Patents Issued in July 25, 2019
  • Publication number: 20190228169
    Abstract: A memory control device and a memory control method. The memory control method includes: receiving a physical address of a memory from a function circuit; searching a lookup table according to the physical address to determine a range identifier; searching a permission lookup table according to a device identifier corresponding to the function circuit and the range identifier to determine an operation permission of the function circuit for operating the physical address of the memory.
    Type: Application
    Filed: July 26, 2018
    Publication date: July 25, 2019
    Inventor: Chien-Hsing HUANG
  • Publication number: 20190228170
    Abstract: Described herein are systems, methods, storage media, and computer programs that support application development in a movable object environment, wherein protocol independent movable object application may be developed. In one embodiment, a request is received in a first protocol from an application executing on an affiliated device to access a movable object; the request in the first protocol is mapped to a function in an application programming interface (API), where the API is independent of the first protocol; and the movable object is directed to perform the function, via the API.
    Type: Application
    Filed: June 14, 2016
    Publication date: July 25, 2019
    Inventors: Chaobin CHEN, Zhaoliang PENG, Xi CHEN, Chang GENG
  • Publication number: 20190228171
    Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating regulation-compliant processing of queries in an on-demand services environment according to one embodiment. In one embodiment and by way of example, a method includes receiving a query having first information not permitted to be stored per a regulation and second information permitted to be stored, and parameterizing the query into a parameterized query to replace the first information with parameters, where the first information includes data types. The method further includes annotating the parameters with decisions based on data properties correspondingly associated with the data types being represented by the parameters, and generating a final query based on the annotated parameters such that the final query is capable of being executed based on the annotated parameters and without storing the first information.
    Type: Application
    Filed: January 24, 2018
    Publication date: July 25, 2019
    Inventor: ROHITASHVA MATHUR
  • Publication number: 20190228172
    Abstract: Securing an endpoint against exposure to unsafe content includes encrypting files to prevent unauthorized access, and monitoring an exposure state of a process to potentially unsafe content by applying behavioral rules to determine whether the exposure state is either exposed or secure, where (1) the process is initially identified as secure, (2) the process is identified as exposed when the process opens a network connection to a URL that is not internal to an enterprise network of the endpoint and that has a poor reputation, (3) the process is identified as exposed when it opens a file identified as exposed, and (4) the process is identified as exposed when another exposed process opens a handle to the process. Access to the files may be restricted when the process is exposed by controlling access through a file system filter that conditionally decrypts files for the process according to its exposure state.
    Type: Application
    Filed: January 15, 2019
    Publication date: July 25, 2019
    Inventors: Kenneth D. Ray, Andrew J. Thomas, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw
  • Publication number: 20190228173
    Abstract: In some aspects, a gateway server can unlock or unfreeze access to data about a user by third parties without requiring the user to navigate completely away from a third-party website through which the user is executing an electronic transaction. The gateway server can receive a request to unlock or unfreeze data through the third-party website hosted by a third-party web server. The gateway server can output a user interface that is displayable simultaneously with the third-party website. Through the user interface, the gateway server can receive sign-in data such as log-in credentials of the user and consent to share data about the user with the third-party web server. The gateway server can output a command to unlock or unfreeze data about the user and to share the data with the third-party web server. Based on the shared data, the transaction can be completed at the third-party web server.
    Type: Application
    Filed: January 22, 2019
    Publication date: July 25, 2019
    Inventors: Rajan Gupta, Justin Whitehead, Josh Hanson
  • Publication number: 20190228174
    Abstract: A data store to store and access digital records is provided, and a key object record is initialized in the data store to store data associated with a physical key object. A digital fingerprint of the physical key object is stored in the key object record. Another digital record is created in the data store that is not the key object record. The digital record is linked to the digital fingerprint of the physical key object. The linking is arranged to provide secure control access to the linked digital record. A tendered access key is received via a programmatic interface or user interface, and the data store is queried based on the tendered access key to identify a matching digital fingerprint of a key object. In a case that the querying identifies the matching digital fingerprint of the key object within a prescribed level of confidence, access to the linked digital record secured by the key object is granted.
    Type: Application
    Filed: January 22, 2019
    Publication date: July 25, 2019
    Inventors: Justin Lynn Withrow, David Justin Ross, Vala Andrésdóttir Withrow
  • Publication number: 20190228175
    Abstract: Systems and techniques are disclosed for detecting whether a wearable computing device is worn by a user or not. The detection can be made based on whether the device is secured to a user or based on a sensor. A device worn by a user may be operated in a private mode such that the user wearing the device is provided information that is useful while wearing the device. For example, the user may receive message notifications, news updates, telephone call information, or the like. A wearable computing device maybe operated in a public mode while not being worn by a user. While in the public mode, the device may provide non user specific information such as a current time, media items, or the like.
    Type: Application
    Filed: April 5, 2019
    Publication date: July 25, 2019
    Inventors: Christopher James DiBona, Daniel Lawrence Morrill, Daniel Berlin
  • Publication number: 20190228176
    Abstract: In certain embodiments, a prediction model is caused to predict first information related to second information. A data structure may be created that comprises (i) a header (ii) a body in which the first and second information are to be represented by first and second data structure portions: (a) encrypting the first information with a cryptographic key to generate the first data structure portion, the first data structure portion being generated using the cryptographic key and without using another cryptographic key; (b) encrypting the second information with the other cryptographic key to generate the second data structure portion, the second data structure portion being generated using the other cryptographic key and without using the cryptographic key; and (c) creating the data structure comprising the first and second data structure portions. The data structure may be provided to a user device.
    Type: Application
    Filed: August 30, 2018
    Publication date: July 25, 2019
    Inventors: Jonathan B. FISHBECK, William F. HEAPES, Matthew JENKS
  • Publication number: 20190228177
    Abstract: A hosted application gateway server node may be communicatively coupled to backend systems, client devices, and database shards associated with database servers. Through the gateway server node, various services may be provided to managed containers running on client devices such that enterprise applications can be centrally managed. A sharding manager may manage relationships of database items across database shards. Each shard stores a copy of a table representing a split of a relationship. A shard ID mask is included in each item's ID. At query time, the shard ID can be extracted and used to query the correct database. This query routing mechanism allows navigation from one shard to another when multiple items are in a relationship (e.g., share the same resource such as a document). As such, embodiments can eliminate the need for APIs to join in data that span multiple shards.
    Type: Application
    Filed: April 1, 2019
    Publication date: July 25, 2019
    Applicant: Open Text SA ULC
    Inventors: Gregory Beckman, Robert Laird, Geoffrey Michael Obbard
  • Publication number: 20190228178
    Abstract: Authorized access to a digital asset is obtained by associating an authentication tag with a physical object accessible to a user, by configuring the tag with a first dataset comprised of a random distribution of three-dimensional elements and with a second dataset comprised of machine-readable data elements, and by authorizing a mobile device to scan the elements. The first and second datasets together comprise an authentication key that uniquely identifies the object and, in turn, the user. The authentication key is scanned by a device in response to a prompt from the digital asset to obtain scanned key data. Predetermined key data and a device identifier indicative of the authorized device are stored in a database. Access to the digital asset is allowed when the scanned key data matches the stored predetermined key data, and when the device scanning the data is authorized.
    Type: Application
    Filed: January 24, 2018
    Publication date: July 25, 2019
    Inventors: Satya Prakash SHARMA, Joseph MARINO
  • Publication number: 20190228179
    Abstract: A computer system processes requests for health information. A request for health information of an entity is received from a requester, wherein a set of access restrictions is associated with the health information. A context of the request is determined based on one or more factors, and the request is processed to retrieve health information appropriate for the requester based on the associated set of access restrictions and the determined context of the request. Embodiments of the present invention further include a method and computer program product for processing requests for health information in substantially the same manner described above.
    Type: Application
    Filed: January 24, 2018
    Publication date: July 25, 2019
    Inventors: Sarbajit K. Rakshit, Martin G. Keen, James E. Bostick, John M. Ganci, JR.
  • Publication number: 20190228180
    Abstract: An information provision apparatus includes a memory configured to store personal data and a processor coupled to the memory and configured to, in response to reception of a provision request to provide personal data on a data originator create a transaction identifier (ID) based on an identifier of the data originator and a combination of identifiers of holders of personal data on two or more request destinations, associate the personal data stored in the memory with the transaction ID and provide the personal data associated with the transaction ID to an apparatus that uses the personal data.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 25, 2019
    Applicant: FUJITSU LIMITED
    Inventors: Wakana Maeda, Yuji Yamaoka, Hisashi Kojima
  • Publication number: 20190228181
    Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.
    Type: Application
    Filed: March 29, 2019
    Publication date: July 25, 2019
    Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
  • Publication number: 20190228182
    Abstract: The invention regards a method and system for recording observation data without violating privacy. Environment is sensed and observation data including information on the sensed environment is generated. The observation data is processed for determining presence of one or more persons in the sensed environment. Those person(s) amongst the present person(s) that did not agree to store their private data are identified and privacy compliant observation data is generated by obfuscating the private data of these persons. The privacy compliant observation data is store for later use.
    Type: Application
    Filed: January 23, 2019
    Publication date: July 25, 2019
    Inventors: Nils EINECKE, Stefan FUCHS, Andreas RICHTER, Christiane KNORZ
  • Publication number: 20190228183
    Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.
    Type: Application
    Filed: June 27, 2017
    Publication date: July 25, 2019
    Applicant: FASOO. COM CO., LTD
    Inventors: Dae Woo CHOI, Woo Seok KWON, Myeong Sik HWANG, Sang Wook KIM, Gi Tae KIM
  • Publication number: 20190228184
    Abstract: Methods and apparatus to assign demographic information to panelists are disclosed. An example disclosed method includes generating decoy database proprietor identifiers to protect privacies of members of panelist households corresponding to panelist database proprietor identifiers, the decoy database proprietor identifiers to be determined based on a probability density function so that a quantity of the decoy database proprietor identifiers is less than would be used if the decoy database proprietor identifiers were selected by a random selection process. The example method also includes querying a server at a database proprietor using the panelist database proprietor identifiers and the decoy database proprietor identifiers, to obtain demographic information and assigning, by executing an instruction with a processor, the panelist database proprietor identifiers to panelists in the panelist households based on the demographic information obtained from the server at the database proprietor.
    Type: Application
    Filed: April 1, 2019
    Publication date: July 25, 2019
    Inventors: Jonathan Sullivan, Shelli Kashriel, Michelle Christian, ChoongKoo Lee
  • Publication number: 20190228185
    Abstract: A computer readable medium causing a processor to evaluate a URL: when an evaluation resides in a cache, determine whether the URL is safe based on the evaluation, and when an evaluation does not reside in cache: perform an evaluation for the URL using one or more virus scanners, store the evaluation in the cache and determine whether the URL is safe based on the evaluation, when the URL is safe, load and display the web page for the URL, and when the URL is not safe, block the web page for the URL from being loaded and displayed, further determine whether a QA check criterion is met, if so, send the URL to an evaluator for behavioral analysis of the web page of the URL, and store results of the behavioral analysis of the web page of the URL, received from the evaluator, in a QA database.
    Type: Application
    Filed: April 3, 2019
    Publication date: July 25, 2019
    Inventors: Scot Robinson, Patrick Conlin, Jules Panopoulos, Julie Mar-Spinola
  • Publication number: 20190228186
    Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.
    Type: Application
    Filed: January 25, 2018
    Publication date: July 25, 2019
    Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
  • Publication number: 20190228187
    Abstract: Systems and methods for performing migration may include receiving, by a server computing system, a request to access a data element from a second data store, the data element having been migrated to the second data store from a first data store; accessing, by the server computing system, the data element from the second data store and its counterpart data element from the first data store; and based on the data element from the second data store being different from the counterpart data element from the first data store, responding, by the server computing system, to the request by providing the counterpart data element from the first data store instead of the data element from the second data store.
    Type: Application
    Filed: April 1, 2019
    Publication date: July 25, 2019
    Applicant: salesforce.com, inc.
    Inventors: Yujia Hu, Prasad Peddada, Ryan Guest
  • Publication number: 20190228188
    Abstract: The present disclosure discloses a security system for robots. The security system comprises a lock located on a platform, configured to restrict power supply to a plurality of actuators of a robotic arm, a key configured to release the lock for providing power supply to the plurality of actuators and a processing unit. The processing unit is configured to restrict power supply to the robotic arm by initiating the lock, relocate the lock to a random location on the platform, generate an encrypted code based on the random location of the lock and a time-stamp and provide the encrypted code to the control unit for decryption. Upon decryption, the control unit configures the lock to supply power to the plurality of actuators. The plurality of actuators operates the robotic arm to pick the key and release the lock for supplying power to the plurality of actuators.
    Type: Application
    Filed: March 9, 2018
    Publication date: July 25, 2019
    Inventors: Vijay KUMAR, THOMAS CHITTAKATTU NINAN, YATEESH KUMAR SHIVARUDRAIAH, RAMKUMAR GANDHINATHAN
  • Publication number: 20190228189
    Abstract: Disclosed are methods and apparatuses relating to an anti-theft device. An anti-theft device can be affixed to a tablet or laptop. The anti-theft device can determine if a distance relative to a reference point exceeds a threshold. An alarm state can be entered.
    Type: Application
    Filed: October 3, 2018
    Publication date: July 25, 2019
    Inventor: Niloy Roy
  • Publication number: 20190228190
    Abstract: A card reading transaction system includes a transaction control device, an intermediate server, a smart card server, an internet dongle, and a card reader. The transaction control device transmits a transaction message according to a transaction type and a transaction amount. The intermediate server generates a transaction request message according to the transaction message. The smart card server generates a transaction confirmation message according to the transaction request message. The intermediate server generates a first card reader operation message according to the transaction confirmation message, and converts a transmission format of the first card reader operation message to generate a second card reader operation message. The internet dongle converts a transmission format of the second card reader operation message received through the internet to generate a third card reader operation message for the card reader to debit or credit the transaction amount.
    Type: Application
    Filed: January 9, 2019
    Publication date: July 25, 2019
    Inventor: Justin Wang
  • Publication number: 20190228191
    Abstract: Methods and systems are provided for transferring data between digital cards and other physical apparatus, and the devices reading these digital cards.
    Type: Application
    Filed: January 22, 2019
    Publication date: July 25, 2019
    Inventor: Doron Aviad
  • Publication number: 20190228192
    Abstract: A terminal device includes a first communication unit that performs a wireless communication with a wireless communication tag of an electronic equipment in accordance with a first communication method, a second communication unit that performs the wireless communication in accordance with a second communication method, and a processing unit. The first communication unit receives an identification information of the electronic equipment from the wireless communication tag and the second communication unit receives a beacon signal including the identification information of the electronic equipment and an identifier of an internal access point. The processing unit establishes the wireless communication with the electronic equipment in accordance with the second communication method using the identifier specified based on a collation process between the identification information received by the first communication unit and the identification information included in the beacon signal.
    Type: Application
    Filed: January 25, 2019
    Publication date: July 25, 2019
    Inventors: Keiichi MORIMOTO, Kenji SAKUDA
  • Publication number: 20190228193
    Abstract: Mobile high density read chambers are provided for scanning a plurality of RFID tagged items. Such chambers may include an enclosure with an interior defined by upper and lower surfaces, with a sidewall extending therebetween. An access (such as a door) may be associated with the sidewall, with the access being at least partially opened to access the interior of the enclosure from an outside location. The chamber further includes an RFID reader having at least one antenna positioned within the interior of the enclosure to emit a scanning signal within the interior of the enclosure. A base supports the enclosure, with at least one movement member supporting the base and configured to engage a ground surface for transport of the mobile high density read chamber. The movement member may comprise one or more wheels, ball casters, low-friction sliders, or rollers, for example.
    Type: Application
    Filed: January 23, 2019
    Publication date: July 25, 2019
    Inventor: Mark W. ROTH
  • Publication number: 20190228194
    Abstract: A system, method, and computer-readable medium for decoding an encoded geometry, comprising: scanning an encoded geometry, the scanning comprising scanning a plurality of multi-dimensional symbols of the encoded geometry; identifying each of the plurality of multi-dimensional symbols; decoding each identifier multi-dimensional symbol to provide encoded geometry information; accessing an encoded geometry repository; and, retrieving data associated with the encoded geometry information.
    Type: Application
    Filed: March 29, 2019
    Publication date: July 25, 2019
    Applicant: Dell Products L.P.
    Inventors: Scott C. Lauffer, Richard W. Guzman
  • Publication number: 20190228195
    Abstract: This invention provides a vision system, typically having at least two imaging systems/image sensors that enable a multi-function unit. The first imaging system, typically a standard, on-axis optical configuration can be used for long distances and larger feature sets and the second imaging system is typically an extended-depth of focus/field (DOF) configuration. This second imaging system allows reading of smaller feature sets/objects and/or at shorter distances. The reading range of an overall (e.g.) ID-code-reading vision system is extended and relatively small objects can be accurately imaged. The extended-DOF imaging system sensor can be positioned with its longest dimension in the vertical axis. The system allows vision system processes to compute the distance from the vision system to the object to generate an autofocus setting for variable optics in the standard imaging system. A single or dual aimer can project structured light onto the object surface around the system optical axis.
    Type: Application
    Filed: December 12, 2018
    Publication date: July 25, 2019
    Inventors: Esther Oteo Lozano, Laurens Nunnink, Tony Depre
  • Publication number: 20190228196
    Abstract: A device for generating a limited-time 2D barcode symbol is provided. In one embodiment, the device includes a casing; a display on the casing for showing a barcode symbol; a MCU in the casing and electrically connected to the display, the MCU being capable of generating a limited-time 2D barcode symbol and sending same to the display for display, or deleting the 2D barcode symbol after a time limit of the 2D barcode symbol has expired; and a power supply in the casing and electrically connected to both the MCU and the display.
    Type: Application
    Filed: April 3, 2019
    Publication date: July 25, 2019
    Inventor: Hung Yuan Wang
  • Publication number: 20190228197
    Abstract: This patent specification describes an attachment for a mobile device. The attachment may have an attachment feature designed to be attached to a mobile device such as a smartphone, tablet, or smartphone/tablet with a camera. The attachment may also include an optics system and/or an illumination system that cooperates with the camera to facilitate the capture of decodable barcodes. The illumination system may include a targeting illumination system that facilitates proper positioning of the article and/or an exposure illumination system that helps illuminate the article during capture. The optics system may include a lens that modifies the depth of field and/or the size of the field of view of the camera, an aperture that helps define the field of view, a filter that prevents light of undesired wavelengths from reaching the camera, and/or a mirror that redirects the camera's optical pathway.
    Type: Application
    Filed: April 1, 2019
    Publication date: July 25, 2019
    Inventors: Garrett Russell, Ryan Hoobler, Philip Utykanski
  • Publication number: 20190228198
    Abstract: A processor of an information processing device acquires an image, determines base point from the image, and acquires first position information of the base point. The processor determines a reference direction indicating characteristics of color information of a section of the image around the base point. The processor acquires a sample for each of a plurality of reference points acquired sequentially in accordance with a predetermined condition from a starting point determined on the basis of the base point and the reference direction. The processor calculates as frequency information, frequency components of changes in the color information with respect to the second position information for the plurality of samples, using a linear prediction coefficient calculated using a Yule-Walker method without applying a window function. The processor causes the memory to store information associating the frequency information, the first position information and the reference direction, as collation information.
    Type: Application
    Filed: March 29, 2019
    Publication date: July 25, 2019
    Applicant: KABUSHIKI KAISHA DDS
    Inventors: Kenji MIYOSHINO, Tatsuki YOSHIMINE, Noriyuki GONDA, Yuhei NIWA
  • Publication number: 20190228199
    Abstract: In accordance with at least one embodiment, a touch sensor is disclosed. The touch sensor includes a first electroconductive pattern including at least two electrodes. The touch sensor further includes a second electroconductive pattern configured to mask a portion of the first electroconductive pattern when positioned over or under the first electroconductive pattern. The second electroconductive pattern masks the portion of the first electroconductive pattern such that an unmasked portion of the first electroconductive pattern includes unmasked portions of the at least two electrodes. The unmasked portions are of approximately equal length.
    Type: Application
    Filed: April 3, 2019
    Publication date: July 25, 2019
    Applicant: SEMICONDUCTOR COMPONENTS INDUSTRIES, LLC
    Inventors: Takayasu OTAGAKI, Kazuyoshi ISHIKAWA
  • Publication number: 20190228200
    Abstract: An image capture module includes a light-permeable element, an image capture element, and a light-guiding element. The light-permeable element has a surface in contact with an environmental medium. The image capture element has a sensing pixel array. The light-guiding element is disposed at a position between the light-permeable element and the image capture element, and has a plurality of optical fibers. Each of the optical fibers has a core part and a shell part that is surroundingly disposed around the core part, the shell part is doped with a plurality of light-absorbing particles, and each of the optical fibers has a numerical aperture smaller than or equal to 0.7. An electronic device includes the image capture module and is configured to capture an image of an object.
    Type: Application
    Filed: October 25, 2018
    Publication date: July 25, 2019
    Inventors: WEI-CHUN CHUNG, JEN-CHIEH WU
  • Publication number: 20190228201
    Abstract: An electronic device for distinguishing between fingerprint feature points and non-fingerprint feature points and a method for the same are provided. A plurality of feature points are extracted from a fingerprint input image, and non-fingerprint feature points are distinguished from fingerprint feature points and deleted. Accordingly, the electronic device for distinguishing between fingerprint feature points and non-fingerprint feature points and the method for the same can prevent non-fingerprint feature points from existing in a fingerprint registration template of a user, so as to protect fingerprint recognition from being affected by non-fingerprint feature points, thereby increasing safety and accuracy of identity authentication.
    Type: Application
    Filed: November 19, 2018
    Publication date: July 25, 2019
    Inventors: YUAN-LIN CHIANG, YU-CHUN CHENG
  • Publication number: 20190228202
    Abstract: A method and a device for unlocking a fingerprint are provided. The method includes: controlling a predetermined light-emitting region of a display device to enter a first display mode upon receipt of external light, controlling the predetermined light-emitting region of the display device to enter a second display mode when the predetermined light-emitting region of the display device is pressed; and acquiring fingerprint information in the predetermined light-emitting region of the display device after the predetermined light-emitting region enters the second display mode, and determining whether to allow unlocking or not according to the fingerprint information.
    Type: Application
    Filed: November 21, 2018
    Publication date: July 25, 2019
    Inventors: Yuanyuan CHAI, Yangpeng WANG, Weinan DAI, Yao HU, Yingsong XU
  • Publication number: 20190228203
    Abstract: A fingerprint sensor and an electronic device are provided. The fingerprint sensor includes a refractive member configured to refract light into a path toward at least one optical sensor, wherein the at least one optical sensor is configured to obtain the light, and a guide member disposed between the refractive member and the at least one optical sensor and configured to provide the path so that the refracted light is transmitted to the at least one optical sensor. The electronic device includes transparent cover; light source configured to output light toward transparent cover; refractive member configured to refract light into path toward at least one optical sensor; wherein at least one optical sensor is configured to obtain light; and guide member disposed between refractive member and at least one optical sensor and configured to provide path so that refracted light is transmitted to at least one optical sensor.
    Type: Application
    Filed: January 22, 2019
    Publication date: July 25, 2019
    Inventors: Jeonghoo KIM, Suna KIM, Valeriy PRUSHINSKIY, Suk HYUN, Yongseok KIM, Changryong HEO
  • Publication number: 20190228204
    Abstract: A fingerprint sensor is disclosed. An embodiment according to an aspect of the present invention provides a display having a fingerprint recognition function. The display having a fingerprint recognition function may comprise: a display panel, which is disposed under a cover glass and allows rays to pass therethrough, the rays having various incident angles indicating ridges and troughs of a fingerprint that is in contact with the cover glass; and an image sensor layer, which is disposed under the display panel and detects a ray to be detected in the rays having the various incident angles to generate a fingerprint image.
    Type: Application
    Filed: June 28, 2017
    Publication date: July 25, 2019
    Inventors: Kwang Sue PARK, Dong Wook NAM, Byung II MIN
  • Publication number: 20190228205
    Abstract: A method of determining presence of a skinprint uses an apparatus comprising: a primary electromagnetic radiation source; an electromagnetic radiation detector; and a translucent waveguide comprising a first surface providing a waveguide interface coincident with a skinprint receiving region.
    Type: Application
    Filed: August 10, 2017
    Publication date: July 25, 2019
    Applicant: INTELLIGENT FINGERPRINTING LIMITED
    Inventors: Benjamin Gordon, Paul Wilson
  • Publication number: 20190228206
    Abstract: In a method for generating an estimated fingerprint image, a ridge/valley pattern of a fingerprint of a finger is received. A sensor image including a partial fingerprint of the finger is received. Ridge/valley characteristics of the fingerprint are extracted from the sensor image including the partial fingerprint. An estimated fingerprint image is generated based at least on the ridge/valley pattern of the fingerprint and the ridge/valley characteristics of the fingerprint.
    Type: Application
    Filed: December 28, 2018
    Publication date: July 25, 2019
    Applicant: InvenSense, Inc.
    Inventors: Jonathan BAUDOT, Etienne De FORAS
  • Publication number: 20190228207
    Abstract: An electronic device is provided. The electronic device includes a touchscreen display, a pressure sensor positioned to sense external pressure against the display, a fingerprint sensor positioned to detect a fingerprint on at least a portion of the display, a processor electrically coupled to the display, the pressure sensor, and the fingerprint sensor, and a memory electrically coupled to the processor, in which the memory stores at least one registered fingerprint. The processor is configured to sense pressure of a user's finger against the display using the pressure sensor, upon sensing of the pressure, activate the fingerprint sensor, detect a fingerprint of the finger using the fingerprint sensor, determine whether the detected fingerprint is matched with any of the at least one registered fingerprint, and perform a preselected function without further requiring authentication, when the detected fingerprint is matched with any of the at least one registered fingerprint.
    Type: Application
    Filed: April 3, 2019
    Publication date: July 25, 2019
    Inventors: Wan Ho ROH, So Young KIM, Dae Kwang JUNG
  • Publication number: 20190228208
    Abstract: A display device for displaying an image and a method by which the display device operates to display an image are provided. The display device may include a display configured to output a screen image, an image sensor configured to acquire an image signal, a bending detection sensor configured to detect a bending motion or a bent state of the display device, and a control unit configured to control the display to display an image, which is generated based on the image signal, in a region according to a position at which the display is bent on the screen image if the bending detection sensor detects the bending motion or a bent state.
    Type: Application
    Filed: April 1, 2019
    Publication date: July 25, 2019
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Shi-yun Cho, So-young Kim, Woo-ram Jeon, Youn-ho Choi, Dae-myung Kim, Kyung-wan Park, Jae-young Huh
  • Publication number: 20190228209
    Abstract: The application discloses a lip movement capturing method and device and a storage medium. The method includes: acquiring a real-time image shot by a photographic device and extracting a real-time facial image from the real-time image; inputting the real-time facial image into a pretrained lip average model and recognizing t lip feature points representative of positions of lips in the real-time facial image; and calculating a movement direction and movement distance of the lips in the real-time facial image according to x and y coordinates of the t lip feature points in the real-time facial image. According to the application, movement information of the lips in the real-time facial image is calculated according to the coordinates of the lip feature points to implement real-time capturing of movements of the lips.
    Type: Application
    Filed: October 31, 2017
    Publication date: July 25, 2019
    Inventors: Lin Chen, Guohui Zhang
  • Publication number: 20190228210
    Abstract: A face identification system includes a transmitter, a receiver, a database, an artificial intelligence chip, and a main processor. The transmitter is used for emitting at least one first light signal to an object. The receiver is used for receiving at least one second light signal reflected by the object. The database is used for saving training data. The artificial intelligence chip is coupled to the transmitter, the receiver, and the database for identifying a face image from the object according to the at least one second light signal and the training data. The main processor is coupled to the artificial intelligence chip for receiving a face identification signal generated from the artificial intelligence chip.
    Type: Application
    Filed: January 22, 2018
    Publication date: July 25, 2019
    Inventor: Chun-Chen Liu
  • Publication number: 20190228211
    Abstract: The disclosure discloses an action unit (AU) feature recognition method, which includes: acquiring a real-time image shot by a photographic device and extracting a real-time facial image from the real-time image by use of a face recognition algorithm; inputting the real-time facial image into a pretrained facial mean shape and recognizing t facial feature points from the real-time facial image by use of the facial mean shape; determining feature regions matched with each AU in the real-time facial image according to positions of the t facial feature points, extracting local features from the feature regions and generating multiple feature vectors; and inputting the multiple feature vectors into pretrained AU classifiers matched with the feature regions respectively to obtain a prediction result of recognition of the corresponding AU features from the feature regions. The disclosure also discloses an electronic device and a computer-readable storage medium.
    Type: Application
    Filed: September 30, 2017
    Publication date: July 25, 2019
    Inventors: Lin Chen, Guohui Zhang
  • Publication number: 20190228212
    Abstract: A wakeup method based on lip reading is provided, the wakeup method including: acquiring a motion graph of a user's lips; determining whether the acquired motion graph matches a preset motion graph; and waking up a voice interaction function in response to the acquired motion graph matching the preset motion graph.
    Type: Application
    Filed: October 19, 2018
    Publication date: July 25, 2019
    Inventor: Liang Gao
  • Publication number: 20190228213
    Abstract: Systems and methods are provided for authenticating a user of a computing device. The system comprises one or more memory devices storing instructions, and one or more processors configured to execute the instructions to provide, to a computing device associated with a user, an indication of a prescribed authentication parameter. The system also receives image data including an image of the user of the computing device captured using an image sensor of the computing device. The system determines an identity of the user based on an analysis of the received image data, determines whether the received image data includes a feature corresponding to the prescribed authentication parameter, and authenticates the user based at least in part on whether the received image data includes the feature corresponding to the prescribed authentication parameter.
    Type: Application
    Filed: December 12, 2018
    Publication date: July 25, 2019
    Inventor: Colin Robert MACDONALD
  • Publication number: 20190228214
    Abstract: The present application provides a gesture recognition method, a device, an apparatus and a storage medium. The gesture recognition method includes: acquiring coordinates of a center point of a gesture in an ith frame of image; determining whether the center point of the gesture in the ith frame of image is within a preset region; if yes, determining that coordinates of an actual center point of the gesture in the ith frame of image are coordinates of an actual center point of the gesture in the (i?1)th frame of image; wherein i is an integer greater than or equal to 2, and the preset region is a region taking the actual center point of the gesture in the (i?1)th frame of image as a center; and performing a dynamic-gesture recognition according to coordinates of an actual center point of the gesture in each frame of image.
    Type: Application
    Filed: December 26, 2018
    Publication date: July 25, 2019
    Inventor: Chu XU
  • Publication number: 20190228215
    Abstract: Evaluating the engagement and attentiveness of persons in a group by preparing a streaming video of the group, extracting faces of the persons in the group, aligning the extracted faces, assigning an identity to each of the faces, recognizing the emotional state of each face by a temporal emotion recognition module, and estimating the attentiveness of each person based on the recognized emotional state of each face of each person. The estimated attentiveness may also include recognizing the gaze of each person.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 25, 2019
    Inventors: Peyman Najafirad, Arun Das
  • Publication number: 20190228216
    Abstract: A childcare support service offering system includes a terminal and a server. The terminal includes a camera and performs operation control and processing of transmitting terminal usage situation data including image data acquired by being picked up by the camera to the server. The server performs image analysis on the received image data, recognizes the user that watches the terminal, judges a gaze of the recognized user, and judges a degree of interest for the terminal based on the gaze. When the judged degree of interest becomes equal to or less than a predetermined threshold value, the server transmits a changing instruction for causing an operation in the terminal to be changed to another operation to the terminal.
    Type: Application
    Filed: March 28, 2019
    Publication date: July 25, 2019
    Applicants: Kabushiki Kaisha Toshiba, Toshiba Digital Solutions Corporation
    Inventors: Motokazu IWASAKI, Genki FUKATSU, Kazuhiro SHIMADA, Keisaku NAKAMURA, Satoko KIKUCHI, Masaru WATABIKI, Yuuka ASAUMI, Kanako MIYAWAKI, Masakazu KASHITA, Shinsuke IUCHI
  • Publication number: 20190228217
    Abstract: A method for waking up a voice interaction function based on a gesture includes: acquiring an image of a user's gesture; determining whether the acquired image matches a preset image; and waking up a voice interaction function in response to the acquired image matching the preset image.
    Type: Application
    Filed: October 19, 2018
    Publication date: July 25, 2019
    Inventor: Liang Gao
  • Publication number: 20190228218
    Abstract: Methods, systems, and apparatuses, including computer programs encoded on a computer-readable storage medium for estimating the shape, size, and mass of fish are described. A pair of stereo cameras may be utilized to obtain right and left images of fish in a defined area. The right and left images may be processed, enhanced, and combined. Object detection may be used to detect and track a fish in images. A pose estimator may be used to determine key points and features of the detected fish. Based on the key points, a three-dimensional (3-D) model of the fish is generated that provides an estimate of the size and shape of the fish. A regression model or neural network model can be applied to the 3-D model to determine a likely weight of the fish.
    Type: Application
    Filed: January 25, 2018
    Publication date: July 25, 2019
    Inventors: Barnaby John James, Evan Douglas Rapoport, Matthew Messana, Peter Kimball