Patents Issued in February 15, 2018
  • Publication number: 20180046814
    Abstract: A method and apparatus for protecting the details of an image to ensure privacy of the image by generating a protected image from an original image is disclosed. The method includes generating a preview image from an original image and applying 5 effects to the preview image so as to obscure the preview image. The original image is encrypted using an encryption key and stored as non-visual metadata of the preview image. The encryption key is encrypted using one or more key encryption key (KEK), and the encrypted encryption keys is also stored in the metadata of the preview image. Any image viewer will display the preview image. The key encryption 10 key is generated based on a passphrase or based on the encryption key of another protected image. Instances of the protected image called profile and cover images is used to provide logical groupings and share access to protected images.
    Type: Application
    Filed: February 20, 2016
    Publication date: February 15, 2018
    Applicant: KBYTES SOLUTIONS PRIVATE LIMITED
    Inventors: Karthikeyan MANOHARAN, Balasubramanian MANOHARAN
  • Publication number: 20180046815
    Abstract: Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein. Additionally, improved information-theoretic metrics for characterizing and optimizing said secrecy scheme systems and associated methods are provided herein. One method of secure communication comprises receiving a data file at a first location, encoding the data file using a list source code to generate an encoded file, encrypting a select portion of the data file using a key to generate an encrypted file, and transmitting the encoded file and the encrypted file to an end user at a destination location, wherein the encoded file cannot be decoded at the destination location until the encrypted file has been received and decrypted by the end user, wherein the end user possesses the key.
    Type: Application
    Filed: March 13, 2014
    Publication date: February 15, 2018
    Inventors: Flavio du Pin Calmon, Muriel Medard, Linda M. Zeger, Mark M. Christiansen, Kenneth R. Duffy
  • Publication number: 20180046816
    Abstract: A method and electronic device are provided to determine that a text-based message to be sent from a sender to a recipient includes a document attached thereto, determine a protection setting value associated with a protection setting, the protection setting value determined based on collaboration data associated with the sender and the recipient, determine whether the protection setting value meets a threshold, in response to determining that the protection setting value meets the threshold, apply the protection setting associated with the protection setting value to the document attached to the text-based message, and transmit the text-based message.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Inventors: Rupen CHANDA, Genevieve Elizabeth MAK, Pauline Po Ning SIU, Paul Wilson LEMARQUAND, Antti Juhani PIIRA, Leonid ZOLOTAREV
  • Publication number: 20180046817
    Abstract: The present invention provides a method and system to facilitate the verification of genuineness of a document by visiting a unique, non-forgeable, permanent URL printed on the document and comparing the document against the original document stored at a database hosted by the system of the present invention. The verifier is given a verification certificate which can also be checked for genuineness by visiting another unique URL printed on the verification certificate.
    Type: Application
    Filed: January 14, 2016
    Publication date: February 15, 2018
    Inventor: Atul GUPTA
  • Publication number: 20180046818
    Abstract: One or more elements on a computing device can be selected and locked from use. For example, a first user (e.g., adult) of a computing device can allow a second user (e.g., child) to use the former's device; however, the first user might not want the second user to have access to all of the elements on the device, and so the first user can select which elements he/she wants to share with the second user and which elements he/she does not want to share. For example, the first user can select elements and choose to lock the selected elements, lock all other elements, lock the selected elements for a certain period of time, or lock the selected elements but allow for earned usage, etc. The lock can be removed in response to an unlock event, which can comprise a user-initiated unlock, a timed unlock, or a user-earned locked.
    Type: Application
    Filed: September 26, 2017
    Publication date: February 15, 2018
    Inventors: Matthew Warren Amacker, Dawn R. Dodd
  • Publication number: 20180046819
    Abstract: Pursuant to issuing a confirmation prompt to confirm an intention to perform a data management function in a computing environment, a processor device determines by a decision engine, a complexity strength of the confirmation prompt based upon a complexity algorithm.
    Type: Application
    Filed: August 11, 2016
    Publication date: February 15, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert J. WALLIS, James D. WHITAKER
  • Publication number: 20180046820
    Abstract: Described herein are systems and methods for providing access to a database in a multi-tenant environment, including the use of a connection pool, and support for efficient connection validation. For example, the system can support a “seconds to trust idle connection” functionality, which enables lazy validation of connections in the connection pool. The seconds to trust idle connection is the time period, expressed, for example, as a number of seconds, within a particular connection usage, that the connection pool trusts that the connection is still viable, and if so will skip a connection validation test before delivering the connection to a requesting application.
    Type: Application
    Filed: July 7, 2017
    Publication date: February 15, 2018
    Inventors: JEAN DE LAVARENE, ARAMVALARTHANATHAN NAMACHIVAYAM, VIDYA HEGDE, SAURABH VERMA, CHANDRA SEKHAR KRISHNA MAHIDHARA
  • Publication number: 20180046821
    Abstract: In one embodiment, a method comprises creating and storing, one or more data objects; wherein a first plurality of the data objects is associated with a base set of data representing data shared across a plurality of users; wherein a second plurality of the data objects is associated with one or more child sets of data, wherein each of the child sets of data represents data local to a project, wherein each of the users is associated with one or more of the child sets of data; wherein each data object is associated to an identifier value and to a version identifier value for a plurality of versions of the data object, wherein each of the versions represents a change to the data object by any of a plurality of users; receiving a request from a first user to view a third plurality of data objects; selecting, based on the base set of data, the particular set of data, the version identifier value for the data objects in the third plurality, and one or more rules associated with the particular set of data and the f
    Type: Application
    Filed: August 29, 2017
    Publication date: February 15, 2018
    Inventors: Robert J. McGrew, Nathan Gettings, Stephen Cohen
  • Publication number: 20180046822
    Abstract: A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: assign identification information to a plurality of users and a plurality of items; associate the identification information of a user of the plurality of users with one or more items of the plurality of items; set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and provide the user access to the one or more items when there is a matching between the identification information of the user and the one or more items, and all of the security policies associated with the user and the one or more of the plurality of items are met.
    Type: Application
    Filed: October 12, 2017
    Publication date: February 15, 2018
    Inventor: Fredrick T. Dunaway
  • Publication number: 20180046823
    Abstract: A method, system, computer-readable media, and apparatus for ensuring a secure cloud environment is provided, where public cloud services providers can remove their code from the Trusted Computing Base (TCB) of their cloud services consumers. The method for ensuring a secure cloud environment keeps the Virtual Machine Monitor (VMM), devices, firmware and the physical adversary (where a bad administrator/technician attempts to directly access the cloud host hardware) outside of a consumer's Virtual Machine (VM) TCB. Only the consumer that owns this secure VM can modify the VM or access contents of the VM (as determined by the consumer).
    Type: Application
    Filed: October 14, 2016
    Publication date: February 15, 2018
    Inventors: David M. Durham, Ravi L. Sahita, Barry E. Huntley, Nikhil M. Deshpande
  • Publication number: 20180046824
    Abstract: A method for managing privacy of a user in a network includes generating, by a user equipment (UE), a Locally Administered Randomized WLAN MAC Address (LRA), wherein at least one portion of the LRA is randomly generated based on at least one of a network temporary identity and a network parameter. Further, the method includes transmitting, by the UE, the generated LRA to a network node. A User equipment (UE) for managing privacy of a user in a network includes a memory, a processor, coupled to the memory, an LRA generator, coupled to the processor, configured to generate an LRA, wherein at least one portion of the LRA is randomly generated based on at least one of a network temporary identity or a network parameter, and a transceiver, coupled to the processor, configured to transmit the LRA to a network node.
    Type: Application
    Filed: November 4, 2016
    Publication date: February 15, 2018
    Inventor: Rajavelsamy Rajadurai
  • Publication number: 20180046825
    Abstract: An approach is provided for discovering social ties among users based on cloaked trajectories. In a method, cloaked regions of a first trajectory of a first user and cloaked regions of a second trajectory of a second user are transformed to corresponding semantic regions, respectively, wherein a semantic region is expressed with a semantic meaning of a corresponding cloaked region. The transformed semantic regions are mapped into nodes of a hierarchical semantic tree, wherein each node of the hierarchical semantic tree corresponds to a semantic region. According to relationships between nodes mapped to semantic regions of the first trajectory and node mapped to the semantic regions of the second trajectory, social ties among the first user and the second user can be inferred.
    Type: Application
    Filed: March 16, 2015
    Publication date: February 15, 2018
    Applicant: Nokia Technologies Oy
    Inventors: Qinli KOU, Ye TIAN, Wendong WANG, Zheng SONG
  • Publication number: 20180046826
    Abstract: An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may also be users of the social networking system. If a privacy setting is changed in the social networking system, and the change applies to information that has been shared with an external system, the change is enforced at the external system. For example, the external system may be notified that the information is invalid and must be deleted, or the external system may periodically request the information so that changes to the privacy settings are eventually experienced at the external systems. When an external system again needs the information, whether expired naturally or actively invalidated by the social network, the external system sends a new request for the information, which is subject to the (possibly revised) privacy settings.
    Type: Application
    Filed: September 4, 2017
    Publication date: February 15, 2018
    Inventors: Michael Steven Vernal, Wei Zhu, James M. Leszczenski, Joshua E. Elman, David Brookes Morin, Charles Duplain Cheever, Ruchi Sanghvi
  • Publication number: 20180046827
    Abstract: A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage device, second credentials stored in a second storage device, and third credentials stored in the reader device. In the reader device, the facility uses a combination of the first credentials, second credentials, and third credentials to decrypt information relating to the person stored in the first storage device.
    Type: Application
    Filed: October 26, 2017
    Publication date: February 15, 2018
    Inventors: Raif Khassanov, Eugene Luskin, Yakov P. Grinberg, Eugene Kolker
  • Publication number: 20180046828
    Abstract: A memory stores a plurality of pieces of information transferred respectively from a plurality of information provision institutions. A processor extracts a plurality of pieces of analysis target information that are to be provided to an analysis device, respectively from the plurality of pieces of information stored in the memory. A communication interface circuit transfers the plurality of pieces of information to a first storage device via a first communication network and transfers the plurality of pieces of analysis target information to a second storage device connected to a second communication network. The second communication network is separated from the first communication network and the analysis device is connected to the second communication network.
    Type: Application
    Filed: July 31, 2017
    Publication date: February 15, 2018
    Applicant: FUJITSU LIMITED
    Inventors: Akito YAMAZAKI, Kazunori Kobashi, Yuri Shimada, Hiroyuki Katayama
  • Publication number: 20180046829
    Abstract: Components of a system for generating anonymized data from timestamped event data are disclosed. The generation of anonymized data is performed in accordance with an anonymization configuration. The anonymization configuration includes information regarding the source of the event data, particulars about the anonymization process that transforms the clear event data from the source into an anonymized form, and particulars about the destination and characteristics for the output dataset. A graphical user interface permits development of anonymization configurations in an interactive, iterative way. The configured anonymizer employs methods and options to produce anonymized data with superior usability as a substitute for real world data, including a mode to effectively emulate live data streams.
    Type: Application
    Filed: October 30, 2017
    Publication date: February 15, 2018
    Inventor: David Carasso
  • Publication number: 20180046830
    Abstract: Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for providing a battery module with secure identity information includes: (1) a tamper resistant processing environment 200 located within the battery module 110 and (2) a key generator configured to generate a key based on an identity of the battery module 110 and cause the key to be stored within the tamper resistant processing environment 200.
    Type: Application
    Filed: October 4, 2017
    Publication date: February 15, 2018
    Inventors: Narendar M. Shankar, Erdal Paksoy, Todd Vanyo
  • Publication number: 20180046831
    Abstract: A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.
    Type: Application
    Filed: October 25, 2017
    Publication date: February 15, 2018
    Applicant: International Business Machines Corporation
    Inventors: Lorraine HERGER, Neal KELLER, James R. KOZLOSKI, Matthew A. McCARTHY, Clifford A. PICKOVER, Andrew WYSKIDA
  • Publication number: 20180046832
    Abstract: An electronic device and method are disclosed herein. The electronic device may include a housing, a socket disposed in the housing, a tray insertable into the socket, and into which at least one of a storage medium card and a subscriber identity module (SIM) card is insertable, a communication circuit disposed in the housing, a processor disposed in the housing and electrically coupled to the communication circuit and a memory electrically coupled to the processor.
    Type: Application
    Filed: August 11, 2017
    Publication date: February 15, 2018
    Inventor: Won-Wook LEE
  • Publication number: 20180046833
    Abstract: Aspects of the present invention provides a system for monitoring and reminding a user of specific activities. In one embodiment, a machine detectable element is provided to an appropriate contactless reader that, when read, provides a proxy for the user completing the activity. Schedule and adherence information may be provided via a display-containing portable electronic device that may also be configured as the contactless reader. The system may also be configured to provide reminders or other information to the user or third parties.
    Type: Application
    Filed: February 17, 2016
    Publication date: February 15, 2018
    Inventors: Peter Roy HAVAS, Cameron John CARRETT
  • Publication number: 20180046834
    Abstract: An improved system and method for reading an upconversion response from nanoparticle inks is provided. A is adapted to direct a near-infrared excitation wavelength at a readable indicia, resulting in a near-infrared emission wavelength created by the upconverting nanoparticle inks. A short pass filter may filter the near-infrared excitation wavelength. A camera is in operable communication with the short pass filter and receives the near-infrared emission wavelength of the readable indicia. The system may further include an integrated circuit adapted to receive the near-infrared emission wavelength from the camera and generate a corresponding signal. A readable application may be in operable communication with the integrated circuit. The readable application receives the corresponding signal, manipulates the signal, decodes the signal into an output, and displays and/or stores the output.
    Type: Application
    Filed: February 19, 2016
    Publication date: February 15, 2018
    Applicant: South Dakota Board of Regents
    Inventors: David LANGERMAN, Jon KELLAR, William CROSS, Stanley MAY, Julian BRACKINS, Jeevan MERUGA, Arvind BARIDE, John RAPP
  • Publication number: 20180046835
    Abstract: The present disclosure provides a marker with a pattern formed thereon, which includes an optical system. At least a part of the pattern that uniquely appears depending on a direction in which the pattern is viewed from an outside of the marker through the optical system, is visually identified from the outside of the marker. The pattern includes a plurality of rows of binary-coded sequences. The binary-coded sequence of each of the plurality of rows includes aperiodic sequences that are repeatedly arranged. The aperiodic sequences included in the binary-coded sequence of one row of the plurality of rows are different from the aperiodic sequences included in the binary-coded sequence of another row of the plurality of rows, and each of the aperiodic sequences includes a plurality of sub-sequences that are arranged in a predetermined order.
    Type: Application
    Filed: December 21, 2016
    Publication date: February 15, 2018
    Applicant: KOH YOUNG TECHNOLOGY INC.
    Inventors: Jong Kyu HONG, Hyun Ki LEE
  • Publication number: 20180046836
    Abstract: Disclosed herein are techniques for generating an image of a target object using a sensor. The sensor includes a substrate and a single transceiver. The transceiver includes a first electrode, a second electrode, and a layer of electrical material positioned between the two electrodes. The transceiver also includes a control unit configured to switch the transceiver into a transmit mode or a receive mode. The transceiver further includes a receiving circuit configured to receive, store, and output a detection signal caused by an interaction between the sensor and the target object. The second electrode, the control unit, and the receiving circuit can be formed on the substrate.
    Type: Application
    Filed: August 11, 2016
    Publication date: February 15, 2018
    Inventor: Ashish Hinger
  • Publication number: 20180046837
    Abstract: An electronic device may include an optical image sensor and a pin hole array mask layer above the optical image sensor. The electronic device may also include a display layer above the pin hole array mask layer that includes spaced apart display pixels, and a transparent cover layer above the display layer defining a finger placement surface capable of receiving a finger adjacent thereto.
    Type: Application
    Filed: March 24, 2016
    Publication date: February 15, 2018
    Inventors: Giovanni GOZZINI, Gennadiy A. AGRANOV, Brian M. KING, Gershon ROSENBLUM, Mohammad YEKE YAZDANDOOST
  • Publication number: 20180046838
    Abstract: A finger scanner comprises a first member and a second member. The first member has a first contact surface configured to contact a first part of a finger, and the second member has a second contact surface adjacent to the first member and configured to contact a second part of the finger adjacent to the first part of the finger. The first contact surface has a first height and the second contact surface has a second height, with a fixed or variable height difference between the first height and the second height. The finger scanner further comprises a first fingerprint sensor associated with the first contact surface, and a second fingerprint sensor associated with the second contact surface.
    Type: Application
    Filed: March 10, 2016
    Publication date: February 15, 2018
    Inventor: Changbang PAN
  • Publication number: 20180046839
    Abstract: Provided in the present disclosure is a fingerprint bookmark system which may be implemented in a vehicle with one or more configurable interior settings. The fingerprint bookmark system may contain a scanner which may be configured to record a fingerprint from a vehicle occupant such that a fingerprint image showing the fingerprint and a duration data for the fingerprint image are recorded by the scanner. The system may contain one or more processors which may be configured to compare the duration data associated with the fingerprint image with a duration threshold. The one or more processors may be configured to initiate a search to obtain a bookmark for the fingerprint shown in the fingerprint image when the duration data is less than the duration threshold. The one or more processors may be further configured to create a new bookmark when the duration data exceeds the duration threshold.
    Type: Application
    Filed: October 26, 2017
    Publication date: February 15, 2018
    Applicant: Thunder Power New Energy Vehicle Development Company Limited
    Inventor: Jia-Wei Ding
  • Publication number: 20180046840
    Abstract: The non-contact capture device allows for an image of an object to be captured when the object is not making contact with any portion of the non-contact capture device. The non-contact capture device comprises an electronic compartment comprising a camera and a light source, wherein the camera and light source are directed to an image capture region, a housing guide comprising a leg extending away from the electronic compartment to support a collar, and an image capture region spaced away from the electronic compartment and the housing guide. The collar extends laterally around only a portion of the image capture region forming an entry gap into the image capture region.
    Type: Application
    Filed: August 9, 2017
    Publication date: February 15, 2018
    Inventors: Brett A. HOWELL, Brian L. LINZIE
  • Publication number: 20180046841
    Abstract: A sensor has drive lines and transverse pickup lines to define an electrode pair where each pickup line crosses a drive line. A reference pickup line is arranged parallel to the pickup lines and a compensation drive line is arranged parallel to the drive lines. A signal source provides a first signal to the drive lines and a second signal that is the inverse of the first signal to the compensation drive line. An amplifier has a first input connected to a pickup line, a second input connected to a reference pickup line, and a output indicative of an object in contact with the electrode pair(s). Each impedance between the compensation drive line and a pickup line, between the reference pickup line and a reference drive line, and between the compensation drive line and the reference pickup line is equal to the impedance at the electrode pair when no object is contact with the electrode pair.
    Type: Application
    Filed: October 2, 2017
    Publication date: February 15, 2018
    Applicant: IDEX ASA
    Inventor: Fred G. BENKLEY, III
  • Publication number: 20180046842
    Abstract: When a plurality of candidate corneal reflections are extracted from an image of a person, a line-of-sight detection device calculates a movement vector of a reflection location on the basis of the candidate corneal reflection extracted from a first image and a second image, calculates a movement vector of a reference point on the person on the basis of the reference point extracted from the first image and the second image, identifies a corneal reflection from among the plurality of candidate corneal reflections on the basis of the movement vector of the reflection location and the movement vector of the reference point so as to identify a location of the corneal reflection, and extracts a location of a pupil from the image, and calculates a line of sight of the person on the basis of the identified location of the corneal reflection and the extracted location of the pupil.
    Type: Application
    Filed: July 17, 2017
    Publication date: February 15, 2018
    Applicant: FUJITSU LIMITED
    Inventors: HIDEKI TOMIMORI, Satoshi NAKASHIMA
  • Publication number: 20180046843
    Abstract: An iterative matching method for partial fingerprint verification includes providing database features and input features; initially comparing the input features with the database features using one of the database features as a first reference point, resulting in initial matched feature pairs between initial matched database features and corresponding initial matched input features; and progressively comparing the input features with the database features using a gravity center of the initial matched database features as a second reference point, resulting in progressive matched feature pairs between progressive matched database features and corresponding progressive matched input features.
    Type: Application
    Filed: August 11, 2016
    Publication date: February 15, 2018
    Inventors: Ming-Der Shieh, Pao-Cheng Luo, Der-Wei Yang
  • Publication number: 20180046844
    Abstract: An application display method of the present disclosure includes receiving a touch operation, obtaining second fingerprint information from the touch operation, matching the second fingerprint information and first fingerprint information, and when the second fingerprint information matches the first fingerprint information, displaying a first application in an application switch screen. The picture display method of the present disclosure includes receiving a touch operation, obtaining second fingerprint information from the touch operation, matching the second fingerprint information and first fingerprint information, and when the second fingerprint information matches the first fingerprint information, displaying a second picture. Hence, the methods provided can be applicable to a scenario in which an electronic device displays an application or a picture that may include private information of a user.
    Type: Application
    Filed: February 15, 2015
    Publication date: February 15, 2018
    Inventors: Xi Huang, Huangwei Wu, Jiejing Huang
  • Publication number: 20180046845
    Abstract: A method to encode and decode a digital fingerprint code by an identification encoder and an identification decoder wherein the digital fingerprint code includes a plurality of N-bit data embedded on a set of curves by changed thicknesses in the curves.
    Type: Application
    Filed: October 26, 2017
    Publication date: February 15, 2018
    Inventor: Rudolf BARTELS
  • Publication number: 20180046846
    Abstract: An apparatus for processing medical images includes a storage unit storing fingerprints that respectively correspond to a plurality of functions, a user input unit detecting a fingerprint of a user, and a controller performing a function corresponding to the detected fingerprint, from among the functions.
    Type: Application
    Filed: October 27, 2017
    Publication date: February 15, 2018
    Applicant: SAMSUNG MEDISON CO., LTD.
    Inventors: Sun-mo YANG, Gil-ju JIN, Yu-ri KIM
  • Publication number: 20180046847
    Abstract: A system, method, and computer program product for automatic machine-implemented pattern registration, particularly suited to small sensor systems which include a reduced image capture area size relative to the pattern being sensed.
    Type: Application
    Filed: October 30, 2017
    Publication date: February 15, 2018
    Applicant: IDEX ASA
    Inventor: Roger A. Bauchspies
  • Publication number: 20180046848
    Abstract: A method of recognizing fingerprints, an apparatus and a terminal device are provided. The method of recognizing fingerprints includes following operations. A fingerprint image is acquired and the fingerprint image matches with pre-stored fingerprint templates. The fingerprint image is divided into a plurality of pixel regions if the fingerprint image matches with the at least one of pre-stored fingerprint templates. A number of the pixel regions having white points is computed to determine whether the fingerprint image is successfully recognized. The method of recognizing fingerprints determines whether the fingerprint image is a false fingerprint to improve fingerprint recognition accuracy. Therefore, the fingerprint recognition of the present disclosure satisfies usage convenience and provides fingerprint password security for users.
    Type: Application
    Filed: August 23, 2016
    Publication date: February 15, 2018
    Applicant: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventor: Yibao ZHOU
  • Publication number: 20180046849
    Abstract: An authentication device includes an operation panel, a registered handwriting procedure acquiring portion, a long-pressing detecting portion, a handwriting detecting portion, and a handwriting authentication portion. The registered handwriting procedure acquiring portion acquires information of a registered handwriting procedure from a storage portion in which the information of the registered handwriting procedure has been stored, which represents a handwriting procedure including a trajectory of a handwriting operation performed on the operation panel and at least one of a time, a speed, and a number of strokes of the handwriting operation. The handwriting detecting portion detects the handwriting procedure in the handwriting operation performed on the operation panel, during a period in which the long-pressing operation is continuously detected.
    Type: Application
    Filed: September 28, 2016
    Publication date: February 15, 2018
    Inventors: Kris-Antonette Lapiz, Michael Jason Aguilar, Gilmore Capiral, Katrina Star Casera
  • Publication number: 20180046850
    Abstract: A method for enhancing user liveness detection is provided that includes calculating, by a computing device, parameters for each frame in a video of captured face biometric data. Each parameter results from movement of at least one of the computing device and the biometric data during capture of the biometric data. The method also includes creating a signal for each parameter and calculating a similarity score. The similarity score indicates the similarity between the signals. Moreover, the method includes determining the user is live when the similarity score is at least equal to a threshold score.
    Type: Application
    Filed: November 29, 2016
    Publication date: February 15, 2018
    Inventor: Mircea IONITA
  • Publication number: 20180046851
    Abstract: A first set of signals corresponding to a first signal modality (such as the direction of a gaze) during a time interval is collected from an individual. A second set of signals corresponding to a different signal modality (such as hand-pointing gestures made by the individual) is also collected. In response to a command, where the command does not identify a particular object to which the command is directed, the first and second set of signals is used to identify candidate objects of interest, and an operation associated with a selected object from the candidates is performed.
    Type: Application
    Filed: August 14, 2017
    Publication date: February 15, 2018
    Applicant: Apple Inc.
    Inventors: Wolf Kienzle, Douglas A. Bowman
  • Publication number: 20180046852
    Abstract: A method for enhancing user liveness detection is provided that includes calculating, by a computing device, parameters for each frame in a video of captured face biometric data. Each parameter results from movement of at least one of the computing device and the biometric data during capture of the biometric data. The method also includes creating a signal for each parameter and calculating a similarity score. The similarity score indicates the similarity between the signals. Moreover, the method includes determining the user is live when the similarity score is at least equal to a threshold score.
    Type: Application
    Filed: September 14, 2016
    Publication date: February 15, 2018
    Inventor: Mircea IONITA
  • Publication number: 20180046853
    Abstract: A method for verifying the identity of a user is provided that includes generating, by a computing device, a parameter for each processed frame in a video of biometric data captured from a user. The parameter results from movement of the computing device during capture of the biometric data. Moreover, the method includes generating a signal for the parameter and calculating a confidence score based on the generated signal and a classification model specific to the user. The classification model is generated from other signals generated for the parameter. Furthermore, the method includes verifying the identity of the user as true when the confidence score is at least equal to a threshold score.
    Type: Application
    Filed: November 29, 2016
    Publication date: February 15, 2018
    Inventor: Mircea IONITA
  • Publication number: 20180046854
    Abstract: Two related methods of fitting a three dimensional model, and a method of performing facial recognition, are disclosed. One method comprises estimating and refining geometric information using image landmarks on an object in a two dimensional image. The other method comprises estimating and refining photometric information of the object in the two dimensional image. Furthermore, a method of performing image recognition is provided.
    Type: Application
    Filed: February 16, 2016
    Publication date: February 15, 2018
    Inventors: Josef KITTLER, William Jeffrey CHRISTMAS, Fei YAN, Guosheng HU
  • Publication number: 20180046855
    Abstract: The present invention provides, in at least one aspect, methods and systems that detect at least one face in at least one digital image, determine and store area co-ordinates of a location of the at least one detected face in the at least one digital image, apply at least one transformation to the at least one detected face to create at least one portrait of the at least one detected face, rotate the at least one portrait at least until the at least one portrait is shown in a vertical orientation and a pair of eyes of the at least one face shown in the at least one portrait are positioned on a horizontal plane; and store the rotated at least one portrait.
    Type: Application
    Filed: July 4, 2017
    Publication date: February 15, 2018
    Inventors: RAY GANONG, DONALD CRAIG WAUGH, YONG MAN RO, KONSTANTINOS PLATANIOTIS, CHRIS STUDHOLME
  • Publication number: 20180046856
    Abstract: A digital identity, which may include a user interface that may be displayed on a mobile computing device, may be generated to include information extracted from a physical identification card (e.g., driver license or passport), as well as information regarding validation of the physical identification card and of the consumer's identity. The digital identity may be used in place of the physical identification card.
    Type: Application
    Filed: July 28, 2017
    Publication date: February 15, 2018
    Inventor: Mark Joseph Kapczynski
  • Publication number: 20180046857
    Abstract: Techniques and systems are provided for processing video data. For example, techniques and systems are provided for performing context-aware object or blob tracker updates (e.g., by updating a motion model of a blob tracker). In some cases, to perform a context-aware blob tracker update, a blob tracker is associated with a first blob. The first blob includes pixels of at least a portion of one or more foreground objects in one or more video frames. A split of the first blob and a second blob in a current video frame can be detected, and a motion model of the blob tracker is reset in response to detecting the split of the first blob and the second blob. In some cases, a motion model of a blob tracker associated with a merged blob is updated to include a predicted location of the blob tracker in a next video frame.
    Type: Application
    Filed: December 20, 2016
    Publication date: February 15, 2018
    Inventors: Jinglun Gao, Ying Chen, Lei Wang, Ning Bi
  • Publication number: 20180046858
    Abstract: Techniques and systems are provided for processing video data. For example, techniques and systems are provided for performing content-adaptive blob filtering. A number of blobs generated for a video frame is determined. A size of a first blob from the blobs is determined, the first blob including pixels of at least a portion of a first foreground object in the video frame. The first blob is filtered from the plurality of blobs when the size of the first blob is less than a size threshold. The size threshold is determined based on the number of the plurality of blobs generated for the video frame.
    Type: Application
    Filed: September 13, 2016
    Publication date: February 15, 2018
    Inventors: Ying Chen, Jianfeng Ren, Jian Wei, Ning Bi
  • Publication number: 20180046859
    Abstract: An apparatus for providing gaze tracking in a near-eye display. Certain examples provide an apparatus including a light modulator configured to receive light of a first range of wavelengths and generate an image beam therefrom. The light modulator is further configured to receive light of a second range of wavelengths and generate a probe beam therefrom. The apparatus also includes one or more light guides including one or more in-coupling element areas, and one or more out-coupling element areas. The one or more in-coupling element areas are configured to receive and in-couple the image beam and the probe beam into the one or more light guides. The one or more out-coupling element areas are configured to out-couple, from the one or more light guides: the image beam to a user's eye for user viewing, and the probe beam to the user's eye for detection of reflection therefrom.
    Type: Application
    Filed: February 5, 2016
    Publication date: February 15, 2018
    Inventor: Toni JARVENPAA
  • Publication number: 20180046860
    Abstract: An image monitoring system includes a recorder that records an image captured by a camera via a network. The system is controlled to display the present image captured by the camera or a past image recorded on the recorder. A moving object is detected from the image captured by the camera, the detector including a resolution converter for generating an image with a resolution lower than the resolution of the image captured by the camera. A moving object is detected from the image generated by the resolution converter and positional information on the detected moving object is output. The positional information of the detected moving object is merged with the image captured by the camera on the basis of the positional information.
    Type: Application
    Filed: October 25, 2017
    Publication date: February 15, 2018
    Inventors: Masaki Demizu, Miki Murakami
  • Publication number: 20180046861
    Abstract: Systems and methods are described for placing large objects and objects separated by large distances in an AR environment. An AR headset system may place and generate digital objects using relative geographical coordinates (e.g., latitude, longitude, and altitude) between the user's current position and the object being placed. In one implementation, a digital object's geographical coordinates may be calculated by determining a user's geographical coordinates, using a distance determination device to measure a distance to a boundary in the user's real-world environment within an AR headset's field of view, and calculating an orientation of the AR headset relative to the user's position.
    Type: Application
    Filed: August 10, 2016
    Publication date: February 15, 2018
    Applicant: Disney Enterprises, Inc.
    Inventors: Mehul PATEL, James VORIS
  • Publication number: 20180046862
    Abstract: A pill identification system identifies a pill type for a pharmaceutical composition from images of the pharmaceutical composition. The system extracts features from images taken of the pill. The features extracted from the pill image include color, size, shape, and surface features of the pill. In particular, the features include rotation-independent surface features of the pill that enable the pill to be identified from a variety of orientations when the images are taken. The feature vectors are applied to a classifier that determines a pill identification for each image. The pill identification for each image is scored to determine identification for the pharmaceutical composition.
    Type: Application
    Filed: October 24, 2017
    Publication date: February 15, 2018
    Inventors: Eugene Gershtein, Alan Jeffrey Jacobs, Alexander Gebala
  • Publication number: 20180046863
    Abstract: Techniques and systems are provided for maintaining lost blob trackers for one or more video frames. In some examples, one or more blob trackers maintained for a sequence of video frames are identified. The one or more blob trackers are associated with one or more blobs of the sequence of video frames. A transition of a blob tracker from a first type of tracker to a lost tracker is detected at a first video frame. For example, the blob tracker can be transitioned from the first type of tracker to the lost tracker when a blob for which the blob tracker was associated with in a previous frame is not detected in the first video frame. A recovery duration is determined for the lost tracker at the first video frame. For one or more subsequent video frames obtained after the first video frame, the lost tracker is removed from the one or more blob trackers maintained for the sequence of video frames when a lost duration for the lost tracker is greater than the recovery duration.
    Type: Application
    Filed: January 6, 2017
    Publication date: February 15, 2018
    Inventors: Ying Chen, Lei Wang