US Pat. No. 10,140,613

SYSTEMS AND METHODS FOR CONVERTING ACCOUNT PORTFOLIOS FROM ONE PROCESSING NETWORK TO ANOTHER

MASTERCARD INTERNATIONAL ...

1. A computer-implemented method for translating account data during a transaction initiated by a cardholder using a payment card, the method implemented using a translation service (TS) computing device in communication with a processor and a memory, the method comprising:storing first account data in the memory along with a corresponding translation identifier, the first account data associated with a first payment processing network (PPN) that processes transactions initiated using the first account data;
receiving, by the TS computing device from a second PPN, an authorization request message including transaction data associated with the transaction initiated by the cardholder, the transaction data including second account data associated with the payment card and with the second PPN, which processes transactions initiated using the second account data, wherein the first PPN and the second PPN are different, the second account data including the translation identifier;
detecting, by the TS computing device, the translation identifier in the second account data;
translating, by the TS computing device, in response to said detecting, the second account data to the first account data by performing a lookup within the memory using the translation identifier;
generating, by the TS computing device, a translated authorization request message including the transaction data and the first account data; and
transmitting, by the TS computing device over the second PPN, the translated authorization request message to an issuer bank for use by the issuer bank for authorization of the transaction with the first account data and without processing by the first PPN.

US Pat. No. 10,140,611

ELECTRONIC DEVICE WITH LIGHT-GENERATING SOURCES TO ILLUMINATE AN INDICIUM

Amazon Technologies, Inc....

1. A system providing temporary third-party access to an account of a user, the system comprising:a host computing device including memory and one or more processors, the host computing device maintaining the account of the user and an electronic marketplace of a third-party merchant, wherein the host computing device enables an agent of the third-party merchant to conduct a transaction with the third-party merchant on behalf of the user using the account of the user and without creating a different account; and
an agent device operable by an agent of the third-party merchant; and
wherein the host computing device includes computer-executable instructions maintained in the memory which, when executed by the one or more processors, performs operations comprising:
receiving, from a user device, a first request to transact with the third-party merchant using the electronic marketplace;
authenticating the user to access the account of the user;
establishing, via a marketplace application installed on the user device, a communication session between the user device and the agent device;
receiving, via the marketplace application, a second request to generate a token, wherein the second request includes parameters indicating one or more actions performable by the agent on behalf of the user, and wherein the token authorizes the agent device to access the account of the user;
generating, based at least in part on receiving the second request, the token;
associating the parameters with the token;
transmitting the token to at least one of the user device or the agent device;
receiving, from the agent device, a third request to access the account of the user, the third request including at least the token;
verifying an authenticity of the token;
receiving, via the marketplace application and based at least in part on verifying the authenticity of the token, at least one action of the one or more actions from the agent device, the at least one action based at least in part on information conveyed from the user to the agent during the communication session, the at least one action satisfying the parameters;
receiving, from the user device, a confirmation authorizing the at least one action; and
performing, based at least in part on receiving the confirmation, the at least one action.

US Pat. No. 10,140,610

CUSTOMER TOKEN PREFERENCES INTERFACE

Bank of America Corporati...

1. A computerized method for token management, the method comprising:initiating presentation on a graphical user interface, by a processor, of a digital wallet management interface, comprising:
initiating presentation of a digital wallet;
initiating presentation of an original multi-use token on the graphical user interface, wherein initiating the presentation of the original multi-use token further comprises presenting at least one indication of association between the original multi-use token and the digital wallet;
initiating presentation of a travel toggle switch comprising a first position and a second position and associated with the original multi-use token and configured for graphical manipulation by a user between the first position and the second position,
wherein the first position corresponds to the user not traveling and the original multi-use token being available for use as a payment credential; and
wherein the second position corresponds to the user traveling and the original multi-use token being unavailable for use as a payment credential;
determining that the user is not traveling;
in response to determining that the user is not traveling, automatically deactivating the travel toggle switch so the user cannot manipulate the travel toggle switch;
determining that the uses is traveling;
in response to determining that the user is traveling, automatically activating the travel toggle switch so the user can manipulate the travel toggle switch between the first position and the second position;
determining that the user has moved the travel toggle switch from the first position to the second position;
in response to determining that the user has moved the travel toggle switch from the first position to the second position, deactivating the original multi-use token and issue a new multi-use token to the digital wallet; and
when the travel toggle switch is moved from the second position to the first position, deactivating the new multi-use token and issuing a second new multi-use token to the digital wallet.

US Pat. No. 10,140,609

INTEGRATED POINT OF SALE (POS) MOBILE DEVICE AND METHODS OF MANUFACTURE

1. An integrated point of sale (POS) mobile device comprising:a mobile-device processor;
a secure payment processor;
a memory, coupled to the mobile device-processor and the secure payment processor, for storing executable instructions that comprise a mobile-device payment system and a set of payment data;
a glass film film (GFF) touch sensor, wherein the GFF touch sensor can be driven by a secure-touch integrated circuit (IC) that encrypts any touch data going to the secure payment processor;
a cover glass over the GGF touch sensor;
a display;
under the cover glass and around the display, an NFC Antenna loop;
an EMV (Europay, MasterCard, and Visa) card reader system;
an NFC (Near field communication) reader system;
a Magnetic stripe reader (MSR);
housing comprising the mobile-device processor, the secure payment processor, the memory, the EMV (Europay, MasterCard, and Visa) card reader system, the NFC (Near field communication) reader system, the Magnetic stripe reader (MSR);
an MSR card slot;
an EMV card slot;
a mobile-device payment system receiving input from the EMV card reader system, the MSR system, and the NFC reader system;
a security mesh securing the secure payment processor and the EMV card reader such that the security mesh must be removed to access the EMV card reader or the secure payment processor, wherein the security mesh causes the memory to delete the payment data when a current passing through the security mesh is interrupted, and wherein any data related to the EMV card reader system, the NFC reader system, and the MSR system is deleted from the memory and the security payment processor when the current passing through the security mesh is interrupted.

US Pat. No. 10,140,607

MUTUAL MOBILE AUTHENTICATION USING A KEY MANAGEMENT CENTER

VISA INTERNATIONAL SERVIC...

1. A method of authentication, comprising:receiving, by a mobile application on a consumer device from a mobile gateway, a challenge message, the challenge message being sent in response to a communication request message sent from the consumer device to the mobile gateway;
sending, by the consumer device to the mobile gateway, a challenge response message in response to the challenge message, the mobile gateway verifying the challenge response message using a key management center by at least verifying a mobile application identifier associated with the mobile application is valid, wherein the key management center is configured to manage session keys for communication with the consumer device, and wherein the key management center allows a communication transaction between a first entity and the consumer device upon determining that the challenge response message is valid; and
receiving, by the consumer device from the mobile gateway, a secure channel response message including a session key that enables communication between the first entity and the consumer device.

US Pat. No. 10,140,606

DIRECT PERSONAL MOBILE DEVICE USER TO SERVICE PROVIDER SECURE TRANSACTION CHANNEL

MASTERCARD MOBILE TRANSAC...

1. A method comprising:issuing with a transaction server a first one-time activation code (OTAC) to a user;
receiving with the transaction server a message from a mobile device executing an electronic transaction facility, the mobile device operated by the user, the message comprising a plurality of keys generated on the mobile device and the first OTAC, wherein the first OTAC is entered by the user into the mobile device during a registration process with the transaction server;
authenticating the mobile device and associating the mobile device with the user based on the received message;
updating credentials of a service provider on the mobile device with the transaction server and forwarding credentials of the mobile device to the service provider, thereby providing secure communication directly between the user via the mobile device and the service provider; and
authenticating with the service provider the user of the mobile device, wherein the user is authenticated by verifying a second OTAC sent to the user from the service provider and then received directly from the mobile device after being encrypted on the mobile device using the updated credentials of the service provider.

US Pat. No. 10,140,605

MONITORING THE DOCKING STATES OF PORTABLE PAYMENT TERMINALS IN MOBILE POINT-OF-SALE (MPOS) SYSTEMS

Toshiba Global Commerce S...

1. A computer-implemented method comprising:detecting that a Portable Payment Terminal (PPT) device is undocked from a tablet device in a Point-of-Sale (POS) system;
monitoring a length of time that the PPT device remains undocked from the tablet device; and
if the PPT device remains undocked from the tablet device for a predetermined length of time:
switching an operating mode of the tablet device from a normal mode to an error mode, wherein switching to the error mode comprises disabling one or more functions of the tablet device that are enabled when the tablet device is operating in the normal mode; and
sending an alert notification to a the user indicating that the tablet device has entered the error mode.

US Pat. No. 10,140,604

POINT OF SALE DEVICE WITH MULTIPLE PROCESSORS

SQUARE, INC., San Franci...

1. A point of sale (POS) system that facilitates a transaction between a customer and a merchant, the system comprising:a housing;
a battery disposed within the housing;
a non-transitory computer-readable storage medium that stores instructions and is disposed within the housing;
a secure internal enclosure disposed within the housing;
a main processor disposed outside of the secure internal enclosure and within the housing, wherein execution of the instructions by the main processor runs a financial transaction software application over an operating system, thereby causing the main processor to render a graphical user interface associated with the financial transaction software application, wherein the main processor receives encrypted data from one or more secure processors;
a display screen disposed outside of the secure internal enclosure and at least partially within the housing, wherein the display screen displays the graphical user interface rendered by the main processor;
a transaction object reader disposed at least partially within the secure internal enclosure, wherein the transaction object reader reads transaction data from a transaction object and provides the transaction data to the one or more secure processors;
the one or more secure processors distinct from the main processor and disposed within the secure internal enclosure, wherein the one or more secure processors generate the encrypted data by encrypting at least the transaction data and a touch-based-input;
tamper detection circuitry disposed within the secure internal enclosure, the tamper detection circuitry configured to detect an attempt to tamper with the secure internal enclosure and to inform the one or more secure processors of the attempt to tamper with the secure internal enclosure;
touch-sensitive layer circuitry distinct from the main processor and the one or more secure processors and the display screen, the touch-sensitive layer circuitry associated with the display screen, the touch-sensitive layer circuitry receiving the touch-based input, the touch-sensitive layer circuitry disposed at least partially within the secure internal enclosure, the touch-sensitive layer circuitry configured to send the touch-based input to the one or more secure processors; and
a network communication transceiver that transmits the transaction data to a transaction processing server and is disposed at least partially within the housing.

US Pat. No. 10,140,603

FINANCIAL TRANSACTION PROCESSING WITH DIGITAL ARTIFACTS AND MULTIPLE PAYMENT METHODS USING A SERVER

Michelle Fisher, Berkele...

1. A method for processing a contactless payment transaction, comprising:maintaining, at a remote management server, a plurality of payment methods;
receiving at the remote management server a payment account identifier from a point of sale terminal over a third communication channel, wherein the point of sale terminal receives the payment account identifier over a second communication channel that utilizes contactless communication from a payment application, wherein the payment application receives the payment account identifier selected from a plurality of payment account identifiers through user input via a mobile device display, the payment application maintaining the payment account identifier in a mobile device memory included in a mobile device, wherein the payment application is not browser based and is a mobile operating system platform based mobile application with a graphical user interface that is preinstalled or downloaded and installed on the mobile device, the mobile device comprising the mobile device display, a mobile device processor, a mobile device wireless interface that utilizes at least one of CDMA, GSM, or WIFI, wherein a first communication channel, the second communication channel and the third communication channel are all different;
processing at the remote management server the contactless payment transaction using a payment method corresponding to the payment account identifier; and
after the contactless payment transaction has been processed by the remote management server, transmitting, over the first communication channel, a digital artifact from the remote management server to the payment application for storage on the mobile device and display within a specific payment application generated screen, wherein the digital artifact is displayed using the mobile device display, wherein the specific payment application generated screen corresponds to a specific screen or area of the payment application.

US Pat. No. 10,140,602

DRIVE-THRU / POINT-OF-SALE AUTOMATED TRANSACTION TECHNOLOGIES AND APPARATUS

1. A method for delivery of a food product, the method comprising:receiving into a server comprising a processor and a memory storing executable code from a scanner located on site of a food preparation facility, an encoded unique transaction code comprising encoded information including a user identification, an order description, and a payment status; and
based upon receipt of the encoded unique transaction code, remotely operate a dispenser comprising a plurality of bins configured for storage of food items to dispense one or more stored food items;
receiving via wireless transmission a list of a plurality of users which may participate in a group order comprising multiple food items;
transmitting a communication to the plurality of users, wherein the communication offers an ordering session to the plurality of users;
receiving a digital communication comprising respective orders from two or more of the users the respective orders comprising food items;
transmitting a status of the group order to a first user;
placing the food items comprising the group order in one or more designated bins of the dispenser;
communicating a barcode image to the first user, wherein the barcode image comprises information for the user to interact with the dispenser and receive the food items of the group order from the one or more designated bins;
receiving a scan of the barcode from a scanner proximate to the dispenser; and
dispensing the food items comprising the group order from the one or more designated bins based upon the receiving of the scan of the barcode.

US Pat. No. 10,140,601

PORTABLE ELECTRONIC DEVICE SALES, PROVISIONING, AND USER CARE VENDING KIOSK

ACCENTURE GLOBAL SOLUTION...

1. A portable electronic device sales, provisioning, and user care apparatus comprising:a transaction manager, executed by at least one hardware processor, to
authenticate a user associated with a user portable electronic device;
a user portable electronic device connector, executed by the at least one hardware processor, to
implement communication with the user portable electronic device upon connection of the user portable electronic device connector to a portable electronic device receptacle of the user portable electronic device,
transfer, based on the connection and the authentication of the user associated with the user portable electronic device, data from the user portable electronic device to a data storage, and
transfer, based on the connection and the authentication of the user associated with the user portable electronic device, configurations associated with the user portable electronic device to the data storage;
a graphical user interface, executed by the at least one hardware processor, to
display options to purchase or upgrade to a new portable electronic device;
a new portable electronic device configuration manager, executed by the at least one hardware processor, to
receive selection of a new portable electronic device from a display of at least one new portable electronic device, wherein the at least one new portable electronic device is of a similar model type as the user portable electronic device and represents an upgrade of the user portable electronic device; and
a user upgrade eligibility analyzer, executed by the at least one hardware processor, to
determine an eligibility of the user to upgrade to the at least one new portable electronic device,
in response to a determination that the user is eligible to upgrade to the at least one new portable electronic device, identify the at least one new portable electronic device as being eligible for the upgrade, and
in response to a determination that the user is not eligible to upgrade to the at least one new portable electronic device, identify the at least one new portable electronic device as being ineligible for the upgrade, wherein
the new portable electronic device configuration manager that is executed by the at least one hardware processor is to
configure, in response to the determination that the user is eligible to upgrade to the at least one new portable electronic device, the selected new portable electronic device by
 transferring, from the data storage, the data from the user portable electronic device to the selected new portable electronic device, and
 transferring, from the data storage, the configurations associated with the user portable electronic device to the selected new portable electronic device.

US Pat. No. 10,140,600

SYSTEM AND METHOD FOR MOBILE PEER AUTHENTICATION AND ASSET CONTROL

LIVEENSURE, INC., Westmi...

1. A computer-aided method for peer asset authentication and asset control, the steps comprising:providing a server application;
prompting a user to select a share on a first computing device, such that a selected share is created;
prompting said user to configure said selected share with one or more authentication factors on said first computing device, such that a configured and selected share is created;
receiving said configured and selected share from said first computing device by said server application;
returning a secured share link to said first computing device;
sharing said secured share link with one or more second computing devices of one or more recipients via one or more electronic transmissions;
accepting by said server application one or more authentication engagements by said one or more recipients to determine if one or more recipients are authenticated to have access to said configured and selected share in said secured share link;
comparing said one or more authentication engagements to said one or more authentication factors by said server application; and
providing an access to said configured and selected share to said one or more recipients whose said one or more authentication engagements match up with said one or more authentication factors, said access provided on said one or more second computing devices;
wherein said secured share link is configured to only be accessible by said one or more recipients via a synchronicity, such that at least two of said one or more recipients are required by said server application be mutually and synchronously engaged with the secured share link.

US Pat. No. 10,140,599

METHODS AND SYSTEMS FOR PROCESSING ELECTRONIC TRANSACTIONS AND MANAGING VEHICLE COSTS

MASTERCARD INTERNATIONAL ...

1. A computer-implemented method for monitoring vehicle expenses using a payment processing computer coupled to a database, said method comprising:receiving, by the payment processing computer, an authorization request message, wherein the authorization request message includes a vehicle identifier for identifying a vehicle, account data associated with a cardholder associated with the vehicle, and first purchase data associated with a first purchased item, wherein the first purchased item is a first vehicle related expense for at least one of operating and maintaining the vehicle;
storing, within the database, the authorization request message in a storage location associated with transaction data associated with a plurality of purchased items relating to the vehicle based on the vehicle identifier, wherein the stored transaction data includes the vehicle identifier, the account data associated with the cardholder, and a plurality of purchase data for the plurality of purchased items, wherein each of the purchased items is a vehicle related expense for at least one of operating and maintaining the vehicle;
receiving, by the payment processing computer from a user computer device, a request for a report of vehicle related expenses for the vehicle;
preparing, by the payment processing computer, the requested report of vehicle related expenses for the vehicle by using the vehicle identifier to retrieve the transaction data associated with the vehicle identifier within the database; and
transmitting, to the user computer device, the requested report of vehicle related expenses, wherein the user computer device is in communication with the payment processing computer through a communication network.

US Pat. No. 10,140,598

DEVICE INCLUDING ENCRYPTED DATA FOR EXPIRATION DATE AND VERIFICATION VALUE CREATION

VISA INTERNATIONAL SERVIC...

1. A method comprising:encrypting, using a processor, a first portion of a first account number, the first portion having less digits than the whole first account number, to form an encrypted account number portion, while leaving a remaining portion of the first account number unencrypted, the first account number being associated with a first expiration date and a first verification value;
determining a second account number based at least in part on a first segment of the encrypted account number portion and the remaining portion of the first account number;
determining a second expiration date based at least in part on a second segment of the encrypted account number portion;
determining a second verification value based at least in part on a third segment of the encrypted account number portion; and
participating in a transaction with respect to an account corresponding to the first account number utilizing the determined second account number, the determined second expiration date and the determined second verification value in place of the first account number, the first expiration date and the first verification value,
wherein (i) each segment of the encrypted account number portion contains less information than the whole encrypted account number portion and (ii) the first segment, the second segment and the third segment of the encrypted account number portion collectively contain all the information in the whole encrypted account number portion.

US Pat. No. 10,140,597

PAYMENT INSTRUMENT VALIDATION AND PROCESSING

BANK OF AMERICA CORPORATI...

1. A system for providing validation and processing of a plurality of payments using a plurality of payment instruments and a plurality of remittance documents, the system comprising:one or more memory devices; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute computer-readable program code to:
receive a plurality of payment instrument images, wherein the plurality of payment instrument images are captured from the plurality of payment instruments by a payment instrument reader;
identify a payment instrument final amount for each of the plurality of payment instruments from each of the plurality of payment instruments images of each of the plurality of payment instruments, wherein the payment instrument final amount is determined from a courtesy box amount and a legal line amount on the payment instrument;
receive a plurality of remittance document images, wherein the plurality of remittance document images are captured from each of the plurality of remittance documents associated with each of the plurality of payment instruments by a remittance document reader;
access account information associated with the plurality of remittance documents by accessing financial institution systems;
identify a remittance courtesy amount, a remittance full payment amount, a remittance minimum payment amount, and a remittance last payment amount for each of the plurality of remittance documents, wherein the remittance courtesy amount, the remittance full payment amount, the remittance minimum payment amount, and the remittance last payment amount are identified from each of the plurality of remittance document images or from the account information stored on the financial institution systems;
route the plurality of payments for verification when the payment instrument final amount does not equal any one of the remittance courtesy amount, the remittance full payment amount, the remittance minimum payment amount, and the remittance last payment amount;
identify a payment instrument final confidence score when the payment instrument final amount equals one of the one of the remittance courtesy amount, the remittance full payment amount, the remittance minimum payment amount, and the remittance last payment amount; and
route the plurality of payments for verification or posting based on when the payment instrument final amount of each of the plurality of payments equals the remittance courtesy amount, the remittance full payment amount, the remittance minimum payment amount, or the remittance last payment amount associated with each of the plurality of payments, and based on the payment instrument final confidence score;
wherein when the payment instrument final amount of a payment is equal to the remittance courtesy amount:
the payment is routed for verification when the payment instrument final confidence score for the payment is less than a first threshold payment instrument final confidence score;
the payment is routed for posting when the payment instrument final confidence score for the payment is greater than or equal to a second threshold payment instrument final confidence score;
the payment is routed based on a remittance courtesy confidence score when the payment instrument final confidence score for the payment is greater than or equal to the first threshold payment instrument final confidence score but less than the second threshold payment instrument final confidence score, and wherein the payment is routed for:
posting when the remittance courtesy confidence score is greater than or equal to a third remittance courtesy confidence score threshold; and
verification when the remittance courtesy confidence score is less than a fourth remittance courtesy confidence score threshold;
wherein when the payment instrument final amount of the payment is equal to the remittance full payment amount:
the payment is routed for posting when the payment instrument final confidence score for the payment is greater than or equal to a fifth threshold payment instrument final confidence score;
the payment is routed based on a remittance full payment confidence score when the payment instrument final confidence score for the payment is less than a sixth threshold payment instrument confidence score, and the payment is routed for:
posting when the remittance full payment confidence score is greater than or equal to a seventh remittance full payment confidence score threshold; and
verification when the remittance full payment confidence score is less than an eighth remittance full payment confidence score threshold
wherein when the payment instrument final amount of the payment is equal to the remittance minimum payment amount:
the payment is routed for verification when the payment instrument final confidence score for the payment is less than a tenth threshold payment instrument final confidence score; and
the payment is routed for posting when the payment instrument final confidence score for the payment is greater than or equal to a ninth threshold payment instrument final confidence score;
wherein when the payment instrument final amount of the payment is equal to the remittance last payment amount:
the payment is routed for verification when the payment instrument final confidence score for the payment is less than a twelfth threshold payment instrument final confidence score; and
the payment is routed for posting when the payment instrument final confidence score for the payment is greater than or equal to an eleventh threshold payment instrument final confidence score;
wherein when the payment from the plurality of payments is routed to validation, the one or more processing devices are further configured to execute computer-readable program code to:
receive a keyed value;
determine when the keyed value is equal to the payment instrument final amount and determine a payment instrument final amount confidence score;
route the payment to posting when the payment instrument final amount confidence score is greater than or equal to a thirteenth threshold value;
route the payment for a second keying process when the payment instrument final amount confidence score is less than a fourteenth threshold value;
determine when the keyed value is not equal to the payment instrument final amount and when the keyed value is equal to the remittance full payment amount and route the payment to posting; and
determine when the keyed value is not equal to the payment instrument final amount and not equal to the remittance full payment amount, and
determine when the keyed value is equal to the remittance last payment amount and route the payment to posting; and
determine when the keyed value is not equal to the remittance last payment amount and route the payment to the second keying process.

US Pat. No. 10,140,596

THIRD PARTY AUTHENTICATION OF AN ELECTRONIC TRANSACTION

1. A method of granting a user access to a service, wherein a first computer system is a computer system of a service provider, wherein a second computer system is a computer system of an authentication provider, the method comprising:(a) receiving from the user and storing onto the first computer system a first username, a first password, and a second password, wherein the first username and the first password form a first identity credential;
(b) retrieving a second username, wherein the second username and the second password form a second identity credential, the service provider verifying the first identity credential but not the second identity credential;
(c) forwarding the second identity credential from the first computer system across a network to the second computer system without forwarding the first username or the first password received in (a);
(d) receiving onto the first computer system verification of the second identity credential, wherein the verification is received across the network from the second computer system of the authentication provider, wherein the second computer system of the authentication provider does not store any user identity information, and wherein the verification received in (d) is a result of the authentication provider having verified the second identity credential without having received the first username from the service provider; and
(e) granting the user access to the service if the service provider verifies the first identity credential received in (a) and if the service provider receives verification of the second identity credential from the authentication provider in (d), wherein the granting of (e) is performed by the service provider.

US Pat. No. 10,140,595

EVENT SCHEDULING

Google LLC, Mountain Vie...

1. A system, comprising:a data processing apparatus; and
a non-transitory computer readable storage medium in data communication with the data processing apparatus and storing instructions executable by the data processing apparatus and upon such execution cause the data processing apparatus to perform operations comprising:
for each of two or more requests:
receiving, by a first computer-implemented agent for a first device from second computer-implemented agent for a second device, the request a) for data identifying a first person who operates the first device who is requested to attend an event with a second person associated with the second device b) that identifies one or more constraints for attending the event, wherein the second device is a different device than the first device;
in response to receiving the request, determining, by the first computer-implemented agent using a profile for the first person, whether attributes for the first person satisfy the one or more constraints for attending the event;
in response to determining that the attributes for the first person satisfy the one or more constraints for attending the event for at least one of the two or more requests, requesting, by the first computer-implemented agent from the second computer-implemented agent, data defining additional details about the event or the second person that were not included in the request; and
in response to determining that at least one of the attributes for the first person does not satisfy a corresponding constraint from the one or more constraints for attending the event for at least one of the two or more requests, determining to skip presentation of information about the event to the first person.

US Pat. No. 10,140,594

MULTI-PROGRAM SCHEDULING PLATFORM WITH PRIORITY TIERS

SJ MedConnect, Inc., San...

8. A method for scheduling a plurality of event programs via a scheduling platform, comprising:generating a user interface on a client device of a respective program administrator of each event program such that the user interfaces enable each program administrator to select a respective priority tier for each of a set of event slots in the respective event program from among a set of predetermined priority tiers depicted in the respective user interface;
generating an administrator dashboard on each client device such that the administrator dashboards enable each program administrator to select a respective view of a set of parameters pertaining to a set of schedulees registered with the scheduling platform and to select a respective priority tier for each schedulee depicted in the respected view from among the predetermined priority tiers wherein each view includes a respective table having a set of rows each depicting the parameters for one of the respective schedulees and each table enables the respective program administrator to sort the respective schedulees by one or more of the respective parameters and to individually select the respective rows and select one of the predetermined priority tiers for assignment to a currently selected row in the respective table and each view includes a set of bar graphs each visually depicting the parameters in a corresponding column of the respective table; and
generating a respective schedulee calendar for each schedulee by merging at least one of the event slots in more than one of the event programs into at least one of the schedulee calendars in response to the priority tiers of the event slots and the priority tiers of the schedulees such that, for each event slot, each schedulee calendar allows the respective schedulee to schedule the event slot only if the priority tier assigned to the event slot by the respective program administrator of the event slot matches the priority tier assigned to the respective schedulee by the respective program administrator of the event slot.

US Pat. No. 10,140,593

SYSTEM, METHOD AND RECORDING MEDIUM FOR DOORBELL CONTROL BASED ON DOORBELL DATA AND CALENDAR DATA

INTERNATIONAL BUSINESS MA...

1. A computer-implemented doorbell control method, the method comprising:causing a doorbell to perform both a differentiated action and emission of a noise based on the differentiated action that is emitted separate from the differentiated action, the differentiated action being performed based on a relationship between both doorbell data and calendar data of an electronic calendar;
annotating the calendar with information based on an activation of the doorbell; and
learning a new differentiated action to perform and a type of annotation for the calendar based on a second user action during a situation in a first user action according to the calendar data, the second user action occurring at a time temporally after the first user action.

US Pat. No. 10,140,592

PROVIDING FEEDBACK-BASED RATE ADJUSTMENT FOR ELECTRONIC COMMUNICATION SERVICES

Amazon Technologies, Inc....

1. A method, comprising:receiving, by at least one of one or more computing devices over a period of time, feedback data associated with at least one of a plurality of emails transmitted on behalf of a sender to a plurality of email recipients, the feedback data indicating that the at least one of the plurality of emails are unwanted;
updating, by at least one of the one or more computing devices, a history of complaint data associated with the sender based at least in part on the feedback data;
determining, by at least one of the one or more computing devices, a first complaint threshold for a first time interval over the period of time and a second complaint threshold for a second time interval over the period of time; and
assessing a cost to the sender based at least in part on (i) a first comparison of a current quantity of complaints with a current complaint threshold and (ii) a second comparison of a weighted moving average of the history of complaint data over the first time interval and the second time interval with at least one of the first complaint threshold or the second complaint threshold, the weighted moving average being based at least in part on a complaint rate during the period of time the first time interval and the second time interval.

US Pat. No. 10,140,591

METHOD AND SYSTEM FOR SUPPLEMENTING JOB POSTINGS WITH SOCIAL NETWORK DATA

ORACLE INTERNATIONAL CORP...

1. A method implemented with a processor for performing social branding for a post object, comprising:accessing a plurality of data sources stored on a plurality of computing systems, wherein the plurality of data sources include a public social network source and a private social network source, wherein a private social network comprises a social network internal to a specific company and a public social network is not internal to the specific company, wherein permission is required to share social content from the private social network source, with employees in a same workgroup, with employees within a same organization, and with the public;
retrieving content from the plurality of data sources generated by a plurality of users, the content is associated with user demographic information including income, age, profession, geographic location, and importance rating, the importance rating corresponds to weights assigned to the content, and the content with a higher weight is more likely to be displayed then content with a lower weight, the content is selected based at least in part on a comparison of a vector for a post with a vector for the content or a preconfigured tag;
identifying a posting to be supplemented based on at least some of the content from the plurality of data sources, the posting comprising a post object created by the specific company and corresponding to the specific company, the post object corresponds to a job position;
storing the content in a corresponding database storage area comprising a social network conversation data area, an employee talent data area, a workplace reputation data area, and a survey data area, the content is classified, categorized, and tagged prior to performing a transformation on the content, and tags are identified for social media content based on at least a classification;
analyzing the content from the plurality of data sources to identify a subset of the content related to the post object, wherein analyzing the content comprises:
performing latent semantic analysis, semantic analysis, semantic filtering, and vector analysis on one or more social network conversations,
applying one or more tags to the one or more social network conversations based at least in part upon a result of the latent semantic analysis, the semantic analysis, the semantic filtering, and the vector analysis, and the semantic filtering is used to remove irrelevant material and confidential information from the content and to reduce occurrences of false positives, false negatives, and inappropriate responses, the semantic filtering is performed on the content from the public social network source but not on the content from the private social network source, wherein content from the public social network source is filtered differently than content from the private social network source,
clustering of the content based on at least a classification and categorization prior to transformation, and
processing talent information to generate a talent profile for the post based on employees that held or hold a position corresponding to the posting;
performing a transformation on the subset of the content related to the post object to form transformed content, the transformation comprising:
selecting one or more excerpts or portions of the content to be used for social branding by identifying an excerpt of a conversation of the one or more social network conversations based at least in part upon one or more tags associated with the conversation where the excerpt of the conversation is used to supplement the posting, and
aggregating the subset of the content related to the post object to produce one or more pieces of aggregated content, the subset of the content related to the post object comprises the one or more social network conversations, profile information corresponding to one or more users of the plurality of users where the one or more users are associated with the post object; and
supplementing the posting with at least some of the transformed content by adding the transformed content to the post object, the transformed content being based at least in part on the subset of the content related to the post object and comprising information corresponding to the posting or an organization that posted the posting.

US Pat. No. 10,140,590

DATA APPROVAL SYSTEM AND METHOD

Oracle International Corp...

1. A data approval system comprising:a server system communicatively coupled to a database and to a network interface to facilitate access to a network, the server system comprising:
a transaction model comprising program code for implementing an approval process comprising an approval operation to update data in the database responsive to a request received by the server system via the network interface from a client device;
a plurality of data-handling modules to provide different methods for managing data during the approval process, wherein each module comprises program code for the server system to implement one or more methods, the plurality of data-handling modules comprising:
at least one first data-handling module to execute a first method to process the request by implementing a first update in the database to a first state, wherein the first method implements the first update via direct changes to the database and wherein the at least one first data-handling module is programmed to execute the first method by executing the steps of:
handling data to be approved before the approval operation by storing a proposed data change in a status column of the database;
in response to receiving an approval to implement the first update from the approval operation:
 handling approved data after the approval operation; and
 integrating the approved data from the status column into the database after the approval operation; and
in response to receiving a denial to implement the first update from the approval, handling unapproved data after the approval operation by rolling back the proposed data change in the status column of the database; and
at least one second data-handling module to execute a second method to process the request via implementing a second update in the database to a second state that is different from the first method, wherein the second method implements the second update via the use of a cache that is independent from the database, the first update being equivalent to the second update and the first state being equivalent to the second state such that the first method and the second method each result in a same final alteration to the database, and wherein the at least one second data-handling module is programmed to execute the second method by executing the steps of:
handling data to be approved before the approval operation by storing the proposed data change in the cache;
in response to receiving an approval to implement the second update from the approval operation:
 handling approved data after the approval operation; and
 integrating the approved data from the cache into the database after the approval; and
in response to receiving a denial to implement the second update from the approval operation, handling unapproved data after the approval operation by deleting the proposed data change in the cache; and
a non-transitory, computer-readable medium storing a configuration file that identifies which of the plurality of data handling modules is used to update the database according to the approval process;
wherein the server system is programmed to select and execute one or more data-handling modules from the plurality of modules to manage data during the approval process based on the configuration file.

US Pat. No. 10,140,588

BILL OF MATERIAL SYNCHRONIZATION

INTERNATIONAL BUSINESS MA...

1. A method performed by a synchronization system incorporated in a physical computing system programmed to synchronize a source bill of material stored on a first networked physical computing system with a target bill of material stored on a second, separate networked physical computing system, the method comprising;with the physical computing system, monitor said source bill of material at said first networked physical computing system for revisions;
in response to a determination by said physical computing system that a revision has been applied to a source node from a tree structure representing said source bill of material at said first networked physical computing system after a corresponding target node from a tree structure representing said target bill of material at said second networked physical computing system was last updated, calculating a change from said source node to said target node with said physical computing system;
determining whether said calculated change matches a difference provided by a revision history associated with said source bill of material at said first networked physical computing system; and
synchronizing the two bills of material by updating, with said physical computing system, said target node at said second networked physical computing system with said revision only when said calculated change matches the difference provided by a revision history associated with said source bill of material at said first networked physical computing system,
so that manufacturing that is based on said target bill of materials located at said second networked physical computing system is accurate with respect to said source bill of materials located at said first networked physical computing system.

US Pat. No. 10,140,587

METHODS OF PREPARING FOOD PRODUCTS

ZUME PIZZA, INC., Mounta...

1. A method of operation in a food preparation and delivery system, the method comprising:loading each of a plurality of food items in a respective one of a plurality of ovens;
subsequent to the loading of each of the plurality of food items in a respective one of the plurality of ovens, positioning the plurality of ovens in a cargo compartment of a vehicle with the food items loaded therein; and
for each of the ovens, automatically controlling by at least one controller a temperature based at least in part on an estimated time to destination for the respective food item to cook the food items in the ovens while the vehicle travels to each of at least two destinations which are different from one another.

US Pat. No. 10,140,586

SYSTEM FOR CHARTING AND SCHEDULES ALONGSIDE EQUIPMENT

Honeywell International I...

1. A system for optimizing equipment comprising:a processor including an occupancy schedule;
an occupancy sensor situated in a space connected to the processor and configured to detect an occupancy in the space;
equipment controlling a parameter connected to the processor;
a parameter sensor in the space connected to the processor and the equipment and configured to detect the parameter over time; and
a display or printer connected to the processor; and
wherein:
the processor is configured to:
obtain the parameter from the parameter sensor and the occupancy from the occupancy sensor;
historically record the parameter over time in a form of a first chart;
historically record the occupancy over time in a form of a second chart;
compare the occupancy schedule and the first and second charts to produce a third chart configured to identify differences between the occupancy schedule and magnitudes of the parameter and occupancy, which discover:
correlations between operation of the equipment controlling the parameter, operation of the occupancy sensor, and the occupancy schedule; and
anomalies indicating deviations from the correlations between the operation of the equipment controlling the parameter, the operation of the occupancy sensor, and the occupancy schedule; and
the correlation and anomalies indicate a condition of the equipment controlling the parameter, the occupancy sensor detecting the occupancy in the space, and the occupancy schedule.

US Pat. No. 10,140,585

CONTROL SYSTEMS AND METHODS FOR ECONOMICAL OPTIMIZATION OF AN ELECTRICAL SYSTEM INCLUDING BATTERY DEGRADATION

DEMAND ENERGY NETWORKS, I...

1. A controller of an electrical system that includes a battery, the controller comprising:a communication interface to receive a measurement of a current state of a battery of the electrical system; and
one or more processors to:
determine a throughput component of degradation of the battery for a time period;
determine an aging component of degradation of the battery for the time period;
sum the throughput component and the aging component to determine a total battery degradation for the time period;
determine a battery degradation cost based on the total battery degradation for the time period;
determine a set of control values for a set of control variables to effectuate a change to the electrical system toward meeting a controller objective for economical optimization of the electrical system during an upcoming time domain, wherein the set of control values are determined by the one or more processors in accordance with one or more cost elements associated with operation of the electrical system, including the battery degradation cost; and
control the electrical system via the communication interface based on the determined values for the set of control variables.

US Pat. No. 10,140,584

ACCLIMATIZING A USER TO A SCHEDULING PATTERN CHANGE

INTERNATIONAL BUSINESS MA...

1. A method of acclimatizing a user to a scheduling pattern change, comprising:in a calendar system implemented by at least one processor, determining an anticipated scheduling pattern change from a current scheduling pattern to a new scheduling pattern for said user;
establishing with said calendar system an acclimatization period to transition user to said scheduling pattern; and
prompting said user to reschedule an event requested within said acclimatization period to a time outside of said acclimatization period with said calendaring system.

US Pat. No. 10,140,583

SCHEDULE IMPACT MAP

Healthcare Technical Serv...

1. A computer-implemented method comprising:receiving, by a processor, information defining a floor plan of a building project, the floor plan comprising a plurality of rooms;
identifying, by the processor, for each of the plurality of rooms in the floor plan, a respective completion date indicating, for each of two or more activities associated with the respective room, when each of the two or more activities is to be completed;
identifying, by the processor, for each of the plurality of rooms in the floor plan, a milestone associated with the two or more activities associated with the respective room;
identifying, by the processor, for each of the plurality of rooms in the floor plan, a respective specified date indicating when the milestone is to be completed, the identifying being based on the completion dates of the two or more activities associated with the respective room;
for each room in the plurality of rooms, determining, by the processor, a time period between the identified specified date and a present date;
generating, by the processor, a visual map of the floor plan for each room in the plurality of rooms;
determining, by the processor, a color characteristic of respective rooms based on the determined time period; and
causing a display device to display the visual map, wherein each respective room in the plurality of rooms is displayed in the visual map based on the determined color characteristic.

US Pat. No. 10,140,582

SYSTEMS AND METHODS OF COGNITIVE PATTERNS KNOWLEDGE GENERATION

APTIMA, INC., Woburn, MA...

1. A processor based method of generating a new pattern knowledge for a processor based device, said method comprising the steps of:receiving at least one concrete pattern representing a sensory input from an electronic sensor;
receiving at least one abstract pattern representing a pattern knowledge of a processor based device;
the pattern knowledge stored in a memory of the processor based device;
vertically blending the concrete pattern with the abstract pattern to create a vertically blended pattern whereby the vertically blended pattern represents a new pattern knowledge of the processor based device;
determining a measure of a degree of vertical blending;
when the measure of the degree of vertical blending exceeds a threshold, horizontally blending at least two abstract patterns to create a horizontally blended abstract pattern as the new pattern knowledge;
determining an action for the processor based device based on the new pattern knowledge wherein the action is to move the processor based device and receive a second concrete pattern; and
executing the action by moving the processor based device and receiving the second concrete pattern representing a second sensory input from the electronic sensor.

US Pat. No. 10,140,581

CONDITIONAL RANDOM FIELD MODEL COMPRESSION

Amazon Technologies, Inc....

1. A computer-implemented method comprising:under control of one or more computing devices configured with specific computer-executable instructions,
obtaining training data comprising a sentence and a correct named entity label for a word of the sentence, the correct named entity label indicating a category of the word;
generating feature data representing one or more features of the word in the sentence of the training data;
determining a first model parameter index based at least partly on a first hashed value of a feature represented by the feature data, wherein the first model parameter index comprises an index of a first model parameter of a plurality of parameters of a conditional random field model, and wherein the first model parameter corresponds to the feature represented by the feature data;
determining a second model parameter index based at least partly on a second hashed value of the feature represented by the feature data, wherein the second model parameter index comprises an index of a second model parameter of the plurality of parameters, and wherein the second model parameter corresponds to the feature represented by the feature data;
computing, for a candidate named entity label of a plurality of named entity labels:
a first product of the first model parameter and a first weight associated with the candidate named entity label; and
a second product of the second model parameter and a second weight associated with the candidate named entity label;
selecting the candidate label for the word from the plurality of named entity labels based at least partly on a sum of the first product and the second product;
determining that the candidate label is incorrect for the word by comparing the candidate label to the correct named entity label;
computing a normalized parameter value using values of the plurality of parameters;
computing a parameter adjustment value using the normalized parameter value, the first product, and the second product;
reducing a value of the model parameter based at least partly on the parameter adjustment value;
quantizing values of the plurality of parameters of the conditional random field model to generate quantized values of the plurality of parameters, wherein the quantized value of the model parameter is zero; and
storing an updated version of the conditional random field model using the quantized parameters of the plurality of parameters, wherein the updated version of the conditional random field model excludes the quantized value for the model parameter, and wherein storage of the updated version of the conditional random field model consumes fewer resources than storage of the conditional random field model.

US Pat. No. 10,140,580

QUANTUM COMPUTING DEVICE FOR ISING MODEL, QUANTUM PARALLEL COMPUTING DEVICE FOR ISING MODEL, AND QUANTUM COMPUTING METHOD FOR ISING MODEL

Inter-University Research...

1. An Ising model quantum computation device comprising:a parametric oscillator that parametrically oscillates a plurality of pseudo spin pulses, the plurality of pseudo spin pulses being in correspondence with a plurality of Ising model spins in a pseudo manner and having mutually an identical oscillation frequency;
a ring resonator in which the plurality of pseudo spin pulses circularly propagate;
a temporary pulse detector that temporarily measures phases of the plurality of pseudo spin pulses every time the plurality of pseudo spin pulses circularly propagate in the ring resonator to temporarily measure pseudo spins of the plurality of pseudo spin pulses;
an interaction computing circuit that temporarily computes sum of interaction between a pseudo spin of a certain pseudo spin pulse and a pseudo spin of all other pseudo spin pulses interacting with the pseudo spin of the certain pseudo spin pulse, based on a coupling coefficient of the Ising model related to the pseudo spin of the certain pseudo spin pulse and the pseudo spins of the other pseudo spin pulses having been temporarily measured by the temporary pulse detector;
a pulse injector that controls amplitudes and phases of light injected to the certain pseudo spin pulse to temporarily implement a magnitude and a sign of the sum of the interaction between the pseudo spin of the certain pseudo spin pulse and the pseudo spin of all the other pseudo spin pulses interacting with the pseudo spin of the certain pseudo spin pulse, the sum of the interaction having been temporarily computed by the interaction computing circuit; and
a pseudo pulse detector that measures the phases of the plurality of pseudo spin pulses after the plurality of pseudo spin pulses have arrived at a steady state in a process of repeating a feedback loop configured of the temporary pulse detector, the interaction computing circuit, and the pulse injector to measure the pseudo spins of the plurality of pseudo spin pulses.

US Pat. No. 10,140,579

SITUATIONAL AWARENESS AND COMMUNICATION SYSTEM

1Q, LLC, Atlanta, GA (US...

1. A method comprising:receiving, by a network device comprising a processor, a request for situational awareness information from a requesting device associated with a requester including one or more of a demographic profile of interest and a topical area of interest;
receiving, by the network device, one or more of demographic data and topical area of interest data reported by mobile communication devices or obtained from social media files associated with the mobile communication devices;
providing, by the network device, the situational awareness information to the requesting device including demographic statistics for the potential respondents;
receiving, by the network device, a survey request from the requesting device identifying a target audience for an electronic survey based on the situational awareness information;
receiving, by the network device, a target demographic objective in association with the survey request;
directing, by the network device, the survey request to the target audience;
receiving, by the network device, responses to the electronic survey from responding communication devices;
iteratively narrowing, by the network device, the target audience to those potential respondents having increasingly precise demographics needed to meet the target demographic objective as the electronic survey progresses toward completion; and
directing, by the network device, an electronic survey report based on the responses to the requesting device, wherein the electronic survey report comprises demographic statistics for persons associated with the responding communication devices.

US Pat. No. 10,140,578

SYSTEM AND METHOD FOR MANAGING SOCIAL-BASED QUESTIONS AND ANSWERS

Intuit Inc., Mountain Vi...

1. A computer-implemented method of managing questions and answers on a computer-hosted service, the computer-implemented method being executed by a computing device executing programmed instructions stored in a memory and comprising:the computing device receiving electronic text based tax question and answer pairings stored in a database;
the computing device inputting the electronic text based tax question and answer pairings into a content model;
the computing device executing programmed instructions of the content model and generating respective content scores for respective tax question and answer pairings, each content score comprising a number within a pre-defined range, wherein one end of the pre-defined range corresponds to product content and another end of the pre-defined range corresponds to general tax content;
the computing device separating the electronic text based tax question and answer pairings into product question and answer pairings and general tax question and answer pairings based on respective content scores generated by execution of the content model; and
after respective product question and answer pairings and general tax question and answer pairings have been determined, the computing device
providing access to the product question and answer pairings to a first group of users through respective networks in response to respective browser requests by respective computing devices of respective users of the first group of users such that the product question and answer pairings are presented through respective displays of respective computing devices of respective users of the first group of users, and
providing access to the general tax question and answer pairings to a second group of users, different from the first group of users, through respective networks in response to respective browser request by respective users of the second group of users such that the second group of product question and answer pairings are presented through respective displays of respective computing devices of respective users of the second group of users.

US Pat. No. 10,140,577

DATA PROCESSING METHOD AND APPARATUS

FUJITSU LIMITED, Kawasak...

1. A non-transitory computer-readable recording medium having stored therein an event processing control program for event processing that processes received event data in accordance with processing rules and outputs output data, the event processing control program causing a computer to execute a process comprising:obtaining first assessment values pertaining to output data by the event processing for a first type of events, periodically by a first period;
calculating a correlation coefficient value of first received event data and second received event data periodically by a second period that is longer than the first period, the first received event data being received event data of the first type and the second received event data being received event data of a second type that is different from the first type of events;
comparing the calculated correlation coefficient of the first received event data and the second received event data, and
when the calculated correlation coefficient is greater than a threshold value,
automatically generating a second filtering condition pertaining to the second received event data, based on a first filtering condition and the correlation coefficient value, the first filtering condition pertaining to the first received data and being specified from the assessment values,
wherein at least one of the first filtering condition and the second filtering condition is discarded when the at least one of the first filtering condition and the second filtering condition is beyond a validity period of the at least one of the first filtering condition and the second filtering condition.

US Pat. No. 10,140,576

COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR DETECTING ANOMALIES USING SAMPLE-BASED RULE IDENTIFICATION

Palo Alto Research Center...

1. A system for detecting anomalies using sample-based rule identification with the aid of a digital computer, comprising:a non-transitory computer readable storage medium comprising program code and further comprising:
a database comprising a data set for data analytics, the data set comprising a plurality of data points; and
a set of anomaly rules;
a computer processor and memory with the computer processor coupled to the storage medium, wherein the computer processor is configured to execute the program code to perform steps to:
statistically identify one or more of the data points in the data set comprised in the database as one or more potential anomalies, comprising calculating a statistics for each of the data points;
label each of the identified data points as at least one of anomaly and non-anomaly based on verification by a domain expert;
adjust the set of anomaly rules comprised in the database based on at least one of the labeled anomalies, comprising creating an additional anomaly rule and adding the rule to the set, further comprising:
determine an entropy of at least a portion of a different data set, the different data set comprising the statistics of all of the data points, the at least the portion comprising the statistics for the at least one anomaly;
use the entropy to set a threshold; and
set the additional anomaly rule to label one or more of the data points other than the at least one labeled anomaly as one or more additional anomalies upon the statistics for these data points exceeding the threshold;
detect and classify as the one or more additional anomalies the one or more data points other than the at least one labeled anomaly comprised in the database by applying the adjusted set of anomaly rues comprised in the database to the statistics for the data points; and
control manipulative malicious activities in at least one of the fields of social welfare, credit card, transportation systems, the Internet networks, and healthcare systems based on the labeled anomalies and the additional anomalies.

US Pat. No. 10,140,575

SPORTS FORMATION RETRIEVAL

Disney Enterprises, Inc.,...

1. A method of sports play retrieval, comprising:receiving positional data, across an interval window, comprising a respective agent trajectory for each of a plurality of agents during the interval window;
partitioning the interval window into a plurality of frames;
at each of the plurality of frames, calculating a cost of assigning a role to each agent of the plurality of agents based on one or more exemplar formations;
determining a formation by assigning a role to each agent based on the calculated cost;
comparing each frame of the plurality of frames of the formation to a corresponding frame of a stored formation, by calculating a distance between a position of each assigned role in the frame and a position of a corresponding role in the stored formation; and
generating, based on the comparisons, a list of stored formations that are similar to the formation.

US Pat. No. 10,140,574

NEURAL NETWORK UNIT WITH SEGMENTABLE ARRAY WIDTH ROTATOR AND RE-SHAPEABLE WEIGHT MEMORY TO MATCH SEGMENT WIDTH TO PROVIDE COMMON WEIGHTS TO MULTIPLE ROTATOR SEGMENTS

VIA ALLIANCE SEMICONDUCTO...

1. An apparatus, comprising:a first memory that holds rows of N weight words indexed as 0 through N?1 and that receives an address, wherein the address has log2 W bits and an extra bit;
a second memory that holds rows of N data words indexed as 0 through N?1, wherein N is at least 512;
an array of N processing units (PUs) indexed as 0 through N?1, each PUs of index J having:
first and second registers, an accumulator having an output, and an arithmetic unit having first, second and third inputs and that performs an operation thereon to generate a result to store in the accumulator, the first input receives the output of the accumulator, the second input receives a weight word output by the first register, the third input receives a data word output by the second register;
first multiplexing logic that, for the PUs 0 through (N/2)?1 receives weight words J and J+(N/2) output by the first memory and for PUs N/2 through N?1 receives weight words J and J?(N/2) output by the first memory, and that outputs a selected weight word to the first register; and
second multiplexing logic that receives data word J output by the second memory and receives a data word output by the second register of PU J?1 and that outputs a selected data word to the second register, wherein PU J?1 is PU N?1 for PU 0; and
wherein the second multiplexing logic of PU 0 also receives the data word output by the second register of PU (N/2)?1, and the second multiplexing logic of PU N/2 also receives the data word output by the second register of PU N?1.

US Pat. No. 10,140,573

NEURAL NETWORK ADAPTATION TO CURRENT COMPUTATIONAL RESOURCES

QUALCOMM Incorporated, S...

1. A method for processing in a Neural Processing Unit (NPU) cortex of a robotic device having a system of artificial neurons, comprising:reducing resolution of one or more functions performed by at least one processing unit of the NPU cortex, based at least in part on availability of computational resources, the at least one processing unit including at least one neuromorphic processor;
compensating for the reduction in resolution by adjusting one or more network weights associated with the system; and
operating at least one sensor of the robotic device, using the at least one processing unit, at the reduced resolution and the adjusted one or more network weights for performing the one or more functions.

US Pat. No. 10,140,572

MEMORY BANDWIDTH MANAGEMENT FOR DEEP LEARNING APPLICATIONS

Microsoft Technology Lice...

1. A method of performing neural network processes, the method comprising:receiving, at a set of N input buffers, a batch of input data for accelerated processing of a neural network evaluation, wherein each input buffer provides a queue with a queue depth of at least two, where N is a number of available parallel streams of a field programmable gate array (FPGA), wherein the batch of input data comprises at least two observation vectors, one of the at least two observation vectors being loaded at a first position in the queue of the set of N input buffers and a second of the at least two observation vectors being loaded at a second position in the queue of the set of N input buffers;
loading the FPGA with a first layer set of weights for the neural network evaluation from an external memory; and
applying, within the FPGA, the first layer set of weights to the batch of the input data to generate intermediates, wherein while the one of the observation vectors is being processed, the second of the observation vectors moves from the second position to the first position in the queue of the input buffers and the intermediates generated from the one of the observation vectors at the first position in the queue are re-queued for next layer processing; and wherein after the second of the at least two feature vectors is processed, the intermediates generated from the second of the observation vectors are re-queued for the next layer processing.

US Pat. No. 10,140,571

HIERARCHICAL SCALABLE NEUROMORPHIC SYNAPTRONIC SYSTEM FOR SYNAPTIC AND STRUCTURAL PLASTICITY

International Business Ma...

1. A method comprising:receiving a first firing event generated by a first symmetric core circuit of a plurality of symmetric core circuits, wherein the plurality of symmetric core circuits are interconnected via a plurality of routers, each router corresponds to a symmetric core circuit of the plurality of symmetric core circuits, and each router comprises a compact lookup table (LUT) maintaining routing information for each firing event generated by a corresponding symmetric core circuit;
retrieving routing information for the first firing event from a first router of the plurality of routers, wherein the first router corresponds to the first symmetric core circuit;
generating a first packet for the first firing event based on the routing information retrieved; and
routing the first packet between the plurality of symmetric core circuits via the plurality of routers,
wherein each symmetric core circuit comprises a first core module and a second core module overlaid on one another and oriented differently relative to each other such that neurons and axons of the first core module are overlaid on and within proximity of axons and neurons of the second core module, respectively, and firing events propagate through the first core module and the second core module in opposite directions.

US Pat. No. 10,140,570

MICROPROCESSOR-CONTROLLED TAMPER DETECTION SYSTEM

1. A system for tamper detection, said system comprising:a layered composite material comprising a first conductive layer separated from a second conductive layer by an inner non-conductive layer, a first non-conductive outer layer in contact with the first conductive layer, and a second non-conductive outer layer in contact with the second conductive layer;
a first microprocessor electrically coupled to the first and second conductive layers;
a second microprocessor electrically coupled to the second conductive layer;
a power supply; and
means for communicating data from the microprocessor to a user
wherein:
said first microprocessor is electrically coupled to the second conductive layer through the second microprocessor;
said first microprocessor is programmed to:
arm the system when a potential is applied between the first and second conductive layers;
upon detecting a change in an electrical property in a circuit comprising the first and second conductive layers, recording a timed tampering event; and
upon recording the tampering event, resetting the system for possible detection of a future event.

US Pat. No. 10,140,569

METAL CONTACTLESS SMART CARD AND METHOD FOR FABRICATING THE SAME

Soo Hyang Kang, Brea, CA...

1. A smart card for financial transactions comprising:a radio-frequency integrated circuit (RFIC) chip module (20) having a RFIC chip;
an inlay (40) having an antenna to enable contactless communication of the RFIC chip module (20) with an external reader;
a first metal layer (10 or 10?) having a through-hole (12) in which the RFIC chip module (20) is inserted and a recess (11) on which the inlay (40) is received;
a second layer (60 or 80) attached to a lower side of the first metal layer; and
a first slit (15 or 15?) formed in the first metal layer (10 or 10?) and disposed from the through-hole (12) to an outer edge of the first metal layer (10 r 10?),
wherein when a current is induced by an applied magnetic field, the current in the first metal layer (10 or 10?) is concentrated along the first slit (15 or 15?),
wherein the first slit (15 or 15?) enhances contactless communication of the RFIC chip module (20) with an external reader,
wherein the inlay (40) comprises a substrate, the antenna having a first wound coil (42) and a second wound coil (42?), and two inlay terminals (41 and 41?),
wherein he inlay terminals (41 and 41?) are formed to pass through the substrate of the inlay (40) as to be exposed on both sides of the inlay (40),
wherein the inlay terminals (41 and 41?) are formed at the ends of the first wound coil (42) and the second wound coil (42?),
wherein the first wound coil (42) is formed on a surface of the substrate of the inlay (40) and the second coil (42?) is formed on an opposite surface of the substrate of the inlay(40),
wherein the two coils (42 and 42?) are connected by a via hole (43) formed through the substrate of the inlay (40),
wherein the inlay terminals (41 and 41?) are electrically connected to two RFIC chip module terminals (14 and 14?),
wherein one of the two coils (42 and 42?) further comprises a wide portion (42a) and the other of the two coils (42 and 42?) further comprises a plurality of islands (44 and 44?), wherein the overall capacitance of the inlay may be adjusted by
electrically insulating a number of islands (44?) and facilitate impedance matching.

US Pat. No. 10,140,568

RFID SWITCH TAG

Neology, Inc., San Diego...

1. An RFID device comprising:a first booster antenna adapted to extend an operational range of the RFID device;
a second booster antenna adapted to extend the operational range of the RFID device;
a first RF module comprising a first integrated circuit and a first set of one or more conductive traces, wherein at least one conductive trace of the first set of one or more conductive traces is configured to electrically couple to a coupling region of the first booster antenna when the coupling region of the first booster antenna is located in a first position relative to the first set of one or more conductive traces;
a second RF module comprising a second integrated circuit and a second set of one or more conductive traces, wherein at least one conductive trace of the second set of one or more conductive traces is configured to electrically couple to the a coupling region of the second booster antenna when the coupling region of the second booster antenna is located in a second position relative to the second set of one or more conductive traces; and
a switching mechanism adapted to selectively activate and deactivate the first RF module and the second RF module by changing a position of the coupling region of the first booster antenna relative to the first position relative to said first set of one or more conductive traces and by changing a position of the coupling region of the second booster antenna relative to the second position relative to said second set of one or more conductive traces.

US Pat. No. 10,140,566

PASSIVE WIRELESS SENSOR

METSO OYJ, Helsinki (FI)...

1. A passive wireless transponder, comprising:an antenna,
a rectifier to convert a RF power of a received radio frequency (RF) interrogating signal into a direct current (DC),
a tag oscillator configured to generate a modulation frequency and an internal clock, a demodulator adapted to demodulate a received RFID interrogating command from the received RF interrogating signal, a digital control part that uses the internal clock and is adapted to process the received RFID interrogating command and to output a digital response,
a modulator adapted to generate a modulated backscattered signal carrying the digital response for communication with a backscattering principle to provide radio frequency identification (RFID) features, and
a sensing element for sensing a predetermined variable,
wherein the modulated backscattered signal carrying a digital response comprises sidebands that are offset from an interrogation frequency by a modulation frequency outputted from the tag oscillator, and wherein the tag oscillator is based on a resonator, and the sensing element is connected to the tag oscillator to load the tag oscillator, and the modulation frequency outputted from the tag oscillator and thereby the offset of the sidebands of the modulated backscattered signal are arranged to be dependent on and carry a sensed value of the predetermined variable.

US Pat. No. 10,140,564

MODULATION OF DISPLAY IMAGERY FOR BARCODE SIMULATION

Samsung Electronics Co., ...

1. A method of modulating display imagery for barcode simulation comprising:receiving barcode information at an image sensor of a portable device;
converting, by the portable device, the barcode information into discrete signals;
processing, by the portable device, the discrete signal into formatted image data;
displaying, at the portable device, imagery based on the formatted image data; and
modulating, at the portable device, light characteristics of the imagery while switching a display of a display screen back-and-forth between the imagery and a solid color, to simulate the barcode information as a light simulated barcode.

US Pat. No. 10,140,563

INFORMATION BEARING DEVICE

INFOTOO INTERNATIONAL LIM...

20. A method of recovering data from a composite information bearing device having a plurality of pixels which is presented on a presentation medium, wherein the composite information bearing device comprises a plurality of data units, the plurality of data units being arranged to define a first data bearing device representing a first set of data; wherein each of the data units is formed into one of a plurality of discrete states to represent one of a corresponding plurality of digital states including at least a first digital state and a second digital state, wherein at least some of the data units of one of the first digital state and/or the second digital state are defined by an ensemble of pattern defining elements, and the number of pattern defining elements forming the ensemble is substantially higher than the number of data units defined by the ensemble; wherein the pattern defining elements of the ensemble are distributed to form a first data embedding pattern, and the first data embedding pattern corresponds to a second set of data; wherein the second set of data correlates to a spread pattern which follows a spatial distribution rule, and the spatial distribution rule defines characteristic values of the spread pattern in spatial domain and have continuous values spread between a maximum value and a minimum value; and wherein spatial distribution of the pattern defining elements of the ensemble follows the spatial distribution rule to the extent where the characteristic values are either above or below a selection threshold value, the selection threshold value being a value between the maximum value and the minimum value; and wherein the method comprises selecting a restoration dividing value and processing an aggregate of pattern defining elements which defines the data units of a digital state such that a pixel is assigned a maximum value if the pixel has a value above the restoration dividing value and assigned a minimum value otherwise.

US Pat. No. 10,140,562

METHOD AND ARRANGEMENT FOR DATA TRANSMISSION

1. A method for transferring an object data set stored in a data storage area of a lower server to at least one upper server, the lower server and the at least one upper server being installed in a server cluster, and the lower server and the at least one upper server being arranged in vertically staggered server levels, wherein a unique allocation of the object data set to a specified object is performed either by addressing the server data storage area with an access data set being stored in an access data storage area of an RFID data carrier attached to the object, or by transferring the object data set from a data storage area of the RFID data carrier to a referenced data storage area of the lower server, wherein transferring the object data set to the upper server is performed by access to the data storage area of the lower server.

US Pat. No. 10,140,561

COGNITIVE LOCALIZATION FOR ENHANCING APPLIANCE CONDITIONING FEATURES

International Business Ma...

1. A method of automated localization of information for smart appliances, the method comprising:identifying a user of the smart appliance via a user interface;
receiving scanned input associated with an item, from a scanning component;
requesting cognitive services from an appliance cognitive localization server, the cognitive services integrating localization information with the item information;
providing the localization information to the smart appliance; and
operating the smart appliance using the localization information and the item information.

US Pat. No. 10,140,560

PRINTING APPARATUS, CONTROL METHOD OF PRINTING APPARATUS, AND A STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. A printing apparatus comprising:a feed tray on which a sheet is to be placed;
a printer configured to print an image on the sheet fed from the feed tray;
a memory device configured to store a sheet size and a sheet type, which are selected by a user and set to the feed tray, and to store information indicating whether setting a sheet size and/or a sheet type is omitted; and
a controller configured to receive a print job,
wherein a first print job designates the feed tray as a sheet supply source and designates a sheet size and a sheet type of a sheet to be printed,
wherein a second print job designates the feed tray as a sheet supply source but does not designate a sheet size and a sheet type of a sheet to be printed,
wherein, in a case where the first print job is received and a sheet size and a sheet type are set to the feed tray, the controller controls the printer to execute a printing operation according to the sheet size and the sheet type in the first print job if the sheet size and the sheet type in the first print job corresponds to the sheet size and the sheet type set to the feed tray,
wherein, in a case where the first print job is received and a sheet size is set to the feed tray but setting of a sheet type is omitted, the controller controls the printer to execute a printing operation according to the sheet size and the sheet type in the first print job if the sheet size in the first print job corresponds to the sheet size set to the feed tray,
wherein, in a case where the first print job is received and setting a sheet size and a sheet type is omitted, the controller controls the printer to execute a printing operation according to the sheet size and the sheet type in the first print job, and
wherein, in a case where the second print job is received, the controller controls the printer to execute a printing operation according to a sheet size and a sheet type for the feed tray even when the setting a sheet size and a sheet type is omitted.

US Pat. No. 10,140,559

METHODS AND SYSTEMS FOR CREATING RASTER IMAGE FOR CLEAR OBJECTS ON CLEAR PLANE

XEROX CORPORATION, Norwa...

1. A method for printing clear tagged objects on clear plane, the method being implemented in a multifunctional device (MFD) having processor, the method comprising:receiving a print job at the MFD, wherein the print job comprising a page description language (PDL) file having an input image;
performing raster image processing on the input image to generate input raster buffer by converting the input image into a digital bitmap image comprised of an array of pixels, wherein each pixel being assigned with an object tag information and an object definition;
determining clear objects based on the object tag information and the object definition present in the PDL file;
drawing a bounding box around each block of the clear objects, wherein pixels tagged as clear objects in the bounding box are considered as foreground pixels and rest pixels in the same bounding box are considered as background pixels;
for each bounding box, computing occupancy percentage of the foreground pixels representing the clear objects against the background pixels;
applying dilation on the pixels representing the clear objects when the computed occupancy percentage is below a threshold value;
tagging the pixels, representing the clear objects, which are dilated as dilated pixels of the clear objects;
determining an amount of flood clear selected for the application on the input image;
for each of the dilated pixels and based on the amount of the flood clear, modifying pixel values of the dilated pixels of the clear objects in the input raster buffer to bring the dilated pixels in the range of visibility of clear ink value;
converting the input raster buffer into a ready-to-print (RTP) format; and
generating a print document at the MFD based on the RTP format.

US Pat. No. 10,140,558

PRINT CONTROL SYSTEM, PRINT CONTROL APPARATUS, AND PROGRAM

KONICA MINOLTA, INC., To...

1. A non-transitory recording medium storing a computer readable program that is executable by a computer to convert first page description language data described in a first page description language to second page description language data described in a second page description language, wherein the first page description language is convertible to the second page description language using a computer-executable general-purpose conversion process, the program being executable by the computer to cause the computer to perform functions comprising:a) analyzing the first page description language data described in the first page description language to determine whether a repetitive pattern image portion is included in the first page description language data;
b) in a case in which it is determined that the repetitive pattern image portion is included in the first page description language data, separating the repetitive pattern image portion from the first page description language data;
c) generating first partial data in the second page description language by converting the repetitive pattern image portion separated from the first page description language data to the second page description language using a unit image repetitive rendering command in the second page description language, without performing the general-purpose conversion processing on the repetitive pattern image portion, wherein the unit image repetitive rendering command is a rendering command to render the repetitive pattern image portion of the first page description language data by using a single image datum relating to a unit image which is repeated in the repetitive pattern image portion, wherein the single image datum relating to the unit image is described only once in the first partial data, irrespective of a number of repetitions of the unit image in the repetitive pattern image portion described in the first page description language data;
d) generating second partial data in the second page description language by converting a portion other than the repetitive pattern image portion of the first page description language data to the second page description language using the general-purpose conversion process for converting the first page description language to the second page description language; and
e) combining the first partial data and the second partial data to generate converted second page description language data that relates to the first page description language data, and that is described in the second page description language,
wherein the general-purpose conversion process performs conversion such that, if the repetitive pattern image portion included in the first page description language data were converted to the second page description language using the general-purpose conversion process, the repetitive pattern image portion would be converted in expanded form in the second page description language, in which the image datum of the unit image is repeatedly described according to the number of repetitions of the unit image in the repetitive pattern image portion described in the first page description language data, whereby conversion of the repetitive pattern image portion using the unit image repetitive rendering command achieves a reduced data amount of the converted second page description language data as compared to a case in which the repetitive pattern image portion is converted using the general-purpose conversion process.

US Pat. No. 10,140,556

ARABIC OPTICAL CHARACTER RECOGNITION METHOD USING HIDDEN MARKOV MODELS AND DECISION TREES

HUAZHONG UNIVERSITY OF SC...

1. A method for establishing a HMM-based encoding network using connectivity rules of Arabic optical characters in a recognition process, the method comprising:providing three non-emitting states in the HMM-based encoding network: a beginning non-emitting state disposed at the beginning of said network, an end non-emitting state disposed at the end of said network, and a middle non-emitting state disposed at the middle of said network;
connecting said beginning non-emitting state to an isolated position character hidden Markov model, and said isolated position character hidden Markov model to said end non-emitting state;
connecting said beginning non-emitting state to a beginning position character hidden Markov model, and said beginning position character hidden Markov model to said middle non-emitting state;
connecting said middle non-emitting state to an end position character hidden Markov model, and said end position character hidden Markov model to said end non-emitting state;
connecting in parallel said middle non-emitting state to a middle position character hidden Markov model, and connecting said middle position character hidden Markov model back to said middle non-emitting state thereby forming a loop between said middle non-emitting state and said middle position character hidden Markov model;
connecting in parallel said middle non-emitting state to an elongation hidden Markov model, and connecting said elongation hidden Markov model back to said middle non-emitting state thereby forming a loop between said middle non-emitting state and said elongation hidden Markov model; and
connecting said end non-emitting state to said beginning non-emitting state.

US Pat. No. 10,140,555

PROCESSING SYSTEM, PROCESSING METHOD, AND RECORDING MEDIUM

NEC Corporation, Tokyo (...

1. An image processing system, comprising:a memory storing a set of instructions; and
a processor configured to execute the instructions to:
receive an input of a plurality of sample images obtained by capturing objects in different conditions;
generate likelihood distribution information of the plurality of sample images, in which values representing a pixel or a pixel block in an area of an object included in a sample image and values representing a plurality of likelihoods are associated with each other, each likelihood indicating a likelihood of belonging to one of a plurality of categories,
wherein the likelihood distribution information includes a first likelihood distribution information generated for a pair of sample images including a same object captured by different capturing devices or captured in different conditions, and a second likelihood distribution information generated for a pair of sample images including different objects;
calculate, using the first and second likelihood distribution information, a weight for each of the values representing the likelihood of belonging to each of the plurality of the categories; and
calculate a degree of similarity of areas of objects within different sample images based on the likelihood of belonging to each of the plurality of the categories and the calculated weight.

US Pat. No. 10,140,554

VIDEO PROCESSING

WIZR LLC, Santa Monica, ...

1. A computer-implemented method to train a video annotation machine learning process, the method comprising:obtaining a video directly from at least one camera at a location;
determining that a predetermined event occurs in the video;
identifying a first set of object attribute data associated with the event in the video based on a machine learning process and machine learning data;
receiving a second set of object attribute data of the event in the video from a user or external source;
comparing the first set of object attribute data with the second set of object attribute data;
validating the quality of the first set of object attribute data when the first set of object attribute data is determined to be sufficiently similar to the second set of object attribute data; and
revising the machine learning process and the machine learning data when the first set of object attribute data is determined not to be sufficiently similar to the second set of object attribute data.

US Pat. No. 10,140,553

MACHINE LEARNING ARTIFICIAL INTELLIGENCE SYSTEM FOR IDENTIFYING VEHICLES

CAPITAL ONE SERVICES, LLC...

1. A system for identifying attributes in an image, comprising:at least one processor in communication with a client processor; and
at least one storage medium storing instructions that, when executed, configure the processor to perform operations comprising:
obtaining a plurality of first images, the first images being associated with first metadata, the first images comprising car images;
extracting a plurality of first features from the first images;
categorizing the first images into one of a first group or a second group based on the first features, the first group comprising car exterior images, the second group comprising car interior images;
modifying the first metadata associated with images in the first images to include a binary label, the binary label representing into which of first and second groups the image was categorized;
calculating a classification function that classifies the first images based on image features and the binary label;
obtaining a plurality of second images, the second images being associated with second metadata;
classifying the second images into one of the first group or the second group using the classification function, the classification function comprising a regression function;
extracting a plurality of second features from the second images classified into the first group;
categorizing the second images in the first group by attribute, based on the second features;
calculating an attribute identification function that identifies attributes of the second images based on image features;
receiving a client image from the client processor; and
identifying at least one attribute associated with the client image using the attribute identification function.

US Pat. No. 10,140,552

AUTOMATIC EVENT RECOGNITION AND CROSS-USER PHOTO CLUSTERING

Google LLC, Mountain Vie...

1. A system comprising:a data processing apparatus including at least one programmable processor; and
a non-transitory computer storage device encoded with a computer program, the computer program comprising instructions that when executed by the data processing apparatus cause the data processing apparatus to perform operations comprising:
receiving, from a first user device of a first user, first check-in data of the first user device checking in to a first location, wherein a first image is captured by the first user device while the first user device is near the first location;
receiving, from a second user device of a second user, second check-in data of the second user device checking in to a second location, wherein a second image is captured by the second user device while the second user device is near the second location;
determining the first location specified by the first check-in data;
determining the second location specified by the second check-in data;
comparing the first location and the second location to determine a geographical distance between the first location and the second location;
generating a distance-related confidence score based, at least in part, on determining the geographical distance meets a threshold distance; and
determining that the first image and the second image each correspond to a same event, based on a total confidence score meeting a threshold total confidence score, wherein the total confidence score is based on individual confidence scores of each of two or more different types of elements including the distance-related confidence score of the geographical distance.

US Pat. No. 10,140,550

CLUSTERING METHOD AND SYSTEM, CORRESPONDING APPARATUS AND COMPUTER PROGRAM PRODUCT

STMICROELECTRONICS S.R.L....

1. A method, comprising:processing, using image processing circuitry, motion vectors associated with a current image frame in a stream of image frames, the processing including:
filtering the motion vectors associated with the current image frame;
grouping the filtered motion vectors associated with the current image frame into a set of clusters associated with the current image frame;
selectively merging clusters in the set of clusters associated with the current image frame;
calculating a weighted average of homologous clusters for the current image frame and a previous image frame in the stream of image frames; and
identifying one or more objects of interest in the stream of image frames based on the merged clusters associated with the current image frame, wherein the processing includes at least one of:
adding motion vectors included in merged clusters associated with a previous frame to filtered motion vectors before grouping the motion vectors in the current frame; and
basing at least one of the grouping, the merging and filtering of the motion vectors associated with the current image frame on one or more clusters associated with one or more previous image frames in the stream of image frames.

US Pat. No. 10,140,549

SCALABLE IMAGE MATCHING

A9.COM, INC., Palo Alto,...

1. A computing system, comprising:a processor; and
memory including instructions that, when executed by the processor, cause the computing system to:
receive a query image from a client computing device;
extract feature descriptors from the query image;
compare at least a portion of the extracted feature descriptors to a set of compressed cluster centers corresponding to a set of database images to determine a matching score, the compressed cluster centers at least partially formed by a set of compressed descriptors storing identifying information for at least one associated feature, the identifying information corresponding to identifying information including at least one of a position, a scale, or an orientation, and the identifying information occupying a majority of a file size of the compressed descriptor, wherein each of the compressed cluster centers is assigned at least one visual word corresponding to at least one feature descriptor;
rank the set of database images based on the matching score; and
select a highest ranking database image of the set of closest matching database images as a match for the query image.

US Pat. No. 10,140,548

STATISTICAL NOISE ANALYSIS FOR MOTION DETECTION

Lenovo (Singapore) Pte. L...

1. A machine-implemented method comprising:calculating reference statistics related to one or more noise characteristics that correspond to a plurality of pixels in a first set of a plurality of video images of an area being monitored;
receiving current noise characteristics that correspond to the plurality of pixels in a second set of one or more video images of the area being monitored, wherein the first set of video images were captured before the second set of video images; and
detecting a motion in the area being monitored by comparing the reference statistics to the current noise characteristics.

US Pat. No. 10,140,547

METHOD FOR DETECTING MICROORGANISM HAVING FLUORESCENT CHARACTERISTICS WITH RESPECT TO SPECIFIC WAVELENGTH

KOREA OCEANIC AND ATMOSPH...

1. A method for determining a number of individuals of microorganisms included in a sample using an optical apparatus, comprising a light source unit for supplying light to a sample comprising microorganisms which reflect only light of a specific wavelength range and have a fluorescent characteristic and a detection unit comprising an image acquisition unit for generating an image by collecting the light reflected by the microorganisms and an image processing unit for processing the generated image, the method comprising steps of:(a) collecting, by the image acquisition unit, light radiated by microorganisms which radiate only light of a specific wavelength range and are included in the sample;
(b) generating, by the image acquisition unit, an image of the collected image;
(c) displaying, by the image processing unit, the image generated by the image acquisition unit on a screen, analyzing each of pixels forming the screen on which the image has been displayed, classifying a plurality of pixels which belongs to the pixels included in the screen and continuously emit light as a single object, and extracting only an object that belongs to said single object and has an average brightness value of the pixels forming the object, corresponding to a predetermined brightness range, as an active object; and wherein in the step (c), the image processing unit classifies the plurality of pixels continuously emitting light to be the single object, wherein the image processing unit determines only a plurality of pixels which continuously emits light within a range of a predetermined contrast range along with one or more of all of neighboring pixels with respect to the pixels forming the screen to be the single object;
(d) calculating, by the image processing unit, a total number of active objects classified in the screen.

US Pat. No. 10,140,546

CLOUD DETECTION ON REMOTE SENSING IMAGERY

The Climate Corporation, ...

1. A method comprising:receiving remote sensing imagery of a geographical area, wherein the remote sensing imagery includes a plurality of pixels and one or more band values for each pixel within the remote sensing imagery;
using a first classifier, identifying one or more cloud seed pixels from the remote sensing imagery based on the one or more band values for each pixel;
using a second classifier, identifying one or more candidate cloud pixels from the remote sensing imagery based on the one or more band values for each pixel;
wherein the first classifier favors precision compared to the second classifier and the second classifier favors recall compared to the first classifier;
identifying a set of the one or more candidate cloud pixels that are connected to the one or more cloud seed pixels by one or more of: being a member of the one or more cloud seed pixels, being directly connected to at least one of the one or more cloud seed pixels, or being indirectly connected to at least one of the one or more cloud seed pixels through at least one candidate cloud pixel of the one or more candidate cloud pixels;
generating a cloud mask for the remote sensing imagery based on the set.

US Pat. No. 10,140,545

METHODS AND SYSTEMS FOR DIFFERENTIATING SYNTHETIC AND NON-SYNTHETIC IMAGES

FACEBOOK, INC., Menlo Pa...

1. A method comprising:receiving an image;
analyzing, using a processer of a computer system, the received image to produce analyzing results;
assigning, based on the analyzing results, an image type to the received image;
identifying a plurality of transcoding parameters, wherein at least one of the transcoding parameters is selected based on the assigned image type; and
transcoding the received image using the plurality of transcoding parameters.

US Pat. No. 10,140,544

ENHANCED CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SEGMENTATION

12 Sigma Technologies, S...

1. A computer image segmentation system for digital images, comprising:a communication interface circuitry;
a database;
a predictive model repository; and
a processing circuitry in communication with the database and the predictive model repository, the processing circuitry configured to:
receive a set of training images labeled with a corresponding set of ground truth segmentation masks from the database;
establish a fully convolutional neural network comprising a multi-layer contraction convolutional neural network and an expansion convolutional neural network connected in tandem;
iteratively train the fully convolution neural network in an end-to-end manner using the set of training images and the corresponding set of ground truth segmentation masks by configuring the processing circuitry to:
forward-propagate a training image from the set of training images through the fully convolutional neural network to generate a predictive segmentation mask for the training image;
generate an end loss based on a difference between the predictive segmentation mask and a ground truth segmentation mask corresponding to the training image;
generate an intermediate loss at one of multiple intermediate layers of the multi-layer contraction convolutional neural network based on an intermediate ground truth segmentation mask downsized from a ground truth segmentation mask corresponding to the training image;
back-propagate the end loss and the intermediate loss through the fully convolutional neural network; and
minimize a sum of the end loss and the intermediate loss by adjusting a set of training parameters of the fully convolutional neural network using gradient descent;
store the iteratively trained fully convolutional neural network with the set of training parameters in the predictive model repository;
receive an unlabeled input image; and
forward-propagate the unlabeled input image through the iteratively trained convolutional neural network with the set of training parameters to generate an output segmentation mask.

US Pat. No. 10,140,543

MEDICAL IMAGE PROCESSING APPARATUS, MEDICAL IMAGE PROCESSING METHOD, AND MEDICAL IMAGING DEVICE

Toshiba Medical Systems C...

1. A medical image processing apparatus, comprising:reception circuitry configured to receive two points specified on at least one image;
first determination circuitry configured to determine a first spine region of interest by performing, on the image, segmentation to extract a spine as a region of interest using a first method;
second determination circuitry configured to determine a second spine region of interest by performing, on the image, segmentation to extract a spine as a region of interest using a second method;
third determination circuitry configured to determine a third spine region of interest by performing, on the image, segmentation to extract a spine as a region of interest using a third method;
fourth determination circuitry configured to determine a fourth spine region of interest by performing, on the image, segmentation to extract a spine as a region of interest by taking the two points as reference boundary positions;
detection circuitry configured to detect a group of intervertebral discs in each of the first to the third spine regions of interest, and detect a group of intervertebral discs by evaluating a luminance distribution within a region that is in the fourth spine region of interest and that includes the two points; and
intervertebral disc selection circuitry configured to select one of the groups of intervertebral discs detected by the detection circuitry and best meeting a predetermined evaluation standard as an intervertebral disc detection result.

US Pat. No. 10,140,542

METHOD AND APPARATUS FOR RECOVERING A VEHICLE IDENTIFICATION NUMBER FROM AN IMAGE

Blinker, Inc., Denver, C...

1. A mobile apparatus, comprising:an image sensor configured to convert an optical image into an electrical signal, the optical image including an image of a vehicle license plate;
a storage for storing instructions;
a license plate detector including a processor communicatively coupled to the storage, the processor configured to retrieve the instructions, which when executed cause the processor to:
process the electrical signal to identify one or more object images from the image, each of said one or more images comprising a candidate vehicle license plate image,
process the electrical signal to crop the image to said identified one or more of the object images,
process the electrical signal to score each of the cropped one or more of the object images based on a probability that the cropped object image comprises the vehicle license plate image, wherein each of the cropped one or more object images is scored by:
detecting a plurality of alphanumeric characters in the object image, and
applying a score based on a position of one of the plurality of characters relative a position of another one of the plurality of characters, and
based on the scored object images, process, by the mobile apparatus, the electrical signal to recover information from the vehicle license plate image; and
an interface configured to transmit the vehicle license plate information to a remote apparatus and receive a vehicle identification number corresponding to the vehicle license plate image in response to the transmission.

US Pat. No. 10,140,541

METHOD AND APPARATUS FOR RECEIVING A LOCATION OF A VEHICLE SERVICE CENTER FROM AN IMAGE

Blinker, Inc., Denver, C...

1. A mobile apparatus, comprising:an image sensor configured to convert an optical image into an electrical signal, the optical image including an image of a vehicle license plate;
a storage for storing instructions;
a processor communicatively coupled to the storage, the processor configured to retrieve the instructions;
a license plate detector, which when executed by the processor:
processes the electrical signal to identify one or more object images from the image, each of said one or more images comprising a candidate vehicle license plate image,
processes the electrical signal to crop the image to said identified one or more of the object images,
processes the electrical signal to score each of the cropped one or more of the object images based on a probability that the cropped object image comprises the vehicle license plate image, wherein each of the cropped one or more object images is scored by:
detecting a plurality of alphanumeric characters in the object image, and
applying a score based on a position of one of the plurality of characters relative a position of another one of the plurality of characters, and
based on the scored object images, processes, at the mobile apparatus, the electrical signal to recover information from the vehicle license plate image; and
an interface configured to transmit the vehicle license plate information to a remote apparatus and receive a location of a vehicle service center corresponding to the vehicle license plate image in response to the transmission.

US Pat. No. 10,140,540

VEHICLE IMAGING SYSTEM

PERCEPTICS, LLC, Knoxvil...

1. A license plate recognition system, comprising:a first circuit board having components for capturing an image of a vehicle wherein the first circuit board includes a C lens mount, a lens mounted on the C lens mount and an imaging sensor;
a second circuit board mechanically and electrically coupled to the first circuit board having components for analyzing the image of the license plate captured by the first circuit board, wherein the analyzing includes locating a location of a license plate in the captured image and performing optical character recognition on the characters in the license plate to identify characters in the image for the license plate of the vehicle; and
a housing enclosing both the first circuit board and the second circuit board.

US Pat. No. 10,140,539

CALIBRATION DEVICE FOR CAMERA-FINGER—OFFSET

OPTOFIDELITY OY, Tampere...

1. A method for determining a location of a device under test on a test bench, the method comprising:instructing the device to display at least one pattern on a display of the device;
capturing by an optical element of a testing probe of the testing apparatus at least one image of the display;
examining the captured image to determine whether the image includes said at least one pattern;
determining the location of the testing probe when the at least one pattern has been detected;
using information on the determined location of the testing probe to determine a location of the at least one pattern in the display; and
utilizing information on the location of the at least one pattern to determine a pose of the device under test on the test bench, wherein examining the captured image comprises searching the pattern by moving both the testing probe and the optical element attached with the testing probe for capturing the image.

US Pat. No. 10,140,538

COMPUTING CONTROL DEVICE, COMPUTING CONTROL METHOD, AND COMPUTER READABLE MEDIUM

RENESAS ELECTRONICS CORPO...

7. A computing control method in which a computer executes the following processing of:extracting a node having a plurality of processing functions different from one another from a graph, each of the plurality of processing functions having an accuracy;
calculating a required accuracy of a node subsequent to the node that has been extracted;
selecting a processing function having a minimum accuracy equal to or higher than the required accuracy that has been calculated from among the plurality of processing functions included in the node that has been extracted; and
setting the processing function that has been selected as the processing function of the node that has been extracted.

US Pat. No. 10,140,537

METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA

DAON HOLDINGS LIMITED, G...

1. A method for capturing biometric data comprising:capturing as a video, by a mobile device aimed at the face of a user, images of the face rotating in response to at least one instruction, each frame of the video including an image of the face;
obtaining frames from the video during said capturing operation;
calculating an alignment measure for each obtained frame;
determining groups of frames from the obtained frames;
calculating a composite alignment measure for each frame group;
determining a peak composite alignment measure and a corresponding peak frame group, each frame in the peak frame group including an image that can be used for generating accurate authentication transaction results to authenticate the user; and
storing, in the mobile device, the image from one frame in the peak frame group.

US Pat. No. 10,140,536

FINGERPRINT IDENTIFICATION APPARATUS AND BIOMETRIC SIGNALS SENSING METHOD USING THE SAME

GINGY TECHNOLOGY INC., H...

1. A fingerprint identification apparatus adapted to sense fingerprint images in a first sensing mode and blood glucose information in a second sensing mode, comprising:at least one light module for generating a test light projected to a finger so as to generate first light intensity signals in a first sensing mode or second light intensity signals in a second sensing mode;
at least one photoelectric sensor having a fingerprint sensing face adapted for placement of a finger, and including:
a sensing array configured to:
receive the first light intensity signals in the first sensing mode;
convert the first light intensity signals into first electronic signals in the first sensing mode; and
a spectrum sensing element configured to:
receive the second light intensity signals in the second sensing mode; and
convert the second light intensity signals into second electronic signals in the second sensing mode; and
an identification unit electrically connected with the photoelectric sensor and configured to:
receive the first electronic signals in the first sensing mode;
generate a fingerprint image in the first sensing mode according to the first electronic signals;
receive the second electronic signals in the second sensing mode;
generate a piece of spectrum information according to the second electronic signals; and
obtain a piece of blood glucose information according to the spectrum information in the second mode.

US Pat. No. 10,140,535

DISPLAY DEVICE FOR DISPLAYING RECOMMENDED CONTENT CORRESPONDING TO USER, CONTROLLING METHOD THEREOF AND COMPUTER-READABLE RECORDING MEDIUM

SAMSUNG ELECTRONICS CO., ...

1. A display device, comprising:a display configured to display a content;
an inputter configured to obtain a photographed image of a user;
a memory configured to store feature information of each age stage of pre-classified age stages; and
a processor configured to compare a feature part in the photographed image with the feature information of each age stage of the pre-classified age stages stored in the memory, and calculate an age matching probability of matching the feature part with each age stage of the pre-classified age stages,
wherein the processor is configured to select a plurality of age stages including a first age stage and a second age stage among all of the pre-classified age stages by comparing the age matching probability with a preset threshold value, and control the display to display recommended contents including at least one content of a plurality of contents corresponding to the first age stage and at least one content of a plurality of contents corresponding to the second age stage, and
wherein the processor is configured to adjust a ratio of the recommended contents according to a first age matching probability of matching the feature part calculated for the first age stage and a second age matching probability of matching the feature part calculated for the second age stage and control the display to display the recommended contents having the adjusted ratio.

US Pat. No. 10,140,534

ULTRASONIC IMAGING DEVICES AND METHODS

QUALCOMM Incorporated, S...

1. An apparatus, comprising:an ultrasonic sensor array; and
a control system, at least part of which is coupled to the ultrasonic sensor array, the control system configured to:
acquire first image data, for an area of a finger, generated by the ultrasonic sensor array, the first image data corresponding to at least one first reflected ultrasonic wave received by at least a portion of the ultrasonic sensor array from a target object during a first acquisition time window;
acquire second image data, for the same area of the finger, generated by the ultrasonic sensor array, the second image data corresponding to at least one second reflected ultrasonic wave received by at least the portion of the ultrasonic sensor array from the target object during a second acquisition time window that is longer than the first acquisition time window; and
initiate an authentication process based on the first image data and the second image data.

US Pat. No. 10,140,533

APPARATUSES, SYSTEMS AND METHODS FOR GENERATING DATA REPRESENTATIVE OF VEHICLE OCCUPANT POSTURES

STATE FARM MUTUAL AUTOMOB...

1. A device for determining postures of vehicle occupants by tracking vehicle occupant postures using image recognition, the device comprising:at least one vehicle interior sensor for acquiring at least one image sequence of at least one vehicle occupant;
a memory for storing the vehicle interior data, vehicle occupant posture data relating to the vehicle interior data, a three-dimensional coordinate spatial location extraction module, a vehicle interior data receiving module, a previously classified interior data receiving module, a skeletal pose data generation module, and a vehicle occupant posture determination module; and
a processor that is configured to determine a vehicle operation mode by:
receiving vehicle interior data from the at least one vehicle interior sensor in response to the processor executing the vehicle interior data receiving module, wherein the vehicle interior data is representative of three dimensional vehicle occupant postures;
creating a vehicle occupant posture record for the at least one vehicle occupant comprising the vehicle interior data of the at least one vehicle occupant;
extracting three-dimensional coordinate spatial locations of at least one joint location of the at least one vehicle occupant from the vehicle interior data in response to the processor executing the three-dimensional coordinate spatial location extraction module, wherein the three-dimensional coordinate spatial locations of at least one joint location of the at least one vehicle occupant are stored in the vehicle occupant posture record as vehicle occupant posture data relating to the vehicle interior data;
receiving previously classified vehicle interior data in response to the processor executing a previously classified vehicle interior data receiving module, wherein the previously classified vehicle interior data is representative of known vehicle occupant postures;
recognizing and tracking postures of the at least one vehicle occupant in the image sequence as vehicle occupant posture data by processing the three-dimensional coordinate spatial locations of at least one joint location of the at least one vehicle occupant and the previously classified interior data in response to the processor executing the stored skeletal pose data generation module and adding the vehicle occupant posture data to the vehicle occupant posture record;
determining a vehicle occupant posture based on a comparison of the vehicle interior data with the previously classified vehicle interior data in response to the processor executing the vehicle occupant posture determination module; and
automatically updating the vehicle occupant posture record with the vehicle posture data, wherein a first posture of the at least two vehicle occupant postures corresponds to a posture and an associated range of movement associated with the first posture that the vehicle occupant was oriented for a longest period of total time over at least two occurrences within a predetermined period of time, and wherein a second posture of the at least two vehicle occupant postures corresponds to a posture and an associated range of movement associated with the second posture that the vehicle occupant was oriented for a second longest period of total time within the predetermined period of time.

US Pat. No. 10,140,532

METHOD AND DEVICE FOR MONITORING AT LEAST ONE VEHICLE OCCUPANT, AND METHOD FOR OPERATING AT LEAST ONE ASSISTANCE DEVICE

Daimler AG, Stuttgart (D...

1. A method for monitoring at least one vehicle passenger in a vehicle, the method comprising:capturing images of the vehicle passenger using at least one camera directed toward a first bodily region;
analyzing the captured images of the first bodily region using at least one processor;
determining a first vital sign and a second vital sign different from the first vital sign of the vehicle passenger, the determining of each of the first and second vital signs being based on the image analysis of the captured images;
determining, based on the determined first vital sign and the second vital sign, one or more diagnostic values for: (i) tachycardia or bradycardia, (ii) heart rate variability, and (iii) tendency related to viral infection; and
recommending a suitable countermeasure based at least on the determined one or more diagnostic values,
wherein the determined first vital sign is a pulse rate and the second vital sign is a breathing rate, and
wherein the first vital sign and the second vital sign are both determined from the same captured images of the first bodily region so that it is unnecessary to move or rotate the at least one camera toward a second bodily region to determine the second vital sign.

US Pat. No. 10,140,531

DETECTION OF BRAKE LIGHTS OF PRECEDING VEHICLES FOR ADAPTATION OF AN INITIATION OF ACTIVE SAFETY MECHANISMS

1. A method for determining a warning condition on the basis of brake light detection, the method comprising:receiving image data from a front camera of a present vehicle, the image data comprising image frames;
determining a first detection area in the image frames of the front camera, the first detection area comprising a position of a left brake light and of a right brake light of a preceding vehicle;
determining positions of the left brake light and of the right brake light within the detection area;
determining whether at least one of the left brake light and the right brake light is active by evaluating an intensity distribution in the detection area;
lowering a first initiation threshold, if it is established that at least one of the left brake light and the right brake light of the preceding vehicle is active;
determining a second detection area in the image frames of the front camera, the second detection area comprising a position of an upper brake light of the preceding vehicle;
detecting the position of the upper brake light within the second detection area;
detecting a status of the upper brake light;
lowering the first initiation threshold if it is detected that the upper brake light is activated;
deriving an estimated risk value from the image data of the front camera wherein the estimated risk value is derived from a distance from the preceding vehicle, a relative speed of the preceding vehicle and deceleration of the preceding vehicle; and
if the estimated risk value exceeds the first initiation threshold:
producing a warning signal; and
initiating an active safety function, the active safety function being selected from a collision warning, a brake prefill, a hydraulic brake assistance and an active emergency braking.

US Pat. No. 10,140,530

METHOD AND DEVICE FOR IDENTIFYING PATH BOUNDARY FOR VEHICLE NAVIGATION

WIPRO LIMITED, Bangalor ...

1. A method for identifying path boundary for vehicle navigation, the method comprising:capturing, by a vehicle navigation device, a plurality of images of a path being traversed by a vehicle, through a plurality of cameras placed to meet predefined placement criteria;
processing, by the vehicle navigation device, shadowed regions within each of the plurality of images based on an associated Hue Saturation and Value (HSV) color space to generate a plurality of shadow processed images;
identifying, by the vehicle navigation device, boundaries of the path within each of the plurality of shadow processed images based on a histogram of each of the plurality of shadow processed images; and
estimating, by the vehicle navigation device, a distance between the boundaries of the path identified in the plurality of shadow processed images, based on a disparity map created for the plurality of shadow processed images and parameters associated with the plurality of cameras.

US Pat. No. 10,140,529

METHOD, APPARATUS AND DEVICE FOR DETECTING LANE LINES

NEUSOFT CORPORATION, She...

1. A method for detecting a lane line, comprising:determining candidate lane line regions in a lane image by filtering the lane image;
extracting center points for each of the candidate lane line regions, wherein the center points comprise a midpoint between two endpoints of each row in each of the candidate lane line regions;
obtaining a fitting curve of each of the candidate lane line regions by performing curve fitting on the center points of each of the candidate lane line regions;
classifying the candidate lane line regions as rectilinear candidate lane line regions and curvilinear candidate lane line regions according to a slope angle of the fitting curve of each of the candidate lane line regions;
dividing the candidate lane line regions into groups based on the classifying result, wherein each curvilinear candidate lane line region alone forms a group, one or more rectilinear candidate lane line regions form a group and candidate lane line regions in a same group correspond to a same lane line; and
determining two of the groups, which meet a first predetermined condition, as target groups, and recognizing candidate lane line regions in the target groups as lane line regions,
wherein the first predetermined condition comprises at least one of: a distance between lane lines corresponding to the two groups is within a first predetermined range of distance, and an included angle of the lane lines corresponding to the two groups is within a first predetermined range of included angle.

US Pat. No. 10,140,528

LANE DETECTION APPARATUS AND LANE DETECTION METHOD

DENSO CORPORATION, Kariy...

1. A lane detection apparatus that is mounted on a vehicle including a plurality of vehicle onboard cameras and detects a lane along which the vehicle travels, based on analysis of images captured by the plurality of vehicle onboard cameras, the lane detection apparatus comprising:a side detection portion that detects a side lane division existing on a side of the vehicle, based on an image captured by a side vehicle onboard camera imaging an area around the side of the vehicle;
a front detection portion that detects a front lane division existing in front of the vehicle, based on an image captured by a front vehicle onboard camera imaging an area around the front of the vehicle;
a traveling speed detection portion that detects a traveling speed of the vehicle;
a position correction portion that corrects a position of the front lane division based on a time lag of imaging timing between the side vehicle onboard camera and the front vehicle onboard camera, and the traveling speed;
a checkup portion that compares a position of the side lane division and a corrected position of the front lane division; and
an output portion that outputs the position of the side lane division as a detection result when the position of the side lane division and the corrected position of the front lane division are matched with each other.

US Pat. No. 10,140,527

APPARATUS AND METHOD FOR RECOGNIZING DRIVING LANE OF VEHICLE

Hyundai Motor Company, S...

1. A method for recognizing a driving lane of a vehicle, the method comprising steps of:extracting front lane attribute information of a driving road from a front image and extracting current position lane attribute information using vehicle information and satellite information;
comparing the front lane attribute information with the current position lane attribute information, calculating numerical matching points for each lane based on a compared result, outputting a lane having a largest value among the calculated numerical matching points for each lane as a driving lane matching result, and calculating a driving lane tracking result based on a previous driving lane and lane change information; and
determining any one of the driving lane matching result and the driving lane tracking result as a current driving lane of the vehicle based on the driving lane matching result and the driving lane tracking result,
wherein a front camera recognition is used as a weight when calculating the numerical matching points,
wherein the front camera recognition includes a camera recognition related to a style and a color of a lane on the driving road within a predetermined front distance from the vehicle,
wherein the front camera recognition for a lane closer to the front camera has a value larger than the front camera recognition for a lane farther from the front camera, and
wherein the front camera recognition for the style of the lane has a value larger than the front camera recognition for the color of the lane.

US Pat. No. 10,140,526

OBJECT DETECTING DEVICE

HITACHI AUTOMOTIVE SYSTEM...

1. An object detecting system comprising:two cameras configured to capture images in front of a vehicle; and
a processor configured to:
compare individual images of the two cameras and calculate a disparity for each pixel;
set a boundary between a near region close to the vehicle and a far region distant from the vehicle, in a single image of one of the two cameras;
detect an object of the near region, on the basis of the disparity; and
detect an object of the far region, on the basis of the single image,
wherein the processor configured to set the boundary further comprises the processor configured to:
output a V-Disparity image obtained by projecting, onto a virtual plane where a first axis shows the disparity and a second axis shows a coordinate position of a longitudinal direction of each pixel of the single image, data of the disparity and the coordinate position corresponding to each pixel of the single image.

US Pat. No. 10,140,525

SYSTEM AND METHOD FOR CAPTURING A REAR PART OF A VEHICLE

1. A system for a vehicle having a driver's cabin and a rearward extending portion that is pivotable with respect to the driver's cabin, for capturing a location of a rear part of the rearward extending portion, the system comprisingat least two wheel sensors, two of the at least two wheel sensors being located at opposite ends of a common axis of the rearward extending portion for acquiring information relating to a rotational movement of wheels attached at the ends of the common axis;
a control unit in communication with the wheel sensors, the control unit determining an alignment of the rear part of the rearward extending portion based only on the acquired information relating to the rotational movement of the wheels from the two wheel sensors which are located at opposite ends of the common axis; and
an indicator viewable from the driver's cabin, the indicator being adjusted based on the determination of the control unit to ensure that the rear part of the rearward extending portion is viewable from the driver's cabin,
wherein the indicator comprises a system for indirect view for providing a field of view of an area which is located outside the driver's cabin, wherein the control unit controls the system for indirect view based on the acquired information on the rotational movement of the wheels in order to adapt the field of view such that the rear part of the rearward extending portion is always located within the field of view.

US Pat. No. 10,140,524

SPARE TIRE BACKUP CAMERA MOUNTING SYSTEM

BrandMotion, LLC, Southf...

13. A monitoring system for a vehicle, the vehicle having a spare-tire hub assembly for securing a spare tire to a rear door or other rear-facing component and a passenger-compartment display system capable of displaying to a vehicle occupant, the system comprising:a camera for conveying images to the display system for display to the vehicle occupant; and
a mounting system for attaching the camera to the spare-tire hub assembly, the mounting system including:
i) a plate having a plurality of apertures sufficient for at least one of a plurality of studs extending rearwardly from the spare-tire hub assembly to fit therethrough, the plate including a first orifice outward of the plurality of apertures;
ii) an arm having a connection end and a distal end, the camera being affixed to the distal end and the connection end including a second orifice;
iii) a linkage interconnecting the plate with the arm, the linkage including a plate channel and an arm channel with the plate and arm channels being elongated;
iv) a plate fastener positioned through the first orifice removably attaching the plate to the plate channel using threads that engage sides of the plate channel; and
v) an arm fastener positioned through the second orifice removably attaching the arm to the arm channel using threads that engage sides of the arm channel.

US Pat. No. 10,140,523

SETTING METHOD OF A COUNTING FLOW PATH, IMAGE MONITORING SYSTEM WITH SETTING FUNCTION OF THE COUNTING FLOW PATH AND RELATED COMPUTER-READABLE MEDIA

VIVOTEK INC., New Taipei...

1. A setting method applied to a counting flow path, the counting flow path being utilized to determine whether an object passes through a monitoring area, the setting method comprising:drawing two boundaries on a video frame correlative to the monitoring area to define the counting flow path;
detecting relative position between a first angle control point and a second angle control point on the counting flow path;
adjusting an angle formed by virtual lines stretching from the two boundaries according to the relative position between the first angle control point and the second angle control point; and
utilizing an initial point and a final point detected by the counting flow path while the objects moves into and out of the counting flow path to determine whether the object passes through the counting flow path.

US Pat. No. 10,140,522

FULLY CONVOLUTIONAL PYRAMID NETWORKS FOR PEDESTRIAN DETECTION

INTEL CORPORATION, Santa...

1. A visual object detection system comprising:a multi-scale image generator to generate a set of images from an input image, the set of images being versions of the input image at different scales;
an object-specific fully convolutional network (FCN) model operable to generate a set of detection results for each image in the set of images that is indicative of objects that are potentially of a specific object type, wherein the object-specific FCN model is generated from a transfer learning guided FCN initially that is trained, in part, by application of a fine-tuned process that is based on data of the specific object type; and
a post processor to combine sets of detection results generated by the FCN model for the set of images into an output image with each object location determined as potentially being the specific object type.

US Pat. No. 10,140,521

METHOD, SYSTEM AND APPARATUS FOR PROCESSING AN IMAGE

Canon Kabushiki Kaisha, ...

1. A method for re-identifying a query object moving from a first camera view to a second camera view using an apparatus or system having at least one processor, a first camera and a second camera, the method comprising the steps of:capturing, via the first camera, a first set of image frames from the first camera view and determining, via the first camera, a plurality of intra-camera object appearance distances between frame pairs in the first set of image frames;
capturing, via the second camera, a second set of image frames from the second camera view and determining, via the second camera, a plurality of intra-camera object appearance distances between frame pairs in the second set of image frames;
accessing, via the at least one processor, the first set of image frames captured from the first camera view of the first camera and the second set of image frames captured from the second camera view of the second camera, the first set of image frames including an instance of the query object and the second set of image frames including an instance of a candidate object;
selecting, via the at least one processor, a first representative frame from the first set of image frames based on the plurality of intra-camera object appearance distances between frame pairs in the first set of image frames and a second representative frame from the second set of image frames based on the plurality of intra-camera object appearance distances between frame pairs in the second set of image frames; and
re-identifying, via the at least one processor, the candidate object in the second camera view as the query object in the first camera view based on at least one inter-camera object appearance distance calculated between the first representative frame and the second representative frame.

US Pat. No. 10,140,520

DETERMINING NATIVE RESOLUTIONS OF VIDEO SEQUENCES

NETFLIX, INC., Los Gatos...

1. A computer-implemented method, comprising:determining a low frequency region associated with a scene within a video sequence;
computing an energy density ratio based on the low frequency region; and
based on a comparison between the energy density ratio and a predetermined threshold, computing a native resolution of the scene based on one or more dimensions of the low frequency region, or setting the native resolution of the scene to a display resolution.

US Pat. No. 10,140,519

GENERATING A SUMMARY VIDEO SEQUENCE FROM A SOURCE VIDEO SEQUENCE

Axis AB, Lund (SE)

1. A method for generating a summary video sequence from a source video sequence, the method comprising:identifying, in the source video sequence, event video sequences, wherein each event video sequence comprises consecutive video frames in which one or more objects of interest are present;
extracting, from video frames of one or more event video sequences of the event video sequences, pixels depicting the respective one or more objects of interest; and
while keeping spatial and temporal relations of the extracted pixels as in the source video sequence, overlaying the extracted pixels of the video frames of the one or more event video sequences onto video frames of a main event video sequence acting as a background sequence, the main event video sequence being one of the event video sequences, thereby generating the summary video sequence.

US Pat. No. 10,140,518

CONTENT INFORMATION AUDITING SERVICE

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:maintaining, by a computer system, content information for a plurality of videos that identifies at least one of cast or crew associated with each video;
receiving, by the computer system, a request to identify particular content information and an identity associated with a particular video of the plurality of videos;
determining, by the computer system, a time period within the particular video that is associated with presentation of credit information for the particular video based at least in part on metadata associated with the particular video;
identifying, utilizing optical character recognition, a plurality of words in the credit information of the particular video based at least in part on the time period;
determining, by the computer system, the particular content information associated with the particular video based at least in part on the plurality of words in the credit information of the particular video and the content information for the plurality of videos;
selecting, by the computer system, a set of rules that are utilized to identify errors in the particular content information of the particular video, the set of rules comprising at least a first rule using a first location of a particular word of the plurality of words in a first frame of a segment of the particular video and a second location for the particular word in a second frame of the segment of the particular media work to identify the errors, and a second rule using a statistical operation associated with a word count of the particular word in the segment and a threshold;
updating, by the computer system, a user interface that is configured to present, via a corresponding user device, the errors identified for the particular word in the particular content information of the particular video based at least in part on applying the set of rules to the particular content information, the user interface including one or more words, including the particular word, grouped in a first configuration;
receiving, by the computer system, input from the user interface of the corresponding user device that identifies movement of the particular word to a new location on the user interface, the new location usable to associate the particular word with at least one of a specific cast or crew associated with the particular video, the one or more words grouped in a second configuration based at least in part on the input and the association;
updating, by the computer system, the content information for the plurality of videos based at least in part on the input for the particular content information of the particular video; and
determining, by the computer system, the identity of the particular video based at least in part on a comparison of a classification of entities included in the particular content information of the particular video and the classification of entities included in associated content information from a set of videos of the plurality of videos.

US Pat. No. 10,140,517

EVENT-BASED IMAGE CLASSIFICATION AND SCORING

DROPBOX, INC., San Franc...

1. A method comprising:identifying a plurality of images stored on an online content management service;
analyzing the plurality of images to identify features from the plurality of images;
receiving from a client device, indications of user selections indicating user preferences among the plurality of images;
training a predictive activity model to weight the features from the plurality of images according to the user preferences indicated by the user selections;
determining image characteristic scores associated with the predictive activity model that correspond to the weighted features of the plurality of images;
receiving, at the online content management service, an image from the client device;
generating at least one image characteristic score for at least one feature of the image;
comparing the at least one image characteristic score of the image to the image characteristic scores associated with the predictive activity model to determine that the at least one image characteristic score is similar to one or more of the image characteristic scores; and
based on the determination that the at least one image characteristic score of the image is similar to the one or more of the image characteristic scores, providing, for display on a graphical user interface of the client device, an action recommendation comprising a selectable element to change settings associated with the image.

US Pat. No. 10,140,516

EVENT-BASED IMAGE MANAGEMENT USING CLUSTERING

SAMSUNG ELECTRONICS CO., ...

6. A system for managing images, comprising:a processor programmed to initiate executable operations comprising:
generating clusters of images from a plurality of images having locations and timestamps, wherein the clusters represent events and are generated according to a distance metric based upon geographic distance and time difference between consecutive pairs of the plurality of images sorted according to time;
merging selected clusters into a merged cluster representing a trip by grouping the clusters into cluster groups according to geographic distance between the clusters, selecting a cluster group according to unique dates in the cluster groups, sorting the clusters of the selected cluster group according to timestamps, and combining at least two of the clusters of the selected cluster group into the merged cluster according to a time difference and the geographic distance between the at least two clusters; and
displaying the plurality of images organized according to the trip.

US Pat. No. 10,140,515

IMAGE RECOGNITION AND CLASSIFICATION TECHNIQUES FOR SELECTING IMAGE AND AUDIO DATA

A9.com, Inc., Palo Alto,...

1. A computer-implemented method, comprising:receiving, from a computing device, an image and image capture data associated with the image;
using a trained neural network to identify a plurality of image descriptors corresponding to one or more determined characteristics of the image, based at least on a comparison of the image to a set of stored image descriptors;
causing a first query including a first set of image descriptors of the plurality of image descriptors to be executed against a set of music descriptors, wherein each of the set of music descriptors is associated with one or more songs available to the computing device;
determining a song mapping between the first set of image descriptors and the set of music descriptors;
generating a playlist of songs based on the song mapping, wherein the songs in the playlist of songs are associated with a music descriptor corresponding to the first set of image descriptors;
causing the playlist of songs to be transmitted to the computing device;
causing a second query including a second set of image descriptors of the plurality of image descriptors to be executed against a set of stored images associated with a user of the computing device;
determining an image mapping between the second set of image descriptors and a third set of image descriptors, each of the third set of image descriptors being associated with one or more images of the set of stored images;
causing an identification of the one or more images of the set of stored images based on the second query and the image mapping;
causing the identification to be transmitted to the computing device; and
causing the one or more images of the set of stored images to be displayed while the playlist of songs is being played.

US Pat. No. 10,140,514

CAPTURING AND SHARING IMAGES WITH MOBILE DEVICE USERS INCLUDING FOR A LIMITED DURATION OF TIME

IP Holdings, Inc., Palo ...

21. A method performed by at least an application of a mobile device having one or more processors, the method comprising:acquiring an image using an interface to one or more cameras of the mobile device;
constructing an image entity using the acquired image, one or more other images, and an image profile of the acquired image;
transmitting the image entity to one or more servers to update and/or refresh display of the constructed image entity, wherein the constructed image entity is accessible to one or more recognized users of a virtual network via one or more client devices through applications in communication with the one or more servers.

US Pat. No. 10,140,513

REFERENCE IMAGE SLICING

LAYAR B.V., Amsterdam (N...

1. A method of generating reference features sets on a basis of a reference image of an object, said reference features sets for use in an image processing function configured to recognize the object and/or estimate pose information of the object from an image frame obtained from a digital imaging device by matching extracted features of the image frame with the reference features sets, the method comprising:extracting a first reference features set from the reference image;
obtaining a first slice of the reference image, wherein the first slice is a first portion of the reference image;
extracting a second reference features set on the basis of the first slice;
obtaining a second slice of the reference image, wherein the second slice is a second portion of the reference image and wherein the first and second portions partially overlap;
extracting a third reference features set on the basis of the second slice;
generating metadata for the reference image, the first slice and the second slice, said metadata comprising information indicating a hierarchical relationship between the reference image, the first slice and the second slice, wherein the metadata comprises at least one of: hierarchical relationship information, parent-child relationship information, sibling relationship information, relative distance information, relative positioning information, and sizing information; and
identifying, from the extracted reference features sets, the reference features sets belonging to the object, based on the generated metadata for the reference image, the first slice and second slice.

US Pat. No. 10,140,512

CHART ANALYSIS METHOD AND SYSTEM

Think-Cell Software GMBH,...

1. A computer-implemented image analysis method for automatically extracting data from a bar chart, the method comprising:receiving a digital image of a bar chart, the digital image comprising a plurality of observable bars (o-bars), each o-bar being a set of pixels of the digital image representing a bar of the bar chart;
providing a plurality of hypothesis charts, each hypothesis chart being a data object that specifies a sequence of hypothetical bars (h-bars) and a particular way of grouping the h-bars into categories, and that comprises an injective mapping from the o-bars to the h-bars such that each o-bar has assigned thereto exactly one of the h-bars of said hypothesis chart, wherein each hypothesis chart comprises an assignment of at least one of an expected, series-specific color and an expected, series-specific texture to each respective h-bar in dependency on a position of the respective h-bars in a respective category;
comparing a position and at least one of a color and a texture of the h-bars of each of the plurality of hypothesis charts with a position and at least one of a color and a texture of their respectively mapped o-bars, and identifying a hypothesis chart among the plurality of hypothesis charts that is most similar to the bar chart based on the comparing;
applying the grouping of the h-bars into categories as specified in the identified most similar hypothesis chart to the o-bars, such that each o-bar gets assigned thereto a data series and a category of an h-bar of the identified most similar hypothesis chart respectively mapped to said o-bar;
returning the data series and the category respectively assigned to each of the o-bars by the identified most similar hypothesis chart, including automatically extracting numerical data represented by the o-bars of the bar chart, the extracted numerical data comprising, for each o-bar, a data value represented by a height of said o-bar, and representing the extracted numerical data in a tabular data structure; and
outputting the tabular data structure.

US Pat. No. 10,140,511

BUILDING CLASSIFICATION AND EXTRACTION MODELS BASED ON ELECTRONIC FORMS

KOFAX, INC., Irvine, CA ...

1. A computer-implemented method for building a classification and/or data extraction knowledge base using an electronic form, the method comprising:receiving an electronic form having associated therewith a plurality of metadata labels, each metadata label corresponding to at least one element of interest represented within the electronic form;
parsing the plurality of metadata labels to determine characteristic features of the element(s) of interest;
building a representation of the electronic form based on the plurality of metadata labels;
generating a plurality of permutations of the representation of the electronic form by applying a predetermined set of variations to the representation; and
training either a classification model, an extraction model, or both using:
the representation of the electronic form, and
the plurality of permutations of the representation of the electronic form.

US Pat. No. 10,140,510

MACHINE PRINT, HAND PRINT, AND SIGNATURE DISCRIMINATION

KOFAX, INC., Irvine, CA ...

1. A non-transitory computer readable medium having program code readable and/or executable by a processor to:receive an image;
determine a color depth of the received image, the color depth being selected from the group consisting of: grayscale, bi-tonal and color;
reduce the color depth of the received image to generate a bi-tonal representation of the image in response to determining the color depth of the received image is not bi-tonal;
identify a set of one or more graphical line candidates in the bi-tonal representation, each of the graphical line candidates being independently selected from the group consisting of: true graphical lines and false positives;
discriminate any of the true graphical lines from any of the false positives;
remove the true graphical lines from the bi-tonal representation without removing the false positives to generate a component map comprising connected components and excluding graphical lines;
identify one or more of the connected components in the component map; and
perform one or more operations selected from the group consisting of:
output an indicator of each of the connected components, each indicator identifying one or more of the connected component and a particular class to which the connected component corresponds, and
display the indicator of each of the connected components; wherein the indicator comprises either or both of: a label identifying the particular class to which the connected component corresponds, and a bounding box surrounding the connected component.

US Pat. No. 10,140,509

INFORMATION PROCESSING FOR DETECTION AND DISTANCE CALCULATION OF A SPECIFIC OBJECT IN CAPTURED IMAGES

SONY CORPORATION, Tokyo ...

1. An information processing device, comprising:a central processing unit (CPU) configured to:
analyze pattern-irradiated images captured by at least one camera from a plurality of different viewpoints, wherein each of the pattern-irradiated images includes a specific object and a pattern image;
calculate an object distance between the specific object and the at least one camera, based on the pattern-irradiated images of the plurality of different viewpoints;
generate non-pattern-irradiated images that include the specific object without the pattern image;
extract feature values of the specific object from the non-pattern-irradiated images based on a plurality of filters;
determine a position of the specific object based on the extracted feature values;
calculate a sum score by addition of the extracted feature values corresponding to the plurality of filters; and
detect the specific object based on the calculated sum score and the determined position.

US Pat. No. 10,140,508

METHOD AND APPARATUS FOR ANNOTATING A VIDEO STREAM COMPRISING A SEQUENCE OF FRAMES

HUAWEI TECHNOLOGIES CO. L...

1. A method of training an image recognition tool for detecting images of a person:scanning a first frame in a video stream comprising a sequence of frames for images of a person;
generatinq a representation of the region of interest of the first frame likely to contain the image of the person;
forming a video track comprising the representation of a region of interest of the first frame likely to contain an image of the person;
scanning each subsequent frame in the sequence of frames for images of the person in each subsequent frame, wherein the scanning each frame begins at a location in each frame based on a location of the region of interest of a preceding frame;
for each subsequent frame in the sequence of frames:
generating a representation of the region of interest of the subsequent frame likely to contain the image of the person;
adding, to the video track, the representation of a region of interest of subsequent frame likely to contain the image of the person;
assigning a positive label to the video track when the representation of the region of interest in at least one of the first frame and the subsequent frames contains the person and no other people, the positive label identifying the video track as corresponding to the person; and
designating each representation of the region of interest in the positively labeled video track as a positive instance and providing each representation of the region of interest in the positively labeled video track to the image recognition tool for training a multiple-instance learning algorithm of the image recognition tool.

US Pat. No. 10,140,507

APPARATUS AND METHOD FOR RECOGNIZING HAND GESTURES IN A VIRTUAL REALITY HEADSET

Samsung Electronics Co., ...

1. A virtual reality apparatus comprising:a plurality of vision sensors configured to detect objects in a vicinity of a user of the virtual reality apparatus; and
a processor coupled to the plurality of vision sensors and configured to:
compare a first object detected by a first vision sensor with a second object detected by a second vision sensor,
in response to the comparison, to:
identify the first detected object as a hand of the user;
differentiate the hand of the user from a hand of a person other than the user;
detect an arm of the user;
comparing a relative position of the detected hand and a relative position of the detected arm of the user, and
ignore hand gestures of the person other than the user.

US Pat. No. 10,140,506

IDENTIFICATION METHOD USING PARTITIONING OF SUBJECT SILHOUETTES

King Fahd University of P...

1. A method of identifying a human subject by gait recognition, the method comprising:obtaining a number of image frames of the human subject showing the human subject's walking style and storing the image frames in a memory,
receiving by circuitry a gait sequence, the gait sequence including a predetermined number of the image frames of the human subject;
processing by circuitry, the received gait sequence to generate a gait-energy-image (GEI), wherein the GEI is a sum of walking silhouette images divided by the number of images;
computing by circuitry, a plurality of Gabor filter responses by convoluting the generated GEI with a bank of Gabor filters, the filter bank including a first predetermined number of unique scales, and a second predetermined number of unique orientations,
partitioning by circuitry, each Gabor filter response of the computed plurality of Gabor filter responses, into a predetermined number of overlapping regions, wherein the partitioning is performed as a fraction of the height of the human subject and width of the human subject, and is denoted by horizontal and vertical lines;
extracting by circuitry, a predetermined number of statistical features only from the overlapping regions, the extracted statistical features corresponding to texture content of the subject; and
identifying by circuitry, the human subject based on a classification of the extracted statistical features.

US Pat. No. 10,140,505

SYSTEM AND METHOD FOR FACIAL RECOGNITION USING IMAGES CAPTURED FROM A TARGET ILLUMINATED WITH INFRARED LIGHT

StereoVision Imaging, Inc...

1. A method for comparing images, the method comprising:receiving a target image, wherein the target image corresponds to a target illuminated by an infrared light source during capture of the target by a camera sensitive to infrared light;
receiving a color image, the color image comprising a color image of a subject;
suppressing a blue component or a green component of a plurality of pixels in the color image to produce a color-suppressed image; and
determining whether the target matches the subject by comparing the target image with the color-suppressed image.

US Pat. No. 10,140,504

SYSTEM AND METHOD UTILIZING FACIAL RECOGNITION WITH ONLINE (SOCIAL) NETWORK TO ACCESS CASUALTY HEALTH INFORMATION IN AN EMERGENCY SITUATION

1. A method of automatically identifying a casualty, comprising:receiving a presenting image of the casualty at a server hosted by a casualty identification service, the presenting image captured by a camera of a mobile computing device of a medical first responder in an emergency medical service system, the server in communication with a database containing a master image and an identity profile corresponding to a member of the casualty identification service;
running a facial recognition engine to compare the presenting image to the master image;
determining a matching identity of the casualty based on a matching of the presenting image to the master image of the member; and
when the matching identity is found:
transmitting the identity profile of the member to at least one of the medical first responder and a medical provider in an emergency medical services system;
when the matching identity is not found;
running a social network interface configured to determine the matching identity of the casualty based on the matching of the presenting image to a profile image at least one of a plurality of users in a participating social network utilizing a facial recognition engine of the participating social media network; and
when the matching identity is found on the participating social network;
transmitting at least one social network user identity to at least one of the medical first responder and the medical provider.

US Pat. No. 10,140,503

SUBJECT TRACKING APPARATUS, CONTROL METHOD, IMAGE PROCESSING APPARATUS, AND IMAGE PICKUP APPARATUS

CANON KABUSHIKI KAISHA, ...

1. A subject tracking apparatus that tracks a subject included in images that are sequentially supplied, the apparatus comprising:one or more processors; and
a memory storing instructions which, when the instructions are executed by the one or more processors, cause the subject tracking apparatus to function as units comprising:
a first registering unit configured to register a partial area indicative of the subject in one image of the supplied images as a template;
a first matching unit configured to estimate a subject area by collating a partial area in a newly supplied image with the template registered by the first registering unit;
a second registering unit configured to generate a histogram based on pixel values of a partial area indicative of the subject in one image of the supplied images and register the generated histogram;
a second matching unit configured to estimate a subject area by collating a histogram based on pixel values of a partial area in a newly supplied image with the histogram registered by the second registering unit; and
a tracking area determination unit configured to determine a tracking area based on either of a first area that is the subject area estimated by the first matching unit or a second area that is the subject area estimated by the second matching unit,
wherein the partial area of which the second registering unit generates the histogram based on the pixel values is larger than the partial area registered as the template by the first registering unit.

US Pat. No. 10,140,502

SELECTING DATA ITEMS USING BIOMETRIC FEATURES

CONDUIT LTD, Nes Ziona (...

1. A computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when read by a processor, cause the processor to perform a method, wherein the processor is capable of executing different programs, wherein the method comprising:obtaining a biometric feature of a user;
selecting a data item from a plurality of data items, wherein each item in the plurality of data items is associated with a different biometric feature, wherein said selecting the data item is based on the biometric feature of the user; and
using the data item in a program as part of an operation, wherein the program is executed by the processor, wherein the operation depends on a current context of the program, whereby different results are achieved for a same data item in different contexts of the program.

US Pat. No. 10,140,501

HIGH RESOLUTION THIN DEVICE FOR FINGERPRINT RECOGNITION

CentraLED Technology, Ltd...

1. A high resolution thin device for fingerprint recognition, used to sense or recognize a fingerprint, comprising:a transparent plate, being made of light transmitting substance, a fingerprint of a finger to be recognized being placed on the surface of the transparent plate;
an imaging component, being fixedly provided beside a surface that is opposite to the surface where the finger being placed on of the transparent plate;
an optical sensor, being fixedly provided beside the imaging component in a way that the imaging component being in between the transparent plate and the optical sensor;
at least one light source, being fixedly provided beside the transparent plate, wherein the light transmitted from the light source penetrates the transparent plate and illuminates the fingerprint; and
wherein the imaging component is composed of a box type structure with a pinhole, with each side wall of the box type structure being opaque;
wherein a size of an opening (Whole) of the pinhole and a pixel number (Wpixel) of the optical sensor is selected based on the equation below:
0.3Wpixel?Whole?3Wpixel;
and
wherein the pinhole is selected to have a relating function based on the following equation:
Wc<4H2 or Wc=4H2.

US Pat. No. 10,140,500

METHOD, APPARATUS, AND SYSTEM FOR RECOGNIZING FINGERPRINT

SAMSUNG ELECTRONICS CO., ...

1. A fingerprint recognition method, comprising:receiving a query image, the query image corresponding to at least a portion of a fingerprint;
dividing the query image into a plurality of blocks;
generating a code element for each of the plurality of blocks based on a feature of the respective block;
determining a code corresponding to the query image by combining the code elements;
obtaining information corresponding to the code from a lookup table, the information being one of a set number of candidate enrolled images and a set number of candidate regions for the query image; and
verifying the query image based on the obtained information corresponding to the code.

US Pat. No. 10,140,499

SYSTEMS AND METHODS FOR TOUCH AND PRESS DETECTION USING A SENSOR

Synaptics Incorporated, ...

1. A device, comprising:a fingerprint sensor; and
a processor configured to:
detect presence of a finger on the fingerprint sensor;
cause the fingerprint sensor to take a plurality of measurements using multiple successive frames of the fingerprint sensor;
for each measurement in the plurality of measurements, compute a metric associated with the measurement at a given frame corresponding to the measurement;
at a first particular frame, determine that the finger has settled on the fingerprint sensor based on the metric at the first particular frame;
based on determining that the finger has settled, determine that a finger touch has occurred;
at a second particular frame, determine that the metric at the second particular frame has exceeded a press threshold; and
based on determining that the finger has exceeded the press threshold, determine that a finger press has occurred.

US Pat. No. 10,140,498

WAFER-LEVEL PACKAGING SENSING DEVICE AND METHOD FOR FORMING THE SAME

XINTEC INC., Taoyuan (TW...

12. A sensing device, comprising:a first substrate and a second substrate;
a cover plate, wherein the first substrate is between the second substrate and the cover plate;
a sensing region, wherein the sensing region is adjacent to a surface of the first substrate that faces the cover plate;
a redistribution layer, wherein the redistribution layer is between the first substrate and the second substrate, and wherein the redistribution layer is electrically connected to the sensing region and the second substrate;
an underfill layer, wherein the underfill layer is between the redistribution layer and the second substrate; and
an encapsulating layer, wherein the encapsulating layer surrounds the first substrate and the underfill layer.

US Pat. No. 10,140,497

METHODS AND SYSTEM FOR READING BARCODES CAPTURED ON MULTIPLE IMAGES

Symbol Technologies, LLC,...

1. A method of stitching a machine-readable code representing an encoded string, the method comprising:in a first image, optoelectrically capturing a first portion of the machine-readable code, the first portion extending to a first boundary;
in a second image, optoelectrically capturing a second portion of the machine-readable code, the second portion being different from the first portion, the second portion extending to a second boundary;
determining a presence of a match between a first matching part of the first portion and a second matching part of the second portion, the first matching part abutting the first boundary and the second matching part abutting the second boundary;
responsive to the presence of the match, determining a presence of an overlap between the first matching part and the second matching part; and
responsive to the presence of the overlap, stitching the first portion of the machine-readable code with the second portion of the machine-readable code, the stitching being based at least in part on the overlap,
wherein the determining the presence of the overlap includes:
determining a presence of a reference mark in the first image and in the second image;
determining a first relative location of the reference mark relative to the first matching part;
determining a second relative location of the reference mark relative to the second matching part; and
evaluating the first relative location and the second relative location.

US Pat. No. 10,140,496

SYSTEM FOR AND METHOD OF STITCHING BARCODE FRAGMENTS OF A BARCODE SYMBOL TO BE READ IN AN IMAGING-BASED PRESENTATION WORKSTATION

Symbol Technologies, LLC,...

1. A system for stitching barcode fragments of a barcode symbol to be read by an imaging-based presentation workstation, comprising:an imaging assembly supported by the workstation, for capturing a plurality of images, each containing a barcode fragment and a plurality of features located adjacent to the barcode fragment; and
a controller for detecting the plurality of features in each captured image, for matching the plurality of features in the captured images, for stitching the barcode fragments together based on the matched features in the captured images, and for reading the barcode symbol from the stitched barcode fragments.

US Pat. No. 10,140,495

DECONVOLUTION OF DIGITAL IMAGES

INTERNATIONAL BUSINESS MA...

1. A system for deconvolution of digital images comprising:a processor; and
a memory to provide instructions to the processor;
wherein the processor, when executing the instructions, implements:
an element identification module to recognize distorted text within a degraded image by performing optical character recognition on the distorted text to produce an optically recognized character;
a degrading function calculator to compare the optically recognized character with the distorted text from which the optically recognized character was recognized to produce a degrading function; and
a deconvolution module to deconvolve the degrading function for at least a portion of the degraded image to improve the image quality.

US Pat. No. 10,140,494

PHOTOLUMINESCENT AUTHENTICATION DEVICES, SYSTEMS, AND METHODS

Spectra Systems Corporati...

1. A system for authenticating an item, the system comprising:a photoluminescent material disposed on or in a substrate and capable of absorbing an incident radiation from a radiation source and emitting an emitted radiation having a spectral signature with a decay time after removal of the radiation source; and
a photoauthentication device capable of being disposed in contact with the substrate, the photoauthentication device comprising:
the radiation source configured to provide the incident radiation to the photoluminescent material; and
a camera configured to measure the emitted radiation from the photoluminescent material at predefined time intervals during the decay time;
wherein, in connection with providing the incident radiation and measuring the emitted radiation, the photoauthentication device is translated across the substrate while the photoauthentication device is disposed in contact with the substrate; and
wherein after the photoauthentication device is translated across or over the substrate and the radiation source is not providing the incident radiation, the photoauthentication device is static with respect to the substrate and the camera is disposed over the photoluminescent material emitting the emitted radiation when the emitted radiation is measured.

US Pat. No. 10,140,493

METHOD AND APPARATUS FOR TAKING ACTION BASED ON CODED GRAPHICAL OBJECT IN VIDEO CONTENT

JANUS TECHNOLOGIES, INC.,...

1. A method for taking a predetermined action based on a coded graphical object in video content for display by a computer device, comprising:generating, by a host subsystem of the computer device, the video content;
receiving, by a secure subsystem of the computer device that is separate from the host subsystem, the video content over a bus of the computer device; and
determining, by the secure subsystem and transparently to the host subsystem, whether the coded graphical object is present in the video content,
wherein receiving includes the secure subsystem presenting itself as a graphics endpoint to the host subsystem, and
wherein the graphics endpoint comprises a PCIe connected graphics adapter.

US Pat. No. 10,140,492

METHODS AND SYSTEMS FOR VERIFYING AUTHENTICITY OF PRODUCTS

Ennoventure, Inc., Washi...

1. A method, comprising:accessing, by a processor, an image of at least a part of a product label associated with a product;
extracting, by the processor, a plurality of image attributes from the image for creating an image profile of the image;
comparing, by the processor, the image profile with a set of reference image profiles, each reference image profile for a reference image comprising a reference control transform value and a reference validation transform value of the reference image;
upon comparing the image profile, by the processor, determining at least one reference image profile of the set of reference image profiles matching with the image profile;
upon determining the at least one reference image profile, by the processor, determining a control transform value and a validation transform value of the image; and
determining, by the processor, authenticity of the product label by comparing the control transform value and the validation transform value of the image with the reference control transform value and the reference validation transform value of the reference image, respectively.

US Pat. No. 10,140,491

HANDHELD BARCODE READER WITH MULTIPLE CIRCUIT BOARDS

Symbol Technologies, LLC,...

1. A handheld barcode reader comprising:a handle portion;
a head portion positioned on a top of the handle portion;
a window positioned within the head portion;
a first circuit board extending at least partially through the handle portion, the first circuit board defining a first plane, the first circuit board including a decode assembly; and
a second circuit board positioned behind the first plane relative to the window, the second circuit board including an imaging assembly having an imaging sensor, the imaging sensor operable to capture image data over a field of view (FOV), the FOV extending through the first plane and the window.

US Pat. No. 10,140,490

MODULE FOR OPTICAL INFORMATION READER

OPTOELECTRONICS CO., LTD....

1. A module for an optical information reader in which a light-emitting unit having a light source, a collimator lens, a vibration mirror for scanning, a collector mirror or a condenser lens, and a light-receiving sensor are disposed in a module casing to be modularized,wherein a collimator lens unit, in which an aperture limit stop formation member and the collimator lens are integrally disposed in a cylindrical member, is inserted in a lens-barrel hole of the module casing so as to be reciprocatable in an optical axis direction within a predetermined range, and the light-emitting unit is fixed to the module casing in the lens-barrel hole, with an optical axis of the light source aligned with an optical axis of the collimator lens, and wherein the aperture limit stop formation member radiates an output laser beam,
wherein a long hole through which an adjust pin is penetrated so as to be reciprocatable in the optical axis direction within a predetermined range is formed in a peripheral sidewall of the lens-barrel hole of the module casing, and a fitting portion in which a tip portion of the adjust pin penetrating through the long hole is fit is formed in an outer peripheral surface of the cylindrical member,
wherein, on an inner peripheral surface of the lens-barrel hole of the module casing, at a position diametrically opposite from the long hole and the fitting portion, a pair of bearing portions which, in a circumferential direction, are in point contact with the outer peripheral surface of the cylindrical member, and in an axial direction, are in line contact with the outer peripheral surface are formed at positions symmetrical with respect to the position in terms of an inner circumferential direction of the lens-barrel hole,
wherein an open-hole through which an adhesive for fixing the cylindrical member is fillable is formed in a middle region of the pair of bearing portions, and
wherein the bearing portions form a V-shaped slope by two flat surfaces which, in a circumferential direction, are in point contact with the outer peripheral surface of the cylindrical member, and in an axial direction, are in line contact with the outer peripheral surface.

US Pat. No. 10,140,489

DECODING INDICIA WITH POLARIZED IMAGING

Symbol Technologies, LLC,...

1. An apparatus for decoding one or more barcodes on a target object comprising:a window;
an illumination light source configured to illuminate the target object through the window from a fixed position;
a dynamic linear polarizer;
an imaging sensor, each of the illumination light source, the dynamic linear polarizer and the imaging sensor located behind the window at respective fixed positions relative to the window, the imaging sensor having photosensitive elements configured to capture at least one image of the target object through the dynamic linear polarizer with the imaging sensor while the dynamic linear polarizer is set to a different defined polarization during each of N time periods, with N being an integer that is at least three; and
a controller configured to process at least N images of the target object to decode the one or more barcodes on the target object, wherein the at least N images includes at least one image that is captured during each of the N time periods.

US Pat. No. 10,140,488

SYSTEM CONTROLLED BY DATA BEARING RECORDS

OEConnection LLC, Richfi...

1. At least one tangible medium including non-transitory circuit executable instructions operative to cause at least one circuit executing such instructions to carry out a method comprising:a) reading with at least one reader, vehicle identifying indicia included on a tag in operative connection with a damaged vehicle,
b) operating a repair estimate calculation circuit (RECC) to
i) determine responsive at least in part to the read vehicle identifying indicia, a plurality of repair parts usable to repair the damaged vehicle, and
ii) generate a needed parts record (NPR), wherein the NPR includes parts identifying data usable to identify the plurality of repair parts,
c) operating a parts pricing circuit (PPC) to
i) receive the NPR,
ii) responsive at least in part to the NPR, produce a parts pricing record (PPR), wherein the PPR includes repair parts identifying data and respective price data for at least some of the repair parts corresponding to the parts identifying data included in the NPR,
iii) associate a unique identifier (ID) with the PPR,
iv) store the ID and the PPR in associated relation in at least one data store associated with the PPC,
v) make accessible to the RECC the PPR and the ID,
d) operating the RECC to
i) generate a repair order record responsive at least in part to the PPR, wherein the repair order record corresponds to repair of the vehicle and includes the ID,
ii) make the repair order record accessible to a vehicle repair entity (VRE) that is authorized to make repairs to the damaged vehicle,
e) operating a parts order circuit (POC) associated with a seller of vehicle repair parts, to
i) receive at least one input including the ID included in the repair order record,
ii) send the ID from the POC to the PPC,
f) operating the PPC responsive to receipt of the ID from the POC to make the PPR accessible to the POC,
g) operating the POC responsive at least in part to the PPR to cause at least one repair part corresponding to the repair parts identifying data included in the PPR, to be furnished to the VRE to install the at least one repair part on the damaged vehicle.

US Pat. No. 10,140,487

RECONFIGURABLE SLED FOR A MOBILE DEVICE

Hand Held Products, Inc.,...

1. A case for a mobile device, comprising:a frame for holding a mobile device comprising guides running along two sides; and
a cover comprising a plurality of hinged panels having sides that engage with the guides so that the panels are slideable along the guides, wherein
in a first configuration, two of the hinged panels fold to form a peak over the mobile device's back surface and redirect the mobile device's camera's field-of-view using a reflective element affixed to one of the folded hinged panels, the reflective element comprising a mirror with visible markings for indicating that the mirror is in the camera's field of view.

US Pat. No. 10,140,486

SYSTEMS AND METHODS FOR POINT-OF-SALE DETECTION WITH IMAGE SENSORS FOR IDENTIFYING NEW RADIO FREQUENCY IDENTIFICATION (RFID) TAG EVENTS WITHIN A VICINITY OF AN RFID READER

Symbol Technologies, LLC,...

1. A point of sale (POS) system enhanced with one or more image sensors for identifying new radio frequency (RF) identification (RFID) tag events within a particular vicinity of an RFID reader, the POS system comprising one or more processors, the POS system configured to:capture, with the one or more image sensors, a first set of one or more video images, the first set of video images captured at a first time and depicting a first RFID tag environment, the first RFID tag environment being static, wherein the first set of one or more video images does not depict a person moving within the first RFID tag environment, the first RFID tag environment associated with at least a portion of the particular vicinity of the RFID reader;
generate an environment database, the environment database including static analytic information determined from the first set of one or more video images and the RFID reader;
capture, with the one or more image sensors, a second set of one or more video images, the second set of video images captured at a second time and depicting a second RFID tag environment, the second RFID tag environment being active, wherein the second set of one or more video images depicts at least one person moving within the second RFID tag environment, the second RFID tag environment associated with the at least a portion of the particular vicinity of the RFID reader;
update the environment database, the environment database including active analytic information determined from the second set of one or more video images and the RFID reader; and
determine at least one RFID tag event based upon the static analytic information and the active analytic information.

US Pat. No. 10,140,485

PAIRING METHOD FOR WIRELESS SCANNER VIA RFID

HAND HELD PRODUCTS, INC.,...

1. A method comprising:reading, with a radio frequency identification (RFID) reader, an RFID tag address from a RFID tag of an RFID reader base that is coupled to and separate from a point-of-sale device;
prior to pairing of the RFID reader with the RFID reader base, the RFID reader is configured to communicate with a plurality of RFID readers;
pairing the RFID reader with the RFID reader base indicated by the RFID tag address only in response to determining that that the RFID tag address is associated with the RFID reader; and
after the RFID reader is paired with the RFID reader base, transmitting data read from the RFID reader only to the RFID reader base that then transmits the data to the point-of-sale device so that the RFID reader base only relays the data between the paired RFID reader and the point-of-sale device without the data being processed by other devices within wireless range of the RFID reader base.

US Pat. No. 10,140,484

ANTENNA CONTROL APPARATUS

TOSHIBA TEC KABUSHIKI KAI...

1. An antenna control apparatus, comprising:a communication interface configured to receive identification information indicating whether each of a plurality of antennas received transmission information from a different one of a plurality of wireless tags;
a memory device that stores a count for each of the plurality of antennas; and
a controller configured to:
determine, for each of the plurality of antennas, whether the antenna received transmission information from one of the plurality of wireless tags based on a first received identification information,
when at least one, but not all, of the plurality of antennas is determined to have not received transmission information from one of the plurality of wireless tags based on the first received identification information, control the memory device to increment the count for each such antenna, wherein, when all of the plurality of antennas are determined to have not received transmission information from any of the plurality of wireless tags based on the first received identification information, the count for each of the plurality of antennas is not incremented,
determine whether the count for any of the plurality of antennas exceeds a predetermined value, and
when the count for one of the plurality of antennas is determined to exceed the predetermined value, output a notification signal indicating that the one of the plurality of antennas has a malfunction.

US Pat. No. 10,140,483

ANTENNA EMBEDDED INVENTORY SHELF

Amazon Technologies, Inc....

1. An apparatus, comprising:an antenna embedded inventory shelf, including:
a ground plane;
a substrate positioned on top of and adjacent to the ground plane and formed of a material having a low dielectric constant;
a plurality of antenna elements positioned along an upper surface of the substrate such that a radio frequency identification (“RFID”) tag placed near an antenna element of the plurality of antenna elements will be energized by the antenna element; and
a protective cover positioned over the plurality of antenna elements, such that the plurality of antenna elements are positioned between the substrate and the protective cover.

US Pat. No. 10,140,482

RFID SCHEME IN HARSH ENVIRONMENTS

Phase IV Engineering Inc....

1. A sensing system comprising:an RFID tag possessing nonvolatile RFID memory;
a sensor linked with an RFID interrogator system, the RFID interrogator system including a microprocessor, sensor reader, real time clock, timer, non-volatile interrogator memory and an RFID antenna, the non-volatile interrogator memory containing a value sensed by the sensor obtained while the RFID tag was disposed in a first environment that renders the RFID tag inoperable, the non-volatile RFID memory containing the value obtained from the RFID interrogator system only after the RFID tag was disposed in a second environment, the RFID tag operable in the second environment.

US Pat. No. 10,140,481

CARD READER WITH POWER EFFICIENT ARCHITECTURE THAT INCLUDES A POWER SUPPLY AND A WAKE-UP CIRCUIT

SQUARE, INC., San Franci...

1. A transaction device reader comprising: a housing;an interface configured to detect a transaction device; and
a wake-up component configured to send a wake up signal to wake up a microcontroller of the transaction device reader from a sleep state to an active state in response to the transaction device being detected, the microcontroller configured to, in the active state, receive data from the transaction device; wherein the microcontroller is configured to power down the wake-up component in response to the microcontroller transitioning to the active state and to power up the wake-up component in response to the microcontroller returning to the sleep state.

US Pat. No. 10,140,480

ELECTRONIC COUNTER FOR FLUID FLOW TOOLS

APEX BRANDS, INC., Apex,...

1. A counter for a fluid-powered tool that includes fluid that moves along a fluid line when the tool is in operation, the counter comprising:a body with a fluid passage comprising an inlet and an outlet that is configured for the fluid to move through the passage from the inlet to the outlet when the tool is in operation;
a piston with a first end and a second end, the piston positioned within the passage between the inlet and the outlet, the piston comprising a smaller cross-sectional size than the passage to be movable along the passage;
a sensor target attached to the piston and positioned within the passage, the sensor target sized to be movable along the passage with the piston;
a non-contact proximity sensor configured to detect when the sensor target is in a predetermined range of the sensor along the passage;
a processing circuit configured to monitor when the sensor detects the sensor target within the predetermined range of the sensor; the processing circuit configured to at least one of:
determine an amount of usage of the fluid-powered tool based on a count of a number of times that the sensor detects that the sensor target is with the predetermined range of the sensor, wherein the count is greater than one; and
determine the amount of usage of the fluid-powered tool based on an amount of time that the sensor detects the sensor target is with the predetermined range of the sensor, wherein the amount of time is from each of at least two distinct time intervals that are non-contiguous in time; and
a biasing member that applies a first force to the piston to bias the sensor target away from the predetermined range,
the first force of the biasing member positioning the sensor target away from the predetermined range when the tool is not in operation;
the first force being less than a force applied by the fluid moving, along the fluid line when the fluid-powered tool is in operation with the sensor target being positioned in the predetermined range.

US Pat. No. 10,140,479

SYSTEMS AND METHODS FOR A WEARABLE USER AUTHENTICATION FACTOR

United Services Automobil...

1. A method of providing multi-factor authentication of an authenticatable user, comprising the steps of:providing an article having a plurality of unique electronic tags within the same article to an authenticatable user;
receiving a first authentication factor from the article via an electronic tag reader, wherein each the plurality of unique electronic tags provides access for the user to a different authenticatable action, each of the unique electronic tags being associated with one or more authentication factors, each authentication factor including an item of information used to authenticate the user's identity;
receiving a second authentication factor from a user;
processing the first authentication factor and the second authentication factor to generate user authentication information;
generating a list of authentication options for the user that includes a list of the authenticatable actions associated respectively with the plurality of unique electronic tags, wherein the list includes a unique identifier associated with the authenticatable action; and
authenticating the user for access to a computing device with the user authentication information.

US Pat. No. 10,140,478

INFORMATION HANDLING SYSTEM PORT FLUIDIC COMPONENT MANAGER

Dell Products L.P., Roun...

1. An information handling system comprising:a chassis;
a processor disposed in the chassis and operates to execute instructions to process information;
a memory disposed in the chassis and interfaced with the processor, the memory operable to store the information;
one or more removable devices digitally communicatively interfaced with the processor through a connector;
a microfluid bladder disposed proximate the connector and operates to inflate to a predetermined size that interacts with the removable device and the connector to interrupt the digital communication interface;
a microfluidic reservoir in fluidic communication with the microfluid bladder; and
a microfluidic controller interfaced with the microfluidic reservoir and operates to inflate the microfluid bladder in response to detection of a malicious attack to the information handling system seeking unauthorized retrieval of data.

US Pat. No. 10,140,477

OBFUSCATING IN MEMORY ENCRYPTION KEYS

THALES E-SECURITY, INC., ...

1. A method for obfuscating keys, performed by a processor, the method comprising:using a key to perform encryption processing, wherein the key is in unencrypted form;
identifying that a system memory is subject to a core dump, wherein the core dump comprises copying the system memory into storage memory to produce an image of the system memory;
overwriting, by an agent located in kernel space, the key in unencrypted form at a location in the system memory prior to the copying the system memory into the storage memory, responsive to the identifying, wherein the key is overwritten with a pattern;
executing the core dump, wherein the pattern is copied into the image to produce a copy of the pattern in the image of the system memory;
copying the image of the system memory back into the system memory;
determining, based on detecting the pattern at the location in the system memory, the key in unencrypted form was overwritten in the system memory;
obtaining a replacement key, responsive to the determining; and
deleting the replacement key in response to determining that the encryption processing is complete.

US Pat. No. 10,140,476

TRACING PROCESSING ACTIVITY

ARM Limited, Cambridge (...

1. A data processing apparatus comprising:a processing element having associated memory storage and one or more registers, the processing element being configured to perform processing activities in two or more security modes so as to inhibit a processing activity performed in one of the security modes from accessing at least some information associated with a processing activity performed in another of the security modes;
in which the processing element is configured, in response to a function call causing a branch from a processing activity in a first security mode to a processing activity in a second security mode, to store the contents of one or more of the registers in the memory storage and, in response to a branch return to the first security mode, to retrieve the register contents from the memory storage; and
trace apparatus configured to generate items of trace data indicative of processing activities of the processing element;
in which the trace apparatus is configured to detect a branch return operation by the processing element and to generate one or more items of trace data relating to the branch return operation; and
in which the trace apparatus is configured to detect the processing element retrieving register contents from the memory storage in response to a branch return to the first security mode and to generate one or more further items of trace data relating to the retrieval of the register contents from the memory storage.

US Pat. No. 10,140,475

FORENSIC COMPUTER EXAMINATION SYSTEMS AND METHODS

1. A computer-implemented method for facilitating a write-protected access to a target computing device, the method comprising the steps of:mounting, in a write-protected mode, a target computing device storage device of a target computing device, the target computing device storage device communicatively connected to a temporary storage device;
loading a virtualization layer, the virtualization layer utilizing the target computing device storage device to operate the target computing device as a virtual machine;
receiving an operation input from a user;
performing a write-protected action based on the operation input received from the user;
writing operation data to the temporary storage device, the operation data resulting from performing the write protected action on the target computing device;
mimicking, by the virtual machine, the target computing device;
resetting security measures on at least one of: the target computing device storage device and a target computing device operating system; and
creating temporary passwords, the temporary passwords allowing access to at least one of: the target computing device storage device and the target computing device operating system.

US Pat. No. 10,140,474

TECHNIQUES FOR CONTEXT INFORMATION MANAGEMENT

INTEL CORPORATION, Santa...

1. An apparatus, comprising:a processor element implemented in hardware;
a selection component that when executed by the processor element to select a context information item comprising a value and a type indicator, the selection component to select the context information item based on at least one privacy setting configured to indicate types of information to be provided to a context information database and the at least one privacy setting to indicate when to provide the types of information to the context information database, the type indicator comprising information identifying at least one of a characteristic or a property of the value;
a random number generator to generate a random number, the random number generator implemented in hardware or executed by the processor element;
an anonymization component that when executed by the processor element to:
generate a random key based on the random number,
generate a context information unit comprising the value, the type indicator, and the random key, and
send a message comprising the context information unit based on the at least one privacy setting; and
a sharing component that when executed by the processor element to enable a content provider to view the context information item by providing the random key.

US Pat. No. 10,140,473

STORAGE AND PRIVACY SERVICE

Facebook, Inc., Menlo Pa...

1. A method comprising:storing access control code defining access control rules applied to a plurality of nodes in a graph, the graph comprising the plurality of nodes and one or more edges, and the plurality of nodes comprising:
a first node representing a user,
a second node representing an object linked to the user by an edge of the one or more edges, and
a third node representing one or more of the access control rules associated with at least one of the user and the object, the third node further representing:
code defining each of the access control rules as a set of operations, wherein each operation for an access control rule returns (1) when the operation is resolved, a predetermined result, wherein the predetermined result comprises a value representing a true or a false value, and (2) when the operation is not resolved, a not definitive result, wherein the not definitive result is an indication that the operation should be skipped if the operation is not necessary for determining the access control rule;
compiling the access control code;
loading the compiled access control code for execution;
receiving a query for the object;
executing the compiled access control code to evaluate, for one of the access control rules, the corresponding set of operations that have not been skipped;
determining, for each of the one or more access control rules, a rule-result comprising a value representing a true or a false value;
determining a final result based on the one or more rule-results of the one or more access control rules, the final result indicating an allow-result or a deny-result; and
sending the object when the final result evaluates to an allow-result.

US Pat. No. 10,140,472

MULTI-LEVEL PRIVACY EVALUATION

Facebook, Inc., Menlo Pa...

1. A computer-implemented method, comprising:detecting an action corresponding to creation of or updating of multiple data items;
computing privacy values of the multiple data items;
evaluating the privacy values of the multiple data items to store the multiple data items into different categories;
receiving a request initiated by a viewer to view a set of data items related to a user; and
applying, in response to the request, a privacy check on the set of data items to filter out data items that the viewer is not permitted to view by selecting at least one of the different categories as a source for retrieving the set of data items;
receiving, at a front end server and from a backend server, at least one data item of the set of data items that failed an initial privacy check for validation;
applying, at the front end server, a final privacy check based on a second set of privacy rules to the at least one data item to determine whether the at least one data item passes or fails the final privacy check; and
identifying, at the front end server, the at least one data item as an incorrectly filtered data item when the at least one data item passes the final privacy check.

US Pat. No. 10,140,471

COMPUTER-IMPLEMENTED METHOD FOR IMPROVING A SOCIAL NETWORK SITE COMPUTER NETWORK, AND TERMINAL, SYSTEM AND COMPUTER READABLE MEDIUM FOR THE SAME

1. A method of one or more of (a) selectively reducing data available to, or processed by one or more computers communicatively connected to, a digitally stored and operated social network site, (b) improving data security and (c) increasing operational efficiency of the one or more computers communicatively connected to the digitally stored and operated social network site, at a terminal in a digital communications network, comprising:displaying indicia, broadcasting data, or transmitting instructions, to solicit collection of or to access data uniquely representative of, or uniquely indicating, one or more digitally stored and operated social network site user account(s);
collecting or accessing data uniquely representative of, or uniquely indicating, the one or more social network site user account(s) and transmitting data necessary to access and control the one or more digitally stored and operated social network site user account(s) to at least one remote computer(s);
establishing direct or indirect communication access and linkage between the terminal and the at least one remote computer(s) on which are stored, or by which access is available to control stored user account object data that were input or modified during prior access to and control over:
the one or more social network site user account(s) or
associated social network site user account(s) that at some prior time had permission to edit data in, or append data to, the stored user account object data of the one or more social network site user account(s),the stored user account data of the one or more user account(s) uniquely accessible based on access data digitally pre-assigned only to the one or more social network site user account(s);displaying indicia, or broadcasting data, representative of or indicating one or more predetermined criteria for selecting a subset of the stored user account object data, wherein the displaying indicia, or the broadcasting data, representative of or indicating the one or more predetermined criteria seek entry of what type of the one or more predetermined criteria are to be used to determine the subset of the user account object data;
collecting data representative of, or indicating, the subset of the stored user account object data based on the one or more predetermined criteria for selecting the subset of the stored user account object data that were input or modified during prior access to and control over the one or more user account(s) or associated social network site user account(s) that at some prior time had permission to edit data in, or append data to, the user account object data of the one or more user account(s); and
transmitting instructions to prevent legible display of only the subset of the stored user account object data, according to the collected data representative of, or indicating, the one or more predetermined criteria for selecting the subset of the stored user account object data, from the terminal to the at least one remote computer(s);
wherein the instructions are calculated to cause the at least one remote computer(s) on which are stored, or by which access is available to control, the stored user account object data, to, in whole or in part, prevent legible display of the selected subset of the stored user account object data from at least one database on which are stored the subset of the stored user account object data, based on the one or more predetermined criteria, the instructions including selection and legible display prevention of at least one copy of all stored user account object data in the subset of the user account object data.

US Pat. No. 10,140,470

SYSTEM FOR EXTERNAL VALIDATION OF DISTRIBUTED RESOURCE STATUS

Bank of America Corporati...

1. A system for validating a status of a distributed resource, the system comprising:a memory device with computer-readable program code stored thereon;
a communication device;
a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to:
recognize a finite divisible resource associated with a plurality of users, wherein the finite divisible resource is a pool of loanable funds of an entity;
identify a first portion of the divisible resource to be assigned to a first user from among the plurality of users;
transmit to a block chain distributed ledger an indication that the first portion of the divisible resource is to be assigned to the first user;
receive from the block chain distributed ledger an indication that the first portion of the divisible resource is available to be assigned to the first user;
transmit to the first user the first portion of the finite divisible resource;
receive from the first user documentation of an obligation of the first user to return the first portion of the finite divisible resource to the entity;
extract data from the documentation;
identify private information in the data extracted from the documentation;
associate one or more tokens with the private information;
store the private information on a private block chain distributed ledger;
transmit to the block chain distributed ledger a record associated with the first user, the first portion of the finite divisible resource, and the obligation of the first user to return the first portion to the entity, wherein the record includes the one or more tokens and does not include the private information;
validate, via one or more nodes of the block chain distributed ledger, the record associated with the first user, the first portion of the finite divisible resource, and the obligation of the first user to return the first portion to the entity;
receive from the block chain distributed ledger an indication that the block chain distributed ledger had been updated to reflect the transmission of the first portion of the finite divisible resource to the first user and the obligation of the first user to return the first portion to the entity;
receive an indication that the first user has assigned the first portion of the finite divisible resource to a second user from among the plurality of the users;
receive an indication of an obligation of the second user to return the first portion of the finite divisible resource to the first user;
transmit to the block chain distributed ledger a record associated with the second user, the first portion of the finite divisible resource, and the obligation of the second user to return the first portion to the first user;
validate, via the one or more nodes of the block chain distributed ledger, the record associated with the second user, the first portion of the finite divisible resource, and the obligation of the second user to return the first portion to the first user; and
receive from the block chain distributed ledger an indication that the block chain distributed ledger had been updated to reflect the transmission of the first portion of the finite divisible resource to the second user and the obligation of the second user to return the first portion to the first user.

US Pat. No. 10,140,469

STORAGE AND PRIVACY SERVICE

Facebook, Inc., Menlo Pa...

1. A method comprising:by a computing device, receiving a request for an object;
by the computing device, retrieving an access-control rule to evaluate whether to allow or deny access to the object, wherein the access-control rule comprises one or more operations, wherein each of the operations is determined to be either necessary or unnecessary for evaluation of the access-control rule;
by the computing device, evaluating the access-control rule by executing the one or more operations of the access-control rule, wherein:
when a first executed operation of the access-control rule returns a result that is not definitive and a second executed operation returns a result that is definitive, assigning a final result to the access-control rule, wherein:
(1) if the first executed operation is determined to be unnecessary for evaluation of the access-control rule, disregarding the result of the first executed operation and assigning as the final result to the access-control rule a value based on the result of the second executed operation, and
(2) if the first executed operation is determined to be necessary for evaluation of the access-control rule, assigning as the final result to the access-control rule a value indicating that access to the object is to be denied; and
by the computing device, based on the final result, allowing or denying access to the object.

US Pat. No. 10,140,468

SECURE START SYSTEM FOR AN AUTONOMOUS VEHICLE

Uber Technologies, Inc., ...

1. A secure start system for an autonomous vehicle, the secure start system comprising:a communications router;
a compute stack storing a cryptographically signed and encrypted file system, and comprising a plurality of drives to execute the file system to enable an autonomous mode of the autonomous vehicle; and
wherein the compute stack comprises a master node including one or more memory resources that execute secure start instructions, causing the secure start system to:
based on detecting startup of the autonomous vehicle, transmit credentials to a backend authentication system via the communications router;
receive, when the credentials are authenticated, a tunnel key from the backend authentication system;
establish, using the tunnel key, a private communications session with a backend vault of the backend authentication system;
retrieve a verification key and an autonomous key from the backend vault;
verify, using the verification key, that the file system was cryptographically signed by the backend authentication system; and
decrypt the file system using the autonomous key to enable the autonomous mode.

US Pat. No. 10,140,467

WORKFLOW FUNCTIONS OF CONTENT MANAGEMENT SYSTEM ENFORCED BY CLIENT DEVICE

DROPBOX, INC., San Franc...

1. A system for enforcing a workflow command on a client device in an environment where at least a portion of a shared content item is synchronized among the client device, a content management system server, and a second client device, and where the at least a portion of a shared content item is stored on the client device, content management system, and the second client device, the system comprising:the client device including at least one processor, an operating system, a storage, and a content management system client application, wherein the at least a portion of a shared content item is stored in the storage of the client device, wherein the content management system client application includes instructions effective to cause the at least one processor to:
receive a synchronization communication from the content management system server pertaining to the shared content item, the synchronization communication including a workflow command and a user account identifier having write privileges; and
determine that the user account identifier does not match a user identifier for a user account logged into the content management system client application on the client device; and
in response to determining that the user account identifier does not match, change access permissions for the shared content item on the client device to read only.

US Pat. No. 10,140,466

SYSTEMS AND METHODS OF SECURE SELF-SERVICE ACCESS TO CONTENT

Quest Software Inc., Ali...

13. An information handling system comprising at least one processor coupled to a memory, wherein the at least one processor is operable to implement a method comprising:receiving a request from a user to access particular content;
determining a trust measure of the user, wherein the trust measure is based, at least in part, on an analysis of logged user-initiated communication events of the user on a plurality of communications platforms;
wherein the determining the trust measure comprises:
enumerating historical data loss prevention (DLP) policy violations by the user on the plurality of communications platforms;
determining a communication profile of the user based, at least in part, on the logged user-initiated communication events;
determining directory-services information for the user from a directory service; and
quantitatively evaluating a combination of the DLP policy violations, the communication profile, and the directory-services information via one or more rules, wherein the trust measure comprises a numerical result of the quantitatively evaluating;
accessing a self-service access policy applicable to the particular content;
ascertaining, from the self-service access policy, a trust threshold applicable to the particular content; and
responsive to a determination that the trust measure fails to satisfy the trust threshold, automatically denying access by the user to the particular content.

US Pat. No. 10,140,465

METHODS AND SYSTEMS FOR USER AUTHENTICATION IN A COMPUTER SYSTEM USING MULTI-COMPONENT LOG-INS, INCLUDING IMAGE-BASED LOG-INS

1. A system, comprising:a computer system having a processor and a memory; and
a non-transitory computer-readable medium encoding instructions for computer-based user authentication and for execution by the processor, the instructions programmed to cause the processor to
receive, into the memory, a request to establish or enhance security for an image based password having a plurality of components, one component of which comprises a verification image having a plurality of target locations, one target location of which comprising a selected target location with a region upon which actions could be applied; and
in response to receiving the request to establish or enhance the security for the image-based password, encrypt information related to position of the selected target location on the verification image.

US Pat. No. 10,140,464

METHODS AND SYSTEMS FOR PROVIDING PRESENTATION SECURITY FOR AUGMENTED REALITY APPLICATIONS

University of Washington,...

1. A system for providing an augmented reality presentation, the system comprising:at least one augmented reality presentation device; and
an augmented reality platform device having at least one processor, wherein the augmented reality platform device is configured to process a request to present a virtual object by:
using one or more policies to evaluate the request to present the virtual object;
in response to determining that no policies are violated, presenting the virtual object using the at least one augmented reality presentation device; and
in response to determining that the one or more policies are violated:
altering a state of the virtual object to comply with the one or more violated policies; and
selectively rendering the altered virtual object using the at least one augmented reality display device;
wherein the one or more policies that are violated include a first policy and a second policy;
wherein the first policy includes a first enforcement action that specifies a first state threshold value for the state;
wherein the second policy includes a second enforcement action that specifies a second state threshold value for the state; and
wherein altering the state of the virtual object to comply with the one or more violated policies includes:
altering a threshold for the state based on the first state threshold value;
comparing the threshold to the second state threshold value:
further altering the threshold based on the second state threshold value in response to determining that the second state threshold value reduces intrusiveness more than the threshold, or retaining the threshold based on the first state threshold value in response to determining that the second state threshold value does not reduce intrusiveness more than the threshold; and
altering the state of the virtual object based on the threshold.

US Pat. No. 10,140,463

MECHANISMS TO SECURE DATA ON HARD RESET OF DEVICE

Micro Focus Software Inc....

1. A method, comprising:detecting an attempt to process an operation of the operating system;
preventing the operation from processing on a device and forcing execution of a customized hardware interrupt service on the device;
requesting, by the customized hardware interrupt service, an entered credential;
verifying, by the customized hardware interrupt service, the entered credential for the device before passing the operation to the operating system for processing on the device; and
ignoring, by the customized hardware interrupt service, the attempt to process the operation after a time duration during which the entered credential is undetected.

US Pat. No. 10,140,462

STACKABLE FILE SYSTEM WITH USER SPACE POLICY MANAGEMENT

QUALCOMM Innovation Cente...

1. A method for managing file access control policies on a computing device, the method comprising:receiving, at a stackable policy file system that comprises code executable by a processor in a kernel level of the computing device, from an application in user space of the computing device, a request to access a file on a hardware storage device of the computing device;
directing the request, as a redirected request, from the stackable policy file system at the kernel level of the computing device to a file-policy manager in user space of the computing device without enforcing file-access policies;
receiving the redirected request for access at the file-policy manager in user-space;
enforcing a file-access policy with the file-policy manager in user space to grant or deny access to the file on the computing device;
providing, with the file-policy manager, in response to the requested operation being allowed, a grant-indicator;
receive the grant indicator with the stackable policy file system in the kernel level of the computing device;
send a file operation request directly from the stackable policy file system to a kernel-level file system;
receive a lower-level file object (LLFO) reference at the stackable policy file system from the kernel-level file system that points to a lower level file object;
provide a stackable policy file object (SPFO) reference with the stackable policy file system that points to a stackable-policy file object; and
placing the SPFO reference in a file table associated with a process of the application to enable file operations on the file on the computing device using only kernel-level calls when access to the file is granted.

US Pat. No. 10,140,461

REDUCING RESOURCE CONSUMPTION ASSOCIATED WITH STORAGE AND OPERATION OF CONTAINERS

Microsoft Technology Lice...

1. A system comprising:one or more processors;
memory;
a storage unit including a container namespace that provides exclusive access to a container configured to access files in the container namespace; and
a file system filter stored in the memory and executable by the one or more processors to:
create a placeholder file within the container namespace, the placeholder file representing a shared file stored in a read-only namespace that is accessible to a plurality of different containers, the shared file storing data that is not stored in the placeholder file;
receive, from the container, a request to read the data;
pass the request to the container namespace;
receive an error message indicating that the data is not stored in the placeholder file in the container namespace;
open, based at least in part on the error message, the shared file in the read-only namespace that stores the data;
provide, to the container, access to the data via the opened shared file in the read- only namespace instead of the placeholder file in the container namespace;
convert, based at least in part on receiving a request to modify the data from the container, the placeholder file into a fully populated file by loading the data from the opened shared file in the read-only namespace to the fully populated file in the container namespace; and
write a modification to the data to the fully populated file in the container namespace to isolate the modification for the container.

US Pat. No. 10,140,460

FILE STORAGE SYSTEM AND USER TERMINAL

MITSUBISHI ELECTRIC CORPO...

1. A file storage system comprising:a file storage apparatus to store a ciphertext which can be decrypted when attribute information satisfies a decryption condition of a logical expression; and
a user terminal to display a folder having the decryption condition set forth in the folder and also as a folder name, and to automatically encrypt using the decryption condition a file to be encrypted input to the folder by a drag and drop operation of a user,
wherein the user terminal comprises processing circuitry:
to transmit the attribute information to the file storage apparatus,
wherein the file storage apparatus comprises processing circuitry:
to store ciphertexts;
to extract identifying information of a ciphertext of which a decryption condition is satisfied by the attribute information transmitted from among the ciphertexts stored; and
to transmit a list indicating identifying information of the ciphertext extracted to the user terminal, and
wherein the processing circuitry of the user terminal displays the identifying information, indicated by the list transmitted, classified by decryption condition.

US Pat. No. 10,140,459

ELECTRONIC SYSTEMS OF ELECTRONIC TERMINALS AND SERVERS FOR SECURING INFORMATION INTEGRITY IN THE DISTRIBUTED TECHNOLOGICAL ENVIRONMENT AND METHODS OF USING THEREOF

1. A computer-implemented method, comprising:receiving, at a first time, via a first computer network, by at least one specifically programmed computer processor of a central data management server, first terminal data from at least one first terminal machine;
wherein the first terminal data comprises:
i) at least one first alphanumerical data sequence,
wherein the at least one first alphanumerical data sequence is a result of at least one first one-way hashing algorithm that the at least one first terminal machine has applied to at least one terminal-generated alphanumerical value which has been generated, at the first time, by the at least one first terminal machine, and
ii) first game play data of at least one game being played by at least one user,
wherein the at least one first alphanumerical data sequence is distinct from the first game play data;
generating, by the at least one specifically programmed computer processor of the central data management server, at least one first computer-generated barcode based, at least in part, on the first terminal data;
storing, in real-time, by the at least one specifically programmed computer processor of the central data management server, the first terminal data and the at least one first computer-generated barcode in at least one database residing in a non-transient computer memory;
transmitting, in real-time, by the at least one specifically programmed computer processor of the central data management server, the at least one first computer-generated barcode to the at least one first terminal machine;
wherein the at least one first terminal machine is configured to generate a user game play output representative of the first game play data at the first time;
wherein the user game play output comprises:
i) the at least one first terminal-generated alphanumerical value, and
ii) the at least one first computer-generated barcode;
receiving, at a second time, via a second computer network, by the at least one specifically programmed computer processor of the central data management server, second terminal data from at least one second terminal machine;
wherein the second terminal data comprises:
i) at least one second alphanumerical data sequence,
ii) at least one second computer-generated barcode;
wherein the at least one second alphanumerical data sequence is a result of the at least one one-way hashing algorithm that the at least one second terminal machine has applied to at least one alphanumerical value which has been acquired by the at least one second terminal machine from a user game play input;
wherein the at least one alphanumerical value has been offered as being the at least one terminal-generated alphanumerical value from the user game play output;
wherein the at least one second computer-generated barcode has been acquired by the at least one second terminal machine from the user game play input;
wherein the at least one second computer-generated barcode has been offered as being the at least one first computer-generated barcode from the user game play output;
validating, in real-time, by the at least one specifically programmed computer processor of the central data management server, the user game play input as being representative of the user game play output by performing one of:
i) confirming that:
1) the at least one second alphanumerical data sequence equals to the at least one first alphanumerical data sequence, and
2) the at least one second computer-generated barcode matches to the at least one first computer-generated barcode; or
ii) generating a validation error when:
1) the at least one second alphanumerical data sequence does not equal to the at least one first alphanumerical data sequence, or
2) the at least one second computer-generated barcode does not match to the at least one first computer-generated barcode; and
transmitting, in real-time, by the at least one specifically programmed computer processor of the central data management server, a validation notification to the at least one second terminal machine, wherein the validation notification identifies that:
i) the user game play input has been validated to be representative of the user game play output, or
ii) the user game play input is not representative of the user game play output.

US Pat. No. 10,140,458

PARALLELIZED AUTHENTICATION ENCODING

Intel Corporation, Santa...

1. A processing system comprising:an accumulator;
a register representing a pipeline stage; and
a processing core coupled to the accumulator and to the register, the processing core to:
split an input message into a first input stream and a second input stream, wherein the processing core is further to, for each input stream in parallel:
add, to the accumulator, a data block from the input stream,
store, in the register, contents of the accumulator multiplied by a squared nonce value, and
store, in the accumulator, a result of applying a modulo reduction operation to the contents of the register; and
generate an authentication tag for the input message based on the result stored in the accumulator and the contents in the register.

US Pat. No. 10,140,457

SECURE INPUT/OUTPUT DEVICE MANAGEMENT

Intel Corporation, Santa...

1. An apparatus comprising:a processor having secure enclave support, wherein the processor is to establish a secure enclave using the secure enclave support; and
an input/output (I/O) controller including an integrated trusted I/O device, wherein the trusted I/O device is to receive a unencrypted request to configure the trusted I/O device via a default control endpoint of the trusted I/O device, configure a command endpoint and a response endpoint to block topology change notifications to system software and direct the topology change notifications to the secure enclave instead in response to receipt of the unencrypted request, receive an encrypted command from the secure enclave via the command endpoint, perform a device management operation related to the I/O controller in response to receipt of the encrypted command; and transmit an encrypted response to the secure enclave via the response endpoint in response to performance of the device management operation.

US Pat. No. 10,140,456

RUNTIME ANALYSIS OF SOFTWARE SECURITY VULNERABILITIES

SALESFORCE.COM, INC., Sa...

1. A computer program product comprising a program stored on a non-transitory computer-readable medium containing an executable set of instructions for detecting a vulnerability in a software application in a database system, the set of instructions operable to:store defined vulnerabilities that identify operations in the software application vulnerable to the security risk and are each associated with one or more input tags and one or more sanitization tags;
receive by the software application in the database system a request from a user system;
at runtime of the application, assign one or more of the input tags to one or more objects associated with the request, wherein the input tags identify the request as potentially malicious and carrying a security risk;
at runtime of the application, assign one or more of the sanitization tags to the one or more objects associated with the request to indicate security checks performed on the objects;
at runtime of the application, compare the input tags assigned to the objects with any of the sanitization tags assigned to the objects; and at runtime of the application, identify at least one of the defined vulnerabilities as a vulnerability in a part of the software application when the assigned input tag for an identified one of the objects matches the input tag associated with an identified one of the defined vulnerabilities, and one or more of the sanitization tags associated with the identified one of the defined vulnerabilities is not an assigned sanitization tag for the identified one of the objects; and
generating a report identifying the vulnerability in a part of the software application.

US Pat. No. 10,140,455

DISTRIBUTED SYSTEM FOR DISCOVERY OF VULNERABILITIES IN APPLICATIONS INCLUDING DETECTING AND/OR FILTERING OUT VULNERABILITY DUPLICATES

Synack, Inc., Redwood Ci...

1. A vulnerability database management system for managing data records representing vulnerability reports submitted by testers, the vulnerability database management system comprising:an input memory for storing a candidate vulnerability report submitted by a tester;
a search record generator including a processor that generates a candidate search record by tokenizing the candidate vulnerability report;
a vulnerability database for storing vulnerability report records and corresponding search records, wherein a vulnerability report record in the vulnerability database represents a previously accepted vulnerability report and wherein a corresponding search record represents a search record corresponding to the previously accepted vulnerability report;
a search engine configured to receive the candidate search record and use the candidate search record as a search query against the corresponding search records stored in the vulnerability database, resulting in search results based on the candidate search record; and
an intake management computer interface that, when a match between the candidate search record and the search results is below a threshold match tightness criteria, presents the search results to an operator and obtains operator feedback at least as to whether to accept the candidate vulnerability report into the vulnerability database and, when the match between the candidate search record and the search results is not below the threshold match tightness criteria, designates the candidate vulnerability report as a duplicate candidate vulnerability report.

US Pat. No. 10,140,454

SYSTEMS AND METHODS FOR RESTARTING COMPUTING DEVICES INTO SECURITY-APPLICATION-CONFIGURED SAFE MODES

Symantec Corporation, Mo...

1. A computer-implemented method for restarting computing devices into security-application-configured safe modes, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:configuring a security application to recognize a predetermined signal received via a predetermined hardware device that indicates that a user wants to restart the computing device into a security-application-configured safe mode that prevents suspicious applications from loading;
detecting the predetermined signal via an instance of the predetermined hardware device that is connected to the computing device, wherein detecting the predetermined signal comprises receiving information about the predetermined signal from a driver associated with the predetermined hardware device, wherein the predetermined hardware device comprises removable media and the predetermined signal comprises the user connecting the removable media to the computing device and wherein the predetermined signal is performed in response to the user inputting the predetermined signal upon detecting applications that are not signed by a known trusted signatory as the suspicious applications on the computing device;
setting, in response to receiving the information about the predetermined signal, a registry key on the computing device that will instruct the computing device to boot into the security-application-configured safe mode during a restart sequence, wherein setting the registry key comprises creating an entry in an internal database of configuration settings on the computing device;
restarting the computing device in the security-application-configured safe mode in response to detecting the registry key during the restart sequence, wherein restarting the computing device into the security-application-configured safe mode prevents the suspicious applications from executing on the computing device while the security application removes the suspicious applications;
marking, in response to restarting the computing device in the security-application-configured safe mode, the registry key as read; and
ignoring the registry key marked as read upon a subsequent restart of the computing device before completion of the removal of the suspicious applications by the security application in the security-application-configured safe mode, thereby preventing the computing device from repeatedly restarting in the security-application-configured safe mode, wherein the suspicious applications comprise ransomware.

US Pat. No. 10,140,453

VULNERABILITY MANAGEMENT USING TAXONOMY-BASED NORMALIZATION

Amazon Technologies, Inc....

1. A distributed system, comprising:a plurality of vulnerability information collectors (VICs) implemented by one or more computing devices comprising one or more hardware processors and memory, including one or more VICs designated for respective groups of monitored entities of a provider network; and
a vulnerability record manager (VRM) implemented by one or more computing devices comprising one or more hardware processors and memory;
wherein a first VIC of the plurality of VICs is configured to:
obtain a first vulnerability data set associated with a first group of one or more monitored entities using a first extraction methodology, wherein the first vulnerability data set comprises values for a first collection of one or more attributes defined in a particular taxonomy specification of the VRM, wherein the particular taxonomy specification includes respective attributes to identify one or more of: (a) a provider network at which a vulnerability data set is collected, (b) a network external to the provider network at which a vulnerability data set is collected, (c) an extraction methodology, or (d) a reference to a vulnerability database, and wherein the first collection of one or more attributes includes an attribute that is not defined according to the particular taxonomy specification;
wherein a second VIC of the plurality of VICs is configured to:
obtain a second vulnerability data set associated with a second group of one or more monitored entities using a different extraction methodology, wherein the second vulnerability data set comprises values for a second collection of one or more attributes of the particular taxonomy specification, wherein the second collection comprises at least one attribute which is not present in the first collection;
and wherein the VRM is configured to:
receive respective indications of the first and second vulnerability data sets from the first and second VICs;
normalize the first and second vulnerability data sets into a common format having a common set of attributes defined in the particular taxonomy specification, producing a first vulnerability record corresponding to the first vulnerability data set and a second vulnerability record corresponding to the second vulnerability data set;
store in a first repository the first vulnerability record corresponding to the first vulnerability data set and the second vulnerability record corresponding to the second vulnerability data set, wherein the first repository is designated for a first level of a monitoring targets hierarchy;
aggregate the first and second records into a consolidated vulnerability record;
transmit the consolidated vulnerability record from the first repository to a second repository designated for a second level of the monitoring targets hierarchy; and
in response to one or more requests received via a programmatic interface, transmit contents of the consolidated vulnerability record to one or more of (a) an automated risk analyzer or (b) a reporting and presentation layer of a vulnerability management system.

US Pat. No. 10,140,452

PROTECTING COMPUTING DEVICES FROM UNAUTHORIZED ACCESS

COMPUTER PROTECTION IP, L...

1. A system comprising:(a) a distributed computer network comprising multiple computing devices at multiple locations, each location comprising at least one network node;
(b) at least one protected computing device at a first location configured for communication through said network with a storage controller to access secure data from a secure data storage repository at a second location;
(c) said at least one protected computing device having an operating system and a virtual machine, said operating system and said virtual machine each associated with said at least one protected computing device and a virtual machine manager;
(d) said virtual machine manager implemented in one or more computer code segments and configured to be launched between boot-up of said at least one protected computing device and launch of said operating system;
(e) an authentication server located remotely from said at least one protected computing device and configured for authenticating said at least one protected computing device for access to said secure data;
(f) a control console configured to access and exert a measure of control over said at least one protected computing device, wherein said control console is operable within a console device at a third location;
(g) said virtual machine manager implemented in one or more computer code segments to be executed on said at least one protected computing device;
(h) said virtual machine manager configured to be launched between boot-up of said protected computing device and launch of said operating system, said virtual machine manager configured to cause said authentication server to provide indicia for use in authenticating said at least one protected computing device, said virtual machine manager configured to make a decision based on said indicia from said authentication server whether to allow said at least one protected computing device to either launch or not launch said operating system based upon whether said at least one protected computing device is either authenticated or not, respectively, by said authentication server, said virtual machine manager further comprising a hypervisor configured to control the protected computing device to either launch or not launch the operating system based upon the decision.

US Pat. No. 10,140,451

DETECTION OF MALICIOUS SCRIPTING LANGUAGE CODE IN A NETWORK ENVIRONMENT

McAfee, LLC., Santa Clar...

1. At least one non-transitory machine accessible storage medium having instructions stored thereon for detecting malicious code in a script, wherein the instructions, when executed by at least one processor, cause the at least one processor to perform a method comprising:evaluating a left side variable name of an assignment statement in the script or a right side value of the assignment statement to produce a result indicating a compilation event;
initiating, by an execution engine, an execution of a compiled script resulting from a compilation of the script;
detecting a function called by the compiled script;
executing the function and performing an evaluation of the function;
detecting an execution event during the evaluation of the function, wherein the execution event is detected based on a parameter passed into the function, a result of the function, data written or replaced by the function, or data calculated by the function at least meeting or exceeding a predetermined threshold length or size; and
verifying, against a correlation signature defining a combination of events that indicate the script is malicious, a time or a location in the script of an occurrence of the compilation event relative to the execution event.

US Pat. No. 10,140,450

VEHICLE COMMUNICATIONS BUS DATA SECURITY

ARILOU INFORMATION SECURI...

1. A device for automotive physical layer handling and real-time security for use between an additional device and a vehicle bus in a vehicle for communicating between multiple Electronic Control Units (ECUs) using frames, each of the frames comprises an identifier of the respective frame type or content, or of the ECU that transmitted the frame to the vehicle bus, the device comprising:a first port coupled for receiving analog differential signals from, and for transmitting analog differential signals to, the vehicle bus;
a first transceiver coupled to the first port for transmitting to, and for receiving from, the vehicle bus;
a memory storing a list of identifiers and coupled to the first transceiver;
a second port coupled to the first transceiver for coupling to the additional device; and
a single enclosure for housing the first and second ports, the first transceiver, and the memory,
wherein the device is configured to receive a frame from the additional device via the second port, to retrieve an identifier from the received frame, to determine if the retrieved identifier is in the list, and responsive to the determining, to change the frame and to transmit the changed frame to the vehicle bus by the first transceiver.

US Pat. No. 10,140,449

CLUSTER ANOMALY DETECTION USING FUNCTION INTERPOSITION

Intel Corporation, Santa...

1. At least one non-transitory computer readable storage medium comprising a set of instructions which, when executed by a computing device, cause the computing device to:interpose one or more functions in response to a control library call from an application to obtain control data from the application;
identify a runtime behavioral pattern of the application based at least on the control data;
interpose one or more functions in response to a current library call from the application to obtain current data from the application;
detect an anomaly in the runtime behavioral pattern, wherein the current data is to be compared to the runtime behavioral pattern to detect the anomaly, and wherein the anomaly is to be indicative of an insertion of malicious code, and is to be detected with regard to one or more of a library call count, a library call type, a library call argument configuration or a library call timing associated with a runtime operation of the application; and
trigger a security event in response to the anomaly.

US Pat. No. 10,140,448

SYSTEMS AND METHODS OF ASYNCHRONOUS ANALYSIS OF EVENT NOTIFICATIONS FOR COMPUTER SECURITY APPLICATIONS

Bitdefender IPR Managemen...

1. A host system comprising a hardware processor and a memory, the hardware processor configured to execute a notification handler and a computer security program, the hardware processor further configured to:receive from the memory an event notification instruction forming part of a currently executing process, wherein execution of the process causes an occurrence of a trigger event, wherein the event notification instruction comprises an operator field and an operand field, wherein the operand field comprises an identifier of an event type of the trigger event;
in response to receiving the event notification instruction, suspend execution of the process; and
in response to suspending execution of the process, switch to executing the notification handler,
wherein the notification handler is configured to:
determine whether an event eligibility condition is satisfied according to the event type of the trigger event,
in response, when the event eligibility condition is satisfied, insert an event indicator into an event queue, the event indicator indicative of the trigger event, and
in response to inserting the event indicator into the event queue, instruct the hardware processor to resume execution of the process, and
wherein the computer security program is configured to:
in response to the hardware processor resuming execution of the process, remove the event indicator from the queue, and
determine according to the event indicator whether the occurrence of the trigger event is indicative of a computer security threat.

US Pat. No. 10,140,447

ATTACK PATTERN FRAMEWORK FOR MONITORING ENTERPRISE INFORMATION SYSTEMS

SAP SE, Walldorf (DE)

1. A computer-implemented method executed by one or more processors, the method comprising:receiving, by the one or more processors, parameters defining a detection technique, an attack scenario, and a detection logic;
receiving, by the one or more processors, configuration data that is specific to a target system that is to be monitored, the configuration data comprising non-technical parameters indicating a significance of the target system relative to an external network and technical parameters indicating features of the target system associated with the attack scenario;
providing, by the one or more processors, an attack pattern using a specification language, the attack pattern being based on the parameters and the configuration data, the attack pattern being defined using a computer-executable description of the attack scenario and comprising a plurality of adjustable metrics defining a misuse of the target system and an anomaly of the target system, the specification language comprising a template of the attack pattern and supporting a definition, an update, and a management of the attack pattern relative to an attack pattern lifecycle;
determining, by the one or more processors, a baseline behavior of the target system, the baseline behavior comprising adjustable parameters defining one or more thresholds of deviations from the baseline behavior corresponding to the anomaly;
monitoring, by the one or more processors, the target system based on the baseline behavior, the attack pattern, and data provided by one or more logs of the target system;
selectively generating, by the one or more processors and based on monitoring, an alert indicating at least one of a potential simple end-to-end intrusion into the target system and a potential complex end-to-end intrusion into the target system, the alert being associated with at least one of the misuse of the target system and the anomaly of the target system; and
updating the configuration data, the baseline behavior, and the attack pattern, based on the alert, by modifying at least one of the plurality of adjustable metrics to reduce future false alerts.

US Pat. No. 10,140,446

SYSTEMS AND METHODS FOR TRACKING AND RECORDING EVENTS IN A NETWORK OF COMPUTING SYSTEMS

Carbon Black, Inc., Walt...

1. A computer security method comprising:detecting an event associated with an operation performed by a process, the event occurring in a first computing system, wherein detecting the event comprises a security module intercepting the operation at a layer of an operating system of the first computing system;
generating, by a processor of the first computing system, an event identifier for the event, wherein the event identifier uniquely identifies the event in the first computing system and is generated based on information associated with the event;
generating, by the processor, a record for the event, the record comprising the event identifier and details that describe the event;
generating, by the processor, a global identifier for the event, the global identifier comprising the event identifier and attributes of the first computing system on which the event occurred, and wherein the global identifier uniquely identifies the event among other events occurring in a plurality of computing systems including the first computing system;
associating, by the processor, the global identifier with the record for the event;
forwarding, by the processor, the record to a remote computing system for storage in a repository having a plurality of records associated with the plurality of computing systems, each of the records indicative of a respective event detected on a respective computing system;
upon detecting a security breach associated with the first computing system, retrieving, by the remote computing system, one or more of the records associated with the first computing system;
determining, by the remote computing system, that at least one of the retrieved records relates to the security breach; and
providing, by remote computing system, to a forensic investigator the at least one record indicative of at least one event relating to the security breach.

US Pat. No. 10,140,445

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD

SONY INTERACTIVE ENTERTAI...

1. An information processing apparatus comprising:a processor;
an input device;
a display;
a password input block configured to accept, from a user using the input device, an already registered password for use in user authentication;
an authentication block configured to execute user authentication on the basis of an authentication identification and the already registered password accepted by the password input block;
a service provision block configured to provide a first service to the user on the display if user authentication by the authentication block is successful,
wherein the service provision block provides the first service corresponding to the already registered password accepted by the password input block to the user; and
a password registration block configured to accept, if the user has already been authenticated using the already registered password, input of a new password to be linked to the authentication identification,
wherein the new password and the already registered password are both stored in association with the authentication identification,
wherein, if the user provides the authentication identification and the new password, the user is provided a second service,
wherein the first service and the second service comprise at least one authority that overlaps,
wherein the second service has less authorities than the first service,
wherein a first background image displayed to the user when using the first service is different than a second background image displayed to the user when using the second service,
wherein the first background image is registered in association with the already registered password, and
wherein the second background image is registered in association with the new password.

US Pat. No. 10,140,444

METHODS AND SYSTEMS FOR DYNAMICALLY MANAGING ACCESS TO DEVICES FOR RESOLUTION OF AN INCIDENT TICKET

WIPRO LIMITED, Bangalore...

1. A method for dynamically managing access to one or more devices for resolution of an incident ticket associated with the one or more devices, the method comprising:identifying, by an access management system, an incident ticket type by analyzing data associated with the incident ticket;
determining, by the access management system, one or more access parameters based on the incident ticket type, wherein the one or more access parameters comprises a device type affected by the incident ticket, an application software run on a device affected by the incident ticket, a system software run on a device, a security privilege to access the device, and time duration to access the device;
providing, by the access management system, the access to the one or more devices based on the one or more access parameters for the resolution of the incident ticket;
dynamically modifying, by the access management system, the one or more access parameters, wherein the dynamically modifying comprises modifying the time duration to access the device when a status of the incident ticket is active;
determining, by the access management system, the status of the incident ticket by monitoring action logs associated with the one or more devices after a pre-defined time interval for actions performed on the application software to determine whether the ticket has been resolved;
dynamically modifying, by the access management system, the one or more access parameters based on the resolved status of the incident ticket; and
providing, by the access management system, the access to the one or more devices based on the one or more modified access parameters.

US Pat. No. 10,140,443

AUTHENTICATION SOURCE SELECTION

VMWARE, INC., Palo Alto,...

1. A method for a computing device to select an authentication source, the method comprising:benchmarking the time required to perform a login for each authentication source within a set of multiple authentication sources by logging into each authentication source wherein the login includes an authentication;
comparing the time required to perform each login;
assigning a priority level to each of the multiple authentication sources based on the comparison;
subsequent to the benchmarking and comparing, receiving a request to authenticate a user account;
selecting, by the computing device, a particular authentication source to process the request, wherein the particular authentication source is selected from the set of multiple authentication sources based on the priority level assigned to the particular authentication source, the priority level being the highest among the multiple authentication sources; and
processing the request using the particular authentication source to authenticate the user account.

US Pat. No. 10,140,442

IMPRESSION AUTHENTICATION

International Business Ma...

1. An authentication improvement method comprising:continuously receiving in real time, by a processor of a hardware device from a plurality of video retrieval devices, visual data associated with a surface of a structure associated with receiving authentication attributes for user access to hardware or software;
continuously tracking in real time, by said processor via said visual data, user interactions with said surface of said structure;
determining, by said processor, that a first user interaction of said user interactions comprises an authentication interaction for authorizing said user to access said hardware or software;
comparing, by said processor in response to results of said determining, said first user interaction with said surface of said structure with a previous user authentication interaction with said surface of said structure, wherein said results of said comparing indicate that multiple previous user authentication interactions with said surface of said structure are located on said surface of said structure, and wherein said action comprises alerting said user to clean said surface of said structure; and
executing, by said processor based on results of said comparing, an action associated with said access to said hardware or software.

US Pat. No. 10,140,441

CONTINUOUS AUTHENTICATION OF MOBILE DEVICE USERS

SRI International, Menlo...

1. A method for securing a mobile electronic device, the method comprising:by one or more sensors in communication with the mobile electronic device, collecting sensor data from which a plurality of different biometric signatures of a user of the mobile electronic device can be derived;
based on at least some of the sensor data, determining an activity context relating to a current activity of the user in relation to the mobile electronic device;
in response to determining and detecting the current activity of the user of the mobile electronic device, a biometric signature representing a style of the current activity of the user is selected to be derived from the collected sensor data;
executing a routine to verify the identity of the user using the selected biometric signature; and
adjusting one or more access privileges of the mobile electronic device in response to a result of the routine to verify the identity of the user.

US Pat. No. 10,140,440

SYSTEMS AND METHODS FOR SECURING COMPUTING DEVICES THAT ARE NOT IN USERS' PHYSICAL POSSESSIONS

Symantec Corporation, Mo...

1. A computer-implemented method for securing computing devices that are not in users' physical possessions, at least a portion of the method being performed by a computing device of a user comprising at least one processor, the method comprising:configuring the computing device and an additional computing device of the user to exchange trusted heartbeat messages through the user's body;
transmitting, from the additional computing device, a first heartbeat message through the user's body;
receiving, at the computing device while the user is in physical possession of the computing device, the first heartbeat message through the user's body;
transmitting, from the additional computing device after the first heartbeat message is transmitted, a second heartbeat message through the user's body;
attempting, at the computing device, to receive the second heartbeat message through the user's body;
failing, at the computing device, to receive the second heartbeat message through the user's body;
determining, based at least in part on failing to receive the second heartbeat message through the user's body, that the user is no longer in physical possession of the computing device; and
performing, at the computing device in response to determining that the user is no longer in physical possession of the computing device, a security action.

US Pat. No. 10,140,439

SECURITY CARD HAVING FINGERPRINT AUTHENTICATION, PROCESSING SYSTEM AND PROCESSING METHOD THEREFOR

Jung Taek Kim, Seoul (KR...

1. A method for operating a security card, the method comprising:providing a security card that performs fingerprint authentication;
providing a new issuing machine that communicates with the security card; and
providing a management server that communicates with the new issuing machine,
sensing, via the security card, a fingerprint and generating sensed fingerprint information;
receiving, via the new issuing machine, new issuance information including personal information of a card-issued person and transmitting the received new issuance information to the management server,
in response to the new issuance information received:
generating and transmitting, via the management server, a first key value and a first key value time limit information to the new issuing machine, and
generating and transmitting, via the management server, a second key value and a second key value time limit information to a card-issued person of the security card in an e-mail or text message format,
receiving, via the new issuing machine, issuance security information including first information and second information and transmitting the issuance security information to the management server,
in response to the first information and the second information included in the issuance security information being identical to the first key value and the second key value and in response to the first information and the second information being received within the first key value time limit information and the second key value time limit information:
transmitting, via the management server, an issuance permission signal to the new issuing machine;
transmitting, via the new issuing machine, the issuance permission signal received to the security card;
in response to the issuance permission signal received, storing, via the security card, the sensed fingerprint information as a reference fingerprint information in a security region of the security card, and further storing security information including at least two of financial information for financial works, personal information, a personal identification number (PIN), and authority information in the security region of the security card;
transmitting, via the security card, the reference fingerprint information to the management server;
generating, via the management server, an issuance completion signal to the new issuing machine when receiving the reference fingerprint information;
transmitting, via the new issuing machine, the issuance completion signal received to the security card;
starting, via the security card, monitoring the security region of the security card;
providing, via the security card, the security information stored in the security region to the outside via an input/output interface or a radio frequency (RF) module only when new sensed fingerprint information is identical to the reference fingerprint information via a controller;
generating, via the security card, a one-time password (OTP) which is output via a display for a financial work when the security card is activated and an OTP generation button is pressed; and
discarding, via the security card, the reference fingerprint information stored in the security region when a change in the security region is sensed.

US Pat. No. 10,140,438

HIDDEN SEPARATION AND ACCESS TO DATA ON A DEVICE

International Business Ma...

1. A method for accessing data and applications on a device, the method comprising:adding, by one or more processors, a first accessibility profile and a second accessibility profile, based on a company policy that specifies enterprise data be associated with a different password than for personal data, wherein the first accessibility profile and the second accessibility profile are each associated with a single-user profile of a device, wherein the device is a single-user personal device;
configuring, by one or more processors, a first level of access for the first accessibility profile and a second level of access for the second accessibility profile, wherein the first level of access includes a different level of accessibility permissions than the second level of access, and wherein the first level of access is associated with, both, enterprise and personal data and the second level of access is associated with only personal data;
assigning, by one or more processors, a first password to access the first accessibility profile and a second password to access the second accessibility profile, wherein the first password and the second password are each associated with the single-user profile;
receiving, by one or more processors, an input of a third password;
determining, by one or more processors, that the third password does not match the first password;
determining, by one or more processors, that the third password matches the second password; and
granting, by one or more processors, access to the device according to the second level of access, based on the determination that the third password matches the second password, wherein the access granted includes, within a user interface, visible personal applications and visible enterprise applications, wherein a user is unable to access the visible enterprise applications, and wherein the user is unable to click on the visible enterprise applications.

US Pat. No. 10,140,437

ARRAY INDEXING WITH MODULAR ENCODED VALUES

NXP B.V., Eindhoven (NL)...

1. A method of providing an application that includes obscured software code including a data array and a plurality of operations, the method comprising:providing the application to a user, the application created by:
identifying, by a processor, the data array with an index to be obscured and an operation using the data array;
permutating the identified data array using a permutation function; and
replacing the identified operation using the permutated data array and an equivalent encoded permutation function by obscuring an index by determining an equivalent encoded expression for the index using split variables and replacing the index in the permutation function with the encoded expression for the index;
wherein the split variables are split into two portions;
wherein the split variables are determined using first and second secret splitting multiplicative values and a modulus value, and
wherein the permutation function includes multiplying a split variable index by a secret permutation multiplication value.

US Pat. No. 10,140,435

METHOD FOR DISTRIBUTION OF LICENSES BASED ON GEOGRAPHICAL LOCATION

TELEFONAKTIEBOLAGET LM ER...

1. A method performed by a local interface device in a network for distributing licenses for software applications, comprising:authenticating the local interface device to a license server in the network for receipt of licenses, wherein use of the authentication of the local interface device to obtain a license from the license server is limited to user devices that communicate with the local interface device when located less than a predetermined maximum distance from the local interface device for using that authentication to enable the user device to obtain a license.

US Pat. No. 10,140,434

GROUP-BASED EXTERNAL SHARING OF ELECTRONIC DATA

Microsoft Technology Lice...

1. A computing system configured to provide access to electronic content, the system comprising:a processor;
memory storing instructions executable by the processor, wherein the instructions, when executed, configure the computing system to:
store the electronic content in a data store associated with the computing system, wherein a plurality of internal users are associated with the computing system;
provide an access control component that stores security group information that:
defines a set of users as members of a security group, the set of users comprises some, but not all, of the plurality of internal users, and
defines a security permission for the members of the security group relative to external content sharing;
receive a sharing request to share the electronic content with an external user, the sharing request being associated with a particular one of the internal users; and
based on the security group information,
allow external sharing of the electronic content with the external user if the particular internal user is a member of the security group that is allowed to externally share the electronic content; and
inhibit external sharing of the electronic content with the external user if the internal user is not a member of the security group that is allowed to externally share the electronic content.

US Pat. No. 10,140,433

VIDEO AND DIGITAL MULTIMEDIA AGGREGATOR

Comcast IP Holdings I, LL...

1. A method comprising:receiving, from a first user device, a search request;
searching, based on the search request, for content of at least one content source in a distributed digital communication network;
determining that the searching was unsuccessful;
storing the search request;
after determining that the searching was unsuccessful, determining, based on at least one change in the at least one content source, available content associated with the search request;
sending, to a second user device, data indicative of the available content; and
receiving a selection of a content item associated with the available content.

US Pat. No. 10,140,432

METHOD FOR SCALABLE ACCESS CONTROL DECISIONS

Comcast Interactive Media...

1. A method comprising:receiving, by a first computing device and from a second computing device, a redirect to a third computing device, wherein the redirect comprises a digital token comprising an indication that the redirect is authorized by the second computing device;
obtaining entitlement data for the first computing device or a user of the first computing device based, at least in part, on transmitting the digital token to the third computing device associated with the redirect;
transmitting, to the second computing device, the entitlement data for the first computing device or the user of the first computing device, wherein the entitlement data authorizes the first computing device or the user of the first computing device to access a content item; and
after transmitting the entitlement data to the second computing device, receiving, by the first computing device and from the second computing device, an unencrypted version of a location of the content item.

US Pat. No. 10,140,431

FILE MANAGEMENT SYSTEM AND USER TERMINAL IN FILE MANAGEMENT SYSTEM

NEC SOLUTION INNOVATORS, ...

1. A file management system comprising:an intranet comprising data storage unit; and
an encapsulation server which generates an encapsulated file by collectively encrypting an original file and access rights information for the original file; and
a decapsulation server which can be accessed from the user terminal and retrieves the original file by decapsulating the encapsulated file; and
a user terminal which can access the intranet and the encapsulation server,
wherein
the encapsulation server comprises
an encapsulation control unit which receives the original file and the access rights information from the user terminal, generates the encapsulated file, and returns the encapsulated file to the user terminal, and
the user terminal comprises:
an encapsulation condition setting unit which sets an encapsulation condition;
an encapsulation request unit which requests encapsulation to the encapsulation server;
an encapsulated file saving unit which saves the returned encapsulated file in the data storage unit; and
an automatic file deletion unit which, upon saving of the encapsulated file, automatically deletes the original file that was stored in the file storage means,
the decapsulation server comprises
a decapsulation control unit which performs decapsulation when the user ID has access rights to the original file, and
the user terminal comprises:
a decapsulation request unit which requests decapsulation by transmitting the encapsulated file and the user ID to the decapsulation server; and
an original file saving unit which receives the original file and saves the original file in the data storage unit; and
an automatic encapsulated file deletion unit which, upon saving of the original file, automatically deletes the encapsulated file that was stored in the data storage unit.