Patents Issued in February 15, 2018
-
Publication number: 20180046814Abstract: A method and apparatus for protecting the details of an image to ensure privacy of the image by generating a protected image from an original image is disclosed. The method includes generating a preview image from an original image and applying 5 effects to the preview image so as to obscure the preview image. The original image is encrypted using an encryption key and stored as non-visual metadata of the preview image. The encryption key is encrypted using one or more key encryption key (KEK), and the encrypted encryption keys is also stored in the metadata of the preview image. Any image viewer will display the preview image. The key encryption 10 key is generated based on a passphrase or based on the encryption key of another protected image. Instances of the protected image called profile and cover images is used to provide logical groupings and share access to protected images.Type: ApplicationFiled: February 20, 2016Publication date: February 15, 2018Applicant: KBYTES SOLUTIONS PRIVATE LIMITEDInventors: Karthikeyan MANOHARAN, Balasubramanian MANOHARAN
-
Publication number: 20180046815Abstract: Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein. Additionally, improved information-theoretic metrics for characterizing and optimizing said secrecy scheme systems and associated methods are provided herein. One method of secure communication comprises receiving a data file at a first location, encoding the data file using a list source code to generate an encoded file, encrypting a select portion of the data file using a key to generate an encrypted file, and transmitting the encoded file and the encrypted file to an end user at a destination location, wherein the encoded file cannot be decoded at the destination location until the encrypted file has been received and decrypted by the end user, wherein the end user possesses the key.Type: ApplicationFiled: March 13, 2014Publication date: February 15, 2018Inventors: Flavio du Pin Calmon, Muriel Medard, Linda M. Zeger, Mark M. Christiansen, Kenneth R. Duffy
-
Publication number: 20180046816Abstract: A method and electronic device are provided to determine that a text-based message to be sent from a sender to a recipient includes a document attached thereto, determine a protection setting value associated with a protection setting, the protection setting value determined based on collaboration data associated with the sender and the recipient, determine whether the protection setting value meets a threshold, in response to determining that the protection setting value meets the threshold, apply the protection setting associated with the protection setting value to the document attached to the text-based message, and transmit the text-based message.Type: ApplicationFiled: August 15, 2016Publication date: February 15, 2018Inventors: Rupen CHANDA, Genevieve Elizabeth MAK, Pauline Po Ning SIU, Paul Wilson LEMARQUAND, Antti Juhani PIIRA, Leonid ZOLOTAREV
-
Publication number: 20180046817Abstract: The present invention provides a method and system to facilitate the verification of genuineness of a document by visiting a unique, non-forgeable, permanent URL printed on the document and comparing the document against the original document stored at a database hosted by the system of the present invention. The verifier is given a verification certificate which can also be checked for genuineness by visiting another unique URL printed on the verification certificate.Type: ApplicationFiled: January 14, 2016Publication date: February 15, 2018Inventor: Atul GUPTA
-
Publication number: 20180046818Abstract: One or more elements on a computing device can be selected and locked from use. For example, a first user (e.g., adult) of a computing device can allow a second user (e.g., child) to use the former's device; however, the first user might not want the second user to have access to all of the elements on the device, and so the first user can select which elements he/she wants to share with the second user and which elements he/she does not want to share. For example, the first user can select elements and choose to lock the selected elements, lock all other elements, lock the selected elements for a certain period of time, or lock the selected elements but allow for earned usage, etc. The lock can be removed in response to an unlock event, which can comprise a user-initiated unlock, a timed unlock, or a user-earned locked.Type: ApplicationFiled: September 26, 2017Publication date: February 15, 2018Inventors: Matthew Warren Amacker, Dawn R. Dodd
-
Publication number: 20180046819Abstract: Pursuant to issuing a confirmation prompt to confirm an intention to perform a data management function in a computing environment, a processor device determines by a decision engine, a complexity strength of the confirmation prompt based upon a complexity algorithm.Type: ApplicationFiled: August 11, 2016Publication date: February 15, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert J. WALLIS, James D. WHITAKER
-
Publication number: 20180046820Abstract: Described herein are systems and methods for providing access to a database in a multi-tenant environment, including the use of a connection pool, and support for efficient connection validation. For example, the system can support a “seconds to trust idle connection” functionality, which enables lazy validation of connections in the connection pool. The seconds to trust idle connection is the time period, expressed, for example, as a number of seconds, within a particular connection usage, that the connection pool trusts that the connection is still viable, and if so will skip a connection validation test before delivering the connection to a requesting application.Type: ApplicationFiled: July 7, 2017Publication date: February 15, 2018Inventors: JEAN DE LAVARENE, ARAMVALARTHANATHAN NAMACHIVAYAM, VIDYA HEGDE, SAURABH VERMA, CHANDRA SEKHAR KRISHNA MAHIDHARA
-
Publication number: 20180046821Abstract: In one embodiment, a method comprises creating and storing, one or more data objects; wherein a first plurality of the data objects is associated with a base set of data representing data shared across a plurality of users; wherein a second plurality of the data objects is associated with one or more child sets of data, wherein each of the child sets of data represents data local to a project, wherein each of the users is associated with one or more of the child sets of data; wherein each data object is associated to an identifier value and to a version identifier value for a plurality of versions of the data object, wherein each of the versions represents a change to the data object by any of a plurality of users; receiving a request from a first user to view a third plurality of data objects; selecting, based on the base set of data, the particular set of data, the version identifier value for the data objects in the third plurality, and one or more rules associated with the particular set of data and the fType: ApplicationFiled: August 29, 2017Publication date: February 15, 2018Inventors: Robert J. McGrew, Nathan Gettings, Stephen Cohen
-
Publication number: 20180046822Abstract: A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: assign identification information to a plurality of users and a plurality of items; associate the identification information of a user of the plurality of users with one or more items of the plurality of items; set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and provide the user access to the one or more items when there is a matching between the identification information of the user and the one or more items, and all of the security policies associated with the user and the one or more of the plurality of items are met.Type: ApplicationFiled: October 12, 2017Publication date: February 15, 2018Inventor: Fredrick T. Dunaway
-
Publication number: 20180046823Abstract: A method, system, computer-readable media, and apparatus for ensuring a secure cloud environment is provided, where public cloud services providers can remove their code from the Trusted Computing Base (TCB) of their cloud services consumers. The method for ensuring a secure cloud environment keeps the Virtual Machine Monitor (VMM), devices, firmware and the physical adversary (where a bad administrator/technician attempts to directly access the cloud host hardware) outside of a consumer's Virtual Machine (VM) TCB. Only the consumer that owns this secure VM can modify the VM or access contents of the VM (as determined by the consumer).Type: ApplicationFiled: October 14, 2016Publication date: February 15, 2018Inventors: David M. Durham, Ravi L. Sahita, Barry E. Huntley, Nikhil M. Deshpande
-
Publication number: 20180046824Abstract: A method for managing privacy of a user in a network includes generating, by a user equipment (UE), a Locally Administered Randomized WLAN MAC Address (LRA), wherein at least one portion of the LRA is randomly generated based on at least one of a network temporary identity and a network parameter. Further, the method includes transmitting, by the UE, the generated LRA to a network node. A User equipment (UE) for managing privacy of a user in a network includes a memory, a processor, coupled to the memory, an LRA generator, coupled to the processor, configured to generate an LRA, wherein at least one portion of the LRA is randomly generated based on at least one of a network temporary identity or a network parameter, and a transceiver, coupled to the processor, configured to transmit the LRA to a network node.Type: ApplicationFiled: November 4, 2016Publication date: February 15, 2018Inventor: Rajavelsamy Rajadurai
-
Publication number: 20180046825Abstract: An approach is provided for discovering social ties among users based on cloaked trajectories. In a method, cloaked regions of a first trajectory of a first user and cloaked regions of a second trajectory of a second user are transformed to corresponding semantic regions, respectively, wherein a semantic region is expressed with a semantic meaning of a corresponding cloaked region. The transformed semantic regions are mapped into nodes of a hierarchical semantic tree, wherein each node of the hierarchical semantic tree corresponds to a semantic region. According to relationships between nodes mapped to semantic regions of the first trajectory and node mapped to the semantic regions of the second trajectory, social ties among the first user and the second user can be inferred.Type: ApplicationFiled: March 16, 2015Publication date: February 15, 2018Applicant: Nokia Technologies OyInventors: Qinli KOU, Ye TIAN, Wendong WANG, Zheng SONG
-
Publication number: 20180046826Abstract: An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may also be users of the social networking system. If a privacy setting is changed in the social networking system, and the change applies to information that has been shared with an external system, the change is enforced at the external system. For example, the external system may be notified that the information is invalid and must be deleted, or the external system may periodically request the information so that changes to the privacy settings are eventually experienced at the external systems. When an external system again needs the information, whether expired naturally or actively invalidated by the social network, the external system sends a new request for the information, which is subject to the (possibly revised) privacy settings.Type: ApplicationFiled: September 4, 2017Publication date: February 15, 2018Inventors: Michael Steven Vernal, Wei Zhu, James M. Leszczenski, Joshua E. Elman, David Brookes Morin, Charles Duplain Cheever, Ruchi Sanghvi
-
Publication number: 20180046827Abstract: A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage device, second credentials stored in a second storage device, and third credentials stored in the reader device. In the reader device, the facility uses a combination of the first credentials, second credentials, and third credentials to decrypt information relating to the person stored in the first storage device.Type: ApplicationFiled: October 26, 2017Publication date: February 15, 2018Inventors: Raif Khassanov, Eugene Luskin, Yakov P. Grinberg, Eugene Kolker
-
Publication number: 20180046828Abstract: A memory stores a plurality of pieces of information transferred respectively from a plurality of information provision institutions. A processor extracts a plurality of pieces of analysis target information that are to be provided to an analysis device, respectively from the plurality of pieces of information stored in the memory. A communication interface circuit transfers the plurality of pieces of information to a first storage device via a first communication network and transfers the plurality of pieces of analysis target information to a second storage device connected to a second communication network. The second communication network is separated from the first communication network and the analysis device is connected to the second communication network.Type: ApplicationFiled: July 31, 2017Publication date: February 15, 2018Applicant: FUJITSU LIMITEDInventors: Akito YAMAZAKI, Kazunori Kobashi, Yuri Shimada, Hiroyuki Katayama
-
Publication number: 20180046829Abstract: Components of a system for generating anonymized data from timestamped event data are disclosed. The generation of anonymized data is performed in accordance with an anonymization configuration. The anonymization configuration includes information regarding the source of the event data, particulars about the anonymization process that transforms the clear event data from the source into an anonymized form, and particulars about the destination and characteristics for the output dataset. A graphical user interface permits development of anonymization configurations in an interactive, iterative way. The configured anonymizer employs methods and options to produce anonymized data with superior usability as a substitute for real world data, including a mode to effectively emulate live data streams.Type: ApplicationFiled: October 30, 2017Publication date: February 15, 2018Inventor: David Carasso
-
Publication number: 20180046830Abstract: Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for providing a battery module with secure identity information includes: (1) a tamper resistant processing environment 200 located within the battery module 110 and (2) a key generator configured to generate a key based on an identity of the battery module 110 and cause the key to be stored within the tamper resistant processing environment 200.Type: ApplicationFiled: October 4, 2017Publication date: February 15, 2018Inventors: Narendar M. Shankar, Erdal Paksoy, Todd Vanyo
-
Publication number: 20180046831Abstract: A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.Type: ApplicationFiled: October 25, 2017Publication date: February 15, 2018Applicant: International Business Machines CorporationInventors: Lorraine HERGER, Neal KELLER, James R. KOZLOSKI, Matthew A. McCARTHY, Clifford A. PICKOVER, Andrew WYSKIDA
-
Publication number: 20180046832Abstract: An electronic device and method are disclosed herein. The electronic device may include a housing, a socket disposed in the housing, a tray insertable into the socket, and into which at least one of a storage medium card and a subscriber identity module (SIM) card is insertable, a communication circuit disposed in the housing, a processor disposed in the housing and electrically coupled to the communication circuit and a memory electrically coupled to the processor.Type: ApplicationFiled: August 11, 2017Publication date: February 15, 2018Inventor: Won-Wook LEE
-
Publication number: 20180046833Abstract: Aspects of the present invention provides a system for monitoring and reminding a user of specific activities. In one embodiment, a machine detectable element is provided to an appropriate contactless reader that, when read, provides a proxy for the user completing the activity. Schedule and adherence information may be provided via a display-containing portable electronic device that may also be configured as the contactless reader. The system may also be configured to provide reminders or other information to the user or third parties.Type: ApplicationFiled: February 17, 2016Publication date: February 15, 2018Inventors: Peter Roy HAVAS, Cameron John CARRETT
-
Publication number: 20180046834Abstract: An improved system and method for reading an upconversion response from nanoparticle inks is provided. A is adapted to direct a near-infrared excitation wavelength at a readable indicia, resulting in a near-infrared emission wavelength created by the upconverting nanoparticle inks. A short pass filter may filter the near-infrared excitation wavelength. A camera is in operable communication with the short pass filter and receives the near-infrared emission wavelength of the readable indicia. The system may further include an integrated circuit adapted to receive the near-infrared emission wavelength from the camera and generate a corresponding signal. A readable application may be in operable communication with the integrated circuit. The readable application receives the corresponding signal, manipulates the signal, decodes the signal into an output, and displays and/or stores the output.Type: ApplicationFiled: February 19, 2016Publication date: February 15, 2018Applicant: South Dakota Board of RegentsInventors: David LANGERMAN, Jon KELLAR, William CROSS, Stanley MAY, Julian BRACKINS, Jeevan MERUGA, Arvind BARIDE, John RAPP
-
Publication number: 20180046835Abstract: The present disclosure provides a marker with a pattern formed thereon, which includes an optical system. At least a part of the pattern that uniquely appears depending on a direction in which the pattern is viewed from an outside of the marker through the optical system, is visually identified from the outside of the marker. The pattern includes a plurality of rows of binary-coded sequences. The binary-coded sequence of each of the plurality of rows includes aperiodic sequences that are repeatedly arranged. The aperiodic sequences included in the binary-coded sequence of one row of the plurality of rows are different from the aperiodic sequences included in the binary-coded sequence of another row of the plurality of rows, and each of the aperiodic sequences includes a plurality of sub-sequences that are arranged in a predetermined order.Type: ApplicationFiled: December 21, 2016Publication date: February 15, 2018Applicant: KOH YOUNG TECHNOLOGY INC.Inventors: Jong Kyu HONG, Hyun Ki LEE
-
Publication number: 20180046836Abstract: Disclosed herein are techniques for generating an image of a target object using a sensor. The sensor includes a substrate and a single transceiver. The transceiver includes a first electrode, a second electrode, and a layer of electrical material positioned between the two electrodes. The transceiver also includes a control unit configured to switch the transceiver into a transmit mode or a receive mode. The transceiver further includes a receiving circuit configured to receive, store, and output a detection signal caused by an interaction between the sensor and the target object. The second electrode, the control unit, and the receiving circuit can be formed on the substrate.Type: ApplicationFiled: August 11, 2016Publication date: February 15, 2018Inventor: Ashish Hinger
-
Publication number: 20180046837Abstract: An electronic device may include an optical image sensor and a pin hole array mask layer above the optical image sensor. The electronic device may also include a display layer above the pin hole array mask layer that includes spaced apart display pixels, and a transparent cover layer above the display layer defining a finger placement surface capable of receiving a finger adjacent thereto.Type: ApplicationFiled: March 24, 2016Publication date: February 15, 2018Inventors: Giovanni GOZZINI, Gennadiy A. AGRANOV, Brian M. KING, Gershon ROSENBLUM, Mohammad YEKE YAZDANDOOST
-
Publication number: 20180046838Abstract: A finger scanner comprises a first member and a second member. The first member has a first contact surface configured to contact a first part of a finger, and the second member has a second contact surface adjacent to the first member and configured to contact a second part of the finger adjacent to the first part of the finger. The first contact surface has a first height and the second contact surface has a second height, with a fixed or variable height difference between the first height and the second height. The finger scanner further comprises a first fingerprint sensor associated with the first contact surface, and a second fingerprint sensor associated with the second contact surface.Type: ApplicationFiled: March 10, 2016Publication date: February 15, 2018Inventor: Changbang PAN
-
Publication number: 20180046839Abstract: Provided in the present disclosure is a fingerprint bookmark system which may be implemented in a vehicle with one or more configurable interior settings. The fingerprint bookmark system may contain a scanner which may be configured to record a fingerprint from a vehicle occupant such that a fingerprint image showing the fingerprint and a duration data for the fingerprint image are recorded by the scanner. The system may contain one or more processors which may be configured to compare the duration data associated with the fingerprint image with a duration threshold. The one or more processors may be configured to initiate a search to obtain a bookmark for the fingerprint shown in the fingerprint image when the duration data is less than the duration threshold. The one or more processors may be further configured to create a new bookmark when the duration data exceeds the duration threshold.Type: ApplicationFiled: October 26, 2017Publication date: February 15, 2018Applicant: Thunder Power New Energy Vehicle Development Company LimitedInventor: Jia-Wei Ding
-
Publication number: 20180046840Abstract: The non-contact capture device allows for an image of an object to be captured when the object is not making contact with any portion of the non-contact capture device. The non-contact capture device comprises an electronic compartment comprising a camera and a light source, wherein the camera and light source are directed to an image capture region, a housing guide comprising a leg extending away from the electronic compartment to support a collar, and an image capture region spaced away from the electronic compartment and the housing guide. The collar extends laterally around only a portion of the image capture region forming an entry gap into the image capture region.Type: ApplicationFiled: August 9, 2017Publication date: February 15, 2018Inventors: Brett A. HOWELL, Brian L. LINZIE
-
Publication number: 20180046841Abstract: A sensor has drive lines and transverse pickup lines to define an electrode pair where each pickup line crosses a drive line. A reference pickup line is arranged parallel to the pickup lines and a compensation drive line is arranged parallel to the drive lines. A signal source provides a first signal to the drive lines and a second signal that is the inverse of the first signal to the compensation drive line. An amplifier has a first input connected to a pickup line, a second input connected to a reference pickup line, and a output indicative of an object in contact with the electrode pair(s). Each impedance between the compensation drive line and a pickup line, between the reference pickup line and a reference drive line, and between the compensation drive line and the reference pickup line is equal to the impedance at the electrode pair when no object is contact with the electrode pair.Type: ApplicationFiled: October 2, 2017Publication date: February 15, 2018Applicant: IDEX ASAInventor: Fred G. BENKLEY, III
-
Publication number: 20180046842Abstract: When a plurality of candidate corneal reflections are extracted from an image of a person, a line-of-sight detection device calculates a movement vector of a reflection location on the basis of the candidate corneal reflection extracted from a first image and a second image, calculates a movement vector of a reference point on the person on the basis of the reference point extracted from the first image and the second image, identifies a corneal reflection from among the plurality of candidate corneal reflections on the basis of the movement vector of the reflection location and the movement vector of the reference point so as to identify a location of the corneal reflection, and extracts a location of a pupil from the image, and calculates a line of sight of the person on the basis of the identified location of the corneal reflection and the extracted location of the pupil.Type: ApplicationFiled: July 17, 2017Publication date: February 15, 2018Applicant: FUJITSU LIMITEDInventors: HIDEKI TOMIMORI, Satoshi NAKASHIMA
-
Publication number: 20180046843Abstract: An iterative matching method for partial fingerprint verification includes providing database features and input features; initially comparing the input features with the database features using one of the database features as a first reference point, resulting in initial matched feature pairs between initial matched database features and corresponding initial matched input features; and progressively comparing the input features with the database features using a gravity center of the initial matched database features as a second reference point, resulting in progressive matched feature pairs between progressive matched database features and corresponding progressive matched input features.Type: ApplicationFiled: August 11, 2016Publication date: February 15, 2018Inventors: Ming-Der Shieh, Pao-Cheng Luo, Der-Wei Yang
-
Publication number: 20180046844Abstract: An application display method of the present disclosure includes receiving a touch operation, obtaining second fingerprint information from the touch operation, matching the second fingerprint information and first fingerprint information, and when the second fingerprint information matches the first fingerprint information, displaying a first application in an application switch screen. The picture display method of the present disclosure includes receiving a touch operation, obtaining second fingerprint information from the touch operation, matching the second fingerprint information and first fingerprint information, and when the second fingerprint information matches the first fingerprint information, displaying a second picture. Hence, the methods provided can be applicable to a scenario in which an electronic device displays an application or a picture that may include private information of a user.Type: ApplicationFiled: February 15, 2015Publication date: February 15, 2018Inventors: Xi Huang, Huangwei Wu, Jiejing Huang
-
Publication number: 20180046845Abstract: A method to encode and decode a digital fingerprint code by an identification encoder and an identification decoder wherein the digital fingerprint code includes a plurality of N-bit data embedded on a set of curves by changed thicknesses in the curves.Type: ApplicationFiled: October 26, 2017Publication date: February 15, 2018Inventor: Rudolf BARTELS
-
Publication number: 20180046846Abstract: An apparatus for processing medical images includes a storage unit storing fingerprints that respectively correspond to a plurality of functions, a user input unit detecting a fingerprint of a user, and a controller performing a function corresponding to the detected fingerprint, from among the functions.Type: ApplicationFiled: October 27, 2017Publication date: February 15, 2018Applicant: SAMSUNG MEDISON CO., LTD.Inventors: Sun-mo YANG, Gil-ju JIN, Yu-ri KIM
-
Publication number: 20180046847Abstract: A system, method, and computer program product for automatic machine-implemented pattern registration, particularly suited to small sensor systems which include a reduced image capture area size relative to the pattern being sensed.Type: ApplicationFiled: October 30, 2017Publication date: February 15, 2018Applicant: IDEX ASAInventor: Roger A. Bauchspies
-
Publication number: 20180046848Abstract: A method of recognizing fingerprints, an apparatus and a terminal device are provided. The method of recognizing fingerprints includes following operations. A fingerprint image is acquired and the fingerprint image matches with pre-stored fingerprint templates. The fingerprint image is divided into a plurality of pixel regions if the fingerprint image matches with the at least one of pre-stored fingerprint templates. A number of the pixel regions having white points is computed to determine whether the fingerprint image is successfully recognized. The method of recognizing fingerprints determines whether the fingerprint image is a false fingerprint to improve fingerprint recognition accuracy. Therefore, the fingerprint recognition of the present disclosure satisfies usage convenience and provides fingerprint password security for users.Type: ApplicationFiled: August 23, 2016Publication date: February 15, 2018Applicant: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.Inventor: Yibao ZHOU
-
Publication number: 20180046849Abstract: An authentication device includes an operation panel, a registered handwriting procedure acquiring portion, a long-pressing detecting portion, a handwriting detecting portion, and a handwriting authentication portion. The registered handwriting procedure acquiring portion acquires information of a registered handwriting procedure from a storage portion in which the information of the registered handwriting procedure has been stored, which represents a handwriting procedure including a trajectory of a handwriting operation performed on the operation panel and at least one of a time, a speed, and a number of strokes of the handwriting operation. The handwriting detecting portion detects the handwriting procedure in the handwriting operation performed on the operation panel, during a period in which the long-pressing operation is continuously detected.Type: ApplicationFiled: September 28, 2016Publication date: February 15, 2018Inventors: Kris-Antonette Lapiz, Michael Jason Aguilar, Gilmore Capiral, Katrina Star Casera
-
Publication number: 20180046850Abstract: A method for enhancing user liveness detection is provided that includes calculating, by a computing device, parameters for each frame in a video of captured face biometric data. Each parameter results from movement of at least one of the computing device and the biometric data during capture of the biometric data. The method also includes creating a signal for each parameter and calculating a similarity score. The similarity score indicates the similarity between the signals. Moreover, the method includes determining the user is live when the similarity score is at least equal to a threshold score.Type: ApplicationFiled: November 29, 2016Publication date: February 15, 2018Inventor: Mircea IONITA
-
Publication number: 20180046851Abstract: A first set of signals corresponding to a first signal modality (such as the direction of a gaze) during a time interval is collected from an individual. A second set of signals corresponding to a different signal modality (such as hand-pointing gestures made by the individual) is also collected. In response to a command, where the command does not identify a particular object to which the command is directed, the first and second set of signals is used to identify candidate objects of interest, and an operation associated with a selected object from the candidates is performed.Type: ApplicationFiled: August 14, 2017Publication date: February 15, 2018Applicant: Apple Inc.Inventors: Wolf Kienzle, Douglas A. Bowman
-
Publication number: 20180046852Abstract: A method for enhancing user liveness detection is provided that includes calculating, by a computing device, parameters for each frame in a video of captured face biometric data. Each parameter results from movement of at least one of the computing device and the biometric data during capture of the biometric data. The method also includes creating a signal for each parameter and calculating a similarity score. The similarity score indicates the similarity between the signals. Moreover, the method includes determining the user is live when the similarity score is at least equal to a threshold score.Type: ApplicationFiled: September 14, 2016Publication date: February 15, 2018Inventor: Mircea IONITA
-
Publication number: 20180046853Abstract: A method for verifying the identity of a user is provided that includes generating, by a computing device, a parameter for each processed frame in a video of biometric data captured from a user. The parameter results from movement of the computing device during capture of the biometric data. Moreover, the method includes generating a signal for the parameter and calculating a confidence score based on the generated signal and a classification model specific to the user. The classification model is generated from other signals generated for the parameter. Furthermore, the method includes verifying the identity of the user as true when the confidence score is at least equal to a threshold score.Type: ApplicationFiled: November 29, 2016Publication date: February 15, 2018Inventor: Mircea IONITA
-
Publication number: 20180046854Abstract: Two related methods of fitting a three dimensional model, and a method of performing facial recognition, are disclosed. One method comprises estimating and refining geometric information using image landmarks on an object in a two dimensional image. The other method comprises estimating and refining photometric information of the object in the two dimensional image. Furthermore, a method of performing image recognition is provided.Type: ApplicationFiled: February 16, 2016Publication date: February 15, 2018Inventors: Josef KITTLER, William Jeffrey CHRISTMAS, Fei YAN, Guosheng HU
-
Publication number: 20180046855Abstract: The present invention provides, in at least one aspect, methods and systems that detect at least one face in at least one digital image, determine and store area co-ordinates of a location of the at least one detected face in the at least one digital image, apply at least one transformation to the at least one detected face to create at least one portrait of the at least one detected face, rotate the at least one portrait at least until the at least one portrait is shown in a vertical orientation and a pair of eyes of the at least one face shown in the at least one portrait are positioned on a horizontal plane; and store the rotated at least one portrait.Type: ApplicationFiled: July 4, 2017Publication date: February 15, 2018Inventors: RAY GANONG, DONALD CRAIG WAUGH, YONG MAN RO, KONSTANTINOS PLATANIOTIS, CHRIS STUDHOLME
-
Publication number: 20180046856Abstract: A digital identity, which may include a user interface that may be displayed on a mobile computing device, may be generated to include information extracted from a physical identification card (e.g., driver license or passport), as well as information regarding validation of the physical identification card and of the consumer's identity. The digital identity may be used in place of the physical identification card.Type: ApplicationFiled: July 28, 2017Publication date: February 15, 2018Inventor: Mark Joseph Kapczynski
-
Publication number: 20180046857Abstract: Techniques and systems are provided for processing video data. For example, techniques and systems are provided for performing context-aware object or blob tracker updates (e.g., by updating a motion model of a blob tracker). In some cases, to perform a context-aware blob tracker update, a blob tracker is associated with a first blob. The first blob includes pixels of at least a portion of one or more foreground objects in one or more video frames. A split of the first blob and a second blob in a current video frame can be detected, and a motion model of the blob tracker is reset in response to detecting the split of the first blob and the second blob. In some cases, a motion model of a blob tracker associated with a merged blob is updated to include a predicted location of the blob tracker in a next video frame.Type: ApplicationFiled: December 20, 2016Publication date: February 15, 2018Inventors: Jinglun Gao, Ying Chen, Lei Wang, Ning Bi
-
Publication number: 20180046858Abstract: Techniques and systems are provided for processing video data. For example, techniques and systems are provided for performing content-adaptive blob filtering. A number of blobs generated for a video frame is determined. A size of a first blob from the blobs is determined, the first blob including pixels of at least a portion of a first foreground object in the video frame. The first blob is filtered from the plurality of blobs when the size of the first blob is less than a size threshold. The size threshold is determined based on the number of the plurality of blobs generated for the video frame.Type: ApplicationFiled: September 13, 2016Publication date: February 15, 2018Inventors: Ying Chen, Jianfeng Ren, Jian Wei, Ning Bi
-
Publication number: 20180046859Abstract: An apparatus for providing gaze tracking in a near-eye display. Certain examples provide an apparatus including a light modulator configured to receive light of a first range of wavelengths and generate an image beam therefrom. The light modulator is further configured to receive light of a second range of wavelengths and generate a probe beam therefrom. The apparatus also includes one or more light guides including one or more in-coupling element areas, and one or more out-coupling element areas. The one or more in-coupling element areas are configured to receive and in-couple the image beam and the probe beam into the one or more light guides. The one or more out-coupling element areas are configured to out-couple, from the one or more light guides: the image beam to a user's eye for user viewing, and the probe beam to the user's eye for detection of reflection therefrom.Type: ApplicationFiled: February 5, 2016Publication date: February 15, 2018Inventor: Toni JARVENPAA
-
Publication number: 20180046860Abstract: An image monitoring system includes a recorder that records an image captured by a camera via a network. The system is controlled to display the present image captured by the camera or a past image recorded on the recorder. A moving object is detected from the image captured by the camera, the detector including a resolution converter for generating an image with a resolution lower than the resolution of the image captured by the camera. A moving object is detected from the image generated by the resolution converter and positional information on the detected moving object is output. The positional information of the detected moving object is merged with the image captured by the camera on the basis of the positional information.Type: ApplicationFiled: October 25, 2017Publication date: February 15, 2018Inventors: Masaki Demizu, Miki Murakami
-
Publication number: 20180046861Abstract: Systems and methods are described for placing large objects and objects separated by large distances in an AR environment. An AR headset system may place and generate digital objects using relative geographical coordinates (e.g., latitude, longitude, and altitude) between the user's current position and the object being placed. In one implementation, a digital object's geographical coordinates may be calculated by determining a user's geographical coordinates, using a distance determination device to measure a distance to a boundary in the user's real-world environment within an AR headset's field of view, and calculating an orientation of the AR headset relative to the user's position.Type: ApplicationFiled: August 10, 2016Publication date: February 15, 2018Applicant: Disney Enterprises, Inc.Inventors: Mehul PATEL, James VORIS
-
Publication number: 20180046862Abstract: A pill identification system identifies a pill type for a pharmaceutical composition from images of the pharmaceutical composition. The system extracts features from images taken of the pill. The features extracted from the pill image include color, size, shape, and surface features of the pill. In particular, the features include rotation-independent surface features of the pill that enable the pill to be identified from a variety of orientations when the images are taken. The feature vectors are applied to a classifier that determines a pill identification for each image. The pill identification for each image is scored to determine identification for the pharmaceutical composition.Type: ApplicationFiled: October 24, 2017Publication date: February 15, 2018Inventors: Eugene Gershtein, Alan Jeffrey Jacobs, Alexander Gebala
-
Publication number: 20180046863Abstract: Techniques and systems are provided for maintaining lost blob trackers for one or more video frames. In some examples, one or more blob trackers maintained for a sequence of video frames are identified. The one or more blob trackers are associated with one or more blobs of the sequence of video frames. A transition of a blob tracker from a first type of tracker to a lost tracker is detected at a first video frame. For example, the blob tracker can be transitioned from the first type of tracker to the lost tracker when a blob for which the blob tracker was associated with in a previous frame is not detected in the first video frame. A recovery duration is determined for the lost tracker at the first video frame. For one or more subsequent video frames obtained after the first video frame, the lost tracker is removed from the one or more blob trackers maintained for the sequence of video frames when a lost duration for the lost tracker is greater than the recovery duration.Type: ApplicationFiled: January 6, 2017Publication date: February 15, 2018Inventors: Ying Chen, Lei Wang