US Pat. No. 10,217,088

MAINTENANCE SUPPORT METHOD, MAINTENANCE SUPPORT SYSTEM, AND MAINTENANCE SUPPORT PROGRAM

Kabushiki Kaisha Toshiba,...

1. A maintenance support method performed by a wearable device including a first camera and a second camera, which shoot different directions, and an information processing apparatus, the method comprising:causing the wearable device to detect identification information of a maintenance target position from a first image shot by the first camera and transmit the identification information and a second image shot by the second camera to the information processing apparatus in correspondence with the detection of the identification information; and
causing the information processing apparatus to receive the identification information and the second image, determine, based on the second image, a situation of a user who wears the wearable device, and record the situation of the user in association with the identification information,
wherein the wearable device detects a two dimensional barcode of the maintenance target position from the first image, and transmits an ID of the two dimensional barcode, a detection start time and a detection end time of the two dimensional barcode, the second image, and a shooting time of the second image to the information processing apparatus, and
the information processing apparatus receives the ID, the detection start time, the detection end time, the second image, and the shooting time, determines the situation of the user based on the detection start time, the detection end time, the second image, and the shooting time, and records the situation of the user in association with the identification information.

US Pat. No. 10,217,087

MULTICOMPUTER PROCESSING OF CLIENT DEVICE REQUEST DATA USING CENTRALIZED EVENT ORCHESTRATOR

Bank of America Corporati...

1. A computing platform, comprising:at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:
receive, via the communication interface, from a first client computing device, first event definition information defining a first event, the first event definition information comprising first stimulus selection information associated with the first event;
receive, via the communication interface, from a first recipient computing device associated with the first event, a first request for a recipient-selection user interface;
based on receiving the first request for the recipient-selection user interface from the first recipient computing device associated with the first event, identify one or more stimulus options available for a first user of the first recipient computing device associated with the first event based on the first stimulus selection information associated with the first event;
based on identifying the one or more stimulus options available for the first user of the first recipient computing device associated with the first event, send, via the communication interface, to the first recipient computing device associated with the first event, a first delivery selection user interface, the first delivery selection user interface comprising a first user-selectable component that, when invoked, causes the computing platform to create a first new endpoint associated with a first stimulus option of the one or more stimulus options identified as being available for the first user of the first recipient computing device associated with the first event;
receive, via the communication interface, from the first recipient computing device associated with the first event, first delivery selection information, the first delivery selection information comprising information indicating that the first user-selectable component has been invoked, and the first delivery selection information comprising information identifying the first new endpoint associated with the first stimulus option as a first destination for the first event selected by the first user of the first recipient computing device associated with the first event;
based on receiving the first delivery selection information from the first recipient computing device associated with the first event, generate, based on the first delivery selection information, one or more first event orchestration commands directing an event processor to execute one or more actions associated with the first event; and
send, via the communication interface, to the event processor, the one or more first event orchestration commands directing the event processor to execute the one or more actions associated with the first event.

US Pat. No. 10,217,086

HIGHLY SCALABLE EVENT BROKERING AND AUDIT TRACEABILITY SYSTEM

GOLBAL HEALTHCARE EXCHANG...

1. A method for managing electronic business documents, the method comprising:obtaining, by a computer-based system, an internal reference number off of an electronic business document, wherein the internal reference number includes at least one of a vendor internal identifier and a client internal identifier;
creating, by the computer-based system, a first event associated with the electronic business document, wherein the first event represents at least one of a state of the electronic business document, a signature verification, an organizational change or a system notification;
detecting, by the computer-based system, the first event;
determining, by the computer-based system, a first action to perform based on the detecting of the first event, wherein the first action includes verifying a structure of the electronic business document based on configurable metadata;
performing, by the computer-based system, the first action;
determining, by the computer-based system, a failed processing of the first event;
re-processing, by the computer-based system and in response to the failed processing, the first event;
creating, by the computer-based system, a second event based on a performance of the first action;
creating, by the computer-based system, an event flow including the first event and the second event;
receiving, by the computer-based system, a request for a status of the electronic business document within the event flow;
searching, by the computer-based system, data within the electronic business document and the configurable metadata about the electronic business document;
displaying, by the computer-based system and based on the searching, the configurable metadata; and
routing, by the computer-based system and based on the searching, the electronic business document.

US Pat. No. 10,217,085

METHOD AND APPARATUS FOR DETERMINING SOCIAL NETWORKING RELATIONSHIPS

NOKIA TECHNOLOGIES OY, E...

1. A method for developing social networking relationships in a social network based on a media content and biometric data, the method comprising:receiving a request from a user equipment of a user associated with the social network specifying a media content associated with one or more people;
initiating electronic processing of the media content to attempt to recognize the one or more people by extracting, utilizing at least one processor, biometric data of the one or more people represented in the media content using one or more computer algorithms configured to extract the biometric data,
wherein the extracted biometric data is associated with one or more intrinsic physical traits of the one or more people as represented in the media content;
comparing the extracted biometric data with other biometric data associated with one or more members of the social network to attempt to recognize the one or more people represented in the media content as being at least one of the one or more members of the social network;
determining whether the extracted biometric data and the other biometric data match within a predetermined error threshold,
wherein the determining is based on the comparing the one or more intrinsic physical traits represented in the biometric data of the one or more people and any corresponding physical traits represented in the other biometric data of the one or more members;
transmitting an option message for presentation at the user equipment configured to develop a social networking relationship based on the determining.

US Pat. No. 10,217,083

APPARATUS, METHOD, AND PROGRAM FOR MANAGING ARTICLES

Kabushiki Kaisha Toshiba,...

1. An apparatus for managing articles, comprising:processing circuitry configured to:
acquire a check image by capturing an image of a shelf on which a plurality of articles are arranged and labels which are installed on a front surface of the shelf or front surfaces of the articles and include label information of a character string including one of letters, numbers, and symbols provided to manage the articles;
acquire plan data including a plurality of plan areas indicating installation positions of the labels in the shelf and the label information of the labels assigned to the respective plan areas;
detect a character area of the character string displayed on each of the labels from the check image;
recognize characters in the character areas;
position and superimpose the check image and the plan data, and associate each of the character areas and each of the plan areas;
compare the label information of the associated plan areas and the recognition information of the associated character areas, and assign attributes to the character areas or the plan areas, each of the attributes indicating a state related to correctness or incorrectness of installation of the articles which can be obtained from matching or mismatching between the label information and the recognition information;
obtain a distance between the character area and the plan area;
obtain a matching ratio from a matching degree between the recognition information of the character area and the label information of the plan area;
obtain a detection likelihood indicating the accuracy of characters in the character area;
obtain a recognition score indicating the correctness of the character recognition;
obtain an importance degree of a correction work of installation of the articles based on the distance, the matching ratio, the detection likelihood, and the recognition score; and
assign the importance as an attribute to the character area or the plan area.

US Pat. No. 10,217,082

INVENTORY TRACKING

WALMART APOLLO, LLC, Ben...

1. A non-transitory computer readable medium storing one or more programs configured for execution by an electronic device, the one or more programs comprising instructions that, when executed, perform acts of:receiving a first item inventory level quantity for a first item;
storing the first item inventory level quantity at an inventory database;
comparing the first item inventory level quantity with a predetermined high threshold;
when the first item inventory level quantity is less than the predetermined high threshold, transmitting a first Limited Stock Alert to an inventory cache;
at the inventory cache, storing a first inventory status corresponding to the first item inventory level quantity;
at the inventory cache, storing (a) a second inventory status corresponding to a second item inventory level quantity for a second item, and (b) the second item inventory level quantity for the second item, wherein:
the second item inventory level quantity is different than the first item inventory level quantity;
the second item is available only after a starting date; and
the second item comprises at least one of:
a holiday item;
a seasonal item; or
a limited stock item; and
after the starting date, transmitting the second inventory status from the inventory cache.

US Pat. No. 10,217,081

PROXIMITY AUDITING OF STORAGE LIBRARY CARTRIDGE MAGAZINES

ORACLE INTERNATIONAL CORP...

1. A system for auditing removable cartridge magazines in a storage library system, the system comprising:a robotic assembly operable to ferry media cartridges in the storage library system;
a proximity sensor integrated with the robotic assembly, the robotic assembly being further operable to move the proximity sensor to search for a structural feature that is present when a corresponding removable cartridge magazine is installed in an installation location of the storage library system; and
a processor having a proximity sensor input and a cartridge audit output,
wherein the cartridge audit output indicates presence of the corresponding removable cartridge magazines in the installation location in response to detection of the structural feature by the proximity sensor,
wherein the proximity sensor comprises an optical source to generate an optical transmission and an optical sink to receive the optical transmission after reflection of the optical transmission off an object in proximity to the proximity sensor,
wherein the optical source and the optical sink are pointed so that the reflected optical transmission is received at a magnitude exceeding a threshold level only when an object is within a predefined distance range from the proximity sensor, and
wherein the proximity sensor is integrated with the robotic assembly so that the structural feature is within the predefined distance range from the proximity sensor when the corresponding removable cartridge magazines in the installation location and the robotic assembly is substantially in an audit position.

US Pat. No. 10,217,080

ITEM CLASSIFICATION USING VISIBLE ATTRIBUTES

Amazon Technologies, Inc....

1. A system, comprising:one or more computing devices configured to implement an item classification system, wherein the item classification system is configured to:
analyze item descriptions of a plurality of items in a catalog to determine a plurality of terms corresponding to respective classifications of a plurality of classifications of a hierarchical taxonomy in which the items are already classified such that individual ones of the plurality of terms correspond to individual ones of the plurality of classifications in the hierarchical taxonomy, wherein the item descriptions include visible terms to display to users when accessing the catalog according to the hierarchical taxonomy;
receive, from a new item submitter, a description of a new item and a requested classification for the new item to be added to the catalog in the hierarchical taxonomy, wherein the received description of the new item comprises a plurality of visible terms for display to users when accessing the catalog, and wherein the received requested classification is not part of the received description comprising visible terms and comprises one of the plurality of classifications in the hierarchical taxonomy;
compare the received visible terms for the new item to the plurality of terms determined from the items descriptions for the plurality of items already classified to automatically select one or more of the plurality of classifications in the hierarchical taxonomy as one or more candidate classifications for the new item irrespective of the received requested classification;
assign the new item to at least one of the candidate classifications in the hierarchical taxonomy; and
generate an interactive webpage based at least in part on the hierarchical taxonomy, wherein the interactive webpage can be modified via user input to navigate the items in the catalog according to their classifications.

US Pat. No. 10,217,079

SYSTEMS AND METHODS FOR CONFIRMING AN IDENTITY OF AN INDIVIDUAL, FOR EXAMPLE, AT A LOCKER BANK

United Parcel Service of ...

1. A computer-implemented method for directing one or more parcels having a consignee to a suitable locker bank location and facilitating a release of the one or more parcels from the suitable locker bank location, the method comprising:receiving, by a processor, a first indication that delivery of one or more parcels is not possible to the consignee at a primary delivery location;
determining, by a processor, a suitable locker bank location based at least in part on the primary delivery location;
facilitating delivery of the parcel to the suitable locker bank location;
receiving, by a processor, from a computing device associated with the suitable locker bank location, a first request to deliver the one or more parcels to the suitable locker bank location;
at least partially in response to receiving the first request, unlocking, by a processor, one or more lockers at the suitable locker bank location;
receiving, by a processor, a second indication that the one or more parcels have been placed in a particular one of the one or more lockers;
at least partially in response to receiving the second indication, associating, by a processor, the one or more parcels with the particular one of the one or more lockers;
receiving, by a processor, from an individual at the computing device associated with the suitable locker bank, a second request to retrieve the one or more parcels from the particular one of the one or more lockers;
at least partially in response to receiving the second request, confirming an identity, by a processor, of the individual as an individual authorized to retrieve the one or more parcels, wherein confirming the identity comprises:
receiving, by a processor, one or more pieces of package level detail information that at least partially identifies the consignee;
receiving, by a processor, one or more pieces of identifying information associated with the individual;
comparing, by a processor, the one or more pieces of package level detail information with the one or more pieces of identifying information to determine whether the one or more pieces of identifying information at least partially match the one or more pieces of package level detail information;
at least partially in response to determining that the one or more pieces of identifying information at least partially match the one or more pieces of package level detail information, at the suitable locker bank location, confirming the identity of the individual as the one or more individuals authorized to retrieve the one or more parcels for the consignee, wherein confirming the identity of the individual comprises:
receiving identifying data from a mobile device associated with the individual, the identifying data being unique to the individual and including at least a current location of the individual,
using the identifying data to confirm the identity of the individual, and
using the current location of the individual to confirm that the individual is at the suitable locker bank location; and
at least partially in response to confirming the identity of the individual, facilitating, by a processor, the release of the one or more parcels from the particular one of the one or more lockers to the individual, wherein facilitating the release of the one or more parcels from the particular one of the one or more lockers to the individual comprises substantially automatically unlocking a door of the particular one of the one or more lockers containing the one or more parcels to provide the individual with physical access to an interior of the particular one of the one or more lockers.

US Pat. No. 10,217,078

BLOCKCHAIN SYSTEM AND METHOD FOR CALCULATING LOCATION OF TIME-CRUCIAL SHIPMENTS ACCORDING TO EXPECTATION AND SMART CONTRACTS

1. A client-server system for calculating whether a time-crucial shipment is located according to an expectation comprising:a client device adapted for being adhered to or placed within a time-crucial package shipment; and
a remote special purpose computer server,the client device comprising:a Wi-Fi receiver adapted to receive identification data of one or more nearby Wi-Fi access points; a Wi-Fi signal receiving antenna;
an accelerometer;
a GSM radio module with antenna which connects to mobile carrier networks; and
a microcontroller programmed to:
detect movement by the accelerometer; and
automatically transmit via the GSM radio module to the remote special purpose computer server the received identification data from the measured access points and signal strength data when a change in movement is detected by the accelerometer;the remote special purpose computer server comprising:a transit plan schedule database based on pickup time and location stored in memory;
a Wi-Fi access point location database accessed by an API;
a GSM gateway; and
a processor programmed to:
calculate a location of the client device based on data accessed from the Wi-Fi access point location database, the transmitted identification data, and the transmitted signal strength data; and
compare the calculated location to an expected location based on common carrier schedule transit plan pickup time and delivery location received from third party database sources.

US Pat. No. 10,217,077

SYSTEM AND METHOD FOR PROVIDING INFORMATION REGARDING A STATUS OF AN ITEM

Aethon, Inc., Pittsburgh...

1. A system, comprising:an apparatus configured for transporting an item from a first location to a second location within a facility, wherein the item comprises a medication;
at least one automated device proximate to and in wireless communication with the apparatus at the first or second location, wherein the at least one automated device comprises at least one automated medicine dispenser;
an interface connected to the apparatus, the interface being configured to wirelessly communicate with the at least one automated device, wherein when the apparatus is proximate to the at least one automated device the interface transmits an instruction to the at least one automated device to display a list of items that requires replenishment; and
a computing system wirelessly connected to the apparatus, wherein the computing system comprises:
a processor;
a first module communicably connected to the processor, wherein the first module is configured for receiving, from the apparatus, chain of custody information associated with the item;
a second module communicably connected to the processor, wherein the second module is configured for determining a delivery status of the item based on the received chain of custody information; and
a third module communicably connected to the processor, wherein the third module is configured for:
arranging data into a specified format, wherein the data comprises the delivery status of the item and the chain of custody information; and
transmitting the data.

US Pat. No. 10,217,076

AUTOMATICALLY CACHING AND SENDING ELECTRONIC SIGNATURES

International Business Ma...

1. A computer-implemented method comprising:storing, by one or more computer processors in a mobile device, a digital signature, wherein the digital signature is associated with information relating to an expected delivery at an expected location, wherein the digital signature includes a tag with information relating to the expected delivery, wherein the tag is utilized in determining that a package corresponds to the expected delivery, wherein the information relating to the expected delivery includes a tracking number, an order number, a merchant or seller, a time of purchase, a delivery company, and an expected date for delivery, and wherein the mobile device is located within a proximity of the expected location;
detecting, by one or more computer processors in the mobile device, that a delivery service has arrived at the expected location with the package, wherein detecting that a delivery service has arrived at the expected location with a package includes:
detecting a sound emitted by a doorbell or a knocking sound on a door,
receiving an indication from a smart doorbell that a delivery service has arrived with the package,
receiving an input from a security camera, and
receiving a transmission from a delivery device relating to the package; and
in response to determining, by one or more processors in the mobile device, that the package corresponds to the expected delivery, authorizing, by one or more processors in the mobile device, the package to be left at the expected location by transmitting the digital signature to a delivery device associated with the delivery service, wherein the transmitting of the digital signature to the delivery device is performed using near-field communication (NFC), and wherein the authorizing is further in response to detecting that an intended recipient of the expected delivery is unavailable to answer the door to sign for the package;
wherein detecting that the intended recipient of the expected delivery is unavailable to answer the door to sign for the package comprises:
determining a proximity value of the intended recipient in relation to the expected location, wherein the proximity value is determined based a location of the mobile device and whether the mobile device is connected to a same network as a smart doorbell installed at the expected location,
determining whether a security system is armed,
determining whether any movements are detected inside a home by one or more motion detectors or one or more security cameras,
determining whether water is running inside the home, and
determining whether any appliances inside the home are being used.

US Pat. No. 10,217,075

TRANSPORTING PACKAGES USING LIGHT GUIDED OPERATIONS

Amazon Technologies, Inc....

1. A package management system, comprising:an inventory tracking system comprising a package database for tracking locations of a plurality of packages in a warehouse;
an event detecting device configured to detect a package transport event corresponding to a first package of the plurality of packages and transmit an indication of the event to the inventory tracking system, wherein the inventory tracking system uses the package database to identify a container assigned to the first package, wherein the container is used to store the first package and has a form factor that can contain multiple packages; and
a gateway comprising a wireless transmitter, wherein the gateway is configured to:
receive an identification of the container from the inventory tracking system,
select a guidance device from a plurality of guidance devices in wireless range of the gateway based on the identification of the container, and
transmit a wireless signal to the selected guidance device uniquely assigned to the container using the wireless transmitter; and
wherein each of the plurality of guidance devices is disposed in a predefined spatial relationship with a respective container, wherein each of the plurality of guidance devices comprises a body containing a wireless receiver and a light, wherein the selected guidance device is configured to receive the wireless signal and illuminate the light.

US Pat. No. 10,217,074

MODULAR AUTOMATED INVENTORY SORTING AND RETRIEVING

Amazon Technologies, Inc....

1. An inventory management system, comprising:a workspace;
a plurality of drive units operable to navigate the workspace; and
a plurality of inventory holders capable of supporting inventory thereon and capable of being transported by the one or more drive units;
a drive unit-navigable grid in the workspace and defining areas where the drive units can navigate;
a modular sorting station comprising:
a frame defining a first inbound bay and a first outbound bay, wherein each bay is sized to accommodate a drive unit of the one or more drive units with a supported inventory holder containing inventory, and wherein each bay is aligned with the drive unit-navigable grid;
a sensor connected with the modular sorting station and operable to identify the inventory;
a unique identifier associated with the modular sorting station; and
a robotic grasper operable to grasp inventory from the inbound bay and release the inventory at the outbound bay; wherein the robotic grasper further comprises at least two robotic arms mounted to respective gantries above the inbound and outbound bays defined by the frame and
a management component configured with executable instructions, in order to, at least:
maintain a virtual representation of the workspace including a first grid position associated with the unique identifier of the modular sorting station;
receive information relating to an inventory item in the inventory system;
instruct a first drive unit of the one or more drive units to retrieve a first inventory holder containing the inventory item;
instruct the first drive unit to transport the first inventory holder to the inbound bay of the modular sorting station based on the grid position associated with the unique identifier of the modular sorting station;
sense, via the sensor, the inventory item in the first inventory holder; and
cause the robotic grasper to move the inventory item from the first inventory holder to the outbound bay of the modular sorting station.

US Pat. No. 10,217,073

MONITORING TRANSACTIONS FROM DISTRIBUTED APPLICATIONS AND USING SELECTIVE METRICS

Oracle International Corp...

1. A non-transitory computer-storage medium storing computer-executable instructions that when executed by a computer cause the computer to:execute a first application that monitors one or more executing transactions that execute across distributed applications;
for a given one of the executing transactions, in response to a given function call of a plurality of function calls for the given one of the executing transactions being executed by a given computer component that executes another function call to another computer component during the executing transaction causing the other computer component to execute a process for the other function call:
collecting aggregate metrics from execution of the given function call and the other function call during the executing transaction;
collecting instance metrics for the plurality of function calls and tracking a cumulative time spent for processing the plurality of function calls;
filtering the instance metrics by (i) identifying a name of each function call of a subset of N function calls from the plurality of function calls that consumed an amount of time meeting a threshold and (ii) selecting the instance metrics for the subset of N function calls;
wherein the filtering discards the instance metrics from unselected function calls that did not consume enough time to meet a threshold in the plurality of function calls; and
aggregating the instance metrics of the subset of N function calls to form a set of aggregate instance metrics for each function in the subset of N function calls, wherein the aggregate instance metric for each function in the subset of N function calls includes data characterizing a number of times that a respective function is called;
controlling transmission of the instance metrics over network communications to a remote monitoring server by transmitting the instance metrics for the selected subset of N function calls according to the filtering.

US Pat. No. 10,217,072

ASSOCIATION-BASED PRODUCT DESIGN

International Business Ma...

1. A non-transitory computer-readable medium storing instructions which, when executed by a processor, cause the processor to perform a method for designing a new product, the method comprising:automatically identifying, by a processor, a plurality of components of stored products, wherein the plurality of components is associated with an existing component included in a design of the new product;
automatically selecting, by the processor, a new component from among the plurality of components, wherein an association between the existing component and the new component optimizes a design objective for the new product;
automatically adding, by the processor, the new component to the design for the new product, wherein a result of the automatically adding is a complete design for the new product;
receiving, by the processor, human feedback relating to the complete design for the new product; and
repeating, by the processor, at least one of the automatically identifying, the automatically selecting, or the automatically adding, in response to the human feedback, in order to modify the complete design.

US Pat. No. 10,217,071

REDUCING CYBERSECURITY RISK LEVEL OF A PORTFOLIO OF COMPANIES USING A CYBERSECURITY RISK MULTIPLIER

SecurityScorecard, Inc., ...

20. A non-transitory computer-readable storage medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations for providing an interactive tool to dynamically determine and modify a cybersecurity risk level of a portfolio of companies, the operations comprising:determining an initial cybersecurity risk level for the portfolio of companies;
identifying at least one company that experienced a cybersecurity risk event during a certain time period;
identifying:
at least one attribute common to the at least one identified company that experienced the cybersecurity risk event and a plurality of companies in the portfolio of companies, and
a degree of mutuality of the at least one attributes;
determining a probability that another cybersecurity risk event will occur with respect to the plurality of companies in the portfolio of companies, where the probability depends on:
the number of identified common attributes, and
degrees of mutuality of the number of identified attributes;
generating, from the determined probability, a cybersecurity risk multiplier for the portfolio of companies;
generating a refined cybersecurity risk level that is a function of the initial cybersecurity risk level and the cybersecurity risk multiplier;
determining one or more actions to reduce the refined cybersecurity risk level; and
displaying, to a user, an interactive tool that enables the user to view:
the refined cybersecurity risk level for the portfolio of companies;
the one or more actions that the user can take to reduce the refined cybersecurity risk level and the effect that the one or more actions have on the refined cybersecurity risk level, and
execute at least one action of the one or more actions to reduce the refined cybersecurity risk level.

US Pat. No. 10,217,070

SYSTEM AND METHOD FOR PROCESSING INFORMATION AND MENTORING PEOPLE

1. A method for processing information for providing mentoring services to at-risk people, comprising the steps of:receiving, via a user interface of an application executing on one or more computer processors, a personal profile concerning an at-risk subject, wherein the personal profile comprises personal data, a risk profile comprises a plurality of risk factors and a plurality of mentee matching tags;
assigning, via the one or more computer processors, a risk point value to each of the plurality of risk factors based on severity level of the subject's risk factors and a risk point matrix stored on a memory device accessible by the one or more computer processors, wherein the risk point matrix is generated using ontology related artificial intelligence and a risk database reflecting risks of other subjects compared to their later successes or failures, and estimated lifetime costs to society;
determining, via the one or more computer processors, a total risk point value of the at-risk subject via the one or more computer processors;
accepting the at-risk subject as a mentee candidate, if the total risk point value satisfies a pre-determined threshold value;
searching, via the one or more computer processors, a mentor candidate database comprising a plurality of mentor profiles, wherein each mentor profile comprises personal data, mentoring experience and a plurality of mentor matching tags;
assigning, via the one or more computer processors, at least one mentor candidate to the mentee candidate, wherein the at least one mentor candidate is selected based on a match between the mentee matching tags and the mentor matching tags, where in the match is performed using a matching algorithm;
submitting the at least one assigned mentor candidate to an oversight board for approval;
receiving, via the user interface of the application, the at-risk subject's progress report after the establishment of a mentor-mentee relationship;
comparing, via the one or more computer processors, the at-risk subject's progress to at-risk individual success odds or ex-convict success odds stored on a memory device accessible by the one or more computer processors;
obtaining, via the one or more computer processors, (1) the at-risk subject's income tax records from relevant governmental agencies, (2) the at-risk subject's retirement plan contribution information, and/or education plan contribution information from relevant financial institutions or (3) a forecast of the at-risk subject's future income tax and retirement plan and/or education plan contribution if the subject is successfully mentored;
determining, via the one or more computer processors, a financial incentive to the mentor based on result of the comparing step, the at-risk subject's income tax records, the at-risk subject's retirement plan contribution information and/or education plan contribution information, or the forecast of the at-risk subject's future income tax and retirement plan and/or education plan contribution if the subject is successfully mentored, and expected lifetime costs to society;
obtaining approval for the amount of financial incentive from the oversight board; and
transmitting a notice to the relevant governmental agency about the approved amount.

US Pat. No. 10,217,069

SYSTEMS AND METHODS FOR VEHICLE RESOURCE MANAGEMENT

Addison Lee Limited, Lon...

1. A system for allocating networked vehicle resources to vehicle requirements, the system comprising:a vehicle resource allocation module configured to receive vehicle requests from a plurality of requester devices;
a vehicle resource location monitoring module in communication with and configured to monitor respective current locations for a plurality of vehicle resources, each vehicle resource being associated with a respective vehicle location, wherein each vehicle resource is associated with a respective vehicle resource device comprising a positioning component that is configured to determine a respective current location of the vehicle resource;
at least one processor in communication with the vehicle resource allocation module and with the vehicle resource location monitoring module; and
a computer-readable medium in communication with the at least one processor, the computer-readable medium storing instructions that when executed by the at least one processor direct the at least one processor to:
a) store, by the vehicle resource allocation module, plural vehicle requirements in the form of plural vehicle requests, each vehicle request including at least a respective start time and a respective start location, wherein for each vehicle requirement of the plural vehicle requirements the respective start time and the respective start location have been received from an associated one of the plurality of requester devices;
b) for a first vehicle request of the plural vehicle requests,
dynamically select, by the vehicle resource allocation module, a time-ahead value (X) representing a predetermined time ahead of the start time of the first vehicle request at which to begin an allocation process for the first vehicle request; and
after dynamically selecting the time-ahead value (X), automatically determine, by the vehicle resource allocation module, that a difference between a current time and the start time of the first vehicle request is not greater than the time-ahead value (X);
c) in response to the determining at step b):
automatically detect, by the vehicle resource location monitoring module, a respective current location for each vehicle resource of the plurality of vehicle resources;
automatically determine, by the vehicle resource allocation module, a respective direct distance from the respective current location of each vehicle resource of the plurality of vehicle resources, to the start location included in the first vehicle request; and
after determining the respective direct distance to the start location for each vehicle resource, automatically select, by the vehicle resource allocation module, a predetermined number (Y) of vehicle resources based on the respective direct distances to the start location and based on respective vehicle resource statuses associated with the vehicle resources, and without calculating respective routes and travel distances to the start location for each vehicle resource, thereby forming a pool of (Y) plural candidate vehicle resources, each of said candidate vehicle resources being for possible fulfillment of the first vehicle request;
d) for each said candidate vehicle resource in the pool of (Y) plural candidate vehicle resources, automatically calculate, by the vehicle resource allocation module, a respective score that is related to the suitability of the candidate vehicle resource to fulfil the first vehicle request, wherein the suitability is without regard to the respective journey time of each candidate vehicle resource to the start location;
e) for each of only a number (Z) of the candidate vehicle resources in the pool of (Y) plural candidate vehicle resources selected by the vehicle resource allocation module based on their respective scores and a threshold score, automatically calculate, by the vehicle resource allocation module, a respective journey time from the candidate vehicle resource's associated vehicle location to the start location included in the first vehicle request, wherein (Z) is less than (Y);
f) at a given time, automatically determine, by the vehicle resource allocation module, whether there is a need to allocate a vehicle resource to the first vehicle request, using both:
1) the respective scores calculated for the (Z) candidate vehicle resources selected from the pool of (Y) plural candidate vehicle resources, and
2) the calculated one or more respective journey times for the (Z) candidate vehicle resources,
wherein automatically determining whether there is a need to allocate a vehicle resource to the first vehicle request comprises:
determining that a respective score calculated for a candidate vehicle resource in step d) is better than respective scores calculated for all other candidate vehicle resources in the pool of (Y) plural candidate vehicle resources;
determining, for the candidate vehicle resource having the best respective score, an allocation buffer value by performing one of the following:
 multiplying the respective calculated journey time from that candidate vehicle resource's associated vehicle location to the start location by a predetermined factor,
 determining a fixed time value, or
 calculating a sum of a number of values, each value corresponding to a respective zone through which the candidate vehicle resource would need to travel to reach the start location;
determining, for the candidate vehicle resource having the best respective score, a sum of the allocation buffer value for that candidate vehicle resource and the respective calculated journey time from that candidate vehicle resource's associated vehicle location to the start location included in the first vehicle request; and
determining whether the sum of the allocation buffer value and the respective calculated journey time meets a predetermined relationship with respect to a time remaining from the current time to the start time of the first vehicle request;
g) automatically repeat performance of steps d), e) and f) at at least two different times for the first vehicle request until it is determined at step f) that there is a need to allocate a vehicle resource to the first vehicle request;
h) on determining at step f) that there is a need to allocate a vehicle resource to the first vehicle request, automatically select a vehicle resource of the (Z) candidate vehicle resources to allocate to the first vehicle request based on the respective scores calculated on last performance of step d); and
i) in response to selecting the vehicle resource at h), automatically transmit a signal to a vehicle resource device associated with the selected vehicle resource, the signal indicating that the selected vehicle resource is to proceed to the start location included with the first vehicle request, to fulfill the first vehicle request.

US Pat. No. 10,217,068

SYSTEMS AND METHODS FOR PRE-SCHEDULING REPAIR OF HOME EQUIPMENT

STATE FARM MUTUAL AUTOMOB...

1. A computer-implemented method for automatically scheduling repair of smart home equipment, the method executed by one or more processors programmed to perform the method, the method comprising:receiving, at a smart home controller, an indication from a property owner pre-authorizing automatic scheduling of smart home equipment repairs;
for each of a plurality of pieces of smart home equipment located at a property which includes a smart home system:
periodically collecting, at one or more first sensors communicatively coupled to a first piece of smart home equipment, a first set of sensor data for the first piece of smart home equipment;
periodically collecting, at one or more second sensors communicatively coupled to a second piece of smart home equipment which is physically connected to the first piece of smart home equipment, a second set of sensor data for the second piece of home equipment;
receiving, at the smart home controller, the first set of sensor data for the first piece of smart home equipment from the one or more first sensors and the second set of sensor data for the second piece of smart home equipment from the one or more second sensors;
identifying, by the smart home controller, a failure at the first piece of smart home equipment;
in response to identifying the failure at the first piece of smart home equipment, determining, by the smart home controller, that the first piece of smart home equipment needs to be repaired based on a collective analysis of both the first and second sets of sensor data for the first and second pieces of smart home equipment, respectively, wherein the collective analysis is used to identify whether the first or the second piece of smart home equipment is a cause of the failure, the collective analysis including:
analyzing, by the smart home controller, the first and second sets of sensor data to detect that the first piece of smart home equipment is operating outside of normal operating characteristics for the first piece of smart home equipment and that the second piece of smart home equipment is operating within normal operating characteristics for the second piece of smart home equipment;
when the first piece of smart home equipment needs to be repaired:
automatically and without interacting with the property owner, scheduling, by the smart home controller, a repair of the first piece of smart home equipment including:
transmitting, by the smart home controller, a first notification to a repair service provider for scheduling the repair of the first piece of smart home equipment, wherein the first notification includes an authorization to access the property and access information for accessing the property; and
receiving, by the smart home controller, a second notification from the repair service provider including a scheduled time for repairing the first piece of smart home equipment to cause the first piece of smart home equipment to be repaired; and
providing, by the smart home controller, a control signal to the first piece of smart home equipment to shut down or limit operation of the first piece of smart home equipment in response to the failure.

US Pat. No. 10,217,067

SYSTEM, METHOD AND PROGRAM PRODUCT FOR SCHEDULING INTERVENTIONS ON ALLOCATED RESOURCES WITH MINIMIZED CLIENT IMPACTS

International Business Ma...

13. A shared resource system comprising:a plurality of client devices;
a plurality of service provider computers selectively making resource capacity available to requesting ones of said plurality of client devices;
a network, said requested resource capacity being provided to said ones from said plurality of service provider computers over said network;
a resource provisioning unit allocating requested resources to each requesting client device; and
an impact estimation support tool estimating the impact from system interventions to client activity over a selected time frame and indicating time varying impact over said time frame such that an optimal time may be selected for system interventions, said impact estimation support tool receiving a change request requesting changes to said shared resource system, said impact estimation support tool comprising:
means for identifying shared resource system elements (E) affected by implementing the requested change,
means for determining individual impacts (I(L,E,T)) to elements in each shared resource system layer (L) at a given time (T) in a selected time frame ([TI,TF]),
means for determining an overall impact (I(E,T)) to client activity at said given time responsive to said individual impacts, wherein said layers include an infrastructure layer (LI), an application layer (LA) and a business process layer (LBP), and said means for determining said overall impact comprises:
means for collecting element information for affected elements including situational information, and current and historical element information, and
means for weighting local impacts, wherein said means for weighting local impacts comprises:
 means for collecting standardized business process impact criticalities,
 means for collecting criticality information for all affected elements from a criticality matrix, collected criticalities indicating layer by layer impact importance on final impact, and
 means for determining layer weights (?BP, ?A, ?I) responsive to said collected criticalities;
means for returning to determining individual impacts at a next given time (TI?T?TF) until said next given time is after said selected time frame, and
means for determining a time within said time frame having a minimum overall impact for implementing said requested change; and
one or more management elements scheduling and managing interventions for minimized client disruption, whereby disruption to said client devices being provided resources is minimized by applying said system interventions.

US Pat. No. 10,217,066

METHODS AND APPARATUS TO MONITOR WORK VEHICLES AND TO GENERATE WORKLISTS TO ORDER THE REPAIR OF SUCH WORK VEHICLES SHOULD A MACHINE FAILURE BE IDENTIFIED

1. An apparatus, comprising:an interface to access a first alert from a first work vehicle and a second alert from a second work vehicle;
an alert scorer to generate a first score for the first alert and a second score for the second alert, the first and second scores associated with a severity of the respective alerts;
a weighting factor applier to associate a first weighting factor with the first alert and to associate a second weighting factor with the second alert;
a machine health score determiner to determine a first machine health score for the first work vehicle based on the first score and the first weighting factor and a second machine health score for the second work vehicle based on the second score and the second weighting factor; and
a worklist generator to generate a worklist indicating that the second work vehicle is to be repaired prior to the first work vehicle based on at least one of the first machine health score or an associated first classification and at least one of the second machine health score or an associated second classification.

US Pat. No. 10,217,065

ENTERTAINMENT EVENT TICKET PURCHASE AND EXCHANGE SYSTEM

GLOBAL E-TICKET EXCHANGE ...

1. A system for selling and exchanging electronic tickets for entertainment events, comprising:a patron interface via which patrons purchase electronic tickets for an entertainment event at a venue from a vendor;
a storage system which stores information regarding electronic tickets purchased by patrons;
a seating system which determines an assignment of seats at said venue for respective electronic tickets purchased for the entertainment event, and dynamically re-allocates the seat assignments as additional tickets are obtained by patrons prior to the entertainment event; and
an entry system having at least one access control device with a reader at the venue of an event, which:
(i) communicates with said seating system prior to the beginning of the entertainment event, to receive information regarding the seats that have been assigned to purchased tickets,
(ii) is responsive to presentation of identifying information pertaining to an entering patron at said reader to communicate with said storage system and determine whether the identified patron is an owner of an electronic ticket for the entertainment event,
(iii) in response to said determination, automatically provides the entering patron who is determined to be associated with an electronic ticket with physical access to the venue at which the entertainment event is being presented, and
(iv) provides the entering patron with an indication of the seat that has been assigned to the electronic ticket associated with the entering patron, at the time that entry is provided by said access control device.

US Pat. No. 10,217,064

INTELLIGENT HOME SCREEN FOR MOBILE AND DESKTOP OPERATING SYSTEMS

APPLE INC., Cupertino, C...

1. A method comprising:at a computing device with a current virtual screen and two or more secondary virtual screens, distinct from the current virtual screen, that each include a plurality of application icons associated with a plurality of applications, wherein each secondary virtual screen is one of a sequentially ordered set of virtual screens of an operating system user interface:
determining that a predefined rule stored on the computing device is satisfied, wherein the predefined rule is specific to a particular application associated with a respective application icon that is maintained at a fixed position in a respective secondary virtual screen of the two or more secondary virtual screens;
in response to determining that the predefined rule is satisfied:
automatically inserting onto the current virtual screen an alias icon comprising an alias of the respective application icon in the respective secondary virtual screen of the two or more secondary virtual screens, wherein the respective application icon and the alias icon are each configured such that user selection of either icon launches the particular application, and
continuing to maintain the respective application icon at the fixed position in the respective secondary virtual screen; and
after inserting the alias icon onto the current screen and in response to a determination that the predefined rule is no longer satisfied:
automatically removing the alias icon from the current virtual screen while continuing to display the current virtual screen; and
continuing to maintain the respective application icon at the fixed position in the respective secondary virtual screen.

US Pat. No. 10,217,063

SYSTEM AND METHOD FOR CLINICAL INTELLIGENT AGENTS IMPLEMENTING AN INTEGRATED INTELLIGENT MONITORING AND NOTIFICATION SYSTEM

TeleTracking Technologies...

1. A method comprising:receiving, at a clinical intelligent agent, patient specific data comprising room location of a patient within a healthcare facility, at least one care provider having contact with the patient in the room location, and information regarding the condition of the patient in the room;
storing, at an intelligent data repository of the clinical intelligent agent, the patient specific data in a repository, the repository storing reference data including historical patient information derived from an electronic medical record;
using a processor to compare, using a monitor of the clinical intelligent agent, patient specific data with the reference data to detect clinical patterns and to identify an alert situation, wherein to identify an alert situation comprises detecting a pattern of decompensation with respect to the patient;
producing, using an alerting agent of the clinical intelligent agent, one or more alerts when the processor identifies a clinical pattern using the patient specific information and the reference data indicating an alert situation, wherein each alert situation is associated with a pattern of decompensation;
sending, using agent, the one or more alerts to an alert repository of the clinical intelligent agent;
storing the one or more alerts in the alert repository as one or more historical alerts for inclusion with the reference information;
sending, using the alerting agent, the one or more alerts to a patient screen located in the room occupied by the patient and accessible to the at least one care provider;
providing, using the clinical intelligent agent, a score to at least one alert situation identified, wherein the providing a score comprises applying escalation criteria to the detected pattern of decompensation;
prioritizing, using the clinical intelligent agent, care provider tasks displayed in the patient screen to dynamically change one or more of a workload and an assignment based on the score; and
as the at least one care provider enters the room, displaying on the patient screen located in the room current tasks for the at least one care provider and patient specific information for the patient in the room.

US Pat. No. 10,217,062

SYSTEM AND METHOD FOR PROVIDING EFFICIENCY SCORES FOR AIRSPACE

PASSUR Aerospace, Inc., ...

1. A method, comprising:determining, by a computer processor, a current efficiency score for an airport, wherein determining the current efficiency score comprises the following substeps:
determining a minimum spacing requirement between each of a plurality of subsequent aircraft landings occurring within a user-defined time interval;
determining position information for each of a plurality of aircrafts relative to a reference location, wherein the plurality of aircrafts correspond to the plurality of aircraft landings and wherein the position information for each of the plurality of aircrafts is based on when a first signal is received by a first radar from a second radar, when a second signal is received by the first radar from one of the plurality of aircrafts, the distance between the first radar and the second radar and the direction between the first radar and the second radar;
determining an actual spacing between each of the plurality of subsequent aircraft landings occurring within the user-defined time interval based on the position information; and
calculating the current efficiency score based on the difference between the actual spacing and the minimum spacing requirements for the plurality of subsequent aircraft landings occurring within the user-defined time interval;
receiving a request to compare the current efficiency score with a previous efficiency score, the request including a user-defined input for retrieving the previous efficiency score over a second user-defined time interval;
retrieving, from a non-transitory computer memory, the previous efficiency score; and
displaying the current efficiency score and the previous efficiency score to a user.

US Pat. No. 10,217,061

SYSTEMS AND METHODS IMPLEMENTING AN INTELLIGENT OPTIMIZATION PLATFORM

SigOpt, Inc., San Franci...

1. A system for tuning a machine learning model for improved effectiveness including accuracy and computational performance, the system comprising:an intelligent machine learning tuning platform that is hosted on a distributed networked system comprising:
a cluster of distinct machine learning tuning sources that perform distinct tuning operations of hyperparameters of machine learning models;
a plurality of queue worker machines that selectively operate one or more of the cluster of distinct tuning sources based on a receipt of a first tuning work request, wherein the plurality of queue worker machines includes a plurality of distinct queue worker machines that operate asynchronously to perform disparate tuning operations using one or more of the cluster of distinct machine learning tuning sources;
a shared work queue that is accessible by each of the plurality of distinct queue worker machines, wherein the shared work queue comprises an asynchronous queue that enable asynchronous tuning operations by the plurality of queue worker machines;
a platform database comprising a central repository that collects tuning data generated during tuning trials of one or more hyperparameters of the machine learning model;
wherein the intelligent machine learning tuning platform:
executing the first tuning work request according to an estimated time of completion;
receives a second tuning work request for tuning the external model;
identifies the second tuning work request as being an intervening tuning work request, wherein the intervening tuning work request relates to a tuning work request that is received at a time during the execution of the first tuning work request before the estimated time of completion of the first tuning work request;
executes the second tuning work request, wherein executing the second tuning request includes:
responsive to identifying the second tuning work request as being the intervening tuning work request, uses an objective function obtained from the first tuning work request to generate a surrogate model of the external model, wherein the surrogate model comprises a hypothesis of and a proxy of the external model when a structure of the external model is not known;
collects a plurality of suggested values for the one or more hyperparameters that were generated during the execution of the first tuning work request;
tests a performance of the plurality of suggested values for the one or more hyperparameters by providing each of the plurality of suggested values as input into the surrogate model;
identifies a subset of the plurality of suggested values for the one or more hyperparameters based on a likelihood that the subset of suggested values would perform well in the external model as determined by the testing; and
returns the subset of the plurality of suggested values as a response to the second tuning work request.

US Pat. No. 10,217,060

CAPACITY AUGMENTATION OF 3G CELLULAR NETWORKS: A DEEP LEARNING APPROACH

The Regents of the Univer...

1. A method of redistributing traffic from congested cellular towers to non-congested cellular towers in a 3G cellular network for the purpose of increasing the capacity of said cellular network wherein said cellular network comprises clusters, clusters comprise sites, and sites comprise cellular towers, and wherein the method comprises:a. importing per cellular tower information including neighbor handover, traffic demand, traffic carried, average transmit power, and minimum acceptable quality;
b. waiting for the expiration of a refresh timer;
c. importing additionally collected learning measurements since the previous expiration of said refresh timer;
d. applying an MLPDL technique to predict breakpoints of the plurality of both congested and non-congested cellular towers one cellular tower at a time, wherein a breakpoint reflects the maximum load limit of associated cellular tower;
e. applying inputs to the BCDSA algorithm including imported topology information and predicted breakpoints;
f. performing the BCDSA algorithm to generate CPiCH and CIO values of the plurality of both congested and non-congested cellular towers; and
g. going back to step b to wait again for the expiration of said refresh timer.

US Pat. No. 10,217,059

METHOD AND SYSTEM FOR GENERATING NATURAL LANGUAGE TRAINING DATA

Maluuba Inc., Waterloo (...

1. A computer-implemented method for generating a training database comprising training data for training one or more models implemented in a natural language processing system, the method comprising:receiving a training set of queries for training classes of the natural language processing system;
analyzing the training set of queries to identify one or more clusters of related queries associated with one or more classes of a set of classes;
receiving, at a language generator, a sentence pattern of a plurality of sentence patterns, wherein the received sentence pattern is associated with a selected class from the set of classes, wherein the received sentence pattern comprises at least one command corresponding to the selected class associated with at least one cluster, wherein the received sentence pattern comprises one or more entity variables associated with the at least one command, and wherein each entity variable is associated with a definition and represented by a placeholder within the received sentence pattern;
providing a user interface for identifying one or more entity sources;
receiving a selection, via the user interface, requesting a plurality of entities associated with the selected class from an entity source of the one or more entity sources, wherein the entity source includes a database storing the plurality of entities, each entity configured to replace the one or more entity variables in accordance with the definition of each entity variable;
receiving, at the language generator, the plurality of entities corresponding to the selected class associated with the received sentence pattern;
selecting at least a first entity and a second entity from the plurality of entities corresponding to a definition of at least one entity variable of the received sentence pattern associated with the selected class;
automatically generating, at the language generator, a plurality of distinct natural language sentences to augment the training data by permutative replacement of the placeholder representing at least one entity variable of the received sentence pattern with at least the first entity and the second entity, wherein the plurality of distinct natural language sentences is maintained for training one or more models associated with the selected class;
storing the plurality of distinct natural language sentences in the training database; and
transmitting the training database to a training computer, the training computer configured to train the one or more models associated with the selected class, wherein generating the plurality of distinct natural language sentences comprises randomly selecting the received sentence pattern associated with the selected class from the plurality of sentence patterns, and for each entity variable in the received sentence pattern, randomly selecting the first entity and the second entity associated with the selected class matching the definition of the entity variable.

US Pat. No. 10,217,058

PREDICTING INTERESTING THINGS AND CONCEPTS IN CONTENT

MICROSOFT TECHNOLOGY LICE...

1. A computer-implemented process performed by a computing device, comprising:receiving arbitrary content selected by a particular user and rendering that content to a display device;
automatically identifying and extracting a plurality of candidate items from the arbitrary content, the candidate items comprising any combination of one or more words, phrases, sentences, images, audio, hyperlinks, and topics in the arbitrary content;
predicting, for each of the plurality of the candidate items, a measure of interest with respect to the particular user, the measure of interest for each of the candidate items representing a statistical measure of a likelihood that the particular user will be interested in additional content related to the corresponding candidate item;
the predicted measure of interest provided by any combination of one or more of a machine-learned topic model and a machine-learned transition model,
the machine-learned topic model generated by applying machine-learning to automatically evaluate content of samples of source and destination documents using a generative model that posits a distribution over joint latent transition topics for each possible transition between the source and destination topics,
the machine-learned transition model generated by applying machine-learning to train on observed transitions between pairs of source content and destination content, and any combination of features extracted from those pairs and joint latent transition topics for each possible transition between the source and destination documents;
ranking the candidate items based on the predicted measure of interest for each candidate item;
selecting a predetermined number of the highest ranked candidate items;
associating additional content with the selected candidate items; and
modifying the arbitrary content by automatically arranging and displaying the associated additional content on the display device in conjunction with the arbitrary content, thereby enabling the user to interact with both the arbitrary content and the associated additional content.

US Pat. No. 10,217,057

REMOVING LEAKAGE IN A QUANTUM BIT

Google LLC, Mountain Vie...

1. An apparatus, comprising:one or more qubits, wherein each qubit facilitates occupation of at least one of a plurality of qubit levels, the qubit levels including two computational qubit levels and one or more non-computational qubit levels that are each higher than the computational qubit levels, and wherein the qubit facilitates transitions between qubit levels associated with a corresponding transition frequency;
a cavity, wherein the cavity defines a cavity frequency;
one or more couplers coupling each qubit to the cavity; and
one or more couplers coupling the cavity to an environment external to the one or more qubits and the cavity;
a frequency controller that controls the frequency of qubits such that, for each qubit that the frequency controller controls, the frequency of the qubit is adjusted relative to the cavity frequency such that a population of a non-computational level is transferred to the cavity.

US Pat. No. 10,217,056

HYPERBOLIC SMOOTHING CLUSTERING AND MINIMUM DISTANCE METHODS

1. A non-transitory computer readable medium storing a program causing a computer including a processor and a memory, to execute a method of data mining by optimizing the clustering of a given set of m observations sj, j=1, . . . , m, each represented by n components, into a specified number of groups q, represented by a set of centroids xi, i=1, . . . , q, following a criterion of minimizing the sum of the values of a monotonic increasing function f applied to each argument zj, defined as the shortest distance from each generic observation sj to the nearest centroid, according to a general optimization formulation:where x=(x1, x2, . . . , xq)?Rnq and f(zj) is an arbitrary monotonic increasing function f applied to the distance zj measured following one of four different metrics, namely Euclidian norm, Minkowski norm, Manhattan norm and Chebychev norm, the method comprising the steps of:performing an initialization step that includes choosing the first initial starting point x0, choosing smoothing parameter values ?, ?, ? and specifying a boundary band width parameter ?;
performing an iterative procedure until an arbitrary stopping rule is attained, with a counter of iterations k , initialized with a value of 1, comprises the steps of:
splitting the set of observations into two non-overlapping parts: the first set JB corresponds to the observations that are relatively close to two or more centroids based on the boundary band width parameter ?, and the second set JG corresponds to the observations that are significantly close to a unique centroid in comparison to the other ones, then:

solving an optimization problem;
determining the q hard clustering;
determining membership levels of each observation to each particular cluster within a fuzzy clustering referential; and
updating the smoothing parameters ?, ?, ? and the boundary band width parameter ?; and
visually outputting the optimized clustering of the set of observations into groups represented by the set of centroids xi using the computer.

US Pat. No. 10,217,055

METHODS AND SYSTEMS FOR SENSOR-BASED DRIVING DATA COLLECTION

TRUEMOTION, INC., Boston...

1. A system for collecting vehicle data, the system comprising:a mobile device of a user comprising a plurality of sensors;
a memory; and
a processor coupled to the memory, wherein the processor is configured to perform operations including:
obtaining a plurality of movement measurements from at least one of the plurality of sensors in the mobile device;
determining a plurality of transportation modes using the plurality of movement measurements, wherein determining includes:
assigning a plurality of first movement measurements of the plurality of movement measurements to a first transportation mode of the plurality of transportation modes, wherein the first transportation mode includes driving by the user of the mobile device; and
assigning a plurality of second movement measurements of the plurality of movement measurements to a second transportation mode of the plurality of transportation modes;
identifying a plurality of first features of the first transportation mode using the plurality of first movement measurements;
identifying a plurality of second features of the second transportation mode using the plurality of second movement measurements;
obtaining a plurality of new movement measurements from the at least one of the plurality of sensors in the mobile device;
extracting a plurality of new features from the plurality of new movement measurements;
associating the first transportation mode with the plurality of new movement measurements based on a comparison of the plurality of new features to the plurality of first features and the plurality of second features; and
operating the at least one of the plurality of sensors at an increased frequency of sampling of the vehicle data based on the association of the first transportation mode with the plurality of new movement measurements.

US Pat. No. 10,217,054

ESCALATION PREDICTION BASED ON TIMED STATE MACHINES

CA, Inc., New York, NY (...

1. A computer server, comprising:a processor; and
a memory coupled to the processor, the memory comprising a computer-readable storage medium storing computer-readable program code therein that is executable by the processor to perform:
receiving a ticket element generated by an issue tracking system responsive to a client request, the ticket element comprising a data field for a time-dependent attribute, wherein the data field comprises data therein indicative of a current state of the time-dependent attribute for the ticket element;
accessing a database comprising state data stored therein responsive to the data field for the time-dependent attribute, wherein the state data relates a plurality of states that are specific to the time-dependent attribute and comprises temporal data indicating respective durations of or between the plurality of states that are specific to the time-dependent attribute for the ticket element;
identifying one of the plurality of states related by the state data as corresponding to a future state of the time-dependent attribute for the ticket element based on the current state of the time-dependent attribute for the ticket element, wherein identifying the one of the plurality of states related by the state data as corresponding to the future state of the time-dependent attribute for the ticket element is based on the respective durations indicated by the temporal data with respect to a future time that corresponds to the future state of the time-dependent attribute for the ticket element after a current time that corresponds to the current state of the time-dependent attribute for the ticket element;
computing a future probability of escalation of the ticket element based on the future state of the time-dependent attribute for the ticket element responsive to identification of the one of the plurality of states as corresponding thereto based on the respective durations of or between the plurality of states; and
providing an action indicator in response to the client request based on the future probability of escalation of the ticket element relative to a predefined threshold.

US Pat. No. 10,217,053

PROVISIONING SERVICE REQUESTS IN A COMPUTER SYSTEM

International Business Ma...

1. A computer-implemented method comprising:receiving at least one new service request for computational resources in a computing system, wherein required computational resources include memory usage, storage usage, processor usage, or a combination thereof to fulfill the new service request;
operating the new service request in a sandbox computing environment, the sandbox computing environment is used to execute a new service requests without harming the computing system by restricting access to the computer system and network, the sandbox computing environment performing pre-execution testing by two or more approximate versions of services models for the new service request, where each service model uses different data sizes, and executing the new service request on each of the two or more approximate versions of services models in the sandbox computing environment to record predicted computation resources usage data including predicted execution time required, predicted memory space required, and predicted number of processors required;
machine learning module utilizing both the predicted computational resources usage data and historical computational resources usage data to create a prediction of the computational resources that will be required in the computing system to fulfill the new service request;
based on the predicted computational resources required being above a definable quality of service threshold, performing at least one of
rejecting the new service request,
providing the predicted computational resources based on each of the service models to a requestor of the new service, and
transforming the new service request into sub-requests, where each sub-request is limited to a sub-set of computational resources, or
a combination thereof; and
based on the predicted computational resources required being below the definable quality of service threshold, deploying in the computing system which is separate from the sandbox computing environment, the computational resources which have been predicted based upon the new service request subject to pricing policies and resource constraints, and recording actual computation resources usage data as historical computation resources usage data including actual execution time required, actual memory space required, and actual number of processors required.

US Pat. No. 10,217,052

EVALUATING FEATURE VECTORS ACROSS DISJOINT SUBSETS OF DECISION TREES

Facebook, Inc., Menlo Pa...

1. A method performed by a computing system, comprising:receiving multiple feature vectors, wherein at least some of the feature vectors include a plurality of features;
receiving multiple decision trees by which the feature vectors are to be evaluated;
loading the feature vectors into a memory of the computing system; and
loading disjoint subsets of the decision trees into the memory of the computing system successively for evaluating the feature vectors, the loading the disjoint subsets successively including:
loading a first subset of the disjoint subsets into the memory,
evaluating the feature vectors using the first subset to generate a first result,
evicting the first subset from the memory,
loading a second subset of the disjoint subsets into the memory after evicting the first subset, and
evaluating the feature vectors using the second subset to generate a second result;
determining whether to evaluate the feature vectors using a third subset of the disjoint subsets as a function of a variation between the first result and the second result; and
responsive to a determination that the variation exceeds a specified threshold, loading the third subset into the memory after evicting the second subset, and evaluating the feature vectors using the third subset to generate a third result.

US Pat. No. 10,217,051

SYSTEMS AND METHODS FOR DETERMINING SOCIAL PERCEPTION

SMART INFORMATION FLOW TE...

1. A system for evaluating communicative acts to determine a social perception network representation based on communicative acts between a plurality of communicative pairs, each of the plurality of communicative pairs including two communicating entities participating in a corresponding one or more of the communicative acts, the system comprising:a patterns database storing behavior recognition patterns defining particular behaviors that may be used in the communicative acts and a social perception score associated with each one of the particular behaviors;
a scoring processor in communication with the patterns database and configured to determine a first pairwise social perception score for the communicative pair based on ones of the particular behaviors identified in the communicative acts between the two communicating entities of the communicative pair occurring during a first time frame, wherein:
the communicative pair is one of a plurality of communicative pairs each including a different two communicating entities, and
the scoring processor is configured to determine a different first pairwise social perception score for each one of the plurality of communicative pairs based on ones of the particular behaviors identified in the communicative acts between a corresponding one of the different two communicating entities of the communicative pair during the first time frame and to determine a different second pairwise social perception score for each one of the plurality of communicative pairs based on ones of the particular behaviors identified in the communicative acts between a corresponding one of the different two communicating entities of the communicative pair during a second time frame differing from the first time frame; and
a communications network aggregation processor configured to combine the different first pairwise social perception scores for each one of the plurality of communicative pairs, received from the scoring processor, into a first social perception network representation including a plurality of entities in the social perception network and indicating a first respective social perception level of each of the plurality of entities relative to other ones of the plurality of entities during the first time frame and to combine the different second pairwise social perception scores for each one of the plurality of communicative pairs, received from the scoring processor, into a second social perception network representation including the plurality of entities in the social perception network and indicating a second respective social perception level of each of the plurality of entities relative to other ones of the plurality of entities during the second time frame, the plurality of entities including the two communicating entities of each one of the plurality of communicative pairs.

US Pat. No. 10,217,050

SYSTEMS AND METHODS FOR DETERMINING SOCIAL PERCEPTION

SMART INFORMATION FLOW TE...

12. A method of constructing a organizational chart, the method comprising:gathering data regarding a plurality of captured communicative acts occurring between two parties, the two parties defining a sender and receiver pair, and the communicative acts including at least one verbal communicative act and at least one non-verbal communicative act;
using a processor and predefined behavior based patterns stored in at least one database to score each of the plurality of captured communicative acts to determine a plurality of social perception scores for the sender and receiver pair, each one of the plurality of social perception scores representing a perceived social difference between the sender and receiver pair for a respective one of the plurality of captured communicative acts based at least in part on non-verbal behaviors used during the respective one of the plurality of captured communicative acts; and
combining the plurality of social perception scores for the captured communicative acts occurring between the sender and receiver pair to construct a combined social perception score for the sender and receiver pair indicating the perceived social difference between the sender and receiver pair based on all of the plurality of captured communicative acts between the sender and receiver pair;
wherein:
the sender and receiver pair is one of a plurality of sender and receiver pairs in a group, and the processor determines a different combined social perception score for each one of the of plurality of sender and receiver pairs, and
the method further comprises using an aggregating hardware engine to aggregate the different combined social perception scores for each of the plurality of sender and receiver pairs to construct the organizational chart for the group, the organizational chart for the group indicating relative social perceptions between all individuals in the group that form part of the plurality of sender and receiver pairs.

US Pat. No. 10,217,049

SYSTEMS AND METHODS FOR DETERMINING SOCIAL PERCEPTION

SMART INFORMATION FLOW TE...

1. A system for evaluating communicative acts to determine a social network perception representation based on communicative acts between a plurality of communicative pairs, each of the plurality of communicative pairs including a first group and one of an individual and a second group participating in a corresponding one or more of the communicative acts, the system comprising:a patterns database storing behavior recognition patterns defining particular behaviors that may be used in the communicative acts and a social perception score associated with each one of the particular behaviors;
a scoring processor in communication with the patterns database and configured to determine a different pairwise social perception score for each of the plurality of communicative pairs based on ones of the particular behaviors identified in the communicative acts taking place between the first group and the one of the individual and the second group of a corresponding one of the plurality of communicative pairs, wherein:
the scoring processor is configured to determine the different pairwise social perception score for each one of the plurality of communicative pairs based on ones of the particular behaviors identified in the communicative acts between the first group and the one of the individual and the second group of the corresponding one of the plurality of communicative pairs; and
a communications network aggregation processor configured to combine the pairwise social perception scores for each one of the plurality of communicative pairs, received from the scoring processor, into a social perception network representation, which indicates a respective social perception level of each of the first group and the one of the individual and the second group of each of the plurality of communication pairs relative to other ones of the first group and the one of the individual and the second group of other ones of the plurality of communicative pairs.

US Pat. No. 10,217,048

PREDICTIVE ASSIGNMENTS THAT RELATE TO GENETIC INFORMATION AND LEVERAGE MACHINE LEARNING MODELS

Humancode, Inc., Denver,...

8. A method comprising:acquiring records that each indicate one or more genetic variants determined to exist within an individual;
selecting one or more machine learning models that utilize genetic variants as input;
for each individual in the records, predictively assigning at least one characteristic to that individual by operating the one or more machine learning models, utilizing at least one genetic variant indicated in the records for that individual as input to the one or more machine learning models;
analyzing input indicating accuracy of a predictively assigned characteristic;
determining a score for a machine learning model based on the analyzed input and a cost function, wherein each of the one or more machine learning models comprises a multi-layer neural network, each layer comprising multiple nodes, wherein nodes in different layers are coupled via weighted connections, nodes in an input layer of the neural network each receive input indicating whether a different genetic variant exists within the individual, and nodes in an output layer of the neural network each provide output predicting whether a different characteristic is predicted for the individual; and
revising the weighted connections based on the score.

US Pat. No. 10,217,047

LEARNING AND DEPLOYMENT OF ADAPTIVE WIRELESS COMMUNICATIONS

Virginia Tech Intellectua...

1. A method performed by at least one processor to train at least one machine-learning network to communicate over a communication channel, the method comprising:determining first information;
using an encoder machine-learning network to process the first information and generate a first RF signal for transmission through a communication channel;
determining a second RF signal that represents the first RF signal having been altered by transmission through the communication channel;
using a decoder machine-learning network to process the second RF signal and generate second information as a reconstruction of the first information;
calculating a measure of distance between the second information and the first information; and
updating at least one of the encoder machine-learning network or the decoder machine-learning network based on the measure of distance between the second information and the first information, wherein the updating comprises:
determining an objective function comprising the measure of distance between the second information and the first information;
calculating a rate of change of the objective function relative to variations in at least one of the encoder machine-learning network or the decoder machine-learning network;
selecting, based on the calculated rate of change of the objective function, at least one of a first variation for the encoder machine-learning network or a second variation for the decoder machine-learning network; and
updating at least one of the encoder machine-learning network or the decoder machine-learning network based on the at least one of the selected first variation for the encoder machine-learning network or the selected second variation for the decoder machine-learning network.

US Pat. No. 10,217,046

NEUROMORPHIC PROCESSING DEVICES

INTERNATIONAL BUSINESS MA...

1. A neuromorphic processing device comprising:a device input for receiving an input data signal;
an assemblage of neuron circuits each comprising a resistive memory cell arranged to store a neuron state, indicated by cell resistance, and to receive neuron input signals for programming cell resistance to vary the neuron state, and a neuron output circuit for supplying a neuron output signal in response to cell resistance traversing a threshold;
an input signal generator, connected to the device input and the assemblage of neuron circuits, for generating neuron input signals for the assemblage in dependence on the input data signal; and
a device output circuit, connected to neuron output circuits of the assemblage, for producing a device output signal dependent on neuron output signals of the assemblage, whereby the processing device exploits stochasticity of resistive memory cells of the assemblage.

US Pat. No. 10,217,045

COMPUTATION DEVICES AND ARTIFICIAL NEURONS BASED ON NANOELECTROMECHANICAL SYSTEMS

Cornell University, Itha...

1. A monolithic ultrasonic fingerprint scanner using piezoelectric transducers, comprising:a substrate comprising a semiconductor material;
an acoustic matching layer, coupled to a backside of the substrate, to provide a surface for a finger to make contact;
a CMOS active layer attached directly on a topside of the substrate; and
an array of piezoelectric transducers, solidly arranged over the CMOS active layer, wherein each of the piezoelectric transducers is operable to generate an incident acoustic wave or an incident acoustic pulse having one or more frequencies of at least 1 GHz that propagates through the substrate and toward the acoustic matching layer, wherein each of the piezoelectric transducers is operable to receive reflected acoustic waves or reflected acoustic pulses reflected from an object being detected at the surface, wherein the substrate lies below the piezoelectric transducers, wherein the acoustic matching layer lies below the substrate and above the object being detected, wherein the surface lies at a bottom of the acoustic matching layer,
wherein the CMOS active layer includes a CMOS die in electrical communication with the array of piezoelectric transducers to receive and process outputs from the piezoelectric transducers produced in response to the reflected acoustic waves or the reflected acoustic pulses.

US Pat. No. 10,217,044

TRANSPONDER AND METHOD FOR TUNING THE RADIO TRANSPONDER

Siemens Aktiengesellschaf...

1. A radio transponder comprising:an antenna;
a transmission and reception unit;
a resonant circuit connected to the antenna and comprising a plurality of capacitors arranged in parallel with one another and each arranged in series with a fuse, a capacitor of the plurality of capacitors being connectable via a series-arranged fuse to tune the resonant circuit;
a control unit associated with the resonant circuit, said control unit being configured to generate a trip signal for a respective fuse of the resonant circuit based on a control signal one of (i) transmitted by a radio transponder reader and (ii) generated in a radio transponder control unit; and
a memory unit at least one of readable and written to via a radio transponder reader;
wherein the resonant circuit comprises a capacitance diode arranged in parallel with the plurality of capacitors; and
wherein the control unit is configured to actuate the capacitance diode within an iterative resonant frequency ascertainment process based on the control signal one of (i) transmitted by the radio transponder reader and (ii) generated in the radio transponder control unit.

US Pat. No. 10,217,043

ULTRAHIGH FREQUENCY RFID TAG ANTENNA WITH MULTI-INFEED

HON HAI PRECISION INDUSTR...

1. An ultrahigh frequency RFID tag antenna with multi-infeed comprising:an antenna assembly comprising a radiating element, a plurality of microstrip lines, and a plurality of tag chips;
a baseboard; and
a ground plane;
wherein the baseboard is located above the ground plane, the antenna assembly is electrically connected to the ground plane, each of the tag chips is connected between corresponding two microstrip lines, thereby a microstrip feed loop is formed by each of the tag chips and the corresponding two microstrip lines, each microstrip feed loop is located near one side of the radiating element, and each side of the radiating element has no more than one microstrip feed loop.

US Pat. No. 10,217,042

RFID TAGS IN WEARABLES

Motorola Mobility LLC, C...

1. A system, comprising:a wearable, stretchable textile article;
at least one RFID tag mounted on the wearable, stretchable textile article; and
a stretch-activated switch on the at least one RFID tag, the stretch-activated switch having a first mode and a second mode, the first mode being associated with a first RFID tag state and the second mode being associated with a second RFID tag state, wherein the stretch-activated switch comprises a ground contact, an RFID enable contact and a contact to slidably engage the ground contact and the RFID enable contact to transition between the first RFID tag state and the second RFID tag state.

US Pat. No. 10,217,041

RADIO-FREQUENCY IDENTIFICATION DEVICE FOR A TUBULAR ELEMENT TO BE IDENTIFIED IN A CONSTRAINED ENVIRONMENT

SYSTEMES ET TECHNOLOGIES ...

1. A radio-frequency identification device for a tubular element to be identified in a constrained environment, said radio-frequency identification device comprising:a radio-frequency identification chip connected to at least one antenna having two conductive strands connected to the radio-frequency identification chip; and
a flexible envelope completely enveloping said radio-frequency identification chip and said two conductive strands,
wherein the flexible envelope is made by an overmolding with a silicone material of said radio-frequency identification chip and of the two conductive strands, said flexible envelope comprising:
a central portion overmolding the radio-frequency identification chip; and
two strips extending on either side of said central portion, each strip overmolds at least one of the two conductive strands,
wherein the two strips of the flexible envelope are thermoformed in a twisted configuration around a common twisting axis to temporarily hold said radio-frequency identification device around said tubular element, and
wherein each of the two strips includes a free end having a pierced boss configured to cooperate with a hose clamp for final fastening of said radio-frequency identification device around said tubular element.

US Pat. No. 10,217,040

CONTACTLESS INFORMATION MEDIUM

TOPPAN PRINTING CO., LTD....

1. A contactless information medium comprising:a film base;
an antenna coil disposed on a first surface of the film base, and formed in a spiral shape to perform wireless communication with an external device;
an IC chip disposed on the first surface of the film base, connected to the antenna coil via an IC chip mounting portion, and performing wireless communication processing via the antenna coil;
a first plate electrode disposed on the first surface of the film base, and connected to at least one of an inner end and an outer end of the antenna coil; and
a second plate electrode disposed on a second surface of the film base so as to be opposite to the first plate electrode in a thickness direction of the film base,
wherein each of the first plate electrode and the second plate electrode
has a first electrode portion and a second electrode portion each extending along a first side direction of the antenna coil and a second side direction intersecting the first side direction so as to be adjacent to an inner periphery or an outer periphery of the antenna coil when viewed perpendicular to the film base, or
is disposed along greater than or equal to one-third of the entire length of the inner periphery or the outer periphery of the antenna coil so as to be adjacent to the inner periphery or the outer periphery of the antenna coil when viewed perpendicular to the film base and wherein the first plate electrode has a first inner plate electrode connected to the inner end of the antenna coil, and a first outer plate electrode connected to the outer end of the antenna coil,
the second plate electrode has a second inner plate electrode opposite to the first inner plate electrode in the thickness direction of the film base, and a second outer plate electrode opposite to the first outer plate electrode in the thickness direction of the film base, and wherein either
a) the first outer plate electrode is disposed on the opposite side of the first inner plate electrode with respect to a center point or center line on a plane of the film base or
b) each of the first inner plate electrode and the first outer plate electrode has the first electrode portion and the second electrode portion.

US Pat. No. 10,217,039

VISUAL RFID TAGS AND INTERACTIVE VISUAL RFID NETWORKS

OMNI-ID CAYMAN LIMITED, ...

1. An edge reader network comprising:a plurality of edge readers, one or more of the edge readers comprising:
an RFID tag reader including an antenna wherein the RFID tag reader is a read-only tag reader;
a short range wireless communications device that communicates with at least one second edge reader;
a microcontroller; and
a power source wherein the edge reader includes a unique identifier that allows the location of the edge reader to be ascertained by a central control station;
at least one base station reader the base station reader further comprising an RFID tag reader having an antenna, a first wireless communications device for communicating wirelessly with the one or more edge controllers and a second communications device for communicating with a central control station; and
a plurality of items that are individually tagged with an RFID tag wherein at least a portion of the individually tagged items lie outside of the read range of the base station RFID tag reader but within the range of the RFID reader of one or more of the edge readers wherein one or more of the plurality of edge readers acquire and transmit RFID tag information of items that lie outside the read range of the base station RFID tag reader to the base station and wherein the first communications device demodulates incoming RFID tag data and transmits the demodulated RFID tag data to the second communications device.

US Pat. No. 10,217,038

SUSPENDING AND RESUMING TRANSACTIONS THROUGH WIRELESS BEACON COMMUNICATIONS

PAYPAL, INC., San Jose, ...

1. A system comprising:a non-transitory memory storing instructions;
a processor configured to execute the instructions to cause the system to:
in response to a check-in communication with a user device, retrieve a user information associated with the user device;
determine transaction information for a transaction between a user and a merchant, the transaction information including at least one item selected for purchase by the user of the user device;
receive a request to suspend the transaction from the user device;
generate and transmit, in respond to the request, a transactional code associated with the transaction information of the user device;
determine that the user is at a checkout location within a merchant location; and
retrieve the transaction information for the checkout process to purchase the at least one item selected for purchase using the transactional code and the user information associated with the user device.

US Pat. No. 10,217,037

SYSTEMS, METHODS AND DEVICES TO FACILITATE SECURE PURCHASES OF CRYPTOCURRENCIES

DECENTRAL INC., Toronto ...

1. A process to produce a redemption device carrying one or more codes, the process comprising:providing a substrate having a face;
applying a redemption code to a first portion of the face of the substrate;
applying a verification code to a second portion of the face or another face of the substrate;
applying an opaque covering to the first portion to hide the redemption code leaving the verification coded visible, the covering applied in a manner such that a removal reveals the redemption code;
storing in a data store the redemption code and verification code in association with one another and providing the data store to verify at least one of the redemption code and verification code or an activation status;
producing a plurality of redemption devices each of the devices having respective unique redemption codes and unique verification codes stored in respective association in the data store; and each having respective activation statuses associated with the respective verification codes, the statuses set to not activated;
grouping a set of the plurality of redemption devices for shipping together; and
assigning a unique grouping code to the set and storing the grouping code in the data store in association with the respective verification numbers from the set, the grouping code usable to set the respective activation statuses of the set to activated with redemption code ready for use.

US Pat. No. 10,217,036

PRINTING APPARATUS, PRINTING METHOD, AND MEDIUM

CANON KABUSHIKI KAISHA, ...

1. A rendering apparatus comprising:at least one processor and a memory, wherein the at least one processor executes a program loaded in the memory to function as:
a reception unit configured to receive print data including a plurality of objects that form a group; and
a generation unit configured to generate intermediate data based on the received print data, wherein the generation unit:
performs a flattening process in which a plurality of pieces of intermediate data generated by the generation unit are combined to obtain new intermediate data, wherein a size of the obtained new intermediate data is lower than a size of the intermediate data already generated by the generation unit based on the received print data, and
wherein, the generation unit performs the flattening process for a part of the plurality of objects that form the group according to a combining method associated with the group, and after the flattening process for the part of the plurality of objects is performed, the generation unit generates intermediate data of the rest of the plurality of objects.

US Pat. No. 10,217,035

IC TAG ISSUING APPARATUS

SATO HOLDINGS KABUSHIKI K...

1. An IC tag issuing method, comprising:pre-processing including:
conveying an IC tag continuous body on a pre-processing conveyor belt in a conveyance direction, the IC tag continuous body including a plurality of IC tags,
writing identification data to the IC tags of the IC tag continuous body, and
suctioning the IC tag continuous body to maintain close contact between the IC tag continuous body and the pre-processing conveyor belt during the pre-processing; and
post-processing including:
conveying the IC tag continuous body on a post-processing conveyor belt in a conveyance direction,
reading and verifying the identification data written to the IC tags of the IC tag continuous body, and
suctioning the IC tag continuous body to maintain close contact between the IC tag continuous body and the post-processing conveyor belt during the post-processing.

US Pat. No. 10,217,034

IMAGE PROCESSING DEVICE, IMAGING DEVICE, AND IMAGE PROCESSING METHOD

Sony Semiconductor Soluti...

1. An image processing device comprising:a vehicle body area detection unit which detects a vehicle body area of a vehicle from an image signal;
a license plate area detection unit which detects a license plate area of the vehicle from the image signal;
a vehicle body area image processing unit which performs processing of the image signal corresponding to the detected vehicle body area;
a license plate area image processing unit which performs processing different from the processing of the image signal corresponding to the vehicle body area on the image signal corresponding to the detected license plate area; and
a synthesis unit which synthesizes the processed image signal corresponding to the vehicle body area and the processed image signal corresponding to the license plate area.

US Pat. No. 10,217,033

SYSTEM AND METHOD FOR GENERATING A MAP FROM ACTIVITY DATA

Under Armour, Inc., Balt...

1. A method for generating a graph, the method comprising:receiving GPS data points for a plurality of GPS tracks;
simplifying the GPS tracks to provide GPS data for simplified GPS tracks, wherein simplifying the GPS tracks includes reducing the GPS data points for each of the GPS tracks by applying an iterative end-point fit algorithm to said GPS track, the iterative end-point fit algorithm using an error parameter that is dependent upon a sport associated with said GPS track, and then identifying points of greater curvature in the GPS tracks;
clustering the identified points of greater curvature;
determining a plurality of nodes for the graph based on the clustered identified points of greater curvature in the GPS tracks; and
determining a plurality of connections between the nodes, the nodes and the connections defining the graph.

US Pat. No. 10,217,032

METHOD FOR CHOOSING A COMPRESSION ALGORITHM DEPENDING ON THE IMAGE TYPE

Jean-Claude Colin, Versa...

1. A method for compressing an image, comprising:calculating an index representing a distribution of light intensity values of pixels of at least all of one colour layer of the image;
depending on a type of hues of the at least all of one colour layer of the image, classifying the image as one of the following three classes:
a first class,
a second class,
a third class;
and choosing a compression processing type depending on the class of the image, such that:
if the image is of the first class, processing comprising a difference between the original value of a pixel of the colour layer and a decompressed value of an adjacent pixel of said layer,
if the image is of the third class, processing by way of frequency processing, and
if the image is of the second class, processing by way of frequency processing, unless the compression is a lossless or near-lossless compression, whereby processing comprises a difference between the original value of a of the colour layer and the decompressed value of a pixel adjacent to said layer.

US Pat. No. 10,217,031

IDENTIFYING COMPLIMENTARY PHYSICAL COMPONENTS TO KNOWN PHYSICAL COMPONENTS

International Business Ma...

1. A method implemented by an information handling system that includes a processor and a memory accessible by the processor, the method comprising:capturing a digital image of an object that has a plurality of facets;
determining, from the captured digital image, an actual size of one or more of the object's facets;
identifying one or more compatible objects based on the actual size of the object's facets;
generating a search criteria based on a selected one of the one or more compatible objects;
searching a data store that includes identifiers of a plurality of component products, wherein the searching utilizes the search criteria and results in a selected set of one or more of the plurality of component products;
displaying the selected set of component products to a user;
receiving a purchase selection of one of the displayed component products from the user; and
ordering the displayed component product corresponding to the received purchase selection from a selected online merchant.

US Pat. No. 10,217,030

HIEROGLYPHIC FEATURE-BASED DATA PROCESSING

International Business Ma...

1. A computer-implemented method, comprising:in response to receiving a character, generating a first representation of the character by performing word embedding processing on the character, the first representation being related to a context of the character;
generating a second representation of the character by performing convolutional neural network (CNN) processing on a stroke of the character, the second representation being related to a hieroglyphic feature of the character, wherein the CNN processing comprises performing a Wubi Chinese character encoding method on the stroke; and
determining a label for the character by performing recurrent neural network (RNN) processing on the first representation and the second representation, the label indicating an attribute of the character related to the context.

US Pat. No. 10,217,029

SYSTEMS AND METHODS FOR AUTOMATICALLY GENERATING HEADSHOTS FROM A PLURALITY OF STILL IMAGES

RingCentral, Inc., Belmo...

1. A system for generating headshots of a user, the system comprising:a memory storing instructions; and
a processor configured to execute the instructions to:
receive a plurality of still images from one or more video feeds,
determine a context associated with the plurality of still images,
identify a plurality of dimensions based on the determined context,
score the plurality of images along the plurality of dimensions based on a scale,
rank the plurality of images using at least one of a composite score or at least one of the dimensions,
select a subset of the plurality of images using the ranking, and
construct at least one headshot of the user from the subset of the plurality of images.

US Pat. No. 10,217,028

SYSTEM AND METHOD FOR DISTRIBUTIVE TRAINING AND WEIGHT DISTRIBUTION IN A NEURAL NETWORK

Northrop Grumman Systems ...

1. A system for distributive training and weight distribution of nodes in a neural network, said system comprising:a training facility including a tools suite that provides training images and object labels for objects in the training images, at least one training neural network that detects and classifies the objects in the training images so as to train weights of nodes in the at least one training neural network, and a training facility transceiver for distributing the trained neural network weights and receiving images; and
a plurality of object detection and classification units each including an image source that provides pixilated image frames, at least one classification and prediction neural network that identifies, classifies and indicates relative velocity of objects in the image frames, and a unit transceiver for transmitting the image frames and receiving the trained neural network weights, wherein each object detection and classification unit transmits its image frames to the training facility so as to allow the at least one training neural network to further train the weights of the nodes in the at least one training neural network, and wherein the trained neural network weights are distributed from the training facility to each of the object detection and classification units so as to train weights of nodes in the at least one classification and prediction neural network in each object detection and classification units with objects in image frames from other object detection and classification units.

US Pat. No. 10,217,027

RECOGNITION TRAINING APPARATUS, RECOGNITION TRAINING METHOD, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. A recognition training apparatus comprising:one or more processors; and
one or more memories storing instructions, when executed by the one or more processors, causing the recognition training apparatus to function as:
an ontology storage unit configured to store ontology information expressing a concept structure of a specific domain;
a moving image data storage unit configured to store moving image data information for identifying a recognition target;
a generation unit configured to generate relevance between the specific domain and a candidate of the recognition target based on the ontology information of the specific domain;
a selection unit configured to select the recognition target from the candidate of the recognition target based on the relevance generated by the generation unit; and
a training unit configured to train a recognizer using training data regarding the recognition target selected by the selection unit.

US Pat. No. 10,217,026

COMPUTER ARCHITECTURE FOR EMULATING AN ASYNCHRONOUS CORRELITHM OBJECT PROCESSING SYSTEM

Bank of American Corporat...

1. A device configured to emulate an asynchronous correlithm object processing system, comprising:a node engine configured to emulate:
a first node linked with a first node table, wherein:
the first node table identifies:
a first plurality of correlithm objects, wherein each correlithm object in the first plurality of correlithm objects is a point in a first n-dimensional space represented by a binary string; and
a second plurality of correlithm objects linked with the first plurality of correlithm objects, wherein each correlithm object in the second plurality of correlithm objects is a point in a second n-dimensional space represented by a binary string; and
the first node is configured to:
receive a first correlithm object;
fetch a second correlithm object from among the second plurality of correlithm objects based on the first correlithm object, wherein fetching the second correlithm object comprises:
 determining Hamming distances between the first correlithm object and each of the first plurality of correlithm objects;
 identifying a correlithm object with the shortest Hamming distance between the first correlithm object and each of the first plurality of correlithm objects; and
 identifying an entry in the first node table that corresponds with the identified correlithm object; and
output the second correlithm object to a second node and a third node;
the second node linked with a second node table, wherein:
the second node table identifies:
a third plurality of correlithm objects, wherein each correlithm object in the third plurality of correlithm objects is a point in the second n-dimensional space represented by a binary string; and
a fourth plurality of correlithm objects linked with the third plurality of correlithm objects, wherein each correlithm object in the fourth plurality of correlithm objects is a point in a third n-dimensional space represented by a binary string; and
the second node is configured to:
receive the second correlithm object;
fetch a third correlithm object from among the fourth plurality of correlithm objects based on the second correlithm object, wherein fetching the third correlithm object comprises:
 determining Hamming distances between the second correlithm object and each of the third plurality of correlithm objects;
 identifying a correlithm object with the shortest Hamming distance between the second correlithm object and each of the third plurality of correlithm objects; and
 identifying an entry in the second node table that corresponds with the identified correlithm object; and
output the third correlithm object to the third node.

US Pat. No. 10,217,025

METHOD AND APPARATUS FOR DETERMINING RELEVANCE BETWEEN NEWS AND FOR CALCULATING RELEVANCE AMONG MULTIPLE PIECES OF NEWS

Beijing Qihoo Technology ...

1. A method for determining relevance between news, comprising:comparing first news with benchmarking, news to obtain a distance between the first news and the benchmarking news;
comparing second news with the benchmarking news to obtain a distance between the second news and the benchmarking news;
calculating a distance differential between the distance between the first news and the benchmarking news and the distance between the second news and the benchmarking news and determining the relevance between the first news and the second news according to the distance differential;
wherein the comparing first news with benchmarking news to obtain a distance between the first news and the benchmarking news further comprises:
acquiring a feature attribute of the first news,
generating a vector corresponding to the first news according to the feature attribute of the first news, and
comparing the vector corresponding to the first news with a vector corresponding to the benchmarking news; and
wherein the comparing second news with the benchmarking news to obtain a distance between the second news and the benchmarking news further comprises:
acquiring a feature attribute of the second news,
generating a vector corresponding to the second news according to the feature attribute of the second news, and
comparing the vector corresponding to the second news with the vector corresponding to the benchmarking news.

US Pat. No. 10,217,024

OBJECT DETECTION APPARATUS

DENSO CORPORATION, Kariy...

1. An object detection apparatus mounted in a vehicle, comprising:a first trajectory estimation unit configured to estimate, using a processor, a trajectory of a first object that is an object detected by an electromagnetic wave sensor configured to transmit and receive electromagnetic waves to detect a position of the object;
an optical flow acquisition unit configured to image process, using the processor, a captured image acquired from a camera to acquire movement directions based on optical flows of a large number of feature points in the captured image;
a movement direction match determination unit configured to determine, using the processor, whether or not a match occurs between a movement direction based on optical flows of a plurality of feature points, of the large number of feature points, situated around the periphery of the first object and a movement direction based on the trajectory of the first object; and
a sameness determination unit configured to, if a match occurs between the movement direction based on the optical flows of the plurality of feature points and the movement direction based on the trajectory of the first object, determine, using the processor, that a second object identified by the plurality of feature points and the first object are a same object,
wherein a collision mitigation control of the vehicle is performed based on the position of the object.

US Pat. No. 10,217,023

IMAGE RECOGNITION SYSTEM USING A PROGRAMMABLE PHOTONIC NEURAL NETWORK

The United States of Amer...

1. A method comprising:providing n arrays of m spatial light modulators (SLMs) connected to both a processor and an image capture device, wherein the processor is connected to a database, wherein the arrays of SLMs are cascaded and have sequentially decreasing block ranks;
inputting an input image from the image capture device into a first array of SLMs of the arrays of SLMs, wherein the input image is represented by a matrix of bits;
determining, using the processor, if the output of the first array of SLMs matches a stored image stored within the database, wherein the output of the first array of SLMs is represented by a set of non-negative integer vectors created by the first array of SLMs by optically summing the matrix of bits using SLMs within the first array of SLMs, wherein a match is found by comparing the length of individual integer vectors within the set of non-negative integer vectors with vectors of stored images stored within the database, wherein if a match is found the processor outputs a stored image associated with the respective matching vectors of the stored image in the database to an image processing system, wherein if a match is not found the processor directs the set of non-negative integer vectors output from the first array of SLMs into an input of an array of SLMs adjacent to the first array of SLMs; and
iteratively performing the determining step for the remaining arrays of SLMs until either a match is found or no further arrays of SLMs remain, wherein if no further arrays of SLMs remain the processor randomly selects a stored image from the database and the processor obtains user feedback on the randomly-selected stored image from a user system connected to the processor, wherein the user feedback correctly identifies the recognition of the input image compared to the randomly-selected stored image, wherein the user feedback is stored by the processor in the database as being associated with the set of non-negative integer vectors input into the n?1 array of SLMs.

US Pat. No. 10,217,022

IMAGE ACQUISITION AND MANAGEMENT

RICOH COMPANY, LTD., Tok...

1. A mobile device comprising:a camera;
a display;
one or more processors;
one or more memories communicatively coupled to the one or more processors; and
an image acquisition application executing on the mobile device, wherein the image acquisition application is configured to:
subsequent to acquisition of a reference image of one or more objects, cause the camera to automatically acquire a plurality of images of the one or more objects, wherein each image of the one or more objects, from the plurality of images of the one or more objects, is acquired using different exposure settings than the other images of the one or more objects, from the plurality of images of the one or more objects, and wherein the exposure settings for the plurality of images of the one or more objects are different than exposure settings used to acquire the reference image of the one or more objects, and a difference in the exposure settings for successive images, from the plurality of images, is based upon a user selection via the mobile device, wherein the reference image was acquired prior to the plurality of images of the one or more objects,
retrieve the reference image of the one or more objects, and
analyze the plurality of images of the one or more objects and determine one or more particular images of the one or more objects from the plurality of images of the one or more objects that best match the reference image of the one or more objects.

US Pat. No. 10,217,021

METHOD FOR DETERMINING THE POSITION OF A PORTABLE DEVICE

Nokia Technologies Oy, E...

1. A method, comprising:obtaining a sequence of captured image frames from a camera of a portable device;
obtaining movement data by using an inertial sensor of the portable device;
determining a sampling frame rate according to the movement data;
selecting a tracking image from the captured image frames according to the sampling frame rate;
determining a position of the portable device by comparing the tracking image with a point cloud;
determining a blurring value for a point of the point cloud based on a position of said point and based on the movement data;
comparing the blurring value with a predetermined limit;
selecting said point to a subset of the point cloud or rejecting said point from said subset of the point cloud based on the comparison;
determining the position of the portable device by comparing the tracking image with the subset of the point cloud; and
displaying information on a display of the portable device based on the determined position.

US Pat. No. 10,217,020

METHOD AND SYSTEM FOR IDENTIFYING MULTIPLE STRINGS IN AN IMAGE BASED UPON POSITIONS OF MODEL STRINGS RELATIVE TO ONE ANOTHER

MATROX ELECTRONIC SYSTEMS...

1. A method of identifying a plurality of strings in an image, the method comprising:receiving a set of ranks, wherein each rank is indicative of a position of a string according to a reading direction and is associated with one or more model strings from a plurality of model strings;
receiving an image;
performing optical character recognition on the image to identify a plurality of candidate strings, wherein each one of the candidate strings includes a plurality of candidate characters;
ordering the plurality of candidate strings according to their location in the image with respect to the reading direction;
determining minimum assignation costs between the plurality of candidate strings and the set of ranks, wherein each of the minimum assignation costs is representative of a cost of one or more edit operations performed on the plurality of candidate strings to obtain a subset of candidate strings ordered according to the set of ranks;
selecting a subset of candidate strings that is associated with the lowest minimum assignation cost when compared with other minimum assignation costs of other subsets of candidate strings from the plurality of candidate strings; and
outputting the selected subset of candidate strings.

US Pat. No. 10,217,019

ASSOCIATING A COMMENT WITH AN OBJECT IN AN IMAGE

International Business Ma...

1. A method of correlating a comment about an image with at least one object in the image, the method comprising the steps of:a computer detecting and identifying one or more objects in the image;
the computer receiving the comment about the image;
the computer performing a cognitive and contextual analysis of the comment;
based on the cognitive and contextual analysis, the computer determining which first one or more objects included in the identified one or more objects are referred to by the comment; and
in response to the step of determining which first one or more objects are referred to by the comment, the computer linking the comment with the first one or more objects,
wherein the step of determining which first one or more objects included in the identified one or more objects are referred to by the comment includes:
calculating one or more confidence scores for the identified one or more objects, respectively, the one or more confidence scores being measures of how likely the comment refers to the respective identified one or more objects, and the one or more confidence scores including first one or more confidence scores for the first one or more objects, respectively; and
determining that the first one or more confidence scores for the first one or more objects indicate that the comment referring to the first one or more objects is more likely than the comment referring to any other object included in the identified one or more objects.

US Pat. No. 10,217,018

SYSTEM AND METHOD FOR PROCESSING IMAGES USING ONLINE TENSOR ROBUST PRINCIPAL COMPONENT ANALYSIS

Mitsubishi Electric Resea...

1. A method for online processing sequence of images of a scene, wherein the sequence of images represents an image tensor, comprising:acquiring the sequence of images of the scene from at least one sensor from an input interface device, such that the acquired sequences of images of the scene include occlusions caused by structures in the scene, wherein the structures include buildings, clouds, or both, between the scene and the at least one sensor;
initializing a low-tubal rank tensor and a sparse tensor using a first image of the sequence of images, and storing the low-tubal rank tensor and the sparse tensor in a memory, wherein the low-tubal rank tensor is a tensor product of a low-rank spanning tensor basis and corresponding tensor coefficients;
iteratively, updating a previously stored low-tubal rank tensor and a previously stored sparse tensor from a previous iteration stored in memory, by using each sequential image of the sequentially acquired images, to obtain an updated low-tubal rank tensor and an updated sparse tensor, wherein the updated low-tubal rank tensor is a tensor product of an updated low-rank spanning tensor basis and updated corresponding tensor coefficients; and
outputting one of the updated low-tubal rank tensor, the updated sparse tensor, or both, upon completion of the iteration of all the sequentially acquired images, and wherein the steps are performed in a processor in communication with the memory.

US Pat. No. 10,217,017

SYSTEMS AND METHODS FOR CONTAINERIZING MULTILAYER IMAGE SEGMENTATION

Board of Regents, The Uni...

1. A non-transitory computer-readable medium embodying a program, that when executed in at least one computing device, causes the at least one computing device to at least:generate a plurality of sets of membership functions based at least in part on a plurality of sets of elements;
generate a plurality of quantized images from an image based at least in part on an entropy score of each of the plurality of sets of membership functions; and
generate a binarized image based at least in part on one of the plurality of the plurality of quantized images.

US Pat. No. 10,217,016

METHOD AND DEVICE FOR AUTOMATICALLY IDENTIFYING A POINT OF INTEREST IN A DEPTH MEASUREMENT ON A VIEWED OBJECT

General Electric Company,...

1. A method for automatically identifying a point of interest in a depth measurement of a viewed object, the method comprising the steps of:displaying on a monitor an image of the viewed object;
determining the three-dimensional coordinates of a plurality of points on a surface of the viewed object using a central processor unit;
determining a reference surface using the central processor unit;
determining at least one region of interest that includes a plurality of points on the surface of the viewed object using the central processor unit;
determining a distance between each of the plurality of points on the surface of the viewed object in the at least one region of interest and the reference surface using the central processor unit;
determining the point of interest as the point on the surface of the viewed object in the at least one region of interest having the greatest distance from the reference surface using the central processor unit;
determining the point of interest as the point on the surface of the viewed object that is perpendicular to the reference surface or determining the point of interest as the point on the surface of the viewed object that is sloping downward relative to the reference surface using the central processor unit;
comparing the distance of the point of interest from the reference surface to a threshold; and
automatically displaying on the monitor a graphical indicator at the location of the point of interest on the surface of the viewed object, the displaying in response to determining that the distance of the point of interest from the reference surface is greater than the threshold.

US Pat. No. 10,217,015

PHYSICAL AND DIGITAL BOOKMARK SYNCING

International Business Ma...

1. A method comprising:obtaining image data representing page content of a physical book, wherein the obtaining image data is responsive to physical bookmarking of the physical book;
running a character recognition process to process the image data for providing a text string of machine encoded text corresponding to text of the physical book;
identifying within a data repository that stores one or more electronic book a string of text of an electronic book that matches the text string of machine encoded text; and
based on the identifying, digitally bookmarking the electronic book, wherein the digitally bookmarking is synchronized to the physical bookmarking so that a digital bookmark of the electronic book is provided at a location of the electronic book corresponding to a location of the physical book that is bookmarked by the physical bookmarking, wherein the obtaining is performed using a bookmark device, wherein the bookmark device is used to perform physical bookmarking of a physical book page of the physical book, wherein the physical bookmarking includes selecting a certain row of text of the physical book page to the exclusion of remaining rows of text of the physical book page, wherein the digitally bookmarking includes highlighting in the electronic book a certain text row of the electronic book corresponding to the certain row of text, and wherein the method includes outputting to the bookmark device for display on a display of the bookmark device a text based message indicating that the certain text row of the electronic book corresponding to the certain row of text of the physical book has been subject to digital bookmarking.

US Pat. No. 10,217,014

METHOD AND DEVICE FOR PLANNING A RECORDING IN MEDICAL IMAGING

Siemens Healthcare GmbH, ...

1. A method for generating magnetic resonance (MR) image data, comprising:providing an input to a processor that is an electronic designation that specifies a region of interest of an examination subject from which raw MR data are to be acquired by executing an MR data acquisition sequence with an MR scanner that has a region of sensitivity that is smaller than said region of interest, so that said MR scanner is not capable of acquiring said raw MR data from an entirety of said region of interest as a whole;
also providing said processor with a further electronic input that designates at least one predetermined parameter selected from the group consisting of a parameter used in said data acquisition sequence and a parameter from which a parameter used in said data acquisition sequence is derived;
in said processor, using said at least one predetermined parameter to automatically divide said region of interest into at least two sub-regions that are each smaller than said region of sensitivity;
in said processor, automatically defining a final form of said MR data acquisition sequence that causes said raw MR data to be acquired from each of said at least two sub-regions;
in said processor, generating control signals for said MR scanner corresponding to said final form of said MR data acquisition sequence;
from said processor, providing said control signals to said MR scanner and thereby changing operation of said MR scanner so as to acquire said raw MR data from each of said at least two sub-regions instead of from said region of interest as a whole; and
in said processor, reconstructing image data from the raw MR data acquired from said at least two sub-regions, so as to produce an image data set that depicts said region of interest as a whole, and making said image data set available from said computer in electronic form as a data file.

US Pat. No. 10,217,013

METHODS AND SYSTEM FOR DETECTING CURVED FRUIT WITH FLASH AND CAMERA AND AUTOMATED IMAGE ANALYSIS WITH INVARIANCE TO SCALE AND PARTIAL OCCLUSIONS

CARNEGIE MELLON UNIVERSIT...

1. A method for detecting fruit, comprising:(a) illuminating an area containing a fruit;
(b) capturing an image of the illuminated area;
(c) detecting a local maximum located in a region of the image, wherein the local maximum is a pixel having a first intensity and corresponds to an area of specular reflection;
(d) identifying a first ring of pixels surrounding the local maximum;
(e) labeling the region as a location of the fruit if:
the intensity of the first ring is less than the first intensity but greater than a threshold intensity, and
a shape of the first ring matches a geometric profile.

US Pat. No. 10,217,012

DRUG RECOGNITION DEVICE AND METHOD

FUJIFILM CORPORATION, To...

1. A drug recognition device comprising:a light the illuminates a drug having a stamped character thereon, said light illuminating the drug in a plurality of illumination directions;
a camera that captures images of the drug illuminated by the light; and
a processor programmed to perform operations of:
switching the illumination direction in which the light illuminates the drug;
controlling the camera to repeatedly capture at least one image of the drug whenever the illumination direction of the light is switched;
extracting a feature image corresponding to a shadow of the stamped character from the captured image of the drug in each illumination direction which is acquired by the camera;
integrating the feature images in each illumination direction which are extracted to generate an integrated image; and
recognizing the stamped character included in the integrated image and recognizing the type of the drug on the basis of the result of recognizing the stamped character,
wherein the light includes a first light source and a second light source, the first light source causes illumination light to be incident on the drug at a first incident angle in the illumination directions surrounding the drug, and the second light source causes illumination light to be incident on the drug at a second incident angle, is the second incident angle being different from the first incident angle, and
wherein the switching of the illumination direction of the light comprises: switching the first light source in a state in which the second light source is turned off, and switching of the illumination direction of the second light source in a state in which the first light source is turned off.

US Pat. No. 10,217,011

APPARATUS AND METHOD FOR FACILITATING MANUAL SORTING OF SLIDES

Agilent Technologies, Inc...

1. An apparatus for facilitating manual sorting of slides, the apparatus comprising:a horizontal display surface;
a camera;
a light source; and
a controller;
wherein the horizontal display surface can be selectively illuminated by the light source and is adapted for receiving a plurality of slides and a plurality of folders into which the slides are to be sorted, wherein each of the plurality of slides comprises a machine readable identification tag;
wherein the controller is configured to:
(i) illuminate the horizontal display surface with the light source to indicate a folder location on the horizontal display surface to which each of the plurality of folders is to be moved;
(ii) determine the number of folders stacked at the folder location;
(ii) read the identification tag on each of the plurality of slides to retrieve identification information; and
(iii) independently illuminate each of the slides on the display surface by the light source based on its identification information and indicate a slide location in one of the plurality of folders to which each illuminated slide is to be moved.

US Pat. No. 10,217,010

INFORMATION PROCESSING APPARATUS FOR REGISTRATION OF FACIAL FEATURES IN A COLLATION DATABASE AND CONTROL METHOD OF THE SAME

CANON KABUSHIKI KAISHA, ...

1. An information processing apparatus comprising:one or more processors; and
at least one memory storing instructions thereon that, when executed by the one or more processors, cause the information processing apparatus to:
acquire video data;
detect at least one face of the same person from a plurality of frames of the acquired video data;
classify the detected face into one of a plurality of predetermined groups;
select, from the faces classified into the groups, not more than a first predetermined number of faces for each group, wherein the first predetermined number is an integer of not less than 2; and
register feature amounts of the selected faces in a collation database.

US Pat. No. 10,217,009

METHODS AND SYSTEMS FOR ENHANCING USER LIVENESS DETECTION

DAON HOLDINGS LIMITED, G...

1. A method for enhancing user liveness detection comprising:calculating, by a terminal device, a first angle and a second angle for each frame in a video of captured face biometric data, the first angle being between a plane defined by a front face of the terminal device and a vertical axis, the second angle being between the plane defined by the front face of the terminal device and a plane defined by the face of the user;
creating a first signal from the first angles and a second signal from the second angles;
calculating a similarity score between the first and second signals; and
determining the user is live when the similarity score is at least equal to a threshold score.

US Pat. No. 10,217,008

METHOD FOR DETECTING FRAUD TO AUTHENTICATE A FINGER

1. A method of detecting fraud to authenticate that an object is a human finger from a three-dimensional representation of said object previously determined by a processing unit from an image of said object acquired by an image acquisition device, said three-dimensional representation comprising a set of representation points modeling at least a part of the surface of the object, wherein a processor implements the following steps:a) determining at least one principal plane comprising a principal axis in the longitudinal direction of the three-dimensional representation of the object, said principal plane intersecting the representation of the surface of the object along at least one intersection zone,
b) then, for each principal plane, determining a set of working points from representation points at the intersection zone,
c) validating the object as one of a human finger and other than a human finger by implementing a validation process on the position of the working points.

US Pat. No. 10,217,007

DETECTING METHOD AND DEVICE OF OBSTACLES BASED ON DISPARITY MAP AND AUTOMOBILE DRIVING ASSISTANCE SYSTEM

1. A disparity map-based obstacle detection method, at least comprising the steps of:acquiring a disparity map and a V-disparity map in accordance with an image comprising a road surface;
simulating the road surface in accordance with the V-disparity map;
identifying a first obstacle in accordance with a result of simulating the road surface;
extracting an object whose disparity value is greater than a first threshold in accordance with the disparity map, and subjecting the extracted object whose disparity value is greater than the first threshold to a morphological operation so as to identify a second obstacle;
extracting an object whose disparity value is smaller than a second threshold in accordance with the disparity map, and subjecting the extracted object whose disparity value is smaller than the second threshold to a morphological operation so as to identify a third obstacle; and
screening the first obstacle, the second obstacle and the third obstacle in accordance with a training model, so as to detect a final obstacle, the training model being acquired through machine learning in accordance with correct obstacle information and erroneous obstacle information.

US Pat. No. 10,217,006

METHOD AND DEVICE FOR DETECTING OBJECTS IN THE DARK USING A VEHICLE CAMERA AND A VEHICLE LIGHTING SYSTEM

Continental Automotive Gm...

1. A method for detecting objects in the dark, the method comprising:a) capturing, by a vehicle camera, a first image when a vehicle lighting is switched off;
b) capturing, by the vehicle camera, a second image when the vehicle lighting is switched on;
c) determining, by a vehicle processor, movement of the vehicle between capturing the first image and capturing the second image;
d) predicting, by the vehicle processor, a position of an object in the second image based on a position of the object in the first image and the movement of the vehicle;
e) generating, by the vehicle processor, a differential image of the second and first images based on the predicted position of the object in the second image; and
f) distinguishing, by the vehicle processor, between lighting devices and reflective objects based on the differential image.

US Pat. No. 10,217,005

METHOD, APPARATUS AND DEVICE FOR GENERATING TARGET DETECTION INFORMATION

NEUSOFT CORPORATION, She...

1. A method for generating target detection information, comprising:determining, in a unified plane coordinate system, spatial positions of initial detection targets detected by a plurality of different types of sensors in a current detection period;
matching spatial positions of initial detection targets to be matched detected by every two of the plurality of different types of sensors in the current detection period, and determining the initial detection targets under a detection result as result detection targets, wherein spatial positions of any two of the result detection targets under the detection result are matched with each other; and
generating target detection information of the detection result, wherein the target detection information of the detection result comprises target detection information on each of the result detection targets, which is collected by the sensor detecting the result detection target in a dimension corresponding to the sensor, and wherein each of the result detection targets is the initial detection target detected by the sensor.

US Pat. No. 10,217,004

PATIENT VIDEO MONITORING SYSTEMS AND METHODS FOR THERMAL DETECTION OF LIQUIDS

CareView Communications, ...

1. A system for monitoring a patient in a patient area having one or more detection zones, the system comprising:one or more infrared thermography devices;
one or more cameras;
a user interface; and
a computing system configured to:
receive a chronological series of frames from the one or more cameras;
determine presence of liquids by determining a difference between at least one pixel characteristic in a current frame as compared to the at least one pixel characteristic in a plurality of previous frames of the chronological series;
identify groups of pixels corresponding to the determined presence of liquids;
identify thermal signatures of the liquids using at least the one or more infrared thermography devices;
determine presence of intravenous (IV) liquids and bodily fluids based on thermal signatures of the groups of pixels;
identify at least one patient event based on the presence of liquids and the thermal signatures of the liquids; and
generate an alert with the user interface corresponding to the at least one identified patient event.

US Pat. No. 10,217,003

SYSTEMS AND METHODS FOR AUTOMATED ANALYTICS FOR SECURITY SURVEILLANCE IN OPERATION AREAS

Sensormatic Electronics, ...

1. A cloud-based surveillance system for a target surveillance area comprising:at least two input capture devices (ICDs), wherein each of the ICDs has at least one visual sensor for capturing input data from the surveillance area;
a cloud-based analytics platform,
wherein the cloud-based analytics platform is constructed and configured in network-based communication with the at least two ICDs;
wherein each of the at least two ICDs is operable to transmit the Input data to the cloud-based analytics platform; and
wherein the cloud-based analytics platform Is operable to:
generate a 3-Dimensional (3D) visual representation of the target surveillance area based on the captured input data from the at least two ICDs;
perform analytics based on the captured input data and generated 3D visual representation; and
determine at least one pattern of movement of one or more individuals within the surveillance area based on the performed analytics.

US Pat. No. 10,217,002

SYSTEMS AND METHODS FOR MONITORING UNMANNED VEHICLES

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for monitoring unmanned aerial vehicles, the method comprising:receiving, by a processor, a captured image of an observed unmanned aerial vehicle, the captured image including measured data;
comparing the measured data with an unmanned aerial vehicle database, wherein the unmanned aerial vehicle database comprises unmanned aerial vehicle identification information and registered routing information;
determining that a status of the observed unmanned aerial vehicle is authorized or unauthorized based at least in part on the comparison; andgenerating a report, which is indicative of the status of the observed unmanned aerial vehicle being authorized or unauthorized, in accordance with the status of the observed unmanned aerial vehicle being determined to be authorized or unauthorized, respectively,wherein:
the measured data comprises a measured distance and a measured angle,
the method further comprises determining a location of the observed unmanned aerial vehicle from the measured distance and the measured angle,
the comparing comprises comparing the location of the observed unmanned aerial vehicle with unmanned aerial vehicle identification information and registered routing information of an unmanned aerial vehicle database, and
the determining of the status of the observed unmanned aerial vehicle as being authorized or unauthorized is based on the location of the observed unmanned aerial vehicle being consistent or inconsistent with the unmanned aerial vehicle identification information and the registered routing information, respectively.

US Pat. No. 10,217,000

CONTEXT-BASED EXTRACTION AND INFORMATION OVERLAY FOR PHOTOGRAPHIC IMAGES

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for organizing information of a plurality of images published to a network site, the method comprising:generating, by a processor, a knowledge base of stored activity related image objects from the plurality of published images, wherein each activity related image object is indicative of an activity, and wherein each activity related image object is associated with an image location of the plurality of published images;
performing a contextual analysis of a new image published to the network site to identify new activities, to determine an activity position of the activities in the new image, and to determine a new image location of the new image;
identifying at least two stored activity related image objects from the knowledge base as relating to the new image location based on the image location of the plurality of published images; and
overlaying, by the processor, an indicium of the at least two stored activity related image objects identified as relating to the image location of the new image on the new image at the activity position of the activities in the new image, the indicium being an animation of the at least two stored activity related image objects displayed sequentially to depict a sequence of activities.

US Pat. No. 10,216,999

DISPLAY SYSTEM, ELECTRONIC DEVICE, AND DISPLAY METHOD

Semiconductor Energy Labo...

1. A display system comprising:an imaging device;
a processing device comprising a first counter and a second counter; and
a display device comprising a first display element and a second display element,
wherein the imaging device is configured to supply imaging data based on a captured image to the processing device,
wherein the processing device is configured to determine whether the captured image contains a predetermined object, and perform image processing based on the determination,
wherein the processing device is configured to supply first image data containing the captured image and second image data based on the image processing to the display device,
wherein the processing device is configured to add 1 to a value of the first counter of the processing device in a case where the captured image contains the predetermined object, and configured to generate data of an image of a virtual object in a case where the value of the first counter is greater than or equal to a first predetermined number,
wherein the processing device is configured to add 1 to a value of the second counter of the processing device in a case where the captured image does not contain the predetermined object, and configured not to perform the image processing in a case where the value of the second counter is greater than or equal to a second predetermined number,
wherein the first display element is configured to display an image based on the first image data, and
wherein the second display element is configured to display an image based on the second image data.

US Pat. No. 10,216,998

METHODS AND SYSTEMS FOR VISUAL PAIRING OF EXTERNAL DEVICES WITH A WEARABLE APPARATUS

OrCam Technologies Ltd., ...

1. A wearable apparatus for visually pairing with an external device, the wearable apparatus comprising:at least one transmitter;
a memory;
at least one image sensor configured to capture a stream of images from an environment of a user of the wearable apparatus; and
at least one processing device programmed to:
receive the stream of images from the at least one image sensor;
analyze the stream of images to detect the external device in the environment of the user;
cause the at least one transmitter to transmit an interrogation signal, the interrogation signal being configured to cause a change in at least one aspect of the external device, the change including a change in illumination of at least one infrared or visible light source associated with the external device;
analyze the stream of images to detect the change in the at least one aspect of the external device; and
after detection of the change in the at least one aspect of the external device, store in the memory information relating to the external device.

US Pat. No. 10,216,997

AUGMENTED REALITY INFORMATION SYSTEM

eBay Inc., San Jose, CA ...

1. A method comprising:capturing, by a client device, an object from a first perspective in a continuous stream of image data;
transmitting, by the client device, the continuous stream of image data to an augmentation system;
receiving, by the client device, an initial identification of the object including information describing the object based on the first perspective;
displaying, by the client device, the object with the information describing the object from the initial identification;
capturing, by the client device, the object from a second perspective in the continuous stream of image data, the second perspective including a visual feature of the object not visible from the first perspective, and the second perspective differing from the first perspective based on movement of the client device relative to the object;
transmitting, by the client device, the continuous stream of image data including the object captured from the second perspective to the augmentation system;
receiving, by the client device, a refined identification of the object including additional information describing the object based on the second perspective; and
updating the display of the object with the information describing the object from the initial identification with the additional information describing the object based on the refined identification.

US Pat. No. 10,216,996

SCHEMES FOR RETRIEVING AND ASSOCIATING CONTENT ITEMS WITH REAL-WORLD OBJECTS USING AUGMENTED REALITY AND OBJECT RECOGNITION

Sony Interactive Entertai...

1. A method comprising:identifying a real-world object in a scene that is being viewed by a camera of a user device;
while the scene is being viewed by the camera of the user device, matching the real-world object with a tagged object based at least in part on image recognition and a sharing setting of the tagged object, the tagged object having been tagged with a content item;
while the scene is being viewed by the camera of the user device, providing a notification to a user of the user device that the content item is associated with the real-world object;
receiving a request from the user for the content item; and
providing the content item to the user;
wherein the tagged object has been tagged with the content item and assigned the sharing setting before the step of identifying a real-world object is performed.

US Pat. No. 10,216,995

SYSTEM AND METHOD FOR GENERATING AND EMPLOYING SHORT LENGTH IRIS CODES

International Business Ma...

1. A computer-implemented method for generating compact iris representations to reduce the amount of memory space needed based on a database of iris images, the method comprising:generating full-length iris codes for the iris images in the database, wherein the full-length iris code is a binary image that encodes a texture of an associated iris image obtained from a human iris, by segmenting the iris images, non-rigidly unwrapping the segmented images into a rectangular template of row x column pixels, and convolving two filter masks over the unwrapped segmented image;
computing genuine and imposter score distributions for full-length iris codes for iris images in the database using a processor, where the full-length iris codes include a plurality of portions corresponding to circumferential rings of the human iris in the associated iris image;
identifying and retaining code portions that have a contribution that provides separation between imposter and genuine distributions relative to a threshold, wherein identifying code portions includes computing a Hamming distance for all rows in an aligned code to correct for relative rotations, where a minimum Hamming distance is used as a criterion to analyze genuine and imposter score distributions for each row;
measuring a correlation between remaining code portions using a processor by measuring the correlation of each row;
generating a subset of the remaining code portions having low correlations within the subset to produce the compact iris representation that uses less memory; and
storing the compact iris representation into a memory of a computing device.

US Pat. No. 10,216,994

SYSTEMS AND METHODS FOR PANNING A DISPLAY OF A WEARABLE DEVICE

Tobii AB, Danderyd (SE)

1. A method for panning content on a display, the method comprising:determining, with an eye tracking device, a gaze direction of a user;
determining, with a head detection system, a head direction of the user; and
panning content on a display in a particular direction and at a particular speed wherein:
the particular direction is based on the gaze direction and the head direction; and
the particular speed is based on the gaze direction and the head direction, wherein the particular speed is increased when the gaze direction is within a predetermined angular direction of the head direction.

US Pat. No. 10,216,993

INTELLIGENT DOCUMENT ELEMENTS HARVEST AND PRESENTATION SYSTEM AND METHOD

1. A non-transitory computer readable medium storing a program causing a computer to execute a parsing process, said parsing process comprising:(a) extracting one or more figure descriptions from a first entity of a document to result in a first number of figure descriptions from the first entity;
(b) extracting one or more drawing pages from a second entity of the document to result in a second number of drawing pages each disposed on an output page;
(c) generating a list of figure descriptions for said each output page, said generating step comprises calculating a start index and an end index of said list of figure descriptions, wherein said start index is a function of a result of dividing said first number by said second number and said end index is a function of the sum of said start index and the product of a bandwidth and said first number and assembling said list of figure descriptions from said one or more figure descriptions corresponding to the range from said start index to said end index; and
(d) combining said list of figure descriptions with said each output page,whereby a user of said each output page can look up a figure description of a figure on said each output page in said list of figure descriptions.

US Pat. No. 10,216,991

AUTOMATICALLY EDITING PRINT JOB BASED ON STATE OF THE DOCUMENT TO BE PRINTED

KONICA MINOLTA LABORATORY...

1. A method for processing print jobs implemented on a print system, the system comprising a server which executes a workflow and a client which executes an editor program, the method comprising:by the client,
(a) receiving a user selection of a workflow to be executed by the server for a document the selected workflow including one or more editing processes for automatically editing the document or its associated print job ticket based on setting parameters of the selected workflow and either predefined key phrases contained in pages of the document or bookmarks associated with pages of the document or both;
(b) editing the document by the editor program, including displaying the document and emulating effects of the selected workflow using a plug-in program corresponding to the selected workflow, wherein the plug-in program is configured to automatically change a display effect of the document by emulating effects of the selected workflow based on setting parameters of the selected workflow and either predefined key phrases contained in the document or bookmarks associated with the document or both;
(c) outputting the edited document, the edited document having associated data that specifies the plug-in program used for emulation in step (b);
by the server,
(d) obtaining a print job to be input to a present workflow, the print job including the edited document and an associated job ticket;
(e) based on the associated data of the edited document, determining whether the plug-in program used for emulation when the document was edited by the editor program is consistent with the present workflow;
(f) when it is determined that the plug-in program used for emulation when the document was edited by the editor program is not consistent with the present workflow, notifying the determination result to a user; and
(g) when it is determined that the plug-in program used for emulation when the document was edited by the editor program is consistent with the present workflow, executing the present workflow on the document to automatically edit the document or its associated print job ticket based on setting parameters of the present workflow and either predefined key phrases contained in pages of the document or bookmarks associated with pages of the document or both, and submitting the automatically edited print job to a printing device to be printed.

US Pat. No. 10,216,990

SELECTION OF MACHINE-READABLE LINK TYPE

Hewlett-Packard Developme...

1. An article comprising at least one non-transitory machine-readable storage medium comprising instructions executable by a processing resource of a computing device to:acquire, via a network interface device, a document in an electronic format;
select, based whether the document is a textual-type or an image-type document, one of an overt type and a covert type of machine-readable link for evaluation;
determine, with the computing device, characteristics of the content of the document, including a tonal distribution for the content when the selected type is a digital watermark;
decide whether the characteristics satisfy an evaluation metric for use of the selected type of machine-readable link;
based on satisfaction of the evaluation metric, determine to produce a first linked version of the document using a machine-readable link of the selected type embodied in the first linked version; and
based at least in part on non-satisfaction of the least one evaluation metric, determine to produce a second linked version of the document using a machine-readable link of the non-selected type embodied in the second linked version.

US Pat. No. 10,216,989

PROVIDING ADDITIONAL INFORMATION FOR TEXT IN AN IMAGE

Amazon Technologies, Inc....

1. One or more server devices comprising:at least one processor;
at least one memory comprising instructions that, when executed by the at least one processor, cause the one or more server devices to:
receive digital data from a client device in communication with the one or more server devices via a network, the digital data corresponding to a first image displayed on a screen associated with the client device and including image data representing the first image;
perform optical character recognition on the image data to produce recognized text data;
identify text data included in the recognized text data;
determine a first potential definition of the text data;
determine a second potential definition of the text data;
determine, based at least in part on a portion of the digital data, that the first potential definition is more relevant than the second potential definition;
identify a source of additional information corresponding to the first potential definition;
send, via the network, an indication to the client device that additional information associated with the text data is available;
receive, via the network, a request from the client device for the additional information; and
send, via the network and based at least in part on receiving the request, the additional information to the client device so as to cause the additional information to be displayed on the screen.

US Pat. No. 10,216,988

INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT

KABUSHIKI KAISHA TOSHIBA,...

1. An information processing device comprising:a memory configured to store therein accumulated information containing entry information and category information accumulated by form type and entry field, the entry information being based on information that is written, when a form is written, to the entry field of the form by a user, the category information representing a category of the entry information, the category information being stored in association with the entry information; and
one or more processors configured to:
receive a form;
recognize entry information entered in the form received;
calculate a reliability of the form type based on whether or not the entry information recognized is contained in the accumulated information, a proportion of the entry information recognized that is contained in the accumulated information, and a proportion of entry information in a same category as the entry information recognized that is contained in the accumulated information; and
specifying multiple form types in a descending order of the reliabilities.

US Pat. No. 10,216,987

IMAGE PROCESSING DEVICE AND IMAGE PROCESSING METHOD

SONY INTERACTIVE ENTERTAI...

1. An image processing device comprising:a contour line acquisition unit configured to acquire a contour line of an object from an image frame that constitutes a moving image;
a target part identification unit configured to identify the position of a predetermined part of the object based on the contour line of the object acquired by the contour line acquisition unit;
a processing unit configured to create a processed image in which predetermined processing is performed on an area, which is determined based on the position of the predetermined part identified by the target part identification unit, in the image frame;
an output unit configured to output data of the moving image having, as the image frame, the processed image generated by the processing unit; and
a storage unit configured to store data of a three-dimensional graphics image of a fingernail with nail art, wherein
the contour line acquisition unit acquires the contour line of a human hand, which is the object,
the target part identification unit identifies an area of the fingernail based on the position of a fingertip in the contour line, and
the processing unit combines the image of the fingernail with nail art such that the image of the fingernail with nail art selected by a user is overlapped with the area of the fingernail, and
the contour line acquisition unit acquires, by adjusting through, matching score computation, a set of coefficients occurring when a parameter of a B-spline curve that defines the contour line of the hand is represented in a linear combination of a parameter that defines the contour line of a plurality of reference shapes defined in advance.

US Pat. No. 10,216,986

GUIDANCE SYSTEM, DETECTION DEVICE, AND POSITION ASSESSMENT DEVICE

NIKON CORPORATION, Tokyo...

1. A detection device comprising:a first image capture that captures an image containing a subject person from a first direction;
a second image capture that is separate from the first image capture and captures an image containing the subject person from the first direction;
an adjuster that adjusts at least one of the first image capture and the second image capture so that a predetermined subject can be contained in a region in which an image capturing region of the first image capture and an image capturing region of the second image capture overlap each other;
a detector that detects a size of an image corresponding to a head of the subject person by way of image capturing performed by at least one of the first image capture and the second image capture; and a determiner that determines a postural state of the subject person based on (i) a relation between a height of the subject person and the size of the image corresponding to the head of the subject person, (ii) identification information of the subject person, and (iii) a change in the size of the image corresponding to the head of the subject person.

US Pat. No. 10,216,985

SESSIONS AND GROUPS

NIKE, Inc., Beaverton, O...

1. A computer-implemented method comprising:automatically initiating a first time clock for measuring, by a first device worn by a first user, athletic activity during a first predetermined time period;
receiving movement data from one or more sensors of the first device during the first predetermined time period;
initiating calculation of an energy expenditure value for the first user for the first predetermined time period based on at least the movement data received from the one or more sensors, an activity factor indicating an energy requirement for the athletic activity, and an activity intensity factor;
after initiating the calculating of the energy expenditure values for the first predetermined time period, initiating a second time clock for measuring athletic activity during a second non-predetermined time period that is within the first predetermined time period;
initiating a session for the first user based on second movement data received from the one or more sensors of the first device during the second non-predetermined time period;
receiving locational data of the first user during the second non-predetermined time period;
determining that the session is associated with a first activity type based on the locational data for the first user;
receiving, from a second device associated with the first user, additional data;
determining, based on an analysis of the additional data received from the second device associated with the first user, that the first user has remained stationary; and
responsive to determining, based on the additional data received from the second device associated with the first user, that the first user has remained stationary, pausing the session.

US Pat. No. 10,216,983

TECHNIQUES FOR ASSESSING GROUP LEVEL COGNITIVE STATES

GENERAL ELECTRIC COMPANY,...

1. A method, comprising:receiving data related to one or more individuals from one or more cameras in an environment;
executing one or more agent-based simulators that each operate to generate a model of behavior of a respective individual, wherein an output of each model is symbolic sequences representative of internal experiences of the respective individual during simulation; and
predicting a subsequent behavior for each of the respective individuals when the symbolic sequences match a query symbolic sequence for a query behavior;
wherein each model uses particle filtering and each particle includes recurrent neural networks that iteratively estimates temporal evolution of the symbolic sequences based on the data.

US Pat. No. 10,216,982

PROJECTING A VIRTUAL COPY OF A REMOTE OBJECT

Microsoft Technology Lice...

1. A system for projecting a virtual copy of a remote object comprising:a processor to:
calibrate the system, the calibration comprising collecting environment data corresponding to a local environment in which the system is located;
receive the virtual copy of a remote object corresponding to a remote user in a remote environment;
detect a viewpoint of a local user in the local environment; and
project the virtual copy of the remote object in the local environment based on the viewpoint of the local user, the virtual copy of the remote object to be positioned in the local environment by taking into account geometry of local objects in the local environment, wherein the virtual copy of the remote object is to be projected against fixed surfaces in the local environment, wherein the virtual copy of the remote object comprises modified mesh data based on an orientation of the remote user.

US Pat. No. 10,216,981

EYEGLASSES THAT MEASURE FACIAL SKIN COLOR CHANGES

Facense Ltd., Kiryat Tiv...

1. A system configured to detect a physiological response based on facial skin color changes (FSCC), comprising:an inward-facing head-mounted visible-light camera (VCAMin) configured to take images of a region of interest (IMROI) on a user's face; wherein the region of interest (ROI) covers at least a portion of at least one of the following regions on the user's face: forehead, nose, and cheek; and wherein the ROI is illuminated by ambient light; and
a computer configured to detect the physiological response based on a photoplethysmographic signal manifested by FSCC recognizable in IMROI.

US Pat. No. 10,216,980

METHOD AND SYSTEM FOR TAGGING AN INDIVIDUAL IN A DIGITAL IMAGE

AVIGILON PATENT HOLDING ...

1. A system for tagging an image of an individual in a photo, the system comprising:a server to support a web site; and
a data store accessible by the server and configured to store a plurality of sets of reference variables generated from a plurality of processed facial images of identified individuals, and
the server configured to:
generate, for each of the plurality of processed facial images, location information including a facial tilt angle;
receive a subject photo containing an unknown facial image of an individual;
generate a first set of variables from the unknown facial image;
determine a predicted identity of the unknown facial image based on a statistical comparison model that analyzes the first set of variables relative to at least some of the plurality of sets of reference variables;
transmit the predicted identity over a network to a computing device; and
receive perception feedback regarding the predicted identity from a user of the web site.

US Pat. No. 10,216,979

IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND STORAGE MEDIUM TO DETECT PARTS OF AN OBJECT

Canon Kabushiki Kaisha, ...

1. An image processing apparatus comprising:one or more processors; and
a memory storing instructions that, when executed by the one or more processors, cause the image processing apparatus to perform operations including:
acquiring an image that includes a target object having a posture and a plurality of parts in an attitude relationship to each other, and acquiring a previously learned model,
detecting, as a first detection using the previously learned model, a candidate region of each of the plurality of parts of the target object included in the acquired image,
selecting, from among the plurality of parts and based on the candidate region detected by the first detection, a first part having a first reliability that is high and a second part having a second reliability that is low relative to the high first reliability, and
correcting the previously learned model by changing a position of the low reliability second part based on the selected first part having the high reliability,
wherein, after correcting the previously learned model, positions of the plurality of parts of the target object are detected using the corrected previously learned model, even in a case where a partial region cannot be sufficiently selected from the uncorrected previously learned model.

US Pat. No. 10,216,978

FINGERPRINT IDENTIFICATION DEVICE AND FINGERPRINT IDENTIFICATION METHOD

Gingy Technology Inc., H...

1. A fingerprint identification device, comprising:a light source, configured to emit a light beam to an object;
a processor, coupled to the light source; and
a light receiver, coupled to the processor, and configured to capture an object image of the object in a time interval,
wherein the processor analyzes the object image, and extracts one of a plurality of object pictures of the object image to obtain a fingerprint image, and the processor performs a fingerprint identification operation on the fingerprint image to obtain a fingerprint identification result, wherein the processor further analyzes the object image to obtain pixel change data of the object image in the time interval, and the processor determines whether the fingerprint image is verified according to the fingerprint identification result and the pixel change data,
wherein the processor analyzes a partial block of each of the object pictures respectively to obtain pixel data corresponding to the object pictures in the time interval, wherein the processor collects statistics of the pixel data to obtain the pixel change data,
wherein the pixel data of each of the object pictures is a sum of a total red pixel value, the total green pixel value, and the total blue pixel value of all the pixels of the partial block of the block picture.

US Pat. No. 10,216,977

PROGRESSIVE MULTIPLE FINGERPRINT ENROLLMENT AND MATCHING, AND DYNAMIC USER ACCOUNT TRANSITIONS

QUALCOMM Incorporated, S...

1. An apparatus, comprising:a fingerprint sensor system; and
a control system configured for communication with the fingerprint sensor system, the control system further configured for:
receiving fingerprint sensor data from the fingerprint sensor system;
extracting fingerprint data from the fingerprint sensor data, the fingerprint data corresponding to fingerprints of multiple digits of a user's hand; and
providing a progressive enrollment process for the fingerprint data, the progressive enrollment process including:
storing at least some of the fingerprint data; and
augmenting stored fingerprint data as the user continues to use the apparatus, wherein the progressive enrollment process involves processing first fingerprint data corresponding to a first digit of the user's hand during a processing time for second fingerprint data corresponding to a second digit of the user's hand.

US Pat. No. 10,216,976

METHOD, DEVICE AND MEDIUM FOR FINGERPRINT IDENTIFICATION

XIAOMI INC., Haidian Dis...

1. A method for fingerprint identification, the method comprising:detecting whether the number of damaged pixel units in a fingerprint identification sensor reaches a preset threshold value, the damaged pixel units being physically damaged pixel units in the fingerprint identification sensor and being determined according to a pixel feature of each of the pixel units acquired in a preset photographic environment, wherein the pixel feature at least includes a brightness value and/or a contrast; and
stopping identifying a fingerprint image acquired by the fingerprint identification sensor if the number of the damaged pixel units reaches the preset threshold value.

US Pat. No. 10,216,975

OPTICAL IMAGING VIA IMAGING LENS AND IMAGING PINHOLE IN UNDER-SCREEN OPTICAL SENSOR MODULE FOR ON-SCREEN FINGERPRINT SENSING IN DEVICES HAVING ORGANIC LIGHT EMITTING DIODE (OLED) SCREENS OR OTHER SCREENS

Shenzhen Goodix Technolog...

1. An electronic device capable of detecting a fingerprint by optical sensing, comprising:a display panel that includes light emitting display pixels operable to emit light for displaying images;
a top transparent layer formed over the display panel as an interface for being touched by a user and for transmitting the light from the display panel to display images; and
an optical sensor module located below the display panel to receive light via the top transparent layer to detect a fingerprint,
wherein the optical sensor module includes
an optical sensor array of optical detectors to convert the received light from the top transparent layer and display panel that carries a fingerprint pattern of the user into detector signals representing the fingerprint pattern,
a pinhole layer located between the display panel and the optical sensor array and structured to include a pinhole that is structured to produce a large optical field of view in collecting the received light and to transmit the collected light towards the optical sensor array, and
a lens located between the pinhole layer and the optical sensor array to receive the transmitted light from the pinhole and to focus the received light onto the optical sensor array for optical imaging at an enhanced spatial imaging resolution at the optical sensor array in comparison with a lower spatial imaging resolution when using the pinhole to project light onto the optical sensor array without the lens.

US Pat. No. 10,216,974

NOISE-REDUCED CAPACITIVE IMAGE SENSOR AND METHOD OPERATING THE SAME

SUNASIC TECHNOLOGIES LIMI...

1. A capacitive image sensor, for sensing a fingerprint pattern of a finger, comprising a semiconductor substrate, at least one driving source and an array of capacitive sensing units formed on said semiconductor substrate, characterized in that each of said array of capacitive sensing units comprises:a protective layer to be touched by said finger;
a sensing electrode arranged underneath said protective layer;
a voltage follower, wherein an input node of the voltage follower is connected to the sensing electrode;
a comparative capacitor, wherein one node of the comparative capacitor is electrically connected to the voltage follower, and another node thereof is electrically connected to the driving source; and
a bias voltage supply circuit, for providing different bias voltages to the sensing electrode,
wherein the comparative capacitor, a portion of the bias voltage supply circuit, and the voltage follower are formed in an isolated well; the isolated well is configured in such a way that current is able to be prevented from flowing across an interface in the isolated well and surrounding structures; the driving source is connected to a bulk node of the isolated well such that well potential of the isolated well equals to the output electric potential of the driving source; a change of output electric potential of the driving source is caused by a positive and/or negative waveform.

US Pat. No. 10,216,955

SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A MEDICAL DEVICE

SOCIEDAD ESPANOLA DE ELEC...

1. A medical device, comprising:a plurality of device components;
a data receiver configured to wirelessly receive user identification information;
a memory configured to store permission information in association with the user identification information, the permission information identifying one or more of the device components as being permissible for access by the user; and
a processor in communication with the memory, the data receiver, and the plurality of device components, the processor configured to:
retrieve the permission information from the memory in response to receiving the user identification information from the data receiver, and
enable access to the one or more device components based on the retrieved permission information.

US Pat. No. 10,216,954

PRIVACY DETECTION OF A MOBILE APPLICATION PROGRAM

International Business Ma...

1. A method for privacy violation detection of a mobile application program having a platform specification comprising:mining regular histories of security or privacy relevant operations based on the platform specification of the mobile application program;
the mining regular histories comprising:
creating a call-graph representation of the mobile application program;
traversing all roots of the call-graph, the roots including the entry points of the mobile application program; and
collecting sequences of the security or the privacy relevant operations according to the platform specification;
extracting a plurality of learnable security or privacy relevant features from the mined regular histories;
combining the plurality of learnable features into a single feature vector;
feeding the single feature vector into a machine-learning-based classification algorithm; and
determining whether the mobile application program includes one or more permissions for accessing unauthorized privacy data of a mobile application user based on a machine learning classification of the single feature vector.

US Pat. No. 10,216,953

CONTROL METHOD OF IMAGE COMMUNICATION APPARATUS FOR PREVENTING THE DISCLOSURE OF ADDRESS BOOK DATA TO AN APPARATUS TO WHICH THE ADDRESS BOOK DATA IS TO BE EXPORTED

Canon Kabushiki Kaisha, ...

4. A control method for a data distribution system including an export apparatus and an import apparatus which includes a storage unit including a shared area which is a storage area of data shared among a plurality of users and a private area which is a storage area of data individually provided for each user, the control method comprising:generating, in the export apparatus, a first export file including private data individually used by a user of the export apparatus and having added type data indicating the private data is included;
generating, in the export apparatus, a second export file including shared data shared among a plurality of users of the export apparatus and not including the private data,
externally outputting, in the export apparatus, the first export file or the second export file,
inputting, in the import apparatus, a file via a user interface which the import apparatus provides to an electronic apparatus by using a hypertext transfer protocol;
accepting, in the import apparatus, designation of an import destination of the input file via the user interface,
determining, in the import apparatus, whether the input file is the first export file including the private data according to the type data added to the input file;
writing, in the import apparatus, the private data included in the input file in the private area if it is determined that the input file is the first export file and the private area is designated as the import destination of the input file,
writing, in the import apparatus, the shared data included in the input file in the shared area if the input file is the second export file in which the type data has not been added and the shared area is designated as the import destination of the input file, and
displaying, in the import apparatus, a warning message via the user interface without writing the private data included in the input file in the shared area if it is determined that the input file is the first export file and the shared area is designated as the import destination of the input file.

US Pat. No. 10,216,952

LOCATION BASED DISK DRIVE ACCESS

SEAGATE TECHNOLOGY LLC, ...

1. A method of providing data security for a storage drive, comprising:identifying a predetermined geographical area within which access to the storage drive is permitted;
determining a geographical location of the storage drive;
permitting access to at least a portion of the storage drive when the determined geographical location of the storage drive is within the identified geographical area;
upon determining the determined geographical location of the storage drive is outside the identified geographical area, determining a time period over which the storage drive remains outside the identified geographical area;
upon determining the time period satisfies a time threshold, denying access to at least a portion of the storage drive;
determining a failure of identifying the geographical location of the storage drive, or that the geographical location of the storage drive is indeterminable, or determining both; and
denying access to at least the portion of the storage drive based at least in part on the determining.

US Pat. No. 10,216,951

SELF SERVICE PORTAL FOR TRACKING APPLICATION DATA FILE DISSEMINATION

Bank of America Corporati...

1. A method, comprising:generating, by at least one processor of a computing platform comprising a memory and a communication interface, a graphical user interface for uploading an application data file, the graphical user interface for uploading the application data file comprising a selectable option for designating whether the application data file is at least one of intended for internal use or external use and confidential or proprietary;
communicating, via the communication interface and to a computing device, the graphical user interface for uploading the application data file;
receiving, via the communication interface and from the computing device, the application data file;
receiving, via the communication interface and from the computing device, data, generated based on an option selected using the selectable option for designating whether the application data file is at least one of intended for internal use or external use and confidential or proprietary, indicating that the application data file is at least one of intended for internal use and confidential or proprietary;
generating, by the at least one processor and based on the data indicating that the application data file is at least one of intended for internal use and confidential or proprietary, a request for a modified version of the application data file that comprises an element for tracking dissemination of the application data file, wherein the request for the modified version of the application data file indicates that the application data file is at least one of intended for internal use and confidential or proprietary;
generating, by the at least one processor, a graphical user interface comprising a link configured to provide the computing device with access to the modified version of the application data file that comprises the element for tracking dissemination of the application data file;
communicating, via the communication interface and to the computing device, the graphical user interface comprising the link configured to provide the computing device with access to the modified version of the application data file that comprises the element for tracking dissemination of the application data file;
detecting, by a data leak prevention (DLP) system associated with an organization that is associated with the computing platform, outbound data that comprises at least a portion of the element for tracking dissemination of the application data file and that is destined for a network address that is not associated with the organization; and
responsive to detecting the outbound data that comprises the at least a portion of the element for tracking dissemination of the application data file and that is destined for the network address that is not associated with the organization, preventing, by the DLP system associated with the organization, the outbound data that comprises the at least a portion of the element for tracking dissemination of the application data file from being communicated to the network address that is not associated with the organization.

US Pat. No. 10,216,950

MULTI-TIERED FILE LOCKING SERVICE IN A DISTRIBUTED ENVIRONMENT

International Business Ma...

1. An apparatus comprising:at least one processor;
a memory coupled to the at least one processor;
a file residing in the memory;
a file locking service residing in the memory and executed by the at least one processor, the file locking service comprising:
a thread locking mechanism that:
maintains a list of local locks by threads for nodes in a distributed file system, wherein the list of local locks by threads comprises a list of files currently being processed by any thread of a process corresponding to the list of local locks, wherein access to the list of local locks by threads is controlled using a mutex lock;
receives a request from a first thread for a lock of a file in the distributed file system;
when a local lock corresponding to the file exists in the list of local locks, denies the request from the first thread for the local lock of the file;
when the local lock corresponding to the file does not exist in the list of local locks, creates an entry corresponding to the file in the list of local locks, and requests a process lock for the file from a process locking mechanism, wherein the process lock for the file comprises a lock on a node number corresponding to the file in a table of locks maintained by the process executing the first thread;
the process locking mechanism that:
receives the request for the process lock for the file from the thread locking mechanism, and in response, when the process lock for the file is not available, denies the request for the process lock from the thread locking mechanism;
when the process lock for the file is available, requesting a file system lock for the file from a file locking mechanism; and
a file locking mechanism that:
receives a request from the process locking mechanism for a file system lock for the file; and
when the file system lock is available, the file locking mechanism grants the file system lock for the file to the process locking mechanism, which in turn grants the process lock for the file to the thread locking mechanism, which in turn grants the file system lock for the file to the first thread.

US Pat. No. 10,216,949

DYNAMIC QUORUM MEMBERSHIP CHANGES

Amazon Technologies, Inc....

1. A system, comprising:a plurality of nodes implementing a distributed storage service configured to implement:
a plurality of storage nodes comprising one or more processors, the plurality of storage nodes storing data for a database that together implement a quorum set for the data, wherein each storage node of the plurality of storage nodes is configured to maintain a replica of the data and process write requests received at the storage node according to a first version of a protection group policy that is enforced for the data;
a membership management module, configured to:
detect that a storage node of the quorum set is unavailable for processing write requests;
in response to detecting that the storage node of the quorum set is unavailable for write requests:
create a new quorum set for the data, wherein the new quorum set includes the remaining storage nodes of the previous quorum set and an additional storage node, wherein the remaining storage nodes of the quorum set are configured to replicate previously processed write requests to be included in the replica maintained at the additional storage node;
update the protection group policy to a second version of the protection group policy that is enforced for the data to include the new quorum set to:
 process subsequent write requests directed toward the data that are received when the second version of the protection group policy is enforced, wherein subsequent write requests are processed at both the previous quorum set and the new quorum set;
 process subsequent read requests directed toward the data that are received when the second version of the protection group policy is enforced, wherein the subsequent read requests are processed at a determined one of either the previous quorum set or the new quorum set that is capable of satisfying a read quorum;
determine that the new quorum set maintains the processed write requests according to a quorum requirement for write requests directed to the data; and
in response to determining that the new quorum set maintains the processed write requests according to the quorum requirement for write requests directed to the data, revise the protection group policy to a third version of the protection group policy that is enforced for the data to exclude the previous quorum set from processing write requests and read requests such that write requests and read requests directed to the data are processed by the new quorum set when the third version of the protection group policy is enforced.

US Pat. No. 10,216,948

SYSTEM AND METHOD FOR THE CREATION AND MANAGEMENT OF DECENTRALIZED AUTHORIZATIONS FOR CONNECTED OBJECTS

BULL SAS, Les Clayes-sou...

1. A computing system for the management of authorizations of connected objects, the computing system comprising:a plurality of storage servers comprising at least one memory and a blockchain distributed in the form of storage nodes, the plurality of storage servers configured to record a new block on the blockchain;
an access controlling module configured to create a right of access to the blockchain, for a user of the system, the right of access including:
a right of access only comprising read access; and
a right of access comprising a right to record new blocks of the blockchain on one of the storage nodes, the user having said right being a governing entity;
a write module for the creation of authorizations, the write module configured to:
receive smart contract execution data issued by a governing entity, the smart contract execution data comprising a unique identifier of the smart contract, application conditions of the smart contract and at least one conditional authorization associated with the smart contract; and
write the smart contract execution data on a storage node of the blockchain; and
a connection module for the allocation of authorizations, the connection module configured to:
receive connection data between a connected object and a third-party entity, the connection data including at least one authorisation request;
identify, on a storage node of the blockchain, a conditional authorization related to the authorization request;
verify the application conditions included in the smart contract execution data; and
generate an authorization allocation instruction acceding to the authorization request only when all the application conditions of the conditional authorization are verified.

US Pat. No. 10,216,947

SYSTEM AND METHOD FOR ACTIVATING A DATA ENTRY MECHANISM

AO Kaspersky Lab, Moscow...

1. A method for activating a data entry mechanism for an application, the method comprising:detecting, by a hardware processor, an activity state of the application during an execution of the application on a user device;
determining, by the hardware processor, security requirements associated with the activity state, wherein the security requirements comprise properties for the data entry mechanism;
activating, by the hardware processor, the data entry mechanism for receiving user input for the application, wherein the data entry mechanism is governed according to the properties of the security requirements;
receiving user input from the user device in accordance with the data entry mechanism; and
displaying, by the hardware processor, a modified version of the user input according to the properties of the security requirement.

US Pat. No. 10,216,946

CLOUD-BASED SECURE PRINTING SYSTEM AND METHOD OF PROCESSING SAME

MWSTORY CO., LTD., Seoul...

1. A cloud-based secure printing system, comprising:a communication network;
a mobile terminal which is equipped by a user and is connected to the communication network to transmit output data desired to be output;
a plurality of printers which is connected to the communication network to be installed in different locations and is driven such that any one is selected according to a print request generated from the mobile terminal through the communication network to print the output data;
a print management server which allows the mobile terminal to select one of the printers when the mobile terminal requests to print through the communication network, confirms a print authority of the user of the mobile terminal, receives the output data from the mobile terminal to control the selected printer to print the output data, and transmits a print result to the mobile terminal when the print is completed by the selected printer;
at least one print agent which is connected to the communication network to manage the printers, is subject to output scheduling by the print management server, and receives the output data from the print management server to transmit the output data to the selected printer to print the output data;
a personal computer which is equipped by the user and selects one of the printers, and requests the print management server to allow the printer selected by the print agent to perform printing;
a print database which receives and stores the output data from the print management server and stores user information on a user of the mobile terminal and the personal computers and output history information of the user; and
a print spool database which stores spool data corresponding to the output data by the print management server and a list of printable documents including the spool data, loads the list of printable documents to the print management server when at least one of the mobile terminal and the personal computers requests the printing, and provides a desired document to be selected from the list of the printable documents by the mobile terminal and the personal computer.

US Pat. No. 10,216,945

DIGITAL TOUCH SCREEN DEVICE AND METHOD OF USING THE SAME

Clipo, Inc., San Ramon, ...

1. A computing device, comprising:a touch screen display configured to display a first image concealed by a second image;
one or more processors;
a memory coupled to the processors and storing instructions which when executed by the processors cause the processors to perform a method, wherein the method comprises:
detecting one or more finger contacts with the touch screen display;
identifying a trace on the touch screen display created by the finger contacts, wherein the trace comprises at least a first segment and a second segment;
consecutively clearing portions of the second image corresponding to the first and second segments of the trace to reveal corresponding portions of the first image; and
subsequent to clearing portions of the second image corresponding to the first and second segments of the trace for a predetermined time period, consecutively redraw the cleared portions of the second image to re-conceal the corresponding portions of the first image.

US Pat. No. 10,216,944

METHOD FOR EXECUTING ACCESS CONTROL OVER ELECTRONIC DEVICE AND ELECTRONIC DEVICE CAPABLE OF EXECUTING ACCESS CONTROL

GETAC TECHNOLOGY CORPORAT...

1. A method for executing access control over an electronic device, comprising the steps of:detecting a position information associated with a current location of the electronic device with a positioning module;
determining whether the electronic device has moved outside an authorized region according to the position information; and
when the electronic device has moved outside the authorized region, disabling a plurality of accessible functions of the electronic device according to a user information and locking the positioning module such that the positioning module cannot be disabled;
wherein a plurality applications are displayed in a display frame of the electronic device, and the step of disabling the plurality of accessible functions comprises the step of not displaying a subset of the plurality applications according to a predetermined list; and
wherein a plurality of folders are displayed in the display frame of the electronic device, and the step of disabling the plurality of accessible functions comprises the step of not displaying a subset of the plurality of folders according to the predetermined list.

US Pat. No. 10,216,943

DYNAMIC SECURITY QUESTIONS IN ELECTRONIC ACCOUNT MANAGEMENT

International Business Ma...

1. A computer-implemented method for providing access to an electronic account, the method comprising:receiving, by a first computer from a second computer over a network, in response to information entered into a graphical user interface (GUI) displayed on the second computer, a plurality of security questions and, for each security question, a plurality of answers and one or more rules for generating a security question from the plurality of security questions and an answer from the plurality of answers, wherein the one or more rules determine which of the security questions to generate based on first contextual information associated with the user, which answer to generate based on second contextual information associated with the user, the rules specifying the at least one answer of the plurality of answers include one or more dynamic elements based upon a time in a number of minutes associated with the user, the dynamic elements varying based upon the second contextual information associated with the user, and the GUI allows the user to disable each security question;
storing, by the first computer, the security questions, the answers, the rules for generating a security question, an answer, a name for each security question assigned by the user, and whether each security question is disabled in a database, whereby the security questions, the answers, and the rules for generating a security question and an answer are associated with additional security credentials of the user; and
in response to receiving, by the first computer from the second computer over the network, via information entered into the GUI on the second computer, a request to provide access to an electronic account associated with the user:
retrieving, by the first computer, from the database, the plurality of security questions, the plurality of answers, and the rules for generating a security question for each security question not disabled and an answer;
generating, by the first computer, a security question, based on the retrieved rules and the first contextual information associated with the user;
generating, by the first computer, a first answer to the generated security question, based on, the retrieved rules, and the second contextual information associated with the user;
transmitting, by the first computer, the generated security question to the second computer via the network;
receiving, by the first computer from the second computer over the network a second answer to the generated security question based on information entered into the GUI on the second computer displaying a time to the user including a number of minutes for the user to generate a currently correct answer of the plurality of answers;
determining, by the first computer, that the first answer matches the second answer; and
granting, by the first computer, the second computer access to the electronic account, based on the additional security credentials of the user.

US Pat. No. 10,216,942

METHOD FOR PRESERVING THE INTEGRITY OF STORED DATA

University of Louisiana a...

1. A method for creating and restoring encrypted data using a computer processing unit, comprising:(a) generating a digital root 9 number to be stored, comprising:
randomly choosing a positive integer m and a non-negative integer n;
computing a resulting value for

 and
replacing any 9s in the resulting number with 0s to produce the digital root 9 number;
(b) encrypting the digital root 9 number, comprising:
randomly selecting integers m and n from a range of pre-set integers;
computing a resulting value b for 5n(9m);
counting a total number of at least one integers in value b and subtracting that total number of integers by 1 to determine an analytic k value; and
determining at least one permutation using the b and k values;
(c) storing the encrypted number;
(d) discovering that at least one integer y of the encrypted number has been degraded during storage;
(e) inputting integer values for the integer y from values of 0 through 8 until the digital root of the encrypted number equals 9.

US Pat. No. 10,216,941

METHOD OF DISTRIBUTING APPLICATION WITH SECURITY FEATURES AND METHOD OF OPERATING THE APPLICATION

Line Corporation, Tokyo ...

1. A method of distributing an application, the method comprising:transmitting, by a distribution server, a signal requesting metadata to a user terminal where an application is installed;
receiving, by the distribution server, a reply comprising first metadata from the user terminal;
determining, by the distribution server, whether the application is forged, altered, or hacked by comparing the first metadata from the user terminal and second metadata corresponding to the application and stored in the distribution server;
setting a connection with the user terminal to re-install the application on the user terminal in response to the distribution server determining that the application is forged, altered, or hacked;
encrypting, by the distribution server, one or more installation files that install the application with a private key; and
transmitting the encrypted one or more installation files via the set connection, to the user terminal.

US Pat. No. 10,216,940

SYSTEMS, METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR TRUNCATED, ENCRYPTED SEARCHING OF ENCRYPTED IDENTIFIERS

CHANGE HEALTHCARE HOLDING...

1. A secure patient information database system, the system comprising at least one processor, wherein the at least one processor is configured to cause the system to at least:receive patient information associated with a plurality of patients and comprising a patient identifier for each of the plurality of patients, where the patient identifier comprises a sequence of characters;
extract a first subset of the sequence of characters comprising a first number of characters from each of the patient identifiers;
encrypt the first subset of the sequence of characters from each of the patient identifiers to form a first truncated encrypted identifier for each of the plurality of patients;
extract a second subset of the sequence of characters comprising a second number of characters from each of the patient identifiers, wherein the second subset comprises the first subset and at least one additional character;
encrypt the second subset of the sequence of characters from each of the patient identifiers to form a second truncated encrypted identifier for each of the plurality of patients;
encrypt each of the patient identifiers to create an encrypted patient identifier for each of the plurality of patients;
store, for each of the plurality of patients, the first truncated encrypted identifiers, the second truncated encrypted identifiers, and the encrypted patient identifiers;
receive a search request comprising a search string of one or more characters;
encrypt a number of characters of the search string equal to the first number of characters to create an encrypted search string in response to the search string comprising at least the first number of characters, but less than the second number of characters; and
encrypt a number of characters of the search string equal to the second number of characters to create an encrypted search string in response to the search string comprising at least the second number of characters.

US Pat. No. 10,216,939

IMPLEMENTING A SECURITY SOLUTION USING A LAYERING SYSTEM

Wyse Technology L.L.C., ...

1. A method, implemented on a computing device on which at least one frozen layer and a write layer are mounted and in which a layering driver causes resources on the at least one frozen layer and the write layer to appear as if the resources were stored in a same storage location, for providing a security solution using a layering system, the method comprising:receiving, at the layering driver, an input/output (“I/O”) request;
accessing layer metadata of the at least one frozen layer to identify to which frozen layer the I/O request is directed, each frozen layer and the write layer comprising a separately mounted storage area;
determining that the I/O request pertains to an attempt to create or update a resource on the identified frozen layer;
modifying the I/O request to direct the I/O request to the write layer such that the resource is added to the write layer, which is a separately mounted storage area from each frozen layer, rather than being added to or updated on the identified frozen layer; and
while the resource is stored on the write layer, evaluating the resource to determine whether the resource is malicious.

US Pat. No. 10,216,938

RECOMBINANT THREAT MODELING

T-Mobile USA, Inc., Bell...

1. A system to perform computer security threat analysis, comprising:a processor, configured to execute computer executable instructions;
a memory, communicatively coupled with the processor;
a computer readable medium, communicatively coupled with the processor;
a data storage structure, resident in the computer readable medium configured to store a plurality of attack surface instances, a plurality of attack vector data instances, each attack vector data instance configured to store an association to one or more attack surface instances, a plurality of threat model instances, and a plurality of associations between attack surface instances and threat model instances, wherein:
an attack vector data instance represents a vulnerability in a defense of a computer network,
an attack surface instance comprises a set of attack vector data instances for a respective portion of the computer network,
a threat model instance comprises an array of attack surface instances, and
information in at least one threat model instance of the plurality of threat model instances is cross-correlated with information in a different threat model instance of the plurality of threat model instances; and
a software query component resident in the memory and communicatively coupled to the data storage structure, the software query component configured to return data based at least on an association between an attack surface instance and a threat model instance, wherein the computer executable instructions direct the system to perform a procedure to remediate the vulnerability associated with the at least one attack vector or the at least one attack surface, wherein the instructions to perform the procedure are in response to indicator data that indicates a likelihood of the at least one attack vector or the at least one attack surface occurring.

US Pat. No. 10,216,937

SECURE BIOS PASSWORD METHOD IN SERVER COMPUTER

HEWLETT PACKARD ENTERPRIS...

1. A method for securing Basic Input/Output System (BIOS) passwords in a server computer under a BIOS user privilege control operation, comprising:requesting a Baseboard Management Controller (BMC) to enter a password authentication mode for user privilege authentication;
receiving passwords inputted by a user and comparing the inputted passwords with valid passwords by the BMC, wherein the valid passwords are stored in the BMC;
deciding an authentication result by the BMC after the comparing the inputted passwords with the stored valid passwords, and saving the authentication result into the BMC; and
exiting the password authentication mode for the BMC and notifying the BIOS of the authentication result by the BMC;
wherein the BMC passes fake scan codes of key strings of the inputted passwords to the BIOS, such that the BIOS cannot access the actual passwords.

US Pat. No. 10,216,936

METHOD OF PREVENTING COMPUTER MALFUNCTION, COMPUTER PROGRAM, AND COMPUTER

Lenovo (Singapore) PTE. L...

1. An apparatus comprising:a processor;
a memory that stores code executable by the processor, the code comprising:
code that writes, to a first variable area, configuration data fundamental to pre-boot;
code that writes, to the second variable area, published data defined by the system firmware to be rewritable by an operating system;
code that writes user data to the second variable area in response to a request from the operating system; and
code that restricts writing to the first variable area after completion of the pre-boot;
code that checks a remaining capacity of the second variable area during the pre-boot and displays a screen indicating that the second variable area is to be cleaned up when the remaining capacity is less than a predetermined value;
code that determines whether a rewriting request for configuration variables is during pre-boot or not;
code that processes the rewriting request when determining that the rewriting request is during the pre-boot; and
code that disables the rewriting of the configuration variables when determining that the pre-boot is completed.

US Pat. No. 10,216,935

MOBILE DEVICE RESISTANT TO MALWARE

Intersections Inc., Chan...

1. A mobile device combination that provides user access to a secure service, comprising:a mobile device capable of wireless network access of a user's financial payment website, but lacking in having all the hardware resources necessary for logging onto a user's financial payment website or use in a merchant checkout;
a mobile app with a password manager installed in and that is executed by the mobile device to supply a password in a character string as if from a user responding with a keyboard entry;
a personal item not physically attached to or made a part of the mobile device, wherein the personal item includes at least one of a keyfob, a wristwatch, a bracelet, or a pocket device;
a Bluetooth low energy (BLE) transceiver disposed in the personal item and that when triggered by a user pushbutton on the personal item establishes a wireless link between the mobile device and the personal item if they are within range of one another, and that pushes whole passwords in cleartext if so triggered back over an encrypted BLE wireless channel, then over a 4G, Wi-Fi, or other wireless connection to a selected one of several different mobile app login dialogs on the Internet;
a non-volatile internal flash memory disposed in the personal item and in which are stored encrypted password parts in escrow that are necessary for logging onto the user's financial payment website or the merchant checkout;
a keyboard human interface device playback queue disposed in the personal item and in which are stored scancodes for each keystroke comprising a password in cleartext ready for transmission via a wireless link to the mobile device and then to the user's financial payment website or the merchant checkout;
an encryption/decryption process implemented within the mobile app and executable by only the mobile device and that controls all password encryption and decryption, escrowing of encrypted passwords into parts, recombining the parts, and coordinating encrypted data passing through a BLE wireless channel;
wherein, commands issued via the BLE paired channel instruct data to be stored or retrieved from the non-volatile internal flash memory;
wherein, only insufficient parts of encrypted passwords are stored on the personal item;
wherein the personal item lacks any independent encryption or decryption capability;
wherein, the wireless link to the mobile device has limited range and any separation of the mobile device from the personal item exceeding the limited range prevents the password manager mobile app from successfully accessing the user's financial payment website or the merchant checkout by denying it the stored encrypted password parts maintained in the personal item; and
wherein, the times and places the mobile device is vulnerable to a malicious mobile app are thereby constrained.

US Pat. No. 10,216,934

INFERENTIAL EXPLOIT ATTEMPT DETECTION

CrowdStrike, Inc., Irvin...

18. A system including:a processor;
a memory having stored thereon computer-executable instructions that, when executed by the one or more processors, cause the system to perform operations including:
detecting an action of interest (AoI) from among actions taken by the system;
determining a frame of a call stack associated with the AoI;
walking the call stack, starting at the frame in the call stack corresponding to the AoI, until:
the walking reaches a stack frame that is associated with a return address that is not associated with a module loaded on the one or more computer-readable media and continuing to walk the call stack until the walking reaches at least one of an end of the call stack, a root thread, or a root process, or
the walking reaches at least one of an end of the call stack, a root thread, or a root thread process; and
and
determining, based at least in part on the walking, a confidence score that indicates that the AoI is an exploit.

US Pat. No. 10,216,933

SYSTEMS AND METHODS FOR DETERMINING WHETHER MALICIOUS FILES ARE TARGETED

Symantec Corporation, Mo...

1. A computer-implemented method for determining whether malicious files are targeted, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:applying, at a first moment in time, a first set of data points to a malware detection structure, the first set of data points having a first portion in which each data point was generated from a malicious file known to be targeted and a second portion in which each data point was generated from a malicious file known to be non-targeted;
applying, at a second moment in time, a second set of data points to the malware detection structure, the second set of data points having a first portion in which each data point was generated from a malicious file known to be targeted and a second portion in which each data point was generated from a malicious file known to be non-targeted;
identifying boundaries within the malware detection structure for each of the first and second portions of the first and second sets;
determining that there is no difference between the boundaries of the first portions of the first and second sets and that there is a difference between the boundaries of the second portions of the first and second sets;
in response to the determining, establishing a policy to classify malicious files as non-targeted if the malicious files are associated with new data points that fall outside of previously identified boundaries;
after establishing the policy, receiving a new data point, generated from a malicious file encountered by a client device, and determining that the new data point falls outside of the previously identified boundaries;
in accordance with the policy, classifying the malicious file as non-targeted in response to determining that the new data point falls outside of the previously identified boundaries; and
using the classification to protect the client device against an infection from the malicious file.

US Pat. No. 10,216,932

NONVOLATILE MEMORY DEVICES AND SOLID STATE DRIVES INCLUDING THE SAME

SAMSUNG ELECTRONICS CO., ...

1. A nonvolatile memory device, comprising:a memory cell array;
a voltage generator configured to generate word-line voltages to be applied to the memory cell array; and
a control circuit configured to generate control signals that control the voltage generator in response to a command and an address,
wherein the control circuit is configured to disable an operation of the nonvolatile memory device when a hacking is detected by a hacking detection circuit of the control circuit, wherein the hacking is detected when an access sequence of the command and the address does not match a standard sequence of the nonvolatile memory device a consecutive number of times, wherein the operation of the nonvolatile memory device is disabled in response to a voltage signal provided from the voltage generator,
wherein the control circuit further comprises:
a command decoder configured to decode the command and to output a decoded command;
a control signal generator configured to generate the control signals in response the decoded command;
a first switch connected between the command decoder and a first path connected to the control signal generator; and
a second switch connected to the command decoder, a second path and the first switch, and
wherein the second path is connected to the control signal generator separately from the first path.

US Pat. No. 10,216,931

DETECTING AN ATTEMPT TO EXPLOIT A MEMORY ALLOCATION VULNERABILITY

Palo Alto Networks, Inc.,...

1. A system for detecting an attempt to exploit a memory allocation vulnerability, comprising:a processor configured to:
receive a malware sample;
monitor an array operation performed by the malware sample using a memory monitoring component; and
determine whether the array operation performed by the malware sample is suspicious based on one or more of the following: a vector size of a vector associated with the array operation, a change in a vector size of a vector associated with the array operation, or a cookie appended at an end of an allocated buffer during the array operation, wherein the determining of whether the array operation performed by the malware sample is suspicious comprises to:
perform one or more of the following:
A) determine whether the vector size of the vector associated with the array operation exceeds a predefined threshold, wherein the determining operation is performed during a read operation on the vector, a write operation on the vector, or a get-size operation on the vector; and
in response to a determination that the vector size exceeds the predefined threshold, determine that the malware sample is suspicious;
B) compare the vector size of the vector associated with the array operation with a corresponding vector size in a size record, wherein the comparing operation is performed during a read operation on the vector, a write operation on the vector, or a get-size operation on the vector; and
in response to a determination that the vector size associated with the array operation does not match the corresponding vector size in the size record, determine that the malware sample is suspicious; or
C) append the cookie at the end of the allocated buffer;
compare a pre-stored value associated with the cookie with a current value of the cookie during the array operation, wherein the comparing operation is performed during a pre-read operation on the allocated buffer, a post-write operation on the allocated buffer, or a get-size operation on the allocated buffer; and
in response to a determination that the pre-stored value associated with the cookie does not match current value of the cookie during the array operation, determine that the malware sample is suspicious; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,216,930

AUTHENTICATING APPLICATION LEGITIMACY

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:obtaining, by a user device of a user based on imaging at least one optical code using a camera of the user device of the user, data of the at least one optical code, the at least one optical code being displayed on a display device in association with an application to be authenticated for the user as being a legitimate application;
automatically determining by the user device, based on the obtained data of the at least one optical code and on obtaining and comparing data from a trusted authentication entity associated with the legitimate application to the obtained data of the at least one optical code, whether the application to be authenticated is authenticated as being the legitimate application; and
providing for the user, by the user device, based on the automatically determining, an indication of whether the application to be authenticated is authenticated as being the legitimate application;
wherein the at least one optical code comprises a first optical code displayed based on a launch of the application to be authenticated, wherein the automatically determining comprises identifying whether the first optical code conveys a user identity registered with a trusted authentication entity associated with the legitimate application as being a proper user identity for the user, and wherein the provided indication of the authenticity of the application is based at least in part on whether the first optical code conveys the user identity registered with the trusted authentication entity associated with the legitimate application.

US Pat. No. 10,216,929

CHIP AND METHOD FOR DETECTING A CHANGE OF A STORED DATA VECTOR

INFINEON TECHNOLOGIES AG,...

1. A chip, comprising:a plurality of processing circuits, each processing circuit being configured to process a data vector by outputting a multiplication of the data vector by one of a plurality of processing matrices, wherein a sum of the respective processing matrices corresponds to a non-identity-matrix part of a generator matrix of a predetermined linear code in reduced form;
a summing circuit configured to sum the output of the data vector processing generated by the processing circuits;
a storage circuit configured to store the data vector with the summed output of the data vector processing as a data word in a memory;
a read-out circuit configured to read the stored data word out of the memory, and
a decoding circuit configured to check whether the read-out data word is a valid code word of the linear code and to output an error signal if the read-out data word is not a valid code word of the linear code and
a monitoring circuit, configured to receive the error signal, and to trigger an execution or a deactivation of a program in response to the error signal.

US Pat. No. 10,216,928

METHODS FOR RESTRICTING RESOURCES USED BY AN APPLICATION BASED ON A BASE PROFILE AND AN APPLICATION SPECIFIC PROFILE

Apple Inc., Cupertino, C...

1. A computer-implemented method, comprising:in response to a request for launching an application within an operating system of a data processing system, extracting one or more extended entitlements from the application, the one or more extended entitlements specifying one or more resources the application is entitled to access;
dynamically generating one or more security profile extensions corresponding to the one or more extended entitlements;
creating a security profile specifically for the application based on the dynamically generated one or more security profile extensions and a base security profile that has been previously compiled, wherein the base security profile specifies a list of a plurality of base resources, wherein the one or more resources the application is entitled to access include additional resources of the data processing system extended dynamically from the base resources; and
launching the application in a sandboxed operating environment of a process space that is configured based on the security profile specifically created for the application.

US Pat. No. 10,216,927

SYSTEM AND METHOD FOR PROTECTING MEMORY PAGES ASSOCIATED WITH A PROCESS USING A VIRTUALIZATION LAYER

FireEye, Inc., Milpitas,...

10. A computing device, comprising:a hardware processor including a control register;
a memory coupled to the hardware processor, the memory includes virtualization software that includes a virtual machine to operate in a guest mode and a virtualization layer to operate in a host mode,
wherein in response to detecting a guest process switch corresponding to a change to an operating state of a guest agent process within a virtual machine as being set into an inactive operating state, the virtualization layer, being executed by the processor, assigns a page table for use in memory address translations different than a page table currently in use, the different page table alters page permissions for one or more memory pages associated with the guest agent process, and
wherein the virtualization layer detects the guest process switch by detecting a change in content with the control register of the processor that is executing the virtualization layer and the virtualization layer assigns the different page table to restrict the page permissions for the one or more memory pages associated with the guest agent process when the content of the control register corresponds to an address space different than an address space associated with the guest agent process.

US Pat. No. 10,216,926

ISOLATION OF UNTRUSTED CODE IN OPERATING SYSTEM WITHOUT ISOLATION CAPABILITY

Cisco Technology, Inc., ...

1. A method for isolating untrusted code, the method comprising:configuring a virtual machine on a server connected to a remote client machine, wherein the sever executes a first operating system to initiate a synthetic transaction;
executing untrusted code on the virtual machine, the first operating system providing an isolation mechanism in which the untrusted code is executed;
establishing a secure connection between the virtual machine having the first operating system and the remote client machine having a second operating system, the second operating system not having any isolation system, the first operating system different than the second operating system;
executing the synthetic transaction over the secure connection with the second operating system not having any isolation system, the synthetic transaction initiating a distributed business transaction over a plurality of distributed servers, wherein isolation for the second operating system is outsourced to the server executing on the first operating system; and
applying instructions generated by the untrusted code executing on the virtual machine to the remote client having the second operating system.

US Pat. No. 10,216,925

VIRUS PROTECTION METHOD AND DEVICE

BEIJING QIHOO TECHNOLOGY ...

1. A virus protection method comprising:providing an application installation listening interface function in an application layer and providing a pre-installation package detection interface function of a security service in a framework layer, wherein the pre-installation package detection interface function is provided at the starting position of an application installation interface function;
determining that an Android operating system needs to install an application when the application installation interface function in a package management service of the Android operating system is called;
transmitting, in response to determining that the Android operating system needs to install the application, identification information of the application that needs to be installed from the framework layer to the application layer, wherein the transmitting includes: in the case that the application installation interface function in a package management service of the Android operating system is called, transmitting, by the application installation interface function, the identification information of the application that needs to be installed to the application installation listening interface function through the pre-installation package detection interface function;
activating, at the application layer, a virus scanner application on the basis of the identification information of the application, to allow the virus scanner application to run virus scan on the application;
acquiring a scan result of the virus scan, and issuing a notification to the framework layer of whether or not to execute an installation operation for the application on the basis of the scan result;
determining, at the framework layer, whether to execute the installation operation for the application or reject the installation operation for the application on the basis of the notification, wherein issuing the notification includes:
issuing the notification directly to the framework layer of whether or not to execute the installation operation for the application on the basis of the virus scan result; or
presenting the virus scan result to a user, and issuing the notification to the framework layer of whether or not to execute the installation operation for the application on the basis of instruction information input by the user, in the case that the virus scan result is that the application is carrying a virus.

US Pat. No. 10,216,924

SYSTEM AND METHODS FOR PROVIDING SECURITY TO AN ENDPOINT DEVICE AND FOR COMBATING ELECTROMAGNETIC PULSE (EMP) ATTACKS

SECURITY TOGETHER CORPORA...

1. A method of providing security to a device, the device including one or more input processing units within an input system built into the device, one or more control processing modules within a control system built into the device, one or more execution processing modules within an execution system built into the device, and a multi-channel internal communication bus built into the device, whereby at least one of the input processing units, at least one of the control processing modules, and at least one of the execution processing modules are coupled for data and control transmissions therebetween, and wherein the device is adapted to communicate with an external communications network and receive a plurality of external messages over a period of time at the one or more input processing units, the method comprising:configuring the one or more input processing units to each present a different attack surface at different intervals within the period of time to the received plurality of external messages from the external communications network, each different attack surface corresponding to a different processor executing a different instruction set and a different operating system;
executing solely within the one or more execution processing modules a corresponding one of a plurality of applications; and
using a Faraday Cage to protect the device from electromagnetic pulse (EMP) events or attacks.

US Pat. No. 10,216,923

DYNAMICALLY UPDATING CAPTCHA CHALLENGES

Google LLC, Mountain Vie...

1. A computer-implemented method of dynamically updating a verification challenge, the method comprising:receiving, by one or more computing devices, a request to access an online resource from a user device;
responsive to receiving the request to access the online resource, providing, by the one or more computing devices, a verification challenge to the user device, the verification challenge comprising a plurality of objects and one or more instructions prompting a user of the user device to interact with at least one object of the plurality of objects;
receiving, by the one or more computing devices, one or more user responses to the verification challenge, each user response corresponding to an interaction by the user with the at least one object from the plurality of objects; and
determining, by the one or more computing devices, one or more risk assessment scores associated with the user of the user device based at least in part on the one or more user responses;
responsive to the one or more user responses, updating, by the one or more computing devices, the verification challenge based at least in part on the one or more user responses and the one or more risk assessment scores exceeding a risk assessment threshold, wherein updating the verification challenge comprises replacing, based at least in part on the one or more risk assessment scores, the at least one object with a replacement object, and wherein updating the verification challenge occurs prior to one or more subsequent user responses to the verification challenge.

US Pat. No. 10,216,922

WIRELESS NETWORK OF LIGHTING DEVICES

Cooper Technologies Compa...

1. A system for changing a network password, the system comprising:a first lighting device comprising a processor and one or more storage devices and configured to wirelessly connect to a second lighting device on a first wireless network having a first network identification, wherein the first network identification is a network password of the first wireless network; and
a password recovery device, wherein, in response to detecting a power cycling sequence of power provided to the first lighting device, the first lighting device attempts to wirelessly connect to the password recovery device over a recovery wireless network having a recovery network identification before attempting to connect to the second lighting device over the first wireless network, wherein the recovery network identification is a network password of the recovery wireless network, and wherein the password recovery device includes a software user interface for changing the first network identification stored in the first lighting device.

US Pat. No. 10,216,921

TECHNIQUES FOR ATTESTING TO INFORMATION

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:receiving, by a control plane of a service provider, a request to provision a virtual machine instance, the virtual machine instance comprising an operating system, the control plane comprising one or more user interfaces that enable provisioning virtual machine instance instances on computer systems operated by the service provider;
obtaining, by the control plane, information about the virtual machine instance at least in response to receiving the request;
creating, by the control plane, an instance identity document based at least in part on the information, the instance identity document encoding a property of the virtual machine instance that identifies the operating system as a first version and comprising a document identifier that identifies the instance identity document;
making, by the control plane, the instance identity document and a signature corresponding to the instance identity document available to the virtual machine instance; and
making, by the control plane, a public key corresponding to the signature available to an interested entity, wherein verification of the instance identity document by the interested entity using the public key authorizes updating of the operating system from the first version to a second version.

US Pat. No. 10,216,920

ORAL AUTHENTICATION MANAGEMENT

International Business Ma...

1. A method comprising:monitoring a plurality of sensors located in an oral cavity of a user and configured to measure one or more properties controllable by the user;
identifying a sequence of stimuli based on monitoring the plurality of sensors, wherein the sequence of stimuli comprises, for each respective stimulus, a respective pressure on a respective sensor, wherein the respective pressure is above a pressure threshold and is applied by a tongue of the user contacting the respective sensor;
recording the sequence of stimuli, the recording comprising a sequence of sensors and a sequence of times, the sequence of sensors corresponding to sensors receiving a pressure above the pressure threshold, and the sequence of times corresponding to respective times the respective sensors in the sequence received pressure above the pressure threshold;
comparing the sequence of stimuli to a password, wherein the password is associated with a user device, wherein the password comprises a pressure above the pressure threshold for each sensor in a sequence of sensors;
unlocking at least a portion of the user device in response to determining, based on comparing the sequence of stimuli to the password, that the sequence of stimuli matches the password.

US Pat. No. 10,216,919

ACCESS BLOCKING FOR DATA LOSS PREVENTION IN COLLABORATIVE ENVIRONMENTS

Microsoft Technology Lice...

1. A method to provide access blocking as part of data loss prevention (DLP) within a collaborative service environment, the method comprising:evaluating content of a user processed by a collaborative service, wherein the content is associated with an application executed within an infrastructure provided by the collaborative service;
determining if information associated with the content matches access blocking criteria defined by one or more DLP policy rules;
in response to a determination that a portion of the information matches at least one access blocking criterion defined by the one or more DLP policy rules, automatically activating a block access tag associated with the content to restrict access to the content;
providing for display, on a user experience of the application that is displaying the content, a notification to the user, wherein the notification describes the at least one access blocking criterion and the portion of the information, and the notification includes a control element associated with an action to remove the portion of the information in order to deactivate the block access tag associated with the content;
detecting a selection of the control element on the user experience by the user to remove the portion of the information that matches the at least one access blocking criterion defined by the one or more DLP policy rules from the content; and
responsive to the removal, automatically deactivating the block access tag associated with the content to provide access to the content based on a determination that the information associated with the content does not match the access blocking criteria defined by the one or more DLP policy rules.

US Pat. No. 10,216,918

SECURITY MECHANISM FOR AN ELECTRONIC DEVICE

Comcast Cable Communicati...

1. A method comprising:identifying, by a computing device, a first numerical value displayed on a display of the computing device;
generating, based on the first numerical value, an input portion of a user interface configured in a locked state;
determining, based on the first numerical value, a second numerical value; and
in response to receiving, via the input portion, a gesture input corresponding to the second numerical value, transitioning the user interface from the locked state to an unlocked state.

US Pat. No. 10,216,917

IDENTITY VALIDATION USING LOCAL ENVIRONMENT INFORMATION

International Business Ma...

1. A computer-implemented method comprising:initiating, by a processor, a first verification event;
identifying two or more devices that are within a predetermined area of the processor during the initiating of the first verification event;
identifying that one device of the two or more devices is not properly communicating with the processor, wherein the processor identifies that the one device is not properly communicating by the processor not being able to determine that the one device belongs to the verified user, the processor not being able to determine that the one device belongs to the verified user due to noise during the first verification event, wherein noise is a communication interference generated by one or more devices not belonging to the verified user;
alerting the verified user to activate a communication channel on the one device, the activation of the communication channel indicating to the processor that the one device belongs to the verified user and is not noise;
alerting the verified user to add the one device to a library;
verifying an identity of a verified user based on the two or more devices, wherein verifying the identity of the verified user based on the two or more devices includes:
accessing the library, wherein the library includes a list of the two or more devices as being authorized by the verified user to allow the processing of one or more verification events, wherein the two or more devices are authorized by the verified user registering the two or more devices into the library before the initiation of the first verification event, and
determining that a combination of the two or more devices confirms the identity of the verified user; and
processing the first verification event in response to verifying the identity of the verified user.

US Pat. No. 10,216,916

METHOD AND APPARATUS FOR CONTROLLING LOCK/UNLOCK STATE OF TERMINAL THROUGH VOICE RECOGNITION

Samsung Electronics Co., ...

1. A portable electronic communication device comprising:a display;
a sound input unit; and
a processor operatively coupled with the sound input unit, the processor configured to:
receive, using the sound input unit, a sound input while the portable electronic communication device is in a lock screen state, in which the portable electronic communication device is locked, and the display is in an on state,
determine that the sound input corresponds to a voice input previously stored as a voice of a user corresponding to the portable electronic communication device,
present information corresponding to at least one portion of the sound input via the display, and
perform a specified function corresponding to the sound input based at least in part on the determining that the sound input corresponds to the voice input, the specified function including activating at least two applications identified based on the sound input.

US Pat. No. 10,216,915

AUTHENTICATION METHOD AND APPARATUS THEREOF

TENCENT TECHNOLOGY (SHENZ...

1. An authentication method, comprising:obtaining, by a processor, data received from a user to be processed;
generating, by the processor, a character sequence based on the received data, wherein each character in the character sequence corresponds to a specific physiological feature information of the user, and a location of each character in the generated character sequence corresponds to a specific order in the generated character sequence on how the specific physiological feature information of the user are to be received as prompted sequential inputs;
receiving by the processor, the specific physiological feature information sequentially inputted by the user as prompted response to the generated character sequence from the priorly received data; and
determining, by the processor, whether every piece of the specific physiological feature information according to the input sequence matches with each and every of the corresponding characters according to the specific order in the generated character sequence, such that unauthorized authentication due to misuse of biometric data is prevented.

US Pat. No. 10,216,914

SYSTEM, METHOD, AND APPARATUS FOR PERSONAL IDENTIFICATION

1. A traits-based personal identification system comprising:a device having at least two sensors suitable for providing sensory inputs in real-time;
software running on a processor produces and stores a plurality of machine learning event first artifact values derived from the sensory inputs over a period of one or more days, the learning event first artifact values indicative of human traits of a first user of the device;
a perpetual software process running on the processor produces and updates the plurality of machine learning first event artifact values with a second set of artifact values derived from the sensory inputs representing the human traits of the first user in actual possession of the device;
the perpetual software process provisioned with the plurality of machine learning first event artifact values running on the processor captures and processes, in real-time, inputs from the at least two sensors to derive predictions of similarity between the first sensory inputs used to the produce with the plurality of machine learning first event artifact values and newly captured sensory inputs;
said software calculating a probability indicative of a current user of the device being the first user; and
said software producing a personal identification code by amalgamation of said probability with a session identification token and device identifiers.

US Pat. No. 10,216,913

MOBILE DEVICE WITH BUILT-IN ACCESS CONTROL FUNCTIONALITY

1. A mobile device with built-in access control functionality comprising:an access control unit that includes
a storage module to which access is to be controlled, and
a control module storing
a permissions table configured to record a reference user identification (ID), and a user authority that corresponds to the reference user ID and that specifies what operation is allowed on said storage module, and
an ID-password table configured to record the reference user ID and a reference user password that corresponds to the reference user ID;
a memory unit that is configured to store an application program; and
a processing unit that is electrically connected to said access control unit and said memory unit, and that is configured to execute instructions of the application program so as to transmit credential information associated with the application program to said access control unit in an attempt to gain access to said storage module;
wherein when it is verified by said control module that the application program is authentic based on the credential information, said control module allows said processing unit to create data connection with said control module;
wherein said processing unit which executes the instructions of the application program is configured to transmit an asserted user ID and an asserted user password to said control module;
wherein said control module is configured
to look up in the permissions table the user authority based on the asserted user ID,
to enable, when it is determined by the control module that the asserted user ID and the asserted user password conform respectively to the reference user ID and the reference user password in the ID-password table, said processing unit to perform the operation allowed on said storage module based on the user authority,
to arrange storage spaces of a hidden area in said storage module,
to enable said processing unit to establish, via said control module, a plurality of private spaces in said hidden area,
to enable said processing unit to access said hidden area of said storage module when it is determined by said control module that the user authority thus looked up allows access to said hidden area and that the asserted user ID and the asserted user password conform respectively to the reference user ID and the reference user password in the ID-password table, and
to enable, when it is determined by said control module that the user authority thus looked up allows access to at least one of said plurality of private spaces and that the asserted user ID and the asserted user password conform respectively to the reference user ID and the reference user password in the ID-password table, said processing unit to access said at least one of said plurality of private spaces, such that said control module is capable of encrypting data obtained from said processing unit and storing the data thus encrypted in said at least one of said plurality of private spaces, and is capable of decrypting data obtained from said at least one of said plurality of private spaces and transmitting the data thus decrypted to said processing unit.

US Pat. No. 10,216,912

CONTEXTUAL USE AND EXPIRATION OF DIGITAL CONTENT

EMPIRE TECHNOLOGY DEVELOP...

9. A method to provide temporary-use digital content item to a receiving computing device, the method comprising:publishing, by a sponsoring device, digital content item information that identifies one or more temporary-use digital content items;
receiving, by the sponsoring device, a request for a selected temporary-use digital content item; and
sending, by the sponsoring device, the requested temporary-use digital content item to the receiving computing device associated with the received request, wherein the requested temporary-use digital content item comprises:
a first set of instructions for an authenticator of the receiving computing device to detect a relationship property, wherein the relationship property defines a relationship between the receiving computing device and the sponsoring device;
a second set of instructions for the authenticator to allow or disallow, based on the detected relationship property, display of digital content item at the receiving computing device; and
the digital content item that is displayable at the receiving computing device based on the second set of instructions, when the relationship property indicates that the receiving computing device is one or more of:
directly connected to the sponsoring device;
connected to a local area network (LAN) that includes the sponsoring device; or
within a particular maximum distance from the sponsoring device,
wherein the digital content item is not displayable at the receiving computing device when the relationship property indicates that the receiving computing device is one or more of:
not directly connected to the sponsoring device;
not connected to the LAN that includes the sponsoring device; or
not within the particular maximum distance from the sponsoring device.

US Pat. No. 10,216,911

PHYSICS-BASED COMPUTATIONAL METHODS FOR PREDICTING COMPOUND SOLUBILITY

1. A method for identifying soluble compounds, comprising:visualizing, using a computer model, an aggregate comprising multiple units of an initial compound in a solvent, the initial compound being insoluble in the solvent;
identifying molecular features of the initial compound that reduces its solubility based on the visualization of the aggregate in the solvent;
establishing a plurality of different candidate compounds based on the visualization of the initial compound, the structure of each of the candidate compounds being variants of the initial compound;
determining a free energy of solubility of each of the candidate compounds according to the following steps:
calculating a free energy of solubility for a compound in a solvent by computer operations which include the following steps:
(i) establishing, using a computer model, an initial state for a system comprising an aggregate of multiple molecules of the compound in a solvent;
(ii) establishing, using the computer model, a final state of the system comprising a single molecule from the aggregate fully solvated in the solvent and separate from a transformed aggregate;
(iii)transforming, using the computer model, the system from the initial state to the final state, via removing a first molecule of the compound from the aggregate to form the transformed aggregate and replacing the first molecule with solvent at the site of the first molecule; and
calculating the free energy of the transformation between the initial and the final states, which determines the free energy of solubility for the compound;
selecting one or more of the candidate compounds for synthesis based on the determined free energy of solubility of each of the candidate compounds; and
measuring an actual solubility of each of the synthesized candidate compounds and identifying which of the synthesized candidate compounds are soluble in the solvent.

US Pat. No. 10,216,910

SIMULATED CARBON AND PROTON NMR CHEMICAL SHIFTS BASED BINARY FINGERPRINTS FOR VIRTUAL SCREENING

1. A method to identify NMR chemical shift based binary fingerprints for virtual high throughput screening in drug discovery comprising:a) subjecting an in silico designed molecule to verification for bad contacts, correct valency, charge and for hybridization to provide a verified in silico designed molecule;
b) adding hydrogens to the verified in silico designed molecule, computing frequency of occurrence of peaks in ppm to assign multiplicity in the fingerprints, and obtaining carbon chemical shifts, proton chemical shifts and number of atoms;
c) generating a computed binary fingerprints of a 1024 bit length to accommodate the entire region of known proton and carbon chemical shift values, wherein functional group variation in the in silico designed molecule is reflected in the computed binary fingerprints;
d) assigning 4 bits to each ppm block in the computed binary fingerprint by using the number of peaks (hydrogen/carbon) and intensity of the spectrum in that region;
e) generating cumulative spectra; and
f) calculating the similarity score to determine class specific fingerprints.

US Pat. No. 10,216,909

HEALTH MONITORING

INTERNATIONAL BUSINESS MA...

1. A system for monitoring a health of a user, the system comprising:an image capture device configured to capture multispectral images;
a memory; and
a processor coupled with the memory and the image capture device, wherein the processor is configured to:
in response to an occurrence of a scheduled activity time of the user:
determine a geographic location of the user; and
select a first exercise routine for the user from a list of exercise routines that is specifically populated for the user based on a health record of the user, the first exercise routine is selected based on a key performance indicator of the first exercise routine being the maximum among the exercise routines from the list of exercise routines, the key performance indicator based on the geographic location;
receive activity-tracking data of the user from a wearable computing device;
determine a calorie outtake of the user based on the activity-tracking data, which includes calories used for the first exercise routine;
in response to an occurrence of a scheduled eating time of the user:
determine a geographic location of the user;
determine a number of calories to be consumed by the user based on the calorie outtake of the user; and
identify an eating place for the user within a predetermined vicinity of the geographic location, the eating place serving a food-item with the number of calories to be consumed by the user;
capture a multispectral image of a food-item;
determine a caloric-value of the food-item based on the multispectral image of the food-item;
output the caloric-value of the food-item as calorie-intake of the user;
access a current image of the user that comprises a picture of a body of the user;
generate a modified image of the user, wherein the modified image of the user reflects a predicted change in the body of the user based on the calorie-intake caused by consuming the food-item using a metabolic model of the user based on health records of the user; and
display the modified image of the user.

US Pat. No. 10,216,908

MEDICATION ASSURANCE SYSTEM AND METHOD

VIAVI Solutions Inc., Sa...

1. A spectrometer comprising:a laterally variable filter to receive light reflected from a medication; and
a photodetector array to obtain data based on the reflected light,
where
at least some of the light is received at a bottom portion of the medication, and
the medication and medication use information are identified based on a chemometric analysis of the data.

US Pat. No. 10,216,907

ELECTRONIC CALIBRATED MATTER TRANSFER SYSTEM

Lunatech, LLC, Encino, C...

1. A system for dispensing a calibrated amount of a monitored material, the system comprising a holding device, the holding device comprising:a holding device processor operable to control the holding device;
a container configured to store a monitored liquid therein, wherein the container includes a transfer outlet for transferring at least a portion of the monitored liquid to an associated dispensing device;
a sensing component operatively coupled to the holding device processor and controlled in part by the holding device processor, wherein the sensing component is configured to detect usage data associated with the monitored liquid stored in the container, and transmit the detected usage data to the holding device processor;
an authentication input component operatively coupled to the holding device processor and controlled in part by the holding device processor, wherein the authentication input component is configured to receive a plurality of authentication data from an associated user and transmit the authentication data to holding device processor;
a capping component positioned proximate to the transfer outlet of the container, wherein the capping component is configured to prevent monitored liquid from exiting the container prior to activation of the holding device to transfer at least a portion of the monitored liquid to the associated dispensing device, wherein the capping component is further configured to matingly engage with the associated dispensing device for transfer of at least a portion of the monitored liquid via the transfer outlet to the associated dispensing device;
an actuation component operatively coupled to the holding device processor and controlled in part by the holding device processor, wherein the actuation component is operable to control activation of the capping component to transfer at least a portion of the monitored liquid to the associated dispensing device;
wherein the holding device processor is further operable to:
receive at least a portion of the detected usage data from the sensing component;
determine, based on at least a portion of the detected usage data, at least one usage condition of the monitored liquid;
receive at least a portion of the authentication data from the authentication input component;
determine, based on at least a portion of the authentication input data, an authorization status of the associated user; and
generate, based on at least one determined usage condition and authorization status of the associated user, at least one activation control signal for controlling the activation of the actuation component to transfer at least a portion of the monitored liquid to the associated dispensing device.

US Pat. No. 10,216,906

SMARTPHONE BASED TELEMEDICINE SYSTEM

Vigilias LLC, Wichita, K...

1. A system for telemedicine, the system comprising:a handheld computing device operable by a first subject, the first handheld computing device coupled to an HDMI capable video display via an HDMI cable, the handheld computing device comprising:
a digital video camera configured to capture video of the first subject,
a display device configured to display the captured video of the first subject,
wireless communication circuitry to communicate first data and second data over a network, wherein the first data is representative of the captured video of the first subject and captured audio of the first subject, and the second data comprises audio and video data different than the first data; and
a processor operably coupled to a computer readable medium having stored thereon computer executable instructions, wherein execution of the instructions by the processor is to cause the system to:
control the digital video camera to capture the video of the first subject,
control a microphone of the HDMI capable video display device to capture the audio of the first subject,
control wireless transmission and receipt of the first and second data over the network; and
send the second data received over the network in HDMI format to the HDMI capable video display device over the HDMI cable; and
the HDMI capable video display device, comprising:
an HDMI input terminal to receive a connector at a first end of the HDMI cable; and
the microphone configured to capture the audio of the first subject,
a display configured to display the video data of the second data, and
a speaker configured to emit the audio data of the second data,
wherein a second end of the HDMI cable is coupled to the handheld computing device.

US Pat. No. 10,216,905

HEALTH STATE TRENDS FOR A CONSISTENT PATIENT SITUATION

Google LLC, Mountain Vie...

1. A computer-implemented method comprising:detecting, using one or more sensing devices of a sensing milieu contained in a bedroom, an automobile, a bathroom, an office, or a workplace, a first instance of an activity of a patient that is within a normal course of life of the patient, wherein said detecting is passive in that no explicit patient interaction with any of said one or more sensing devices is required, wherein said sensing devices are part of a color-sensing mirror, a pressure and electrical sensing mat, an ultrasonic bathtub, or an automobile rear-view minor and sense in a first modality, wherein said detecting is non-invasive, and wherein said activity that is within the normal course of life of the patient is walking, eating, working, exercising, driving, or talking;
responsive to said detecting said first instance of the activity, monitoring, using a radar-based monitoring device that senses in a second modality that is other than the first modality, said patient to detect a first health state of the patient associated with said activity, wherein said monitoring is carried out in temporal proximity to said first instance of the activity, wherein said monitoring is non-invasive, and wherein said monitoring is passive in that no explicit patient interaction with said radar-based monitoring device is required;
subsequently detecting, using said one or more sensing devices, multiple subsequent instances of said activity of the patient that is within said normal course of life of the patient, said subsequently detecting being passive and non-invasive;
subsequently monitoring, for each of said detected subsequent instances of said activity, said patient using said radar-based monitoring device to detect subsequent respective health states of the patient associated with said activity, wherein said subsequent monitoring is carried out in temporal proximity to said subsequent instances of the activity, respectively, and wherein said subsequent monitoring is non-invasive and passive;
processing said first and subsequent health states of the patient to determine a health state trend of the patient for said activity; and
providing the health state trend for said activity.

US Pat. No. 10,216,904

CLOUD-ASSISTED REHABILITATION METHODS AND SYSTEMS FOR MUSCULOSKELETAL CONDITIONS

CARKMH, LLC, Springfield...

1. A cloud-assisted rehabilitation system for musculoskeletal conditions, comprising:a plurality of intelligent musculoskeletal rehabilitation apparatuses each including one or more intelligent rehabilitation members, each of the intelligent rehabilitation members having a logic section, wherein the intelligent musculoskeletal rehabilitation apparatuses are configured to be attached to a corresponding plurality of patients to generate, by the corresponding logic section, musculoskeletal rehabilitation information; and
a rehabilitation portal configured to receive the musculoskeletal rehabilitation information from the plurality of patients, de-identify personal identifying information from the musculoskeletal rehabilitation information, process the musculoskeletal rehabilitation information, aggregate the de-identified musculoskeletal rehabilitation information, and generate one or more reports for one or more healthcare professionals based at least on the aggregated de-identified musculoskeletal rehabilitation information.

US Pat. No. 10,216,903

MEDICAL ADHERENCE TRACKING FRAMEWORK

ORACLE INTERNATIONAL CORP...

1. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processor, cause the processor to implement a medical adherence tracker framework for a user provided with a workflow, the implementing comprising:receiving, from one of a plurality of user devices over a network, a workflow definition including a plurality of nested objects that represents tasks to be completed by the user;
serializing the workflow definition, including splitting the plurality of nested objects into a plurality of separate objects, and linking the plurality of separate objects using one or more identifiers;
persisting the workflow definition, including converting the plurality of linked objects into an object graph having a plurality of nodes, each node including one of the linked objects, and assigning a unique object identifier (OI) to each node of the object graph;
synchronizing the workflow definition among the user devices, including transmitting the object graph to the user devices over the network;
receiving, from one of the user devices over the network, an updated workflow definition having an updated portion;
updating the workflow definition, including updating one of the nodes of the object graph to incorporate the updated portion of the updated workflow definition;
synchronizing the updated workflow definition among the user devices, including transmitting the updated node to the user devices over the network;
receiving, from one of the user devices over the network, user activity data generated by a tracking device connected to the user device, the tracking device having a sensor configured to capture user activity related to the tasks, the user activity data including one or more of steps taken, distance traveled, calories burned, activity intensity, sleep duration, sleep patterns, weight, body mass index (BMI), or percentage of body fat;
updating the workflow definition, including updating one of the nodes of the object graph to incorporate the user activity data to reflect progress towards completion of the tasks;
automatically synchronizing the updated workflow definition among the user devices, including transmitting the updated node to the user devices over the network;
generating a reminder to complete one or more tasks based on the updated workflow definition; and
transmitting the reminder to the user devices over the network,
wherein, when the updated node of the object graph is updated for a first time, a unique numeric object update identifier (OUI) is assigned to the updated node, and, when the updated node of the object graph is updated after the first time, the unique numeric OUI of the updated node is incremented.

US Pat. No. 10,216,902

METHODS AND SYSTEMS FOR IMPROVING CONNECTIONS WITHIN A HEALTHCARE ECOSYSTEM

General Electric Company,...

1. A method to facilitate dynamic interface definition and configuration via an integration platform, the method comprising:storing, using a particularly configured processor, a plurality of reusable interface and route definitions to translate and exchange data messages between source and target systems in a healthcare ecosystem;
monitoring, using the processor, message exchanges and message patterns in the healthcare environment via a machine learning system to predict traffic and utilization patterns in the healthcare ecosystem;
tracking, using the processor, metadata regarding connections involving the source and target systems and storing the metadata in a graph database;
suggesting, using the processor, connections between the source and target systems based on the monitored message exchanges and message patterns and metadata from the graph database using graph analytics; and
provisioning, using the processor, an interface between the source system and the target system based on a suggested connection, the interface provisioned from the plurality of reusable interface and route definitions based on the suggested connection.

US Pat. No. 10,216,901

AUDITING THE CODING AND ABSTRACTING OF DOCUMENTS

A-Life Medical, LLC, San...

1. A method of evaluating coded medical documents performed by a computer, the method comprising:providing, by a computer, a graphical user interface (GUI) wizard;
receiving, by the computer via the GUI wizard, audit parameters for selecting a document universe and for calculating a sample size;
calculating, by the computer, a sample size using the received audit parameters;
selecting, by the computer, a document universe based on the received audit parameters;
providing, by the computer via the GUI wizard, a plurality of medical documents coded by a coder and selected using the selected document universe and the calculated sample size;
receiving, by the computer via the GUI wizard, a plurality of corrections by an auditor to the plurality of medical documents;
recording, by the computer, the plurality of corrections to the coded medical documents to form a plurality of audited medical documents;
determining, by the computer, a document score for each of the plurality of audited medical documents, each document score based on one or more document corrections provided by the auditor and weighted factors, wherein the weighted factors comprise predefined weights assigned to diagnosis codes and finding codes of each of the plurality of audited medical documents;
determining, by the computer, a sample score for the plurality of audited medical documents based on the determined document scores;
determining, by the computer, the acceptability of the sample score by periodically performing an empirical test to compare the sample score to system control limits; and
displaying, by the computer via the GUI, an X-bar chart analysis comprising the sample score, an upper control limit, a lower control limit, and a previously determined sample score of audited medical documents coded by the coder.

US Pat. No. 10,216,900

MONITORING INFORMATION PROVIDING DEVICE AND METHOD

KONINKLIJKE PHILIPS N.V.,...

1. A monitoring information providing device comprising:a plurality of sensors configured to measure a plurality of physiological signs of a monitored patient;
a bedside patient monitor configured to control the sensors to measure each of the plurality of the physiological signs with a selected measurement frequency;
a drug label reader configured to obtain drug administration data identifying a drug administered to a patient and a time of administration of the drug to a patient; and
one or more processors configured to:
retrieve medical data of the monitored patient from a patient database,
determine drug information of the identified drug, said drug information including drug side effects, and/or drug-drug interactions and/or drug-disease contraindications, and/or drug-food interactions,
determine how the potential drug side effects, and/or the drug-drug interactions, and/or the drug-disease contraindications and/or the drug-food interactions are expected to cause changes of physiological signs, to which extent changes are expected and/or how critical the respective changes are,
determine changes in the monitored physiological signs that are expected due to the administered drug,
determine at what time changes of physiological signs due to the administered drug are expected,
compare the measured physiological signs with corresponding thresholds to determine how critical the respective changes in the monitored physiological signs are, and
control the patient monitor to dynamically adapt at least one of the thresholds and the selected measurement frequency for a time based on the determined time at which the physiological signs are expected and based on the expected changes, the criticality of the respective changes, drug-drug interactions, drug-disease contraindications and/or drug-food interactions.

US Pat. No. 10,216,899

SENTENCE CONSTRUCTION FOR DNA CLASSIFICATION

HEWLETT PACKARD ENTERPRIS...

1. A method comprising:obtaining, from a deoxyribonucleic acid (DNA) sequence, a DNA bin that comprises a number of consecutive DNA elements in the DNA sequence equal to a bin length parameter;
constructing sentences from the DNA bin to form a constructed sentence set that includes a number of sentences equal to a size parameter, wherein:
each sentence of the constructed sentence set includes overlapping DNA elements with other sentences of the constructed sentence set and starts with a different DNA element of the DNA bin; and
each sentence of the constructed sentence set is constructed by partitioning the DNA bin into a number of words, each word comprising a number of DNA elements equal to the size parameter, and
using the constructed sentence set to train a classifier; and
determining a DNA classification for an unclassified DNA subsequence through the classifier trained using the constructed sentence set.

US Pat. No. 10,216,896

METHODS FOR NON-INVASIVE PRENATAL PLOIDY CALLING

Natera, Inc., San Carlos...

1. A method of determining at least a portion of the genome of an unborn fetus of a pregnant female, the fetus having a father and a mother being the pregnant female, and the father having a paternal genome with paternal haplotypes and the mother having a maternal genome with maternal haplotypes, the method comprising:measuring at least 1,000 SNP loci, comprising amplifying the SNP loci from a biological sample obtained from the pregnant female containing a mixture of free floating maternal and fetal nucleic acid molecules;
analyzing a plurality of the nucleic acid molecules, comprising:
identifying a location of the nucleic acid molecule in the human genome; and
determining a respective allele of the nucleic acid molecule;
determining a paternal allele inherited by the fetus from the father at each of a first plurality of loci, wherein the maternal genome is heterozygous at the first plurality of loci;
determining each of two maternal haplotypes of the first plurality of loci;
based on the determined alleles of the nucleic acid molecules, determining, with a computer system, amounts of respective alleles at each of the first plurality of loci;
comparing relative amounts of the respective alleles of the nucleic acid molecules at more than one locus of the first plurality of loci; and
based on the comparison, determining which of the two maternal haplotypes is inherited by the unborn fetus from the mother at the portion of the genome covered by the first plurality of loci.

US Pat. No. 10,216,894

MULTIMODE SENSOR DEVICES

Fitbit, Inc., San Franci...

1. A biometric monitoring device comprising:one or more sensors providing sensor output data comprising information about a user's physiological activity when the biometric monitoring device is worn by the user;
a display device configured to display values of physiological metrics generated for the user; and
one or more processors configured to:
(a) operate the one or more sensors to provide the sensor output data when the biometric monitoring device is worn by the user;
(b) determine that a first portion of the sensor output data includes data indicative of the user being engaged in a first activity and that a signal strength characteristic for the first portion of the sensor output data is higher than a first threshold value, wherein the first activity is walking and/or running;
(c) update, based at least in part on the determination of (b), a heart rate metric using information obtained from a time domain analysis of the first portion of the sensor output data;
(d) determine that a second portion of the sensor output data includes data indicative of the user being engaged in a second activity and that a signal strength characteristic for the second portion of the sensor output data is less than or equal to a second threshold value, wherein the second activity is selected from the group consisting of: elliptical machine exercise, stair machine exercise, cardio exercise machines, weight training, driving, swimming, biking, sleeping, driving, stair climbing, rock climbing, and any combination thereof;
(e) update, based at least in part on the determination of (d), the heart rate metric using information obtained from a frequency domain analysis of the second portion of the sensor output data;
(f) repeat (b) through (e) for additional portions of the sensor output data; and
(g) control the display device of the biometric monitoring device to display the heart rate metric.

US Pat. No. 10,216,893

MULTIMODE SENSOR DEVICES

Fitbit, Inc., San Franci...

1. A biometric monitoring device comprising:one or more motion sensors providing sensor output data comprising information about a user's motion;
a display device configured to display a step count metric generated for the user; and
one or more processors configured to:
(a) operate the one or more motion sensors when the biometric monitoring device is in motion;
(b) obtain a first set of motion sensor output data generated by the one or more motion sensors indicative of the motion of the biometric monitoring device;
(c) determine that a first signal strength of the first set of motion sensor output data is larger than a threshold value;
(d) select, based on determining that the first signal strength of the first set of motion sensor output data is larger than the threshold value, a time domain analysis of the first set of motion sensor output data over a frequency domain analysis of the first set of motion sensor output data;
(e) quantify a step count using the time domain analysis of the first set of motion sensor output data, and update the step count metric using the step count quantified using the time domain analysis of the first set of motion sensor output data;
(f) obtain a second set of motion sensor output data generated by the one or more motion sensors indicative of the motion of the biometric monitoring device;
(g) determine that a second signal strength of the second set of motion sensor output data is smaller than the threshold value;
(h) select, based on determining that the second signal strength of the second set of motion sensor output data is smaller than the threshold value, the frequency domain analysis of the second set of motion sensor output data over the time domain analysis of the second set of motion sensor output data; and
(i) quantify a step count using the frequency domain analysis of the second set of motion sensor output data, and update the step count metric using the step count quantified using the frequency domain analysis of the second set of motion sensor output data;
(j) control the display device of the biometric monitoring device to display the step count metric.

US Pat. No. 10,216,892

SYSTEM AND METHOD FOR INTERACTIVE VEHICLE DESIGN UTILIZING PERFORMANCE SIMULATION AND PREDICTION IN EXECUTION OF TASKS

Honda Motor Co., Ltd., T...

1. A computer-implemented method for determining the feasibility of a vehicle occupant package design model using an interactive vehicle package design system, the method comprising:receiving at a computer processor and from a peripheral device, a high-level description of a task to be executed, wherein the task to be executed is a physical task to be accomplished through motion by a virtual human subject within a task space boundary of the vehicle occupant package design model, and the high-level description of the task to be executed is entered as a user input at the peripheral device;
receiving at the computer processor, vehicle occupant package design model data based on the high-level description of the task, wherein the vehicle occupant package design model data is entered as user input at the peripheral device, retrieved from a database or memory of the peripheral device, or determined by a design analysis systems of the peripheral device;
receiving at the computer processor, parameters defining the virtual human subject, the parameters being for executing the task based on the high-level description of the task, and including physical parameters of the virtual human subject and physiological parameters of the virtual human subject, wherein the virtual human subject includes a plurality of degrees of freedom, and wherein the parameters are entered as user input at the peripheral device, retrieved from the database or the memory, or determined by the design analysis system;
receiving at the computer processor, a set of constraints based on the high-level description of the task, the set of constraints limiting the motion of the virtual human subject within the task space boundary while accomplishing the task, and including a dynamic consistency constraint that preferences a solution to a degree of freedom vector minimizing energy required to complete the task with diagonal coefficients corresponding to diagonal elements of a joint space inertia matrix and ensuring that the virtual human subject is dynamically balanced while accomplishing the task, wherein the set of constraints is determined by a posture initialization system of the peripheral device;
calculating via a design analysis system of the peripheral device, a plurality of motion descriptors of the virtual human subject including calculating a manipulation over time of the plurality of degrees of freedom of the virtual human subject during accomplishment of the task;
calculating via the design analysis system, a physical performance metric index quantifying a capability of the virtual human subject to accomplish the task based on the physical parameters of the virtual human subject and the plurality of motion descriptors;
calculating via the design analysis system, a physiological performance metric index quantifying a capability of the virtual human subject to accomplish the task based on the physiological parameters of the virtual human subject and the plurality of motion descriptors;
calculating via the design analysis system, a performance index based on the physical performance metric index and the physiological performance metric index;
generating via the design analysis system, a visual representation of the vehicle occupant package design model data and the virtual human subject executing the task based on the plurality of motion descriptors and the performance index;
displaying the visual representation on a display of the peripheral device;
evaluating via the design analysis system and based on the performance index, a feasibility of the virtual human subject accomplishing the task in the vehicle occupant package design model;
graphically representing the feasibility on the display as part of the visual representation;
receiving via the computer processor, a modification of at least one of the vehicle occupant package design model data, the task, the set of constraints, or the parameters describing the virtual human subject, wherein the modification is made by modifying the visual representation using an input/output device of the peripheral device; and
updating the visual representation according to the modification.

US Pat. No. 10,216,891

METHOD AND APPARATUS FOR SUPPORTING DESIGN IMPROVEMENT WORK OF MECHANICAL APPARATUS

FUJI CORPORATION, Chiryu...

1. A method for supporting work of improving the design of a mechanical apparatus which is operated by a motor, comprising:an operating step of operating a movable section of the mechanical apparatus by the motor;
a measuring step of obtaining at least one index which indicates an input into the motor or an output from the motor in the operating step;
a determining step of determining the mechanical properties of the mechanical apparatus, by using at least one index obtained in the measuring step; and
a specifying step of specifying at least one improvement-required item which is required to be improved in the design of the mechanical apparatus, by using the mechanical properties determined in the determining step,
wherein the operating step includes:
performing an oscillation motion of the movable section,
performing a uniform motion of the movable section under a plurality of velocity conditions, and
performing an acceleration/deceleration motion of the movable section,
wherein the measuring step includes:
obtaining an input index which indicates an input into the motor over time, and an output index which indicates an output from the motor over time based on the performed oscillation motion of the movable section,
obtaining a position index which indicates a rotation position of the motor over time in each velocity condition, a first velocity index which indicates a rotational velocity of the motor in each velocity condition, and a first torque index which indicates torque of the motor over time in each velocity condition based on the performed uniform motion of the movable section under a plurality of velocity conditions, and
obtaining a second torque index which indicates the torque of the motor in the acceleration/deceleration motion over time, and a second velocity index which indicates the rotational velocity of the motor over time based on the performed acceleration/deceleration motion of the movable section,
wherein the determining step includes:
determining frequency properties of the output with respect to the input into the motor using the input index and the output index,
determining position-torque properties which illustrate a relationship between the rotational position and the torque of the motor using the position index and the first torque index for each velocity condition,
determining velocity-torque properties which illustrate a relationship between the rotational velocity and the torque of the motor using the first velocity index and the first torque index for each velocity condition, and
determining a correction torque index excluding influence of friction from the second torque index using the second torque index, the second velocity index, and the velocity-torque properties, and
wherein the specifying step includes at least one of:
specifying rigidity of the mechanical apparatus as the improvement-required item using the frequency properties,
specifying a tooth contact of a gear connected to the motor or cogging torque of the motor as the improvement-required item using the position-torque properties,
specifying friction according to the motion of the movable section as the improvement-required item using the velocity-torque properties, or
specifying inertia of the movable portion as the improvement-required item using the correction torque index.

US Pat. No. 10,216,890

INTEGRATED CIRCUITS HAVING IN-SITU CONSTRAINTS

IYM Technologies LLC, We...

1. A method of increasing manufacturability of a design layout of an integrated circuit product fabricated using a manufacturing process performed by an integrated circuit fabrication system, comprising:defining an original design layout based on original design rules associated with the manufacturing process, the original design rules comprising at least global limits on relative distance between layout objects, and a design layout process comprising at least one optimization process on features of the original design layout;
generating a modified design layout by an automated design layout system, based at least on the original design layout, the original design rules, and a set of location-specific limits on relative distance between layout objects of the original design layout which are looked up from a predetermined table using patterns of layout objects in the original design layout defined by the design layout process, as look-up keys; and
outputting the modified design layout in a format suitable for use by the integrated circuit fabrication system to fabricate the integrated circuit product.

US Pat. No. 10,216,889

IC LAYOUT PATTERN MATCHING AND CLASSIFICATION SYSTEM AND METHOD

INTERNATIONAL BUSINESS MA...

1. A method for classifying patterns in a set of layout patterns, comprising:decomposing each of a plurality of pattern windows of an integrated circuit layout into a low frequency and a high frequency component using a wavelet analysis;
computing a plurality of moments for each of the plurality of pattern windows of the integrated circuit layout using the low frequency component as an approximation;
classifying the plurality of pattern windows into pattern classes using a distance computation for respective moments of the plurality of pattern windows by comparing the distance computation to an error value to determine similarities between the plurality of pattern windows, the classifying including generating a preferred set of integrated circuit layout designs for a particular technology node; and
fabricating one or more integrated circuit chips using one or more of the generated preferred set of integrated circuit layout designs.