounts the encrypted client data onto the secure logical partition. The client data key is used by the boot image to decrypt data read from the encrypted client data and to encrypt data written to the encrypted client data.Type: GrantFiled: March 16, 2016Date of Patent: September 27, 2016Assignee: International Business Machines CorporationInventors: Reinhard T. Buendgen, James A. O'Connor, William J. Rooney
-
Patent number: 9454663Abstract: A data processing method pertains to a step (E308) including in verifying a criterion indicative of the normal running of the method and a step (E320) including in processing performed in case of negative verification. The processing step (E230) is separated from the verifying step (E308) by an intermediate step (E312, E314) of non-null duration. The intermediate step (E312, E314) and/or the processing step (E320) includes at least one action (E314) performed in case of positive verification. The invention also concerns a corresponding device.Type: GrantFiled: March 18, 2013Date of Patent: September 27, 2016Assignee: OBERTHUR TECHNOLOGIESInventor: Francis Chamberot
-
Patent number: 9454664Abstract: An arrangement for providing privacy settings for determining whether location information for a subscriber can be provided to a requesting party is described. The privacy settings are at least partially based on presence information for the subscriber. A gateway mobile location center (GMLC) selectively provides the location information regarding subscribers on request, in accordance with the privacy settings.Type: GrantFiled: November 25, 2013Date of Patent: September 27, 2016Assignee: NOKIA SOLUTIONS AND NETWORKS OYInventors: Jarko Tapio Henrik Niemenmaa, Ville Matti Harri Ruutu
-
Patent number: 9454665Abstract: A system and method for retrieving contact information based on image recognition searches is disclosed. A requestor takes a picture of a user or retrieves a storage image of a user and transmits the image to an image recognition module. The image recognition module identifies the user and determines whether the requestor can receive access to the user's contact information based on permission rules. For example, the permission rule includes a requirement that the user and the requestor be sufficiently related on a social graph generated by a social network application. The permission rules can also include a requirement that the requestor have a predetermined proximity to the image. Once the permission rules are satisfied, the image recognition module transmits the user's contact information to the requestor.Type: GrantFiled: July 21, 2014Date of Patent: September 27, 2016Assignee: Google Inc.Inventors: Christopher Richard Wren, Nadav Aharony
-
Patent number: 9454666Abstract: In the present disclosure, a hash function is computed over a known image, for example, an address range in a program. The result of the hash function is known to be the same at two distinct points in time, before the program is run, i.e. signing at build-time, and during the running of the program, i.e. run time. The value that the programmer wishes to hide, i.e. the secret value, is also known at build-time. At build-time, the secret value is combined with the hash in such a way that the combining operation can be reversed at run time. This combined value, i.e. the salt, is stored along with the program. Later, at runtime, the program computes the same hash value as was computed at signing time, and does the reverse combining operation in order to reveal the secret value.Type: GrantFiled: March 26, 2012Date of Patent: September 27, 2016Assignee: Irdeto B.V.Inventors: Robert Krten, Hongrui Dong, Clifford Liem
-
Patent number: 9454667Abstract: In an embodiment, in response to a gesture by an administrator, a security palette is created and displayed on a multi-touch screen. In response to a move by the administrator of a first icon to within the security palette, wherein the first icon represents a first object, a same authority that the administrator has to the first object is granted to the security palette. In response to a collaborator touching the security palette, the same authority to the first object is granted to the collaborator.Type: GrantFiled: November 3, 2011Date of Patent: September 27, 2016Assignee: International Business Machines CorporationInventors: Michael J. Branson, Gregory R. Hintermeister
-
Patent number: 9454668Abstract: When a failure of a reply in response to a packet is detected, A terminal apparatus transmits, to a stand-by information processing apparatus, multiple packets in which multiple divided command statements are attached to header areas thereof, the divided command statements being obtained by dividing into multiple statements a command statement for a switch command to switch from a currently-operated information processing apparatus to the stand-by information processing apparatus. The stand-by information processing apparatus stores each of the divided command statements that are attached to the packets that are transmitted from the terminal apparatus. The stand-by information processing apparatus performs a switch operation to switch from the currently-operated information processing apparatus to the stand-by the information processing apparatus in accordance with the switch command that is generated from the stored divided command statements.Type: GrantFiled: October 29, 2014Date of Patent: September 27, 2016Assignee: FUJITSU LIMITEDInventor: Masayoshi Utaka
-
Patent number: 9454669Abstract: A method of creating content within a secure processing environment can include detecting a wiki identifier, indicating a phrase, within a parent document. The parent document can be associated with an author attribute. The method also can include searching for documents corresponding to the author attribute and that have a name corresponding to the phrase indicated by the wiki identifier. If one or more of documents are identified, a source anchor within the parent document can be created and a universal resource locator for the identified document can be associated with the source anchor.Type: GrantFiled: July 10, 2006Date of Patent: September 27, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Satwiksai Seshasai
-
Patent number: 9454670Abstract: Systems and computer program products may provide a virtual system with direct access to one or more sectors of a resource of a computer system. The system and computer program products may include providing, by a computer system to a virtual system, first access control data associated with a regular computer file that corresponds to a resource on the computer system. The system and computer program products may additionally include receiving, at the computer system, a direct read from or direct write to one or more sectors of the resource represented by the regular computer file from the virtual system. The system and computer program products may further include hiding, at the computer system, a hidden computer file from the virtual system. The system and computer program products may additionally include routing, at the computer system, the direct read from or direct write to the hidden computer file on the computer system.Type: GrantFiled: December 3, 2012Date of Patent: September 27, 2016Assignee: International Business Machines CorporationInventors: James D Beecham, William K Bittner, Venkateswararao Jujjuri, Samuel W Yang
-
Patent number: 9454671Abstract: Providing analytics information from a cloud service includes maintaining an analytics database that is separate from data and servers accessed by users of the cloud service, selectively pushing information from the cloud service to the analytics database, where data and servers accessed by users of the cloud service are inaccessible for direct access by the analytics database, and allowing users limited access to the analytics database, where users of the analytics information that are accessing the analytics database are restricted from accessing data and servers of the cloud service. The analytics database may include a first database of adapted database records and a second database of dynamic logs of service related events. The adapted database records may be initially formed using the data and servers accessed by users of the cloud service prior to being pushed to the analytics database.Type: GrantFiled: May 13, 2014Date of Patent: September 27, 2016Assignee: Evernote CorporationInventors: David Engberg, Phil Constantinou
-
Patent number: 9454672Abstract: A method of controlling distribution of content in a message sent by a message sender comprises receiving an indication from the message sender that the message is to be protected, identifying content in the message to be protected, adding the identified content to a database of protected content, and determining whether subsequently received content in a subsequently received message is associated with the identified content. A system for controlling distribution of content in a message sent by a message sender comprises a processor configured to receive an indication from the message sender that the message is to be protected, identify content in the message to be protected, add the identified content to a database of protected content, and determine whether subsequently received content in a subsequently received message is associated with the identified content.Type: GrantFiled: September 19, 2014Date of Patent: September 27, 2016Assignee: DELL SOFTWARE INC.Inventors: Jonathan J. Oliver, Gleb Budman, Andrew F. Oliver, Eugene Koontz, Christine Drake
-
Patent number: 9454673Abstract: A method implements searchable encryption of cloud stored data by appending tokenized keywords to an encrypted file destined for a cloud storage service. In some embodiments, the tokenized keywords are appended to the header of the encrypted file. Searching of cloud-stored encrypted files using the native search capability of the cloud storage service is then possible by performing the search using the tokenized keywords. In alternate embodiments of the present invention, a method enables searching of cloud stored encrypted file using a cloud search appliance.Type: GrantFiled: November 7, 2014Date of Patent: September 27, 2016Assignee: Skyhigh Networks, Inc.Inventors: Sekhar Sarukkai, Kaushik Narayan, Rajiv Gupta, Paul Grubbs
-
Patent number: 9454674Abstract: Provided is a method and apparatus to detect and control flow of data shared in a terminal. A method to control data sharing may include accessing a program that shares a type of data with a terminal, displaying the accessed program on a screen organized by the type of data; and controlling the data to be shared with the accessed program in response to a control signal input on the screen.Type: GrantFiled: September 26, 2013Date of Patent: September 27, 2016Assignee: Samsung Electronics Co., Ltd.Inventors: Min Young Mun, Sang Joon Kim, Chang Mok Choi
-
Patent number: 9454675Abstract: Disclosed are an apparatus which is capable of easily performing the personal information protection processing without changing the original image recorded in the image recorder, a method thereof, and a computer-readable recording medium having computer program recorded therein. The method for protecting personal information of a recorded image includes: performing personal information protection processing by masking a personal information protection region that needs personal information protection based on a user input signal for an original image in a predetermined section of the recorded image designated by a user; generating metadata which represents a personal information protection processing result; and generating a personal information protection processed image file including a playing program which plays the original image, the original image file, and the metadata which represents the personal information protection processing result for the original image.Type: GrantFiled: January 26, 2015Date of Patent: September 27, 2016Assignee: IDIS Co., Ltd.Inventor: Chul Kim
-
Patent number: 9454676Abstract: Technologies for monitoring system API calls include a computing device with hardware virtualization support. The computing device establishes a default memory view and a security memory view to define physical memory maps and permissions. The computing device executes an application in the default memory view and executes a default inline hook in response to a call to an API function. The default inline hook switches to the security memory view using hardware support without causing a virtual machine exit. The security inline hook calls a security callback function to validate the API function call in the security memory view. Hook-skipping attacks may be prevented by padding the default inline hook with no-operation instructions, by designating memory pages of the API function as non-executable in the default memory view, or by designating memory pages of the application as non-executable in the security memory view. Other embodiments are described and claimed.Type: GrantFiled: June 27, 2014Date of Patent: September 27, 2016Assignee: Intel CorporationInventors: Harshawardhan Vipat, Manohar R. Castelino, Ravi L. Sahita, Sergio Rodriguez, Vikas Gupta
-
Patent number: 9454677Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: GrantFiled: November 14, 2014Date of Patent: September 27, 2016Assignee: Truedata Systems, Inc.Inventors: Peter Sinclair, James Lloyd, Michael Eynon
-
Patent number: 9454678Abstract: A platform protected by a system, the platform including a power source, is described. The system in one embodiment comprises a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to trigger a security action logic to perform a security action, when the potential problem indicates a theft suspicion, and the security action logic to utilize a kill pill to disable the platform, when the platform has set a high security status authorizing use of a self-kill pill or the platform sends an alert and receives a remote instruction to utilize a remote kill pill.Type: GrantFiled: December 22, 2011Date of Patent: September 27, 2016Assignee: Intel CorporationInventor: Michael Berger
-
Patent number: 9454679Abstract: A system for a baseband near field magnetic stripe data transmitter includes a mobile phone, a magnetic stripe transmission (MST) device and a payment button. The mobile phone includes a payment wallet application and is configured to transmit a stream of pulses including magnetic stripe data of a payment card. The MST device includes a driver and an inductor, and the MST device is configured to receive the stream of pulses from the mobile phone, to amplify and shape the received stream of pulses and to generate and emit high energy magnetic pulses including the magnetic stripe data of the payment card. The inductor is driven by a series of timed current pulses that result in a series of high energy magnetic pulses that resemble the fluctuating magnetic field created by a moving magnetic stripe.Type: GrantFiled: December 28, 2015Date of Patent: September 27, 2016Assignee: SAMSUNG PAY, INC.Inventor: George Wallner
-
Patent number: 9454680Abstract: A Radio Frequency Identification (RFID) tag IC stores an identifier and a check code. The IC determines whether the stored identifier is corrupted by comparing it to the check code. If the stored identifier does not correspond to the check code then the IC may terminate operation or indicate an error. The IC may also reconstruct the correct identifier from the check code.Type: GrantFiled: December 4, 2015Date of Patent: September 27, 2016Assignee: IMPINJ, INCInventor: Christopher J. Diorio
-
Patent number: 9454681Abstract: A method of choosing an object from multiple objects using a wireless device includes receiving a backscatter communication signal from each of the objects, determining one or more analog parameter of each backscatter communication signal, and, using the wireless device, selecting one object based at least in part on the analog parameter of each backscatter communication signal. Each of the objects includes an RF interface configured to communicate using backscatter communication.Type: GrantFiled: May 31, 2011Date of Patent: September 27, 2016Assignee: PLUM LABS, LLCInventor: Yael Maguire
-
Patent number: 9454682Abstract: A near field communication reader device is provided including a transmitter to transmit a request to a near field communication tag device; wherein the request is formed according to a predetermined format including an identifier section for carrying a request identifier; a receiver to receive a response from the near field communication tag device; wherein the response is formed based on the request according to the predetermined format including the identifier section for carrying a response identifier; and a processor to generate the request identifier, to compare the request identifier with the response identifier and to accept the response as a valid response if the response identifier is different from the request identifier. A corresponding near field communication tag device, a near field communication system and a near field communication method are provided as well.Type: GrantFiled: September 13, 2012Date of Patent: September 27, 2016Assignee: SONY CorporationInventor: Stephen Tiedemann
-
Patent number: 9454683Abstract: A method associated with a UWB RFID system provides for receiving a data transmission transmitted using UWB and accessing data within the data transmission using a communications protocol. An initial portion of the data transmission defines a structure of the data transmission such that subsequent data in the data transmission is directly accessible without additional decoding.Type: GrantFiled: May 22, 2014Date of Patent: September 27, 2016Assignee: Lightwaves Systems, Inc.Inventors: Philip T. Kennedy, Joseph A. Gerke, David M. Snyder, Leslie D. Baych, Bruce D. Melick
-
Patent number: 9454684Abstract: According to an exemplary embodiment, a method of detecting edge cracks in a die under test is provided. The method includes the following operations: receiving a command signal; providing power from the command signal; providing a response signal based on the command signal; and self-destructing based on the command signal.Type: GrantFiled: May 28, 2014Date of Patent: September 27, 2016Assignee: Taiwan Semiconductor Manufacturing Company LimitedInventors: Huang-Ting Hsiao, An-Tai Xu, Pei-Haw Tsao, Cheng-Hung Tsai, Tsui-Mei Chen, Nai-Cheng Lu
-
Patent number: 9454685Abstract: A portable radio-frequency identifier (RFID) reading terminal can comprise a microprocessor, a memory, an RFID reading device, and a display. The portable RFID reading terminal can be configured to display a scan trace provided by a line comprising a plurality of time varying points. Each point can be defined by a projection of a radio frequency (RF) signal coverage shape of the RFID reading device onto a chosen plane at a given moment in time.Type: GrantFiled: January 29, 2016Date of Patent: September 27, 2016Assignee: HAND HELD PRODUCTS, INC.Inventors: Joseph Vargas, Tom Plocher, Ynjiun Paul Wang, Sriharsha Putrevu, Philip Zumsteg
-
Patent number: 9454686Abstract: There is provided in one embodiment an apparatus having an image sensor array. In one embodiment, the image sensor array can include monochrome pixels and color sensitive pixels. The monochrome pixels can be pixels without wavelength selective color filter elements. The color sensitive pixels can include wavelength selective color filter elements.Type: GrantFiled: April 13, 2015Date of Patent: September 27, 2016Assignee: Hand Held Products, Inc.Inventor: Ynjiun P. Wang
-
Patent number: 9454687Abstract: Methods, devices, and systems for barcode imaging are described herein. One method includes capturing image data that is used to form an image with a light field imager, wherein the image includes a barcode, locating the barcode within the image, measuring a variance of at least a portion of the barcode region of the image, and refocusing at least a portion of the image based on the measured variance.Type: GrantFiled: December 10, 2014Date of Patent: September 27, 2016Assignee: Honeywell International Inc.Inventors: Xinqing Guo, Scott McCloskey
-
Patent number: 9454688Abstract: A 2D color barcode decoding method is disclosed. The barcode includes a 2D array of data cells, corner locators, and border reference cells. Each data cell and reference cell has one of four primary colors (e.g. CMYK or CMWK). The reference cells, which have known colors, are used to calculate the channel offset (a spatial offset) of each primary color and the reference color values of each primary color. The reference cells are also used to calculate a color conversion matrix between color intensity (RGB) values and the primary color. Pixel-color probabilities are calculated from the pixel color intensity values using the color conversion matrix. The color of each data cell is determined using the pixel-color probabilities, the pixel color intensity values, the reference color intensity values, and the channel offset.Type: GrantFiled: July 20, 2015Date of Patent: September 27, 2016Assignee: KONICA MINOLTA LABORATORY U.S.A., INC.Inventor: Gang Fang
-
Patent number: 9454689Abstract: Methods, devices, and systems for rolling shutter bar code imaging are described herein. One method includes initiating the imaging of a bar code by initiating a sequence of procedures to accumulate a charge in a first row of pixels as they are exposed to light thereby capturing data to create a first row of the image of the bar code at a first time, initiating the sequence of procedures to accumulate a charge in a subsequent row of pixels as they are exposed to light thereby capturing data to create a subsequent row of the image of the bar code at a second time, actuating a light source to illuminate the bar code at multiple specific times during a pre-determined timing sequence, and de-blurring the image data for each row based on the specific times during the pre-determined timing sequence that the light source was actuated.Type: GrantFiled: December 19, 2014Date of Patent: September 27, 2016Assignee: Honeywell International, Inc.Inventors: Scott McCloskey, Sharath Venkatesha
-
Patent number: 9454690Abstract: A biometric scanner having a sensor and an array of conductive strands is disclosed. The sensor has at least one sensor electrode, and that sensor electrode may be a capacitance sensor, an electric field sensor, or an electroluminescent sensor. The array may have an electrical insulating material between adjacent ones of the conductive strands. The array serves to protect the sensor, and conduct through the array information about the electrical characteristics of a biometric object.Type: GrantFiled: April 19, 2016Date of Patent: September 27, 2016Assignee: QUALCOMM IncorporatedInventors: John Keith Schneider, Jack C. Kitchens
-
Patent number: 9454691Abstract: A method is provided of forming an imaging reference device for a biological material imaging system. A first region is provided in a substrate formed from an optically transmissive material which is an analogue of biological tissue. This first region is stained using a first biological tissue stain. A second region is provided in second substrate which is optically transmissive and an analogue of biological tissue. The second region is stained with a second biological tissue stain. The first and second regions are overlapped as a pair, such that light incident upon the pair is modulated by the respective first and second biological tissue stains of the respective regions. Multiple regions of the first and second type may be provided, stained to different degrees.Type: GrantFiled: March 9, 2015Date of Patent: September 27, 2016Assignee: FFEI LimitedInventors: William Craig Revie, Martin Philip Gouch
-
Patent number: 9454692Abstract: A method for identifying and positioning a building using mountain-based outline region restraint, including steps of: (1) obtaining a real-time image, detecting a mountain-based outline of the real-time image, and extending the mountain-based outline thereby obtaining a mountain-based outline restraint region, (2) conducting morphological enhancement and background suppression on the image in the mountain-based outline restraint region, (3) conducting recursive segmentation in the mountain-based outline restraint region thereby transforming an image obtained in step (2) into a binary image, (4) extracting local regions of interest of a target building in the mountain-based outline restraint region according to the binary image, and (5) directly identifying and positioning the target building in the local regions of interest.Type: GrantFiled: May 15, 2015Date of Patent: September 27, 2016Assignee: HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGYInventors: Tianxu Zhang, Li Zhang, Fan Peng, Heng Yao, Cen Lu, Yayun Zheng, Yaxun Wei, Cong Xiao
-
Patent number: 9454693Abstract: An image correction apparatus includes a correction factor calculating unit which calculates a correction factor such that a distance between a corrected value obtained by correcting, using the correction factor, a luminance value of a first pixel on the image corresponding to a sensor element with a first filter in an image sensor included in an image capturing unit which generates the image, the first filter having a first transmittance characteristic and a luminance value of a second pixel on the image corresponding to a sensor element with a second filter in the image sensor, the second filter having a second transmittance characteristic, becomes smaller than a distance between the luminance value of the first pixel and the luminance value of the second pixel, and a correcting unit which generates a corrected image by correcting the luminance value of the first pixel using the correction factor.Type: GrantFiled: March 3, 2014Date of Patent: September 27, 2016Assignee: FUJITSU LIMITEDInventor: Takahiro Aoki
-
Patent number: 9454694Abstract: One embodiment provides a method, including: accepting, in an overlay input application, one or more ink strokes provided to an input field overlay area; wherein the input field overlay area is located on top of an underlying application display; and providing, in the input field overlay area, an at least partially opaque background. Other embodiments are described and claimed.Type: GrantFiled: December 23, 2014Date of Patent: September 27, 2016Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Joshua Neil Novak, Steven Richard Perrin, Jianbang Zhang, Russell Speight VanBlon, Sarah Jane E Cox, Jonathan Jen-Wei Yu
-
Patent number: 9454695Abstract: A method for matching a pattern to a multi-view sequence includes receiving a multi-view sequence which includes a plurality of sequences. Each sequence includes symbols drawn from a respective alphabet. A pattern to be matched on the multi-view sequence is received. The pattern includes a sequence of symbols drawn from a plurality of the alphabets. Offsets are assigned to the symbols as a function of a latest position of the symbol in the pattern or a length of the pattern otherwise. The multi-view sequence is traversed with the pattern to identify index positions in the sequence at which the pattern matches the corresponding part of the multi-view sequence. The pattern is shifted between index positions by a shift which is based on a minimum of the offsets for those of the symbols of the plurality of sequences that are aligned with a last of the symbols in the pattern.Type: GrantFiled: October 22, 2014Date of Patent: September 27, 2016Assignee: XEROX CORPORATIONInventor: Matthias Gallé
-
Patent number: 9454696Abstract: Methods and devices receive a document comprising raster images, using an optical scanner. These methods and devices automatically identify topical items within the raster images based on raster content in the raster images, using a processor. Further, these methods and devices automatically associate the topical items with topics in the document based on previously established rules for identifying topical sections, and automatically crop the topical items from the raster images to produce cropped portions of the raster images, using the processor. These methods and devices then automatically create an index for the document by combining the cropped portions of the raster images organized by the topics, using the processor, and output the index from the processor.Type: GrantFiled: April 17, 2014Date of Patent: September 27, 2016Assignee: Xerox CorporationInventors: Michael R. Campanelli, Saurabh Prabhat, Raja Srinivasan
-
Patent number: 9454697Abstract: A method and system for uniquely identifying a subject based on an iris image. After obtaining the iris image, the method produces a filtered iris image by applying filters to the iris image to enhance discriminative features of the iris image. The method analyzes an intensity value for pixels in the filtered iris image to produce an iris code that uniquely identifies the subject. The method also creates a segmented iris image by detecting an inner and outer boundary for an iris region in the iris image, and remapping pixels in the iris region, represented in a Cartesian coordinate system, to pixels in the segmented iris image, represented in a log-polar coordinate system, by employing a logarithm representation process. The method also creates a one-dimensional iris string from the iris image by unfolding the iris region by employing a spiral sampling method to obtain sample pixels in the iris region, wherein the sample pixels are the one-dimensional iris string.Type: GrantFiled: September 9, 2014Date of Patent: September 27, 2016Assignee: Biometricore, Inc.Inventors: Marios Savvides, Khalid Harun, Vijayakumar Bhagavatula, Sungwon Park, Yung-Hui Li
-
Patent number: 9454698Abstract: A terminal for minimizing a gazing phenomenon in an iris recognition terminal is disclosed. The iris recognition terminal may minimize the gazing phenomenon by including an eyeball reflection unit. Also, it is also possible to minimize the gazing phenomenon by displaying a positioner on a display unit. A person who wears glasses may experience specular light on the iris recognition terminal but the terminal of the present disclosure avoids the specular light. The terminal determines the location of the specular light and guides an avoidance location to a user based on the determination, so quick and accurate iris recognition is possible.Type: GrantFiled: June 3, 2015Date of Patent: September 27, 2016Assignee: IRIS ID, INCInventors: Seung Gi Min, Kie Young Lee
-
Patent number: 9454699Abstract: Embodiments are disclosed for eye tracking systems and methods. An example eye tracking system comprises a plurality of light sources and a camera configured to capture an image of light from the light sources as reflected from an eye. The eye tracking system further comprises a logic device and a storage device storing instructions executable by the logic device to acquire frames of eye tracking data by iteratively projecting light from different combinations of light sources of the plurality of light sources and capturing an image of the eye during projection of each combination. The instructions may be further executable to select a selected combination of light sources for eye tracking based on a determination of occlusion detected in the image arising from a transparent or semi-transparent optical structure positioned between the eye and the camera and project light via the selected combination of light sources for eye tracking.Type: GrantFiled: April 29, 2014Date of Patent: September 27, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Mudit Agrawal, Vaibhav Thukral, Ibrahim Eden, David Nister, Shivkumar Swaminathan