US Pat. No. 10,395,175

DETERMINATION AND PRESENTMENT OF RELATIONSHIPS IN CONTENT

Amazon Technologies, Inc....

1. A method comprising:receiving, by a source device comprising at least one processor, an electronic book (“eBook”) comprising a story including a first character having a first character name;
identifying, by the source device, a match between a keyword and a first word in the eBook;
determining, by the source device, a bookmarked location in the eBook, wherein the bookmarked location indicates a current reading location in the eBook;
determining, by the source device, an occurrence relating the first character name to the first word;
determining, by the source device, a number of words between the first character name and the first word in the eBook;
determining, by the source device, that the number of words between the first character name and the first word in the eBook is less than a threshold number of words;
determining, by the source device, a connection score for the first character and the first word in the eBook, wherein the connection score is based at least in part on the occurrence;
determining, by the source device and based at least in part on the connection score, that the first character is connected to the first word;
identifying, by the source device, that a second character is connected to the first word;
generating, by the source device and based at least in part on the number of words between the first character name and the first word in the eBook being less than the threshold number of words, data that represents a family structure including a parental relationship between the first character and the second character; and
sending, by the source device, the eBook and the data representing the family structure to a reader device.

US Pat. No. 10,395,174

METHOD FOR PERFORMING INSIGHT OPERATIONS WITHIN A COGNITIVE ENVIRONMENT

Cognitive Scale, Inc., A...

1. A method for providing cognitive insight via a cognitive information processing system environment, the cognitive information processing system environment comprising a cognitive inference and learning system and a cognitive application, comprising:receiving data from a plurality of data sources, the plurality of data sources comprising a social data source stored in a social data repository, public data source stored in a public data repository, a licensed data source stored in a licensed data repository and a proprietary data source stored in a proprietary data repository;
encapsulating an operation for providing a desired cognitive insight via an insight engine; and,
applying the operation to a target cognitive graph to generate a cognitive insight based upon the operation, the target cognitive graph being stored within a repository of cognitive graphs, the target cognitive graph providing a representation of expert knowledge, associated with individuals and groups over a period of time, to depict relationships between people, places and things, the target cognitive graph providing a machine-readable formalism for knowledge representation, the cognitive inference and learning system executing on a hardware processor of an information processing system, the information processing system being deterministic, the cognitive inference and learning system comprising a cognitive platform executing on the information processing system, the cognitive platform and the information processing system performing a cognitive computing function, the cognitive platform comprising a cognitive engine, the cognitive engine comprising the insight engine, the insight engine processing streams of data from the plurality of data sources, the cognitive inference and learning system using the insight engine to generate a plurality of cognitive insights; and,
providing the plurality of cognitive insights generated by the insight engine to a destination, the destination comprising the cognitive application, the cognitive application enabling a user to interact with the cognitive insights, the cognitive application being a cloud-based application.

US Pat. No. 10,395,173

SYSTEM AND METHODS FOR EXEMPLARY PROBLEM SOLVING, THINKING AND LEARNING USING AN EXEMPLARY ARCHETYPE PROCESS AND ENHANCED HYBRID FORMS

Zxibix, Inc., Mountain V...

1. A method to support learning, problem solving, understanding, or immersion approaches, to take advantage of additional perception capabilities, said method comprising:a method performed by a system using at least one processor, said method comprising activities comprising:
receiving at least one input;
providing a hybrid experience comprising a set of actions to capacitate exploration or development, or both, of a multipart constructed composition related to at least one problem or topic; said experience accomplished by providing a set of areas or stations, or both, arranged in spatial or temporal relation, or both, to one another; said arrangement according to a defined set of phases or activities for the exploration or development, or said arrangement according to parts or phases or path of said composition, or said arrangement according to both; said areas or stations or both comprising interaction or presentation elements or both; said composition, interaction element, and presentation element comprising an electronic item, digital item, electrical item, physical item, mechanical item, interface item, displayed item, projected item, output, stored item, system control, input receiver, item to cause an output to an interface or device, or a combination thereof;
said hybrid experience provisioning comprising at least one electronic or digital or electrical component and at least one physical or mechanical component, or a combination thereof;
in response to said input, providing or changing, or both, at least one interaction element or presentation element or related content item, or a combination thereof, comprising at least one additional or changed item, or both, comprising display, output, item to cause an output to an interface or device, projection, storage, interaction, interaction element, presentation element, movement, location, mechanical element, or physical element, or a combination thereof.

US Pat. No. 10,395,172

COLLABORATIVE DECISION MAKING

AIRBUS OPERATIONS LIMITED...

1. A method of generating decision options, the method comprising operating a computer system to:receive and store sensor data from a plurality of sensors;
present a visualisation of at least some of the sensor data to a first user;
receive and store first tag data from the first user in response to the presentation of the visualisation to the first user;
present a visualisation of at least some of the sensor data to a second user which is the same visualisation that is presented to the first user or a different visualisation;
receive and store second tag data from the second user in response to the presentation of the visualisation to the second user;
generate decision options with a computer implemented decision support algorithm in accordance with the first and second tag data, a stored operational plan, and at least some of the sensor data; and
output the decision options generated by the decision support algorithm.

US Pat. No. 10,395,171

PROVIDING EVENT-PROCESSING RULES

INTERNATIONAL BUSINESS MA...

1. A method of storing a plurality of general rules capable of representing a larger plurality of customized rules as computer readable data on computer data storage hardware in a storage space efficient manner that does not require storing all of the larger plurality of customized rules, the method comprising:determining a plurality of rule expression parameters including at least: an event field, an arithmetic operator, a first operand, and a logical operator;
determining an order for the plurality of rule expression parameters;
storing the plurality of rule expression parameters in the determined order as a particular general rule of the plurality of general rules; and
generating a first customized rule from the particular general rule at least in part by determining a first respective parameter value for each rule expression parameter of the plurality of rule expression parameters;
storing, on the computer data storage hardware, each determined first parameter value in the determined order;
generating a second customized rule from the particular general rule at least in part by determining a second respective parameter value for each rule expression parameter of the plurality of rule expression parameters;
storing, on the computer data storage hardware, each determined second parameter value in the determined order;
executing the first customized rule at least in part by calling the particular general rule and applying the particular general rule using each first respective parameter value specified by the first customized rule in accordance with the determined order; and
executing the second customized rule at least in part by calling the particular general rule a second time, shifting each rule expression parameter from a corresponding first respective parameter value specified by the first customized rule to a corresponding second respective parameter value specified by the second customized rule, and applying the particular general rule using each second respective parameter value in accordance with the determined order.

US Pat. No. 10,395,170

METHOD AND APPARATUS FOR IDENTIFYING PREPARATIONS FOR PRODUCTION OF TARGET MATERIALS

CSA Technologies Ltd., M...

1. A method for determining a probability that ingredient materials found at a scene can be used for producing a target material, the method comprising:operating a computing apparatus located at a scene to access a computerized database that comprises information relating to multiple ingredient materials and multiple target materials;
operating the computing apparatus located at the scene to receive input related to at least one ingredient material found at the scene, wherein:
the at least one ingredient material is of the multiple ingredient materials in the computerized database, and
the input is received from a source selected from the group consisting of:
an ingredient material name, an ingredient material description, a finding, and data received from spectroscopic equipment;
using at least one hardware processor for computing a non-binary material score factor from the input, the non-binary material score factor indicating a probability that the at least one ingredient material is found at the scene;
using at least one hardware processor for computing a target material score associated with a target material, the score indicative of a probability that the at least one ingredient material is used for producing the target material,
wherein the target material score is computed as a ratio between a sum of the non-binary material score factor of materials required for producing the target material and detected at the scene, and a number of ingredient materials required for producing the target material; and
displaying, on the computing apparatus located at the scene, a name of the target material.

US Pat. No. 10,395,169

SELF LEARNING NEURAL KNOWLEDGE ARTIFACTORY FOR AUTONOMOUS DECISION MAKING

GLOBAL ELMEAST INC., Sun...

1. A computer-implemented method comprising:identifying one or more knowledge domains under which one or more sets of knowledge neurons are to be organized, each knowledge domain in the one or more knowledge domains corresponding to a respective set of knowledge neurons in the one or more sets of knowledge neurons;
selecting one or more sets of domain data sources from which domain data for generating one or more sets of knowledge artifacts for the one or more knowledge domains is to be retrieved, each set of domain data sources in the one or more sets of domain data sources corresponding to a respective knowledge domain in the one or more knowledge domains, each set of knowledge artifacts in the one or more sets of knowledge artifacts corresponding to a respective knowledge domain in the one or more knowledge domains;
wherein knowledge artifacts in the one or more sets of knowledge artifacts for the one or more knowledge domains are learned from documents retrieved from a plurality of web-based data sources through machine learning with a machine learning model implemented by a computing device;
generating one or more sets of domain keywords, for the one or more knowledge domains, from the domain data retrieved from the one or more sets of domain data sources for generating the knowledge artifacts, each set of domain keywords in the one or more sets of domain keywords corresponding to a respective knowledge domain in the one or more knowledge domains;
determining one or more sets of keyword values for the one or more sets of domain keywords, each set of keyword values in the one or more sets of keyword values corresponding to a respective set of domain keywords in the one or more sets of domain keywords;
using the one or more sets of domain keywords and the one or more sets of keyword values respectively corresponding to the one or more sets of domain keywords to generate the one or more sets of knowledge artifacts to be included in the one or more sets of knowledge neurons; and
causing the one or more sets of knowledge neurons with machine learned knowledge artifacts to be used by a query processor in one or more computer devices to generate responses to query requests from client computing devices.

US Pat. No. 10,395,167

IMAGE PROCESSING METHOD AND DEVICE

BOE TECHNOLOGY GROUP CO.,...

9. An image processing device, comprising:a first Convolutional Neural Network (CNN) circuit configured to extract one or more features of an inputted first image by a first CNN, the inputted first image being inputted to the first one of the first convolutional layers, wherein the first CNN comprises a plurality of first convolutional layers connected sequentially to each other and a plurality of first pooling layers each connected to and arranged between respective adjacent first convolutional layers, and each of the first convolutional layers is configured to generate and output a first convolutional feature; and
a second CNN circuit configured to reconstruct the inputted first image and output the reconstructed image after reconstruction by a second CNN, wherein the second CNN comprises a plurality of second convolutional layers connected sequentially to each other and a plurality of second composite layers each connected to and arranged between respective adjacent second convolutional layers, and each of the second composite layers is an up-sampling layer, wherein
the number of the first convolutional layers is identical to the number of the second convolutional layers,
an outputted image from the last one of the first convolutional layers is applied to the first one of the second convolutional layers,
apart from the first one of the plurality of second convolutional layers, at least one of the second convolutional layers is configured to receive the first convolutional feature outputted from the corresponding first convolutional layer, and
an output from the second composite layer at an identical level started from the first one of the second convolutional layers is combined with the first convolutional feature outputted from the corresponding first convolutional layer to acquire a final output image data.

US Pat. No. 10,395,166

SIMULATED INFRARED MATERIAL COMBINATION USING NEURAL NETWORK

Lockheed Martin Corporati...

1. A mipping system, comprising:processing circuitry configured to:
receive combinations of a plurality of pixels N at a time, each pixel having material codes directed to respective materials of the pixels, where the material codes relate to infrared properties of the respective materials sensed by a sensor of the mipping system, and N is a positive integer greater than 1; and
train an artificial neural network having a classification space by providing respective neurons for each unique combination of material codes, and condition the artificial neural network so that the respective neurons activate when presented with their unique of material code combinations;
calculate an average value of the material codes;
replace a stored maximum value with the average value when the average value exceeds the stored maximum value;
replace a stored minimum value with the average value when the average value falls below the stored minimum value; and
normalize the material codes using the replaced maximum and minimum values;
train the artificial neural network starting with a vigilance setting of a first value; and
when the artificial neural network reaches a state in which no more new patterns are to be learned by the artificial neural network, adjust the vigilance setting of the first value to a second value that is lower than the first value and greater than zero, and retrain the artificial neural network with the vigilance setting of the second value.

US Pat. No. 10,395,165

NEURAL NETWORK UNIT WITH NEURAL MEMORY AND ARRAY OF NEURAL PROCESSING UNITS THAT COLLECTIVELY PERFORM MULTI-WORD DISTANCE ROTATES OF ROW OF DATA RECEIVED FROM NEURAL MEMORY

VIA ALLIANCE SEMICONDUCTO...

1. An apparatus, comprising:an array of N processing units (PU) each having:
an accumulator having an output;
an arithmetic unit having first, second and third inputs and that performs an operation thereon to generate a result to store in the accumulator, the first input receives the output of the accumulator;
a weight input that is received by the second input to the arithmetic unit; and
a multiplexed register having first, second, third and fourth data inputs, an output received by the third input to the arithmetic unit, and a control input that controls selection of the first, second, third and fourth data inputs;
a first memory that holds rows of N weight words and provides the N weight words of a row to the corresponding weight inputs of the N PUs of the PU array;
a second memory that holds rows of N data words and provides the N data words of a row to the corresponding first data inputs of the multiplexed register of the N PUs of the PU array;
wherein the output of the multiplexed register is also received by:
the second data input of the multiplexed register of a PU one PU away;
the third data input of the multiplexed register of a PU 2  J PUs away, wherein J is an integer greater than 1; and
the fourth data input of the multiplexed register of a PU 2 K PUs away, wherein K is an integer greater than J;
wherein the multiplexed registers of the N PUs collectively operate as an N-word rotater that rotates by one word when the control input specifies the second data input;
wherein the multiplexed registers of the N PUs collectively operate as an N-word rotater that rotates by 2 J words when the control input specifies the third data input; and
wherein the multiplexed registers of the N PUs collectively operate as an N-word rotater that rotates by 2 K words when the control input specifies the fourth data input.

US Pat. No. 10,395,164

FINGERPRINT SENSING MODULE AND METHOD FOR MANUFACTURING THE FINGERPRINT SENSING MODULE

1. A fingerprint sensing module comprising:a fingerprint sensor device having a sensing array arranged on a first side of the device, the sensing array comprising an array of fingerprint sensing elements, wherein said fingerprint sensor device comprises connection pads arranged on said first side of said fingerprint sensing device for connecting said fingerprint sensor device to external circuitry;
a fingerprint sensor device cover structure arranged to cover said fingerprint sensor device, said cover structure having a first side configured to be touched by a finger, thereby forming a sensing surface of said sensing module, and a second side facing said sensing array, wherein said cover structure comprises conductive traces arranged on the second side of the cover structure, for electrically connecting said fingerprint sensing module to external circuitry, and wherein a surface area of said cover structure is larger than a surface area of said sensor device; and
a carrier having a first side attached to a second side of said fingerprint sensor device, opposite of said first side of said fingerprint sensor device;
wherein said fingerprint sensor device further comprises wire-bonds electrically connecting said connection pads of said fingerprint sensor device to said conductive traces of said cover structure, said wire-bonds comprising:
wire-bonds between said connection pads of said fingerprint sensor device and said first side of said carrier, and
wire-bonds arranged between a second side of said carrier, opposite of said first side of said carrier, and said conductive traces of said cover structure.

US Pat. No. 10,395,163

METAL CHIP CARD CAPABLE OF SUPPORTING RADIO FREQUENCY COMMUNICATION AND PAYMENT

Hightec Technology Co., L...

1. A metal chip card supporting radio frequency communication and payment, wherein, an antenna circuit module of the metal chip card supporting radio frequency communication and payment comprises a flexible printed circuit/printed circuit board assembly (FPC/PCBA) antenna circuit board, an IC chip, a chip sealing adhesive and a two-side gold-plated touch electrode, an ultrathin ferrite wave absorption electromagnetic shielding layer is stuck below the antenna circuit module, the two-side gold-plated touch electrode is disposed on a surface of the FPC/PCBA antenna circuit board, and the antenna circuit module and a metal substrate which is provided with a milled groove and an inner wall of which is coated with a hot melt adhesive layer are packaged into the metal chip card by means of hot pressing,wherein a lower surface of the FPC/PCBA antenna circuit board is stuck with the IC chip and the sealing adhesive used for fixing and protecting gold wire solder joints.

US Pat. No. 10,395,162

ULTRA-LOW POWER AND COST PURELY ANALOG BACKSCATTER SENSORS WITH EXTENDED RANGE SMARTPHONE/CONSUMER ELECTRONICS FM RECEPTION

1. A device comprising:an antenna configured to receive and backscatter a RF signal;
a sensing element;
a base (first) oscillator coupled to the sensing element;
a modulation (second) oscillator configured to be controlled by the base oscillator;
and an impedance modulator coupled to the antenna and controlled by the modulation oscillator.

US Pat. No. 10,395,161

REMOTE KEYLESS ENTRY SYSTEM

1. A remote keyless entry system comprising; a lock assembly including: a movable latch bolt; a motor; wherein said motor is mechanically connected to said latch boll and adapted to move said latch bolt between a locked position and an unlocked position; a battery; wherein said battery is electronically connected to said motor; a receiver; wherein said receiver is adapted to receive electronic signals from a remote transmitter wherein said receiver is electronically connected to said battery and said motor and adapted to control said motor and thereby move said latch bolt between said locked position and said unlocked positions; and wherein said receiver is adapted to receive signals from said transmitter within a predetermined range; a lock controller comprising: a housing; wherein said housing forms a hollow interior volume; a battery; wherein said battery is located within said interior volume; and a transmitter; wherein said transmitter is located within said interior volume and is electrically connected to said battery member; and wherein said transmitter is adapted to send electronic signals to said receiver of said lock assembly; wherein said lock controller is adapted to remotely unlock said lock assembly when within said predetermined range; wherein said housing is formed having an adjustable hand adapted to fit over a person's finger; wherein the housing has an opening on an inside to house the electronics including at least the battery and the transmitter and a lid to be placed on the opening on the inside.

US Pat. No. 10,395,160

IDENTIFIER DEVICE

Mysphera, S.L., Paterna ...

1. An identification device that can be adjustably attached to an object or person whose identity is to be monitored, the identification device (11) comprising(a) an electrically conductive identification strap (12) having an outside surface that is an electrical insulator and an interior beneath the outside surface comprising an electrically conductive doped rubber;
(b) an electrically conductive locking member (21) made from an elongate strip of flexible material (22) comprising an orifice (23) at one end of the elongate strip and a protruding mechanical locking projection (24) at an opposite end of the elongate strip, the elongate strip being constructed and arranged to allow pivoting of the locking projection between an open position, wherein the locking projection (24) is not inserted through the orifice (23) at the one end of the elongate strip, and a working or closed position wherein the locking projection (24) is inserted through both the orifice (23) at the one end of the elongate strip and through the strap at any one of a plurality of positions to form an adjustable circular attachment of the identification strap (12) around a predetermined part of the object or person whose location is to be monitored and also to form a closed electrical circuit when the electrically conductive identification strap (12) and the locking member (21) are both in the working or closed position, the closed electrical circuit being formed by the locking projection contacting the electrical conductive doped rubber in the interior of the identification strap; and
(c) a first wireless communications transceiver module (31) adapted to establish communication with at least a second transceiver module (31) mounted in a different identification device (11) attached to a different object or person.

US Pat. No. 10,395,159

UNIT LOAD DEVICE TRACKING TAG

ACL Airshop, LLC, Easley...

1. A unit load device tracking tag, comprising:a base having a plurality of studs, the plurality of studs of the base configured such that the plurality of studs of the base is receivable within an aircraft seat track;
a tag housing mounted to the base such that the tag housing is translatable relative to the base between an extended position and a retracted position, the tag housing having a plurality of studs, the plurality of studs of the tag housing configured such that each stud of the plurality of studs of the tag housing is received within a respective mounting seat hole of the aircraft seat track in the extended position; and
a tag positioned within the tag housing, the tag operable to transmit one or more signals to a tag reader.

US Pat. No. 10,395,158

METHOD FOR MAKING AN ANTI-CRACK ELECTRONIC DEVICE

GEMALTO SA, Meudon (FR)

1. A method for manufacturing an intermediate electronic-device for a device having an electronic module covered with a cover sheet or layer, said method comprising a step of forming a carrier body comprising:a cavity formed in the carrier body and extending through opposed outer surfaces of the carrier body,
an electrical circuit inside the cavity, said electrical circuit comprising a conductive path and at least one electrical interconnection area electrically connected to said conductive path,
an electronic module comprising a protective coating and at least one connection pad connecting said interconnection area, said electronic module, including said at least one connection pad, being disposed in the cavity,
a cover sheet or layer disposed outside the cavity and covering said electronic module from outside the cavity, and
a space or gap existing at the interface between the module and the cavity formed in the carrier body,
wherein the space or gap is at least partially filled by a conductive material arranged in the device in contact with the at least one electrical interconnection area and the at least one connection pad.

US Pat. No. 10,395,157

SMART CARD MODULE ARRANGEMENT, SMART CARD, METHOD FOR PRODUCING A SMART CARD MODULE ARRANGEMENT AND METHOD FOR PRODUCING A SMART CARD

Infineon Technologies AG,...

1. A method for producing a smart card module arrangement, the method comprising:arranging a smart card module on a first carrier layer, wherein the first carrier layer is free of a prefabricated smart card module receptacle cutout for receiving the smart card module, and wherein the smart card module comprises:
a substrate;
wherein the substrate comprises a first side and a second side,
wherein the second side of the substrate is opposite the first side,
a chip on the substrate;
a first mechanical reinforcement structure arranged on the first side, between the chip and the substrate, wherein the first mechanical reinforcement structure covers at least one part of a surface of the chip; and
a second mechanical reinforcement structure arranged on the second side, wherein the second mechanical reinforcement structure covers at least one part of the chip;
applying a second carrier layer to the smart card module, wherein the second carrier layer is free of a prefabricated smart card module receptacle cutout for receiving the smart card module; and
at least one of laminating or pressing the first carrier layer with the second carrier layer, such that the smart card module is enclosed by the first carrier layer and the second carrier layer.

US Pat. No. 10,395,156

CARDS, DEVICES, SYSTEMS, METHODS AND DYNAMIC SECURITY CODES

DYNAMICS INC., Pittsburg...

1. A device comprising:a signal generator operable to generate a signal selected from a timing signal, a counter signal, a random number generator signal, and combinations thereof;
a memory operable to store at least a first data set, a second data set, and a third data set;
a processor operable to generate a fourth data set based on at least one selected from the first data set, the second data set, and the third data set, and to determine a first code based on the fourth data set and the signal; and
a communication interface operable to communicate information associated with the signal and at least a portion of at least one selected from the first data set, the second data set, the third data set, the fourth data set, and the first code to a processing entity.

US Pat. No. 10,395,155

BILLBOARD CONTAINING ENCODED INFORMATION

1. A billboard containing encoded information, the billboard comprising:a billboard body having a front face presenting advertisement content;
a plurality of color blocks, the plurality of color blocks being distributed in a preset mode on the front face and each of which individually covering a part of the front face,
wherein the plurality of color blocks are encoded as color geometric graphic code elements and the entire front face can be optically identified and decoded to obtain the encoded information when captured by a mobile terminal, and wherein the encoded information, or the information decoded by the mobile terminal and imported to a web page, is associated with the advertisement content.

US Pat. No. 10,395,154

DIGITAL LABEL AND ASSET TRACKING INTERFACE

GENERAL ELECTRIC COMPANY,...

1. A product information display device for application to a product, the product information display device comprising:a controller;
a non-transitory electronic memory unit operably connected to, the controller and configured to store product information therein;
a securing mechanism configured to secure the device to a surface of the product; and
a display operably connected to the controller and configured to present the product Information thereon wherein the controller includes a transceiver, and wherein the memory unit retains and stores updated product information from the transceiver on newly installed components on the product for presentation on the label,
wherein the controller includes at least one sensor, and
wherein the display device is further configured to obtain and provide real-time usage and performance data of the product and environmental condition data of the product from the at least one sensor on the display.

US Pat. No. 10,395,153

DURABLE CARD

COMPOSECURE, LLC, Somers...

1. A process for forming a card, the process comprising the steps of:forming a first core subassembly comprised of two or more layers which include one or more elements that define functionality of the card, said first core subassembly having a top layer and a bottom layer;
forming a second subassembly including a hard coat layer attached to a release layer mounted on a carrier layer;
attaching the second subassembly to the top layer of the of the first core subassembly so the hard coat layer is closest to the first core assembly to form a first card assembly;
laminating the first card assembly under predetermined temperature and pressure such that the carrier layer imparts a finish to the hard coat layer of the card; and
removing the release layer and the carrier layer to form a resultant card.

US Pat. No. 10,395,152

AMASSING PICK AND/OR STORAGE TASK DENSITY FOR INTER-FLOOR TRANSFER

Amazon Technologies, Inc....

1. A method comprising:instructing retrieval of a first storage rack from a storage area of a storage floor to a consolidation area of the storage floor based on the first storage rack bearing a first container including a first inventory item designated for removal from the first container on a processing floor, the processing floor being separate from the storage floor;
instructing transfer of the first container including the first inventory item from the first storage rack to a transfer rack in the consolidation area;
instructing retrieval of a second storage rack from the storage area of the storage floor to the consolidation area of the storage floor based on the second storage rack bearing a second container including a second inventory item designated for removal from the second container on the processing floor;
instructing transfer of the second container including the second inventory item from the second storage rack to the transfer rack in the consolidation area;
instructing movement of the transfer rack to the processing floor;
instructing movement of the first container including the first inventory item from the transfer rack to a first shuttle rack to facilitate movement to a destination on the processing floor for removal of the first inventory item from the first container; and
instructing movement of the second container including the second inventory item from the transfer rack to a second shuttle rack to facilitate movement to a destination on the processing floor for removal of the second inventory item from the second container.

US Pat. No. 10,395,151

SYSTEMS AND METHODS FOR LOCATING GROUP MEMBERS

Symbol Technologies, LLC,...

1. A method for tracking individuals within a venue, the method comprising:grouping, with at least one processor, a set of wearable articles, each of the wearable articles comprising a radio frequency identification (RFID) tag;
receiving, from an RFID positioning system within the venue, RFID position data indicating a location for each wearable article in the set of wearable articles;
detecting, based on the RFID position data, that a first wearable article within the set of wearable articles is no longer within a permitted location of the venue; and
transmitting, using the at least one processor, an alert to a mobile device associated with a second wearable article within the set of wearable articles,
wherein the permitted location is a proximity to another wearable article; and
wherein detecting that the first wearable article is no longer within the permitted location of the venue comprises detecting, based on the RFID position data, that a distance between the first wearable article and another wearable article within the set of wearable articles exceeds a threshold distance.

US Pat. No. 10,395,150

PRINTING CONTROL APPARATUS, CONTROL METHOD OF PRINTING CONTROL APPARATUS, AND PROGRAM

Seiko Epson Corporation, ...

1. A printing control apparatus that controls a printing apparatus executing printing based on print data, comprising:a storage unit having a nonvolatile memory in which reading and writing are executed in n cell units (n is 2 or more);
a writing unit that writes the print data to the nonvolatile memory;
a reading unit that reads the print data from the nonvolatile memory;
a measuring unit that measures a cumulative amount of the print data written in the nonvolatile memory;
a reporting unit that reports information; and
a control unit that controls erasing of the print data that have been printed from the nonvolatile memory according to a read state of the reading unit and causes the writing unit to write new print data,
wherein the reporting unit reports information on a reduction in a printing speed of the printing apparatus in a case where the cumulative amount measured by the measuring unit is equal to or more than a predetermined amount.

US Pat. No. 10,395,149

IMAGE FORMING APPARATUS HAVING PRINT JOB TIME DISPLAY AND IMAGE QUALITY ADJUSTMENT CONTROL

CANON KABUSHIKI KAISHA, ...

1. An image forming apparatus, comprising:a printer configured to form an image on a sheet;
a display configured to display a remaining time in which a print job is not performed by the printer in a case where an image quality adjustment control for adjusting a parameter of the printer is performed, the remaining time being counted down;
a processor configured to execute instructions to:
perform a first image quality adjustment control;
perform a second image quality adjustment control different from the first image quality adjustment control;
control whether or not to perform the first image quality adjustment control repeatedly;
determine the remaining time based on a first time corresponding to the first image quality adjustment control and a second time corresponding to the second image quality adjustment control in a case where the first image quality adjustment control and the second image quality adjustment control are continuously performed after the printer finishes performing a print job, wherein the processor determines again the remaining time based on the second time before the second image quality adjustment control is performed in the case where the first image quality adjustment control and the second image quality adjustment control are continuously performed after the printer finishes performing the print job; and
determine the remaining time based on a third time corresponding to the first image quality adjustment control and the second time corresponding to the second image quality adjustment control in a case where the first image quality adjustment control and the second image quality adjustment control are continuously performed by interrupting a print job, the third time being shorter than the first time, wherein the processor determines again the remaining time based on the second time before the second image quality adjustment control is performed in the case where the first image quality adjustment control and the second image quality adjustment control are continuously performed by interrupting the print job.

US Pat. No. 10,395,148

METHOD FOR TRANSMITTING PRINT DATA, SERVER AND MOBILE TERMINAL

CORTADO AG, Berlin (DE)

1. A server comprising an virtual desktop, VD, application installed and executed on the server,wherein the VD application is configured to display a graphic user interface for the application on a screen of a mobile terminal,
wherein the VD application is controlled by the mobile terminal by way of keyboard or a pointing device of the mobile terminal
for generating first data in the context of the VD application to be stored on the server or
for modifying first data stored on the server in the context of the VD application and
to generate from the first data on the server from within the VD application print data for printing on the printer,
wherein the VD application is unable to access second data stored locally on the mobile terminal,
wherein the server or another server notifies the mobile terminal, after the print data have been generated, that the print data are available for forwarding, via the mobile terminal, to a printer connected to the mobile terminal.

US Pat. No. 10,395,147

METHOD AND APPARATUS FOR IMPROVED SEGMENTATION AND RECOGNITION OF IMAGES

RAKUTEN, INC., Tokyo (JP...

1. A method of determining a floorplan using a specially programmed machine, the machine comprising and a processor, a memory and a display, in communication with one another, the method comprising:obtaining a first floorplan image into said machine;
obtaining semantic segmentation data of the floorplan image;
obtaining optical character recognition (OCR) data for the floorplan image;
using the machine to compare the results of the OCR data to the semantic segmentation data with respect to a room size; and
outputting a second floorplan image based on a result of the comparison.

US Pat. No. 10,395,146

FACE RECOGNITION IN BIG DATA ECOSYSTEM USING MULTIPLE RECOGNITION MODELS

International Business Ma...

1. A computer-implemented method of training a facial recognition modeling system using an extremely large data set of facial images, the method comprising:distributing a plurality of facial recognition models across a plurality of nodes within the facial recognition modeling system; and
optimizing a facial matching accuracy of the facial recognition modeling system by increasing a facial image set variance among the plurality of facial recognition models, wherein, to optimize the facial matching accuracy of the facial recognition modeling system, the program code when executed is further operable to:
match each facial image of the data set of facial images with at least one of the facial recognition models;
determine the least closely matching facial image associated with a maximum eigenvector distance between the facial image and each most closely matching facial image of the plurality of facial recognition models; and
insert a facial image of the data set of facial images into a facial recognition model of the plurality of facial recognition models, wherein the facial recognition model is associated with a least closely matching facial image.

US Pat. No. 10,395,145

DEDUPLICATION RATIO ESTIMATION USING REPRESENTATIVE IMAGES

International Business Ma...

1. A method, executed by one or more processors, the method comprising:receiving a set of representative machine image regions for a computing environment wherein the set of representative machine image regions collectively comprise a set of representative image chunks;
generating a fingerprint for each representative image chunk within the set of representative image chunks to produce a set of representative fingerprints;
generating a fingerprint for selected image chunks within a measured machine image region to produce a set of sampled fingerprints;
determining a deduplication metric for the measured machine image region based on the representative fingerprints and the sampled fingerprints; and
determining an overall deduplication metric for the representative machine image regions and a plurality of measured machine image regions, wherein determining the overall deduplication metric is conducted according to the formula r=?(di*ci*si)/?(si), where si is the size of an image region i, di is a deduplication ratio of the image region i, ci is a compression ratio of the image region i, and the summation operations ? are conducted over all of the image regions i in the plurality of measured machine image regions.

US Pat. No. 10,395,144

DEEPLY INTEGRATED FUSION ARCHITECTURE FOR AUTOMATED DRIVING SYSTEMS

GM GLOBAL TECHNOLOGY OPER...

1. A sensor fusion system for an autonomous driving system, comprising:a sensor system for providing environment condition information;
a camera for providing camera data;
a range data processing unit configured to receive the environment condition information and produce a range data map; and
a convolutional neural network comprising:
a receiving interface configured to receive the environment condition information, from the sensor system and to receive the camera data from the camera,
a common convolutional layer configured to, by a processor, extract traffic information from the camera data based on the range data map and to produce a plurality of feature maps associated with the traffic information,
a plurality of fully connected layers configured to, by a processor, detect objects belonging to different object classes based on the extracted traffic information and the range data map, wherein the object classes include at least one of a road feature class, a static object class, and a dynamic object class;
an environment representation layer configured to, by a processor, provide environment information; and
an object-level fusion layer is configured to, by a processor, track the detected objects by fusing information from the range data map and data from the environment representation layer and to provide estimates for the position and velocity of the tracked objects, perform fusion in a free-space representation using the range data map and the plurality of feature maps to produce a fused free-space output, and perform fusion in stixel representation using the range data map and camera data the plurality of feature maps to produce fused stixels.

US Pat. No. 10,395,143

SYSTEMS AND METHODS FOR IDENTIFYING A TARGET OBJECT IN AN IMAGE

International Business Ma...

1. A computer implemented method of identifying a plurality of target objects in a digital image, the method comprising:receiving a digital image including a plurality of target objects;
extracting a plurality of query descriptors from a respective plurality of locations in the digital image;
comparing each one of said plurality of query descriptors with a plurality of training descriptors for identifying a plurality of matching training descriptors, each one of the plurality of training descriptors is associated with one of a plurality of reference object identifiers and with relative location data comprising an estimated distance and an estimated direction from a center point of a reference object indicated by the respective associated reference object identifier from the plurality of reference object identifiers;
computing a plurality of object-regions of the digital image by clustering the query descriptors having common center points defined by the matching training descriptors, each object-region approximately bounding one target object of the plurality of target objects of the digital image, each object-region is associated with another common center point of said common center points and with a scale relative to a reference object size,
wherein each of the plurality of object-regions is computed independently of the respective reference object identifier associated with said each of the plurality of object-regions; and
classifying the bound target object of each object-region of the plurality of object-regions according to the reference object identifier of a respective cluster according to a statistically significant correlation requirement between a common center point of the respective cluster and the center point of the reference object associated with the reference object identifier of the respective cluster;
wherein the comparing is performed by finding a set of Euclidean nearest neighbors of the respective extracted query descriptors, wherein each member of the set of Euclidean nearest neighbors is one of the plurality of matching training descriptors;
wherein the set of Euclidean nearest neighbors are identified for a first subset of the extracted query descriptors, wherein a second subset of extracted query descriptors are unmatched, wherein for each member of the second subset of extracted query descriptors that are unmatched, a matching training descriptor is computed such that the difference between the center point of the relative location data of the identified matching training descriptors and the center point of the relative location data of the computed training descriptor matched to the unmatched second subset of query descriptors is equal to the difference between the location relative location of the query descriptor matched to the identified matching training descriptor and the location relative location of the unmatched second subset of query descriptors for which the matching training descriptor is computed.

US Pat. No. 10,395,142

METHOD AND A SYSTEM FOR IDENTIFYING REFLECTIVE SURFACES IN A SCENE

Infinity Augmented Realit...

1. A method comprising:sensing at least one image of a scene containing surfaces and objects;
maintaining an objects database of the scene which stores approximate positions of at least some portions of some of the objects in the scene;
recognizing that at least a portion of one of the objects in the scene in the at least one image is not located at the approximate position associated with the stored object in the database;
attempting to obtain a reflective surface representation for one or more candidate reflective surfaces selected from the surfaces in the scene by back ray tracking at least one optical path from the recognized portion of the object in the scene in the at least one image to the stored approximate position associated with the object stored in the database; and
in a case obtaining the at least one optical path from the recognized portion of the object in the scene to the stored approximate position associated with the object in the database is successful, determining that at least one candidate reflective surface is a reflective surface defined by the obtained reflective surface representation.

US Pat. No. 10,395,141

WEIGHT INITIALIZATION FOR MACHINE LEARNING MODELS

SAP SE, Walldorf (DE)

1. A system, comprising:at least one data processor; and
at least one memory storing instructions which, when executed by the at least one data processor, result in operations comprising:
processing an image set with a convolutional neural network configured to detect, in the image set, a first feature and a second feature;
determining a first effectiveness of the first feature and a second effective of the second feature, the first effectiveness of the first feature corresponding to a first quantity of images in the image set the convolutional neural network is able to classify based on the presence of the first feature, and the second effectiveness of the second feature corresponding to a second quantity of images in the image set the convolutional neural network is able to classify based on the presence of the second feature;
determining, based at least on the first effectiveness of the first feature and the second effectiveness of the second feature, a first initial weight for the first feature and a second initial weight for the second feature; and
initializing the convolutional neural network prior to training the convolutional neural network, the initialization of the convolutional neural network comprising configuring the convolutional neural network to apply, during the training of the convolutional neural network, the first initial weight and the second initial weight.

US Pat. No. 10,395,139

INFORMATION PROCESSING APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT

Kabushiki Kaisha Toshiba,...

1. An information processing apparatus comprising:a memory; and
processing circuitry configured to:
acquire an input image captured by an image-capturing device installed in a specific location;
perform adaptation processing of adapting an estimation model, which is used for detecting positions or the number of objects contained in an image, to the specific location by sequentially selecting a parameter of the estimation model from a lower level toward a higher level, and by modifying the selected parameter in such a manner to reduce an estimation error in the positions or the number of the objects contained in the input image;
acquire a termination condition for the adaptation processing; and
terminate the adaptation processing when the termination condition is satisfied.

US Pat. No. 10,395,138

IMAGE SEGMENTATION USING USER INPUT SPEED

Microsoft Technology Lice...

1. An image segmentation apparatus comprising:a processor which receives user input specifying a boundary of a region of interest of an image;
the processor determining speed of the user input;
the processor configured to act as a segmentation component which maps the speed of the user input to a width of an area associated with the boundary of the region of interest, wherein the width changes based on a change in speed of the user input, and
the segmentation component configured to extract training data from the image based on the area, and to train a segmentation model using the extracted training data, the training data comprising image elements labeled as being in the region of interest taken from the image within a first range of one side of the area and image elements labeled as being not in the region of interest taken from the image within a second range of another side of the area; and
the segmentation component configured to process image elements of the area using the trained segmentation model in order to compute an indication whether the image elements are to be assigned to the region of interest or not.

US Pat. No. 10,395,136

IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND RECORDING MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An image processing apparatus comprising:a memory; and
a processor in communication with the memory, the processor configured to provide:
a segmentation unit configured to segment a learning image into a plurality of regions for learning;
a first learning unit configured to learn a first region identifier for identifying a class of a region in an input image based on first training data;
an evaluation unit configured to evaluate a result of identification of a class of the first training data by the first region identifier;
a generation unit configured to generate second training data by dividing the first training data into correct data and incorrect data based on an evaluation result by the evaluation unit, dividing the incorrect data into a plurality of categories, and combining the incorrect data divided into the plurality of categories with the correct data; and
a second learning unit configured to learn a plurality of second region identifiers different from the first region identifier based on the second training data,
whereby the image processing apparatus is configured to generate the first and second region identifiers so as to improve region identification accuracy and accurately identify images in a case where image features vary due to a change of an imaging condition.

US Pat. No. 10,395,135

METHOD AND A SYSTEM FOR DETERMINING RADIATION SOURCES CHARACTERISTICS IN A SCENE BASED ON SHADOWING ANALYSIS

Infinity Augmented Realit...

1. A method comprising:sensing at least one image of a scene containing surfaces and objects, wherein the scene is illuminated by at least one distinct radiation source;
maintaining a database of the scene which stores approximate positions of at least portions of at least some of the objects in the scene;
identifying at least one candidate silhouette, in the at least one image sensed by a sensing device, that is suspected to be cast by the at least one distinct radiation source; and
deriving properties of the at least one distinct radiation source, based on the at least one identified silhouette, based on data derived from the database.

US Pat. No. 10,395,134

EXTRACTION OF SPECTRAL INFORMATION

University of Utah Resear...

17. A method for determining a spectral distribution of incident light, the method comprising:passing incident light through a spectrum selective element;
collecting the spectral distribution of the incident light via a sensor;
representing the spectral distribution of the incident light as a sum of known spectral components after the incident light passes through the spectrum selective element, the known spectral components being associated with unknown weighting factors;
determining a signal from the sensor at each color pixel of the spectrum selective element using, in part, the sum of known spectral components, wherein the unknown weighting factors are represented by a set of preliminary weighting values;
calculating an error associated with the signal at each color pixel of the spectrum selective element; and
performing one or more perturbations on each of the preliminary weighting values and recalculating the error associated with the signal at each color pixel of the spectrum selective element, wherein the perturbations on each of the preliminary weighting values are repeated until the error stabilizes within a predetermined range in order to assign the stabilized preliminary weighting values to the spectral components in the incident light.

US Pat. No. 10,395,133

IMAGE BOX FILTERING FOR OPTICAL CHARACTER RECOGNITION

Open Text Corporation, W...

1. A method for box filtering comprising:obtaining, by a computing device, a form image, the obtained from image comprising a plurality of boxes and image content in the plurality of boxes;
identifying, by the computing device, a region of the obtained form image comprising the plurality of boxes included in the obtained form image;
loading a set of box removal parameters, the box removal parameters comprising a box type, sliding window, and a width parameter;
detecting a plurality of vertical lines in the region of the obtained form image from a plurality of pixels in the region, the plurality of pixels comprising pixels representing the plurality of vertical lines, wherein each vertical line in the plurality of verticals lines is detected from a respective summation of pixels in the sliding window that comply with a color requirement;
detecting, by the computing device, the plurality of boxes in the region according to the box type, detected plurality of vertical lines and the width parameter;
extracting, by the computing device, image content from the plurality of boxes; and
generating a preprocessed form with the plurality of boxes removed, the preprocessed form including the image content extracted from the plurality of boxes.

US Pat. No. 10,395,132

ELECTRONIC DEVICE FOR EXTRACTING DISTANCE OF OBJECT AND DISPLAYING INFORMATION AND METHOD THEREOF

Samsung Electronics Co., ...

1. A method of operating an electronic device, the method comprising:executing a camera application installed in the electronic device;
while the camera application is executed, extracting relative distance information for each of at least two external objects using distributed pixels on a sensor of the electronic device, wherein the relative distance information for each of the at least two external objects indicates relative information by distances between each of the at least two external objects and the electronic device;
displaying, in a display of the electronic device, an image including at least two objects corresponding to the at least two external objects, the image photographed by the executed camera application;
determining a relative value for each of the displayed at least two objects based on the extracted relative distance information and object analysis information, wherein the object analysis information includes contrast distribution information for each of the displayed at least two objects;
determining an object with a smallest relative value among the at least two objects classified according to the relative values; and
inserting and displaying, in a specific region of the displayed image in which the object with the smallest relative value is included, one or more contents with which picture in picture (PIP) functionalities are performed.

US Pat. No. 10,395,131

APPARATUS, METHOD AND NON-TRANSITORY STORAGE MEDIUM FOR CHANGING POSITION COORDINATES OF A CHARACTER AREA STORED IN ASSOCIATION WITH A CHARACTER RECOGNITION RESULT

CANON KABUSHIKI KAISHA, ...

1. An apparatus comprising:a memory; and
at least one processor in communication with the memory, wherein the at least one processor executes:
identifying a character area corresponding to each character included in an image;
performing character recognition processing for each of the identified character areas to obtain character recognition results;
storing the obtained character recognition results in association with position coordinates of each of the character areas;
determining a specific character from the stored character recognition results;
changing position coordinates of the character area being stored in association with the determined specific character to extend the character area corresponding to the determined specific character;
displaying the image on a display;
acquiring a range selected by a user in the image displayed on the display; and
outputting, based on the results of the character recognition processing stored in association with the position coordinates of each of the characters after the changing, character recognition results corresponding to a plurality of character areas included in the selected range.

US Pat. No. 10,395,130

FINGERPRINT REGISTRATION METHOD AND DEVICE AND TERMINAL THEREOF

Guangdong Oppo Mobile Tel...

1. A fingerprint registration method performed by a mobile terminal, the fingerprint registration method comprising:receiving a registered fingerprint image input at an Nth time by a user and retrieving feature points of the registered fingerprint image input at the Nth time, wherein N is a positive integer;
determining whether the registered fingerprint image input at the Nth time and registered fingerprint images input at N?1 times belong to a same finger based on the feature points of the registered fingerprint image input at the Nth time and feature points of the registered fingerprint images input at the N?1 times previous to the Nth time;
adding the registered fingerprint image input at the Nth time to a candidate collection of registered fingerprint images if the registered fingerprint image input at the Nth time and the registered fingerprint images input at the N?1 times belong to the same finger, wherein a fingerprint template is generated correspondingly based on registered fingerprint images in the candidate collection of registered fingerprint images; and
receiving a next registered fingerprint image input at an (N+1)th time by the user, if N is less than a predetermined threshold value and the registered fingerprint image input at the Nth time and the registered fingerprint images input at the N?1 times belong to the same finger.

US Pat. No. 10,395,129

DYNAMIC REGISTRATION SEED

IDEX ASA, Fornebu (NO)

1. A machine-implemented method for evolving a trusted template using a set of post-registration information, the trusted template including a set of trusted template elements defined from a pattern with the set of trusted template elements, the method comprising:a) defining, during a trusted mode, a set of evolvable seeds from the pattern, said set of evolvable seeds including at least two evolvable seeds, each said evolvable seed having an initial area including an initial portion of the pattern;
b) including said set of evolvable seeds in the set of trusted template elements;
c) applying, during a semi-trusted mode, a metric to choose which evolvable seeds to evolve from said set of evolvable seeds; and
d) evolving, during the semi-trusted mode, the chosen evolvable seeds of said set of evolvable seeds responsive to the set of post-registration information with each evolvable seed producing an evolved seed dependent on an order in which the post registration information is applied to that evolvable seed, each particular said evolved seed having a particular evolved area larger than said initial area of said particular evolved seed, said evolved area including an additional portion of the pattern not included in said initial area of said particular evolvable seed.

US Pat. No. 10,395,128

IMPLEMENTATION OF BIOMETRIC AUTHENTICATION

Apple Inc., Cupertino, C...

1. An electronic device, comprising:one or more biometric sensors;
a display;
one or more processors; and
memory storing one or more programs configured to be executed by the one or more processors, the one or more programs including instructions for:
displaying, on the display, a biometric enrollment user interface for enrolling a biometric feature, wherein displaying the biometric enrollment user interface includes displaying a representation of the biometric feature, wherein the appearance of the representation of the biometric feature changes as the orientation of the biometric feature relative to the one or more biometric sensors changes;
while displaying the biometric enrollment user interface:
enrolling a portion of the biometric feature; and
after enrolling the portion of the biometric feature, detecting that enrollment-prompt criteria have been met with respect to one or more portions of the biometric feature;
in response to detecting that the enrollment-prompt criteria have been met with respect to one or more portions of the biometric feature, outputting a respective prompt to move the biometric feature in a respective manner, wherein the respective prompt is selected based on an enrollment state of one or more portions of the biometric feature and is displayed concurrently with the representation of the biometric feature in the biometric enrollment user interface, including:
in accordance with a determination that the enrollment-prompt criteria have been met with respect to a first portion of the biometric feature that can be enrolled by moving the biometric feature in a first manner, outputting the respective prompt includes outputting a prompt to move the biometric feature in the first manner; and
in accordance with a determination that the enrollment-prompt criteria have been met with respect to a second portion of the biometric feature, different from the first portion of the biometric feature, that can be enrolled by moving the biometric feature in a second manner, different from the first manner, outputting the respective prompt includes outputting a prompt to move the biometric feature in the second manner;
while maintaining display of the biometric enrollment user interface including the representation of the biometric feature, detecting movement of the biometric feature; and
in response to detecting movement of the biometric feature and while continuing to display the representation of the biometric feature in the biometric enrollment user interface, enrolling one or more additional portions of the biometric feature.

US Pat. No. 10,395,127

STATE PREDICTION DEVICE AND STATE PREDICTION METHOD

1. A state prediction device, comprising:a sensor information acquisition unit that acquires first sensor information that is obtained with observation of a state of an observation object at a first time by a periphery monitoring sensor;
a purpose attribute storage unit that stores a purpose attribute that shows a use purpose or an observation purpose of the observation object and a purpose attribute that shows a use purpose or an observation purpose of an environmental factor that affects the state change of the observation object;
an object identification unit that identifies the kind of the observation object based on the first sensor information, reads a purpose attribute corresponding to an identified kind of the observation object from the purpose attribute storage unit, identifies the kind of the environmental factor based on the first sensor information, and reads a purpose attribute corresponding to an identified kind of the environmental factor from the purpose attribute storage unit;
a finite state series storage unit that stores a finite state series that corresponds to the kind of the observation object and specifies a series of a plurality of state changes accompanying the time course; and
a state prediction unit that retrieves and selects plural finite state series corresponding to the kind of the observation object from the finite state series storage unit, reduces the selection number of the plural finite state series to be retrieved, based on the purpose attribute of the observation object and the purpose attribute of the environmental factor, acquires an observation value obtained by observation of the observation object, corrects the reduced finite state series based on the observation value, and outputs the corrected finite state series as a state prediction.

US Pat. No. 10,395,126

SIGN BASED LOCALIZATION

Honda Motor Co., Ltd., T...

1. A system for sign based localization, comprising:a sensor component mounted to a vehicle, the sensor component capturing an image of an operating environment around the vehicle;
an extraction component:
extracting one or more text candidates from the image, wherein a text candidate of the one or more text candidates comprises a plurality of points;
detecting one or more line segments within the image, wherein a line segment of the one or more line segments comprises a plurality of points;
filtering one or more of the detected line segments based on proximity of two points of the plurality of points of the detected line segments to one point of the plurality of points of the extracted text candidates to select one or more filtered line segments having proximity of the two points being less than a threshold, wherein the proximity defines a distance from one point of the plurality of points of a text candidate to one point of the plurality of points of a detected line segment; and
defining one or more quadrilateral candidates based on one or more of the extracted text candidates, one or more of the filtered line segments, and one or more intersections of respective line segments;
a candidate component determining one or more sign candidates for the image based on one or more of the quadrilateral candidates and one or more of the extracted text candidates;
a communication component communicating with a localization database and matching one or more of the sign candidates against one or more reference images stored in the localization database; and
a localization component determining a location of the vehicle based on a match between one or more of the sign candidates and one or more of the reference images.

US Pat. No. 10,395,125

OBJECT DETECTION AND CLASSIFICATION WITH FOURIER FANS

SMR PATENTS S.A.R.L., Lu...

1. A system comprising:an image sensor configured to capture an image from an environment surrounding the system, the image from the environment surrounding the system including one or more keypoints;
extracting circuitry communicatively coupled to the image sensor and configured to extract at least one feature value from at least one of the one or more keypoints in the image from the environment surrounding the system;
query point evaluation circuitry communicatively coupled to the image sensor and the extracting circuitry and configured to classify an object by sampling a periodic descriptor function for a query point in the image from the environment surrounding the system to produce a sample value, the periodic descriptor function depending on the distance between at least one of the one or more keypoints and the query point in complex space, the periodic descriptor function further depending on at least one feature value extracted from at least one of the one or more keypoints in the image from the environment surrounding the system, wherein:
the periodic descriptor function is defined as:

 where N is the number of keypoints in the image from the environment surrounding the system in the neighborhood of the query point, zc is the query point represented in complex space, zk is the kth keypoint, ƒ(zk) is the feature value of the kth keypoint, and ? is the continuous independent variable of the descriptor function F(?), or
the periodic descriptor function is a scale-invariant or rotation invariant function defined as:
whereinanda signal bus configured to transmit a signal to the operator of the system if the sample value satisfies an alert condition.

US Pat. No. 10,395,124

THERMAL IMAGE OCCUPANT DETECTION

OSRAM SYLVANIA Inc., Wil...

1. A method for determining occupancy of an area, the method comprising:receiving a first thermal image of the area collected at a first time, the first thermal image including a first plurality of thermal intensity values corresponding a plurality of pixels of a sensor;
receiving a second thermal image of the area collected at a second time after the first time, the second thermal image including a second plurality of thermal intensity values corresponding to the plurality of pixels of the sensor;
identifying a change in thermal intensity values between the second plurality of thermal intensity values and the first plurality of thermal intensity values;
comparing the change in thermal intensity values to a level of expected change in thermal intensity values corresponding to at least one of a single occupant entering the area and a single occupant leaving the area;
determining a rate of change for the change in thermal intensity values;
identifying a presence of an occupant in the area when:
the compared change in thermal intensity values corresponds to one or more occupants, and
the determined rate of change is equal or greater to an occupant threshold; and
identifying the number of occupants in the area by determining a multiple of the change in thermal intensity values to the level of expected change in thermal intensity values.

US Pat. No. 10,395,123

METHOD FOR MONITORING A PATIENT WITHIN A MEDICAL MONITORING AREA

1. A method for monitoring a patient within a medical monitoring area the method comprising the steps of:providing a monitoring system with a depth camera device;
generating a point cloud of the monitoring area with the monitoring system;
analyzing the point cloud for detecting predefined objects;
determining a location of at least one detected object in the monitoring area;
comparing the determined location of the at least one detected object with at least one predefined value for the location of the at least one detected object;
wherein the above steps are repeatedly performed over time so that a four-dimensional monitoring and thus with respect to the respective location of the object a tracking process is performed;
determining if the at least one detected object is a person during the performance of the above steps, and if so creating a motion profile of the person from the locations of the person for a digital patient file;
storing the locations of the at least one detected object in the digital patient file,
the at least one predefined value for the location of the at least one detected object is formed as an absolute predefined value relative to the monitoring area.

US Pat. No. 10,395,122

SYSTEMS AND METHODS FOR IDENTIFYING MOMENTS IN VIDEOS

GoPro, Inc., San Mateo, ...

1. A system that identifies moments in videos, the system comprising:physical storage media storing video information defining video content, wherein capture of the video content by an image capture device and/or the video content captured by the image capture device is characterized by capture information, the capture information enabling a computing device remote from the image capture device to identify one or more portions of the video content prior to reception of the video content; and
one or more physical processors configured by machine-readable instructions to:
transmit at least a portion of the capture information to the computing device prior to transmission of the video information to the computing device, the computing device identifying, prior to the reception of the video content, the one or more portions of the video content based on the transmitted capture information;
receive the identification of the one or more identified portions of the video content from the computing device; and
responsive to the reception of the identification, transmit the video information defining at least some of the one or more identified portions of the video content to the computing device.

US Pat. No. 10,395,121

COMPARING VIDEO SEQUENCES USING FINGERPRINTS

SNELL ADVANCED MEDIA LIMI...

1. A system configured to compare a first sequence of video images represented by a first sequence of fingerprints at a first image repetition rate with a second sequence of video images represented by a second sequence of fingerprints at a second image repetition rate, wherein the second image repetition rate is different from the first image repetition rate, in which the fingerprints are spatial fingerprints derived each from content of a single video image, temporal fingerprints derived each from a difference in content between two video images or a combination of spatial and temporal fingerprints, the system comprising an electronic processor configured to:generate from the first sequence of fingerprints a converted sequence of fingerprints at the second image repetition rate or a common image repetition rate; and
perform a correlation between the converted sequence of fingerprints and the second sequence of fingerprints or a second converted sequence of fingerprints generated from the second sequence of fingerprints at the common image repetition rate;
wherein the converted sequence of fingerprints includes a combination of a number of neighbouring fingerprints in the first or second sequence of fingerprints, and
wherein the combination of the number of neighbouring fingerprints includes a weighted average based on a temporal location of the respective neighbouring fingerprints in the first sequence of fingerprints in which a temporal fingerprint in the first sequence of fingerprints is scaled in accordance with a ratio of the first and second image repetition rates.

US Pat. No. 10,395,120

METHOD, APPARATUS, AND SYSTEM FOR IDENTIFYING OBJECTS IN VIDEO IMAGES AND DISPLAYING INFORMATION OF SAME

ALIBABA GROUP HOLDING LIM...

1. A method comprising:receiving, from a client, information associated with a paused video, the information including an identifier of the paused video and a pause time point associated with the paused video displayed on the client;
transmitting, in response to receiving the information associated with a paused video, a request for static images to a video server associated with the identifier of the paused video, the request for static images including the pause time point;
receiving, from the video server, at least one static image corresponding to the paused video in response to the request for static images, the at least one static image comprising a video frame of the paused video associated with the pause time point;
identifying an object present in the at least one static image and obtaining object information associated with the object; and
sending, to the client, the object information and an identified position of the object within the at least one static image.

US Pat. No. 10,395,119

SYSTEMS AND METHODS FOR DETERMINING ACTIVITIES PERFORMED DURING VIDEO CAPTURE

GoPro, Inc., San Mateo, ...

1. A system configured to recognize one or more activities performed during video capture, the system comprising:one or more physical processors configured by machine-readable instructions to:
obtain information defining a video, the video including visual content previously captured by a capture device over a capture duration, the information defining the video including content information and metadata information, the content information defining the visual content, the metadata information including tracking information, the tracking information including locations of the capture device as a function of progress through the capture duration, the locations including a first set of locations; and
determine a type of activity being performed by an entity moving with the capture device over the capture duration based on the tracking information, wherein the determining the type of activity being performed by the entity moving with the capture device over the capture duration based on the tracking information comprises:
generating a location graph for the video using the tracking information the location graph including the first set of locations of the capture device as the function of the progress through the capture duration;
identifying an overall shape of the location graph; and
determining the type of activity being performed by the entity moving with the capture device based on the overall shape of the location graph, wherein determining the type of activity includes distinguishing between a sport-type activity and a race-type activity based on the overall shape of the location graph.

US Pat. No. 10,395,118

SYSTEMS AND METHODS FOR VIDEO PARAGRAPH CAPTIONING USING HIERARCHICAL RECURRENT NEURAL NETWORKS

Baidu USA LLC, Sunnyvale...

1. A computer-implemented method for automating describing a video with a paragraph comprising multiple sentences, the method comprising:producing, using a sentence generator, multiple single sentences, each single sentence being generated sequentially and describing a specific time span and video region or regions within the video, the sentence generator comprising:
a word embedding layer word converting an input word into a word embedding;
a first recurrent layer for language modeling based at least on the word embedding, the first recurrent layer updating its hidden state when receiving a word embedding;
an attention model coupled to the first recurrent layer for selectively focusing on input video features in a video feature pool; and
a multimodal layer for integrating outputs from the first recurrent layer and the attention model to connect vision components with the language model;
using a paragraph generator to affect inter-sentence dependency for the sentence generator when producing a next sentence, the paragraph generator comprising:
a sentence embedding layer receiving word embeddings from the word embedding layer and current hidden state of the first recurrent layer to output a sentence embedding;
a second recurrent layer linked to the sentence embedding layer for inter-sentence dependency modeling, the second recurrent layer updating its hidden state when receiving a sentence embedding; and
a paragraph state component combining current hidden state of the second recurrent layer and the sentence embedding to generate of a current paragraph state as an initial hidden state when the first recurrent layer is reinitialized for next sentence generation.

US Pat. No. 10,395,117

VISUAL-INERTIAL POSITIONAL AWARENESS FOR AUTONOMOUS AND NON-AUTONOMOUS TRACKING

Trifo, Inc., Santa Clara...

1. A system including:two or more mobile platforms, including a first autonomous unit and a second autonomous unit, each having disposed thereon:
a visual sensor comprising at least 4 cameras providing at least two frames, each frame providing a 360-degrees view about a centerline of the mobile platform; and
at least one of:
a multi-axis inertial measuring unit (IMU) capable of providing measurement of at least acceleration; and
a global positioning system (GPS) receiver; and
a map server, including a processor and a coupled memory storing instructions to build 3D maps of surrounding scenery encountered by the mobile platforms using information sourced by the one or more autonomous units, which instructions when executed by the processor perform:
receiving a set of keyrigs from a first autonomous unit, each keyrig comprising visual information of surrounding scenery captured by the visual sensor of the first autonomous unit and a position of the first autonomous unit where the visual information was captured, the position of the autonomous unit generated using combinations of global positioning system (GPS) receiver, the multi-axis inertial measurement unit (IMU), and visual information of the surrounding scenery by the first autonomous unit during travel from a starting point to an end point;
classifying at least one of one or more objects from the visual information of the surrounding scenery from the set of keyrigs into a set of moving objects and a set of non-moving objects;
selecting a subset of keyrig from the set of keyrigs and determining a sparse 3D mapping of object feature points taken from the visual information of the surrounding scenery from the subset of keyrigs for the set of non-moving objects;
building a 3D map of object feature points from the sparse 3D mapping of object feature points using visual information of the surrounding scenery from the set of keyrigs for the set of non-moving objects, wherein the 3D map is accurate within centimeters; and
providing the 3D map via a communications link to one or more additional autonomous units to guide the one or more additional autonomous units at a future time.

US Pat. No. 10,395,116

DYNAMICALLY CREATED AND UPDATED INDOOR POSITIONING MAP

Hand Held Products, Inc.,...

1. A system for creating and dynamically updating indoor positioning maps comprising:an augmented reality (AR) device comprising:
a display for displaying AR content to a user, the AR content overlapping the AR device's perspective view of an environment; and
one or more depth sensors for gathering mapping data of physical objects in the environment;
a computing device communicatively coupled to the AR device, the computing device comprising a processor that is configured by software to:
dynamically create a three-dimensional (3D) indoor positioning map of the environment in a building based on the mapping data gathered by the AR device;
create guidance AR content in response to the mapping data of the physical objects in the environment in the 3D indoor positioning map being older than a refresh period, wherein the guidance AR content is created corresponding to the AR device's perspective view of the environment for guidance;
transmit the 3D indoor positioning map with the guidance AR content to the display for the guidance to gather updated mapping data; and
dynamically update the 3D indoor positioning map of the environment in the building based on the updated mapping data gathered by the AR device when at least the mapping data of the physical objects in the environment in the 3D indoor positioning map is older than the refresh period.

US Pat. No. 10,395,115

SYSTEMS, DEVICES, AND METHODS FOR ROBOTIC REMOTE SENSING FOR PRECISION AGRICULTURE

The Trustees of the Unive...

1. A method for data-driven remote sensing for precision agriculture, the method comprising:obtaining high-resolution 3-D imagery using one or more mobile sensor arrays;
applying state-estimation and mapping algorithms to the high-resolution 3-D imagery to generate high-resolution multi-spectral 3-D maps; and
extracting actionable intelligence from the high-resolution multi-spectral 3-D maps.

US Pat. No. 10,395,114

AUTOMATED DETECTION OF FEATURES AND/OR PARAMETERS WITHIN AN OCEAN ENVIRONMENT USING IMAGE DATA

1. A method comprising using at least one hardware processor to:for each of one or more ocean-facing cameras that are positioned to capture image data of a region of an ocean environment,
receive the captured image data via at least one network,
identify one or more features within the captured image data, wherein the one or more features comprise at least one occurrence of at least one recreational activity, and wherein the at least one recreational activity comprises one or more of a person surfing an ocean wave, a person jet-skiing, a person swimming, a person kite-surfing, a person paddling a paddleboard, a person drifting, or a person paddling on a surfboard, and
measure one or more parameters of the ocean environment based on the identified one or more features within the captured image data; and,
for each of one or more user systems,
receive a request for data from the user system via the at least one network,
generate the requested data based on the one or more parameters, and
send the requested data to the user system via the at least one network.

US Pat. No. 10,395,113

POLARIZATION-BASED DETECTION AND MAPPING METHOD AND SYSTEM

Polaris Sensor Technologi...

1. A method of detecting an aerial object, the method comprising:recording raw image data of an area using a polarimeter to obtain polarized images of the area;
calculating Stokes parameters S0, S1, and S2 from the polarized images to create Stokes images by weighted subtraction of the polarized images;
computing Degree of Linear Polarization (DoLP) images and orientation images from the Stokes images;
creating multi-dimensional imagery using one or more of: the polarized images, the Stokes parameters, the DoLP images and the orientation images;
applying contrast enhancement algorithms to the multi-dimensional imagery to form enhanced object images;
automatically detecting the aerial object from the enhanced object images.

US Pat. No. 10,395,112

DEVICE AND METHOD OF RECOGNIZING IRIS

Samsung Electronics Co., ...

1. A method of recognizing an iris, the method comprising:obtaining an iris image from an input image;
extracting a reference area from the obtained iris image;
extracting, dependent on a severity of eyelash occlusion, a candidate area from the obtained iris image;
determining a threshold brightness based on a plurality of pixels included in the extracted reference area; and
determining a target pixel, in the candidate area, to be excluded from iris recognition based on the determined threshold brightness.

US Pat. No. 10,395,111

GAZE-TRACKING SYSTEM AND METHOD

VARJO TECHNOLOGIES OY, H...

1. A gaze-tracking system for use in a head-mounted display apparatus, the gaze-tracking system comprising:a first set of illuminators for emitting infrared light at a predefined angle to a view direction of a user's eye;
at least one first optical element for reflecting the infrared light emitted by the first set of illuminators towards the user's eye to illuminate the user's eye when the head-mounted display apparatus is worn by the user;
at least one photo sensor for sensing positions of reflections of the infrared light emitted by the first set of illuminators from the user's eye in relation to the at least one photo sensor;
at least one actuator for moving at least one of:
(i) the first set of illuminators for emitting infrared light,
(ii) the at least one photo sensor for sensing positions of reflections of the infrared light emitted by the first set of illuminators; and
a processor coupled in communication with the first set of illuminators, the at least one photo sensor and the at least one actuator, wherein the processor is configured to collect sensor data from the at least one photo sensor and process the sensor data to detect a change in the gaze direction of the user, and to control the at least one actuator to adjust, based upon the detected change in the gaze direction of the user, a position of the at least one of:
(i) the first set of illuminators to maintain the emitted infrared light at the predefined angle to the view direction of the user's eye,
(ii) the at least one photo sensor to maintain the relative positions of the reflections of the infrared light emitted by the first set of illuminators from the user's eye and the at least one photo sensor.

US Pat. No. 10,395,110

IRIS SCANNING CAMERA MODULE AND MOBILE DEVICE INCLUDING THE SAME

Samsung Electro-Mechnics ...

1. An iris scanning camera module comprising:a housing comprising an internal space;
a first lens module and a second lens module disposed in the internal space; and
an image sensor configured to convert light passing through the first lens module and the second lens module into an image,
wherein the image sensor comprises a first region comprising a color pixel array and a second region comprising a black-and-white pixel array,
wherein the color pixel array is aligned in a direction of an optical axis direction of the first lens module, and the black-and-white pixel array is aligned in a direction of an optical axis of the second lens module, and
wherein the optical axis of the first lens module is parallel to the optical axis of the second lens module.

US Pat. No. 10,395,109

RECOGNITION APPARATUS, RECOGNITION METHOD, AND COMPUTER PROGRAM PRODUCT

Kabushiki Kaisha Toshiba,...

1. A recognition apparatus for performing pattern recognition of an input signal being a recognition target, the recognition apparatus comprising:one or more hardware processors configured to:
calculate, based on the input signal, a score vector sequence in which a plurality of score vectors each including respective scores of symbols are arranged; and
cause a partial score vector of the calculated score vector sequence to pass through to filter the score vector sequence, wherein the one or more hardware processors are configured to cause, among:
a first score vector in which a representative symbol is a recognition-target symbol, the representative symbol being a symbol corresponding to a best score among the scores included in the first score vector;
a second score vector in which a representative symbol is a non-target symbol, and a score of the representative symbol is worse than a first threshold, the non-target symbol being a symbol representing that it is undetermined which piece of information among information pieces represented by recognition-target symbols is included in the input signal; and
a third score vector in which a representative symbol is a non-target symbol, and a score of the representative symbol is equal to the first threshold or better than the first threshold,
a third score vector satisfying a predefined first condition, to pass through to filter the score vector sequence.

US Pat. No. 10,395,108

AUTOMATICALLY IDENTIFYING AND INTERACTING WITH HIERARCHICALLY ARRANGED ELEMENTS

Decision Engines, Inc., ...

1. A computer-implemented method of recognizing and completing electronic forms, comprising:receiving, by a processor, a digital image of an electronic form having a hierarchy of at least one group of elements, including at least one field that is programmed to receive input data;
detecting, by the processor, a set of objects represented in the digital image;
identifying, for each object of the set of objects, values for multiple attributes, including a type and a position, a value of the type being a group label corresponding to a group label in the electronic form, a field label corresponding to a field label in the electronic form, or a field corresponding to a field in the electronic form;
building a set of feature vectors, including a first feature vector that represents a first pair of objects in the set of objects such that a first object of the first pair has a type of a field and a second object of the first pair has a type of a group label, and a second feature vector that represents a second pair of objects in the set of objects such that a first object of the second pair has a type of a field and a second object of the second pair has a type of a field label;
determining, for each object of the set of objects having a type of a field, an associated group label at a higher level of the hierarchy and an associated field label at a lower level of the hierarchy based on the set of feature vectors;
searching, for each of at least one of the set of objects having a type of a field, a database for field data for the object based on the associated group label at a higher level of the hierarchy and the associated field label at a lower level of the hierarchy;
causing, by the processor, displaying each of the at least one objects having a type of a field in association with the corresponding field data, thereby automatically completing the electronic form.

US Pat. No. 10,395,107

AUTHENTICATION METHOD, COMPUTER SYSTEM, SERVER COMPUTER AND AUTHENTICATION PROGRAM

1. An authentication method for a system including a first computer and a second computer, each having a display surface having a contact recognition function, and for obtaining contact information from a contact with the display surface, one input device configured to make contact with the display surface of the first computer displaying red inkpad information and the display surface of the second computer; and a third computer configured to store a permitted value of time when permitting contact by the one input device at the first computer and the second computer as a series of consecutive contacts,the authentication method comprising:transmitting contact information from the first computer and the second computer by the one input device to the third computer respectively at the first computer and the second computer;
storing values of time based on the first computer and the second computer when contact information is received from the first computer and the second computer respectively in the third computer;
judging whether or not contact information in the second computer corresponds to contact information in the first computer;
if the contact information in the second computer corresponds to the contact information in the first computer, judging whether or not a difference in time obtained from each value of time based on the first computer and the second computer stored in the third computer satisfies the permitted value of the time; and
transmitting viewing information in the third computer based on the red inkpad information displayed on the first computer to the second computer when it is judged that the permitted value is satisfied.

US Pat. No. 10,395,106

HUMAN BODY POSTURE DATA ACQUISITION METHOD AND SYSTEM, AND DATA PROCESSING DEVICE

Wuhan Zhunwofei Science a...

1. A human body posture data acquisition method, applicable to a human body posture data acquisition system, wherein the human body posture data acquisition system comprises a data processing device, and the human body posture data acquisition method comprises:the data processing device obtaining feature data between pre-calibrated human body feature points, wherein the pre-calibrated human body feature points comprise a human head center point, a head rotation center point and a body rotation center point, and the feature data comprises a length of a first line segment between the head center point and the head rotation center point, and a length of a second line segment between the head rotation center point and the body rotation center point;
obtaining rotational angles of the human body feature points, wherein the rotational angles comprise a first rotational angle of the first line segment relative to a vertical direction with the first line segment between the head center point and the head rotation center point, and a second rotational angle of the second line segment relative to the vertical direction with the second line segment between the head rotation center point and the body rotation center point, the first rotational angle and the second rotational angle being located on a same plane; and
obtaining human body posture data according to the rotational angles of the human body feature points and the feature data between the human body feature points, wherein the human body posture data comprises the rotational angles of the human body feature points, a first horizontal displacement of the head center point relative to the head rotation center point, and a second horizontal displacement of the head rotation center point relative to the body rotation center point, the first horizontal displacement being obtained by multiplying the length of the first line segment by a sinusoidal function value of the first rotational angle, and the second horizontal displacement being obtained by multiplying the length of the second line segment by a sinusoidal function value of the second rotational angle.

US Pat. No. 10,395,105

VEHICLE IMAGING SYSTEM, VEHICLE IMAGING METHOD AND DEVICE, PROGRAM, AND RECORDING MEDIUM

NEC CORPORATION, Tokyo (...

1. A vehicle imaging device that detects a window of a vehicle utilizing a laser displacement sensor which emits a laser beam which scans a side of the vehicle in a height direction of the vehicle, receives a beam reflected by the vehicle, and measures a distance from the laser displacement sensor to a reflection point on the vehicle, at which the laser beam was reflected, wherein:the vehicle imaging device is configured to:
detect a change in the distance from the laser displacement sensor to the reflection point on the vehicle; and
when the change in the distance from the laser displacement sensor to the reflection point on the vehicle being detected, send a trigger for imaging the vehicle from the side of the vehicle.

US Pat. No. 10,395,104

VEHICLE IMAGING SYSTEM, VEHICLE IMAGING METHOD AND DEVICE, PROGRAM, AND RECORDING MEDIUM

NEC CORPORATION, Tokyo (...

1. A vehicle imaging device that detects a window of a vehicle utilizing a laser displacement sensor which emits a laser beam which scans a side of the vehicle in a height direction of the vehicle, receives a beam reflected by the vehicle, and measures a distance from the laser displacement sensor to a reflection point on the vehicle, at which the laser beam was reflected, wherein:the vehicle imaging device is configured to:
detect a candidate window of the vehicle based on a change in a distance from the laser displacement sensor to the reflection point;
verify whether a predetermined determination condition is satisfied for the candidate window;
when the determination condition has been continued over a predetermined time, determine the candidate window of the vehicle is a window of the vehicle, and
send a trigger for imaging to a camera when the window of the vehicle has been detected, wherein
the determination condition for the verifying process is whether or not (i) the position of the candidate window in the vertical direction is greater than or equal to a first threshold and also less than or equal to a second threshold, and (ii) the size of the candidate window in the vertical direction is greater than or equal to a predetermined width.

US Pat. No. 10,395,103

OBJECT DETECTION METHOD, OBJECT DETECTION APPARATUS, AND PROGRAM

CANON KABUSHIKI KAISHA, ...

1. An object detection method comprising:acquiring an image;
generating a plurality of layer images by enlarging or reducing the image;
detecting a first object from at least one of the plurality of layer images;
estimating a specific object based on the detected first object;
selecting at least one of the plurality of layer images based on the estimated specific object;
detecting a second object larger than the detected first object in the selected layer image;
estimating the specific object based on the detected second object; and
determining the specific object based on the specific object estimated based on the first object and the specific object estimated based the second object.

US Pat. No. 10,395,102

LEARNED FEATURE MOTION DETECTION

Imagination Technologies ...

1. A data processing device for detecting motion in a sequence of video frames each comprising one or more blocks of pixels, the data processing device comprising:a sampling unit configured to determine image characteristics by point sampling at a set of sample points of a block;
a feature generation unit configured to form a current feature for the block in dependence on the determined image characteristics, the current feature being an image characteristic histogram having a plurality of values derived from the sample points in which each value of the plurality of values corresponds to a bin defining a predefined range and includes a count of the number of sampling points having an image characteristic falling within that bin; and
motion detection logic configured to generate a motion output for a block by comparing the current feature for the block to a learned feature representing historical feature values for the block, wherein the learned feature represents a historical image characteristic histogram for the block.

US Pat. No. 10,395,101

INTEREST DEGREE DETERMINATION DEVICE, INTEREST DEGREE DETERMINATION METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM

FUJITSU LIMITED, Kawasak...

1. An interest degree determination device comprising:a memory; and
a processor that executes a process comprising:
detecting a gaze position of a user included in a plurality of users including a first user and a second user, on the basis of image data included on a plurality of frames that are consecutively captured by a camera that is so arranged that an imaging range of the camera includes the first user and the second user that gaze at gaze targets displayed;
storing, for each of the plurality of users, the detected gaze position that corresponds to a gaze target in association with a time of a frame in the plurality of frames on which the gaze position is detected in a first table within the memory;
obtaining a field of view of the user based on the detected gaze position;
determining, when determining that the gaze target of the first user and the gaze target of the second user who is present in the vicinity of the first user have been the same for a predetermined time based on the first table, whether the gaze position of the first user has been affected by the second user based on the obtained field of view of the first user and an action taken by the second user determined from the image data, wherein when the determining determines that the gaze position of the first user has been affected by the second user, a further determination is made that the first user is not spontaneously gazing at the gaze target; and
storing a determination result of the determining in association with the gaze position of the first user and a time of determination in a second table within the memory.

US Pat. No. 10,395,099

SYSTEMS, DEVICES, AND METHODS FOR THREE-DIMENSIONAL ANALYSIS OF EYEBAGS

1. A computer-implemented method of processing three-dimensional face scan data, the method comprising:applying a treatment to an eyebag area of a face;
receiving, by a facial analysis device, first face scan data representing a three-dimensional scan of the face;
determining, by the facial analysis device, a first model of an eyebag area of the first face scan data;
determining, by the facial analysis device, a first score based on the first model;
storing by the facial analysis device, the first score in a scan data store;
comparing, by the facial analysis device, the first model to at least one stored model of previous face scan data representing a previous three-dimensional scan of the face to determine differences between the models;
presenting, by the facial analysis device, the determined differences in order to evaluate the treatment; and
storing, by the facial analysis device, the determined differences in the scan data store.

US Pat. No. 10,395,098

METHOD OF EXTRACTING FEATURE OF IMAGE TO RECOGNIZE OBJECT

SAMSUNG ELECTRONICS CO., ...

1. A method of converting a vector corresponding to an input image, the method comprising:generating a projection matrix based on a covariance matrix corresponding to training vector data and a dictionary which is a set of elements constituting an object in an image, the generating including generating the projection matrix such that the projection matrix has a fixed rank;
receiving input vector data associated with the input image including the object;
converting the received input vector data into feature data based on the projection matrix having the fixed rank, wherein a first dimension of the input vector data is higher than a second dimension of the feature data; and
recognizing the object using the feature data converted from the received input vector data based on the projection matrix.

US Pat. No. 10,395,096

DISPLAY METHOD FOR RECOMMENDING EYEBROW STYLE AND ELECTRONIC APPARATUS THEREOF

CAL-COMP BIG DATA, INC., ...

1. A display method for recommending an eyebrow style, comprising:obtaining an image;
determining a face type of a human face in the image according to a ratio based on a distance and a length of a plurality of auxiliary lines;
obtaining a corresponding recommended eyebrow style according to the face type of the human face in the image; and
displaying the recommended eyebrow style in an eyebrow area of the human face in the image according to calculated heights from a plurality of reference points to the plurality of auxiliary lines.

US Pat. No. 10,395,095

FACE MODEL MATRIX TRAINING METHOD AND APPARATUS, AND STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A face model matrix training method, comprising:obtaining a face image library, the face image library comprising k groups of face images, and each group of face images comprising at least one face image of at least one person, wherein k>2, and k is an integer;
separately parsing each group of the k groups of face images, and calculating a first matrix and a second matrix according to parsing results, the first matrix being an intra-group covariance matrix of facial features of each group of face images, and the second matrix being an inter-group covariance matrix of facial features of the k groups of face images; and
training face model matrices according to the first matrix and the second matrix,
wherein the training face model matrices according to the first matrix and the second matrix comprises:
calculating a third matrix and a fourth matrix according to the first matrix and the second matrix, wherein the third matrix is a covariance matrix of facial features in the face image library, and the fourth matrix is a covariance matrix among facial features of different persons in the face image library; and
training the face model matrices according to the third matrix and the fourth matrix.

US Pat. No. 10,395,094

METHOD AND APPARATUS FOR DETECTING GLASSES IN A FACE IMAGE

TENCENT TECHNOLOGY (SHENZ...

1. A method for detecting glasses in a face image performed at a computing device having one or more processors and memory storing one or more programs to be executed by the one or more processors, the method comprising:obtaining a face image;
determining a nose bridge region, a left eye, and a right eye in the face image;
detecting an image change in the nose bridge region to obtain an image change result of the nose bridge region, wherein the image change is a gradient change in a gray scale of a pixel in the face image, further comprising:
designating first coordinates corresponding to a right corner of the left eye as L(x1, y1);
designating second coordinates corresponding to a left corner of the right eye as R(x2, y2);
determining a length of the nose bridge region by taking a difference between the horizontal components of the first and second coordinates;
determining a width of the nose bridge region based on a width of the eyes;
designating the width of the nose bridge region as n pixels, wherein n is an integer;
computing a vertical gradient per pixel, wi, along the width of the nose bridge region to obtain a gradient vector w in the length of n, wherein i is an integer having values from one to n and w={w1, w2, . . . , wn};
computing an average gradient value, u, of the gradient vector w, wherein

computing an average value, s, of a gradient modulus value; wherein
andcomputing a ratio of the average gradient value, u, to the average value of the gradient modulus value, s, to obtain the gradient change of the nose bridge region;
in accordance with a determination that that the computed ratio is less than a predetermined threshold, determining that a pair of glasses is worn on the face image; and
in accordance with a determination that that the computed ratio exceeds the predetermined threshold, determining that no glasses are worn on the face image.

US Pat. No. 10,395,093

IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

9. An image processing method, comprising:performing first detection for detecting a person in a visible light image obtained by capturing that uses visible light;
performing second detection for detecting a person in an invisible light image obtained by capturing that uses invisible light in a capturing region that includes a capturing region of the visible light image; and
determining, if a person is not detected in the second detection at a position that corresponds to a position of a person detected in the first detection, that the person detected in the first detection is actually present.

US Pat. No. 10,395,092

PROCESSING DEVICE, PROCESSING METHOD, AND INFORMATION STORAGE DEVICE

OLYMPUS CORPORATION, Tok...

1. A processing device comprising:a processor comprising hardware, the processor being configured to:
acquire a tissue image obtained by capturing an image of a tissue;
determine a property of the tissue image acquired, and setting a plurality of identification criteria for identifying a state of the tissue as a normal state or an abnormal state, based on the tissue image and the property of the tissue image;
in response to the property of the tissue image being a first property, generate a re-generated identification criterion based on the tissue image and set the plurality of identification criteria to include an original identification criterion and the re-generated identification criterion; and
in response to the property of the tissue image being a second property, correct the original identification criterion based on the tissue image to generate a corrected identification criterion and set the plurality of identification criteria to include the original identification criterion and the corrected identification criterion.

US Pat. No. 10,395,090

SYMBOL DETECTION FOR DESIRED IMAGE RECONSTRUCTION

MorphoTrak, LLC, Anaheim...

1. A computer-implemented method comprising:obtaining data indicating an image comprising a latent fingerprint and a template that surrounds the latent fingerprint, and
obtaining reference data that (i) identifies a known symbol associated with the template, and (ii) includes characteristics of the known symbol;
processing the image;
identifying, based on processing the image, one or more candidate regions of the image that are predicted to include the known symbol;
extracting image characteristics represented within the one or more candidate regions; and
determining, based on the characteristics of the known symbol and the extracted image characteristics represented within the one or more candidate regions, that the one or more candidate regions include the known symbol.

US Pat. No. 10,395,089

APPLICATION AND PICTURE DISPLAY VERIFICATION METHODS, APPARATUSES, AND ELECTRONIC DEVICE

HUAWEI TECHNOLOGIES CO., ...

1. An application display method applied to an electronic device, the method comprising:receiving, by the electronic device, a touch operation requesting to display an application switch screen, the electronic device storing first fingerprint information, the electronic device having a first application installed thereon, and running the first application requires performing verification against the first fingerprint information;
obtaining second fingerprint information from the touch operation, wherein at least two pieces of fingerprint information are obtained from the touch operation, and obtaining the second fingerprint information from the touch operation comprises:
setting both of the at least two pieces of fingerprint information obtained from the touch operation as the second fingerprint information; or
setting either of the at least two pieces of fingerprint information obtained from the touch operation as the second fingerprint information; or
setting fingerprint information, obtained from the touch operation, of a recognized finger that earliest comes into contact with the electronic device as the second fingerprint information; or
setting fingerprint information, obtained from the touch operation, of a recognized finger that latest comes into contact with the electronic device as the second fingerprint information; or
setting fingerprint information, obtained from the touch operation, of a recognized finger that has a maximum area of contact with the electronic device as the second fingerprint information; or
setting fingerprint information, obtained from the touch operation, of a recognized finger that has a minimum area of contact with the electronic device as the second fingerprint information; or
performing:
obtaining a contact moment, a contact area, and an integrity parameter corresponding to fingerprint information obtained from the touch operation, wherein the contact moment is a moment when a finger corresponding to the fingerprint information comes into contact with the electronic device, the contact area is an area in which the finger corresponding to the fingerprint information comes into contact with the electronic device, and the integrity parameter represents an integral degree of the fingerprint information; and
determining the second fingerprint information according to the contact moment, the contact area, and the integrity parameter;
matching the second fingerprint information and the first fingerprint information; and
displaying the first application in the application switch screen when the second fingerprint information matches the first fingerprint information.

US Pat. No. 10,395,088

FAN-OUT FINGERPRINT SENSOR PACKAGE

SAMSUNG ELECTRONICS CO., ...

1. A fan-out fingerprint sensor package comprising:a first connection member having a through-hole;
a fingerprint sensor disposed in the through-hole of the first connection member, and having an active surface on which a connection pad and a sensing pattern are disposed and an inactive surface opposing the active surface;
an encapsulant encapsulating at least portions of the first connection member and the fingerprint sensor; and
a second connection member disposed on the first connection member and the active surface of the fingerprint sensor,
wherein the first connection member includes a distribution layer,
the second connection member includes a first insulating layer disposed on the distribution layer of the first connection member and the active surface of the fingerprint sensor, a redistribution layer disposed on the first insulating layer, a first via connecting the redistribution layer to the connection pad of the fingerprint sensor, and a second via connecting the redistribution layer to the distribution layer of the first connection member,
the first via passes through the first insulating layer and at least a portion of the encapsulant,
the second via passes through the first insulating layer, and
the encapsulant encapsulates a side surface and the inactive surface of the fingerprint sensor, and encapsulates at least a portion of the connection pad on the active surface.

US Pat. No. 10,395,087

BIOMETRIC SENSING CHIP AND ELECTRONIC DEVICE USING SAME

SHENZHEN XINWEI TECHNOLOG...

1. A biometric sensing chip comprising:a biometric sensing die comprising a memory circuit for saving data;
two pads set on the biometric sensing die and grounded directly or indirectly;
a first insulating layer set on the memory circuit, wherein the pads are set on the first insulating layer; and
an electrostatic conductor partially or entirely set right above the memory circuit for discharging static electricity, wherein the electrostatic conductor is directly or indirectly grounded, and two ends of the electrostatic conductor are correspondingly connected to the two pads.

US Pat. No. 10,395,086

FLAT PANEL DISPLAY EMBEDDING OPTICAL IMAGING SENSOR

LG Display Co., Ltd., Se...

1. A flat panel display embedding an image sensor comprising:a display panel including a display area and a non-display area, the display panel having a top surface; and
a directional optical unit attached to the top surface of the display panel, the directional optical unit having a length along a length axis of the display panel, a width along a width axis of the display panel and a thickness along to a thickness axis of the display panel,
wherein the directional optical unit includes:
a cover plate having a size corresponding to the length and the width of the directional optical unit;
a light radiating film corresponding to the display area, the light radiating film positioned under the cover plate;
a light incident film positioned under the cover plate and disposed outside of the display area adjacent to a lateral side of the light radiating film;
a low refractive layer disposed under the light radiating film and the light incident film, the low refractive layer attached on the top surface of the display panel, and having a refractive index that is lower than a refractive index of the cover plate and that is lower than a refractive index of the light radiating film; and
a light source positioned under the light incident film,
wherein the directional optical unit provides a sensing light beam to the display area,
wherein the sensing light beam is collimated and directionized along a predetermined direction,
wherein the light source provides an incident light beam to an incident point on a surface of the light incident film,
wherein the light incident film has a first polarization axis along to a predetermined direction; and
wherein the light source provides an infrared light beam polarized in a second polarization axis which is parallel to the first polarization axis.

US Pat. No. 10,395,085

SEMICONDUCTOR DEVICE AND FINGERPRINT SENSOR DEVICE THEREOF

VANGUARD INTERNATIONAL SE...

1. A semiconductor device, comprising:a semiconductor substrate;
a first metal wiring layer disposed on the semiconductor substrate;
an interlayer dielectric layer disposed on the first metal wiring layer;
a second metal wiring layer disposed on the interlayer dielectric layer; and
a first via and a second via disposed in the interlayer dielectric layer, wherein the second via is on the first via, and there is no conductive element except the first via and the second via in the interlayer dielectric layer.

US Pat. No. 10,395,083

SYSTEM FOR COMMUNICATION FROM A USER TO THE PUBLISHER OF A SCANNABLE LABEL

1. A system for facilitating private communication between publishers and consumers, comprising: a secure remote server for facilitating secure communications over a public digital communication network; at least one publisher terminal integrated with a respective smartphone communication device including: an optical display for displaying a two dimensional code symbol in which is embedded a respective sequence of digital data including a digital identification code corresponding to a particular communication profile of a local particular publisher, and a publisher remote app for generating the two dimensional code symbol for a selected communication profile and for transmitting a corresponding unique identification code and related details of the corresponding communication profile to the secure remote digital server over a public digital network; and a plurality of consumer terminals, each integrated with a respective smartphone communication device which includes: an optical scanner for scanning the two dimensional code symbol displayed on the optical display of the publisher terminal to thereby produce a scanned code symbol, a consumer local app for converting the scanned code symbol into a corresponding two dimensional pattern of dots and for extracting therefrom the particular sequence of digital data embedded therein, and a consumer remote app for using extracted digital identification code data about the publisher and other private information about the consumer and the consumer terminal to establish secure two way communication with the publisher terminal via the remote digital server; wherein the code displayed by the publisher and scanned by the consumer includes sufficient encoded digital information to permit the consumer terminal to establish secure private communication with the publisher terminal via the digital server, without revealing to the consumer or the consumer terminal a network address of the publisher terminal or any other information designated private by the publisher, and without revealing to the publisher or the publisher terminal a network address of the consumer terminal or any other information designated private by the consumer.

US Pat. No. 10,395,081

ENCODING DOCUMENT CAPTURE BOUNDS WITH BARCODES

Hand Held Products, Inc.,...

1. A method for processing a document image containing one or more fields with a scanner, the method comprising:via the scanner:capturing the document image with embedded barcodes containing field descriptors for at least one of the one or more fields;
receiving the captured document image with embedded barcodes;
decoding the embedded barcodes of the captured document image;
setting a field counter level to a current level of zero;
finding at least one of the one or more fields at the current level based on the field descriptors decoded from the embedded barcodes;
processing the one or more fields found at the current level;
determining if the one or more fields at the current level are processed;
if the one or more fields at the current level are not processed and additional fields are present, selecting a next field in the current level, and outputting a field extent;
determining if the current level comprises subfields;
if the current level comprises subfields, incrementing the current level by +1 and limiting subsequent processing to a region of interest for the subfields; and
repeating the method of finding at least one of the one or more fields at the incremented current level and determining if the one or more fields at the incremented current level are processed.

US Pat. No. 10,395,080

SIMPLIFIED GATE STACK PROCESS TO IMPROVE DUAL CHANNEL CMOS PERFORMANCE

INTERNATIONAL BUSINESS MA...

1. A method of fabricating a semiconductor device, the method comprising:forming at least one of a first semiconductor region and a second semiconductor region different from the first semiconductor region, wherein forming at least one of the first semiconductor region and second semiconductor region comprises:
forming a first semiconductor channel comprising a first semiconductor material;
forming a first set of spacers extending from the top surface of the semiconductor channel so as to define a first gate between the first set of spacers;
depositing a fist sacrificial material between the first set of spacers, the sacrificial material comprising a combination of the first semiconductor material and an oxide material
annealing the first sacrificial material to form a first semiconductor-rich surface on a portion of the top surface of the semiconductor channel between the first set of spacers,
wherein the first gate includes a first high-k dielectric layer in contact with the spacers, and a first metal gate material in contact with the high-k dielectric layer.

US Pat. No. 10,395,079

SIMPLIFIED GATE STACK PROCESS TO IMPROVE DUAL CHANNEL CMOS PERFORMANCE

INTERNATIONAL BUSINESS MA...

1. A semiconductor device comprising:at least one of a first semiconductor region and a second semiconductor region different from the first semiconductor region, at least one of the first semiconductor region and second semiconductor region including:
a first semiconductor channel comprising a first semiconductor material;
a first set of spacers extending from the top surface of the semiconductor channel, wherein between the first set of spacers defines a first gate; and
an annealed semiconductor-rich surface on a portion of the top surface of the semiconductor channel between the first set of spacers, the annealed semiconductor-rich surface directly contacting the first gate,
wherein the first gate includes a first high-k dielectric layer in contact with the spacers, and a first metal gate material in contact with the high-k dielectric layer.

US Pat. No. 10,395,078

DIGITAL FINGERPRINT GENERATION USING SENSOR EMBEDDED PACKAGING ELEMENTS

International Business Ma...

1. A method for detecting package tampering, comprising:performing first scanning of a container comprising a packaged item and a plurality of packaging elements surrounding the packaged item;
wherein the plurality of packaging elements are integrated on a base material wrapped around the packaged item;
wherein each packaging element of the plurality of packaging elements is a cushioning element comprising a sensing component comprising a stress sensor;
wherein each stress sensor measures a stress value on a corresponding packaging element in one or more directions; and
wherein each sensing component wirelessly transmits one or more of the measured stress values to one or more scanning devices;
determining at least one stress on each of the plurality of packaging elements surrounding the packaged item from the first scanning;
performing second scanning of the container comprising the packaged item and the plurality of packaging elements surrounding the packaged item;
determining at least one stress on each of the plurality of packaging elements surrounding the packaged item from the second scanning; and
comparing the at least one stress on each of the plurality of packaging elements surrounding the packaged item from the first scanning with the at least one stress on each of the plurality of packaging elements surrounding the packaged item from the second scanning;
wherein the method is performed by at least one computer system comprising at least one memory and at least one processor coupled to the memory.

US Pat. No. 10,395,077

SYSTEM AND METHOD FOR NEAR FIELD COMMUNICATION

Hallmark Cards, Incorpora...

1. A system for providing a near field communication (NFC) session with an NFC-tagged object, comprising:a tip-ring-ring-sleeve (TRRS) component configured to be inserted into an audio port on a smart device and including at least three channels;
an NFC component for transmitting a first radio frequency (RF) signal and for receiving a second RF signal, the second RF signal including identifying information, the NFC component further configured to decode the second RF signal to determine the identifying information; and
an energy-collecting component comprising an energy-collecting circuit configured to store energy from a modulated power signal, increase a voltage of the modulated power signal, and supply the stored energy in a burst to the NFC component for use in transmitting the first RF signal,
wherein the energy-collecting circuit is tuned to correspond to one or more parameters of the modulated power signal, and
wherein a first channel of the at least three channels is configured for receiving the modulated power signal, a second channel is configured for receiving control signals, and a third channel is configured for communicating tag value information.

US Pat. No. 10,395,076

PROCESSES FOR DISTRIBUTION AND USE OF A MOBILE RFID CONTAINER

PROMEGA CORPORATION, Mad...

1. A system comprising:a mobile container configured to carry a plurality of items with a corresponding plurality of RFID tags inside the mobile container, wherein the mobile container includes:
an RFID detector configured to conduct at least one RFID scan and responsively generate scan data concerning the plurality of RFID tags;
location determining circuitry configured to determine location data corresponding to a current location of the mobile container;
a communications interface configured to wirelessly transmit the scan data and the location data; and
a door providing access to an interior region of the mobile container where the plurality of items with the corresponding plurality of RFID tags reside; and
an enterprise resource planning (“ERP”) system remote from the mobile container, wherein the ERP system is configured to:
communicate with the mobile container to receive the scan data and the location data;
determine whether the mobile container is within a geofence boundary of an end user based on the location data, at a distribution center, or in transit between the geofence boundary of the end user and the distribution center;
determine an identity of items removed from the mobile container while in the geofence boundary of the end user based on the scan data and the location data; and
determine restocking information for the mobile container based on the scan data before the mobile container arrives at the distribution center.

US Pat. No. 10,395,075

RFID APPARATUS AND METHOD FOR COMMUNICATING WITH AT LEAST ONE RFID TRANSPONDER

SICK AG, Waldkirch (DE)

1. An RFID apparatus for communicating with at least one RFID transponder, the RFID apparatus comprising:an RFID transceiver for radiating and receiving RFID signals; and
a control unit that is configured to encode RFID information into the RFID signal in accordance with an RFID protocol or to read it from the RFID signal and a singulation process is implemented in the control unit, with the singulation process being adapted to give a command to only one respective RFID transponder, and with the command given to only one respective RFID transponder in instances in which plural transponders have identical identification parameters,
wherein the singulation process checks a communication parameter of the RFID signal itself that is independent of RFID information encoded in the RFID signal,
wherein the RFID apparatus is configured for the UHF range in accordance with ISO 180000-6,
wherein the control unit is configured to determine the communication parameter during an inventory,
and wherein the inventory divides a time duration of a round into a plurality of slots and the control unit acknowledges the response in each slot, provided that exactly one RFID transponder responds therein, and subsequently receives the unique identification parameter UII of the responding RFID transponder.

US Pat. No. 10,395,074

RFID READER AND ANTENNA STRUCTURE THEREOF

AUDEN TECHNO CORP., Taoy...

1. A radio-frequency identification (RFID) reader, comprising:a carrying plate having a connecting portion and defining a first boundary and a second boundary both orthogonal to each other at the connecting portion, wherein the carrying plate is defined as four quadrants by the first boundary and the second boundary, and the four quadrants are named as a first quadrant, a second quadrant, a third quadrant, and a fourth quadrant in sequence along a counterclockwise direction;
an antenna module disposed on the carrying plate and including:
a feeding antenna including:
a feeding connecting segment disposed on the connecting portion;
two feeding transmitting segments extending from the feeding connecting segment along two opposite directions substantially parallel to the first boundary; and
two feeding radiating segments respectively and curvedly extending from the two feeding transmitting segments toward the second boundary, wherein the two feeding radiating segments are respectively connected to ends of the two feeding transmitting segments arranged away from the connecting portion, and are respectively disposed in the first quadrant and the third quadrant; and
a grounding antenna including:
a grounding connecting segment disposed on the connecting portion;
two grounding transmitting segments extending from the grounding connecting segment along two opposite directions substantially parallel to the first boundary; and
two grounding radiating segments respectively and curvedly extending from the two grounding transmitting segments toward the second boundary, wherein the two grounding radiating segments are respectively connected to ends of the two grounding transmitting segments arranged away from the connecting portion, and are respectively disposed in the second quadrant and the fourth quadrant; and
a transmitting cable including a feeding wire and a grounding wire, wherein the feeding wire is connected to the feeding connecting segment, and the grounding wire is connected to the grounding connecting segment; when a first current related to the feeding wire travels in the two feeding radiating segments, and a second current related to the grounding wire travels in the two grounding radiating segments, the two feeding radiating segments and the two grounding radiating segments each generate a first magnetic direction, and are arranged in an annular shape to co-generate a second magnetic direction; the first magnetic directions and the second magnetic direction face the same side of the carrying plate.

US Pat. No. 10,395,073

METHOD FOR RFID TAG-READER ANTENNA ASSOCIATION IN A LABORATORY DEVICE

Roche Molecular Systems, ...

1. A method for radio frequency identification RFID tag-reader antenna association in a laboratory device comprising a number N RFID reader antennae, the method comprising the steps:reading a unique identifier corresponding to each of a number M of RFID tag(s);
registering received signal strength indications by each of the N RFID reader antennae of corresponding response signals from each of the M RFID tag(s); and
associating each of the M RFID tag(s) with the reader antenna having received the strongest received signal strength indication corresponding to the RFID tag, and
generating an error signal if, based on reading the unique identifiers corresponding to each of the M of RFID tag(s), the number M of RFID tag(s) is (i) greater than the number N of RFID reader antennae, or (ii) different than a number R of resource(s) detected as being present in loading and/or holding and/or processing position(s) of the laboratory device,
wherein:
R, N and M are natural numbers;
N is greater than or equal to 2; and
M is greater than or equal to 1.

US Pat. No. 10,395,072

TAG BASED LOCATION

Rockwell Automation Techn...

1. An electronic device comprising:an augmented reality display that presents an image;
a processor;
a memory that stores code executable by the processor to perform:
identifying a given equipment tag within the image at a user focus determined using eye tracking at the augmented reality display; and
determining a device location based on the given equipment tag.

US Pat. No. 10,395,071

CONTROL OF RFID READER EMISSIONS WHICH MAY CAUSE INTERFERENCE WITH SYSTEMS USING RFID TAGS

AVERY DENNISON RETAIL INF...

1. A system for controlling an RFID emission within an environment including a sensitive object, comprising: an RFID reader configured to emit a reader signal; a host associated with the RFID reader and configured to define a signal strength of the reader signal; and a guard tag configured to receive the reader signal and, upon receiving the reader signal, emit a return signal to be received by the RFID reader, wherein the host is further configured to, upon the RFID reader receiving the return signal, decrease the signal strength and/or change a direction in which the reader signal is emitted; andwherein the guard tag includes a sensor configured to determine whether the sensitive object is active or inactive and, upon determining that the sensitive object is inactive, modify the return signal to prevent the host from decreasing the signal strength or changing the direction in which the reader signal is emitted upon the RFID reader receiving the return signal.

US Pat. No. 10,395,070

PEAK DETECTOR CIRCUIT

TEXAS INSTRUMENTS INCORPO...

1. A peak detector circuit, comprising:a comparator configured to compare an input voltage to an output voltage of the peak detector circuit to thereby generate a compare output signal;
a latch configured to generate a first control signal responsive to a logic level of the comparator output signal;
a first capacitor coupled to the comparator by way of a first switch, wherein the output voltage represents the voltage on a plate of the first capacitor; and
a second capacitor coupled to the first capacitor by way of a second switch controlled by the first control signal from the latch;wherein, responsive to the compare output signal indicating the input voltage is greater than the output voltage, the latch asserts the first control signal to a logic level that causes the second switch to close to thereby cause the second capacitor to deliver charge to the first capacitor thereby increasing the output voltage;further comprising a third switch coupled to the input voltage, wherein:
during a reset phase of operation of the peak detector circuit, the third switch is open and the first switch is closed to provide the output voltage to a node of the comparator; and
during a sample phase of operation of the peak detector circuit, the third switch is closed and the first switch is opened to provide the input voltage to the node of the comparator.

US Pat. No. 10,395,069

RESTRICTING ACCESS TO A DEVICE

PAYPAL, INC., San Jose, ...

1. A system comprising:one or more computer-readable memories storing program instructions; and
one or more processors configured to execute the program instructions to cause the system to perform operations comprising:
determining that a first mobile device, associated with a first user, is in a process of falling or has fallen during a first time period;
in response to the determining that the first mobile device is in the process of falling or has fallen during the first time period, determining if the first mobile device is located within a safe space; and
in response to determining that the first mobile device is not located within the safe space, switching the first mobile device to stealth mode, wherein switching the first mobile device to stealth mode includes determining an image that visually matches at least a portion of a surface that is underneath the first mobile device, and displaying the image on at least one display of the first mobile device.

US Pat. No. 10,395,068

USER ACCOUNT FOR SYSTEM PROTECTION OR RECOVERY

Apple Inc., Cupertino, C...

1. A method for protecting or recovering a computing device, the method comprising, at the computing device:receiving a first request to login to a guest account that is different from a user account managed on the computing device;
establishing a session for the guest account in response to receiving the first request, wherein an initial configuration of the computing device locks the user account and requires first login credentials to deactivate the session for the guest account and to unlock the user account;
establishing a communications link with a network through the session for the guest account, wherein a different computing device is communicably coupled to the computing device through the communications link;
in response to establishing the communications link, updating the initial configuration of the computing device to a second configuration of the computing device that requires:
(i) the communications link to remain active while the session for the guest account is active, and
(ii) second login credentials to be provided to deactivate the session for the guest account and to unlock the user account;
receiving, over the communications link from the different computing device, a second request to perform an action including locking an unauthorized user from logging into the user account at the computing device; and
performing the action in response to receiving the second request.

US Pat. No. 10,395,067

METHOD OF FABRICATING A TAMPER-RESPONDENT SENSOR ASSEMBLY

INTERNATIONAL BUSINESS MA...

1. A method of fabricating a tamper-respondent sensor assembly, the method comprising:providing a first tamper-respondent sensor including:
forming at least one first formed flexible layer having opposite first and second sides with surface curvatures extending from the opposite first and second sides of the at least one first formed flexible layer; and
forming first circuit lines on at least one of the first side or the second side of the at least one first formed flexible layer, the first circuit lines defining at least one first resistive network, and the first circuit lines wrapping over or within the surface curvatures extending from the at least one of the first side or second side of the at least one first formed flexible layer;
providing a second tamper-respondent sensor including:
forming at least one second formed flexible layer having opposite first and second sides with surface curvatures extending from the opposite first and second sides of the at least one second formed flexible layer; and
forming second circuit lines on at least one of the first side or the second side of the at least one second formed flexible layer, the second circuit lines defining at least one second resistive network, and the second circuit lines wrapping over or within the surface curvatures extending from the at least one of the first side or second side of the at least one second formed flexible layer; and
overlapping, at least in part, the first tamper-respondent sensor and the second tamper-respondent sensor about at least one electronic component to be protected to facilitate defining a secure volume about the at least one electronic component to be protected.

US Pat. No. 10,395,066

METHOD FOR PROTECTING A CAMERA AND A MICROPHONE FROM UNAUTHORIZED ACCESS

KROMTECH ALLIANCE CORP., ...

1. A method for protecting a camera and a microphone from unauthorized access comprising:determining a list of audio devices and Universal Serial Bus (USB) devices connected to a computer system by a system registry of devices of the computer system,
obtaining a list of computer system camera identifiers to identify all cameras in the computer system,
tracking creation of records of process requests to access the camera and the microphone in the system registry of devices of the computer system,
storing last record information on the process requesting access to the camera or the process requesting access to the microphone from the system registry of devices of the computer system,
screening the process requesting access to the camera or a process recording sound through the microphone against a process whitelist according to the last stored record information,
providing access to the camera and to the microphone for the whitelisted process or sending a message of unavailability of the camera and blocking sound recording through the microphone for an unknown process,
informing a user about the process request to access the camera or the sound recording process that are not on the process whitelist,
adding the process requesting access to the camera and/or the sound recording process, which are not on the process whitelist, to the process whitelist or blocking the process requesting access to the camera or the process recording sound with the microphone,
wherein identifying all cameras in the computer system comprises an identification of all USB devices connected to the computer system by the system registry of devices of the computer system followed by an identification of cameras among the devices by the list of identifiers of all cameras obtained through a system component for identification of computer system devices.

US Pat. No. 10,395,065

PASSWORD PROTECTION UNDER CLOSE INPUT OBSERVATION BASED ON DYNAMIC MULTI-VALUE KEYBOARD MAPPING

International Business Ma...

1. A method for determining whether to authenticate a user, comprising:receiving a user identifier by a first keyboard;
identifying a stored password corresponding to the user identifier;
identifying a number of characters in the stored password corresponding to the user identifier;
receiving a first input from the user through the first keyboard including a password and a first number of random characters;
receiving a second input from the user through a second keyboard having a different layout from the first keyboard, the second input including the password and a second number of random characters different from the first number of random characters;
comparing the password to X characters of the first input, wherein X equals the number of characters in the stored password;
comparing the password to X characters of the second input; and
determining whether to authenticate the user when:
a subset of the X characters of the first input match the password, and
a subset of the X characters of the second input match the password.

US Pat. No. 10,395,064

CUSTOMIZED SMART DEVICES AND TOUCHSCREEN DEVICES AND CLEAN SPACE MANUFACTURING METHODS TO MAKE THEM

1. An encryption protocol protected communications system comprising:a first smart device comprising:
a first display screen, comprising a touchscreen;
a first wireless communication circuit, wherein the first wireless communication circuit communicates digital data into and out of the first smart device;
a first memory circuit of the first smart device;
a first processor, wherein the first processor performs processing steps of application software of the first smart device stored within the first memory circuit, wherein the processing steps of application software display at least a first display message on the first display screen;
a first hardware encryption device comprising:
a second memory circuit, comprising a data storage function with a write capability, wherein data values stored within the second memory circuit are written during an assembly process of the hardware encryption device into the first smart device as a series of encryption codes;
a second processor, wherein the processor receives an input data value at a data bus connected to the processor, and wherein the processor performs an encryption algorithm utilizing data values of the second memory circuit; and
a first physically measurable device, wherein the first physically measurable device is contained within encapsulating layers of the first hardware encryption device, and wherein at least a first measurement of the physically measurable device is utilized in generating the encrypted data value.

US Pat. No. 10,395,063

ZERO DETECTION CIRCUIT AND MASKED BOOLEAN OR CIRCUIT

Infineon Technologies AG,...

1. A zero detection circuit, comprisinga chain of masked OR circuits, wherein
each masked OR circuit of the chain of masked OR circuits comprises
a plurality of data inputs, wherein each data input is configured to receive
a respective data input bit,
at least one input mask input configured to receive one or more input masking bits,
at least one output mask input configured to receive an output masking bit and
a data output
and is configured to output a bit equal to an OR combination, masked with the output masking bit, of the data input bits, each demasked with an input masking bit of the one or more input masking bits, and
wherein one of the inputs of each masked OR circuit except the first masked OR circuit of the chain of masked OR circuits is coupled to the data output of the masked OR circuit preceding the masked OR circuit in the chain of masked OR circuits, and
wherein the data output of the last masked OR circuit of the chain of masked OR circuits forms an output of the zero detection circuit for outputting a zero detection result.

US Pat. No. 10,395,062

METHOD AND SERVER FOR AUTHENTICATING AND VERIFYING FILE

Coinplug, Inc., Gyeonggi...

1. A method for authenticating a file by using a system including (i) at least one user device of a user who requests an authentication of the file, (ii) a server performing the authentication of the file in response to an authentication request from the user, and (iii) a blockchain device, linked with the server, managing a blockchain of virtual currency, comprising steps of:(a) the server, when the authentication request for the file is acquired, generating or supporting another device to generate a specific message digest of the file using a hash function;
(b) the server, when a first message digest generated by encoding the specific message digest with a private key of the user is acquired from the user device, and when reference information acquired by decoding the first message digest with a public key of the user corresponds to the specific message digest generated at the step of (a), registering or supporting another device to register a hash value of a second message digest, generated by encoding the specific message digest with the private key of the user and a private key of the server, in the blockchain of the virtual currency by using the blockchain device, wherein when the reference information corresponds to the specific message digest, the server registers or supports another device to register the hash value of the second message digest, generated by encoding the specific message digest in sequence with the private key of the user and the private key of the server, in the blockchain of the virtual currency by using the blockchain device; and
(c) the server acquiring or supporting another device to acquire a transaction ID indicating a location of the hash value registered in the blockchain of the virtual currency by using the blockchain device,
wherein the authentication request includes transmission of the public key of the user by the user device,
after the step of (a), further comprising a step of:
(a1) the server transmitting or supporting another device to transmit the specific message digest to the user device,
after the step of (a1), further comprising a step of:
(a2) the server acquiring or supporting another device to acquire the first message digest, the public key of the user, and the specific message digest.

US Pat. No. 10,395,061

EFFICIENT AUDITING OF DATA IN OBJECT STORAGE

International Business Ma...

1. A computer program product for auditing data in object storage, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by an object storage system to cause the object storage system to:receive, by the object storage system, a directive to audit an object;
audit, by the object storage system, the object based on the directive, wherein auditing the object comprises determining a presence or an absence of corruption in the object; and
generate, by the object storage system, a result of the audit of the object,
wherein auditing the object includes calculating a unique value based on contents of the object,
wherein an eventual consistency loop is triggered in response to a determination that the calculated unique value is not the same as an expected unique value, wherein the eventual consistency loop includes:
calculating additional unique values based on the contents of the object, and
comparing the calculated unique value to the additional unique values until determining:
the calculated unique value is identical to one of the additional unique values, and/or
an amount of time elapsed since determining the calculated unique value is not the same as the expected unique value is greater than a predetermined timeout threshold, wherein the predetermined timeout threshold is based on:
a maximum object size of the object storage system, and
a longest time expected to elapse while writing the object having the maximum object size to the object storage system.

US Pat. No. 10,395,060

MULTIPLE MESSAGE RETRIEVAL FOR SECURE ELECTRONIC COMMUNICATION

Microsoft Technology Lice...

1. A system for obscuring mailbox identity during transmission of electronic communications, the system comprising:at least one processor; and
at least one computer-readable storage medium storing instructions that are executable by the at least one processor to perform operations including:
storing target electronic communications across multiple mailboxes, wherein the target electronic communications having one or more encrypted labels;
sorting the multiple mailboxes into multiple mailbox bins that each comprise a label range for the multiple mailboxes, wherein the sorting comprises indexing locations of the multiple mailboxes within the multiple mailbox bins based on the one or more encrypted labels;
receiving a query including: one or more probes to locate indexed locations of at least one target mailbox in each of the multiple mailbox bins, and a query vector that comprises encrypted entries to isolate content from the at least one target mailbox in each of the multiple mailbox bins; and
sending the isolated content of the at least one target mailbox in each of the multiple mailbox bins to an external computing device based on processing of the query vector.

US Pat. No. 10,395,059

SYSTEM AND METHOD TO REDUCE A RISK OF RE-IDENTIFICATION OF TEXT DE-IDENTIFICATION TOOLS

PRIVACY ANALYTICS INC., ...

1. A computer-implemented method to reduce a risk of re-identification of personal information (PI) of a plurality of patients in a plurality of unstructured documents while preserving the PI and analytic quality and maintaining a justifiable low risk of re-identification in a data set, the method comprising the steps of:on a processor:
comparing a first sample of the plurality of unstructured documents annotated by a human authority to the first sample of the plurality of unstructured documents annotated by the computing device to determine metrics of leak rates indicating PI of one or more patients missed by the annotation by the computing device;
constructing one or more structured documents corresponding to the one or more patients missed by the annotation by the computing device;
determining a de-identification strategy to maximize analytic quality of the one or more structured documents and to maintains the risk of re-identification below a maximum acceptable risk threshold, wherein the de-identification strategy defines what PI is to suppress, perturb, and retain; and
applying the determined de-identification strategy to the plurality of unstructured documents by
retrieving a data set from a database communicatively coupled to the processor, the data set is selected to include the plurality of unstructured documents including patient medical records that meet a predetermined criteria;
identifying direct identifiers and quasi-identifiers in the data set;
calculating a first probability of re-identification from the direct identifiers and a second probability of re-identification from the quasi-direct identifiers;
perturbing the data set if one of the first probability or second probability exceeds a respective predetermined threshold, to produce a perturbed data set; and
providing the perturbed data set.

US Pat. No. 10,395,058

SYSTEMS AND METHODS FOR OBTAINING ANONYMIZED INFORMATION DERIVED FROM DATA OBTAINED FROM EXTERNAL DATA PROVIDERS

FORTIFID, INC., San Jose...

1. A computer-implemented method, comprising:generating, by a persona management system, a searchable data store containing metadata related to a plurality of users of the persona management system, the metadata including entries indicating:
a first identifier of a user of the plurality of users of the persona management system,
a second identifier of an external data provider of a plurality of external data providers that possess data related to users of the persona management system,
a third identifier of an algorithm that is used to transform data possessed by the external data provider related to the user of the persona management system into one or more transformed data values, and
the one or more transformed data values, wherein the one or more transformed data values include one or more dimensionally reduced values, and wherein the one or more dimensionally reduced values obfuscate the data possessed by the data provider about the user of the persona management system;
receiving a request to obtain identifiers of users matching one or more criteria, wherein each of the one or more criteria is related to an algorithm of a plurality of algorithms used to generate the searchable data store;
identifying, based on the searchable data store, one or more users of the persona management system that are associated with one or more transformed data values satisfying the one or more criteria; and
providing anonymous identifiers of the one or more users of the persona management system that are associated with one or more transformed data values satisfying the one or more criteria.

US Pat. No. 10,395,057

PROFILE MANAGEMENT

WELLS FARGO BANK, N.A., ...

1. A method for applying profile management that creates value mapping, comprising:enabling, by a system comprising a hardware processing unit,
application of rights management rules to a profile that is created by a first entity
wherein content of the profile is associated with a plurality of entities and the content includes personal information associated with the first entity, the content of the profile is segregated into portions that are based on the plurality of entities that provides the content, at least a subset of the rights management rules is based at least in part on an identity of one of the plurality of entities that provides content of at least a corresponding content portion, and types of rights are assigned based at least in part on the identity;
providing, by the system, social networking between the first entity and other entities of the plurality of entities;
collecting, by the system, additional content to update the profile;
establishing, based on search criteria, a mapping of personal goals from the personal information of the profile to the additional content, wherein the mapping comprises:
identifying the other entities from the collected additional content,
matching the identified other entities to the first entity based at least on the personal goals matching at least a part of the collected additional content,
identifying access rights of the other entities from the provided social networking,
identifying potential rights management rule changes to the profile based on the collected additional content and the identified access rights,
providing notifications to each of the identified other entities of the matching, and
enabling at least one of the first entity or the identified other entities to preview at least a respective matching profile;
wherein based upon receipt of a notification response to at least one of the identified other entities and based on the mapping, updating the profile and implementing the potential rights management rule changes; and
enabling the identified other entities to access the updated profile based on the identified access rights.

US Pat. No. 10,395,056

PROTECTING PRIVACY OF DIGITAL IMAGES

International Business Ma...

1. A computer-implemented method for protecting personal privacy of one or more persons in a photo, comprising:receiving, at a hardware processor, digital image data of a digital photo including a face of at least one person;
performing, by the hardware processor, based on said digital image data, a face recognition on the at least one person in the digital photo to thereby recognize the at least one person;
determining, at the hardware processor, a cross-relationship value between another person requesting access to the digital photo and the at least one person recognized, based on a degree of closeness between said another person and the at least one person, wherein a first cross-relationship value indicates a degree of closeness between said another person and the at least one person recognized meeting a predetermined criterion and a second cross-relationship value indicates a closeness relationship between said another person and the at least one person recognized not meeting a predetermined criterion;
modifying, using said hardware processor, said digital image data responsive to performing the face recognition on the at least one person in the photo, to blur the face of the at least one person in the digital photo;
outputting, using said hardware processor, said digital photo to a display device associated with said another person for viewing of said digital photo; and
determining, at the hardware processor, whether or not to show said another person the face of the at least one person recognized in the digital photo, based on the cross-relationship value,
said digital image data being modified so that said blur of the face of said at least one person in the output digital photo is removed when accessed at the associated display device in response to determining the first cross-relationship value, or so that said blur of the face of said at least one person in the digital photo is not removed when accessed at the associated display device in response to determining the second cross-relationship value, wherein a degree of closeness represents one or more of:
a first number indicating an amount of the another person's visits to a web site associated with the at least one person recognized;
a second number indicating an amount of the another person's views or comments to posts or images uploaded by the at least one person recognized,
wherein a predetermined criterion for determining a first cross-relationship value or second cross-relationship value is a threshold number of said visits, views or comments against which a corresponding the first number and or the second number is measured.

US Pat. No. 10,395,055

SCALE-BASED DATA ACCESS CONTROL METHODS AND APPARATUSES

Physiowave, Inc., Menlo ...

1. An apparatus comprising:a scale comprising:
a platform for a user to stand on,
data-procurement circuitry, including force-sensor circuitry and a plurality of electrodes integrated with the platform, and configured and arranged to collect cardio-physiological measurements while the user is standing on the platform and signals indicative of the user's identity, and
processing circuitry configured and arranged with the force-sensor circuitry and the plurality of electrodes to receive data obtained by the data-procurement circuitry and, in response, derive and output user data to external circuitry, including data indicative of the user's identity and the cardio-physiological measurements; and
the external circuitry configured and arranged to:
validate the user data as concerning a specific user having a user profile using the data indicative of the user's identity;
correlate the user data with the user profile of the user in response to the validation;
generate a clinical indication corresponding to the user by processing the user data in response to receiving authorization provided by or on behalf of a physician for the user to receive the clinical indication, the clinical indication including indications selected from the group consisting of: pulse wave velocity, cardiac output, pre-ejection period, stroke volume, and a combination thereof; and
control access to the user profile of the user by:
not allowing the user to access the clinical indication until after authorization for receipt by the user is provided by or on behalf of the physician; and
not allowing the user to access to the clinical indication until the user provides an input indicative of interest in the clinical indication and a prescription for the clinical indication is provided.

US Pat. No. 10,395,054

UPDATING DISTRIBUTED STORAGE NETWORK SOFTWARE

PURE STORAGE, INC., Moun...

1. A method of updating software in a dispersed storage network (DSN), where the DSN includes a plurality of dispersed storage (DS) units having respective software including one or more of operating system software, bootstrap firmware, application software, and software configuration information, the method comprising:identifying, by one DS unit of the plurality of DS units, a subset of other DS units of the plurality of DS units, wherein the one DS unit and the subset of other DS units comprise a set of DS units of the plurality of DS units that store encoded data slices associated with a storage vault, and wherein a decode threshold number of DS units is needed to reconstruct original data encoded in the encoded data slices;
determining, by the one DS unit, that a number of available DS units in the set of DS units is greater than the decode threshold number of DS units based on an update status of the set of DS units; and
updating, by the one DS unit, the respective software of the set of DS units, including the respective software of the one DS unit itself, while maintaining availability of the decode threshold number of DS units of the set of DS units to service access requests to the original data encoded in the encoded data slices.

US Pat. No. 10,395,053

METHOD FOR INHIBITING MASS CREDENTIAL THEFT

1. A method to represent access credentials, the method comprising:receiving a first access credential;
generating a random data bit string O with a bit count that is equal to the value of the first access credential, wherein the identities of the bits of the random data bit string O are randomly selected from any of the potential 2n permutations of bits, where n is the bit count of the random data bit string O;
providing the generated random bit string O to a party for use as an authentication credential;
storing a copy of the random data bit string O in an off-line file;
creating a data bit string Ot that has a Hamming distance oft from the random data bit string O (H(O, Ot)=t);
storing the data bit string Ot in a verifier; and
authenticating, by the verifier, a submitter of a received second access credential as the party that was provided the generated random bit string O if and only if the received second access credential has the Hamming distance of t from the stored data bit string Ot.

US Pat. No. 10,395,052

MANAGING DATA HANDLING POLICIES

TRUSTARC INC, San Franci...

1. A method of automatically obtaining sensitive data in accordance with a set of predetermined policy commitments including data handling policies a node commits to for handling and protecting sensitive data, the method comprising:establishing a secure connection between a first node and a second node across a network;
providing a request from the first node to obtain a set of sensitive data from the second node;
providing a set of certified policy commitments from the first node, wherein the set of certified policy commitments includes data handling policies that the first node commits to utilize in handling and protecting the set of sensitive data of the second node, and wherein the set of policy commitments are provided to the second node for authentication and for comparison of the data handling policies of the first node to data handling policies of a set of predetermined policy requirements the second node requires for handling and protecting the requested sensitive data prior to the second node providing access to the first node of the requested set of sensitive data; and
as an indication of positive authentication of the set of policy commitments and an indication that the data handling policies of the set of policy commitments of the first node at least meet the data handling policies of the set of predetermined policy requirements of the second node, receiving access to the requested set of sensitive data from the second node.

US Pat. No. 10,395,051

IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF

SAMSUNG ELECTRONICS CO., ...

1. An image processing apparatus comprising:a random access memory (RAM);
a processor configured to process data that is encrypted;
a descrambler configured to:
decrypt the data that is encrypted and processed by the processor; and
store, in the RAM, the data decrypted by the descrambler;
a decoder configured to:
obtain, from the RAM, the data decrypted by the descrambler and stored in the RAM;
decode the data decrypted by the descrambler and obtained from the RAM; and
output the data decoded by the decoder, to be displayed as an image on a display;
a read-only memory configured to store access authority information to the RAM; and
a RAM controller configured to:
obtain, from the read-only memory, the access authority information stored in the read-only memory;
block the processor from accessing the data decrypted by the descrambler and stored in the RAM, based on the access authority information obtained from the read-only memory indicating that the processor is blocked from accessing the data decrypted by the descrambler and stored in the RAM; and
authorize the decoder to access the data decrypted by the descrambler and stored in the RAM, based on the access authority information obtained from the read-only memory indicating that the decoder is authorized to access the data decrypted by the descrambler and stored in the RAM.

US Pat. No. 10,395,050

POLICY STORAGE USING SYNTAX GRAPHS

Oracle International Corp...

1. One or more non-transitory machine-readable media storing instructions that, when executed by one or more processors, cause:receiving a user-defined policy statement comprising a requestor variable value, an action variable value, a resource variable value, and a location variable value, wherein the user-defined policy statement describes an authorization policy for a requestor associated with the requestor variable value to perform an action associated with the action variable value on a resource associated with the resource variable value in a system location associated with the location variable value;
converting the user-defined policy statement to a canonical policy statement, wherein converting the user-defined policy statement comprises:
(a) mapping the requestor variable value to a unique system-wide requestor identifier, and
(b) mapping the location variable value to a unique system-wide location identifier;
generating a syntax graph of the canonical policy statement, wherein the syntax graph is traversable to determine whether the authorization policy is satisfied for a particular authorization request;
storing the syntax graph for use by an authorization service executing in a computer system;
traversing, by the authorization service, at least part of the syntax graph to determine whether the authorization policy is satisfied for the particular authorization request;
receiving a second user-defined policy statement;
converting the second user-defined policy statement to a second canonical policy statement;
generating a multi-policy syntax graph comprising the first canonical policy statement and the second canonical policy statement; and
storing the multi-policy syntax graph for use by the authorization service.

US Pat. No. 10,395,049

CONDITIONAL SECURITY INDICATOR SHARING

ENTIT SOFTWARE LLC, Sunn...

1. A non-transitory computer readable medium comprising instructions that when executed cause a system to:receive a security indicator from a first entity by a sharing platform for sharing with a second entity;
analyze a rule;
determine a cardinality condition associated with the rule based on the analysis of the rule, the cardinality condition specifying that the security indicator is to be shared with an entity that is experiencing a specified type of attack and that already has a predetermined amount of security indicators that have been shared with the entity;
determine whether to share the security indicator with a third entity based on the cardinality condition;
in response to a determination that the security indicator is to be shared with the third entity based on a determination that the third entity has the predetermined amount of security indicators that have been shared with the third entity, share the security indicator with the third entity as part of a collaboration between the first and third entities in addressing the specified type of attack; and
in response to a determination that the security indicator is not to be shared with the third entity based on a determination that the third entity does not have the predetermined amount of security indicators that have been shared with the third entity, not share the security indicator with the third entity.

US Pat. No. 10,395,048

METHOD FOR PROTECTING CLOUD STORAGE VIDEO DATA AND SYSTEM THEREOF

HANG ZHOU HIKVISION DIGIT...

1. A method for protecting cloud storage video data, wherein the method comprises following steps:when receiving a request to protect video data in a memory, setting by a processor a corresponding locking flag and information representing locking time for the video data;
when the locking time of the video data having been locked is reached, clearing by the processor the corresponding locking flag for the video data; and
when triggering cyclic overwriting, overwriting by the processor video data which is stored for longest time without a corresponding locking flag by new video data to be stored in the memory,
wherein the step of setting by a processor a corresponding locking flag and information representing locking time for the video data further comprises substeps:
setting by a processor a locking password; and
when receiving a request for manually removing the video data from the memory or manually clearing the corresponding locking flag for the video data, performing by the processor a password validation on the video data: if the validation is passed, removing or unlocking by the processor the video data; otherwise rejecting removing or unlocking by the processor the video data,
wherein in the step of setting by the processor a corresponding locking flag and information representing locking time for the video data, the video data is video data within a future time period, and automatically locking by the processor the video data within the future time period is implemented by setting a locking plan,
wherein the automatically locking comprises the following substeps:
setting by the processor a locking plan for a specific type or all types of video data within a future time period;
determining by the processor whether a time period set by the locking plan is reached;
if the set time period is reached, automatically setting by the processor a corresponding locking flag and information representing locking time for the video data matching a condition of the locking plan within the time period; and
setting by the processor a locking password corresponding to the locking plan for the locking.

US Pat. No. 10,395,047

SYSTEM AND METHOD OF APPLYING MULTIPLE ADAPTIVE PRIVACY CONTROL LAYERS TO SINGLE-LAYERED MEDIA FILE TYPES

Entefy Inc., Palo Alto, ...

1. A non-transitory computer readable medium comprising computer executable instructions stored thereon that when executed cause one or more processing units to:receive an indication of a first protected portion and a second protected portion of a file of a single-layered, lossy file type having first dimensions, wherein the file further comprises anchor points;
receive first and second respective access permission settings for each of the first and second protected portions;
receive an indication of a first recipient for the first protected portion;
receive an indication of a second recipient for the second protected portion;
generate a first layer representation corresponding to the first protected portion and a second layer representation corresponding to the second protected portion;
generate an edited copy of the file based on the indication of the first and the second protected portions to create an edited single-layered, lossy file;
add the first and second layer representations back into the file structure of the edited single-layered, lossy file;
crop the edited single-layered, lossy file to have dimensions different from the first dimensions; and
transmit the cropped and edited single-layered, lossy file to the first and the second recipients,
wherein the anchor points are configured to align the first and second layer representations at the correct positions within the cropped and edited single-layered, lossy file when an authorized recipient views the cropped and edited single-layered, lossy file in an authorized viewing application.

US Pat. No. 10,395,046

WORK PROCESS MANAGEMENT SYSTEM, INDIVIDUAL CONTROLLER USED THEREIN, AND ACCESS RESTRICTION METHOD

OMRON Corporation, Kyoto...

1. A work process management system in an on-demand multi-product production environment, the system comprising:a work device comprising:
a work-device-side communicator comprising a first transmitter, a first receiver, and a first antenna, the work-device-side communicator configured to conduct external radio communication, and configured to transmit characteristic identification information;
a work part comprising a production machine configured to perform at least one work process on a work object;
a work-device-side control part comprising a first processor configured to perform operations comprising:
transmitting an access request to access associated information associated with a work content of the work process, or the work object through the work-device-side communicator, and
controlling the work process performed with the work part based on a reception result received in response to the access request and a command received through the work-device-side communicator, and
an individual controller attached to the work object, the individual controller controlling the work device, the individual controller comprising:
a second processor;
an individual-controller-side storage comprising a memory, in which the work content of the work process, the associated information, and access restriction information about the associated information are stored with respect to the work object;
an individual-controller-side communicator comprising a second transmitter, a second receiver, and a second antenna, the individual-controller-side communicator configured to perform external radio communication; and
an individual-controller-side calculation controller comprising the second processor, the second processor configured to perform operations comprising:
calculating a command value to be transmitted in the command for the work device to perform the work content of the work process, the command value calculated based on: a kind of the work device determined based on the characteristic information received from the work device; and the associated information associated with the work content of the work process, or the work object,
transmitting the command to the work-device-side communicator of the work device through the individual-controller-side communicator,
in response to receiving the access request to access the associated information from the work device through the individual-controller-side communicator, determining whether the access is permitted based on the access restriction information and the kind of the work device, and
transmitting the associated information to the work device through the individual-controller-side communicator only when permitting the access, wherein
the work device performs the work process based on the transmitted associated information and the transmitted command.

US Pat. No. 10,395,045

COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS AND SCANNING FOR PLAGIARISM

Dropbox, Inc., San Franc...

1. A computer implemented method comprising:receiving, by a content management system and from a client device associated with a collector, a request to collect electronic files from a plurality of submitters;
generating, by the content management system, a link to a designated collection folder based on the request to collect the electronic files from the plurality of submitters, wherein the designated collection folder is associated with an account of the collector within the content management system;
distributing, by the content management system, the link to the designated collection folder to a plurality of client devices associated with the plurality of submitters;
receiving, by the content management system, an electronic file from a client device associated with a submitter of the plurality of submitters based on the submitter accessing the link to the designated collection folder;
storing, by the content management system, the electronic file in the designated collection folder;
receiving, by the content management system, additional electronic files from other client devices associated with other submitters of the plurality of submitters based on the other submitters accessing the link to the designated collection folder;
storing, by the content management system, the additional electronic files in the designated collection folder;
providing the submitter limited rights to the designated collection folder, wherein the limited rights allow for the submitter to upload the electronic file to the designated collection folder and prohibits the submitter from viewing the additional electronic files in the designated collection folder from the other submitters;
generating a similarity parameter corresponding to the electronic file by scanning the electronic file for plagiarism;
determining whether the similarity parameter corresponding to the electronic file meets a predetermined threshold;
if the similarity parameter meets or exceeds the predetermined threshold, sending, to the client device associated with the collector, a plagiarism notification via an electronic message, wherein the plagiarism notification indicates the electronic file is suspected of plagiarism based on determining that the similarity parameter corresponding to the electronic file meets the predetermined threshold; and
based on the similarity parameter being below the predetermined threshold, storing a plagiarism report that indicates a lack of plagiarism within the electronic file without sending the electronic message that includes the plagiarism notification.

US Pat. No. 10,395,044

METHOD AND APPARATUS FOR SECURING COMPUTER MASS STORAGE DATA

Janus Technologies, Inc.,...

1. A system for securely storing computer system data comprising:a mass storage including a SATA device;
a host processor system including a SATA host, the host processor system executing an operating system and applications that produce and use data stored on the mass storage via the SATA host; and
a secure subsystem including a SATA complex, the secure subsystem being interposed between the SATA host of the host processor system and the SATA device of the mass storage,wherein the SATA complex includes a SATA device core that communicates with the SATA host of the host processor system when the operating system and applications are producing and using the data stored on the mass storage device.

US Pat. No. 10,395,043

SECURELY STORING DATA IN AN ELASTICALLY SCALABLE DISPERSED STORAGE NETWORK

INTERNATIONAL BUSINESS MA...

1. A method for execution by a dispersed storage and task (DST) processing unit that includes a processor, the method comprises:generating an encoded data slice from a dispersed storage encoding of a data object;
determining when the encoded data slice will not be stored in local dispersed storage;
when the encoded data slice will not be stored in the local dispersed storage:
storing the encoded data slice via at least one elastic slice in an elastic dispersed storage by:
dispersed storage encoding the encoded data slice into a plurality of elastic slices; and
storing the plurality of elastic slices in a plurality of storage units of the elastic dispersed storage;
generating cryptographic material and an elastic storage pointer indicating a location of the elastic slice in the elastic dispersed storage;
generating a read error indicator based on the cryptographic material, wherein the read error indicator is used to verify the encoded slice data or the elastic slices; and
storing the cryptographic material and the elastic storage pointer in the local dispersed storage when the encoded data slice is stored in the at least one elastic slice in the elastic dispersed storage.

US Pat. No. 10,395,042

DATA ENCRYPTION SERVICE

Oracle International Corp...

1. A system comprising:a central data store comprising:
information related to a plurality of applications hosted in a cloud computing environment,
information related to a plurality of cryptographic policies used to secure the plurality of applications, and
information related to a plurality of encryption objects used to secure the plurality of applications; and
one or more computing devices configured to provide one or more data encryption services, wherein at least one computing device from the one or more computing devices comprises:
one or more processors, and
a memory having stored thereon a set of instructions that, when executed by the one or more processors, cause the one or more processors to:
receive an application policy to apply to an application of the plurality of applications, the application policy specifying a type of encryption for securing at least a portion of data in the application;
in response to receiving the application policy:
identify the portion of the data in the application to be secured based on the application policy;
determine, based at least in part on the application policy, a cryptographic policy from the plurality of cryptographic policies for securing the portion of the data in the application, wherein the cryptographic policy specifies an encryption object of the plurality of encryption objects for securing the portion of the data in the application, and wherein the cryptographic policy is stored in the central data store; and
generate and store, in the central data store, a mapping between the application policy and the cryptographic policy for the portion of the data in the application;
receive, from a user device, a request for the portion of the data; and
in response to receiving the request:
acquire the encryption object from the central data store, based at least in part on the cryptographic policy;
secure the portion of the data in the application using the encryption object in accordance with the application policy and the cryptographic policy;
transmit the secured portion of the data to the user device; and
transmit notification information related to the application to a remote computing device, wherein the notification information comprises at least one of a roll-over date of the encryption object used to secure the portion of the data in the application, an expiry date of the encryption object, and a renewal date of the encryption object.

US Pat. No. 10,395,040

SYSTEM AND METHOD FOR IDENTIFYING NETWORK SECURITY THREATS AND ASSESSING NETWORK SECURITY

vThreat, Inc., Austin, T...

1. A method for security assessment of a computer network, the method comprising:transmitting a first executable program code from a security assessor that controls one or more security assessment computers on a network to a first end device on the network, the first executable program code for acting as an agent on the first end device, and the first executable program code configured to be executed by a browser application of the first end device,
wherein the first executable program code is configured to collect software and/or hardware attribute information regarding the first end device and transmit the same to at least a first security assessment computer of the one or more security assessment computers,
wherein the first executable program code is configured to collect vulnerability information of the first end device, and
wherein the vulnerability information of the first end device is received by at least the first security assessment computer;
transmitting a second executable program code from the security assessor to the first end device, the second executable program code for acting as an agent on the first end device, and the second executable program code configured to be executed by the browser application of the first end device,
wherein the second executable program code is selected based on the vulnerability information of the first end device received by at least the first security assessment computer, and
wherein the second executable program code is configured to be used to perform a security assessment using the first end device;
displaying results of the security assessment;
selecting an artifact from the displayed results; and
automatically querying a third party security database based on the selected artifact for security information related to the artifact.

US Pat. No. 10,395,039

CUSTOMER-OWNED TRUST OF DEVICE FIRMWARE

Dell Products, L.P., Rou...

1. An Information Handling System (IHS), comprising:a processor; and
a Basic Input/Output System (BIOS) coupled to the processor, the BIOS having program instructions stored thereon that, upon execution, cause the IHS to:
receive, from a user during a boot process, selection of a pre-boot code module;
export, during the boot process, a digest of the pre-boot code module to the user;
import, during the boot process, a signed digest signed by the user;
store a public key or certificate usable to authenticate the signed digest in a primary database (db) of a Secure Boot policy, wherein the primary database (db) does not allow storage of the signed digest;
store the signed digest in a secondary database (db2) of the Secure Boot policy, wherein the secondary database is distinct from a revoked signature database (dbx) of the Secure Boot policy; and
in response to the pre-boot code module failing Secure Boot verification during a subsequent booting of the IHS:
calculate a digest for the pre-boot code module;
search the secondary database (db2) of the Secure Boot policy for a digest matching the calculated digest;
in response to finding the matching digest in the secondary database (db2), verify the signature of the matching digest against one or more public keys or certificates stored in the primary database (db) of the Secure Boot policy; and
in response to verification of the signature of the matching digest, load the pre-boot code module.

US Pat. No. 10,395,038

SYSTEM AND METHOD FOR AUTOMATIC RECOVERY OF FIRMWARE IMAGE

QUANTA COMPUTER INC., Ta...

1. A method for recovering a firmware image in a computer device, the method comprising:creating a shadow firmware image in a storage device from a firmware image in non-volatile memory;
determining whether a predetermined event affecting the firmware image has occurred;
recovering, by a control circuit, the shadow firmware image from the storage device,wherein the control circuit includes an internal memory with an internal bit indicating the predetermined event;copying, by the control circuit, the shadow firmware image to the non-volatile memory;
updating the firmware image in the non-volatile memory;
determining whether the shadow firmware image is identical to the firmware image; and
replacing the shadow firmware image in the storage device with the updated firmware image in the non-volatile memory,
wherein a check sum of the shadow firmware image is determined, and
a check sum of the firmware image is determined in determining whether the shadow firmware image is identical to the firmware image.

US Pat. No. 10,395,037

SYSTEM AND METHOD FOR PRESERVING DATA DURING AN INFORMATION HANDLING SYSTEM EVENT USING INFORMATION HANDLING SYSTEM MEMORY

Dell Products, LP, Round...

1. An information handling system comprising:a non-volatile memory; and
a processor system coupled to the non-volatile memory to access the non-volatile memory, the processor system including a processor core and a corresponding platform security processor (PSP) having a PSP memory, wherein a BIOS of the processor system running on the processor core stores data to be preserved in response to a stimulus at memory addresses in the non-volatile memory, provides the memory addresses to the PSP, and provides a preserve memory command, and the PSP stores the memory addresses in the PSP memory and maintains the data in the non-volatile memory at the memory addresses during the stimulus affecting the processor system.

US Pat. No. 10,395,036

CONTINUED RUNTIME AUTHENTICATION OF INFORMATION HANDLING SYSTEM (IHS) APPLICATIONS

Dell Products, L.P., Rou...

1. An Information Handling System (IHS), comprising:one or more processors; and
a memory coupled to the one or more processors, the memory including program instructions stored thereon that, upon execution by the one or more processors, cause the IHS to:
receive a command to execute an application;
initially verify a plurality of tokens, wherein a first token is provided by the application, a second token is provided by an application manager, and a third token is provided by a hardware component within the IHS;
execute the application in response the initial verification being successful; and
perform a continued verification of at least two of the plurality of tokens after the initial verification has been successful and during execution of the application.

US Pat. No. 10,395,035

PHOTON EMISSION ATTACK RESISTANCE DRIVER CIRCUITS

Intel Corporation, Santa...

1. An apparatus comprising:diffusion regions located adjacent each other in a substrate, the diffusion regions including first diffusion regions, second diffusion regions, and third diffusion regions, wherein one of the second diffusion regions and one of the third diffusion regions are between two of the first diffusion regions, and one of the first diffusion regions and one of the third diffusion regions are between two of the second diffusion regions, wherein the first, second, and third diffusion regions have a same conductivity type;
a first connection coupled to each of the first diffusion regions;
a second connection coupled to each of the second diffusion regions; and
a third connection coupled to each of the third diffusion regions.

US Pat. No. 10,395,034

DATA TRACKING IN USER SPACE

International Business Ma...

1. A method comprising:marking, by a set of processors, a first location in a storage, wherein (i) the first location is a store for a set of data based, at least in part, on a first section of code in a program, (ii) the set of data is requested in a set of data requests from the program, and (iii) the program is encrypted;
determining, by the set of processors, that a second section of code in the program attempts to access the first location;
injecting, by the set of processors, a set of instrumentation code into the program according to a dynamic tracing framework, wherein the set of instrumentation code (i) is a dynamic binary instrumentation, (ii) is injected subsequent to the second section of code in an instruction execution stream, and (iii) does not modify the second section of code;
determining, by the set of processors, the instrumentation code executes;
examining, by the set of processors, the first section of code and a set of subsequent instructions in the program, wherein the set of subsequent instructions references the first location;
scanning, by the set of processors, the first location for a set of threats;
determining, by the set of processors, the set of threats exist; and
taking, by the set of processors, a defensive measure.

US Pat. No. 10,395,033

SYSTEM, APPARATUS AND METHOD FOR PERFORMING ON-DEMAND BINARY ANALYSIS FOR DETECTING CODE REUSE ATTACKS

Intel Corporation, Santa...

1. At least one non-transitory computer readable storage medium comprising instructions that when executed enable a computing system to:in response to a validation request associated with a first control transfer instruction, perform, in a binary analysis engine of a hardware binary translation logic, a first binary analysis of a first code region comprising a caller-based side and including a return target of the first control transfer instruction to determine whether a second control transfer instruction is included in the first code region;
if the second control transfer instruction is included in the first code region, perform, in the binary analysis engine, a second binary analysis of a second code region comprising a callee-based side and including a call target of the second control transfer instruction to determine whether the second code region includes the first control transfer instruction;
identify the first control transfer instruction as likely to be part of a code reuse attack when the second control transfer instruction is not included in the first code region or the first control transfer instruction is not included in the second code region; and
report the identification of the first control transfer instruction as likely to be part of the code reuse attack to a security agent within the computing system to cause the security agent to take at least one security action in response to the identification.

US Pat. No. 10,395,031

SYSTEMS AND METHODS FOR MALWARE DETECTION AND SCANNING

VERISIGN, INC., Reston, ...

1. A computer-implemented method, operating in a hub computing device, for malware scanning and detection, the method comprising:receiving, by the hub computing device from a separate controller computing device, a malware scan request having:
a first portion that includes an identification of a target website, and
a second portion that includes instructions to scan the target website;
identifying, by the hub computing device, a plurality of first spoke honeypot computing devices for performing the malware scan request on the target website, wherein:
at least one first spoke honeypot computing device of the plurality of first spoke honeypot computing devices is separate from the hub computing device,
at least one first spoke honeypot computing device is configured to use a second spoke honeypot computing device as a proxy, and
the second spoke honeypot computing device appears to originate from a different address than the plurality of first spoke honeypot computing devices;
sending, by the hub computing device to the plurality of first spoke honeypot computing devices, the malware scan request received from the controller computing device, wherein at least one first spoke honeypot computing device of the plurality of first spoke honeypot computing devices is configured to route the malware scan request to the second spoke honeypot computing device;
receiving, by the hub computing device from at least one first spoke honeypot computing device of the plurality of first spoke honeypot computing devices, a first set of results associated with performing the malware scan request, wherein performing the malware scan request includes visiting the target website by at least one first spoke honeypot computing device of the plurality of first spoke honeypot computing devices or by the second spoke honeypot computing device; and
sending, to the controller computing device, the first set of results associated with performing the malware scan request.

US Pat. No. 10,395,030

BINARY SEARCH OF BYTE SEQUENCES USING INVERTED INDICES

CrowdStrike, Inc., Irvin...

9. A computer-implemented method comprising:for each byte sequence of a fixed length comprising a file, searching an inverted index which specifies byte sequences of the fixed length and, for each specified byte sequence, file identifiers of files that include the specified byte sequence;
identifying a subset of search results of the searching that are associated with the fewest numbers of file identifiers; and
constructing a fuzzy hash from byte sequences comprising the subset of the search results.

US Pat. No. 10,395,029

VIRTUAL SYSTEM AND METHOD WITH THREAT PROTECTION

FireEye, Inc., Milpitas,...

1. A computing device comprising:one or more hardware processors; and
a memory coupled to the one or more processors, the memory comprises one or more software components that, when executed by the one or more hardware processors, provide a virtualization software architecture including (i) a virtual machine, (ii) a plurality of hyper-processes and (iii) a hypervisor, wherein
the visual machine to operate in a guest environment and includes a process that is configured to monitor behaviors of data under analysis within the virtual machine,
the plurality of hyper-processes to operate in a host environment and isolated from each other within an address space of the memory, the plurality of hyper-processes include a threat protection process to classify the data under analysis as malicious or non-malicious based on the monitored behaviors and a guest monitor process configured to manage execution of the virtual machine and operate with the process to obtain and forward metadata associated with the monitored behaviors to the threat protection process, and
the hypervisor is configure to enforce temporal separation of the plurality of hyper-processes and enable inter-process communications between the plurality of hyper-processes.

US Pat. No. 10,395,028

VIRTUALIZATION BASED INTRA-BLOCK WORKLOAD ISOLATION

Intel Corporation, Santa...

1. One or more non-transitory computer-readable storage devices having instructions stored thereon that, when executed by at least one processor of a first computing device, result in operations for workload isolation, the operations comprising:create a secure virtualization environment associated with a processor block of a system, the secure virtualization environment managed by a virtual machine manager (VMM);
load data into a memory of the secure virtualization environment;
generate a workload package, wherein the workload package is associated with a first workload and a second workload, the workload package based on the data and stored in the memory of the secure virtualization environment; and
submit the workload package to an operational block of the system;
cause the operational block to execute the first and second workloads from the secure virtualization environment;
wherein the workloads being executed in the secure virtualization environment are isolated from other operations being executed by the operational block.

US Pat. No. 10,395,027

CO-EXISTENCE OF MANAGEMENT APPLICATIONS AND MULTIPLE USER DEVICE MANAGEMENT

VMWARE, INC., Palo Alto,...

1. A non-transitory computer-readable medium embodying program code executable in a client device that, when executed by the client device, causes the client device to provide execution of both a first management application and a second management application on the client device by:identifying that the first management application installed on the client device has device management privileges with an operating system of the client device through enrollment of the client device with a first remote service, the first management application being configured to generate a terminate command that terminates execution of any other management application on the client device;
installing the second management application on the client device, the second management application being configured to obtain device management privileges with the operating system of the client device through enrollment of the client device with a second remote service; and
intercepting the terminate command prior to a receipt of the terminate command by the operating system such that the operating system does not terminate execution of the second management application on the client device.

US Pat. No. 10,395,026

METHOD FOR PERFORMING SECURITY FUNCTION AND ELECTRONIC DEVICE FOR SUPPORTING THE SAME

Samsung Electronics Co., ...

1. An electronic device, comprising:a memory configured to store an application;
a communication interface; and
a processor operatively connected to the memory and the communication interface,
wherein the processor is configured to:
receive a request to install or execute the application,
transmit an authentication request for the application to an external electronic device using the communication interface in response to the request,
receive a response indicating an authentication result from the external electronic device using the communication interface in response to the authentication request,
when the response indicates that the application is unauthenticated, determine whether a first image of an execution icon of the application includes a second image of a predetermined security indication by comparing at least part of the first image with the second image,
when the first image includes the second image, provide a notification of a security warning for the application and restrict an installation and execution of the application,
determine that the first image includes the second image when a similarity between the at least part of the first image and the second image is greater than a threshold value, and
determine that the first image does not include the second image when the similarity is less than or equal to the threshold value,
wherein the predetermined security indication comprises at least one of an image pattern, a badge image, or text.

US Pat. No. 10,395,025

METHOD FOR RECORDING STROKE DATA MADE ON A TOUCH SENSITIVE INTERACTIVE DEVICE

QuirkLogic, Inc., Calgar...

1. A system comprising:an interactive device comprising:
an interactive display,
a removable media port configured to receive a removable media device,
wherein the interactive device is configured to:
receive, via the interactive display, at least one stroke input, and
automatically store the at least one stroke input onto the removable media device as stroke data when the removable media device is connected to the removable media port;
the removable media device, comprising:
a data repository configured to store:
the stroke data, and
metadata associated with the stroke data; and
an ID file, comprising:
a reference pointer to the metadata;
user login credentials of a user of the removable media device;
a default insertion action and a default removal action of the removable media device; and
an identification device ID, wherein the identification device ID is at least partially based on a serial number of an identification device; and
the identification device, wherein the identification device is used by the interactive device to authenticate the removable media device.

US Pat. No. 10,395,024

AUTHENTICATION FOR ONLINE CONTENT USING AN ACCESS TOKEN

Adobe Inc., San Jose, CA...

1. A system comprising:one or more processors; and
one or more computer-readable storage device storing computer-executable instructions that, responsive to execution by the one or more processors, cause the system to perform operations including:
authenticating, at an online content resource, a client device for access to online content based on user credentials received from the client device as part of a request for access to the online content;
generating a message that includes the user credentials and a common access key held by multiple content resources that serve the online content;
creating an access token by hashing the message with the common access key to generate a first hashed message and by storing the first hashed message and an unhashed version of the message together as part of the access token;
communicating the access token and an instance of the online content to the client device;
removing, subsequent to the communicating, the access token and the message from the online content resource so that the access token is not stored by the online content resource;
receiving, subsequent to the removing, the access token as part of a subsequent request from the client device for access to the online content; and
authenticating the client device as permitted to access the online content as part of the subsequent request using the common access key and the access token and independent of any information about the client device stored by the online content resource by:
retrieving the first hashed message and the unhashed version of the message from the access token;
hashing the unhashed version of the message with the common access key to generate a second hashed message; and
ascertaining that the second hashed message matches the first hashed message retrieved from the access token.

US Pat. No. 10,395,023

AUTOMATED PASSWORD AUTHENTICATION

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:monitoring an authentication request displayed on a screen and an authentication area drawn by a user, the drawn authentication area providing input, wherein the drawn authentication area encompasses a login area;
prompting the user to highlight the drawn authentication area that identifies the login area prior to entering information into the login area;
storing data that pairs screen buffer regions with authentication details;
and
outputting the authentication details in response to one of the screen buffer regions that correspond to the authentication details matching the drawn authentication area.

US Pat. No. 10,395,022

ACCESS CONTROL FOR A RESOURCE

British Telecommunication...

1. An access control method for a resource in a computer system comprising:generating a challenge image including a user challenge;
generating a mask image including a mask;
generating a dynamic composite image comprising the challenge image and the mask image superimposed such that the user challenge is partially masked by the mask; and
granting access to the resource on receipt of a correct response by a user of the computer system to the challenge,wherein the user challenge is at least 70% masked by the mask,wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image by the mask and the challenge having one or more of: identical colors, textures or images,wherein the composite image is dynamic by the mask randomly moving in the composite image periodically,wherein the mask comprises a plurality of mask elements having spaces therebetween for revealing portions of the user challenge, andwherein the mask moves by movement of individual mask elements, each individual mask element moving in a random direction independently for each period.

US Pat. No. 10,395,021

SECURITY AND IDENTIFICATION SYSTEM AND METHOD USING DATA COLLECTION AND MESSAGING OVER A DYNAMIC MESH NETWORK WITH MULTIPLE PROTOCOLS

Mesh Candy, Inc., Santa ...

1. A dual-protocol security and sensing mesh network, comprising:a first mesh network-utilizing dual protocol devices configured to communicate with other mesh-connected devices;
at least one dual protocol device, having a plurality of microcontrollers, wherein a first microcontroller of the plurality of microcontrollers conducts communication utilizing a cellular-based synchronized communication protocol and a second microcontroller of the plurality of microcontrollers conducts bidirectional Bluetooth® communication;
at least one wearable digital identification badge operating within the first mesh network, comprising:
a badge microcontroller managing badge Bluetooth® communication;
a badge security status indicator; and
an asynchronous badge Bluetooth® communication link to the second microcontroller of the dual protocol device hardware;
at least one asset tag operating within the first mesh network, comprising:
a tag microcontroller managing tag Bluetooth® communication;
a tag security status indicator; and
an asynchronous tag Bluetooth® communication link to the second microcontroller of the dual protocol device hardware;
at least one gateway device, operating to aggregate data collected from the first mesh network from the at least one dual protocol device; and
a server coupled to an external network, communicating with the gateway device, the server providing validation and security information for the at least one badge and tag, the information being communicated across the dual protocol mesh network,
wherein a security status indicator for the at least one badge and tag that does not change with a change signal routinely sent to all badges or tags is an indication to personnel that the unchanged badge or tag is not authentic.

US Pat. No. 10,395,020

SYSTEM AND METHOD FOR SENDING AN UNLOCK SIGNAL TO A SMART WALLET ENGAGED TO A MOBILE DEVICE

Motorola Mobility LLC, C...

1. An apparatus, comprising:a smart wallet, comprising:
a first body of the smart wallet defining an enclosure;
a first biometric sensor on the smart wallet;
a first processor device to unlock a portion of the first body to allow access to the enclosure responsive to validating a biometric input from the first biometric sensor; and
a mobile device, comprising:
a second body having an attachment interface for removably coupling to the first body of the smart wallet;
detecting engagement of the small wallet to the mobile device by a security application of the mobile device for facilitating control of the smart wallet;
disabling the first biometric sensor; and
a second processor device to send a signal to unlock the portion of the first body and allow access to the enclosure based on a user input on the mobile device upon validating a biometric input from the mobile device.

US Pat. No. 10,395,019

METHOD, SYSTEM AND COMPUTER PROGRAM FOR COMPARING IMAGES

Paycasso Verify Ltd, Lon...

1. A method of verifying, by a processing system, whether a user of a device corresponds to a previously authenticated user, the processing system having access to a first image and a second image, the first image being an image acquired from an identity document comprising an image of the previously authenticated user and data identifying the previously authenticated user, the identity document having been validated in respect of the previously authenticated user by a trusted authority, whereby to previously authenticate the user, and the processing system being arranged to derive, from the identity document, the data identifying the previously authenticated user, wherein the second image is an image captured by the device, the method comprising:comparing the first image to the second image, whereby to determine whether they are images of the same user;
determining that the first and second images are images of the same user; and
responsive to the determining that the first and second images are images of the same user:
encoding one of the first image and the second image using a one-way encoding algorithm, thereby to generate an encoded image;
storing the encoded image as a validated encoded image of the previously authenticated user in a storage device together with an identifier for the previously authenticated user, the validated encoded image being for use in a subsequent verification event for the previously authenticated user; and
arranging for the derived data to be stored, together with the identifier for the previously authenticated user, whereby to enable the data to be retrieved in a subsequent verification event for the previously authenticated user.

US Pat. No. 10,395,018

SYSTEM, METHOD, AND DEVICE OF DETECTING IDENTITY OF A USER AND AUTHENTICATING A USER

BIOCATCH LTD., Tel Aviv ...

1. A method comprising:(a) generating a user-authentication process that utilizes at least a combination of: (I) a self-taken image of a user of an electronic device, together with (II) device spatial-orientation data as derived from image analysis of one or more images captured by a camera of said electronic device and (III) sensing device-acceleration data or device-orientation data of said electronic device, via at least one of: an accelerometer of said electronic device, and a gyroscope of said electronic device, as an authentication factor for authenticating said user to a computerized service;
(b) in said user-authentication process,
(b1) capturing via the camera of said electronic device, one of: (i) a set of self-taken image frames, or (ii) a video comprising self-taken image frames;
(b2) performing an analysis of content of at least one frame of said self-taken image frames that were captured via said camera of said electronic device;
(b3) based on said analysis of content, determining non-correspondence of said self-taken image frames to a genuine set of image frames captured by a live person utilizing said electronic device, by detecting in said self-taken image frames lack of movement or shaking;
(b4) sensing said acceleration data or device-orientation data that accompanies the submission by said user of said self-taken image frames;
(b5) determining a mismatch between (i) said acceleration data or device-orientation data as sensed by said electronic device, and (ii) device acceleration data or device-orientation data that is expected to accompany capturing and submission of said self-taken image frames;
(c) based on the determining of steps (b3) and (b5), triggering an alert that said self-taken image is estimated to be a resubmission of a previously-captured image.

US Pat. No. 10,395,017

SELECTIVELY REDACTING DIGITAL FOOTPRINT INFORMATION IN ORDER TO IMPROVE COMPUTER DATA SECURITY

International Business Ma...

1. A computer-implemented method for protecting user privacy, the computer-implemented method comprising:retrieving, by one or more processors, a historical digital footprint of a user, wherein the historical digital footprint is a record of past digital data about the user that is available to a public, and wherein the historical digital footprint describes a pattern of routine activities related to social communications from the user;
generating, by one or more processors, a simulated digital footprint for the user, wherein the simulated digital footprint conforms to the pattern of routine activities related to the social communications from the user, and wherein the simulated digital footprint describes simulated current activities of the user;
transmitting, by one or more processors, the simulated digital footprint to the public while a current real digital footprint of real-time activities of the user is being created for the user, wherein use of the pattern of routine activities related to the social communications from the user provides an imperceptible transition from the historical digital footprint to the simulated digital footprint, and wherein the simulated digital footprint prevents the public from accessing the current real digital footprint of the user; and
adjusting, by one or more processors, the simulated digital footprint of the user to simulate a new routine of the user while at a second location, wherein the user is actually at a different first location.

US Pat. No. 10,395,016

COMMUNICATION PATTERN RECOGNITION

International Business Ma...

1. An apparatus, comprising:one or more processors;
a network interface whereby the one or more processors communicate with a network; and
a memory storing code that is executable by the one or more processors to:
generate a baseline network communications fingerprint for a first user, based on network communication pattern data for communications between the user one or more second users and sampled at a first point in time from one or more databases that archive network communication pattern data from a set of predefined sources;
generate an active network communications fingerprint for the first user based on a re-sampling of the predefined sources after a predefined time interval; and
perform a predefined action to update a network permission in response to differences detected between the baseline network communication fingerprint and the active network communication fingerprint for the first user, wherein the predefined action includes communicating a message to a network administrator to apply network permissions to the first user based on similarity between the first user's baseline network communication fingerprint and the baseline network communication fingerprint of the one or more second users.

US Pat. No. 10,395,015

MULTI-LEVEL MATRIX PASSWORDS

INTERNATIONAL BUSINESS MA...

1. A method comprising:traversing, during a password entry, a matrix to select a position, wherein the matrix comprises a plurality of levels, each level in the plurality of levels comprising at least one position where data can be entered, wherein a second level in the matrix forms a sub-level of a first level, and wherein the second level is reachable only from a particular position in the first level;
changing, responsive to an input, a mode of the selected position such that the position becomes unchangeable and unselectable during a remainder of the password entry;
encoding the selected position in an auth-step; and
transmitting, responsive to an indication of an end of the password entry, an auth-code, the auth-code comprising a set of auth-steps, the set of auth-steps including the auth-step.

US Pat. No. 10,395,014

METHOD AND SYSTEM FOR INITIATING A LOGIN OF A USER

16. A method for logging a user into a system, the system comprising at least one computer device having a processor connected to a non-transitory computer readable medium, the method comprising:the system, during input of a password into a password field:
requiring the user to wait a delay time period to continue entering characters of a password character sequence of the password into the password field during a pre-selected delay time period before entirety of the password is entered;
blocking entering of a character of the password character sequence into the password field during the delay time period until at least one pre-selected additional character is inserted into the password field so that a fully entered password within the password field will differ from the password of the user; and
verifying whether the password is a stored password associated with an input username of the user such that each and every pre-selected additional character that is inserted during the blocking of the entering of the character into the password field during the delay time period is removed or ignored to authenticate the password.

US Pat. No. 10,395,013

METHOD AND DEVICE FOR ENHANCING THE PROTECTION OF A SIGNAL, IN PARTICULAR A MULTIMEDIA SIGNAL, AGAINST A MALICIOUS ATTACK

STMicroelectronics SA, M...

1. A method of protecting a signal against an attack, comprising:monitoring to check conformity of an actual state of the signal with an expected state,
wherein the signal includes an outgoing multimedia data stream delivered at an end of a decryption of an incoming encrypted data stream and an application of a multimedia interface protection,
wherein the actual state of the signal comprises an active or inactive state of the delivery of the outgoing multimedia data stream, and
if the actual state of the signal is not in conformity with the expected state, then applying a protective action on said signal so as to neutralize or nullify said attack.

US Pat. No. 10,395,012

MEDIA CLIENT DEVICE AUTHENTICATION USING HARDWARE ROOT OF TRUST

ERICSSON AB, Stockholm (...

1. A client device, comprising:at least one processor;
one-time-programmable (OTP) storage including a first verification key and one or more second verification keys; and
a computer-readable storage medium, coupled to the at least one processor, including:
a media client,
firmware,
a boot image including
a public encryption key securely stored in the boot image, and
an encrypted symmetric key, and
computer-readable instructions, when executed by the at least one processor, are configured to:
engage in a secure boot process to authenticate the boot image for use in a rights management scheme employing a private encryption key at a rights management server and the public encryption key by:
verifying a signature of the public encryption key using the first verification key,
decrypting the encrypted symmetric key to generate a decrypted symmetric key,
verifying a signature of the decrypted symmetric key using the one or more second verification keys, and
verifying a signature of the boot image using the decrypted symmetric key,
load and execute the firmware, responsive to successful completion of the secure boot process,
responsive to a request from the media client, use, by the firmware, the public encryption key to create an encrypted device registration message, and
return the encrypted device registration message to the media client, and
forward, by the media client, the encrypted device registration message to the rights management server to register the client device.

US Pat. No. 10,395,011

MONITORING LOCATION OF A CLIENT-SIDE DIGITAL CONTENT DELIVERY DEVICE TO PREVENT DIGITAL CONTENT MISUSE

Screening Room Media, Inc...

1. A method comprising:transmitting, by a client-side computing device, a request to a remote server to initiate presentation of a digital movie on a display device, the remote server facilitating presentation of multiple digital movies, the client-side computing device being associated with a first user account, the first user account including data identifying a geographic location of a dwelling associated with the first user account;
receiving, by the client-side computing device, a data stream of the digital movie and data identifying the geographic location of the dwelling associated with the first user account from a remote server, the remote server having accessed the data identifying the geographic location of the dwelling from the first user account;
initiating, by the client-side computing device, presentation of the digital movie on a display of the display device, the display device being different than the client-side computing device;
determining, by the client-side computing device, a current location of the client-side computing device;
determining, based on the current location of the client-side computing device and the data identifying the geographic location of the dwelling associated with the first user account, that the client-side computing device is outside of a predetermined radius from the geographic location of the dwelling associated with the first user account; and
in response to determining that the client-side computing device is outside of the predetermined radius from the geographic location of the dwelling associated with the first user account:
halting presentation of the digital movie on the display of the display device, and
scanning social media activity of a user associated with the client-side computing device for postings made by the user that indicate that the user is misusing the digital movie.

US Pat. No. 10,395,010

CLOUD-BASED BLOOD BANK COLLABORATIVE COMMUNICATION AND RECOMMENDATION

International Business Ma...

1. A method for providing cloud-based communication for blood bank collection and management, comprising:detecting a plurality of cloud systems;
registering the detected plurality of cloud systems based on a type of cloud system associated with the detected plurality of cloud systems;
enabling a plurality of cloud communications for the registered plurality of cloud systems, wherein enabling a plurality of cloud communications for the registered plurality of cloud systems comprises restricting user access to information associated with one or more cloud systems that are associated with the registered plurality of cloud systems based on the type of the cloud system;
enabling a blood bank cloud database, wherein the blood bank cloud database stores the information associated with the registered plurality of cloud systems, and wherein the information on the blood bank cloud database is restricted based on the type of the cloud system associated with the information;
receiving at least one blood donation request and at least one blood donation event using the enabled plurality of cloud communications for the registered plurality of cloud systems;
in response to receiving the at least one blood donation request, categorizing the at least one blood donation request based on information associated with the at least one blood donation request, and designating the at least one blood donation request for selected cloud administrators and users based on the categorization of the at least one blood donation request, wherein the categorization is based on a determination that there is sensitive information associated with the at least one blood donation request;
generating a plurality of lists of blood donors based on the at least one blood received donation request and the registered plurality of cloud systems; and
presenting to a plurality of users associated with the registered plurality of cloud systems, the generated at least one blood donation request based on the categorization and the received at least one blood donation event using the enabled plurality of cloud communications, wherein the plurality of users associated with the registered plurality of cloud systems are based on the generated plurality of lists of blood donors.

US Pat. No. 10,395,009

APPARATUS AND METHOD FOR COLLECTION OF PROTOCOL ADHERENCE DATA

Ai Cure Technologies LLC,...

1. A medication adherence monitoring system, comprising:a first storage device operable to store (i) one or more sets of video instructions and user prompts for encouraging proper performance of one or more predetermined movement sequences to be performed by a patient and (ii) additional video data comprising one or more videos of the one or more predetermined movement sequences, the one or more predetermined movement sequences being indicative of proper medication administration;
a display operable to display to the patient, one or more of the one or more sets of video instructions and user prompts for encouraging proper performance of the one or more predetermined movement sequences;
a video data capture device operable to capture at least video data of the patient performing one or more of the one or more predetermined movement sequences in response to the one or more of the one or more video instructions and user prompts;
a second storage device for storing the captured video data; and
a first processor operable to
output, to the display, a first type of alert that notifies the patient it is time to administer medication,
receive a patient medication administration initiation response following the output of the first type of alert,
output to the display, responsive to receiving the patient medication administration initiation response, the one or more of the one or more sets of video instructions and user prompts for encouraging proper performance of the one or more predetermined movement sequences,
receive the captured video data from the second storage device,
automatically compare the stored captured video data to the additional video data comprising the one or more videos of the one or more predetermined movement sequences,
determine, from the comparison, whether the patient has properly performed the predetermined movement sequences,
responsive to determining, from the comparison, that the patient has not properly performed the predetermined movement sequences, output, to the display, interactive feedback to the patient and an additional one or more of the one or more sets of video instructions and user prompts to further encourage proper performance of the one or more predetermined movement sequences.

US Pat. No. 10,395,008

DEVICE CONNECTIVITY ENGINE

Welch Allyn, Inc., Skane...

1. A single medical device, comprising:a physiological measurement device of the single medical device to capture data associated with vital signs; and
a computing device of the single medical device, comprising:
a device management engine configured to receive the data captured by the physiological measurement device, wherein the data captured by the physiological measurement device is formatted in a first data format;
a listener engine configured to determine a destination of the data sent by the single medical device; and
a device connectivity engine configured to:
transform the data captured by the physiological measurement device into an array of key-value pairs;
identify a template from a plurality of templates based upon the destination for the data;
populate the template with at least some values from the array of key-value pairs to generate a populated template, wherein the populated template includes at least a portion of the data captured by the physiological measurement device in a second data format; and
transmit the populated template from the single medical device to the destination.

US Pat. No. 10,395,007

LOCATION-BASED MANAGEMENT OF HEALTHCARE ENVIRONMENTS

Cerner Innovation, Inc., ...

1. One or more non-transitory computer-storage media having computer-executable instructions embodied thereon that, when executed, perform an improved method by a server including one or more processors, a plurality of sensors, one or more tracked clinical devices, and one or more identifiers communicating through a computer network accurately monitoring and managing a healthcare environment to identify an appropriate replacement clinical device and to generate a graphical user interface displaying the appropriate replacement clinical device utilizing location awareness in combination with electronic health records and electronic storage of clinical information, the method comprising:receiving in real-time by the server configured to operate in the healthcare environment, through the computer network from the one or more identifiers associated with a first clinical device of the one or more tracked clinical devices, a real-time status of the first clinical device from the plurality of sensors indicating at least whether the first clinical device is functionally appropriate for use, wherein the plurality of sensors use signals to track in real-time the one or more identifiers which continuously provide real-time status of the first clinical device and update a location of the first clinical device in the network in real-time;
determining by the server from the real-time status of the first clinical device that the first clinical device is not appropriate for use based on the real-time status indicating that the first clinical device has a problem which requires attention;
determining by the server that an alert is needed, the name of the first clinical device, a particular problem that makes the first clinical device not appropriate for use, and a severity of the problem based on the clinical information, location information, and clinical device information;
upon determining that the alert is needed, generating a graphical user interface by the server automatically without user interaction which simultaneously displays the alert on a computing device in an alert area of the graphical user interface indicating at least that the first clinical device is not appropriate for use, the severity of the problem, the name of the clinical device, the particular problem that makes the first clinical device not appropriate for use, and a location of the first clinical device within a blueprint of a healthcare environment based on the data received from the first clinical device, wherein the location of the first clinical device is tracked by a clinical device identifier via a plurality of sensors in the healthcare environment;
the server identifying features of the first clinical device and determining at least one available replacement clinical device that meets the identified features criteria as the first clinical device by accessing a list of available clinical device;
the server automatically without user interaction identifying a real-time location of the determined at least one available replacement clinical device utilizing the one or more identifiers associated with the one or more tracked clinical devices via the plurality of sensors;
the server automatically without user interaction prioritizing the at least one available replacement clinical device based at least on the determined features of the at least one available replacement clinical device matching the features of the first clinical device;
the server automatically without user interaction determining the appropriate replacement clinical device from the prioritized replacement at least one clinical device with the most features matching the features of the first clinical device and located within the closest proximity of real-time location to the location of the first clinical device; and
the server automatically without user interaction updating the graphical user interface to display on the computing device the real-time location of the appropriate replacement clinical device within the blueprint of the healthcare environment identifying the appropriate replacement clinical device so that the location of the appropriate replacement device is visible within the blueprint simultaneously with the alert.

US Pat. No. 10,395,006

CENTRALIZED EOB ARCHIVING AND ACCESS

Alegeus Technologies, LLC...

1. A system for managing electronic records of benefit information, comprising:a communications interface of a benefits-records system configured to establish, via a computer network, a first secure network connection with a first device of a first insurance provider of a plurality of insurance providers;
the communications interface further configured to receive, via the first secure network connection from the first device of the first insurance provider, a first electronic record comprising, in a first format having a first plurality of fields, data from the plurality of fields indicating an insured employee and a first medical-insurance adjudication explanation for a first service of a first patient generated by the first insurance provider;
the communications interface further configured to establish, via the computer network, a second secure network connection with a second device of a second insurance provider of the plurality of insurance providers;
the communications interface further configured to receive, via the second secure network connection from the second device of the second insurance provider, a second electronic record comprising, in a second format having a second plurality of fields different from the first format, data from the plurality of fields indicating the insured employee and a second medical-insurance adjudication explanation for a second service of a second patient generated by the second insurance provider, the second patient different from the first patient;
the communications interface further configured to receive, via the computer network from a third device of the insured employee, a fourth electronic record comprising, in a third format, data indicating the insured employee and a third medical-insurance adjudication explanation for a third service generated by a device of a third insurance provider;
the communications interface further configured to transmit, via the computer network, the first electronic record, the second electronic record, and the fourth electronic record to one or more devices designated by request of insured party;
a processor of the benefits-records system configured to:
identify the first format of the first electronic record based on an identity of the first insurance provider;
extract, based on the provided information defining the first format of the first insurance provider, data from the first electronic record corresponding to the provided information;
provide, based on unidentified one or more portions of first format, an interface configured to receive user input for the first electronic record;
obtain an indication of an unpaid expense determined from adjudication of a medical-insurance claim adjudicated by the first insurance provider;
convert, using a mapping of data extracted from the first electronic record and the user input received from the interface, the first electronic record in the first format into a common format configured for the benefits-records system that is common to each of the plurality of insurance providers;
store the converted first electronic record in a storage device of the benefits-records system, the benefits-records system configured with a data repository that maintains electronic records in the common format;
identify the second format of the second electronic record based on an identity of the second insurance provider, the second format different from the first format;
convert, using the mapping of data extracted from the second electronic record and the user input received from the interface, the second electronic record in the second format into the common format;
convert, using the mapping of data extracted from the fourth electronic record and the user input received from the interface, the fourth electronic record in the third format into the common format;
generate, using the converted first electronic record, the converted second electronic record, and the converted fourth electronic record, a third electronic record for a single explanation of benefits comprising, in a single optically readable bar code that concatenates information from the first plurality of fields and the second plurality of fields with a descriptor of the optically readable bar code, data indicating (i) the first medical-insurance adjudication explanation for the first service of the first patient received, by the benefits-records system, in the first format via the first secure network connection with the first device of the first insurance provider, (ii) the second medical-insurance adjudication explanation for the second service of the second patient received, by the benefits-records system, in the second format via the second secure network connection with the second device of the second insurance provider, (iii) the third medical-insurance adjudication explanation, and (iv) the indication of the unpaid expense associated with one or more medical-insurance claims in the third electronic record for the single explanation of benefits; and
transmit, to a fourth device of the insured employee, the third electronic record for the single explanation of benefits in the single optically readable bar code with the descriptor, wherein the fourth device is configured to scan the single explanation of benefits and automatically extract, from the single optically readable bar code, data indicating (i) the first medical-insurance adjudication explanation for the first service of the first patient received, (ii) the second medical-insurance adjudication explanation for the second service of the second patient, (iii) the third medical-insurance adjudication explanation, and (iv) the indication of the unpaid expense associated with the one or more medical-insurance claims in the third electronic record for the single explanation of benefits.

US Pat. No. 10,395,004

HYPOTHESIS-DRIVEN, REAL-TIME ANALYSIS OF PHYSIOLOGICAL DATA STREAMS USING TEXTUAL REPRESENTATIONS

INTERNATIONAL BUSINESS MA...

1. A computer system, comprising:a decision support system, comprising:
an input/output port receiving physiological data associated with a patient having an unknown medical condition, said physiological data comprising streams of medical data obtained by monitoring said patient and medical symptoms reported by said patient; and
a processor operatively connected to said input/output port; and
an information retrieval system operatively connected to said decision support system, said information retrieval system comprising a corpus of data having structured and unstructured data in a relevant medical domain, said corpus of data being maintained in a separate database,
said processor:
automatically extracting numerical data from said physiological data based on development of said streams of medical data over a period of time,
automatically extracting features from said numerical data, said features comprising a property of said physiological data being observed,
automatically converting said features extracted from said physiological data into a textual representation using natural language generation, said natural language generation converting said features into words to use as input terms for said information retrieval system,
automatically generating a query for said information retrieval system using said input terms based on said textual representation and said medical symptoms reported by said patient, at least one said query being generated for each feature extracted from said physiological data, and
inputting said query to said information retrieval system,
said information retrieval system:
receiving said query, and
automatically searching said corpus of data and retrieving results to said query, said results indicating a possible medical condition of said patient in said period of time.

US Pat. No. 10,395,003

WIND SIMULATION DEVICE

1. A method comprising:generating, by a wind simulation module executed by a processor, a wind model that includes software for virtualizing a wind particle;
generating, by a virtual simulation tool executed by the processor, a simulation that tests a performance of a vehicle design for an Advanced Driver Assistance System (ADAS system) of an autonomous vehicle, the simulation including a virtual roadway environment, a virtual wind particle that is configured by the wind model to be variable and dynamic within the virtual roadway environment when the simulation is executed, a virtual vehicle and a virtualized control software for controlling an operation of the virtual vehicle in the virtual roadway environment;
modifying the operation of the virtual vehicle in response to a variable in the simulation, wherein the simulation is operable to test the virtualized control software and the modifying of the operation of the virtual vehicle in response to the virtual wind particle in the simulation;
determining that the virtualized control software failed to meet one or more requirements of a specification for the ADAS system of the autonomous vehicle represented in the simulation by the virtualized control software; and
modifying the vehicle design based on the virtualized control software failing to meet the one or more requirements of the specification for the ADAS system such that the autonomous vehicle will be built with a modified vehicle design that changes a trajectory of the autonomous vehicle to correct for wind load.

US Pat. No. 10,395,002

OPTICAL RULE CHECKING FOR DETECTING AT RISK STRUCTURES FOR OVERLAY ISSUES

INTERNATIONAL BUSINESS MA...

1. A method of performing lithography and detecting at risk structures due to a lithographic mask overlay comprising:performing a lithography process;
performing the lithographic mask overlay; and
the method of detecting being implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to:
determine a probability that an arbitrary point (x, y) on a metal layer is covered by a via by calculating a statistical coverage area metric followed by a summing function; and
detect at risk structures of a semiconductor device by detecting a lithography error occurring from a misalignment of the lithography mask overlay during the lithography process in which the misalignment of the lithography mask overlay occurs when the metal layer is covered by the via based on the determined probability,
wherein determining the probability that the arbitrary point (x, y) on the metal layer is covered by the via comprises:
determining that the metal layer is inside the via by calculating:

wherein:
Pin is representative of a probability that the via covers the metal layer, at the arbitrary point;
determining that the metal layer is outside the via by calculating:

wherein:
Pout is representative of the probability that the via covers the metal layer, at the arbitrary point outside the nominal via shape; and
Ox and Oy follows Gaussian distributions to calculate for the Pin and Pout;
Rv represents the radius of the nominal via shape,
wherein the arbitrary point (x, y) is defined by an x coordinate and a y coordinate in a cartesian coordinate system,
wherein P is a probability, and Ox and Oy is an overlay in an x direction and a y direction, respectively, and
wherein the summing function includes mathematical approximations, and the mathematical approximations including engineering approximations to detect the at risk structures of overlay error.

US Pat. No. 10,395,001

MULTIPLE PATTERNING LAYOUT DECOMPOSITION CONSIDERING COMPLEX COLORING RULES

SYNOPSYS, INC., Mountain...

1. A computer implemented method for decomposing a layout of a portion of an integrated circuit, the layout including a first plurality of polygons, the method comprising:constructing, using the computer, a first matrix representative of a first plurality of constraints, each of the first plurality of constraints being between a different pair of the first plurality of polygons;
solving, using the computer, the first matrix to thereby assign one of a plurality of masks to each different one of the first plurality of polygons, when the computer is invoked to decompose the layout; and
characterizing the first matrix by a dimension equal to the sum of a first number and a second number, wherein the first number is equal to a first count of the first plurality of polygons multiplied by a second count of the plurality of masks, wherein the second number is equal to a third count of the first plurality of constraints multiplied by the second count.

US Pat. No. 10,395,000

METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING AN ELECTRONIC DESIGN USING VOLTAGE-BASED ELECTRICAL ANALYSES AND SIMULATIONS WITH CORRECTIONS

Cadence Design Systems, I...

1. A computer implemented method for implementing an electronic design with one or more voltage-based electrical analyses or simulations, comprising:identifying, at a physical electronic design implementation module including or functioning in conjunction with at least one processor and at least partially stored in a non-transitory computer readable storage medium, design data of an electronic design or a portion thereof for an electronic circuit;
performing, at a design reduction module stored at least partially in memory of the non-transitory computer readable storage medium, multi-stage processes on the electronic design or the portion thereof while avoiding performance of iterations that involves a matrix equation for solving certain electrical behaviors at least by:
reducing the electronic design or the portion thereof into a reduced representation at least by eliminating at least one type of electrical components and further by representing the at least one type, which is eliminated, as a different type of electrical components in the electronic design or the portion thereof;
performing a first stage analysis on the reduced representation of the electronic design or the portion thereof based at least in part upon a first requirement pertaining to computational resource utilization at least by computing first electrical characteristics with the reduced representation of the electronic design or the portion thereof while avoiding the performance of the iterations that involves the matrix equation for solving one or more second electrical characteristics in one or more devices in at least a part of the electronic design or the portion thereof during the first stage analysis; and
generating electrical behavior of the electronic design or the portion thereof based at least in part upon a second requirement pertaining to accuracy of predicted circuit behaviors at least by performing a second stage analysis on a different representation of the electronic design or the portion thereof in determining at least the one or more second electrical characteristics using at least one or more adjusted electrical characteristics adjusted from one or more corresponding first electrical characteristics, without the performance of the iterations that involves the matrix equation for solving the one or more second electrical characteristics; and
reducing or eliminating photomask manufacturing errors or reducing photomask manufacturing cycle times using the electronic design or the portion thereof that is implemented based in part or in whole upon the electrical behavior.

US Pat. No. 10,394,999

ANALYSIS OF COUPLED NOISE FOR INTEGRATED CIRCUIT DESIGN

International Business Ma...

1. A computer-implemented method comprising:generating, by a processor coupled to the computer, an electronic representation of a circuit design based on the output of a Simulation Program with Integrated Circuit Emphasis (SPICE) for one or more variations of the circuit, derived from the described circuit as expressed in a hardware description language (HDL), or derived from actual data measured from one or more manufactured prototypes of the circuit;
identifying a noise cluster from within the circuit design;
representing said noise cluster according to a variational model, wherein the variational model supports variational analysis of a maximum and a minimum noise given asserted levels of pessimism, the maximum and the minimum noise are expressed through assumed and/or nominal values that are passed through the variational model to represent the noise cluster;
projecting said variational model onto one or more corners to yield a projected noise cluster; and
determining a computed noise for said projected noise cluster.

US Pat. No. 10,394,998

ACCELERATION OF MEMORY WALKING SEQUENCES DURING SIMULATION

International Business Ma...

1. A method for accelerating a simulated memory walking sequence during a simulation conducted by a computer, the method comprising:executing, by a computer, a simulation test-case;
creating, by the computer, a test-case memory address table comprising memory addresses of a first simulated memory, wherein each memory address of the first simulated memory is associated with one or more memory locations in a second simulated memory;
for each memory address in the test-case memory address table, identifying, by the computer, each memory location of the respectively associated one or more memory locations as a memory location in the second simulated memory that is eligible to contain valid data during execution of the simulation test-case based on an association with the respective memory address in the test-case memory address table, wherein the second simulated memory includes a plurality of memory locations that are not associated with at least one memory address in the first simulated memory and are thus known to be vacant during execution of the simulation test-case;
detecting, by the computer, during execution of the simulation test-case a simulated memory walking sequence being commenced by the simulated hardware, wherein the simulated hardware is configured to perform the simulated memory walking sequence by sequentially processing each memory location in the second simulated memory; and
responsive to detecting, by the computer, the simulated memory walking sequence being commenced by the simulated hardware, the computer executing walking-sequence control logic to modify the simulated memory walking sequence responsive to comparing each memory location in the second simulated memory to a predetermined set of memory locations in the second simulated memory identified as eligible to contain valid data during execution of the simulation test-case, the walking-sequence control logic causing the simulated hardware to:
process each identified memory location that is eligible to contain valid data;
process one or more of memory locations that are known to be vacant during execution of the simulation test-case and are included in the plurality of memory locations that are not associated with at least one memory address in the first simulated memory, the walking-sequence control logic selecting memory locations known to be vacant for processing based on or more rules; and
skip at least one memory location known to be vacant in the second simulated memory during execution of the simulation test-case and included in the plurality of memory locations that are not associated with at least one memory address in the first simulated memory.

US Pat. No. 10,394,997

METHOD AND APPARATUS FOR RELOCATING DESIGN MODULES WHILE PRESERVING TIMING CLOSURE

Altera Corporation, San ...

1. A method, comprising:compiling a first circuit design;
performing a placement of the first circuit design on a programmable logic device at a first location;
performing an optimization of the placed first circuit design to generate a design optimization;
preserving the design optimization of the placed first circuit design after the optimization; and
applying the design optimization on a placed design of the first circuit design at a second location.

US Pat. No. 10,394,996

VIA ARRAY PLACEMENT ON A PRINTED CIRCUIT BOARD OUTLINE

International Business Ma...

1. A method of via array placement on a printed circuit board (PCB) outline, the method comprising:receiving, by a PCB design module, via array data from a user;
generating, by the PCB design module, a via array based on the via array data from the user wherein the via array data comprises a grid size, a via size, and a voltage via connection, and generating the via array further comprises generating the via array using the grid size, the via size, and the voltage via connection including placing the via array on the PCB outline, wherein the via array comprises a grid of vias;
detecting, by the PCB design module, that a first PCB element has been placed on top of a first portion of the via array on the PCB outline;
removing, by the PCB design module, the first portion of the via array under the first PCB element, wherein a second portion of the via array remains on the PCB outline after removing the first portion of the via array; and
generating, by the PCB design module, a PCB design document using the PCB outline and the second portion of the via array.

US Pat. No. 10,394,995

METHODS AND SYSTEMS FOR SCHEMATIC DRIVEN 2D CHAINING IN AN INTEGRATED CIRCUIT LAYOUT

Cadence Design Systems, I...

1. A computer implemented method for two dimensional chaining of circuit devices in an integrated circuit, the method comprising:receiving, by a computer, one or more files containing database records of a plurality of circuit devices and a plurality of nets interconnecting at least a portion of the plurality of circuit devices;
selecting, by the computer, a set of circuit devices of a first type from the plurality of circuit devices to generate one or more two dimensional chains of abutted circuit devices;
retrieving, by the computer, schematic orientation information and connectivity information of the set of circuit devices from the corresponding database records in the one or more files, wherein the schematic orientation information indicates the angle of orientation between the respective circuit devices in a symbolic view and the connectivity information indicates whether the respective circuit devices are connected to each other;
determining, by the computer, that a first circuit device should be abutted with a second circuit device based upon the connectivity information of the first and the second circuit devices, wherein the first circuit device is connected to the second circuit device, and wherein the location of the first circuit device is to be traversed prior to the location of the second circuit device; and
abutting, by the computer, the first circuit device with the second circuit device at an angle of orientation as indicated in the schematic orientation information of the first and second circuit devices based upon a center abutment direction to generate a two dimensional chain of abutted circuit devices containing the first and second circuit devices, whereby device footprint of the abutted circuit devices is reduced while the integrity of a signal passing through the abutted circuit devices is maintained.

US Pat. No. 10,394,994

FIELD-EFFECT TRANSISTOR PLACEMENT OPTIMIZATION FOR IMPROVED LEAF CELL ROUTABILITY

INTERNATIONAL BUSINESS MA...

1. A computer program product for automatically generating a layout of a cell of a semiconductor circuit by minimizing a gate-to-gate net length of the cell, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to:read, by a processor, a netlist of the cell, the netlist including a description of internal electrical nets connecting electrical components of the cell with each other, wherein the program instructions are executable by the processor to cause the processor to;
assign, by the processor, an exclusive internal weight to at least one internal net of the internal electrical nets; and
place, by the processor, the electrical components in an area of the semiconductor circuit based on the netlist and the weight to generate the layout of the cell of the semiconductor circuit;
provide the layout of the cell to a production process for producing the semiconductor circuit,
wherein the weight corresponds to a probability that electrical components respective to the at least one internal net are placed close to each other,
wherein the program instructions are executable by the processor to cause the processor to assign a second weight to at least one external net that is lower than the weight of the at least one internal net,
wherein the program instructions are executable by the processor to cause the processor to place the electrical components, comprises optimizing a total internal net length of the cell, where a length of the at least one internal net is weighted according to the weight.

US Pat. No. 10,394,993

DISCRETIZING GATE SIZES DURING NUMERICAL SYNTHESIS

SYNOPSYS, INC., Mountain...

1. In an electronic design automation (EDA) software tool in a computer, a method for discretizing cell sizes during numerical synthesis, the method comprising:modeling, by using the EDA software tool in the computer, a numerical optimization problem based on a circuit design and numerical models of a first set of library cells;
solving the numerical optimization problem by using a numerical solver to obtain an optimal input capacitance value for an input of an optimizable cell in the circuit design;
identifying a first library cell in the first set of library cells whose input capacitance value is closest to the optimal input capacitance value;
computing a delay from an input of a driver cell to an output of the optimizable cell assuming the first library cell is instantiated at the optimizable cell; and
identifying a second library cell from a second set of library cells that includes all library cells in the first set of library cells and at least one additional library cell, wherein the input capacitance value of the second library cell is less than or equal to the input capacitance value of the first library cell, and wherein instantiating the second library cell at the optimizable cell would improve the delay from the input of the driver cell to the output of the optimizable cell.

US Pat. No. 10,394,992

WIRE LINEEND TO VIA OVERLAP OPTIMIZATION

International Business Ma...

1. A computer-implemented method for shifting a cut associated with a lineend of an interconnect in an advanced manufacturing system, the method comprising:selecting, by a circuit design component, one or more polygons associated with a lineend of an interconnect;
determining, by the circuit design component, whether a first cut is spanning the one or more polygons;
determining, by the circuit design component, a presence of a first via on a first interconnect;
determining, by the circuit design component, a first distance of the first via to the first cut;
determining, by the circuit design component, whether the first distance is greater than a first pre-determined threshold;
determining, by the circuit design component, a second distance of the first cut to a second cut;
determining, by the circuit design component, whether the second distance is greater than a second pre-determined threshold;
generating, by the circuit design component, a shift associated with the first cut; and
outputting, by the circuit design component, the shift for moving the first cut.

US Pat. No. 10,394,991

METHODS AND APPARATUS FOR DYNAMICALLY CONFIGURING SOFT PROCESSORS ON AN INTEGRATED CIRCUIT

Altera Corporation, San ...

1. A method of implementing an integrated circuit using an aggregated profiler tool running on circuit design computing equipment, comprising:with the aggregated profiler tool, receiving a source code;
with the aggregated profiler tool, analyzing the source code to identify resource-intensive tasks;
in response to identifying the resource-intensive tasks, outputting suggested hardware configurations for soft processors on the integrated circuit;
presenting a user with opportunity to select from among the suggested hardware configurations and receiving from the user a corresponding selection;
generating a configuration bit stream based on the received selection; and
loading the configuration bit stream into the integrated circuit.

US Pat. No. 10,394,990

INITIAL CONDITION SUPPORT FOR PARTIAL RECONFIGURATION

Altera Corporation, San ...

1. A method for initializing one or more registers of a programmable integrated circuit (IC) to store an initial condition value by emulating programmable initial conditions in the programmable IC without native support for the initial conditions, comprising:determining, via a compiler, whether at least a register of the one or more registers is not directly connected to at least a LUT of one or more look-up tables (LUTs), whether both a first register and a second register of the one or more registers are directly connected to a first LUT of the one or more LUTs, a combination thereof;
when the register is not directly connected to the LUT and a pass-through LUT can be directly connected to the register, generating, via the compiler, one or more pass-through LUTs that are directly connected to the register;
when both the first register and the second register are directly connected to the first LUT:
generating, via the compiler, a second LUT of the one or more LUTs;
disconnecting, via the compiler, the second register from the first LUT in response to generating the second LUT; and
directly connecting, via the compiler, the second register to the second LUT subsequent to disconnecting the second register from the first LUT;
receiving, at the compiler, a design to be implemented in a region of the IC;
providing, via the compiler, a first bitstream that configures the region of the IC, wherein the first bitstream comprises a modification of the design and a first LUT mask, such that the first bitstream supplies the initial condition value derived from the modification of the design to the one or more registers, by:
when the register is directly connected to the one or more pass-through LUTs, providing the initial condition value to the register via the one or more pass-through LUTs; and
when the first register and the second register are directly connected to the first LUT and the second LUT, respectively, providing a first initial condition of the initial condition value to the first register via the first LUT and a second initial condition value of the initial condition value to the second register via the second LUT; and
providing, via the compiler, a second bitstream that is representative of an unmodified version of the design and comprises a second LUT mask, wherein the second bitstream configures the region of the IC by using the second LUT mask to facilitate supplying values associated with a function of the design to the one or more registers subsequent to the configuration of the region of the IC by the first bitstream.