Patents Issued in July 25, 2019
-
Publication number: 20190228169Abstract: A memory control device and a memory control method. The memory control method includes: receiving a physical address of a memory from a function circuit; searching a lookup table according to the physical address to determine a range identifier; searching a permission lookup table according to a device identifier corresponding to the function circuit and the range identifier to determine an operation permission of the function circuit for operating the physical address of the memory.Type: ApplicationFiled: July 26, 2018Publication date: July 25, 2019Inventor: Chien-Hsing HUANG
-
Publication number: 20190228170Abstract: Described herein are systems, methods, storage media, and computer programs that support application development in a movable object environment, wherein protocol independent movable object application may be developed. In one embodiment, a request is received in a first protocol from an application executing on an affiliated device to access a movable object; the request in the first protocol is mapped to a function in an application programming interface (API), where the API is independent of the first protocol; and the movable object is directed to perform the function, via the API.Type: ApplicationFiled: June 14, 2016Publication date: July 25, 2019Inventors: Chaobin CHEN, Zhaoliang PENG, Xi CHEN, Chang GENG
-
Publication number: 20190228171Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating regulation-compliant processing of queries in an on-demand services environment according to one embodiment. In one embodiment and by way of example, a method includes receiving a query having first information not permitted to be stored per a regulation and second information permitted to be stored, and parameterizing the query into a parameterized query to replace the first information with parameters, where the first information includes data types. The method further includes annotating the parameters with decisions based on data properties correspondingly associated with the data types being represented by the parameters, and generating a final query based on the annotated parameters such that the final query is capable of being executed based on the annotated parameters and without storing the first information.Type: ApplicationFiled: January 24, 2018Publication date: July 25, 2019Inventor: ROHITASHVA MATHUR
-
Publication number: 20190228172Abstract: Securing an endpoint against exposure to unsafe content includes encrypting files to prevent unauthorized access, and monitoring an exposure state of a process to potentially unsafe content by applying behavioral rules to determine whether the exposure state is either exposed or secure, where (1) the process is initially identified as secure, (2) the process is identified as exposed when the process opens a network connection to a URL that is not internal to an enterprise network of the endpoint and that has a poor reputation, (3) the process is identified as exposed when it opens a file identified as exposed, and (4) the process is identified as exposed when another exposed process opens a handle to the process. Access to the files may be restricted when the process is exposed by controlling access through a file system filter that conditionally decrypts files for the process according to its exposure state.Type: ApplicationFiled: January 15, 2019Publication date: July 25, 2019Inventors: Kenneth D. Ray, Andrew J. Thomas, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw
-
Publication number: 20190228173Abstract: In some aspects, a gateway server can unlock or unfreeze access to data about a user by third parties without requiring the user to navigate completely away from a third-party website through which the user is executing an electronic transaction. The gateway server can receive a request to unlock or unfreeze data through the third-party website hosted by a third-party web server. The gateway server can output a user interface that is displayable simultaneously with the third-party website. Through the user interface, the gateway server can receive sign-in data such as log-in credentials of the user and consent to share data about the user with the third-party web server. The gateway server can output a command to unlock or unfreeze data about the user and to share the data with the third-party web server. Based on the shared data, the transaction can be completed at the third-party web server.Type: ApplicationFiled: January 22, 2019Publication date: July 25, 2019Inventors: Rajan Gupta, Justin Whitehead, Josh Hanson
-
Publication number: 20190228174Abstract: A data store to store and access digital records is provided, and a key object record is initialized in the data store to store data associated with a physical key object. A digital fingerprint of the physical key object is stored in the key object record. Another digital record is created in the data store that is not the key object record. The digital record is linked to the digital fingerprint of the physical key object. The linking is arranged to provide secure control access to the linked digital record. A tendered access key is received via a programmatic interface or user interface, and the data store is queried based on the tendered access key to identify a matching digital fingerprint of a key object. In a case that the querying identifies the matching digital fingerprint of the key object within a prescribed level of confidence, access to the linked digital record secured by the key object is granted.Type: ApplicationFiled: January 22, 2019Publication date: July 25, 2019Inventors: Justin Lynn Withrow, David Justin Ross, Vala Andrésdóttir Withrow
-
Publication number: 20190228175Abstract: Systems and techniques are disclosed for detecting whether a wearable computing device is worn by a user or not. The detection can be made based on whether the device is secured to a user or based on a sensor. A device worn by a user may be operated in a private mode such that the user wearing the device is provided information that is useful while wearing the device. For example, the user may receive message notifications, news updates, telephone call information, or the like. A wearable computing device maybe operated in a public mode while not being worn by a user. While in the public mode, the device may provide non user specific information such as a current time, media items, or the like.Type: ApplicationFiled: April 5, 2019Publication date: July 25, 2019Inventors: Christopher James DiBona, Daniel Lawrence Morrill, Daniel Berlin
-
Publication number: 20190228176Abstract: In certain embodiments, a prediction model is caused to predict first information related to second information. A data structure may be created that comprises (i) a header (ii) a body in which the first and second information are to be represented by first and second data structure portions: (a) encrypting the first information with a cryptographic key to generate the first data structure portion, the first data structure portion being generated using the cryptographic key and without using another cryptographic key; (b) encrypting the second information with the other cryptographic key to generate the second data structure portion, the second data structure portion being generated using the other cryptographic key and without using the cryptographic key; and (c) creating the data structure comprising the first and second data structure portions. The data structure may be provided to a user device.Type: ApplicationFiled: August 30, 2018Publication date: July 25, 2019Inventors: Jonathan B. FISHBECK, William F. HEAPES, Matthew JENKS
-
Publication number: 20190228177Abstract: A hosted application gateway server node may be communicatively coupled to backend systems, client devices, and database shards associated with database servers. Through the gateway server node, various services may be provided to managed containers running on client devices such that enterprise applications can be centrally managed. A sharding manager may manage relationships of database items across database shards. Each shard stores a copy of a table representing a split of a relationship. A shard ID mask is included in each item's ID. At query time, the shard ID can be extracted and used to query the correct database. This query routing mechanism allows navigation from one shard to another when multiple items are in a relationship (e.g., share the same resource such as a document). As such, embodiments can eliminate the need for APIs to join in data that span multiple shards.Type: ApplicationFiled: April 1, 2019Publication date: July 25, 2019Applicant: Open Text SA ULCInventors: Gregory Beckman, Robert Laird, Geoffrey Michael Obbard
-
Publication number: 20190228178Abstract: Authorized access to a digital asset is obtained by associating an authentication tag with a physical object accessible to a user, by configuring the tag with a first dataset comprised of a random distribution of three-dimensional elements and with a second dataset comprised of machine-readable data elements, and by authorizing a mobile device to scan the elements. The first and second datasets together comprise an authentication key that uniquely identifies the object and, in turn, the user. The authentication key is scanned by a device in response to a prompt from the digital asset to obtain scanned key data. Predetermined key data and a device identifier indicative of the authorized device are stored in a database. Access to the digital asset is allowed when the scanned key data matches the stored predetermined key data, and when the device scanning the data is authorized.Type: ApplicationFiled: January 24, 2018Publication date: July 25, 2019Inventors: Satya Prakash SHARMA, Joseph MARINO
-
Publication number: 20190228179Abstract: A computer system processes requests for health information. A request for health information of an entity is received from a requester, wherein a set of access restrictions is associated with the health information. A context of the request is determined based on one or more factors, and the request is processed to retrieve health information appropriate for the requester based on the associated set of access restrictions and the determined context of the request. Embodiments of the present invention further include a method and computer program product for processing requests for health information in substantially the same manner described above.Type: ApplicationFiled: January 24, 2018Publication date: July 25, 2019Inventors: Sarbajit K. Rakshit, Martin G. Keen, James E. Bostick, John M. Ganci, JR.
-
Publication number: 20190228180Abstract: An information provision apparatus includes a memory configured to store personal data and a processor coupled to the memory and configured to, in response to reception of a provision request to provide personal data on a data originator create a transaction identifier (ID) based on an identifier of the data originator and a combination of identifiers of holders of personal data on two or more request destinations, associate the personal data stored in the memory with the transaction ID and provide the personal data associated with the transaction ID to an apparatus that uses the personal data.Type: ApplicationFiled: January 18, 2019Publication date: July 25, 2019Applicant: FUJITSU LIMITEDInventors: Wakana Maeda, Yuji Yamaoka, Hisashi Kojima
-
Publication number: 20190228181Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
-
Publication number: 20190228182Abstract: The invention regards a method and system for recording observation data without violating privacy. Environment is sensed and observation data including information on the sensed environment is generated. The observation data is processed for determining presence of one or more persons in the sensed environment. Those person(s) amongst the present person(s) that did not agree to store their private data are identified and privacy compliant observation data is generated by obfuscating the private data of these persons. The privacy compliant observation data is store for later use.Type: ApplicationFiled: January 23, 2019Publication date: July 25, 2019Inventors: Nils EINECKE, Stefan FUCHS, Andreas RICHTER, Christiane KNORZ
-
Publication number: 20190228183Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.Type: ApplicationFiled: June 27, 2017Publication date: July 25, 2019Applicant: FASOO. COM CO., LTDInventors: Dae Woo CHOI, Woo Seok KWON, Myeong Sik HWANG, Sang Wook KIM, Gi Tae KIM
-
Publication number: 20190228184Abstract: Methods and apparatus to assign demographic information to panelists are disclosed. An example disclosed method includes generating decoy database proprietor identifiers to protect privacies of members of panelist households corresponding to panelist database proprietor identifiers, the decoy database proprietor identifiers to be determined based on a probability density function so that a quantity of the decoy database proprietor identifiers is less than would be used if the decoy database proprietor identifiers were selected by a random selection process. The example method also includes querying a server at a database proprietor using the panelist database proprietor identifiers and the decoy database proprietor identifiers, to obtain demographic information and assigning, by executing an instruction with a processor, the panelist database proprietor identifiers to panelists in the panelist households based on the demographic information obtained from the server at the database proprietor.Type: ApplicationFiled: April 1, 2019Publication date: July 25, 2019Inventors: Jonathan Sullivan, Shelli Kashriel, Michelle Christian, ChoongKoo Lee
-
Publication number: 20190228185Abstract: A computer readable medium causing a processor to evaluate a URL: when an evaluation resides in a cache, determine whether the URL is safe based on the evaluation, and when an evaluation does not reside in cache: perform an evaluation for the URL using one or more virus scanners, store the evaluation in the cache and determine whether the URL is safe based on the evaluation, when the URL is safe, load and display the web page for the URL, and when the URL is not safe, block the web page for the URL from being loaded and displayed, further determine whether a QA check criterion is met, if so, send the URL to an evaluator for behavioral analysis of the web page of the URL, and store results of the behavioral analysis of the web page of the URL, received from the evaluator, in a QA database.Type: ApplicationFiled: April 3, 2019Publication date: July 25, 2019Inventors: Scot Robinson, Patrick Conlin, Jules Panopoulos, Julie Mar-Spinola
-
Publication number: 20190228186Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.Type: ApplicationFiled: January 25, 2018Publication date: July 25, 2019Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
-
Publication number: 20190228187Abstract: Systems and methods for performing migration may include receiving, by a server computing system, a request to access a data element from a second data store, the data element having been migrated to the second data store from a first data store; accessing, by the server computing system, the data element from the second data store and its counterpart data element from the first data store; and based on the data element from the second data store being different from the counterpart data element from the first data store, responding, by the server computing system, to the request by providing the counterpart data element from the first data store instead of the data element from the second data store.Type: ApplicationFiled: April 1, 2019Publication date: July 25, 2019Applicant: salesforce.com, inc.Inventors: Yujia Hu, Prasad Peddada, Ryan Guest
-
Publication number: 20190228188Abstract: The present disclosure discloses a security system for robots. The security system comprises a lock located on a platform, configured to restrict power supply to a plurality of actuators of a robotic arm, a key configured to release the lock for providing power supply to the plurality of actuators and a processing unit. The processing unit is configured to restrict power supply to the robotic arm by initiating the lock, relocate the lock to a random location on the platform, generate an encrypted code based on the random location of the lock and a time-stamp and provide the encrypted code to the control unit for decryption. Upon decryption, the control unit configures the lock to supply power to the plurality of actuators. The plurality of actuators operates the robotic arm to pick the key and release the lock for supplying power to the plurality of actuators.Type: ApplicationFiled: March 9, 2018Publication date: July 25, 2019Inventors: Vijay KUMAR, THOMAS CHITTAKATTU NINAN, YATEESH KUMAR SHIVARUDRAIAH, RAMKUMAR GANDHINATHAN
-
Publication number: 20190228189Abstract: Disclosed are methods and apparatuses relating to an anti-theft device. An anti-theft device can be affixed to a tablet or laptop. The anti-theft device can determine if a distance relative to a reference point exceeds a threshold. An alarm state can be entered.Type: ApplicationFiled: October 3, 2018Publication date: July 25, 2019Inventor: Niloy Roy
-
Publication number: 20190228190Abstract: A card reading transaction system includes a transaction control device, an intermediate server, a smart card server, an internet dongle, and a card reader. The transaction control device transmits a transaction message according to a transaction type and a transaction amount. The intermediate server generates a transaction request message according to the transaction message. The smart card server generates a transaction confirmation message according to the transaction request message. The intermediate server generates a first card reader operation message according to the transaction confirmation message, and converts a transmission format of the first card reader operation message to generate a second card reader operation message. The internet dongle converts a transmission format of the second card reader operation message received through the internet to generate a third card reader operation message for the card reader to debit or credit the transaction amount.Type: ApplicationFiled: January 9, 2019Publication date: July 25, 2019Inventor: Justin Wang
-
Publication number: 20190228191Abstract: Methods and systems are provided for transferring data between digital cards and other physical apparatus, and the devices reading these digital cards.Type: ApplicationFiled: January 22, 2019Publication date: July 25, 2019Inventor: Doron Aviad
-
Publication number: 20190228192Abstract: A terminal device includes a first communication unit that performs a wireless communication with a wireless communication tag of an electronic equipment in accordance with a first communication method, a second communication unit that performs the wireless communication in accordance with a second communication method, and a processing unit. The first communication unit receives an identification information of the electronic equipment from the wireless communication tag and the second communication unit receives a beacon signal including the identification information of the electronic equipment and an identifier of an internal access point. The processing unit establishes the wireless communication with the electronic equipment in accordance with the second communication method using the identifier specified based on a collation process between the identification information received by the first communication unit and the identification information included in the beacon signal.Type: ApplicationFiled: January 25, 2019Publication date: July 25, 2019Inventors: Keiichi MORIMOTO, Kenji SAKUDA
-
Publication number: 20190228193Abstract: Mobile high density read chambers are provided for scanning a plurality of RFID tagged items. Such chambers may include an enclosure with an interior defined by upper and lower surfaces, with a sidewall extending therebetween. An access (such as a door) may be associated with the sidewall, with the access being at least partially opened to access the interior of the enclosure from an outside location. The chamber further includes an RFID reader having at least one antenna positioned within the interior of the enclosure to emit a scanning signal within the interior of the enclosure. A base supports the enclosure, with at least one movement member supporting the base and configured to engage a ground surface for transport of the mobile high density read chamber. The movement member may comprise one or more wheels, ball casters, low-friction sliders, or rollers, for example.Type: ApplicationFiled: January 23, 2019Publication date: July 25, 2019Inventor: Mark W. ROTH
-
Publication number: 20190228194Abstract: A system, method, and computer-readable medium for decoding an encoded geometry, comprising: scanning an encoded geometry, the scanning comprising scanning a plurality of multi-dimensional symbols of the encoded geometry; identifying each of the plurality of multi-dimensional symbols; decoding each identifier multi-dimensional symbol to provide encoded geometry information; accessing an encoded geometry repository; and, retrieving data associated with the encoded geometry information.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Applicant: Dell Products L.P.Inventors: Scott C. Lauffer, Richard W. Guzman
-
Publication number: 20190228195Abstract: This invention provides a vision system, typically having at least two imaging systems/image sensors that enable a multi-function unit. The first imaging system, typically a standard, on-axis optical configuration can be used for long distances and larger feature sets and the second imaging system is typically an extended-depth of focus/field (DOF) configuration. This second imaging system allows reading of smaller feature sets/objects and/or at shorter distances. The reading range of an overall (e.g.) ID-code-reading vision system is extended and relatively small objects can be accurately imaged. The extended-DOF imaging system sensor can be positioned with its longest dimension in the vertical axis. The system allows vision system processes to compute the distance from the vision system to the object to generate an autofocus setting for variable optics in the standard imaging system. A single or dual aimer can project structured light onto the object surface around the system optical axis.Type: ApplicationFiled: December 12, 2018Publication date: July 25, 2019Inventors: Esther Oteo Lozano, Laurens Nunnink, Tony Depre
-
Publication number: 20190228196Abstract: A device for generating a limited-time 2D barcode symbol is provided. In one embodiment, the device includes a casing; a display on the casing for showing a barcode symbol; a MCU in the casing and electrically connected to the display, the MCU being capable of generating a limited-time 2D barcode symbol and sending same to the display for display, or deleting the 2D barcode symbol after a time limit of the 2D barcode symbol has expired; and a power supply in the casing and electrically connected to both the MCU and the display.Type: ApplicationFiled: April 3, 2019Publication date: July 25, 2019Inventor: Hung Yuan Wang
-
Publication number: 20190228197Abstract: This patent specification describes an attachment for a mobile device. The attachment may have an attachment feature designed to be attached to a mobile device such as a smartphone, tablet, or smartphone/tablet with a camera. The attachment may also include an optics system and/or an illumination system that cooperates with the camera to facilitate the capture of decodable barcodes. The illumination system may include a targeting illumination system that facilitates proper positioning of the article and/or an exposure illumination system that helps illuminate the article during capture. The optics system may include a lens that modifies the depth of field and/or the size of the field of view of the camera, an aperture that helps define the field of view, a filter that prevents light of undesired wavelengths from reaching the camera, and/or a mirror that redirects the camera's optical pathway.Type: ApplicationFiled: April 1, 2019Publication date: July 25, 2019Inventors: Garrett Russell, Ryan Hoobler, Philip Utykanski
-
Publication number: 20190228198Abstract: A processor of an information processing device acquires an image, determines base point from the image, and acquires first position information of the base point. The processor determines a reference direction indicating characteristics of color information of a section of the image around the base point. The processor acquires a sample for each of a plurality of reference points acquired sequentially in accordance with a predetermined condition from a starting point determined on the basis of the base point and the reference direction. The processor calculates as frequency information, frequency components of changes in the color information with respect to the second position information for the plurality of samples, using a linear prediction coefficient calculated using a Yule-Walker method without applying a window function. The processor causes the memory to store information associating the frequency information, the first position information and the reference direction, as collation information.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Applicant: KABUSHIKI KAISHA DDSInventors: Kenji MIYOSHINO, Tatsuki YOSHIMINE, Noriyuki GONDA, Yuhei NIWA
-
Publication number: 20190228199Abstract: In accordance with at least one embodiment, a touch sensor is disclosed. The touch sensor includes a first electroconductive pattern including at least two electrodes. The touch sensor further includes a second electroconductive pattern configured to mask a portion of the first electroconductive pattern when positioned over or under the first electroconductive pattern. The second electroconductive pattern masks the portion of the first electroconductive pattern such that an unmasked portion of the first electroconductive pattern includes unmasked portions of the at least two electrodes. The unmasked portions are of approximately equal length.Type: ApplicationFiled: April 3, 2019Publication date: July 25, 2019Applicant: SEMICONDUCTOR COMPONENTS INDUSTRIES, LLCInventors: Takayasu OTAGAKI, Kazuyoshi ISHIKAWA
-
Publication number: 20190228200Abstract: An image capture module includes a light-permeable element, an image capture element, and a light-guiding element. The light-permeable element has a surface in contact with an environmental medium. The image capture element has a sensing pixel array. The light-guiding element is disposed at a position between the light-permeable element and the image capture element, and has a plurality of optical fibers. Each of the optical fibers has a core part and a shell part that is surroundingly disposed around the core part, the shell part is doped with a plurality of light-absorbing particles, and each of the optical fibers has a numerical aperture smaller than or equal to 0.7. An electronic device includes the image capture module and is configured to capture an image of an object.Type: ApplicationFiled: October 25, 2018Publication date: July 25, 2019Inventors: WEI-CHUN CHUNG, JEN-CHIEH WU
-
Publication number: 20190228201Abstract: An electronic device for distinguishing between fingerprint feature points and non-fingerprint feature points and a method for the same are provided. A plurality of feature points are extracted from a fingerprint input image, and non-fingerprint feature points are distinguished from fingerprint feature points and deleted. Accordingly, the electronic device for distinguishing between fingerprint feature points and non-fingerprint feature points and the method for the same can prevent non-fingerprint feature points from existing in a fingerprint registration template of a user, so as to protect fingerprint recognition from being affected by non-fingerprint feature points, thereby increasing safety and accuracy of identity authentication.Type: ApplicationFiled: November 19, 2018Publication date: July 25, 2019Inventors: YUAN-LIN CHIANG, YU-CHUN CHENG
-
Publication number: 20190228202Abstract: A method and a device for unlocking a fingerprint are provided. The method includes: controlling a predetermined light-emitting region of a display device to enter a first display mode upon receipt of external light, controlling the predetermined light-emitting region of the display device to enter a second display mode when the predetermined light-emitting region of the display device is pressed; and acquiring fingerprint information in the predetermined light-emitting region of the display device after the predetermined light-emitting region enters the second display mode, and determining whether to allow unlocking or not according to the fingerprint information.Type: ApplicationFiled: November 21, 2018Publication date: July 25, 2019Inventors: Yuanyuan CHAI, Yangpeng WANG, Weinan DAI, Yao HU, Yingsong XU
-
Publication number: 20190228203Abstract: A fingerprint sensor and an electronic device are provided. The fingerprint sensor includes a refractive member configured to refract light into a path toward at least one optical sensor, wherein the at least one optical sensor is configured to obtain the light, and a guide member disposed between the refractive member and the at least one optical sensor and configured to provide the path so that the refracted light is transmitted to the at least one optical sensor. The electronic device includes transparent cover; light source configured to output light toward transparent cover; refractive member configured to refract light into path toward at least one optical sensor; wherein at least one optical sensor is configured to obtain light; and guide member disposed between refractive member and at least one optical sensor and configured to provide path so that refracted light is transmitted to at least one optical sensor.Type: ApplicationFiled: January 22, 2019Publication date: July 25, 2019Inventors: Jeonghoo KIM, Suna KIM, Valeriy PRUSHINSKIY, Suk HYUN, Yongseok KIM, Changryong HEO
-
Publication number: 20190228204Abstract: A fingerprint sensor is disclosed. An embodiment according to an aspect of the present invention provides a display having a fingerprint recognition function. The display having a fingerprint recognition function may comprise: a display panel, which is disposed under a cover glass and allows rays to pass therethrough, the rays having various incident angles indicating ridges and troughs of a fingerprint that is in contact with the cover glass; and an image sensor layer, which is disposed under the display panel and detects a ray to be detected in the rays having the various incident angles to generate a fingerprint image.Type: ApplicationFiled: June 28, 2017Publication date: July 25, 2019Inventors: Kwang Sue PARK, Dong Wook NAM, Byung II MIN
-
Publication number: 20190228205Abstract: A method of determining presence of a skinprint uses an apparatus comprising: a primary electromagnetic radiation source; an electromagnetic radiation detector; and a translucent waveguide comprising a first surface providing a waveguide interface coincident with a skinprint receiving region.Type: ApplicationFiled: August 10, 2017Publication date: July 25, 2019Applicant: INTELLIGENT FINGERPRINTING LIMITEDInventors: Benjamin Gordon, Paul Wilson
-
Publication number: 20190228206Abstract: In a method for generating an estimated fingerprint image, a ridge/valley pattern of a fingerprint of a finger is received. A sensor image including a partial fingerprint of the finger is received. Ridge/valley characteristics of the fingerprint are extracted from the sensor image including the partial fingerprint. An estimated fingerprint image is generated based at least on the ridge/valley pattern of the fingerprint and the ridge/valley characteristics of the fingerprint.Type: ApplicationFiled: December 28, 2018Publication date: July 25, 2019Applicant: InvenSense, Inc.Inventors: Jonathan BAUDOT, Etienne De FORAS
-
Publication number: 20190228207Abstract: An electronic device is provided. The electronic device includes a touchscreen display, a pressure sensor positioned to sense external pressure against the display, a fingerprint sensor positioned to detect a fingerprint on at least a portion of the display, a processor electrically coupled to the display, the pressure sensor, and the fingerprint sensor, and a memory electrically coupled to the processor, in which the memory stores at least one registered fingerprint. The processor is configured to sense pressure of a user's finger against the display using the pressure sensor, upon sensing of the pressure, activate the fingerprint sensor, detect a fingerprint of the finger using the fingerprint sensor, determine whether the detected fingerprint is matched with any of the at least one registered fingerprint, and perform a preselected function without further requiring authentication, when the detected fingerprint is matched with any of the at least one registered fingerprint.Type: ApplicationFiled: April 3, 2019Publication date: July 25, 2019Inventors: Wan Ho ROH, So Young KIM, Dae Kwang JUNG
-
Publication number: 20190228208Abstract: A display device for displaying an image and a method by which the display device operates to display an image are provided. The display device may include a display configured to output a screen image, an image sensor configured to acquire an image signal, a bending detection sensor configured to detect a bending motion or a bent state of the display device, and a control unit configured to control the display to display an image, which is generated based on the image signal, in a region according to a position at which the display is bent on the screen image if the bending detection sensor detects the bending motion or a bent state.Type: ApplicationFiled: April 1, 2019Publication date: July 25, 2019Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Shi-yun Cho, So-young Kim, Woo-ram Jeon, Youn-ho Choi, Dae-myung Kim, Kyung-wan Park, Jae-young Huh
-
Publication number: 20190228209Abstract: The application discloses a lip movement capturing method and device and a storage medium. The method includes: acquiring a real-time image shot by a photographic device and extracting a real-time facial image from the real-time image; inputting the real-time facial image into a pretrained lip average model and recognizing t lip feature points representative of positions of lips in the real-time facial image; and calculating a movement direction and movement distance of the lips in the real-time facial image according to x and y coordinates of the t lip feature points in the real-time facial image. According to the application, movement information of the lips in the real-time facial image is calculated according to the coordinates of the lip feature points to implement real-time capturing of movements of the lips.Type: ApplicationFiled: October 31, 2017Publication date: July 25, 2019Inventors: Lin Chen, Guohui Zhang
-
Publication number: 20190228210Abstract: A face identification system includes a transmitter, a receiver, a database, an artificial intelligence chip, and a main processor. The transmitter is used for emitting at least one first light signal to an object. The receiver is used for receiving at least one second light signal reflected by the object. The database is used for saving training data. The artificial intelligence chip is coupled to the transmitter, the receiver, and the database for identifying a face image from the object according to the at least one second light signal and the training data. The main processor is coupled to the artificial intelligence chip for receiving a face identification signal generated from the artificial intelligence chip.Type: ApplicationFiled: January 22, 2018Publication date: July 25, 2019Inventor: Chun-Chen Liu
-
Publication number: 20190228211Abstract: The disclosure discloses an action unit (AU) feature recognition method, which includes: acquiring a real-time image shot by a photographic device and extracting a real-time facial image from the real-time image by use of a face recognition algorithm; inputting the real-time facial image into a pretrained facial mean shape and recognizing t facial feature points from the real-time facial image by use of the facial mean shape; determining feature regions matched with each AU in the real-time facial image according to positions of the t facial feature points, extracting local features from the feature regions and generating multiple feature vectors; and inputting the multiple feature vectors into pretrained AU classifiers matched with the feature regions respectively to obtain a prediction result of recognition of the corresponding AU features from the feature regions. The disclosure also discloses an electronic device and a computer-readable storage medium.Type: ApplicationFiled: September 30, 2017Publication date: July 25, 2019Inventors: Lin Chen, Guohui Zhang
-
Publication number: 20190228212Abstract: A wakeup method based on lip reading is provided, the wakeup method including: acquiring a motion graph of a user's lips; determining whether the acquired motion graph matches a preset motion graph; and waking up a voice interaction function in response to the acquired motion graph matching the preset motion graph.Type: ApplicationFiled: October 19, 2018Publication date: July 25, 2019Inventor: Liang Gao
-
Publication number: 20190228213Abstract: Systems and methods are provided for authenticating a user of a computing device. The system comprises one or more memory devices storing instructions, and one or more processors configured to execute the instructions to provide, to a computing device associated with a user, an indication of a prescribed authentication parameter. The system also receives image data including an image of the user of the computing device captured using an image sensor of the computing device. The system determines an identity of the user based on an analysis of the received image data, determines whether the received image data includes a feature corresponding to the prescribed authentication parameter, and authenticates the user based at least in part on whether the received image data includes the feature corresponding to the prescribed authentication parameter.Type: ApplicationFiled: December 12, 2018Publication date: July 25, 2019Inventor: Colin Robert MACDONALD
-
Publication number: 20190228214Abstract: The present application provides a gesture recognition method, a device, an apparatus and a storage medium. The gesture recognition method includes: acquiring coordinates of a center point of a gesture in an ith frame of image; determining whether the center point of the gesture in the ith frame of image is within a preset region; if yes, determining that coordinates of an actual center point of the gesture in the ith frame of image are coordinates of an actual center point of the gesture in the (i?1)th frame of image; wherein i is an integer greater than or equal to 2, and the preset region is a region taking the actual center point of the gesture in the (i?1)th frame of image as a center; and performing a dynamic-gesture recognition according to coordinates of an actual center point of the gesture in each frame of image.Type: ApplicationFiled: December 26, 2018Publication date: July 25, 2019Inventor: Chu XU
-
Publication number: 20190228215Abstract: Evaluating the engagement and attentiveness of persons in a group by preparing a streaming video of the group, extracting faces of the persons in the group, aligning the extracted faces, assigning an identity to each of the faces, recognizing the emotional state of each face by a temporal emotion recognition module, and estimating the attentiveness of each person based on the recognized emotional state of each face of each person. The estimated attentiveness may also include recognizing the gaze of each person.Type: ApplicationFiled: January 18, 2019Publication date: July 25, 2019Inventors: Peyman Najafirad, Arun Das
-
Publication number: 20190228216Abstract: A childcare support service offering system includes a terminal and a server. The terminal includes a camera and performs operation control and processing of transmitting terminal usage situation data including image data acquired by being picked up by the camera to the server. The server performs image analysis on the received image data, recognizes the user that watches the terminal, judges a gaze of the recognized user, and judges a degree of interest for the terminal based on the gaze. When the judged degree of interest becomes equal to or less than a predetermined threshold value, the server transmits a changing instruction for causing an operation in the terminal to be changed to another operation to the terminal.Type: ApplicationFiled: March 28, 2019Publication date: July 25, 2019Applicants: Kabushiki Kaisha Toshiba, Toshiba Digital Solutions CorporationInventors: Motokazu IWASAKI, Genki FUKATSU, Kazuhiro SHIMADA, Keisaku NAKAMURA, Satoko KIKUCHI, Masaru WATABIKI, Yuuka ASAUMI, Kanako MIYAWAKI, Masakazu KASHITA, Shinsuke IUCHI
-
Publication number: 20190228217Abstract: A method for waking up a voice interaction function based on a gesture includes: acquiring an image of a user's gesture; determining whether the acquired image matches a preset image; and waking up a voice interaction function in response to the acquired image matching the preset image.Type: ApplicationFiled: October 19, 2018Publication date: July 25, 2019Inventor: Liang Gao
-
Publication number: 20190228218Abstract: Methods, systems, and apparatuses, including computer programs encoded on a computer-readable storage medium for estimating the shape, size, and mass of fish are described. A pair of stereo cameras may be utilized to obtain right and left images of fish in a defined area. The right and left images may be processed, enhanced, and combined. Object detection may be used to detect and track a fish in images. A pose estimator may be used to determine key points and features of the detected fish. Based on the key points, a three-dimensional (3-D) model of the fish is generated that provides an estimate of the size and shape of the fish. A regression model or neural network model can be applied to the 3-D model to determine a likely weight of the fish.Type: ApplicationFiled: January 25, 2018Publication date: July 25, 2019Inventors: Barnaby John James, Evan Douglas Rapoport, Matthew Messana, Peter Kimball