Patents Issued in January 12, 2017
-
Publication number: 20170011209Abstract: A method of controlling access to an electronic device includes scanning a fingerprint of a user and obtaining a first image of the fingerprint. A preset number of feature points of the fingerprint from the first image are extracted. A distance value between each of the extracted feature points is adjusted to obtain a new image. A first slide path according to touch signals corresponding to the extracted feature points in the new image is identified. The first slide path is set as a password for unlocking the electronic device.Type: ApplicationFiled: September 24, 2015Publication date: January 12, 2017Inventor: KAI-WEN CHUNG
-
Publication number: 20170011210Abstract: A method for providing a service by an electronic device according to various embodiments may comprise the steps of: obtaining biometric information of a user; determining at least one service associated with the biometric information out of a plurality of services that the electronic device supports; and providing the determined at least one service.Type: ApplicationFiled: February 11, 2015Publication date: January 12, 2017Inventors: Cheol-Ho CHEONG, Hyuk KANG, Dong-Hyun KIM, Yang-Su KIM, Hyun-Soo KIM, Bo-Yeon NA, Byoung-Tack ROH, Jeong-Min PARK, Ji-Hyun PARK, Tae-Gun PARK, Kwang-Sub SON, Dong-Il SON, Sung-Ho SON, Sung-Hyuk SHIN, Hyun-Seok SHIN, Jin-Gil YANG, Jae-Yung YEO, Jae-Bong YOO, Su-Ha YOON, Seung-Young JEON, Kyung-Soo LIM, Eui-Chang JUNG, In-Ji JIN, Jong-Ho CHOI, Duk-Ki HONG, Moo-Hyun BAEK, Sang-Youp SEOK, Byoung-Uk YOON
-
Publication number: 20170011211Abstract: A portable phone includes a control unit, a first communication module coupled to the control unit, and a second communication module coupled to the control unit. A touch screen and a display are formed on the portable device; memory is coupled to the control unit to store an application. An image capturing device is coupled to the processing unit, and an eye-detecting illumination is formed on the portable device to detect user's eye. An eye-sensor is formed on the portable phone to sense the detected light from the user's eye for generating an eye image; an eye characteristic recognition module is provided within the portable device to compare a template in the portable phone with the eye image; wherein the application is accessed after the eye image matches with the template. A template refreshing system is provided to refresh an old template by a new template.Type: ApplicationFiled: August 28, 2016Publication date: January 12, 2017Inventors: Mei Ling LO, Kuo-Ching CHIANG
-
Publication number: 20170011212Abstract: An access controller comprising: a data store storing: a challenge image including a user challenge; a mask image including a mask; a composite image generator to superimpose the challenge image and the mask image as a dynamic composite image such that the user challenge is partially masked by the mask in the composite image; and a display to display the dynamic composite image to a user; a user input receiver, wherein the access controller to grants access to the resource on receipt, via the user input receiver, of a correct response by a user to the challenge, wherein that the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image, and wherein the composite image is dynamic by the mask randomly moving in the composite image periodically.Type: ApplicationFiled: March 5, 2015Publication date: January 12, 2017Applicant: British Telecommunications Public Limited CompanyInventor: Robert ROWLINGSON
-
Publication number: 20170011213Abstract: Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability to automatically replace their old passwords with new passwords for their one or more website accounts. The users can set a pre-determined frequency at which their passwords are to be updated and replaced with new passwords. The users can further define additional one or more rules based on which their passwords are updated. The methods and systems are further configured to auto log into user's website accounts with the updated passwords.Type: ApplicationFiled: July 6, 2015Publication date: January 12, 2017Applicant: Unisys CorporationInventors: Edward T. Cavanagh, Michael J. DiDomenico, Brittney Burchett
-
Publication number: 20170011214Abstract: Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability to automatically replace their old passwords with new passwords for their one or more website accounts. The users can set a pre-determined frequency at which their passwords are to be updated and replaced with new passwords. The users can further define additional one or more rules based on which their passwords are updated. The methods and systems are further configured to auto log into user's website accounts with the updated passwords.Type: ApplicationFiled: July 6, 2015Publication date: January 12, 2017Applicant: Unisys CorporationInventors: Edward T. Cavanagh, Michael J. DiDomenico, Brittney Burchett
-
Publication number: 20170011215Abstract: Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.Type: ApplicationFiled: July 8, 2015Publication date: January 12, 2017Inventors: Benjamin D. Poiesz, Andrew Abramson, Roger William Graves
-
Publication number: 20170011216Abstract: Methods and nodes for securing execution of a web application by determining that a call dependency from a first to a second function needs to be protected, adding a Partial Execution Stub (PES) function comprising code to establish a communication connection with a trusted module. Methods and nodes for secured execution of a web application by invoking a function of the web application, invoking a Partial Execution Stub (PES) function during execution of the function of the web application, sending, from the PES function, a message call with current execution information to a trusted module and receiving, a verification result from the trusted module.Type: ApplicationFiled: September 20, 2016Publication date: January 12, 2017Inventors: Yuan Xiang Gu, Garney David Adams
-
Publication number: 20170011217Abstract: Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device (a desktop computer, a laptop computer, a smartphone, a tablet, or the like) interacts and communicates with a server of a computerized server (a banking website, an electronic commerce website, or the like). The interactions are monitored, tracked and logged. Communication interferences are intentionally introduced to the communication session; and the server tracks the response or the reaction of the end-user device to such communication interferences. The system determines whether the user is a legitimate human user; or a cyber-attacker posing as a legitimate human user but actually utilizing a Virtual Machine.Type: ApplicationFiled: September 26, 2016Publication date: January 12, 2017Inventors: Avi Turgeman, Yaron Lehmann
-
Publication number: 20170011218Abstract: A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an additional group process within the first process group; performing a first determination by an application programming interface (API) that the additional group process is within the first process group, and as a result of the first determination, causing the additional group process to inherit and duplicate a handle of the process. Process communications and control within isolated groups is permitted freely, whereas process control by an isolated process for non-isolated processes or isolated processes in different groups is constrained or prohibited.Type: ApplicationFiled: September 26, 2016Publication date: January 12, 2017Inventors: James B. Kargman, Peter Scott, Jeffrey Bromberger
-
Publication number: 20170011219Abstract: A trusted kernel starting method and apparatus are provided. The method includes: starting a security boot module boot loader; invoking the boot loader to measure, according to a first security algorithm, whether a platform configuration register (PCR) partition is trusted; if the PCR partition is trusted, invoking the boot loader to read kernel code into a memory, and invoking the boot loader to measure, according to a first complete algorithm and a kernel code standard measurement value prestored in the PCR partition, whether the kernel code is trusted; initializing, if the kernel code is trusted, the kernel code to trigger an initialized kernel to measure, according to a second complete algorithm, whether the boot loader is trusted; and starting the kernel if the boot loader is trusted. Kernel starting security is improved.Type: ApplicationFiled: September 21, 2016Publication date: January 12, 2017Inventors: Zhi LI, Bo ZHAO, Yongkang FEI
-
Publication number: 20170011220Abstract: Disclosed are systems and methods for controlling opening of computer files by vulnerable applications. An example method includes: detecting a request from a software application to open a computer file on the user computer; determining one or more parameters of the file; determining a file access policy based on the parameters of the file, wherein the file access policy specifies at least access rights of the software application to the resources of the user computer; identifying vulnerabilities of the software application; determining an application launching policy for the software application based at least on the determined vulnerabilities, wherein the application launching policy specifies at least whether opening of the file is permitted or prohibited; and controlling opening of the file on the user computer and accessing of the computer resources by the software application working with the opened file based on the file access policy and application launching policy.Type: ApplicationFiled: July 6, 2015Publication date: January 12, 2017Inventors: Andrey A. Efremov, Andrey V. Ladikov, Andrey Y. Solodovnikov, Alexey V. Monastyrsky
-
Publication number: 20170011221Abstract: Preventing the reuse of cartridges in a dispenser using encryption is provided. A cartridge for dispensing a product may be received by a dispenser. The dispenser may then read an encrypted tag from the cartridge and decrypt the encrypted tag. The dispenser may then retrieve a current usage status for the cartridge based on the decrypted tag and determine, from the current usage status, whether the cartridge has been retired. The dispenser may then generate an alert message upon determining that the cartridge has been retired.Type: ApplicationFiled: February 25, 2015Publication date: January 12, 2017Applicant: THE COCA-COLA COMPANYInventors: C. Brad Green, David R. Newman
-
Publication number: 20170011222Abstract: A method of security access control for a hard disk and a hard disk, where the hard disk includes an Internet Protocol (IP) interface and a control board, and the method includes that the IP interface receives an access data packet and sends the access data packet to the control board, where the control board parses the access data packet to obtain an authentication data packet, where the authentication data packet includes access permission information, inspects the access permission information according to a stored security policy to determine whether an access is authorized, performs a security check on the access data packet using a security algorithm when the access of the user is authorized, and allows accessing data in a corresponding sector on the hard disk according to the sector identifier when the security check is passed.Type: ApplicationFiled: September 20, 2016Publication date: January 12, 2017Inventor: Yibin Li
-
Publication number: 20170011223Abstract: Methods, devices, systems, and computer program products for implementing a bio-medical sensing platform are provided herein. A method includes receiving one or more items of sensed biological data and/or sensor-related information from one or more sensor devices via a communication link established with the one or more sensor devices, wherein the one or more sensor devices are associated with a given user; analyzing the one or more items of sensed biological data and/or sensor-related information to perform one or more characterization functions pertaining to the one or more items of biological data and/or the given user; and transferring the one or more items of sensed biological data and/or sensor-related information and/or a result of the one or more characterization functions to a private storage component via a communication link established with the private storage component, wherein said transferring comprises implementing one or more security functions in conjunction with said transferring.Type: ApplicationFiled: July 8, 2015Publication date: January 12, 2017Inventors: Bing Dang, John U. Knickerbocker, Joana Sofia Branquinho Teresa Maria, Sufi Zafar
-
Publication number: 20170011224Abstract: An information processing apparatus carries out license return at the same time as carrying out license activation and returns only a license that can bring about a beneficial effect by being returned according to a state of a held license. Further, if a plurality of licenses is associated with a single serial number, the information processing apparatus returns the plurality of licenses collectively.Type: ApplicationFiled: July 1, 2016Publication date: January 12, 2017Inventor: Hiroshi Fuse
-
Publication number: 20170011225Abstract: A self-protection device includes a flexible display having a display side. One or more actuating devices are arranged on a back side of the flexible display opposite the display side. A monitoring mechanism is configured to monitor one or more conditions such that if a triggering event occurs, the monitoring mechanism triggers the one or more actuating devices to obtain a self-protecting pose to protect the flexible display.Type: ApplicationFiled: July 8, 2015Publication date: January 12, 2017Inventors: SARBAJIT K. RAKSHIT, JOHN D. WILSON
-
Publication number: 20170011226Abstract: In a computer environment, a mechanism for the flow of access by means of derivation is provided. Typically, access rights granted with respect to an access point flow (or derive from) an access provider to an access recipient. Typically, the access provider is a function and the access recipient is a function. The access point may be any object, such as files or functions, to which the access recipient is granted access rights by the access provider. Access is typically represented by a relationship object referencing the access provider function, the access recipient function, and the access point object, and a set of access rights. There are typically different types of access, including read access, right access, and membership access. Therefore, the membership access relationship is typically represented as a subtype of the general/abstract access relationship.Type: ApplicationFiled: March 21, 2016Publication date: January 12, 2017Applicant: Skai, Inc.Inventor: Charles E. HENDERSON
-
Publication number: 20170011227Abstract: A method of storing data from a whiteboard application executed on a computing system including an interactive display device is provided. The method comprises storing, in a memory of the computing system, whiteboard data input to the whiteboard application in response to user interaction with the interactive display device, displaying a login selector on the interactive display device, upon detecting actuation of the login selector, identifying the user based on credentials of the user; and in response to identifying the user, (i) retrieving previews of stored whiteboard files from a user account in a cloud-based storage system corresponding to the identity of the user, (ii) displaying the previews on the interactive display device, and (iii) uploading the whiteboard data as a whiteboard file from the memory of the computing system to the user account.Type: ApplicationFiled: September 20, 2016Publication date: January 12, 2017Applicant: Microsoft Technology Licensing, LLCInventors: David Tse, Nathaniel Stott, Jason Lowell Reisman, Brian T. Albrecht, Matthew C. Pohle, Isaiah Ng
-
Publication number: 20170011228Abstract: A computing platform may generate requests for log data stored on computing systems and may communicate the requests to the computing systems. The computing platform may receive the log data from the computing systems and may utilize the log data to generate records interrelating different data-access requests indicated by the log data. The computing platform may analyze the records to identify corresponding requests made by a user to multiple different computing systems and may determine an interrelationship between the corresponding requests. The computing platform may generate data indicating the multiple different computing systems and the interrelationship between the corresponding requests and may communicate the data to a computing device associated with at least one of the multiple different computing systems.Type: ApplicationFiled: July 6, 2015Publication date: January 12, 2017Inventors: Ryan M. Greenway, Seyamak Amin, David Joa, Yanghong Shao, Tim Bendel, Jangaiah Kurva, Dilip Nair, Edward W. Carroll
-
Publication number: 20170011229Abstract: The present disclosure describes user self-directed sharing of user data with entities in return for user benefits. Embodiments herein disclosed receive user data, aggregate the user data into user data groups, receive at least one benefit that an entity is willing to offer in exchange for a user data group, associate the benefit with each of the user data groups, provide a user interface to the user, prompt the user for selecting one of the user data groups and the benefit for the selected user data group, receive an indication that the user has selected to share one of the user data groups in exchange for the benefit, provide the user data associated with the selected user data group to the entity associated with the benefit, and provide a notification to the user of the benefit associated with the selected user data group has been associated with the user.Type: ApplicationFiled: July 10, 2015Publication date: January 12, 2017Inventors: Alicia C. Jones-McFadden, Matthew Hsieh, Jade Michelle Le Vo-Dinh, David M. Grigg, Carrie Anne Hanson, Peter John Bertanzetti
-
Publication number: 20170011230Abstract: A search query is received from a first user through one or more input devices. A set of results is determined from content stored on a computer system based on the search query. The set of results includes a first subset of results not accessible to the first user due to access control. A list of results is provided to the first user. The list excludes the first subset of results. A target result is identified from the first subset of results. An owner is identified with control over access to the target result. The owner is notified that the target result is not accessible to at least one user.Type: ApplicationFiled: September 29, 2016Publication date: January 12, 2017Inventors: Mustansir Banatwala, David A. Brooks, Joseph A. Russo
-
Publication number: 20170011231Abstract: Mechanisms are provided for anonymizing data comprising a plurality of graph data sets. The mechanisms receive input data comprising a plurality of graph data sets. Each graph data set comprises data for generating a separate graph from graphs associated with other graph data sets. The mechanisms perform clustering on the graph data sets to generate a plurality of clusters. At least one cluster of the plurality of clusters comprises a plurality of graph data sets. Other clusters in the plurality of clusters comprise one or more graph data sets. The mechanisms also determine, for each cluster in the plurality of clusters, aggregate properties of the cluster. Moreover, the mechanisms generate, for each cluster in the plurality of clusters, pseudo-synthetic data representing the cluster, from the determined aggregate properties of the clusters.Type: ApplicationFiled: September 26, 2016Publication date: January 12, 2017Inventor: Charu C. Aggarwal
-
Publication number: 20170011232Abstract: Disclosed herein are systems and methods for redacting sensitive information. Certain methods involve receiving a copy of a communication and automatically, under computer control, analyzing the communication and identifying sensitive information in accordance with one or more rules, and identifying the location of the sensitive information in the communication. Automatically, under computer control, the sensitive information is redacted from the communication.Type: ApplicationFiled: September 26, 2016Publication date: January 12, 2017Inventors: Shaoyu Xue, Michael C. Dwyer, Erik A. Strand, Scott R. Wolf, Frank Salinas, Jeffrey A. Gallino, Scott A. Kendrick
-
Publication number: 20170011233Abstract: Disclosed herein are systems and methods for redacting sensitive information. Certain systems include a speech-to-text converter for converting a vocal stream to text, a text analysis module for automatically analyzing the text and identifying sensitive information in accordance with a plurality of rules, and identifying the location of the sensitive information in the vocal stream, and a multi-level redactor for redacting sensitive information from the vocal stream in accordance with the plurality of the rules.Type: ApplicationFiled: September 26, 2016Publication date: January 12, 2017Inventors: Shaoyu Xue, Michael C. Dwyer, Erik A. Strand, Scott R. Wolf, Frank Salinas, Jeffrey A. Gallino, Scott A. Kendrick
-
Publication number: 20170011234Abstract: Some embodiments provide a program that synchronizes a keychain stored on a device with a set of other devices. The keychain includes a set of keychain items. The program receives (1) a list of keychain items for updating the keychain stored on the device and (2) data representing the keychain items specified in the list of keychain items. For each keychain item in the list of keychain items, the program updates the keychain stored on the device with the data that represents the keychain item.Type: ApplicationFiled: September 23, 2016Publication date: January 12, 2017Inventors: Michael Brouwer, Dallas B. De Atley, Mitchell D. Adler
-
Publication number: 20170011235Abstract: A signature device including a storage unit configured to store moving image data, and a processor configured to extract original metadata from moving image data for the image data of each of a plurality of images forming the moving image data, the original metadata including location data of the image data and identification data of the moving image data, to encode the image data of each of the images into still image data in accordance with an image format, to write the still image data into a first area, to write the original metadata extracted by the extractor into a second area, the first area and the second area being included in a storage area of a still image data file in which the still image data is filed, and to generate summary data for the still image data file.Type: ApplicationFiled: September 20, 2016Publication date: January 12, 2017Applicant: FUJITSU LIMITEDInventor: Takashi YOSHIOKA
-
Publication number: 20170011236Abstract: A laser marker enables efficient determination of an optimum condition for a printing pattern of a two-dimensional code and simplification of the evaluation operation of the printing pattern of the two-dimensional code. A printing pattern regarding a cell to be printed in each of reference cells of a two-dimensional code is generated. The two-dimensional code is printed in this cell printing pattern. The recognition rate of the two-dimensional code is calculated on the basis of the reference cells. When the recognition rate is a predetermined value or more, a present printing pattern is stored as an optimum condition (optimum printing pattern) in a database. In contrast, when the recognition rate is less than the predetermined value, the size of cells constituting the present printing pattern is changed. The two-dimensional code is printed in the changed cell printing pattern, and the recognition rate of the two-dimensional code is calculated again.Type: ApplicationFiled: September 20, 2016Publication date: January 12, 2017Inventor: Masatoshi Kouyama
-
Publication number: 20170011237Abstract: A card reader may include a recording and reproducing means to perform reading of data or writing of data, a first cable configured to transmit a data signal outputted from the recording and reproducing means or a data signal inputted into the recording and reproducing means, a circuit board in a flat plate shape for controlling the card reader, a connector mounted on the circuit board and connected with one end side of the first cable, and a second cable connected with the circuit board and configured to transmit a control signal for controlling the card reader. A width of the second cable is wider than a width of the first cable, and the second cable is connected with the circuit board so as to cover a connected portion of the first cable with the connector.Type: ApplicationFiled: July 8, 2016Publication date: January 12, 2017Inventors: Shigeo NAKAJIMA, Mamoru MIZAWA
-
Publication number: 20170011238Abstract: A system, comprising a communication station for communicating with a number of radio tags in a time slot communication process, in which a number of time slots per time slot cycle in a repeating sequence are available for communication, and each time slot is characterized by a distinct time slot symbol, wherein the communication station is designed to send out a synchronization data signal comprising the time slot symbol for the currently present time slot, and wherein a radio tag is designed for changing from a sleep state into an active state at a wakeup instant, and for receiving the synchronization data signal in the active state and, if the received time slot symbol indicates a time slot intended for it, for defining a new wakeup instant corresponding to the next appearance of the time slot intended for it in a time slot cycle that follows the currently present time slot cycle.Type: ApplicationFiled: February 20, 2014Publication date: January 12, 2017Inventors: Andreas RÖßL, Andreas HECHENBLAICKNER, Christian FRIEßNEGG
-
Publication number: 20170011239Abstract: A system and method is disclosed for remotely managing functional modes of devices. A device may receive commands remotely to initiate a particular functional mode when the device is within the proximity of a given location. The commands may be provided to the device via Radio Frequency Identification (RFID), or proximity based wireless communication networks.Type: ApplicationFiled: March 24, 2016Publication date: January 12, 2017Applicant: Texas Instruments IncorporatedInventors: Trevor Thomas Chapman, James Joseph Galu, JR., Thomas Brian Olson
-
Publication number: 20170011240Abstract: Systems and methods are provided for monitoring medication compliance to allow a doctor or medical care provider to determine whether a subject is ingesting a prescribed medication at the proper times. A medication container includes at least one medication-containing cell, with a cover overlaying the cell. The medication within the cell is accessed through the cover. The medication container also includes an electrical circuit having an RFID chip electrically coupled to an antenna. The RFID chip is associated with the cover, while the antenna is configured to communicate with an RFID reader to detect whether the cell has been accessed through the cover. The RFID chip may be uncoupled from the antenna or remain coupled to the antenna upon the cell being accessed through the cover, with the antenna thereafter transmitting a signal to an RFID reader to indicate that the cell has been accessed through the cover.Type: ApplicationFiled: July 7, 2015Publication date: January 12, 2017Inventor: Ian James Forster
-
Publication number: 20170011241Abstract: A method for filtering scanned objects displayed on a reader is provided. The reader may scan one or more transponders, and obtain, from a database, an image for each scanned transponder. Each transponder may be associated with an object (e.g., an item of retail inventory). The obtained image for each object may be presented on an interface, and a selection of an object category may be received using the obtained images. A determination may be made as to which objects are associated with the selected object category. A display screen may display data associated with only the objects associated with the selected object category.Type: ApplicationFiled: September 26, 2016Publication date: January 12, 2017Applicant: HAND HELD PRODUCTS, INC.Inventors: Joseph VARGAS, Tom PLOCHER, Sriharsha PUTREVU, Ynjiun WANG
-
Publication number: 20170011242Abstract: An imaging system includes a camera having a field of view, a set of axially spaced moveable mirrors supported on a rotor to rotate the mirrors within the field of view of the camera, and a set of stationary mirrors supported to redirect the fields of view from the set of moveable mirrors to provide multiple fields of view at different angles.Type: ApplicationFiled: July 9, 2015Publication date: January 12, 2017Inventor: Paul Detwiler
-
Publication number: 20170011243Abstract: A scanner for scanning an item positioned in a scan volume can include: an electronically switchable mirror configured to switch between a reflective state and a transmissive state, a plurality of mirrors, and a camera having a sensor. In a method for scanning the item, the scanner can repeatedly: switch the switchable mirror from the reflective state to the transmissive state, image a first field of view of the item onto the sensor with light that reflects from at least one mirror and transmits through the switchable mirror, switch the switchable mirror from the transmissive state to the reflective state, and image a second field of view of the item onto the sensor with light that reflects from at least one mirror and reflects from the switchable mirror. In some examples, the scanner can synchronize the switching of the switchable mirror to a frame rate of the sensor.Type: ApplicationFiled: July 9, 2015Publication date: January 12, 2017Inventor: Steven Joel Hammer
-
Publication number: 20170011244Abstract: The present invention proposes a dot pattern on which code information and x and y coordinate information can be defined even if the dot pattern is extremely small, and proposes an information reproducing method and an information reproducing device based on the dot pattern. More specifically, a medium such as a printed material on which is formed a dot pattern portion by arranging in accordance with a given rule dots generated by a dot code generating algorithm in order to recognize various kinds of multimedia information is scanned as image data by scanning means. Then, the image data is converted into code data. Multimedia information corresponding to the code data is read out of storing means to be reproduced.Type: ApplicationFiled: June 20, 2016Publication date: January 12, 2017Inventor: Kenji Yoshida
-
Publication number: 20170011245Abstract: An imaging lens assembly, especially for an imaging reader, includes a plurality of lenses mounted in a lens barrel along an optical axis. A plurality of deflectable ribs is arranged around the optical axis at one end region of the barrel. Each deflectable rib extends axially at least partly over one of the lenses. A strain relief recess is formed in the one end region of the barrel and creates a radial spacing between the deflectable ribs and the one lens. The imaging lens assembly is inserted into a passage bounded by an inner chassis wall of a chassis. The chassis wall exerts radial forces on the deflectable ribs during insertion of the imaging lens assembly to deflect the deflectable ribs relative to the barrel end region into the recess without exerting radial pressure on the one lens and degrading optical performance of the imaging lens assembly.Type: ApplicationFiled: July 8, 2015Publication date: January 12, 2017Inventors: CARL D. WITTENBERG, JEFFREY A. KALINOSKI
-
Publication number: 20170011246Abstract: The present invention is directed to an authenticating apparatus, system and a method for authentication of an object or product having a secure glyph thereon. The invention is also directed to the use of the object or product in a machine wherein the secure glyph has an intellectual property protected feature and a machine readable feature.Type: ApplicationFiled: October 9, 2015Publication date: January 12, 2017Applicant: SUN CHEMICAL CORPORATIONInventors: Jessica Blatt, Sidney Persley, Charles Achkar, Stephen Postle, Danny Rich
-
Publication number: 20170011247Abstract: A sheet body 30 includes first and second sheets 40 and 60 that transmit infrared radiation. A rear face of the first sheet 40 is opposed to a front face of the second sheet 60. An information code is marked on a front or rear face of the second sheet 60 by using an infrared absorbing material. The rear face of the first sheet 40 and the front face of the second sheet 60 are stuck together with a highly infrared transmitting adhesive. The front face of the first sheet 40 is marked with a pattern using an infrared transmitting material that is visible when visible radiation is irradiated onto the pattern.Type: ApplicationFiled: October 22, 2014Publication date: January 12, 2017Inventors: Takuya KUJI, Yuichi MACHIDA, Takeshi YAMAGISHI, Kaname KOSUGI, Jun SAKAMOTO
-
Publication number: 20170011248Abstract: A fingerprint identification module includes a cover plate, a fingerprint identification sensor, at least one light source, and a plurality of fibers. The cover plate has an inner surface and an outer surface opposite to the inner surface. The fingerprint identification sensor and the at least one light source are located under the inner surface, and the at least one light source is located adjacent to the fingerprint identification sensor. The fibers are arranged in an array and are located between the cover plate and the fingerprint identification sensor, wherein each of the fibers has a light incident surface. The light incident surface faces the inner surface and is inclined relative to the inner surface.Type: ApplicationFiled: May 10, 2016Publication date: January 12, 2017Applicant: Gingy Technology Inc.Inventor: Jen-Chieh Wu
-
Publication number: 20170011249Abstract: An eye state detecting method, applied to an electronic apparatus with an image sensor, comprising: (a) defining a detecting range according to a possible location of a user's eye, wherein the detecting range is smaller than a maximum detecting range that the electronic apparatus can apply; (b) capturing a detecting image via the detecting range; and (c) determining whether the user's eye is in an opening state or in a closing state according a brightness of to the detecting image. The present invention also discloses a method applying a smaller determining range to determine if the user's eye is open or close.Type: ApplicationFiled: June 30, 2016Publication date: January 12, 2017Inventor: Guo-Zhen Wang
-
Publication number: 20170011250Abstract: A method of generating a reliable image of an iris for subsequent optical analysis leading to identification or authentication of a mammal. The method comprises directing point light sources towards the iris, capturing a gray scale image of the iris and reflections of the point light sources, deriving a two tone image from the gray scale image, generating an image containing the true boundaries of the pupil, determining boundaries of the iris and generating an image containing the true boundaries of the iris, and generating a final image of the iris from the image containing the true boundaries of the iris. This establishes a reliable image of the iris. The process may further comprise conducting an identification or authentication process based on optical analysis of the final image of the iris and comparison with a pre-established data corresponding to a person whose identity has been confirmed.Type: ApplicationFiled: July 7, 2016Publication date: January 12, 2017Inventor: Boris Gill
-
Publication number: 20170011251Abstract: A fingerprint identification module including a cover plate, a fingerprint identification sensor, a first adhesive layer, and at least one light source is provided. The cover plate has an inner surface, an outer surface opposite to the inner surface, and a plurality of microstructures located at the inner surface. The fingerprint identification sensor is located under the microstructures and attached to the microstructures through the first adhesive layer. The at least one light source is located under the inner surface and adjacent to the fingerprint identification sensor.Type: ApplicationFiled: December 17, 2015Publication date: January 12, 2017Applicant: Gingy Technology Inc.Inventor: Jen-Chieh Wu
-
Publication number: 20170011252Abstract: An apparatus for processing medical images includes a storage unit storing fingerprints that respectively correspond to a plurality of functions, a user input unit detecting a fingerprint of a user, and a controller performing a function corresponding to the detected fingerprint, from among the functions.Type: ApplicationFiled: January 13, 2016Publication date: January 12, 2017Applicant: SAMSUNG MEDISON CO., LTD.Inventors: Sun-mo YANG, Gil-ju JIN, Yu-ri KIM
-
Publication number: 20170011253Abstract: A method and apparatus for identifying platelets within a whole blood sample. The method includes the steps of: a) adding at least one colorant to the whole blood sample, which colorant is operable to tag platelets; b) disposing the blood sample into a chamber defined by at least one transparent panel; c) imaging at least a portion of the sample quiescently residing within the chamber to create one or more images; and d) identifying one or more platelets within the sample using an analyzer adapted to identify the platelets based on quantitatively determinable features within the image using a analyzer, which quantitatively determinable features include intensity differences.Type: ApplicationFiled: September 20, 2016Publication date: January 12, 2017Inventors: Changhua Yu, Min Xie, Yiming Wu
-
Publication number: 20170011254Abstract: Augmented reality (AR) based component replacement and maintenance may include receiving a first wireless signal from a pair of AR glasses worn by a user. An image of a component viewed by the user may be analyzed and compared to a plurality of images of components stored in a database that includes information associated with the plurality of images of the components. Based on a match of the image of the component viewed by the user to one of the plurality of images of the components stored in the database, the component viewed by the user may be identified. An inventory of the identified component may be analyzed to determine whether a supplier includes the identified component in stock, and in response to a determination that the supplier includes the identified component in stock, an estimated time of delivery of the identified component to the user may be determined.Type: ApplicationFiled: July 6, 2015Publication date: January 12, 2017Inventors: Ping GUO, Daniel Kaplan, Sunny M. Webb
-
Publication number: 20170011255Abstract: A system that determines an invariant magnetic-resonance (MR) signature of a biological sample is disclosed. During operation, the system determines a magnetic-resonance (MR) model of voxels in a biological sample based on differences between MR signals associated with the voxels in multiple scans and simulated MR signals. The MR signals are measured or captured by an MR scanner in the system during multiple MR scans, and based on scanning instructions, and the simulated MR signals for the biological sample are generated using the MR model and the scanning instructions. Moreover, the system iteratively modifies the scanning instructions (including a magnetic-field strength and/or a pulse sequence) in the MR scans based on the differences until a convergence criterion is achieved. Then, the system stores, in memory, an identifier of the biological sample and a magnetic-field-strength-invariant MR signature of the biological sample that is associated with the MR model.Type: ApplicationFiled: April 3, 2016Publication date: January 12, 2017Applicant: Tesla Health, IncInventors: Jeffrey Howard Kaditz, Andrew Gettings Stevens
-
Publication number: 20170011256Abstract: A computer-implemented method for creating an image product by accurately grouping faces includes receiving an initial set of face groups for a plurality of face images, training classifiers between pairs of face groups in the initial set of face groups using image-product statistics by a computer processor, classifying the plurality of face images by classifiers to output binary vectors for the plurality of face images by the computer processor, calculating a value for an improved similarity function using the binary vectors for each pair of the plurality of face images, grouping the plurality of face images into modified face groups based on values of the binary similarity functions by the computer processor, and creating an image product based at least in part on the modified face groupsType: ApplicationFiled: September 20, 2016Publication date: January 12, 2017Inventors: Roman Sandler, Alexander M. Kenis
-
Publication number: 20170011257Abstract: A computer executed method for supervised facial recognition comprising the operations of preprocessing, feature extraction and recognition. Preprocessing may comprise dividing received face images into several subimages, converting the different face image (or subimage) dimensions into a common dimension and/or converting the datatypes of all of the face images (or subimages) into an appropriate datatype. In feature extraction, 2D DMWT is used to extract information from the face images. Application of the 2D DMWT may be followed by FastICA. FastICA, or, in cases where FastICA is not used, 2D DMWT, may be followed by application of the l2-norm and/or eigendecomposition to obtain discriminating and independent features. The resulting independent features are fed into the recognition phase, which may use a neural network, to identify an unknown face image.Type: ApplicationFiled: July 7, 2016Publication date: January 12, 2017Applicant: University of Central Florida Research Foundation, Inc.Inventors: Wasfy Mikhael, Ahmed Aldhahab
-
Publication number: 20170011258Abstract: Facial expressions are evaluated for control of robots. One or more images of a face are captured. The images are analyzed for mental state data. The images are analyzed to determine a facial expression of the face within an identified a region of interest. Mental state information is generated. A context for the robot operation is determined. A context for the individual is determined. The actions of a robot are then controlled based on the facial expressions and the mental state information that was generated. Displays, color, sound, motion, and voice response for the robot are controlled based on the facial expressions of one or more people.Type: ApplicationFiled: September 23, 2016Publication date: January 12, 2017Inventors: Boisy G. Pitre, Rana el Kaliouby, Abdelrahman Mahmoud, Seyedmohammad Mavadati, Daniel McDuff, Panu James Turcot, Gabriele Zijderveld