Patents Issued in December 21, 2017
  • Publication number: 20170364690
    Abstract: A method for determining a position of a receiver via use of encrypted signals of a public regulated service. The method comprises transmitting PRN code chips to the receiver by an assistance server. The method further comprises storing the transmitted PRN code chips to be used before a designated time interval by the receiver. The method further comprises receiving the encrypted signals during the designated time interval by the receiver from satellites in line-of-sight to the receiver. The method further comprises determining the position of the receiver via use of the encrypted signals and the stored PRN code chips by the receiver.
    Type: Application
    Filed: June 13, 2017
    Publication date: December 21, 2017
    Inventors: Jan Wendel, Alexander Ruegamer
  • Publication number: 20170364691
    Abstract: The present document discloses methods, systems and terminals for controlling encryption of information and analyzing information. The method for controlling encryption of information includes: determining a content of a message required to be encrypted when it is detected that the message needs to be encrypted and transmitted; combining and encrypting the content of the message required to be encrypted and a time parameter indicating a decryption time limit of the message to generate an encrypted data block; and sending the message in which the encrypted data block is carried.
    Type: Application
    Filed: August 19, 2015
    Publication date: December 21, 2017
    Applicant: ZTE Corpration
    Inventor: Dongming ZHANG
  • Publication number: 20170364692
    Abstract: An electronic file sharing system includes a data store, a processor, and memory. The memory is coupled to the processor and stores instructions that when executed by the processor, provide electronic file storage relative to the data store. The processor is configured to detect a first sharing operation from a first entity to share a selected electronic file with a second entity to allow the second entity to interact with the selected electronic file in a way set by the first entity. The processor is further configured to generate a first sharing link for the second entity to access the selected electronic file in the way set by the first entity. The processor is also configured to detect a second sharing operation from an entity other than the first entity to share the selected electronic file with a third entity in the way set by the first entity and to generate a second sharing link for the third entity to access the selected electronic file in the way set by the first entity.
    Type: Application
    Filed: June 15, 2016
    Publication date: December 21, 2017
    Inventors: Rafael Lopez-Uricoechea, Eugene S. Lin
  • Publication number: 20170364693
    Abstract: An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data files from the non-transitory memory medium; and sending the data files to the user, if the access is granted.
    Type: Application
    Filed: June 21, 2016
    Publication date: December 21, 2017
    Applicant: Unisys Corporation
    Inventor: Adam Gallagher
  • Publication number: 20170364694
    Abstract: Various techniques are described for platform management of integrated access of public and privately-accessible datasets utilizing federated query generation and query schema rewriting optimization, including receiving at a dataset access platform a query formatted according to a first data schema, generating a copy of the query, saving the query and the copy to a datastore, parsing the copy of the query in the first schema using an inference engine, determining whether the query comprises data associated with an access control condition associated with accessing the dataset, the access control condition being configured to indicate whether the query is permitted to access the dataset, and rewriting, using a proxy server, the copy of the query in a second schema, and optimizing the rewriting by identifying a database engine to execute the query and including other data converted into another triple associated with an attribute of the query.
    Type: Application
    Filed: February 22, 2017
    Publication date: December 21, 2017
    Applicant: Data.World, Inc.
    Inventors: Bryon Kristen Jacob, David Lee Griffith, Triet Minh Le, Shad William Reynolds, Arthur Albert Keen
  • Publication number: 20170364695
    Abstract: In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing cross organizational data sharing including, for example, means for storing customer organization data in a database of the host organization; allocating at least a sub-set of the customer organization data to be shared as shared data; configuring a hub to expose the shared data to a proxy user and configuring the proxy user at the hub with access rights to the shared data; configuring one or more spokes with access rights to the shared data of the hub via the proxy user; receiving a request from one of the hubs for access to the shared data of the customer organization via the proxy user at the hub; and returning a response to the hub having made the request. Other related embodiments are disclosed.
    Type: Application
    Filed: May 3, 2017
    Publication date: December 21, 2017
    Inventors: Simon Y. Wong, Igor Tsyganskiy, Patrick John Calahan, Alexandre Hersans
  • Publication number: 20170364696
    Abstract: Embodiments of the present disclosure relate to a method and apparatus for document retrieval. The method comprises: determining, in response to receiving a request to retrieve a document from a user, information for the user; obtaining, based on the determined information, ACL information for the user from an ACL index, the ACL index indicating access right of at least one user to the document; and determining, based on the ACL information of the user, a document to be provided to the user from retrieved documents in response to the request. According to the embodiments of the present disclosure, the retrieval efficiency may be enhanced.
    Type: Application
    Filed: June 15, 2017
    Publication date: December 21, 2017
    Inventors: Zed Minhong Zhou, Wei William Zhou, Dingmeng Xue, Jason Muhua Chen
  • Publication number: 20170364697
    Abstract: A data interworking method and a data interworking device are provided. The implementation of the method comprises: receiving first data and second data, wherein the first data are associated with a first user identity of a first platform, and the second data are associated with a second user identity of a second platform; generating a uniform user identity of a user corresponding to the first user identity and/or the second user identity in response to a request of the user, and obtaining result data corresponding to the uniform user identity of the user according to the first data and the second data; and storing the result data and the uniform user identity. The method can realize data interworking of associated users under account number systems of different platforms so as to realize data fusion.
    Type: Application
    Filed: August 10, 2017
    Publication date: December 21, 2017
    Inventors: Ji Zhao, Kaibin Chen
  • Publication number: 20170364698
    Abstract: Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields; segmenting a first value in the first subset; instructing a first computing device to store a first subset of segments among the plurality of segments in memory; and instructing a second computing device to store a second subset of segments among the plurality of segments in memory.
    Type: Application
    Filed: August 11, 2017
    Publication date: December 21, 2017
    Inventors: Scott Nathaniel Goldfarb, James Douglas Beecham, Christopher Edward Struttmann
  • Publication number: 20170364699
    Abstract: Provided is a process including: receiving a first write request from an application requesting to write data to a first remote database via a network; classifying the second value as higher-security; and in response to classifying the second value as higher-security, redirecting the second value from a destination specified by the application in the received first write request, wherein an attacker with full access to the first database does not have access to the second value classified as higher security, and wherein code of the application is not modified to interface with two databases in place of the first remote database.
    Type: Application
    Filed: August 11, 2017
    Publication date: December 21, 2017
    Inventors: Scott Nathaniel Goldfarb, James Douglas Beecham
  • Publication number: 20170364700
    Abstract: Provided is a process including: receiving a request to access a distributed data store, wherein the distributed data store stores a plurality of units of content that are each distributed among multiple computing entities hosting different subsets of data of the distributed data store; and causing, with one or more processors of a computing device configured to participate in combining the information from the plurality of computing entities to access units of content, logging of the request in an entry in a tamper-evident log.
    Type: Application
    Filed: August 11, 2017
    Publication date: December 21, 2017
    Inventors: Scott Nathaniel Goldfarb, James Douglas Beecham, Christopher Edward Struttmann
  • Publication number: 20170364701
    Abstract: Provided is a process including: receiving a request to write a new version of a document to a tamper-evident, immutable data repository; determining that the new version of the document is different from the previous version of the document; and in response to determining, storing a difference between the previous version of the document and the new version of the document in the tamper-evident, immutable data repository.
    Type: Application
    Filed: August 11, 2017
    Publication date: December 21, 2017
    Inventor: Christopher Edward Struttmann
  • Publication number: 20170364702
    Abstract: Provided is a process including: obtaining, with a network controls engine, network traffic, wherein: the network traffic is sent across the network between source computing devices and destination computing devices; at least one of the source or destination computing devices are on a network carrying the network traffic; and the network has a plurality of computing devices causing the network traffic and which are assigned addresses on the network; applying, with the network controls engine, a plurality of rules to the network traffic to identify rules with criteria satisfied by the network traffic; and causing, with the network controls engine, one or more actions prescribed by one or more identified rules with criteria satisfied by the network traffic.
    Type: Application
    Filed: August 11, 2017
    Publication date: December 21, 2017
    Inventors: Scott Nathaniel Goldfarb, Christopher Edward Struttmann, James Douglas Beecham, Gordon Earl Martin
  • Publication number: 20170364703
    Abstract: Various embodiments relate generally to data science and data analysis, computer software and systems, and wired and wireless network communications to provide an interface between repositories of disparate datasets and computing machine-based entities that seek access to the datasets, and, more specifically, to a computing and data storage platform that facilitates consolidation of one or more datasets, whereby a collaborative data layer and associated logic facilitate, for example, efficient access to, and implementation of, collaborative datasets. In some examples, a method may include receiving a dataset and dataset attributes and identifying a first version of the dataset. The method may include identifying data that varies from a first version of the dataset, and generating a second version of the dataset to include a first subset and a second subset of atomized data. The method may include storing subsets of atomized data points as an atomized dataset.
    Type: Application
    Filed: June 19, 2016
    Publication date: December 21, 2017
    Applicant: data.world
    Inventors: Bryon Kristen Jacob, David Lee Griffith, Triet Minh Le, Jon Loyens, Brett A. Hurt, Arthur Albert Keen
  • Publication number: 20170364704
    Abstract: A server node with one or more processors is configured to receive a request to write data to a storage medium and compress the data to yield compressed data. The one or more processors are further configured to encrypt the compressed data according to an encryption key to yield compressed and encrypted data. The one or more processors are further configured to hash the compressed and encrypted data to yield one or more block identifiers that uniquely represent the compressed and encrypted data.
    Type: Application
    Filed: June 20, 2016
    Publication date: December 21, 2017
    Inventors: David D. Wright, Daniel McCarthy
  • Publication number: 20170364705
    Abstract: A method for obfuscating granular transaction data via the introduction of noise includes: storing transaction data entries, each including transaction data values including at least a transaction amount and merchant identifier; receiving a data request including selection criteria and desired metrics; identifying a subset of transaction data entries based on the selection criteria; identifying a metric value for each desired metric based on the corresponding transaction data value in each of the transaction data entries in the subset; inserting noise to modify the subset by (i) adjusting the transaction data values included in at least two of the transaction data entries, and/or (ii) adding at least one transaction data entry to and removing at least one transaction data entry from the subset, where the inserted noise adjusts the metric values within a predetermined range; and transmitting the modified subset.
    Type: Application
    Filed: June 21, 2016
    Publication date: December 21, 2017
    Applicant: MasterCard International Incorporated
    Inventor: Curtis VILLARS
  • Publication number: 20170364706
    Abstract: A file protection method, to resolve a problem that privacy of a file cannot be ensured by manually hiding the file or manually encrypting the file, is presented. The method includes obtaining, by a terminal device, a target file; determining, by the terminal device, whether the target file satisfies a preset file condition; when the target file satisfies the preset file condition, determining, by the terminal device, whether the target file satisfies a corresponding preset protection condition; and when the target file satisfies the preset protection condition, applying, by the terminal device, a corresponding protection solution to the target file. The embodiments of the present disclosure further provide a corresponding file protection apparatus.
    Type: Application
    Filed: December 30, 2014
    Publication date: December 21, 2017
    Inventor: Jie Liu
  • Publication number: 20170364707
    Abstract: Technologies for trusted I/O include a computing device having a processor, a channel identifier filter, and an I/O controller. The I/O controller may generate an I/O transaction that includes a channel identifier and a memory address. The channel identifier filter verifies that the memory address of the I/O transaction is within a processor reserved memory region associated with the channel identifier. The processor reserved memory region is not accessible to software executed by the computing device. The processor encrypts I/O data at the memory address in response to invocation of a processor feature and copies the encrypted data to a memory buffer outside of the processor reserved memory region. The processor may securely clean the processor reserved memory region before encrypting and copying the data. The processor may wrap and unwrap programming information for the channel identifier filter. Other embodiments are described and claimed.
    Type: Application
    Filed: June 20, 2017
    Publication date: December 21, 2017
    Inventors: Reshma Lal, Gideon Gerzon, Baruch Chaikin, Siddhartha Chhabra, Pradeep M. Pappachan, Bin Xing
  • Publication number: 20170364708
    Abstract: A distributed file integrity checking system is described. The described peer integrity checking system (PICS) may negate an attack by storing a properties database amongst nodes of a peer-to-peer network of hosts, some or all of which co-operate to protect and watch over each other.
    Type: Application
    Filed: August 31, 2017
    Publication date: December 21, 2017
    Inventors: Barry A. Trent, Edward R. Mandy
  • Publication number: 20170364709
    Abstract: A Hardware-Embedded Delay Physical Unclonable Function (“HELP PUF”) leverages entropy by monitoring path stability and measuring path delays from core logic macros. Reliability and security enhancing techniques for the HELP PUF reduce bit flip errors during regeneration of the bitstring across environmental variations and improve cryptographic strength along with the corresponding difficulty of carrying out model building attacks. A voltage-based enrollment process screens unstable paths on normally synthesized (glitchy) functional units and reduces bit flip errors by carrying out enrollment at multiple supply voltages controlled using on-chip voltage regulators.
    Type: Application
    Filed: December 15, 2015
    Publication date: December 21, 2017
    Inventor: James PLUSQUELLIC
  • Publication number: 20170364710
    Abstract: An apparatus for obfuscating power consumption associated with one or more operations of a logic circuitry of a processor. The apparatus comprises counterbalance circuitry configured to provide a second power consumption to directly counterbalance the power consumption associated with the one or more operations of the logic circuitry. The second power consumption varies inversely with the power consumption associated with the one or more operations of the logic circuitry. The apparatus further comprises header circuitry configured to enable a common node to vary in voltage corresponding to the one or more operations of the logic circuitry. The counterbalance circuitry and the header circuitry are each coupled to the logic circuitry at the common node.
    Type: Application
    Filed: June 17, 2016
    Publication date: December 21, 2017
    Inventors: Bal S. Sandhu, George McNeil Lattimore, Carl Wayne Vineyard
  • Publication number: 20170364711
    Abstract: The invention relates to a secure element device comprising at least one processor, at least one communication interface, at least one memory RAM and NVM and at least one bus access controller, wherein the bus access controller defines at least a first area PBL, a second area SBL and a secure area MZ. The first area comprises a first loader program capable of loading a program package in the second area. The secure area comprises an authentication key capable of authenticating the program package loaded in the second area. After authentication of the program package loaded in the second area, the access right of the first loader program is changed in such a way that a program in the first area can no more access the second area.
    Type: Application
    Filed: December 16, 2015
    Publication date: December 21, 2017
    Applicant: Gemalto SA
    Inventor: Alain RHELIMI
  • Publication number: 20170364712
    Abstract: Technologies for secure input/output device activation include a compute device to identify an attempt to activate an input/output device of the compute device, notify a controller of the compute device of the attempt to activate the input/output device via a communication channel that is out-of-band relative to an operating system of the compute device, determine whether to authorize activation of the input/output device based on a security policy, and allow the input/output device to resume activation in response to a determination that the security policy authorizes the activation. The security policy indicates whether one or more applications are authorized to access the input/output device.
    Type: Application
    Filed: June 21, 2016
    Publication date: December 21, 2017
    Inventors: Tamir Damian Munafo, Rafi Davidovich
  • Publication number: 20170364713
    Abstract: A security device for a local computer, said security device comprising a locked-down system environment that includes a remote-access connector and an authenticator facility. The remote-access connector initiates a remote connection request with a virtual-computer service. The authenticator facility provides first authentication-data to the remote-access connector for ensuring that the security device has permission to be allocated a virtual computer from the virtual-computer service.
    Type: Application
    Filed: December 1, 2015
    Publication date: December 21, 2017
    Inventors: Graeme Speak, Chris Hoy Poy, Neil Richardson, Peter McCredie, Adam Law, Corrado Fiore
  • Publication number: 20170364714
    Abstract: Disclosed herein is a combined reading apparatus for identifying a product. According to a first aspect of the present invention, a combined reading apparatus may include: a plate panel configured to recognize Radio Frequency Identification (RFID) tag information, configured such that an antenna adapted to transmit and receive a Radio Frequency (RF) signal to and from an RFID tag is included therein, and formed in a plate shape having predetermined lengths in a horizontal direction and a height direction; a connection bar coupled to one side of the plate panel, configured to support the plate panel, and configured to extend from the plate panel in the horizontal direction; a grip formed in a bar shape so as to be held by a hand, spaced apart from the plate panel, and coupled to the connection bar; and a control unit configured to control the RF transmission and reception of the antenna.
    Type: Application
    Filed: June 15, 2017
    Publication date: December 21, 2017
    Inventors: Jong Hoon LIM, Sung Ki LIM
  • Publication number: 20170364715
    Abstract: RFID data signals from RFID tags may be recovered by determining the probabilities of transitions between data states between a series of a pairs of signal samples using a set of predetermined probabilities related to data, timing, baud rate and/or phase variables affecting the received signal and processing those determined probabilities to determine the sequence of such transitions that has the highest probability of occurrence. A second set of predetermined probabilities related to transitions in the opposite direction may be used to sequence in a reverse direction. The determination of the sequence representing the RFID tag data may be iterated in both directions until further iterations do not change the determined probabilities.
    Type: Application
    Filed: March 31, 2017
    Publication date: December 21, 2017
    Applicant: Mojix, Inc.
    Inventor: Ramin Sadr
  • Publication number: 20170364716
    Abstract: The invention relates to a method for retrieving a shut state and/or a location of a closable container as well as closable containers, wherein a transition between an open position and a closed position is achieved by a relative movement at least of a first container part with respect to a second container part, wherein the container has at least one RFID chip having a connected near field antenna and a far field antenna and the RFID chip having the connected near field antenna is arranged at the first or at the second container part and the far field antenna is arranged at the other one of the first and second container part, respectively, and the near field antenna, which is connected to the RFID chip, is arranged, as compared to the far field antenna, such that, in the closed position of the container, a noncontact electromagnetic coupling takes place between the near field antenna and the far field antenna.
    Type: Application
    Filed: December 17, 2015
    Publication date: December 21, 2017
    Inventors: Lauri Johannes Huhtasalo, Joerg Stefan Wittkowski
  • Publication number: 20170364717
    Abstract: A wireless user authentication system uses an AIDC device and a wireless reader to verify the identity of an individual. The AIDC device is a key fob that contains the user's credentials. The wireless reader is a device that wirelessly interrogates the AIDC device to ascertain the user's credentials. The wireless reader has a casing an interface window, a component cavity, a control panel, multiple antenna spacers, an antenna, and a processing unit. The casing is an enclosure that houses the components of the wireless reader within the component cavity. The interface window is hole that enables the user to access the control panel. the antenna spacers are rigid beams that retain the processing unit in a position that is offset from the control panel. Additionally, the antenna is wound around the antenna spacers and retained in a configuration that facilitates wirelessly communicating with the AIDC device.
    Type: Application
    Filed: June 21, 2017
    Publication date: December 21, 2017
    Inventor: Christopher J. Duca
  • Publication number: 20170364718
    Abstract: Systems and methods for compensating for interference in radiofrequency identification (RFID) devices are provided. One system includes an RFID antenna structure having a fixed antenna having a plurality of loops, one or more additional inductive loops and a switching arrangement coupled with the one or more additional inductive loops. The RFID antenna structure further includes a controller configured to control the switching arrangement to selectively switch the one or more additional inductive loops to change an inductance of the fixed antenna.
    Type: Application
    Filed: June 17, 2016
    Publication date: December 21, 2017
    Applicant: INTERMEC, INC.
    Inventor: Thomas FINKE
  • Publication number: 20170364719
    Abstract: A system includes a communication device and a user interface. The communication device includes a universal toll module configured to transmit a toll signal that includes at least one electronic toll code to be communicated to an electronic toll system. The universal toll module is communicatively coupled to a vehicle bus of the vehicle. The user interface is communicatively coupled to the vehicle bus.
    Type: Application
    Filed: June 16, 2017
    Publication date: December 21, 2017
    Applicant: Gentex Corporation
    Inventors: Neil J. BOEHM, Marc A. Smeyers, Steven L. Geerlings
  • Publication number: 20170364720
    Abstract: Techniques for determining an item location based on multiple RFID parameters from multiple read events are described. In an example, a computer system may access a first read event. A first RFID reader located within a first zone may have generated the first read event at a first time. The first read event may identify an RFID tag and may include first RFID parameters. The computer system may access a second read event. A second RFID reader located within a second zone may have generated the second read event at a second time within a predefined amount of time from the first time. The second read event may identify the RFID tag and include second RFID parameters. The computer system may determine whether the item location falls within the first zone or the second zone based on two or more first RFID parameters and two or more second RFID parameters.
    Type: Application
    Filed: June 27, 2017
    Publication date: December 21, 2017
    Inventors: Oleg Kantor, Tak Keung Joseph Lui
  • Publication number: 20170364721
    Abstract: There is provided in one embodiment a data collection system including a data collection terminal having an encoded information reader device and a computer spaced apart from the data collection terminal. The data collection terminal in one embodiment can be configured to be responsive to configuration data expressed in an extensible markup language.
    Type: Application
    Filed: August 16, 2017
    Publication date: December 21, 2017
    Inventors: Daniel D. Yeakley, Aldo Mario Caballero
  • Publication number: 20170364722
    Abstract: By tracking a user's eyes, an indicia scanning system can make educated guesses as to what the user is interested in. This insight could be useful in dynamically configuring a camera system, configuring an indicia decoding process or even as a method to select data that the user is interested in.
    Type: Application
    Filed: June 16, 2016
    Publication date: December 21, 2017
    Inventor: Erik Todeschini
  • Publication number: 20170364723
    Abstract: A measurement apparatus includes an image acquisition part that acquires a captured image obtained by imaging a partial area on a two-dimensional scale on which a plurality of two-dimensional codes having a first code, which is specified by a combination pattern of a first pixel value image and a second pixel value image, and a second code, which is specified by a pattern of a type different from the combination pattern, are arranged, a code specification part that specifies the first code and the second code corresponding to the two-dimensional code included in the captured image, and a position specification part that specifies position information on the two-dimensional scale of the two-dimensional code including the first code and the second code on the basis of the first code and the second code.
    Type: Application
    Filed: June 15, 2017
    Publication date: December 21, 2017
    Inventor: Yuto Inoue
  • Publication number: 20170364724
    Abstract: An image processing apparatus includes an acquisition unit that acquires setting information acquired from a captured image, a setting unit that performs, based on the acquired setting information, setting regarding image analysis processing to be performed on a captured image obtained by capturing an image of a predetermined monitoring target range.
    Type: Application
    Filed: August 30, 2017
    Publication date: December 21, 2017
    Inventor: Futoshi Hachimura
  • Publication number: 20170364725
    Abstract: A reading system including: a primary reader for reading an information bearing device (IBD) having encoded IBD data provided therein for packetizing the encoded data and processing a first data packet of the packetized encoded data and transmitting a second data packet of the packetized encoded data; at least one auxiliary reader for receiving and processing the second data packet and the transmitting the processed second data packet; and wherein the processed first and second data packets are combined to produce decoded IBD data.
    Type: Application
    Filed: March 3, 2017
    Publication date: December 21, 2017
    Inventor: Charles Joseph Cunningham, IV
  • Publication number: 20170364726
    Abstract: A fingerprint sensor device includes a sensor substrate, a plurality of sensor circuits over a first surface of the sensor substrate, and a transceiver layer located over the plurality of sensor circuits and the first surface of the sensor substrate. The transceiver layer includes a piezoelectric layer and a transceiver electrode positioned over the piezoelectric layer. The piezoelectric layer and the transceiver electrode are configured to generate one or more ultrasonic waves or to receive one or more ultrasonic waves. The fingerprint sensor device may include a cap coupled to the sensor substrate and a cavity formed between the cap and the sensor substrate. The cavity and the sensor substrate may form an acoustic barrier.
    Type: Application
    Filed: February 10, 2017
    Publication date: December 21, 2017
    Inventors: Nicholas Ian Buchan, Mario Francisco Velez, Chin-Jen Tseng, Hrishikesh Vijaykumar Panchawagh, Firas Sammoura, Jessica Liu Strohmann, Kostadin Dimitrov Djordjev, David Williams Burns, Leonard Eugene Fennell, Jon Gregory Aday
  • Publication number: 20170364727
    Abstract: A display device, including a display panel and a transparent cover plate disposed on the display panel, a first side of the transparent cover plate close to the display panel is provided with a full-screen fingerprint sensor and a fingerprint identification alarm circuit. The full-screen fingerprint sensor is configured to acquire fingerprint information at a surface of a second side of the transparent cover plate opposite to the first side, including a receiving unit, an extracting unit, a comparison unit and an alarming unit which are connected successively.
    Type: Application
    Filed: September 29, 2016
    Publication date: December 21, 2017
    Inventor: Tian YANG
  • Publication number: 20170364728
    Abstract: An apparatus for detecting false fingerprints, comprising: an optical element having a detection surface on which at least one body is intended to be positioned, of which cutaneous imprints are intended to be detected, an anti-fake illuminator configured to generate at least one bright zone and at least one dark zone on said detection surface, an optical sensor arranged to capture light radiation reflected/diffused by said detection surface.
    Type: Application
    Filed: May 4, 2017
    Publication date: December 21, 2017
    Inventors: Andrei BACHURINSKII, Davide BOZZATO
  • Publication number: 20170364729
    Abstract: A display apparatus performs predetermined image processing on at least one image data item among the plurality of image data items, does not perform the predetermined image processing on at least another one image data item among the plurality of image data items, and to cause a display unit to display the plurality of image data items, if (A) it is determined, on the basis of meta-information associated with the plurality of image data items, that the plurality of image data items are image data items that have been output from a single image output apparatus, or if (B) it is determined that a display mode is set in which a plurality of image data items are to be displayed, the plurality of image data items including a first image data item and a second image data item generated by duplicating the first image data item.
    Type: Application
    Filed: June 7, 2017
    Publication date: December 21, 2017
    Inventors: Sosuke Kagaya, Hirofumi Urabe
  • Publication number: 20170364730
    Abstract: A fingerprint entry prompting method, includes: obtaining an ith entered fingerprint image, during a process of collecting and combining N fingerprint images entered in sequence to generate a fingerprint template of a user, wherein N?i?2, and N and i are integers; obtaining an overlap region between the ith entered fingerprint image and a determined template image, wherein the determined template image is generated by combining i-1 previously entered fingerprint images; and presenting a prompting message when the overlap region satisfies a prompting condition, wherein the prompting message is configured to instruct the user to move a finger towards a specified direction and re-enter the ith fingerprint image.
    Type: Application
    Filed: May 4, 2017
    Publication date: December 21, 2017
    Inventors: Zhongsheng JIANG, Chuanshun JI, Gang WANG
  • Publication number: 20170364731
    Abstract: Systems and methods for detecting, decoupling and quantifying unresolved signals in trace signal data in the presence of noise with no prior knowledge of the signal characteristics (e.g., signal peak location, intensity and width) of the unresolved signals. The systems and methods are useful for analyzing any trace data signals having one or multiple overlapping constituent signals and particularly useful for analyzing data signals which often contain an unknown number of constituent signals with varying signal characteristics, such as peak location, peak intensity and peak width, and varying resolutions. A general signal model function is assumed for each unknown, constituent signal in the trace signal data. In a first phase, the number of constituent signals and signal characteristics are determined automatically in a parallel fashion by executing multiple simultaneous evaluations iteratively starting with an initial set of trial signals.
    Type: Application
    Filed: June 17, 2016
    Publication date: December 21, 2017
    Inventor: Patrick G. Humphrey
  • Publication number: 20170364732
    Abstract: A method includes sensing one or more pattern elements on a patterned contact lens on the eye of a person. Movement or direction of the person's eye is assessed based on the sensing of the one or more pattern elements. The pattern elements may be sensed using a single-pixel sensor. The pattern may include, for example, a pattern of elements having different colors.
    Type: Application
    Filed: December 7, 2015
    Publication date: December 21, 2017
    Applicant: Texas State University
    Inventor: Oleg V. Komogortsev
  • Publication number: 20170364733
    Abstract: A system for simplified generation of systems for analysis of satellite images to geolocate one or more objects of interest. A plurality of training images labeled for a study object or objects with irrelevant features loaded into a preexisting feature identification subsystem causes automated generation of models for the study object. This model is used to parameterize pre-engineered machine learning elements that are running a preprogrammed machine learning protocol. Training images with the study are used to train object recognition filters. This filter is used to identify the study object in unanalyzed images. The system reports results in a requestor's preferred format.
    Type: Application
    Filed: May 30, 2017
    Publication date: December 21, 2017
    Inventors: Adam Estrada, Kevin Green, Andrew Jenkins
  • Publication number: 20170364734
    Abstract: Systems and methods are provided for optically reading data from metering equipment by using a camera to record images of a meter, and converting the displayed data measurement regions of the images into alphanumeric data for reporting over a wireless network to a database system for storage, analysis and reporting. One implementation of the device is a water meter reading device integrated into a form factor that replaces the lid of a water meter box. The device captures images of the meter face, converts the images using optical character recognition software into usage data, meter identification and date/time of the data capture and sends the data to a database over a wireless data network.
    Type: Application
    Filed: June 12, 2017
    Publication date: December 21, 2017
    Inventors: Clay Eugene Melugin, Sarp Sekeroglu
  • Publication number: 20170364735
    Abstract: A flight vehicle and a tracking method are disclosed. The method includes: collecting the flight vehicle's geographic location information and image data of the areas over which the flight vehicle flies; establishing a correspondence between the geographic location information and the image data collected at a same moment; and sending the foregoing data between which the correspondence is established. A receive end receives the geographic location information and the image data between which the correspondence is established; draws a flight path of the flight vehicle by using the geographic location information; obtains geographic location information corresponding to a location selected on the flight path, and displays image data corresponding to the geographic location information.
    Type: Application
    Filed: August 29, 2017
    Publication date: December 21, 2017
    Inventors: Hongjing LI, Jiasong YAN, Zhihui CHEN, Yuanliang CHEN
  • Publication number: 20170364736
    Abstract: An apparatus for a combined camera system is described herein. The apparatus includes an adjustable infrared (IR) pass filter. A passband of the adjustable infrared (IR) pass filter is electrically adjusted. The apparatus also includes a rolling shutter sensor. An adjustable filter is to implement a global shutter and a rolling shutter sensor global reset.
    Type: Application
    Filed: June 16, 2016
    Publication date: December 21, 2017
    Applicant: INTEL CORPORATION
    Inventor: Mikko Ollila
  • Publication number: 20170364737
    Abstract: Technologies for grouping images, and ranking the images and the groupings, based on entities shown in the images. Images may be grouped based on faces shown in the images. Different images with faces that indicate the same entity (e.g., Adam) may be automatically grouped together. Different images with faces that indicate the same multiple entities (e.g., the people in my family) may also be automatically grouped together. Such automatic grouping may be based on facial recognition technologies. Further, images and groups of images may be automatically ranked based on the faces shown and entities represented. Such rankings may also be influenced by adjacent data that indicates family and friends and the like, and that can be used to identify such entities in the images.
    Type: Application
    Filed: August 31, 2017
    Publication date: December 21, 2017
    Inventors: Chunkit Jacky Chan, David Lee, Allison Light
  • Publication number: 20170364738
    Abstract: This application discloses a method and a terminal for detecting glasses in a face image. The method includes: obtaining a face image; determining a nose bridge region in the face image; detecting an image change in the nose bridge region to obtain an image change result of the nose bridge region; and determining whether there are glasses in the face image according to the image change result of the nose bridge region. The terminal for detecting glasses in a face image matches the method.
    Type: Application
    Filed: September 5, 2017
    Publication date: December 21, 2017
    Inventors: Chengjie WANG, Guofu TAN, Hui NI
  • Publication number: 20170364739
    Abstract: An eyebrow shaping method includes providing an image of a face. Multiple guidelines are determined on the image and points and areas are located via the guidelines. A face is shaped with contouring and lightening to have Golden Ratio proportions via the different points and zones.
    Type: Application
    Filed: August 18, 2017
    Publication date: December 21, 2017
    Inventors: Anastasia SOARE, Andrew Zuk