Patents Issued in July 13, 2017
-
Publication number: 20170200010Abstract: Disclosed are a security control method and a network device. The method includes: a network device obtains confidential data generated by a software trusted platform module (TPM) running in the network device, where the confidential data includes permanent confidential data and refreshable confidential data, the permanent confidential data is data that cannot be updated during a startup process of the network device and the refreshable confidential data is data that can be updated during a startup process of the network device; the network device encrypts the permanent confidential data by using a white box algorithm and stores the permanent confidential data encrypted by using the white box algorithm and the refreshable confidential data in a storage unit whose address is hidden.Type: ApplicationFiled: March 24, 2017Publication date: July 13, 2017Inventors: Tianfu Fu, Chong Zhou, Hao Lei, Liang Zhu, Yubai Ye
-
Publication number: 20170200011Abstract: Data DNA modeling is used to represent data and the relationship this data has with other data. When an information access request from a user is detected, an asset DNA associated with the user is retrieved and analyzed against the information access request. Using the asset DNA, it can be determined whether the information access request is a normal request or a suspicious request. If the user is unknown, a generic asset DNA can be created and populated with the data from the information access request. The system checks the newly created asset DNA against other similar asset DNA to determine whether there is any abnormality associated with this newly created asset DNA.Type: ApplicationFiled: January 7, 2016Publication date: July 13, 2017Inventor: Yeejang James Lin
-
Publication number: 20170200012Abstract: In some examples, a method includes inserting monitoring instructions to be executed with a set of conditional operations and data type operations in an application and executing the application with a benign value. The method can also include storing at least one of result values and path constraints from the monitoring instructions, the result values comprising values generated by each conditional operation and each data type operation executed with the benign value. Furthermore, the method can include generating a prohibited value corresponding to a security vulnerability that satisfies the set of conditional operations and data type operations in the application based on the result values and the path constraints and modifying the application to prevent execution of the prohibited value.Type: ApplicationFiled: January 11, 2016Publication date: July 13, 2017Inventors: Roee Hay, Omer Tripp
-
Publication number: 20170200013Abstract: Example embodiments disclosed herein relate to determining terms for a security test. Terms associated with an application under test are determined. The terms are filtered with words in a dictionary to generate a filtered set or wordlist. The set or wordlist is used for input to the application under test for the security test.Type: ApplicationFiled: July 18, 2014Publication date: July 13, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Ronald J. SECHMAN, Prajakta JAGDALE, Sasi MUTHURAJAN, Nidhi KEJRIWAL
-
Publication number: 20170200014Abstract: Embodiments of the present invention disclose a method and an apparatus for selecting a terminal mode, and the method includes: reading configuration information when a screen wakeup instruction is obtained, where the configuration information includes information about a wearable device that is paired with the terminal; querying to determine whether a wearable device is connected to a terminal; and selecting a mode corresponding to the wearable device as the terminal model if the wearable device that is connected to the terminal as determined by the querying is the same as the paired wearable device. In this solution, a corresponding mode can be selected according to a connection status between a terminal and a wearable device, thereby enhancing an automation degree of the terminal and improving a user experience effect.Type: ApplicationFiled: May 29, 2014Publication date: July 13, 2017Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Hao JING
-
Publication number: 20170200015Abstract: A server is provided that includes a processing device configured to execute programmable instructions to perform operations. The operation include hosting a first email account associated with an individual configured to exchange email messages with another email account and accessing usage data, wherein the usage data is based on at least one of tracked usage of and statistics related to the first email account and being separate from content included in email messages exchanged by the first email account. The operations further include providing a usage report, in association with a communication by the individual, to a computing device that is aware of the communication, wherein the usage report includes at least one of at least a portion of the usage data accessed and an indication of a result of a determination as to whether the usage data accessed is consistent with a primary email account model.Type: ApplicationFiled: July 11, 2016Publication date: July 13, 2017Inventor: Emmanuel Gonzalez
-
Publication number: 20170200016Abstract: The invention provides an information processing method. The information processing method is applied to a terminal that comprises a plurality of operating systems. The information processing method comprises: upon receiving an instruction of copying data information in an arbitrary operating system to a specified operating system among the plurality of operating systems, acquiring a target entering key of the specified operating system; and after copying the data information to the specified operating system, encrypting the data information in the arbitrary operating system by using the target entering key of the specified operating system, or not displaying the data information in the arbitrary operating system again. The technical solution guarantees that data are not lost and also guarantees that data are not easy to divulge. The invention also provides a terminal and a nonvolatile machine-readable medium.Type: ApplicationFiled: March 24, 2017Publication date: July 13, 2017Applicant: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) CO., LTD.Inventor: Jingen SHENG
-
Publication number: 20170200017Abstract: Prior art attempts to manage authority designation in GUI-based computer systems have set up various “handshaking” schemes between a graphics management system, such as a window server, and the various processes that are attempting to offer and accept access to each other. However, these schemes have certain limitations. In particular, when windows are used as the “fundamental basis” for implementing authority designation, events that should treat all content within a window identically can't do so because, even though all content in the window may appear to be “owned” by the window, there may be some other process that is actually rendering the content to some portion of the window. Thus, described herein are systems and methods to manage authority designation and event handling within “hierarchical” GUIs using “handshaking” schemes that are secure, sub-window granular, and that generalize recursively when applied to the various graphical layers used to construct the windows.Type: ApplicationFiled: March 23, 2017Publication date: July 13, 2017Inventors: Philip J. Holland, Chendi Zhang
-
Publication number: 20170200018Abstract: Systems, apparatuses, and methods for creating, editing and using notes within the context of a records database. In an embodiment, a user may create a virtual sticky note that is associated with an underlying record such that the note is displayed with the record but extraneous from any field in the business record. Further, not all notes may be seen by all users as various levels of privacy may be established for different users. Embodiments enable users to efficiently and effectively associate their comments or other inputs with a record or file that is maintained on a cloud-based or multi-tenant platform. The notes may be implemented is a cloud-based solution to track notes/comments against business records maintained on a multi-tenant platform. In one embodiment, a note creator may permit other users to specify rules or criteria that determine who or what portions of an organization may view the created notes.Type: ApplicationFiled: May 8, 2015Publication date: July 13, 2017Inventors: Chris Boncha, Juan Camacho, Wei (Michelle) Xue, Rosalina Kessman, Sam Rajkumar, Johanne Lim
-
Publication number: 20170200019Abstract: The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect agents installed across various egress points (e.g., email server, user's computer, etc.) to monitor information disclosed by a user. The present system also provides the use of fingerprint servers to remotely maintain a database of fingerprints associated with the organization's secure data. In one embodiment, the protect agents transmit fingerprints associated with the user's information to the fingerprint server utilizing a local network or the public internet. The protect agents then receive a comparison analysis from the fingerprint servers and execute appropriate security action based on the analysis. In one embodiment, a combination of the local network and public internet is utilized to achieve remote agent lookups.Type: ApplicationFiled: February 21, 2017Publication date: July 13, 2017Applicant: Workshare Technology, Inc.Inventors: Scott More, Ilya Beyer, Daniel Christopher John Sweeting
-
DATA MANAGEMENT SYSTEM, PROGRAM RECORDING MEDIUM, COMMUNICATION TERMINAL, AND DATA MANAGEMENT SERVER
Publication number: 20170200020Abstract: A data management system with which secret data is hardly leaked to a third party. A communication terminal of the present invention generates an encryption key and a data ID using a terminal identification ID of the communication terminal, encrypts the secret data using the encryption key, and causes a data management server to associate the secret data encrypted through this encryption with the data ID and to store the associated data and ID. In addition, the communication terminal of the present invention generates again the encryption key and the data ID using the terminal identification ID internally stored in the communication terminal, requests the secret data corresponding to the data ID from the management server, and decrypts the received secret data using the encryption key.Type: ApplicationFiled: October 17, 2016Publication date: July 13, 2017Applicant: Showcase-TV Inc.Inventors: Toyoshi NAGATA, Koji YUGETA -
Publication number: 20170200021Abstract: A customer support application provides screen sharing of the user's computing device with a remote customer support agent, thereby enabling the customer support agent to view the content displayed on the user's device. At least a portion of the content displayed on the user's device may contain sensitive information. Coordinates corresponding to the content displayed on the user's device may be obtained and the portion of the display corresponding to the coordinates may be obscured from the remote customer support agent.Type: ApplicationFiled: December 1, 2016Publication date: July 13, 2017Inventors: Anand Bhupendra Patel, Samuel Scott Gigliotti
-
Publication number: 20170200022Abstract: A method for distributed tokenization of sensitive strings of characters, such as social security numbers, credit card numbers and the like, in a local server is disclosed. The method comprises the steps of receiving from a central server at least one, and preferably at least two, static token lookup tables, and receiving a sensitive string of characters. In a first tokenization step, a first sub string of characters is substituted with a corresponding first token from the token lookup table(s) to form a first tokenized string of characters, wherein the first sub string of characters is a substring of the sensitive string of characters. Thereafter, in a second step of tokenization, a second sub string of characters is substituted with a corresponding second token from the token lookup table(s) to form a second tokenized string of characters, wherein the second substring of characters is a substring of the first tokenized string of characters. Optionally, one or more additional tokenization steps is/are used.Type: ApplicationFiled: March 27, 2017Publication date: July 13, 2017Inventor: Ulf Mattsson
-
Publication number: 20170200023Abstract: Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.Type: ApplicationFiled: May 12, 2015Publication date: July 13, 2017Inventors: Steven Sprague, Michael Sprague
-
Publication number: 20170200024Abstract: An electronic device and a method of securing the electronic device are provided. The method includes displaying content and recognizing at least one of a tilt, a sound, or a voice. Then, comparing preset reference data to at least one of an angle corresponding to the tilt, data corresponding to the sound, or data corresponding to the voice. Further, activating a secure mode for the displayed content, when the at least one of the angle corresponding to the tilt, the data corresponding to the sound, or the data corresponding to the voice is consistent with the preset reference data. Another embodiment includes displaying content, recognizing a connection with an external electronic device, and activating a secure mode for the displayed content, in response to the recognized connection. Additional features may include requesting the connected external electronic device to display the content, and then altering and displaying the altered content thereon.Type: ApplicationFiled: January 3, 2017Publication date: July 13, 2017Inventors: Soyeon Kim, Daewoong Song, Eojin Lim, Youngtae Jin, Seongyeon Hwang, Soojung Lee
-
Publication number: 20170200025Abstract: An apparatus is provided. The apparatus includes processing circuitry including a processor and a memory that contains instructions that, when executed by the processor, configure the processor to receive an activation request including identification data from a device, determine whether functionality of the device is authorized for activation based on the identification data, and in response to determining the device is not authorized for activation, cause transmission of a message configured to cause functionality of the device to remain deactivated while keeping communication capability of the device activated.Type: ApplicationFiled: January 11, 2016Publication date: July 13, 2017Inventor: Steven SHAPIRO
-
Publication number: 20170200026Abstract: The disclosed apparatus may include a secure storage device that securely stores an initial geographic location of a network device that facilitates network traffic within a network. This apparatus may also include a processing unit communicatively coupled to the secure storage device. The processing unit may determine a current geographic location of the network device. The policy-enforcement unit may then detect evidence of theft of the network device by (1) comparing the current geographic location of the network device with the initial geographic location of the network device and (2) determining, based at least in part on the comparison, that the current geographic location of the network device does not match the initial geographic location of the network device. Finally, the processing unit may perform at least one security action in response to detecting the evidence of theft of the network device.Type: ApplicationFiled: March 27, 2017Publication date: July 13, 2017Inventors: Ravindranath C. Kanakarajan, Venkanna Thadishetty
-
Publication number: 20170200027Abstract: A system and method of validating electronic encoded information from magnetic stripe card data transmitted as electronic stripe data includes a lump transmission stream. The lump transmission stream is read by at least two track channel readers each of which recognizes and reads only data corresponding to data to be read from a respective magnetic stripe represented in the lump transmission stream, which has data read from two tracks of magnetic card stripes. One track channel reader reads the first portion of the lump stream and discards the second portion of the stream, the second track channel reader reads the second portion of the stream and discards the first portion of the stream.Type: ApplicationFiled: May 5, 2016Publication date: July 13, 2017Applicant: Samsung Pay, Inc.Inventor: Enyang Huang
-
Publication number: 20170200028Abstract: A magnetic anti-counterfeit label and identification system thereof, wherein the magnetic anti-counterfeit label comprises a substrate, a magnetic ink layer, an opaque layer and a protective coating. The magnetic ink layer covers the substrate. The opaque layer covers the magnetic ink layer in order to visually hide the characters, bar code, and other patterns which are printed using magnetic ink. Additionally the protective coating is composed of a polymer or a metal layer, which covers opaque layer. This identification system comprises a magnetic sensor for sensing the magnitude of the magnetic field emitted by the magnetic anti-counterfeit label, a permanent magnet or an electromagnet for magnetizing the magnetic anti-counterfeit label, a digital processing circuit that is electrically connected to the magnetic sensor, and a frame that is used to hold the magnetic sensor and the digital processing circuit. The digital processing circuit outputs a code corresponding to the magnetic anti-counterfeit label.Type: ApplicationFiled: May 14, 2015Publication date: July 13, 2017Inventors: James Geza Deak, Xiaofeng Cheng
-
Publication number: 20170200029Abstract: A passive, self-steering antenna device is provided along with methods pertaining to operations and controls of the antenna device. The antenna device can include a main antenna for receiving an unmodulated wireless signal, a power harvester configured to obtain power from the unmodulated wireless signal, a main circuit disposed in a central region of the antenna device, and a plurality of peripheral distributed antenna elements configured to modify the radiation pattern of the antenna device. The antenna device can be configured to operate automatically device without needing control information in response to receiving a message from another antenna. Related methods include operations and controls for such an antenna device including automatically performing actions to enhance communications with another antenna device by selecting and activating a subset of the peripheral antenna elements to create a radiation pattern.Type: ApplicationFiled: December 31, 2015Publication date: July 13, 2017Applicant: INTERMEC, INC.Inventors: Pavel NIKITIN, Stephen J. Kelly
-
Publication number: 20170200030Abstract: Various switchable RFID devices are disclosed. These switchable RFID devices may include one or more RFID tags and one or more switches. Some of these one or more switches are optionally wireless. In various embodiments, the switchable RFID devices include cellular phones, security devices, identity devices, financial devices, remote controls, and the like. The switchable RFID devices are optionally disposed in a passport.Type: ApplicationFiled: January 28, 2017Publication date: July 13, 2017Inventor: Steven Michael Colby
-
Publication number: 20170200031Abstract: There is provided a system including a wireless tag reader, a wireless tag attached to an object, a non-transitory memory storing an executable code, and a hardware processor executing the executable code to transmit, using the wireless tag reader, an interrogation signal, receive, using the wireless tag reader, a tag signal from the wireless tag attached to the object, in response to the interrogation signal, the tag signal including a wireless tag identification uniquely identifying the wireless tag, determine a tag state associated with the wireless tag using a probabilistic estimate based on the tag signal received from the wireless tag, and determine an interaction state of the object based on the tag state of the wireless tag attached to the object.Type: ApplicationFiled: April 18, 2016Publication date: July 13, 2017Inventors: James McCann, Andrew Spielberg, Scott Hudson, Alanson Sample, Jennifer Mankoff
-
Publication number: 20170200032Abstract: There is provided a system including a plurality of radio frequency (RF) tags, each corresponding to one of a plurality of individuals, a memory, and a processor configured to receive a signal from a first RF tag of the plurality of RF tags, the signal including a first tag identification (ID) uniquely identifying the first RF tag, follow a motion of the first RF tag, follow a motion of a first individual of the plurality of individuals, and determine a first likelihood that the first RF tag corresponds to the first individual based on the motion of the first RF tag and the motion of the first individual.Type: ApplicationFiled: May 9, 2016Publication date: July 13, 2017Inventors: Alanson Sample, Hanchuan Li, Samer Al Moubayed
-
Publication number: 20170200033Abstract: There is provided a system including a wireless tag reader, a first wireless antenna, a wireless tag including an integrated circuit (IC), a conductive element electronically connecting the wireless tag to the first wireless antenna, a non-transitory memory storing an executable code, a hardware processor executing the executable code to transmit an interrogation signal, receive a tag signal from the wireless tag electronically connected to the first wireless antenna in response to the interrogation signal, the tag signal including a wireless tag identification (ID) uniquely identifying the wireless tag, and determine an interaction by a user with the wireless tag based on the tag signal.Type: ApplicationFiled: May 23, 2016Publication date: July 13, 2017Inventors: Hanchuan Li, Josh Fromm, Scott Hudson, Eric Brockmeyer, Elizabeth Carter, Shwetak Patel, Alanson Sample
-
Publication number: 20170200034Abstract: An object locating, identifying, tracking, and surveillance system, denoted the Assets Locating, Tracking, and Surveillance System (ALTSS), is provided for managing physical objects and evidence in environments such as police departments, law offices, and the Courts. ALTSS employs radio frequency identification (RFID) technology, computer programming and database applications, networking technologies, and hardware elements. ALTSS may locate and track physical evidence, merchandise, information carriers like files, folders or individual pieces of paper, and people, under certain conditions, in near-real time. It may be configured as part of a local area network, a wide area network, or the Internet. ALTSS may employ exemplary components such as RFID transponders, scanners, strategically located antennas and computers to facilitate tracking of objects and people as needed.Type: ApplicationFiled: January 13, 2017Publication date: July 13, 2017Inventor: Frederick SAWYER
-
Publication number: 20170200035Abstract: Provided is an optical code that retains compatibility with existing optical codes and is used for recording information different from the information recorded under prescribed conditions. Also provided are a method and a device for reading the optical code. The optical code includes a plurality of light color modules of a light color and a plurality of dark color modules of a dark color to record first data. At least the light color modules or the dark color modules are made up of a first module and a second module having different reflectance for light of a predetermined wavelength. Second data is recorded in a pattern of the first and second modules.Type: ApplicationFiled: December 19, 2016Publication date: July 13, 2017Applicants: DENSO WAVE INCORPORATED, TERRARA CODE RESEARCH INSTITUTE, INC.Inventor: Nobuyuki TERAURA
-
Publication number: 20170200036Abstract: Disclosed is a fingerprint detection circuit and a display device. The fingerprint detection circuit comprises at least one fingerprint detection unit, the fingerprint detection unit comprising a switch transistor and a sensor capacitor, the fingerprint detection unit further comprising an output amplification element and a data input terminal for receiving a data signal, wherein a control terminal of the output amplification element is coupled with a terminal of the sensor capacitor, an output terminal of the output amplification element functions as an output terminal of the fingerprint detection unit, an input terminal of the output amplification element is coupled with the data input terminal, the output amplification element is configured for amplifying and outputting a current input to the output amplification element via the data input terminal.Type: ApplicationFiled: October 31, 2016Publication date: July 13, 2017Inventors: Haisheng WANG, Xue DONG, Hailin XUE, Xiaochuan CHEN, Xiaoliang DING, Yingming LIU, Shengji YANG, Weijie ZHAO, Hongjuan LIU, Wei LIU, Changfeng LI, Pengpeng WANG
-
Publication number: 20170200037Abstract: An exemplary embodiment of the present inventive concept provides a display device including: a display unit including a plurality of pixels disposed on a display area; a display controller configured to control the display unit; a sensor including a plurality of first sensing electrodes and a plurality of second sensing electrodes disposed in the display area; and a sensor controller configured to recognize a touch of a user inputted into the sensor in a touch sensing mode and to recognize a fingerprint of the user inputted into the sensor in a fingerprint sensing mode, wherein the sensor controller changes a mode to the fingerprint sensing mode when no touch is inputted for a predetermined time period in the touch sensing mode and changes the mode to the touch sensing mode when authorization on a fingerprint inputted into the sensor is succeeded in the fingerprint sensing mode.Type: ApplicationFiled: January 9, 2017Publication date: July 13, 2017Inventors: Won Ki HONG, Jong Seo LEE
-
Publication number: 20170200038Abstract: The present invention provides an electronic device providing with a security mode and an operation mode, wherein the electronic device includes a touch panel having a sensing array. A sample fingerprint is fetched by using the sensing array, the mobile communicating device includes a first conductive line on a substrate, an organic light emitting layer formed over said first conductive line, a second conductive line formed over the organic light emitting layer, a fingerprint X sensing line and a fingerprint Y sensing line are formed over the second conductive line; and an isolation layer is formed over the fingerprint Y sensing line for isolating the fingerprint X sensing line and the fingerprint Y sensing line.Type: ApplicationFiled: March 9, 2017Publication date: July 13, 2017Inventor: KUO-CHING CHIANG
-
Publication number: 20170200039Abstract: This application provides techniques, including circuits and designs, which can receive information with respect to fingerprint images, or portions thereof, and which can be incorporated into devices using fingerprint recognition. This application also provides techniques, including devices which perform fingerprint recognition and methods which can be performed by those devices. In one embodiment, techniques can include providing a fingerprint recognition sensor in which one or more portions of each fingerprint can be collected as they are identified, and those portions can be combined into a unified fingerprint template. In this way, collection and enrollment of fingerprints may be simplified for users.Type: ApplicationFiled: March 27, 2017Publication date: July 13, 2017Inventors: John A. Wright, Byron B. Han, Craig A. Marciniak
-
Publication number: 20170200040Abstract: An optical module includes a housing with a lighting mechanism, an aperture formed therein, and a window that frames a transparent surface adapted to contact a skin surface of a person, for example, a fingertip. The lighting mechanism provides light to illuminate the skin surface placed upon the transparent surface. A prism has a first side facing the lighting mechanism, a second side at the window, and a third side through which a dactylographic image exits the prism. One or more light reflecting surfaces are disposed within the housing to reflect the dactylographic image towards the housing aperture. The optical module is coupled to a mobile device having a camera, with the aperture of the housing aligning with a lens of the camera. The camera acquires the dactylographic image, and the mobile device adjusts this dactylographic image to produce a dactylographic image suitable for biometric matching.Type: ApplicationFiled: March 29, 2017Publication date: July 13, 2017Inventors: Taras P. RIOPKA, Robert MUNGOVAN, Limin MA, David BENINI
-
Publication number: 20170200041Abstract: A system includes an aerial image database containing sensor data representing an aerial image of the earth surface, the sensor data comprising a feature vector for each pixel in the aerial image. A processor applies a plurality of classifiers to each feature vector to produce a plurality of classifier scores for each feature vector. The processor then determines a plurality of cluster probabilities for each feature vector, each cluster probability for a feature vector indicating a probability of the feature vector given a respective cluster of feature vectors. The processor uses the cluster probabilities for the feature vectors to form a respective weight for each of the plurality of classifiers. The processor combines the weights and the classifier scores to form an ensemble score for each pixel, the ensemble score indicating which of two possible land cover types is present on a portion of the earth surface represented by the pixel.Type: ApplicationFiled: January 11, 2017Publication date: July 13, 2017Inventors: Vipin Kumar, Anuj Karpatne
-
Publication number: 20170200042Abstract: A biometric authentication device includes: a memory; and a processor coupled to the memory and the processor configured to execute a process, the process comprising: extracting a finger crotch from a palm image for comparison; extracting a finger root wrinkle from the palm image for comparison; adjusting at least one of a position of a biometric feature for comparison of the palm image for comparison and a position of an enrollment biometric feature of an enrolled palm image, based on position information of the finger crotch extracted in the extracting of the finger crotch and position information of the wrinkle extracted in the extracting of the finger root wrinkle; and comparing the biometric feature for comparison and the enrollment biometric feature after the adjusting.Type: ApplicationFiled: January 9, 2017Publication date: July 13, 2017Applicant: FUJITSU LIMITEDInventors: Hajime NADA, SOICHI HAMA, Satoshi MAEDA, SATOSHI SEMBA, Yukihiro Abiko
-
Publication number: 20170200043Abstract: Disclosed are a fingerprint information dynamic updating method and a fingerprint recognition apparatus. The method includes the steps of: collecting fingerprint information, and performing fingerprint recognition according to the collected fingerprint information and a pre-registered fingerprint template database; after the fingerprint recognition succeeds, determining whether the fingerprint template database is saturate; if the fingerprint template database is not saturate and the collected fingerprint information satisfies a first updating condition, adding the collected fingerprint information to the fingerprint template database; and if the fingerprint template database is saturate and the collected fingerprint information satisfies a second updating condition, selecting target fingerprint information from the fingerprint template database, and replacing the target fingerprint information with the collected fingerprint information.Type: ApplicationFiled: March 24, 2017Publication date: July 13, 2017Applicant: SHENZHEN HUIDING TECHNOLOGY CO., LTD.Inventors: Dongcheng WU, Hongwei XU, Weiwen CHEN
-
Publication number: 20170200044Abstract: An apparatus and a method for providing a surveillance image based on a depth image. The apparatus according to the present invention includes: a first camera capturing a depth image for a subject in a predetermined capturing region; a second camera capturing a color image for the subject in the predetermined capturing region; a subject identification unit identifying a subject in the capturing region; an image processing unit extracting the color image corresponding to a region of the identified subject from the color image and synthesizing the extracted color image with a position corresponding to the depth image to generate a synthesized image; and a control unit providing the depth image when the subject is not identified by the subject identification unit and providing the synthesized image only when the subject is identified by the subject identification unit.Type: ApplicationFiled: July 15, 2016Publication date: July 13, 2017Inventors: Jae Ho LEE, Hee Kwon KIM, Soon Chan PARK, Ji Young PARK, Kwang Hyun SHIM, Moon Wook RYU, Ju Yong CHANG, Ho Wook JANG, Hyuk JEONG
-
Publication number: 20170200045Abstract: Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for matching faces. The method includes receiving an image of a face of a first person from a device of a second person, comparing the image of the face of the first person to a database of known faces in a contacts list of the second person, identifying a group of potential matching faces from the database of known faces, and displaying to the second person the group of potential matching faces. In one variation, the method receives input selecting one face from the group of potential matching faces and displays additional information about the selected one face. In a related variation, the method displays additional information about one or more face in the displayed group of potential matching faces without receiving input.Type: ApplicationFiled: March 28, 2017Publication date: July 13, 2017Inventor: William Roberts CHESWICK
-
Publication number: 20170200046Abstract: Provided is a user authentication method using a natural gesture input. The user authentication method includes recognizing a plurality of natural gesture inputs from image data of a user, determining number of the plurality of natural gesture inputs as total number of authentication steps, determining a reference ratio representing a ratio of number of authentication steps requiring authentication pass to the total number of the authentication steps, determining an actual ratio representing a ratio of number of authentication steps, where authentication has actually passed, to the total number of the authentication steps, and performing authentication on the user, based on a result obtained by comparing the actual ratio and the reference ratio.Type: ApplicationFiled: January 11, 2017Publication date: July 13, 2017Applicant: Electronics and Telecommunications Research InstituteInventors: Jun Seong BANG, Dong Chun LEE
-
Publication number: 20170200047Abstract: Embodiments of vehicle gesture recognition systems and methods are disclosed. An example vehicle gesture recognition system comprises a data interface configured for receiving 2d image data from a 2d sensor and/or from a portable device camera via a portable device interface. Additionally or alternatively, the data interface is configured for receiving gesture data indicating a gesture. A vehicle processing unit is configured for controlling user interfacing with a user interface based on the gestures recognized from the 2d image data and/or as indicated by the gesture data.Type: ApplicationFiled: March 24, 2017Publication date: July 13, 2017Inventors: Florian Mueller, Peter Wagner
-
Publication number: 20170200048Abstract: An information processing apparatus includes: a storage that stores establishment information including identification information of an establishment, establishment position information indicating the position of the establishment, and level information indicating a level, on which the establishment is located, communication circuitry that receives, from a user terminal, a captured image captured, azimuth information, and terminal position information, and control circuitry that identifies at least one establishment existing in a building included in the received captured image based on the received terminal position information and azimuth information and the stored establishment position information, identifies the position of a level, on which the identified establishment exists, in the captured image based on the level information, and generates display information for displaying the identification information of the identified establishment on the position of the identified level of the captured image iType: ApplicationFiled: January 13, 2017Publication date: July 13, 2017Applicant: Gurunavi, Inc.Inventor: Atsushi YAMADA
-
Publication number: 20170200049Abstract: A system for analyzing scene traits in an object recognition ingestion ecosystem is presented. In some embodiment, a trait analysis engine analyzes a digital representation of a scene to derive one or more features. The features are compiled into sets of similar features with respect to a feature space. The engine attempts to discover which traits of the scene (e.g., temperature, lighting, gravity, etc.) can be used to distinguish the features for purposes of object recognition. When such distinguishing traits are found, an object recognition database is populated with object information, possibly indexed according to the similar features and their corresponding distinguishing traits.Type: ApplicationFiled: March 16, 2017Publication date: July 13, 2017Applicant: Nant Holdings IP, LLCInventors: David McKinnon, John Wiacek, Jeremi Sudol, Kamil Wnuk, Bing Song
-
Publication number: 20170200050Abstract: A device for previewing a video includes a memory device configured to store instructions, and one or more processors configured to execute the instructions to receive a video captured by a camera and analyze the video. The one or more processors are also configured to detect a special event from the analysis of the video. The special event includes at least one of an object, a moving object, or a sound detected in the video. The one or more processors are further configured to extract, from the video, at least one of a video preview frame or audio segment corresponding to the special event, and generate a preview video including the at least one of the video preview frame or audio segment corresponding to the special event.Type: ApplicationFiled: April 6, 2016Publication date: July 13, 2017Inventors: Junfeng ZHANG, Lili ZHAO, Feng LI
-
Publication number: 20170200051Abstract: An approach for re-identifying an object in a test image is presented. Similarity measures between the test image and training images captured by a first camera are determined. The similarity measures are based on Bhattacharyya distances between feature representations of an estimated background region of the test image and feature representations of background regions of the training images. A transformed test image based on the Bhattacharyya distances has a brightness that is different from the test image's brightness, and matches a brightness of training images captured by a second camera. An appearance of the transformed test image resembles an appearance of a capture of the test image by the second camera. Another image included in test images captured by the second camera is identified as being closest in appearance to the transformed test image and another object in the identified other image is a re-identification of the object.Type: ApplicationFiled: March 28, 2017Publication date: July 13, 2017Inventors: Lisa M. Brown, Ankur Datta, Rogerio S. Feris, Sharathchandra U. Pankanti
-
Publication number: 20170200052Abstract: An analytical recognition system includes a video camera, an antenna, and a data analytics module. The video camera is configured to capture video data. The antenna is configured to capture mobile communication device data. The data analytics module is configured to correlate the video data and the mobile communication device data to generate a profile of a person associated with the video data and the mobile communication device data. The profile has profile data including any one or a combination of the captured video data and the captured mobile communication data.Type: ApplicationFiled: March 27, 2017Publication date: July 13, 2017Inventor: James Carey
-
Publication number: 20170200053Abstract: Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts.Type: ApplicationFiled: March 25, 2017Publication date: July 13, 2017Applicant: iProov LtdInventor: Andrew Bud
-
Publication number: 20170200054Abstract: A method of determining whether a biometric object is part of a live individual is described. In one such method, image information is acquired from the biometric object by using a sensor, such as an ultrasonic sensor. The image information may be analyzed in at least two analysis stages. One of the analysis stages may be a temporal analysis stage that analyzes changes in the image information obtained during a time period throughout which the biometric object was continuously available to the sensor. For example, a dead/alive stage may analyze differences between image information taken at two different times in order to identify changes from one time to the next. Other stages may focus on aspects of a particular image information set, rather than seeking to assess changes over time. These other stages seek to determine whether an image information set exhibits characteristics similar to those of a live biometric object.Type: ApplicationFiled: March 28, 2017Publication date: July 13, 2017Inventors: Eliza Yingzi Du, Ming Yu Chen, Esra Vural, Kwokleung Chan, David William Burns, Suryaprakash Ganti, John Keith Schneider, Saurav Kumar Bandyopadhyay, Jin Gu
-
Publication number: 20170200055Abstract: A magnetic ink character reader includes a transport unit configured to move a medium along a transport path, a reader configured to magnetically read magnetic ink characters printed on the medium, while the medium is moved along the transport path and to output a signal waveform corresponding to the magnetic ink characters, and a processor configured to compare a transportation direction of the medium through the reader to a forward reading direction of the reader, and to invert, in horizontal and vertical directions, the signal waveform output from the reader when the transportation direction is not the forward reading direction. The processor performs magnetic character recognition using the signal waveform from the reader when the transportation direction is the forward reading direction and the inverted signal waveform when the transportation direction is a reverse reading direction opposite the forward reading direction.Type: ApplicationFiled: January 12, 2017Publication date: July 13, 2017Inventor: Kengo SAGA
-
Publication number: 20170200056Abstract: There is provided systems and methods for performing actions based on light signatures. An exemplary system includes a light source, a light detector, a non-transitory memory storing a plurality of light signatures and a hardware processor. The hardware processor executes an executable code to illuminate, using the light source, a target object with a first light, collect, using the light detector, a second light being a reflection of the first light by the target object, match the second light with one of the plurality of light signatures, and perform an action in response to matching the second light with the one of the plurality of light signatures.Type: ApplicationFiled: January 12, 2016Publication date: July 13, 2017Inventors: Lanny S. Smoot, Michael Holton
-
Publication number: 20170200057Abstract: An image processing device for performing a preprocessing of an image recognition process to an input image is provided, which includes: a generation element for generating a histogram of luminance values of the input image; a determination element for determining a reference value for the luminance values on the basis of the histogram, and determining a high luminance pixel that is a pixel having a luminance value greater than the reference value; and a conversion element for converting the luminance value of the high luminance pixel into a luminance value that is lower than or equal to the reference value. Thus, even when a high luminance region is present in the input image due to specularly reflected light or the like, high-accuracy character recognition can be performed.Type: ApplicationFiled: October 30, 2015Publication date: July 13, 2017Applicant: OMRON CorporationInventors: Tadashi HYUGA, Tomoyoshi AIZAWA, Hideto HAMABASHIRI
-
Publication number: 20170200058Abstract: A method for determining a level of degradation of a road marking is executed by a determination unit. The method includes generating a plurality of reference images by an image capturing device photographing a reference road marking with a plurality of shutter speeds. The reference images are stored in a database. The method further includes generating an image by the image capturing device photographing an examined road marking according to a selected shutter speed, retrieving one of the reference data from the database that has the same shutter speed as the examined road marking by a processor, and performing a difference determination procedure between the retrieved reference data and the examined data by the processor, and outputting a determined result of the level of degradation of the examined road marking by the processor. As such, accurate determination on the level of degradation of the examined road marking can be achieved.Type: ApplicationFiled: January 13, 2016Publication date: July 13, 2017Inventors: Kuo-Liang LIN, Jyh-Bin SUEN
-
Publication number: 20170200059Abstract: The present disclosure involves systems, software, and computer-implemented methods for applying correction macros to a clearing payment instrument image. An example method includes identifying a correction macro including one or more image processing actions to apply to a first clearing payment instrument image; associating the correction macro with a first attribute of the first clearing payment instrument image; and determining that the correction macro is to be applied to a second clearing payment instrument including a second attribute based on the second attribute matching the first attribute associated with the correction macro.Type: ApplicationFiled: January 11, 2016Publication date: July 13, 2017Applicant: Digital Check CorporationInventors: Rian Maloney, Scott Weber