US Pat. No. 10,248,953

SYSTEMS AND METHODS FOR PROVIDING TOKENIZED TRANSACTION ACCOUNTS

The Toronto-Dominion Bank...

1. A system, comprising:a communications interface;
at least one processor coupled to the communications interface;
a memory having computer executable instructions stored thereon, that when executed by the at least one processor, causes the at least one processor to perform the steps of:
generating and storing a first update condition for determining whether to update a first tokenized transaction account at a client device;
providing the first tokenized transaction account to the client device, the first tokenized transaction account constituting a secure digital representation of a transaction account;
obtaining pending purchase transaction data involving a transaction account, the pending purchase transaction data including the first tokenized transaction account;
in response to obtaining the pending purchase transaction data, determining that the first update condition applies to the pending purchase transaction data;
determining that an update to the first tokenized transaction account is required based on the determination that the first update condition applies to the pending purchase transaction data;
based on the determination that the update to the first tokenized transaction account is required, obtaining first location data of prior geographic positions of the client device and second location data of geographic positions of terminal devices that processed prior purchase transactions involving the transaction account;
determining that a subset of the prior geographic positions of the client device matches the geographic positions of the terminal devices;
based on the determination that the subset matches the geographic positions of the terminal devices, delaying the required update of the first tokenized account for a predetermined time period;
detecting that the predetermined time period has expired; and
in response to the detection that the predetermined time period has expired, performing an update to the first tokenized transaction account and providing the updated first tokenized transaction account to the client device.

US Pat. No. 10,248,952

AUTOMATED ACCOUNT PROVISIONING

VISA INTERNATIONAL SERVIC...

1. A method comprising:authenticating, by a server computer, a user associated with a user payment account, wherein the server computer is associated with an issuer that issued the user payment account to the user;
receiving, by the server computer, a mobile device identifier identifying a mobile device of the user;
prior to provisioning the user payment account on the mobile device of the user:
generating, by the server computer, a provisioning information request message without interacting with the user, the provisioning information request message including at least the mobile device identifier and a provisioning information request identifier, wherein the provisioning information request identifier automatically causes the mobile device to gather provisioning information associated with a secure memory of the mobile device without interacting with the user; and
sending, by the server computer, the provisioning information request message to the mobile device, wherein the provisioning information request message initiates provisioning of the user payment account on the mobile device of the user.

US Pat. No. 10,248,951

E-COUPON SETTLEMENT AND CLEARING PROCESS

METAVANTE CORPORATION, M...

9. A computer system comprising:at least one storage device comprising instructions; and
a processor configured to execute the instructions to perform operations comprising:
providing, for display on a terminal device in communication with the processor via a network, a website listing coupons based on a first data structure that are available for selection by a user, the website being connected to a database comprising the first data structure:
receiving, over the network, a selection of at least one coupon, the at least one coupon being selected from the first data structure, based on a selection of at least one of the coupons listed on the website;
storing, in a second data structure at the transaction processing system, at least one identifier associated with the at least one coupon, in association with a consumer account;
receiving, over the network, from a point-of-sale system, information concerning a transaction, the information comprising at least one transaction data detail, data identifying the consumer account, and at least one item identifier representing a purchased item;
processing the transaction using the at least one coupon identifier in the second data structure, the at least one item identifier, and the at least one transaction data detail, wherein processing the transaction comprises comparing the received at least one item identifier to the at least one coupon identifier to determine whether there is a match between the at least one coupon identifier and the received at least one item identifier;
sending, to the point-of-sale system, transaction information for fulfilling the transaction; and
in response to a determination that the at least one identifier still remains in the second data structure after the at least one selected coupon has expired, automatically removing the at least one identifier from the second data structure and automatically releasing funds associated with unused coupons to a coupon sponsor.

US Pat. No. 10,248,950

METHODS AND SYSTEMS TO SECURELY LOAD / RELOAD A CONTACTLESS PAYMENT DEVICE

Mastercard International ...

1. A method for operating a terminal device, comprising:receiving, by the terminal device, a request for a load transaction for loading value onto a contactless payment device, the request including a requested load amount;
prompting a user, by the terminal device, to present the contactless payment device to a contactless reader operatively coupled to the terminal device;
presenting the contactless payment device to the contactless reader;
establishing a wireless data communication channel between the contactless payment device and the contactless reader in connection with the load transaction;
transmitting an authorization request from the contactless payment device to the contactless reader over the wireless data communication channel, said authorization request for requesting authorization from a remote server computer for said load transaction, said authorization request different from said request for a load transaction;
receiving, by the contactless reader from said contactless payment device over the wireless data communication channel, the authorization request;
transmitting, by the terminal device, said authorization request electronically over a communication channel to the remote server computer, the remote server computer associated with a destination address, the remote server computer operated by or on behalf of an issuer of said contactless payment device for authorization processing;
receiving, by the terminal device, a signed authorization response from said remote server computer indicating approval of the authorization request;
after the terminal device receives the signed authorization response, prompting the user, by the terminal device, to present the contactless payment device to the contactless reader;
second presenting the contactless payment device to the contactless reader;
establishing the wireless data communication channel for a second time in connection with said load transaction;
transmitting, by the contactless reader to the contactless payment device over the wireless data communication channel, the signed authorization response for authentication by the contactless payment device;
transmitting a transaction certificate from the contactless payment device to the contactless reader over the wireless data communication channel;
receiving, by the contactless reader over the wireless data communication channel, the transaction certificate from the contactless payment device indicating authentication of the issuer;
displaying, by the contactless reader, a prompt to enter a personal identification number (PIN);
receiving, by the terminal device via an input device, the PIN from the user;
third presenting the contactless payment device to the contactless reader;
establishing the wireless communication channel for a third time in connection with said load transaction;
transmitting, by the contactless reader over the wireless data communication channel, an encrypted version of the PIN to the contactless payment device;
verifying of the encrypted version of the PIN by the contactless payment device to verify the user; and
accepting said request for the load transaction by the contactless payment device.

US Pat. No. 10,248,949

METHOD FOR ENCRYPTING TRANSACTIONS AT A DYNAMIC TRANSACTION CARD

CardLab ApS., Herlev (DK...

1. A method comprising:at a dynamic transaction card:
at a first time, storing a group of cryptograms generated by a local cryptogram generator stored on the dynamic transaction card, the group of cryptograms comprising the first cryptogram and a second cryptogram distinct from the first cryptogram;
at a second time, establishing a wireless connection with a mobile computing device;
in response to establishing the wireless connection with the mobile computing device, at a local token generator stored on the dynamic transaction card, generating a first token associated with the first cryptogram;
generating a first magnetic stripe sequence command representing the first cryptogram and the first token by fusing the first cryptogram and the first token representing a first payment method;
in response to detecting a magnetic stripe card reader proximal a magnetic stripe emulator integrated into the dynamic transaction card at a third time succeeding the second time, driving the magnetic stripe emulator according to the first magnetic stripe sequence command;
at the local token generator, generating a second token associated with the second cryptogram;
generating a second magnetic stripe sequence command representing the second cryptogram and the second token by fusing the second cryptogram and the second token representing a second payment method;
at a fourth time succeeding the third time, receiving a selection for the second payment method; and
at approximately the fourth time, in response to detecting a second magnetic stripe card reader proximal the magnetic stripe emulator, driving the magnetic stripe emulator according to the second magnetic stripe sequence command.

US Pat. No. 10,248,948

APPARATUS AND METHOD FOR PROVIDING INTERACTION INFORMATION BY USING IMAGE ON DEVICE DISPLAY

SAMSUNG ELECTRONICS CO., ...

1. A method for using a mobile device to provide information to a point-of-sale (POS) terminal, the method comprising:detecting, by the mobile device, a presence of the POS terminal via wireless communication;
in response to the presence of the POS terminal being detected, displaying, on a display of the mobile device, a credit card image that is stored in the mobile device, by executing a payment application, without displaying a lock screen for receiving a user input for unlocking the mobile device;
while the credit card image is displayed:
receiving, via a fingerprint sensor of the mobile device, a first fingerprint input of a user of the mobile device; and
determining, by the mobile device, whether the first fingerprint input that is received is valid; and
in response to the first fingerprint input that is received being determined to be valid and being maintained over a preset time interval, providing, by the mobile device, to the POS terminal, first information corresponding to a credit card related to the credit card image that is displayed, to facilitate a performance of a transaction by a settlement server.

US Pat. No. 10,248,947

METHOD OF GENERATING A BANK TRANSACTION REQUEST FOR A MOBILE TERMINAL HAVING A SECURE MODULE

OBERTHUR TECHNOLOGIES OF ...

1. A method of generating a transaction request using a mobile payment terminal hosting a payment application and including a secure module, the method comprising:the payment application receiving a secure token from a provisioning server, the secure token representing bank data of a user of the mobile payment terminal;
the payment application executing a payment protocol with a trader application;
the payment application requesting an authorization cryptogram from an encryption application hosted in the secure module for verifying authorization of the transaction request in compliance with the payment protocol;
the encryption application generating the authorization cryptogram from a diversifier transmitted by the trader application, the payment application, or an authorization server and by a key hosted by the secure module; and
the payment application generating the transaction request using the authorization cryptogram and the secure token.

US Pat. No. 10,248,946

METHODS, SERVER, MERCHANT DEVICE, COMPUTER PROGRAMS AND COMPUTER PROGRAM PRODUCTS FOR SETTING UP COMMUNICATION

TELEFONAKTIEBOLAGET LM ER...

1. A security server comprising a processor and a memory, said memory containing instructions that when executed by said processor cause said processor to perform the steps of:receiving a first message from a merchant device, the first message comprising a customer identifier, an application identifier of a customer payment application and a merchant device security token, said merchant device security token comprising a certificate;
determining, using the merchant device security token, customer identifier, and application identifier, that the merchant device is authorised by a scheme provider of the customer payment application to perform payment using the customer payment application,
wherein the determining comprises determining that the certificate was issued by the scheme provider of the customer payment application;
in response to determining that the merchant device is authorized by the scheme provider of the customer payment application, sending, to the merchant device, an indication that the merchant device is authorized;
after determining that the merchant device is authorized by the scheme provider of the customer payment application and sending the indication, setting up a secure channel between the merchant device and the customer payment application in a secure element of a mobile communication terminal, wherein setting up the secure channel includes (i) receiving a request from the merchant device to set up the secure channel with the secure element of the mobile communication terminal and (ii) sending a second message to the merchant device responding to the request; and
after setting up the secure channel, passing communication between the merchant device and the customer payment application in the secure element of the mobile communication terminal using the secure channel.

US Pat. No. 10,248,945

DYNAMIC SCREEN LOGO THAT TRANSMITS SHOPPING BASKET CONNECTION INFORMATION TO MOBILE DEVICE

Mastercard International ...

1. A method comprising:using a camera component of a mobile device to capture images over time of a design element displayed on a display screen, the design element modulated over time to encode data in the design element, the design element presented by a merchant;
analyzing the captured images by a payment application running on the mobile device to obtain the encoded data;
the payment application using the encoded data to establish a communication channel with a merchant device, the merchant device operated by or on behalf of the merchant; and
the payment application engaging in a purchase transaction with the merchant device via the communication channel, the purchase transaction including the payment application causing payment credentials to be transmitted to the merchant device to permit the merchant device to use the payment credentials to initiate a request for payment;
wherein the design element is presented by the merchant via being included in a web page downloaded by the merchant to a computer operated by a user of the mobile device.

US Pat. No. 10,248,944

FUNCTION EXPANSION METHOD IN A POINT-OF-SALE SYSTEM USING PRINT DATA

Seiko Epson Corporation, ...

1. A function expansion system that executes a process configured to expand functionality of a Point-of-Sale application program, wherein the program is configured to generate print data printed on a receipt and output the print data, comprising:a computer configured to output the print data;
a first point-of-sale printer configured to receive the print data from the computer;
a second point-of-sale printer configured to receive the print data from the computer; wherein the computer comprises:
a first communication port configured to output the print data to the first point-of-sale printer;
a second communication port configured to output the print data to the second point-of-sale printer;
a data acquisition unit configured to acquire the print data generated by the application program to be received at the first communication port before the print data is received at the first communication port;
a function expansion unit configured to perform a function expansion processing based on the print data acquired by the data acquisition unit;
a processor configured to execute the function expansion unit and the data acquisition unit, wherein
the function expansion processing includes reading the print data, at least one of changing content that is printed by the print data based on a source of the print data, changing an output printer, generating a new output, and using information contained in the print data for other purposes, supplying information about a product sold to another application, and
determining whether the first point-of-sale printer is suitable for printing the print data, wherein determining whether the first point-of-sale printer is suitable for printing the print data is based on a type of printout, a text string or image, a content of predefined processes, or a content of specific data in a source print data, the specific data on which suitability for printing the print data is based comprising one or more of detection for adding color or location of the first point-of-scale printer;
when it is determined that the first point-of-sale printer is not suitable for printing the print data, the function expansion unit outputs the print data processed by the function expansion processing to the second communication port and not to the first communication port; and
when it is determined that the first point-of-sale printer is suitable for printing the print data, the function expansion unit outputs the print data to the first communication port.

US Pat. No. 10,248,943

OBJECT RECOGNITION SYSTEM FOR CHECKOUT LANE MANAGEMENT

1. A method for checkout lane management at a retail store location, the method comprising:collecting a stream of images from a plurality of checkout lanes;
casting a plurality of recognition polygons on predetermined areas of each of the images;
collecting recognition data from the plurality of recognition polygons cast on each of the images, where the recognition data includes color data, coordinate data and timestamp data;
analyzing the recognition data to iteratively determine a checkout status for each of the plurality of checkout lanes, where the checkout status includes a CIP value and an estimated checkout period;
ordering each of the checkout lanes according to estimated checkout periods through a weighting algorithm;
translating the ordering of the plurality of checkout lanes to a light intensity value for each of the plurality of checkout lanes;
communicating the light intensity values to each of the corresponding plurality of checkout lanes associated with the light intensity values; and
illuminating indicator lights at each of the plurality of checkout lanes according to the light intensity value for the associated checkout lane.

US Pat. No. 10,248,942

SYSTEM AND METHOD FOR SELF-CHECKOUT, SCAN PORTAL, AND PAY STATION ENVIRONMENTS

ECR Software Corporation,...

1. A checkout system comprising:a checkout station having a housing, a customer interface and a customer unloading station,
a point-of-sale system having a microprocessor and memory operatively associated with one another to identify products being purchased, payments tendered therefor and to store transaction information locally at the checkout station or remotely from the checkout station,
the microprocessor having programming configured to allow an item to be scanned by a product identification scanner, and
an attendant command module, wherein the attendant command module includes a voice command module.

US Pat. No. 10,248,941

SYSTEM AND METHOD FOR THE OPTICAL DETECTION OF INTRUSION, AND CORRESPONDING ELECTRONIC DEVICE, PROGRAM AND RECORDING MEDIUM

INGENICO GROUP, Paris (F...

1. An electronic device comprising:at least one security module, a keypad, an insertion slot for a card and at least one pre-determined light source inside said electronic device; and
a system for detecting intrusion in the electronic device, wherein the system comprises:
at least one optical sensor connected to the at least one security module of the electronic device, said at least one optical sensor and said security module being configured to detect a variation in light intensity measured by said at least one optical sensor as compared with a reference light intensity associated with the at least one pre-determined light source inside said electronic device, said at least one pre-determined light source carrying out back-lighting of the keypad and/or of the insertion slot for the card of said electronic device, and said variation in light intensity representing a risk of intrusion into said electronic device,
and wherein said electronic device comprises a transmitter, which transmits at least one random on/off signal or a random variation signal for at least said pre-determined light source, the variation in light intensity being measured by said at least one optical sensor and said security module by taking account of the at least one random on/off signal transmitted.

US Pat. No. 10,248,940

MODULAR FIRMWARE FOR TRANSACTION SYSTEM

Square, Inc., San Franci...

1. A payment reader for processing transactions between a contactless device or a chip card and a point-of-sale application running on a seller mobile device, the payment reader comprising:a contactless interface configured to receive payment information from the contactless device;
a contact interface configured to receive the chip card and receive payment information from the chip card;
a wireless communication interface configured to communicate with the point-of-sale application;
a memory comprising firmware instructions, wherein a first subset of the firmware instructions are associated with at least one transaction processing module and a second subset of firmware instructions are associated with one or more other processing functions of the payment reader, and wherein the first subset of firmware instructions comprise position independent code that is located in a distinct section of the memory from the second subset of firmware instructions;
a processor configured to:
generate a unique identifier for the firmware instructions of the at least one transaction processing module of the plurality of transaction processing modules,
receive the payment information from the contactless interface or the contact interface in accordance with the second subset of firmware instructions,
process the payment information in accordance with the first subset of firmware instructions,
transmit, to one or more other processors, data to be encrypted, such data being based on the first subset of firmware instructions and one or more of: the payment information and the processed payment information,
receive encrypted data from the one or more other processors, and
provide the encrypted data to the wireless communication interface in accordance with the second subset of firmware instructions,
wherein the wireless communication interface is configured to transmit the encrypted data to the point-of-sale application.

US Pat. No. 10,248,939

REMOTE TRANSACTION PROCESSING AT A SERVER WITH AUTHENTICATION BEFORE A PRODUCT LIST

Michelle Fisher, Berkele...

1. A method for processing a transaction, comprising:maintaining, at the remote management server, a payment method;
receiving, at the remote management server, user input login information including an identification code associated with a user and information related to a PIN from a non-browser based application, wherein the non-browser based application is a mobile operating system platform non-browser based mobile application with a graphical user interface that is preinstalled or downloaded and installed on a mobile device, wherein the non-browser based application stored on the mobile device receives the user input login information including the identification code associated with a user and the information related to the PIN through user input via a mobile device display of the mobile device, the mobile device including the mobile device display, a mobile device processor, a mobile device wireless transceiver configured to support voice and data interactions through a first wireless communication channel including at least one of CDMA and GSM, and a mobile device wireless fidelity (Wi-Fi) transceiver;
upon receipt of the user input login information including the identification code associated with a user and the information related to the PIN, authenticating, at the management server, a user associated with the user input login information;
after the user authentication, sending a list of products from the remote management server to the non-browser based application generated screen for display using the non-browser based application generated screen;
receiving, at the remote management server an identification of one or more products selected from a list of products, from the non-browser based application generated screen, wherein the non-browser based application generated screen receives the identification of one or more products selected from the list of products through the user input via the mobile device display of the mobile device;
receiving, at the remote management server a transaction purchase request from the non-browser based application generated screen, wherein the non-browser based application generated screen receives the transaction purchase request through the user input via the mobile device display of the mobile device;
after receiving the transaction purchase request, transmitting, from the remote management server the payment method to a transaction server which processes the transaction using the payment method;
receiving, at the remote management server, a transaction verification from the transaction server, wherein the transaction verification indicates that the transaction has been processed; and
after the transaction has been processed, sending, from the remote management server to the non-browser based application generated screen, a digital artifact for display within the non-browser based application generated screen using the mobile device display.

US Pat. No. 10,248,938

REMOTE TRANSACTION PROCESSING AT A SERVER WITH AUTHENTICATION AFTER A PRODUCT LIST

Michelle Fisher, Berkele...

1. A method for processing a transaction comprising:maintaining, at a remote management server, a payment method;
sending a list of products from the remote management server to a non-browser based application generated screen for display using the non-browser based application generated screen, wherein the non-browser based application generated screen is generated by a non-browser based application which is a mobile operating system platform non-browser based mobile application with a graphical user interface that is preinstalled or downloaded and installed on a mobile device, the non-browser based application generated screen corresponding to a specific screen or area of the non-browser based application, the mobile device including the mobile device display, a mobile device processor, a mobile device wireless transceiver configured to support voice and data interactions through a first wireless communication channel including at least one of CDMA and GSM, and a mobile device wireless fidelity (Wi-Fi) transceiver;
receiving, at the remote management server, an identification of one or more products selected from a list of products, from the non-browser based application generated screen wherein the non-browser based application generated screen device receives the identification of one or more products selected from the list of products through user input via the mobile device display of the mobile device;
receiving, at the remote management server, user input login information including an identification code associated with a user and information related to a password from the non-browser based application generated screen, wherein the non-browser based application generated screen receives the user input login information including the identification code associated with the user and the information related to the password, through the user input via the mobile device display of the mobile device;
upon receipt of the user input login information including the identification code associated with the user and the information related to the password, authenticating, at the remote management server, the user associated with the user input login information;
receiving, at the remote management server, a transaction purchase request from the non-browser based application generated screen, wherein the non-browser based application generated screen receives the transaction purchase request through the user input via the mobile device display of the mobile device;
after receiving the transaction purchase request, transmitting, from the remote management server, the payment method to a transaction server which processes the transaction using the payment method;
receiving, at the remote management server, a transaction verification from the transaction server, wherein the transaction verification indicates that the transaction has been processed; and
after the transaction has been processed, sending, from the remote management server to the non-browser based application generated screen stored on the mobile device, a digital artifact for display within the non-browser based application generated screen using the mobile device display.

US Pat. No. 10,248,937

SYSTEM AND METHOD OF PROVIDING POST-PURCHASE MEDIA CONTENT TO A SUBSCRIBER

1. A method comprising:receiving, by a computing device of a media service provider, purchase data of a subscriber of the media service provider, the purchase data including identification information of a first product;
in response to receiving the purchase data, sending, by the computing device of the media service provider, media content associated with the first product to a device associated with the subscriber;
receiving, by the computing device from the device associated with the subscriber, a search request associated with the first product;
in response to receiving the search request, determining, by the computing device, a responsible party associated with the first product based on whether a return period associated with the first product is active, wherein determining the responsible party associated with the first product comprises:
determining, by the computing device, that a return period associated with the first product is active based on a purchase date associated with the first product; and
selecting a seller of the first product as the responsible party associated with the first product based on determining that the return period is active;
placing, by the computing device, a first call to a communication device of the responsible party;
placing, by the computing device, a second call to a second communication device of the subscriber; and
bridging, by the computing device, the first call and the second call.

US Pat. No. 10,248,936

SYSTEMS AND COMPUTER-IMPLEMENTED PROCESSES FOR DEPOSITING, WITHDRAWING, AND REUSING CURRENCY FOR PURCHASE TRANSACTIONS USING AN INTELLIGENT TELLER MACHINE

CAPITAL ONE SERVICES, LLC...

1. A system, comprising:a first intelligent teller machine; and
one or more second intelligent teller machines in communication with the first intelligent teller machine,
the first intelligent teller machine further comprising:
a currency repository holding an amount of currency;
at least one memory storing instructions; and
at least one processor configured to execute the stored instructions to:
identify that the amount of currency in the currency repository is above an upper limit for the amount of currency in the currency repository;
transmit a verification request to the one or more second intelligent teller machines to verify that at least one of the second intelligent teller machines has currency repository space available to accept currency; and
notify a user of the availability of the at least one second intelligent teller machine to accept currency.

US Pat. No. 10,248,935

SYSTEM AND METHOD FOR PROVIDING A DRIVERLESS PORTABLE ATM

CAPITAL ONE SERVICES, LLC...

1. An Americans with Disabilities Act (ADA) compliant driverless motor vehicle comprising:an driverless mobile automated teller machine (ATM) including a communication interface configured to (i) establish a secure connection with a backend system of a financial institution and (ii) execute a cash withdrawal for a user associated with a user device or receive a deposit of cash or a check from the user;
a generator;
a power switchover configured to transition, without electrical interruption, the mobile ATM between receiving power from the generator and receiving power from an electrical grid;
a dual-band router having a first band configured to communicate via a first mobile internet service provider and a second band configured to communicate via a second mobile internet service provider; and
a vibration-reduction element,
wherein the backend system of the financial institution includes:
a database configured to maintain a status of the driverless mobile ATM, the status of the driverless mobile ATM indicating a current location of the driverless mobile ATM and a current amount of cash available for withdrawal from the driverless mobile ATM;
a communication interface configured to receive, from the user device and via a network, a request for the driverless mobile ATM, the request including transaction location data indicative of a transaction location at which the driverless mobile ATM is requested to conduct a transaction;
a location processor configured to compare the transaction location data to the current location of the driverless mobile ATM, and determine whether the driverless mobile ATM is a closest driverless mobile ATM from among a plurality of driverless mobile ATMs to the transaction location, wherein the communication interface is configured to:
transmit a first alert including the request to the driverless mobile ATM via the network,
receive a response from the driverless mobile ATM via the network,
transmit a second alert, to the user device, including a current location of the driverless mobile ATM and an estimated time at which the driverless mobile ATM is estimated to arrive at the transaction location, and
receive, from the driverless mobile ATM, confirmation that the transaction was completed; and
a transaction processor configured to process the requested transaction subsequent to receiving the confirmation.

US Pat. No. 10,248,934

SYSTEMS AND METHODS FOR LOGGING AND REVIEWING A MEETING

MELO INC., San Jose, CA ...

1. A system for logging and reviewing a meeting, comprising:a communication interface configured to receive video of the meeting captured by at least one camera device and audio of the meeting captured by at least one microphone device;
a memory having computer-executable instructions stored thereon; and
a processor in communication with the communication interface and the memory, the processor being configured to execute the computer-executable instructions to:
generate a plurality of data streams based on the captured video and the captured audio;
determine identifications of attendees of the meeting based on at least one of the captured video and the captured audio;
transcribe speeches of the attendees based on at least one of the captured audio;
match the identifications and transcripts to the plurality of data streams; and
cause a data stream of the plurality of data streams to be shown on a display based on a user-selected identification of an attendee of the meeting,
wherein the at least one camera device includes an array of cameras configured to capture a plurality of views of the meeting,
wherein the processor is further configured to execute the computer-executable instructions to:
detect and track a position of an attendee of the meeting;
crop the plurality of views of the meeting based on the tracked position of the attendee of the meeting; and
generate an attendee position stream for the attendee of the meeting based on the cropped views.

US Pat. No. 10,248,933

CONTENT ITEM ACTIVITY FEED FOR PRESENTING EVENTS ASSOCIATED WITH CONTENT ITEMS

Dropbox, Inc., San Franc...

1. A method executed by a content management system, comprising:storing a content item including content data in a database, the content item synchronized between a set of users each with permission to edit the content data of the content item, the set of users including a first user and a second user;
providing the content item for display by a native application in a first interface window controlled by the native application of each of a first computing device and a second computing device;
providing to each of the first computing device and the second computing device a corresponding activity feed separate from the content data and displayed by a client application in a second interface window controlled by the client application, the client application different from the native application and the second interface window different from the first interface window;
receiving from the first computing device a first set of events corresponding to the first user's interactions with the content item via the native application in real time;
receiving from the second computing device a second set of events corresponding to the second user's interactions with the content item via the native application in real time; and
updating the activity feed displayed in the second activity window by each of the first computing device and the second computing device to include the first set of events and the second set of events, the activity feed including a first event from the first set of events, the first event including a preview of an edit made to the content data of the content item by the first user, the activity feed further including a second event from the second set of events indicating that the second user has seen the first user's edit.

US Pat. No. 10,248,932

INFORMING USERS OF A VIRTUAL UNIVERSE OF REAL WORLD EVENTS

International Business Ma...

1. A method for informing users of a virtual universe (VU) of real world events, comprising:receiving, from a real-world emergency notification service, an alert at a VU server hosting the VU, the alert notifying of an emergency event that is currently occurring in a real world emergency location, the VU including a computer-based virtual environment that a plurality of users access, the plurality of users interacting with the computer-based virtual environment and with others of the plurality of users within the computer-based virtual environment using avatars;
adding hierarchical data to a location database having, for every user of the plurality of users, a real world location associated with the user, the hierarchical data associating the user into a plurality of location-based categories;
identifying, in response to receipt of the alert, a plurality of VU users to which the alert pertains based on a comparison of the real world emergency location and the real world location in the hierarchical data;
validating, in response to the receipt of the alert, that the real world location in the hierarchical data of each VU user of the plurality of VU users to which the alert pertains is an actual current location of the VU user in real time using an internet protocol (IP) address associated with each of the plurality of VU users to which the alert pertains,
informing all of the plurality of VU users that have been identified and currently have avatars that are online in the VU of the alert of the real-world emergency, including:
providing a first in-VU indicated preferred alert having a first alert type designated by an online VU user of the plurality of VU users that have been identified and given within the virtual environment of the VU, wherein the first alert type is a private message visible only to the online VU user;
and providing, in response to a determination that the online VU user has not responded to the first in-VU indicated preferred alert, a second in-VU indicated preferred alert having a first alert type designated by the online VU user, wherein the second alert type is a globally visible sign.

US Pat. No. 10,248,931

COLLABORATIVE ANNOTATION OF MULTIMEDIA CONTENT

1. A data processing system comprising:a processor; and
a computer readable storage medium accessible to the processor and including processor executable instructions that, when executed by the processor, cause the processor to perform operations including:
generating annotation data indicative of an annotation responsive to detecting an annotation request from a first user viewing a program wherein the annotation includes a rating indicating either an approval or disapproval of proximal content, wherein the proximal content comprises content within a time period to the chronological location of the annotation;
receiving, from the first user, a collaboration group request indicative of a first collaboration group defined by the first user, wherein the first collaboration group includes a second user and wherein the collaboration group request includes information indicative of the second user;
maintaining first group data including first collaboration group annotations created by any member of the first collaboration group;
receiving, from the second user, a compound annotation criteria including first and second annotation criterion, wherein satisfaction of the first annotation criterion requires an approval density exceeding a threshold density and wherein satisfaction of the second annotation criterion requires a disapproval density exceeding the threshold density, wherein the approval density indicates a density of ratings approving the content and wherein the disapproval density indicates a density of ratings disapproving the content and further wherein satisfaction of the compound annotation criteria indicates proximal content satisfying the first annotation criterion and the second annotation criterion simultaneously;
identifying chronological locations in the program satisfying the compound annotation criteria;
receiving, from the second user, a navigation request indicating a particular one of the chronological locations identified; and
responsive to the navigation request from the second user, navigating to the particular one of the chronological locations identified.

US Pat. No. 10,248,930

SYSTEM AND METHOD OF COMMITMENT MANAGEMENT

Execusoft Corporation, P...

1. A system for managing a task comprising:a server configured to establish an accepted commitment relationship for a task between a requester of the task and a performer of the task, wherein the task comprises a number of sub-tasks, wherein the accepted commitment relationship includes a task completion date generated from dates negotiated between the requester and the performer on the system for completing components of the task;
a first host coupled to the server for use by the requester, the first host configured to exchange negotiation messages with the performer over multiple negotiation rounds, the negotiation messages containing proposed commitment relationships; and
a second host coupled to the server for use by the performer, the second host configured to exchange the negotiation messages with the requester over the multiple negotiation rounds, wherein the task and the sub-tasks are associated such that the task and sub-tasks form a hierarchical tree structure, wherein a thread corresponds to the task in a structure that mirrors relationships of tasks, further wherein at least one of the first host and the second host maintains a copy of the negotiation messages in order to maintain operation at the at least one of the first host and the second host if there is no connection to the server, wherein after the task is generated, a parent process automatically generates a child process and generates an electronic mail message providing notification that the task has been assigned, wherein the server further comprises a data structure containing task data identifying the commitment relationship, wherein the data structure is stored centrally, accessible by the first host and the second host.

US Pat. No. 10,248,929

ORDER FILLING SYSTEM

OCADO INNOVATION LIMITED,...

1. An order fulfillment system comprising:at least one processor configured to identify whether any of a plurality of incoming items should be pre-picked and placed in bins, based on at least one physical characteristic of an item and on a predicted demand for the item;
a facility comprising first machinery configured to pre-pick one or more of identified bulky items of the plurality of incoming items, and to place the identified pre-picked bulky items in bins, and second machinery configured to move the bins having the identified, pre-picked bulky items;
a storage facility, configured to store the bins each having one or more pre-picked bulky items pending picking of an order containing at least one other item stored in a storage and retrieval system; and
a retrieval and picking system comprising third machinery configured to retrieve the bins having one or more pre-picked bulky items and enable placement therein, at a picking station, of one or more additional items from the storage and retrieval system, and to deliver packed bins containing the bulky and at least one other item to a dispatch facility,
wherein the at least one processor is configured to provide instructions for the first machinery and the second machinery of the facility and the third machinery of the retrieval and picking system.

US Pat. No. 10,248,928

SYSTEMS AND METHODS FOR MANAGING AIRPORT LOUNGES

LoungeBuddy, Inc., San F...

1. A system for dynamically managing airport lounge inventory, comprising:an application server comprising:
a processor;
a database, the database comprising:
a plurality of access rules corresponding to access to a corresponding plurality of associated airport lounges, and
an inventory corresponding to an available capacity in each of the plurality of associated airport lounges; and
memory in communication with the processor, the memory storing instructions which are executed by the processor for:
receiving an access request from an associated airport lounge application resident on an associated client device;
receiving at least one access item associated with the access request;
retrieving the plurality of access rules from the database;
determining whether at least one of the plurality of airport lounges is accessible for a user of the associated client device in accordance with the received access request and the at least one access item, and the retrieved access rules;
communicating a response to the access request based upon the accessibility determination;
tracking a location of each of a plurality of associated client devices within at least one of the plurality of airport lounges using local positioning data of the associated client device collected by the application server;
updating the inventory associated with the at least one airport lounge responsive to the tracked locations; and
dynamically updating the at least one set of access rules corresponding to the at least one airport lounge responsive to the updated inventory of the corresponding at least one associated airport lounge;
wherein the memory further stores instructions which are executed by the processor for:
determining, in accordance with the access rules and the at least one access item, a guest access status associated with the user of the associated client device;
receiving, from the associated client device, instructions to transfer the quest access status to a second client device;
determining relative positions of the associated client device and the second client device;
generating routing information specific to each client device, the routing information corresponding to a route to a single physical location;
tracking each client device on route the single physical location; and
updating the route specific to each client device during travel to the single physical location.

US Pat. No. 10,248,927

MULTIFUNCTIONAL SELF-SERVICE SHIPPING AND MAIL PROCESSING SYSTEM

1. A method for finalizing a package including one or more objects prior to its tendering to a package shipping service, the method comprising the steps of:providing a package shipping processing system including a kiosk housing, a computer terminal including a display device, an input device, a data processor, and network data communications module, the computer terminal being disposed in the kiosk housing with the display device and the input device being accessible, the package shipping processing system also including a weighing scale including a platform on which one or more objects for shipment are placed, the weighing scale being in communication with the computer terminal with a measured weight of the one or more objects for shipment placed on the platform being reported to the computer terminal, and an imaging device being disposed in proximity to the weighing scale and positioned to have a field of view extending beyond the platform of the weighing scale, the imaging device being in communication with the computer terminal with captured image data of the object placed on the platform being transmitted to the computer terminal, and wherein the data processor stores a fragility index which includes a listing of a plurality of objects and stores a plurality of insulation densities corresponding to the listing of the plurality of objects;
receiving, on the data processor, weight data from the weighing scale on which the one or more objects for shipment are placed;
capturing an image of the one or more objects for shipment from a fixed position with the imaging device;
receiving depth data for a plurality of locations along the one or more objects for shipment, the plurality of locations being matched to the captured image;
transmitting the image of the one or more objects for shipment and the depth data to the data processor;
generating, on the data processor, dimensional parameters of the one or more objects for shipment along a plurality of axes from the image of the one or more objects for shipment based on the received depth data; and
generating, on the data processor, a set of packaging parameters based on the generated dimensional parameters and the weight data;
inputting, into the input device, a designation of the one or more objects for shipment which is within the data processor's listing of objects;
selecting, by the data processor, an insulation density based upon the fragility index and the designation of the one or more objects for shipment input into the input device; and
packaging the one or more objects for shipment within an insulation filled package wherein the package was selected in accordance with the set of packaging parameters and the insulation was selected in accordance with the selected insulation density.

US Pat. No. 10,248,926

METHOD OF, AND CONSIGNMENT MAGAZINE AND VEHICLE FOR, DELIVERING CONSIGNMENTS

Deutsche Post AG, Bonn (...

1. A method of delivering consignments, comprising the steps of:loading, in a distribution centre, different consignment chambers of a consignment magazine with different consignments,
moving, during the operation of the consignment magazine being loaded, different consignment chambers one after the other into a receiving position for receiving at least one consignment and then into a storage position for the interim storage of the consignment received,
documenting the assignment of the loaded consignment chambers to the consignments received in each case in the consignment chambers,
transferring the consignment magazine loaded with consignments to a vehicle for delivering the consignments, and
moving the consignment chambers loaded with consignments one after the other into a discharging position so that the consignment assigned to the respective consignment chamber is discharged for delivery purposes.

US Pat. No. 10,248,925

SYSTEMS AND METHODS FOR COMPRESSING SHORTEST PATH MATRICES FOR DELIVERY ROUTE OPTIMIZATION

WALMART APOLLO, LLC, Ben...

1. A system comprising:one or more processors; and
one or more non-transitory storage devices storing computing instructions configured to run on the one or more processors and perform acts of:
preparing an initial shortest path matrix comprising a plurality of elements, an initial number of a plurality of map intersection nodes, and a plurality of full shortest paths between an origination map intersection node and a destination map intersection node, wherein each element of the plurality of elements comprises a full shortest path of the plurality of full shortest paths, and each full shortest path of the plurality of full shortest paths comprises one or more map intersection nodes of the plurality of map intersection nodes;
obtaining a first set of compression rules for compressing, using the one or more processors, the initial shortest path matrix by reducing the plurality of map intersection nodes in the initial shortest path matrix;
using the first set of compression rules and the one or more processors to compress the initial shortest path matrix to form a compressed shortest path matrix comprising a compressed number of the plurality of map intersection nodes that is fewer than the initial number of the plurality of map intersection nodes;
receiving a first delivery order for delivery of a first order at a first location; and
determining a shortest path delivery route for the first delivery order at the first location using the compressed shortest path matrix,
wherein:
using the first set of compression rules and the one or more processors to compress the initial shortest path matrix to form the compressed shortest path matrix comprises using the first set of compression rules and the one or more processors to compress the initial shortest path matrix to form a first compressed shortest path matrix by replacing the full shortest path between the origination map intersection node and the destination map intersection node in each element of the plurality of elements with a single map intersection node of the plurality of map intersection nodes;
the compressed number of the plurality of map intersection nodes that is fewer than the initial number of the plurality of map intersection nodes comprises a first compressed number of the plurality of map intersection nodes that is fewer than the initial number of the plurality of map intersection nodes;
the single map intersection node for a respective element of the plurality of elements comprises a next map intersection node in the full shortest path of the respective element of the plurality of elements; and
determining the shortest path delivery route for the first delivery order at the first location using the compressed shortest path matrix comprises determining the shortest path delivery route using the first compressed shortest path matrix.

US Pat. No. 10,248,923

BUSINESS PROCESS MODELING BASED ON NETWORK TRAFFIC

Cisco Technology, Inc., ...

1. A method comprising:receiving an input of an identifier, wherein the identifier corresponds to a node in a network;
recursively tracing data packets in the network, wherein the identifier is utilized as a seed for the tracing and serves as a beginning of a list of identifiers that grows based on the tracing;
receiving an update to the list of identifiers, the update containing additional identifiers added to the list of identifiers;
reprogramming at least one network switch based on receipt of the update; and
generating an information model of a business process based on the data packets.

US Pat. No. 10,248,922

MANAGING NETWORK PATHS WITHIN A NETWORK OF INVENTORY SPACES

Amazon Technologies, Inc....

1. A computing system comprising:a production system; and
a vehicle management system communicatively coupled with the production system over a data interface and comprising:
a processor; and
a memory comprising instructions that, when executed by the processor, cause the vehicle management system to at least:
receive, from the production system over the data interface, data about consumer demand for items available based at least in part on a network connecting storage buildings via transportation paths and transportation vehicles usable to transport the items between the storage buildings;
access historical data associated with the consumer demand;
generate unconstrained fulfillment options to fulfill the consumer demand based at least in part on the historical data and the network, a fulfillment option comprising a type and a schedule of a transportation vehicle to transport an item from a first storage building to a second storage building based at least in part on a transportation path, the consumer demand to be fulfilled by the production system based at least in part on the item being transported to the second storage building;
evaluate a performance of the network associated with utilizing a subset of the fulfillment options to fulfill the consumer demand, the subset of the fulfillment options comprising the fulfillment option and utilizing a subset of the transportation paths and transportation vehicles, the performance evaluated based at least in part on constraints associated with the network and variables associated with the subset of the transportation paths and transportation vehicles;
select the subset of the fulfillment options to fulfill the consumer demand based at least in part on a comparison of the performance to a second performance of the network indicating an improvement to a utilization of the network, the second performance associated with utilizing a second subset of the fulfillment options to fulfill the consumer demand by the production system, the second performance determined based at least in part on production data that is received from the production system over the data interface and that comprises scheduled network paths and transportation vehicles; and
send, to the production system over the data interface, a recommendation that identifies the subset of the fulfillment options, wherein the production system a deployment system based at least in part on the recommendation by at least changing the scheduled network paths and transportation vehicles and causing the deployment system to deploy the transportation vehicle to transport the item from the first storage building to the second storage building according to the schedule.

US Pat. No. 10,248,921

ANALYZING AND OPTIMIZING MAINTENANCE OF GOLF COURSES AND GOLF COURSE DESIGNS BY USE OF ALLOCABLE RESOURCES

United States Golf Associ...

1. A virtual golf course maintenance system comprising:a) a virtual golf course formed from a plurality of Course Components for one or more holes of said golf course, and a visualization means for visually viewing the virtual golf course on a device;
b) a CPU connected to a data input device providing a means for inputting said Course Components of said golf course and one or more factors associated with maintenance costs and consumable resources for the Course Components of the virtual golf course;
c) a manual input means for virtually modifying any one or more of the boundaries of the Course Components of said virtual golf course; and
d) said CPU providing visual confirmation of proposed boundary modifications of the Course Components of said virtual golf course and an anticipated change in said maintenance costs and consumable resources automatically in response to the proposed boundary modifications.

US Pat. No. 10,248,920

AUTOMATIC WELLBORE ACTIVITY SCHEDULE ADJUSTMENT METHOD AND SYSTEM

Schlumberger Technology C...

1. A method for controlling wellbore construction activities, comprising:entering a well plan into a computer, the well plan comprising estimated start and stop times for a plurality of activities in a predetermined sequence wherein the activities comprise at least one of tripping in of a drill string and tripping out of a drill string;
measuring progress of selected ones of the plurality of activities during their performance;
in the computer, recalculating an expected ending time of at least one of the plurality of activities based on progress thereof during the at least one of the plurality of activities, wherein the recalculating an expected ending time comprises using a calculated maximum safe pipe movement speed to an end of at least one of the at least one of the plurality of activities, and wherein the calculated maximum safe pipe movement speed is for tripping in of a drill string or tripping out of a drill string;
in the computer, recalculating expected start and stop times for each activity subsequent to the activity in progress based on the recalculated expected ending time wherein, for tripping in of a drill string, the recalculating comprises accounting for surge, and wherein, for tripping out of a drill string, the recalculating comprises accounting for swab; and
controlling at least one of the subsequent activities according to at least one of the recalculated start and stop times.

US Pat. No. 10,248,919

TASK ASSIGNMENT USING MACHINE LEARNING AND INFORMATION RETRIEVAL

1. A method of assigning a task to a developer, comprising:partitioning a list of developers into a plurality of developer clusters, a developer being included in a developer cluster based on a first set of attributes indicative of the developer's experience with software development, and the first set of attributes including at least one of the respective developer's commits, number of commits, or comment on previous commits;
for a plurality of tasks:
identifying a set of developers assigned to the respective task;
identifying a developer cluster including a greater number of developers from the respective set of developers than another developer cluster of the plurality of developer clusters; and
classifying the respective task as belonging to the respective developer cluster;
comparing one or more attributes of one or more classified tasks to a second set of attributes of a new task;
selecting a classified task having a greater number of attributes that match the second set of attributes than another classified task, the classified task belonging to a first developer cluster; and
assigning the new task to one or more developers included in the first developer cluster.

US Pat. No. 10,248,918

BALANCING A WORKLOAD BASED ON COMMITMENTS TO PROJECTS

INTERNATIONAL BUSINESS MA...

1. A method for balancing a workload in responding to incoming messages regarding a specific project with which a group of multiple users is associated, the method comprising, with a server having a network interface for connecting, via a computer network, to an electronic collaboration system that supports a distributed population of collaborating users, performing all of:monitoring messages in the collaboration system;
selecting a number of the users associated with the specific project in the collaboration system to form the group of multiple users, wherein the group comprises at least a first user;
analyzing data associated with the messages to determine which of the messages relate to the specific project;
measuring an amount of time taken by the first user to process a message related to the specific project;
determining a commitment level for each user in the group of multiple users associated with the specific project;
determining a commitment level for the first user based on the amount of time taken by the first user to process the message related to the specific project; and
reassigning a message related to the specific project in the collaboration system from the first user to a different user in the group based on a comparison of the commitment levels of the users in the group of users associated with the specific project to rebalance the workload in responding to incoming messages among the group of users.

US Pat. No. 10,248,917

SYSTEM AND METHOD FOR DEVELOPING AND UTILIZING A CONTACTABILITY PROFILE

CAPITAL ONE SERVICES, LLC...

1. A system for improving call center efficiency based on a contactability profile of an entity, comprising:at least one memory configured to store data and instructions;
at least one processing unit configured to access the at least one memory and execute the instructions, causing the at least one processing unit to:
generate a contactability profile of an entity by:
receiving, from a transaction system, transaction card usage data associated with the entity, the transaction card usage data comprising a transaction date and time and a transaction channel associated with each of a plurality of transactions;
receiving, from a plurality of data sources, internet usage data associated with the entity's access to a plurality of webpages, the internet usage data comprising an access time and an access channel for each of the plurality of webpages;
extrapolating, by a discriminator controlling a plurality of data enhancers and based on the transaction card usage data and internet usage data, contactability data including both contactable times and channels and non-contactable times and channels;
filtering the contactability data to remove conflicting contactability data indicating that the entity is both contactable and noncontactable at a same period of time; and
calculating, based on the filtered contactability data, a plurality of probabilities that the entity will be available for contact at a respective specified time and via one or more communication channels,
store, in the at least one memory, the contactability profile including a block of time indicating a calculated probability that the entity will be available at a specified time and via a specified channel;
and
a call generator system configured to:
receive the contactability profile of the entity;
schedule a telephone call during the block of time provided by the contactability profile;
dial a telephone number provided in the contactability profile during the block of time;
detect that the telephone call is answered by the entity; and
connect a user to the answered telephone call.

US Pat. No. 10,248,915

RISK PROFILING FOR ENTERPRISE RISK MANAGEMENT

INTERNATIONAL BUSINESS MA...

1. A method comprising:by an enterprise risk management (ERM) processor(s) set:
instantiating, within a memory from a risk profile class definition, at least one risk profile instance that compartmentalizes real-time authentication services security risk metrics and real-time user access compliance risk metrics associated with operational real-time authentication services security risk mitigation and real-time user access compliance risk mitigation performed by at least one control instance, where the at least one control instance is instantiated from a control class definition within a policy instance instantiated from a policy hierarchy class definition, where the policy hierarchy class definition associates as subclasses the control class definition and the risk profile class definition that each define accessible attributes that store real-time data values and define executable code segments that may be invoked within the respective instantiated at least one control instance and the instantiated at least one risk profile instance;
updating, by invocation of an object public-interface executable code segment of the at least one risk profile instance, a real-time data value of a risk attribute automatically within the at least one risk profile instance in response to a real-time event associated with the at least one control instance, where the risk attribute represents one or more of the real-time authentication services security risk mitigation and the real-time user access compliance risk mitigation performed by the at least one control instance;
performing real-time control of policy enforcement actions within an ERM system related to network security, where control of policy enforcement actions comprises regulating user operations within a network according to a defined security policy, and where real-time specifies a time frame of sufficiently short duration to perform computational policy decisions contemporaneously with detection of the regulated user operations;
performing, simultaneously within the time frame of performing the real-time control of policy enforcement actions, real-time self-diagnosis of functional code improvements for the ERM system;
where performing the real-time self-diagnosis of the functional code improvements for the ERM system comprises using results of the real-time control of policy enforcement actions to identify network security vulnerabilities capable of being mitigated with code modifications to the control class definition, and further comprises:
determining real-time execution effectiveness of the at least one control instance at operationally mitigating the respective real-time authentication services security risk(s) and the user access compliance risk(s) represented within the updated real-time data value of the risk attribute; and
identifying, using real-time class design feedback from the at least one risk profile instance within the ERM system and the determined real-time execution effectiveness of the at least one control instance, at least one code modification to the control class definition that adjusts one or more real-time operational control aspects of the at least one control instance and improves real-time execution effectiveness and operational capabilities of a new control instance instantiated from an updated control class definition at operationally mitigating the respective real-time authentication services security risk(s) and user access compliance risk(s) within the ERM system; and
the method further comprising performing an automated execution of a test procedure against the new control instance instantiated from the updated control class definition, with a successful test result confirming a functional improvement to the real-time execution effectiveness and operational capabilities of the new control instance.

US Pat. No. 10,248,914

SUSTAINING A FLEET OF CONFIGURATION-CONTROLLED ASSETS

The Boeing Company, Chic...

1. A computer-implemented method for sustaining a fleet of configuration-controlled assets, the method implemented using a sustainment data system (SDS) server including a processor in communication with a memory, the method comprising:integrating a plurality of previously separate computer applications each including specific reusable business transactions associated with managing a fleet of assets, wherein functional capabilities of individual computer applications of the plurality of previously separate computer applications are defined by one or more of the specific reusable business transactions executable therein, wherein the plurality of previously separate computer applications are separate from the assets of the fleet of assets, and wherein a first computer application of the plurality of previously separate computer applications communicates via a first communication format to a first gateway, where the first gateway communicates with the SDS server via a second communication format;
receiving, by the SDS server from an engineering data system, technical data associated with one asset of the fleet of assets, wherein the engineering data system is separate from the one asset of the fleet of assets;
translating, by the SDS server, the received technical data from a third communication format associated with the engineering data system to the second communication format associated with the SDS server;
transmitting, from the SDS server to the first gateway associated with the first computer application, the translated technical data;
converting, by the first gateway, the translated technical data from the second communication format to the first communication format;
transmitting, from the first gateway to the first computer application, the converted technical data, wherein the first computer application is configured to utilize at least one of the specific reusable business transactions, wherein the first computer application is further configured to install the converted technical data, and wherein the first computer application is separate from one asset of the fleet of assets;
receiving, by the SDS server from the at least one asset, sensor data associated with a first mission completed by the at least one asset;
determining, by the SDS server, a work order and a schedule to perform the work order, based on the received sensor data for the at least one asset, an availability of a trained resource to perform the work order, and the technical data;
transmitting, from the SDS server to a computer system associated with a user, the work order and the schedule for display to the user;
planning, by the SDS server, using one or more of the previously separate computer applications, a second mission for the at least one asset; and
transmitting, from the SDS server to the computer system associated with the user, the second mission for display to the user.

US Pat. No. 10,248,913

SYSTEMS, DEVICES, AND METHODS FOR SEARCHING AND BOOKING RIDE-SHARED TRIPS

TRANSIT LABS INC., Water...

1. A computer implemented system for optimizing electronically booked ride share trips, the system comprising:a data storage device storing ride sharing records with itineraries including a plurality of legs and maintaining a data structure storing additional variant trip booking options, each variant trip booking option automatically generated based on a seed trip;
a processor configured to:
receive a trip booking request for a passenger, the trip booking request defining passenger constraints;
parse the trip booking request to determine the seed trip and generate the additional variant trip booking options to expand a search domain associated with the trip booking request;
populate the data structure representing the expanded search domain with the automatically generated additional trip booking options, each trip booking option representing a different variant trip generated by varying at least one of pickup time, arrival time, pickup location, and drop off location based on at least one of the passenger constraints;
segregate, the additional trip booking options of the expanded search domain into a plurality of sub-search domains for parallel processing using separate processes, threads, or cores of one or more additional processors or the processor,
compute, using the separate processes, threads, or cores for each sub-search domain of the plurality of sub-search domains of the additional trip booking options to reduce an overall impact on system resources, objective values for the trip booking options, each trip booking option temporarily assigned to a vehicle to compute a corresponding objective value, the objective value being a metric output by an objective function of parameters, the parameters representing one or more of a level of ride share or efficiency, violation of passenger(s) targeted pickup time, violation of passenger(s) targeted arrive-before time, route deviation, vehicle operating cost, in-transit operating cost, vehicle itinerary and vehicle distance travelled, and time travelled;
responsive to the objective values computed using the separate processes, threads, or cores, heuristically transform the expanded search domain to generate a constrained data set of one or more retained trip booking options by removing at least one trip booking option from the generated trip booking options based on a comparison of its objective value and temporal proximity to at least one other trip booking option, wherein the temporal proximity of the at least one trip booking option to the at least one other trip booking option is a time difference between a pickup time or a drop off time of the at least one trip booking option and pickup time or a drop-off time of the at least one other trip booking option; and
transmit the one or more retained trip booking options for display on an interface application of an electronic device to confirm a selected trip booking option from the one or more retained trip booking options, the selected trip booking option identified at least partly using the interface application of the electronic device.

US Pat. No. 10,248,912

SYSTEMS AND METHODS FOR DISPLAYING TRAVEL ITINERARIES

GOOGLE LLC, Mountain Vie...

1. A method to display travel itineraries via a computer network, comprising:receiving, by an itinerary engine executing on one or more processors of a data processing system, a search request for a travel itinerary;
identifying, by the itinerary engine using a database storing travel information, a candidate travel itinerary responsive to the search request;
generating, by the itinerary engine, a first coordinate on a first axis of a multidimensional graph corresponding to a departure time of the candidate travel itinerary;
generating, by the itinerary engine, a second coordinate on a second axis of the multidimensional graph corresponding to an arrival time of the candidate travel itinerary, wherein the second axis is perpendicular to the first axis;
determining, by the itinerary engine, a location on the multidimensional graph based on the first coordinate and the second coordinate;
indicating, in the multidimensional graph, a duration slice comprising one or more duration time lines that extend diagonally with respect to the first axis and the second axis, each duration time line indicating a flight duration corresponding to any location on the multidimensional graph falling along the duration time line;
creating, by the itinerary engine, a data structure in memory for the candidate travel itinerary, the data structure indicating the location on the multidimensional graph that indicates the duration of the candidate travel itinerary in the duration slice;
allocating, by the itinerary engine, an icon to the data structure indicating the departure time, the arrival time, and a price of the candidate travel itinerary;
setting, by the itinerary engine, an attribute of the icon of the candidate travel itinerary based on the price of the candidate travel itinerary;
transmitting, by the data processing system to a display device via the computer network, the icon allocated to the data structure and instructions to display the icon with the multidimensional graph comprising the duration slice, wherein the display device displays the icon with the multidimensional graph;
receiving, by the data processing system from the display device, instructions to rotate the multidimensional graph comprising the icon;
in response to receiving the instructions to rotate the multidimensional graph comprising the icon, rotating the multidimensional graph comprising the icon so that the duration slice is horizontal with respect to the first axis; and
transmitting, by the data processing system to the display device via the computer network, the rotated multidimensional graph comprising the icon and instructions to display the rotated multidimensional graph comprising the icon; and
displaying, by the display device, the rotated multidimensional graph comprising the icon.

US Pat. No. 10,248,911

ION TRAPPING DEVICE WITH INSULATING LAYER EXPOSURE PREVENTION AND METHOD FOR MANUFACTURING SAME

1. An ion trap device, comprising:a substrate;
at least one central DC electrode disposed over the substrate and comprising:
a DC connector pad, and
a DC rail connected to the DC connector pad;
an RF electrode disposed over the substrate and comprising:
at least one RF rail located adjacent to the DC rail, and
an RF pad connected to the at least one RF rail;
at least one side electrode disposed over the substrate with the RF electrode disposed between the central DC electrode and the side electrode; and
a plurality of insulating layers configured to support at least one of the central DC electrode, the RF electrode or the side electrode, on a top surface of the substrate,
wherein
the plurality of insulating layers includes a first insulating layer and a second insulating layer disposed over the first insulating layer,
the second insulating layer includes an insulating overhang that protrudes with respect to the first insulating layer in a width direction of the ion trap device, and
the insulating overhang comprises at least one bottom side, substantially parallel to the substrate, and a lateral sidewall, substantially perpendicular to the substrate,
wherein the lateral sidewall of the insulating overhang has a conductive film formed thereon, and
wherein the bottom side has no conductive film formed thereon.

US Pat. No. 10,248,910

DETECTION MITIGATION AND REMEDIATION OF CYBERATTACKS EMPLOYING AN ADVANCED CYBER-DECISION PLATFORM

Fractal Industries, Inc.,...

1. A system for detection and mitigation of cyberattacks employing an advanced cyber decision platform comprising:a time series data retrieval and storage module stored in a memory of and operating on a processor of a computing device;
a directed computational graph analysis module stored in a memory of and operating on a processor of a computing device;
an action outcome simulation module stored in a memory of and operating on a processor of a computing device; and
an observation and state estimation module stored in a memory of and operating on a processor of a computing device;
wherein the time series data retrieval and storage module: monitors cybersecurity-related data from a plurality of sources; continuously monitors network traffic in real-time on at least one client network; and stores retrieved and monitored data;
wherein the directed computational graph analysis module: retrieves a plurality of data from the time series data retrieval and storage module; analyzes at least a portion of retrieved data for baseline pattern determination; analyzes at least a portion of retrieved data for predetermined anomalous occurrences; performs real-time analysis of the network traffic data collected during the real-time traffic monitoring; generates alerts based on the real-time analysis, and provides relevant data and metadata to the action outcome simulation module;
wherein the action outcome simulation module: receives data and metadata for predictive simulation analysis from the directed computational graph analysis module; performs predictive simulation transformations on data provided by other modules of the advanced cyber decision platform; and provides results of predictive simulation analysis to predetermined modules of advanced cyber decision platform;
wherein the observation and state estimation module formats data received from other modules of the advanced cyber decision platform in ways predesigned to maximize conveyance of included information and data;
wherein at least a portion of the data retrieved by the time series data retrieval and storage module is cybersecurity intelligence data from a plurality of expert sources;
wherein at least a portion of simulations run by the action outcome simulation module comprise predictive discovery of resident network infrastructure vulnerabilities to a plurality of cyberexploits and provide at least one resultant correction recommendation;
wherein at least a portion of simulations run by the action outcome simulation module comprise network traffic sample data from a probable ongoing cyberattack to predict a timeline of progression of the probable ongoing cyberattack and at least one recommendation predicted mitigate effects of the probable ongoing cyberattack;
wherein at least a portion of output formatted by the observation and state estimation module is directed to indicate a focused actionable response from a subset of the set of those participating in cybersecurity response; and
wherein at least a portion of output formatted by the observation and state estimation module provides a specifically segmented subset of the available information for delivery to one or more cyberattack response groups having differing roles in the mitigation and recovery process.

US Pat. No. 10,248,909

ASSESSMENT PERFORMANCE PREDICTION

Conduent Business Service...

1. A computer-implemented method for estimating readiness for passing an associated summative assessment, the method comprising: at a server computer, executing instructions for:receiving test results via a network device for at least one diagnostic test administered before the associated summative assessment, wherein each test is coded with information corresponding to at least one concept being assessed by the each test;
generating a score Cn of the at least one concept for each of the tests;
using the score Cn, generated for a first test, computing a probability of mastery p(Mn) of the at least one concept;
associating the probability of mastery p(Mn) as a prior in a database in communication with a controller;
updating the probability of mastery p(Mn) of the at least one concept for at least a second test using the prior and the score ?corresponding to the at least a second test wherein the probability of mastery v(Mn) is computed using the following equation:

wherein p(S) is a probability that the at least one concept is mastered although a guestion corresponding to the at least one concept was incorrectly answered on the each test; and wherein p(G) is a probability that the at least one concept is not mastered although the question corresponding to the at least one concept was correctly answered on the each test: and
providing a user with the probability of mastery p(Mn) at an associated output device.

US Pat. No. 10,248,908

ALTERNATIVE LOOP LIMITS FOR ACCESSING DATA IN MULTI-DIMENSIONAL TENSORS

Google LLC, Mountain Vie...

1. A method performed by a computing system for accessing an N-dimensional tensor, comprising:determining that a number of tensor elements of a particular dimension of the N-dimensional tensor is not an exact multiple of a number of individual computing units of the computing system that will be used to determine memory addresses for the tensor elements and in response:
generating a first loop for controlling a number of iterations of a second loop used to traverse the particular dimension;
determining a first loop bound for the second loop and an alternative loop bound for the second loop based on the number of tensor elements of the particular dimension and the number of individual computing units of the computing system, wherein the first loop bound controls a number of iterations of the second loop for one or more first iterations of the first loop and the alternative loop bound controls the number of iterations of the second loop for a final iteration of the first loop such that the number of iterations of the second loop does not exceed a number of tensor elements for which a memory address will be determined during the final iteration of the first loop; and
generating code that has the second loop nested within the first loop;
executing the code to access the N-dimensional tensor, including:
for each of one or more first iterations of the first loop, performing iterations of the second loop that is nested within the first loop until the first loop bound for the second loop is reached, wherein:
for each iteration of the second loop, a computing unit of a plurality of computing units determines a memory address for a tensor element of the N-dimensional tensor, each tensor element including a data value;
after a penultimate iteration of the first loop has completed, performing one or more iterations of the second loop for a final iteration of the first loop until the alternative loop bound is reached, wherein the alternative loop bound is less than the first loop bound; and
outputting data indicating each determined memory address to a processing unit that accesses tensor elements of the N-dimensional tensor using each determined memory address.

US Pat. No. 10,248,907

RESISTIVE PROCESSING UNIT

INTERNATIONAL BUSINESS MA...

1. A two-terminal resistive processing unit (RPU) comprising:a first terminal;
a second terminal; and
an active region having a resistance;
wherein the RPU represents a neuron in a neural network, and the resistance of the active region represents a weight of the neuron according to a training methodology applied to the neural network;
wherein the active region is configured to change the resistance in a stochastic manner wherein the change in the conduction state comprises a non-linear change based on a first encoded voltage signal applied to the first terminal and a second encoded voltage signal applied to the second terminal; and
wherein the active region is further configured to locally perform a data processing operation of the training methodology using the changed resistance.

US Pat. No. 10,248,906

NEUROMORPHIC CIRCUITS FOR STORING AND GENERATING CONNECTIVITY INFORMATION

Intel Corporation, Santa...

1. A neuromorphic computing system comprising:a synapse core; and
a pre-synaptic neuron, a first post-synaptic neuron, and a second post-synaptic neuron coupled to the synaptic core,
wherein the synapse core is to:
receive a request from the pre-synaptic neuron, and
generate, in response to the request, a first address of the first post-synaptic neuron and a second address of the second post-synaptic neuron, wherein the synapse core is to generate the first address based on a seed number, and
wherein the first address and the second address are not stored in the synapse core prior to receiving the request.

US Pat. No. 10,248,905

SYSTEM FOR TRACKING STUDENTS

1. A system for tracking one or more students throughout a dismissal process comprising:a barcode being assigned to a student;
at least one identification badge having the bar code located thereon and a clip for attaching the at least one identification badge to an object carried by the student;
said at least one identification badge being color coded with a specific color indicating an authorized destination at which the student carrying the at least one identification badge should arrive;
a central online database in communication via a secure server with at least one electronic device possessed by school personnel;
said central online database in communication via the secure server with at least one electronic device possessed by an after school care provider;
said central online database in communication via the secure server with at least one electronic device possessed by a guardian;
the after school care provider being saved as the authorized destination in the central online database;
said bar code being scanned by the at least one electronic device in possession of the school personnel during dismissal of the student from the school to verify that the at least one identification badge provided to the student is heading toward the authorized destination;
said bar code being scanned by the at least one electronic device in possession of the after school care provider;
a determination being made that the at least one identification badge is at the authorized destination;
a time-stamp being created and saved in the central online database; and
said time stamp being sent to the at least one electronic device possessed by the guardian.

US Pat. No. 10,248,903

METHOD FOR CREATING CERAMIC-CONTAINING TRANSACTION CARDS

AMERICAN EXPRESS TRAVEL R...

1. A method of making a transaction card comprising:forming a card body comprising a ceramic material and including a card body aperture, the card body including a primary surface and a first mating surface;
forming a card backer comprising a metallic material and including a secondary surface, a second mating surface, a card backer aperture and a slit extending from the card backer aperture to an exterior edge of the card backer;
coupling together a portion of the first mating surface and a portion of the second mating surface such that the card backer aperture and the card body aperture at least partially overlap;
disposing a fill panel on a portion of the secondary surface of the card backer such that at least a portion of the fill panel is co-extensive with the card backer aperture and completely covers the card body aperture; and
disposing a microchip over the card body aperture and over the card backer aperture such that an unobstructed path exists from at least a portion of the microchip through the card backer aperture and to the fill panel.

US Pat. No. 10,248,902

COUPLING FRAMES FOR RFID DEVICES

1. An RFID device comprising:a transponder chip module (TCM) comprising an RFID chip (IC) and a module antenna (MA); and
a coupling frame (CF) comprising a conductive surface and having an electrical discontinuity comprising a slit (S) or non-conductive stripe (NCS) extending through the surface from an outer edge thereof to an inner position thereof, wherein the coupling frame is disposed so that the slit (S) or non-conductive stripe (NCS) overlaps at least a portion of the module antenna (MA), further comprising a capacitor connected across the slit (S).

US Pat. No. 10,248,901

TWO-PIECE TRANSACTION CARD CONSTRUCTION

Capital One Services, LLC...

1. A transaction card, comprising:a card frame, including:
a first card component;
a second card component, wherein the second card component has a cavity formed therein and is attached to the first card component by an adhesive layer; and
a transaction component disposed between the first card component and the second card component, wherein:
the first card component is separate from the second card component, and the first card component is at least partially insertable into the cavity,
a thickness of the first card component is less than a depth of the cavity such that, when the first card component is inserted into the cavity, a top surface of the first card component sits below flush with a top surface of the second card component, and
a gap is formed around a perimeter of the first card component between a side surface of the first card component and an inner side surface of the cavity.

US Pat. No. 10,248,900

SENSOR ARRAY SYSTEM SELECTIVELY CONFIGURABLE AS A FINGERPRINT SENSOR OR DATA ENTRY DEVICE

IDEX ASA, Fornebu (NO)

1. A system for enrolling a verification template of fingerprint data in a fingerprint-enabled smart card, the system comprising:a non-data-transmitting power source configured to be coupled to the smart card to transmit power to the smart card without transmitting data to or from the smart card, wherein the non-data-transmitting power source comprises a receptacle configured to receive an end of the smart card removably inserted into the receptacle and a power element supported on the receptacle;
a fingerprint sensor comprising one or more sensor elements and associated circuitry for controlling operation of the one or more sensor elements and for processing signals from the one or more sensor elements,
wherein the fingerprint sensor is configured to be installed in the smart card whereby power is transmitted to the fingerprint sensor when the non-data-transmitting power source is coupled to the smart card,
wherein the fingerprint sensor is configured to operate in an enrollment mode when power is transmitted to the fingerprint sensor by the non-data-transmitting power source, and
wherein, when operating in the enrollment mode, the fingerprint sensor is configured to derive and store a verification template of fingerprint data from fingerprint data generated by the one or more sensor elements; and
a finger guide that is removably attachable to the smart card and comprises two or more channels, wherein each channel is configured to position a finger placed thereon to contact the fingerprint sensor at a different orientation.

US Pat. No. 10,248,898

PASSIVE RFID DOOR LOCK

Spectrum Brands, Inc., M...

1. A system comprising:a locking device movable between a locked position and an unlocked position;
a passive radio frequency identification (“RFID”) tag affixed to a housing of the locking device; and
a mobile device comprising a reader, the mobile device configured to:
scan the passive RFID tag;
automatically transmit one or more notifications; and
update a cloud service;
wherein the one or more notifications are automatically transmitted in response to the passive RFID tag being recognized by a software application of the mobile device; and
wherein the cloud service issues one or more additional commands based on the scan of the RFID tag, the one or more additional commands including a command issued from the cloud service to a home automation controller.

US Pat. No. 10,248,897

CONFIGURING A SET OF APPLETS ON A BATTERY-LESS TRANSACTION CARD

Capital One Services, LLC...

1. A transaction card, comprising:one or more memories; and
one or more processors, communicatively coupled to the one or more memories, configured to:
establish a communication with a device;
determine, based on location information associated with the transaction card, that a particular applet is not configured on the transaction card,
the particular applet being associated with completing a transaction with the device;
request the particular applet from another device;
receive, based on the request, the particular applet; and
complete, based on receiving the particular applet, the transaction.

US Pat. No. 10,248,896

DISTRIBUTED CAMERA MODULES SERIALLY COUPLED TO COMMON PREPROCESSING RESOURCES FACILITATING CONFIGURABLE OPTICAL CODE READER PLATFORM FOR APPLICATION-SPECIFIC SCALABILITY

Datalogic USA, Inc., Eug...

1. An optical code reader, comprising:centralized decoding circuitry communicatively couplable to an expandable set of camera modules placed at spaced-apart locations of the optical code reader, a number of and locations for members of the expandable set of camera modules establishing application-specific and scalable read zone coverage formed from multiple fields of view of the members, the centralized decoding circuitry having multiple serial interfaces and a preprocessor-and-processor pair;
a first camera module of the expandable set of camera modules having a first imager and a first serial interface for communicating first image data generated by the first imager according to a first data rate, the first serial interface being integral to the first imager;
a second camera module of the expandable set of camera modules, spaced apart from the first camera module, having a second imager and a second serial interface for communicating second image data generated by the second imager according to the first data rate, the second serial interface being integral to the second imager;
the preprocessor-and-processor pair including a preprocessor providing a serial-to-parallel multiplexer of the pair, a processor providing an optical code decoder of the pair, a first set of serial interfaces of the serial-to-parallel multiplexer, and a second set of parallel interfaces;
the first set of serial interfaces including third and fourth serial interfaces, the third serial interface serially couplable through a first corresponding serial cable to the first serial interface of the first camera module, and the fourth serial interface serially couplable through a second corresponding serial cable to the second serial interface of the second camera module; and
the second set of parallel interfaces including a first parallel interface of the serial-to-parallel multiplexer and a second parallel interface of the optical code decoder, the first and second parallel interfaces communicatively coupled to each other for communicating, at a second data rate different from the first data rate, multiplexed image data generated from the first and second image data by the serial-to-parallel multiplexer for conveying the multiplexed image data to the optical code decoder and thereby facilitating an attempt of the optical code decoder to decode an optical code borne by an item present within the read zone coverage and represented in one or both of the first and second image data.

US Pat. No. 10,248,894

RASTER PIXEL OBJECT IDENTIFICATION MECHANISM

Ricoh Company, Ltd., Tok...

1. A non-transitory machine-readable medium including data that, when accessed by a machine, causes the machine to perform operations comprising:receiving print job data;
performing a rasterization to transform the print job data into a sheetside bitmap having raster bit plane data for each of a plurality of colorants of a device color space, including,
identifying a colorant object type for each colorant of the plurality of colorants corresponding to a pixel, wherein a number of the identified colorant object types is greater than one;
generating object identification (ID) data for the pixel based on a first of the identified colorant object types; and
storing the object ID data in a common buffer;
performing post rasterization processing on the raster bit plane data for each of the plurality of colorants of the pixel using the object ID data; and
transmitting the sheetside bitmap to be printed by a printer.

US Pat. No. 10,248,893

PRINT CONTROL DEVICE FOR TRACKING PRINTING INFORMATION AND METHOD FOR PERFORMING THE SAME

Seiko Epson Corporation, ...

1. A print control device, comprising:a processor configured to acquire print image data from a plurality of storage devices according to a print request and to cause a printer which performs printing based on the print image data to perform the printing,
wherein the processor
acquires operation status information of the storage device storing the print image data, attribute information of the print image data stored in the storage device, and access success/failure information,
enables the operation status information, the attribute information, and a success ratio of access per the storage device based on the access success/failure information to be displayed on a display, and
if one or more pieces of print image data cannot be acquired, displays a choice of whether to perform the printing while excluding the one or more pieces of print image data that cannot be acquired.

US Pat. No. 10,248,892

WEB PROCESSING SYSTEM AND METHOD FOR PROCESSING A BASE WEB

TEXTILMA AG, Stansstaad ...

1. A radio-frequency identification (RFID) label processing system for a base web, the system comprising:a conveyor device configured to feed a base web along a predetermined conveyor path, the base web comprising a sequence of processing segments, each processing segment forming an RFID label;
at least two processing modules arranged adjacent to the conveyor path, the processing modules being spaced apart by a variable distance;
at least one sensor module configured to determine the position of the processing segments on the base web along the predetermined conveyor path and to output a segment position signal; and
a positioning module coupled to at least one of the processing modules and the sensor module, the positioning module being configured to displace the at least one of the processing modules along the predetermined conveyor path depending on the value of the segment position signal.

US Pat. No. 10,248,891

IMAGE PREDICTION

1. A method comprising:receiving, by an image prediction system comprising a processor, a training data set comprising a plurality of training images;
defining, by the image prediction system, N-dimensional feature vectors corresponding to the plurality of training images in the training data set;
parameterizing, by the image prediction system, the N-dimensional feature vectors to obtain a plurality of parameterized curves corresponding to the plurality of training images in the training data set;
obtaining, by the image prediction system, a square root velocity representation for each parameterized curve of the plurality of parameterized curves;
rescaling, by the image prediction system, the plurality of parameterized curves to remove scaling variability among the plurality of parameterized curves
defining, by the image prediction system, a pre-shape space for the plurality of parameterized curves; and
obtaining, by the image prediction system, shape space points pertaining to each parameterized curve of the plurality of parameterized curves on a shape space that inherits a structure from the pre-shape space.

US Pat. No. 10,248,890

PANORAMIC CAMERA SYSTEMS

Facebook, Inc., Menlo Pa...

1. A method comprising:identifying positioning information for each camera in a set of cameras, each camera having a position with respect to an image capture system, an orientation, and an angle of view;
determining a semi-random set of test points external to the image capture system;
initializing a plurality of candidate camera orientation configurations, each camera orientation configuration comprising an orientation of each of the cameras in the set of cameras, each orientation determining a field of view of an environment for the camera based on the camera angle of view and position;
for each of the candidate camera orientation configurations:
determining, for each test point of the set of test points, a number of cameras that view the test point in the camera field of view based on the angle of view, position, and orientation of each camera in the candidate camera orientation configuration;
determining a minimum number of cameras that view any test point in the camera field of view based on the number of cameras that view the test points in set of test points;
calculating, for the candidate camera orientation configuration, a coverage score based on the minimum number of cameras that view any test point; and
modifying the orientation of one or more of the cameras in the candidate camera orientation configuration to improve the coverage score for the candidate camera orientation configuration;
evaluating each of the camera orientation configurations based on a second set of evenly distributed test points;
selecting a camera orientation configuration from the set of candidate camera orientation configurations based on the evaluating; and
orienting one or more cameras of the set of cameras based on the selected camera orientation configuration.

US Pat. No. 10,248,889

ORGANIZING IMAGES ASSOCIATED WITH A USER

Google LLC, Mountain Vie...

1. A computer-implemented method comprising:identifying images associated with a user, wherein at least one of the images includes a first person;
for each of the images:
identifying one or more objects in the image; and
for each of the one or more objects, determining labels, wherein the labels are based on at least one of metadata or a primary annotation and at least one of the labels indicates that a corresponding image includes the first person;
determining, based on the labels, that the first person is identified as being present in at least a threshold number of the images associated with the user; and
responsive to determining that the first person is identified as being present in at least the threshold number of the images associated with the user, providing a user interface that includes graphical data that displays an image of the first person and a prompt for the user to provide identification information for the first person.

US Pat. No. 10,248,888

CLASSIFYING METHOD, STORAGE MEDIUM, INSPECTION METHOD, AND INSPECTION APPARATUS

CANON KABUSHIKI KAISHA, ...

1. A classifying method of classifying an article into one of a plurality of groups based on an evaluation value for an image of the article, the method comprising:a determining step of determining an evaluation method for obtaining the evaluation value based on sample images, which are images of a plurality of samples each of which has already been classified into one of the plurality of groups;
a first obtaining step of obtaining evaluation values for the sample images by the determined evaluation method;
a first changing step of changing a group for a sample with a sample image having a singular evaluation value for the group;
a second changing step of changing the evaluation method based on the sample images, each of which is being classified into one of the plurality of groups after changing the group; and
a second obtaining step of obtaining the evaluation value for the image of the article using the changed evaluation method, and classifying the article into one of the plurality of groups based on the obtained evaluation value for the image of the article.

US Pat. No. 10,248,887

OBJECT TRACKING DEVICE AND METHOD

SONY CORPORATION, Tokyo ...

1. An object tracking device including a processor and a memory, wherein the processor includes:an image preprocessing module that normalizes a background area of an input image to obtain a normalized image with a background area of a fixed size;
a super-pixel matching module that converts the normalized image into a super-pixel image by a super-pixel arithmetic, and matches the super-pixel image with a reference super-pixel area for a matching area in super-pixel image which has high degree similarity of super-pixel colors with the reference super-pixel area; and
a background masking module that masks the super-pixel image having the matching area to mask a super-pixel masked image at the background area which is outside the matching area.

US Pat. No. 10,248,886

SYSTEM AND METHOD FOR UNDERWATER DISTANCE MEASUREMENT

PGS Geophysical AS, Oslo...

1. A method comprising:obtaining, at an underwater imaging device, a stream of images of geophysical surveying equipment, wherein the geophysical surveying equipment includes a target pattern, the target pattern having a calibrated image size;
tracking the geophysical surveying equipment using the image stream and the target pattern;
capturing from the image stream, an image from the stream of images of the geophysical surveying equipment, wherein the image comprises an image of the target pattern having an apparent size; and
determining, using a single image captured from the image stream, a distance between the underwater imaging device and the geophysical surveying equipment, the determining based on the calibrated image size and the apparent size of the target pattern in the single image.

US Pat. No. 10,248,885

METHOD FOR ENCODING OF ANATOMIC CURVES

James R. Glidewell Dental...

1. A method for automatic generation of a design proposal for a dental restoration prosthesis to be used as a tooth restoration for a patient comprising the steps of:in a computing system,
a. identifying and sampling a characteristic curve of a tooth preparation of the patient to be restored with the dental restoration prosthesis, at a plurality of sample points;
b. encoding the characteristic curve of the tooth preparation of the patient as a string by a curve encoding process;
c. searching a database of cases of previously completed tooth restoration designs, each case having
i. a dental restoration prosthesis design, and
ii. a string encoding a characteristic curve of the dental restoration prosthesis design,
d. measuring similarities and defining a plurality of string similarity measures between the string of the tooth preparation and the strings of the database;
e. obtaining one of the dental restoration prosthesis designs as the design proposal for the dental restoration prosthesis for the tooth preparation based on the string similarity measures; and
f. using the design proposal as a design for the dental restoration prosthesis.

US Pat. No. 10,248,884

SYSTEMS AND METHODS FOR PROVIDING AN IMAGE CLASSIFIER

Linear Algebra Technologi...

1. A computing device for image classification comprising:a memory including:
a non-rectangular foreground silhouette generated based on a set of training images, and
a non-rectangular bitmap that identifies a subset of cells of a rectangular detection window, the rectangular detection window having a cell width and cell height;
a hardware accelerator to:
identify a portion of an image to be classified based on the non-rectangular foreground silhouette,
identify a cell within the portion of the image to be classified that match the subset of the cells of the non-rectangular bitmap, the portion having the cell width and the cell height,
generate and store a histogram of orientations of pixels within the cell that matches the subset of cells, and
determine a cell block having a plurality of contiguous identified cells from the image; and
a processor to:
generate, for the cell block, a descriptor including at least a portion of the histogram, and
evaluate the descriptor against the set of training images to selectively identify the portion of the image as including a class of object associated with at least one of the training images.

US Pat. No. 10,248,883

PHOTOGRAPH-BASED ASSESSMENT OF DENTAL TREATMENTS AND PROCEDURES

Align Technology, Inc., ...

1. A dental-treatment monitoring system comprising:one or more processors;
one or more electronic memories that store instructions and data;
one or more mass-storage devices that store encoded images and patient information;
a communications subsystem through which the dental-treatment monitoring system receives images and information from remote computer systems; and
computer instructions, encoded in one or more of the one or more electronic memories, that control the dental-treatment monitoring system to store, in one or more data-storage devices selected from among the one or more electronic memories and one or more mass-storage devices, a three-dimensional model of a patient's teeth, receive, through the communications subsystem, one or more two-dimensional digital photographs of the patient's teeth taken at a time t during the course of a dental treatment, project, in time, the three-dimensional model of the patient's teeth to the time t to generate and store a time-projected three-dimensional model of the patient's teeth representing an expected configuration of the patient's teeth, compare one or more of the one or more two-dimensional digital photographs to corresponding two-dimensional digital images generated from the time-projected three-dimensional model of the patient's teeth to generate one or more comparison values and generate, from the received one or more two-dimensional digital photographs, a set of one or more processed images with associated metadata for analysis, determine, for each image in the set of one or more processed images, a set of virtual-camera parameters that describe the position, and orientation for a virtual camera that produces a generated image from the time-projected three-dimensional model of the patient's teeth equivalent to the image in the set of one or more processed images, use, for each image in the set of one or more processed images, the standard type of view and additional metadata to generate an initial set of virtual-camera parameters for the image in the set of one or more processed images, use the standard type of view and additional metadata to determine a value for an iteration variable; carry out a number of optimization iterations equal to the value of the iteration variable; and finally refine the virtual-camera parameters for the image in the set of one or more processed images, generate, for each image in the set of one or more processed images, a generated image corresponding to the image from the time-projected three-dimensional model of the patient's teeth and the virtual-camera parameters determined for the image in the set of one or more processed images, and compare each image in the set of one or more processed images with the corresponding generated image to generate the one or more comparison values for the image in the set of one or more processed images, determine, from the one or more comparison values, whether or not a configuration of the patient's teeth is within a threshold level of correspondence to the expected configuration of the patient's teeth, and store an indication of the determination in one of the one or more electronic memories.

US Pat. No. 10,248,881

INFORMATION PROCESSING DEVICE AND RECOGNITION SUPPORT METHOD

NEC Corporation, Tokyo (...

1. An information processing device comprising:at least one processor configured to:
detect a marker from an image captured by an imaging device, the marker being disposed at an arbitrary place within a target area to be recognized, the imaging device capturing an object located within the target area; and
acquire recognition environment information based on image information of the marker itself described in the detected marker, the recognition environment information representing an appearance as an image of a target object to be recognized at the arbitrary place where the marker disposed when the target object locates within the target area and is captured by the imaging device.

US Pat. No. 10,248,880

METHOD OF PROCESSING AND RECOGNIZING HAND-WRITTEN CHARACTERS

Boston Inventions, LLC, ...

1. A method of recognizing and processing hand-written strokes and characters, the method comprising:receiving a plurality of strokes provided by using a writing utensil on an input recognition interface;
recognizing the plurality of strokes provided on the input recognition interface utilizing processing circuitry;
differentiating between a plurality of input methods including at least a tactile touch input and input received by the writing utensil;
determining a stroke box around each stroke;
providing a stroke margin around each of the stroke boxes;
determining an overlap between the stroke margins for each stroke box;
correlating any overlapping stroke margins to one or more characters;
providing a character box around each of the one or more characters;
providing a character margin around each of the one or more character boxes;
determining overlap between the character margins for each character box;
correlating overlapping character margins to one or more words; and
storing stroke and character information on a non-transitory computer-readable medium;
providing a word box around each of the one or more words;
providing a word margin around each of the one or more word boxes;
determining an overlap between the word margins for each word box;
correlating overlapping word margins to one or more lines;
determining a line box correlating to the vertical and horizontal bounds of each line;
determining a reference line for each line box;
determining an offset of each word with respect to the reference line;
calculating an average character spacing and average word spacing;
selecting an individual character or word;
repositioning the individual character word within an associated word or reference line;
wherein one or more surrounding characters or words are configured to be automatically repositioned along the reference line to allow for repositioning of the individual character word in accordance with the average character or word spacing on the reference line having a proper associated offset with respect to the reference line;
wherein input from the writing utensil is associated with a positive stroke, and touch input is associated with an alternative command; wherein at least one alternative command is an undo command regarding at least one previous stroke,
receiving, from the writing utensil, a positive inference stroke connecting a plurality of separated strokes; and
receiving a touch input so as to delete the positive inference stroke, wherein the processing circuitry causes the non-transitory computer-readable media to retain inference information between the strokes so as to recognize the separated strokes as an associated character, word, or line.

US Pat. No. 10,248,879

ITEM TRACKING USING A DYNAMIC REGION OF INTEREST

United States Postal Serv...

1. A system for sorting an item comprising:a primary camera having a field of view comprising a portion of a defined physical area, the primary camera in communication with a central unit, and where the primary camera is configured to identify an item within the defined physical area;
a plurality of secondary cameras in communication with the central unit, each of the plurality of secondary cameras having a field of view comprising a section of the defined physical area; and
wherein the central unit comprises one or more processors configured to:
determine spatial coordinates of a region of interest located on the item within a defined physical area, based on image data received by the primary camera;
identify one or more of the plurality of secondary cameras having a field of view including the determined spatial coordinates;
and cause the identified one or more of the plurality of secondary cameras to capture an image of the region of interest.

US Pat. No. 10,248,878

CHARACTER INPUT METHOD AND SYSTEM AS WELL AS ELECTRONIC DEVICE AND KEYBOARD THEREOF

INTSIG INFORMATION CO., L...

1. A character input method comprising the following steps:step A, inputting a text through an electronic device;
step B, electing a photography input procedure and starting a photographing device during text input on the electronic device;
step C, imaging a text image with the photographing device;
step D, recognizing pointed text in the text image and converting the pointed text into a character text through an optical character recognition module; and
Step E, inputting the converted character text into a current text in process, or inputting modified character text into the current text in process after some modifications;
wherein the photographing device takes the text image, the display unit of the electronic device displays a preview box of the photographing device, wherein the preview box comprises characters to be input;
wherein the optical character recognition module recognizes the pointed text image in the preview box;
wherein the preview box comprises a mark of character direction for marking the direction of characters;
wherein the step C also includes changing the character direction to be a horizontal character layout or a vertical character layout during text input; and
wherein the optical character recognition module recognizes the characters according to the changed character direction.

US Pat. No. 10,248,877

ILLUMINATION DEVICE AND BIOMETRIC AUTHENTICATION APPARATUS

FUJITSU LIMITED, Kawasak...

1. An illumination device comprising:a light source including a plurality of light emitting elements provided on a surface of a substrate and configured to emit light; and
a diffraction optical element having a plurality of diffraction gratings and configured to diffract the light from the light source into illumination light that illuminates an illuminated region of an illuminated target,
wherein each of the plurality of light emitting elements emits light that irradiates two or more diffraction gratings among the plurality of diffraction gratings of the diffraction optical element,
wherein the plurality of light emitting elements are grouped into a plurality of light emitting element groups including at least one light emitting element group that includes two or more light emitting elements,
wherein each of the plurality of diffraction gratings diffracts the light emitted from each of the plurality of light emitting element groups to a corresponding one of a plurality of irradiated regions that are aligned to overlap a position of the illuminated region and are combined to form the illuminated region,
wherein the plurality of irradiated regions have mutually different shapes and sizes, and a shape and a size of the plurality of irradiated regions in an overlapped state are identical to those of the illuminated region, and
wherein the illuminated region is larger than an area occupied by the diffraction optical element and the light source in a top view of the illumination device viewed from above the surface of the substrate, and the area is parallel to the surface of the substrate.

US Pat. No. 10,248,876

METHOD AND APPARATUS FOR AVOIDING NON-ALIGNED LOADS USING MULTIPLE COPIES OF INPUT DATA

Texas Instruments Incorpo...

1. A method of determining a summation of pixel characteristics for a rectangular region of a digital image for object detection, the method comprising:determining, by a digital signal processor (DSP) of an electronic assembly, whether a first base address for a first data element in an integral image buffer is aligned for a first single instruction multiple data (SIMD) operation by the DSP, wherein the first data element represents a first corner of a pre-selected rectangular region of an integral image, wherein the integral image is a representation of a pre-selected digital image, and wherein the integral image is formed by data elements stored in the integral image buffer on a storage device;
loading the first data element from the integral image buffer, to the DSP, in response to determining that the first base address is aligned for the first SIMD operation; and
loading an offset first data element of an offset integral image from an offset integral buffer on the storage device, to the DSP, in response to determining that the first base address is non-aligned for the first SIMD operation, wherein the offset first data element represents the first corner of the pre-selected rectangular region; and
wherein the offset first data element of the offset integral image is defined by corresponding data elements of the integral image and stored at address locations in the offset integral buffer that are offset by one address location such that a select data element in the integral image buffer at a select address that is non-aligned for a select SIMD operation by the DSP is located at a select offset address in the offset integral buffer that is aligned for the select SIMD operation.

US Pat. No. 10,248,875

METHOD FOR AUTOMATICALLY DETECTING AND REPAIRING BIOMETRIC CROSSLINKS

AWARE INC., Bedford, MA ...

1. A method of repairing cross-linked biometric records to reduce a number of incorrect fields associated with an individual, the individual capable of having multiple records, comprising:receiving a set of biometric records, each biometric record containing at least one biometric sample in a non-textual modality stored in a field, one or more of the biometric records in the set of biometric records being a cross-linked biometric record having at least two biometric samples that are associated with different individuals;
performing cross-link resolution on the set of biometric records to reduce a number of incorrect biometric samples contained in record fields by searching for a match between a biometric sample, stored in a field of a first record, and a corresponding field in each of the other biometric records in the set of biometric records and, based on a matching threshold, declaring whether a match exists;
performing, based on a number of matches, an action to reduce the number of incorrect fields, the action including removing one of the matching biometric samples from one of the first biometric record and a second biometric record and adding the removed biometric sample to the other of the first and second biometric records; and
outputting at least one repaired biometric record.

US Pat. No. 10,248,874

BRAKE LIGHT DETECTION

FORD GLOBAL TECHNOLOGIES,...

1. A method comprising:selecting a night mode or a day mode based on a pixel brightness in an image frame; detecting an image region corresponding to a vehicle based on range sensor data when in the night mode or based on camera image data when in the day mode;
converting the range sensor data into luminosity and two-color channel (LAB) color space when in the night mode;
converting the camera image data into hue, saturation, and value (HSV) color space when in the day mode;
determining at least one region of interest within the image region corresponding to a brake light of the vehicle based on the converted range sensor data or the converted camera image data;
classifying the brake light of the vehicle as on or off based on the at least one region of interest to generate a brake light classification; and executing a driving maneuver based on the brake light classification.

US Pat. No. 10,248,873

APPARATUS FOR PRESENTING RESULT OF RECOGNIZING RECOGNITION TARGET

PANASONIC INTELLECTUAL PR...

1. An apparatus comprising:a processor; and
a memory storing thereon a computer program, which when executed by the processor, causes the processor to perform operations including:
detecting a recognition target present within a predetermined range from an autonomous moving body which includes the apparatus; and
emitting, via an emitter on the autonomous moving body, a light to the detected recognition target to alert the recognition target that the autonomous moving body recognizes the recognition target after the recognition target's presence is detected.

US Pat. No. 10,248,872

ESTIMATION OF TIME TO COLLISION IN A COMPUTER VISION SYSTEM

TEXAS INSTRUMENTS INCORPO...

1. A method for estimating time to collision (TTC) of a detected object in a computer vision system, the method comprising:determining a three dimensional (3D) position of a camera in the computer vision system;
determining a 3D position of the detected object based on a 2D position of the detected object in an image captured by the camera and an estimated ground plane corresponding to the image;
computing a relative 3D position of the camera, a velocity of the relative 3D position, and an acceleration of the relative 3D position based on the 3D position of the camera and the 3D position of the detected object, wherein the relative 3D position of the camera is relative to the 3D position of the detected object; and
computing the TTC of the detected object based on the relative 3D position, the velocity of the relative 3D position, and the acceleration of the relative 3D position.

US Pat. No. 10,248,871

AUTONOMOUS LANE DETECTION

QUALCOMM Incorporated, S...

1. A method of lane detection for a vehicle, comprising:receiving, via a wireless receiver of the vehicle, a signal from a first device;
determining, by a processor disposed within the vehicle and in communication with the wireless receiver, a time of the vehicle passing the first device at which a path of the received signal is approximately orthogonal to a direction of travel of the vehicle based on a comparison of a measured received frequency of the received signal to a source frequency of the received signal and to one or more thresholds;
determining, by the processor disposed within the vehicle and in communication with the wireless receiver, a distance from the vehicle to the first device based on at least one of a time of arrival (“TOA”) or a round trip time (“RTT”) of the received signal at or near the determined time of the vehicle passing the first device at which the path of the received signal is approximately orthogonal to the direction of travel of the vehicle; and
determining, by the processor disposed within the vehicle and in communication with the wireless receiver, a lane in which the vehicle is operating based on the determined distance and a lane map.

US Pat. No. 10,248,870

TRAFFIC-COUNTING SYSTEM AND METHOD THEREOF

SHANGHAI XIAOYI TECHNOLOG...

1. A traffic-counting method performed by a processor in communication with an imaging device, comprising:in a view of traffic comprising moving objects, identifying first and second regions of interest (ROIs);
obtaining, from the imaging device, first and second image data respectively representing the first and second ROIs;
analyzing the first and second image data over time; and
based on the analyses of the first and second image data:
counting the moving objects; and
determining moving directions of the moving objects,
wherein the counting and determining comprise:
detecting that a first foreground begins to appear in the first ROI:
when detecting that a second foreground begins to appear in the second ROI within a first amount of time after the first foreground begins to appear, determining whether a color of the first foreground is consistent with a color of the second foreground; and
when it is determined that the colors of the first and second foregrounds are consistent, concluding that one or more moving objects are moving from the first ROI to the second ROI.

US Pat. No. 10,248,869

SCENE PRESET IDENTIFICATION USING QUADTREE DECOMPOSITION ANALYSIS

Omni AI, Inc., Houston, ...

1. A computer-implemented method for identifying a scene preset for a background scene depicted in an image, comprising:receiving the background scene;
generating a quadtree decomposition of the background scene, the quadtree decomposition including a plurality of window portions of the background scene;
determining that a first window portion of the quadtree decomposition of the background scene is one of over-saturated or under-saturated;
discarding the first window portion of the quadtree decomposition of the background scene;
determining if the background scene matches a stored scene preset representing a previously captured background scene, based on the plurality of window portions of the background scene;
updating the stored scene preset when the background scene matches the stored scene preset that represents the previously captured background scene; and
creating a new scene preset when the background scene does not match the stored scene preset that represents the previously captured background scene.

US Pat. No. 10,248,868

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM

NEC CORPORATION, Tokyo (...

1. An information processing apparatus comprising:a memory configured to store:
a type of object to be extracted from a captured video, the type of object being associated with a predetermined event, which is sensed as a trigger to generate query information,
time difference information which designates a time period of video data at least one of before and after the event occurred for which the type of object is to be detected, the time difference information being associated with a type of the event such that the time period varies based on the type of event, and
program instructions;
one or more processors configured to read the program instructions to execute:
a sensor configured to analyze the captured video and senses whether the event occurred,
a designator configured to designate the video data, from which the type of object is to be detected, based on the time difference information and the time the event has occurred,
a detector configured to detect the type of the object from the designated video data, and
a generator configured to generate a feature of the detected object as the query information.

US Pat. No. 10,248,867

SYSTEMS AND METHODS FOR PROVIDING PLAYBACK OF SELECTED VIDEO SEGMENTS

Facebook, Inc., Menlo Pa...

11. A system comprising:at least one processor; and
a memory storing instructions that, when executed by the at least one processor, cause the system to perform:
selecting a subset of video segments out of a set of video segments representing a video, based on an analysis of one or more objects represented in each video segment in the set of video segments; and
generating a list that indicates a playback sequence for the subset of video segments, wherein playback of the subset of video segments is based on the playback sequence indicated via the list.

US Pat. No. 10,248,866

SYSTEMS AND METHODS FOR IDENTIFYING VIDEO HIGHLIGHTS BASED ON AUDIO

GoPro, Inc., San Mateo, ...

1. A system that identifies video highlights based on audio, the system comprising:one or more physical processors configured by machine-readable instructions to:
obtain video information defining spherical video content, the spherical video content having a progress length, the spherical video content defining visual content viewable from a point of view as a function of progress through the progress length of the spherical video content;
obtain audio information defining audio content, the audio content captured during capture of the spherical video content, the audio information characterizing one or more directions of sounds within the audio content;
identify an audio event within the audio content, the audio event indicating an occurrence of a highlight event based on one or more of the sounds within the audio content, the audio event occurring at an audio event moment within the progress length, the one or more of the sounds originating from one or more audio sources captured within an audio event extent within the spherical video content at the audio event moment, the audio event extent characterized by an audio viewing direction and an audio viewing size;
determine a temporal type of the audio event, the temporal type providing guidance with respect to relative temporality of the highlight event with respect to the audio event;
determine a spatial type of the audio event, the spatial type providing guidance with respect to relative spatiality of the highlight event with respect to the audio event;
identify a highlight event moment of the highlight event based on the audio event moment and the temporal type of the audio event, the highlight event occurring at the highlight event moment within the progress length;
identify a highlight event extent of the highlight event based on the audio event extent and the spatial type of the audio event, the highlight event extent characterized by a highlight viewing direction and a highlight viewing size, the highlight event captured within the highlight event extent within the spherical video content at the highlight event moment; and
effectuate storage of the identification of the highlight event moment and the identification of the highlight event extent in a storage medium.

US Pat. No. 10,248,865

IDENTIFYING PRESENTATION STYLES OF EDUCATIONAL VIDEOS

MICROSOFT TECHNOLOGY LICE...

1. A system for training a video presentation style classifier, comprising:one or more computing devices, said computing devices being in communication with each other via a computer network whenever there is a plurality of computing devices; and
a computer program having program modules executable by the one or more computing devices, the one or more computing devices being directed by the program modules of the computer program to;
receive a training dataset comprising a plurality of videos each of which is labeled with a presentation style identifier specifying the presentation style that is predominately employed in the video, said specified presentation style being a one of the presentation styles in a set of possible presentation styles;
use the training dataset to independently learn a different classifier for each possible unordered pair of presentation styles in the set of possible presentation styles; and
combine the different classifiers using probabilistic fusion, said combination producing the video presentation style classifier.

US Pat. No. 10,248,864

SYSTEMS AND METHODS FOR CONTEXTUAL VIDEO SHOT AGGREGATION

Disney Enterprises, Inc.,...

1. A system comprising:a memory storing an executable code; and
a hardware processor executing the executable code to:
receive a video having a plurality of video shots;
create a plurality of video shot groups based on feature distances between the plurality of video shots, wherein each video shot group of the plurality of video shot groups includes one or more of the plurality of video shots and has different ones of the plurality of video shots than other video shot groups;
create at least one video supergroup including at least one video shot group of the plurality of video shot groups by using a cluster algorithm on the plurality of video shot groups;
divide the at least one video supergroup into a plurality of connected video supergroups, each connected video supergroup of the plurality of connected video supergroups including one or more of the plurality of video shot groups based on interactions among the one or more of plurality of video shots in each of the plurality of video shot groups;
identify one of the plurality of connected video supergroups as an anchor video subgroup based on (a) a screen time of the one of the plurality of connected video supergroups, and (b) an amount of time between a first appearance and a last appearance of the video shots of the one of the plurality of connected video supergroups, wherein the anchor video subgroup includes video shots that are not temporally adjacent; and
assign a category to the video based on the anchor video subgroup of the plurality of connected video supergroups.

US Pat. No. 10,248,863

AUGEMENTED VIDEO ANALYTICS FOR TESTING INTERNET OF THINGS (IOT) DEVICES

International Business Ma...

1. A method of testing a device in an Internet of Things, the method comprising the steps of:a computer receiving first data items indicating visually perceptible physical output of the device during a testing of the device, the first data items being captured on a video by a video camera surveilling the device during the testing, and the video camera being coupled to the computer;
the computer receiving second data items indicating non-visually perceptible physical output of the device during the testing;
the computer receiving an event log from a beacon continuously streamed by the device, the event log generated by an instrumented application being executed in the device;
the computer receiving indications of interactions of one or more humans with the device that occur during the testing, the interactions captured by (1) a wearable device operated by a human during the testing or (2) a sensor that is coupled to the device and that senses the interactions;
based on the first data items indicating visually perceptible physical output, the second data items indicating non-visually perceptible physical output, the event log, and the indications of the interactions, the computer overlaying the first data items, the second data items, entries included in the event log, and the indications of the interactions onto respective frames of the video that include the device, so that timings of the frames are correlated with timestamps of (1) the first data items, (2) the second data items, (3) the entries from the event log, and (4) the indications of the interactions;
based on the video having the overlaid first data items, second data items, entries included in the event log, and the indications of the interactions, the computer detecting performance, functionality, and usability issues and generating respective markers of the issues;
the computer indexing the video with the markers by overlaying the markers on a timeline of the video; and
in response to a selection of one of the markers by a user which indicates an issue included in the issues, the computer locating and displaying a frame of the video that depicts the issue.

US Pat. No. 10,248,862

USE OF CAMERA METADATA FOR RECOMMENDATIONS

eBay Inc., San Jose, CA ...

1. A system comprising:one or more hardware processors, configured to:
receive an image file having image data including camera metadata, the camera metadata indicating a location at which the image file was captured;
analyze the location to determine improvements to image capture aspects associated with the image file;
determine a time of day at which the image file was captured based on the camera metadata; and
determine a position of the sun at the time of day and at the location indicated by the camera metadata; and
generate feedback based on both the camera metadata from the image file, the position of the sun determined based on the time of day and location that were determined based on the camera metadata, and use information that indicates a purpose for which the image file was captured.

US Pat. No. 10,248,861

SYSTEM FOR IDENTIFYING AN UNMANNED MOVING OBJECT

PRODRONE CO., LTD., Nago...

1. A system for identifying an unmanned moving object, the system comprising:a mobile terminal including a camera, a GPS sensor, and a gravity sensor;
an unmanned moving object;
a management server including a database storing specific information including possessor information of the unmanned moving object and a flight plan, the flight plan including positional information and time information of the unmanned moving object; and
a communication network enabling communication between the mobile terminal and the management server,
wherein the mobile terminal is configured to:
acquire the positional information and time information of the unmanned moving object by the GPS sensor and the gravity sensor upon a user of the mobile terminal tracking the unmanned moving object using the camera;
check the acquired positional information and the acquired time information for a match with the flight plan on the management server and acquire specific information of the unmanned moving object; and
display the possessor information of the unmanned moving object using the acquired specific information.

US Pat. No. 10,248,860

SYSTEM AND METHOD FOR OBJECT RE-IDENTIFICATION

CANON KABUSHIKI KAISHA, ...

1. A method of identifying, with a camera, an object in an image of a scene, the method comprising the steps of:obtaining relative orientation of a candidate object to the camera;
selecting at least one of a plurality of attributes of the candidate object in accordance with the obtained relative orientation of the candidate object;
determining one of a head, an upper body, legs, and a whole body as a region of interest, the determined region of interest including the selected attribute;
operating a set of at least one of pan, tilt, and zoom corresponding to the determined region of interest so as to observe the selected attribute, and
identifying an object based on the result of the observation of the selected attribute.

US Pat. No. 10,248,859

VIEW FINDER APPARATUS AND METHOD OF OPERATING THE SAME

SAMSUNG ELECTRONICS CO., ...

1. A viewfinder apparatus comprising:a window on which first and second reference marks are disposed;
a movable eye imaging camera configured to photograph at least one eye of a user via the window; and
a controller configured to detect a current position of the eye imaging camera, based on a first distance between the first reference mark and the second reference mark in a first image captured by the eye imaging camera when the eye imaging camera is at a first position different from the current position and a second distance between the first reference mark and the second reference mark in a second image captured by the eye imaging camera when the eye imaging camera is at the current position; and track the eye of the user based on the detected current position of the eye imaging camera.

US Pat. No. 10,248,857

SYSTEM AND METHOD FOR DETECTING AND ANNOTATING BOLD TEXT IN AN IMAGE DOCUMENT

Wipro Limited, Bangalore...

1. A method for annotating bold text in image documents, the method implemented by a bold text detection and annotation computing device and comprising:processing an image document to derive a digitized textual image;
applying an adaptive edge rounding filter to the digitized textual image to generate a filter image comprising one or more edge rounded structures corresponding to one or more regions of interest within the digitized textual image, wherein applying the adaptive edge rounding filter comprises:
determining a plurality of characters in the digitized textual image;
determining, for each of the plurality of characters, a height of a character, a radius for the character based on a dots per inch (dpi) of the image document and the height of the character;
determining, for each of a plurality of pixels in the character, a plurality of subpixels within the radius of a pixel and a dominant pixel type among the plurality of subpixels; and
setting the pixel to the dominant pixel type;
determining one or more regions of bold text from the one or more regions of interest in the filter image; and
annotating the one or more regions of bold text within the image document.

US Pat. No. 10,248,856

SMART NECKLACE WITH STEREO VISION AND ONBOARD PROCESSING

1. A wearable neck device for providing optical character or image recognition information to a user, comprising:a band having a left portion, a right portion, and a central portion connecting the left portion and the right portion;
an inertial measurement unit (IMU) that is configured to detect IMU data including a body posture of the user;
at least one camera connected to the band, having a field of view, and configured to detect image data corresponding to a surrounding environment of the user;
a memory storing optical character or image recognition processing data corresponding to an algorithm or a set of instructions for identifying characters or images of documents;
a processor connected to the IMU, the memory and the at least one camera, and configured to:
determine, using the image data, a location of the user,
determine, using the IMU data, the body posture of the user,
detect, using the image data, a plurality of documents in the surrounding environment of the user based on the location of the user,
determine, using the image data and IMU data, that the plurality of documents are of interest to the user based on the determined location and the determined body posture of the user relative to a location of the plurality of documents in the surrounding environment of the user, and in response:
recognize a document that is among the plurality of documents that are of interest and in the surrounding environment of the user,
provide a description of the document that identifies the document to the user,
receive a user selection of the document that is among the plurality of documents that are of interest and in the surrounding environment of the user in response to providing the description of the document to the user,
select the document that is among the plurality of documents in the surrounding environment based on the user selection,
adjust the field of view of the at least one camera such that the document is within the adjusted field of view,
recognize, using the optical character or image recognition processing data, at least one of a character or an image of the document, and
determine output data based on the at least one of the character or the image of the document; and
a speaker configured to provide audio information to the user based on the output data.

US Pat. No. 10,248,854

HAND MOTION IDENTIFICATION METHOD AND APPARATUS

BEIJING UNIVERSITY OF POS...

1. A hand motion identification method, comprising:a computing device having one or more processors and a memory storing programs executed by the one or more processors;
obtaining a to-be-identified video;
performing area localization and tracking of a hand for the to-be-identified video;
extracting a red-green-blue (RGB) video and a depth information video of the located and tracked hand;
detecting the RGB video and the depth information video of the hand to obtain a feature point;
representing, by using a 3D Mesh motion scale-invariant feature transform (MoSIFT) feature descriptor, the feature point; and
comparing the 3D Mesh MoSIFT feature descriptor of the feature point with 3D Mesh MoSIFT feature descriptors in positive samples obtained through beforehand training, to obtain a hand motion category in the to-be-identified video,
wherein comparing the 3D Mesh MoSIFT feature descriptor of the feature point with 3D Mesh MoSIFT feature descriptors in positive samples obtained through beforehand training, to obtain a hand motion category in the to-be-identified video comprises:
dimensionally reducing the 3D Mesh MoSIFT feature descriptor of the feature point to a dimension that is the same as that of a 3D Mesh MoSIFT feature descriptor in a positive sample obtained through the beforehand training;
evaluating a Euclidean distance between the 3D Mesh MoSIFT feature descriptor of the feature point after the dimension reduction and the 3D Mesh MoSIFT feature descriptor in the positive sample; and
selecting a category corresponding to the 3D Mesh MoSIFT feature descriptor in one of the positive samples with a minimum Euclidean distance to the 3D Mesh MoSIFT feature descriptor of the feature point, to be used as the hand motion category in the to-be-identified video.

US Pat. No. 10,248,853

IMAGE OUTPUT DEVICE, IMAGE OUTPUT METHOD, AND COMPUTER PROGRAM PRODUCT

Kabushiki Kaisha Toshiba,...

1. An image output device, comprising:a memory; and
one or more processing circuits configured to function as an acquirer, an extractor, a search unit, an associate unit and an output controller, wherein
the acquirer acquires a plurality of first images obtained by capturing a mobile object and a plurality of second images obtained by capturing the mobile object;
the extractor extracts a first parameter that varies in accordance with a movement of the mobile object from at least one of the first images, and extracts a second parameter that varies in accordance with a movement of the mobile object from each of the second images;
the search unit searches the second parameters for a second parameter that is similar to the first parameter;
the associate unit associates the first image from which the first parameter is extracted with the second image from which the second parameter that is retrieved with respect to the first parameter is extracted and to associate another first image other than the first image with another second image that is shifted from the second image by a number of frames between the another first image and the first image from which the first parameter is extracted; and
the output controller instructs an output unit to output an image based on the first image and the second image that are associated to each other.

US Pat. No. 10,248,852

METHOD FOR RECOGNIZING FACIAL EXPRESSION OF HEADSET WEARING USER AND APPARATUS ENABLING THE SAME

INDUSTRY-ACADEMIC COOPERA...

1. A head mounted display apparatus for recognizing expressions, comprising:a sensing unit including at least one expression detection sensing unit installed inside of the head mounted display apparatus for sensing expression information around eyes in at least one of a contact manner and a non-contact manner;
an image acquiring unit installed outside of said head mounted display apparatus for collecting expression information around a mouth; and
an acquisition unit for information of expressions for collecting the expression information around the eyes and the expression information around the mouth,
wherein the sensing unit measures a reference value of compression and stretching of one object and senses a degree of the compression of the one object or a degree of the stretching of the one object by comparing an infrared intensity value measured for the one object with the reference value, and
wherein the degree of the compression of the one object or the degree of the stretching of the one object is reflected in the expression information around the eyes.

US Pat. No. 10,248,851

COLLECTION OF MACHINE LEARNING TRAINING DATA FOR EXPRESSION RECOGNITION

Emotient, Inc., La Jolla...

1. A computer-implemented method comprising:receiving, responsive to one or more requests for one or more images depicting a specific affective state, image data corresponding to at least one image from one or more first devices, wherein the affective state is one of anger, contempt, disgust, fear, happiness, sadness, and surprise;
receiving, from one or more second devices, one or more selections corresponding to the image data;
determining one or more ratings relating to the image data, each of the one or more ratings corresponding to at least one selection from amongst the one or more received selections;
testing a machine learning classifier by:
presenting, based at least in part on the one or more ratings, the image data to the machine learning classifier;
receiving, from the machine learning classifier, a classification corresponding to the image data; and
detecting whether the classification corresponds to the specific affective state; and
providing, responsive to the detection, training data to the machine learning classifier.

US Pat. No. 10,248,850

GENERATING ACTIONS BASED ON A USER'S MOOD

IMMERSION CORPORATION, S...

1. A method of operating an electronic device, the method comprising:determining a mood of a first user associated with a first electronic device based on a physical attribute of the first user, wherein the physical attribute comprises an input pressure applied by the first user to the first electronic device, and wherein said determining a mood of the first user includes determining a deviation of the input pressure from a normal input in an input profile;
determining an action to be performed by the first electronic device based on the determined mood;
initiating the determined action, wherein the initiating of the determined action comprises transmitting an object that corresponds to the determined mood to a second electronic device, and wherein the object includes a haptic effect that reflects the determined mood; and
modulating the determined action to be generated for a second user associated with the second electronic device based on mood information of the second user detected prior to the transmitting of the object to the second electronic device,
wherein the modulating of the determined action is performed by a processor of the first electronic device.

US Pat. No. 10,248,849

TECHNIQUE FOR PROVIDING SECURITY TO AN AREA

Intelligence Based Integr...

1. A method for providing security to an area, the method comprising:providing at least one entry port for persons to enter into a secure area; capturing a photographic image of each person who approaches the at least one entry port seeking entry into the secure area;
comparing the photographic image of each person seeking entry into the secure area to facial images compiled in a database of facial images of persons of interest to detect a likely match; and
alerting at least one of one or more law enforcement officers or one or more security personnel of a detection of a likely match between the photographic image of the person seeking entry into the secure area and a facial image of a person of interest,
wherein the comparing of the photographic image of each person seeking entry into the secure area includes transmitting the photographic image of each person seeking entry into the secure area to the database and, in response, receiving an alert that the person seeking entry into the secure area is the person of interest if the likely match is detected between the photographic image of the person seeking entry into the secure area and the facial image of the person of interest, and
wherein the secure area is controlled by a first party and the database is controlled by a second party.

US Pat. No. 10,248,848

METHOD AND APPARATUS FOR IMPROVED FACIAL RECOGNITION

Nokia Technologies Oy, E...

1. A method comprising:accessing a trained block division trained on a set of facial images of a same subject, wherein the trained block division is trained by iterative evaluation and modification;
receiving a subject facial image;
normalizing the subject facial image and applying the trained block division to the subject facial image by performing:
(a) identifying a plurality of key point pixels in the subject facial image, wherein the plurality of key points are dynamically identified using data comprising distinguishing points on faces according to the trained block division; and
(b) measuring the distance from each of a plurality of pixels P, to each respective key point pixel and assigning each respective pixel P to a block encompassing a closest key point pixel;
determining statistical property measurements for respective pixels in at least one block of the subject facial image;
converting the statistical property measurements into a feature vector; and
identifying, by a processor, at least one characteristic of the subject facial image by comparing the feature vector to a plurality of feature vectors of enrolled images;
wherein training the block division comprises:
receiving a training group of facial images comprising at least a plurality of facial images of the same subject;
applying block division to the training group;
classifying images in the training group following the application of block division;
utilizing results of the classification to determine a learned dimension compression matrix;
receiving an evaluation group of facial images comprising at least a plurality of facial images of the same subject;
applying the block division to the evaluation group;
applying the learned dimension compression matrix to the evaluation group following application of the block division; and
evaluating the block division based on results of applying the learned dimension compression to the evaluation group.

US Pat. No. 10,248,846

INFORMATION PROCESSING DEVICE

SONY INTERACTIVE ENTERTAI...

1. An information processing device comprising:an image obtaining section configured to obtain a captured image from an imaging device;
a registered user information retaining section configured to retain face identifying data of a registered user;
a face authenticating section configured to detect a face image of the registered user present in the captured image and to compare the face image to the face identifying data retained in the registered user information retaining section to authenticate the user;
a login processing section configured to allow the registered user to log in;
a damage determining section configured to determine whether or not the face identifying data retained in the registered user information retaining section is unusable for authenticating the user;
a notifying section configured such that if the face identifying data is determined to be unusable for authenticating the user, the notifying section notifies that the face identifying data is unusable for authenticating the user,
wherein, if the damage determining section determines that the face identifying data of the registered user allowed to log in by the login processing section is unusable for authenticating the user, the notifying section notifies the logged-in registered user that the face identifying data is unusable for authenticating the user; and
a face data generating section configured to perform reregistration processing of the face identifying data following the notification by the notifying section to replace the retained face identifying data.

US Pat. No. 10,248,845

METHOD AND APPARATUS FOR FACIAL RECOGNITION

Samsung Electronics Co., ...

1. A facial recognition method, comprising:identifying a first makeup pattern present in a region of interest (ROI) of a first image obtained from an image sensor, the first image including a face of a user to be recognized;
determining whether a second makeup pattern is present in an ROI of a second image, the ROI of the second image corresponding to the ROI of the first image, the second image including a face of a pre-registered user,
in response to the second makeup pattern not being present in the ROI of the second image, generating a third image by applying the first makeup pattern to the ROI of the second image; and
authorizing the user in the first image as the pre-registered user by recognizing the face of the user included in the first image as the face of the pre-registered user when the third image matches the first image.

US Pat. No. 10,248,844

METHOD AND APPARATUS FOR FACE RECOGNITION

SAMSUNG ELECTRONICS CO., ...

1. A face recognition method comprising:inputting a first input image into an illumination compensation model and outputting, by the illumination compensation model, a first albedo image and a first surface normal image, the illumination compensation model being implemented by a neural network model;
inputting an enrolled image into the illumination compensation model and outputting, by the illumination compensation model, a second albedo image and a second surface normal image;
generating a first feature value by inputting the first albedo image and the first surface normal image extracted by the illumination compensation model to a face recognition model and outputting, by the face recognition model, the first feature value;
generating a second feature value by inputting the second albedo image and the second surface normal image extracted by the illumination compensation model to the face recognition model and outputting, by the face recognition model, the second feature value; and
determining a face recognition result based on the first and second feature values.

US Pat. No. 10,248,843

IMAGE PROCESSING APPARATUS AND METHOD FOR REMOVING A FACIAL OBJECT

Omron Corporation, Kyoto...

5. An image processing method performed by an image processing apparatus that performs correction for removing an object from a face image, which is an image including a face of a person, the image processing method comprising the steps of:acquiring the face image;
determining a representative pixel value, which is a pixel value representing a skin region, on the basis of pixels included in the face image;
generating a first region, which is a region including the object;
determining correction pixels, which are one or more pixels used for the correction, out of a plurality of pixels present in a vicinity of the first region, on the basis of similarity to the representative pixel value, wherein the correction pixels include a plurality of pairs of a first correction pixel and second correction pixel opposed to each other across the first region, each of the first and second correction pixel being specified by performing scanning a predetermined distance toward an outer side from a pixel present on a boundary line of the first region and specifying a pixel having a luminance component closest to a luminance component of the representative pixel value;
generating a partial image, which is a collection of pixels for replacing pixels corresponding to the object, using the correction pixels; and
performing correction by combining the partial image with the face image,
wherein the generating of the partial image further includes generating, for each of the pairs, a pixel row for connecting the first correction pixel and the second correction pixel to generate a partial image in which the first region is interpolated, and
wherein the color of the pixels included in the pixel row changes stepwise from a color of the first correction pixel to a color of the second correction pixel.

US Pat. No. 10,248,842

FACE TRACKING USING STRUCTURED LIGHT WITHIN A HEAD-MOUNTED DISPLAY

Facebook Technologies, LL...

1. A head mounted display (HMD) comprising:a display element configured to:
display content to a user wearing the HMD,
sequentially illuminate a portion of a face of the user inside the HMD with monochromatic light of different colors, and
wherein the content is displayed by the display element to the user for a content frame having a first time period, the monochromatic light being emitted for a second time period after the first time period has elapsed, and prior to display of additional content for a subsequent content frame; and
an optics block configured to direct light from the display element to an exit pupil of the HMD;
a camera assembly configured to:
capture images of the portion of the face illuminated by the display element with the monochromatic light of different colors; and
a controller configured to:
update a facial model that describes the portion of the face based at least in part on the captured images including the monochromatic light of different colors.

US Pat. No. 10,248,840

METHOD AND SYSTEM FOR AUTOMATICALLY TRACKING FACE POSITION AND RECOGNIZING FACE

FIVEGT CO., LTD, Seoul (...

1. A system for automatically tracking a face position and recognizing a face, comprising:a capturing unit configured to capture a face image of a user;
a face region detection unit configured to detect a face region from the face image, and to output position information of the detected face region;
a displacement calculation unit configured to measure a displacement of the capturing unit based on the face region position information, such that the face region captured by the capturing unit is moved to a face authentication region;
a driving unit configured to move the capturing unit based on the displacement; and
a face recognition unit configured to execute face recognition by comparing a current authentication image input from the face region detection unit, with a plurality of registered face images pre-stored in a database,
wherein the face recognition unit executes face recognition by storing the plurality of registered face images with matching frequencies indicating the number of times that the plurality of registered face images have been matched with an authentication image input of a prior face recognition process, and by sequentially comparing the current authentication image with the registered face images having large matching frequencies when the current authentication image is input from the face region detection unit,
wherein the plurality of face images pre-stored in the database are classified into a plurality of groups in order of large matching frequency,
wherein the face recognition unit firstly compares the current authentication image with users' registered face images which belong to a group having a largest matching frequency, and then compares the current authentication image with users' registered face images which belong to a group having a next largest matching frequency, and
wherein the face recognition unit replaces a registered face image having a smallest matching frequency, among the plurality of registered face images, by the current authentication image, at a predetermined time period.

US Pat. No. 10,248,839

LOCATING OBJECTS WITHIN DEPTH IMAGES

Intel Corporation, Santa...

1. A method comprising:performing on a computer connected components labelling in both screen dimensions and a depth dimension to label objects in a depth image;
using a contour of said labels to identify an object in the depth image using said computer;
identifying an object within a labeled blob by finding a convex hull that surrounds a blob labelled by said connected components labelling; and
finding a defect in said blob and a closest opposite point on the convex hull and using a line from said defect to said closest opposite point to segment the object to be identified from a remainder of the blob.

US Pat. No. 10,248,838

METHOD AND DEVICE FOR SINGLE MOLECULE IMAGING

THE REGENTS OF THE UNIVER...

1. A device for imaging fluorescently labeled nucleic acid molecules in a sample comprising:a mobile phone having a camera therein;
a modular attachment device configured to mount to the mobile phone and position a fluorescently labeled nucleic acid sample contained therein within a field of view of the camera, the modular attachment device comprising:
an excitation light source;
a sample holder configured to hold the sample containing the fluorescently labeled nucleic acid compressed between two optically transparent substrates, wherein fluorescently labeled nucleic acid molecules are stretched or extended in response to a compression force applied to the two optically transparent substrates;
a lens or set of lenses for magnifying the image of the sample;
a filter interposed between the lens and the camera of the mobile phone and configured to reject scattered background light from the excitation light source and transmit fluorescent light through the filter;
a moveable stage for moving the excitation light source and sample holder relative to the camera of the mobile phone; and
wherein the mobile phone comprises software executed thereon to identify molecules of fluorescently labeled nucleic acid in the sample along with their respective lengths or lengths of sub-regions of the nucleic acid molecules.

US Pat. No. 10,248,837

MULTI-RESOLUTION FINGERPRINT SENSOR

Synaptics Incorporated, ...

1. A method of processing an image obtained with a biometric sensor having a sensing region, the method comprising:acquiring with the biometric sensor an image of an input object in the sensing region, the image having a first resolution;
providing the image for first image processing to determine whether the input object is a legitimate biometric object;
adjusting the image to a second resolution lower than the first resolution to produce a reduced-resolution image; and
providing the reduced-resolution image for second image processing to validate the biometric object.

US Pat. No. 10,248,835

METHODS AND APPARATUSES FOR AUTHENTICATION USING BIOMETRIC INFORMATION

SAMSUNG ELECTRONICS CO., ...

1. An authentication method, comprising:generating a quality profile of an authentication image, the quality profile of the authentication image indicating a quality of the authentication image, the generating the quality profile including,
determining a first quality value corresponding to a starting position in the authentication image based on a variance of pixels in a window at the starting position,
determining at least one second quality value corresponding to at least one other position in the authentication image by moving the window from the start position to an end position in the authentication image, and
generating the quality profile of the authentication image based on the first quality value and the at least one second quality value;
determining an effective region in the authentication image based on the quality profile, the determining the effective region including,
dividing the authentication image into at least one effective segment and at least one ineffective segment by comparing the quality profile of the authentication image to a threshold,
verifying a quality of the at least one ineffective segment,
determining a final ineffective segment based on a result of the verifying, and
omitting the final ineffective segment from the authentication image to determine the effective region in the authentication image; and
determining whether the authentication image is authenticated based on the effective region in the authentication image to a registered image.

US Pat. No. 10,248,834

DISPLAY PANEL HAVING FINGERPRINT RECOGNITION AND DISPLAY APPARATUS

Shenzhen China Star Optoe...

2. A display panel having a fingerprint recognition function, comprising: a display region and a fingerprint recognition region, the display region comprising a plurality of first pixel unit, the fingerprint identification region comprising a plurality of second pixel units, each of the second pixel units comprising a display unit and a fingerprint identification unit; wherein the pixel aperture area of the first pixel unit is equal to the pixel aperture area of the display unit plus the pixel aperture area of the fingerprint identification unit; by the gray scale voltage compensation of the pixel in the fingerprint recognition region is made in accordance with a ratio of the pixel aperture area of the first pixel unit to the pixel aperture area of the display unit and makes the pixel luminance in the display region and the pixel luminance in the fingerprint identification region is the same;wherein by the compensation of the gray scale voltage of the pixel in the fingerprint identification region, the following formula needs to be satisfied:

wherein, A1 is the pixel aperture area of the pixel in the display region, A2 is the pixel aperture area of the display unit, ? are constants; Vd1 is the gray scale voltage in the display region; Vd2 is the gray scale voltage in the fingerprint identification region; Vth is the threshold voltage of the driving switch T2 to compensate the gray scale voltage of the fingerprint identification region and makes the pixel luminance in the display region and the pixel luminance in the fingerprint identification region is the same.

US Pat. No. 10,248,833

METHOD FOR BIOMETRIC PROCESSING OF IMAGES

1. A method for biometric processing of images of part of the human body having papillary ridges for determining whether an imaged part of the human body is authentic for the detection of fraud, said method comprising:acquiring images of part of the human body having papillary ridges on contact with a surface of a sensor adapted to receive in contact a part of the human body to be imaged, said sensor comprising an automated data-processing system, an emissive screen comprising an array of individually controllable pixels, the states of the pixels defining a display pattern of the emissive screen, and a substrate on which are disposed elements sensitive to light constituting an imager and sharing the orientation of the emissive screen,
wherein the acquiring images further comprises:
displaying, by the emissive screen of the sensor, at least one first display pattern to light said part of the human body, the emissive screen being configured to light said part of the human body to be imaged when said part of the human body is in contact with the surface, and acquiring at least one first image of said part of the human body by the imager;
determining, from this first image, by the automated data-processing system, at least one second display pattern different to the first display pattern, wherein the determination of the second display pattern comprises analysis of the first image to locate a representation of the part of the human body in said first image, and wherein determination of the second display pattern comprises positioning of lighting zones in the second display pattern corresponding to the location of the representation of the part of the human body in the first image, such that the part of the human body in contact with the surface is lit by said lighting zones when the emissive screen displays the second display pattern, the second display pattern comprising luminous geometric figures which are distinct and separate defined by the states of the pixels of the emissive screen; and
displaying, by the emissive screen, at least the second display pattern to light said part of the human body so that said part of the human body in contact with the surface is illuminated by said lighting zones when the emissive screen displays the second display pattern, and acquiring at least one second image of said part of the human body by the imager, and
performing, by the automated data-processing system, biometric processing on a final image constructed from at least the second image, said biometric processing comprising performing a method for fraud detection aimed at determining that the imaged part of the human body is authentic and not a fraud using representations in the second image of projections of the luminous geometric figures of the second display pattern.

US Pat. No. 10,248,832

METHOD OF DETERMINING, IN AN IMAGE, AT LEAST ONE ZONE LIABLE TO REPRESENT AT LEAST ONE FINGER OF AN INDIVIDUAL

1. A method of detecting zones (Z1a, Z1b, Z1c, Z1d, Z2a, Z2b, Z2d, Z3a) liable to contain at least one finger print in an image of at least one portion of hand of an individual, the method comprising:a) a step of acquiring the image of at least one illuminated portion of hand with the aid of an optical sensor and without contact with this hand;
b) a step of determining a plurality of zones (Z1a, Z1b, Z1c, Z1d) of the acquired image, each zone thus determined being a continuous zone of points of the acquired image which each exhibit a luminous intensity level (I) greater than or equal to a luminous intensity threshold value (Vsn, Vs1) selected for the determination of the zone thus determined; and
c) a first selection step for selecting, from among the zones determined, the zones which are liable to represent at least one print of a finger, this selection being carried out with the aid of at least one filtering criterion of a first type, chosen from among a finger shape identification criterion and/or a finger print standard texture identification criterion and/or a finger standard color identification criterion and in which a set of threshold values (Vsn, Vs, Vs2, Vs3) of luminous intensity (I) lying between a minimum threshold value (Vsmin) of intensity (I) and a maximum threshold value (VsMax) of intensity (I) is selected and the step of determining a plurality of zones of the acquired image is carried out with the aid of each of the threshold values (Vs1, Vs2, Vs3) of the set of threshold values (Vsn), and then the plurality of the zones (Z1a, Z1b, Z1c, Z1d, Z2a, Z2b, Z2d, Z3a) of the captured image which have been determined with each of the threshold values (Vs1, Vs2, Vs3) of the set of threshold values (Vsn) is stored.

US Pat. No. 10,248,831

FLAT-PANEL DISPLAY EMBEDDED WITH A FINGERPRINT SENSOR AND A METHOD OF FORMING THE SAME

Himax Technologies Limite...

1. A flat-panel display embedded with a fingerprint sensor, comprising:a substrate;
a photo sensor formed on a bottom surface of the substrate;
a lens region disposed above and substantially aligned with the photo sensor vertically; and
a light barrier substantially aligned with the photo sensor vertically and disposed between the photo sensor and the lens region;
wherein a liquid crystal layer for constructing a liquid crystal display or an encapsulation layer for constructing a light-emitting diode display is disposed above the light barrier, the lens region vertically passing through the liquid crystal layer or the encapsulation layer; wherein a first dielectric layer formed on a top surface of the substrate, wherein the light barrier is formed on the first dielectric layer, wherein the light barrier comprises: a polysilicon layer; a first metal layer formed above the polysilicon layer; and a second metal layer formed on the first metal layer; wherein the polysilicon layer, the first metal layer and the second metal layer surround a passage; wherein a light beam representing a fingerprint passes the lens region and the passage, and is then detected by the photo sensor.

US Pat. No. 10,248,829

FINGERPRINT DETECTION CIRCUIT AND METHOD, ELECTRONIC DEVICE

BYD COMPANY LIMITED, She...

19. A fingerprint detection method, comprising:applying an excitation signal to a finger so as to generate ridge capacitors and valley capacitors;
generating a first voltage or a second voltage by a collecting unit according to a regulation voltage, a capacitance value of one of the ridge capacitors and a capacitance value of one of the valley capacitors;
amplifying the first voltage and the second voltage with a predetermined factor by a processing module;
calculating a difference between an amplified first voltage and an amplified second voltage by the processing module;
determining whether the difference is greater than or equal to a predetermined threshold by the processing module;
when the difference is greater than or equal to the predetermined threshold, calculating the capacitance value of one of the ridge capacitors according to the first voltage and calculating the capacitance value of one of the valley capacitors according to the second voltage by the processing module; and
when the difference is less than the predetermined threshold, adjusting an excitation voltage of the excitation signal according to the predetermined threshold and the difference by the processing module, wherein the excitation voltage is a voltage magnitude of the excitation signal.

US Pat. No. 10,248,828

WEARABLE DEVICE HAVING A FINGERPRINT SENSOR

ARM IP Limited, Cambridg...

1. A device configured to be worn by a user when in operation, comprising:a device body having a first surface located adjacent to skin of a user when the device is worn by the user; and
fingerprint sensor circuitry comprising a capacitive fingerprint sensor and associated control circuitry, the capacitive fingerprint sensor having electrodes between which a primary impedance path is established when a user places a finger on the capacitive fingerprint sensor, the associated control circuitry being connected to an electrical ground connection and configured to pass an AC drive signal through the capacitive fingerprint sensor when a user places said finger on the capacitive fingerprint sensor in order to measure a property whose value varies as a function of impedance;
the device body providing a body ground connection which is different from the electrical ground connection;
the body ground connection being arranged such that when the user places said finger on the capacitive fingerprint sensor, a parasitic impedance path is established from the finger through the body of the user and via said first surface of the device body to the body ground connection;
the device further comprising filter circuitry between the body ground connection and the electrical ground connection and configured to decouple the body ground connection from the electrical ground connection in a first frequency range including the frequency of the AC drive signal, and configured to couple the body ground connection to the electrical ground connection in at least one further frequency range, where the first frequency range is different from and lower than one further frequency range of the at least one further frequency range.

US Pat. No. 10,248,827

INTERFERENCE-FREE FINGERPRINT IDENTIFICATION DEVICE

SUPERC-TOUCH CORPORATION,...

1. An interference-free fingerprint identification device, comprising:a thin film transistor substrate;
a thin film transistor layer disposed on one side of the thin film transistor substrate and including plural thin film transistors;
a sensing electrode layer including plural fingerprint sensing electrodes, wherein each fingerprint sensing electrode corresponds to a plurality of the thin film transistors, and is connected to sources or drains of at least two corresponding thin film transistors;
a gate line layer including plural gate lines, wherein at least two gate lines are electrically connected to gates of a plurality of the thin film transistors corresponding to a fingerprint sensing electrode;
a data line layer including plural data lines, wherein each data line is electrically connected to a source or drain of a thin film transistor in a plurality of the thin film transistors corresponding to each of a plurality of fingerprint sensing electrodes; and a first shielding layer disposed between the gate line layer and the data line layer, and electrically connected to a source or drain of a thin film transistor in a plurality of the thin film transistors corresponding to each fingerprint sensing electrode.

US Pat. No. 10,248,826

FINGERPRINT SENSOR WITH PROXIMITY DETECTION, AND CORRESPONDING DEVICES, SYSTEMS, AND METHODS

Motorola Mobility LLC, C...

1. An electronic device, comprising:a housing;
one or more processors;
a fingerprint sensor; and
a proximity sensor component concentrically located with the fingerprint sensor;
the fingerprint sensor comprising a plurality of sensors surrounding the proximity sensor component;
the proximity sensor component to transition the fingerprint sensor from a first mode of operation to a second mode of operation upon receiving an infrared emission from an object external to the housing.

US Pat. No. 10,248,825

IMAGE PROCESSING

Hewlett-Packard Developme...

1. A method of image processing comprising, by at least one processing device:receiving an image;
placing a window across the image;
computing a set of all occurring grayscale values within the window;
computing a threshold value based on the set of all occurring unique grayscale values within the window, including considering every occurring unique grayscale value without considering a number of occurrences of each occurring unique grayscale value within the set; and
determining an output pixel value of at least one pixel from the window based on the threshold value.

US Pat. No. 10,248,824

ENCODING INFORMATION IN PHYSICAL PROPERTIES OF AN OBJECT

1. A method comprising:obtaining a representation of a three dimensional object having physical properties;
obtaining information to encode within the three dimensional object when produced;
modifying the physical properties to determine modified physical properties, wherein said modifying comprises encoding the information within the physical properties; and
producing a tangible product, wherein the tangible product is the three dimensional object having the modified physical properties, whereby the tangible product encodes within its physical properties the information, whereby the information is decodable from the tangible product.

US Pat. No. 10,248,823

USE OF SECURITY INK TO CREATE METADATA OF IMAGE OBJECT

International Business Ma...

1. A method, comprising:capturing a first image of a first object with a first imaging technology operating at frequencies within the visual spectrum;
capturing a second image of a second object positioned on the first object with a second imaging technology operating at frequencies outside the visual spectrum, wherein the first imaging technology is different than the second imaging technology and the first object is a different object than the second object;
extracting content from the second image that is invisible in the first image, wherein the content comprises information about the first object;
generating a third image by combining the content as metadata and the first image; and
storing the third image in a non-transitory, computer-readable storage medium.

US Pat. No. 10,248,822

SCANNER ASSEMBLY WITH REMOVABLE SHOCK MOUNT

HAND HELD PRODUCTS, INC.,...

1. An indicia scanning assembly, comprising:a housing having a shock mount receiving space;
a scan engine receiving shock mount positioned in the shock mount receiving space, and having a first end with a scan engine receiving space, and an opposite second end with a scanning window receiving space; and
a scan engine securing cap, positioned at the first end, covering and sealing the scan engine receiving space.

US Pat. No. 10,248,821

TARGET GENERATING STRUCTURE FOR AN ACCESSORY FOR A MOBILE DEVICE

The Code Corporation, Dr...

1. An accessory for a mobile device, the mobile device comprising a processor, a display screen, memory, an illumination torch, and a camera comprising a camera lens and an image sensor, the accessory comprising:a target generating structure for emitting a targeting pattern of illumination into a field of view of the camera of the mobile device, when the accessory is secured to the mobile device, wherein the target generating structure is secured to the accessory such that the target generating structure can be repositioned between a first position aligned with the illumination torch and a second position outside an illumination field of the illumination torch.

US Pat. No. 10,248,820

APPARATUS AND METHODS FOR ENABLING INFORMATION TO BE READ FROM A TOUCH SCREEN APPARATUS

Nokia Technologies Oy, E...

1. An apparatus comprising:a memory element configured to store information; and
a switching element coupled to the memory element;
wherein the switching element is configured to be switched from a first state to a second state in response to an input signal from a capacitive touch screen external to the apparatus and wherein when the switching element is in the second state the memory element is configured to provide at least part of the information in the memory element to the capacitive touch screen external to the apparatus; and
wherein the memory element and the switching element are configured to enable an electrode to be connected to and disconnected from ground.

US Pat. No. 10,248,819

CARD READER AND METHOD OF USE THEREOF

ID TECH, Cypress, CA (US...

25. A method for communicating with a host device comprising the steps of:receiving analog signals by an interfacing circuit from the host device on audio channels of the host device, wherein the audio channels are designed for audio speakers and microphones;
processing the received analog signals from the host device;
adjusting at least one parameter of an interfacing circuit based on the processed signals of the received analog signals from the host device;
sensing data from a magnetic strip of a card;
detecting analog signals that are associated with the sensed data from the magnetic strip of the card; and
transmitting the analog signals that are associated with the sensed data from the magnetic strip of the card on at least one of the audio channels based on the at least one adjusted parameter.

US Pat. No. 10,248,818

CONDUCTIVE PATTERN READING DEVICE AND METHOD, AND INTERACTIVE PLATFORM USING SAME

Leo Paper Bags Manufactur...

1. A conductive pattern reading device, comprisinga sensing circuit board including one or more conductive sensing blocks and a sensing chip used for sensing and detecting a capacitance value of each conductive sensing block; and
a medium printed with conductive patterns of corresponding codes and provided with one or more conductive sensing regions,
wherein the conductive patterns are printed in the corresponding conductive sensing regions, the conductive sensing blocks correspond to the conductive sensing regions, and the sensing chip is connected to each conductive sensing block on the sensing circuit board.

US Pat. No. 10,248,817

READING RFID TAGS IN DEFINED SPATIAL LOCATIONS

HAND HELD PRODUCTS, INC.,...

1. A radio frequency identification (“RFID”) reader of a point-of-sale (POS) system, comprising:a first radio frequency (RF) antenna configured to transmit power in a first spatial zone in order to read a first set of RFID tags disposed within the first spatial zone;
a second RF antenna configured to transmit power in a second spatial zone in order to read the first set of RFID tags, at a second time wherein the second spatial zone is upstream the first spatial zone,
wherein the first set of RFID tags are attached to items to be purchased at a point of sale location of an establishment, wherein the point of sale location comprises the first spatial zone and the second spatial zone, wherein a list of identifiers of cleared RFID tags is produced listing only RFID tags of the first set of RFID tags that indicate that they have been scanned, at a time between said first and second times, by a decodable indicia reading at the point of sale location, wherein the list is produced based on the first set of RFID tags being moved, from the first spatial zone to the second spatial zone based on the readings by the first and second RF antennas at the first and second times, to enable the POS system to identify read RFID tags of the first set of RFID tags that are not listed on the list and trigger an alert.

US Pat. No. 10,248,816

AUTOMATED SYSTEM AND METHOD FOR CONSTRUCTING CARD MULTIPACKS, AND CARD MULTIPACK CONSTRUCTED USING THE SAME

Harvard Label LLC, Wilmi...

1. An automated system for constructing card multipacks, the automated system comprising:a movable conveyor comprising a plurality of tooling plates, each configured to receive a height adjusting member on an upper surface thereof;
a first carrier placing station configured to place a first carrier portion of a carrier on a tooling plate of the plurality of tooling plates;
a first card placing station configured to place a first stored value card on the first carrier portion;
a first data capture station configured to read a first card bar code of the first stored value card in-line in the automated system; and
a software system adapted to verify the first card bar code with a data file,
wherein the height adjusting member is configured to support the first carrier portion thereon.

US Pat. No. 10,248,815

CONTEMPORANEOUS GESTURE AND KEYBOARD FOR DIFFERENT LEVELS OF ENTRY AUTHENTICATION

International Business Ma...

1. A method comprising:receiving a request for a level of access of one of a plurality of levels of access to a restricted access device;
based on the level of access requested, enabling increased access to the restricted access device based upon an animated facial gesture event and receiving a predetermined keyboard entry from a user accessing the restricted access device, wherein the predetermined keyboard entry includes a password requiring multiple keyboard activations and the animated facial gesture event includes at least one change from at least one of a smile, a frown, a straight face, a blink, a wink, an open mouth and a closed mouth to at least one of a smile, a frown, a blink, a wink, an open mouth and a closed mouth; and
increasing a number of keyboard activations in a password based upon the animated facial gesture event being received and a higher level of access requested.

US Pat. No. 10,248,814

MEMORY INTEGRITY MONITORING

HEWLETT PACKARD ENTERPRIS...

1. A system comprising:a first memory module; and
a first memory integrity monitoring processor embedded to the first memory module, the first memory integrity monitoring processor to:
receive, from a second memory integrity monitoring processor coupled to a second memory module, a second hash corresponding to a second memory region of the second memory module, wherein the second hash includes a second sequence number for reconstruction of a final hash value and the second hash is not sequentially a first number in a sequence for reconstruction of the final hash value;
receive, from a third memory integrity monitoring processor coupled to a third memory integrity monitoring processor, a third hash corresponding to a third memory region of the third memory module, wherein the third hash includes a third sequence number for reconstruction of the final hash value ;
determine, based on the second and third sequence numbers, if the second hash can be combined with the third hash;
combine the second hash and third hash into a partial hash; and
reconstruct the final hash value using the partial hash.

US Pat. No. 10,248,813

ORGANIZING KEY-VALUE INFORMATION SETS INTO HIERARCHICAL REPRESENTATIONS FOR EFFICIENT SIGNATURE COMPUTATION GIVEN CHANGE INFORMATION

INTERNATIONAL BUSINESS MA...

1. A method for enabling computation of a signature of an information set given change information by storing information in a hierarchical data structure, the method comprising:utilizing at least one processor to execute computer code that performs the steps of:
receiving change information relating to data represented by a first node within the hierarchical data structure, wherein each node within the hierarchical data structure has a corresponding assigned key and wherein the change information comprises key identification information assigned to the first node;
accessing a database associated with the hierarchical data structure and comprising at least one key, wherein the at least one key comprises a crypto-hash and is assigned to a node within the hierarchical data structure;
identifying a node key within the database that is assigned to the first node, wherein the identifying comprises (i) deriving information related to the location of the first node by applying a transformation to the key identification information and (ii) locating the node key corresponding to the first node by searching the database via a single look-up using the derived information;
computing, from the identified node key, a node crypto-hash for the first node that is based upon the first node being modified using the received change information;
effectuating the received change information within the hierarchical data structure by modifying the first node within the hierarchical data structure using the computed node crypto-hash; and
updating the database with a modified node key generated based upon the effectuated change.

US Pat. No. 10,248,812

USER PERSONALIZATION OF THIRD-PARTY WEBPAGE IMAGES

MICROSOFT TECHNOLOGY LICE...

1. A system for allowing a user to personalize a webpage, comprising:a webpage personalizer comprising one or more computing devices, said computing devices being in communication with each other via a computer network whenever there is a plurality of computing devices, and a computer program having a plurality of sub-programs executable by said computing devices, said computing devices being directed by the sub-programs of the computer program to,
receive a request from a client device of the user to insert a user-selected image into an existing third-party webpage managed by an entity other than the user, the third-party webpage being publicly accessible to client devices over a wide-area network at an initial Uniform Resource Locator that uniquely identifies the third-party webpage, said image insertion request specifying a particular one of a variety of ways that the user-selected image is to be inserted into the third-party webpage,
determine if the user is authorized to personalize the third-party webpage based on a user identifier, and if the user-selected image is appropriate for use on the third-party webpage, said image appropriateness determination being based on one or more image appropriateness criteria,
whenever the user is determined to be authorized to personalize the third-party webpage and the user-selected image is determined to be appropriate for use on the third-party webpage, personalize the third-party webpage by inserting the user-selected image into the third-party webpage according to the particular way that is specified in said image insertion request to obtain a personalized version of the third-party webpage, the user being identified by the user identifier for accessing the personalized version of the third-party webpage over the wide-area network at the initial Uniform Resource Locator, and
generate a version-specific Uniform Resource Locator that uniquely identifies the personalized version of the third-party webpage for sharing access to the personalized version of the third-party webpage.

US Pat. No. 10,248,811

METHODS AND APPARATUS TO ASSIGN DEMOGRAPHIC INFORMATION TO PANELISTS

The Neilson Company (US),...

1. An apparatus comprising:a decoy generator to generate decoy database proprietor identifiers to protect privacies of members of panelist households corresponding to panelist database proprietor identifiers, the decoy database proprietor identifiers to be determined by the decoy generator based on a probability density function so that a quantity of the decoy database proprietor identifiers is less than would be used if the decoy database proprietor identifiers were selected by a random selection process;
a query handler to query, via a network, a server at a database proprietor using the panelist database proprietor identifiers and the decoy database proprietor identifiers, to obtain demographic information; and
a panelist comparator to assign the panelist database proprietor identifiers to panelists in the panelist households based on the demographic information obtained from the server at the database proprietor.

US Pat. No. 10,248,810

AUTOMATIC SQL QUERY MODIFICATION FOR DATA RESTRICTION

Pearson Education, Inc., ...

1. A method for managing access to information via a modification of a request for information, the method comprising:receiving, by a network interface of a server comprising a special purpose hardware computing device coupled to a network and including at least one processor executing instructions in a memory coupled to the at least one processor, from a graphical user interface (GUI) on a user device coupled to the network a transmission of:
an authentication user input from a user operating the user device: and
a query from the user device, wherein the query comprises a character string arranged according to a programming language;
responsive to an authentication of the user using the authentication user input, automatically identifying, by the server, a character string parsed from the query and matching the name of a first table;
automatically executing, by the server, at least one database command:
selecting, from a database coupled to the network:
a user categorization data defining an access rule corresponding to a user attribute data associated in the database with the user authenticated by the authentication user input and the user device that identifies a limitation of accessibility of a data in the first table and the data accessible by the user: and
predicate, stored within a second table referenced in association with the first table, and associated with the access rule, the predicate comprising a pre-created text string insertable into the query to limit the accessibility of data of the first table identified in the query;
automatically editing, by the server, the scope of the query by inserting the predicate into the character string;
retrieving a second predicate associated with the first table;
inserting the second predicate into the character string of the query;
using the edited query with the predicate to access the data in the first table according to the limitation of accessibility of data corresponding to the access rule; and
transmitting, by the server, the data through the network for display on the GUI.

US Pat. No. 10,248,809

SYSTEM AND METHOD FOR AUTOMATICALLY SECURING SENSITIVE DATA IN PUBLIC CLOUD USING A SERVERLESS ARCHITECTURE

Capital One Services, LLC...

1. A system comprising a cloud compute service for executing jobs immediately upon receipt of a notification, the cloud compute service comprising:one or more hardware processors; and
a memory unit storing instructions executable by the one or more hardware processors to perform operations comprising:
receiving, at the cloud compute service, a first notification that a first sensitive file comprising sensitive data has been received at a file receipt location, the first sensitive file being sent by a client device;
selecting, by the cloud compute service, a warm container instance for completing a first job comprising stripping the sensitive data from the first sensitive file;
assigning, by the cloud compute service, the first job to the warm container instance;
retrieving, by the warm container instance, the first sensitive file from the file receipt location;
generating, by the warm container instance, a first stripped file by stripping the sensitive data from the first sensitive file based on a configuration file;
transmitting, by the warm container instance, the first stripped file to a storage location;
deleting the first sensitive file from the file receipt location; and
terminating the warm container instance, wherein
terminating the container instance comprises deleting files comprising sensitive data.

US Pat. No. 10,248,808

FILE SHARING AND POLICY CONTROL BASED ON FILE LINK MECHANISM

International Business Ma...

1. A machine-implemented method for accessing a file, the method comprising:creating, by a computing device, a plurality of links to a file, each of the plurality of links being for use by a respective user of a plurality of users to access the file, and each of the plurality of links being a respective data structure on a file system, the respective data structure including information about the file and failing to include a content of the file;
encrypting, by the computing device, the content of the file by using a common key;
encrypting, by the computing device, the common key using a respective public key of each respective user to produce a respective encrypted common key for the each respective user;
registering, by the computing device, the respective encrypted common key for the each respective user in a respective link of the plurality of links;
setting, by the computing device, respective access rights regarding the file for the each respective user;
registering, by the computing device, the respective access rights for the each respective user in the respective link of the plurality of links; and
permitting or denying access to the content of the file for the each respective user based on information stored in the respective link of the plurality of links, wherein
the information about the file includes access rights for accessing the file by a respective user, key information for obtaining the common key encrypted with the public key of the respective user, key management information for accessing information managed by a key management service, and at least one block for accessing the content of the file encrypted by using the common key, each of the at least one block is one of a direct block for directly accessing the encrypted content of the file, an indirect block for accessing a direct block for directly accessing the encrypted content of the file, a double indirect block for accessing an indirect block for accessing a direct block for directly accessing the encrypted content of the file, and a triple indirect block for accessing a double indirect block for accessing an indirect block for accessing a direct block for directly accessing the encrypted content of the file.

US Pat. No. 10,248,807

ENHANCED PERMISSION ALLOCATION IN A COMPUTING ENVIRONMENT

CONJUR, INC., Waltham, M...

1. A method of operating a control service for cloud-based applications in a virtualized computing environment, the method comprising:obtaining an error report for a cloud-based application operating within the virtualized computing environment, wherein the error report comprises application identifying data and error identifying data, and wherein an error indicated in the error report is caused by a malware issue;
identifying a permission change for the cloud-based application based on the error report, wherein the identified permission change defines one or more rights to access or control one or more resources in the virtualized computing environment and the identified permission change may permit managing network connections for the cloud-based application and wherein the identified permission change is identified to facilitate a response based on the error report; and
allocating the identified permission change to the at least one new or existing member of the virtualized computing environment.

US Pat. No. 10,248,806

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, CONTENT MANAGEMENT SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An information processing apparatus comprising:one or more processors; and
a memory having stored thereon instructions which, when executed by the one or more processors, cause the information processing apparatus to function as:
a management unit configured to manage authorities, each of which is set to each of one or more keywords which are associated with each of a plurality of contents, wherein each of the authorities allows a corresponding group of users to receive provision of content associated with the one or more keywords;
an obtainment unit configured to obtain user identification information of a user and a keyword input by the user; and
a control unit configured to exclude, from one or more contents to be displayed on a predetermined display as a result of a search of content associated with the keyword obtained by the obtainment unit from the plurality of contents, any content whose provision to a user indicated in the user identification information obtained by the obtainment unit is restricted by an authority set to the keyword obtained by the obtainment unit, wherein
in a case where the keyword obtained by the obtainment unit is a first keyword and the user indicated in the user identification information obtained by the obtainment unit is not given an authority for receiving provision of a first content set to the first keyword, the control unit excludes the first content from content displayed on the predetermined display as results of a search of content associated with the first keyword,
in a case where the keyword obtained by the obtainment unit is a second keyword and the user indicated in the user identification information obtained by the obtainment unit is given an authority for receiving provision of a second content set to the second keyword, where the second content is different from the first content set to the first keyword, the control unit displays, on the predetermined display, one or more contents including the second content as results of a search of content associated with the second keyword,
each of the plurality of contents is an image, and
the first keyword, to which the authority which cannot provide any content to a part or users is set, represents a position with respect to the image.

US Pat. No. 10,248,805

DATABASE SECURITY TOOL

Bank of America Corporati...

1. A database security tool comprising:a user interface configured to receive a request from a user to add a row to a table in a database;
a retrieval engine configured to retrieve, in response to the request, an authorization table from the database, the authorization table separate from the table, the authorization table indicating a plurality of users who are authorized to edit the table;
an authorization engine configured to determine whether the plurality of users includes the user;
an alert engine configured to communicate an alert in response to a determination that the plurality of users does not include the user, the alert indicating that the user is not authorized to add the row to the table;
an update engine configured to communicate, to the database, an update request in response to a determination that the plurality of users includes the user, wherein the row is added to the table in response to the update request;
a data integrity engine configured to determine, for each column of the table, at least one value based on a retrieved datatype of the column, wherein the retrieval engine is further configured to retrieve the datatype for each column; and
a logging engine configured to:
receive an indication that the request was received;
add an entry to a log indicating that the request was received;
receive an indication that the plurality of users includes the user;
add an entry to the log indicating that the addition of the row to the table was authorized;
receive an indication that the row was added to the table; and
add an entry to the log indicating that the row was added to the table.

US Pat. No. 10,248,804

FRAUDULENT APPLICATION DETECTION SYSTEM AND METHOD OF USE

THE ARIZONA BOARD OF REGE...

1. A real-time fraud detection method during data entry in an electronic application filing process by a subject, said method comprising:passively collecting in real-time an electronic input device usage characteristic of a subject during said subject's data entry in an electronic application filing process;
(ii) calculating a confidence score against a baseline model comprised of both the subject's electronic input device usage characteristic data and population input device usage characteristic data; and
(iii) on the basis of the confidence score, determining in real-time a fraud potential of said subject by comparing said subject's electronic input device usage characteristic data with a control electronic input device usage characteristic data.

US Pat. No. 10,248,803

INTERNAL FOLDER SHARING

Intermedia.net, Inc., Mo...

1. A method of sharing a folder in a file system between an owner and a grantee, the method comprising:receiving an indication of a folder to share with a grantee from the owner, the folder to share being a subfolder within a parent folder, the parent folder not shared with the grantee;
storing, with the subfolder itself, sharing permissions indicating a level of access the grantee has to the subfolder;
creating a virtual folder corresponding to the subfolder on a device of the grantee, the virtual folder mapping to all objects within the subfolder and being stored at a level equal to parent folders of a file hierarchy on device of the grantee;
altering permissions of the parent folder to share the parent folder with the grantee; and
creating a virtual folder corresponding to the parent folder on the device of the grantee, the virtual folder corresponding to the parent folder mapping to all objects within the parent folder being stored at a level equal to subfolder on the device of the grantee, without deleting the subfolder on the device of the grantee.

US Pat. No. 10,248,802

DIGITAL RIGHTS MANAGEMENT USING GEOGRAPHIC AND TEMPORAL TRAITS

Adobe Inc., San Jose, CA...

1. In a digital medium environment to control access to at least one item of content by digital rights management functionality embedded as part of the content, a method implemented by a computing device, the method comprising:collecting geographic data describing geographical traits of a location associated with a request received from the user, by the computing device, to access the content;
collecting social network data from at least one social network service associated with the user that originated the request, the social network data describing a location associated with a social network post as part of the at least one social network service;
determining from the data using a digital rights management module embedded as part of the content whether the geographical traits meet specified traits of a geographical behavior of a digital rights management policy enforced by the digital rights management module for the at least one item of the content, the determining including calculating a likelihood that access to the at least one item of content will be compromised at the location associated with the user and verifying the collected geographic data describing the geographical traits of the location using the collected social network data from the at least one social network service describing the location associated with the social network post; and
responsive to a determination that the specified traits are met, permitting access to the least one item of the content, by the embedded digital rights management module, at the geographic location.

US Pat. No. 10,248,801

SYSTEMS AND METHODS FOR ROLE-BASED FILE ACCESS CONTROL

AMERICAN EXPRESS TRAVEL R...

1. A method comprising:writing, by a data storage system, a file to a storage media,
wherein the file contains data, an embedded flag, and an embedded verification datum of the embedded flag,
wherein the embedded flag indicates an access permission requisite for file access;
receiving, by the data storage system, a request to access the file from a user;
retrieving, by the data storage system, the access permission for the user;
comparing, by the data storage system, the embedded flag to the access permission for the user to determine the user has permission to access the file;
calculating, by the data storage system, a verification datum; and
comparing, by the data storage system, the calculated verification datum to the embedded verification datum to determine the embedded flag has not changed.

US Pat. No. 10,248,800

SECURE COMPARISON OF INFORMATION

Openeye Scientific Softwa...

1. A method of comparing a first piece of data from a first party and a second piece of data from a second party without revealing the first and second pieces of data themselves, the method comprising:The first party creates a first fingerprint from the first piece of data;
The second party creates a second fingerprint from the second piece of data;
The first party generates a first GM key with associated first public GM key and private GM key;
The second party generates a second GM key with associated second public GM key and private GM key;
The first party encrypts each bit in the first fingerprint with the first public GM key to create a first encrypted first fingerprint;
The second party encrypts each bit in the second fingerprint with the second public GM key to create a second encrypted second fingerprint;
The first party sends the first public GM key to the second party;
The second party sends the second public GM key to the first party;
The first party encrypts each bit in the first fingerprint with the second public GM key to create a second encrypted first fingerprint;
The second party encrypts each bit in the second fingerprint with the first public GM key to create a first encrypted second fingerprint;
The first party sends the first encrypted first fingerprint to the second party;
The second party sends the second encrypted second fingerprint to the first party;
The first party performs an XOR operation on the second encrypted first fingerprint and the first encrypted second fingerprint, thereby creating a second encrypted fingerprint XOR;
The second party performs an XOR operation on the first encrypted first fingerprint and the first encrypted second fingerprint, thereby creating a second encrypted fingerprint XOR;
The first party scrambles the first encrypted fingerprint XOR, thereby creating a scrambled first encrypted fingerprint XOR;
The second party scrambles the second encrypted fingerprint XOR, thereby creating a scrambled second encrypted fingerprint XOR;
The first party generates a first RSA Keys and associated first public RSA key and private RSA key;
The second party generates a second set of RSA key and associated second public RSA key and private RSA key;
The first party then encrypts each bit in the scrambled first encrypted fingerprint XOR with the first public RSA key, thereby creating a doubly scrambled first encrypted fingerprint XOR;
The second party then encrypts each bit in the scrambled second encrypted fingerprint XOR with the second public RSA key, thereby creating a doubly scrambled second encrypted fingerprint XOR;
The first party sends the doubly encrypted first scrambled fingerprint XOR to the second party;
The second party sends the doubly encrypted second scrambled fingerprint XOR to the first party;
The first party sends the first private RSA key to the second party;
The second party sends the second private RSA key to the first party;
The first party decrypts the doubly encrypted second scrambled fingerprint XOR with the second private RSA key, and counts the number of bits in the scrambled second encrypted fingerprint XOR by further decrypting with the first private GM key, thereby learning the level of similarity between the first and second fingerprints; and
The second party decrypts the doubly encrypted first scrambled fingerprint XOR with the first private RSA key, and counts the number of bits in the scrambled first encrypted fingerprint XOR by further decrypting with the second private GM key, thereby independently learning the level of similarity between the first and second fingerprints.

US Pat. No. 10,248,799

DISCOURAGING SCREEN CAPTURE

Wickr Inc., San Francisc...

1. A system for discouraging screen capture, the system comprising:a processor configured to:
provide a first designated region of a display to a user to allow the user to view a first file;
detect a first location of a first finger of the user in the first designated region of the display;
display the first file when the first finger is held at the first location in the first designated region of the display;
detect a second location of the first finger;
determine whether the second location is located within the first designated region of the display by determining whether a distance between the first location and the second location is greater than a predetermined threshold;
indicate an attempted screen capture by the user when the distance is greater than the predetermined threshold; and
cease displaying the first file in response to the indication of the attempted screen capture by the user and a determination that the second location is outside the first designated region of the display; and
a memory coupled to the processor and configured to provide the processor with instructions.

US Pat. No. 10,248,798

METHOD AND SYSTEM FOR A CONFIDENTIAL SCAN OF A DOCUMENT

Toshiba Tec Kabushiki Kai...

1. A method for confidential scanning of a document in a scanner device, comprising:receiving, by a confidential scan system, a request from a user for a confidential scan of a document through a scanner associated with the confidential scan system;
receiving, by the confidential scan system, first credential data from the user;
authenticating, by the confidential scan system, the user based on the first credential data;
storing, by the confidential scan system, the document as a hidden document which is a confidential scanned document in a predefined path, upon the authentication;
permitting the user to view the confidential scanned document by:
(i) receiving, by the confidential scan system, second credential data from the user;
(ii) receiving, by the confidential scan system, a request from the user to view the confidential scanned document;
(iii) verifying, by the confidential scan system, the second credential data to be the same as the first credential data upon receiving the request; and
(iv) enabling, by the confidential scan system, the user to view the confidential scanned document upon verification when the confidential scanned document is retrieved from the predefined path for viewing; and
providing, by the confidential scan system, access to the user to perform one or more tasks relating to the confidential scanned document upon the verification, wherein the one or more tasks relating to the confidential scanned document include at least one of modifying, deleting, printing, copying, cutting, pasting, or publishing the confidential scanned document,
wherein the publishing of the confidential scanned document comprises disabling hiding of the confidential scanned document in the predefined path.

US Pat. No. 10,248,797

SYSTEMS AND METHODS FOR ZERO-DAY DLP PROTECTION HAVING ENHANCED FILE UPLOAD PROCESSING

SYMANTEC CORPORATION, Mo...

14. A non-transitory computer-readable medium including code for performing a method, the method comprising:capturing file upload context for a scheduled file or folder upload, wherein
capturing the file upload context comprises:
detecting an associated operation for the scheduled file or folder upload, including whether the scheduled file or folder upload corresponds to a single file upload, multi-file upload, folder upload, or a drag-and-drop operation, and wherein detecting the associated operation comprises:
intercepting a shell dialogue Application Programming Interface (API) to detect the single file upload and multi-file upload;
intercepting a browse folder API to detect the folder upload;
intercepting a drop process interface exposed by browser during an instance creation to detect the drag-and-drop operation;
detecting a match between the scheduled file or folder upload and data associated with the shell dialogue API, the browse folder API, and the drop process interface;
extracting metadata, and active Uniform Resource Locator (URL) associated with the scheduled file or folder upload; and
caching folder name, metadata, and active URL to form the file upload context wherein the folder name is cached in a global structure;
sending the file upload context to a DLP filesystem driver;
generating a file upload cache including the file upload context, prior classification entries, and a timestamp indicating when the scheduled file or folder upload was last modified;
intercepting a file open call by the DLP filesystem driver; and
processing the file open call based upon the file upload cache.

US Pat. No. 10,248,796

ENSURING COMPLIANCE REGULATIONS IN SYSTEMS WITH DYNAMIC ACCESS CONTROL

SAP SE, Walldorf (DE)

1. A computer-implemented method for enforcing dynamic access control constraints of a plurality of access control policies, the method being executed using one or more processors and comprising:receiving, by the one or more processors, a set of ordered policies that are ordered according to a policy lattice defining a hierarchy from most restrictive policies to least restrictive policies, the policy lattice combining an access control algorithm, a deny cache storing previously denied requests, and a permit cache storing previous access control requests, the policy lattice enabling access control overriding for a first portion of policies that are controlled in a fine-grained manner and providing an explicit access control specification for a second portion of policies that are enforceable at any time;
determining, by the one or more processors, a set of active policies comprising one or more policies in the set of ordered policies, the set of active policies being used in evaluating an access control request during a particular time period;
determining, by the one or more processors, an access control decision based on at least a first policy in the set of active policies, the access control decision being based on operations comprising:
determining whether one of a permit decision and a deny decision is inherited from a second policy in the set of ordered policies that extends from the first policy in the set of active policies based on the policy lattice, the permit decision being inherited if the second policy is active and the deny decision being inherited regardless whether the second policy is active, and
in response to determining that the permit decision and the deny decision are not inherited from the second policy, evaluating the first policy in the set of active policies based on the policy lattice; and
transmitting, by the one or more processors, the access control decision for enforcement of the access control policy.

US Pat. No. 10,248,794

ENCRYPTION COMPLIANCE VERIFICATION SYSTEM

ALERTSEC, INC., Leesburg...

1. A compliance checker to verify a device complies with a policy, the compliance checker comprising:a compliance checker plug-in installed on the device, the compliance checker plug-in receiving a request for compliance validation;
a compliance checker agent, to initiate the compliance validation, in response to receiving the request;
an encryption checker to verify that the device stores data in an encrypted format, the encryption checker comprising:an encryption checker upper driver above a level of an encryption driver in a storage driver stack, to read data as it is sent to a storage medium from above the encryption driver, andan encryption checker lower driver, below the level of the encryption driver to read the data after it was written to the storage medium, below the encryption driver; and
a comparator to determine whether the data read from the upper driver is identical to data read from the lower driver;
the compliance checker plug-in verifying the compliance status of the device, based on the data from the comparator to report a compliance result.

US Pat. No. 10,248,793

TECHNIQUES AND SYSTEMS FOR DURABLE ENCRYPTION AND DELETION IN DATA STORAGE SYSTEMS

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:in response to receiving a data storage request for data to be stored in a plurality of volumes of durable storage of a data storage system, storing the data by at least:
encrypting the data using an encryption key provided by a key management service to produce encrypted data;
and, redundancy coding, using a redundancy code, at least the encrypted data to generate a bundle of bundle-encoded shards, a quorum quantity of which is sufficient to reconstruct original data associated with the bundle, the bundle of bundle-encoded shards including at least:
an identity shard that contains an original form of the encrypted data, and
encoded shards representing a redundancy coded form of the encrypted data;
and in response to receiving a deletion request to delete the data, rendering the data storage system incapable of producing the data using the identity shards by discarding the encryption key,wherein other data associated with the bundle is recoverable using the identity shard.

US Pat. No. 10,248,791

TECHNOLOGIES FOR SECURE HARDWARE AND SOFTWARE ATTESTATION FOR TRUSTED I/O

Intel Corporation, Santa...

1. A computing device for trusted I/O attestation and verification, the computing device comprising:a hardware processor;
an in-field programmable fuse;
a hardware attestation module, executed by the hardware processor, to (i) collect hardware attestation information associated with one or more statically attached hardware I/O components of the computing device, wherein the hardware I/O components are associated with a trusted I/O usage protected with a cryptographic engine of the computing device, wherein to collect the hardware attestation information comprises to read a platform manifest of the computing device, wherein the platform manifest is indicative of the statically attached hardware I/O components, and (ii) verify the hardware attestation information, wherein to verify the hardware attestation information comprises to verify, by a trusted software component of the computing device, a cryptographic signature of the platform manifest;
a secure enumeration module, executed by the hardware processor, to (i) securely enumerate one or more dynamically attached hardware I/O components of the computing device in response to verification of the hardware attestation information, and (ii) load one or more trusted software components in response to secure enumeration of the one or more dynamically attached hardware I/O components; and
a software attestation module, executed by the hardware processor, to (i) collect software attestation information associated with the trusted software components in response to loading of the trusted software components, wherein the software attestation information is indicative of identity and topology of the trusted software components, and (ii) verify the software attestation information;
wherein to verify the hardware attestation information further comprises to: (i) read, by a trusted system computing agent of the computing device, a platform model identifier from the in-field programmable fuse; (ii) securely transmit, by the trusted system computing agent, the platform model identifier to the trusted software component; and compare, by the trusted software component, the platform model identifier to a second platform model identifier of the platform manifest in response to verification of the cryptographic signature of the platform manifest.

US Pat. No. 10,248,790

INFORMATION PROCESSING SYSTEM, CONTROLLING METHOD, AND CONTROLLING COMPUTER PROGRAM

NIPPON TELEGRAPH AND TELE...

1. An information processing system including a first information processing apparatus that analyzes behavior of malware started up and a second information processing apparatus that transfers received transmission information transmitted from the first information processing apparatus, whereinthe first information processing apparatus comprises:
a memory that stores pieces of data and pieces of tag information assigned to the pieces of data, so as to be kept in correspondence with one another; and
processing circuitry configured to, when the malware transmits data, generate the transmission information containing the transmitted data and tag information assigned to the transmitted data and further transmits the generated transmission information to the second information processing apparatus, and
the second information processing apparatus comprises:
processing circuitry configured to
extract the tag information from the received transmission information; and
determine a transfer destination of the transmission information on a basis of the extracted tag information and further transfers the transmission information to the determined transfer destination,
wherein
the second information processing apparatus further stores tag type information that keeps each of the pieces of tag information in correspondence with a piece of information indicating whether or not a piece of data, to which the piece of tag information is assigned, is permitted to be transferred to an external apparatus, and
the processing circuitry of the second information processing apparatus determines the transfer destination of the transmission information by selecting one from between a simulating Internet network and a real Internet network, by referring to the tag type information.

US Pat. No. 10,248,789

FILE CLUSTERING USING FILTERS WORKING OVER FILE ATTRIBUTES

AVAST SOFTWARE S.R.O., P...

1. A method for classifying a file, the method comprising:determining a file event for a file;
in response to the file event, receiving metadata for an attribute of the file;
in response to receiving the metadata, selecting, based at least in part on the metadata, a filter of a plurality of filters, the plurality of filters comprising a filter layer of a classification network;
executing one or more rules in the selected filter to classify the file as belonging to a cluster of files based on the metadata satisfying the executing one or more rules, the cluster of files sharing one or more metadata characteristics; and
in response to classifying the file, activating, based at least in part on the classification, a queue node of a plurality of queue nodes for taking an action to be performed with respect to the file, the plurality of queue nodes comprising a queue layer of the classification network.

US Pat. No. 10,248,788

DETECTING HARMFUL APPLICATIONS PRIOR TO INSTALLATION ON A USER DEVICE

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for detecting harmful applications prior to installation on a user device, the method comprising:analyzing, by a processing device, a plurality of reviews for a first version of an application and a second version of the application to associate a first subset of the plurality of reviews with the first version of the application based at least in part on a timestamp of the first version of the application and to associate a second subset of the plurality of reviews with the second version of the application based at least in part on a timestamp of the second version of the application;
determining, by the processing device, whether the first version of the application is harmful based on the first subset of the plurality of reviews;
determining, by the processing device, whether the second version of the application is harmful based on the second subset of the plurality of reviews;
responsive to determining that the first version of the application is harmful based on the first subset of the plurality of reviews, preventing a user from installing the first version of the application; and
responsive to determining that the second version of the application is harmful based on the second subset of the plurality of reviews, preventing the user from installing the second version of the application.

US Pat. No. 10,248,787

SYSTEMS AND METHODS FOR DETERMINING REPUTATIONS OF FILES

Symantec Corporation, Mo...

1. A computer-implemented method for determining reputations of files, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:identifying, on an endpoint device, a loadpoint data entry created by a file installed on the endpoint device that directs an operating system of the endpoint device to execute the file during boot up operations of the endpoint device;
determining a reputation of the loadpoint data entry created by the file installed on the endpoint device that indicates a reputation of the file installed on the endpoint device;
detecting, on an additional endpoint device, an attempt to install a suspicious file with a loadpoint data entry at least partially similar to the loadpoint data entry of the file installed on the endpoint device;
determining a reputation of the suspicious file based on the reputation of the loadpoint data entry of the file installed on the endpoint device; and
protecting the additional endpoint device from security threats by performing a security action on the suspicious file based on the reputation of the suspicious file.

US Pat. No. 10,248,786

PLATFORM SECURITY USING PROCESSOR ASSISTS

Intel Corporation, Santa...

1. A platform comprising:a platform resource;
a host processor to execute an operating system (OS) and a guest kernel associated with the OS;
a resource monitor to detect an attempt by the OS to access the platform resource; and
an extension component communicatively coupled to the resource monitor, the extension component to inject, in response to the attempt, an access event into a platform security component, wherein the guest kernel is to respond to the attempt in accordance with a policy response from the platform security component,
wherein the attempt is to be detected with respect to one or more of an extended page table (EPT) permission or a virtual machine exit control set by a security virtual machine monitor (SVMM).

US Pat. No. 10,248,785

APPLICATION MEMORY PROTECTION USING A HOST PAGE TABLE SWITCHING VIRTUAL MACHINE FUNCTION

1. A system comprising:a memory;
one or more processors, in communication with the memory;
a virtual machine, including a guest operating system (OS), executing on the one or more processors; and
a hypervisor executing on the one or more processors,
wherein the one or more processors are configured to:
generate, by the hypervisor, a first page view and a second page view, wherein a guest physical address of the virtual machine points to a first page of the first page view, which is protected, and a second page of the second page view, which is unprotected;
write a first pointer value to the first page of the first page view and a second pointer value to the second page of the second page view;
execute, by the guest OS, a first task;
determine, by the guest OS, whether to switch to a second task;
responsive to a determination to switch from the first task to the second task, read, by the guest OS, a current pointer value pointed to by a guest physical address, wherein the current pointer value is one of the first pointer value and the second pointer value;
responsive to reading the current pointer value, determine, by the guest OS, a current page view based on the current pointer value, wherein the current page view is one of the first page view and the second page view; and
responsive to determining that the current page view is the first page view:
save, by the guest OS, the first pointer value in a first memory of the first task;
load, by the guest OS, the second pointer value from a second memory of the second task; and
execute, by the guest OS, a virtual machine function, wherein the virtual machine function receives the second pointer value as a parameter and, when executed, switches to the second page view.

US Pat. No. 10,248,784

SEQUENTIAL OBJECT SET PASSWORDS

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for authentication, the method comprising:receiving, at a user device, a first object set;
transmitting, to a processing device, a first rearranged object set that represents the first object set rearranged into a first sequential order by the user, the first sequential order being a different order than an order of the first object set;
responsive to the first rearranged object set matching a first known sequential object set, receiving, at the user device, a second object set;
transmitting, to the processing device, an indication that the second object set is a false object set;
responsive to identifying the second object set as a false object set, receiving, at the user device, a third object set;
transmitting, to the processing device, a second rearranged object set that represents the third object set rearranged into a second sequential order by the user, wherein the second sequential order being a different order than an order of the third object set; and
responsive to the second rearranged object set matching a second known sequential object set, receiving, at the user device, access to a restricted resource.

US Pat. No. 10,248,783

METHODS AND SYSTEMS FOR IDENTITY CREATION, VERIFICATION AND MANAGEMENT

THOMSON REUTERS (GRC) LLC...

1. A method of providing identity services, the method comprising:receiving, by an identity system at a first interface from an identity provider system, identity data for an individual for which the identity provider has generated an identity, wherein the identity data is validated by the identity provider;
generating, by the identity system, a transaction to store an identifier representing the identity data in a data structure on a blockchain of a distributed system;
sending the transaction to at least one node of the distributed system;
generating, by the identity system, an identity token incorporating the identifier representing the identity data; and
providing, by the identity system at a second interface to a user system of the individual, the generated identity token to the user system.

US Pat. No. 10,248,782

SYSTEMS AND METHODS FOR ACCESS CONTROL TO WEB APPLICATIONS AND IDENTIFICATION OF WEB BROWSERS

Duo Security, Inc., Ann ...

1. A system for controlling access to a web application server, the system comprising:a remote access control platform being implemented by one or more computing servers having non-transitory computer-readable medium storing computer instructions, that when executed by one or more computer processors perform one or more steps including:
receiving, from a requesting web browser, an access request for accessing a web application of a web application computing server;
in response to receiving the access request:
establishing a browser identification assessment session between the requesting web browser and the remote access control platform;
generating a browser identification inspector based on browser identifying data supplied by the requesting web browser, wherein generating the browser identification inspector includes selecting a combination of browser identification tests from a browser identification test bank;
transmitting the generated browser inspector to the requesting web browser for execution, wherein during an execution of the browser identification inspector at the requesting web browser, the browser identification inspector collects runtime environment data of the requesting web browser using the combination of browser identification tests and transmits the collected runtime environment data to the remote access control platform;
using the collected runtime environment data of the requesting web browser as input into a browser identifier module that:
(i) estimates a browser version and a browser type of the requesting web browser,
(ii) determines a browser identification sub-confidence score for each of the combination of browser identification tests, and
(iii) determines an overall browser identification confidence score based on aggregating the browser identification sub-confidence scores from the combination of browser identification tests; and
granting or denying access to the web application based on (a) the estimated browser version and the browser type of the requesting web browser and (b) the overall browser identification confidence score.

US Pat. No. 10,248,781

METHOD OF PASSCODE UNLOCK USING FORCE DETECTION

BlackBerry Limited, Wate...

1. A method comprising:providing, with an electronic device, a prompt requesting entry of a passcode having a reference set of sequential numerical fields stored in memory in the electronic device, a successful entry of the passcode toggling a user interface of the electronic device from a locked state to an unlocked state;
sequentially unlocking one at a time each sequential numerical field in the reference set of sequential numerical fields of the passcode by performing the following with a processor in the electronic device:
selecting each sequential numerical field in the reference set of sequential numerical fields;
detecting a level of external input pressure force imparted onto a touch location on an outer surface of the electronic device, in which the detected level of external input pressure force is detected as a press and hold gesture on the outer surface;
driving, with the processor and based on the detected level of input pressure force, a haptic feedback actuator mechanically coupled to the outer surface to communicate outwardly from the touch location a series of pulsed vibratory signals;
advancing a counter from a start value by one for each pulsed vibratory signal in the series of pulsed vibratory signals that is communicated outwardly from the touch location;
halting the communicating of the series of pulsed vibratory signals to the touch location on the outer surface in response to sensing the press and hold gesture is released;
comparing, in response to sensing the press and hold gesture is released, a numerical value of the counter with a numerical value of the currently selected sequential numerical field in the reference set of sequential numerical fields; and
if the numerical value of the counter matches the numerical value of the currently selected sequential numerical field then selecting a subsequent sequential numerical field in the reference set of sequential numerical fields, initializing the counter to the start value, and repeating the above steps for each subsequent sequential numerical field, until the numerical value of each and every subsequent sequential numerical field has been compared with, and matches, a respective numerical value of the counter; and
sending an unlock signal to toggle the user interface of the electronic device from a locked state to an unlocked state in response to the numerical value of each and every subsequent sequential numerical field having been compared with, and matching, a respective numerical value of the counter; and
wherein providing a haptic effect comprises providing a set of pulsed vibration signals, each pulsed vibration signal comprising a pulsed vibration cycle of a pulsed vibration signal immediately followed by no vibration signal; and
wherein the pulsed vibration cycle has a cycle duration that varies based on detecting a varying level of input pressure force imparted onto the touch location on the outer surface of the electronic device.

US Pat. No. 10,248,780

METHOD AND DEVICE FOR SECURING AN OBJECT, CORRESPONDING CONTROL METHOD AND DEVICE SECURED OBJECT

1. Device for securing an object, comprising:an input component to input a digital file representing a photograph that represents at least one portion of the object;
an image processor for extracting from the digital file, characteristic elements of the photograph by applying image processing, said characteristic elements including biometric data;
an encoder to encode the characteristic elements of the photograph into a matrix code; and
a printer to print the matrix code on or in the object;
wherein the encoder encodes a message in a copy-protection mark, and the matrix code printed by the printer comprises a zone representative of the copy-protection mark.

US Pat. No. 10,248,779

MOBILE TERMINAL, SMART WATCH, AND METHOD OF PERFORMING AUTHENTICATION WITH THE MOBILE TERMINAL AND THE SMART WATCH

LG ELECTRONICS INC., Seo...

1. A smart watch comprising:a display unit;
a sensor mounted in a bottom of a smart watch; and
a controller configured to:
measure a heartbeat rhythm using the sensor when an authentication request signal for an application displayed on an external apparatus is detected, wherein the external apparatus is interworked with the smart watch,
perform an authentication for the application by comparing the measured heartbeat rhythm with a stored heartbeat rhythm, and
transmit a result of the authentication to the external apparatus so that the external apparatus can execute the application,
wherein the external apparatus is further configured to:
detect a grip type in which a user holds a mobile terminal in one hand or both hands,
automatically measure the heartbeat rhythm using the sensor when a stored specific grip type is detected,
perform a user authentication by comparing the measured heartbeat rhythm with a stored heartbeat rhythm, and
display a function screen that is frequently used in the detected specific grip type when the authentication is completed,
wherein the function screen includes at least one a website, a game site, a bank website, and a cloud image folder, and
wherein the controller is further configured to:
execute a different operational mode according to the detected specific grip type and which finger touches on the mobile terminal.

US Pat. No. 10,248,778

METHOD FOR IMPROVING UNLOCKING SPEED AND MOBILE TERMINAL

Guangdong Oppo Mobile Tel...

1. A method for improving unlocking speed, applicable to a mobile terminal in a screen-off state and equipped with a metal dome array, comprising:executing a first thread when a current unlock mode of the mobile terminal is press-to-trigger fingerprint unlock in the screen-off state, and executing a second thread during the execution of the first thread; wherein the first thread comprises: receiving an operation instruction when a user touches a fingerprint module, acquiring a fingerprint image, comparing the fingerprint image acquired with a preset fingerprint image, and unlocking after a successful match; wherein the second thread comprises: receiving an operation instruction when the user presses the metal dome array, and waiting for unlocking success and then lighting up a display screen;
prior to lighting up the display screen,
determining whether the mobile terminal has currently turned on light sensing and color temperature detection;
turning off the light sensing and the color temperature detection and invoking light sensation data and color temperature data used last time for lighting up the display screen of the mobile terminal, to light up the display screen of the mobile terminal, based on a determination that the mobile terminal has currently turned on the light sensing and the color temperature detection; and
using a moment that the display screen is lit up as a moment of completion of unlocking.

US Pat. No. 10,248,776

BACKGROUND ENROLLMENT AND AUTHENTICATION OF A USER

Apple Inc., Cupertino, C...

1. A method for authenticating a user of an electronic device that includes a biometric sensing device, the method comprising:capturing, as part of background operations of the electronic device, a first biometric as the user interacts with the electronic device;
receiving user identification data (UID) from the user as the user interacts with the electronic device;
if the first biometric and the UID are received within a given time period of each other:
tagging the first biometric with the UID; and
assigning the tagged first biometric to a cluster, wherein the cluster comprises one or more biometrics associated with a respective biometric attribute of the user;
capturing a second biometric as the user interacts with the electronic device;
determining if the second biometric matches at least one biometric in the cluster; and
providing the user with access to the electronic device or to an application on the electronic device in response to determining that the second biometric matches at least one biometric in the cluster.

US Pat. No. 10,248,775

MANAGING LATENCY AND POWER IN A HETEROGENEOUS DISTRIBUTED BIOMETRIC AUTHENTICATION HARDWARE

QUALCOMM Incorporated, S...

1. A method of managing latency and power in a biometric authentication system, comprising:receiving a biometric image information on a first processor and a second processor, wherein a processing capability of the first processor is greater than the processing capability of the second processor;
configuring the first processor to operate in a high speed mode;
determining a feature extraction result and a feature matching result with the first processor operating in the high speed mode, wherein the feature matching result is based on a comparison of the received biometric image information and a previously stored biometric template;
providing the feature extraction result and the feature matching result to the second processor;
configuring the first processor to operate in a default mode, wherein the processing capability of the first processor while in the default mode is less than it is while in the high speed mode; and
determining an authentication score with the second processor, wherein the authentication score is based at least in part on the feature matching result determined on the first processor.

US Pat. No. 10,248,774

METHOD FOR CONTROLLING UNLOCKING AND MOBILE TERMINAL

Guangdong Oppo Mobile Tel...

1. A method for controlling unlocking, comprising:receiving fingerprint data;
increasing a dominant frequency of a processor of a mobile terminal;
matching the received fingerprint data based on the increased dominant frequency; and
unlocking the mobile terminal when the received fingerprint data is matched.

US Pat. No. 10,248,773

VEHICLE SECURITY ACCESSORY AND METHODS OF IDENTITY AUTHENTICATION

GENTEX CORPORATION, Zeel...

1. An accessory configured to authenticate a transaction, the accessory comprising:a communication circuit configured to communicate with transaction system;
at least one sensor mounted in connection with the vehicle and configured to collect verification data indicative of authentication of the transaction with the transaction system; and
a processor in communication with the communication circuit and the at least one sensor, wherein the processor is configured to:
communicate the verification data received from the at least one sensor to a transaction verification server as a first authentication;
receive an authentication of the transaction from the transaction system, wherein the authentication comprises coded light data received by the at least one sensor; and
communicate a verification of the receipt of the coded light data as a second authentication, wherein the first authentication and the second authentication are used in combination validating the transaction based on the verification data and the coded light data.

US Pat. No. 10,248,772

SECURE COMMUNICATION BETWEEN A VIRTUAL SMARTCARD ENCLAVE AND A TRUSTED I/O ENCLAVE

McAfee, LLC, Santa Clara...

1. A hardware machine readable medium comprising instructions that when executed cause a machine to:transmit, from a first trusted execution environment operatively connected to a biometric capture device, a request for a biometric match claim;
receive, in response to the request for the biometric match claim, biometric data from the biometric capture device;
perform, by the first trusted execution environment, a match of the biometric data against biometric templates stored in the first trusted execution environment;
verify, with a report including a signed piece of data transmitted by a second trusted execution environment via a credential manager application operating in a third execution environment, an authorization of the first trusted execution environment, wherein the second trusted execution environment is sealed; and
in response to the verification of the first trusted execution environment, unseal the second trusted execution environment based on the match of the biometric data performed by the first trusted execution environment, wherein the second trusted execution environment includes a virtual smartcard including cryptographic data specific to a user corresponding to the biometric data, and wherein the first trusted execution environment is independent from the second trusted execution environment.

US Pat. No. 10,248,771

PERFORMING BIOMETRICS OPERATIONS IN UNCONTROLLED ENVIRONMENTS

MicroStrategy Incorporate...

1. A system comprising:a data store for storing data; and
one or more computing devices comprising one or more processors configured to interact with the data store, the one or more computing devices being further configured to perform operations comprising:
receiving an enrollment biometric identifier of a user in an environment;
receiving data indicating an environmental condition occurring in the environment of the user at a time the enrollment biometric identifier was obtained from the user;
determining a matching threshold based on a characteristic of the enrollment biometric identifier of the user;
storing, in the data store and in association with the enrollment biometric identifier, the data indicating the environmental condition occurring in the environment of the user at the time the enrollment biometric identifier was obtained from the user, the data indicating the environmental condition being stored in an enrollment profile for the user; and
storing, in the data store and in association with the enrollment biometric identifier, the matching threshold in the enrollment profile for the user.

US Pat. No. 10,248,770

UNOBTRUSIVE VERIFICATION OF USER IDENTITY

Sensory, Incorporated, S...

1. A method comprising:creating, by a computing device, a first verification model for a user, the first verification model being based upon enrollment data that is collected via an explicit enrollment procedure and including a first set of biometric data for verifying an identity of the user;
verifying, by the computing device, the identity of the user a first time using the first verification model;
unobtrusively collecting, by the computing device, one or more reliable data streams associated with the user, wherein the one or more reliable data streams are collected while the identity of the user is verified the first time using the first verification model;
unobtrusively creating, by the computing device, a second verification model for the user, wherein the second verification model is based upon the one or more reliable data streams that are collected while the identity of the user is verified the first time using the first verification model, wherein the second verification model includes a second set of biometric data for verifying the identity of the user, and wherein the second set of biometric data included in the second verification model comprises biometric data of a different type than the first set of biometric data included in the first verification model;
unobtrusively collecting, by the computing device, one or more verification data streams from the user, the one or more verification data streams being separate from the enrollment data used to create the first verification model, and the one or more reliable data streams used to create the second verification model; and
verifying, by the computing device, the identity of the user a second time by applying the one or more verification data streams to the first and second verification models, wherein verifying the identity of the user the second time comprises:
receiving, by the computing device, a first verification result generated by a server remote from the computing device, the first verification result being generated by the server based on instances of the first and second verification models stored on the server;
comparing, by the computing device, the first verification result with a second verification result generated by the computing device based on instances of the first and second verification models stored on the computing device; and
if the first verification result generated by the server is consistent with the second verification result generated by the computing device, authorizing the user to perform a secured action on the computing device.

US Pat. No. 10,248,769

SYSTEMS AND METHODS FOR AUTHENTICATING USERS ON TOUCHSCREEN DEVICES

Symantec Corporation, Mo...

1. A computer-implemented method for authenticating users on touchscreen devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:detecting that the computing device is at an authentication step that requires valid authentication input from a user of the computing device in order to authenticate the user to a service on the computing device, wherein the computing device has a single touchscreen comprising a numerical keypad;
detecting that the computing device is physically oriented such that the touchscreen of the computing device is facing away from the user and facing downwards towards a surface relative to the user;
receiving input from the user via the touchscreen when the touchscreen is facing downwards towards the surface relative to the user;
determining that the input from the user comprises a mirrored version of the valid authentication input that is flipped along a vertical axis relative to the touchscreen; and
authenticating the user to the service in response to determining that the input was received from the user while the touchscreen was facing away from the user and downwards towards the surface relative to the user and determining that the input comprises the mirrored version of the valid authentication input.

US Pat. No. 10,248,768

METHODS AND SYSTEMS FOR PROCESSING CONTENT RIGHTS

Comcast Cable Communicati...

1. A method comprising:receiving, from a license generation service of a plurality of license generation services, a request for an access decision associated with content, wherein the license generation service of the plurality of license generation services is associated with a license generation of a particular format;
determining, based on a compatibility between the content and the particular format and one or more requirements associated with at least one of the content, a user device, or a user associated with the user device, the access decision;
transmitting the access decision to the license generation service of the plurality of license generation services, wherein the access decision facilitates generating a license by the license generation service of the plurality of license generation services when the access decision indicates a granting of access rights, and wherein the access decision facilitates generating a denial of the license by the license generation service of the plurality of license generation services when the access decision indicates a denial of access rights; and
wherein the plurality of license generation services are remotely located from the user device.

US Pat. No. 10,248,767

LEVERAGING A UNIFICATION OF CONTENT HOSTING AND SOCIAL NETWORKING

Google LLC, Mountain Vie...

1. A method for accessing content, the method comprising:determining, using a hardware processor, that media content in a content request received from a first user account associated with a first user is designated as premium media content in which access privileges are needed to access the media content and that the first user account is not associated with the access privileges;
determining, using the hardware processor, that a relationship exists between the first user account associated with the first user and a plurality of additional user accounts associated with other users;
in response to determining that a relationship exists between the first user account associated with the first user and the plurality of additional user accounts associated with the other users, determining, using the hardware processor, whether a second user account associated with a second user from the plurality of additional user accounts has the access privileges needed to access the premium media content; and
causing, using the hardware processor, the premium media content to be presented on a device associated with the first user account associated with the first user in response to the second user account associated with the second user extending the access privileges to the first user account.

US Pat. No. 10,248,766

SIMULATION METHOD AND ANALYZING DEVICE

SUMITOMO HEAVY INDUSTRIES...

1. An analyzing device for simulating of a flow of particles in a virtual space, the analyzing device comprising:disturbance source data storage means configured to electronically store data for a source of a disturbance in the flow of the particles in the virtual space and data for a source of generation of a vortex that is caused by the flow of the particles in the virtual space;
particle data storage means configured to electronically store positions of the particles in the virtual space and velocities of the particles in the virtual space;
constraint assigning means configured to electronically assign a constraint to the particles so as to simulate the flow of the particles in the virtual space, the constraint including an initial velocity assigned to each of the particles so that the particles in the virtual space move in a direction of the flow;
numerical computation means configured to electronically, after the constraint to the particles is assigned by the constraint assigning means, compute a governing equation that governs the motion of said each of the particles; and
display control means configured to electronically control a display, on a display device, the flow of the particles in the virtual space and the vortex that is caused by the flow of the particles in the virtual space,
wherein the numerical computation means, by referring to the disturbance source data storage means and the particle data storage means, electronically identifies the particles that are linked with the source of the disturbance in the flow of the particles in the virtual space, and
wherein the particles displayable on the display device that the numerical computation means has identified as being linked with the source of the disturbance in the flow in the virtual space are distinguishable on the display device from others of the particles that are displayable on the display device.

US Pat. No. 10,248,765

SYSTEMS, DEVICES, AND METHODS FOR BODILY FLUID SAMPLE COLLECTION, TRANSPORT, AND HANDLING

Theranos IP Company, LLC,...

1. A method for use with a bodily fluid sample from a subject, the method comprising:shipping a plurality of sample containers from a first location to a second location, wherein each of said sample containers contains a microsample of about 500 uL or less and wherein interior volume of each of the sample containers is about 600 uL or less,
wherein shipping of the plurality of samples containers is accomplished using a first frame sized to fit in a shipping container, said first frame comprises a plurality of openings each sized and shaped to engage at least one of the sample containers and hold the sample containers in a desired orientation;
obtaining data from each of the sample containers;
providing a plurality of processing frames at the second location;
using said data from the sample containers to determine which of said processing frames receive which of said sample containers and provide sorting information for the sample containers; and
moving said sample containers from the shipping frame to the processing frame based on data provided by the sample containers and based on said sorting information; and
handling the processing frame to simultaneously process the sample containers in the processing frame.

US Pat. No. 10,248,764

SYSTEM AND METHODS FOR PERFORMING MEDICAL PHYSICS CALCULATIONS

STC.UNM, Albuquerque, NM...

1. A method of determining distributions of energy deposition and fluence due to ionizing radiation comprising the steps of:accessing a distributed processing framework connecting a medical provider network;
uploading from the medical provider network to the distributed processing framework a Monte Carlo task comprising calculation parameters including a patient anatomy and a beam configuration;
determining by a master node of the distributed processing framework a number of virtual nodes required for the Monte Carlo task, wherein the number of virtual nodes includes one or more additional virtual nodes determined by a threshold amount;
distributing by the master node to each virtual node the calculation parameters;
performing by each virtual node a portion of a Monte Carlo calculation using the calculation parameters to compute a dose calculation result;
meeting a threshold value by the number of virtual nodes that completes the Monte Carlo calculation;
using a linear model to aggregate by the master node all dose calculation results from each virtual node to obtain a final dose calculation result comprising a distribution of energy deposition;
storing the final dose calculation result in a data storage of the distributed processing framework; and
communicating by the distributed processing framework to the medical provider network the final dose calculation result.