Patents Issued in March 19, 2020
-
Publication number: 20200089901Abstract: A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. Whether the client application is authorized to access the trusted application is determined in view of the request. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.Type: ApplicationFiled: November 18, 2019Publication date: March 19, 2020Inventor: David Zeuthen
-
Publication number: 20200089902Abstract: Provided are a system and method of encrypting a folder in a device. The device for controlling access to the folder includes a communication part configured to transmit, to a server, an encryption key generation request with respect to the folder, and receive, from the server, an encryption key associated with the folder that is generated in response to the encryption key generation request, wherein the encryption key generation request includes an identification of the folder and authentication data of a user who accesses the folder is an authorized user; and a controller configured to authenticate the user by using the encryption key.Type: ApplicationFiled: November 18, 2019Publication date: March 19, 2020Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventor: Jung-kyuen LEE
-
Publication number: 20200089903Abstract: Data masking is provided by, for at least one predetermined data item in data to be sent, applying a one-way function to that data item to produce a first value, producing a masked data item by encrypting the first value via a deterministic encryption scheme using a current encryption key for a current epoch, and replacing that data item by the masked data item. A data-provider computer sends the masked data to the data-user computer. On expiry of the current epoch, the data-provider computer generates a new encryption key for the encryption scheme in a new epoch, produces mask-update data, dependent on the current and new encryption keys, and sends the mask-update data to the data-user computer. The mask-update data permits updating, at the data-user computer, of masked data items produced with the current encryption key into masked data items produced with the new encryption key.Type: ApplicationFiled: November 25, 2019Publication date: March 19, 2020Inventors: Christian Cachin, Jan L. Camenisch, Eduarda Freire Stögbuchner, Anja Lehmann
-
Publication number: 20200089904Abstract: A webpage content self-protection method includes: running a set of webpage elements of at least one webpage through a browser, wherein at least one portion of webpage elements within the set of webpage elements includes webpage contents of the aforementioned at least one webpage; monitoring a target webpage element within the set of webpage elements to determine whether any content variation event associated to the target webpage element occurs; when the content variation event occurs, storing previous data of the target webpage element, and generating a first password, wherein the first password is a one-time password; trying extracting a second password from the target webpage element, in order to perform password verification; and when failure of extracting the second password occurs or the first password and the second password are different from each other, recovering the target webpage element according to the previous data. An associated server is also provided.Type: ApplicationFiled: April 16, 2019Publication date: March 19, 2020Inventor: Geng-Bao Lin
-
Publication number: 20200089905Abstract: In some aspects, an entity-resolution computing system for entity resolution is provided. The entity-resolution computing system includes an entity resolution computing device configured as an interface between a client computing device and an encrypted identity data repository that contain resolved entity dataset. The entity resolution computing device is configured for servicing a resolution request from the client computing device by matching encrypted indexes generated from identity data objects stored in a client identity database to encrypted data objects stored in the encrypted identity data repository. The resolution computing device retrieves and transmits a common entity identifier associated with the encrypted data objects so that the client computing device can link the identity data objects stored in a client identity database via the common entity identifier.Type: ApplicationFiled: February 12, 2019Publication date: March 19, 2020Inventors: Gregory Dean JONES, Marek Ludomir CYZIO, Amy Michelle WORRELL
-
Publication number: 20200089906Abstract: A method generates, in a higher security domain (SD), public and secret keys using a first homomorphic encryption scheme (HES), passes the public key to a first shared security zone (SSZ) between the higher SD and a lower SD and through the first SSZ to a second entity in the lower SD, passes a plain text query from the higher SD to the first SSZ, encrypts the plain text query using a second HES, passes the encrypted plain text query to the second entity, performs an oblivious query to generate an encrypted result, and passes that from the lower SD to a second SSZ located between the higher and lower SDs, passes the secret key from the higher SD to the second SSZ, and decrypts the encrypted result using the secret key to generate a plain text result, and passes the plain text result to the higher SD.Type: ApplicationFiled: November 22, 2019Publication date: March 19, 2020Inventors: Graham A. BENT, Flavio A. BERGAMASCHI
-
Publication number: 20200089907Abstract: Systems, methods, and devices for implementing secure views for zero-copy data sharing in a multi-tenant database system are disclosed. :A method includes generating a share object in a first account comprising a share role. The method includes associating view privileges for the share object such that an underlying detail of the share object comprises a secure view definition. The method includes granting, to a second account, cross-account access rights to the share role or share object in the first account. The method includes receiving a request from the second account to access data or services of the first account and providing a response to the second account based on the data or services of the first account. The method is such that the underlying detail of the share object that comprises the secure view definition is hidden from the second account and visible to the first account.Type: ApplicationFiled: November 25, 2019Publication date: March 19, 2020Inventors: Allison Waingold Lee, Peter Povinec, Martin Hentschel, Robert Muglia
-
Publication number: 20200089908Abstract: A computer implemented method for digitally managing personal data comprises a data storage system and the steps of receiving a variety of digital and photographic copies of personal data, prompting manual input of certain personal data, prompting categorization of the received personal data, and permitting access to such personal data upon receipt of authenticating credentials. The personal data may be stored on a blockchain, in the cloud, or locally on a person's mobile computing device, such as a smart phone. A corresponding computer program product and computer system are also disclosed.Type: ApplicationFiled: September 14, 2018Publication date: March 19, 2020Inventor: Medhat Faltas
-
Publication number: 20200089909Abstract: A personal information protection device includes a communication unit connected to control devices of a vehicle for communication, and a controller configured to determine whether to approve data communication of a control device which intends to perform data communication with an outside device. The controller extracts first unique data stored when previous last data communication is performed from a first control device, extracts second unique data stored when previous last data communication is performed from a second control device, determines approval of data communication of the first control device if the extracted pieces of data are consistent with each other, and updates the first unique data on the basis of second unique data acquired at a data communication start time.Type: ApplicationFiled: November 13, 2018Publication date: March 19, 2020Applicants: Hyundai Motor Company, KIA Motors CorporationInventor: Zeung Il Kim
-
Publication number: 20200089910Abstract: The disclosure provides a method for privately annotating a thread of a conversation between a participant and at least one other participant in a computer-based chat function. The disclosure also provides a method for hiding one or more messages in an existing thread of a chat conversation.Type: ApplicationFiled: January 10, 2018Publication date: March 19, 2020Inventors: Ofir Paz, Erez Doron, Eyal Arbabof
-
Publication number: 20200089911Abstract: An information processing system is provided that publicizes individual-related information so that the individual cannot be identified. The information processing system includes: a database for storing individual-related publicized information; an information publicizing server; and a person meta data generator. In the information processing system connected to the outside via a network, a database is configured to store each piece of individual related publicized information together with a flag showing whether or not the information is publicized so that the individual cannot be identified. The person meta data generator is configured to generate person meta data based on the publicized information to be publicized so that the individual cannot be identified.Type: ApplicationFiled: March 30, 2018Publication date: March 19, 2020Inventor: Yoshimitsu Kagiwada
-
Publication number: 20200089912Abstract: A method and system for anonymizing data are disclosed. The method and system include receiving, at the wrapper, a request to store data in a data source. The wrapper includes a dispatcher and at least one service. The dispatcher receives the communication and is data agnostic. The method and system also include providing the request from the dispatcher to the at least one service and anonymizing, at the service(s), the data to provide anonymized data.Type: ApplicationFiled: August 22, 2019Publication date: March 19, 2020Inventors: Manav Ratan Mital, Srinivas Nageswarrao Vadlamani, Pramod Chandraiah
-
Publication number: 20200089913Abstract: A non-transitory computer-readable recording medium stores therein a program for causing a computer to execute a process that includes: obtaining data in which a value is set to at least a part of one or a plurality of items from a device coupled to the computer via a network; determining a management level to be applied to the data among a plurality of management levels of different information protection measure strengths based on an item name of each of the one or the plurality of items of the data and presence or absence of a setting of a value to each of the one or the plurality of items; and storing the data in a memory in association with management information indicating the management level applied to the data.Type: ApplicationFiled: August 28, 2019Publication date: March 19, 2020Applicant: FUJITSU LIMITEDInventor: Soichi Shigeta
-
Publication number: 20200089914Abstract: According to an embodiment, an information processing device includes a prior verifying unit, and an execution control unit. The prior verifying unit is configured to verify integrity of software registered in a whitelist at a timing which does not depend on an execution start of software and generate an execution permission list in which software which is successfully verified is registered as execution-permitted software. The execution control unit is configured to permit execution of the software if the software is registered in the execution permission list as the execution-permitted software when the execution start of the software is detected.Type: ApplicationFiled: February 27, 2019Publication date: March 19, 2020Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yoshihiro KOMATSUBARA, Shinya TAKUMI, Yoshikazu HANATANI, Jun KANAI
-
Publication number: 20200089915Abstract: Provided is a method and a system for the tamper-proof storage of information about object-related measures which are contained as transactions in transaction blocks that are interlinked in a transaction block chain of the object to which the measures relate, the transaction block chain being stored in an object data memory allocated to the object.Type: ApplicationFiled: January 4, 2018Publication date: March 19, 2020Inventor: RAINER FALK
-
Publication number: 20200089916Abstract: Aspects of the present disclosure relate to binding a hardware security module to a software component. A secret can be cryptographically linked to the software component. The secret linked to the software component can be protected such that the secret is only accessible by a trusted firmware. The software component can then be installed in a secure software context. The protected secret can be transferred to the trusted firmware. A control block can be maintained by the trusted firmware in the secure software context, wherein the control block comprises the secret. The hardware security module can then be configured by the trusted firmware such that the hardware security module only responds to requests from a component having access to the secret.Type: ApplicationFiled: September 14, 2018Publication date: March 19, 2020Inventor: Reinhard T. Buendgen
-
Publication number: 20200089917Abstract: A computer-implemented method according to one embodiment includes obtaining, at an untrusted environment, encrypted data from a storage location, initiating, within the untrusted environment, a performance of one or more secure computations on the encrypted data, and providing, within the untrusted environment, results of performing the one or more secure computations on the encrypted data.Type: ApplicationFiled: September 14, 2018Publication date: March 19, 2020Inventors: Dimitrios Skourtis, Deepavali M. Bhagwat
-
Publication number: 20200089918Abstract: A Secure World access method includes creating a first virtual machine (VM) in a Normal World, loading a plurality of programs in the Normal World to the first VM, where the plurality of programs include a kernel and at least one user program, the kernel runs in a first-level mode, the at least one user program runs in a second-level mode, and the first level is higher than the second level, when it is determined that a first user program in the at least one user program needs to access a Secure World, creating, in the Normal World, a second VM running in the first-level mode, and stripping the first user program from the first VM, and loading the first user program to the second VM such that the first user program accesses the Secure World using the second VM.Type: ApplicationFiled: November 21, 2019Publication date: March 19, 2020Inventor: Xiaoqiang Du
-
Publication number: 20200089919Abstract: A method for executing a polymorphic machine code, wherein: for each branching address at which a base block of a flow of generated instructions starts, the microprocessor automatically adds, in the generated flow of instructions, a renewal instruction suitable, when it is executed, for triggering the renewal of an initialization vector of a module for decryption by flow with a specific value associated with this branching address, then a flow encryption module encrypts the flow of instructions as it is generated and, during this encryption, each base block is encrypted using a specific value associated with the branching address at which it starts. Only the instruction flow encrypted in this way is recorded in the main memory. During execution of the encrypted instruction flow, the added renewal instructions are executed as they are encountered.Type: ApplicationFiled: December 14, 2017Publication date: March 19, 2020Applicant: COMMISSARIAT A L'ENERGIE ATOMIQUE ET AUX ENERGIES ALTERNATIVESInventors: Damien COUROUSSE, Thomas HISCOCK, Olivier SAVRY
-
Publication number: 20200089920Abstract: A method and electronic device are disclosed herein. The electronic device includes at least one connector, at least one switch electrically connected to the at least one connector, a sensor, a memory, and a processor electrically connected to the at least one connector, the at least one switch, the sensor, and the memory. The processor implements the method, including detecting insertion of an external device into the at least one connector based on an electrical signal input through the at least one connector, receiving biometric information using the sensor after detecting the insertion of the external device, and controlling a switch electrically connected to the connector to be connected to the connector into which the external device is inserted when the received biometric information matches biometric information stored in the memory.Type: ApplicationFiled: September 17, 2019Publication date: March 19, 2020Inventors: Heedong GANG, Jinhui PARK
-
Publication number: 20200089921Abstract: According to various aspects, systems and methods are provided for improving a computer system's resistance to tampering. A PUF may be one component of a system. Other components of the system may not have the same level of protection against tampering as the PUF. According to one aspect, tamper protection provided by the PUF may be extended to one or more other components of the system, thus creating a network of tamper-resistant components. The system may include a tamper detection circuit that receives signals from the component(s). The tamper detection circuit generates an output signal based on the received signals that indicates whether any of the components has been tampered with. The PUF may be configured to use the output signal to generate secret information. If the output signal indicates that one of the components has been tampered with, the PUF may prevent generation of the correct secret information.Type: ApplicationFiled: September 17, 2018Publication date: March 19, 2020Applicant: Analog Devices, Inc.Inventors: Deniz Karakoyunlu, Tze Lei Poo
-
Publication number: 20200089922Abstract: A device implementing a system for NFC communication with a second device includes an antenna and a processor configured to transmit a pulse signal for detection of another device within proximity of the device, and to detect, in conjunction with transmission of the pulse signal, that a first value of a measurement parameter of the antenna satisfies an initial detection factor. The processor is further configured, in response to the detection, to set a confirmation detection factor for the measurement parameter of the antenna based at least in part on the first value of the measurement parameter of the antenna, to transmit a confirmation pulse signal, and to initiate a second polling for reception of data from the other device when a second value of the measurement parameter of the antenna detected in conjunction with transmission of the confirmation pulse signal satisfies the confirmation detection factor.Type: ApplicationFiled: May 21, 2019Publication date: March 19, 2020Inventors: Vincent CHAUVIN, Peter M. AGBOH, Vusthla Sunil REDDY, Xinping ZENG
-
Publication number: 20200089923Abstract: An ore tag assembly including a tube subassembly having one or more tubes extending between first and second ends thereof and defining a cavity therein, and a RFID device located in the cavity. The ore tag assembly includes plugs positioned in the respective first and second ends of one of the tubes, to prevent ingress of liquids or other materials into the cavity.Type: ApplicationFiled: September 18, 2019Publication date: March 19, 2020Applicant: K4 Integration Inc.Inventors: Gilles Arsenault, Yvan Brule, Patrick Clement
-
Publication number: 20200089924Abstract: A reader includes a smartphone configured to read information from an image of a symbol included in a photographed image created by a camera module, and a unit attached to the smartphone. The unit includes a semiconductor laser to display a marker in a photographing range of the camera module. A user simply adjusts the orientation of the reader so that the marker overlaps on the symbol for reading processing of the smartphone, whereby information can be read from the symbol.Type: ApplicationFiled: July 3, 2017Publication date: March 19, 2020Inventor: Noriyuki SUZUKI
-
Publication number: 20200089925Abstract: This invention discloses a temperature-measuring scan head, comprising an enclosure, and its use method. There are supplementary lamp, image sensor and temperature sensor embedded on the end surface of the enclosure. The present scan head is as small as the existing scan heads on the market, but it has high-precision temperature sensor with built-in temperature-calibration module that promises temperature information collection. and accurate temperature measurement. Technically, the operator should use the scan head to scan the barcode of the objects or living things to be measured, and the scan head will read identity information and conduct temperature measurement. As such, temperature of the objects or living things corresponds to their respective identity, thereby guaranteeing the accuracy of data.Type: ApplicationFiled: November 4, 2016Publication date: March 19, 2020Inventors: Zhenhua Deng, Jiangtao Wei, Chao He, Zhenxi Wang
-
Publication number: 20200089926Abstract: A burning control system includes a capturing unit, a storing unit, a controlling unit, a processing unit, and a displaying unit. The capturing unit acquires product barcode information and burned barcode information relating to printed circuit board assembly (PCBA). The storing unit can store a program file corresponding to the burned barcode information. The controlling unit obtains product barcode information and the burned barcode information and outputs the burned barcode information to the processing unit. The processing unit writes the program file to a storage chip of the PCBA board. The displaying unit can display one of several prompts for a user's information. A burning control method is also provided.Type: ApplicationFiled: May 13, 2019Publication date: March 19, 2020Inventors: CHIH-HAO HUANG, KUO-LIN CHIEN, YEN-CHING LEE, CHIH-FENG LIOU
-
Publication number: 20200089927Abstract: An image capturing apparatus includes a light guide plate, a first light transmissive layer, a second light transmissive layer, a third light transmissive layer, a light source and an image capturing device. The light guide plate has a first surface and a second surface opposite to the first surface. The first light transmissive layer is disposed on the first surface. The second light transmissive layer is disposed on the second surface, wherein the second light transmissive layer is overlapped with a light transfer region of the light guide plate and not overlapped with a light penetration region of the light guide plate. The third light transmissive layer is disposed on the second surface and overlapped with the light transfer region and the light penetration region. Refractive indices of the third light transmissive layer and the light guide plate are higher than those of the first and second light transmissive layers.Type: ApplicationFiled: November 20, 2019Publication date: March 19, 2020Applicant: Gingy Technology Inc.Inventor: Jen-Chieh Wu
-
Publication number: 20200089928Abstract: Embodiments of the present application disclose an optical image capturing unit, an optical image capturing system, and an electronic device. The optical image capturing unit includes: a micro lens; a light shielding layer disposed under the micro lens, where the light shielding layer is provided with a window; and a photosensor disposed under the light shielding layer, where the micro lens is configured to converge an optical signal from above the micro lens to the window, and the optical signal is transmitted to the photosensor via the window. Technical solutions of embodiments of the present application could enhance performance of an optical image capturing product.Type: ApplicationFiled: November 21, 2019Publication date: March 19, 2020Inventor: Wei LONG
-
Publication number: 20200089929Abstract: An optical module includes a housing with a lighting mechanism, an aperture formed therein, and a window that frames a transparent surface adapted to contact a skin surface of a person, for example, a fingertip. The lighting mechanism provides light to illuminate the skin surface placed upon the transparent surface. A prism has a first side facing the lighting mechanism, a second side at the window, and a third side through which a dactylographic image exits the prism. One or more light reflecting surfaces are disposed within the housing to reflect the dactylographic image towards the housing aperture. The optical module is coupled to a mobile device having a camera, with the aperture of the housing aligning with a lens of the camera. The camera acquires the dactylographic image, and the mobile device adjusts this dactylographic image to produce a dactylographic image suitable for biometric matching.Type: ApplicationFiled: November 20, 2019Publication date: March 19, 2020Inventors: Taras P. RIOPKA, Robert MUNGOVAN, Limin MA, David BENINI
-
Publication number: 20200089930Abstract: A system for simplified generation of systems for analysis of satellite images to geolocate one or more objects of interest. A plurality of training images labeled for a study object or objects with irrelevant features loaded into a preexisting feature identification subsystem causes automated generation of models for the study object. This model is used to parameterize pre-engineered machine learning elements that are running a preprogrammed machine learning protocol. Training images with the study are used to train object recognition filters. This filter is used to identify the study object in unanalyzed images. The system reports results in a requestor's preferred format.Type: ApplicationFiled: August 6, 2019Publication date: March 19, 2020Inventors: Adam Estrada, Kevin Green, Andrew Jenkins
-
Publication number: 20200089931Abstract: An assessment and reporting system may utilize one or more scanning techniques to provide useful assessments and/or reports for structures and other objects. The scanning techniques may be performed in sequence and optionally used to further fine-tune each subsequent scan. The system may receive or determine a pitch of a surface of a structure or otherwise orthogonally align an optical axis of a camera with respect to a planar surface. An imaging system may capture perpendicular images of sample regions that have a defined area-squared.Type: ApplicationFiled: November 15, 2019Publication date: March 19, 2020Inventors: Jim Loveland, Leif Larson, Dan Christiansen, Tad Christiansen, Cam Christiansen
-
Publication number: 20200089932Abstract: A method for removing foreign matter from an agricultural product stream of a manufacturing process. The method includes conveying a product stream past an inspection station; scanning a region of the agricultural product stream as it passes the inspection station using at least one light source of a single or different wavelengths; generating hyperspectral images from the scanned region; determining a spectral fingerprint for the agricultural product stream from the hyperspectral images; comparing the spectral fingerprint obtained in step (c) to a spectral fingerprint database containing a plurality of fingerprints using a computer processor to determine whether foreign matter is present and, if present, generating a signal in response thereto; and removing a portion of the conveyed product stream in response to the signal. A system for detecting foreign matter within an agricultural product stream is also provided.Type: ApplicationFiled: November 20, 2019Publication date: March 19, 2020Applicant: Altria Client Services LLCInventors: Henry M. DANTE, Samuel Timothy HENRY, Seetharama C. DEEVI
-
Publication number: 20200089933Abstract: In a method of accessing a fingerprint recognition process of an electronic device having a display region, it executes the steps of: sensing a contact area of a finger touching the display region; comparing the contact area with a predetermined area; and accessing the fingerprint recognition process when the contact area is greater than the predetermined area.Type: ApplicationFiled: September 17, 2018Publication date: March 19, 2020Inventor: Chandra LIUS
-
Publication number: 20200089934Abstract: Systems and methods of identifying unknown video content are described. An example method may include receiving a first fingerprint and a second fingerprint. The first fingerprint may be a color-based fingerprint derived from colors in a portion of the unknown video content, and the second fingerprint may be at least partially based on a feature other than the colors of the unknown video content. A reference database of reference fingerprints may then be queried using one of the first fingerprint or the second fingerprint to obtain a candidate group of fingerprints. The candidate group of fingerprints may then be queried using the other of the first fingerprint and the second fingerprint to identify at least one query fingerprint. The unknown video content may then be identified using the at least one query fingerprint.Type: ApplicationFiled: November 22, 2019Publication date: March 19, 2020Inventors: Wilson Harron, Markus K. Cremer
-
Publication number: 20200089935Abstract: A body information analysis apparatus capable of indicating shading-areas includes: an image capturing module (12) for capturing an external image; a processor (10) electrically connected to the imager capturing module (12), stored multiple face types and multiple indicating processes respectively corresponding to each of the face types, wherein the processor (10) determines a face type of a face when the face is recognized in the external image, and executes one of the multiple indicating processes corresponding to the determined face type, so as to indicate shading-areas on the face; a mirror screen (11) for reflecting the face of a user; and, a display module (111) electrically connected to the processor (10) and arranged inside the mirror screen (11), for displaying the indicated shading-areas and the displayed shading-areas are overlapped with the face.Type: ApplicationFiled: November 21, 2019Publication date: March 19, 2020Inventors: Shyh-Yong SHEN, Min-Chang CHI, Hui-Teng LIN
-
Publication number: 20200089936Abstract: An image processing apparatus, an image processing method, and an image processing program capable of selecting an image having common characteristics with a previously selected image, and a recording medium storing the program are provided. In a case where an image of a child and a father captured together is included in common in a first image selected from a first image group and a second image selected from a second image group, a speech balloon 200 for notifying a user to select such an image IR1 from a target image group is displayed on a display panel 21 of a smartphone. In a case where the user selects the image IR1 of the child and the father captured together, common characteristics with a previously selected image are maintained.Type: ApplicationFiled: August 16, 2019Publication date: March 19, 2020Applicant: FUJIFILM CorporationInventors: Shimpei NODA, Tetsuya MATSUMOTO, Masaya USUKI
-
Publication number: 20200089937Abstract: The application provides a face recognition method and an electronic device using the method. The method includes: obtaining face information from an image frame in a video stream; determining whether a first similarity between pre-registration information and the face information is higher than a first similarity threshold; determining that face recognition is successful if the first similarity is higher than the first similarity threshold, and updating real-time registration information with the face information; and determining that face recognition fails if the first similarity is lower than the first similarity threshold, and then determining whether a second similarity between the real-time registration information and the face information is higher than a second similarity threshold, where the second similarity threshold is higher than the first similarity threshold.Type: ApplicationFiled: July 15, 2019Publication date: March 19, 2020Applicant: PEGATRON CORPORATIONInventor: YU-HUNG TSENG
-
Publication number: 20200089938Abstract: A computer-implemented method, system, and computer program product for determining a valence indication, the computer-implemented method comprising: selecting a number of areas, a number of thresholds, a number of points, a number of emotion models, a number of expression models, a number of algorithms; using the number of areas, the number of thresholds, the number of points, the number of emotion models, the number of expression models, and the number of algorithms to form a valence formula; retrieving a video stream from a camera in the particular area in the location; using the video stream, calculating a valence indication for each of a number of individuals having images in the video stream; and wherein the valence indication represents a predominant emotion of a number of individuals at a point in time in the particular area.Type: ApplicationFiled: September 14, 2018Publication date: March 19, 2020Inventor: Roberto Reznicek
-
Publication number: 20200089939Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining one or more data feed that includes data of individuals within a crowd, wherein the crowd comprises a plurality of individuals gathered within an area; examining data of the one or more data feed to return behavior parameter values for respective individuals of the plurality of individuals; identifying, using values of the behavior parameter values, a disrupted group of a plurality of the individuals of the crowd, wherein the identifying is in dependence on a first one or more criterion being satisfied; detecting, using values of the behavior parameter values, a disruptor individual within the disrupted group, the detecting in dependence on a second one or more criterion being satisfied; and providing, by machine logic, one more disruptor mitigation output to mitigate disruptive behavior of the disruptor individual.Type: ApplicationFiled: September 17, 2018Publication date: March 19, 2020Inventors: Cesar Augusto Rodriguez Bravo, Gregory J. Boss, Bernadette Pierson, Jayashree Vaidyanathan
-
Publication number: 20200089940Abstract: A behavior understanding system and a behavior understanding method are provided. The behavior understanding system includes a sensor and a processor. The sensor senses a motion of a human body portion for a time period. A sequence of motion sensing data of the sensor is obtained. At least two comparing results respectively corresponding to at least two timepoints within the time period are generated according to the motion sensing data. The comparing result are generated through comparing the motion sensing data with base motion data. The base motion data is related to multiple base motions. A behavior information of the human body portion is determined according to the comparing results. The behavior information is related to a behavior formed by at least one of the base motions. Accordingly, the accuracy of behavior understanding can be improved, and the embodiments may predict the behavior quickly.Type: ApplicationFiled: September 10, 2019Publication date: March 19, 2020Applicant: XRSPACE CO., LTD.Inventors: Yi-Kang Hsieh, Ching-Ning Huang, Chien-Chih Hsu
-
Publication number: 20200089941Abstract: Methods and systems for generating electronic signatures are disclosed. In some embodiments, the method includes: storing pixel features of a signing device; capturing, via an imaging device, a plurality of image frames including the pixel features of the signing device; identifying in the plurality of image frames, by a processor, first pixels matching the stored pixel features of the signing device; generating, by the processor, a first image including the identified pixels; and connecting, by the processor, the identified pixels to form at least one line drawing representing a signature.Type: ApplicationFiled: January 11, 2019Publication date: March 19, 2020Applicant: CAPITAL ONE SERVICES, LLCInventors: Joshua EDWARDS, Michael MOSSOBA
-
Publication number: 20200089942Abstract: A computer-implemented method and system for neural network-based recognition of trade workers present on industrial sites is presented.Type: ApplicationFiled: September 19, 2018Publication date: March 19, 2020Inventors: LAI HIM MATTHEW MAN, MOHAMMAD SOLTANI, AHMED ALY, WALID ALY
-
Publication number: 20200089943Abstract: A living body search system includes an unmanned moving body and a server connected to the unmanned moving body through a communication network. The unmanned moving body includes a camera, a moving means, and an image data processor. The image data processor is configured to detect a presence of a face of the living individual in an observation image taken by the camera, retrieve image data of the observation image, and transmit the retrieved image data to the server for facial recognition. The server includes a database configured to store individual identification information of the searched-for object, and an individual identifying means configured to compare the image data with the individual identification information to determine whether the living individual in the image data is the searched-for object.Type: ApplicationFiled: November 15, 2019Publication date: March 19, 2020Applicant: PRODRONE CO., LTD.Inventors: Kazuo ICHIHARA, Masakazu KONO
-
Publication number: 20200089944Abstract: An information processing apparatus includes a receiving unit and a controller. The receiving unit receives an extraction-area image indicating an extraction area. The extraction area includes a fill-in area in which a writer handwrites information. When an instruction to correct a recognition result for the information written in the fill-in area indicated by the extraction-area image is given, the controller causes a display unit to display a different extraction-area image similar to the extraction-area image.Type: ApplicationFiled: February 22, 2019Publication date: March 19, 2020Applicant: FUJI XEROX CO., LTD.Inventor: Shigekazu SASAGAWA
-
Publication number: 20200089945Abstract: An information processing apparatus includes an acquiring unit, a confirming unit, and a controller. The acquiring unit acquires a text recognition result with respect to a first image showing a document and a certainty factor indicating a certainty of the text recognition result. The confirming unit confirms the text recognition result if the certainty factor is above or equal to a threshold value. The controller controls an output of a warning for the text recognition result with respect to the first image in a case where the text recognition result and a text recognition result with respect to a second image showing a relevant document related to the document do not match even when the certainty factor is above or equal to the threshold value.Type: ApplicationFiled: February 12, 2019Publication date: March 19, 2020Applicant: FUJI XEROX CO.,LTD.Inventor: Takumi KITAMURA
-
Publication number: 20200089946Abstract: Disclosed is system for extracting tabular data from electronic document, system having data processing arrangement comprising: tabular data detection module that is operable to: (i) receive electronic document; (ii) determine location of tabular data within electronic document; and (iii) extract image of tabular data from electronic document; and tabular data extraction module that receives extracted image of tabular data from tabular data detection module, wherein tabular data extraction module is operable to: (i) convert received image of tabular data into greyscale image; (ii) extract grid structure from greyscale image; (iii) remove grid structure from greyscale image; (iv) determine position for placement of horizontal and vertical lines in greyscale image; (v) generate horizontal and vertical lines on greyscale image; (vi) perform optical character recognition of text associated with tabular data from received image; and (vii) extract tabular data by combining information of grid structure with text, tType: ApplicationFiled: March 27, 2019Publication date: March 19, 2020Inventors: Shubhojit Mallick, Kedar Bartake, Omkar Kumbhar
-
Publication number: 20200089947Abstract: Systems and methods for assessing similarity of documents are provided. Embodiments of the systems and methods include extracting a reference document text from a reference document, extracting an archived document text from an archived document, and quantifying the reference document and the archived document. The systems and methods may also include determining a document similarity value of the quantified reference document and the archived document. Determining the document similarity value includes calculating a set of vector similarity values for a set of combinations of a reference document text vector and an archived document text vector, and calculating the document similarity value, including a sum of the plurality of vector similarity values.Type: ApplicationFiled: November 22, 2019Publication date: March 19, 2020Inventors: Jeroen Mattijs van Rotterdam, Michael T. Mohen, Chao Chen, Kun Zhao
-
Publication number: 20200089948Abstract: A method includes obtaining a filtered waveform signal, marking the waveform signal as K signal line segments based on monotonicity, extracting line segment data of each signal line segment, and determining a line segment matching template of the waveform signal based on the line segment data of each signal line segment, where the line segment matching template includes M consecutive signal line segments, and M is an integer less than K. The method further includes matching each of the K signal line segments with the M signal line segments included in the line segment matching template, and determining a target wave group of the waveform signal based on a matching result of each signal line segment. The method further includes determining periodic signal data of the waveform signal based on line segment data of the target wave group.Type: ApplicationFiled: July 29, 2017Publication date: March 19, 2020Inventors: Chen Dong, Jie Zhang, Chao Lv, Yixin Chen, Peida Xu
-
Publication number: 20200089949Abstract: According to one embodiment, a model update support system supports an update of a first model trained using a training data group. The training data group includes a plurality of labeled data and includes a plurality of labels respectively labeling the plurality of labeled data. The system includes a processor. The processor is configured to output first information or second information based on a classification certainty and a plurality of similarities. The classification certainty is calculated using the first model and indicates a sureness of a classification of first data. The plurality of similarities respectively indicates likenesses between the first data and the plurality of labeled data. The first information indicates that the training of the first model is insufficient. The second information indicates that one of the plurality of labels is inappropriate.Type: ApplicationFiled: February 27, 2019Publication date: March 19, 2020Inventor: Takahiro Takimoto
-
Publication number: 20200089950Abstract: The present invention provides a technology that acquires a high resolution iris image more quickly than before. An iris capture apparatus according to one example embodiment of the present invention includes a rotatable movable mirror; a control unit that controls rotation of the movable mirror; a capture unit that captures different regions of a face of a user via the movable mirror and outputs a group of images every time the control unit rotates the movable mirror by a predetermined angle; and an iris image acquisition unit that acquires an image of an iris of the user from the group of images.Type: ApplicationFiled: November 20, 2019Publication date: March 19, 2020Inventors: Leiming SU, Hiroaki MORITA, Mamoru INOUE