US Pat. No. 10,339,426

INDUCTION SYSTEM FOR CROWD MONITORING

1. A system for monitoring an area, the system comprising:a processor;
an electromagnetic radiation source in communication with the processor, wherein the electromagnetic radiation source is configured to emit radiation to heat a metallic object that is in or carried by a target;
an array of temperature sensors in communication with the processor, wherein the array of temperature sensors is configured to detect a first temperature associated with the target and a second temperature associated with the target, wherein the first temperature is detected prior to emission of the radiation and the second temperature is detected subsequent to emission of the radiation; and
wherein the processor is configured to determine whether to trigger an alert based at least in part on a difference between the first temperature and the second temperature.

US Pat. No. 10,339,425

SYSTEM AND METHOD FOR CELL RECOGNITION

IMEC VZW, Leuven (BE)

1. A method for recognizing a cell, comprising:receiving an image of the cell, wherein receiving the image of the cell comprises reconstructing the image of the cell from a first hologram with its background removed;
performing edge detection on the reconstructed image of the cell;
detecting ridges within the reconstructed image of the cell; and
quantifying an internal complexity of the cell by gauging a contrast of the ridges with an average of a Laplacian on the detected ridges.

US Pat. No. 10,339,423

SYSTEMS AND METHODS FOR GENERATING TRAINING DOCUMENTS USED BY CLASSIFICATION ALGORITHMS

Symantec Corporation, Mo...

1. A computer-implemented method for generating training documents used by classification algorithms, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:identifying a set of training documents used by a classification system to classify documents written in a first language;
generating a list of tokens from within the training documents that indicate critical terms representative of classes defined by the classification system;
determining linguistic properties of at least one token by analyzing a context in which the token is used within the set of training documents;
translating, while retaining the linguistic properties of the token, the list of tokens from the first language to a second language;
creating, based on the translated tokens, a set of simulated training documents that enables the classification system to classify documents written in the second language; and
classifying an additional document written in the second language based on the set of simulated training documents.

US Pat. No. 10,339,422

OBJECT DETECTION DEVICE, OBJECT DETECTION METHOD, AND RECORDING MEDIUM

NEC CORPORATION, Minato-...

1. An object detection device comprising:one or more processors acting as a detecting unit configured to detect an object from an input image by referring to a dictionary;
the one or more processors acting as an accepting unit configured to display, on a display device, the input image with indication that emphasizes a partial region of the detected object and accepting a selection of the partial region and an input of a class for the selected partial region through one operation of an input device;
the one or more processors acting as a generating unit configured to generate teacher data from an image of the selected partial region and the input class; and
the one or more processors acting as a learning unit configured to learn the dictionary based on the teacher data,
wherein the accepting unit accepts the selection of the partial region based on a location on the input image subjected to the one operation.

US Pat. No. 10,339,421

RGB-D SCENE LABELING WITH MULTIMODAL RECURRENT NEURAL NETWORKS

1. A system for evaluating multimodal data comprising:a multimodal data input comprising the multimodal data, the multimodal data comprising a first modality and a second modality; and
a multimodal processing module configured to:
receive the multimodal data comprising the first modality and the second modality;
evaluate the first modality using a first recursive neural network comprising a first transformation matrix;
evaluate the second modality using a second recursive neural network comprising the first transformation matrix, wherein the first transformation matrix shares memory of the first modality and the second modality between the first recursive network and the second recursive network to inform the first recursive network and the second recursive network of inter-correlations between the first modality and the second modality; and
determine an output based, at least in part, on evaluating the first modality and the second modality.

US Pat. No. 10,339,420

ENTITY RECOGNITION USING MULTIPLE DATA STREAMS TO SUPPLEMENT MISSING INFORMATION ASSOCIATED WITH AN ENTITY

Accenture Global Solution...

1. A method, comprising:receiving, by a device, a first data stream and a second data stream;
determining, by the device, that a plurality of entities are present in image data of the first data stream based on applying an object recognition technique to the image data;
analyzing, by the device, the first data stream to determine that an entity, of the plurality of entities, is unrecognizable in the image data of the first data stream based on a facial recognition technique not detecting a face of the entity;
obtaining, by the device, a common knowledge graph associated with the first data stream and the second data stream,
wherein the common knowledge graph includes information regarding the plurality of entities;
annotating, by the device, the common knowledge graph with first corresponding recognizable characteristics of the plurality of entities in the first data stream to generate a first annotated knowledge graph;
annotating, by the device, the common knowledge graph with second corresponding recognizable characteristics of the plurality of entities in the second data stream to generate a second annotated knowledge graph;
determining, by the device, whether the entity is recognizable based on the first annotated knowledge graph and the second annotated knowledge graph;
generating, by the device, metadata for the entity based on the first annotated knowledge graph and the second annotated knowledge graph; and
appending, by the device, the metadata to the first data stream to at least one of:
overlay information for the entity on the image data of the first data stream, or
replace an unrecognizable characteristic of the entity with a recognizable characteristic of the entity.

US Pat. No. 10,339,419

FINE-GRAINED IMAGE SIMILARITY

Google LLC, Mountain Vie...

1. A computer-implemented method, comprising:training an image embedding function to operate on an input image to produce as output a representation of features of the input image by at least:
selecting one or more image triplets, each image triplet of the one or more image triplets being a combination of a first image, a second image and a third image, wherein a first pairwise relevance score that measures a similarity of the first image to the second image is greater than a second pairwise relevance score that measures the similarity of the first image to the third image; and
for an image triplet of the one or more image triplets:
providing each of the first, second and third images as input to the image embedding function;
determining a performance measure of the image embedding function for the image triplet; and
adjusting the image embedding function based on the performance measure for the image triplet.

US Pat. No. 10,339,418

COMPUTER-READABLE STORAGE MEDIUM STORING IMAGE PROCESSING PROGRAM AND IMAGE PROCESSING APPARATUS

FUJITSU LIMITED, Kawasak...

1. A non-transitory computer-readable storage medium storing a program that causes a computer to perform a procedure comprising:calculating luminance differences of individual pixel pairs defined in a feature area in a source picture, the luminance differences each being a difference in luminance between pixels constituting a corresponding one of the pixel pairs;
calculating a local feature value of the feature area, based on the calculated luminance differences of the individual pixel pairs, the local feature value being a collection of bit values respectively corresponding to the individual pixel pairs,
wherein the calculating of the local feature value includes:
comparing a specific luminance difference with a specified range between a lower bound and an upper bound, the specified range including a zero point of luminance difference, the specific luminance difference having been calculated for a specific pixel pair corresponding to a specific bit value in the local feature value,
assigning a first value to the specific bit value when the specific luminance difference is greater than the upper bound of the specified range,
assigning a second value to the specific bit value when the specific luminance difference is smaller than the lower bound of the specified range, and
assigning a predetermined one of the first and second values to the specific bit value when the specific luminance difference falls in the specified range; and
defining the specified range, based on distribution of luminance differences of pixel pairs placed in one or more sample pictures at identical positions as in the source picture.

US Pat. No. 10,339,417

LEARNING CONTOUR IDENTIFICATION SYSTEM USING PORTABLE CONTOUR METRICS DERIVED FROM CONTOUR MAPPINGS

1. A computer implemented method for identifying contour groupings, within contour maps, and within at least one learning contour identification system, comprising the steps of:prepare at least one learning contour identification system for processing data types that are internal, and retrieving data types that are both internal and external, with file type format being external containers of data format described by data format in information technology, and where reading data types of whether data recalled was from internal or external format of the data type is dependent upon what stage the learning contour system resides in method execution,
provide training cases of data instances of format numerical data type for at least one learning contour identification system iteratively reading and processing same, or converting at least one training case to a system readable plurality of formatted data types for same system purpose,
transform at least one of the training cases into at least one contour map, of at least one contour, with each contour of the mapping further transformed into having at least one training contour pattern metric set, each defined entirely between two memory addresses when stored, with each contour a contour pattern metric set containing a possibility of at least one: plurality label sets, plurality coordinate point sets, plurality statistical outcome point sets, plurality calculated outcome point-sets, plurality metric instruction code-sets, and plurality of grouping contours and mappings and their sub-pattern metric sets of same,
store and label each metric of each contour into individual memory addressed locations, wherein managing appending to and removal from the memory being as determined necessary by at least one learning contour identification system's pattern identification process,
retrieve from memory, iteratively, a portion of the total finite set of stored training contour pattern metric sets, each training contour pattern metric set retrieved for the purpose of grouping contour pattern metric sets for determining a black boxed or rule-based machine instruction code set, for the classifier of at least one learning contour identification system, that when the instruction code set is tested against the remaining set of labeled and known training contour pattern metric sets, a desired level of performance presented by a confusion matrix is achieved,
store instruction code set and label as a black boxed or rule-based learned instruction set sequence, and store confusion matrix values,
provide test cases of data instances of format numerical data type for at least one learning contour identification system iteratively reading and processing same, or converting at least one test case to a system readable plurality of formatted data types for same system purpose,
transform at least one of the test cases into at least one contour map, of at least one contour, with each contour of the mapping further transformed into having at least one test contour pattern metric set, each defined entirely between two memory addresses when stored, with each contour a contour pattern metric set containing a possibility of at least one: plurality label sets, plurality coordinate point sets, plurality statistical outcome point sets, plurality calculated outcome point sets, plurality metric instruction code sets, and plurality of grouping contours and mappings and their sub-pattern metric sets of same,
store and label each metric of each contour into individual memory addressed locations, wherein managing appending to and removal from the memory being as determined necessary by at least one learning contour identification system's pattern identification process,
retrieve from memory the black boxed or rule-based labeled instruction code set, determined from the learning contour identification system, and retrieve from memory in an iterative process, test contour pattern metrics, to finalize the identification of the unknown test labeled contour pattern metric set combinations optimized in training and captured in the instruction set used to identify contour pattern of interest,
label at least one matched contour pattern metric set as an data item group of interest and compare performance to confusion matrix performance and repeat training and testing with increases or decreases in the number of contours in either test or training transformations, or both, and stop iterations of increases in contours when maximum percentage of success is achieved based on training confusion matrix performance readings,
output to display interfaces the identification of the test contour pattern of the classifier, and output the success reading for that classification from the confusion matrix along with other information pertinent to understanding output by user.

US Pat. No. 10,339,416

DATABASE SYSTEMS AND USER INTERFACES FOR DYNAMIC AND INTERACTIVE MOBILE IMAGE ANALYSIS AND IDENTIFICATION

Palantir Technologies Inc...

1. A system for matching images and interacting with an external mobile device, the system comprising:one or more computer-readable mediums configured to store computer-executable instructions; and
one or more processors, wherein the computer-executable instructions, when executed by the one or more processors, cause the system to:
receive, from an external mobile device, an image;
access a data store storing images and information associated with the images;
determine, from among the images stored in the data store, one or more closest matching images to the received image;
retrieve, from the data store, information associated with the one or more closest matching images;
transmit, to the external mobile device, the one or more closest matching images and the associated information;
receive, from the external mobile device, a request for additional information associated with a first image selected from among the one or more closest matching images; and
transmit, to the external mobile device, additional information associated with the first image, wherein the additional information comprises, at least in part, information that was not previously transmitted to the external mobile device as part of the associated information.

US Pat. No. 10,339,415

PHOTOGRAPHING METHOD AND APPARATUS AND TERMINAL

Yulong Computer Telecommu...

1. A photographing method comprising:using two photographing modules to acquire images of a to-be-photographed object at a first moment and a second moment after a preset time interval, and determining a distance of the to-be-photographed object according to:
a distance from an image point to a center of a photosensitive device of each of the two photographing modules, wherein image points are formed by a point of the to-be-photographed object on the photosensitive devices of the two photographing modules;
a distance between centers of lenses of the two photographing modules; and
one of a distance between the lens and the photosensitive device of each of the two photographing modules and an incident angle formed by a light and the photosensitive device of each of the two photographing modules;
calculating a variation between the distance of the to-be-photographed object at the first moment and the distance of the to-be-photographed object at the second moment;
determining whether the variation is less than or equal to a preset value; and
photographing the to-be-photographed object when the variation is less than or equal to the preset value.

US Pat. No. 10,339,414

METHOD AND DEVICE FOR DETECTING FACE, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM FOR EXECUTING THE METHOD

INTEL CORPORATION, Santa...

1. A face detection device, comprising:an image dividing unit to divide an input image into a plurality of divided input image portions, the input image including a frame from among a plurality of frames of input images sequentially received during a predetermined time period;
a mode change unit to transmit the plurality of divided input image portions of a first frame in parallel when a full detection mode signal is generated for the first frame, transmit a divided input image portion including a specific region in a second frame corresponding to a specific region of the first frame at which a face is detected when a face tracking mode signal is generated for the second frame temporally succeeding the first frame, and transmit a divided input image portion including a specific region in a third frame corresponding to the specific region of the first frame in which the face is detected when a partial detection mode signal is generated for the third frame temporally succeeding the second frame;
one or more face detection units for detecting a face by resizing the plurality of divided input image portions of the first or third frame transmitted through the mode change unit and performing a face detection operation on the plurality of resized divided input image portions of the first or third frame;
one or more face tracking units for performing a face tracking operation on a surrounding area of the specific region in the divided input image portion of the second frame transmitted through the mode change unit; and
a mode change signal generation unit for generating the face tracking mode signal when the one or more face detection units indicate that a face is detected in at least one divided and resized input image portion from among the plurality of divided and resized input image portions of the first frame, and generating the partial detection mode signal when the one or more face tracking units indicate that a face is not detected in the divided input image portion of the second frame.

US Pat. No. 10,339,413

WARNING SIGN PLACING APPARATUS AND CONTROL METHOD THEREOF

Wistron Corporation, New...

1. A warning sign placing apparatus comprising:a warning sign equipment;
at least two camera units, capturing a plurality of images in a preset direction, wherein the at least two camera units have at least two different fields of view;
a control unit, coupled to the at least two camera units; and
a vehicle, having drive elements and carrying the warning sign equipment, the at least two camera units and the control unit,
wherein the warning sign placing apparatus is initially placed within a car,
wherein the control unit identifies a traveling direction of a road based on the images captured by the at least two camera units, distinguishes at least one object on the road, plans a route from the car to a target point along the road for the vehicle according to the at least one object, and controls the vehicle to travel along the route away from the car to place the warning sign equipment at the target point through the drive elements,
wherein the control unit enters its sleep state after transmitting the route to the vehicle, and the vehicle travels along the route by itself.

US Pat. No. 10,339,412

IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. An image processing apparatus comprising:at least one processor programmed to cause the image processing apparatus to:
input an image;
extract an image feature of the input image;
store a plurality of registered images that serve as search targets for a query image;
search for an image similar to the query image from among the plurality of registered images based on the extracted image feature extracted from the query image to acquire a search result image; and
if a plurality of search result images is acquired, compare a difference area between the plurality of search result images with an area of the query image corresponding to a position of the difference area.

US Pat. No. 10,339,411

SYSTEM TO REPRESENT THREE-DIMENSIONAL OBJECTS

AMAZON TECHNOLOGIES, INC....

1. A computer-implemented method comprising:accessing a query image;
determining a query feature of the query image using a scale-invariant feature transform (SIFT) algorithm;
determining a query local descriptor value produced by the SIFT algorithm with respect to the query feature;
accessing object data comprising:
an object identifier indicative of a three-dimensional (3D) object,
a feature identifier indicative of a feature on the 3D object,
a distribution identifier indicative of a type of probability distribution descriptive of a plurality of local descriptor values of the feature, each of the plurality of local descriptor values indicative of the feature as viewed from a particular camera pose,
a distribution parameter associated with the distribution identifier, wherein the distribution parameter is indicative of a constant value used to define one or more characteristics of the type of probability distribution;
determining, using the type of probability distribution and the distribution parameter, a probability that the query local descriptor value is represented by the object data;
determining the probability of the query local descriptor value exceeds a threshold value; and
generating data indicative of a match between the query feature and the feature on the 3D object.

US Pat. No. 10,339,410

COLOR EXTRACTION OF A VIDEO STREAM

Snap Inc., Santa Monica,...

1. A computer implemented method, comprising:receiving, by one or more processors, a set of images of a video stream, the set of images depicting at least a portion of a face within the video stream;
converting, by the one or more processors, a first portion of images of the set of images to a set of cylindrical coordinate representations as the set of images is being captured;
performing a first histogram equalization on the set of cylindrical coordinate representations;
detecting an area of interest for the first portion of images of the set of images, the area of interest positioned on the portion of the face within the video stream;
identifying one or more colors of the set of cylindrical coordinate representations based on the area of interest, the one or more colors identified within the portion of the face;
determining a prevailing color of the one or more colors within the area of interest;
comparing pixel values within the area of interest to a set of predetermined pixel value ranges selected from a plurality of sets of pixel value ranges each associated with an object type;
converting the prevailing color from the cylindrical coordinate representation to a color space associated with the set of images of the video stream while the set of images are being captured;
applying the prevailing color to a second portion of images of the set of images of the video stream while the set of images are being captured; and
generating a modified set of images by performing a second histogram equalization on the set of cylindrical coordinate representations of the second portion of images after applying the prevailing color.

US Pat. No. 10,339,409

METHOD AND A DEVICE FOR EXTRACTING LOCAL FEATURES OF A THREE-DIMENSIONAL POINT CLOUD

Peking University Shenzhe...

1. A method for extracting local features of a 3D point cloud, comprising:determining the local reference system corresponding to the points of each body element, comprising:
calculating a covariance matrix M;
decomposing the covariance matrix M to obtain three feature vectors;
sorting the three feature vectors in descending order as the roll axis x, the heading axis y and the pitch axis z of the local reference system respectively; and
aligning the three feature vectors for de-ambiguity calculation, to obtain the local reference system corresponding to the points of each body element,
wherein the covariance matrix M is calculated using

wherein R is the radius of the point cloud sphere, p? is a point of each body element, p is a local feature point,

calculating angle information about a local feature point to be extracted and points of each body element in a pre-set point cloud sphere;
calculating concavo-convex information about a curved surface between the local feature point to be extracted and the points of each body element respectively, wherein the pre-set point cloud sphere contains various body elements, and the body elements are adjacent to the local feature point to be extracted;
computing histogram statistics according to the angle information and the concavo-convex information;
generating histograms each corresponding to each body element;
connecting the histograms corresponding to the body elements in the pre-set point cloud sphere on a one-to-one basis, to obtain an extracted vector; and
performing exponential normalization processing and second-normal-form normalization processing on the extracted vector.

US Pat. No. 10,339,408

METHOD AND DEVICE FOR QUASI-GIBBS STRUCTURE SAMPLING BY DEEP PERMUTATION FOR PERSON IDENTITY INFERENCE

TCL RESEARCH AMERICA INC....

1. A method for visual appearance based person identity inference, comprising:obtaining a plurality of input images, wherein the input images include a gallery set of images containing persons-of-interest and a probe set of images containing person detections, and one input image corresponds to one person;
extracting N feature maps from the input images using a Deep Neural Network (DNN), N being a natural number;
constructing N structure samples of the N feature maps using conditional random field (CRF) graphical models, comprising:
for a feature map, constructing an initial graph structure by K Nearest Neighbor (KNN) based on feature similarity in a feature space corresponding to the feature map, the graph model including nodes and edges, a node representing one person;
performing structure permutations by a plurality of iterations of KNN computation in N feature spaces with a Quasi-Gibbs Structure Sampling (QGSS) process;
assigning labels to the nodes that minimize a conditional random field (CRF) energy function over all possible labels, wherein the all possible labels represent all different persons-of-interest in the gallery set; and
deriving the N structure samples from the plurality of iterations and the assigned labels;
learning the N structure samples from an implicit common latent feature space embedded in the N structure samples; and
according to the learned structures, identifying one or more images from the probe set containing a same person-of-interest as an image in the gallery set.

US Pat. No. 10,339,407

NOISE MITIGATION IN VECTOR SPACE REPRESENTATIONS OF ITEM COLLECTIONS

MAXIM ANALYTICS, LLC, Re...

1. A computer-implemented method to mitigate noise in vector space representations of item collections, the method comprising:receiving, by one or more computing devices, a collection of items, each item characterized by a plurality of features;
preparing, by the one or more computing devices, a first vector space representative of the collection, wherein each item in the first vector space is represented by a vector that is a function of the features characterizing the item;
first identifying, by the one or more computing devices and based on information characteristic of the first vector space, only a first one of: items contributing to first vector space noise, and features contributing to first vector space noise;
first weighting, by the one or more computing devices, the first identified items and features to decrease the influence of the first identified items and features on vector spaces representative of the collection;
preparing, by the one or more computing devices, a second vector space representative of the collection based on the first weighted items and features;
second identifying, based on information characteristic of the second vector space, the first one of:
items contributing to second vector space noise and
features contributing to second vector space noise;
second weighting the second identified items and features to decrease the influence of the second identified items and features on vector spaces representative of the collection; and
preparing a third vector space representative of the collection based on the cumulatively weighted items and features, wherein each item is represented by a vector that is sum of the vectors of the features comprising the item.

US Pat. No. 10,339,406

APPARATUS AND METHOD FOR USING BACKGROUND CHANGE TO DETERMINE CONTEXT

OrCam Technologies Ltd., ...

1. An apparatus for providing feedback to a user, the apparatus comprising:an image sensor configured to be positioned for movement with a head of the user as the head moves, and to capture real time images from an environment of the user; and
at least one processor device for determining contextual information based on the real time images, the processor device being configured to:
monitor a plurality of the real time images captured by the image sensor to determine that relative motion occurs between a first portion of a scene captured in the plurality of real time images and other portions of the scene captured in the plurality of real time images;
determine that an object appears to be stationary in the first portion of the scene across the monitored real time images while the other portions of the scene appear to be moving across the monitored real time images;
determine, based on the stationary appearance of the object in the first portion of the scene across the monitored real time images while the other portions of the scene appear to be moving across the monitored real time images, that the head of the user is tracking the object included in the first portion of the scene;
obtain contextual information associated with the object that the head of the user is tracking; and
provide the feedback to the user based on at least part of the contextual information.

US Pat. No. 10,339,405

IMAGE RECOGNITION DEVICE AND IMAGE RECOGNITION METHOD

PANASONIC INTELLECTUAL PR...

1. An image recognition device comprising:a camera unit that generates a distance signal and a luminance signal using reflected light from a plurality of subjects;
an image generator that generates a range image from the distance signal and a luminance image from the luminance signal; and
an image recognition processor that performs image recognition, wherein
the image recognition processor:
divides the range image and the luminance image into a plurality of regions based on boundaries extracted from both the range image and the luminance image;
makes a determination, for each of the plurality of regions, as to whether the region is a first region in which a specific object is clearly not present or a second region other than the first region, and
performs image recognition processing on one or more of the plurality of regions,
wherein the image recognition processor does not perform image recognition processing on the region determined to be the first region.

US Pat. No. 10,339,404

AUTOMATED FILTERING OF ITEM COMMENTS

International Business Ma...

1. A computer-implemented method for automated filtering of comments associated with a published item element, comprising executing on a computer processor the steps of:analyzing via image analysis an item that is a photograph published to an account of a user of a social network service to identify and distinguish an element that is an image of an object that is visible within the photograph item from other elements that are visible within graphic content of the published photograph item and from surrounding contextual visual image pixel data, wherein the item is published with a plurality of comments that are posted by a plurality of users of the social network service that is inclusive of the user, and wherein the surrounding contextual visual image pixel data defines a background element or a foreground element;
in response to a selection of the distinguished element of the item, analyzing text content of the plurality of comments to identify associations of the analyzed text content of the plurality of comments to the selected element; and
differentially displaying a subset of the plurality of comments to the user account of the social network in association with the published item, relative to displays of remaining others of the plurality of comments that are not within the subset, in response to determining that the or analyzed text content of each of the subset plurality of comments comprises a string text content identification of the object, and that the analyzed text content of each of the remaining others of the plurality of comments does not comprise the string text content identification of the object, wherein the string text content identification of the object is selected from the group consisting of a name of the object, a type of the object, and a category of the object.

US Pat. No. 10,339,403

METHODS AND SYSTEMS OF ENROLLMENT AND AUTHENTICATION

1. A computerized biometric method comprising enrollment and authentication of a user,wherein the enrollment includes:
capturing a pre-enrollment image of a view object, while the user holds the view object in view of the camera;
presenting said pre-enrollment image to the user on the display;
upon presenting said pre-enrollment image, enabling the user to superimpose a symbol with an imaged feature of the view object as presented on said display;
upon superimposing said symbol on said display with the imaged feature of the view object, storing as an enrollment image said symbol and position and orientation of said symbol in image space with said pre-enrollment image;
wherein the authentication includes:
presenting on a display at least a portion of a previously stored enrollment image to a candidate person, wherein said previously stored enrollment image includes said symbol;
instructing the candidate person to present a view object to a camera while the view object is located in view of the camera;
using the camera, capturing a times series of candidate images of the view object while enabling aligning by the candidate person at least one of said candidate images with a previously stored enrollment image or portion thereof including said symbol; and
upon said aligning said at least one of said candidate images with said symbol in the enrollment image, verifying said candidate image as an authentic image of said view object, thereby authenticating the candidate person as the user previously enrolled.

US Pat. No. 10,339,402

METHOD AND APPARATUS FOR LIVENESS DETECTION

BEIJING KUANGSHI TECHNOLO...

1. A liveness detection method performed by a processor, comprising:generating a random action instruction sequence including a plurality of random action instructions;
sequentially sending a random action instruction in the random action instruction sequence;
determining whether the sequentially sent random action instruction in the random action instruction sequence is sequentially executed by a living body based on detection information of at least two sensors, wherein the at least two sensors comprise an image sensor and at least one non-image sensor;
determining that the liveness detection is succeeded if the sequentially sent random action instruction in the random action instruction sequence is sequentially executed by the living body; and
determining that the liveness detection is failed if a currently sent random action instruction is determined to not be executed by the living body, wherein the random action instruction sequence at least comprises a third category of action instructions, for each third category of action instructions, the method further comprises: determining, by said processor, a first decision parameter based on a first detection information obtained from the image captured by the image sensor, determining, by said processor, a second decision parameter based on a second detection information generated by the at least one non-image sensor, and determining, by said processor, that the liveness detection is failed if the first decision parameter does not match with the second decision parameter, and wherein in the case that the currently sent random action instruction is not a last random action instruction in the random action instruction sequence, a next random action instruction is sent when the currently sent random action instruction is determined to be executed by the living body.

US Pat. No. 10,339,401

SYSTEM AND METHODS OF MONITORING DRIVER BEHAVIOR FOR VEHICULAR FLEET MANAGEMENT IN A FLEET OF VEHICLES USING DRIVER-FACING IMAGING DEVICE

BENDIX COMMERCIAL VEHICLE...

1. A safety system monitoring a seatbelt worn condition of an associated vehicle during operation of the associated vehicle by an associated driver, the system comprising:an imaging device disposed in the associated vehicle, the imaging device capturing an image of the associated driver in the associated vehicle and generating image data representative of the captured image of the associated driver; and
a control device comprising:
a processor;
an image data input operatively coupled with the processor, the image data input receiving the image data from the imaging device;
a non-transient memory device operatively coupled with the processor, the non-transient memory device storing safe model data comprising a recommended value range of a seatbelt use parameter of the monitored seatbelt worn condition of the associated vehicle; and
control logic stored in the non-transient memory device, the control logic being executable by the processor to:
process the image data to determine an operational value of the seatbelt use parameter of the monitored seatbelt worn condition of the associated vehicle by:
inspecting the image data to locate a head of a human; and
inspecting the image data to determine one or more pairs of discontinuous collinear seatbelt lines below the located head of the human;
perform a comparison between the recommended value range of the seatbelt use parameter of the monitored seatbelt worn condition of the associated vehicle and the operational value of the seatbelt use parameter of the monitored seatbelt worn condition of the associated vehicle; and
determine a state of vehicle operation compliance as a one of:
a seatbelt non-compliance state in accordance with a first result of the comparison between the recommended value range of the seatbelt use parameter and the operational value of the seatbelt use parameter of the monitored seatbelt worn condition of the associated vehicle, wherein the control logic is executable by the processor to generate seatbelt use non-compliance data in accordance with the first result, or
a seatbelt use compliance state in accordance with a second result of the comparison between the recommended value range of the seatbelt use parameter and the operational value of the seatbelt use parameter of the monitored seatbelt worn condition of the associated vehicle; and
an output operatively coupled with the processor, the output selectively receiving the seatbelt use non-compliance data from the processor and generating a seatbelt use non-compliance signal representative of the operational value of the seatbelt use parameter of the monitored seatbelt worn condition being outside of the recommended value range of the safe model data.

US Pat. No. 10,339,400

TRAFFIC LIGHT DETECTION USING MULTIPLE CAMERAS

CHONGQING JINKANG NEW ENE...

1. A method for imaging a traffic light, the method comprising:determining, by an on-vehicle processing system, a distance to the traffic light, wherein the on-vehicle processing system is installed on a vehicle;
selecting, by the on-vehicle processing system, a camera mode based on the determined distance to the traffic light;
receiving, by the on-vehicle processing system, one or more images from one or more cameras based on the selected camera mode;
determining, by the on-vehicle processing system, a state of the traffic light within the one or more received images; and
driving, by the on-vehicle processing system, the vehicle based on the determined state of the traffic light.

US Pat. No. 10,339,399

DETECTION APPARATUS, DETECTION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

Ricoh Company, Ltd., Tok...

1. A detection apparatus comprising:a camera configured to acquire image data around a vehicle;
a recognizer configured to recognize an area indicating a light of a traffic signal from the image data; and
a first detector configured to detect that the vehicle runs through the light when a size of the area indicating the light is larger than a first threshold, a distance between the area indicating the light and an end of the image data is shorter than a second threshold, and velocity data of the vehicle is higher than a third threshold.

US Pat. No. 10,339,398

METHOD AND DEVICE FOR RECOGNIZING TRAFFIC SIGNS

Elektrobit Automotive Gmb...

1. A method for recognizing traffic signs, comprising:receiving images of traffic signs from different locations at different times;
defining a provisional probability value, indicating the probability with which an image received at the specific time maps a specific traffic sign from a set of traffic signs;
calculating a first probability value that indicates the probability with which an image received at a specific time maps a specific traffic sign from a set of traffic signs, wherein the calculating is based on:
at least one image of a traffic sign received before the specific time and characterizing an earlier state, and
a previously known transition probability value that indicates the probability with which the specific traffic sign occurs following the earlier state;
calculating a second probability value on the basis of the provisional probability value for a specific traffic sign from the set of traffic signs and the first probability value for the specific traffic sign, by weighting the provisional probability value with the first probability value; and
outputting the specific traffic sign from the set of traffic signs based on the second probability value,
wherein the previously known transition probability value is allocated to a sequence of traffic signs that map a real traffic event.

US Pat. No. 10,339,397

DETECTING DEVICE, DETECTING METHOD, AND PROGRAM

International Business Ma...

1. A detecting device comprising:an acquisition section for acquiring a plurality of images obtained at a same time from a plurality of imaging devices provided at different heights; and
a detection section for detecting a rising portion of an identical object toward the imaging devices based on a difference between lengths of the identical object in a height direction in the plurality of images;
wherein the detection section detects the rising portion based on a length ratio between regions corresponding to the identical object in the height direction in the plurality of images;
wherein the detecting device further comprises:
an extraction section for extracting, from the plurality of images obtained at a same time from the plurality of imaging devices, an obstacle candidate as a candidate for an obstacle;
wherein the extraction section is configured to:
divide one of the plurality of images into a plurality of regions, each region comprising a plurality of pixels and having a predetermined size and shape;
extract as a candidate obstacle, each of the plurality of regions that differs from surrounding regions by more than a reference amount; and
identify, as the identical object, a region similar to the extracted candidate obstacle from one of the plurality of images not used to extract the candidate obstacle;
a distance calculation section for calculating distance to an identical object corresponding to the obstacle candidate based on amounts of parallax of the plurality of images in the height direction and in a longitudinal direction using the focal lengths and relative positions of the plurality of imaging devices, at least three of the plurality of imaging devices located at respective vertices of a triangle having a horizontal base; and
a determination section for determining whether the identical object is an obstacle;
wherein the detection section generates a plurality of template images obtained by reducing an image of the obstacle candidate included in one image of the plurality of images at each of a plurality of magnification candidates, performs template matching using each of the plurality of template images on another image of the plurality of images, calculates a matching score at a best matching position in the other image, and calculates a magnification giving a maximum matching score from among the plurality of magnification candidates;
wherein a value of the calculated magnification indicates a ratio of the length of the identical object in the height direction in a first image captured from a lower position to the length of the identical object in the height direction in a second image captured from a higher position;
wherein, on condition that the value of the magnification giving the maximum matching score is larger than a threshold value based on distance to the identical object, the determination section determines the identical object to be an obstacle; and
an output section configured to display a direction of the determined obstacle and the distance to the determined obstacle on a display.

US Pat. No. 10,339,396

VEHICLE ACCESSIBILITY DETERMINATION DEVICE

CLARION CO., LTD., Saita...

1. A vehicle accessibility determination device comprising:a memory; and
a central processing unit connected to the memory, the central processing unit being configured to:
capture a range including a road surface around a vehicle via an imager to be attached to the vehicle;
convert an original image captured by the imager into a virtual image to be viewed from a predetermined viewpoint;
detect from the virtual image a three-dimensional object having a height from the road surface; and
determine whether the vehicle is capable of accessing an inside of the three-dimensional object or a clearance among other three-dimensional objects,
wherein the central processing unit is configured to determine whether the vehicle is capable of accessing the inside or the clearance by:
extracting an area corresponding to the three-dimensional object from the original image;
calculating a presence or an absence of a floating area that does not contact the road surface and a height of the floating area from the road surface relative to the extracted three-dimensional object area, and calculating a road surface projecting position in which the floating area is projected to the road surface from directly above, the floating area constituting the three-dimensional object area; and
identifying whether there is a space inside the three-dimensional object or in the clearance among other three-dimensional objects to which the vehicle is capable of accessing, based on the presence or the absence of the floating area and the calculated road surface projecting position.

US Pat. No. 10,339,395

DISPLAY DEVICE, VEHICLE CONTROLLER, TRANSMITTER, AND TRAVELLING ASSISTANCE SYSTEM

DENSO CORPORATION, Kariy...

1. A display device comprising:a computer configured to:
communicate with an outside to acquire absence region information identifying an absence region in which an obstacle is presumed to be absent;
display on a display the absence region, which is acquired by the computer, in a state of superimposing the absence region on a map; and
estimate a future position of the obstacle based on a shape of the absence region and a change in the shape of the absence region;
wherein the computer further displays on the display the future position of the obstacle estimated by the computer, and
wherein the shape of the absence region identified by the absence region information is determined based on a detection range of a sensor and a detection result of the sensor.

US Pat. No. 10,339,394

STEP DETECTION DEVICE AND STEP DETECTION METHOD

Nissan Motor Co., Ltd., ...

1. A step detection device comprising:a distance sensor which is mounted on a vehicle and detects a distance and a direction to a road surface around the vehicle;
a step determination position circuit which sets a first step determination position on the road surface, the first step determination position being away from the distance sensor in a first predetermined direction by a first predetermined distance and extending in a direction orthogonal to the first predetermined direction, and which sets a second step determination position on the road surface, the second step determination position being away from the distance sensor in a second predetermined direction different from the first predetermined direction by a second predetermined distance and extending in a direction orthogonal to the second predetermined direction;
a road surface height calculation circuit which calculates a height change of the road surface at the first step determination position and a height change of the road surface at the second step determination position, based on the distance and the direction to the road surface detected by the distance sensor; and
a step detection circuit which detects a step on the road surface based on one of the first step determination position and the second step determination position, a gradient of the height change of the road surface at the one being larger than a gradient of the height change of the road surface at the other.

US Pat. No. 10,339,393

DEMARCATION LINE RECOGNITION APPARATUS

DENSO CORPORATION, Kariy...

1. A demarcation line recognition apparatus that is applied to a vehicle in which an imaging apparatus that captures an image of an area ahead of the vehicle is mounted, the demarcation line recognition apparatus comprising:a demarcation line recognizing unit that recognizes, using a processor, a traveling demarcation line that demarcates a traveling lane of the vehicle based on an image of the area ahead of the vehicle acquired by the imaging apparatus;
a demarcation line estimating unit that estimates, using the processor, a shape of the traveling demarcation line in a range that cannot be recognized by the demarcation line recognizing unit, based on the traveling demarcation line recognized by the demarcation line recognizing unit;
a reliability level determining unit that determines, using the processor, a reliability level of the traveling demarcation line recognized by the demarcation line recognizing unit; and
an estimation invalidating unit that invalidates, using the processor, the estimation of the shape of the traveling demarcation line by the demarcation line estimating unit, based on a determination result of the reliability level of the traveling demarcation line by the reliability level determining unit.

US Pat. No. 10,339,392

METHOD AND SYSTEM FOR REAR STATUS DETECTION

BlackBerry Limited, Wate...

1. A method for identifying a loading bay at a facility to which a vehicle is reversing, the method comprising:determining, at a sensor apparatus connected with the vehicle, that the vehicle is reversing;
capturing, at the sensor apparatus, an image of the loading bay; and
determining, from the image, an identity of the loading bay at the facility to which the vehicle is reversing.

US Pat. No. 10,339,391

FUSION-BASED WET ROAD SURFACE DETECTION

GM Global Technology Oper...

1. A method for determining wetness on a path of travel of a motor vehicle, the method comprising:capturing an image of a surface of the path of travel by an image capture device, the image capture device focusing at the surface where water is expected as the motor vehicle travels along the path of travel;
applying a plurality of wet surface detection techniques, by a processor, to the image, each of the wet surface detection techniques independently assessing whether the path of travel is wet or not wet, the plurality of wet surface detection techniques including a rearward tire splash analysis technique, a side tire splash analysis technique, a tire track analysis technique, and/or a mirrored light image analysis technique;
determining, in real-time by the processor, a respective analysis result for each of the wet surface detection techniques indicating the surface of the path of travel is wet or not wet;
inputting the analysis results determined by the wet surface detection techniques into a fusion and decision-making module;
weighting the analysis results input into the fusion and decision-making module using a condition assessment module, the weighting including dynamically determining and applying a respective weight factor to each of the analysis results determined by each of the wet surface detection techniques within the fusion and decision-making module;
fusing the weighted analysis results using the fusion and decision-making module, the fusing including calculating a summation of the weighted analysis results and determining if the summation of the weighted analysis results exceeds a predetermined threshold; and
providing, responsive to the summation of the weighted analysis results exceeding the predetermined threshold, a wet surface detection signal indicating a wet surface condition on the path of travel to a control device of the motor vehicle, the control device applying the wet surface detection signal to mitigate the wet surface condition.

US Pat. No. 10,339,390

METHODS AND APPARATUS FOR AN IMAGING SYSTEM

SEMICONDUCTOR COMPONENTS ...

1. An imaging apparatus, comprising:an image sensor comprising a pixel array configured to generate pixel data;
a storage unit coupled to the image sensor and configured to store the pixel data; and
an image processing unit communicatively coupled to the image sensor and the storage unit and configured to:
receive a first image frame of pixel data and a second image frame of pixel data, wherein the first image frame and the second image frame are captured sequentially;
detect at least two features in the first image frame and at least two features in the second image frame;
form matched features by matching the at least two features of the first image frame to the at least two features of the second image frame;
perform orientation estimation comprising:
calculating an epipole from the matched features;
estimating a rotation angle in relation to the epipole;
determining whether the matched features appear on a reference plane by calculating a 3D coordinate for each of the matched features in a reference coordinate system; and
updating the estimated rotation angle using the calculated 3D coordinate for each of the matched features and model fitting techniques until a predetermined tolerance level is reached;
validate the estimated orientation in the reference coordinate system using homography; and
estimate an average camera orientation by weighted averaging of multiple estimates of the camera orientation using quality scores as weights, and wherein a quality score measures the consistency of multiple estimates of a translation vector of the camera in the vehicle coordinate system between two image frames.

US Pat. No. 10,339,389

METHODS AND SYSTEMS FOR VISION-BASED MOTION ESTIMATION

Sharp Laboratories of Ame...

1. A visual odometry method for estimating vehicle motion, said method comprising:providing a vehicle equipped with a camera rigidly mounted and calibrated with respect to the vehicle;
moving the vehicle from a starting position in a global coordinate frame to a first location across a planar ground plane;
receiving an incoming image on the camera;
performing feature detection on said incoming image to identify a plurality of regions, wherein each region in said plurality of regions is associated with a key point in an incoming image coordinate frame;
selecting a feature descriptor for each region in said plurality of regions, thereby producing a plurality of feature descriptors for said incoming image coordinate frame;
performing feature matching between said plurality of feature descriptors for said incoming image coordinate frame and a plurality of feature descriptors selected for a previous image coordinate frame, thereby producing a plurality of feature correspondences;
for each feature correspondence in said plurality of feature correspondences, aligning key points from said previous image coordinate frame to said incoming image coordination frame;
projecting said key points to a previous world coordinate frame and an incoming world coordinate frame at the planar ground plane, thereby producing a plurality of pairs of world coordinates at the planar ground plane;
estimating vehicle motion from said plurality of pairs of world coordinates at the planar ground plane;
minimizing an accumulation of errors by selecting a key pose as follows:
comparing a rotation angle of said motion estimate to an angle threshold and a distance traveled by the vehicle to a distance threshold; and
when said angle comparison meets a first criterion or said distance comparison meets a second criterion;
projecting said key pose to a current camera pose in said global coordinate frame;
determining a motion trajectory from said current camera pose; and
updating said plurality of feature descriptors selected for a previous world coordinate frame to said plurality of feature descriptors for said incoming world coordinate frame, wherein
said motion estimate comprises a rotation matrix and a translation vector;
said rotation matrix is associated with no more than three degrees of freedom and an in-plane rotation that is in-plane with respect to the ground plane;
said motion estimate comprises a rigid transformation Tk,k?1
where said rigid transformation Tk,k?1 consists of the rotation matrix Rk,k?1 between a previous time (k?1) and a current time (k), and the translation vector tk?k?1 between the previous time and the current time, such that

US Pat. No. 10,339,388

VIRTUAL SENSORS

Alarm.com Incorporated, ...

1. An electronic sensor comprising:a camera configured to capture images of an area monitored by a monitoring system;
an electronic storage device configured to store data;
a transmitting device configured to send signals to a controller of the monitoring system; and
a processing device configured to perform operations comprising:
defining configuration data used in sensing an event through image data captured by a camera included in a monitoring system;
monitoring images captured by the camera for an error condition that reduces an ability to detect the event through image data captured by the camera;
based on the monitoring of images captured by the camera, detecting a potential error condition that reduces an ability to detect the event through image data captured by the camera;
determining a degree of severity of the potential error condition; and
handling the potential error condition based on the degree of severity,
wherein determining the degree of severity of the potential error condition comprises:
classifying the potential error condition as severe based on a determination that an entire field of view of the camera or an entire area of interest that is essential for detecting the event has been obstructed;
classifying the potential error condition as moderate based on a determination that a subset of anchor points have been obstructed and an area of interest has been partially obstructed; and
classifying the potential error condition as low based on a determination that a subset of anchor points have been obstructed, but an area of interest remains unobstructed.

US Pat. No. 10,339,387

AUTOMATED MULTIPLE TARGET DETECTION AND TRACKING SYSTEM

Brigham Young University,...

1. A method for automated detection and tracking of multiple targets, comprising:receiving video data, wherein the video data comprises a sequence of video frames;
compensating for platform motion in the video data;
removing noise and spurious returns from the video data;
detecting one or more targets within the video data, wherein detecting one or more targets within the video data comprises applying a recursive random sample consensus algorithm to the video data to generate contiguous tracks for each moving object in the video data; and
identifying target information for each target in the video data.

US Pat. No. 10,339,386

UNUSUAL EVENT DETECTION IN WIDE-ANGLE VIDEO (BASED ON MOVING OBJECT TRAJECTORIES)

Grandeye, Ltd., London (...

1. A method of monitoring moving objects in a wide-angle video, comprising the steps of:determining moving object trajectories;
converting the moving object trajectories to a trajectory in a perspectively corrected image domain; and
interpreting the object trajectories for detecting unusual behavior using state transition probability models of non-hidden Markov models;
wherein the said moving object trajectories in corrected image domain are interpreted using Markov Models with states defined according to motion vector angles of moving objects for unusual event detection;
wherein the Markov Models are trained with motion vectors in Cartesian coordinates and polar coordinates computed in corrected image domain.

US Pat. No. 10,339,385

DETERMINING AN ACTION OF A CUSTOMER IN RELATION TO A PRODUCT

Capital One Services, LLC...

1. A method, comprising:receiving, by a device, input that comprises video data concerning a plurality of customers and a product in a plurality of physical retail locations;
processing, by the device, the video data to identify the plurality of customers and the product in the plurality of physical retail locations;
determining, by the device, actions of the plurality of customers in relation to the product in the plurality of physical retail locations,
wherein determining the actions of the plurality of customers in relation to the product in the plurality of physical retail locations includes:
identifying one or more eyes of a customer of the plurality of customers,
tracking movement of the one or more eyes of the customer,
determining an eye gaze direction of the customer relative to the product based on the movement of the one or more eyes of the customer,
determining a duration of time associated with the eye gaze direction of the customer relative to the product based on the movement of the one or more eyes of the customer, and
determining, for the customer, an action, of the actions of the plurality of customers, based on the eye gaze direction of the customer relative to the product and the duration of time associated with the eye gaze direction of the customer relative to the product;
determining, by the device, categories for the actions of the plurality of customers in relation to the product;
generating, by the device, a report that indicates one or more of the categories for the actions of the plurality of customers in relation to the product; and
sending, by the device, the report to a client device to permit the client device to display the report.

US Pat. No. 10,339,384

CONSTRUCTION PHOTOGRAPH INTEGRATION WITH 3D MODEL IMAGES

1. A method comprising:receiving, by an image processing device, one or more photos of building locations at a building;
extracting position coordinates comprising X and Y values in a 2D floor plan from the one or more photos;
converting the position coordinates into 3D model coordinates;
extracting model viewpoints from a 3D model of the building at the 3D model coordinates, each of the model viewpoints providing a view of the 3D model at a same viewing position and orientation as one of the one or more photos; and
comparing each of the one or more photos with a corresponding model viewpoint,
wherein the one or more photos are 360 degree images produced by a 360 degree image capture device, wherein in response to converting the position coordinates into 3D model coordinates, the method further comprising:
generating six 3D model viewpoints at each of the 3D model coordinates;
producing a cubic projection based on the six 3D model viewpoints; and
assembling the cubic projection into an equirectangular panorama.

US Pat. No. 10,339,383

METHOD AND SYSTEM FOR PROVIDING AUGMENTED REALITY CONTENTS BY USING USER EDITING IMAGE

DS GLOBAL, Geumcheon-Gu ...

1. A method for a terminal to provide augmented reality (AR) using a user-edited image, the method comprising:selecting a frame comprising a plurality of markers from a plurality of frames, wherein each of the plurality of frames comprises a different theme;
adding the frame comprising the plurality of markers to an image captured by a camera unit or an already captured image by executing an application installed on the terminal;
requesting a printing apparatus to print the image to which the frame has been added;
obtaining an image by photographing the printed matter printed by the printing apparatus by executing the application;
identifying a marker in the obtained image and requesting an AR object and AR object attribute data corresponding to the marker from an AR content providing server; and
displaying the AR object received from the AR content providing server,
wherein the user-edited image includes a plurality of markers indicating the AR object.

US Pat. No. 10,339,382

FEEDBACK BASED REMOTE MAINTENANCE OPERATIONS

FIELDBIT LTD., Kfar-Saba...

1. A method for feedback based maintenance, the method comprises:transmitting to an intermediate computerized system a first image that was acquired, at an acquisition point of time, by a head mounted display (HMD) mounted on a head of a first user;
transmitting the first image from the intermediate computerized system and towards a computerized device of a second user; wherein the intermediate computerized system differs from the computerized device of the second user and differs from the HMD;
displaying, on the computerized device of the second user, the first image;
following the displaying, receiving feedback, related to the first image; wherein the feedback is provided by a user that differs from the first user;
generating, by the intermediate computerized system, an augmented image that comprises the first image and the feedback;
transmitting, to the HMD, the augmented image;
adjusting, by the HMD, the augmented image to provide an amended augmented image that corresponds to visual information as viewed by the HMD at a display point in time;
wherein the adjusting comprises overlaying at least a part of the augmented image over the visual information viewed by the HMD at the display point of time and matching a target object of the augmented image to the target object as appearing in the visual information viewed by the HMD at the display point of time;
wherein the overlaying of the at least part of the augmented image over the visual information viewed by the HMD at the display point of time comprises projecting staggered parts of the augmented image over the visual information viewed by the HMD at the display point of time;
and
displaying, by the HMD, the amended augmented image.

US Pat. No. 10,339,381

CONTROL APPARATUS, CONTROL SYSTEM, AND CONTROL METHOD

HITACHI, LTD., Tokyo (JP...

1. A control apparatus, which is configured to control a data acquisition apparatus group comprising at least one data acquisition apparatus configured to acquire a position and an image of an object present in a space to execute a plurality of different pieces of processing for one of the space and the object, the control apparatus comprising:a processor configured to execute programs relating to the plurality of different pieces of processing;
a storage device configured to store the programs; and
a communication interface configured to communicate to and from the data acquisition apparatus group,
wherein the storage device is configured to store, when the processor executes any one of the plurality of different pieces of processing, as data on a first object, time series data on a series of positions and images of the first object that has been collected since the at least one data acquisition apparatus detected the first object, and
wherein the processor is configured to execute, in each processing of the plurality of different pieces of processing:
acquisition processing of acquiring, from the at least one data acquisition apparatus, as data on a second object, time series data on a series of positions and images of the second object that has been collected since the at least one data acquisition apparatus detected the second object;
determination processing of determining whether or not the first object and the second object are identical to each other based on the images of the first object in the data on the first object stored in the storage device and the images of the second object in the data on the second object acquired through the acquisition processing; and
storage processing of storing, when the determination processing results in a determination that the first object and the second object are identical to each other, the data on the second object and the data on the first object into the storage device in association with each other, and when the determination processing results in a determination that the first object and the second object are not identical to each other, the data on the second object and the data on the first object into the storage device without associating the data on the second object with the data on the first object, and
wherein the data acquisition apparatus group includes a specific data acquisition apparatus configured to acquire the position, the image, and a voice of the object,
wherein the storage device is configured to store, when the processor executes any one of the plurality of different pieces of processing, as data on a third object, time series data on a series of positions, images, and voices of the third object that has been collected since the at least one data acquisition apparatus detected the third object, and
wherein the processor is configured to, in processing of controlling the specific data acquisition apparatus among the plurality of different pieces of processing:
acquire, in the acquisition processing, from the specific data acquisition apparatus, as data on a fourth object, time series data on a series of positions, images, and voices of the fourth object that has been collected since the specific data acquisition apparatus detected the fourth object;
determine, in the determination processing, whether or not the third object and the first object, second object or fourth object are identical to each other based on the images of the third object in the data on the third object stored in the storage device and the images of the first object, the second object and the fourth object in the data on the first object, the second object and the fourth object acquired through the acquisition processing; and
store, in the storage processing, when the determination processing results in a determination that the third object and the first object, the second object or fourth object are identical to each other, the data on the first object, the second object or the fourth object, and the data on the third object into the storage device in association with each other, and when the determination processing results in a determination that the third object and the first object, the second object, or the fourth object are not identical to each other, the data on the first object, the second object, or the fourth object and the data on the third object into the storage device without associating the data on the first object, the second object, or the fourth object with the data on the third object.

US Pat. No. 10,339,380

HI-FIDELITY COMPUTER OBJECT RECOGNITION BASED HORTICULTURAL FEEDBACK LOOP

IUNU, Inc., Seattle, WA ...

1. A computing device to detect anomalies on a plant, the computing device comprising:a processor;
a memory communicatively coupled to the processor, the memory storing a set of software components, comprising:
an image retriever software component, which when executed by the processor, directs the computing device to receive a plurality of images from one or more grow operations;
a classifier software component, which when executed by the processor, directs the computing device to identify a plurality of discrete objects in a first image of the plurality of images as portions of the first image that represent an individual plant present in one of the one or more grow operations;
an identifier software component, which when executed by the processor, directs the computing device to:
identify the individual plant as a same plant previously identified by the computing device based on at least one of the discrete objects; and
identify at least one artifact of the individual plant based on at least one of the discrete objects; and
an analyzer software component, which when executed by the processor, directs the computing device to:
select an analysis method from among a plurality of analysis methods based on the identification of the at least one artifact;
analyze the at least one artifact, via the selected analysis method, to identify at least one issue of the individual plant; and
store the at least one issue of the individual plant, wherein storing identified issues includes storing the identified issues on a per plant basis.

US Pat. No. 10,339,379

METHOD OF SEARCHING DATA TO IDENTIFY IMAGES OF AN OBJECT CAPTURED BY A CAMERA SYSTEM

AVIGILON ANALYTICS CORPOR...

1. A system comprising:a display;
an input device;
a processor communicatively coupled to the display and the input device; and
a memory communicatively coupled to the processor and having stored thereon computer program code that is executable by the processor, wherein the computer program code, when executed by the processor, causes the processor to:
receive image data representing a first object in an image of a field of view of a camera system, the first object having a first signature representing features of the first object;
display an image of the first object on the display;
accept input from the input device indicative of a selection of the first object;
make determinations as to whether the first signature matches one or more signatures of a group that correspond to a set of objects captured in images of the field of view; and
send a notification indicating a match between the first signature and a second signature of a second object of the set.

US Pat. No. 10,339,378

METHOD AND APPARATUS FOR FINDING DIFFERENCES IN DOCUMENTS

ABBYY Production LLC, Mo...

1. A method comprising:identifying, using a computing device comprising one or more processors, one or more differences between a first document and a second document;
determining, using the computing device, each of the one or more differences between the first document and the second document to be either a significant difference or an insignificant difference;
providing a first identification of the significant differences; and
providing a second identification of the insignificant differences.

US Pat. No. 10,339,376

SYSTEM AND METHOD FOR AUTOMATED PROCESSING OF ELECTRONIC DOCUMENTS

COGNIZANT TECHNOLOGY SOLU...

1. A system for automatically processing electronic documents, the system comprises:a memory comprising programming instructions;
a processor configured to execute the programming instructions stored in the memory and configured to;
receive an electronic document comprising at least one of: a structured section or an unstructured section;
convert the electronic document into a textual equivalent;
scan the textual equivalent and demarcate those sections that correspond to one or more predetermined structural attributes;
separate the one or more demarcated sections from the textual equivalent and retrieve the one or more demarcated sections corresponding to the structured sections and a remaining textual equivalent corresponding to the unstructured sections as distinct inputs;
receive the one or more demarcated sections and the remaining textual equivalent as the distinct inputs;
identify one or more master triggers within the received distinct inputs;
generate one or more potential zones with the identified one or more master triggers, wherein the generated one or more potential zones is defined by at least one geometric shape formed by geometrically coupling the master triggers and co-triggers proximate to the master triggers into the geometric shape such that the master triggers and the co-triggers form one or more vertices of the geometric shape;
generate one or more rules of extraction to determine at least one extraction type from a plurality of extraction types, wherein each of the plurality of extraction types represent a particular method of extraction, based on the type of electronic document, wherein the type of electronic document is ascertainable based on identification of a template type of the electronic document associated with the demarcated section; and
capture the business relevant data contained in the generated one or more potential zones within the one or more demarcated sections and the remaining textual equivalent based on co-ordinates of the vertices of the geometric shape formed by the one or more master triggers and the co-triggers by applying the determined at least one extraction type.

US Pat. No. 10,339,375

METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR CLASSIFICATION OF DOCUMENTS

GROUPON, INC.

1. A computer-implemented method for identifying content to represent web pages and creating thumbnails from the content, the computer-implemented method comprising:retrieving a web document using a uniform resource locator (URL) contained in a dequeued work item, the dequeued work item parsed using a markup language parser;
determining, from the web document, candidate images for thumbnail creation,
wherein the determination of the candidate images for thumbnail creation comprises at least:
identifying a desired thumbnail size and aspect ratio;
extracting data content from the parsed markup to determine one or more candidate images for thumbnail creation; and
utilizing one or more heuristics to discard candidate images having predefined undesirable characteristics, including at least discarding, from among the extracted one or more images, any images failing to meet the desired thumbnail size and aspect ratio; and
creating a thumbnail image, wherein generation of the thumbnail image comprises at least: cropping a chosen image, the chosen image selected from among the candidate images, to each of one or more predefined sizes and encoding the chosen image with predefined compression settings, each in accordance with an environment in which the thumbnails will be used.

US Pat. No. 10,339,374

DETECTING A FRAGMENTED OBJECT IN AN IMAGE

Capital One Services, LLC...

1. A method, comprising:capturing, by a user device, an image including an object;
analyzing, by the user device, the image to identify the object based on an expected aspect ratio of the object;
determining, by the user device, that the object cannot be identified in the image based on the expected aspect ratio of the object;
analyzing, by the user device, the image to identify a first part of the object based on an expected aspect ratio of the first part of the object;
identifying, by the user device, the first part of the object,
wherein the first part of the object is identified based on detecting an outline of the first part of the object that corresponds to the expected aspect ratio of the first part of the object;
analyzing, by the user device, a first region of the image determined in relation to the first part of the object to detect a second part of the object;
identifying, by the user device, the second part of the object based on detecting the first part of the object and based on analyzing the first region;
combining, by the user device, first image data associated with the first part of the object and second image data associated with the second part of the object to generate object data associated with the object; and
performing, by the user device, an action related to the object data.

US Pat. No. 10,339,373

OPTICAL CHARACTER RECOGNITION UTILIZING HASHED TEMPLATES

INTUIT INC., Mountain Vi...

1. A computer-implemented method for creating a template associated with a document, comprising:receiving a first digital image including a document, the document including a plurality of bordered text sections comprising respective text values and at least one text label adjacent to one bordered text section of the plurality of bordered text sections;
extracting a portion of the first digital image depicting the document;
determining spatial information associated with the plurality of bordered text sections in the extracted portion of the first digital image depicting the document;
removing the respective text values from the plurality of bordered text sections in the extracted portion of the first digital image depicting the document;
generating a scaled image by scaling the extracted portion of the first digital image depicting the document from a first resolution to a second resolution, wherein;
the second resolution is less than the first resolution,
the scaled image includes the plurality of bordered text sections and the at least one text label, and
the scaled image does not include the respective text values;
generating a first hash based on the scaled image;
generating a template comprising the first hash and the spatial information;
storing the template in a database of templates;
receiving a second hash based on a second digital image;
comparing the second hash to a set of hashes corresponding to a set of templates in the database of templates;
determining that the first hash matches the second hash;
providing the template comprising the first hash to an optical character recognition component, wherein the template is configured to be used by the optical character recognition component to extract one or more sections of the second digital image.

US Pat. No. 10,339,372

ANALOG STROKES TO DIGITAL INK STROKES

Microsoft Technology Lice...

1. A method, executed by a hardware processor, for transforming analog written content to digital ink strokes, comprising:receiving a static image of written content captured by a camera;
extracting, from the static image, analog strokes of the written content from background information of the static image and marks that are not part of the written content;
analyzing the analog strokes to identify at least two ink parameters associated with an underlying analog stroke of the written content;
converting the analog strokes to an ink modifiable format of digital ink strokes comprising the at least two ink parameters;
storing the digital ink strokes;
displaying the digital ink strokes separate from the background information of the static image and the marks that are not part of the written content;
receiving a modification to at least one of the digital ink strokes; and
displaying the digital ink strokes with the modification to the at least one of the digital ink strokes.

US Pat. No. 10,339,370

METHOD AND APPARATUS FOR DETERMINING OBSTACLE COLLISION BY USING OBJECT MOVING PATH

HANWHA DEFENSE CO., LTD.,...

1. A method of determining obstacle collision by using an object moving path, the method comprising:acquiring a topological skeleton corresponding to a path area on an image comprising a moving path of an object and an obstacle;
determining, from among skeleton points forming the topological skeleton, branch points that are interconnecting points between branches of the topological skeleton;
determining a target branch from among the branches by using the branch points;
selecting, from among points forming the target branch, a plurality of target points to determine whether the moving path is a collision path of the object; and
determining whether the moving path is the collision path by using the target points, and
generating an evaluation index based on the determined collision path.

US Pat. No. 10,339,369

FACIAL EXPRESSION RECOGNITION USING RELATIONS DETERMINED BY CLASS-TO-CLASS COMPARISONS

INTEL CORPORATION, Santa...

1. A method of determining descriptors for each of a plurality of facial expression classes for expression class recognition, the method comprising:defining a plurality of pair-wise facial expression class-to-class tasks;
learning a set of discriminative image patches for each task using a plurality of labelled training images for each task, each image patch being a portion of an image;
determining differences in the learned image patches in each training image for each task;
defining a relation graph for each image for each task using the determined differences, the relation graph representing connections of a subset of image patches containing different facial image features having relations to each other;
determining a final descriptor for each image by stacking and concatenating the relation graphs for each task; and
determining a facial expression for a face by feeding the final descriptors of the images of the plurality of training images into a training algorithm and learning a final facial expression model.

US Pat. No. 10,339,368

SYSTEMS AND METHODS FOR EFFICIENT FACE RECOGNITION

Tinoq Inc., Santa Clara,...

1. A method of recognizing a face of a user that uses a device in a facility, comprising:receiving, at a face recognition device from a camera, a photo of the user;
extracting, at the face recognition device, a face image of the user from the photo;
receiving, at the face recognition device, a full candidate face set of all registered users of the facility;
receiving, at the face recognition device, a first list of registered users that are within the facility, wherein the photo or a video clip is taken at a point in time of a registered user using a first device;
receiving, at the face recognition device, a second list of registered users, wherein the second list of registered users are using other devices in the facility that are different from the first device, which was captured by the photo or video clip of the first device at the point in time;
generating, at the face recognition device, a reduced candidate face set from the full candidate face set by excluding at least one of (1) one or more candidate faces corresponding to users that are not included in the first list or (2) one or more candidate faces corresponding to users that are included in the second list, from the full candidate face set; and
determining, at the face recognition device, whether the face image corresponds to a candidate face of the reduced candidate face set.

US Pat. No. 10,339,367

RECOGNIZING A FACE AND PROVIDING FEEDBACK ON THE FACE-RECOGNITION PROCESS

Microsoft Technology Lice...

1. A method comprising:obtaining an image of a face;
commencing a face-recognition algorithm that recognizes features of the face;
in conjunction with recognizing the features of the face, displaying an indication of one or more of the features on a rendering of the face; and
displaying, prior to completion of the rendering, a progressive indicator indicating progress for facial recognition processing of the face, wherein the displaying presents the progressive indicator overlaying a portion of the rendering.

US Pat. No. 10,339,366

SYSTEM AND METHOD FOR FACIAL RECOGNITION

MobileSphere Holdings II ...

1. A system to verify user identity on a computing device having a display and coupled to a computer network, comprising:a server coupled to the computer network;
a data storage area communicatively coupled to the server and configured to store an image;
a network interface controller associated with the server and configured to control communications with the computer network wherein the server is configured to receive a request for user identity verification from the computing device and, in response to the request, to transmit the stored image to the computing device from which the request for user identity verification was received, using the computer network, to thereby display the image on the display;
a mobile communication device having forward-facing and rearward-facing imaging devices and configured to capture the displayed image with one of the imaging devices and to simultaneously capture a user facial image with the other of the imaging devices to thereby generate a captured display image and a captured facial image;
a mobile communication device transmitter configured to transmit the captured display image and the captured facial image;
a display image analyzer, remote from the mobile communication device, configured to receive the captured display image transmitted from the mobile communication device and to perform an image analysis of the captured display image with respect to the stored image and generate a display match indicator if the image analysis indicates that the captured display image matches the stored image; and
a facial image analyzer, remote from the mobile communication device, configured to receive the captured facial image transmitted from the mobile communication device and to analyze the captured facial image with respect to stored facial characteristics associated with a verified user and to generate a facial match indicator if the analysis indicates that the captured facial image contains facial characteristics that match the stored facial characteristics;
wherein user identity is verified only if the display image analyzer generates the display match indicator and the facial image analyzer generates the facial match indicator.

US Pat. No. 10,339,365

AUTOMATED AVATAR GENERATION

Snap Inc., Santa Monica,...

1. A method, comprising:receiving, by one or more processors, one or more two-dimensional images depicting at least a portion of a face of a first user;
detecting, by the one or more processors, the portion of the face depicted within the one or more two-dimensional images;
identifying a set of facial landmarks within the portion of the face depicted within the one or more two-dimensional images;
in response to detecting the portion of the face and the set of facial landmarks, determining one or more characteristics representing the portion of the face depicted in the one or more two-dimensional images, the determining comprising:
identifying a set of colors within a hair region of the face;
determining a hair texture for the hair region based on variations in the set of colors that indicate edges, objects or shapes within the hair associated with the hair texture;
comparing a dimension of the hair region to one or more of the set of facial landmarks; and
determining hair length or hair volume based on the comparison of the dimension of the hair region to the one or more of the set of facial landmarks;
based on the one or more characteristics and the set of facial landmarks, generating a representation of a face for the at least one portion of the face depicted in the one or more images;
generating one or more sticker graphics incorporating the representation of the face, the generating of the one or more sticker graphics comprising generating a scaled version of the representation corresponding to a template graphic; and
generating, by a user device of the first user, a message, directed to a second user, that includes the one or more sticker graphics incorporating the representation of the face of the first user.

US Pat. No. 10,339,364

APPARATUS AND METHOD FOR REJECTING ERRONEOUS OBJECTS OF EXTRUSION IN POINT CLOUD DATA

CLEAREDGE3D, INC., Manas...

1. A method of rejecting the presence of an object of extrusion within a point cloud, said method comprising the steps of:receiving, through a data interface, data describing a set of measurements of observed portions of the one or more objects in the scene;
receiving data describing a predicted extruded object in the scene;
finding a set of near measurement points comprising measurement points wherein each measurement point is within a predefined distance of the predicted extruded object;
classifying points within the set of near measurement points associated with the predicted extruded object as on-surface or off-surface; and
rejecting the predicted extruded object whose ratio of off-surface measurement points to on-surface measurement points exceeds an allowable threshold.

US Pat. No. 10,339,363

APPARATUS AND METHOD USING OPTICAL SPECKLE

SAMSUNG ELECTRONICS CO., ...

1. An apparatus comprising:a light source configured to emit coherent light to an object;
an imaging device configured to photograph a speckle image of a speckle pattern generated on the object by the coherent light; and
a processor configured to determine whether the object is a living body or a non-living body based on a contrast value of the speckle pattern,
wherein, when the object comprises skin and blood vessels under skin, the apparatus is configured to determine whether the object is a living body or not from the speckle pattern of a skin surface or a skin tissue of the object, without imaging blood vessels under the skin surface of the object or using a change of the speckle image according to a heartbeat of the object,
wherein, when the speckle image is divided into a plurality of windows, the contrast value is determined according to a standard deviation of a brightness of each of the plurality of windows and an average brightness of the plurality of windows.

US Pat. No. 10,339,362

SYSTEMS AND METHODS FOR PERFORMING FINGERPRINT BASED USER AUTHENTICATION USING IMAGERY CAPTURED USING MOBILE DEVICES

VERIDIUM IP LIMITED, Lon...

1. A method for performing fingerprint recognition, the method comprising:capturing, by a mobile device having a camera, a storage medium, instructions stored on the storage medium, and a processor configured by executing the instructions, images depicting a plurality of fingers of a subject;
detecting, with the processor using a finger detection algorithm, the plurality of fingers depicted in one or more of the images;
processing, with the processor, at least one image using a segmentation algorithm, to identify a respective fingertip segment for one or more fingers depicted in the at least one image;
extracting, with the processor from the identified respective fingertip segment for the one or more fingers, features of the one or more fingers;
generating, with the processor, a biometric identifier including the extracted features;
storing the generated biometric identifier in the memory; and
determined, with the processor, a liveness of the subject, wherein the step of determining liveness comprises:
processing an image of the identified respective fingertip segment using a convolutional neural network (CNN), wherein the CNN is trained on two classes of images including images of fingers captured from the live subjects and images of spoofed fingers.

US Pat. No. 10,339,361

COMPOSITE FINGERPRINT AUTHENTICATOR

International Business Ma...

1. A computer-implemented method, comprising:receiving a composite fingerprint comprising thermal image data generated from a single thermal scan of a reference finger by a thermal scanner, wherein the composite fingerprint thermal image data comprises a first fingerprint plurality of ridges having a first temperature value and a second fingerprint plurality of ridges having a second temperature value that is different from the first temperature value;
authenticating the composite fingerprint in response to matching the first fingerprint plurality of ridges to a known fingerprint of the reference finger and to matching the second fingerprint plurality of ridges to a known fingerprint of an other finger that is different from the reference finger; and
returning a result of the authentication.

US Pat. No. 10,339,360

METHOD FOR CONTROLLING UNLOCKING AND TERMINAL

Guangdong Oppo Mobile Tel...

1. A method for controlling unlocking, comprising:determining, by a terminal, whether a finger of a user is in a steady state when a touch operation of the finger on a fingerprint recognition sensor of the terminal is detected;
collecting, by the fingerprint recognition sensor, a first fingerprint image according to capacity auto control (CAC) parameters corresponding to a wet finger when the finger of the user is in the steady state;
collecting, by the fingerprint recognition sensor, N second fingerprint images corresponding to N sets of CAC parameters during the collecting of the first fingerprint image, wherein N is an integer greater than one;
determining, by the terminal, a target fingerprint image and performing, by the terminal, a fingerprint comparison on the target fingerprint image, wherein the target fingerprint image is a fingerprint image having the best image quality among the first fingerprint image and the N second fingerprint images; and
controlling, by the terminal, unlocking of the terminal according to a result of the fingerprint comparison, wherein determining, by the terminal, whether the finger of the user is in the steady state comprises:
collecting, by the fingerprint recognition sensor, M third fingerprint image, wherein the M third fingerprint images are fingerprint images collected at M time points, and M is an integer greater than one;
determining, by the terminal, the clarity of each of the M third fingerprint images and determining a difference in the clarity of any two of the M third fingerprint images;
determining, by the terminal, that the finger of the user is in the steady state when the difference in the clarity of any two of the M third fingerprint images is less than or equal to a first threshold; and
determining, by the terminal, that the finger of the user is not in the steady state when the difference in the clarity of any two of the M third fingerprint images is greater than the first threshold;
wherein unlocking the terminal comprises:
determining, by the terminal, an application interface that is loaded and displayed the most in a preset time period; and
loading and displaying the determined application interface, wherein the preset time period comprises a current system time.

US Pat. No. 10,339,359

DISPLAY PANEL AND DISPLAY DEVICE

Shanghai Tianma Micro-Ele...

1. A display panel, comprising:a display module comprising a first substrate and a first polarizer disposed on the first substrate, wherein the first substrate has an inner side facing the first polarizer and an opposite outer side, the first polarizer has an inner side facing the first substrate and an opposite outer side, and a light-exiting surface of the display module is arranged on the outer side of the first polarizer;
a fingerprint recognition module disposed on the outer side of the first substrate and comprising a fingerprint recognition layer and a second polarizer, wherein the fingerprint recognition layer has an inner side facing the display module and an opposite outer side, and the second polarizer is disposed on the inner side of the fingerprint recognition layer; and
a light source disposed on the inner side of the first polarizer,
wherein the fingerprint recognition layer is configured to recognize fingerprint based on fingerprint signal light, the fingerprint signal light being light emitted from the light source and then reflected to the fingerprint recognition layer by a touch object,
the first polarizer is engaged with the second polarizer, such that the fingerprint signal light is transmitted through the first polarizer and the second polarizer without a light intensity loss, and
the second polarizer is configured to reduce the light intensity of fingerprint noise light, the fingerprint noise light being light other than the fingerprint signal light.

US Pat. No. 10,339,358

PALMPRINT RECOGNITION CIRCUIT BASED ON LTPS TECHNOLOGY, A PALMPRINT RECOGNITION METHOD AND A DISPLAY SCREEN

BOE TECHNOLOGY GROUP CO.,...

1. A palmprint recognition circuit based on a low temperature poly-silicon (LTPS), comprising:an optical signal collecting unit, configured to collect an optical signal indicating a palmprint information and to convert the collected optical signal into a current signal, wherein the optical signal is obtained when a light emitted from a back light being reflected by a palmprint of a user palm;
a current signal amplifying unit, connected to the optical signal collecting unit and configured to amplify the converted current signal; and
a current signal detecting unit, connected to the current signal amplifying unit and configured to detect an intensity of the amplified current signal which indicates a ridge line or a valley line of the palmprint in the palmprint information,
wherein the current signal detecting unit comprises:
a first switch, of which a turn off time is controlled by a clock, such that during the turn off time, a lead-to-ground capacitor in the current signal detecting unit and a reference capacitor inside a chip are charged by the amplified current signal.

US Pat. No. 10,339,357

DEVICE AND METHOD FOR THE DIRECT RECORDING OF PRINTS OF ROLLED FINGERS

JENETRIC GmbH, Jena (DE)...

1. A device for direct recording of prints of a rolled finger, the device comprising;a layer body including a sensor layer having a two-dimensional matrix of sensor elements for detecting characteristic skin prints of the rolled finger, and a support surface on which the finger can be rolled, the support surface being disposed as an outer surface of the layer body in parallel and opposite the sensor layer at a distance from the sensor layer less than five times a mean distance between adjacent sensor elements;
a light source provided as a two-dimensional display layer attached to the layer body, said light source comprising lighting elements that can be controlled individually or by groups to generate visible patterns for user information with spatial and temporal reference to the rolled finger by portions of light of the light source passing through the support surface, wherein the display layer is capable of changing patterns in a sequence of images at a refresh rate of at least one image per second; and
an electronic control unit serving to communicate with the light source to control lighting elements along different areas of the support surface to generate a pattern which is variable over time with spatial and temporal reference to the rolled finger.

US Pat. No. 10,339,356

FINGERPRINT SENSOR

ILI TECHNOLOGY CORP., Hs...

1. A fingerprint sensor, having a central region and a border region, comprising:a plurality of first touch electrode strips, arranged along a first direction; and
a plurality of second touch electrode strips, arranged along a second direction different from the first direction, wherein
each of the first touch electrode strips intersects each of the second touch electrode strips to form a plurality of intersections,
the first touch electrode strips and the second touch electrode strips form a plurality of maximum included angles, wherein a maximum included angle of the plurality of maximum included angles is formed at each intersection of the plurality of intersections, and
a maximum included angle of a first touch electrode strip of the plurality of first touch electrode strips gradually increases from a center towards two ends of the first touch electrode strip.

US Pat. No. 10,339,355

FINGERPRINT SENSING CIRCUIT, ELECTRONIC DEVICE AND METHOD FOR PROCESSING FINGERPRINT IMAGE

HIMAX TECHNOLOGIES LIMITE...

1. A fingerprint sensing circuit, comprising:a plurality of sensing units, arranged as a plurality of columns and a plurality of rows, wherein each of the sensing units comprises a sensing electrode and a transfer switch having a first terminal, a second terminal and a control terminal, and the first terminal of the transfer switch is connected to a respective sensing electrode;
a sensing circuit, configured to be electrically connected to the sensing electrodes in at least two first sensing units of the sensing units in a first period to obtain a first fingerprint grey level;
a plurality of first conductive lines respectively corresponding to the rows, wherein each of the first conductive lines is electrically connected to the control terminals of the transfer switches in one of the rows;
a plurality of second conductive lines respectively corresponding to the columns and electrically connected to the sensing circuit, wherein each of the second conductive lines is electrically connected to the second terminals of the transfer switches in one of the columns;
a plurality of column switches respectively disposed on the second conductive lines and disposed between the sensing units and the sensing circuit;
a row select circuit, configured to transmit a first signal to the first conductive lines corresponding to a first row and a second row in the first period for turning on the transfer switches in the first row and the second row; and
a column select circuit, configured to turn on the column switches corresponding to a first column and a second column in the first period,
wherein the row select circuit is further configured to transmit the first signal to the first conductive lines corresponding to the first row and the second row in a second period to turn on the transfer switches in the first row and the second row,
wherein the column select circuit is further configured to turn on the column switches corresponding to the second column and a third column in the second period.

US Pat. No. 10,339,354

WEARABLE DEVICE AND CONTROLLING METHOD THEREOF

LG ELECTRONICS INC., Seo...

1. A wearable device, comprising:a memory;
a flexible surface light source;
a photo panel located on a top surface of the flexible surface light source; and
a controller coupled with the flexible surface light source and the photo panel,
wherein the controller is configured to detect a first biometric image by controlling the flexible surface light source and identify a user by comparing the detected first biometric image to a second biometric image previously saved in the memory,
wherein the flexible surface light source further comprises:
at least one or more infrared or white light projection units arranged sequentially; and
a reflective unit located on one side of the flexible surface light source in a direction parallel with the flexible surface light source to project at least one of an infrared light and a white light in a direction vertical to the flexible surface light source, and
wherein the flexible surface light source is configured to selectively project at least one of the infrared light and the white light under a control of the controller.

US Pat. No. 10,339,353

THREE-DIMENSIONAL ROTATABLY-READABLE ENCODING OF DATA FOR OPTICAL MACHINE-READING

Genie Enterprise Ltd., R...

1. An object bearing a three-dimensional rotatably-readable encoding of data configured for optical rotational machine-reading, said object being a subject of said data, said encoding of data comprising:a multiplicity of three-dimensional shapes formed on a label adhered to a surface of said object, said surface being arranged for rotation in a plane coinciding with said surface, said multiplicity of three-dimensional shapes being formed to reflect light impinging thereupon while said surface is being rotated, characteristics of said reflected light representing data encoded within said multiplicity of three-dimensional shapes,
said characteristics of said light reflected from each of said three-dimensional shapes corresponding at least to physical characteristics of a corresponding one of said three-dimensional shapes and a speed of said rotation, and
said physical characteristics of each of said three-dimensional shapes comprising a length, a width and a height of said shape.

US Pat. No. 10,339,352

WEARABLE METROLOGICAL APPARATUS

HAND HELD PRODUCTS, INC.,...

1. A system for measuring dimension and weight of an object, the system comprising:an article of headgear to be worn by a user, the headgear comprising a dimensioner, the dimensioner comprising a range camera configured to optically scan an object to measure a length, a width, and a height of the object;
an article of footwear to be worn on at least one foot of the user, the footwear comprising a force sensing device configured to measure a weight of the object when held by the user based at least in part on a force acting on a bottom portion of the footwear and a combined weight of the user and the article of headgear; and
a control unit comprising a dimension input module and a weight input module, the control unit configured to receive signals comprising data pertaining to the length, the width, and the height of the object, and data pertaining to the weight of the object.

US Pat. No. 10,339,351

SYSTEMS AND METHODS FOR DECODING AND USING DATA ON CARDS

Integrated Solutions Inte...

1. A system for decoding data stored on an identification card comprising:a scanner configured to scan a passive data source on the identification card and transmit a scanner signal associated with the passive data source; and
a processor coupled to the scanner, the processor configured to:
receive the scanner signal;
determine a type of encryption associated with the passive data source;
extract one or more known data elements from the passive data source;
create a data file associated with the scanner signal;
transmit the data file and the type of encryption to a server, the server configured to:
extract data comprising one or more of: a first name, a last name, an address, a city, a state, a zip code, an issue date, an expiration date, or a birthdate from the data file; and
transmit the extracted data to a device associated with the scanner; and
receive the extracted data from the server.

US Pat. No. 10,339,350

SUBDIVIDED BARCODE READER EXIT WINDOW

DATALOGIC IP TECH S.R.L.,...

1. A barcode scanner system, comprising:an aiming source operable to emit a first light to indicate a location of a barcode;
an illumination source operable to emit a second light to reflect off of the barcode;
a receiving sensor positioned next to the aiming source and the illumination source on a substrate to receive the reflected second light from the barcode;
an exit window divided into a first portion and a second portion;
the first portion of the exit window positioned in front of the aiming source for emitting the first light from the aiming source;
and the second portion of the exit window positioned in front of the illumination source and receiving sensor for emitting the second light from the illumination source and receiving the reflected second light from the illumination source reflected from the barcode at the receiving sensor,
wherein the first portion of the exit window being positioned at a first planar position having a first distance from the substrate different from the second portion of the exit window positioned at a second planar position having a second distance from the substrate.

US Pat. No. 10,339,349

ILLUMINATION ARRANGEMENT FOR LONG WORKING RANGE LINE-SCAN IMAGING SYSTEM

DATALOGIC USA, INC., Eug...

1. A line scan camera that scans a long depth of field with a short distance to a target object, comprising:an image sensor configured to receive an image of the target object through a collimating lens, wherein the collimating lens has a single F-stop value for a short depth of field and the long depth of field;
a set of mirrors configured to allow folded optics along an optical path from the target object to the collimating lens, wherein the optical path is bent with the set of mirrors so that the optical path within the line scan camera is longer than a size of the line scan camera, and wherein the folded optics enable the line scan camera to be compact; and
a first light source configured to illuminate the target object with a line illumination without going through the set of mirrors, wherein the first light source is close to the target, and wherein the light source is located with one of the set of mirrors so that an angle between the line illumination and the optical axis from the one of the set of mirrors to the target object is minimized.

US Pat. No. 10,339,347

BAND WITH RFID CHIP HOLDER AND IDENTIFYING COMPONENTS

S.P.M. Flow Control, Inc....

1. An apparatus, comprising:a band adapted to be coupled to a component of a system associated with a wellhead, the band comprising first and second ends;
a holder coupled to the band;
an electronic identifying device attached to the holder and adapted to identify the component to which the band is adapted to be coupled; and
an identifying component positioned on the band;
wherein the identifying component visually conveys information about at least one of:
the electronic identifying device, and
the component to which the band is adapted to be coupled.

US Pat. No. 10,339,346

SYSTEMS AND METHODS FOR A RECONFIGURABLE ANTENNA

INTERMEC, INC., Lynnwood...

1. A device comprising:a plurality of antenna elements configured to read a radio-frequency identification (RFID) tag;
a switch having an input configured to receive an RFID control signal from an RFID reader via a communication line to select one antenna of the plurality of antenna elements; and
a controller configured to control a state of the switch,
wherein the switch is configured to be switched between states when the controller receives the RFID control signal comprising an address unique to the controller, thereby allowing the RFID reader to send an interrogation signal to and receive a response from the RFID tag in response to receiving the RFID control signal.

US Pat. No. 10,339,345

CARD PROCESSING APPARATUS AND AUTOMATIC TRANSACTION MACHINE

HITACHI-OMRON TERMINAL SO...

1. A card processing apparatus, comprising:a card insertion opening in which a magnetic card is to be inserted;
a card insertion detection sensor configured to detect the magnetic card inserted in the card insertion opening;
a magnetic head provided near the card insertion opening and configured to read magnetic information from magnetic stripe of a magnetic card and magnetic information from radio waves sent from a radio terminal as a magnetic signal and output a magnetic signal;
a card lock unit configured to hold the magnetic card inserted in the card insertion opening; and
a control unit configured to: receive the magnetic signal from the magnetic head when the card insertion detection sensor detects the magnetic card; receive the magnetic signal from the magnetic head when the card insertion detection sensor does not detect the magnetic card; acquire the magnetic signal when the magnetic signal includes a predetermined pattern; discard the magnetic signal when the magnetic signal does not include the predetermined pattern; and cause the card lock unit to restrict insertion of the magnetic card into the card insertion opening while the control unit is processing a magnetic signal of a wireless terminal.

US Pat. No. 10,339,344

ELECTROMAGNETIC MARKING DEVICE AND METHODS FOR ITS USE

1. A system for marking objects using an electromagnetic marking device, the system comprising:a first electromagnetic marking device, wherein the first electromagnetic marking device further comprises:
a body having a top surface and a bottom surface, the body comprising:
a first part, wherein the first part further comprises:
a through-hole in the first part, the through-hole comprising a first opening in the top surface of the body and a second opening in the bottom surface of the body; and
first member disposed within the through-hole, the first member including a first proximal end attached to the body and a first distal end not attached to the body; and
a second member disposed within the through-hole, the second member including a second proximal end attached to the body and a second distal end; and
a second part attached to the first part; and
a signal generator attached to the second part, the signal generator further including a wave generator circuit and a wave modulator circuit.

US Pat. No. 10,339,343

STORAGE SYSTEM AND METHOD FOR IMPROVED GENERATION AND STORAGE OF DATA PROTECTION INFORMATION

Western Digital Technolog...

1. A storage system comprising:a memory; and
a controller in communication with the memory, wherein the controller is configured to:
receive a write command, data, and a logical address;
determine a physical address associated with the logical address;
generate protection information for the data using the data, the logical address, and physical address; and
store the data and the protection information in the memory without storing the logical address and physical address in the memory.

US Pat. No. 10,339,342

DATA TRANSFER BASED ON INPUT DEVICE IDENTIFYING INFORMATION

LENOVO (SINGAPORE) PTE. L...

1. An input device, comprising:a portable housing;
at least one processor supported by the portable housing; and
at least one light accessible to the at least one processor, wherein the at least one light establishes a bar that extends longitudinally along the portable housing relative to a longitudinal axis of the portable housing; and
storage accessible to the at least one processor and bearing instructions executable by the at least one processor to:
indicate, via the at least one light, available storage capacity of the input device, wherein the available storage capacity is indicated by illuminating a first amount of the bar that is less than a total illuminable amount of the bar;
sense physical contact of the input device against a first device different from the input device; and
in response to the physical contact being sensed, provide information to at least one of the first device and/or a server as part of a cut, copy, or paste operation.

US Pat. No. 10,339,341

METHODS AND SYSTEMS FOR OBFUSCATING SENSITIVE INFORMATION IN COMPUTER SYSTEMS

1. A computer-implemented method for masking information of a dataset, in a computing system that includes one or more servers, a memory for storing information and instructions to be executed by a processor automatically, and coupled via a web network, the method comprising the steps of:receiving, by an analytics computing system from a data computing system, a first data set that is characterized as having a statistical distribution and the first data set further comprising identifying information;
analyzing, by the analytics computing system, the statistical distribution of the first data set by a statistical analysis engine;
selecting, by the analytics computing system based at least in part on the analyzed statistical distribution of the first data set, a discrete transform to be performed on the data to alter the statistical distribution relative to the identifying information;
generating, by the analytics computer system, a third data set by replacing at least a portion of the first data set with a second data set, such that the statistical distribution for the identifying information of the third data is different than the statistical distribution that characterized the first data set;
creating, by a mapping computer system, a value mapping scheme between the first, second and third datasets, wherein the value mapping scheme is changeable based on a user request; and
outputting, by the mapping computer system to the data computing system, the third data set as the masked data set of the first data set.

US Pat. No. 10,339,340

ANONYMOUS REPUTATION REQUESTS

Symantec Corporation, Mo...

1. A method to improve customer privacy in computer security comprising:calculating a full thumbprint of an object on a client machine;
trimming one or more bits from the full thumbprint to generate a trimmed thumbprint;
sending the trimmed thumbprint to a reputation server; and
receiving a result from the reputation server regarding the trimmed thumbprint, the result indicating each server thumbprint of which a portion of each server thumbprint matches at least a portion of the trimmed thumbprint.

US Pat. No. 10,339,339

SECURELY STORING AND DISTRIBUTING SENSITIVE DATA IN A CLOUD-BASED APPLICATION

MOBILERON, INC., Mountai...

1. A method, comprising:receiving a request, a first secret data, and a second secret data including a public key of a remote security proxy server;
mapping the request to the first secret data;
identifying a first encrypted data to retrieve based on the request;
using the first secret data to decrypt the first encrypted data to generate a decrypted data including by recovering a public key from the first secret data;
discarding the first secret data;
generating a second encrypted data by using the second secret data to encrypt the decrypted data; and
providing the second encrypted data to the remote security proxy server, wherein the security proxy server does not own the first secret data and the second encrypted data is decryptable by a private key of the security proxy server.

US Pat. No. 10,339,338

SYSTEM AND METHODS FOR PROVIDING QUERY-BASED PERMISSIONS TO DATA

Workiva Inc., Ames, IA (...

1. A method implemented on a computing device, the method comprising:generating, in a graph database, an access role vertex that defines an access role of a user, wherein the access role vertex is connected to a user vertex representing the user;
generating a query vertex comprising a traversal clause that represents a query of the graph database;
generating a permission edge between the access role vertex and the query vertex, wherein the permission edge defines the access role's default permission to access results of the query;
generating an edit rule vertex, wherein the edit rule vertex comprises a rule that defines a permission to edit the results of the query;
generating an edge between the query vertex and the edit rule vertex;
generating an edge between the access role vertex and the edit rule vertex, wherein the permission to edit the results of the query defined by the rule overrides the default permission defined by the permission edge;
receiving a request to execute the query on behalf of the user;
in response to the request, traversing the graph database according to the traversal clause to locate a set of vertices; and
generating a set of results based on the set of vertices.

US Pat. No. 10,339,337

APPARATUS AND METHOD FOR SUPPLYING SECURE RELATIONAL QUERY RESULTS FROM A SEMI-STRUCTURED DOCUMENT DATABASE

MarkLogic Corporation, S...

1. An apparatus, comprising:a processor; and
a memory connected to the processor, the memory storing instructions executed by the processor to:
ingest and store within a semi-structured document database a semi-structured document with access permissions,
form an access permissions index entry for the semi-structured document within an access permissions index,
form a relational schema index entry for the semi-structured document within a relational schema index;
and resolve a relational query against the semi-structured document database utilizing the access permissions index and the relational schema index, wherein the memory storing instructions executed by the processor to resolve the relational query include instructions to:
look-up within the access permissions index available documents for a user submitting the relational query,
resolve the relational query against relational schema within the relational schema index for the available documents to produce secure relational query results, and
supply the secure relational query results.

US Pat. No. 10,339,336

METHOD AND APPARATUS FOR ENCRYPTING DATABASE COLUMNS

Oracle International Corp...

1. A method for accessing encrypted columns in a database, comprising:receiving, by a database system on a server computer, a database query command directed to a column in the database;
determining, by the database system, whether the column is encrypted based on metadata for the column; and
responsive to determining that the column is encrypted:
determining a plurality of database commands performing a plurality of inter-dependent cryptographic operations on the database query command, wherein a first database command of the plurality of database commands retrieves a key encrypting the column, and wherein a second operation of the plurality of database commands decrypts the encrypted column;
inserting in the database query command, by the database system, the plurality of database commands to generate a modified query command; and
performing the modified query command, by the database system, that decrypts the encrypted column to obtain column data of the column and performs the received database query command on the obtained column data.

US Pat. No. 10,339,335

SEMICONDUCTOR DEVICE

RENESAS ELECTRONICS CORPO...

1. A semiconductor device, comprising:a first storage unit including twin cells which are electrically rewritable and complementarily store 1-bit data based on a difference in a threshold voltage;
a second storage unit including a memory cell which is electrically rewritable, data stored in the memory cell being erased when data in the twin cells is erased;
at least one scrambler subjecting first data to a scramble processing by using scramble data to generate second data;
a first write circuit which writes the second data into the twin cells in the first storage unit;
a second write circuit which writes the scramble data into the memory cell in the second storage unit; and
at least one descrambler subjecting the second data read from the first storage unit to a descramble processing by using the scramble data read from the second storage unit,
wherein the second storage unit includes a plurality of single cells each consisting of one memory cell and storing 1 bit of the scramble data, and the plurality of single cells redundantly store 1 bit of the scramble data, and
wherein the semiconductor device further comprises a sense amplifier including one input terminal simultaneously connected to a plurality of bit lines connected to the plurality of single cells and another terminal connected to a constant current source circuit.

US Pat. No. 10,339,334

AUGMENTED REALITY CAPTCHA

CA, Inc., Islandia, NY (...

1. A method for authorizing a user to access a network location, the method comprising:receiving an indication that a user is attempting to access the network location;
receiving a streaming image feed from a camera associated with a device being used by the user to attempt to access the network location;
determining from the streaming image feed an environment in which the user is located;
determining from the environment, an interactive image overlay;
augmenting the streaming image feed with the interactive image overlay;
receiving an augmented image feed from the camera, the augmented image feed comprising image data indicating that the user is interacting virtually with the interactive image overlay;
verifying that the user interaction with the interactive image overlay is a correct interaction for the interactive image overlay for passing a challenge-response test; and
providing access to the user to the network location.

US Pat. No. 10,339,332

CONTAINERIZED BUILD STEPS

Google LLC, Mountain Vie...

1. A method comprising:receiving, at data processing hardware, a build request containing build step instructions from a user, the build step instructions specifying a usage of containers within memory hardware for building an output container, the containers comprising at least one private container having private contents and/or at least one public container having public contents, the at least one private container requiring a user authorization for accessing the private contents, the private contents of the at least one private container comprising a proprietary software development kit for use in building the output container;
authenticating, by the data processing hardware, the user initiating the build request;
determining, by the data processing hardware, whether the user is authorized to access the private containers; and
when the user is authenticated and authorized to access the private containers:
obtaining, by the data processing hardware, the containers specified by the build step instructions from the memory hardware;
executing, by the data processing hardware, the build step instructions to build the output container while using the obtained containers; and
outputting, by the data processing hardware, the built output container,
wherein the built output container includes contents that exclude the proprietary software development kit.

US Pat. No. 10,339,331

PLAYBACK DEVICE QUEUE ACCESS LEVELS

Sonos, Inc., Santa Barba...

1. A method, comprising:receiving, via a playback device from a first control interface, a request for information identifying all media items in a playback queue, the request comprising a credential associated with the first control interface, wherein the first control interface is associated with a first playlist, wherein the media items comprise one or more media items added from a second playlist associated with a second control interface, and wherein the playback device is configured to play back media according to the playback queue;
determining an access level of the playback queue for the first control interface based on the credential;
determining, via the playback device, a first subset of the media items in the playback queue and a second subset of the media items in the playback queue based on the credential, wherein the determining the first subset and the second subset comprises:
identifying, as included in the first subset, media items in the playback queue that were added via the second control interface; and
identifying, as included in the second subset, media items in the playback queue that were added via a control interface different from the second control interface; and
providing, via the playback device to the first control interface, first information identifying the first subset of the media items in the playback queue based on the access level and second information identifying the second subset of the media items in the playback queue.

US Pat. No. 10,339,330

DATA AGGREGATION SYSTEM FOR ENABLING QUERY OPERATIONS ON RESTRICTED DATA THAT ORIGINATES FROM MULTIPLE INDEPENDENT MULTIPLE SOURCES

Neustar, Inc., San Franc...

1. A computer system comprising:a memory to store:
a set of run time instructions;
a collection of records, each record in the collection being structured to include a set of multiple fields of which at least some fields are individually assigned a field value, the record including a source identifier of the assigned field value, the source identifier corresponding to a source of a plurality of sources which collectively supply field values for the collection of records; and
a library of data usage rules, including a set of usage rules mandated by each source of the plurality of sources; and
one or more processors that execute instructions from the set of run time instructions to:
process requests from multiple computing entities, each request being for one or more unknown field values that are associated with a known field value specified in that request; and
for each request, (i) search the collection of records to determine a first matching record that includes the known field value of that request; (ii) determine, from the first matching record, a first field value that correlates to at least one of the one or more unknown field values; (iii) identify, from the source identifier included in the record at least one source of the plurality of sources from which originates the first field value; (iv) determine, based at least in part on the at least one identified source, one or more usage rules from the library of data usage rules that pertain to the first field value; and (v) when multiple sources are identified as originating the first field value of a matching record for the request, the one or more processors provide a response to the request in accordance with the determined one or more usage rules as mandated by a first source of the multiple sources exclusive of other sources of the multiple sources based on an objective of minimizing a number of unknown field values included in the response,
wherein when multiple sources are identified as originating the first field value of the matching record for the request and the set of usage rules for each of the first source and a second source of the multiple sources equally satisfy the objective, the one or more processors (a) rank the first source relative to the second source based on a predetermined indication of credibility or authoritativeness; (b) select the set of usage rules from whichever source is ranked more credible or authoritative; and (c) provide the response to the request in accordance with the selected set of usage rules.

US Pat. No. 10,339,329

CONTROLLING ACCESS TO DATA IN A DATABASE

International Business Ma...

1. A method for accessing data in a database table, said method comprising:displaying a login page on a display screen of a first computer;
receiving a first user ID and a first password associated with a first user via the displayed login page;
sending, by a processor of the first computer, a first authentication request for the first user ID and the first password;
in response to successful authentication of the first user ID and the first password, receiving a first cookie having a first cookie value associated with the first user ID;
displaying an additional login page on the display screen of the first computer;
receiving a second user ID, that differs from the first user ID, and a second password associated with a second user via the displayed additional login page;
sending, by the processor of the first computer, a second authentication request for the second user ID and the second password without logging out the first user, wherein the first cookie having the first cookie value is sent with the second authentication request;
in response to successful authentication of the second user ID and the second password, receiving a second cookie having a second cookie value associated with the first user ID and the second user ID;
sending, by the processor of the first computer, to a second computer having access to the database table while the first user and the second user are simultaneously logged in via the first computer, a search request for first data from the database table that the first user is authorized to access and second data from the database table that the second user is authorized to access, wherein the second cookie having the second cookie value is sent with the search request;
after said sending the search request, receiving, by the processor of the first computer, the requested first and second data in the database table, wherein the received first and second data comprises individual data and family data, wherein the individual data comprises a first set of rows of the table that the first user is authorized to access and a second set of rows of the table that the second user is authorized to access, wherein the family data is (i) a sum set consisting of a combination of the first set of rows and the second set of rows or (ii) a product set consisting of a combination of the rows that both the first set of rows and the second set of rows comprise; and
displaying, by the processor in a user interface on the display screen of the first computer, the individual data or the family data, in response to the individual data or the family data having been selected in the user interface by the first user or the second user.

US Pat. No. 10,339,328

SECURING STORED COMPUTER FILES FROM MODIFICATION

CRU Acquisition Group, LL...

1. A computer system for securing computer files from modification comprising:a processor;
a first internal data storage area;
a non-volatile second internal data storage area physically separate from the first data storage area, the second data storage area having stored thereon files that are executable by the processor, including executable files of an operating system configured to save temporary files on the first data storage area; and
a control circuit operatively coupling the first internal data storage area and the second internal data storage area to the processor, wherein the control circuit is configured to operate in a first mode to allow communication from the processor to the first internal data storage area of all commands received from the processor, to block communication to the second internal data storage area of commands that are configured to modify the second internal data storage area, and to allow communication to the second internal data storage area of commands received from the processor that are configured not to modify the second internal data storage area, and to operate in a second mode to allow communication from the processor to the first and second internal data storage areas of all commands received from the processor.

US Pat. No. 10,339,327

TECHNOLOGIES FOR SECURELY BINDING A PLATFORM MANIFEST TO A PLATFORM

Intel Corporation, Santa...

1. A computing device for platform manifest management, the computing device comprising:a field-programmable fuse;
a security engine, wherein the security engine comprises a hash manager to receive a manifest hash, wherein the manifest hash comprises a hash of a platform manifest, and wherein the platform manifest is indicative of a hardware configuration of the computing device; and
a fuse manager to modify a bit of the field-programmable fuse in response to receipt the manifest hash;
wherein the hash manager is further to (i) store the manifest hash and a counter value in a non-volatile storage of the computing device in response to modification of the bit to generate a stored manifest hash and a stored counter value, wherein the counter value is indicative of a value of the field-programmable fuse, (ii) generate a message authentication code over the stored manifest hash and the stored counter value in response to the modification of the bit, and (iii) store the message authentication code in the non-volatile storage.

US Pat. No. 10,339,326

CABLE MODEM ANTI-CLONING

ARRIS Enterprises LLC, S...

1. A method comprising:retrieving a unique identifier associated with a cable modem, wherein the unique identifier associated with the cable modem is retrieved by a security engine of a system-on-a-chip that is associated with the cable modem;
retrieving a unique key associated with the system-on-a-chip, wherein the unique key associated with the system-on-a-chip is retrieved by the security engine;
producing, at the security engine, an encrypted unique identifier, wherein the encrypted unique identifier is produced by using the unique key as an encryption key to encrypt the unique identifier associated with the cable modem;
storing the encrypted unique identifier at the cable modem;
initiating an authentication process at the cable modem;
producing, at the security engine, the unique identifier associated with the cable modem, wherein the unique identifier associated with the cable modem is produced by using the unique key as a decryption key to decrypt the encrypted unique identifier; and
outputting the unique identifier associated with the cable modem to an upstream controller, wherein the unique identifier associated with the cable modem is output as an authorization request message.

US Pat. No. 10,339,325

MULTI-LEVEL SECURITY MODEL FOR SECURING ACCESS TO ENCRYPTED PRIVATE DATA

JJD Software LLC, Sarato...

1. A database security model for securing data in an application database, comprising:an encrypted storage area configured to store encrypted private data;
a first level system for implementing a plurality of first level routines, wherein each of the first level routines is callable from a database application to process and provide limited access to decrypted private data and wherein the first level routines can only be modified with a first level user account having access rights separate from the database application; and
a crypto system having a private key and decryption system that requires both the private key and a public key to decrypt encrypted private data in the encrypted storage area, wherein the crypto system decrypts private data in response to receiving a decrypt request and public key from a first level routine, and wherein the crypto system is accessible only with a crypto user account separate from the first level account and database application.

US Pat. No. 10,339,324

TAMPER-PROOF STORAGE USING SIGNATURES BASED ON THRESHOLD VOLTAGE DISTRIBUTIONS

APPLE INC., Cupertino, C...

1. An apparatus, comprising:an interface, configured to communicate with a memory comprising multiple memory cells that store data as respective analog values, wherein the memory is addressable using physical addresses; and
storage circuitry, which is configured to:
perform a first read operation from a physical address, and determine a first sequence of analog values retrieved by the first read operation;
perform a second read operation from the physical address, and determine a second sequence of analog values retrieved by the second read operation;
evaluate a variation between the first sequence and the second sequence, including classifying the analog values of the first and second sequences into predefined analog zones; and
determine that an unauthorized re-programming to the physical address has occurred between the first read operation and the second read operation, by detecting at least first and second analog values, which have a same position in the first and second sequences, respectively, but that belong to non-neighboring analog zones among the predefined analog zones of the analog values, in response to the evaluated variation exceeding a predefined variation level.

US Pat. No. 10,339,323

GROUP LICENSE ENCRYPTION AND DECRYPTION

GOOGLE LLC, Mountain Vie...

1. A method comprising:receiving, over a network, a license request from a client computing device requesting access to media content provided by a media content provider, the media content associated with a license group, the license request including a group identifier assigned to the license group among a plurality of license groups and a content identifier that identifies the media content, each of the plurality of license groups defining a different group of media content and being associated with a different master key;
obtaining a master key for the license group using the group identifier, the master key being a key for the license group such that content keys for all media content that is part of the license group can be derived using the master key;
deriving a content key for the media content based on the master key, the content identifier, and the group identifier using a key derivation function; and
sending, over the network, a license to the client computing device and the license includes the master key and the content key such that the media content is configured to be decrypted at the client computing device using the content key and content keys for other media content that is part of the license group are configured to be obtained at the client computing device based on the master key, a respective content identifier, and the group identifier using the key derivation function.

US Pat. No. 10,339,322

METHOD AND APPARATUS FOR IDENTIFYING SECURITY VULNERABILITY IN BINARY AND LOCATION OF CAUSE OF SECURITY VULNERABILITY

KOREA INTERNET AND SECURI...

1. A binary vulnerability analysis method performed by a computing device, the binary vulnerability analysis method comprising:a primary execution step of recording a symbolic constraint of a vulnerability associated with an execution flow path causing a crash to a target binary to be analyzed and a suspicious element on the execution flow path by performing taint analysis through a primary execution of the target binary; and
a secondary execution step of performing a secondary execution after the primary execution step, which is a symbolic execution, on the execution flow path and, if an instruction satisfying the symbolic constraint recorded in the primary execution step is found, determining that the vulnerability exists in the target binary by comparing the suspicious element and the found instruction,
wherein the primary execution step includes performing the primary execution using an execution parameter for executing the target binary and setting a taint source for the taint analysis using the execution parameter, and
wherein setting the taint source comprises setting a loading location of the execution parameter during the primary execution as the taint source if “main” does not exist in a debug symbol of the target binary.

US Pat. No. 10,339,321

CYBERSECURITY MATURITY FORECASTING TOOL/DASHBOARD

Dignity Health, San Fran...

1. A system comprising:a server,
a custom-designed special-purpose hardware computing device coupled to a network and at least one processor executing specific computer-executable instructions comprising a specific device logic within a memory that, when executed, cause the system to: extract, from an electronic assessment document, at least one assessment data comprising an original maturity score defining an original level of compliance with a cybersecurity framework; analyze a first input into a graphical user interface (GUI) on a client hardware computing device, the first input comprising: a forecast maturity score representing a desired level of compliance with the cybersecurity framework; a forecast date identifying a target date by which an organization, identified by an authenticated organization identifier, will achieve a level of compliance represented by the forecast maturity score;
automatically generate, using a combination of the cybersecurity framework, the original maturity score, the forecast maturity score, and the forecast date: at least one project objective to achieve the forecast maturity score; a project objective forecast date by which the at least one project objective will be completed;
automatically update the at least one project objective responsive to at least one update in the cybersecurity framework;
programmatically audit the system for security weaknesses by executing a remote procedure call to determine whether a system process is performing the at least one project objective, or is configured to complete the at least one project objective prior to or subsequent to the project objective forecast date: and
responsive to a determination that the system process is configured to complete the at least one project objective prior to or subsequent to the project objective forecast date:
update the project objective forecast date thereby dynamically updating the forecast date and generate a notification to a project manager of the at least one project objective that the system process is configured to complete the at least one project objective prior to or subsequent to the project objective forecast date.

US Pat. No. 10,339,320

APPLYING MACHINE LEARNING TECHNIQUES TO DISCOVER SECURITY IMPACTS OF APPLICATION PROGRAMMING INTERFACES

International Business Ma...

1. A computer-implemented method of improving security of a tangible computer, the method comprising:normalizing, by a processor, a plurality of application programming interfaces (APIs) on the tangible computer to form a plurality of normalized APIs, wherein the plurality of APIs include first APIs with unknown security information;
analyzing, by the processor using a machine learning algorithm, the plurality of normalized APIs by identifying a subset of the plurality of APIs that have semantics of a feature, wherein the feature is selected from the group consisting of a source, a sink, and a taint propagator;
performing, by the processor, static analysis security testing only on the subset of the plurality of APIs;
identifying, by the processor, a compromised API from the subset of the plurality of APIs using the static analysis security testing;
improving, by the processor, security of the computer by taking an action on the computer as a result of identifying the compromised API; and
automatically marking-up, by the processor, the subset of the plurality of APIs, wherein marking-up highlights sources of taint, sinks, and taint propagators.

US Pat. No. 10,339,319

METHOD AND APPARATUS FOR IDENTIFYING VULNERABILITY INFORMATION USING KEYWORD ANALYSIS FOR BANNER OF OPEN PORT

1. A method for identifying information of a computer system by a computing device, the method comprising:acquiring, by the computing device, service information which operates in a specific port of the computer system connected to a network;
processing, by the computing device, the acquired service information;
acquiring, by the computing device, a vulnerability occurrence product name common platform enumeration (CPE) dictionary through the network;
creating, by the computing device, a CPE tree having a plurality of levels including at least three levels and a plurality of nodes by analyzing the CPE dictionary,
wherein a node corresponding to a first level includes vendor information, a node corresponding to a second level includes product name information, a node corresponding to a third level includes product version information, a node corresponding to a fourth level includes update information, a node corresponding to a fifth level includes edition information, and a node corresponding to a sixth level includes product language information, and
wherein the CPE dictionary includes a character string used to create the CPE tree, and the character string corresponds to at least (i) a respective first node of the CPE tree corresponding to the first level or the second level, (ii) a respective second node of the CPE tree having the respective first node as a parent node, and (iii) a respective third node of the CPE tree having the respective second node as a parent node;
searching, by the computing device, keywords of respective levels of the CPE tree in the processed service information; and
combining, by the computing device, the keywords included in the processed service information among the keywords of the CPE tree to generate one or more CPEs based on the CPE tree that observe the format of the CPE dictionary and output the CPEs, in order to generate the CPEs from the acquired service information more rapidly and easily when the acquired service information does not conform to a predetermined pattern.

US Pat. No. 10,339,318

SEMICONDUCTOR MEMORY SYSTEM AND OPERATING METHOD THEREOF

SK hynix Inc., Gyeonggi-...

1. An operating method of a semiconductor memory system including a memory controller and a memory device, the method comprising:storing at least a customer identification (ID) identifying a customer in a one-time-programmable memory component of the memory controller;
executing instructions by a processor of the memory controller for:
authenticating whether a program is authorized by a controller provider for the customer in a first-level authentication, in accordance with a customer image format, by generating a controller signature and authenticating the controller signature with a controller public key, including matching the customer ID with a program customer ID defined in the program;
authenticating whether the program is authorized by the customer in a second-level authentication, using a customer signature and a customer public key, after the first-level authentication is passed;
embedding the controller public key into the memory controller during the first-level authentication;
authenticating whether the program is authorized by the controller provider for the customer identified by the customer ID in a repeated first-level authentication after the second-level authentication is passed; and
executing the program after the program is authenticated.

US Pat. No. 10,339,317

COMPUTING DEVICES

Intel Corporation, Santa...

1. A computing device, comprising:a trusted execution environment;
a Basic Input/Output System (BIOS) configured to request a Key Encryption Key (KEK) from the trusted execution environment; and
a Self-Encrypting Storage (SES) associated with the KEK;
wherein the trusted execution environment is configured to verify the BIOS and provide the KEK to the BIOS subsequent to verification of the BIOS, and the BIOS is configured to provide the KEK to the SES to unlock the SES for access by the trusted execution environment.

US Pat. No. 10,339,316

INTEGRITY ASSURANCE THROUGH EARLY LOADING IN THE BOOT PHASE

CrowdStrike, Inc., Irvin...

1. A computing device comprising:a processor;
memory; and
a plurality of components stored in the memory and operable by the processor during a boot phase of the computing device, wherein the boot phase is not a pre-boot phase, the components including:
a library component of a driver of an integrity manager associated with a kernel-mode component, the library component to be processed during the boot phase and before initialization of drivers by an operating system of the computing device and which, when processed, ensures that the driver of the integrity manager is a first of the drivers in an initialization order of the drivers utilized by the operating system;
the driver of the integrity manager which, when initialized, causes the computing device to launch the integrity manager; and
the integrity manager which, when launched:
determines that a driver of the kernel-mode component is not next in the initialization order after the driver of the integrity manager; and
alters the initialization order to place the driver of the kernel-mode component next in the initialization order to initialize the driver of the kernel-mode component before initializing remaining ones of the drivers.

US Pat. No. 10,339,315

APPARATUS AND METHOD FOR DETECTING MALICIOUS MOBILE APP

Electronics and Telecommu...

1. An apparatus for detecting a malicious application, the apparatus comprising:a processor configured to
collect a mobile application,
extract basic information from the collected mobile application,
generate a call flow graph (CFG) of the mobile application,
execute the collected mobile application, and expand the CFG of the mobile application to a dynamic action-based CFG,
extract a semantic-based partial action-based graph from the dynamic action-based CFG with reference to a semantic division rule set,
compare the extracted semantic-based partial action-based graph and a partial graph signature image of a reference malicious action, and
determine whether the collected mobile application is malicious based on the comparison and by analyzing the extracted basic information,
wherein the basic information comprises any one or any combination of any two or more of an execution file, resource information, metadata information, and permission information of the mobile application.

US Pat. No. 10,339,314

DEVICE, METHOD AND STORAGE MEDIUM FOR TERMINATING OPERATION OF SOFTWARE THAT IS NOT SUCCESSFULLY VERIFIED

FUJITSU LIMITED, Kawasak...

1. A system comprising:a verification device configured to
receive software,
execute the software received, and
transmit to the software, when a first command is generated by the software, information which causes the software to terminate an operation of the software in the verification device; and
a terminal device configured to
receive, from the verification device, the information and a notification regarding the first command,
receive, from the verification device, the software;
hook a second command when the second command is generated by the software, and
transmit, to the software, the information that is transmitted from the verification device and causes the software to terminate the operation of the software in the terminal device when the second command corresponds with the first command.

US Pat. No. 10,339,313

SYSTEM AND METHOD FOR BYPASSING A MALWARE INFECTED DRIVER

WEBROOT INC., Broomfield...

1. A method comprising:determining a lowest level driver in a driver chain, wherein the driver chain comprises one or more drivers for communicating with a device;
locating a trusted copy of the lowest level driver, wherein the trusted copy is not infected by a rootkit;
establishing an alternate communication path to the device, wherein the alternate communication path includes the trusted copy of the lowest level driver;
submitting a first request via the alternate communication path;
receiving a first response to the first request via the alternate communication path; and
based upon the first response, determining that the driver chain is infected with a rootkit.

US Pat. No. 10,339,312

SYSTEM AND METHOD FOR DETECTING MALICIOUS COMPOUND FILES

AO KASPERSKY LAB, Moscow...

1. A computer-implemented method for detecting malicious compound files, the method comprising:obtaining, by a processor of a computing device, at least one compound file;
identifying, by the processor, a first set of features of the at least one compound file including features associated with a header of the at least one compound file;
subsequent to identifying the first set of features, identifying, by the processor, a second set of features of the at least one compound file including features associated with at least one directory of the at least one compound file;
determining a hash of the at least one compound file based on the first and second set of features by concatenating byte representations of the first set of features with byte representations of the second set of features and byte representations of a size of the compound file;
comparing the hash of the at least one compound file with information associated with a plurality of compound files stored in a database; and
identifying the at least one compound file as being malicious, trusted or untrusted based at least on comparison results.

US Pat. No. 10,339,311

ANOMALOUS COMMIT DETECTION

SAP SE, Walldorf (DE)

1. A system for detecting anomalous modifications to a software component, the system comprising:a computing device comprising one or more processors and a memory in communication with the one or more processors, wherein the computing device is programmed to perform operations comprising:
receiving, from a version control system, version metadata describing properties of a plurality of commits for the software component;
generating a distance in a multidimensional space between a first commit of the plurality of commits and a second commit of the plurality of commits, wherein a first dimension of the multidimensional space corresponds to at least one commit property;
generating a plurality of commit clusters based, at least in part, on the distance, wherein the plurality of commit clusters comprises a first commit cluster and a second commit cluster;
determining a first anomalous commit of the plurality of commits, wherein determining the first anomalous commit comprises:
determining that a first commit of the plurality of commits is not in the first commit cluster; and
determining that the first commit is not in the second commit cluster; and
generating an alert message indicating a first code segment modified by the first commit.

US Pat. No. 10,339,310

DETECTION OF MALICIOUS ATTACHMENTS ON MESSAGES

Symantec Corporation, Mo...

1. A method for detecting malicious attachments on electronic messages, the method being performed by one or more computing devices comprising at least one processor, the method comprising:receiving, via a message application running on a client computing device, an electronic message including an unopened attachment;
analyzing a characteristic associated with the electronic message, a characteristic associated with the unopened attachment, or both;
determining the unopened attachment is malicious based at least in part on the analyzing, comprising comparing a send time associated with the electronic message to a creation time associated with the unopened attachment, and determining that the creation time satisfies a threshold difference between the send time and the creation time; and
performing a security action based at least in part on determining the unopened attachment is malicious.

US Pat. No. 10,339,309

SYSTEM FOR IDENTIFYING ANOMALIES IN AN INFORMATION SYSTEM

Bank of America Corporati...

1. A computerized system for identifying anomalies in a computerized information system, comprising:a computer processor;
a memory;
a network communication device; and
an information security analysis module stored in the memory, executable by the processor, and configured for:
collecting information regarding a hierarchy of capabilities of the information system;
storing, in a graph database, a plurality of capability nodes, each capability node corresponding to a capability category of the hierarchy of capabilities;
collecting information regarding a hierarchy of resources of the information system;
storing, in the graph database, a plurality of resource nodes, each resource node corresponding to a resource category of the hierarchy of resources;
collecting information regarding a plurality of capability instances of the information system;
storing, in the graph database, a plurality of capability instance nodes, each capability instance node corresponding to a capability instance of the plurality of capability instances of the information system;
collecting information regarding a plurality of resource instances of the information system;
storing, in the graph database, a plurality of resource instance nodes, each resource instance node corresponding to a resource instance of the plurality of resource instances of the information system;
collecting information regarding relationships among the hierarchy of capabilities, the hierarchy of resources, the plurality of capability instances, and the plurality of resource instances;
defining, in the graph database, edges among the plurality of capability nodes, the plurality of resource nodes, the plurality of capability instance nodes, and the plurality of resource instance nodes, the edges corresponding to the relationships among the hierarchy of capabilities, the hierarchy of resources, the plurality of capability instances, and the plurality of resource instances;
collecting event and/or state data for the information system, wherein the event and/or state data includes parameters of an event and/or state;
comparing the parameters of the event and/or state to the graph database;
based on comparing the parameters of the event and/or state to the graph database, determining that the event and/or state is anomalous; and
in response to determining that the event and/or state is anomalous, taking an information security action.

US Pat. No. 10,339,308

SYSTEMS AND METHODS FOR REMEDIATING COMPUTER RELIABILITY ISSUES

Symantec Corporation, Mo...

1. A computer-implemented method for remediating computer reliability issues, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:obtaining a computer-generated log line that potentially includes information pertaining to a cause of a reliability issue experienced by a device;
determining that a product-specific schema has not been created for a product that generated the computer-generated log line;
in response to determining that a product-specific schema has not been created for the product, matching values of the computer-generated log line to fields within one or more established schemas that are not specific to the product;
based at least in part on the fields that match the values of the computer-generated log line, identifying an entry, within the one or more established schemas, that corresponds to the computer-generated log line; and
remediating the device based on information associated with the entry within the one or more established schemas.

US Pat. No. 10,339,307

INTRUSION DETECTION SYSTEM IN A DEVICE COMPRISING A FIRST OPERATING SYSTEM AND A SECOND OPERATING SYSTEM

IDEMIA FRANCE, Colombes ...

1. A device comprising:a first operating system;
a second operating system;
intrusion detection system comprising:
listening-executable instructions configured to be executed by one or more processors in the first operating system in order to listen to the activity of the first operating system,
collecting-executable instructions configured to be executed by the one or more processors in the first operating system in order to collect data characterizing the activity of the first operating system, and
analysis and detection-executable instructions configured to be executed by the one or more processors in the second operating system in order to analyze the data collected in the first operating system and to detect a suspicious activity in the first operating system as a result of said analysis; and
one or more hardware processors configured to execute the first operating system, the second operating system, and the intrusion detection system,
wherein the first operating system and the second operating system are executed exclusively of each other, and
the second operating system conforms to a Trusted Execution Environment (TEE) Protection Profile version 1.0 defined by the GlobalPlatform Organization.

US Pat. No. 10,339,306

METHODS AND SYSTEMS FOR FRAUD CONTAINMENT

The 41st Parameter, Inc.,...

1. A computer-implemented method for device identification in a fraudulent electronic transaction, the computer-implemented method comprising:by one or more processors:
accessing an electronic repository storing at least: a plurality of data records corresponding to a plurality of device identifiers, a plurality of account identifiers, and a plurality of relationship indicators, each of the plurality of relationship indicators associated with one more relationships among one or more of the plurality of device identifiers and one or more of the plurality of account identifiers;
receiving an electronic information data packet associated with an electronic fraudulent transaction and including a fraud event indicator;
parsing the electronic information data packet to identify a first fraud device identifier used to carry out the electronic fraudulent transaction, the first fraud device identifier corresponding to one of the plurality of device identifiers stored in the electronic repository;
executing an automated search of the electronic repository using one or more of the plurality of relationship indicators to identify: (a) a first set of device identifiers of the plurality of device identifiers, the first set of device identifiers potentially related to the electronic fraudulent transaction, and (b) a first set of account identifiers of the plurality of account identifiers, the first set of account identifiers potentially related to the electronic fraudulent transaction;
calculating a first plurality of proximity indicators each associated with each of the first set of device identifiers, each of the first plurality of proximity indicators indicating a number of device identifiers or account identifiers between a device and the first fraud device identifier, the device flagged as a master perpetrator device if the proximity indicator is zero such that the device is used to access an account for committing the electronic fraudulent transaction;
generating a first plurality of assessment indicators based on the first plurality of proximity indicators and involvement factor rules, each of the first plurality of assessment indicators representing a first confidence level that the device is involved with a perpetrator associated with the electronic fraudulent transaction;
identifying a subset of the first set of device identifiers based at least on the first plurality of assessment indicators;
generating one or more electronic flags indicating that the subset of the first set of device identifiers are likely involved with the perpetrator associated with the electronic fraudulent transaction; and
generating a risk score for a victim circle the risk score representing a second confidence level that one or more potential victim accounts are compromised.

US Pat. No. 10,339,305

SUB-EXECUTION ENVIRONMENT CONTROLLER

Cylance Inc., Irvine, CA...

1. A computer-implemented method, comprising:determining that an executable implements a sub-execution environment, the sub-execution environment being configured to receive an input, and the input being associated with at least one event at the sub-execution environment;
intercepting the event at the sub-execution environment; and
applying a security policy to the intercepted event, the applying of the policy comprising blocking the event, when the event is determined to be a prohibited event.

US Pat. No. 10,339,304

SYSTEMS AND METHODS FOR GENERATING TRIPWIRE FILES

Symantec Corporation, Mo...

1. A computer-implemented method for generating tripwire files, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:generating an initial tripwire file according to an initial variant of a tripwire generation algorithm, the initial tripwire file configured such that modification of the initial tripwire file triggers investigation of a security breach;
generating a subsequent tripwire file according to a subsequent variant of the tripwire generation algorithm, the subsequent variant of the tripwire generation algorithm randomly differing from the initial variant of the tripwire generation algorithm along at least one dimension;
receiving automated feedback that indicates whether at least one of the initial tripwire file and the subsequent tripwire file failed to enable detection of a security threat at least in part by:
a backup client receiving an indication from a user to perform a restoration operation; and
the backup client asking the user, in response to receiving the indication from the user to perform the restoration operation, whether the restoration operation is a result of a recent crypto-lock attack; and
adjusting automatic generation of a third tripwire file based on the automated feedback indicating whether at least one of the initial tripwire file and the subsequent tripwire file failed to detect the security threat at least in part by selecting which variant of the tripwire generation algorithm was more effective in protecting against known ransomware exploits.

US Pat. No. 10,339,303

DETECTION OF MALICIOUS INVOCATION OF APPLICATION PROGRAM INTERFACE CALLS

McAfee, LLC, Santa Clara...

1. At least one non-transitory computer-readable medium comprising one or more instructions that when executed by at least one processor, cause the processor to:receive, by a kernel driver executed by the at least one processor, an application program interface (API) call, wherein the kernel driver is included within a kernel space;
extract, with the kernel driver, metadata from the API call;
determine, with the kernel driver, that the API call should be hooked based on the extracted metadata;
hook, with the kernel driver, the API call;
communicate the API call and the extracted metadata to a security module, wherein the security module determines if the API call should be allowed or denied; and
allow the API call if a response from the security module is not received after a predetermined amount of time has passed from when the API call and the extracted metadata was communicated to the security module.

US Pat. No. 10,339,302

CREATING MULTIPLE WORKSPACES IN A DEVICE

AIRWATCH LLC, Atlanta, G...

7. A method, comprising:intercepting, by a translator in a managed application executed in a managed device, a message from a target application executed in the managed device to a system service of the managed device, wherein the managed application operates in a workspace managed by a workspace manager;
generating, by the translator, a modified version of the message;
providing the modified version of the message to the system service;
obtaining a component invocation message from the managed application;
determining whether the component invocation message is intended to invoke a public component in the workspace managed by the workspace manager; and
providing an instruction to the managed application in response to determining whether the component invocation message is intended to invoke the public component.

US Pat. No. 10,339,301

SYSTEM AND METHOD OF ANALYSIS OF FILES FOR MALICIOUSNESS IN A VIRTUAL MACHINE

AO Kaspersky Lab, Moscow...

1. A method for analysis of files for maliciousness, the method comprises: opening and executing a file, by a processor, in a virtual machine; intercepting, by the processor, an event arising during an execution of a thread of a process created upon opening of the file; halting the execution of the thread of the process upon interception of the event; reading a context of the processor on which the thread of the process created upon opening of the file is being executed; comparing, by the processor, the context of the processor with a plurality of rules that check: a path of the file, a type of the file, an extension of the file, a behavior of the thread of the process created upon opening of the file, a changing, by the thread of the process, of attributes of the file, and an access of the thread of the process to the Internet; and based on a result of the comparison, performing at least one of: recognizing the file as being malicious, halting the execution of the process created upon opening of the file, changing the context of the processor, and waiting for a next intercepted event.

US Pat. No. 10,339,300

ADVANCED PERSISTENT THREAT AND TARGETED MALWARE DEFENSE

Binary Guard Corp., Germ...

1. A method, comprising:receiving, at a computer system, data from one or more data feeds;
obtaining, with the computer system, a binary object based on the data;
loading, with the computer system, the binary object onto a sandboxed system;
executing the binary object with the sandbox system, wherein the binary object that is executed comprises at least one of an email attachment, an application, a program, a media file, a web browser visiting a suspicious URL, a document, an executable file, or a compressed file;
searching, with the computing system, for vulnerabilities in hardware or an operating system of the sandboxed system using a hardware debugger interface by feeding streams of random or malformed data to the sandboxed system;
analyzing, with the computer system, operation of the sandboxed system to determine whether the binary object includes a malware payload; and
based on a determination that the binary object includes a malware payload, generating, with the computer system, a report indicating that the binary object includes a malware payload.

US Pat. No. 10,339,299

RUNTIME MANAGEMENT OF APPLICATION COMPONENTS

Kashmoo, Inc., Austin, T...

1. A computer-implemented method performed by at least one processor, the method comprising:during execution of an application, determining, by the at least one processor, a function to be executed as a component of the application;
accessing, by the at least one processor, metadata associated with the function, the metadata including at least one term for executing the function; and
based at least partly on verifying, by the at least one processor, that the execution of the function complies with the at least one term, executing the function as a nano function that executes, independently of other functions, in a locally executing instance of a container that does not include another executing function.

US Pat. No. 10,339,298

WEAK PASSWORD SUPPORT IN A MULTI-USER ENVIRONMENT

International Business Ma...

1. A method for supporting weak password authentication in a multi-user application environment, the method comprising:registering a different weak password without minimum length or minimum mix of alphabetical and numerical characters for each of a multiplicity of different end users in the multi-user application environment;
detecting an event in the multi-user application environment indicating a failed log in attempt attempted by an end user amongst the different end users in the multi-user application environment; and,
responsive to the detected event, acquiring log in data for the end user, messaging the acquired log in data to others of the different end users for subjective analysis by the others of the different end users in detecting an unauthorized log in attempt, determining if a threshold number of the different end users of a particular supervisory role report the acquired log in data as an anomaly, and transmitting a message indicating the unauthorized log in attempt by at least one of the different end users to an administrator of the multi-user application environment in response to determining that a threshold number of the different end users of the particular supervisory role have reported the acquired log in data as an anomaly so as to implement communal policing of the multi-user application environment.

US Pat. No. 10,339,297

DETERMINING WHETHER CONTINUOUS BYTE DATA OF INPUTTED DATA INCLUDES CREDENTIAL

GITHUB, INC., San Franci...

1. A system for detecting user credentials, comprising:one or more processors; and
one or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to efficiently protect a user credential in an input data stream, the computer-executable instructions including instructions that are executable by the one or more processors to perform at least:
determine a plurality of data chunks in the input data stream; and
for one or more of the plurality of data chunks:
determine whether each byte of data in the data chunk comprises a valid byte value for the user credential;
represent each byte of data in the data chunk with a corresponding bit that indicates whether or not the byte of data comprises a valid byte value for the user credential;
using the representations of each byte of data in the data chunk, determine whether there is a continuous number of bits greater than or equal to a threshold number, that each indicates that its corresponding byte of data in the data chunk comprises a valid byte value for the user credential;
based on determining that there is a continuous number of bits greater than or equal to the threshold, determine a credential address range for a corresponding continuous number of bytes;
determine whether data stored at the credential address range comprises the user credential; and
when the data stored at the credential address range comprises the user credential prevent the user credential from being stored in public storage.

US Pat. No. 10,339,296

TERMINAL APPARATUS AND CONTROL METHOD FOR TERMINAL APPARATUS

LG ELECTRONICS INC., Seo...

1. A terminal device, comprising:an input unit configured to receive a fingerprint input;
a display comprising a touchscreen; and
a controller operably coupled with the input unit and the display and configured to:
perform an authentication procedure in response to the fingerprint input;
cause the display to display a notification message when fingerprint authentication for a finger associated with the fingerprint input is completed;
if a contact of the finger is maintained for more than a predetermined first time after the fingerprint authentication is completed, set a fingerprint authentication cancellation mode;
cause the display to display a cancel button when the finger moves from the input unit to the touchscreen during the fingerprint authentication cancellation mode, continuous contact maintained by the finger with the input unit or the touchscreen when the finger moves from the input unit to the touchscreen; and
cancel the fingerprint authentication in response to selection of the displayed cancel button.

US Pat. No. 10,339,295

TRACKING WORK BETWEEN SYSTEM ENTITIES

Microsoft Technology Lice...

1. A method implemented in a computer having a processor and a memory with instructions executable by the processor to provide an operating system and first and second processes, the method comprising:receiving, at the operating system, a first request from the first process for a ticket of work tracking;
in response to the received first request, generating and assigning a first ticket to the first process, wherein the generating and assigning include encoding the first ticket with an authentication key accessible by the operating system; and
subsequently, at the operating system,
receiving a second request from the second process for validating a second ticket as being attributable to the first process, the second request indicating that the first process has requested the second process to perform work for the first process by passing to the second process the first ticket;
determining whether the received second ticket from the second process is a valid ticket assigned to the first process, wherein the determining includes decoding the received second ticket with the authentication key; and
in response to determining that the second ticket is a valid ticket assigned to the first process,
instructing the second process to perform the work for the first process; and
recording the work performed by the second process as attributable to the first process.

US Pat. No. 10,339,294

CONFIDENCE-BASED AUTHENTICATION

JPMorgan Chase Bank, N.A....

11. A computer system, comprising:a memory; and
a processing device communicatively coupled to the memory, the processing device accessing the memory and executing instructions to perform steps including:
assigning an authentication requirement rating to an activity, the authentication requirement rating being a value associated with the activity and independent of authentication technology used to perform authentication;
assigning an authentication capability rating to each of one or more authentication methods, wherein the authentication capability rating indicates a maximum authentication level that each authentication method can provide;
receiving over a network from a remote user access device, a request from a user to perform the activity;
formulating, in response to the request, an authentication challenge requiring a first authentication method for presentation to the user;
receiving over the network from the remote user access device, an authentication attempt from the user;
calculating a first authentication sample result as a degree of similarity correspondence between the authentication attempt and an expected authentication result;
determining a current authentication rating for the user based on the authentication capability rating of the first authentication method and the first authentication sample result, wherein the current authentication rating is a product of the authentication capability rating and the authentication sample result;
determining whether to allow the user to perform the requested activity based on a comparison of the authentication requirement rating associated with the activity requested by the user and the current authentication rating determined for the user;
wherein the requested activity is permitted when the current authentication rating is greater than or equal to the authentication requirement rating for the activity;
wherein when the current authentication rating is less than the requirement rating for the activity, the processing device accessing the memory and executing instructions performs additional steps including:
denying the requested activity;
providing the user with a second authentication challenge;
receiving a second authentication attempt in response to the second authentication challenge and calculating a second sample result, wherein the second sample result is calculated as a degree of similarity between the second authentication attempt and a second expected authentication result; and
adjusting the current authentication rating determined for the user based on the second authentication sample result.

US Pat. No. 10,339,293

AUTHENTICATED DEVICE USED TO UNLOCK ANOTHER DEVICE

Apple Inc., Cupertino, C...

1. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by one or more processors of an electronic device having a user-interface locked state and a user-interface unlocked state, cause the electronic device to:detect, via wireless communication, an external device, wherein the external device has a user-interface locked state and a user-interface unlocked state;
receive, from the external device, unlocking information for unlocking the electronic device;
obtain an indication that the external device is in the user-interface unlocked state;
detect, while in the user-interface locked state, user input at the electronic device; and
in response to detecting the user input at the electronic device and receiving the unlocking information from the external device, and based on the indication that the external device is in the user-interface unlocked state, unlock the electronic device.

US Pat. No. 10,339,292

METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD

Assa Abloy AB, Stockholm...

1. A method of controlling physical access to a secure asset with a physical access control system including a mobile device and a host, comprising:receiving location information at the mobile device;
analyzing the location information by an application stored on the mobile device; and
making, by the mobile device, an access control decision as to whether to permit or deny a holder of the mobile device to access the secure asset based on the analysis of the location information; and
determining, by the mobile device, a host identifier based upon the location information.

US Pat. No. 10,339,291

APPROVING TRANSACTIONS USING A CAPTURED BIOMETRIC TEMPLATE

AMERICAN EXPRESS TRAVEL R...

1. A method comprising:identifying, by a server, a transaction account for a transaction using a scratch pad having a predetermined set of inputs that map to the transaction account,
wherein the transaction account is associated with a stored biometric template,
wherein biometric data is converted to a captured biometric template, and
wherein the scratch pad changes based on the captured biometric template;
approving, by the server, the transaction in response to comparing the stored biometric template with the captured biometric template.

US Pat. No. 10,339,290

SPOKEN PASS-PHRASE SUITABILITY DETERMINATION

NXP B.V., Eindhoven (NL)...

1. An apparatus comprising at least one processor and at least one memory including computer program code,the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following:
based on at least one utterance of a pass-phrase and predetermined scoring information comprising predetermined linguistic-element-scores attributable to one or more linguistic elements that form at least part of each of the at least one utterance,
provide for spoken pass-phrase suitability determination wherein the at least one utterance is assigned a pass-phrase-score based on linguistic analysis in which one or more linguistic elements identified in said utterances are assigned their corresponding linguistic-element-score from the predetermined scoring information, the pass-phrase score based on the one or more linguistic-element scores of the, identified, linguistic elements, wherein the spoken pass-phrase suitability is determined to be deficient at least based on the pass-phrase score being below a predetermined pass-phrase score threshold;
wherein the apparatus is configured to base said spoken pass-phrase suitability on at least two utterances of the pass-phrase and the pass-phrase suitability is also determined to be deficient based on a measure of spoken pass-phrase consistency comprising a difference between the at least two utterances being above a predetermined consistency threshold and wherein the apparatus is configured to generate a pass-phrase model from the at least two utterances of the pass-phrase, the pass-phrase model comprising a statistical description of the utterances of the pass-phrase, wherein the measure of spoken pass-phrase consistency comprises a difference between the model and a corresponding statistical description of at least one of the at least two utterances;
wherein the apparatus is configured to provide for the spoken pass-phrase suitability determination as part of an enrolment procedure in which a user provides a spoken pass-phrase to a microphone of the apparatus for future use to authenticate the identity of the user;
wherein the apparatus comprises at least part of: a portable electronic device, a mobile phone, a Smartphone, a laptop computer, a desktop computer, a tablet computer, a personal digital assistant, a digital camera, a smartwatch, a non-portable electronic device, a monitor, a household appliance, a smart TV, a server, or a module/circuitry for one or more of the same.

US Pat. No. 10,339,289

SYSTEM AND METHOD FOR SHARING OF DATA SECURELY BETWEEN ELECTRONIC DEVICES

1. A system for securely transferring data in an electronic environment, said system comprising:a personal information device, said personal information device comprising a processor and a memory accessible to the processor, the memory having personal data and a biometric template stored therein, the personal information device having an input/output port for transferring data;
a centralized system having a server connected to a database, the database having stored therein a unique identification number associated with the personal information device;
an access device having a processor and a memory accessible to the processor, the access device further having an input/output port for communicating with the personal information device;
a network connection between the centralized system and the access device;
a biometric sensor;
wherein the biometric sensor, upon being prompted, obtains a biometric sample from a user and provides it to the personal information device;
wherein the personal information device, upon being prompted, performs the steps of: (i) receive a biometric sample from a user, (ii) compare the biometric sample from the user to the biometric template, and (iii) provide a unique identification number and personal data to the access device if the biometric sample and biometric template match;
wherein the memory of the access device has operating instructions stored therein to cause the processor of the access device to perform the steps of: (i) receive a unique identification number from the personal information device, (ii) transmit the unique identification number to the centralized system, and (iii) receive personal data from the personal information device;
wherein the memory of the centralized system has operating instructions stored therein to cause the processor of the centralized system to perform the step of receiving a unique identification number associated with a personal information device from an access device.

US Pat. No. 10,339,288

USER AUTHENTICATION FOR MOBILE DEVICES USING BEHAVIORAL ANALYSIS

MCAFEE, LLC, Santa Clara...

1. A hardware computer readable medium comprising instructions that, when executed, cause a machine to at least:collect usage data representative of usage of a mobile computing device by an authentic user;
collect media data representative of media usage by the authentic user including a frequency of access of music content by genre, by artist, or a combination thereof;
generate one or more usage patterns from the collected usage data and the media usage, the one or more usage patterns including a pattern of use of a spoken phrase by the authentic user;
monitor second media usage by a second user;
monitor second usage of the mobile computing device by the second user, the second usage of the mobile computing device by the second user including a detected pattern of use of the spoken phrase by the second user and the second media usage by the second user;
in response to determining that the monitored second usage of the mobile computing device by the second user meets a threshold of deviation from the one or more usage patterns of the authentic user, encrypting data stored on the mobile computing device.

US Pat. No. 10,339,287

SYSTEMS AND METHODS FOR AUTHENTICATING DRIVERS BASED ON GPS DATA

Tata Consultancy Services...

1. A processor implemented method, comprising:obtaining, from a Global Positioning System (GPS), GPS data comprising trip information pertaining to a vehicle being driven by a driver;
extracting one or more features from the trip information;
ranking the one or more features from the trip information by performing a first comparison of the one or more features with a plurality of features associated with a plurality of trip information pertaining to other drivers to selectively identify and obtain one or more ranked features, wherein the one or more ranked features are selectively identified based on the trip information and historical data pertaining to one or more driving patterns of the driver stored in a database, and wherein the one or more ranked features are associated with a corresponding importance value;
performing a second comparison of (i) the importance value of each ranked feature from the one or more ranked features and (ii) a value of corresponding feature pertaining to the one or more driving patterns stored in the database;
generating an abnormality score for each of the ranked feature based on the second comparison; and
authenticating the driver based on the abnormality score.

US Pat. No. 10,339,286

MANAGING PERMISSIONS

LIFETRACK MEDICAL SYSTEMS...

1. A computer-implemented method comprisingserving a user interface page to a first individual user of an application, the user interface page exposing interactive features to the first individual user for using the application,
the interactive features exposed to the first individual user on the user interface page including interactive features that enable the first individual user to specify other individual users of the application and to specify permitted feature sets of the application for each of the specified other individual users,
by a server comprising a database, storing in the database information identifying the specified permitted feature sets of the application for each of the specified other individual users,
the interactive features exposed to the first individual user also enabling the first individual user to specify that the permitted feature set for each of the other specified individual users will be the same as the permitted feature set of another specified individual user,
in the database, storing information indicating that the permitted feature set for each of the other specified individual users is the same as the permitted feature set of the other individual user,
serving the user interface page to each of the other specified individual users, and
obtaining from the database the information indicating the permitted feature sets of the other specified individual users, and
including in the user interface page as served to the other specified individual users the same permitted feature set as the permitted feature set of the other specified user, based on the information stored in the database.

US Pat. No. 10,339,285

AUTHENTICATION SELECTION FOR INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

FUJI XEROX CO., LTD., Mi...

1. An information processing apparatus comprising:a processor configured to:
specify an authentication mode from a plurality of authentication modes supported by a document management apparatus;
acquire information indicating an authentication mode supported by a first terminal apparatus; and
perform, in response to determining the authentication mode indicated by the acquired information does not match the specified authentication mode, control of outputting to the first terminal apparatus information on a second terminal apparatus that supports the specified authentication mode.

US Pat. No. 10,339,284

MEASUREMENT METHOD, ELECTRONIC DEVICE, AND MEASUREMENT SYSTEM

HUAWEI TECHNOLOGIES CO., ...

1. A measurement method, comprising:writing, by an electronic device to a hardware storage device, running code and running data that are in a running process of a virtual machine manager (VMM), the electronic device running the VMM;
reading, by the electronic device from the hardware storage device, the running code and the running data without disrupting the running process of the VMM;
generating, by the electronic device, first verification information according to the running code and the running data using a digital digest calculation;
storing, by the electronic device, the first verification information; and
transmitting, to a trusted data center, log information comprising the running code, the running data, and a timestamp corresponding to a time at which the first verification information is generated,
the trusted data center generating second verification information according to the running code and the running data of the log information corresponding to the timestamp and using the digital digest calculation, and
the trusted data center measuring the electronic device using the first verification information and the second verification information.

US Pat. No. 10,339,283

SYSTEM AND METHOD FOR CREATING, PROCESSING, AND DISTRIBUTING IMAGES THAT SERVE AS PORTALS ENABLING COMMUNICATION WITH PERSONS WHO HAVE INTERACTED WITH THE IMAGES

TAUTACHROME, INC., Oro V...

1. A programmable electronic imaging device arranged to create an image, said imaging device including a memory for storing imaging software, said imaging software made up of a set of instructions executed by a processor for creating the image, steganographically marking the image with source and content verification data to create one of said source-and-content verifiable images, and securely transmitting the source-and-content-verifiable image to said cloud service,wherein said imaging software includes instructions for, when a user of the imaging device has not previously registered with the cloud service, carrying out the steps of obtaining a unique device identifier of the imaging device; collecting said identification information and preferences of the user; generating a private/public key pair; and transmitting the unique device identifier, the identification information and preferences of the user, and a public key of the private/public key pair to the cloud service,
wherein the instructions for steganographically marking the image created by the imaging software include instructions for generating a unique random identifier (URI) and steganographically marking the created image with the URI, and
wherein the imaging software further includes instructions for collecting metadata concerning an image created by the imaging software.

US Pat. No. 10,339,282

FILE ORIGIN DETERMINATION

International Business Ma...

1. A file validation method comprising:requesting, by a computer processor of a computing system executing an agent in response to a request, a detachable fetch software module;
generating, by said computer processor executing said detachable fetch software module, a digital fingerprint associated with securing an artifact file downloaded via said detachable fetch software module; and
generating, by said computer processor, metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system;
encrypting, by said computer processor based on results of said executing, said metadata resulting in encrypted metadata;
generating, by said computer processor, a log indicating that said encrypted metadata has been successfully generated;
generating, by said computer processor, a modified artifact file comprising said encrypted metadata combined with said artifact file and said log;
validating, by said computer processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; and
generating, by said computer processor, an encrypted package comprising said modified artifact file and a first portion of an encryption key.

US Pat. No. 10,339,281

APPARATUS AND METHODS FOR RIGHTS-MANAGED CONTENT AND DATA DELIVERY

Time Warner Cable Enterpr...

1. A computerized method for providing digitally rendered content to a computerized client device in a content delivery network, the computerized method comprising:receiving, from a rights management application computer program operating on a computerized client device, data representative of a request for a rights profile, the data representative of the request comprising identification information, the identification information identifying a user associated with the computerized client device;
based at least on a portion of the identification information, causing an association of the computerized client device to a subscriber account of the user associated with the computerized client device via association data;
based at least on the association data, receiving rights data relating to rights of the user to access the digitally rendered content;
utilizing the rights data to generate rights profile data; and
transmitting the rights profile data to the rights management application computer program, the rights profile data enabling the rights management application computer program to authorize rendering digitally rendered content via a media player application computer program configured to operate on the computerized client device or another computerized device associated with the user.

US Pat. No. 10,339,280

SYSTEMS AND METHODS FOR PROTECTING CONTENT WHEN USING A GENERAL PURPOSE USER INTERFACE APPLICATION

Stamps.com Inc., El Segu...

1. A method comprising:providing, by a server, a web page comprising content to a web browser application controlled by a user device, the content including unprotected content and executable code configured to access protected content that comprises at least one value bearing indicium, wherein said executable code is executed to access the protected content in response to a command received via the web browser application;
receiving, by the server in response to execution of the executable code, a request to obtain the protected content;
in response to receiving the request, determining whether the request to obtain the protected content is an initial request or a subsequent request to obtain the protected content, wherein the request is determined to be the subsequent request when the request is received subsequent to receiving the initial request; and
selectively providing, by the server, the protected content or the unprotected content to the web browser application based on whether the request is determined to be the initial request or the subsequent request, wherein the protected content is provided in response to a determination that the request is the initial request and the unprotected content is provided in response to a determination that the request is the subsequent request.

US Pat. No. 10,339,279

SYSTEM AND METHODS FOR SECURE COLLABORATIVE COMMUNICATION

MINDHIVE INC., New York,...

1. A method for sharing content over a communication network, the method comprising:receiving at a computing device coupled to a communication network a content identifier from a second computing device through the communication network, the first and second computing device each comprising a tangible, non-transitory memory coupled to a processor;
(i) retrieving content associated with the content identifier from the non-transitory memory of the computing device or (ii) sending a request for the content to a server through the communication network, sending a user credential to the server through the communication network, and receiving a copy of the content from the server through the communication network;
receiving, from a user, editing instructions modifying the content;
creating an editing parameter wherein the computing device is operable to synthesize and display edited content from the content and the editing parameter;
sending the editing parameter to the second computing device wherein the second computing device is operable to synthesize and display the edited content from the editing parameter and a copy of the content stored on the tangible, non-transitory memory of the second computing device.

US Pat. No. 10,339,278

MONITORING NEARBY MOBILE COMPUTING DEVICES TO PREVENT DIGITAL CONTENT MISUSE

Screening Room Media, Inc...

1. A method comprising:transmitting, by a client-side computing device, a request to a remote server to initiate presentation of a digital content item, the remote server facilitating presentation of multiple digital content items, the client-side computing device being associated with a first user account
receiving, from the remoter server, the digital content item and data identifying a threshold number of users that are authorized to view presentation of the digital content item by the client-side computing device, the threshold number of users being based on a number of known inhabitants of a dwelling associated with the first user account
initiating, by the client-side computing device, presentation of the digital content item on a display of a viewing device;
after initiating presentation of the digital content item on the display of the viewing device, detecting, by the client-side computing device, a number of mobile computing devices that are within a geographic distance of the client-side computing device;
determining, based on the number of mobile computing device that are within the geographic distance of the client-side computing device, a number of users that are viewing the presentation of the digital content item on the display of the viewing device;
determining that the number of users viewing the presentation of the digital content item on the display of the viewing device exceeds the threshold number of users that are authorized to view presentation of the digital content item by the client-side computing device; and
in response to determining that the number of users viewing the presentation of the digital content item on the display of the viewing device exceeds the threshold number of users that are authorized to view presentation of the digital content item by the client-side computing device, halting the presentation of the digital content item on the display of the viewing device.

US Pat. No. 10,339,277

REAL-TIME AND SECURED PICTURE/VIDEO UPLOAD VIA A CONTENT DELIVERY NETWORK

1. A method, comprising:facilitating establishing, by a system including a processor, a first communication path through an overlay network between a mobile device and customer premises equipment, the customer premises equipment being registered with a content delivery network based on a first electronic serial number, the mobile device being registered with the content delivery network based on a second electronic serial number;
exchanging encryption keys with the mobile device;
verifying, by the system, that incoming content is authorized based on the encryption keys exchanged with the mobile device, wherein the verifying further comprises preventing, based on the encryption keys, a rogue system impersonating the customer premises equipment from accessing the content;
selectively transferring, by the system, the content from the mobile device along the first communication path to the customer premises equipment;
facilitating establishing, by the system, a second communication path through the overlay network between the mobile device and the customer premises equipment responsive to a determination that the first communication path is overloaded; and
transferring, by the system, the content from the mobile device along the second communication path to the customer premises equipment responsive to a determination that bandwidth is limited, wherein the content from the mobile device is prioritized over other content for transfer along the second communication path to the customer premises equipment in response to the determination that the bandwidth is limited, wherein a bit rate of the content is reduced according to the bandwidth by the mobile device prior to transferring the content at a reduced rate to the customer premises equipment, wherein the content is provided, in part, to the customer premises equipment at the reduced rate by reducing the bit rate of the content,
wherein the content is captured by the mobile device when the bandwidth is insufficient for a real-time stream, and
wherein the content is formatted by the mobile device based on capabilities of an available display device.

US Pat. No. 10,339,276

METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR CONTINUOUSLY PROVIDING A LICENSE TO A NETWORK ELEMENT VIA A REMOTE CONNECTION

NOKIA TECHNOLOGIES OY, E...

1. A method comprising:temporarily enabling, at a first device, one or more transmission software features, configured to control transmission and reception of data at a first network element comprising a base transceiver station, for a predetermined time period;
alternately disabling and enabling the one or more transmission software features periodically, via the first device, after the predetermined time period expires during respective disabling and enabling time periods;
obtaining, via the first device, one or more licenses from a second network element, corresponding to the one or more features, during the predetermined time period or during a subsequent enabling time period; and
activating the one or more licenses obtained during the predetermined time period or during the subsequent enabling time period and enabling provision, via the first device, of the one or more licenses to the first network element to fully enable the one or more transmission software features, configured to control the transmission of data from the first network element and the reception of data at the first network element.

US Pat. No. 10,339,275

LICENSE CONFIRMATION VIA EMBEDDED CONFIRMATION CHALLENGE

Intel Corporation, Santa...

1. A method of operation on a license server in communication with a client device having a rights manager, the method comprising:generating, by the license server, a license defining rights to certain contents on the client device;
obtaining, by the license server, a challenge identifier targeting an intended recipient, the intended recipient corresponding to at least one of the rights manager and the client device;
encrypting, by the license server, the license and the challenge identifier into an encrypted communication for the intended recipient;
challenging, by the license server, the intended recipient to demonstrate successful application of the license, wherein the challenging includes sending the encrypted communication to the intended recipient; and
confirming, by the license server, that the encrypted communication was not intercepted by a spoofing device and that the intended recipient successfully applied the license, wherein the confirming includes receiving, by the license server from the intended recipient, a confirmation response corresponding to the challenge identifier.

US Pat. No. 10,339,273

SYSTEMS AND METHODS FOR PRE-OPERATIVE PROCEDURE DETERMINATION AND OUTCOME PREDICTING

Warsaw Orthopedic, Inc., ...

1. A spinal kinematics system for measuring objective parameters used to determine a predicted outcome of a procedure based on vertebral motion analysis of a patient, the system comprising:at least one imaging sensor configured to image and measure vertebral displacement by measuring the displacement of one or more vertebra of the patient relative to one or more predetermined reference points;
at least one motion sensor configured detect motion using accelerometers to detect motion of a patient; and
a monitoring device that includes: a wireless interface adapter in communication with and receives information from the at least one imaging sensor and the at least one motion sensor, and a control circuit having a processor and a memory and is configured to process information received from the at least one imaging sensor and the at least one motion sensor;
wherein the control circuit is further configured to determine:
an activity score, based on the vertebral displacement measured by the at least one imaging sensor and the motion detected by the at least one motion sensor, that measures a rest-activity cycle of the patient for a predetermined activity period;
a quality of sleep score, based on information generated by the at least one motion sensor, that measures a number of sleep interruptions during a predetermined sleep period;
a cumulative activity score by summing weighted daily averages of a plurality of activity scores across a plurality of predetermined activity periods;
a cumulative quality of sleep score by summing weighted daily averages of a plurality of quality of sleep scores across a plurality of predetermined sleep periods;
a combined baseline score by summing the cumulative activity score and the cumulative quality of sleep score; and
whether the procedure is recommended by comparing the combined baseline score to one or more predetermined cut-points, wherein each predetermined cut-point is associated with an increasing outcome probability, and wherein a higher baseline score indicates the procedure is likely to be successful.

US Pat. No. 10,339,272

SYSTEM AND METHOD FOR PATIENT CARE IMPROVEMENT

1. A system, comprising:an input module for receiving a first data set that includes at least one patient condition for each of a plurality of patients, wherein the data of the first data set is obtained during a predetermined time period of 24 hours;
a comparison module configured to:
compare each of the at least one patient condition to at least one filter criterion; and
compare information related to each of the plurality of patients to a predetermined patient type, wherein the predetermined patient type includes patients who are below a particular age threshold and patients who have been admitted to a medical facility for less than 24 hours;
a filter module for filtering the first data set to create a second data set that includes the at least one patient condition for each of one or more patients of the plurality of patients, wherein the at least one patient condition for a particular patient is included in the second data set if the at least one patient condition for the particular patient satisfies the at least one filter criterion and the particular patient does not satisfy the predetermined patient type;
a report module for generating a report that includes, for each of the one or more patients of the plurality of patients, i) at least one patient identifier, ii) at least one descriptor of the at least one patient condition, and iii) a healthcare provider identifier associated with the at least one patient identifier, wherein the report represents a 24-hour snapshot of all patients in the medical facility who are included in the second data set;
a recommendation module for generating a treatment recommendation for at least one of the one or more patients associated with the second data set, wherein the treatment recommendation is based at least partially on the at least one descriptor associated with the at least one of the one or more patients, and wherein a dose of insulin is administered to the at least one of the one or more patients based at least partially on the treatment recommendation;
a classification module for generating and storing at least one classification value for the at least one patient condition, wherein the classification value is generated based on one or more factors selected as having contributed to an onset of the at least one patient condition; and
an alert module for transmitting, for each of the one or more patients of the plurality of patients, an alert message to an address that corresponds to the healthcare provider identifier associated with the at least one patient identifier.

US Pat. No. 10,339,271

INTELLIGENT ELIGIBILITY REQUEST AND RESPONSE

PASSPORT HEALTH COMMUNICA...

13. A method comprising:using an intermediary computer system disposed between a provider computer system and a payer computer system to create an intelligent eligibility request, the intermediary computer system:
receiving an eligibility request containing eligibility request data from the provider computer system;
in response to receipt of the eligibility request from the provider computer system:
creating the intelligent eligibility request to send to the payer computer system that includes one or more appropriate component service type codes (STCs) and one or more appropriate explicit STCs, wherein the one or more appropriate component STCs and one or more appropriate explicit STCs are determined according to: the eligibility request data received from the provider computer system and an average response time for the payer computer system to respond to eligibility requests according to a communication pathway associated with the payer computer system, wherein the intermediary computer system creates the intelligent eligibility request with the one or more appropriate component STCs and one or more appropriate explicit STCs to prompt the payer computer system to provide a particular eligibility response having one or more desired response STCs without experiencing a time out according to a time out value; and
sending the intelligent eligibility request as an electronic transmission to the payer computer system with the one or more appropriate component STCs and one or more appropriate explicit STCs to prompt the payer computer system to provide the particular eligibility response having the one or more desired response STCs.

US Pat. No. 10,339,270

BILLING SYSTEM FOR MEDICAL PROCEDURES

VASCULAR MANAGEMENT ASSOC...

1. A non-transitory computer-readable medium having stored thereon sequences of instructions which, when executed by at least one processor, cause the at least one processor to:output a graphical user interface (GUI), the GUI including a visual representation of at least a portion of a human body and a text input area;
receive input from a user via the GUI, the input selecting portions of the visual representation and identifying a sequence of medical procedures that were performed on a patient with respect to the selected portions;
highlight the selected portions on the visual representation, the highlighted portions providing a graphical representation of the sequence of medical procedures that were performed on the patient;
automatically generate billing codes corresponding to the medical procedures that were performed based on the input received via the GUI;
automatically generate text, based on input received via the GUI, identifying at least some of the medical procedures that were performed;
display the billing codes and the generated text on the GUI;
provide, via the GUI, a pop-up or dialog window in response to input corresponding to at least some of the medical procedures that were performed;
receive, from the user, information via the pop-up or dialog window;
display at least some of the information provided via the pop-up or dialog window in the text input area of the GUI;
wherein the sequence of medical procedures corresponds to surgery performed on the patient and the visual representation displays a portion of a vascular system of the human body, and
wherein when highlighting the selected portions, the instructions cause the at least one processor to highlight a path in the displayed portion of the vascular system corresponding to portions of the vascular system in which the surgery was performed;
determine which of the medical procedures that were performed on the patient are billable; and
generate a report including particular ones of the billing codes corresponding to medical procedures determined to be billable.

US Pat. No. 10,339,269

HAND-HELD SPHERICAL ANTENNA SYSTEM TO DETECT TRANSPONDER TAGGED OBJECTS, FOR EXAMPLE DURING SURGERY

Covidien LP, Mansfield, ...

1. A transponder detection device to detect surgical objects in a work area, the surgical objects marked by respective resonant tag elements that produce return signals in response to energization, the transponder detection device comprising:a hand-held probe comprising:
a substantially spherically shaped coil form that includes three coil support channels, each of the three coil support channels defines an outer coil support surface;
a first antenna element comprising a first electrical wire wound around the outer coil support surface of a first one of the three coil support channels, the first antenna element arranged to transmit and receive signals generally in a first coordinate direction;
a second antenna element comprising a second electrical wire wound around the outer coil support surface of a second one of the three coil support channels over the first electrical wire, the second antenna element arranged to transmit and receive signals generally in a second coordinate direction orthogonal to the first coordinate direction;
a third antenna element comprising a third electrical wire wound around the outer coil support surface of a third one of the three coil support channels over the first electrical wire and the second electrical wire, the third antenna element arranged to transmit and receive signals generally in a third coordinate direction orthogonal to the first coordinate direction and the second coordinate direction;
a processor operatively coupled to the first antenna element, the second antenna element, and the third antenna element; and
a nontransitory processor-readable medium communicatively coupled to the processor and that stores at least one of instructions or data executable by the processor, which cause the processor to:
independently control each of the first antenna element, the second antenna element and the third antenna element to emit wideband interrogation signals;
receive any of the return signals from any of the resonant tag elements; and
determine from a receipt of any of the return signals whether any of the resonant tag elements are present in the work area.

US Pat. No. 10,339,268

SYSTEM AND METHOD FOR CYTOPATHOLOGICAL AND GENETIC DATA BASED TREATMENT PROTOCOL IDENTIFICATION AND TRACKING

COVIDIEN LP, Mansfield, ...

1. A user interface for assessing a target and presenting treatment options, the user interface comprising:a present patient data field;
a care team field;
a disease identification field;
a plurality of fields presenting data including one or more of imaging data, cytopathological data, genetic information and treatment options for an identified target of a present patient, wherein the treatment options include power and duration parameters for an ablation treatment and are based on a correlation of similarities in data from a plurality of prior patients having been treated by an ablation treatment and the data for the identified target of the present patient; and
a personalized plan field presenting a personalized treatment plan for the present patient, the personalized treatment plan selected by software based on one or more treatment options having a ranking exceeding a preconfigured threshold, the ranking based on an observed patient outcome of each treatment option of the one or more treatment options for the plurality of prior patients, the personalized treatment plan including personalized power and duration parameters for ablation treatment of the identified target of the present patient, wherein the personalized power and duration parameters are determined by identifying a match between a genetic mutation in the identified target of the present patient and a genetic mutation in a target of at least one patient of the plurality of prior patients.

US Pat. No. 10,339,266

MECHANISMS FOR CONSTRUCTING SPLINE SURFACES TO PROVIDE INTER-SURFACE CONTINUITY

Board of Regents of the U...

1. A computer-implemented method for modifying a computer-aided design (CAD) model of a tangible object, the method comprising:performing, by the computer:
storing geometric input data describing first and second input parametric surfaces associated with the CAD model, wherein the first and second input surfaces are described in a first and second parameter space domain, respectively;
storing a model space trim curve associated with the first and second input surfaces, wherein the model space trim curve is a parametric curve that approximates a geometric intersection of the first and second input surfaces;
reparametrizing the first and second parametric surfaces into a common third parameter space domain based on the model space trim curve;
constructing first and second output surfaces as approximations of at least portions of the first and second input surfaces, respectively, wherein the first and second output surfaces are described in the third parameter space domain, wherein at least a portion of the boundary of each of the first and second output surfaces coincides with the model space trim curve; and
storing a modified CAD model of the tangible object comprising the first and second output surfaces, wherein the modified CAD model exhibits increased inter-surface continuity between the first and second output surfaces relative to the first and second input surfaces.

US Pat. No. 10,339,265

METHOD AND SYSTEMS FOR OFF-LINE CONTROL FOR SIMULATION OF COUPLED HYBRID DYNAMIC SYSTEMS

MTS SYSTEMS CORPORATION, ...

1. An arrangement for controlling a coupled hybrid dynamic system comprising modeled components in a virtual model and physical components, the arrangement comprising:a physical test rig configured to drive the physical structural components and generate a test rig response comprising a coupling response corresponding to an input to the virtual model and a convergence response that is compared to an output of the virtual model;
a storage device; and
a processor operable with the storage device to store a virtual model of a complementary system to the physical structural components, the virtual model comprising a model of a disembodied assembly, the processor configured to:
obtain a virtual dynamic response of the virtual model of the disembodied assembly;
obtain a combined virtual dynamic response for a plurality of disembodied assemblies using the virtual dynamic response for the disembodied assembly; and
obtain the system dynamic response model using the combined virtual dynamic response, the coupling response and the convergence response.

US Pat. No. 10,339,264

USING SCANNED VANES TO DETERMINE EFFECTIVE FLOW AREAS

Rolls-Royce Engine Servic...

1. A computing device for determining an effective flow area of a first vane segment for a turbine or a turbine engine, the computing device comprising at least one computing device and instructions embodied in one or more non-transitory machine accessible storage media, the instructions executable by the at least one computing device to cause the computing device to:determine an effective flow area of the first vane segment for the turbine or the turbine engine by:
optically scanning the first vane segment, wherein the first vane segment comprises a first vane and a second vane;
creating a virtual vane segment based on the optical scanning, wherein the virtual vane segment comprises a first virtual vane corresponding to the first vane and a second virtual vane corresponding to the second vane;
determining at least one chokepoint of the virtual vane segment, wherein each chokepoint comprises a point of the first virtual vane and a point of the second virtual vane that restrict a flow area between the first virtual vane and the second virtual vane, and wherein determining the at least one chokepoint comprises (i) sectioning the virtual vane segment into one or more sections and (ii) for each of the one or more sections, determining a distance across the flow area between an edge of the first virtual vane and an edge of the second virtual vane; and
calculating a virtual vane segment effective flow area based at least in part on the at least one chokepoint.

US Pat. No. 10,339,262

SYSTEM AND METHOD FOR DEFINING CARE AREAS IN REPEATING STRUCTURES OF DESIGN DATA

KLA-Tencor Corporation, ...

1. A system, comprising:an inspection tool, wherein the inspection tool includes a detector configured to acquire one or more images of a selected region of a sample;
a user interface, wherein the user interface includes a display and a user input device; and
a controller including one or more processors configured to execute a set of program instructions stored in memory, wherein the program instructions are configured to cause the one or more processors to:
receive design data, wherein the design data includes a block of repeating cells;
present, on the user interface, a particular cell of the block of repeating cells;
define a first care area associated with a first design of interest in the particular cell from a first input received via the user interface, wherein the first care area has a first sensitivity threshold;
define an additional care area associated with an additional design of interest in the particular cell from an additional input received via the user interface, wherein the additional care area has an additional sensitivity threshold, wherein the first care area is more sensitive than the additional care area;
identify a set of first care areas within the block of repeating cells by performing a search function to identify additional occurrences of the first design of interest within the block of repeating cells;
identify a set of additional care areas within the block of repeating cells by performing a search function to identify additional occurrences of the additional design of interest within the block of repeating cells;
configure the inspection tool based on the set of first care areas and the set of additional care areas to reduce inspection time when acquiring the one or more images of the selected region of the sample;
receive the one or more images of the selected region of the sample from the inspection tool;
identify one or more defects within the first set of care areas in the one or more images of the selected region of the sample based on the first sensitivity threshold; and
identify one or more defects within the additional set of care areas in the one or more images of the selected region of the sample based on the additional sensitivity threshold.

US Pat. No. 10,339,261

OPTICAL RULE CHECKING FOR DETECTING AT RISK STRUCTURES FOR OVERLAY ISSUES

INTERNATIONAL BUSINESS MA...

1. A method of performing lithography and detecting at risk structures due to a lithographic mask overlay, comprising:performing a lithography process;
performing the lithographic mask overlay; and
the method of detecting being implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to:
obtain a simulation of a metal layer and a via;
determine a probability that an arbitrary point (x, y) on the metal layer is covered by the via by calculating a statistical coverage area metric followed by mathematical approximations of a summing function; and
detect the at risk structures of a semiconductor device during the lithography process in which a misalignment of a lithography mask overlay occurs when the metal layer is covered by the via by detecting a lithography error occurring from the misalignment of the lithography mask overlay based on the determined probability,
wherein the arbitrary point (x, y) is defined by an x coordinate and a y coordinate in a cartesian coordinate system, and
wherein determining the probability that the arbitrary point (x, y) on the metal layer is covered by the via comprises:
determining that the metal layer is inside the via by calculating:

wherein:
Pin is representative of a probability that the via covers the metal layer, at the arbitrary point,
Ox and Oy follows Gaussian distributions to calculate for the Pin, and
P is a probability, and Ox, and Oy is an overlay in a x direction and a y direction, respectively.

US Pat. No. 10,339,260

METHODOLOGY TO GENERATE GUIDING TEMPLATES FOR DIRECTED SELF-ASSEMBLY

ASML Netherlands B.V., V...

1. A method comprising:determining a guiding template for each of two or more features in a design layout without accounting for the others of the two or more features;
determining, by a hardware computer system, a characteristic of a joined guiding template for guiding a physical process of self-assembly of block copolymer to form the two or more features, the joined guiding template being the joining of each of the guiding templates for the two or more features, wherein curvatures on the joined guiding template are not greater than a maximum curvature, the maximum curvature being a function of numerical aperture and of wavelength of radiation, of the process to produce the joined guiding template; and
producing electronic data, using the determined characteristic, to setup and/or modify an aspect of a physical equipment or process to produce the joined guiding template on a substrate and/or of the physical process of self-assembly of block copolymer.

US Pat. No. 10,339,259

METHOD FOR ORGANIZING, CONTROLLING, AND REPORTING ON DESIGN MISMATCH INFORMATION IN IC PHYSICAL DESIGN DATA

SYNOPSYS, INC., Mountain...

1. A method for detecting and reporting design mismatch information in integrated circuit (IC) physical design data generated via a computer-aided electronic design automation (EDA) system, comprising:receiving, at a computer, a plurality of sets of design mismatch settings each identifying potential mismatch types generated via the EDA system;
receiving, at the computer, a selection of a set of design mismatch settings selected from the plurality of sets of design mismatch settings;
configuring, at the computer, one or more handlers for execution with the EDA system based at least in part on the selected set of design mismatch settings, wherein the one or more handlers comprise a detecting module configured to import at least a portion of the selected set of design mismatch settings to detect a mismatch within the IC physical design data satisfying at least one potential mismatch type of the selected set of design mismatch settings and an encounter module configured to automatically perform one or more actions to detected design mismatches within the IC physical design data;
applying, via the EDA system executing on the computer, the one or more handlers to the physical design data;
automatically performing, via the encounter module of the one or more handlers operating via the EDA system executing on the computer, one or more actions with respect to one or more detected design mismatches;
generating, by the computer, a record identifying the performed one or more actions.

US Pat. No. 10,339,258

LOOK-AHEAD TIMING PREDICTION FOR MULTI-INSTANCE MODULE (MIM) ENGINEERING CHANGE ORDER (ECO)

SYNOPSYS, INC., Mountain...

1. A method for determining an engineering change order (ECO) for a multi-instance module (MIM) in a circuit design that includes multiple instances of the MIM, the method comprising:creating a merged timing data structure that is associated with a pin of the MIM, wherein the merged timing data structure stores timing information for the pin across the multiple instances of the MIM, and wherein the timing information includes at least one of an arrival time, a required time, a slack, or a slew; and
determining the ECO for the MIM by using a processor that accesses the merged timing data structure, wherein said determining comprises using the merged timing data structure to compute a change in the timing information for the pin across the multiple instances of the MIM when an incremental adjustment is applied to the MIM.

US Pat. No. 10,339,257

INFORMATION PROCESSING APPARATUS, METHOD, AND STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An information processing apparatus that evaluates an appropriateness of an arrangement of a bypass capacitor on a printed circuit board, comprising:a memory device; and
circuitry communicable with the memory device and configured to:
specify positions of a power source pad of a die and a ground pad of the die which are arranged within an integrated circuit package based on a power source wiring and a power source ring which are included in design information on the printed circuit board;
specify a bypass capacitor arranged on the printed circuit board based on the design information;
derive an evaluation value for evaluating the arrangement of the specified bypass capacitor on the printed circuit board based on the design information, information on the specified positions of the power source pad of the die and the ground pad of the die which are arranged within the integrated circuit package, and information on the specified bypass capacitor; and
determine whether the arrangement of the specified bypass capacitor on the printed circuit board is appropriate based on the derived evaluation value,
wherein the arrangement of the specified bypass capacitor on the printed circuit board is rearranged in a case where it is determined that the arrangement of the specified bypass capacitor on the printed circuit board is not appropriate based on the derived evaluation value.

US Pat. No. 10,339,256

METHOD OF PATTERNING TARGET LAYER

IMEC vzw, Leuven (BE) Gl...

1. A method of defining routing tracks to be formed in a target layer over a standard cell semiconductor device, the method comprising:forming a first mandrel, a second mandrel and a third mandrel above the target layer, the second mandrel being arranged between the first mandrel and the third mandrel;
forming a first set of spacers including a first spacer on a sidewall of the first mandrel facing the second mandrel, a second spacer and a third spacer on sidewalls of the second mandrel, and a fourth spacer on a sidewall of the third mandrel facing the second mandrel;
removing the first, second and third mandrels;
using the first set of spacers as a masking layer to pattern a sacrificial layer arranged vertically between the target layer and the first set of spacers, thereby forming a set of sacrificial features including first, second, third and fourth sacrificial features corresponding to the first, second, third and fourth spacers, wherein the set of sacrificial features defines positions of off-center routing tracks (T1, T2, T3, T4); and
forming a second set of spacers on at least part of the sidewalls of the set of sacrificial features, wherein the second set of spacers fill a gap between the first and second sacrificial features and a gap between the third and fourth sacrificial features, while leaving a gap between the second and third sacrificial feature that define a position of a central routing track.

US Pat. No. 10,339,255

PROGRAM DEVELOPMENT SUPPORT DEVICE, NON-TRANSITORY STORAGE MEDIUM STORING THEREON COMPUTER-READABLE PROGRAM DEVELOPMENT SUPPORT PROGRAM, AND PROGRAM DEVELOPMENT SUPPORT METHOD

OMRON CORPORATION, Kyoto...

1. A program development support device for supporting development of a safety program to be executed in a safety controller, the program development support device comprising:a first display control module configured to display, in response to selection of any input/output unit connected to the safety controller, a first image object representing an external appearance and input/output terminals of the selected input/output unit; and
a second display control module configured to display, together with the first image object, a second image object representing an external appearance of a safety device and a circuit configuration of the safety device, the safety device being set to be allocated to any of the input/output terminals of the selected input/output unit, wherein the circuit configuration includes an internal circuit of the safety device and connection between the safety device and the allocated input/output terminals;
wherein for an input/output terminal to which each safety device is allocated, the input/output terminal represented by the first image object and the circuit configuration represented by the second image object being displayed in association with each other,
wherein the first image object includes, as the external appearance of the input/output unit corresponding to the first image object, one or more partial image objects each representing an input/output terminal, and
wherein the first display control module varies, depending on a type of the safety device allocated to the input/output unit, a manner of displaying a corresponding partial image object.

US Pat. No. 10,339,254

INTEGRATED CIRCUIT DESIGN SYSTEMS AND METHODS

Motivo, Inc., Sunnyvale,...

1. A method, performed by one or more processors, for determining a netlist describing the electrical connectivity of an integrated circuit electrical design and having target metrics, the method comprising:building a netlist configuration database to include a plurality of netlist configurations with annotations, the building comprising:
analyzing sample netlists from one or more other integrated circuit electrical designs;
annotating the sample netlists with corresponding electrical characteristics, wherein each of the plurality of netlist configurations is based on at least one of the sample netlists; and
representing each of the plurality of netlist configurations by a plurality of matrices, wherein each matrix of the plurality of matrices is connected to another matrix of the plurality of matrices to form a connected graph of the plurality of matrices; and annotating each of the plurality of matrices with metrics based on the analyzing of the sample netlists;
accessing the netlist configuration database comprising the plurality of netlist configurations, wherein at least two of the plurality of netlist configurations of the netlist configuration database are annotated with electrical characteristics, the at least two of the plurality of netlist configurations comprising a first netlist configuration and a second netlist configuration, the first netlist configuration being annotated with first electrical characteristics and connecting a set of elements in a first order, and the second netlist configuration being annotated with second electrical characteristics and connecting the set of elements in a second order, wherein a first matrix of the plurality of matrices represents the first netlist configuration and is annotated with first metrics and a second matrix of the plurality of matrices represents the second netlist configuration and is annotated with second metrics;
partitioning the integrated circuit electrical design into a plurality of circuit design configurations including one specific circuit design configuration, the one specific circuit design configuration comprising the set of elements; and
selecting, based on the target metrics, one of the first or the second netlist configurations from the netlist configuration database, annotated with the target metrics, the selecting comprising searching the connected graph of the plurality of the matrices to find a matrix corresponding to the selected one of the first or the second netlist configurations;
determining a manufacturing configuration for manufacturing an integrated circuit, the manufacturing configuration comprising the netlist of the integrated circuit electrical design including the selected one of the first or the second netlist configurations; and
manufacturing the integrated circuit using the determined manufacturing configuration.

US Pat. No. 10,339,253

METHOD OF YIELD PREJUDGMENT AND BUMP RE-ASSIGNMENT AND COMPUTER READABLE STORAGE MEDIUM

INDUSTRIAL TECHNOLOGY RES...

1. A method of yield prejudgment and bump re-assignment for a die, the die comprising a plurality of areas, each area being electrically connected to a substrate through a bump, and the method comprising:calculating a probability for an occurrence of warpage in each area to obtain a successful-connection probability for the area;
defining some of the areas as a short-circuit region according to the successful-connection probabilities, wherein the successful-connection probabilities of the areas of the short-circuit region are not within a predetermined range;
arranging the areas excluding the areas of the short-circuit region and the areas located at corners of the die in a descending order from high to low according to the corresponding successful-connection probabilities;
defining some of the areas which are arranged in the descending order as a signal region, wherein the successful-connection probabilities of the areas of the signal region are greater than a predetermined value;
dividing the short-circuit region into at least one power region and at least one ground region;
determining whether the number of areas in the power region is less than a first required value and whether the number of areas in the ground region is less than a second required value;
when the number of areas in the power region is less than the first required value, assigning at least one area among the areas arranged in the descending order to the power region, wherein the successful-connection probability of the area assigned to the power region is less than the predetermined value; and
when the number of areas in the ground region is less than the second required value, assigning at least one area among the areas arranged in the descending order to the ground region, wherein the successful-connection probability of the area assigned to the ground region is less than the predetermined value.

US Pat. No. 10,339,252

AUTOMATED CUSTOM CIRCUIT LAYOUT ENHANCEMENT

ORACLE INTERNATIONAL CORP...

1. A method for enhancing a chip layout, comprising:obtaining the chip layout comprising:
a first layer comprising a first track and a second track, a first route occupying the first track, and
an open net comprising open terminals;
grouping the open terminals into at least a first subset of open terminals;
calculating, based on the first subset, a region of interest (ROI) within the chip layout;
determining that neither the first track nor the second track within the ROI can be used to connect all the open terminals in the first subset;
determining that the first track can be used to connect all the open terminals in the first subset after moving the first route from the first track to the second track;
moving, within the chip layout, the first route from the first track to the second track; and
attempting to connect all the open terminals in the first subset using the first track.

US Pat. No. 10,339,251

METHOD TO IMPROVE TRANSISTOR MATCHING

TEXAS INSTRUMENTS INCORPO...

1. A process of forming an integrated circuit, comprising the steps:selecting a target transistor in a design data base of the integrated circuit with a target transistor active overlap of gate that is different than a reference active overlap of gate of a reference transistor;
determining a target transistor gate length change that will match a drive current of the target transistor with a drive current of the reference transistor;
applying the target transistor gate length change to the gate of the target transistor in the design data base, wherein the target gate length change occurs to only a portion of the gate, the portion located where the target transistor gate crosses a boundary between isolation and active of the transistor; and
fabricating the transistor with the target transistor gate length change on a semiconductor wafer.

US Pat. No. 10,339,250

METHOD OF GENERATING ENGINEERING CHANGE ORDER (ECO) LAYOUT OF BASE CELL AND COMPUTER-READABLE MEDIUM COMPRISING EXECUTABLE INSTRUCTIONS FOR CARRYING OUT SAID METHOD

TAIWAN SEMICONDUCTOR MANU...

1. A method of generating an ECO-layout of an engineering change order (ECO) base cell, the ECO-layout being stored on a non-transitory computer-readable medium, the method comprising:generating first and second active area patterns having corresponding long axes arranged in a first direction parallel to a first axis of symmetry;
arranging the first and second active area patterns on opposite sides of the first axis of symmetry;
generating non-overlapping first, second and third conductive patterns having corresponding long axes in a second direction perpendicular to the first direction and parallel to a second axis of symmetry;
arranging each of the first, second and third conductive patterns to correspondingly overlap the first and second active area patterns;
locating the first conductive pattern between the second and third conductive patterns;
generating a first cut-pattern which overlaps corresponding central regions of the second and third conductive patterns and which is indicative that the central regions will be removed subsequently;
aligning the first cut-pattern relative to the first axis of symmetry;
generating a fourth conductive pattern;
locating the fourth conductive pattern over an area bounded by the first cut-pattern;
expanding the fourth conductive pattern to occupy an area which substantially overlaps a first segment of the first conductive pattern and a first segment of one of the second and third conductive patterns, thereby resulting in the ECO layout; and
fabricating, based on the ECO-layout, at least one of (A) one or more semiconductor masks or (B) at least one component in a layer of an inchoate semiconductor integrated circuit and
wherein at least one of the generating, arranging, locating and expanding is executed by a processor of a computer.

US Pat. No. 10,339,249

USING COLOR PATTERN ASSIGNED TO SHAPES FOR CUSTOM LAYOUT OF INTEGRATED CIRCUIT (IC) DESIGNS

Synopsys, Inc., Mountain...

1. A method for facilitating custom layout of an integrated circuit (IC) design, the method comprising:for each net in a set of nets in the IC design, assigning a distinct color pattern to a set of shapes in a layout of the IC design that correspond to the net, wherein each shape in the set of shapes represents a source, gate, or drain of a multigate device, and wherein each net in the set of nets specifies electrical connectivity between one or more multigate devices; and
displaying the layout of the IC design in a graphical user interface (GUI) of a computer, wherein each shape in the layout of the IC design is displayed in the GUI of the computer using the distinct color pattern assigned to the shape, thereby enabling a user to easily connect the one or more multigate devices.

US Pat. No. 10,339,248

MODIFIED DESIGN RULES TO IMPROVE DEVICE PERFORMANCE

TAIWAN SEMICONDUCTOR MANU...

1. A method, comprising:designing a layout of gate structures and diffusion regions of a plurality of active devices;
identifying an edge device of the plurality of active devices;
adding a dummy device next to the edge device and a dummy gate structure next to the dummy device resulting in a modified layout; and
fabricating, based on the modified layout, at least one of a photolithography mask or at least one component in a layer of a semiconductor device,
wherein the dummy device shares a diffusion region with the edge device, and
a gate structure of the dummy device is one of two dummy gate structures added next to the edge device, and the edge device has a gate structure and a diffusion region.

US Pat. No. 10,339,247

SIMULATING EFFECTS OF TEMPERATURE ON ACOUSTIC MICROWAVE FILTERS

RESONANT INC., Santa Bar...

1. A method of creating an acoustic microwave filter in accordance with frequency response requirements over a temperature range, comprising:generating a temperature modeled filter circuit design that serves as an input to an acoustic filter manufacturing process, wherein generating said filter circuit comprises:
generating an initial filter circuit design, comprising a plurality of acoustic resonator elements, based on the frequency response requirements;
introducing a lumped inductive element in series with and a lumped capacitance element in parallel with each acoustic resonator element of the initial filter circuit design, wherein each lumped inductive element shifts a resonant frequency of the acoustic resonator element to which it is introduced and each lumped capacitance element shifts an anti-resonant frequency of the acoustic resonator element to which it is introduced;
varying a capacitance value of each lumped capacitance element and an inductance value of each lumped inductive element based on a plurality of operating temperatures until the frequency response of the initial filter circuit design matches a particular frequency response requirement at a particular operating temperature.

US Pat. No. 10,339,246

SCHEMATIC OVERLAY FOR DESIGN AND VERIFICATION

Synopsys, Inc., Mountain...

1. A computer-implemented method for modifying an integrated circuit (IC) design, comprising:displaying at least a part of a base schematic data including a plurality of base objects;
receiving modification information indicating a change in the base schematic data;
responsive to receiving the modification information, producing schematic overlay data representing modification to at least one of the base objects or connectivity between the base objects in the base schematic data;
generating a modified schematic data representing the base schematic data as modified by the schematic overlay data, the base schematic data representing a circuit different from a modified circuit corresponding to the modified schematic data, the modified circuit being modified with respect to at least one of: (i) omission of an object and removal of one or more connections associated with the omitted object, or (ii) inclusion of an object and addition of at least one connection associated with the included object;
performing an electronic design automation (EDA) operation based on the modified schematic data; and
retaining the base schematic data unchanged during or after performing of the EDA operation.

US Pat. No. 10,339,245

TIMING EXACT DESIGN CONVERSIONS FROM FPGA TO ASIC

CALLAHAN CELLULAR L.L.C.,...

1. A method comprising:accessing programming data for a programmable logic design to meet a plurality of design specifications; and
altering a programming data layer of the programmable logic design to form a hard-wired design that meets the plurality of design specifications, said altering including:
based on the programming data, determining a plurality of interconnects between the programming data layer and at least one of a plurality of input programming nodes of a programmable circuit layer of the programmable logic design and determining a plurality of individual logic values provided by a respective one of the plurality of interconnects; and
based on the plurality of individual logic values, replacing the programming data layer with a wire pattern layer hard-wired to a first portion of the plurality of interconnects to provide a logic high and hard-wired to a second portion of the plurality of interconnects to provide a logic low.

US Pat. No. 10,339,244

METHOD AND APPARATUS FOR IMPLEMENTING USER-GUIDED SPECULATIVE REGISTER RETIMING IN A COMPILATION FLOW

Altera Corporation, San ...

1. A method for designing a system on a target device, comprising:performing speculative register retiming with speculative changes made to a design of the system after an initial compilation of the design;
generating a strategy for an actual register retiming in response to user specified preferences on the speculative changes;
generating a data file that reflects the strategy for the design of the system; and
programming the target device with the data file to physically transform components on the target device to implement the system.