US Pat. No. 10,430,699

IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

Ricoh Company, Ltd., Tok...

1. An image processing apparatus, comprising:a memory to store a dither table in which a plurality of dither patterns are recorded, each of the dither patterns being formed with a halftone dot screen in which an output area ratio that is a proportion of void halftone dots per unit area corresponds to any one of gradation values of image data; and
processing circuitry configured to
read a gradation value for each region in image data input for each toner color,
decide a dither pattern to be applied to the read gradation value, wherein the dither pattern is the halftone dot screen formed such that formation of a void halftone dot shape is finished at an output area ratio of 40% or less, and the dither pattern is formed by performing dot growth such that a first number of screen lines, defined as a number of halftone dots per inch, within a range of an output area ratio of 18% to 34% is greater than a second number of screen lines outside the range,
read out the decided dither pattern from the dither table, and
perform dither processing of applying the read dither pattern to the region in the image data.

US Pat. No. 10,430,698

IMAGE PROCESSING SYSTEM, METHOD OF CONTROLLING IMAGE PROCESSING SYSTEM, AND STORAGE MEDIUM

RICOH COMPANY, LTD., Tok...

1. An image processing system, comprising:an offset printer;
a digital printer; and
a server that is communicable with the offset printer and the digital printer, the server including processing circuitry configured to:
perform a first image processing to generate first raster data based on print target data, the first raster data to be used for generating a plate that is used by the offset printer; and
perform a second image processing to generate second raster data based on the print target data, the second raster data used by the digital printer, wherein
a first image formed by the offset printer and a second image formed by the digital printer are substantially the same,
the offset printer uses the plate to form the first image on a recording medium,
the digital printer uses the second raster data to form the second image on the recording medium,
the digital printer includes second processing circuity, and
the processing circuitry performs a part of the second image processing and the second processing circuitry performs another part of the second image processing.

US Pat. No. 10,430,697

PRINTER AND METHOD FOR PROCESSING STRING INFORMATION

SEIKO EPSON CORPORATION, ...

16. A control method of a printer having a receive buffer configured to receive string information indicating a string including substrings segmenting the string, wherein the string is segmented into the substrings by at least one delimiter, and at least some characters in the string are character codes that relate to font information, and storage configured to store style information indicating one or more styles defined by one or more specific rules, and to store the font information related to the character codes, comprising:generating, for one or more of the substrings in the string information received by the receive buffer, a command string including a command and the one or more of the substrings based on the style information stored in the storage indicating a style of the one or more of the substrings;
executing the one or more commands included in the generated command string, and generating image data by referencing the font information in the storage; and
printing based on the image data,
wherein the command string is generated according to the style information, which is applied according to an order of the one or more of the substrings.

US Pat. No. 10,430,696

COMPUTATIONALLY-EFFICIENT HUMAN-IDENTIFYING SMART ASSISTANT COMPUTER

MICROSOFT TECHNOLOGY LICE...

1. A method for a smart assistant computer to track a human, the method comprising:receiving data from one or more sensors configured to monitor a physical environment;
computer-analyzing the data to recognize presence of a human in the physical environment and to determine the human to be one of the following: a previously identified human, an unidentified human in the presence of a known user, and an unidentified human not in the presence of a known user;
based at least on determining the human to be a previously identified human, dedicating a first level of computational resources of the smart assistant computer to track the human;
based at least on determining the human to be an unidentified human in the presence of a known user, dedicating a second level of computational resources of the smart assistant computer, greater than the first level of computational resources, to determine an identity of the human; and
based at least on determining the human to be an unidentified human not in the presence of a known user, dedicating a third level of computational resources of the smart assistant computer, greater than the second level of computational resources, to determine the identity of the human.

US Pat. No. 10,430,695

SYSTEM AND METHOD FOR CONTEXTUALIZED VEHICLE OPERATION DETERMINATION

Nauto, Inc., Palo Alto, ...

1. A method for determining event data comprising:sampling a first image stream within a first time window at an interior-facing camera of an onboard vehicle system, wherein the onboard vehicle system is integrated into a mountable unit coupled to a vehicle at a single interior location;
extracting interior activity data, comprising a driver gaze direction, from the first image stream;
sampling a second image stream within a second time window at an exterior-facing camera of the onboard vehicle system, wherein the first and second time window are coextensive;
extracting exterior activity data from the second image stream;
determining an interior event based on the interior activity data, comprising mapping the driver gaze direction relative to a first region of the second image stream based on a relative orientation between the interior-facing camera and the exterior-facing camera of the onboard vehicle system;
determining an exterior event based on the exterior activity data, comprising determining that a distance between the vehicle and an object depicted in the first region of the second image stream has fallen below a threshold distance;
correlating the interior event with the exterior event to generate combined event data, comprising determining that the driver gaze direction overlaps with the first region of the second image stream at a time point within the first time window;
automatically classifying the combined event data to generate an event label; and
automatically labeling the first image stream within the first time window and the second image stream within the second time window with the event label to generate labeled training data;
transmitting the labeled training data to a remote computing system; and
aggregating the labeled training data at the remote computing system with a corpus of labeled training data, wherein the corpus of labeled training data is received from a plurality of onboard vehicle systems operating in a plurality of vehicles.

US Pat. No. 10,430,694

FAST AND ACCURATE SKIN DETECTION USING ONLINE DISCRIMINATIVE MODELING

Intel Corporation, Santa...

1. A computer-implemented method for performing skin detection comprising:applying face detection to received image data representative of an image to detect a first skin dominant region corresponding to a first face in the image and a second skin dominant region corresponding to a second face in the image;
combining the first and second skin dominant regions to generate a combined skin dominant region of the received image data;
randomly selecting a background region of the received image data outside of the first and second skin dominant regions;
generating a skin model based on the combined skin dominant region of the image data and a non-skin model based on the randomly selected background region of the image data;
determining a discriminative skin likelihood function based on the skin model and the non-skin model; and
classifying individual pixels of the image data as skin pixels or non-skin pixels based on the discriminative skin likelihood function to generate skin label data associated with the image data; and
outputting the skin label data, wherein the skin label data comprises one of a binary value of skin or non-skin for each of the individual pixels or a confidence value of skin pixel classification for each of the individual pixels.

US Pat. No. 10,430,693

PIPING AND INSTRUMENTATION PLANNING AND MAINTENANCE SYSTEM

Accenture Global Solution...

1. A piping and instrumentation planning and maintenance system comprising:an input/output (I/O) interface for receiving a target piping and instrumentation diagram (PID) from a document source system;
a processor in communication with the I/O interface; and
non-transitory computer readable media in communication with the processor that stores instruction code, which when executed by the processor, causes the processor to:
select, based on a type of the target PID, a process pipeline of a plurality of process pipelines for processing PIDs;
classify, using the selected process pipeline, entities and properties thereof within the target PID, wherein the entities include one or more assets and interconnections therebetween specified in the PID;
compare the classified entities to a knowledge base that represents relationships between a plurality of assets and interconnections between the plurality of assets;
determine, based on the comparison, whether the one or more assets in the target PID are interconnected correctly; and
when the one or more assets are not interconnected correctly, generate a report to identify the one or more assets that are not interconnected correctly.

US Pat. No. 10,430,692

GENERATING SYNTHETIC MODELS OR VIRTUAL OBJECTS FOR TRAINING A DEEP LEARNING NETWORK

Capital One Services, LLC...

1. A method, comprising:receiving, by a training platform, data for generating synthetic models of a body part,
the body part including a hand, and
the data including information relating to a plurality of potential poses of the hand;
generating, by the training platform, a set of synthetic models of the hand based on the information,
a synthetic model, in the set of synthetic models, representing a pose of the plurality of potential poses,
wherein generating the set of synthetic models includes:
generating the synthetic model such that no portions of two of a first component of the synthetic model, a second component of the synthetic model, a third component of the synthetic model, a fourth component of the synthetic model, or a fifth component of the synthetic model occupy a common voxel,
wherein the first component corresponds to a first finger of the hand,
wherein the second component corresponds to a second finger of the hand,
wherein the third component, corresponding to a third finger of the hand,
wherein the fourth component, corresponding to a fourth finger of the hand, and
wherein the fifth component, corresponding to a fifth finger of the hand;
deriving, by the training platform and after generating the set of synthetic models, an additional set of synthetic models based on the set of synthetic models,
the deriving including:
performing one or more processing operations with respect to at least one synthetic model in the set of synthetic models; and
causing, by the training platform, the set of synthetic models and the additional set of synthetic models to be provided to a deep learning network to train the deep learning network to perform image segmentation, object recognition, or motion recognition.

US Pat. No. 10,430,690

MACHINE LEARNING PREDICTIVE LABELING SYSTEM

SAS INSTITUTE INC., Cary...

1. A non-transitory computer-readable medium having stored thereon computer-readable instructions that when executed by a computing device cause the computing device to:read a plurality of labeled observation vectors from a dataset;
read a plurality of unlabeled observation vectors from the dataset;
(A) train a labeling model using the read plurality of labeled observation vectors;
(B) execute the trained labeling model with each observation vector of the plurality of unlabeled observation vectors to define a label distribution probability matrix, wherein the label distribution probability matrix defines a label probability for each label of a label set for each observation vector of the plurality of unlabeled observation vectors;
(C) select a label for each observation vector of the plurality of unlabeled observation vectors as the label associated with a maximum label probability value in the label distribution probability matrix for a respective observation vector of the plurality of unlabeled observation vectors;
(D) for each label of the label set, compute a mean observation vector from the observation vectors of the plurality of unlabeled observation vectors selected to have each respective label;
(E) for each label of the label set, compute a covariance matrix from the observation vectors of the plurality of unlabeled observation vectors selected to have each respective label;
(F) for each label of the label set, select a number of eigenvalues from the covariance matrix computed for each respective label, wherein the selected eigenvalues have a smallest value of the eigenvalues for each respective label;
(G) for each label of the label set, define a null space using the selected eigenvalues for each respective label;
(H) for each observation vector of the plurality of unlabeled observation vectors, compute a distance vector from each respective observation vector to the computed mean observation vector associated with the label selected for each respective observation vector;
(I) for each observation vector of the plurality of unlabeled observation vectors, compute a distance value from each respective computed distance vector projected into the defined null space associated with the label selected for each respective observation vector;
(J) for each observation vector of the plurality of unlabeled observation vectors, determine a diversity rank based on a minimum computed distance value for the computed distance value for each respective observation vector;
(K) select a predefined number of observation vectors from the plurality of unlabeled observation vectors, wherein the predefined number of observation vectors have the predefined number of observation vectors number of highest values for the diversity rank;
(L) update the plurality of labeled observation vectors to include the selected observation vectors with the label selected for each respective observation vector;
(M) remove the selected observation vectors from the plurality of unlabeled observation vectors;
(N) repeat operations (A) to (M) a predefined number of times; and
after the predefined number of times, output the label selected for each observation vector of the plurality of unlabeled observation vectors to a second dataset.

US Pat. No. 10,430,688

KNOWLEDGE-BASED ULTRASOUND IMAGE ENHANCEMENT

Siemens Medical Solutions...

11. A system for image enhancement in medical diagnostic ultrasound, the system comprising:a receive beamformer configured to acquire ultrasound data representing a region of a patient;
a B-mode detector configured to output detected data from the ultrasound data;
a processor configured to extract input features from the detected data, identify an artifact as a grating lobe, shadow, or blood from the detected data as a function of a knowledge base, and image process the detected data as a function of the artifact, the image process including filtering locations of the artifact differently than other locations; and
a display configured to display an image of the region based on the image processed detected data, the image being a B-mode image with the artifact reduced.

US Pat. No. 10,430,687

TRADEMARK GRAPH ELEMENT IDENTIFICATION METHOD, APPARATUS AND SYSTEM, AND COMPUTER STORAGE MEDIUM

1. A method for automatically dividing trademark figurative element codes, comprising:S101, establishing a sample trademark library and establishing a corresponding relationship between sample trademarks and division data for figurative element codes of known filed/registered figurative trademarks;
S102, extracting and processing image feature information of the sample trademarks, and establishing a corresponding relationship between the sample trademarks and the extracted image feature information, specifically including extracting coordinate values (xn, yn), relative coordinate values (xn?, yn?) and rounded relative coordinate values (xn?, yn?) of pixels in a contour feature line of a sample trademark image to obtain the image feature information of the sample trademark, wherein xn represents a coordinate value of an nth pinxel on an x axis in a coordinate system, yn represents a coordinate value of the nth pixel on a y axis in the coordinate system;
S103, extracting and processing image feature information of a trademark to be identified, specifically including extracting coordinate values (xn, yn), relative coordinate values (xn?, yn?) and rounded relative coordinate values (xn?, yn?) of pixels in a contour feature line of a trademark image to be identified to obtain the image feature information of the trademark to be identified;
S104, performing a matching retrieval by taking the image feature information of the trademark to be identified as a retrieval condition, and finding out a sample trademark with a highest similarity degree to the image feature information of the trademark to be identified, and a corresponding trademark figurative element code, specifically including performing the matching retrieval in the sample trademark library by taking the image feature information of the rounded relative coordinate values (xn?, yn?) of the pixels in the contour feature line of the trademark image to be identified as a retrieval keyword, and for each sample trademark respectively finding out a number of pixels matched with the rounded relative coordinate values (xn?, yn?) of the pixels in the contour feature line of the trademark image to be identified and a number of pixels mismatched with the rounded relative coordinate values (xn?, yn?) of the pixels in the contour feature line of the trademark image to be identified, to find out the sample trademark with a highest similarity degree to the image feature information of the trademark to be identified, and the corresponding trademark figurative element code;
S105, outputting the trademark figurative element code corresponding to the sample trademark with a highest similarity degree to the image feature information of the trademark to be identified as a figurative element code of the trademark to be identified,
wherein a similarity degree between two trademark images is obtained using the following formula:
Similarity degree between two trademark images=Similarity rate of subfigure segments or arrays of continuous pixels of the two trademark images*weight of the subfigure segments of the two trademark images+Overlapping rate of the rounded relative coordinate values of the pixels*weight of overlapped rounded relative coordinate values+Non-overlapping rate of the rounded relative coordinate values of the pixels*weight of non-overlapped rounded relative coordinate values.

US Pat. No. 10,430,686

SYSTEMS AND METHODS FOR ENHANCING IMAGE RECOGNITION TECHNIQUES USING PRIMARY AND SECONDARY FOCI

Verizon Patent and Licens...

1. A device, comprising:a non-transitory computer-readable medium storing a set of processor-executable instructions; and
one or more processors configured to execute the set of processor-executable instructions, wherein executing the set of processor-executable instructions causes the one or more processors to:
use one or more image recognition techniques to automatically identify, in a reference image, a primary focus of the reference image, the primary focus being a first feature of the reference image;
use the one or more image recognition techniques to automatically identify, in the reference image, one or more secondary foci of the reference image, the secondary foci including at least a second feature of the reference image;
use the one or more image recognition techniques to automatically identify at least one of:
characteristics of at least one of the one or more secondary foci of the reference image, or
a positional relationship of the at least one of the one or more secondary foci to the primary focus;
score a set of candidate images based on the identified primary focus and the one or more secondary foci, the scoring for a particular candidate image, in the set of candidate images, being based on at least one of the following factors:
whether the particular candidate image includes the primary focus,
whether the particular candidate image includes the one or more secondary foci,
whether characteristics, of a particular secondary focus included in the candidate image, match characteristics of a corresponding secondary focus included in the reference image, or
whether a positional relationship, of the particular secondary focus included in the candidate image, matches a positional relationship of the corresponding secondary focus included in the reference image; and
rank the set of candidate images based on the scoring.

US Pat. No. 10,430,685

DEEP MULTI-SCALE VIDEO PREDICTION

Facebook, Inc., Menlo Pa...

1. A method comprising:by a computing device, receiving a plurality of input frames of a video sequence associated with a time t;
by the computing device, training a convolutional network to predict one or more future frames of the video sequence from the plurality of input frames based on a generative model,
wherein the training comprises using an adversarial model and an image gradient difference loss model, and
wherein the training comprises randomly selecting temporal sequences of a n×m grid of pixels from the plurality of input frames exhibiting a threshold of optical flow; and
by the computing device, outputting a first future frame of the video sequence associated with a time t+1 as predicted by the generative model.

US Pat. No. 10,430,683

IMAGE PROCESSING METHOD AND PROCESSING DEVICE

BOE TECHNOLOGY GROUP CO.,...

1. An image processing method, comprising:acquiring an input image;
acquiring a first noise image and a second noise image;
executing image conversion processing on the input image with the first noise image using a generative neural network, to output the input image converted as a first output image; and
executing high resolution conversion processing on the first output image with the second noise image using a super-resolution neural network, to output the first output image converted as a second output image,
wherein the first noise image is different from the second noise image.

US Pat. No. 10,430,682

SYSTEMS AND METHODS FOR DECODING IMAGE FILES CONTAINING DEPTH MAPS STORED AS METADATA

FotoNation Limited, Galw...

1. A system for rendering an image using an image container file, the system comprising:a processor; and
memory containing a rendering application and an image container file, wherein the image container file comprises:
an encoded image synthesized from a plurality of images captured by a plurality of heterogeneous cameras, wherein each camera of the plurality of heterogeneous cameras captures the scene from a different viewpoint;
a depth map that specifies depths from a reference viewpoint for pixels in the encoded image based on disparity between pixels of the plurality of images;
an auxiliary map that provides information corresponding to pixel locations within a synthesized image; and
metadata describing the image container file, wherein the metadata comprises offset information to locate the encoded image, the depth map, and the auxiliary map;
wherein the rendering application configures the processor to:
locate the encoded image within the image container file;
decode the encoded image;
locate the depth map and the auxiliary map within the image container file; and
post process the decoded image to apply a depth based effect to the pixels of the decoded image based on the depth map, the auxiliary map, and the metadata to create a rendered image.

US Pat. No. 10,430,681

CHARACTER SEGMENTATION AND RECOGNITION METHOD

GRG Banking Equipment Co....

1. A character segmentation and recognition method, comprising:collecting image data to obtain a to-be-recognized image;
positioning a character line candidate region on the to-be-recognized image, wherein the character line candidate region comprises a plurality of characters which do not overlap with each other;
obtaining pre-set character line prior information, wherein the character line prior information comprises a quantity of the plurality of characters, a spacing among the plurality of characters, and a size of the plurality of characters;
obtaining a segmentation point template based on the character line prior information, wherein the segmentation point template comprises boundary frames of each of the plurality of characters;
traversing the segmentation point template within the character line candidate region, to obtain credible degrees of different positions in the character line candidate region;
determining an optimal segmentation position from the different positions, wherein the credible degree of the optimal segmentation position is largest among the credible degrees of the different positions;
segmenting the character line candidate region based on the segmentation point template and the optimal segmentation position to obtain a plurality of single-character regions which do not overlap with each other, wherein each of the plurality of single-character regions comprises one of the plurality of characters; and
performing character recognition on each of the plurality of single-character regions to obtain a corresponding recognition result;
wherein traversing the segmentation point template within the character line candidate region, to obtain credible degrees of different positions in the character line candidate region comprises:
recording position information of the segmentation point template, in response to the segmentation point being traversed to each of the different positions; and
obtaining the credible degrees corresponding to the position information; and
wherein the obtaining the credible degrees corresponding to the position information comprises:
obtaining the first number of first effective pixel points of the character line candidate region on a left boundary of a character segmentation point, wherein the segmentation point template comprises a plurality of character segmentation points, each of the character segmentation points corresponds to one character on a character line, each of the character segmentation points comprises the left boundary and a right boundary, and the first effective pixel points are pixel points with gray values in a pre-set first threshold range;
obtaining a first evaluation value based on the first number and a pre-set first weight;
obtaining the second number of second effective pixel points of the character line candidate region on the right boundary of the character segmentation point, wherein the second effective pixel points are pixel points with gray values in a pre-set second threshold range;
obtaining a second evaluation value based on the second number and a pre-set second weight;
obtaining the third number of third effective pixel points of the character line candidate region within the segmentation point template, wherein the third effective pixel points are pixel points with gray values in a pre-set third threshold range;
obtaining a third evaluation value based on the third number and a pre-set third weight; and
obtaining the credible degrees corresponding to the position information based on the first evaluation value, the second evaluation value and the third evaluation value.

US Pat. No. 10,430,680

IMAGE PROCESSING ALGORITHM

Robert Bosch GmbH, Stutt...

1. A method for allocating processor/computing times of a processor or of a computing unit for a driver assistance system of a vehicle, comprising:allocating processor/computing times to at least two functions of the driver assistance system as a function of a signal representing a state of the vehicle, wherein each function has assigned to it a control loop such that prior to the functions being executed each of the respective control loops requests a processor/computing time for the associated function.

US Pat. No. 10,430,679

METHODS AND SYSTEMS FOR DETECTING HEAD MOTION DURING AN AUTHENTICATION TRANSACTION

DAON HOLDINGS LIMITED, G...

1. A method for detecting user head motion comprising:generating, by a computing device, a motion type feature vector and a user head motion type prediction based on data generated for a sequence of frames, the frames include an image of a biometric modality of a user;
generating a liveness rating feature vector based on the data generated for the sequence of frames;
merging the motion type and liveness rating vectors;
generating a spoof prediction from the merged vector;
changing the user head motion type prediction to no motion when the generated spoof prediction indicates the image in the frames was spoofed;
storing the user head motion type prediction in a buffer; and
determining a final user head motion type detected for the frames.

US Pat. No. 10,430,678

BIOMETRIC INFORMATION PROCESSING DEVICE, BIOMETRIC INFORMATION PROCESSING METHOD AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM

FUJITSU LIMITED, Kawasak...

1. A biometric information processing device comprising:a memory;
a processor coupled to the memory and the processor configured to:
extract a surface pattern and a blood vessel pattern of a living body from a biometric image;
extract a feature point of the surface pattern;
set a region that contains the feature point, where the region being smaller than the biometric image; and
extract a feature of the blood vessel pattern in the region,
wherein pixels representing the blood vessel pattern exist in the region with a ratio that is equal to or more than a threshold value.

US Pat. No. 10,430,677

METHOD FOR CLASSIFYING DRIVER MOVEMENTS

Robert Bosch GmbH, Stutt...

1. A method for classifying driver movements for ascertaining a degree of driver attentiveness during driving of a motor vehicle, using an interior compartment camera, the method comprising:recording at least a part of the driver;
based on the recording, evaluating a movement quantity representing a head movement of the driver; and
classifying the head movement of the driver as a safety view if the movement quantity corresponds to a defined condition;
wherein the head movement of the driver is classified as the safety view if a lateral head movement is recognized as the movement quantity;
wherein the lateral head movement is recognized if, starting from a first head orientation, a beginning of a head rotation in a first direction is ascertained, a beginning of a head rotation in the first direction being ascertained if a speed of the head rotation in the first direction corresponds to a defined first speed threshold value or exceeds a defined first speed threshold value.

US Pat. No. 10,430,676

APPARATUS DETECTING DRIVING INCAPABILITY STATE OF DRIVER

DENSO CORPORATION, Kariy...

1. An apparatus detecting driving incapability state of a driver, the apparatus comprising:an imaging device that is mounted on a vehicle and is configured to capture a driver's seat;
a memory storing a head detection portion and a shake detection portion; and
a processor executing the head detection portion and the shake detection portion stored in the memory, wherein
the head detection portion detects a head of the driver based on an image of the driver's seat captured by the imaging device, and
the shake detection portion detects the driver is incapable of driving when an amplitude of a shake of the head detected by the head detection portion is smaller than a first amplitude or larger than a second amplitude, which is larger than the first amplitude, before a shake determination time elapses after external force has been applied to the vehicle during travel of the vehicle, causing the vehicle to be safely stopped in a case where it is determined that the driver is incapable of driving.

US Pat. No. 10,430,675

METHOD AND DEVICE FOR PROVIDING A PIECE OF OCCUPANT INFORMATION FOR A SAFETY UNIT FOR A VEHICLE

Robert Bosch GmbH, Stutt...

1. A method for providing a piece of occupant information for a safety unit of a vehicle, the method comprising:obtaining, by a processor and via an interface to an image recording unit of the vehicle, image data representing an occupant of the vehicle;
obtaining, by the processor and via an interface to a mobile device or a data memory, plausibility check data representing a person;
determining, by the processor and based on the obtained image data and plausibility check data, occupant data characterizing the occupant; and
at least one of (a) providing, by the processor, the determined occupant data to an interface to the safety unit for the vehicle and (b) adapting, by the processor, the safety unit based on the determined occupant data;
responsive to initially being unable to determine the occupant data based on the obtained image data and plausibility check data, requesting further plausibility check data representing a further person, wherein the determination of the occupant data is additionally based on the further plausibility check data.

US Pat. No. 10,430,674

VEHICLE VISION SYSTEM USING REFLECTIVE VEHICLE TAGS

MAGNA ELECTRONICS INC., ...

1. A vision system for a vehicle, said vision system comprising:a camera configured to be disposed at a vehicle equipped with said vision system so as to have a field of view forward of the equipped vehicle;
an image processor operable to process image data captured by said camera when said camera is disposed at the equipped vehicle;
a tag element disposed at another vehicle, said tag element having a pattern thereat;
wherein, with said camera disposed at the equipped vehicle and when the tag element is present in the field of view of said camera, said image processor is operable to process image data by said camera to determine the pattern of the tag element present in the field of view of said camera;
wherein said image processor compares the determined pattern of the tag element to a database of patterns and classifies the tag element at least in part responsive to determination that the determined pattern of the tag element generally matches a pattern of the database;
wherein the pattern of the tag element disposed at the other vehicle includes information at least pertaining to a type of the other vehicle; and
wherein, responsive to determination that the determined pattern of the tag element generally matches a pattern of the database, headlamps of the equipped vehicle are adjusted.

US Pat. No. 10,430,673

SYSTEMS AND METHODS FOR OBJECT CLASSIFICATION IN AUTONOMOUS VEHICLES

GM GLOBAL TECHNOLOGY OPER...

1. An object classification method comprising:receiving lidar point cloud data associated with an object observed by a sensor system of an autonomous vehicle;
determining, with a processor, a bounding curve as an outline of the object in the lidar point cloud data and having a plurality of curve segments;
determining, with the processor, a feature vector for each of the plurality of curve segments based on convexities and concavities associated with the bounding curve; and
classifying, with the processor, the object by applying the feature vectors to a machine learning model and receiving a classification output that classifies the object for assisting in control of the autonomous vehicle.

US Pat. No. 10,430,672

HITCH ASSIST SYSTEM WITH TRAILER HEIGHT ESTIMATION AND HITCH COUPLER IDENTIFICATION

Ford Global Technologies,...

1. A hitch assist system comprising:an imager for capturing rear-vehicle images; and
a processor configured to:
extract trailer and ground features from the captured images;
compute vehicle motion displacement based on optical flow of the ground features;
estimate a height of each trailer feature based on vehicle motion displacement and optical flow of the trailer features; and
determine a trailer height based on the estimated heights of at least a portion of the trailer features.

US Pat. No. 10,430,671

SYSTEM AND METHOD FOR REMAPPING SURFACE AREAS OF A VEHICLE ENVIRONMENT

Honda Motor Co., Ltd., T...

1. A computer-implemented method for remapping surface areas of a vehicle environment, comprising:receiving a plurality of images of the surface areas of the vehicle environment from a computing device, wherein the surface areas of the vehicle environment includes an internal environment of a vehicle and an external environment surrounding the vehicle;
evaluating the plurality of images to determine an optical flow value associated with at least one pixel of at least two images of the plurality of images;
determining at least one surface area that includes the external environment of the vehicle; and
remapping the surface areas by filtering the at least one surface area from which the external environment is captured, wherein filtering the at least one surface area includes prohibiting rendering of at least one graphic through at least one window of the vehicle.

US Pat. No. 10,430,670

IMAGE-RECOGNITION DEVICE AND METHOD FOR CONTROLLING SAME

Robert Bosch GmbH, Stutt...

1. An image-recognition device that is mounted in a vehicle body and that recognizes a surrounding situation of the vehicle body on the basis of image data that corresponds to an image of surroundings captured from the vehicle body, the image-recognition device comprising:a tilt-detection section that detects a tilt angle of the vehicle body with respect to a virtual line perpendicular to a road surface by representing motion of an objects in the image data as a vector;
an image-rotation section that rotates the image data for correction in accordance with the tilt detected by the tilt-detection section such that the image is tilted only by an amount of the tilt in a direction of the tilt of the vehicle body; and
an image-recognition section that recognizes the surrounding situation of the vehicle body on the basis of corrected image data that is generated when the image-rotation section rotates the image data for the correction, and that outputs position information data, which includes position information of recognized objections in the surrounding situation, to a drive assist control section executing a control for assisting a driver.

US Pat. No. 10,430,669

METHODS, SERVERS AND SYSTEMS FOR OPERATING ON SECURITY INSPECTION DATA

Nuctech Company Limited, ...

1. A method performed by a server for operating on security inspection image data, comprising:receiving an operation request for target security inspection image data from a client through a network;
loading the target security inspection image data from a storage server based on the operation request;
performing, by an image processing module, image processing on the loaded target security inspection image data;
encoding the processed target security inspection image data or a graphic interface including the processed target security inspection image data; and
transmitting the encoded target security inspection image data or graphic interface to the client through the network in a video stream,
wherein the server selects one of a plurality of data loading applications according to parameter information of the target security inspection image data to load the target security inspection image data from the storage server, and
wherein the server performs image processing on the loaded target security inspection image data using an image processing module corresponding to the selected data loading application.

US Pat. No. 10,430,668

SITUATION ASCERTAINMENT SYSTEM USING CAMERA PICTURE DATA, CONTROL DEVICE, AND SITUATION ASCERTAINMENT METHOD USING CAMERA PICTURE DATA

HITACHI SYSTEMS, LTD., T...

1. A situation confirmation system for using camera image data that enables an image data from a camera to be applied for a purpose of use in addition to preventing crime or monitoring safety, the situation confirmation system comprisinga central processing unit receive image data from a camera via a network
set header information to a header of the image data;
analyze the image data to identify objects and movement;
receive respective information entered from another system excluding the camera and/or an information processing device via the network;
automatically create, in response to the analyzing of the image data, auxiliary information that includes a number of objects and a direction of movement based on the created auxiliary information and the respective information,
create and add to the image data additional information according to a purpose of use of the image data by correlating the image data with a portion of additional information according to the purpose of use of the image data; wherein:
the additional information includes:
information of an installation location of the camera entered from the information processing device;
a vicinity event and disaster information entered from the information processing device; and
the auxiliary information; and the vicinity event and disaster information includes a set of weighting ranks; the purpose of use of the image data comprises marketing, traffic, amusement, sightseeing, festival, event, medical service and care giving;
store the image data including the additional information; and
the purpose of use of the image data of the camera in addition to crime prevention or safety monitoring, and stored in an image recording device;
search image data and display the same on a display
receiving a search condition;
searching the image data correlated with the portion of the additional information;
extract a search result based on the search condition; and
based on the search result, set a weighting rank according to the vicinity event and disaster information, the weighting rank indicating a level of influence
wherein the image data is correlated with the portion of the additional information of the other system and/or the information processing device according to the purpose of use of the image data of the camera in addition to crime prevention or safety monitoring and stored in an image recording device.

US Pat. No. 10,430,667

METHOD, DEVICE, AND COMPUTER PROGRAM FOR RE-IDENTIFICATION OF OBJECTS IN IMAGES OBTAINED FROM A PLURALITY OF CAMERAS

Canon Kabushiki Kaisha, ...

1. A method for re-identification by a computing device of at least one target object in images obtained from at least two image sources, each of the image sources obtaining images representing an area associated with the corresponding image source, the method comprising:identifying, by the computer device, at least one target object in images obtained from one of a pair of image sources;
estimating, by the computer device, a relative velocity of the at least one target object in comparison with at least another object previously identified in images obtained from the one of the pair of image sources, wherein the previously identified another object is a moving object; and
establishing, by the computer device, based on the estimated relative velocity of the at least one target object, a correspondence between the at least one target object identified in images obtained from the one of the pair of image sources and a plurality of candidate objects represented in images obtained from an other image source of the pair of image sources, thereby determining which among the plurality of candidate objects is the at least one target object; and
wherein the method further comprises, by the computer device, a step of extracting, for the at least one target object and each of the plurality of candidate objects, respective image-based features, and a step of selecting at least one candidate object of the plurality of candidate objects based on the extracted image-based features and the relative velocity of each of the plurality of candidate objects, and on the extracted image-based features and the relative velocity of the at least one target object.

US Pat. No. 10,430,666

TARGET OBJECT IDENTIFYING DEVICE, TARGET OBJECT IDENTIFYING METHOD AND TARGET OBJECT IDENTIFYING PROGRAM

NEC CORPORATION, Tokyo (...

1. A target object identifying device comprising:a processor;
a non-transitory computer-readable data storage medium storing computer-executable code that the processor executes to:
match monitoring targets shown in video captured by one or more imaging devices, identify monitoring targets estimated to be the same monitoring target, as an identified monitoring target, and identify other monitoring targets estimated to be different monitoring targets and responsively add the other monitoring targets within a first storage device upon which basis further matching of additional monitoring targets is performed;
identify a desired target object from one or more identified monitoring targets, using imaging times of each of the one or more identified monitoring targets, the desired target being a suspicious person or object; and
store the identified desired target object within a second storage device, wherein the desired target object is identified as the identified monitoring target whose frequency of monitoring target imaging information with an imaging time in a predetermined period is greater than or equal to a predetermined threshold,
wherein the desired target object is identified as the identified monitoring target whose time width between an earliest imaging time and a latest imaging time, among time widths between imaging times in a predetermined period, is greater than or equal to a predetermined threshold specified by a determination condition,
wherein the processor executes the computer-executable code to further generate the determination condition for specifying a condition of the time width between the earliest imaging time and the latest imaging time, based on imaging times of monitoring targets not identified as the desired target object.

US Pat. No. 10,430,665

VIDEO COMMUNICATIONS METHODS USING NETWORK PACKET SEGMENTATION AND UNEQUAL PROTECTION PROTOCOLS, AND WIRELESS DEVICES AND VEHICLES THAT UTILIZE SUCH METHODS

GM GLOBAL TECHNOLOGY OPER...

1. A video communications method comprising:segmenting an image frame or an image frame portion into a first source network packet block and a second source network packet block, wherein the first source network packet block comprises a first number of source network packets and the second network packet block comprises a second number of source network packets;
encoding the first source network packet block to produce a first encoded network packet block and encoding the second source network packet block to produce a second encoded network packet block, wherein the first encoded network packet block comprises a first number of encoded network packets and the second encoded network packet block comprises a second number of encoded network packets, and wherein the first number of encoded network packets is greater than or equal to the first number of source network packets and the second number of encoded network packets is greater than or equal to the second number of source network packets; and
transmitting the first encoded network packet block and the second encoded network packet block over a wireless network.

US Pat. No. 10,430,664

SYSTEM FOR AUTOMATICALLY EDITING VIDEO

1. A method comprising:receiving, by a computer system, an input media file;
decomposing, by the computer system, the input media file into a sequence frames;
identifying, by the computer system, for each frame subsequent to a first frame of the sequence of frames, motion values of pixels of the each frame relative to a preceding frame of the plurality of frames;
generating, by the computer system, a sequence of filtered motion values by smoothing the motion values of the sequence of frames;
identifying, by the computer system, one or more hotspots in the media file from the sequence of filtered motion values, each hotspot of the one or more hotspots including a video segment of the media file; and
generating an output including the one or more hotspots and excluding portions of the input media file not identified as hotspots.

US Pat. No. 10,430,663

METHOD, ELECTRONIC DEVICE AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM FOR IMAGE ANNOTATION

INSTITUTE FOR INFORMATION...

1. An image annotation method implemented by an electronic device including a processor, comprising:acquiring a sequence of image frames comprising a plurality of image frames from video data by the processor;
performing an object detecting and tracking procedure on the sequence of image frames by the processor, so as to identify and track one or more target objects from the image frames;
selecting a plurality of candidate key image frames from the image frames according to a first selection condition by the processor, wherein the first selection condition comprises when a target object in the one or more target objects starts to appear or disappears in an image frame of the image frames, selecting the image frame as one of the candidate key image frames;
determining a plurality of first similarity indexes of the candidate key image frames by the processor, wherein each of the first similarity indexes is determined by the processor through a similarity calculation according to a first covariance value of a corresponding one of the candidate key image frames and a plurality of first variation values statistically calculated in different directions of the corresponding candidate key image frame;
determining a plurality of second similarity indexes of a plurality of adjacent image frames by the processor, wherein each of the adjacent image frames is adjacent to at least one of the candidate key image frames, and each of the second similarity indexes is determined by the processor through the similarity calculation according to a second covariance value of a corresponding one of the adjacent image frames and a plurality of second variation values statistically calculated in different directions of the corresponding adjacent image frame;
selecting the candidate key image frames as well as the adjacent image frames that meet a second selection condition as a plurality of key image frames, wherein the second selection condition comprises when a difference between a corresponding second similarity index of an adjacent image frame of the adjacent image frames and a corresponding first similarity index of a candidate key image frame adjacent to the adjacent image frame exceeds a similarity threshold, selecting the adjacent image frame as one of the key image frames; and
presenting the key image frames on a graphical user interface and displaying annotation information for the one or more target objects through the graphical user interface by the processor.

US Pat. No. 10,430,662

TRAINING MACHINE LEARNING MODELS TO DETECT OBJECTS IN VIDEO DATA

GumGum, Inc., Santa Moni...

11. A computer-implemented method comprising:as implemented by one or more computing devices configured with specific executable instructions,
receiving one or more video files as potential training data for one of more machine learning models;
selecting a first sample set of frames from the one or more video files;
receiving indication that (a) a first portion of a first sample frame includes the object of interest and (b) a second portion of a second sample frame includes the object of interest, wherein an intermediary plurality of frames appear in the one or more video files between the first sample frame and the second sample frame;
determining an in-frame location of the object of interest in at least a subset of the intermediary plurality of frames using a tracker;
storing frame annotation data for the one or more video files, wherein the frame annotation data includes an in-frame location of the object of interest in each of the first sample frame, the second sample frame, and the at least a subset of the intermediary plurality of frames;
training the one or more machine learning models to identify the object of interest, wherein the frame annotation data is used as training data in training the at least one machine learning model;
determining that performance of the one or more machine learning models when trained using the frame annotation data is below a performance threshold, wherein the performance threshold relates to at least one of accuracy or speed;
selecting a second sample set of frames from the one or more video files, wherein the first sample set of frames is different than the second sample set of frames;
receiving indications of portions of the second sample set of frames that include the object of interest; and
retraining the one or more machine learning models based at least in part on the portions of the second sample set of frames that include the object of interest.

US Pat. No. 10,430,661

GENERATING A COMPACT VIDEO FEATURE REPRESENTATION IN A DIGITAL MEDIUM ENVIRONMENT

Adobe Inc., San Jose, CA...

1. In a digital medium environment to learn a compact feature representation of video, a method implemented by at least one computing device, the method comprising:determining, by the at least one computing device, temporal order dynamics exhibited by a plurality of frames of the video through machine learning, the temporal order dynamics describing changes to the plurality of frames, one to another, over time;
generating, by the at least one computing device, a video feature representation from the temporal order dynamics, the generating based on:
a value of each feature of a plurality of features that has been reached for the plurality of frames in the video from the machine learning; and
a timestamp indicating when the value is reached for each feature of the plurality of features; and
outputting, by the at least one computing device, the video feature representation as a basis to determine similarity of the video with at least one other video.

US Pat. No. 10,430,660

IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM

Canon Kabushiki Kaisha, ...

1. An image processing apparatus comprising:a motion vector detection unit configured to perform motion vector detection by using an image signal output from an image sensor;
a generation unit configured to generate information regarding a result of the motion vector detection as metadata;
a recording unit configured to record each frame image of moving image output from the image sensor in a recording medium in association with the metadata; and
a control unit configured to cause, during an image capturing operation, the motion vector detection unit to perform motion vector detection by using an image signal output from the image sensor on which first reduction processing to reduce a number of pixels of the frame image was performed, and cause, during a playback operation of playing back the recorded age instructed by a user, the motion vector detection unit to narrow an image area in the each frame image in which motion vector detection is to be performed based on the metadata and to perform motion vector detection by using an image signal output from the recording medium on which second reduction processing to reduce a number of pixels of the frame image was not performed or on which the second reduction processing was performed such that a number of pixels of the frame image which has undergone the second reduction processing is larger than number of pixels of the frame image which has undergone the first reduction processing.

US Pat. No. 10,430,659

METHOD AND APPARATUS FOR URBAN ROAD RECOGNITION BASED ON LASER POINT CLOUD, STORAGE MEDIUM, AND DEVICE

Baidu Online Network Tech...

1. A method for urban road recognition based on a laser point cloud, comprising:constructing a corresponding road edge model according to the laser point cloud acquired by a laser sensor;
determining a height of a mobile carrier provided with the laser sensor and constructing a corresponding road surface model based on the height and the laser point cloud;
eliminating a road surface point cloud and a road edge point cloud in the laser point cloud according to the road edge model and the road surface model, segmenting a remaining laser point cloud using a point cloud segmentation algorithm, and recognizing an object corresponding to a segmenting result,
wherein the method is performed by one or more processors.

US Pat. No. 10,430,657

OBJECT RECOGNITION TOOL

X Development LLC, Mount...

1. A method performed by a data processing apparatus of a robot:navigating a robot through an area to identify objects located in the area, the robot detecting presence of the objects in the area using one or more sensors;
attempting to determine an identity of a particular object detected in the area using an image processing technique and one or more images of the particular object captured by a camera of the robot;
determining that the robot cannot determine the identity of the particular object using the image processing technique;
in response to determining that the robot cannot determine the identity of the particular object using the image processing technique, providing data that causes a user device to present a user interface that includes data describing the particular object, the data describing the particular object including the one or more images of the particular object captured by the camera of the robot, the user interface being configured to present multiple categories of objects and to receive user input that identifies a category for the particular object;
receiving, in response to interaction with the user interface, data identifying the category for the particular object; and
in response to receiving the data identifying the category for the particular object:
updating a database for the robot with the data identifying the category for the particular object; and
enabling the robot to perform one or more actions with respect to objects of the identified category that the robot was previously unable to perform before receiving the data identifying the category for the particular object.

US Pat. No. 10,430,656

ANALOG UTILITY METER READING

UTILITY METER READER, LLC...

1. A method of reading a utility meter with a mobile device having a camera, a processor, and wireless communication transceiver associated therewith, the utility meter having a plurality of scrolling dials, the plurality of scrolling dials each having a scrolling dial indicator, the method comprising:taking a digital image of the plurality of scrolling dials of the utility meter with the camera of the mobile device;
analyzing the digital image to identify the dial indicators in the digital image;
analyzing the identified dial indicators to determine a value of the dials with the processor of the mobile device; wherein analyzing the digital image to identify the dial indicators in the digital image includes converting the digital image to a gray-scale image, inverting the gray-scale image to produce a high contrast image, applying a morphological filter to the high contrast image to produce a smoothed image, applying a top-hat transform to the smoothed image to produce a transformed image, eroding boundaries of regions in the transformed image to produce an eroded image, applying a threshold filter to the eroded image to produce a bi-level image, and analyzing the bi-level image to identify the dial indicators in the digital image with the processor of the mobile device; and
transmitting the determined value with the wireless communication transceiver of the mobile device, whereby the utility meter is read with the mobile device.

US Pat. No. 10,430,655

AUGMENTED REALITY INFORMATION PROCESSING SYSTEM AND AUGMENTED REALITY DISPLAY CONTROL METHOD WITH SPACE INFORMATION CONVERSION AND DISPLAY CONTROL FEATURES

FUJITSU LIMITED, Kawasak...

1. A system, comprising:circuitry configured to:
obtain an image;
detect a first actual object in the image;
obtain, from storage, space information indicating a first space in a three-dimensional coordinate system whose criterion is based on the first actual object;
convert, in accordance with a first shape of the first actual object in the image, the space information into first area information corresponding to an arrangement enable area in which the first space is projected onto the image;
obtain, from the storage, other space information indicating a second space in the three-dimensional coordinate system whose criterion is based on the first actual object, the second space being different from the first space;
convert, in accordance with the first shape of the first actual object, the other space information into second area information corresponding to an arrangement disable area in which the second space is projected onto the image; and
control, based on the first area information and the second area information when at least a part of the arrangement enable area is included in the arrangement disable area, a display to display a content in a third area within the arrangement enable area in the image, the third area not being included in the arrangement disable area, the content being associated with the actual object.

US Pat. No. 10,430,654

AUTOMATED DETECTION OF ENVIRONMENTAL MEASURES WITHIN AN OCEAN ENVIRONMENT USING IMAGE DATA

1. A method comprising using at least one hardware processor to:in a machine-learning phase during a first time period,
receive first image data of an ocean environment,
receive ocean sensor data that represent one or more environmental measurements of the ocean environment collected by at least one ocean sensor contemporaneously with a time at which the first image data of the ocean environment was captured, and
correlate the first image data with the ocean sensor data to train a predictive model to emulate an output of the at least one ocean sensor based on the first image data; and,
in an operational phase during a second time period that is subsequent to the first time period,
for each of one or more ocean-facing cameras that are positioned to capture second image data of the ocean environment,
receive the captured second image data via at least one network, and
use the predictive model to
identify one or more features within the captured second image data, and
estimate the one or more environmental measures of the ocean environment based on the identified one or more features within the captured second image data, and,
for each of one or more user systems,
receive a request for data from the user system via the at least one network,
generate the requested data based on the estimated one or more environmental measures, and
send the requested data to the user system via the at least one network.

US Pat. No. 10,430,653

SYSTEM AND METHOD FOR AUTONOMOUS VEHICLE CONTROL

Landing Technologies, Inc...

1. A system for localizing an autonomous vehicle to a target landing area, comprising:an unmanned aerial vehicle with a plurality of directional control components, the unmanned aerial vehicle including a control system for controlling the directional control components, and having three separated light emitting diodes providing a position indicator;
a camera proximate the target landing area, the camera for detecting the three LEDs on the unmanned aerial vehicle;
a computation device proximate or in association with the camera and the target landing area, the computation device in communication with the camera and configured to compute a position of the vehicle based on the detected three LEDs and the relationship of the three LEDs to the vehicle orientation and to provide a path to the target landing area;
a transmitter proximate the computation device in communication with the computation device and configured to receive information from the computation device and produce a signal carrying the information;
a receiver on the vehicle and configured to receive the signal from the transmitter, the control system in communication with the receiver, the control system configured to control the plurality of directional control components of the vehicle based on the information received from the receiver to localize the unmanned aerial vehicle to the target area.

US Pat. No. 10,430,652

PROCESS AND SYSTEM FOR VIDEO SPOOF DETECTION BASED ON LIVENESS EVALUATION

1. A process for determining a video of a biometric characteristic as being a spoof or a genuine recording of a live biometric characteristic, wherein the video comprises a temporal sequence of frames (j), the process being implemented in a system comprising a processing unit,characterized in that it comprises the steps of:
preprocessing the video, said preprocessing comprising aligning the biometric characteristic on each frame of the video,
determining a liveness score of the video, said determination comprising, for each frame of a plurality of frames:
computing a difference between a motion intensity of a current frame and a motion intensity of each frame of a set of preceding frames,
inferring, from said differences, a differential motion intensity of the current frame,
inferring from the differential motion intensities of the plurality of frames a motion intensity of the video,
comparing said motion intensity to a predetermined threshold, and assigning a liveness score to the video, depending on a comparison of the motion intensity of the video with the threshold, and
according to the liveness scores of the video, determining whether the video is a genuine recording of a biometric characteristic or a spoof.

US Pat. No. 10,430,651

ELECTRONIC DEVICE INCLUDING IRIS CAMERA

SAMSUNG ELECTRONICS CO., ...

1. An electronic device comprising:a light source module comprising a light source and associated circuitry;
an iris camera configured to capture an image of an iris using infrared rays radiated from the light source module; and
a processor electrically connected with the light source module and the iris camera and configured to generate an image regarding the iris, and
wherein, the light source module and the iris camera are arranged such that a distance between the light source module and the iris camera is between a first threshold distance and a second threshold distance, the first threshold distance being for generating a retina reflection region having a specified size in the image of the iris obtained by detecting, by the iris camera, the infrared rays reflected from the retina, the second threshold distance being for generating a darkest portion to be displayed in an iris region in the image of the iris having a specified luminance.

US Pat. No. 10,430,650

IMAGE PROCESSING SYSTEM

FANUC CORPORATION, Yaman...

1. An image processing system that detects an image of a target in input shape information based on a model pattern representing the feature of the image of the target, comprising:a model pattern acquisition unit that acquires the model pattern generated from the input shape information;
a model pattern correction unit used for correcting the model pattern acquired by the model pattern acquisition unit; and
a machine learning unit that generates generation information for generating the model pattern from the input shape information by performing supervised learning using a set of learning data pieces each including correction information about the model pattern corrected by using the model pattern correction unit and the input shape information associated with each other, wherein
the image processing system is capable of generating a model pattern in which a result of the learning is reflected using the input shape information input to the image processing system and the generation information.

US Pat. No. 10,430,649

TEXT REGION DETECTION IN DIGITAL IMAGES USING IMAGE TAG FILTERING

Adobe Inc., San Jose, CA...

1. An automated text region detection method implemented by at least one computing device, the method comprising:locating, by the at least one computing device, a text region candidate in a digital image;
generating, by the at least one computing device, a plurality of image tags for the text region candidate using a plurality of classifiers trained as part of machine learning, the plurality of classifiers including:
a classifier having a model configured to generate an image tag indicative of text; and
a classifier having a model configured to generate an image tag not indicative of text;
determining, by the at least one computing device, whether the text region candidate includes text based on inclusion of the image tag indicative of text and the image tag not indicative of text in the plurality of image tags generated for the text region candidate; and
outputting, by the at least one computing device, an indication of a text region corresponding to the text region candidate in the digital image responsive to the determining the text region candidate includes text.

US Pat. No. 10,430,648

METHOD OF PROCESSING CONTENT AND ELECTRONIC DEVICE USING THE SAME

Samsung Electronics Co., ...

1. A method of processing content in an electronic device, the method comprising:acquiring, by a controller in the electronic device, content including a plurality of characters;
generating, by the controller, a plurality of editable images using the acquired content;
grouping the plurality of editable images into a plurality of blocks, based on sizes of the plurality of editable images, intervals between the plurality of editable images, and shapes of the plurality of editable images, wherein each of the plurality of blocks includes a plurality of characters;
editing, by the controller, the plurality of editable images based on the grouped plurality of editable images; and
displaying, by the controller, the edited plurality of editable images,
wherein the editing of the plurality of editable images comprises:
identifying an interval between at least two adjacent blocks among the plurality of blocks; and
adjusting the interval between the at least two adjacent blocks based on the identified interval of the at least two adjacent blocks.

US Pat. No. 10,430,647

TAILORED ILLUMINATION PROFILE FOR ARTICULATED HAND TRACKING

Microsoft Licensing Techn...

1. A near-eye display device comprising:an illumination module that, when in operation, provides illumination having an illumination profile that matches a predicted interaction volume within which a user of the near-eye display device is expected to place a body part of the user to interact with a user interface of the near-eye display device, wherein the illumination profile includes an upper portion and a lower portion, the upper portion corresponding to a first part of the predicted interaction volume from a shoulder height of the user and above, the lower portion corresponding to a second part of the predicted interaction volume from the shoulder height of the user and below, and wherein the upper portion of the illumination profile has an average illumination power that is lower than an average illumination power of the lower portion of the illumination profile;
an imaging sensor that, when in operation, receives light reflected by an environment of the near-eye display device and the body part of the user and generates depth values corresponding to depths of the environment and the body part relative to the near-eye display device; and
a processor that, when in operation, tracks a location of the body part of the user based on the depth values.

US Pat. No. 10,430,646

SYSTEMS AND METHODS FOR OPERATING A VIRTUAL REALITY ENVIRONMENT USING COLORED MARKER LIGHTS ATTACHED TO GAME OBJECTS

ZERO LATENCY PTY LTD, No...

1. A system for operating a virtual reality environment including at least one space, the system comprising:at least one color camera configured to view the at least one space;
at least one object, wherein the at least one object comprises at least one of a player, a controller and a device related to the virtual reality;
at least one colored light attached to each of the at least one object configured to be used as a tracking marker;
at least one server configured to track movements of the at least one object during the virtual reality;
a memory containing machine readable medium comprising machine executable code having stored thereon instructions for tracking the movements of the at least one object; and
a control system comprising a processor or processors coupled to the memory, the control system configured to execute the machine executable code to cause the control system to:
assign a color choice to each of the at least one colored light, wherein the assignment of the first color to the first colored light from among the at least one colored light is based on a spatial proximity of the first colored light to other colored lights in the at least one space.

US Pat. No. 10,430,645

FACIAL RECOGNITION OPERATIONS BASED ON POSE

Apple Inc., Cupertino, C...

1. A device, comprising:a camera;
at least one illuminator providing illumination;
circuitry coupled to the camera and the illuminator, wherein the circuitry is programmed to:
obtain at least one image of a face of a user using the camera while the face of the user is illuminated with the illumination;
encode the at least one image to generate at least one feature vector, wherein the at least one feature vector represents one or more facial features of the user in the at least one image;
determine a pose of the user in the at least one image;
in response to the pose of the user being determined to be a first pose:
compare the at least one feature vector to a first set of dynamic reference templates and a set of static reference templates to obtain a first matching score; and
authorize the user to perform at least one operation on the device that requires authentication in response to the first matching score being above a first unlock threshold of the device;
in response to the pose of the user being determined to be a second pose:
compare the at least one feature vector to a second set of dynamic reference templates and the set of static reference templates to obtain a second matching score; and
authorize the user to perform at least one operation on the device that requires authentication in response to the second matching score being above a second unlock threshold of the device.

US Pat. No. 10,430,644

BLENDED IRIS AND FACIAL BIOMETRIC SYSTEM

Global Bionic Optics Ltd....

1. A method for identifying a candidate, comprising:capturing, by an optical system, a raw image of the candidate;
identifying, by the optical system, iris features and facial features within the raw image;
quantifying, by the optical system, each of the iris features;
quantifying, by the optical system, each of the facial features;
determining, by the optical system, a first weight associated with the iris features;
determining, by the optical system, a second weight associated with the facial features, wherein the first weight and second weight are based on a distance of the candidate from the optical system;
comparing, by the optical system, the quantified iris features with iris enrollment data to determine an iris match probability;
comparing, by the optical system, the quantified facial features with facial enrollment data to determine a facial match probability;
modifying, by the optical system, the iris match probability based on the first weight;
modifying, by the optical system, the facial match probability based on the second weight;
calculating, by the optical system, a combined probability based on the modified iris match probability and the modified facial match probability; and
confirming, by the optical system, an identity of the candidate based on the combined probability.

US Pat. No. 10,430,643

FACIAL RECOGNITION PET IDENTIFYING SYSTEM

Finding Rover, Inc., Bre...

1. A user interface device, comprising:a processor;
a display;
a memory configured to store a first image, wherein a first animal appears in the image; and
a network interface device configured to:
transmit the first image;
transmit a first geographical location indicator, wherein the first geographical location indicator is generated in response to a user input;
receive a second image, wherein the first animal appears in the second image; and
receive a contact information associated with the second image, wherein the second image is received in response to a networked device determining that the first animal appears in the second image, and wherein the determining that the first animal appears in the second image is only performed by the networked device when the first geographical location indicator indicates a first location that is within a distance from a second location that is indicated by a second geographical location indicator associated with the second image.

US Pat. No. 10,430,642

GENERATING ANIMATED THREE-DIMENSIONAL MODELS FROM CAPTURED IMAGES

Apple Inc., Cupertino, C...

1. A method, comprising:obtaining at least one image of a face of a user using a camera located on a device, the device comprising a computer processor, a memory, and a display;
encoding, using the computer processor, the at least one image to generate one or more first feature vectors, wherein the first feature vectors represent one or more facial features of the user in the at least one image;
determining, using the computer processor, a pose of the face of the user and one or more muscle activations of the face of the user in the at least one image from the first feature vectors;
generating, using the computer processor, a three-dimensional model of the user's face based on the determined pose and muscle activations for the user's face;
projecting, using the computer processor, the three-dimensional model onto the at least one image;
defining, using the computer processor, one or more selected locations on the three-dimensional model;
using the three-dimensional model projected onto the at least one image, encoding, at least once, using the computer processor, the at least one image at the selected locations to generate one or more second feature vectors for the at least one image, wherein the second feature vectors represent one or more facial features of the user at the selected locations in the at least one image;
refining, at least once, using the computer processor, the determination of the pose of the face of the user and the one or more muscle activations of the face of the user in the at least one image using the second feature vectors; and
refining, at least once, using the computer processor, the three-dimensional model of the user's face generated from the at least one image based on the refined pose and muscle activations for the user's face.

US Pat. No. 10,430,640

SYSTEM AND METHOD FOR CLASSIFICATION OF PARTICLES IN A FLUID SAMPLE

KONINKLIJKE PHILIPS N.V.,...

1. A system for classifying particles in a water sample, system comprising:an optical detection assembly comprising at least one image acquisition device and corresponding lens with an optical axis, the image acquisition device is configured to acquire images of an image acquisition area perpendicular to the optical axis;
a sample device comprising at least one sample container suitable for holding a water sample in liquid form comprising particles;
a translating arrangement configured to translate said image acquisition area through at least a part of said sample container with a step length between each acquired image;
a controller configured to control said optical detection assembly and said translating arrangement to acquire images of a plurality of image acquisition areas;
an image processor programmed to analyze said acquired images and to determine a set of features for an individual particle captured by said acquired images by creating objects of the individual particle and assigning each of the objects to a corresponding stack of objects comprising different images of the individual particle; and
an artificial intelligent processor programmed to associate said set of features for said individual particle to a particle classification of particles,
wherein said step length between each acquired image is used to determine a distance between the objects in the stacks of objects.

US Pat. No. 10,430,639

USER AUTHENTICATION DEVICE, INPUT SENSING MODULE FOR THE SAME, AND METHOD OF AUTHENTICATING USER

Samsung Display Co., Ltd....

1. An input sensing module comprising:a flexible base member comprising a three-dimensional base surface; and
a plurality of sensing electrodes disposed on the flexible base member;
wherein:
the flexible base member comprises a first base portion having a first non-flat average curvature and a second base portion having a second non-flat average curvature smaller than the first average curvature;
the plurality of sensing electrodes comprise first sensing electrodes disposed on the first base portion and second sensing electrodes disposed on the second base portion, the first sensing electrodes having a first pitch, and the second sensing electrodes having a second pitch greater than the first pitch;
the first pitch is defined by a sum of a first width of an electrode of the first sensing electrodes and a first distance between the first sensing electrodes adjacent to each other; and
the second pitch is defined by a sum of a second width of an electrode of the second sensing electrodes and a second distance between the second sensing electrodes adjacent to each other.

US Pat. No. 10,430,638

SYSTEMS AND METHODS FOR SPOOF DETECTION RELATIVE TO A TEMPLATE INSTEAD OF ON AN ABSOLUTE SCALE

Synaptics Incorporated, ...

9. A method for performing spoof detection, comprising:receiving, by a processor from a sensor, an input image of a biometric;
extracting, by the processor, one or more anti-spoof metrics from the input image;
receiving, by the processor, an anti-spoof template corresponding to a biometric of a first user;
for a first anti-spoof metric, computing, by the processor, a first amount of a difference between a value of the first anti-spoof metric extracted from the input image and a value of the first anti-spoof metric in the anti-spoof template that corresponds to the biometric of the first user;
for a second anti-spoof metric extracted from the input image, computing, by the processor, a second amount of a difference between a value of the second anti-spoof metric extracted from the input image and a value of the second anti-spoof metric in the anti-spoof template that corresponds to the biometric of the first user;
determining, by the processor, whether the input image is a replica of the biometric of the first user based on the first amount of the difference between the value of the first anti-spoof metric extracted from the input image and the value of the first anti-spoof metric in the anti-spoof template that corresponds to the biometric of the first user and the second amount of the difference between the value of the second anti-spoof metric extracted from the input image and the value of the second anti-spoof metric in the anti-spoof template that corresponds to the biometric of the first user; and
preventing, by the processor, successful authentication on the device in response to determining that the input image is a replica of the biometric of the first user.

US Pat. No. 10,430,637

FINGERPRINT IDENTIFICATION UNIT

Keycore Technology Corp.,...

1. A fingerprint identification unit formed on a base, having a top and a bottom side, comprising:a first coating layer disposed either on the top side or on the bottom side of the base and being a film layer, not a silicon substrate, the first coating layer being a base layer for the fingerprint identification unit;
a first fingerprint identification electrode layer disposed on one side of the first coating layer opposite to the base and having a plurality of first fingerprint identification electrodes;
a second coating layer covering the first fingerprint identification electrode layer;
a second fingerprint identification electrode layer disposed on one side of the second coating layer opposite to the first fingerprint identification electrode layer and having a plurality of second fingerprint identification electrodes;
a conductor layer having a plurality of metal conductors, which are selectively electrically connected to the first and the second fingerprint identification electrode layer; and
a third coating layer covering the second fingerprint identification electrode layer and part of the conductor layer;
wherein the base is selected from a group consisting of a touch panel, a Color Filter (CF), a Thin-Film Transistor (TFT), and a Liquid Crystal Module (LCM); and
wherein the first, the second, and the third coating layer being a silica film.

US Pat. No. 10,430,636

DISPLAY PANEL AND DISPLAY DEVICE

Shanghai Tianma Micro-Ele...

1. A display panel, comprising:an array substrate including a plurality of organic light-emitting structures;
at least one fingerprint identification unit configured to identity a fingerprint based on light reflected by a touch object to the at least one fingerprint identification unit, wherein an organic light-emitting structure has a first side facing the array substrate and an opposing second side, and the at least one fingerprint identification unit is disposed in a display region on the first side of the organic light-emitting structure;
a plurality of spacers, wherein an orthogonal projection of a spacer onto the array substrate is disposed between orthogonal projections of adjacent organic light-emitting structures onto the array substrate; and
a plurality of anti-crosstalk pads, wherein an anti-crosstalk pad is disposed between the spacer and the at least one fingerprint identification unit, an orthogonal projection of the anti-crosstalk pad onto the array substrate includes a first region, the first region overlaps with the orthogonal projection of the spacer onto the array substrate, and the anti-crosstalk pad blocks light scattered by the spacer from entering the at least one fingerprint identification unit.

US Pat. No. 10,430,635

FINGERPRINT IDENTIFICATION SENSOR, FINGERPRINT IDENTIFICATION METHOD AND ELECTRONIC DEVICE

BOE TECHNOLOGY GROUP CO.,...

1. A fingerprint identification sensor, comprising:a substrate;
a fingerprint sensing element disposed on the substrate and including a thin film transistor, an off-state leakage current of the thin film transistor at an off-state voltage applied to a gate of the thin film transistor varying with the intensity of light irradiating onto an active area thereof, the fingerprint sensing element being configured to generate a sensing signal based on the off-state leakage current; and
a fingerprint identification light source arranged to emit light that irradiates onto a finger and is reflected thereby, the reflected light irradiating onto the active area of the thin film transistor.

US Pat. No. 10,430,634

BIOMETRIC SENSING DEVICE AND DISPLAY DEVICE

InnoLux Corporation, Mia...

1. A biometric sensing device, comprising:a first electricity storage component;
a first sensing component coupled with the first electricity storage component, wherein when the first sensing component is turned on, a charging path is formed between the first sensing component and the first electricity storage component, and the first sensing component makes the first electricity storage component be charged according to a sensed biometric;
a first driving component coupled with the first electricity storage component and the first sensing component, wherein when the first driving component is turned on, the first electricity storage component discharges; and
a control unit coupled with at least one of the first sensing component and the first driving component for turning on the first sensing component and the first driving component.

US Pat. No. 10,430,632

DISPLAY DEVICE AND DRIVING METHOD THEREOF

Samsung Display Co., Ltd....

1. A display device comprising:a display including a plurality of pixels disposed on a display area;
a display controller including a timing controller and configured to control the display;
a sensor including a plurality of first sensing electrodes and a plurality of second sensing electrodes disposed in the display area; and
a sensor controller including a touch detector configured to recognize a touch of a user inputted into the sensor in a touch sensing mode and a fingerprint authorizer configured to recognize a fingerprint of the user inputted into the sensor in a fingerprint sensing mode,
wherein the sensor controller changes a mode to the fingerprint sensing mode when no touch is inputted for a predetermined time period in the touch sensing mode and changes the mode to the touch sensing mode when authorization on a fingerprint inputted into the sensor is succeeded in the fingerprint sensing mode, and
wherein the sensor controller sequentially drives all the first sensing electrodes in the fingerprint sensing mode and the sensor controller drives all the second sensing electrodes in the fingerprint sensing mode.

US Pat. No. 10,430,630

ELECTRONIC DEVICE

GUANGDONG OPPO MOBILE TEL...

1. An electronic device, comprising a flexible display screen, a fingerprint identification module and a housing, the housing having a top face and a side face connected with each other, the side face defining a mounting groove, the fingerprint identification module being accommodated in the mounting groove, the flexible display screen comprising a fixed portion and a movable portion connected with each other, the fixed portion being fitted to the top face, and the movable portion extending beyond the top face,wherein when the movable portion is bent relative to the fixed portion, the movable portion covers the side face and the fingerprint identification module performs fingerprint identification through the flexible display screen; when the movable portion is spread out relative to the fixed portion, the fingerprint identification module is exposed out of the flexible display screen, such that a finger is fitted to the side face to perform the fingerprint identification.

US Pat. No. 10,430,628

SLIP PROCESSING DEVICE, SLIP PROCESSING METHOD, AND RECORDING MEDIUM

CASIO COMPUTER CO., LTD.,...

1. A handheld device for slip processing, comprising:an imaging unit that images an object;
a barcode scanner that reads a one-dimensional barcode;
a storage unit; and
a processor configured to perform the following:
causing the barcode scanner to scan a one-dimensional barcode on a slip to obtain identification information on the slip;
determining whether the obtaining of the identification information has succeeded;
when the obtaining of the identification information has succeeded, causing the imaging unit to image the slip to obtain a slip image;
determining whether the one-dimensional barcode is present within the slip image that has been obtained, and, when it is determined that the one-dimensional barcode is present, detecting an inclination of the one-dimensional barcode and then causing a horizontal correction process to be applied to the slip image in accordance with the inclination that has been detected; and
causing the identification information that has been obtained and the slip image that has been corrected by said horizontal correction process to be stored in association with each other in the storage unit.

US Pat. No. 10,430,627

LABEL CREATING DEVICE, SYSTEM, AND LABEL

SEIKO EPSON CORPORATION, ...

1. A system configured to verify an identity of an article, the system comprising:a label creating device configured to create a label associated with the article; and
an information device configured to acquire information used for verifying the identity of the article from a content of the label, wherein
the label creating device includes:
an imaging unit configured to image a first subject including the article, and to acquire first image data of the first subject;
a first analyzer configured to analyze a characteristic of the article in the first subject by using the first image data, and to generate first characteristic information;
a first identification information acquiring unit configured to acquire first identification information associated with the article and used for identifying the article;
a generator configured to generate code information including at least the first characteristic information and the first identification information; and
a printing unit configured to print the code information on a label medium, and to output the label, and
the information device includes:
a device imaging unit configured to image a second subject including the article and the code information, and to output second image data;
an extracting unit configured to extract the first characteristic information and the first identification information from the image data of the code information of the second subject included in the second image data;
a second analyzer configured to analyze a characteristic of the article of the second subject by using the second image data, and to generate the second characteristic information;
a second identification information acquiring unit configured to acquire second identification information to be checked with the first identification information extracted by the extracting unit;
a characteristic information determining unit configured to determine whether the first characteristic information and the second characteristic information match each other;
an identification information determining unit configured to determine whether the first identification information extracted by the extracting unit and the second identification information acquired by the second identification information acquiring unit match each other; and
a display controller configured to control a display to display a determination result determined by the characteristic information determining unit and the identification information determining unit.

US Pat. No. 10,430,625

BARCODE READING ACCESSORY FOR A MOBILE DEVICE HAVING A ONE-WAY MIRROR

THE CODE CORPORATION, Dr...

1. A barcode reading enhancement system for a mobile device, the mobile device comprising a processor, a display screen, a camera comprising a camera lens, and memory, the barcode reading enhancement system comprising:an accessory securable to the mobile device, the accessory comprising:
an optic module within a camera field of view of the camera, wherein the optic module folds the camera field of view toward a direction extending away from a top end of the mobile device to create a system field of view; and
a target-generating structure configured to project a targeting pattern through the optic module into a center of the system field of view; and
a mobile barcode reading application comprising executable code stored in the memory that, when executed by the processor, causes the camera to capture an image of a barcode within the system field of view.

US Pat. No. 10,430,624

WIRELESS SENSOR READER ASSEMBLY

ENDOTRONIX, INC., Lisle,...

1. A system for wirelessly sensing a parameter from a remote location, comprising:a handheld reader device configured to communicate with a wireless sensor;
wherein said handheld reader device includes a plurality of modes to establish communication with said wireless sensor, said modes comprising:
a docked mode wherein said handheld reader device is not in use;
a search mode wherein said handheld reader device attempts to establish the proper distance acceptable for taking readings from the wireless sensor, wherein when said handheld reader device is in said search mode, said handheld reader device is configured to receive at least one response signal from said wireless sensor and compare a characteristic of said at least one response signal to a predetermined threshold value, wherein said comparison of said characteristic of the at least one response signal to said predetermined threshold value is used to determine to provide a feedback to a user of said handheld reader device; and
a read mode wherein said handheld reader device reads and samples response signals from the wireless sensor.

US Pat. No. 10,430,623

RFID TAG TRACKING USING TAG POPULATION MANAGEMENT

Impinj, Inc., Seattle, W...

1. A method for a Radio Frequency Identification (RFID) reader system to track the movement of an RFID integrated circuit (IC) of interest coupled to an antenna, the method comprising:receiving an IC response in an inventory round;
determining that the IC response is from the RFID IC of interest;
in response to determining that the IC response is from the RFID IC of interest, preventing the RFID IC of interest from entering a quiet state;
determining, based on at least the IC response, a trajectory of the RFID IC;
generating a plurality of beams along the trajectory;
cooperatively powering the RFID IC using the plurality of beams; and
receiving a subsequent response from the RFID IC in the inventory round.

US Pat. No. 10,430,622

RFID TAG WITH RECONFIGURABLE PROPERTIES AND/OR RECONFIGURING CAPABILITY

INTERMEC, INC., Lynnwood...

1. A radio frequency identification (RFID) tag comprising:an antenna configured to receive a wireless signal from an RFID reader;
an RFID circuit comprising a controller configured to process the wireless signal received from the antenna; and
a first sensor or switch that is connected to the RFID circuit and that outputs a first signal to the RFID circuit when the first sensor or switch is engaged or activated but outputs a second signal when the first sensor or switch is not engaged or activated, wherein the controller is configured to change at least one protocol of the RFID tag when the RFID circuit receives the first signal and when the RFID circuit receives the second signal.

US Pat. No. 10,430,621

USING ANTENNA REFLECTION COEFFICIENTS TO DETECT EVENTS IN A GAMING ENVIRONMENT

Magnet Consulting, Inc., ...

1. A system for detecting events in a gaming environment, the system comprising:a plurality of antennas positioned on a gaming table, wherein the plurality of antennas corresponds to a plurality of locations on the gaming table;
a network analyzer device, coupled to the plurality of antennas, that is configured to selectively detect a plurality of reflection coefficients that are associated with the plurality of antennas, wherein the plurality of reflection coefficients change as a plurality of radio frequency identification (RFID) tags interact with the plurality of antennas, wherein a plurality of gaming objects include the plurality of RFID tags; and
a control device, coupled to the network analyzer device, that is configured to select a subset of the plurality of antennas based on the plurality of reflection coefficients that change, wherein the subset is less than all of the plurality of antennas, wherein the subset corresponds to less than all of the plurality of locations, and that is configured to selectively energize the subset of the plurality of antennas according to the change in the plurality of reflection coefficients,
wherein the control device is configured to read a subset of the plurality of RFID tags when energizing the subset of the plurality of antennas, and
wherein detecting the plurality of reflection coefficients takes a first amount of time, wherein reading the subset of the plurality of RFID tags takes a second amount of time, wherein reading all of the plurality of RFID tags takes a third amount of time, and wherein the first amount of time and the second amount of time is less than the third amount of time.

US Pat. No. 10,430,620

DYNAMIC THERMOELECTRIC IMAGE BRANDING

INTERNATIONAL BUSINESS MA...

1. An image branding system to brand an image on a product, the system comprising:an image controller configured to determine current values for application to one or more thermoelectric devices, wherein the image controller is further configured to determine a current range within which to select the current values based on a material composition of the product; and
an image branding device comprising the thermoelectric devices, each of the thermoelectric devices having a corresponding contact surface representing a single pixel, wherein the contact surface of each of the one or more thermoelectric devices is heated based on the respective current value applied.

US Pat. No. 10,430,619

MANAGEMENT OF DIGITAL COPIES OF REGISTRATIONS USING MOBILE DEVICES

International Business Ma...

1. A computer program product for managing digital copies of a registration of a specified physical object with a registration authority, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by at least one computer to cause the at least one computer to:transmit a master digital copy of the registration to a first mobile device, the registration being proof that the specified physical object has been registered with the registration authority; and
receive from a second mobile device a valid peripheral digital copy of the registration showing that the specified physical object has been registered with the registration authority, the valid peripheral digital copy of the registration having been made by the first mobile device from the master digital copy of the registration and sent from the first mobile device to the second mobile device, and including a security feature preventing the valid peripheral digital copy of the registration from being used to make other valid digital copies of the registration that would show registration of the specified physical object with the registration authority to limit copying of the registration.

US Pat. No. 10,430,617

TERMINAL DETERMINATION DEVICE AND METHOD

FUJITSU LIMITED, Kawasak...

1. A terminal determination device comprising:a processor configured to execute a procedure, the procedure comprising:
acquiring a terminal ID of a terminal, and operation information indicating a history of operation that has taken place on the terminal; and
comparing the acquired operation information with operation information stored in a memory associated with the terminal ID, and, when the acquired operation information belongs in a particular range of similarity with the stored operation information, determining that the terminal is an authorized terminal corresponding to the terminal ID, wherein in the procedure:
a user of the authorized terminal is also stored associated with the operation information; and
when determining whether or not the terminal is the authorized terminal, determination is made as to whether or not the terminal is the authorized terminal operated by the user according to whether or not the acquired operation information belongs in a particular range of similarity with operation information stored associated with the terminal and the user,
wherein in the procedure, the operation information is information indicating operation traits related to starting up, closing, or switching of an application on the terminal, or restoration from screen lock, or the operation information is information indicating a combination of operations related to starting up, closing, or switching of the application on the terminal, or restoration from screen lock,
adding the acquired operation information to the operation information stored associated with the authorized terminal, and also erasing operation information, for which a specific time has elapsed since being stored, from the operation information associated with the authorized terminal, and
issuing an alert when the terminal is not an authorized terminal.

US Pat. No. 10,430,616

SYSTEMS AND METHODS FOR SECURE PROCESSING WITH EMBEDDED CRYPTOGRAPHIC UNIT

Square, Inc., San Franci...

1. A cryptographic processing unit that cooperates with a general purpose processor to perform cryptographic processing, the cryptographic processing unit comprising:a protected memory that is readable by the cryptographic processing unit but is not readable by the general purpose processor, wherein (1) the protected memory stores script hashes, a script hash being a value generated by applying a one-way hash function to a script, which is a set of pre-defined executable instructions, where the script does not include data to be operated on, and (2) the protected memory does not store scripts corresponding to the stored script hashes; and
a cryptographic processor configured to verify that a script received from the general purpose processor is authorized for execution on the cryptographic processing unit, by performing steps comprising:
(a) accessing, from the protected memory, one or more script hashes, the one or more script hashes being associated with a user data block for a user of the cryptographic processing unit;
(b) receiving, from the general purpose processor, a script intended for execution on the cryptographic processing unit;
(c) hashing the received script to generate a received script hash value, by applying a one-way hash function to the received script;
(d) comparing the received script hash value to a script hash of the one or more script hashes associated with the user data block;
(e) in a case that the received script hash value matches the script hash of the one or more script hashes, (1) determining that the script is authorized for execution on the cryptographic processor, (2) executing the received script to produce a script result, and (3) transmitting the script result to the general purpose processor; and
(f) in a case that the received script hash value does not match any script hash of the one or more script hashes, identifying an error condition and performing one of: halting operation of the general purpose processor or resetting operation of the general purpose processor.

US Pat. No. 10,430,615

SECURE CRYPTO MODULE INCLUDING OPTICAL SECURITY PATHWAY

International Business Ma...

1. A cryptographic adapter card comprising:a printed circuit board (PCB) comprising a connector that interconnects with a motherboard;
a secure crypto module comprising a daughter card electrically connected to the PCB;
the daughter card comprising: a wiring dielectric layer, an optical electromagnetic radiation (EM) emitter upon the wiring dielectric layer, an optical EM receiver upon the wiring dielectric layer, a transparent dielectric layer upon the wiring dielectric layer and between the optical EM emitter and the optical EM receiver, one or more mirrors upon the wiring dielectric layer, and a crypto component;
wherein a destruct feature of the crypto component is programmed in response to the optical EM receiver detecting a predetermined threshold decrease in optical flux of optical EM that is emitted from the optical EM emitter, transmitted by the transparent dielectric layer, reflected by the one or more mirrors, and received at the optical EM receiver.

US Pat. No. 10,430,614

AUTOMATIC INITIATION OF EXECUTION ANALYSIS

Bromium, Inc., Cupertino...

1. One or more non-transitory machine-readable storage mediums storing one or more sequences of instructions for initiating execution analysis upon a bit set, which when executed by one or more processors, causes:monitoring execution of the bit set in a host operating system execution environment to identify whether the bit set exhibits a suspicious characteristic, wherein said suspicious characteristic corresponds to one or more of a set consisting of: (1) creating a new executable bit set, (2) modifying an existing executable bit set in the host operating system execution environment, and (3) loading a new dynamic link library (DLL) file, wherein said monitoring execution of said bit set is performed without additional performance of execution analysis upon said bit set;
upon determining that the execution of the bit set exhibits a suspicious characteristic, then consulting metadata maintained locally upon a machine in which said one or more processors reside to determine if said execution analysis has previously been performed upon said bit set; and
upon determining that the execution of the bit set exhibits a suspicious characteristic and upon determining that said execution analysis has not yet been performed upon said bit set, then (a) ceasing the execution of the bit set in the host operating system execution environment, (b) instantiating an isolated environment configured to have the same operating attributes as said host operating system execution environment, (c) copying the bit set into the isolated environment and transferring control to the bit set within the isolated environment, and (d) initiating said execution analysis upon the bit set in the isolated environment,
wherein said same operating attributes includes any versions of software executing in said host operating system execution environment and any patches applied to said host operating system execution environment.

US Pat. No. 10,430,613

BLOOD GLUCOSE MEASURING DEVICE WITH RELIABLE TRANSMISSION OF VALUES TO AN EXTERNAL DEVICE

Roche Diabetes Care, Inc....

1. A blood glucose measuring device, comprising:a measuring means for determining measured blood glucose values,
a measured value memory in which the measured blood glucose values are stored,
a data interface that is configured for a data exchange with an external data reading apparatus, and
a data file system which comprises a data reading application that is executed by means of an external data reading apparatus and that is configured to provide the stored measured blood glucose values for reading by means of the external data reading apparatus,
wherein the data system file further comprises a test application that is configured to execute an integrity test for the data reading application by forming a current digital signature for the data reading application and comparing this with a digital test signature provided in the data file system and;
wherein the data reading application is configured to
download of the measured blood glucose values to the external data reading apparatus, and
prevent a display of downloaded measured blood glucose values if the test application reveals that the current digital signature and the digital test signature inadmissibly fail to match.

US Pat. No. 10,430,612

ELECTRONIC PREEMPTIVE EVIDENTIARY ESCROW PLATFORM

1. A computer-implemented method for implementing an electronic preemptive evidentiary escrow platform, comprising:receiving, from a client device, a compound message comprising a public summary data component and a private data component;
at a processor, consulting a first previously generated database to determine a location and encoding scheme of the public summary data component within the compound message;
at the processor, extracting the public summary data component from the compound message using the determined location and encoding scheme of the public summary data component;
at the processor, consulting a second previously generated database to determine a location and encoding scheme of the private data component within the compound message;
at the processor, extracting the private data component from the compound message using the determined location and encoding scheme of the private data component;
storing the public summary data component and the private data component at one or more storage devices;
responsive to a request for the public summary data component, providing the public summary data component;
responsive to at least one predetermined condition, automatically reconfiguring at least one stored parameter to make the private data component available to at least one authorized entity;
determining whether an entity is an authorized entity; and
responsive to the entity being an authorized entity, and responsive to the at least one stored parameter indicating that the private data component is available to the authorized entity, providing the private data component to the authorized entity.

US Pat. No. 10,430,610

ADAPTIVE DATA OBFUSCATION

International Business Ma...

1. A computer-implemented method comprising:parsing, by a processor, input plain text into one or more strings;
comparing, by the processor, a first string of a first portion of the input plain text to text signatures in a confidential data format repository stored in a memory, wherein the text signatures correspond to confidential data patterns, and wherein the text signatures correspond to obfuscation keys in a set of obfuscation keys;
determining, by the processor, that the first string does not match any of the text signatures;
determining, by the processor, a similarity metric value for the first string and at least one historical string from a set of historical strings stored in the memory, wherein the at least one historical string matches a text signature from the text signatures;
determining, by the processor, that the similarity metric value is within a similarity threshold;
in response to the determining that the similarity metric value is within the similarity threshold, updating, by the processor, the text signature matching the at least one historical string to generate an updated text signature, wherein the updated text signature defines a pattern that includes the first string and the at least one historical string;
saving the updated text signature, by the processor, to the confidential data format repository;
updating, by the processor, an obfuscation key that corresponds to the text signature matching the at least one historical string to generate an updated obfuscation key corresponding to the updated text signature; and
saving, by the processor, the updated obfuscation key to the set of obfuscation keys.

US Pat. No. 10,430,609

LOW PRIVACY RISK AND HIGH CLARITY SOCIAL MEDIA SUPPORT SYSTEM

International Business Ma...

1. A method for decreasing privacy risk and increasing clarity in a social media system, comprising:separating initial user-inputted data into a plurality of terms;
receiving, into a memory device, a tolerance range from the user, wherein the tolerance range designates one or more of the plurality of terms that are not to be altered;
determining which of the plurality of terms are identity-related terms relating to an identity of a user, and which of the plurality of terms are clarity-related terms relating to subject-matter clarity;
calculating, using a processor, a population value, wherein the population value is a number of individuals that satisfies the identity-related terms;
assigning a clarity level representing a respective amount of clarity to each of the clarity-related terms;
creating amended user-inputted data by amending the initial user-inputted data such that the population value of the amended user-inputter data is greater than or equal to a first predefined threshold, and the sum of the clarity levels assigned to each of the clarity-related terms in the amended user-inputter data is greater than or equal to a second predefined threshold; and
transmitting, using a graphical user interface, the amended user-inputted data to one or more respondents.

US Pat. No. 10,430,608

SYSTEMS AND METHODS OF AUTOMATED COMPLIANCE WITH DATA PRIVACY LAWS

SALESFORCE.COM, INC., Sa...

1. A method of a server restricting transfer of private data that do not meet data privacy regulations, the method including:tracking a person-related data source by associating a data entity that holds person-related data with a trust object that tracks the person-related data source, wherein the person-related data includes private data;
wherein the trust object holds trust metadata, including:
name of the person-related data source,
interface category of the person-related data source,
physical origin of the person-related data source,
consent-type given by subject of the person-related data,
data privacy regulations that control access to the private data and are set for a legal jurisdiction that governs the physical origin,
at least one purpose of assembling the person-related data, and
at least one classification of the person-related data;
representing the data privacy regulations set for the legal jurisdiction that governs the physical origin of the person-related data in an access control object that specifies, by the legal jurisdiction, access control based on the name of the person-related data source, the physical origin of the person-related data source, the consent-type given by subject of the person-related data, the purpose of assembling the person-related data, and the classification of the person-related data;
receiving, from a client computer, a tenant request for the person-related data, wherein the tenant request identifies at least one legal jurisdiction where the person-related data will be subsequently used;
constructing a filter that implements access control, in accordance with the access control object representing the data privacy regulations specified in the legal jurisdiction that governs the physical origin of the person-related data, for the name of the person-related data source, the physical origin of the person-related data source, the consent-type given by subject of the person-related data, the purpose of assembling the person-related data, and the classification of the person-related data; and
automatically applying the filter to the person-related data requested by the client computer to restrict transfer of any private data, from the server to the client computer, that do not meet the data privacy regulations specified in the legal jurisdiction that governs the physical origin of the person-related data, and to restrict transfer of any private data from the server to the client computer that do not meet the data privacy regulations of the at least one legal jurisdiction identified in the tenant request.

US Pat. No. 10,430,607

USE OF AKA METHODS AND PROCEDURES FOR AUTHENTICATION OF SUBSCRIBERS WITHOUT ACCESS TO SIM CREDENTIALS

Ribbon Communications Ope...

1. A method comprising:storing a first instance of an alternate secret key, used in authentication of a third party application accessing a service over a network, in a secure network in association with a user device hosting the third party application, wherein an instance of a particular secret key to which the third party application is forbidden access to is also stored in the secure network in association with the user device;
receiving an authentication request from the user device via the network for authenticating the third party application;
determining that an authentication process implemented in response to the authentication request is to use the alternate secret key rather than the particular secret key;
performing authentication processing for the third party application using the first instance of the alternate secret key in response to the determining;
wherein said determining that an authentication process implemented in response to the authentication request is to use the alternate secret key rather than the particular secret key includes: detecting, by a security element or a backend authentication system of the secure network, whether a native application or a third party application is being authenticated based upon: (i) a variant of a username portion of a Network Address Identifier (NAI) included in the authentication request or (ii) a variant of a realm portion of the Network Address Identifier included in the authentication request; and
wherein the first instance of the alternative secret key is stored in a user database (UDB) of the secure network, and wherein a second instance of the alternative secret key is stored in a configuration database for the third party application in the user device.

US Pat. No. 10,430,606

SYSTEM AND METHOD FOR IMPLEMENTING DOMAIN BASED ACCESS CONTROL ON QUERIES OF A SELF-DESCRIBING DATA SYSTEM

ARAS CORPORATION, Andove...

1. A method for implementing access controls for items of data belonging to a self-describing data structure, the method comprising:obtaining a query definition specifying a requested item of data in the self-describing data structure;
determining one or more domains associated with the requested item, the one or more domains comprising a set of items within the self-describing data structure on an execution path of a query executed according to the query definition;
for each respective domain of the one or more domains associated with the requested item:
determining one or more subdomains associated with the requested item, wherein the one or more subdomains are located in the respective domain;
determining a role of the user for the respective domain, wherein the role is associated with a set of access permissions to items of data within the domain; and
generating, by a processing device, an output corresponding to whether access to the requested item is granted based on a policy for each of the one or more subdomains associated with the requested item and the role of the user for the domain, the generating comprising:
determining a first state of the requested item, the first state associated with a subdomain item state;
determining a second state of a root item of the respective domain, the second state associated with a root item state; and
identifying the output in a rule data structure based on the first state of the requested item, the second state of the root item, and the role of the user.

US Pat. No. 10,430,605

DIFFERENTIALLY PRIVATE DATABASE PERMISSIONS SYSTEM

LeapYear Technologies, In...

1. A method of providing differentially private database security, comprising:receiving a request from a client to perform a query on data stored in a database;
establishing a set of permissions granted to the client with respect to the data in the database, wherein the set of permissions comprises a private compute permission granting permission to perform differentially private operations on specified data in the database;
deconstructing the query into query components, wherein the query components comprise at least one relation identifying a dataset in the database and at least one expression specifying an operation to be performed in the identified dataset;
identifying permissions necessary to perform the specified operation on the identified dataset, wherein the identified permissions comprise the private compute permission and the identified dataset comprises the specified data;
determining whether the established set of permissions granted to the client includes the identified permissions necessary to perform the specified operation on the identified dataset using a set of mutually recursive functions to check whether the established set of permissions granted to the client includes the identified permissions necessary to perform expressions on relations indicated by the deconstructed query components; and
selectively executing the query responsive to the determination.

US Pat. No. 10,430,604

SYSTEMS AND METHODS FOR SECURING DATA IN ELECTRONIC COMMUNICATIONS

EQUIFAX INC., Atlanta, G...

1. A method comprising:generating, by a first device comprising a processor, hashed credit bureau records by hashing credit bureau records of a majority of individuals having an age over a pre-set age and residing in at least one of the United States of America or a state within the United States of America, and storing the hashed credit bureau records, wherein the first device is included in a first network;
deleting, by the first device, the credit bureau records subsequent to generating the hashed credit bureau records;
subsequent to deleting the credit bureau records, hashing, by the first device, updated credit bureau records received subsequent to hashing the credit bureau records, and modifying the stored hashed credit bureau records using the hashed updated credit bureau records;
deleting the updated credit bureau records subsequent to modifying the stored hashed credit bureau records using the hashed updated credit bureau records;
subsequent to deleting the updated credit bureau records:
receiving, by the first device, a first electronic communication addressed to a second device in a second network,
hashing, by the first device, content from the first electronic communication,
determining, by the first device and based on the second network to which the first electronic communication is addressed being external to the first network that includes the first device, that the hashed content from the first electronic communication matches at least one of the stored hashed credit bureau records as modified using the hashed updated credit bureau records, and
preventing the first electronic communication from being transmitted to the second device via the second network based on determining that the hashed content from the first electronic communication matches at least one of the stored hashed credit bureau records as modified using the hashed updated credit bureau records; and
omitting, for a second electronic communication that is addressed to the first network that includes the first device, operations comprising:
(i) determining that additional hashed content from the second electronic communication matches at least one of the stored hashed credit bureau records as modified using the hashed updated credit bureau records, and
(ii) preventing the second electronic communication from being transmitted via the first network.

US Pat. No. 10,430,603

SYSTEMS AND PROCESSES FOR MANAGING ACCESS TO VEHICLE DATA

GM GLOBAL TECHNOLOGY OPER...

1. A gateway apparatus, for managing local-device access to vehicle data, comprising:an input/output component configured to receive requests for vehicle data from a local device, and send vehicle data to the local device;
a hardware-based processing unit in communication with the input/output component;
a non-transitory computer-readable storage device in communication with the hardware-based processing unit and comprising an access unit, a control unit, and a data unit, wherein:
the access unit comprises access-unit code that, when executed by the hardware-based processing unit, receives, by way of the input/output component, a request for the vehicle data from the local device and determines whether the gateway apparatus may satisfy the request;
the control unit comprises control-unit code that, when executed by the hardware-based processing unit, determines, in response to the access unit determining that the gateway apparatus may satisfy the request, what vehicle data will be provided to the local device;
the data unit comprises data-unit code that, when executed by the hardware-based processing unit, prepares the vehicle data to be provided to the local device by way of the input/output component, and sends the vehicle data to the local device by way of the input/output component;
the control-unit code comprises data-quality-decision-module code that, when executed by the hardware-based processing unit, determines quality for the vehicle data to be provided to the local device;
the quality indicates a resolution of the vehicle data to be provided to the local device; and
the vehicle data is up-sampled by the data-quality-decision-module code, when executed to determine the quality for the vehicle data to be provided to the local device, to provide a higher quality of vehicle data, in one or more ways, than the vehicle data requested by the local device.

US Pat. No. 10,430,602

TAPE PROCESSING OFFLOAD TO OBJECT STORAGE

International Business Ma...

1. A computer-implemented method, comprising:receiving a data volume having data from multiple tenants therein;
separating data in the data volume into objects using tenant identifiers from metadata corresponding to portions of the data, wherein each object corresponds to a respective tenant;
storing the objects in object storage; and
updating the metadata with information pertaining to the object which the data in the data volume was separated into,
wherein separating data in the data volume into objects using tenant identifiers includes:
determining whether a tenant identifier corresponds to an existing object in the object storage,
using the tenant identifier to create a new tenant account having a new object in response to determining that the tenant identifier does not correspond to an existing object,
adding a portion of the data associated with the tenant identifier to the new object,
determining whether an object size of the existing object is above a threshold in response to determining that the tenant identifier does correspond to an existing object,
using the tenant identifier to create a new object in response to determining that the object size of the existing object is above a threshold,
adding the portion of the data associated with the tenant identifier to the new object, and
adding the portion of the data associated with the tenant identifier to the existing object in response to determining that the object size of the existing object is not above the threshold.

US Pat. No. 10,430,601

AUTHORIZATION CONTROL DEVICE, SYSTEM AND SMART APPARATUS FOR CONVENIENT FOOD AND DIGITAL MENU

ZHUHAI UNICOOK TECHNOLOGY...

1. An authorization control method of convenient food and a digital menu, comprising the following steps:(1) establishing a database on a local server which stores digital menu information, convenient food specification information corresponding to the digital menu information, one or more digital menu instantiation information generated according to the digital menu information, and one or more convenient food product information generated according to the convenient food specification information;
(2) processing the convenient food product information and the digital menu instantiation information, respectively, on a local server so as to generate a convenient food product information unit and a digital menu instantiation information unit, respectively;
(3) presetting on a local server corresponding digital menu instantiation information in the convenient food product information unit and/or presetting corresponding convenient food product information in the digital menu instantiation information unit;
(4) validating on a local server information in the convenient food product information unit, and granting usage authorization of digital menu instantiation information corresponding to the convenient food product information after the information is validated as being legitimate, wherein the digital menu instantiation information comprises a sequence of executable commands to be executed by a smart cooking appliance to prepare a convenience food product for consumption; and
(5) resolving and running the digital menu instantiation information on a smart cooking appliance and completing automatic cooking of a convenient food product by the smart cooking appliance;
wherein automatic cooking of a convenient food product by the smart cooking appliance is an automatic process without user input.

US Pat. No. 10,430,600

MECHANISMS FOR NEED TO KNOW AND LEAK AVOIDANCE

INTERNATIONAL BUSINESS MA...

1. A method for preventing the divulging information to an unauthorized requestor, the method comprising:receiving a request to view a data set, the receiving from a requestor through a processor;
identifying, by the processor, the data set with an identifier indicating that the data set should not be distributed to an unauthorized requestor;
encapsulating, by the processor, the data set with the identifier with code that provides for sending context information from the requestor to the processor, the code comprising instructions to request specific context information from the requestor related to a condition for viewing the data set and instructions to receive the requested context information from the requestor, wherein the code is written to present the data set to the requestor based on the context information agreeing with the policy and prevent the data set from being presented to the requestor based on the context information not agreeing with the policy;
obtaining, by the processor, a policy associated with the data set, wherein the policy comprises a permutation filter of a form such that the requestor can only view the data set if a defined action occurs, the defined action comprising at least one of (i) viewing by the requestor of the data set using multiple connected devices that display different shares of a visual cryptographic split image, (ii) presence of only one or more specific persons with the requestor, (iii) viewing the requestor on camera by a specific person, and (iv) monitoring an environment of the requestor using at least one of a camera, a microphone, and an infrared sensor;
applying, by the processor, the policy to the context information;
determining, by the processor, whether the context information agrees with the policy;
presenting, by the processor, the data set to the requestor based on the context information agreeing with the policy; and
preventing, by the processor, the data set from being presented to the requestor based on the context information not agreeing with the policy.

US Pat. No. 10,430,599

FILEKEY ACCESS TO DATA

EMC IP HOLDING COMPANY LL...

1. A method for performing an operation for data objects associated with an owner in a computing system, the method comprising:generating a key from an unencrypted data object during the operation;
encrypting the unencrypted data object with the key to generate an encrypted data object;
generating a fingerprint of the encrypted data object;
encrypting the key with different access keys to generate access codes, wherein each of the access keys is a private key that that is associated a different public key, wherein each access code corresponds to one of the access keys and wherein the access codes are each associated with a different user and wherein the access codes are different and are configured to allow the owner of the data object to control which users associated with the owner are allowed to access the data object on an individual user basis, wherein the access codes are associated with the fingerprint and allow the encrypted data object to be accessed using the access code to be identified;
storing the encrypted data objects in a tree-type structure that includes multiple levels of blocks, wherein higher levels of the tree-type structure point to lower levels of the tree-type structure, wherein the higher levels include encrypted keys needed to unlock lower levels and fingerprints, wherein each of the access codes allow a chain of blocks in the tree-type structure to be decrypted, wherein each block in the chain is encrypted with a different key and, as each block in the chain is decrypted, the key to decrypt the next block in the chain is obtained, wherein each of the data objects is associated with a different key; and
allowing a group that is separate from the owner access to at least one of the data objects by generating an access code using a public key associated with the group, wherein members of the group access the at least one of the data objects using a private key associated with the group.

US Pat. No. 10,430,598

SECURE GENERALIZED BLOOM FILTER

The Government of the Uni...

1. A non-transitory computer-readable medium configured to store computer-executable instructions that when executed by a processor cause the processor to perform a method, the method comprising:identifying a request to create a secure Bloom filter; and
creating the secure Bloom filter through implementation of a security method, the security method comprising:
compressing an identifier of a Bloom filter;
creating secure indexing of the Bloom filter based on the compressed identifier;
creating random salt dynamically for the Bloom filter;
creating multiple independent hash functions for the Bloom filter;
inserting a random bit into the Bloom filter;
inserting a fake bit into the Bloom filter;
creating a linkage for the Bloom filter;
integrating the Bloom filter with multiple identifiers using a long-term clock; and
encrypting the Bloom filter using the random salt and at least one of the multiple independent hash functions.

US Pat. No. 10,430,597

GENERATING SEARCH RESULTS FOR PEOPLE

Google LLC, Mountain Vie...

1. A computer-implemented method comprising:receiving a search query;
obtaining one or more search results that a search engine identifies as responsive to the search query;
identifying (i) a topic of the search query, and (ii) one or more members of a social network that are indicated as having expertise in the topic of the search query;
generating a search results page that includes (i) one or more of the search results, and (ii) a region that includes, for each of the one or more members of the social network that are indicated as having expertise in the topic of the search query, information identifying that particular member and a control for filtering the search results to include only those search results that the search engine has identified as responsive to the search query and that are associated with that particular member; and
providing the search results page for output.

US Pat. No. 10,430,596

INFORMATION PROCESSING METHOD, TERMINAL AND NONVOLATILE MACHINE-READABLE MEDIUM

YULONG COMPUTER TELECOMMU...

1. An information processing method, applied to a terminal that comprises a plurality of operating systems including a first operating system and a second operating system different from the first operating system, comprising:receiving an instruction to copy data information from the second operating system to the first operating system;
prompting a user of the terminal to input a key after receiving the instruction;
comparing the inputted key with an encryption key associated with the first operating system to determine whether the inputted key matches the encryption key associated with the first operating system;
copying the data information to the first operating system based on the comparing; and
after copying the data information to the first operating system, encrypting the data information in the second operating system by using the encryption key associated with the first operating system, or not displaying the data information in the second operating system again even though the data information is stored within the second operating system.

US Pat. No. 10,430,595

SYSTEMS AND METHODS FOR RULE BASED DYNAMIC SELECTION OF RENDERING BROWSERS

INTERNATIONAL BUSINESS MA...

1. A method for rendering content by a processor, comprising:receiving a request to render content;
selecting a rendering browser from a plurality of rendering browsers to render the content on a computing device, wherein the selecting of the rendering browser is based on security information associated with the content and the plurality of rendering browsers; and wherein the security information includes at least an operating system (OS) type and an OS patch level of the computing device, and a browser type and a browser patch level of the plurality of rendering browsers;
pursuant to selecting the rendering browser, assigning a score to each of the plurality of rendering browsers based on a plurality of factors associated with the content and the plurality of rendering browsers; wherein the score is further used in determining the selection of the rendering browser and is weighted according to each of the plurality of factors comprising at least: a security risk of the content, and language support, performance characteristics and a user preference of the plurality of rendering browsers; and
automatically instantiating the selected rendering browser and causing the content to be rendered by the selected rendering browser on the computing device.

US Pat. No. 10,430,594

EXTRACTION OF POLICIES FROM STATIC PERMISSIONS AND ACCESS EVENTS FOR PHYSICAL ACCESS CONTROL

CARRIER CORPORATION, Pal...

1. A system for generating at least one policy, the system comprising:a static permission database containing a plurality of static permission records identifying access permissions for at least one credential holder to at least one resource;
a policy database; and
a processor to analyze the plurality of static permission records to generate the at least one policy, wherein an outcome of execution of the at least one policy corresponds to the plurality of static permission records;
wherein the processor utilizes pattern mining to analyze the plurality of static permission records to generate the at least one policy, the processor configured to generate the at least one policy upon a confidence associated with a rule of the policy being above a threshold.

US Pat. No. 10,430,593

BOOT IMAGES FOR UNITS UNDER TEST

Hewlett Packard Enterpris...

1. A system comprising:a processing resource; and
a non-transitory machine readable medium storing instructions that, when executed, cause the processing resource to:
receive, from a manufacturing execution system, configuration information related to a unit under test (UUT),
build a virtual machine that includes a virtual machine key pair and a test suite specific to the UUT,
lock the virtual machine to the UUT,
create a boot image that includes a boot image key pair generated based on the configuration information, the boot image stored on the virtual machine, and
exchange public keys between the boot image and the virtual machine.

US Pat. No. 10,430,592

INTEGRITY CHECKING FOR COMPUTING DEVICES

Federal Reserve Bank of P...

1. A computing device having a closed operating system defining a user portion of the closed operating system and a system portion of the closed operating system, the closed operating system being configured to disallow user access to an identity of system folders or files in the system portion, the computing device comprising:a processor circuitry configured to:
determine, via an integrity checking module on the user portion of the closed operating system, a predefined set of device integrity parameters, wherein the set of device integrity parameters comprise at least one parameter associated with a file stored on the system portion of the closed operating system;
perform, via the integrity checking module on the user portion of the closed operating system, an integrity check based on the predefined set of device integrity parameters, wherein the integrity check is configured to submit a query for information associated with the at least one parameter associated with the file stored on the system portion of the closed operating system, wherein the query comprises a file name, a file directory, and the at least one parameter associated with the file to the system portion of the closed operating system, which is configured to disallow queries to provide access to the identity of the file name or the file directory of the system portion of the closed operating system to the user portion of the closed operating system, and receive a response to the query that includes the information associated with the at least one parameter that is associated with the file; and
provide an indication of a potential compromise to an integrity of the computing device based on the integrity check.

US Pat. No. 10,430,591

USING THREAT MODEL TO MONITOR HOST EXECUTION IN A VIRTUALIZED ENVIRONMENT

Bromium, Inc., Cupertino...

1. A non-transitory computer-readable storage medium storing one or more sequences of instructions for monitoring a host operating system, which when executed, cause:storing and maintaining, in an isolated execution environment, a threat model that identifies, for any process executing on a host operating system executing on a same machine as the isolated execution environment, a pattern of allowable behavior for the process;
the isolated execution environment monitoring execution of a particular process, and those processes in a monitoring circle relationship with the particular process, within the host operating system, wherein the monitoring circle relationship includes a parent process to the particular process, any process in communication with a member of monitoring circle relationship, and any process instantiated by a present member of monitoring circle relationship;
the isolated execution environment comparing observed behavior of the particular process and those processes in the monitoring circle relationship with the threat model; and
upon the isolated execution environment determining that the particular process has behaved in a manner inconsistent with the pattern of allowable behavior identified by the threat model for that process, the isolated execution environment taking a responsive action.

US Pat. No. 10,430,590

APPARATUS FOR QUANTIFYING SECURITY OF OPEN-SOURCE SOFTWARE PACKAGE, AND APPARATUS AND METHOD FOR OPTIMIZING OPEN-SOURCE SOFTWARE PACKAGE

ELECTRONICS AND TELECOMMU...

1. An apparatus for quantifying security of an open-source software package, comprising:a hardware processor; and
at least one or more units being configured and executed by the hardware processor using algorithm associated with least one non-transitory storage device,
wherein the units comprise:
in response to detection of searches the National Vulnerability Database (NVD) for information of a common vulnerabilities and Exposures (CVE) record corresponding to the open-source software package, a CVE record analysis unit for calculating a CVE security score based on information about a CVE record corresponding to an open-source software package, calculating the CVE security score being performed by the processor using at least one of a number, a description, an access vector, a number of issues, and a total of Common Vulnerability Scoring System (CVSS) scores of the found CVS record;
a binary file analysis unit for calculating a security score of a plurality of binary files for installing the open-source software package by analyzing the binary files, calculating the security score of a plurality of binary files being performed by the processor using at least one of a size of the binary files, a size of a file acquired by decompressing the binary files, a number and size of Executable Linkable Format (ELF) files, a size of a text area of the ELF file, a number and size of script files to which execute permissions are granted, and a type and number of packages requiring a dependency package, corresponding to the open-source software package;
a source file analysis unit for calculating a security score of a plurality of source files of the open-source software package by analyzing the source files, calculating a security score of a plurality of source files being performed by the processor using at least one of cyclomatic complexity of source code of the source files, a number of lines of the source files, and a number of lines of comments in the source files;
a development project analysis unit for calculating a security score of a package development project of the open-source software package by analyzing information about the package development project, calculating a security score being performed by the processor using at least one of a Uniform Resource Locator (URL), a development language, a development license, a number of users and developers contributing to development, a frequency of source code commits, and a frequency of patching and updating, corresponding to the package development project;
a security score calculation unit for generating security information of the open-source software package by totaling each of the security scores calculated by the binary file analysis unit, the source file analysis unit, and the development project analysis unit; and
in response to receipt of a request for security information from an external output device or a package management system,
a security information output unit for quantifying the security information corresponding to the package by displaying the security scores of respective packages, the security scores including at least one of the CVE security score, the security score of a binary file (BIN), the security score of a source file (SRC), and a security score of a package development project (PRJ) corresponding to the open-source software package,
wherein the security information output unit outputs the security information of the open-source software package to an apparatus for optimizing an open-source software package so that the security information of the open-source software package is used to generate a deletion target package list.

US Pat. No. 10,430,589

DYNAMIC FIRMWARE MODULE LOADER IN A TRUSTED EXECUTION ENVIRONMENT CONTAINER

Intel Corporation, Santa...

1. A computer implemented method comprising:providing a dynamic firmware module loader within a trusted execution environment to load and unload modules, before booting is complete, as needed from a storage containerized within a trusted execution environment including a processor within the trusted execution environment;
providing an external processor and operating system outside the trusted execution environment;
accessing the trusted execution environment before booting via an inter process communication channel rather than using a system management mode; and
abstracting storage on platform boot media, allowing different types of storage without using a storage driver for each type of storage.

US Pat. No. 10,430,588

METHOD OF AND SYSTEM FOR ANALYSIS OF INTERACTION PATTERNS OF MALWARE WITH CONTROL CENTERS FOR DETECTION OF CYBER ATTACK

TRUST LTD., Moscow (RU)

1. A method for analyzing an interaction framework between a malware application and a malware control center associated with the malware application, the method executable by a server; the malware application, the malware control center and the server of the method being communicatively coupled via a communication network, the method comprising:executing at a first moment in time:
uploading the malware application into at least one virtual environment, the at least one virtual environment being executable by the server;
collecting, by the server, a plurality of malware requests transmitted by the malware application to at least one malware control center via the communication network;
analyzing the plurality of malware requests to determine, for each given malware request:
at least one malware request parameter contained therein; and
an order thereof of the at least one malware request parameter;
grouping, into at least one group, the plurality of malware requests based on shared malware request parameters contained therein and the order thereof;
generating a plurality of regular expressions, each of the plurality of regular expressions being generated for each group of the at least one group containing at least two malware requests, each of the plurality of regular expressions describing the malware request parameters and the order thereof in the group;
transmitting, via the communication network, a server-generated request, the server-generated request having been generated based on one of the plurality of regular expressions, to a plurality of malware control centers;
the server-generated request having been generated by randomly assigning values to the parameters in the one of the plurality of regular expressions;
receiving, from a given one of the plurality of malware control centers, a control center response to the server-generated request;
analyzing the control center response for presence of data representative of characteristic of a cyber attack;
in response to the analyzing rendering a positive outcome indicative of the presence of data representative of characteristics of the cyber attack associated with the given one of the plurality of malware control centers:
determining a type of the cyber attack;
identifying the given one of the plurality of malware control centers as a source of the cyber attack of the determined type;
storing, in a memory, a cyber attack pattern generated based on the data representative of characteristics of the cyber attack;
the cyber attack pattern comprising the server-generated request and the control center response;
executing at a second moment in time after the first moment in time:
using the cyber attack pattern to determine an occurrence of a future cyber attack of the determined type launched by the given one of the plurality of malware control centers.

US Pat. No. 10,430,587

SYSTEM AND METHOD FOR MAINTAINING SECURITY TAGS AND REFERENCE COUNTS FOR OBJECTS IN COMPUTER MEMORY

HRL Laboratories, LLC, M...

1. A method for maintaining security tags and reference counts for objects in computer memory, the method comprising an act of:causing at least one processor to execute instructions encoded on a non-transitory computer-readable medium, such that upon execution, the at least one processor performs operations of:
updating a security tag for a first segment comprising at least part of a first object being modified in a computer memory;
updating reference counts for a first set of objects that the first object pointed to immediately prior to modification; and
updating reference counts for a second set of objects that the first object points to immediately after the modification;
examining one or more of the security tags for the first segment, the security tags for the first set of objects, the security tags for the second set of objects, and program counter security context; and
if the examination reveals a potential information flow security violation, performing a corrective action, the corrective action being at least one of terminating a program, filtering out a suspect value, or rolling back a suspect update.

US Pat. No. 10,430,586

METHODS OF IDENTIFYING HEAP SPRAY ATTACKS USING MEMORY ANOMALY DETECTION

FireEye, Inc., Milpitas,...

1. A non-transitory storage medium having stored thereon logic, the logic being executable by one or more processors to perform operations for heap spray detection including:monitoring memory allocation for a process running during processing of an object;
responsive to detecting the memory allocation has exceeded a first memory threshold, determining whether (i) a memory region having a size greater than a second memory threshold being different than the first memory threshold has been allocated for the process, or (ii) at least a threshold number of memory regions having corresponding sizes has been allocated for the process;
selecting a subset of either (i) the memory region having a size greater than the second memory threshold or (ii) the memory regions having corresponding sizes; and
performing a similarity analysis on at least a portion of the selected subset, the similarity analysis to generate a similarity score based on a plurality of hash values associated with either portions of the subset of the memory region or the memory regions having corresponding sizes, the similarity score to indicate whether the object is associated with a heap spray attack.

US Pat. No. 10,430,585

BINARY SEARCH OF BYTE SEQUENCES USING INVERTED INDICES

CrowdStrike, Inc., Irvin...

8. A computer-implemented method comprising:receiving a search query;
determining a plurality of byte sequences of a fixed length that correspond to the search query;
searching for each of the byte sequences in an inverted index that specifies byte sequences of the fixed length and, for each specified byte sequence, file identifiers of files that include the specified byte sequence;
determining an intersection of search results of the searching; and
returning indications of files associated with file identifiers that are included in the intersection in response to the search query.

US Pat. No. 10,430,584

MULTIPLEXED—PROACTIVE RESILIENCY SYSTEM

Bank of America Corporati...

1. A method for machine-learned detection and removal of malicious software within a network, the method comprising:recording, within a trace data repository, environment behavior of:
a network application; and
a plurality of network components that communicate with the application;
based on the recorded environment behavior, generating a baseline dataset within the trace data repository,
scheduling a plurality of snapshots of the application, each of the snapshots occurring at a predetermined periodic interval;
capturing a first snapshot of the application and the plurality of components, the first snapshot corresponding to one of the plurality of scheduled snapshots;
storing the first snapshot in the trace data repository;
monitoring the application and the plurality of components, using the stored snapshots and the baseline dataset, for any deviation in the environment behavior;
detecting a first deviation in the environment behavior of the application or the plurality of components;
in response to detecting a first deviation, capturing a second snapshot of the application and the plurality of components, the second snapshot being inconsistent with the plurality of scheduled snapshots;
transmitting the second snapshot as an alert to one or more stakeholders associated with the application;
receiving a flag from the one or more stakeholders relating to the first deviation, the flag identifying the first deviation as intended or unwarranted;
detecting a second deviation included in the application or the plurality of components;
identifying a second deviation as intended or unwarranted based on the received flag;
upon determining that the second deviation is unwarranted, and, therefore, is directed to malicious software, reverting the application and the plurality of components back to a previous version of the application and the plurality of components, thereby removing the malicious software; and
upon determining that the second deviation is intended, storing the intended deviation in a log of verified intended deviations.

US Pat. No. 10,430,583

SYSTEMS AND METHODS TO DETECT AND NEUTRALIZE MALWARE INFECTED ELECTRONIC COMMUNICATIONS

eBay Inc., San Jose, CA ...

1. A system comprising:at least one processor and executable instructions accessible on a computer-readable medium that, when executed, cause the at least one processor to perform operations comprising:
receiving, at a server, a request for interface information, the request being received at the server over a network from a client machine;
generating interface information, at the server, the interface information including:
at least one input mechanism to receive user information, the at least one input mechanism being authorized for being included in a user interface to receive the user information, the at least one input mechanism corresponding to at least one input element including a first input element including a first name, the first name for enabling a detection of whether a first input mechanism is authorized, and
countermeasure information including white list information including the first name for enabling detection of whether the first input mechanism is authorized and whether the interface information is modified to include an input mechanism that is not authorized to receive user information; and
communicating the interface information, over the network, to the client machine.

US Pat. No. 10,430,582

MANAGEMENT APPARATUS AND MANAGEMENT METHOD

FUJITSU LIMITED, Kawasak...

5. A management apparatus comprising:a processor configured to perform a process including;
obtaining execution information about a first process generated or a first command executed by an information processing apparatus that performs a task in response to an execution instruction for executing the task, the execution information including an execution start time and an execution end time of the first process or the first command executed by the information processing apparatus;
accumulating the execution start time and the execution end time of the first process or the first command as record information;
creating a scheduled task list of the first process or the first command that the information processing apparatus is scheduled to execute during a predetermined time period, based on the execution information obtained about the first process or the first command, as well as based on a schedule of the execution instruction for the task;
receiving alert information including information about a second process being generated or a second command being executed by the information processing apparatus when a security incident indicating an unauthorized action is detected in the information processing apparatus;
calculating a scheduled execution time zone in which the first process or the first command is expected to be executed, based on the scheduled task list, the schedule, and the record information, and comparing detected date and time of the second process or the second command indicated by the alert information against the scheduled execution time zone;
determining whether or not the detected date and time of the second process or the second command is included in the scheduled execution time zone calculated based on the scheduled task list that has been created based on the execution information and the schedule; and
discarding the received alert information when the determining concludes that the detected date and time of the second process or the second command is included in the scheduled execution time zone.

US Pat. No. 10,430,581

COMPUTER TELEMETRY ANALYSIS

Chronicle LLC, Mountain ...

1. A system comprising one or more computers and one or more storage devices on which are stored instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising:accessing data describing a telemetry tree that includes a plurality of nodes and edges, wherein:
each node represents a telemetry value of a telemetry type, and one of the nodes is a root node;
each edge connects two of the nodes and indicates a relationship between the two of the nodes connected to the edge; and
each edge has a number of values equal to a depth of a deepest child node of the two of the nodes to which the edge connects, and each value represents a relationship between respective spans of nodes in a path from the root node to the deepest child node to which the edge connects, wherein:
the respective spans of nodes in the path from the root node to the deepest child node to which the edge connects includes: i) a span that begins from the root node and that descends to the deepest child node to which the edge connects, and ii) for each descendent child node from the root node and that is not the deepest child node to which the edge connects, a span from the descendent child node to the deepest child node to which the edge connects;
each value is unique from each other value for the edge and from each of the values of each other edge in the path from the root node to the deepest child node;
querying, for each of the edges in the telemetry tree using at least one value for the edge from the number of values, historical telemetry data that quantifies an anomaly score for each value to determine whether the relationship indicated by the edge in the telemetry tree represents a potentially malicious relationship; and
performing an action using a result of the querying of the historical telemetry data that indicates whether one of the anomaly scores indicates that the relationship indicated by the edge in the telemetry tree represents a potentially malicious relationship.

US Pat. No. 10,430,580

PROCESSOR EXTENSIONS TO PROTECT STACKS DURING RING TRANSITIONS

Intel Corporation, Santa...

1. A processor comprising:a plurality of registers to store shadow stack pointers (SSPs), wherein each register is associated with a privilege level; and
a processor core circuitry, operatively coupled to the plurality of registers, to:
receive an indicator to change a first privilege level associated with a currently active application to a second privilege level;
select, in view of the second privilege level, a register of the plurality of registers, wherein the register comprises a shadow stack pointer (SSP); and
identify, using the SSP, a shadow stack to control data flow of the currently active application at the second privilege level.

US Pat. No. 10,430,579

PASSWORD RECOVERY

Osirium Limited, Berkshi...

1. An apparatus for use as a Single Sign On, SSO, entity for controlling access to a device in a computer network, wherein the device is accessible with a multi-use device access password, the apparatus comprising:a hardware processor; and
a computer-readable medium having computer executable instructions therein that when executed by the hardware processor configure the apparatus to:
generate a current device access password PW1 and at least one future device access password PW2;
store in a memory a back-up comprising the current device access password PW1 and the at least one future device access password PW2 at the time of the back-up;
control a transmitter to transmit current device access password PW1 to the device for implementing setting the device access password to PW1;
access the device multiple times by controlling the transmitter to transmit the current device access password PW1 to the device;
update the current device access password to be the at least one future device access password PW2, and control the transmitter to transmit the updated current device access password PW2 to the device for implementing the update of the current device access password to PW2;
access the device multiple times by controlling the transmitter to transmit the updated current device access password PW2 to the device; and
following a failure of the apparatus resulting in a loss of the updated current device access password PW2, restoring the device access password to be the updated device access password PW2, by retrieving PW2 from the back-up, where PW2 was previously stored as a future device access password, so that the restored updated current device access password matches the device access password PW2 of the device.

US Pat. No. 10,430,578

SERVICE CHANNEL AUTHENTICATION TOKEN

Bank of America Corporati...

1. An apparatus comprising:at least one memory device;
at least one processor coupled to the at least one memory device and configured to perform, based on instructions stored in the at least one memory device:
receiving a service request for a protected resource from a first user device, wherein the service request includes a plurality of device attributes and an authentication token;
determining a derived device identification from a first attribute set contained in the plurality of device attributes;
when a signed device identification of the authentication token and the derived device identification are equal, continue processing the service request;
when the signed device identification is not equal to the derived device identification, rejecting the service request;
receiving an authentication request from a second user device;
determining a determined device identification from a set of device attributes;
when a desired level of authentication for the second user device is achieved, generating a generated authentication token, wherein the generated authentication token is signed by the determined device identification; and
returning the generated authentication token to the second user device.

US Pat. No. 10,430,577

METHOD AND APPARATUS FOR INTER PROCESS PRIVILIGE TRANSFER

Apple Inc., Cupertino, C...

1. A machine-readable non-transitory storage medium having instructions therein, which when executed by a machine, cause the machine to perform a method of dynamically transferring a second privilege of a second process to a first process, while both the first and second processes are running, the method comprising:running a plurality of processes including the first process and the second process, each process having attributes including a privilege to control access of the process to processing resources, wherein the first process is running with a first privilege, wherein the first process with the first privilege is allowed to access a first processing resource and is prohibited from access to a second processing resource, wherein the second process is running in a first mode with a second privilege, wherein the second process with the second privilege is allowed to access at least the first processing resource;
receiving, by the running second process, from a voucher management system, a message containing a first voucher comprising an attribute having a value indicating that the second process is to run in a second mode, wherein the second mode modifies the second privilege to prohibit access to the first processing resource and allow access to the second processing resource;
redeeming, by the second running process, the first voucher thereby dynamically transferring the second mode and modified second privilege to the second running process;
requesting by the running second process, from the voucher management system, a second voucher comprising one or more attributes, each having a value, related to a context of the second process, including at least one attribute and value pair specifying the modified second privilege;
in response to receiving by the running first process a message containing the second voucher requesting that the first process perform a data processing task on behalf of the running second process, redeeming, by the running first process, the second voucher with the voucher management system, thereby dynamically transferring the attribute and value pair specifying the modified second privilege to the running first process to allow the first process to access the second processing resource for the data processing task and to prohibit the first process from accessing the first processing resource; and
performing, by the first process running with the modified second privilege, the data processing task on the second processing resource on behalf of the running second process.

US Pat. No. 10,430,576

SYSTEMS AND METHODS FOR SENSOR-BASED LAYER VARIATION ON MOBILE DEVICES

Live Nation Entertainment...

1. A computer-implemented method for visually varying presentation of digital access rights on mobile devices using parallax images responsive to motion, comprising:receiving, at a first time, from a mobile device, a first image comprising a first digital representation of a digital access right and a first parallax image, the first parallax image comprising a plurality of layers arranged in a first configuration according to a position protocol, wherein the first configuration is determined, based at least in part on, a first position associated with the mobile device;
receiving, at a second time, from the mobile device, a second image comprising the first digital representation of the digital access right and a second parallax image, the second parallax image comprising the plurality of layers arranged in a second configuration according to the position protocol, wherein the second configuration is determined, based at least in part on, a second position associated with the mobile device, the second position being a different physical position than the first position; and
validating the first digital representation of the digital access right based at least in part on the first configuration of the plurality of layers being different from the second configuration of the plurality of layers.

US Pat. No. 10,430,575

SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEM

ALCLEAR, LLC, New York, ...

1. A biometric identification system, comprising:at least one non-transitory storage medium that stores instructions; and
at least one processor that executes the instructions to:
receive input information regarding an identity of a person from an input component of an electronic device;
receive first document information from at least one second input component of the electronic device that scanned a first document associated with the identity of the person, the first document comprising at least one of a passport, a driver's license, a state identification, or a military identification;
receive second document information from the at least one second input component of the electronic device that scanned a second document associated with the identity of the person, the second document comprising a boarding pass;
electronically retrieve data source information relating to the identity of the person from at least one data source;
authenticate the identity of the person based on the input information, the first document information, the second document information, and the data source information;
upon authenticating the identity of the person, receive biometric data for the person electronically collected using a biometric capture device of the electronic device; and
upon confirming a biometric match between the biometric data and received biometric data from an airport security device, transmit an indication to the airport security device to admit the person.

US Pat. No. 10,430,574

SYSTEMS FOR IDENTITY VALIDATION AND ASSOCIATION

FILEVINE, INC., Provo, U...

1. A computer system, comprising:one or more processors; and
memory having stored thereon computer-executable instructions that are executable by the one or more processors to configure the computer system to perform at least the following:
receive an endorsable electronic instrument from an endorsement requesting party;
receive a mobile phone number associated with a targeted endorser;
associate the mobile phone number with the endorsable electronic instrument;
generate a link to a web-based application in which the endorsable electronic instrument is accessible to the targeted endorser;
send the generated link and an associated verification information request to the targeted endorser in the form of an SMS/MMS message using the mobile phone number associated with the targeted endorser, the verification information request including a request for imagery of the targeted endorser according to a particular pose or gesture;
receive an endorsed electronic instrument and electronic verification information through the web-based application, the electronic verification information including imagery data and including a time stamp indicating when the imagery data was captured,
wherein the imagery data is validated according to both,
whether the timestamp is sufficiently recent based on a predetermined time period, and
whether the imagery data corresponds to the particular pose or gesture required by the verification information request.

US Pat. No. 10,430,573

METHOD FOR CONTROLLING UNLOCKING AND TERMINAL DEVICE

Guangdong Oppo Mobile Tel...

1. A method for controlling unlocking, comprising:performing a password matching process on a screen unlock password, triggering an interrupt request and acquiring an original fingerprint image, and performing a fingerprint identification process on the original fingerprint image, when a terminal device is in a screen-off state and the screen unlock password input by a user and a touch-press operation of the user on a fingerprint identification module of the terminal device are detected; wherein, the password matching process and the fingerprint identification process are performed sequentially or performed in parallel; and
lighting up a screen of the terminal device, when the password matching process is successful and the fingerprint identification process is successful;
wherein the screen unlock password is a graphic unlock password, performing the password matching process on the screen unlock password comprises the following when W registered graphic unlock passwords are pre-stored, W being an integer greater than 1:
acquiring the number of times that the W registered graphic unlock passwords are matched within a preset time period;
ranking the W registered graphic unlock passwords in a descending order according to the number of times that the W registered graphic unlock passwords are matched within the preset time period; and
matching the graphic unlock password with the ranked W registered graphic unlock passwords sequentially.

US Pat. No. 10,430,572

INFORMATION PROCESSING SYSTEM THAT RECOGNIZES A USER, STORAGE MEDIUM, AND INFORMATION PROCESSING METHOD

SONY CORPORATION, Tokyo ...

1. An information processing system comprising: circuitry configured to function asa recognition unit configured to recognize a user;
a provision unit configured to display, on a signage terminal in a public space, an authentication code specific to the user recognized by the recognition unit;
the recognition unit further configured to detect a passcode input by the user in response to the authentication code, the passcode indicating whether or not there is approval from the user for the signage terminal in the public space to display provision information corresponding to the user; and
a control unit configured to prevent the provision unit from displaying the authentication code and to control whether the provision unit displays the provision information corresponding to the user on the signage terminal without requiring the approval from the user under a condition determined based on attribute information of a person located around the user.

US Pat. No. 10,430,571

TRUSTED UI AUTHENTICATED BY BIOMETRIC SENSOR

BlackBerry Limited, Wate...

19. A method of controlling, while executing a Trusted Execution Environment (TEE), access to a computing device, the method comprising:presenting, on a display, an object;
receiving data from a biometric sensor, said data representative to movement, sensed by the biometric sensor, of a user's finger, said data being available to the computing device when executing the TEE and unavailable to the computing device when executing a high level operating system;
controlling, based on the data, movement of the object on the display, such that the movement of the object is correlated to the sensed movement of the user's finger, thereby establishing that the computing device is executing the TEE;
in conjunction with the controlling, arranging presentation of a user interface, the user interface including a field configured for receiving input;
receiving, via the field, input; and
based on only the input, controlling access to the computing device.

US Pat. No. 10,430,569

MULTICOMPUTER SYSTEM FOR USER DATA AUTHENTICATION AND PROCESSING

Bank of America Corporati...

1. A computing platform, comprising:at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:
receive, via the communication interface, first data associated with a first telephone call made from a first user computing device;
analyze the first data to generate a call fingerprint for the first telephone call;
establish, via the communication interface, a connection to at least one call authentication computing platform;
with the connection established, transmit the call fingerprint to the at least one call authentication computing platform;
with the connection established, receive at least one call security response from the at least one call authentication computing platform, wherein the at least one call security response comprises data including an identification of a first user of the first user computing device and a record of any previous calls made from the first user computing device;
based on the call fingerprint and the at least one call security response, determine a call security score for the first telephone call made by the first user computing device;
generate a first notification of the call security score to a call handling system; and
transmit, via the communication interface, the first notification to the call handling system.

US Pat. No. 10,430,568

DEVICE SECURITY UTILIZING CONTINUALLY CHANGING QR CODES

GOOGLE LLC, Mountain Vie...

1. A method, comprising:at a data communication system including a mobile device and an imaging device that is distinct from the mobile device:
obtaining by an application executing on the mobile device an authentication code for establishing a local communication channel for the imaging device;
converting the authentication code to a graphical representation, wherein the graphical representation includes an encoded version of the authentication code for establishing the local communication channel for the imaging device, and the graphical representation is valid for establishing the local communication channel for the imaging device at a defined physical location identified by associated location coordinates;
displaying the graphical representation on a display of the mobile device;
capturing, by the imaging device, an image of the graphical representation displayed on the mobile device; and
in accordance with a verification of the authentication code, establishing the local communication channel for the imaging device.

US Pat. No. 10,430,567

CUSTOMIZABLE FIRMWARE BASED ON ACCESS ATTRIBUTES

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for customizing a system for a user, the method comprising:receiving, by a processor, attribute data for the user from a tag associated with the user;
determining, by the processor, a maximum lift of the user;
generating, by the processor, a set of service procedure instructions comprising a set of steps to be executed by the user to service components of the system, the set of steps being customized for the user based on the attribute data, wherein, in response to the maximum lift being below a predetermined value, generating the set of service procedure instructions comprises, adding instructions identifying a lift-support tool to be used;
displaying, by the processor, the set of service procedure instructions comprising the set of steps that are customized for the user;
receiving, by the processor, authentication data for the user from the tag;
validating, by the processor, authority of the user based on the authentication data, wherein the validating is performed prior to receiving the attribute data; and
adjusting, by the processor, a position of one or more components of the system based on the attribute data of the user.

US Pat. No. 10,430,566

VEHICLE BASED ELECTRONIC AUTHENTICATION AND DEVICE MANAGEMENT

PAYPAL, INC., San Jose, ...

1. A system, comprising:a non-transitory memory storing instructions; and
one or more hardware processors coupled to the non-transitory memory and configured to read the instructions from the non-transitory memory to cause the system to perform operations comprising:
determining that a first user device is located within a vehicle, wherein the first user device is associated with a first user;
receiving, from the vehicle, vehicle authentication information;
authenticating a vehicle account associated with the vehicle using the vehicle authentication information;
receiving, from the vehicle, first transportation information associated with the vehicle;
receiving, from the first user device, user authentication information including orientation information indicating an orientation direction of the first user device; and
authenticating a user account of the first user for the first user device based on the first transportation information and the user authentication information.

US Pat. No. 10,430,565

SECURING MICROPROCESSORS AGAINST INFORMATION LEAKAGE AND PHYSICAL TAMPERING

BlueRISC, Inc., Amherst,...

1. A method that is performed on a processing device, comprising:encoding blocks of instructions for a computer program differently to produce coded blocks of instructions that are part of a binary executable, the binary executable being based on the computer program, the blocks of instructions being encoded based on mutation instructions stored in memory, at least one of the mutation instructions to perform encoding based on a processing variation of a die containing the processing device;
associating, with each coded block of instructions, control information to decode a corresponding coded block of instructions; and
executing the binary executable on the processing device, wherein executing the binary executable comprises using the control information to decode the coded blocks of instructions.

US Pat. No. 10,430,564

SOFTWARE WRAPPER AND INSTALLER USING TIMESTAMP VALIDATION AND SYSTEM IDENTIFICATION VALIDATION

VIRTUAL MARKETING INCORPO...

1. A user device apparatus for installing a software product provided within a software wrapper comprising:an interface configured to receive i) the software product encompassed within the software wrapper, ii) an installer for the software product, and iii) registration information for the software product;
a hard drive including a unique hard drive serial number;
a clock configured to maintain a month, day, year, and time;
a processor configured execute at least one instruction causing the processor to install the software product by:
identifying an encrypted unlock code associated with the software product,
determining the unique hard drive serial number from the hard drive,
generating a hash number of the unique hard drive serial number,
decrypting the encrypted unlock code using the hash number as a passphrase to generate a decrypted unlock code including a first campaign identifier and a first date-time code,
determining a second campaign identifier of the software product from a secure variable within the software product,
generating a second date-time code in a predefined format based on a current date and time of the clock, and
conditioned on the first campaign identifier matching the second campaign identifier and a time difference between the first date-time code and the second date-time code being less than a predefined threshold, using the installer to install the software product,
wherein the installer is configured to:
determine a source of a launch request by searching for the encrypted unlock code within the launch request;
responsive to determining that the launch request came from the software wrapper, install the software product; and
responsive to determining that the launch request did not come from the software wrapper, end the installation process.

US Pat. No. 10,430,562

SYSTEM AND METHOD FOR EXTRACTING DEVICE UNIQUENESS TO ASSIGN A LICENSE TO THE DEVICE

Dell Products, LP, Round...

1. An information handling system, comprising:a hardware processor; and
a memory device storing instructions that when executed cause the hardware processor to perform operations, the operations including:
receiving a peripheral component interconnect (PCI) identifier sent by a device connected to a peripheral component interconnect bus;
querying a PCI-based licensing manager for the peripheral component interconnect identifier, the PCI-based licensing manager having a datastore that electronically associates licenses to the peripheral component interconnect identifiers;
determining that the device connected to the peripheral component interconnect bus is unlicensed in response to the PCI-based licensing manager failing to electronically associate the peripheral component interconnect identifier to any of the licenses in the datastore; and
licensing the device connected to the peripheral component interconnect bus in response to the determining that the device is unlicensed.

US Pat. No. 10,430,560

MONITORING DIGITAL CONTENT USAGE HISTORY TO PREVENT DIGITAL CONTENT MISUSE

Screening Room Media, Inc...

1. A method comprising:receiving, by a digital content delivery system, a request from a first client-side computing device to initiate presentation of a first digital movie on a display device coupled to the first client-side computing device, the digital content delivery system facilitating presentation of multiple digital movies and maintaining a plurality of user accounts, each user account from the plurality of user accounts corresponding to a unique client-side computing device, wherein the first client-side computing device corresponds to the first user account maintained by the digital content delivery system;
in response to receiving the request, accessing a content usage history for the first user account, the content usage history indicating digital movies accessed by the first client-side computing device and timestamps indicating times at which the digital movies were accessed by the first client-side computing device;
determining, based on the content usage history of the first user account, a number of times that the first digital movie has been accessed by the first client-side computing device within a predetermined time period;
determining that the number of times that the first client-side computing device has accessed the first digital movie within the predetermined time period meets or exceeds a threshold number of times the client-side computing device is permitted to access the digital movie during any predetermined time period;
in response to determining that the number of times that the first client-side computing device has accessed the first digital movie meets or exceeds the threshold number, denying the request to initiate presentation of the first content item;
subsequently receiving, by the digital content delivery system, a second request from the first client-side computing device to initiate presentation of the first digital movie on the display device coupled to the first client-side computing device;
determining, based on the content usage history of the first user account, a number of times that the first digital movie has been accessed by the first client-side computing device within a second predetermined time period, the second predetermined time period occurring at least partially after the predetermined time period;
determining that the number of times that the first digital movie has been accessed by the first client-side computing device within a second predetermined time period does not meet or exceed the threshold number; and
initiating a stream of the first digit movie to the first client-side computing device.

US Pat. No. 10,430,559

DIGITAL RIGHTS MANAGEMENT IN VIRTUAL AND AUGMENTED REALITY

Adobe Inc., San Jose, CA...

1. In a digital medium environment, a method implemented by at least one computing device having a hardware processor, computer-readable storage media and instructions stored on the computer-readable storage media and executable by the hardware processor, the method comprising:obtaining, by the at least one computing device, data describing user traits of users responsive to requests received from the users to access digital content as part of an augmented or virtual reality environment;
determining, by the at least one computing device, from the data using a digital rights management module whether the user traits meet specified traits of a behavior of a digital rights management policy enforced by the digital rights management module;
responsive to the determining that the specified traits are met by a first set of the user traits, rendering, by the at least one computing device, a first portion of the digital content along with content of the augmented or virtual reality environment; and
responsive to the determining that the specified traits are met by a second set of the user traits, rendering, by the at least one computing device, a second portion of the digital content along with the content of the augmented or virtual reality environment, the first set of the user traits and the second set of the user traits are mutually exclusive sets of the user traits.

US Pat. No. 10,430,558

METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO VIRTUAL REALITY MEDIA CONTENT

Verizon Patent and Licens...

1. A method comprising:detecting, by a virtual reality media content access control system, a request from a media player client device to access data representative of an immersive virtual reality world, the immersive virtual reality world generated from and including camera-captured real-world scenery and a virtual object that has been mapped to the immersive virtual reality world and assigned an access permissions profile;
determining, by the virtual reality media content access control system, an access key and a device key associated with the request, the access key being associated with a user profile of a user of the media player client device and being a session specific access key that is specific to an active user login session with a virtual reality media content provider system and that is invalidated upon termination of the active user login session;
validating, by the virtual reality media content access control system, the access key and the device key associated with the request;
determining, by the virtual reality media content access control system, metadata associated with the access key, the metadata comprising session metadata that is associated with interactions of the user with a virtual reality media content service during the active user login session with the virtual reality media content provider system and that is deleted after termination of the active user login session; and
selectively providing, by the virtual reality media content access control system based on the access permissions profile for the virtual object and on at least one of the device key associated with the request and the metadata associated with the access key, access to the virtual object for experiencing by the user of the media player client device as part of the immersive virtual reality world.

US Pat. No. 10,430,557

MONITORING TREATMENT COMPLIANCE USING PATIENT ACTIVITY PATTERNS

Elwha LLC, Bellevue, WA ...

1. A system comprising:at least one audio sensor in a communication system for sensing at least one audio signal including patient speech from a patient at a patient location during use of the communication system, the patient having a brain-related disorder and a prescribed treatment regimen for treating at least one aspect of the brain-related disorder;
at least one first activity sensor for sensing at least one first activity signal indicative of a first activity of the patient;
signal processing circuitry configured to process the at least one first activity signal and at least one second activity signal indicative of a second activity of the patient to generate at least one activity data signal, the activity data signal containing activity data indicative of whether the patient has complied with the treatment regimen; and
at least one transmitting device at the patient location for transmitting the at least one activity data signal and at least one audio data signal based on the at least one audio signal to a receiving device at a monitoring location.

US Pat. No. 10,430,554

MEDICATION PREPARATION QUEUE

CareFusion 303, Inc., Sa...

1. A system for managing preparation of a medication for a patient, the system comprising:a display screen;
a memory comprising instructions; and
one or more processors configured to execute the instructions to:
receive information indicative of an order for medication for a patient from an electronic data feed;
determine a display position of an indicator of the order for the medication in a virtual queue configured to display multiple medication orders to be filled based on at least one of an estimated amount of time to prepare the medication, an estimated amount of time to deliver the medication to a delivery location, an estimated time at which the medication will be needed for administration to a patient at the delivery location, a delivery deadline for the medication, a degree of urgency for delivery of the medication, a type of the medication, or a component of the medication;
aggregate a group of received orders into an aggregated group of orders having a same medication type or a same medication component as the medication, such that, when displayed, the display position of the indicator in the virtual queue is visually associated with another medication in the aggregated group having the same medication type or the same medication component as the medication;
provide the virtual queue for display on the display screen with the indicator of the order for medication visually displayed at the display position in the virtual queue, in the aggregated group with an indicator of the another medication displayed in the virtual queue;
receive an electronically obtained user verification of an electronic record that the medication was prepared with the component of the medication; and
transmit to a remote device remote from the system, based on receiving the user verification, a notification configured to cause a display of a graphical visualization of a path associated with a delivery of the medication at the remote device,
wherein when the medication and the other medication have the same medication component, the one or more processors is further configured to provide, for display with the virtual queue, a total amount of the component needed to prepare both the medication and the other medication.

US Pat. No. 10,430,552

DISTRIBUTED TELEMEDICINE SYSTEM AND METHOD

1. A distributed telemedicine system for medical remote assistance applications, the telemedicine system comprising:a. one or more patient monitoring devices, the patient monitoring device comprising:
i. one or more vital signs sensors configured for physical attachment to a patient;
ii. a first communication system;
iii. a first processor configured to receive vital signs information from the one or more sensors, generate streaming vital signs data based on the information and transmit at least a first portion of the streaming vital signs data to an aggregator via the first communication system;
iv. a first screen configured to display a representation of at least a second portion of the streaming vital signs;
b. one or more aggregators, the aggregator comprising:
i. one or more audio and video sensors;
ii. a second communication system;
iii. a third communication system;
iv. a fourth communication system;
v. a fifth communication system;
vi. a second processor configured to receive site audio and video from the audio and video sensors and streaming vital signs from the one or more patient monitoring devices via the second communication system, transmit at least a third portion of the streaming vital signs data to a first gateway via the third communication system, transmit the site audio and video to a second gateway via the fourth communication system, and receive backchannel audio data from a third gateway via the fifth communication system;
vii. a first application executed on the second processor, the application configured to detect the presence of the first communication system and establish a communication link between the first and second communication system, detect the presence of a sixth communication system and establish a communication link between the third and sixth communication system, detect the presence of a seventh communication system and establish a communication link between the fourth and seventh communication system, detect the presence of an eighth communication system and establish a communication link between the fifth and eighth communication system;
viii. a second screen configured to display an aggregated representation of at least a fourth portion of the streaming vital signs data together with the site video and session controls;
ix. one or more first audio reproduction devices configured to reproduce the backchannel audio data received as audible sounds;
c. at least one first gateway comprising:
i. a sixth communication system;
ii. a ninth communication system;
iii. a third processor configured to receive streaming vital signs data from a plurality of aggregators over the sixth communication system and send the streaming vital signs to a plurality of dashboards over the ninth communication system;
iv. a third screen configured to display session status, statistics, and configuration controls;
d. one or more second gateways, the gateway comprising:
i. a seventh communication system;
ii. the ninth communication system;
iii. a fourth processor configured to receive site audio and video from a plurality of aggregators over the seventh communication system and send the site audio and video data to a plurality of dashboards over the ninth communication system;
iv. a fourth screen configured to display session status, statistics, and configuration controls;
e. one or more third gateways, the gateway comprising:
i. an eighth communication system;
ii. the ninth communication system;
iii. a fifth processor configured to receive backchannel audio data from a plurality of dashboards over the ninth communication system and transmit backchannel audio data to a plurality of aggregators over the eighth communication system;
iv. a fifth screen configured to display session status, statistics, and configuration controls;
f. one or more dashboards, the dashboard comprising:
i. a tenth communication system;
ii. an audio sensor;
iii. a sixth processor configured to receive site audio and video and streaming vital signs data from a gateway over the tenth communication system and to send audio backchannel data to a gateway over the tenth communication system;
iv. one or more audio reproduction devices configured to reproduce the site audio data received as audible sounds;
v. a second application executed on the sixth processor, the application configured to detect the presence of the ninth communication system and establish a communication link between the ninth and tenth communication system;
vi. a sixth screen configured to display an aggregated representation of at least a fifth portion of the streaming vital signs and clinical alarms and alerts with a representation of the site video received together with session controls;
vii. one or more second audio reproduction devices configured to reproduce the site audio data received as audible sounds.

US Pat. No. 10,430,551

SCAN DATA RETRIEVAL WITH DEPTH SENSOR DATA

Siemens Healthcare GmbH, ...

1. A method for scan data retrieval, the method comprising:measuring depths relative to a surface of a patient with a depth sensor;
fitting a first mesh to the depths;
searching for a second mesh in a database of meshes fit to medical scan data from different patients, the searching based on a similarity of values of parameters of the first mesh and values of parameters of the meshes in the database; and
configuring a medical scanner to scan the patient, the configuring being based, at least in part, on scan parameters derived from one of the different patients corresponding to the second mesh.

US Pat. No. 10,430,550

MEDICAL IMAGE METADATA PROCESSING

Virtual Radiologic Corpor...

1. A data processing system, comprising:at least one hardware processor;
an image processing component implemented by a first plurality of instructions executed with the at least one hardware processor, the image processing component to, under computerized control:
extract data values from a set of electronic imaging data that includes a plurality of digital medical images, the plurality of digital medical images originating from a medical imaging procedure performed by a medical imaging modality at a medical facility;
an order processing component implemented by a second plurality of instructions executed with the at least one hardware processor, the order processing component to, under computerized control:
extract data values from electronic order data, wherein the electronic order data includes data provided to the data processing system that originates from the medical facility, and wherein the electronic order data specifies characteristics of a diagnostic evaluation task for the plurality of digital medical images;
associate the plurality of digital medical images in the data processing system with the electronic order data based on data values provided in the electronic imaging data;
a medical data processing component implemented by a third plurality of instructions executed with the at least one hardware processor, the medical data processing component to, under computerized control:
generate data values that identify characteristics of the diagnostic evaluation task for the plurality of digital medical images, based on the data values extracted from the electronic order data; and
perform an evaluation of parameterized qualification characteristic data values for a plurality of evaluators to perform the diagnostic evaluation task, using the identified characteristics of the diagnostic evaluation task, the evaluation to apply rules which identify respective evaluators that are credentialed or licensed to perform the diagnostic evaluation task for the medical facility;
a workflow component implemented by a fourth plurality of instructions executed with the at least one hardware processor, the workflow component to:
generate data values to provide electronic worklists associated with respective evaluators, the electronic worklists to list pending diagnostic evaluation tasks designated for performance by the respective evaluators, wherein the data values to provide the electronic worklists are communicated to computing systems of the respective evaluators;
initiate a command to designate a particular evaluator of the respective evaluators to perform the diagnostic evaluation task, wherein the particular evaluator is designated based on a match of at least one qualification of the particular evaluator with at least one requirement of the diagnostic evaluation task, using the parameterized qualification characteristic data values; and
update the electronic worklist for the particular evaluator in response to the command to designate the particular evaluator, wherein the electronic worklist for the particular evaluator is updated to include a pending state for the diagnostic evaluation task; and
a data transmission component implemented by a fifth plurality of instructions executed with the at least one hardware processor, the data transmission component to, under computerized control:
transmit the plurality of digital medical images, via a network, to a computing device associated with the particular evaluator, in response to a command received from the particular evaluator via the electronic worklist to accept the diagnostic evaluation task from the pending state;
wherein the plurality of digital medical images are transmitted and made accessible to the computing device associated with the particular evaluator for performance of the diagnostic evaluation task, based on the acceptance of the diagnostic evaluation task and management of the electronic worklist for the respective evaluators, such that the plurality of digital medical images are not transmitted to the computing systems of the respective evaluators before acceptance of the diagnostic evaluation task.

US Pat. No. 10,430,549

TELERADIOLOGY IMAGE PROCESSING SYSTEM

Virtual Radiologic Corpor...

1. An image processing system, comprising:at least one hardware processor;
an image processing component comprising a plurality of instructions executed with the at least one hardware processor, the image processing component configured to, under computerized control:
extract data values from a set of electronic imaging data that includes a plurality of digital medical images, the plurality of digital medical images originating from a medical imaging procedure performed by a medical imaging modality at a medical facility;
a data processing component comprising a plurality of instructions executed with the at least one hardware processor, the data processing component configured to, under computerized control:
generate data values that identify characteristics of a diagnostic evaluation task for the plurality of digital medical images, based on the data values extracted from the set of electronic imaging data; and
determine at least one requirement for the diagnostic evaluation task, based on medical information included in the data values from the set of electronic imaging data;
a workflow component comprising a plurality of instructions executed with the at least one hardware processor, the workflow component configured to, under computerized control:
generate data values for electronic worklists associated with respective evaluators, the electronic worklists to list pending diagnostic evaluation tasks designated for performance by the respective evaluators, wherein the data values are communicated to computing systems of the respective evaluators;
initiate a command to designate a particular evaluator of the respective evaluators to perform the diagnostic evaluation task, wherein the particular evaluator is designated based on a match of at least one qualification of the particular evaluator with the at least one requirement of the diagnostic evaluation task; and
update the electronic worklist for the particular evaluator in response to the command to designate the particular evaluator, wherein the electronic worklist for the particular evaluator is updated to include a pending state for the diagnostic evaluation task; and
a data transmission component comprising a plurality of instructions executed with the at least one hardware processor, the data transmission component configured to, under computerized control:
transmit the plurality of digital medical images, via a network, to a computing device associated with the particular evaluator, in response to a command received from the particular evaluator via the electronic worklist to accept the diagnostic evaluation task from the pending state;
wherein the plurality of digital medical images are transmitted and made accessible to the computing device associated with the particular evaluator for performance of the diagnostic evaluation task, based on the acceptance of the diagnostic evaluation task and management of the electronic worklist for the respective evaluators, such that the plurality of digital medical images are not transmitted to the computing systems of the respective evaluators before acceptance of the diagnostic evaluation task.

US Pat. No. 10,430,548

COMPUTER-IMPLEMENTED METHOD FOR SPACE FRAME DESIGN, SPACE FRAME CONSTRUCTION KIT AND SPACE FRAME

Airbus Operations GmbH, ...

1. A method of making a space frame construction kit, the method comprising:receiving a truss model generated to optimize a plurality of load paths through a truss for a space frame by iteratively evaluating a plurality of potential space frame designs, wherein receiving the truss model comprises supplying a plurality of optimization parameters to a computer system executing a metaheuristic optimization algorithm;
fabricating a plurality of space frame rods based on the truss model, including fabricating each space frame rod to dimensionally match a modelled space frame rod in the truss model; and
fabricating a plurality of connectors for connecting the plurality of space frame rods based on the truss model;
wherein fabricating the plurality of space frame rods and the plurality of connectors comprises fabricating at least a first one of the space frame rods to comprise an angled pin connector integrally formed at an end portion of the first space frame rod with angled pins being spaced apart from and protruding parallel to an end face of the first space frame rod.

US Pat. No. 10,430,547

UNIVERSAL CIRCUIT DESIGN SYSTEMS AND METHODS

Oracle International Corp...

1. A system that generates a circuit design, comprising a non-transitory computer-readable medium storing instructions that, when executed by a computer processor, perform the steps of:receiving a circuit type from a first user interface;
retrieving a set of applications corresponding to the circuit type;
retrieving a set of attribute requirements corresponding to each of the set of applications;
generating, for each resolvable attribute requirement, a set of resolved attribute requirements that intersect applicable sets of attribute requirements for each of the set of applications;
selecting application set components that do not violate any of the set of resolved attribute requirements; and
populating a circuit design environment with the selected application set components to generate the circuit design.

US Pat. No. 10,430,546

INTEGRATED CIRCUIT, AND COMPUTING SYSTEM AND COMPUTER-IMPLEMENTED METHOD FOR DESIGNING INTEGRATED CIRCUIT

SAMSUNG ELECTRONICS CO., ...

19. A computer-implemented method, the method comprising:placing standard cells based on design data defining an integrated circuit;
generating a layout of the integrated circuit by performing colorless routing wherein a first pattern, a second pattern, and a third pattern included in a triple patterning lithography (TPL) layer are arranged on the placed standard cells according to predefined space constraints, wherein the predefined space constraints include a relative positional relationship between adjacent patterns, the identity of colors to be respectively assigned to the adjacent patterns, and a minimum space between two of the first pattern, the second pattern, and the third pattern,
wherein the positional relationships include one of adjacent patterns disposed in a same track, adjacent patterns disposed in parallel, or adjacent patterns perpendicularly disposed, and
wherein when a space between two of the first pattern, the second pattern, and the third pattern is less than respective space constraint, a color violation is indicated;
storing the generated layout to a non-transitory computer-readable storage medium;
assigning a first color, a second color, and a third color to the first pattern, the second pattern, and a third pattern, respectively
generating a first mask, a second mask, and a third mask respectively corresponding to the first color, the second color, and the third color based on the layout; and
manufacturing a semiconductor device by using the generated first mask, the second mask, and the third mask.

US Pat. No. 10,430,545

ESTIMATION OF CHIP FLOORPLAN ACTIVITY DISTRIBUTION

ARTERIS, INC., Campbell,...

1. A method comprising:estimating activity distribution within a floorplan, wherein the activity includes the amount of data transfer that results in power consumption;
accepting, as input through the user interface unit of a computing device, information descriptive of a location of each of a multiplicity of units;
accepting, as input through the user interface unit, information descriptive of an amount of data transfer between each of the multiplicity of units;
calculating, for a range of locations, an amount of data transfer as a function of the location of at least one unit of the multiplicity of units resulting in power consumption of the at least one unit of the multiplicity of units to determine high activity regions;
duplicating the at least one unit of the multiplicity of units to produce at least one duplicate unit, wherein the at least one unit of the multiplicity of units and the at least one duplicate unit are separated within the floorplan and collectively share the activity of the at least one unit of the multiplicity of units in order to spread out the activity each carries; and
optimizing the floorplan by selecting placement of the duplicate unit and the at least one unit of the multiplicity of units based on the amount of the activity to avoid high activity regions and reduce power consumption.

US Pat. No. 10,430,544

MULTI-PATTERNING GRAPH REDUCTION AND CHECKING FLOW METHOD

Taiwan Semiconductor Manu...

1. A method of generating a plurality of photomasks for a photolithographic process, comprising:generating a circuit graph representative of a circuit layout having a plurality of conductive lines, wherein the graph comprises a plurality of vertices and a plurality of edges, wherein each of the plurality of vertices is representative of a corresponding one of the plurality of conductive lines, and wherein each of the plurality of edges is representative of a spacing between the conductive lines less than an acceptable minimum distance;
identifying at least one Kn+1 graph within the circuit graph, wherein a Kn+1 graph comprises a first set of vertices selected from the plurality of vertices connected in series by a first set of edges selected from the plurality of edges and having at least one non-series edge connection between a first vertex and a second vertex selected from the first set of vertices, wherein the first set of vertices comprises n+1 vertices, where n is any integer greater than 2;
reducing the at least one Kn+1 graph by merging a third vertex into a fourth vertex selected from the first set of the plurality of vertices, wherein the third vertex has a second set of edges selected from the plurality of edges and the fourth vertex has a third set of edges selected from the plurality of edges, and wherein the third vertex is merged into the fourth vertex by removing the third vertex from the circuit graph and adding edges from the second set of edges to the third set of edges to generate a reduced circuit graph, wherein the edges from the second set of edges are added to the third set of edges only if a the third set of edges does not include a corresponding edge;
performing an n-pattern conflict check on the reduced circuit graph; and
generating the plurality of photomasks based on a result of the n-pattern conflict check.

US Pat. No. 10,430,543

MATRIX REDUCTION FOR LITHOGRAPHY SIMULATION

Synopsys, Inc., Mountain...

1. A computer-implemented method for analysis and design of a semiconductor integrated circuit, the method comprising:identifying, from mask data based on the semiconductor integrated circuit design, target points and moveable mask edges;
determining interactions between the moveable mask edges wherein the interactions impact resulting integrated circuit design fabrication shapes associated with the target points;
building a graph that shows the interactions;
partitioning the graph into a plurality of groups, based on the interactions;
performing lithography simulations based on the plurality of groups; and
performing optical proximity correction (OPC) based on the lithography simulations.

US Pat. No. 10,430,541

ALWAYS-ON TIE CELLS FOR LOW POWER DESIGNS AND METHOD OF MANUFACTURE THEREOF

SYNOPSYS, INC., Mountain...

1. A computer-implemented method, comprising:determining a relationship between a primary power supply and a backup load supply;
selecting a cell, based on the relationship, from a group consisting of a tie cell, an insulated always-on (AO) tie-high cell, an insulated always-on (AO) tie-low cell, a non-insulated AO tie-high cell, and a non-insulated AO tie-low cell, wherein the cell generates one of a logic ‘0’ or a logic ‘1’ for an IC design; and
placing the cell in the IC design.

US Pat. No. 10,430,540

PROCESSING A BLOCK DIAGRAM CIRCUIT DESIGN INTO AN EFFICIENT HIGH-LEVEL LANGUAGE REPRESENTATION

XILINX, INC., San Jose, ...

1. A method comprising:inputting a block diagram representation of a circuit design to a computer processor;
determining, by the computer processor, respective high-level programming language (HLL) code fragments associated with each block of the block diagram representation;
generating, by the computer processor, a dependency graph from the block diagram representation, wherein the dependency graph includes a plurality of vertices connected by edges, each vertex represents a block of the block diagram representation, and each edge represents a signal that is driven by one block to another block;
generating, by the computer processor, one or more clusters of vertices from the dependency graph, wherein each of the HLL code fragments represented by the vertices of each cluster includes a for-loop, and each cluster includes a subset of the plurality of vertices and edges;
combining, by the computer processor and for each of the clusters, a plurality of for-loops of the HLL code fragments associated with blocks represented by the vertices of the cluster, into a single for-loop; and
generating, by the computer processor, an HLL function from each single for-loop and the HLL code fragments associated with each block that is not represented by any of the one or more clusters.

US Pat. No. 10,430,539

METHOD AND APPARATUS FOR ENHANCING PERFORMANCE BY MOVING OR ADDING A PIPELINED REGISTER STAGE IN A CASCADED CHAIN

XILINX, INC., San Jose, ...

1. A method for configuring a programmable device, comprising:generating a directed graph for a circuit design;
identifying a cascaded chain in the directed graph with a timing violation;
identifying available resources for placement of the cascaded chain;
moving a pipeline register stage of the cascaded chain to remove the timing violation by adjusting negative slack;
selecting a set of resources from the available resources for the placement of the cascaded chain to provide a multiple-column configuration having multiple-pipeline sections;
transforming the circuit design to provide a netlist including the pipeline register stage; and
providing a bitstream to the programmable device to instantiate the circuit design in the programmable circuitry of the programmable device.

US Pat. No. 10,430,537

INTEGRATED CIRCUIT INCLUDING CELLS/GATES ARRANGED BASED ON SUPPLY VOLTAGE VARIATIONS OF CELLS AND INFLUENCE BETWEEN CELLS, AND DESIGN METHOD THEREOF

Samsung Electronics Co., ...

1. An integrated circuit comprising:a plurality of cells; and
a plurality of paths configured to supply power to the plurality of cells, respectively,
wherein the plurality of cells and the plurality of paths are arranged based on a plurality of propagation delays of the plurality of cells,
wherein the plurality of propagation delays comprise:
a plurality of first delays of the plurality of cells generated by a plurality of power resistances of the plurality of paths; and
a plurality of second delays of the plurality of cells generated based on a plurality of arrival timing windows that overlap each other.

US Pat. No. 10,430,536

METHOD AND APPARATUS FOR YIELD CALCULATION USING STATISTICAL TIMING DATA THAT ACCOUNTS FOR PATH AND STAGE DELAY CORRELATION

Cadence Design Systems, I...

1. A computer implemented method for accounting for path and stage delay correlations, comprising:receiving statistical timing analysis data for a design to be analyzed;
identifying a plurality of paths for performing timing analysis processing, wherein the plurality of paths comprise one or more stages; and
performing path timing analysis on the plurality of paths, wherein common delay data is used for analysis of the one or more stages shared by two or more paths of the plurality of paths and a stage shared by different paths is represented by a same arrival time.

US Pat. No. 10,430,535

VERIFICATION SUPPORT PROGRAM MEDIUM, VERIFICATION SUPPORT METHOD, AND INFORMATION PROCESSING DEVICE FOR VERIFICATION OF A CIRCUIT

FUJITSU LIMITED, Kawasak...

1. A non-transitory computer-readable medium storing a verification support program that causes a processor, coupled to a memory storing:first correspondence information in which, regarding each region of a plurality of regions delimited based on a level of possibility that a path included in a circuit does not meet timing constraints, region information that represents the region and a range of a value of an item relating to delay of the path in the region are associated with each other, and
second correspondence information in which, regarding a certain region among the plurality of regions, region information that represents the certain region and countermeasure information that represents a countermeasure against delay of the path whose value of the item corresponds to the certain region are associated with each other,
to execute a process, the process including:
acquiring a value of the item relating to delay of a path included in a target circuit of verification;
determining whether or not a region corresponding to the acquired value of the item among the plurality of regions is the certain region with reference to the first correspondence information; and
outputting the countermeasure information associated with the region information that represents the certain information with reference to the second correspondence information in response to determining that the region corresponding to the acquired value of the item is the certain region.

US Pat. No. 10,430,533

METHOD FOR AUTOMATIC BEHAVIORAL PHENOTYPING

Yeda Research and Develop...

1. A method for identification and classification of behavior for at least one of a plurality of organisms, said method including, for each of a pair of the organisms:performing 3-D monitoring of the organisms over a time period; and
determining behavior from at least one of video imaging data, 3-D RFID data, and a calculated average organism position over the time period,
wherein said behavior is chasing behavior if, for a pair of organisms, a time segment is identified during which:
a. the distance between the pair of organisms is below a first threshold,
b. the distance each of the pair of organisms has moved is above a second threshold,
c. each of the pair has a velocity above a third threshold and
d. the pair of organisms has a trajectory correlation less than a fourth threshold.

US Pat. No. 10,430,532

BIDOMAIN SIMULATOR

The MathWorks, Inc., Nat...

1. A method performed by a computer device, the method comprising:interacting with one or more plots associated with a simulation of an executable graphical model,
the one or more plots being graphically displayed, and
the interacting being performed by the computer device;
detecting a selection of one or more target output points associated with the one or more plots based on a user interaction with a point on the graphically displayed one or more plots,
where the point is located within a particular distance from plotted data of the one or more plots, and
the detecting of the selection of the one or more target output points being performed by the computer device;
providing, via a graphical user interface, one or more system parameters, associated with the executable model, that are tunable,
the providing the one or more system parameters being performed by the computer device;
detecting a selection identifying one or more parameters, associated with the one or more plots, of the one or more system parameters,
the detecting the selection identifying the one or more parameters being performed by the computer device;
generating a parameter sensitivity for the one or more parameters,
the generating being performed by the computer device;
determining one or more tuning values for the one or more parameters based on the parameter sensitivity and based on the selected one or more target output points,
the determining being performed by the computer device; and
providing other plotted data, generated based on the one or more tuning values and the selected one or more target output points, for display via the graphical user interface,
the providing the other plotted data being performed by the computer device.

US Pat. No. 10,430,531

MODEL BASED SYSTEM MONITORING

UNITED TECHNOLOGIES CORPO...

1. A method comprising:configuring, in a processing system of a mechanical system, a predictive system model with a plurality of component models to correspond with a modeled state of a mechanical system, wherein the predictive system model is a reduced order model derived from one or more higher fidelity models of the mechanical system by removing higher order terms above second-order effects;
applying a set of perturbation inputs to one or more of the component models to produce a plurality of prediction results;
comparing the prediction results to a targeted mode of the mechanical system, the targeted mode defining a target/goal state to be achieved;
capturing, in a memory system of the processing system, a set of configuration parameters of the mechanical system in combination with one or more of the perturbation inputs that most closely results in the prediction results matching the targeted mode of the mechanical system, wherein associations between fault conditions of the mechanical system and the set of configuration parameters and perturbation inputs are captured in failure mode definitions to reproduce one or more faults; and
using the failure mode definitions to predict and detect one or more failure modes of the mechanical system in real-time through trends of sensor data relative to an observed history comprising prediction and detection of one or more parameters changing at a faster rate than expected as defined in the failure mode definitions.

US Pat. No. 10,430,530

DRILLING DATA VISUALIZATION METHOD

Schlumberger Technology C...

1. A method for generating a visual representation of wellbore drilling parameters during drilling operations to improve one or more of the drilling operations, comprising:representing a predetermined length of drilled wellbore as a segmented two dimensional shape, wherein one dimension of the shape corresponds to the predetermined length of drilled wellbore and the other dimension of the shape comprises segments that correspond to a plurality of values of different drilling parameters;
in a computer, during at least one of the drilling operations, receiving input values of the different drilling parameters;
during the at least one drilling operation, using the input values, plotting the segmented two dimensional shape in a visual representation to a display, wherein plotting the segmented two-dimensional shape comprises aligning the two-dimensional shape with respect to a coordinate value of a coordinate axis based on a selected segment boundary; and
during the at least one drilling operation, based on the visual representation, determining a response of the at least one drilling operation to improve one or more of the drilling operations.

US Pat. No. 10,430,529

DIRECTED DESIGN UPDATES IN ENGINEERING METHODS FOR SYSTEMS

MSC.SOFTWARE CORPORATION,...

1. A method of generating redesign recommendations over a computer aided engineering (CAE) program, comprising:providing one or more redesign recommendations via Artificial Intelligence (AI) implemented using a rule-based suggestion engine by:
identifying at least one difference between a first model and a second model, wherein the first model and the second model are simulated models;
updating a component hierarchical graph based on the at least one difference, the component hierarchical graph comprising a plurality of simulated components;
generating, using an inference engine of the rule-base suggestion engine, the one or more redesign recommendations for at least one of the plurality of simulated components in the component hierarchical graph based on the at least one difference; and
displaying, with a display generator, the one or more redesign recommendations to a user.

US Pat. No. 10,430,528

METHOD AND SYSTEM FOR MANAGING SPACE CONFIGURATIONS

SIGNIFY HOLDING B.V., Ei...

1. A system for managing sensors in a space configuration, comprising:a plurality of sensors incorporated into a space, at least one of the plurality of sensors providing a plurality of sensor pixel information of the space;
a processor:
receiving a plurality of sensor pixel information from respective selected ones of the plurality of sensors,
associating one or more of the sensor pixel information with a corresponding subspace of a plurality of subspaces of the space;
establishing a current configuration of the space associated with the corresponding subspaces, by mapping the received sensor pixel information associated with the corresponding subspace from the selected ones of plurality of sensors;
determining a center of gravity of motion within the space, using the plurality of sensor pixel information of the plurality of subspaces over a predetermined period of time, of the current configuration;
comparing the center of gravity of motion of the current configuration of the space with a center of gravity of motion within the space of a previous configuration of the space over a previous predetermined period of time;
determining whether a configuration change from the previous configuration of the space has occurred; and
adjusting a field of view of at least one of the selected ones of the plurality of sensors based on the configuration change.

US Pat. No. 10,430,527

SYSTEM AND METHOD FOR DESIGN AND DETAILING OF STEEL STRUCTURES

Design Data Corporation, ...

1. A method implemented by a computer program product which includes one or more computer readable storage media having encoded thereon computer executable instructions which, when executed upon one or more computer processors, performs a method for supplying modified data to a requesting application, the method comprising:identifying a point of connection between at least two steel members within the design of framing structure;
calculating the structural needs of the identified point of connection;
determining a first connection structure based on the calculated structural needs of the identified point of connection;
calculating one or more selectable parameters for the connection structure made between the two steel members using the first connection structure; wherein the selectable parameters comprise edge distance and cope criteria;
displaying one or more selectable parameters for the first connection structure;
receiving a first user selected parameter from the group of selectable parameters; wherein the first user selected parameter comprises an edge distance parameter; wherein the first user selected parameter is received from a user interface device to create a modified connection structure;
performing a first limit state calculation for the modified connection structure using the user selected edge distance parameter;
updating a cope criteria parameter to create an updated cope criteria parameter in response to the failed first limit state calculation, wherein the updated cope criteria parameter is calculated using output from the first limit state calculation;
performing a second limit state calculation for the modified connection structure using the user selected edge distance parameter and the system updated cope criteria parameter;
generating measurements for hole and weld sizes, plate thickness and bolt types for the modified connection structure using the user selected edge distance parameter and the system updated cope criteria parameter; and
generating material lists based on the user selected edge distance parameter and the system updated cope criteria parameter.

US Pat. No. 10,430,526

SYSTEMS AND METHODS FOR DISPLAYING IMPACT ANALYSIS DATA WHILE DESIGNING AN ARCHITECTURAL STRUCTURE

Safaira, Inc., New York,...

1. A method for displaying real-time impact analysis feedback of an architectural structure design, comprising:simultaneously displaying on a display screen:
a pictorial representation of a heating load of the architectural structure design;
a pictorial representation of a cooling load of the architectural structure design, wherein the heating load and the cooling load represent power or energy consumption required to heat and cool a structure represented by the architectural structure design for a period of time;
one or more building component contributors to the heating load and to the cooling load of the architectural structure design, the one or more building component contributors representing at least one of infiltration, required fresh air, roof conduction, wall conduction, floor conduction, appliances, north solar, glazing conduction, or lighting of the architectural structure design;
a pictorial representation of a first visual connector visually indicating an impact of each of the one or more building component contributors to the heating load of the architectural structure design; and
a pictorial representation of a second visual connector visually indicating an impact of each of the one or more building component contributors to the cooling load of the architectural structure design, wherein for at least one of the one or more building component contributors, the pictorial representation of the first visual connector is displayed adjacent to the pictorial representation of the second visual connector to provide a visual comparison between the impact to the heating load and the impact to the cooling load;
accepting input from a user, the input changing a parameter value of a building component contributor; and
in response to the input, simultaneously modifying, in real-time or near-real-time, the heating load representation and the cooling load representation on the display screen to reflect an impact of the change in the parameter value on the heating load and on the cooling load of the architectural structure design.

US Pat. No. 10,430,525

RECONFIGURABLE SPACES

Autodesk, Inc., San Rafa...

1. A method comprising:identifying, by a computer-aided design (CAD) system comprising at least one computer programmed to determine and suggest reconfigurable elements for a design, plan information relating to a space under evaluation;
identifying, by the CAD system comprising the at least one computer, constraints related to structures associated with the plan information, wherein identifying constraints includes identifying at least one physical constraint;
receiving, by the CAD system comprising the at least one computer, input regarding uses or elements to be included in a reconfigurable design for the space, wherein receiving the input includes receiving at least a first use and at least a second different use;
evaluating, by the CAD system comprising the at least one computer, a library of elements for inclusion in the space including determining one or more reconfigurable elements that satisfy the received input including the first use and the second different use, wherein each of the one or more reconfigurable elements has more than one structural configuration effecting more than one function in the space, and the evaluating is based at least in part on the plan information, the constraints and the input;
determining, by the CAD system comprising the at least one computer, a first configuration of a reconfigurable element of the one or more reconfigurable elements, in accordance with the first use received as part of the input and in accordance with one or more rules that define relationships between locations of elements in the space, including a first placement in a first design associated with the space and presenting the first design including the reconfigurable element in accordance with the first configuration; and
determining, by the CAD system comprising the at least one computer, a second different configuration of the reconfigurable element, in accordance with the second different use received as part of the input and in accordance with the one or more rules that define relationships between locations of elements in the space, including a second placement in a second different design associated with the same space and presenting the second different design including the reconfigurable element in accordance with the second different configuration, wherein the method further includes identifying one or more additional elements required to reconfigure the reconfigurable element into the first and second different configurations and adding the one or more additional elements into the first and second different designs, thereby forming the reconfigurable design for the space; and
wherein the presenting the first and second different designs includes presenting alternative designs as suggestions to a viewer including different configurations of the reconfigurable element.

US Pat. No. 10,430,524

CONSTRUCTING MULTI-ELEMENT FEATURES USING A 3D CAD SYSTEM

Dassault Systemes SolidWo...

1. A computer-implemented method for constructing a multi-element feature in a three-dimensional (3D) computer-aided design (CAD) model, the method comprising:selecting a first element and a second element to include in the multi-element feature;
creating a single sketch defining a shape of the multi-element feature, wherein:
the single sketch includes a set of sketch entities;
the first element is defined by a first subset of the sketch entities; and
the second element is defined by a second subset of the sketch entities;
adding to the set of sketch entities a connection entity, wherein the connection entity joins the first element and the second element;
creating in the single sketch a first subgroup corresponding to elements of the multi-element feature and a second subgroup corresponding to other elements of the multi-element feature, wherein:
the first subgroup contains the first subset of sketch entities and a third subset of sketch entities defining a third element; and
the second subgroup contains the second subset of sketch entities and a fourth subset of sketch entities defining a fourth element;
updating the sketch entities of the first subgroup and the sketch entities of the second subgroup independently;
joining the sketch entities of the first subgroup and the sketch entities of the second subgroup by implementing an up-to-next element end condition; and
constructing the multi-element feature in the 3D CAD model by applying a modeling operation to the single sketch.

US Pat. No. 10,430,520

METHODS AND SYSTEMS FOR GENERATION OF A TRANSLATABLE SENTENCE SYNTAX IN A SOCIAL NETWORKING SYSTEM

FACEBOOK, INC., Menlo Pa...

1. A method, comprising:accessing a part of a social graph, wherein the part of the social graph comprises an actor node and a target node corresponding to actor and target entities respectively within a social networking system and an edge connecting the actor and target nodes corresponding to an action or relationship between the actor and target entities; and
generating an internationalized sentence syntax representing an expression of the action or relationship comprising:
an actor element corresponding to the actor node;
a target element corresponding to the target node;
an edge element corresponding to the edge connecting the actor and target nodes; and
a token structure that includes one or more tokens identifying one or more social graph attributes, the one or more social graph attributes related to the actor element, the target element, the edge element or to an intended viewer of the expression of the action or relationship;
wherein one of the one or more tokens is associated with the actor element of the internationalized sentence syntax and identifies a gender as the corresponding social graph attribute;
generating an expression of the action or relationship into an output language from the internationalized sentence syntax by:
identifying one or more edges or nodes of the social graph that correspond to the actor element, the target element and the edge element;
matching each of the one or more tokens in the token structure of the internationalized sentence syntax with an attribute of the identified edges or nodes; and
generating the expression of the action or relationship in the output language based on the identified nodes, edges and attributes;
wherein identifying one or more attributes comprises identifying a gender value associated with a node of the social graph; and
wherein the generating the expression of the action or relationship in the output language is based on the identified gender value.

US Pat. No. 10,430,519

DETERMINING THE USER'S CURRENT PREFERRED MANNER IN COMMUNICATING WITH USER

International Business Ma...

1. A computer program product for suggesting a preferred manner in communicating with a user, the computer program product comprising a non-transitory computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for: determining a user-indicated preferred manner in communicating with said user from a social networking profile of said user; monitoring communications with said user from a plurality of other users and responses thereto, wherein said communications comprise phone calls, electronic mail messages, instant messages, short message service messages and social network posts; creating a communication history storing said monitored communications and responses thereto in response to a number of said monitored communications reaching a threshold, wherein said threshold comprises one of the following: a threshold number of communications, a threshold number of people have contacted said user, and a threshold number of people have contacted said user via one or more communication methods; analyzing said communication history to determine a preferred manner in communicating with said user based on types of said communications and responses thereto, times of said communications and responses thereto, urgency of said communications and responses thereto, topics of said communications and responses thereto, a frequency of said communications and responses thereto, a schedule of said user at a time of said responses and user availability at said time of said responses;determining whether said determined preferred manner in communicating with said user matches said user-indicated preferred manner in communicating with said user; and
informing said user that said determined preferred manner in communicating with said user does not match said user-indicated preferred manner in communicating with said user and providing said user an opportunity for said user to change said user-indicated preferred manner in communicating with said user by updating said social networking profile in response to determining that said determined preferred manner in communicating with said user does not match said user-indicated preferred manner in communicating with said user thereby allowing said user to avoid potential interruptions, increase productivity of said user as well as to address matters appropriately.

US Pat. No. 10,430,518

WORD VECTOR PROCESSING FOR FOREIGN LANGUAGES

Alibaba Group Holding Lim...

1. A word vector processing method, comprising:performing word segmentation on a corpus to obtain words;
determining n-gram strokes corresponding to the words, the n-gram stroke representing n successive strokes of a corresponding word;
initializing word vectors of the words and stroke vectors of the n-gram strokes corresponding to the words; and
after performing the word segmentation, determining the n-gram strokes, and initializing the word vectors and stroke vectors, training the word vectors and the stroke vectors,
wherein the training the word vectors and the stroke vectors comprises:
determining a designated word in the corpus, and one or more context words of the designated word in the corpus;
determining a degree of similarity between the designated word and the context word according to stroke vectors of n-gram strokes corresponding to the designated word as well as a word vector of the context word;
selecting one or more words from the words as a negative sample word;
determining a degree of similarity between the designated word and each negative sample word;
determining a loss characterization value corresponding to the designated word according to a designated loss function, the degree of similarity between the designated word and the context word, and the degree of similarity between the designated word and each negative sample word; and
updating the word vector of the context word and the stroke vectors of the n-gram strokes corresponding to the designated word according to the loss characterization value.

US Pat. No. 10,430,517

APPARATUS, SYSTEM AND METHOD FOR PROVIDING AN AGENT THAT INTELLIGENTLY SOLVES INFORMATION TECHNOLOGY ISSUES

General Electric Company,...

1. An artificially intelligent (AI) agent capable of assisting an information technology (IT) personnel in addressing an IT ticket, the AI agent comprising non-transitory computing code, the AI agent configured to:receive, by a visualization interface, dialog from the IT personnel related to the IT ticket;
translate the received dialog to a machine language translation;
compare the machine language translation to a plurality of prospective solutions for IT issues, select a subset of the plurality of prospective solutions deemed most relevant to the IT ticket and return the subset to the visualization interface; and
receive explicit and implied feedback from the IT personal regarding the machine language translation and the subset, wherein a selection of the subset varies upon subsequently received dialog according to the feedback.

US Pat. No. 10,430,515

ELECTRONIC DOCUMENT SIGNATURES AND SIGNATURE RETRIEVAL INVOLVING MOBILE COMMUNICATION DEVICE

INTUIT INC., Mountain Vi...

1. A computer-implemented method for requesting and acquiring a signature of a first taxpayer for a first electronic tax return and a signature of a second taxpayer for a second electronic tax return, the method comprising:a computing device of a preparer of the electronic tax returns, utilized to prepare the first electronic tax return for the first taxpayer and the second electronic tax return for the second taxpayer with a tax preparation application and in communication through a first network with a first mobile communication device of the first taxpayer, in communication through a second network with a second mobile communication device of the second taxpayer and in communication through a third network with an electronic filing server, the preparer's computing device transmitting a first electronic message to the first mobile communication device of the first taxpayer requesting the first taxpayer to sign the first electronic tax return, the first electronic message comprising:
the first electronic tax return attached to the first electronic message, and
a first hyperlink within the first electronic message;
transmitting, from the computing device of the preparer, a second electronic message to the second mobile communication device of the second taxpayer requesting the second taxpayer to sign the second electronic tax return, the second electronic message comprising:
the second electronic tax return attached to the second electronic message, and
a second hyperlink within the second electronic message,
wherein the first hyperlink is selected or clicked by the first taxpayer to download the application to the first mobile communication device, the second hyperlink is selected or clicked by the second taxpayer to download the application to the second mobile communication device, the application being executed by the first and second mobile communication devices, wherein the application displays a first signature field on a first screen of the first mobile communication device, the first signature field capturing a first signature by the first taxpayer contacting the first screen, the first signature being incorporated into the first electronic tax return, and the application displays a second signature field on a second screen of the second mobile communication device, the second signature filed capturing a second signature by the second taxpayer contacting the second screen, the second signature being incorporated into the second electronic tax return;
the preparer's computing device receiving a third electronic message from the first mobile communication device of the first taxpayer at the preparer's computer in response to the first electronic message, the third electronic message comprising the first electronic tax return incorporating the signature of the first taxpayer;
the preparer's computing device receiving a fourth electronic message from the second mobile communication device of the second taxpayer at the preparer's computer in response to the second electronic message, the fourth electronic message comprising the second electronic tax return incorporating the signature of the second taxpayer;
the preparer's computing device transmitting a fifth electronic message including the first electronic tax return incorporating the signature of the first taxpayer to the electronic filing server in communication with a computer of a tax authority for electronic filing of the first electronic tax return incorporating the signature of the first taxpayer with the tax authority;
the preparer's computing device updating a status table indicating the first electronic tax return incorporating the signature of the first taxpayer was transmitted to the electronic filing server;
the preparer's computing device transmitting a sixth electronic message including the second electronic tax return incorporating the signature of the second taxpayer to the electronic filing server; and
the preparer's computing device updating the status table indicating the second electronic tax return incorporating the signature of the taxpayer was transmitted to the electronic filing server.

US Pat. No. 10,430,514

METHOD AND TERMINAL FOR EXTRACTING WEBPAGE CONTENT, AND NON-TRANSITORY STORAGE MEDIUM

TENCENT TECHNOLOGY (SHENZ...

1. A method for extracting webpage content performed at a terminal having one or more processors and a memory for storing programs to be executed by the processors, the method comprising:responding to a webpage browsing instruction triggered on a browser by a mobile client to obtain a corresponding webpage;
detecting whether an existing predetermined rule within a script code on the terminal for extracting a plug-in resource that corresponds to a predetermined type tag is updated to facilitate dynamic configuration of the existing predetermined rule by a background server;
at a time when the existing predetermined rule for extracting a plug-in resource that corresponds to a predetermined type tag is updated, obtaining an updated predetermined rule from the background server of the browser, the updated predetermined rule including a regular expression rule;
after obtaining the updated predetermined rule, parsing the webpage to obtain a document object model (DOM) node of a tag in a webpage script;
obtaining a plug-in tag node from the DOM node;
when a plug-in tag corresponding to the plug-in tag node is a predetermined type tag, extracting a plug-in resource that corresponds to the plug-in tag;
when the plug-in tag corresponding to the plug-in tag node is not the predetermined type tag, matching a plug-in resource that corresponds to the predetermined type tag of the webpage script by using the updated predetermined rule; and
after the matching succeeds, extracting the plug-in resource that corresponds to the predetermined type tag from the webpage script.

US Pat. No. 10,430,513

AUTOMATED PERSONALIZED ELECTRONIC MESSAGE COMPOSITION

OATH INC., New York, NY ...

1. A method comprising:training, by an electronic messaging computing device, a message classifier using a corpus of messages and machine learning;
retrieving, by the electronic messaging computing device and from a data store of a user, a plurality of messages of the user;
assigning, by the electronic messaging computing device and using the message classifier, each message of a plurality of messages of the user to a category of a plurality of categories of electronic messages, the assigning comprising using the each message's features and the message classifier to assign the each message to one category of the plurality of categories;
determining, by the electronic messaging computing device and for a category of the plurality of categories, a composition style for the user, the determining comprising determining the user's composition style for the category using a number of messages, of the plurality of messages of the user, assigned to the category;
obtaining, by the electronic messaging computing device and for the category of the plurality of categories, multiple non-personalized messages of multiple users;
generating, by the electronic messaging computing device and for the user of an electronic messaging system, a number of personalized messages for the category of the plurality of categories, each personalized message being generated by modifying a non-personalized message, of the multiple non-personalized messages of the multiple users, using the user's determined composition style for the category; and
providing, by the electronic messaging computing device and for the user of the electronic messaging system, the number of personalized messages generated using the user's composition style determined for the category of the plurality of categories, each personalized message, of the number, being selectable by the user for modification by the user.

US Pat. No. 10,430,512

METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR FORMATTING MESSAGES IN A MESSAGING USER INTERFACE WITHIN A GROUP-BASED COMMUNICATION SYSTEM

Slack Technologies, Inc.,...

1. An apparatus configured for parsing and formatting a message in a group-based communication interface, the apparatus comprising at least one processor and at least one non-transitory memory including program code, and a display device, wherein the at least one non-transitory memory and the program code are configured to, with the processor, cause the apparatus to at least:receive an input string generated through user engagement of the group-based communication interface, wherein the input string is associated with a formatted message;
parse the input string to identify a structured format trigger, wherein the structured format trigger indicates a structured format for the formatted message; and
apply the structured format to the input string to generate a structured message object for rendering to the group-based communication interface, wherein the structured format comprises a graphical representation of the formatted message;
display the structured message object in the group-based communication interface using the display device;
parse the structured message object to extract a plain text message object; and
transmit the plain text message object to a group-based communication server for storage by a group-based communication system.

US Pat. No. 10,430,511

METHODS AND SYSTEMS FOR GENERATING APPLICATION PROGRAMMING INTERFACES

Wolfram Research, Inc., ...

1. A method for generating an application programming interface (API), the method comprising:receiving, at one or more computers, programmer input in a programming language, the programmer input including i) first specification data specifying one or more parameters to be passed to an API, and ii) second specification data that specifies a function to be performed by the API;
evaluating, at one or more computers, the programmer input to generate an API object that is configured to, when executed, perform the specified function using the one or more parameters, wherein evaluating the programmer input includes evaluating the first specification data to generate the API object such that the API object is configured to receive the one or more parameters; and
storing the API object in a memory device of, or communicatively coupled to, the one or more computers.

US Pat. No. 10,430,510

METHOD FOR CONTROLLING ACCESS TO ELECTRONIC DOCUMENTS BASED ON STATELESS COMMUNICATION

SAP SE, Walldorf (DE)

1. A telecommunication method for controlling data access to a telecommunication server, the telecommunication server connected to at least one client terminal via at least a first telecommunication network, the telecommunication server configured to communicate with the client terminal via a stateless protocol, the client terminal being a battery powered device, the method comprising:a) providing, by the telecommunication server, an electronic document having a plurality of input fields for entry of a set of user data to the client terminal via the first telecommunication network;
b) storing, by the telecommunication server, a status parameter in association with the electronic document, the status parameter having one of a first value, a second value, or a third value, the first value indicating a first state of the electronic document in which the electronic document does not contain user data, the second value indicating a second state of the electronic document in which the electronic document is filled with the set of user data, the third value indicating a third state of the electronic document in which the electronic document is being requested for modifying at least part of the set of user data;
c) receiving, by the telecommunication server, a request from the client terminal to access the electronic document;
d) setting, by the telecommunication server, the status parameter to the first value in response to determining the received request is a first request to access the electronic document;
e) in response to determining that the status parameter has the first value,
creating, by the telecommunication server, an initial draft document including content of the electronic document in response to determining the initial draft document has not been created,
assigning, by the telecommunication server, a first identification address to the initial draft document for accessing the initial draft document, in response to determining the first identification address has not been assigned to the initial draft document,
displaying, by the client terminal, the initial draft document on the client terminal,
receiving, by the telecommunication server, user data from the client terminal, and
saving the received user data in the initial draft document;
in response to determining, by the telecommunication server, that the set of user data has been completely received,
setting, by the telecommunication server, the status parameter to the second value,
copying, by the telecommunication server, the initial draft document into the electronic document,
assigning, by the telecommunication server, a second identification address to the electronic document, for accessing the electronic document via the first telecommunication network, and
deleting the initial draft document;
f) in response to determining that the status parameter has the second value or the third value,
creating, by the telecommunication server, an edit draft copy of the electronic document in response to determining the edit draft copy has not been created,
assigning, by the telecommunication server, a third identification address to the edit draft copy for accessing the edit draft copy, in response to determining the third identification address has not been assigned to the edit draft copy,
setting the status parameter to the third value in response to determining the status parameter has the second value,
displaying, by the client terminal, the edit draft copy on the client terminal,
receiving, by the telecommunication server, modifications to the set of user data from the client terminal, and
modifying, by the telecommunication server, the edit draft copy using the received modifications, and
in response to receiving a save modification request from the client terminal,
setting, by the telecommunication server, the status parameter to the second value,
copying, by the telecommunication server, the edit draft copy into the electronic document, and
deleting, by the telecommunication server, the edit draft copy; and
g) repeating each of the operations c)-f) in one or more consecutive communication sessions between the client terminal and the telecommunication server using at least one of the first, second and third identification addresses,
wherein the first, second, and third identification addresses are generated in accordance with a communication protocol of the first telecommunication network that is used by the client terminal,
each of the first, second, and third identification addresses is one of an IP address or a media access control (MAC) address, and
the first, second, third values are different from each other, and the first, second, third identification addresses are different from each other.

US Pat. No. 10,430,509

NOTE BROWSER

Dropbox, Inc., San Franc...

1. a computer implemented method of displaying shared notes, comprising:receiving, in a note browser on a client device from a remote note sharing system, a plurality of notes, each note including a separate content item created by an author, a time the note was created, and a creation location at which the author was located when the note was created;
for each note, mapping the creation location to a nearest major location marker, the mapping comprising:
determining location coordinates of the creation location;
accessing a database with location coordinates for each major location marker; and
determining a nearest major location marker to the creation location having a shortest distance between the location coordinates for the nearest location marker and the location coordinates of the creation location:
grouping the plurality of notes by the major location markers, wherein for each of a plurality of the major location markers, there is a corresponding location group comprising at least one note mapped to the major location marker;
ordering the location groups based on ordering criteria; and
displaying the plurality of notes in the note browser in the ordered location groups such that notes in a same location group are displayed together, the plurality of notes displayed in conjunction with an identifier of the major location marker of the corresponding location group.

US Pat. No. 10,430,508

SYSTEM AND METHOD FOR ANALYZING AND DEDUCING CRITERIA-RELATED CONTENT FOR EVALUATION

International Business Ma...

1. A computer-implemented method for analyzing and deducing criteria-related content for evaluation via a criteria deduction system executing on a hardware processor, the criteria deduction system being associated with a question/answer (QA) system capable of answering questions, comprising:receiving an input corpus to the criteria deduction system via a network, the input corpus comprising a plurality of guidelines, each of the plurality of guidelines comprising criteria, the criteria comprising principles related to each of the plurality of guidelines and the criteria comprises a treatment rule related to a prospective medical treatment;
processing criteria text from the plurality of guidelines to identify the criteria, the processing performed by the QA system capable of answering questions;
analyzing, via the criteria deduction system, the criteria text to identify a set of criteria-related content associated with the criteria, the criteria-related content comprising content that skews scoring and evaluation of the criteria when the QA system is answering a question using the criteria;
processing, via the criteria deduction system, the set of criteria-related content to determine a relationship of the criteria to an associated guideline;
annotating, via the criteria deduction system, the set of criteria-related content according to the determined relationship, wherein the annotation compromises ignored content to identify content to be excluded from an evaluation of the prospective medical treatment; and augmentation content to adjust the evaluation of the prospective medical treatment; and
using the set of criteria-related content in accordance with its annotation when processing the criteria for the evaluation; and wherein,
the set of criteria-related content is in proximity of an associated criterion in the criteria text; and,
the set of criteria-related content is identified by a trigger associated with the criteria, the trigger comprising a key characteristic trigger, the key characteristic trigger serving as a point of reference without user intervention to identify an associated set of criteria-related content.

US Pat. No. 10,430,507

REPORT CREATING SUPPORT APPARATUS, METHOD FOR THE SAME, AND COMPUTER-READABLE STORAGE MEDIUM

CANON KABUSHIKI KAISHA, ...

1. An imaging diagnosis report creating support apparatus comprising:one or more processors; and
one or more memories coupled to the one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the report creating support apparatus to:
cause a display unit to display a plurality of evaluation values for an evaluation item associated with an imaging diagnosis target, wherein the plurality of evaluation values are arranged in order in accordance with a state of the imaging diagnosis target, and the evaluation item is an item related to an imaging finding;
in a case where a mouse cursor is moved to a position at one of the displayed evaluation values, determine a number of the evaluation values to display adjacent to an indicated evaluation value at the position of the mouse cursor;
while the mouse cursor is at the position of the indicated evaluation value, obtain a subset of evaluation values from the displayed evaluation values adjacent to the indicated evaluation value based on the determined number, and cause the display unit to display in a popup, based on the obtaining, the subset of evaluation values and the indicated evaluation value, and wherein a graphic illustrates a criterion for the indicated evaluation value in the popup and a graphic illustrates a criterion for the displayed subset of evaluation values adjacent to the indicated evaluation value in the popup, in such a manner that the popup is displayed at the position of the mouse cursor; and
in a case where one of the subset of evaluation values or indicated evaluation value is selected in the popup or display by clicking, store, as an imaging diagnosis report for the imaging diagnosis target, the selected evaluation value for the item in the one or more memories.

US Pat. No. 10,430,506

UTILIZING CLASSIFICATION AND TEXT ANALYTICS FOR ANNOTATING DOCUMENTS TO ALLOW QUICK SCANNING

INTERNATIONAL BUSINESS MA...

1. A system for annotating a document stored on a non-transitory computer readable storage medium of a computer comprising:a classifier executed by the computer, wherein the classifier:
(i) determines a type of the document, wherein the type of document is a format within which the document is written;
(ii) determines a subject domain of the document, wherein the subject domain is a field, topic or genre of content set forth in the document; and
(iii) segments the document into one or more paragraphs and sections based on the document's structure;
(b) an annotation model, executed by the computer, with information to determine and drive an annotation strategy based on the type of the document, wherein the annotation strategy specifies one or more annotations to utilize and a location in the document's original text and on a margin of the document for the one or more annotations;
(c) a text analytics system, executed by the computer, wherein the subject domain determines which domain model to load into the text analytics system and the domain model identifies terms, phrases, entities, and concepts of the subject domain to be annotated in the document, and wherein the text analytics system:
(i) provides the one or more annotations in the document's original text and on the margin of the document for the paragraphs of the document based on the domain model and the annotation model, wherein the one or more annotations comprise domain-specific keywords and concepts; and
(ii) aggregates the one or more annotations in the margin of the document for the paragraphs of the document into one or more section-level aggregated annotations for the sections of the document based on the annotation model; and
(d) a custom viewer/renderer application, executed by the computer, that annotates the document with the one or more annotations in the document's original text and on the margin of the document for the paragraphs, and with the one or more section-level aggregated annotations for the sections of the document, and renders the document including the one or more annotations and the one or more section-level aggregated annotations.

US Pat. No. 10,430,505

FACILITATING MODIFICATION OF AN EXTRACTED FIELD

Splunk, Inc., San Franci...

1. A method, comprising:receiving a first selection associated with an event of a plurality of events, wherein each event in the plurality of events includes a portion of raw data, and wherein the first selection is of a portion of text within the raw data of the event to be extracted as a value of a field;
automatically determining an extraction rule that extracts the selected portion of text as the value of the field; and
causing display of an interface to allow user modification of a representation of the value.

US Pat. No. 10,430,503

ELECTRONIC DISPLAY CONTENT FITTING

Lenovo (Singapore) Pte. L...

1. A device, comprising: a display device;a processor operatively coupled to a receiver; and
a memory comprising instructions that are executed by the processor to:
analyze a received communication comprising one or more words to identify text characters;
identify a non-synonym shortened representation for display of one or more of the text characters, wherein the shortened representation is selected based on display size and is identified based upon a shortening technique provided by a user and wherein the shortening technique corresponds a content type of the text characters, wherein the shortened representation comprises selectively resized portions of the one or more text characters to a smaller font size;
shorten the one or more of the text characters using the shortened representation; and
output display data including the shortened representation to the display device.

US Pat. No. 10,430,502

SYSTEMS AND METHODS FOR HOSTED APPLICATIONS

SweetLabs, Inc., San Die...

1. A computing device comprising:a processor and storage, where an operating system is installed on the computing device that configures the processor to create a computing environment;
an application platform application stored in the storage of the computing device, where the application platform application comprises:
a rendering engine layer; and
an integration layer; and
at least one hosted application comprising a background page file including instructions;
wherein the rendering engine layer is configured to parse the instructions contained within the background page file to configure the processor to:
retrieve at least one text file;
build a document object model (DOM) based on the at least one text file; and
modify the DOM based on the computing environment;
wherein the rendering engine layer is configured to render a user interface page integrated into the computing environment of the operating system of the computing device based on the modified DOM;
wherein the integration layer is configured to integrate the user interface page with functionalities of the computing device.

US Pat. No. 10,430,501

MAPPING OF DOCUMENTS WITH GLOBAL TAGGING MAP

International Business Ma...

1. A method comprising:applying, by one or more processor, tags to a first document using a tagging map; and
applying, by the one or more processor, tags to a second document using the tagging map, wherein the tagging map is a custom tagging map provided based on user defined one or more input, wherein the user defined one or more input is received using a user interface that presents a graphical representation of the tagging map and which allows the user to perform one or more of the following selected from the group consisting of (a) adding a node to the tagging map; (b) subtracting a node from the tagging map; (c) specifying a description of a node of the tagging map, and (d) specifying a hierarchical relationship between nodes of the tagging map, wherein the graphical representation of the tagging map includes a plurality of nodes that have descriptions and wherein a hierarchical relationship between first and second nodes of the plurality of nodes is represented in the graphical representation of the tagging map, wherein the user interface allows the user to perform each of the following (a) adding a node to the tagging map; (b) subtracting a node from the tagging map; (c) specifying a description of a node of the tagging map and (d) specifying a hierarchical relationship between tagging map nodes, and wherein the applying tags to a first document using a tagging map includes applying tags to the first document based on user specified one or more input, wherein the user specified one or more input is received using a displayed user interface that presents a graphical representation of the tagging map and that presents in different areas of the displayed user interface first and second text segments of the first document parsed from the first document and wherein the displayed user interface allows the user to select each of the first and second texts segments and to specify a belonging of the first and second text segments to a selected one of the first node or the second node of the tagging map using the graphical representation which represents the hierarchical relationship between the first node and the second node, wherein the method includes associating each of the first and second text segments to one of the first node or the second node based on a belonging specified by the user, and wherein the first node and the second node include text descriptions, wherein the method includes generating an output document using the tagging map, wherein the generating includes using the tagging map so that text of the text descriptions of the first node and second node are included in the output document according to an order that is based on a hierarchy of the hierarchical relationship between the first node and the second node.

US Pat. No. 10,430,500

DETECTING AND ANIMATING A CHANGE IN POSITION OF A VISUAL LAYOUT NODE OF A VISUAL LAYOUT TREE

INTENTIONAL SOFTWARE CORP...

1. A method in a computing device, the method comprising:providing a first version of a visual layout tree that represents a document, wherein a first visual layout handle of the first version of the visual layout tree includes a reference to a child visual layout node, a back reference to a parent visual layout node of that child visual layout node, and positioning information indicating a start position of content corresponding to the child visual layout node within a coordinate space of the parent visual layout node, wherein the child visual layout node has a back reference to the first visual layout handle;
in response to a change in the document, generating a second visual layout handle for a second version of the visual layout tree that includes a reference to the child visual layout node and positioning information of a destination position;
detecting that the back reference of the child visual layout node references the first visual layout handle in the second version of the visual layout tree;
generating positioning information along a path of intermediate positions from the start position to the destination position;
setting the back reference of the child visual layout node to point to the second visual layout handle and setting the second visual layout handle to indicate animation is in progress; and
animating a movement of the content corresponding to the child visual layout node from the start position to the destination position by generating successive renderings of the content using the second visual layout handle and the positioning information along the path of intermediate positions from the start position to the destination position.