US Pat. No. 10,366,322

SYSTEM AND METHOD FOR COMPACT AND EFFICIENT SPARSE NEURAL NETWORKS

DeepCube Ltd., Tel Aviv ...

1. A method for efficiently storing a sparse neural network, the method comprising:obtaining a sparse neural network of a plurality of weights, each weight representing a unique connection between a pair of a plurality of artificial neurons in different layers of a plurality of neuron layers, wherein the sparse neural network comprises at least one hidden layer, wherein a minority of pairs of neurons in adjacent neuron layers are connected by weights in the sparse neural network; and
storing each of the plurality of weights of the sparse neural network with an association to a unique index, the unique index uniquely identifying a pair of artificial neurons that have a connection represented by the weight, wherein only non-zero weights are stored that represent connections between pairs of neurons and zero weights are not stored that represent no connections between pairs of neurons.

US Pat. No. 10,366,321

RFIC DEVICE AND METHOD FOR MANUFACTURING RESIN MOLDED BODY INCLUDING RFIC DEVICE

MURATA MANUFACTURING CO.,...

1. A resin molded body, comprising:a radio frequency integrated circuit (RFIC) device including:
a resin block having a first surface, a second surface facing the first surface, and a through-hole extending through the first and second surfaces;
an RFIC element embedded in the resin block;
a coil antenna disposed in the resin block and connected to the RFIC element, wherein the coil antenna has a coil axis that extends from the first surface to the second surface and the through-hole extends inside the coil antenna; and
a molding resin that continuously covers the RFIC device and fills the through-hole of the RFIC device,
wherein the RFIC element is disposed in the resin block and inside the coil antenna disposed in the resin block.

US Pat. No. 10,366,320

DUAL-INTERFACE IC CARD

NXP B.V., Eindhoven (NL)...

1. A dual-interface card comprising:a card body containing an antenna, the antenna having first and second antenna connections; and
a dual-interface integrated circuit card module comprising:
a substrate having first and second opposing surfaces;
a contact area on the first surface of the substrate, the contact area comprising a plurality of contact pads and first and second routing connections each having a first end and a second end;
an integrated circuit on the second surface of the substrate;
electrical connections through the substrate connecting the integrated circuit to the plurality of contact pads and to the first end of each of the first and second routing connections;
first and second antenna connectors disposed in respective first and second holes in the substrate and in electrical contact with the second end of the respective first and second routing connections, the antenna connectors comprising solder; and
a first metal plug placed across the first hole on the second surface of the substrate and a second metal plug placed across the second hole on the second surface of the substrate;
wherein the first and second antenna connectors of the card module are electrically connected to the first and second antenna connections of the card body.

US Pat. No. 10,366,319

MOUNTING BRACKET APPARATUS TO AMPLIFY ELECTROMAGNETIC FIELD STRENGTHS ASSOCIATED WITH MOUNTABLE RFID

FISHER CONTROLS INTERNATI...

1. An apparatus, comprising:a mounting bracket having a central portion, a first field amplification arm extending from the central portion in a first direction, a second field amplification arm extending from the central portion in a second direction different from the first direction, and a mounting arm extending from the central portion in a third direction different from the first direction and the second direction; and
a radio frequency identification (RFID) tag mounted to the central portion of the mounting bracket;
wherein the first field amplification arm and the second field amplification arm are to at least one of:
amplify an electromagnetic field associated with the RFID tag; or
increase a communication range associated with the RFID tag.

US Pat. No. 10,366,318

MICRO RFID TAG WITH CONDUCTIVE INTERFACE

1. A micro radio frequency identification tag for use on an article in an equipment identification and tracking system, the micro radio frequency identification tag comprising:a substrate having a first surface and a second surface, each one of said surfaces including a width, and a longitudinal length, said longitudinal length being greater than said width;
an RFID chip operatively retained on the first surface by an anchor;
a power storage means, comprising at least a pair of capacitors operatively retained on the first surface, said capacitors symmetrically spaced from said RFID chip;
an antenna operatively retained on the second surface and extending along said longitudinal length of said second surface, the antenna also acting as a communication layer; and
a conductive means extending between the first surface and the second surface to operatively connect the antenna to the RFID chip and the power storage means.

US Pat. No. 10,366,317

METHOD AND SYSTEM FOR PREVENTING FORGERY

1. A method for securing an object from forgery, comprising the steps:supplying a seal element having an antenna structure;
supplying an object to be secured;
supplying at least one coupling elements arranged at the object or arrangeable at the object;
arranging the seal element and, where applicable, the at least one coupling element at the object such that a relative arrangement of the antenna structure to the at least one coupling element at the object is fixed;
measuring the value of the oscillating circuit parameter of the antenna structure arranged at the object relative to the at least one coupling element by means of a measuring apparatus; and
associating the measured value with the object having the seal element arranged thereto as an authentication feature of the object;
wherein the coupling element is provided and suitable to influence a value of an oscillating circuit parameter of the antenna structure when the antenna structure is arranged relative to the at least one coupling element at the object, and by the arranging, the value of the oscillating circuit parameter of the antenna structure arranged at the object is defined in dependence on the fixed relative arrangement.

US Pat. No. 10,366,316

CONDUCTIVE LOOP DETECTION MEMBER

3M Innovative Properties ...

1. A component, comprising:a detection member comprising at least one closed continuously electrically conductive loop having at least two spatially separate sections; and
one or more engagement features configured to reversibly engage with a host device, the engagement features configured to locate the closed continuously electrically conductive loop relative to a reader of the host device so that at least one section of the closed conductive loop is in position to be electromagnetically excited by a signal emitted by the reader and the reader is in position to sense a predetermined magnetic response of at least one other section of the closed electrically conductive loop, the predetermined magnetic response of the at least one other section of the at least two spatially separate sections corresponding to at least a one digit code.

US Pat. No. 10,366,314

PROTECTING PRIVATE INFORMATION PROVIDED ON A TRANSACTION CARD AND/OR A DOCUMENT WITH A REFLECTIVE ELEMENT

Capital One Services, LLC...

1. A transaction card, comprising:a card body,
a surface of the card body including a first portion that includes private information; and
a reflective element,
the reflective element enabling the reflective element to reflect light away from the private information,
the reflective element being applied to a second portion of the surface,
the second portion being separated from the first portion by a distance that is determined based on at least one of:
a size of the reflective element,
a size of the private information,
a size of the surface, or
expected light to be reflected by the reflective element, and
the reflective element to preclude obtaining an image of the private information.

US Pat. No. 10,366,313

ACTIVATION LAYERS FOR DEEP LEARNING NETWORKS

A9.COM, INC., Palo Alto,...

4. A computer-implemented method, comprising:training a convolutional neural network using a set of a training data, the training data including instances of data objects with determined classifications;
receiving a query;
processing the query using the trained convolutional neural network to determine a classification of a data segment represented in the query, the trained convolutional neural network containing at least one convolutional layer and at least one activation layer, the at least one activation layer including a generalized linear unit (GLU), the GLU having three parameters including a first slope in a positive region, a second slope in a negative region, and an offset applied to the first slope and the second slope, the three parameters learnable over at least one input channel;
determining a set of data segments corresponding to the classification; and
providing, to a client device, information for at least a subset of the set of data segments.

US Pat. No. 10,366,312

PATTERN RECOGNITION DEVICE, PATTERN RECOGNITION METHOD, AND COMPUTER PROGRAM PRODUCT

KABUSHIKI KAISHA TOSHIBA,...

1. A pattern recognition device that recognizes a pattern of an input signal by converting the input signal to a feature vector and matching the feature vector with a recognition dictionary, whereinthe recognition dictionary includes a dictionary subspace basis vector for expressing a dictionary subspace which is a subspace of a space of the feature vector, and a plurality of probability parameters for converting similarity calculated from the feature vector and the dictionary subspace into likelihood,
the device comprising:
processing circuitry configured to function as a recognition unit configured to calculate the similarity using a quadratic polynomial of a value of an inner product of the feature vector and the dictionary subspace basis vector, and calculate the likelihood using the similarity and an exponential function of a linear sum of the probability parameters, wherein
the recognition dictionary is trained by using an expectation maximization method using a constraint condition between the probability parameters.

US Pat. No. 10,366,311

ADJUSTING TRAINING SET COMBINATION BASED ON CLASSIFICATION ACCURACY

Capital One Services, LLC...

1. A system comprising:one or more computing devices, wherein the one or more computing devices comprises:
a memory to store instructions; and
processing circuitry, coupled with the memory, operable to execute the instructions, that when executed, cause the processing circuitry to:
access or receive a plurality of samples associated with one or more classes of a classification model;
generate at least one training batch, wherein the at least one training batch includes the plurality of samples associated with the one or more classes;
train the classification model for a number of iterations using the at least one training batch;
determine an accuracy of each class based on the training;
determine whether the accuracy of each of the one or more classes meets or exceeds an accuracy threshold value;
increase a number of the samples associated with the one or more classes having accuracies that fall below the accuracy threshold value in order to generate an adjusted training batch; and
train the classification model for a subsequent number of iterations using the adjusted training batch.

US Pat. No. 10,366,310

ENHANCED CAMERA OBJECT DETECTION FOR AUTOMATED VEHICLES

Aptiv Technologies Limite...

1. An object detection system, comprising:a camera having a field of view, the camera providing an output comprising information regarding potential objects within the field of view; and
a processor that is configured to select a portion of the camera output based on information from at least one other type of detector that indicates a potential object in the selected portion, the processor being configured to ignore other portions of the camera output that, based on the information from the at least one other type of detector, do not include a potential object, the processor determining an Objectness of the selected portion based on information in the camera output regarding the selected portion.

US Pat. No. 10,366,309

IMAGE QUALITY ASSESSMENT AND IMPROVEMENT FOR PERFORMING OPTICAL CHARACTER RECOGNITION

Intuit Inc., Mountain Vi...

1. A computer-implemented method for identifying information in an electronic document, comprising:obtaining a reference image of the electronic document;
distorting the reference image by adjusting parameter values for a plurality of sets of parameters associated with a quality of the reference image to generate a plurality of distorted images;
for each respective distorted image of the plurality of distorted images:
analyzing the distorted image to attempt to detect a first set of parameters from the plurality of sets of parameters and corresponding parameter values used to generate the distorted image; and
determining an accuracy of detection of the first set of parameters and the corresponding parameter values used to generate the distorted image, the determining including:
comparing each detected parameter determined as a result of the analyzing the distorted image with the first set of parameters used for generating the distorted image; and
determining the accuracy of detection based on the comparing;
obtaining a second image of the electronic document;
determining, based on a model trained with the plurality of distorted images and respective accuracies of detection, a second set of parameters to be adjusted in the second image and a value corresponding to each parameter in the second set of parameters by which the parameter is to be adjusted;
preparing the second image for optical character recognition (OCR) by adjusting each determined parameter in the second set of parameters by a corresponding determined value to generate a prepared second image; and
performing OCR on the prepared second image.

US Pat. No. 10,366,308

ENHANCED CONTRAST FOR OBJECT DETECTION AND CHARACTERIZATION BY OPTICAL IMAGING BASED ON DIFFERENCES BETWEEN IMAGES

Leap Motion, Inc., San F...

16. A wearable goggle, comprising:at least one camera oriented toward a field of view containing a background and a hand including fingers;
at least one light source disposed on a same side of the field of view as the camera and oriented to illuminate the field of view; and
a processor coupled to the at least one camera and the light source and configured to:
activate the at least one light source to illuminate the field of view containing the hand;
capture a sequence of digital images of the field of view using that at least one camera at a time when the at least one light source is activated;
based on information obtained from the hand, construct at least a position and shape of the hand; and
capture a first image when the at least one light source is not activated, a second image when the at least one light source is activated, and a third image when the at least one light source is not activated, wherein pixels corresponding to the hand are identified based on a difference between the second and first images and a difference between the second and third images.

US Pat. No. 10,366,307

COARSE-TO-FINE SEARCH METHOD, IMAGE PROCESSING DEVICE AND RECORDING MEDIUM

OMRON Corporation, Kyoto...

1. A coarse-to-fine search method, comprising:a first search step of detecting an object from a first image by means of template matching; and
a second search step of setting a region of n pixels×m pixels corresponding to a position at which the object is detected in the first search step as a search range in a second image having a horizontal resolution and a vertical resolution which are respectively n times and m times as compared with the first image (n and m being integers equal to or greater than 2), and detecting the object from the second image by means of template matching, wherein the coarse-to-fine search method further comprises:
a rearrangement step of rearranging data of the second image in a work memory such that data of n×m pixels which can be collated with the same element of a template in the second search step is stored in contiguous memory addresses, prior to the second search step,
wherein n×m collation operations for the n×m pixels stored in the contiguous memory addresses in the work memory are executed for the number of times less than n×m rounds of operation processes through an SIMD instruction in the second search step.

US Pat. No. 10,366,306

ITEM IDENTIFICATION AMONG ITEM VARIATIONS

Amazon Technologies, Inc....

1. A computing system, comprising:one or more processors; and
a memory coupled to the one or more processors and storing program instructions that when executed by the one or more processors cause the one or more processors to:
receive an image of an item located within a materials handling facility;
process the image of the item to generate a first item image information, wherein the first item image information includes:
a plurality of features of the item identified in the image;
an arrangement of the plurality of features; and
wherein the program instructions that when executed by the one or more processors to cause the one or more processors to process the image, further include program instructions that cause the one or more processors to:
determine a correlation score between the first item image information and a second item image information, wherein the second item image information is associated with the item and accessible from an item images data store;
determine that the correlation score exceeds a threshold;
determine that the second item image information is associated with a set, wherein the set includes the second item image information and a third item image information, and wherein the second item image information includes a distinctive feature identifying a difference between the second item image information and the third item image information;
determine a distinctive features correlation score between the first item image information and the distinctive feature;
determine that the distinctive features correlation score exceeds a distinctive features threshold; and
identify the item as the item associated with the second item image information.

US Pat. No. 10,366,305

FEATURE VALUE EXTRACTION METHOD AND FEATURE VALUE EXTRACTION APPARATUS

SOINN INC., Tokyo (JP)

1. A feature value extraction method comprising:a consecutive image acquisition step of acquiring consecutive images that are consecutively taken;
a local feature value extraction step of extracting a local feature value at each feature point from the consecutive images acquired by the consecutive image acquisition step;
a feature value matching step of performing matching between the consecutive input images for the local feature value extracted by the local feature value extraction step; and
an invariant feature value calculation step of acquiring, in the local feature values for which matching between a predetermined number of consecutive images has been obtained in the feature value matching step, an average of the local feature values whose position changes between the consecutive images are equal to or less than a predetermined threshold value as an invariant feature value, wherein a matching distance is calculated for each matched local feature value,
the matched local feature values are sorted based on the calculated matching distances,
a predetermined number of local feature values are selected from the matched local feature values in ascending order of the matching distance, and
in the selected local feature values, the average of the local feature values whose position changes between the consecutive images are equal to or less than the predetermined threshold value is acquired as the invariant feature value.

US Pat. No. 10,366,304

LOCALIZATION AND MAPPING METHOD

NOKIA TECHNOLOGIES OY, E...

1. A method implemented by a data processing system for estimating a camera pose of a two-dimensional (2D) image, the method comprising:obtaining a three-dimensional (3D) point cloud about an object;
obtaining binary feature descriptors for feature points in the 2D image about the object;
assigning a plurality of index values for each feature point as multiple bits of the corresponding binary feature descriptor;
storing the binary feature descriptor in a table entry of a plurality of hash key tables of a database image;
obtaining query binary feature descriptors for feature points in a query image;
matching the query binary feature descriptors to the binary feature descriptors of the database image;
selecting one bit of the hash key of the matched database image; and
re-indexing the feature points in the table entries of the hash key table of the database image.

US Pat. No. 10,366,303

IMAGE PROCESSING DEVICE AND IMAGE PROCESSING METHOD

SONY CORPORATION, Tokyo ...

1. An image processing device for performing image processing based on surface shape of an object, the image processing device comprising:circuitry configured to:
acquire polarization images of three or more different polarization directions; and
perform image processing using an image feature quantity of each pixel of a plurality of pixels, each image feature quantity having been computed according to the surface shape of the object captured within the acquired polarization images, and including information indicating a feature of the surface shape at a respective position corresponding to a respective pixel of the object captured within the acquired polarization images,
wherein the circuitry is further configured to compute image feature quantities using the acquired polarization images, generate a non-polarization image from the acquired polarization images and compute a feature quantity on the basis of the non-polarization image, and compute the image feature quantities using information determined when the feature quantity is computed, and
wherein the image feature quantity of a target pixel of the plurality of pixels is computed using the image feature quantity of an adjacent pixel located in a vicinity of the target pixel.

US Pat. No. 10,366,302

HIERARCHICAL CATEGORY CLASSIFICATION SCHEME USING MULTIPLE SETS OF FULLY-CONNECTED NETWORKS WITH A CNN BASED INTEGRATED CIRCUIT AS FEATURE EXTRACTOR

Gyrfalcon Technology Inc....

1. A system for classifying input data using a hierarchical category classification scheme comprising:a cellular neural networks (CNN) based integrated circuit being loaded with pre-trained filter coefficients of convolutional layers for extracting features out of an input data that belong to a particular domain; and
a multi-processor computing unit configured for using multiple hierarchically-ordered groups of pre-trained fully-connected networks (FCNs) in a hierarchical category classification scheme that contains a set of top level categories and each of the top level categories contains at least one set of subcategories, the extracted features being repeatedly processed through corresponding ones of the multiple hierarchically-ordered groups to identify the input data as a most probable category, the multiple hierarchically-ordered groups of FCNs containing a root level group configured for the set of top level categories and at least one next level group configured for the at least one set of subcategories.

US Pat. No. 10,366,301

BLOCK BASED NON-MAXIMUM SUPPRESSION

Ambarella, Inc., Santa C...

17. An apparatus comprising:a processor configured to generate a command to run a block based non-maximum suppression; and
a coprocessor configured to (i) receive said command from said processor, (ii) receive an array of scores, (iii) parse said array of scores into a data flow including one or more operators, (iv) schedule said operators in one or more data paths (iv) divide said array of scores into blocks of two or more scores by processing said array of scores using said one or more data paths, (v) compute per-block information using said one or more data paths, and (vi) compute local maxima position information for said array of scores by performing block based non-maximum suppression based on said per-block information using said one or more data paths, wherein (a) said data paths are implemented with a plurality of hardware engines, (b) said hardware engines operate in parallel to each other, and (c) said coprocessor is implemented solely in hardware.

US Pat. No. 10,366,300

SYSTEMS AND METHODS REGARDING 2D IMAGE AND 3D IMAGE ENSEMBLE PREDICTION MODELS

STATE FARM MUTUAL AUTOMOB...

1. A multi-dimensioning computing device configured to generate enhanced predict actions from a 2D and 3D image-based ensemble model, the multi-dimensioning computing device comprising:an image processor;
a memory communicatively coupled to the image processor;
an ensemble component implemented on the memory and configured to execute on the image processor to:
obtain one or more sets of two dimensional (2D) images;
obtain one or more sets of three dimensional (3D) images;
generate one or more sets of standardized 2D images from the one or more sets of 2D images, wherein each standardized 2D image represents a 2D image in the one or more sets of 2D images;
generate one or more sets of standardized 3D images from the one or more sets of 3D images, wherein each standardized 3D image represents a 3D image in the one or more sets of 3D images;
determine at least one 2D3D image pair, the at least one 2D3D image pair determined from a paired 2D image in the one or more sets of standardized 2D images that corresponds to a paired 3D image in the one or more sets of standardized 3D images, the 2D3D image pair configured in the memory;
execute a 2D prediction model using the paired 2D image, wherein the 2D prediction model determines one or more 2D predict actions based on the paired 2D image;
execute a 3D prediction model using the paired 3D image, wherein the 3D prediction model determines one or more 3D predict actions based on the paired 3D image; and
determine a 2D3D image pair classification for the at least one 2D3D image pair, the 2D3D image pair classification based upon the one or more 2D predict actions and the one or more 3D predict actions,
wherein the image processor is configured to classify one or more sets of 2D images or one or more sets of 3D images with the 2D3D image pair classification to determine an enhanced predict action.

US Pat. No. 10,366,299

SORTING/SCANNING SYSTEM CAMERA UPGRADE APPARATUS WITH BACKWARDS COMPATIBILITY

BULL HN INFORMATION SYSTE...

1. An apparatus for improving a scanning and sorting system that processes a plurality of postal items having printed physical address identification image data on a surface thereof, the scanning and sorting system including a legacy lower resolution camera for generating image data in legacy data formats and reduced resolutions and legacy image processing equipment for processing the legacy image data, the apparatus comprising:a camera generating higher resolution image data than the legacy lower resolution camera, the higher resolution camera adapted to capture higher resolution images of the physical address identification image data from the surface of the postal items being scanned including the printed physical address identification data; and
a scanning adaptor device interposed between the higher resolution camera and the legacy image processing equipment to provide compatibility between the higher resolution camera and the legacy image processing equipment, the scanning adaptor device including:
an input connector arranged to couple the scanning adaptor device to the higher resolution camera and to enable reception of the higher resolution image data from the higher resolution camera via a higher resolution data signal;
an image format conversion apparatus configured to convert the higher resolution image data including the physical address identification image data received via the higher resolution signal into legacy-compatible image data, the legacy compatible image data having a data format and reduced resolution that is compatible with the legacy image processing equipment and including the physical address identification image data; and
a backward-compatible legacy connector arranged to couple the scanning adaptor device to the legacy image processing equipment and to enable transmission of the legacy-compatible image data from the scanning adaptor device to the legacy image processing equipment via a legacy data signal,
wherein the legacy data signal is consistent with the data format and electrical signaling characteristics required by the legacy image processing equipment, and
wherein the backward-compatible legacy connector is dimensionally configured to facilitate physical attachment to the legacy image processing equipment,
wherein the input connector is further configured to accommodate reception of one or more control signals from the higher resolution camera in a first format compatible with the higher resolution camera,
the image format conversion apparatus is further configured to convert the one or more control signals from the first format into a one or more control signals in a second format compatible with the legacy camera; and
the backward-compatible legacy connector is further configured to accommodate transmission of the control signals in the second format.

US Pat. No. 10,366,298

METHOD AND SYSTEM FOR IDENTIFYING OBJECTS IN IMAGES

Shoou Jiah Yiu, Los Alto...

1. A computer implemented method for identifying and tracking an object in a plurality of images, the method comprising:receiving, through an input device, a delineation of the object in at least one image of the plurality of images;
identifying, using the processor, an image region corresponding to the object in the at least one image based on the delineation, wherein the image region more accurately delineates the boundaries of the object within the image than the delineation input received by the input device, the image region determined at least in part by identifying pixels having the same color as and neighboring the pixels comprising the received object delineation; and
tracking, using the processor, the image region across the plurality of images within the video, wherein tracking includes:
generating, using the processor, a contour comprising a plurality of contour points based on the image region;
constructing, using the processor, a plurality of local windows for the object in the at least one image, the plurality of windows corresponding to a plurality of contour points;
estimating, using the processor, parameters corresponding to the plurality of local windows;
moving, using the processor, the plurality of local windows across the plurality of images based on optical flow; and
generating, using the processor, a mask of the object in at least one other image of the plurality of images based on parameters corresponding to the plurality of local windows subsequent to the moving plurality of local windows.

US Pat. No. 10,366,297

DETERMINING THE RELATIVE LOCATIONS OF MULTIPLE MOTION-TRACKING DEVICES

Leap Motion, Inc., San F...

1. A method of coordinating three-dimensional (3D) motion-capture, the method comprising:designating a first 3D motion-capture sensor among three or more 3D motion-capture sensors as having a master frame of reference, each respective 3D motion-capture sensor of the three or more 3D motion-capture sensors: (i) having networked connectivity to other 3D motion-capture sensors of the three or more 3D motion-capture sensors; and (ii) monitoring a portion of a monitored space falling within a field of view of the respective 3D motion-capture sensor;
observing, by the first 3D motion-capture sensor and at least one other 3D motion-capture sensor of the three or more 3D motion-capture sensors, 3D motion of a hand in the monitored space as the hand passes through at least two overlapping fields of view of the first 3D motion-capture sensor and the at least one other 3D motion-capture sensor;
utilizing the networked connectivity between the first 3D motion-capture sensor and the at least one other 3D motion-capture sensor to synchronize a capture of multiple pairs of images of the hand within the at least two overlapping fields of view; and
calibrating the at least one other 3D motion-capture sensor to the master frame of reference of the first 3D motion-capture sensor by calculating one or more rigid geometric coordinate transformations between pairs of the 3D motion-capture sensors and based on a determined shift between corresponding points on the hand in the captured pairs of images.

US Pat. No. 10,366,296

BIOMETRIC ENROLLMENT SYSTEMS AND METHODS

Princeton Identity, Inc.,...

16. A method of biometric system enrollment, comprising:capturing a probe image of a subject with a camera, the probe image including an iris of the subject;
determining an iris characteristic of the iris in the probe image with an image analysis module;
analyzing the probe image relative to a first enrollment image to determine if a match exists based on the iris characteristic, the first enrollment image is electronically stored in a first bin of at least first and second bins, the first and second bins corresponding to different ranges of the iris characteristic, the iris characteristic in the first enrollment image falling within the range of the iris characteristic of the first bin, a coverage area of the iris characteristic of the first enrollment image extending across at least a portion of the first bin and at least across a portion of the second bin;
if the match exists, electronically storing the matched probe image as an accepted image, the accepted image is electronically stored in the second bin, the iris characteristic of the accepted image falling within the range of the iris characteristic of the second bin;
determining if the accepted image meets enrollment image criteria, the accepted image meeting the enrollment image criteria if the iris characteristic of the accepted image is within the coverage area of the first enrollment image; and
if the accepted image meets the enrollment image criteria, selecting and establishing the accepted image as a second enrollment image.

US Pat. No. 10,366,295

OBJECT RECOGNITION APPARATUS

DENSO CORPORATION, Kariy...

1. An object recognition apparatus mounted to a moving body, the moving body being provided with a plurality of object detecting apparatuses for detecting an object present within a predetermined detectable area including a reference axis, the plurality of object detecting apparatus including a first object detecting apparatus and a second object detecting apparatus, the detectable area of the first object detecting apparatus and the detectable area of the second object detecting apparatus overlapping each other, the object recognition apparatus comprising:a processor, wherein the processor is configured to:
learn an axis displacement amount of the reference axis of the first object detecting apparatus;
combine and integrate, as information belonging to a same object, a plurality of pieces of information present within a first combining area and a second combining area, when a positional relationship between the first combining area and the second combining area meets a predetermined combinable condition, the first combining area being set as an area in which pieces of information related to the object acquired by the first object detecting apparatus are combined, the second combining area being set as an area in which pieces of information related to the object acquired by the second object detecting means apparatus are combined; and
variably set sizes of the first combining area and the second combining area based on a learning state of the axis displacement amount learned by the processor.

US Pat. No. 10,366,294

TRANSPARENCY-CHARACTERISTIC BASED OBJECT CLASSIFICATION FOR AUTOMATED VEHICLE

Aptiv Technologies Limite...

1. An object classification system for an automated vehicle, said system comprising:a lidar mounted on a host-vehicle, said lidar determines spot-distances indicated by light-beams that were emitted by the lidar and reflected toward the lidar from an area proximate to the host-vehicle;
a controller in communication with the lidar, wherein the controller
determines a lidar-outline of an object in the area based on spot-distances,
determines an object-distance to the object based on spot-distances within the lidar-outline of the object,
determines a backdrop-distance to a backdrop based on spot-distances outside of the lidar-outline of the object,
determines a transparency-characteristic of the object based on instances of spot-distances from within the lidar-outline of the object that correspond to the backdrop-distance, and
operates the host-vehicle to avoid the object when the transparency-characteristic is less than a transparency-threshold.

US Pat. No. 10,366,293

COMPUTER SYSTEM AND METHOD FOR IMPROVING SECURITY SCREENING

Synapse Technology Corpor...

1. A computing system comprising:at least one processor; and
a non-transitory computer-readable storage medium comprising instructions stored thereon that, when executed by the at least one processor, cause the computing system to:
perform an initial security screening on an object based on (i) a first set of security-related data associated with the object comprising first image data corresponding to a first scan of the object by a detection device communicatively coupled to the computing system and (ii) a first set of security screening parameters, wherein performing the initial security screening comprises:
based on the first image data, executing a neural network in accordance with the first set of security screening parameters; and
based on executing the neural network in accordance with the first set of security screening parameters, generating a first security determination for the object;
perform a supplemental security screening on the object based on (i) a second set of security-related data associated with the object comprising at least one of (a) the first image data or (b) second image data corresponding to a second scan of the object and iii) a second set of security screening parameters, wherein performing the supplemental security screening comprises:
based on at least one of (a) the first image data or (b) the second image data, executing a neural network in accordance with the second set of security screening parameters; and
based on executing the neural network in accordance with the second set of security screening parameters, generating a second security determination for the object; and
provide to a computing device an output notification based on at least one of (i) the first security determination or (ii) the second security determination; and
wherein the first set of security-related data is different from the second set of security-related data, and wherein the first set of security screening parameters is different from the second set of security screening parameters.

US Pat. No. 10,366,291

SYSTEMS, METHODS, AND APPARATUS FOR PROVIDING IMAGE SHORTCUTS FOR AN ASSISTANT APPLICATION

GOOGLE LLC, Mountain Vie...

1. A method implemented by one or more processors, the method comprising:determining, by an assistant application, that a real-time image feed from a camera of a computing device includes a graphical representation of an object, the determining including processing an image from the camera using one or more image processing techniques;
identifying an image shortcut setting associated with the object, the image shortcut setting corresponding to a preconfigured process through which the assistant application responds to image content provided in the real-time image feed,
wherein the image shortcut setting is preconfigured by a user at least via a verbal command that is at least partially processed via the assistant application;
generating a query associated with the image shortcut setting, the query comprising a data identifier corresponding to data to be provided by the assistant application according to the image shortcut setting;
receiving the data based on the query that is associated with the image shortcut setting; and
in response to determining that the real-time image feed includes the graphical representation of the object, and based on the image shortcut setting being stored in association with the object:
causing the data to be rendered at the computing device along with the real-time image feed.

US Pat. No. 10,366,290

SYSTEM AND METHOD FOR PROVIDING AUGMENTED VIRTUAL REALITY CONTENT IN AUTONOMOUS VEHICLES

BAIDU USA LLC, Sunnyvale...

1. A computer-implemented method for content delivery to autonomous vehicles, the method comprising:receiving at a server a request from a first autonomous vehicle for content delivery over a network, the request including an image that was captured by a camera of the first autonomous vehicle while the first autonomous vehicle was driving on a road, the image capturing an object external to the first autonomous vehicle;
in response to the request, performing a vision analysis on an image obtained from the request to determine three-dimensional (3D) positioning information of the image, including determining a position of the object within the image and a viewing angle of the object with respect to a location of the camera;
identifying a list of a plurality of content items to augment based on current vehicle information of the first autonomous vehicle in view of one or more user profiles of one or more users to be entertained while riding the first autonomous vehicle;
augmenting a first content item selected based on user preferences from the list of content items onto the image by superimposing the first content item onto the image based on the position and viewing angle of the object to generate an augmented image, wherein the first content item includes a content item previously cached by a content database maintained by the autonomous vehicle; and
transmitting the augmented image to the first autonomous vehicle over the network, wherein the augmented image is to be displayed on a display device within the autonomous vehicle in a virtual reality manner.

US Pat. No. 10,366,289

SYSTEMS AND METHODS FOR PROVIDING VEHICLE COGNITION

Solfice Research, Inc., ...

1. A method of creating a vehicle localization table used by a vehicle in determining the absolute geospatial position of the vehicle via reference to the local environment of the vehicle, the method comprising:engaging in multiple traversals of a local environment, by one or more vehicles, each vehicle having an on board machine vision sensor and an on board computer;
observing, during each traversal by a vehicle, each of a plurality of voxels, in order to generate for each of said voxels a voxel signature and an associated voxel location hypothesis, both of which are stored locally within a localization table and utilized by the vehicle for determining the vehicle's absolute geospatial position;
aggregating localization tables from said traversals;
for each observed voxel, determining a refined voxel location hypothesis combinatorially based on voxel location hypotheses sharing a common voxel signature within the aggregated localization tables; and
updating, by one or more of said vehicles, the voxel location hypothesis within the vehicle localization table, based on the refined voxel location hypothesis.

US Pat. No. 10,366,288

SYSTEMS AND METHODS FOR ANALYZING REMOTE SENSING IMAGERY

CAPE ANALYTICS, INC., Mo...

1. A method of aligning images, comprising:receiving, at an aligning device, N first type of image sets, wherein N>1, wherein each of the N first type of image sets includes one or more first type of images;
receiving, at the aligning device, N second type of image sets, wherein each of the N second type of image sets includes different one or more second type of images, wherein each of the N second type of image sets is aligned with a different one of the N first type of image sets;
generating, at the aligning device, M transform parameters, wherein M>1;
generating, at the aligning device, M transformed second type of image sets for each of the N first type of image sets so that there are N*M total transformed second type of image sets, wherein each of the M transformed second type of image sets for each of the N first type of image sets is generated by transforming a respective one of the N second type of image sets using a different one of the M transform parameters;
creating, at the aligning device, a regressor configured to identify parameters of a transformation that maps a second type of image set to a first type of image set, wherein the regressor is created based on the N first type of image sets, the M transform parameters, and the N*M total transformed second type of image sets;
receiving, at the aligning device, a target first type of image set and a target second type of image set;
generating, at the aligning device using the regressor, a target transform parameter based on the target first type of image set and the target second type of image set; and
generating, at the aligning device, a transformed target second type of image set by transforming the target second type of image set using the target transform parameter so that the transformed target second type of image set is aligned with the target first type of image set.

US Pat. No. 10,366,286

DETECTION OF TRAFFIC LIGHT SIGNAL CHANGES

Google LLC, Mountain Vie...

1. A computer-implemented method of detecting a traffic light signal change, the method comprising:determining, by a user device, that a user is stopped at an intersection having a traffic light;
capturing, by the user device, a plurality of images in response to detecting that the user is stopped at the intersection having a traffic light, wherein the plurality of images do not depict the traffic light;
detecting, by the user device, a tonal shift in one or more color values associated with at least one surface depicted in at least one image of the plurality of images, the at least one surface being separate from the traffic light, the tonal shift being indicative of a change in signal provided by the traffic light; and
providing, by the user device, a notification to the user indicative of the change in signal produced by the traffic light based at least in part on detecting the tonal shift in the one or more color values associated with the at least one surface that is separate from the traffic light.

US Pat. No. 10,366,285

METHOD AND APPARATUS FOR DETERMINING THE OPERATION OF A VEHICLE SAFETY SYSTEM

Bendix Commercial Vehicle...

1. A controller for a safety system on a vehicle comprising:a sensor input for receiving a signal from a safety system sensor;
a camera input for receiving a signal from a camera;
an environmental condition input for receiving a signal from an environmental condition device;
an output for indication of the state of the active safety system; and
a processor having control logic, the control logic capable of:
receiving the sensor signal indicating an absence of detected forward objects in a field of view of the safety system sensor;
receiving the camera signal indicating at least one non-vehicle forward object identified in the field of view of the camera;
maintaining the active vehicle safety system as active in response to the sensor signal indicating the absence of detected forward objects and the camera signal indicating the identification of at least one visual non-vehicle forward object;
deactivating the active vehicle safety system in response to the sensor signal indicating the absence of detected forward objects, the environmental condition device signal indicating the environment does not meet a predetermined value and the camera signal indicating a camera fault; and
indicating at the output that the active vehicle safety system is deactivated.

US Pat. No. 10,366,284

IMAGE RECOGNITION AND PARSING

David Prulhiere, Grants ...

1. A system, comprising:at least one processor; and
one or more computer-readable media storing computer-executable instructions for performing image recognition, the image recognition comprising:
comparing, by the at least one processor, scan mark candidates in an input image with blueprint scan marks for a set of form blueprints;
based on the comparing, determining, by the at least one processor, that at least some of the scan mark candidates are confirmed scan marks;
determining, by the at least one processor and based on the confirmed scan marks, that the input image corresponds to one form blueprint of the set of form blueprints; and
based on the form blueprint to which the input image corresponds, extracting, by the at least one processor, information from the input image using optical character recognition.

US Pat. No. 10,366,283

SYSTEMS AND METHODS OF READING AND PROCESSING CHANGE-OF-ADDRESS FORMS IN A CLOUD-BASED ARCHITECTURE

SIEMENS INDUSTRY, INC., ...

1. A method for processing change-of-address (COA) forms, comprising:capturing, at a geographically regional processing center, a first image of a first COA form with a camera connected to an automated mail transport to create first image data;
receiving the first image data in an image management system (IMS) at the geographically regional processing center;
assigning a unique identifier to the first COA form by the IMS;
associating the unique identifier with the first image data by the IMS;
transmitting the first image data and the unique identifier to a cloud computing system, wherein the cloud computing system:
performs an optical-character-recognition process on the first image data to produce name and address data, the name and address data including both an old address and a new address,
performs a validation process on the name and address data,
associates the name and address data with the unique identifier,
performs a lookup process according to the name and address data and saves the name and address data, including the new address and a validation result, and
manages a system load of the cloud computing system and automatically distributes the images and data within the cloud computing system,
wherein when the validation result indicates that the name and address data are validated, then storing the name and address data in a change of address database.

US Pat. No. 10,366,282

HUMAN DETECTION APPARATUS AND METHOD USING LOW-RESOLUTION TWO-DIMENSIONAL (2D) LIGHT DETECTION AND RANGING (LIDAR) SENSOR

Daegu Gyeongbuk Institute...

1. A human detection method performed by a processor using a light detection and ranging (LIDAR) sensor, the human detection method comprising:receiving LIDAR data generated by reflecting a laser signal that continues to be transmitted to a search region from a plurality of objects in the search region;
clustering a plurality of points included in the received LIDAR data by the same objects based on a correlation between the plurality of points;
applying the plurality of clustered points to a higher-order polynomial to derived a higher-order characteristic function, the higher-order characteristic function being used to identify a shape of a human; and
determining whether each of the objects is a human based on the derived higher-order characteristic function.

US Pat. No. 10,366,281

GESTURE IDENTIFICATION WITH NATURAL IMAGES

PIXART IMAGING INC., Hsi...

1. A method for identifying a gesture using natural images, wherein the method is independent of color temperature and adaptive to indistinct images caused by fast motion of an object, comprising the steps of:selecting a plurality of successive images from a series of the images frames, wherein for each of the selected plurality of successive images, entire image frames are used to generate a plurality of variant images; and
comparing a varying pattern of the variant images with a gesture definition to identify the gesture;
wherein the method does not comprise the steps of:
recognizing a shape of a gesture in each of the selected plurality of successive images, and
determining a position of the gesture in each of the selected plurality of successive images.

US Pat. No. 10,366,280

METHOD AND APPARATUS FOR MEASURING PERIODIC MOTION

Mitac International Corp....

1. A method for measuring periodic motion of an object, the method to be implemented by an apparatus that includes an accelerometer which is attached to the object and oriented relative to the object so that a y-axis of the accelerometer is parallel to an axial direction of the object and an x-axis of the accelerometer is parallel to a radial direction of the object, a processor, a state counter, and a periodic motion counter, the method comprising the following steps, which are to be performed by the accelerometer and the processer, of:(A) detecting, by the accelerometer, a periodic motion of the object so as to generate an axial acceleration along a y-axis that represents an axial component of an acceleration of the object in an axial direction and a radial acceleration along an x-axis that represents a radial component of the acceleration of the object in a radial direction, and receiving, by the processor, the axial acceleration and the radial acceleration generated by the accelerometer;
(B) calculating a first included angle between a composite acceleration and one of the axial direction and the radial direction, and a second included angle between the composite acceleration and the other one of the axial direction and the radial direction; wherein the composite acceleration is a sum of the axial component of acceleration and the radial component of acceleration;
(C) controlling the state counter to increment a state counter value if the second included angle is greater than the first included angle;
(D) if the second included angle is not greater than the first included angle, recording the state counter value kept by the state counter and resetting the state counter to zero;
(E) if the state counter value recorded in step (D) is greater than a state threshold value, controlling the periodic motion counter to increment a motion counter value kept by the periodic motion counter; wherein the motion counter value is associated with a number of times the periodic motion of the object has occurred; and
(F) outputting the number of times the periodic motion of the object has occurred based on the motion counter value kept by the periodic motion counter;
whereby the periodic motion of the object may be measured regardless of the kind of periodic motion, including divergent movements of the object, including swinging, shaking, and rotating, and regardless of the orientation of the x-axis of the accelerometer about its v-axis.

US Pat. No. 10,366,279

SYSTEM FOR EXECUTION OF MULTIPLE EVENTS BASED ON IMAGE DATA EXTRACTION AND EVALUATION

Bank of America Corporati...

1. A system for execution of multiple events based on image data extraction and evaluation, the system comprising:a memory device; and
a processing device operatively coupled to the memory device, wherein the processing device is configured to execute computer-readable program code to:
receive, from a computing device of a user, a prompt to request a contribution from one or more individuals;
receive, from the computing device of the user, an image that includes the one or more individuals;
determine an identity for each of the one or more individuals in the image by applying a facial recognition process to the image to extract image hashes for each face in the image and comparing the extracted image hashes to stored hashes of the computing device of the user or to stored hashes of a social network of the user;
identify contact information for each of the one or more individuals based on the identity of each of the one or more individuals;
in response to identifying contact information for each individual of the identified one or more individuals, cause the computing device of the user to display the identity and contact information for each of the one or more individuals in the image;
cause the computing device of the user to display a request for a user input of a respective contribution amount for each individual of the one or more individuals;
receive, from the computing device of the user, the user input of the contribution amount for each individual of the one or more individuals; and
transmit the request for the contribution to each individual of the one or more individuals using the contact information, wherein transmitting the request for the contribution to each individual of the identified one or more individuals comprises transmitting a request for the respective contribution amount to each individual of the one or more individuals.

US Pat. No. 10,366,278

CURVATURE-BASED FACE DETECTOR

APPLE INC., Cupertino, C...

1. A method for processing data, comprising:receiving a depth map of a scene containing at least a humanoid head, the depth map comprising a matrix of pixels having respective pixel depth values;
using a digital processor, extracting from the depth map a curvature map of the scene, the curvature map comprising respective curvature values of at least some of the pixels in the matrix; and
processing the curvature values in order to detect and segment one or more blobs in the curvature map over which the pixels have respective curvature values that are indicative of a convex surface, to calculate a roll angle of each of the one or more blobs corresponding to an axis perpendicular to a dominant direction of a curvature orientation of the pixels in each of the one or more blobs, and to identify one of the blobs as a face in the scene by applying a face classifier filter to the one or more blobs to calculate a score for each pixel indicating a likelihood that it is a center point of the face while normalizing a rotation between the one or more blobs and the filter using the calculated roll angle.

US Pat. No. 10,366,277

AUTOMATED METHODS AND SYSTEMS FOR IDENTIFYING AND CHARACTERIZING FACE TRACKS IN VIDEO

Imagesleuth, Inc., Rento...

1. A video-processing system comprising:a distributed computing system that includes multiple computer systems, each having one or more processors, one or more memories, one or more mass-storage devices, and one or more network interconnections;
a still-image face-detection and attribute-assignment subsystem that identifies face-containing subimages within a digital image and assigns values for image attributes for the identified face-containing subimages and that comprises
an input-image memory for receiving an input image provided by one or more of the multiple computer systems,
a set of first-level feature detectors, provided by one or more of the multiple computer systems, that detect face-containing subimages within the input image and, for each face-containing subimage, generate a set of normalized regions,
a set of second-level feature detectors that generate a set of feature vectors from each normalized region,
a set of attribute classifiers that each outputs an attribute value and associated probability, and
a controller that
submits the input image to the first-level feature detectors in order to generate sets of normalized regions for each face-containing subimage in the input image,
submits each set of normalized regions to generate a set of feature vectors, and
submits subsets of feature vectors to each attribute classifier in an ordered list of attribute classifiers to assign attributes to each face-containing subimage; and
a controller that
receives a reference to a video, and
processes each chunk of frames in the video to
identify and characterize face-containing subimages within each frame of the chunk by applying the still-image face-detection and attribute-assignment subsystem to the frame, and
identify and characterize face tracks in the video, each face track comprising a sequence of frames in which subimages of a particular face occur, the face track characterized by attribute values generated from the attribute values associated with each identified subimage containing the particular face.

US Pat. No. 10,366,276

INFORMATION PROCESSING DEVICE AND COMPUTER PROGRAM

SEIKO EPSON CORPORATION, ...

1. An information processing device comprising:a processor that communicates with a camera that captures an image of a target object; and
a memory that acquires at least one template in which first feature information, 3D locations and a viewpoint are associated with each other, the first feature information including information that represents a plurality of first 2D locations included in a contour obtained from a projection of a 3D model corresponding to the target object onto a virtual plane based on the viewpoint, and the 3D locations corresponding to respective first 2D locations and being represented in a 3D coordinate system,
wherein the processor
identifies second feature information representing edges from the captured image of the target object obtained from the camera, and determines correspondences between the first 2D locations and second 2D locations in the captured image based at least on the first feature information and the second feature information,
derives a position and pose of the target object, using at least (1) the 3D locations that correspond to the respective first 2D locations and (2) the second 2D locations that correspond to the respective first 2D locations,
derives similarity scores between each of the first 2D locations and the second 2D locations within a region around a corresponding first 2D location,
smooths the similarity scores derived with respect to the region, using other similarity scores derived with respect to other regions around other first 2D locations adjacent to the corresponding first 2D location, and
determines a correspondence between each of the first 2D locations and one of the second 2D locations within the region around the corresponding first 2D location based on at least the smoothed similarity scores.

US Pat. No. 10,366,275

METHOD AND DEVICE FOR IMPROVING FINGERPRINT TEMPLATE, AND TERMINAL DEVICE

Guangdong Oppo Mobile Tel...

1. A method for improving a fingerprint template, performed by a terminal device, the method comprising:extracting first feature information of a recorded fingerprint image based on preset fingerprint feature types, wherein different fingerprint feature types are preset based on different recognition accuracy for the fingerprint image;
determining a degree of matching between the first feature information and second feature information stored in a registered fingerprint template based on the second feature information corresponding to the fingerprint feature types;
determining whether the degree of matching is higher than or equal to a preset compensation threshold value;
when the degree of matching is higher than or equal to the compensation threshold value, acquiring, from the fingerprint image, a compensation image that has no common feature information with the fingerprint template, and adding the compensation image to the fingerprint template; and
after determining the degree of matching between the first feature information and the second feature information, further comprising:
determining whether the degree of matching is higher than or equal to a preset recognition threshold value, wherein the recognition threshold value is less than the compensation threshold value; and
responding a corresponding event based on a preset instruction when the degree of matching is higher than or equal to the recognition threshold value.

US Pat. No. 10,366,274

FINGERPRINT IDENTIFICATION SYSTEM, FINGERPRINT IDENTIFICATION METHOD, AND ELECTRONIC EQUIPMENT

BYD COMPANY LIMITED, She...

1. A fingerprint identification system, comprising a fingerprint sensor, a judging unit, and a processing unit, wherein:the fingerprint sensor collects multiple frames of fingerprint images sliding-inputted by a user, the fingerprint images are collected from a left side, a middle portion and a right side of a finger, and each of the left side, the middle portion and the right side of the finger is separately sliding-inputted through a detection panel of the fingerprint sensor;
the judging unit determines whether, among the multiple frames of fingerprint images of each of the left side, the middle portion and the right side of the finger, there is a first overlap region between a current frame of fingerprint images and a previous frame of fingerprint images;
when there is a first overlap region between the current frame of fingerprint images and the previous frame of fingerprint images, the judging unit removes the first overlap region from the current frame of fingerprint images and superposes the previous frame of fingerprint images with the current frame of fingerprint images without the first overlap region thereof to separately form a superposed fingerprint image of each of the left side, the middle portion and the right side of the finger; or the judging unit removes the first overlap region from the previous frame of fingerprint images and superposes the current frame of fingerprint images with the previous frame of fingerprint images without the first overlap region to separately form the superposed fingerprint image of each of the left side, the middle portion and the right side of the finger;
the judging unit also judges whether there is a second overlap region between a next frame of fingerprint images and the superposed fingerprint image, until completing judgment of all the multiple frames of fingerprint images of each of the left side, the middle portion and the right side of the finger to obtain three template fingerprint images collected from the left side, the middle portion and the right side of the finger, and the three template fingerprint images are stitched together to form a complete template fingerprint image;
when there is not a first overlap region between the current frame of fingerprint images and the previous frame of fingerprint images, the fingerprint sensor collects new multiple frames of fingerprint images sliding-inputted by the user;
the processing unit extracts and saves characteristic points of the complete template fingerprint image;
the fingerprint sensor collects a to-be-identified fingerprint image pressing-inputted by the user, and the processing unit extracts characteristic points of the to-be-identified fingerprint image and determines whether the characteristic points of the to-be-identified fingerprint image match with the characteristic points of the complete template fingerprint image;
when the characteristic points of the to-be-identified fingerprint image match with the characteristic points of the complete template fingerprint image, the processing unit determines the to-be-identified fingerprint image as a matching fingerprint image; and
when the characteristic points of the to-be-identified fingerprint image do not match with the characteristic points of the complete template fingerprint image, the processing unit determines the to-be-identified fingerprint image as a non-matching fingerprint image.

US Pat. No. 10,366,273

DEVICE FOR THE CONTACT-BASED SIMULTANEOUS CAPTURE OF PRINTS OF AUTOPODIA

JENETRIC GmbH, Jena (DE)...

1. A device for the contact-based simultaneous capture of prints of several areas of skin of human autopodia supplied with blood, by means of disturbed total internal reflection, comprising, seen from the direction of an area of skin in contact:a protective body of predefined thickness with a contact surface, wherein the contact surface has a size which makes possible the simultaneous placement of several autopodia;
a sensor layer, comprising light-sensitive sensor elements, arranged in the form of an array, for detecting light of at least one predefined wavelength range, wherein passband areas which are transparent for light of at least one predefined illumination wavelength range are arranged between the sensor elements;
a light guide made of a material that is transparent for light of the predefined illumination wavelength range, which is designed in the form of a plane-parallel plate, with a lower large face and an upper large face arranged parallel thereto which faces the sensor layer, as well as several edges connecting the large faces, wherein one of the edges is formed as a coupling-in surface for illumination light,
a light source configured to emit illumination light along a longitudinal direction of the coupling-in surface, wherein the light source is designed to emit light in a limited angular range around a preferred direction, and the preferred direction makes an angle of incidence with the large faces and is predefined such that light which is emitted in the angular range would, after entering the light guide, be predominantly totally internally reflected at the large faces in the case of a medium with a refractive index of air in contact therewith;
a mirror layer arranged between the sensor layer and the light guide, the mirror layer configured to reflect one portion of the illumination light back into the light guide and transmit another portion of the illumination light, and configured to homogenize the illuminance of illumination light which exits the light guide through the upper large face thereof and strikes the contact surface, based on a distance to the light source.

US Pat. No. 10,366,272

ELECTRONIC DEVICE SUPPORTING FINGERPRINT VERIFICATION AND METHOD FOR OPERATING THE SAME

Samsung Electronics Co. L...

1. An electronic device, comprising:a display;
a rear panel comprising a protective layer directly below the display and including an opening aligned with a fingerprint recognition area of the display;
a fingerprint sensor disposed below the rear panel and aligned with the opening, the fingerprint sensor being adapted to acquire image information to be used for authentication of a fingerprint corresponding to an object that approaches the fingerprint recognition area based at least partially on a light radiated from at least one pixel of the display and reflected by the object; and
a processor configured to:
control to display, on the display, the fingerprint recognition area when a function associated with a fingerprint recognition is executed;
receive the image information from the fingerprint sensor; and
control at least one function of the fingerprint sensor in relation with the acquiring of the image information.

US Pat. No. 10,366,271

METHOD AND APPARATUS FOR AUTHENTICATING FINGERPRINTS USING REFLECTED WAVE

1. A fingerprint authentication apparatus comprising:a fingerprint sensor configured to apply a wave signal to a subject and receive a wave signal reflected from the subject;
a local waveform detector configured to detect local waveforms by dividing the received wave signal by a reception time; and
a forgery detection unit configured to count the number of local waveforms and detect whether a fingerprint provided from the subject is forged or not based on the counted number of local waveforms,
wherein the wave signal is an ultrasonic signal, and
wherein the forgery detection unit detects whether the fingerprint provided from the subject is forged or not based on whether a ratio of an amplitude of a local waveform reflected from a forged fingerprint film and an amplitude of a local waveform reflected between the forged fingerprint film and a finger to which the forged fingerprint film is attached, among the detected local waveforms, exceeds a predetermined threshold value.

US Pat. No. 10,366,270

CAPACITIVE FINGERPRINT SENSOR

Shenzhen Goodix Technolog...

1. A capacitive fingerprint sensor, comprising:a first electrode plate layer, a second electrode plate layer and a third electrode plate layer that are sequentially arranged; and
an integrator having an integrating capacitor;
wherein the first electrode plate layer forms a fingerprint capacitor with a finger, at least one fourth electrode plate layer is arranged between the first electrode plate layer and the second electrode plate layer, a first parasitic capacitor is formed between the first electrode plate layer and the fourth electrode plate layer, and a second parasitic capacitor is formed between the second electrode plate layer and the fourth electrode plate layer;
the integrating capacitor is formed between the second electrode plate layer and the third electrode plate layer; and
the integrating capacitor is configured to store charges from the fingerprint capacitor,
the capacitive fingerprint sensor further comprising a first switch circuit, wherein the first switch circuit causes, via a switch-on or switch-off action, a voltage of the fourth electrode plate layer to be a power-supply voltage or a common-mode voltage, and a voltage of the first electrode plate layer is the power-supply voltage or the common-mode voltage.

US Pat. No. 10,366,269

BIOMETRIC SYSTEM WITH PHOTOACOUSTIC IMAGING

QUALCOMM Incorporated, S...

1. An apparatus, comprising:an ultrasonic sensor array;
a light source system;
a display; and
a control system comprising one or more general purpose single- or multi-chip processors, digital signal processors, application specific integrated circuits, field programmable gate arrays or other programmable logic devices, discrete gates, discrete transistor logic or discrete hardware components, the control system being configured to:
control the light source system to emit light, wherein the light induces acoustic wave emissions inside a target object;
select a first acquisition time delay for the reception of acoustic wave emissions primarily from a first depth inside the target object;
acquire first ultrasonic image data from the acoustic wave emissions received by the ultrasonic sensor array during a first acquisition time window that is initiated at an end time of the first acquisition time delay, wherein the control system is further configured to select second through Nth acquisition time delays and to acquire second through Nth ultrasonic image data during second through Nth acquisition time windows after the second through Nth acquisition time delays, each of the second through Nth acquisition time delays corresponding to a second through an Nth depth inside the target object; and
control the display to depict a three-dimensional image that corresponds with at least a subset of the first through Nth ultrasonic image data.

US Pat. No. 10,366,268

METHOD AND SYSTEM FOR OPTICAL IMAGING USING PATTERNED ILLUMINATION

Synaptics Incorporated, ...

1. A display for imaging an input object, comprising:a sensing surface;
a plurality of display pixels;
a plurality of detector pixels; and
a processing system configured to:
determine a location of the input object relative to the sensing surface;
illuminate one or more display pixels of the plurality of display pixels according to a pattern based, at least in part, on the location of the input object;
acquire image data of the input object from one or more detector pixels of the plurality of detector pixels, wherein the image data corresponds to light from the one or more display pixels that is reflected at the sensing surface.

US Pat. No. 10,366,267

IMAGE ACQUISITION DEVICE AND IMAGE ACQUISITION METHOD

GLORY LTD., Himeji-shi, ...

1. An image acquisition device that acquires image data of a paper sheet, comprising:a first light source that is arranged to emit light to a first surface of the paper sheet and has directivity by which the light is emitted in a first direction and a second direction;
a first light receiving sensor arranged to receive light that has been emitted in the first direction and reflected from the paper sheet; and
a second light receiving sensor arranged to receive light that has been emitted in the second direction and passed through the paper sheet,
wherein a quantity of light emitted in the second direction is larger than a quantity of light emitted in the first direction.

US Pat. No. 10,366,264

SYSTEM AND METHOD FOR TRANSFERRING CONTENT AMONG DEVICES

Korea Advanced Institute ...

1. A display device, comprising:a coupling controller hardware device configured to identify a user equipment in accordance with a content transfer request and to perform coupling with the identified user equipment;
a content transfer unit configured to transmit content to the user equipment or to receive content from the user equipment, when coupling is completed; and
a display configured to receive a touch input,
wherein the coupling controller hardware device is further configured to:
identify a touch input on the display as the content transfer request and to request for status information to a peripheral device,
store a time of recognition at which a touch is recognized and a time of cancellation at which the touch is cancelled, and
compare the time of recognition and the time of cancellation with recognition information, the recognition information being acquired by using a proximity sensor within the user equipment, when the recognition information is received from the user equipment as the status information, and to perform coupling with the user equipment based upon the compared result.

US Pat. No. 10,366,263

OBJECT DETECTION FOR VIDEO CAMERA SELF-CALIBRATION

Accenture Global Solution...

1. A computer-implemented method for performing video camera self-calibration, comprising:receiving, by a computing system, video information that characterizes a video showing a scene from a field of view of a video camera that is to be self-calibrated;
detecting, by the computing system and based on analysis of the video information, an object that has been placed in the scene of the video for use in assisting with self-calibration of the video camera, the object having an attached, computer-readable, visual marking that identifies the object to which it is attached;
identifying, by the computing system, the visual marking that is attached to the detected object that has been placed in the scene of the video for use in assisting with self-calibration of the video camera;
determining, by the computing system, a particular visual marking, among a plurality of pre-defined visual markings available to the computing system, that matches the visual marking that appears on the detected object that has been placed in the scene of the video for use in assisting with self-calibration of the video camera;
identifying, based on stored data that correlates the plurality of pre-defined visual markings with characteristics of respective objects on which the pre-defined visual markings can appear and which are used for assisting with self-calibration of video cameras, one or more real-world object characteristics that are defined for objects having the particular visual marking that appears on the detected object that has been placed in the scene of the video for use in assisting with self-calibration of the video camera, wherein the one or more real-world object characteristics comprise at least one of a physical dimension of the object, a real-world location of the object, a color of the object, or an orientation of the object;
comparing one or more characteristics of the detected object that has been placed in the scene of the video for use in assisting with self-calibration of the video camera as they appear in the video to respective ones of the one or more real-world object characteristics that are defined for objects having the particular visual marking that appears on the detected object;
automatically self-calibrating the video camera based on a result of comparing one or more characteristics of the detected object that has been placed in the scene of the video for use in assisting with self-calibration of the video camera as they appear in the video to respective ones of the one or more real-world object characteristics that are defined for objects having the particular visual marking that appears on the detected object, comprising:
selecting a setting for an operational parameter of the video camera, wherein the operational parameter of the video camera comprises at least one of a focal length, a principal point, an aspect ratio, a skew, a colorisation, a lens distortion, a height of the video camera, a tilt angle of the video camera, or a roll angle of the video camera; and
setting the operational parameter of the video camera according to the selected setting.

US Pat. No. 10,366,262

METHOD AND SYSTEM FOR READING INFORMATION CODES

DENSO WAVE INCORPORATED, ...

1. A system which reads an information code, comprising:an information processing terminal; and
a server communicably connected to the information processing terminal,
wherein the information processing terminal comprises
imaging means for imaging an information code configured by a plurality of types of cells, the cells being arrayed to form a contour, first and second information being recorded in advance by partial cells among the cells arrayed within the contour, the first information being different from the second information,
producing means for reading, from the imaged information code, cell information indicating the information code and including the first and second information,
terminal-side transmitting means for transmitting, to the server, the cell information indicating the information code obtained by the imaging means, and
information processing means for performing a process with the first information received from the server in reply to transmission of the cell information indicating the information code from the terminal-side transmitting means; and
the server comprises
decoding means for decoding the cell information indicating the information code received from the information processing terminal,
storage means for storing therein other information of the information code, the other information showing that the information code has become an object being read by the information processing terminal, when the second information of the information code has been decoded by the decoding means, and
server-side transmitting means for transmitting, to the information processing terminal, either the first information decoded by the decoding means or information related to the first information.

US Pat. No. 10,366,261

RADIO FREQUENCY MONITORING OF A SHOPPING FACILITY

Walmart Apollo, LLC, Ben...

1. A system for monitoring a shopping facility using transmitters, the system comprising:a database storing predefined read rate and signal strength fluctuation profiles;
an array of receivers within the shopping facility configured to read transmitters coupled to products within the shopping facility;
an automated ground vehicle (AGV) having a sensor; a control circuit in communication with the database, the array of receivers and the AGV, the control circuit configured to:
receive readings of transmitters from one or more of the receivers;
analyze the readings to identify the products associated with the transmitters;
determine locations of the products within the shopping facility;
monitor fluctuations of a read rate and signal strength of the readings over time for individual ones of the products to identify the presence of customers adjacent thereto;
analyze the fluctuations of the read rate and the signal strength relative to the predefined read rate and signal strength fluctuation profiles to identify a predefined situation selected for investigation for a particular product;
command the AGV to investigate the particular product according to the predefined situation;
wherein the AGV is configured to:
navigate to a location of the particular product; and
operate the sensor to capture data as set forth in the predefined situation;
wherein at least one of the control circuit and the AGV is further configured to analyze the data to determine a next action; and
wherein the control circuit is further configured to create a task for an associate based on the analysis of the data.

US Pat. No. 10,366,260

VEHICLE KEY LOCKER

Firstech, LLC, , WA (US)

1. A device comprising:a key locker body sized to store a vehicle key including a radio-frequency identification (RFID) tag;
a key locker door, wherein the key locker body is configured to shield the RFID tag of the vehicle key from receiving or transmitting radio signals outside the key locker body when the key locker door is closed; and
an access actuator configured to open the key locker door in response to an access signal, wherein opening the key locker door includes the access actuator moving the key locker door to allow the RFID tag of the vehicle key to receive an interrogation signal generated by an RFID reader of a vehicle and send a response signal to the RFID reader of the vehicle in response to receiving the interrogation signal, the response signal allowing driving access to the vehicle, wherein a distance that the key locker door is opened does not allow the vehicle key to be removed from the key locker body.

US Pat. No. 10,366,259

READING DEVICE

TOSHIBA TEC KABUSHIKI KAI...

1. A reading device configured to read information from an RFID tag attached to a product, comprising:a housing including an opening portion and a space for housing the product;
an antenna provided within the space;
an opening-and-closing lid configured to cover the opening portion;
a detector configured to detect state of the opening-and-closing lid, the state including an open state and a closed state;
a reading unit configured to execute a reading process of reading, via the antenna, the information including a product code from the RFID tag of the product in the housing in response to the detection of the closed state; and
an alert unit configured to issue an alert in accordance with the state of the opening-and-closing lid and an operation state of the reading unit,
wherein the alert unit issues the alert when either one of a first condition and a second condition is satisfied, wherein the first condition is satisfied when the reading process is being executed and the opening-and-closing lid is in the open state, and the second condition is satisfied when the reading process is completed and the opening-and-closing lid has been in the closed state for a predetermined length of time, and
wherein the alert unit issues product information corresponding to the product code read by the reading unit when a third condition is satisfied, wherein the third condition is satisfied when the reading process is being executed and the opening-and-closing lid is in the closed state, and
wherein the alert unit issues an alert to close the opening-and-closing lid when the first condition is satisfied.

US Pat. No. 10,366,258

DETERMINING BLOCKED WIRELESS COMMUNICATION BETWEEN DEVICES

Motorola Mobility LLC, C...

1. A method performed by a mobile device for determining that an object is blocking wireless communication, the method comprising:initiating, via a transceiver of the mobile device, the wireless communication with a wireless device;
receiving partial data or no data from the wireless device responsive to the wireless communication;
activating one or more sensors to obtain sensor data based on the receiving the partial data or no data from the wireless device;
determining whether the object is positioned or located between the mobile device and the wireless device based on the sensor data, the object being independent and separate from the mobile device and the wireless device;
determining that the object is likely blocking the wireless communication between the transceiver of the mobile device and the wireless device based on the determining that the object is positioned or located between the mobile device and the wireless device; and
displaying a notification that the wireless communication is being blocked based on the determining that the object is likely blocking the wireless communication.

US Pat. No. 10,366,257

RFID TAG SINGULATION IN DENSE RFID ENVIRONMENTS

Amazon Technologies, Inc....

1. A method, comprising:generating, using one or more computer processors, a first value based on a signal strength of signals received from a first radio frequency identification (RFID) tag at a first RFID reader during multiple read events;
determining a first average signal strength for a predefined period of time based on the first value;
generating a second value based on a signal strength of signals received from one of: (i) a plurality of RFID tags that excludes the first RFID tag at the first RFID reader and (ii) the first RFID tag at a second RFID reader;
determining a second average signal strength for the predefined period of time based on the second value;
generating a tag to noise ratio (TNR) value for the first RFID tag by dividing the first average signal strength by the second average signal strength; and
determining a physical location of the first RFID tag based on the TNR value.

US Pat. No. 10,366,256

METALLURGICAL VESSEL HAVING A PLURALITY OF TRANSPONDERS

PRIMETALS TECHNOLOGIES AU...

1. A metallurgical vessel, comprising:an exterior of the vessel;
an identification tag at the exterior of the vessel;
the identification tag comprises:
a carrier matrix comprised of an electrically and thermally insulating material and at least two passive transponders embedded in the carrier matrix;
the carrier matrix is comprised of several layers,
each layer is above another layer inward from a side of the metallurgical vessel;
each of the layers has a respective thickness measured inward from the side of the metallurgical vessel;
the thicknesses of the layers decreases with increasing distance from an outer surface at the side of the metallurgical vessel; and
at least one of the passive transponders is arranged between two adjacent ones of the layers;
wherein each passive transponder is configured to output a signal sufficient to identify the metallurgical vessel and to distinguish itself from remaining passive transponders of the metallurgical vessel.

US Pat. No. 10,366,255

BARCODE SCANNING DEVICE FOR DETERMINING A PHYSIOLOGICAL QUANTITY OF A PATIENT

KONINKLIJKE PHILIPS ELECT...

1. A barcode scanning device configured both for reading a barcode attached to a patient and for determining a physiological quantity of the patient wherein the physiological quantity of the patient comprises at least one of a respiratory frequency of the patient or a pulse frequency of the patient, the barcode scanning device comprising:a light emitting unit configured for emitting light towards a surface to be sensed of the patient, wherein a wavelength of the emitted light comprises visible light or infrared light, and wherein the emitted light comprises a light pattern of at least one of a rectangular shape, a rectangular framed shape, a grid shape, and a spot shape,
a light receiving unit configured for:
(i) receiving light reflected from a surface to be sensed of the patient, and
(ii) acquiring images based on the received light, and
a signal processing unit configured for: (i) reading a barcode, and (ii) determining the physiological quantity of the patient based on the received light, wherein the signal processing unit comprises:
(i) a change signal determining unit configured for determining a signal indicative of a change between the images acquired based on the received light, and
(ii) a peak detector configured for determining a peak of the signal indicative of the change between the acquired images.

US Pat. No. 10,366,254

AUTHORIZATION FOR TRANSIENT STORAGE DEVICES WITH MULTIPLE AUTHENTICATION SILOS

Microsoft Technology Lice...

1. A transient storage device (TSD) comprising:a physical interface;
a processor that operates under the control of firmware embedded in the transient storage device;
a data storage area divided into one or more individually addressable command targets (ACTs);
each of the one or more ACTs having an associated plurality of silos, each associated plurality of silos including a probe silo which exchanges device configuration information with a host and an authentication silo which provides one or more authentication certificates to the host;
the each authentication silo comprising at least one of a manufacturers certificate and a provisioning certificate, wherein the at least one of a manufacturers certificate and a provisioning certificate comprises a multiple authentication silo extension setting and one or more of an authentication sequence extension setting, an authentication combination extension setting, and a user interaction requirement extension setting, such that:
each associated plurality of silos also including at least a first authentication requirement for a first authentication silo corresponding to the data storage area and a second authentication requirement for a second authentication silo corresponding to the data storage area, both the first and second authentication requirements being included in a logical expression, the logical expression comprising one or more authentication silo combinations, at least one combination comprising both the first and second authentication requirements, and the logical expression, when the one or more authentication silo combinations are authenticated in the combinations specified in the logical expression, determining when access to the associated ACT is granted; and
each associated plurality of silos also including a stored authentication sequence order that specifies an order for attempting authentication of the at least first authentication silo and the second authentication silo, the sequence order applied based upon an operating environment of the host.

US Pat. No. 10,366,253

RELIABILITY ENHANCEMENT METHODS FOR PHYSICALLY UNCLONABLE FUNCTION BITSTRING GENERATION

STC.UNM, Albuquerque, NM...

1. A reliability enhancement method to reduce the number of bit flips during physically unclonable function bitstring generation comprising the step of:measuring a path delay value of each launch capture interval of a plurality of intervals;
calculating a difference value between two randomly selected path delay values;
defining the difference value as a ‘0’ bit when the difference value is positive and a ‘1’ bit when the difference value is negative;
generating a family of bitstrings based on the defining step, each bitstring generated at two or more supply voltage regulators; and
eliminating the family of bitstrings by identifying inconsistencies in one or more bit positions of each bitstring generated at the two or more supply voltage regulators.

US Pat. No. 10,366,252

METHOD AND SYSTEM FOR STORAGE-BASED INTRUSION DETECTION AND RECOVERY

INTERNATIONAL BUSINESS MA...

1. A method for detecting a modification to stored data, said method comprising:continuously creating a point-in-time copy of a storage level logical unit, said point-in-time copy comprising:
a volume copy of said storage level logical unit; and
signatures of different portions of said storage level logical unit, the signatures comprising encoding of data and metadata of files of said storage level logical unit that are monitored in said point-in-time copy;
comparing at least a portion of said point-in-time copy with a previous copy of the storage level logical unit;
judging, based on said comparing, if a modification has occurred, wherein said modification comprises at least an intrusion and an unwanted modification;
marking said point-in-time copy as a good copy and removing said previous copy of the storage level logical unit, when based on said judging, the modification has not occurred; and
defining access rules to identify the files of said storage level logical unit that are monitored in said point-in-time copy,
wherein the access rules define types of actions that are allowed to be performed on the files and types of actions on the files that are to be treated as the intrusion, and
wherein the signatures for files of interest are created based on the access rules.

US Pat. No. 10,366,251

METHODS AND SYSTEMS FOR NETWORK-BASED ANALYSIS, INTERVENTION, AND ANONYMIZATION

Pearson Education, Inc., ...

1. A system for location-based anonymization, the system comprising:a user device comprising location-determining features configured to determine a physical location of the user device; and
at least one server configured to:
determine a data privacy level of a jurisdiction for applying to a contribution from a user, the contribution for placement in a conversation thread, wherein determining the data privacy level of the jurisdiction comprises:
receiving information identifying the physical location of the user device; and
identifying the data privacy level specific to a geographic location of the user based on the physical location of the user by extracting data identifying the data privacy level from an anonymization table based on the physical location information;
determine that a potential identifier in the user contribution is not an actual identifier when the potential identifier: matches a portion of course materials associated with the conversation thread; or when the potential identifier does not match user data; and
anonymize the potential identifier according to the determined data privacy level when the potential identifier does not match course materials associated with the conversation thread.

US Pat. No. 10,366,250

SYSTEMS AND METHODS FOR PROTECTING PERSONALLY IDENTIFIABLE INFORMATION DURING ELECTRONIC DATA EXCHANGES

Symantec Corporation, Mo...

1. A computer-implemented method for protecting personally identifiable information during electronic data exchanges, the method being performed by a first computing device comprising at least one processor, the method comprising:receiving, from a computing device, an authentication token for a proposed electronic data exchange, wherein the authentication token comprises:
an anonymized identifier, for a user of the computing device, that obviates a need to transmit personally identifiable information of the user as part of the proposed electronic data exchange; and
information of the proposed electronic data exchange extracted by the computing device from an image of a digital representation of the proposed electronic data exchange, wherein extracting data exchange information from the image of the digital representation includes analyzing pixels of the image to identify an electronic code that includes the data exchange information;
preventing the user's personally identifiable information from entering the proposed electronic data exchange by identifying the user using the anonymized identifier rather than using the user's personally identifiable information;
authenticating the user identified in the data exchange information; and
in response to authenticating the user, authorizing completion of the proposed electronic data exchange.

US Pat. No. 10,366,249

SYSTEM AND METHOD FOR PRIVACY MANAGEMENT OF INFINITE DATA STREAMS

Samsung Electronics Co., ...

1. An apparatus for preserving streaming data anonymity, the apparatus comprising:a physical memory configured to store data streams of user data; and
at least one hardware processor operably connected to the physical memory, the at least one hardware processor configured to:
continuously collect the data streams of the user data comprising participation data or sensor data from a plurality of user devices;
convert the user data into a data summary that represents the participation data or the sensor data for a certain time period;
transform the data summary to a distorted summary based on a difference level for preserving differential privacy of the user data, wherein to transform the data summary, the hardware processor is configured to:
determine whether the difference level between the data summary and a previous data summary exceeds a difference threshold;
transform the data summary to the distorted summary by adding a first noise when the difference level exceeds the difference threshold;
when the difference level does not exceed the difference threshold:
determine whether a retroactive count of the data summary is greater than a retroactive count threshold,
transform the data summary to the distorted summary by adding a second noise when the retroactive count is greater than the retroactive count threshold, and
transform the data summary to the distorted summary by adding a third noise when the retroactive count is not greater than the retroactive count threshold; and
transmit the distorted summary to a data processing system for statistic based services.

US Pat. No. 10,366,248

SYSTEM AND METHOD FOR PROVIDING DATA SECURITY IN A HOSTED SERVICE SYSTEM

INTERNATIONAL BUSINESS MA...

1. A hosted service system for protecting sensitive data, the system comprising:a host computer system having a hardware processor, wherein the host system includes:
a federation server; and
a database management system (DBMS), the DBMS having:
a database;
a query pre-parser, wherein the query pre-parser is configured to receive, via the federation server, communications from a key management system (KMS) and a metadata service system (MSS) associated with a tenant system where the host system is configured to process at least some of the data of the tenant system, and wherein the query pre-parser is configured to:
receive a query;
receive, from the MSS, a determination if the query received by the query pre-parser has a part of the query associated with the sensitive data;
if the part of the query is associated with the sensitive data:
 receive, from the KMS, at least one encryption key corresponding to the part of the query;
 decrypt the part of the query using the at least one encryption key corresponding to the part of the query; and
 generate a modified query, wherein the modified query includes the decrypted part of the query;
generate a database query (DB query) using at least one of the query or the modified query; and
transmit the DB query to the database; and
a results handler, wherein the query pre-parser and the results handler are both communicatively coupled to the federation server.

US Pat. No. 10,366,247

REPLACING DISTINCT DATA IN A RELATIONAL DATABASE WITH A DISTINCT REFERENCE TO THAT DATA AND DISTINCT DE-REFERENCING OF DATABASE DATA

ALTR Solutions, Inc., Sa...

1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:obtaining, with one or more processors, criteria to select plain-text values in, or requested to be written to, a lower-trust database;
selecting, based on the criteria, a first plain-text value stored in, or requested to be stored in, a first entry in the lower-trust database;
in response to selecting the first plain-text value, determining, with one or more processors, a first reference value, wherein:
the criteria indicate whether the plain-text values are to be stored in the lower-trust database or a higher-trust database;
the lower-trust database stores relationships between both plain-text values stored in the lower-trust database and plain-text values stored in the higher-trust database; and
the first reference value does not reveal the first plain-text value without access to the higher-trust database;
storing, with one or more processors, the first plain-text value in the higher-trust database in a second entry identified by the first reference value;
storing, with one or more processors, the first reference value in the first entry of the lower-trust database;
selecting, with one or more processors, another instance of the first plain-text value stored in, or requested to be stored in, a third entry in the lower-trust database, the third entry being a different entry from the first entry; and
in response to selecting another instance of the first plain-text value stored in, or requested to be stored in, the third entry in the lower-trust database, storing, with one or more processors, a value associated with, or equal to, the first reference value.

US Pat. No. 10,366,246

ELECTRONIC DEVICE AND OPERATING METHOD THEREOF

Samsung Electronics Co., ...

1. An electronic device comprising:a memory storing a first piece of identification information, a second piece of identification information, a first function set related to a first operating authority, and a second function set related to a second operation authority;
an input circuitry;
a sensor;
a communication unit comprising communication circuitry; and
a processor functionally connected to the memory, the input circuitry, the communication circuitry, and the sensor, and
wherein the processor is configured to:
detect a first request for access to the electronic device through the input circuitry or the sensor;
acquire the first piece of identification information or the second piece of identification information in response to the first request;
set the first function set when the first piece of identification information is acquired;
set the second function set when the second piece of identification information is acquired;
remove the first function set on the basis of a determination that the electronic device is operating under the first operation authority when the second piece of identification information is acquired;
remove the second function set on the basis of a determination that the electronic device is operating under the second operation authority when the first piece of identification information is acquired; and
allow access based on the set function set of the first function set and the second function set,
wherein the first piece of identification information is acquired through the input circuitry or the sensor, and the second piece of identification information is acquired through the communication unit from a peripheral device to be wirelessly connected to the electronic device via the communication circuitry,
wherein the first function set comprises a function of operating independently in the electronic device, and the second function set comprises a function of operating in cooperation with the peripheral device, and
wherein the second function set comprises a function of sharing a notification event with the peripheral device.

US Pat. No. 10,366,244

PERFORMING AN OPERATION ON SENSITIVE DATA

International Business Ma...

1. A method for performing an operation on sensitive data, said method comprising: receiving, from a computing system by a remote processor of a data processing system during execution of an application in the computing system using a local processor in the computing system to implement the execution of the application in the computing system, information comprising: (i) a data stream that includes protected sensitive data, wherein the protected sensitive data is an encryption of unprotected sensitive data via use of a protection key (ii) an identification of an operation required by the application program to be performed on the unprotected sensitive data during the execution of the application program in the computing system, wherein the operation accesses and utilizes the unprotected sensitive data during performance of the operation, (iii) a request to perform the operation, and (iv) a processor status of the local processor in the computing system, wherein the computing system is external to the data processing system, wherein the local processor is a sensitive data processor (SDP), wherein the remote processor is a remote sensitive data processor (RSDP), and wherein said receiving the information comprises receiving, the information via a direct memory access (RDMA) from a memory of the computing system to a memory of the data processing system without involving the computing system's operating system and without involving the data processing system's operating system; said remote processor de-protecting the received protected sensitive data by decrypting the protected sensitive data, said de-protecting generating the unprotected sensitive data from the protected sensitive data; after said de-protecting, said remote processor performing the operation, said performing the operation comprising accessing and utilizing the unprotected sensitive data and generating a result; after said performing the operation, said remote processor re-protecting the unprotected sensitive data, said re-protecting restoring the protected sensitive data by encrypting the unprotected sensitive data via use of the protection key; and said remote processor sending the result to the computing system, wherein the said de-protecting, said performing the operation, and said re-protecting have characteristics of being transparent to the execution of the application program in the computing system and of not interrupting a flow of the execution of the application program in the computing system, and wherein said receiving the processor status of the local processor provides a complete computer context that enables the characteristics to exist.

US Pat. No. 10,366,243

PREVENTING RESTRICTED CONTENT FROM BEING PRESENTED TO UNAUTHORIZED INDIVIDUALS

AirWatch, LLC, Atlanta, ...

1. A system, comprising:a computing device;
a storage device storing a plurality of computer instructions executable by the computing device, wherein the plurality of computer instructions cause the computing device to at least:
detect, by a primary management component associated with a management service, a request by a managed application whose operation is at least in part managed by the management service to render content in a first display of a primary user device, the content being at least a portion of an enterprise resource associated with the management service;
determine whether the primary user device satisfies a compliance rule indicating whether the first display of the primary user device is authorized to render the content;
in response to determining that the primary user device fails to satisfy the compliance rule:
prevent the content from being rendered in the first display of the primary user device;
transmit, by the primary management component, a request for a secondary management component to obtain the content from the management service, wherein the secondary management component responds by requesting the content from the management service;
receive the content from the management service by the secondary management component; and
cause, by the secondary management component, the content to be rendered in a second display of a secondary user device.

US Pat. No. 10,366,241

SYSTEMS AND METHODS FOR ANALYZING, ASSESSING AND CONTROLLING TRUST AND AUTHENTICATION IN APPLICATIONS AND DEVICES

The Privacy Factor, LLC, ...

1. A system comprising:one or more processors; and
memory storing instructions that, when executed by the one or more processors, cause the system to perform:
receiving a request to analyze trust of a client system;
identifying, based on the request, a set of digital certificates installed on the client system;
for each digital certificate of the set of digital certificates identified based on the request:
(i) determining whether the digital certificate has a previously generated digital certificate trust rating;
(ii) if at least a determination is made that the digital certificate does not have a previously generated digital certificate trust rating, then
(1) identifying digital certificate parameters of the digital certificate, the digital certificate parameters including at least an encryption parameter, a certifying authority parameter, and at least one of a parameter associated with a history of adverse events associated with the digital certificate or a parameter associated with a history of adverse events associated with an issuer of the digital certificate; and
(2) generating a new digital certificate trust rating for the digital certificate based on a respective level of trust risk associated with each digital certificate parameter of the digital certificate parameters;
(iii) if at least a determination is made that the digital certificate has a previously generated trust rating, then retrieving the previously generated digital certificate trust rating for the digital certificate from a datastore;
generating a first aggregate digital certificate trust rating based on any of the new digital certificate trust ratings and the previously generated digital certificate trust ratings for the set of digital certificates installed on the client system; and
establishing a mapping between an application or website and one or more digital certificates of the set of digital certificates installed on the client system.

US Pat. No. 10,366,240

AUTHORIZATION TO ACCESS A SERVER IN THE CLOUD WITHOUT OBTAINING AN INITIAL SECRET

Intuit Inc., Mountain Vi...

1. A computing system implemented method for providing efficient and secure access control for a data management system;receiving access request data from a cloud-based client machine requesting access to secured data controlled by an access control system;
retrieving an access policy identification from the access request data;
retrieving access policy data related to an access policy corresponding to the access policy identification, the access policy defining one or more access policy rules;
receiving client characteristics data related to characteristics of the client machine associated with a cloud platform service provider;
comparing the client characteristics data to the access policy rules;
determining whether the client characteristics data satisfies the access policy rules;
providing ticket data to the client machine, the ticket data representing a ticket for authenticating the client machine;
verifying that the ticket data has been properly written to a client machine information database; and
if the ticket data has been properly written to the client machine information database and if the client characteristics data satisfies the access policy rules, generating initial access secret data including an initial access secret configured to enable the client machine to access secured data protected by the access control system.

US Pat. No. 10,366,239

MULTI-PARTY ENCRYPTION CUBE PROCESSING APPARATUSES, METHODS AND SYSTEMS

VISA INTERNATIONAL SERVIC...

1. A method for use within secure multi-pa rty computation, comprising:storing, by one or more data processors, a plurality of operation preferences including allowed database operations and a cryptographic preference, which are both associated with a data set, each cryptographic preference specifying two or more encryption protocols;
storing, by the one or more data processors, the data set on an element by element basis, according to the cryptographic preference;
analyzing, by the one or more data processors, a query from a requestor associated with at least the data set;
determining, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on the operation preference;
determining, by the one or more data processors, elements of the data set required to perform the allowable operation on the data set;
selecting, by the one or more data processors, an encryption protocol specified by the cryptographic preference for each respective element of the data set; and
using, by the one or more data processors, the at least one of the two or more encryption protocols to perform the allowable operation on the data set, with a summarized version of a transactional data analysis provided to at least the requestor while keeping data from individual contributors to the data set private from one another.

US Pat. No. 10,366,238

SECURE BOOT FOR MULTI-CORE PROCESSOR

Microsoft Technology Lice...

1. An apparatus, comprising:a multi-core processor, including a first core, a second core, and at least one memory adapted to store run-time data, wherein the first core is adapted to execute processor-executable code that, in response to execution, enables the multi-core processor to perform actions, including:
deriving a first mutated key from a secret device key and based on a hash of a first boot loader;
deriving a second mutated key from the first mutated key;
calculating a hash of a runtime for the first core;
validating the runtime for the first core based on a signature of the runtime for the first core;
in response to validating the runtime for the first core, booting the runtime for the first core;
calculating a hash of a runtime of a first execution environment for the second core;
using the runtime for the first core to validate the runtime of the first execution environment for the second core based on a signature of the runtime of the first execution environment for the second core, wherein the signature of the runtime of the first execution environment for the second core is based on a key that is retrieved from a secure key store and that is at least one of decrypted or validated with the second mutated key; and
in response to validating the runtime of the first execution environment of the second core, booting the runtime of the first execution environment of the second core.

US Pat. No. 10,366,236

SOFTWARE ANALYSIS SYSTEM, SOFTWARE ANALYSIS METHOD, AND SOFTWARE ANALYSIS PROGRAM

NIPPON TELEGRAPH AND TELE...

1. A software analysis system comprising: processing circuitry configured to, in accordance with codes of applications,determine whether the applications access predetermined privacy information due to permission, assign a first type of label to any application from the applications that is determined to access the predetermined privacy information, and assign a second type of label, which is different from the first type of label, to any application that is determined not to access the predetermined privacy information;
calculate a score of each word included in descriptions of the applications such that a high score is set to a word that is included in a text of the description of the application, to which the first type of label is assigned, more often than in a text of the description of the application, to which the second type of label is assigned, and extract a predetermined number of words having a highest score with regard to the score calculated from the descriptions of the applications in relation to the permission; and
classify any application from the applications whose text of the description includes at least one of the predetermined number of words extracted by the processing circuitry as an application that refers to the permission and classify any application from the applications whose text of the description does not include the word extracted by the processing circuitry as an application that does not refer to the permission, such that the processing circuitry indicates whether there is a discrepancy between whether the text of the description of a respective application does or does not refer to the permission and whether a code of the respective application actually does or does not access the predetermined privacy information due to the permission.

US Pat. No. 10,366,235

SAFE MOUNTING OF EXTERNAL MEDIA

Microsoft Technology Lice...

1. A computing device, comprising:a processor; and
a memory having stored thereon instructions executable by the processor to cause the computing device to provide an operating system, a fileserver, a client to the fileserver, and a virtual machine hosted on the computing device, the memory also having additional instructions executable by the processor to cause the computing device to:
detect that a removable data storage device is connected to the computing device, the removable data storage device having a filesystem organizing file data on the detected removable data storage device; and
upon detecting the removable data storage device being connected to the computing device,
mount the filesystem of the removable data storage device to the virtual machine hosted on the computing device without directly mounting the filesystem of the removable data storage device to the operating system of the computing device; and
serve, via the fileserver, the file data organized by the filesystem from the removable data storage device mounted to the virtual machine to the client on the computing device, thereby preventing the filesystem on the removable data storage device from affecting other parts of the computing device by limiting the filesystem of the removable data storage device to have access to only resources available to the virtual machine on the computing device.

US Pat. No. 10,366,234

IDENTIFYING WEB SHELL APPLICATIONS THROUGH FILE ANALYSIS

Rapid7, Inc., Boston, MA...

1. A method for identifying malicious applications, the method comprising:accessing, through an interface to a computer-readable medium, at least one file;
performing, using a configured processor, a lexical analysis on content of the at least one file to turn the content into lexed components that include syntactically meaningful tokens;
extracting, using the configured processor, at least one feature related to the file based on at least one of the lexed components and unlexed components of the file;
providing, using the configured processor, the at least one feature to a classifier as input;
executing, using the classifier, at least one machine learning procedure to analyze the at least one feature to calculate a probabilistic assessment indicating the likelihood that the file is a web shell application; and
removing the file from an affected system upon the probabilistic assessment indicating that the file is likely a web shell application.

US Pat. No. 10,366,233

SYSTEMS AND METHODS FOR TRICHOTOMOUS MALWARE CLASSIFICATION

Symantec Corporation, Mo...

1. A computer-implemented method for trichotomous malware classification, at least a portion of the method being performed by one or more computing devices comprising at least one processor, the method comprising:identifying a sample potentially representing malware;
selecting a machine learning model trained on a set of samples to distinguish between malware samples and benign samples, the machine learning model including one or more independent processing units;
analyzing the sample using a plurality of stochastically altered versions of the machine learning model to produce a plurality of classification results, wherein analyzing the sample includes applying the selected machine learning model through a filter that modifies the operation of the processing units of the machine learning model dynamically as the processing units are applied to the sample;
calculating a variance of the plurality of classification results;
adjusting the calculated variance by accessing a precision value associated with the machine learning model and adding an inverse of the precision value to the calculated variance to derive a predictive variance of the machine learning model for the sample; and
trichotomously classifying the sample based at least in part on the predictive variance of the plurality of classification results.

US Pat. No. 10,366,232

LANGUAGE-BASED MISSING FUNCTION CALL DETECTION

HRL Laboratories, LLC, M...

1. A system for preventing security vulnerabilities in software, the system comprising:one or more processors and a non-transitory computer-readable medium having executable instructions encoded thereon such that when executed, the one or more processors perform operations of:
detecting, in computer software source code, missing function calls in appropriate security contexts, wherein varying security contexts represent varying ordered security levels of security-sensitive operations,
applying a typechecking operation to enforce a requirement that a function is only called with a security context that is at least at its required security level; and
detecting at least one new class of security flaws in the computer software source code to defend against cybersecurity risk.

US Pat. No. 10,366,229

METHOD FOR DETECTING A CYBER ATTACK

JASK Labs Inc., San Fran...

1. A method for detecting a cyber attack comprising:storing network traffic data of network events occurring on a network over a period of time to a network accounting log;
compressing the network accounting log by writing metadata of network events, occurring within the period of time and represented in the network accounting log, to a compressed log file comprising a probabilistic data structure;
in response to receipt of a new threat intelligence representing a newly-identified security threat identified after the period of time, querying the compressed log file for a network traffic metadata value representative of a threat element defined in the new threat intelligence;
in response to detecting the threat element in the compressed log file, querying the network accounting log for the threat element; and
in response to detecting the threat element in the network accounting log, issuing an alert to respond to the newly-identified security threat on the network.

US Pat. No. 10,366,228

DETECTION AND MITIGATION OF MALICIOUS INVOCATION OF SENSITIVE CODE

McAfee, LLC, Santa Clara...

17. A method comprising:monitoring regions of code that include Application Program Interface (API) code pages;
detecting an execution fault of a page load on the monitored API code pages;
determining whether the execution fault occurred at a proper entry point of the API; and
clearing, based on a determination that the execution fault did not occur at the proper entry point of the API, a last exception record address and calculate an offset from the entry point of the API.

US Pat. No. 10,366,227

SECURE DEBUGGING IN A TRUSTABLE COMPUTING ENVIRONMENT

INTERNATIONAL BUSINESS MA...

1. A computer program product for facilitating debugging within a computing environment, the computer program product comprising:a computer readable storage device readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising:
determining, by a trusted component of the computing environment, that debugging of a virtual machine of the computing environment is to be initiated, the determining being based on an encrypted communication inaccessible to a hypervisor, the encrypted communication having been sent by a client via the hypervisor to the trusted component;
commencing, by the trusted component, a debugging session, based on the determining that debugging of the virtual machine is to be initiated, the commencing the debugging session comprising:
generating encryption information to be provided to the client for which debugging of the virtual machine is to be performed, the encryption information being inaccessible to the hypervisor and including a symmetric key that is encrypted and to be used by the client to encrypt a debug request to debug the virtual machine; and
forwarding the encryption information to the client via the hypervisor;
obtaining, by the trusted component, an encrypted debug request sent by the client via the hypervisor indicating one or more operations to be performed to debug the virtual machine, the encrypted debug request encrypted using the symmetric key;
performing, by the trusted component, the one or more operations specified in the encrypted debug request to obtain debugging results for the virtual machine;
encrypting, by the trusted component, the debugging results using the symmetric key to provide encrypted debugging results;
providing, by the trusted component, the encrypted debugging results to the client via the hypervisor; and
wherein encrypting the debugging result using the symmetric key facilitates preventing the hypervisor from accessing data or context of the virtual machine.

US Pat. No. 10,366,226

MALICIOUS CODE ANALYSIS DEVICE AND METHOD BASED ON EXTERNAL DEVICE CONNECTED VIA USB CABLE

ELECTRONICS AND TELECOMMU...

1. A malicious code analysis method based on an external device connected via a Universal Serial Bus (USB) cable, the malicious code analysis method comprising:connecting a malicious code analysis device to an analysis target terminal on which malicious code is to be executed, the malicious code analysis device being located outside the analysis target terminal and connected to the analysis target terminal via the USB cable;
multi-booting the analysis target terminal based on multiple Operating System (OS) image files stored in the malicious code analysis device;
providing a user input to the analysis target terminal to thereby prevent the malicious code from recognizing that a current environment is an analysis environment, after the analysis target terminal has been multi-booted based on the multi OS image files;
analyzing, by the malicious code analysis device, the malicious code in consideration of both the user input and data modified by the malicious code among data corresponding to the multiple OS image files,
wherein the analyzing the malicious code comprises:
extracting both a real-time activity of the malicious code, which corresponds to an intermediate activity of the malicious code being executed on the analysis target terminal, and a result of a modification made to the analysis target terminal after the malicious code is executed on the analysis target terminal; and
checking, by the malicious code analysis device, at least one OS image file loaded into the analysis target terminal in accordance with the multi-booting, among the multiple OS image files, from outside the analysis target terminal, and then extracting the modified data; and
restoring the at least one OS image file.

US Pat. No. 10,366,225

METHOD FOR ALLOWING A CONFIGURATION CHANGE OF AN INTELLIGENT ELECTRONIC DEVICE OF A POWER SYSTEM

ABB Schweiz AG, Baden (C...

1. A method for allowing a change in configuration of an Intelligent Electronic Device (IED) of a power system with a signalling component, the method comprising:receiving a request at the IED for changing the configuration, wherein the request comprises a signal from the signalling component along with a user input, wherein the signal is received from the signalling component at the IED in response to establishing a connection between an I/O module of the IED and the signalling component, wherein the user input is received at a communication interface of the IED, and wherein establishing the connection between the I/O module and the signalling component comprises creating a feedback loop using at least one input of the I/O module of the IED, at least one output of the I/O module of the IED, and the signalling component;
verifying the request automatically by the IED, wherein verifying the request comprises detecting a predetermined signal pattern at the I/O module upon receiving the signal, wherein the predetermined signal pattern is stored in a memory associated with the IED; and
enabling the change in configuration in response to verification of the request by the IED.

US Pat. No. 10,366,224

SYSTEM AND METHOD FOR SECURING SECURE MEMORY ALLOCATIONS IN AN INFORMATION HANDLING SYSTEM

Dell Products, LP, Round...

1. An information handling system comprising:a hardware processor; and
a data storage, the data storage storing a basic input/output system, the basic input/output system when executed causing the hardware processor to perform operations including:
partitioning the data storage to include a secure storage partition to which an access is restricted;
storing a set of authorized memory locations, with each authorized memory location in the set of authorized memory locations authorized to access the secure storage partition;
receiving a function call requesting the access to the secure storage partition, wherein the function call is a BIOS function call;
reverse tracing the BIOS function call to determine a memory location representing an origin of the BIOS function call;
comparing the memory location to the set of authorized memory locations authorized for the access to the secure storage partition;
in response to the memory location satisfying the set of authorized memory locations, authorizing the BIOS function call for the access to the secure storage partition;
in response to the memory location failing to satisfy the set of authorized memory locations, blocking the BIOS function call from accessing the secure storage partition, and
determining a software program representing the origin of the BIOS function call.

US Pat. No. 10,366,223

METHODS AND APPARATUS FOR RESTRICTING BATCH REQUESTS FOR SERVICE

BEIJING JINGDONG SHANGKE ...

1. A method for restricting batch requests for a service, characterized in comprising:receiving, by a server, service request information sent by a terminal;
sending, by the server, a calculation question to the terminal, the calculation question requiring a larger amount of computing resources of the terminal than that of the server; and
receiving, by the server, a calculation result of the calculation question from the terminal, and verifying the calculation result, and if the calculation result is correct, providing the service to the terminal, otherwise, rejecting to provide the service to the terminal.

US Pat. No. 10,366,222

MANAGING PASSWORDS USING STEGANOGRAPHY

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for managing passwords using steganography, the method comprising:receiving a master password for a password manager;
determining whether the master password is valid;
upon determining that the master password is valid, displaying a plurality of images that are stored in a computer memory, and displaying a list of computer services;
receiving user input indicative of selecting a first image of the plurality of images;receiving the user input indicative of selecting a first computer service of the list of the computer services, for which a first password is to be stored;receiving an indication of the first password;
generating a steganographic image based on the first image and the indication of the first password; and
replacing the first image with the steganographic image in the plurality of images stored in the computer memory, wherein the replacement is performed to prevent a malicious user from using the two images to determine how the steganographic image has changed relative to the first image.

US Pat. No. 10,366,221

DONGLE APPARATUS AND METHOD OF CONTROLLING THE SAME

Samsung Electronics Co., ...

1. A dongle apparatus comprising:a fastener configured to be combined with or separated from a home appliance;
a locker configured to lock the fastener so that the fastener does not separate from the home appliance and unlock the fastener to separate fastener from the home appliance;
a power supply configured to receive power supplied from the home appliance when the fastener is combined with the home appliance;
a power converter configured to convert the power into available power; and
a controller configured to:
receive the available power from the power converter,
determine whether an update of software of at least one of the home appliance and the dongle apparatus is started or finished by receiving the available power, and
control locking and unlocking between the locker and the fastener depending on whether the update of software is started or finished.

US Pat. No. 10,366,220

SYSTEM AND METHOD FOR SUPPLYING SECURITY INFORMATION

Tokenize, Inc., Rocheste...

1. A wearable device, comprising:a housing configured to be worn by a user;
at least one sensor supported by the housing and configured to sense presence of a user in contact with the housing, and at least one biometric parameter of a user in contact with the wearable device and output one or more signals representative of the biometric parameter;
a communication device configured to provide wireless communication signals;
at least one data processing system supported by the housing, and having one or more processor configured to receive the one or more signals representative of the biometric parameter and sensed presence of the user and compare the biometric parameter to a stored user parameter for authentication of the user, wherein upon authentication by the one or more processor, the one or more processor are configured to switch from a locked mode to an unlocked mode to enable the one or more processor to communicate data, via the communication device, indicative of at least two factors conforming to the requirements of a multi-factor authentication scheme, and to switch from the unlocked mode to the locked mode in absence of the at least one sensor device sensing the presence of the user, at least one of the one or more processor and the communication device being disabled from communicating data indicative of the at least two factors in the locked mode; and,
a power source providing energy to the sensor and the at least one data processing system; and
wherein at least one of the sensor and the one or more processor are configured to transform the biometric parameter with a cryptographic hash function.

US Pat. No. 10,366,219

PREVENTING UNAUTHORIZED ACCESS TO SECURED INFORMATION USING IDENTIFICATION TECHNIQUES

Bank of America Corporati...

1. A computing platform, comprising:at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:
receive driver sensor data indicating whether a driver seat in a vehicle is occupied;
determine, based on the driver sensor data, an identity of a driver of the vehicle;
receive passenger sensor data indicating whether a passenger seat in the vehicle is occupied;
based on the passenger sensor data indicating that the passenger seat in the vehicle is occupied, obscure first information on a screen of the vehicle while displaying second information on the screen of the vehicle; and
send, to a headset of the driver, audio of a spoken version of the first information.

US Pat. No. 10,366,218

SYSTEM AND METHOD FOR COLLECTING AND UTILIZING CLIENT DATA FOR RISK ASSESSMENT DURING AUTHENTICATION

Nok Nok Labs, Inc., San ...

1. A method implemented on a client device comprising a memory for storing program code, and a processor for processing the program code to implement the method comprising:collecting client configuration data on a client device using a native code agent running in a client operating system of the client device, the native code agent having secure access to the client configuration data, wherein the client configuration data is collected by the native code agent without disclosing confidential user information to a relying party;
performing an assessment of the client configuration data on the client to determine a risk level associated with the client device, the client configuration data including:
data related to client authentication hardware, including an indication of hardware to implement secure elements or trusted execution environments on the client;
data related to the client operating system, including an indication of a current operating system version installed on the client device and how recently the client operating system has been updated;
data related to anti-virus software configuration, including an indication of whether an anti-virus software has been installed and how recently the anti-virus software has been updated and/or executed; and
data related to firewall configuration, including an indication of whether a firewall is installed and how recently the firewall has been updated;
collecting biometric reference data of the user usable to authenticate the user and storing the biometric reference data in a secure storage of the authentication device used to collect the biometric reference data, the secure storage to cryptographically protect the biometric reference data of the user;
performing authentication for a particular transaction in accordance with the risk level to determine an assurance level that a current user of the client is legitimate, the assurance level determined, at least in part, based on the risk level, and also determined based on a combination of one or more current or prior explicit user authentications using the authentication hardware and one or more non-intrusive authentication techniques;
wherein for relatively higher risk levels, relatively more rigorous authentication techniques are selected to reach an assurance level required for the transaction as specified by the relying party, and for relatively lower risk levels, relatively less rigorous authentication techniques are selected to reach the assurance level required for the transaction as specified by the relying party; and
permitting the transaction when the authentication techniques selected to reach the assurance level required for the transaction as specified by the relying party are successfully completed and denying the transaction when the authentication techniques selected to reach the assurance level required for the transaction as specified by the relying party are not successfully completed.

US Pat. No. 10,366,217

CONTINUOUS USER AUTHENTICATION

SECUREDTOUCH LTD., Tel A...

1. A cross platform user authentication system, comprising:an authentication server;
an enterprise server; and
a second touch screen device configured to communicate with said enterprise server and said authentication server;
said system configured to generate at least one unique user profile during user contact with a touch screen of a first touch screen device;
said at least one unique user profile comprising at least touch parameters;
said authentication server configured to communicate with said enterprise server;
said system configured to perform:
initial identification of said user using said second touch screen device when starting a session with said enterprise server; and
continuous cross platform authentication of said user during contact with a touch screen of said second touch screen device during said session with said enterprise server, according to said at least one unique user profile generated while said user has been using said first touch screen device;
wherein said first touch screen device is different from said second touch screen device and wherein the authentication of said user of said second touch screen device occurs without requiring a new calibration on said second touch screen device.

US Pat. No. 10,366,216

AUTHORIZATION DEVICE THAT GRANTS AUTHORITY TO GUEST USERS

Konica Minolta, Inc., To...

1. An authorization device comprising a hardware processor, to grant authority whereinthe hardware processor evaluates a depth of a social relationship on a social networking service used by a plurality of users, between a host user to whom an authority for using a device was given and a guest user different from the host user,
wherein the depth of the social relationship is determined based on a type of relationship defined on the social network service and at least one of a number of mutual friends, and interactions between the host user and guest user, and
the hardware processor grants an authority to the guest user to use the device, based on the evaluation result, wherein the authority granted to the guest user is the same authority given to the host user.

US Pat. No. 10,366,215

AUTHENTICATION METHOD AND SYSTEM

LICENTIA GROUP LIMITED, ...

1. A computer-implemented verification method comprising the step of:enabling a user to input an identifier into an electronic device having:
a screen; and
an operable, virtual keypad provided within a keypad zone of the screen, the operable, virtual keypad comprising a plurality of labeled keys, each labeled key having at least one indicia associated with it which, when operated by the user, causes the associated indicia to be inputted to the device, and the operable, virtual keypad generated at run time;
by operating at least one labeled key of the operable, virtual keypad through an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone, and which functions as a cover superimposed over the operable, virtual keypad such that:
the operable, virtual keypad is hidden, at least partially, by the image; and,
when the user identifies a location within the image it operates the operable, virtual keypad key positioned at that location within the keypad zone to record the indicia of the operable, virtual keypad key in the device as an encoded version of the user's input.

US Pat. No. 10,366,214

METHOD AND DEVICE FOR ESTABLISHING WIRELESS CONNECTION

Huawei Technologies Co., ...

1. A method for establishing a wireless connection between a first device and a second device, comprising:receiving, by the first device, an operation instruction of a first user;
generating, by the first device, connection information according to the operation instruction, wherein the first user is a user corresponding to the first device, wherein the operation instruction of the first user is an instruction of the first user for triggering the first device to: perform media sharing with another device, or perform network sharing with another device, or perform multi-screen interaction with another device, or perform a multi-player game with another device, or establish a service connection to another device; and
wherein the another device is one or more devices that can meet a service requirement of the first device; and
providing the connection information to the second device near the first device, so that the second device obtains a first identifier through calculation according to at least a first information portion of the connection information by using a preset algorithm, wherein the first information portion is a portion or all of the connection information, wherein the providing, by the first device, the connection information to the second device, comprises:
displaying or playing, by the first device, the connection information, so that the second device receives the connection information input by a user to the second device; or generating, by the first device according to the connection information, a graphic code comprising the connection information, and displaying the graphic code, so that the second device scans the graphic code and obtains the connection information; or establishing, by the first device, a short-range communications connection to the second device, and sending the connection information to the second device by using the short-range communications connection;
receiving, by the first device, a first message that is sent by the second device according to the connection information, wherein the first message carries the first identifier;
obtaining, by the first device, a second identifier through calculation according to at least the first information portion of the connection information by using the preset algorithm;
determining, by the first device, whether the first identifier matches the second identifier; and
in response to determining that the first identifier matches the second identifier, sending, by the first device, a second message to the second device, and establishing a wireless connection to the second device, wherein the second message is a response message for the first message, wherein the establishing the wireless connection to the second device comprises:
verifying whether first authentication information of the second device matches second authentication information of the first device, wherein the first authentication information is generated by the second device through calculation according to at least a second information portion of the connection information, the second information portion is a portion or all of the connection information, and the second authentication information is generated by the first device through calculation according to at least the second information portion of the connection information; and
in response to determining that the first authentication information matches the second authentication information, sending confirmation information to the second device, and establishing the wireless connection to the second device, wherein the confirmation information is used by the second device to determine to establish the wireless connection to the first device;
wherein the verifying whether first authentication information of the second device matches the second authentication information of the first device comprises:
determining that the second authentication information of the first device is a pairwise master key (PMK) of a 4-way handshake authentication mode, and verifying, according to the PMK by using the 4-way handshake authentication mode, whether the first authentication information of the second device matches the second authentication information of the first device; or
determining that the second authentication information of the first device is a personal identification number (PIN) of a Wireless Fidelity protected setup (WPS) authentication mode, and verifying, according to the PIN by using the WPS authentication mode, whether the first authentication information of the second device matches the second authentication information of the first device.

US Pat. No. 10,366,213

PROTECTING AN APPLICATION VIA AN INTRA-APPLICATION FIREWALL

International Business Ma...

1. A computer-implemented method for building a secure computing device application, the method comprising:scanning one or more communication interfaces of a first application, the first application being stored to a computing device;
determining, in response to the scanning, that at least a first component of a plurality of components of the first application is subject to public access from any application;
removing one or more public access features associated with the first component, wherein the first component is no longer subject to public access from any application;
adding, to the first application, a first module to control access to data to or from the first component via one or more security rules, wherein the scanning, the determining, the removing, and the adding are performed by a first computing device at compile time;
receiving a first request to transfer data from the first component to a second component within the first application;
in response to the receiving of the first request, receiving a second request from a second application within the computing device to inject data to the second component via a driver of a kernel of the computing device; and
blocking, based on the one or more security rules, the second request from the second application; and
wherein the first application is managed by an Android operating system, and wherein the first component is a first activity, the first activity being a user interface screen that represent an instance workflow of the first application, and wherein the public access features includes exported activities, the exported activities corresponding to activities that cross application boundaries and are configured to be invoked from any application.

US Pat. No. 10,366,212

VERIFICATION SYSTEM FOR SECURE TRANSMISSION IN A DISTRIBUTED PROCESSING NETWORK

1. A verification system, comprising:an arithmetic/logic unit (“ALU”) to perform one or more mathematical operations and compare selected variables;
a register to hold a value from a comparison of selected variables performed by the ALU;
an instruction decoder to provide read and write commands to memory;
an address bus to provide an address to memory for a read or write operation; and
a data bus to provide or access data for a write or read operation to or from memory, wherein:
the ALU automatically generates, in response to a request from a target computational device, a recipient identifier, wherein at least a portion of the recipient identifier is generated by a random or pseudo-random number generator seeded with a transaction identifier of the transaction, and provides the recipient identifier to the target computational device, the recipient identifier being related to an identity of the target computational device and/or a target device human operator, and writes the recipient identifier to memory in response to a write command issued by the instruction decoder; and
as a part of a transaction, the ALU automatically: receives, from a user computational device of a first user, the recipient identifier and a credential of the first user and/or user computational device, wherein the recipient identifier is a token encapsulating the transaction identifier, one or more of an identifier of an entity associated with the target computational device, an identifier of the target computational device human operator, and an identifier of the target computational device and a transaction amount authenticates at least one of the first user computational device and first user as a prerequisite to providing restricted information to the target computational device; compares each of the recipient identifier and credential against one or more stored values; and, when each of the comparisons match, causes the information provider system to provide the restricted information to the target computational device to enable the target computational device to perform an operation.

US Pat. No. 10,366,211

METHOD, DEVICE AND APPARATUS FOR RECOGNIZING PICTURE

BAIDU ONLINE NETWORK TECH...

1. A method for recognizing a pirated picture, comprising:acquiring a to-be-recognized picture from an Internet-based on-line database;
extracting characteristics from the to-be-recognized picture and a previously acquired copy-righted picture, to obtain the characteristics of the to-be-recognized picture and the copy-righted picture, the extracted characteristics comprising a color characteristic and a shape characteristic, the color characteristic being characterized by a 64-dimensional histogram in HSV space of a color model; and the shape characteristic being characterized by 1024-dimensional scale-invariant characteristic transform (SIFT) of an image;
comparing the extracted characteristics of the to-be-recognized picture and the copy-righted picture; and
determining the to-be-recognized picture as a suspected pirated picture based on the comparison result;
the comparing the extracted characteristics of the to-be-recognized picture and the copy-righted picture comprises:
establishing characteristic indices of the characteristics of the to-be-recognized picture; and
cross-comparing the extracted characteristics of the to-be-recognized picture and the copy-righted picture based on the characteristic indices.

US Pat. No. 10,366,210

MEDICAL DEVICE CONNECTION STATUS MONITORING

Fenwal, Inc., Lake Zuric...

10. A computer-implemented medical device management method for monitoring connection status between medical devices and their data management server computer over a network, said method comprising:receiving at configurable time intervals via a processing circuit a medical device connection status message from a medical device over the network, wherein the medical device is configured to send the connection status message to the data management server computer at said configurable time intervals;
setting a device last connection time, comprising a date and time that a most recent connection status message was received over the network by the server computer from the medical device;
receiving input from a user interface in communication with the server computer to retrieve medical device information;
calculating a delta between the device last connection time and a date and time the server computer received the input from the user interface;
comparing the delta with a device connection threshold value, wherein the device connection threshold value is set equal to or greater than the configurable time interval; and
displaying a warning indicator on the user interface if the delta is greater than the device connection threshold value.

US Pat. No. 10,366,209

DYNAMIC CRITICAL ACCESS OVERRIDE FOR MEDICATION DISPENSING APPARATUSES

CERNER INNOVATION, INC., ...

1. One or more computer storage media storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations, the operations comprising:identifying a patient;
accessing patient profile information for the identified patient;
analyzing the patient profile information to predict one or more medications that may be needed in a future emergency situation for the patient involving a future patient condition not currently experienced by the patient;
selecting, based on analyzing the patient profile information, one or more medications to allow for critical access override dispensing from a medication dispensing apparatus serving a population of patients in a clinical facility; and
generating a personalized critical access override list for the identified patient that includes an identification of the one or more medications to allow for future critical access override dispensing of the one or more medications on the personalized critical access override list without requiring all steps required for a typical medication dispensing event from the medication dispensing apparatus, wherein the one or more medications are selected and added to the personalized critical access override list for the identified patient in a background process independent of any medication dispensing event and the personalized critical access override list is stored.

US Pat. No. 10,366,208

FACILITATING PRESCRIPTION MANAGEMENT

ALLSCRIPTS SOFTWARE, LLC,...

1. A method executed by a cloud platform that is in network communication with an ePrescribing application and a first electronic device operated by a patient, the method comprising:receiving, at the cloud platform from the ePrescribing application, an electronic prescription for the patient prescribed by a healthcare provider;
transmitting first data to the first electronic device, wherein the first data causes a first interface to be displayed on a display screen of the first electronic device, wherein the first interface comprises:
a first selectable button indicating that the electronic prescription is to be transmitted by the cloud platform to a pharmacy and
a second selectable button indicating that a scannable copy of the electronic prescription is to be transmitted by the cloud platform to the first electronic device,
wherein the first electronic device receives a selection of the second selectable button causing the first electronic device to transmit data indicative of the selection of the second selectable button to the cloud platform;
transmitting second data to the first electronic device, wherein the second data causes the first electronic device to display a second interface on the display screen, wherein the second interface comprises a scannable copy of the electronic prescription including a scannable portion configured to provide identifying data for the electronic prescription, and further wherein an electronic scanner of a first pharmacy scans the scannable portion of the scannable copy of the electronic prescription;
receiving, at the cloud platform from a second electronic device of the first pharmacy, a request to verify validity of the electronic prescription based on the identifying data for the electronic prescription, wherein the request includes the identifying data for the electronic prescription;
responsive to verifying the electronic prescription, communicating, from the cloud platform to the second electronic device of the first pharmacy, an indication that the electronic prescription is valid; and
receiving, at the cloud platform from the second electronic device of the first pharmacy, data indicating that the electronic prescription has been filled by the first pharmacy.

US Pat. No. 10,366,207

MONITORING ADHERENCE TO A MEDICATION REGIMEN USING A SENSOR

KALI CARE, INC., Mountai...

1. A medication device comprising:a jacket configured to hold a container of medicine; and
an attachment component configured to enable the medication device to be physically connected to a mobile device,
wherein, when the container is being held by the jacket and the medication device is physically connected to the mobile device, the medicine container, the medication device, and the mobile device move substantially in unison, and
wherein, when moved in said unison, the medication device causes a computer system to analyze sensor data obtained by the mobile device to determine that medication was dispensed from the container, the sensor data being data from a sensor.

US Pat. No. 10,366,206

SYSTEM AND METHOD FOR PROVIDING CONNECTING RELATIONSHIPS BETWEEN WEARABLE DEVICES

KONINKLIJKE PHILIPS N.V.,...

8. A computer-implemented method for providing connecting relationships between wearable devices, the method comprising:measuring a base health parameter of a user via one or more sensors of a first wearable device;
determining whether or not the base health parameter meets a certain predetermined threshold criterion;
in response to the base health parameter meeting the certain predetermined threshold criterion, requesting measurement of a second health parameter of the user via one or more sensors of a second wearable device, wherein the second wearable device is selected by:
determining a set of wearable devices that the user is wearing, wherein each wearable device in the set is configured to measure the second health parameter using a corresponding measuring method;
determining, from a lookup table matching different health parameters with different measuring methods that is stored in memory of the first wearable device,
the measuring method for each wearable device in the set to produce a set of measuring methods;
selecting, from the determined set of measuring methods, the measuring method optimal for measuring the second health parameter; and
selecting the wearable device with corresponding optimal measuring method as the second wearable device having the slave role for measuring the second health parameter;
determining an alert action based on a combination of the base health parameter
and the second health parameter; and generating a notification to the user based on the alert action.

US Pat. No. 10,366,205

SYSTEM AND METHOD FOR REMOTE TELE-HEALTH SERVICES

VIDEOKALL, INC., Potomac...

1. A tele-health services cabin comprising:a medical device station comprising:
an enclosure having a wall, wherein an opening is formed in the enclosure wall;
a medical device disposed behind the enclosure wall that shields the medical device from user contact, wherein a test strip receptacle of the medical device is aligned with the opening, wherein the opening is sized to permit only a user test strip to be inserted through the opening into the test strip receptacle; and
a cabin management unit comprising:
a processor that controls equipment in the cabin;
a data input at which patient data is provided from the medical device;
a data output to control the medical device;
a transmitter connectable to a communication link for bi-directional communication between the cabin management unit and a remote medical call center, wherein the transmitter transmits the patient data to the medical call center;
videoconferencing hardware via which a remote practitioner in the medical call center videoconferences with a patient in the cabin to diagnose symptoms of the patient; and
a bracket having a first movable arm, wherein:
the medical device is mounted on the first movable arm in a horizontal plane in the enclosure, and
the first movable arm is operable to retract the medical device away from the opening and rotate the medical device.

US Pat. No. 10,366,204

SYSTEM AND METHOD FOR DECENTRALIZED AUTONOMOUS HEALTHCARE ECONOMY PLATFORM

CHANGE HEALTHCARE HOLDING...

1. A system for a decentralized autonomous healthcare, comprising:a computer system having a plurality of off-chain health data sources some of which contain personal health data whose access is controlled by a patient, the personal health data including consultation data, medical history data, medical procedure data, claims data and eligibility data;
a plurality of health blockchain network components implemented on a computer system that interface with the plurality of off-chain health data sources, each health blockchain network component comprising a plurality of blocks forming a linked list with each block having a header with a cryptographic hash of a prior block in the plurality of blocks and a healthcare transaction coupled to the header and each health blockchain network component maintains cryptographic proof of a valid healthcare transaction;
wherein one of the plurality of health blockchain network components performs a healthcare transaction using a healthcare transaction protocol using the personal health data in the off-chain health data sources when authorization is granted to the personal health data and the one healthcare blockchain network component executes an automated patient data sharing smart contract that grants access to an authorized user to the personal health data stored in the off-chain health data sources if the authorized user satisfies a set of terms contained in the smart contract; and
wherein the plurality of health blockchain network components perform side chaining in which a first health blockchain network component validates the data from a second health blockchain network component during the healthcare transaction.

US Pat. No. 10,366,203

METHOD AND PROCEDURE TO FIND BEST FIT MEDICAL SERVICE PROVIDER

1. A computer-implemented method performed by a processor, the method comprising:receiving a detected health characteristic of a user from a biometric sensor;
determining an amount of insulin available to an insulin pump is insufficient to treat the user, wherein the detected health characteristic of the user is a blood sugar level;
identifying a medical service for the user based on a request signal received from a mobile device and the amount of insulin and the blood sugar level, the medical service is based on the detected health characteristic of the user, and the medical service having a type;
identifying a health insurance plan associated with the user;
determining a location of the mobile device;
identifying a plurality of medical service providers based on at least the type of medical service;
identifying insurance plans accepted by each of the plurality of medical service providers;
determining a plurality of travel times, wherein each of the plurality of travel times is indicative of an estimated time to travel between the location and a provider location of a respective one of the plurality of medical service providers and wherein the plurality of travel times are based on traffic information;
determining a plurality of estimated wait times for the plurality of medical service providers based on at least data provided by the at least one of the plurality of medical service providers;
identifying a first subset of the plurality of medical service providers having operating hours for which an estimated arrival time is outside of a predetermined threshold from the associated operating hours;
determining a ranking of the plurality of medical service providers based on whether each of the plurality of medical service providers accepts the health insurance plan, the plurality of travel times, and the plurality of estimated wait times, wherein the ranking excludes the first subset of the plurality of medical providers; and
providing patient information related to the blood sugar level to at least one of the plurality of medical service providers.

US Pat. No. 10,366,202

DYNAMIC MEDIA OBJECT MANAGEMENT SYSTEM

Mach 7 Technologies, Inc....

1. A dynamic media object management system in communication with at least one source media modality (SMM) and at least one technologist data processor (TDP) and adapted to communicate source media objects (SMOs) there between, comprising:at least one parameter database and at least one management console (MC), wherein said at least one MC includes a user interactive subsystems controller (UISC) in communication with said at least one parameter database, wherein said at least one parameter database is configured for storing predetermined parameters received from said UISC;
at least one modality services subsystem (MSS) in communication with said at least one management console wherein said MSS is operative to communicate the SMOs, wherein said SMOs as communicated from said MSS are in a format incompatible with said at least one TDP, wherein said SMOs as communicated by said MSS include compliant SMO elements and non-compliant SMO elements, wherein the compliant SMO elements are compliant with the TDP, and wherein the non-compliant SMO elements are non-compliant with the TDP;
at least one media object processor (MOP) interoperable with said at least one MC and said MSS, wherein said at least one MOP is connected to dynamically receive SMOs from said MSS and normalize the SMOs on the fly; and
wherein said at least one MOP is connected to apply a plurality of said predetermined parameters to said SMOs to normalize said SMOs, wherein said at least one MOP is connected to route the normalized SMOs to the at least one TDP according to a predetermined routing parameter and according to at least one predetermined mapping parameter, wherein said predetermined routing parameter and said at least one predetermined mapping parameter are communicated to said MOP from said at least one parameter database, wherein said at least one MOP is responsive to said at least one predetermined mapping parameter, wherein said at least one predetermined mapping parameter establishes a mapping protocol operative with said MOP and enabling compatible communication of the mapped and normalized SMOs to the at least one TDP, wherein said applying a plurality of said predetermined parameters by said processor changes format of the non-compliant SMO elements into now-compliant SMO elements, wherein said applying a plurality of said predetermined parameters by said processor avoids spending processing time on a plurality of the compliant SMO elements to speed processing, wherein said applying a plurality of said predetermined parameters by said processor provides said format changing at a speed in real time with the communication of the SMO from the MSS to the TDP.

US Pat. No. 10,366,201

TIMING CLOSURE OF CIRCUIT DESIGNS FOR INTEGRATED CIRCUITS

XILINX, INC., San Jose, ...

1. A system for closing timing for a circuit design, comprising:a processor configured to perform a design flow on a circuit design and generate a plurality of data sets corresponding to implementation states at different times during a phase of the design flow, wherein the circuit design is configured for implementation within an integrated circuit; and
a display device including:
a first region having a plurality of controls corresponding to the plurality of data sets, wherein each control selects the data set associated with the control;
a second region configured to display a list of critical paths for data sets selected from the first region using one of the plurality of controls, wherein the critical paths are timing critical and determined using the processor; and
a third region configured to display a representation of a target integrated circuit including layouts for the critical paths of the list for the implementation states of the circuit design specified by the selected data sets;
wherein the display is configured to illustrate evolution of the critical paths within the second region and the third region through the phase of the design flow responsive to selection of different ones of the plurality of controls.

US Pat. No. 10,366,200

SYSTEM FOR AND METHOD OF MANUFACTURING A LAYOUT DESIGN OF AN INTEGRATED CIRCUIT

TAIWAN SEMICONDUCTOR MANU...

1. A method of fabricating an integrated circuit, the method comprising:generating a first layout of the integrated circuit based on design criteria, the first layout having a first set of vias arranged in first rows and first columns, the first rows of the first set of vias being arranged in a first direction, the first columns of the first set of vias being arranged in a second direction different from the first direction, the first set of vias being divided into sub-sets of vias based on a corresponding color, the color indicating that vias of the sub-set of vias with a same color are to be formed on a same mask of a multiple mask set and vias of the sub-set of vias with a different color are to be formed on a different mask of the multiple mask set;
generating a standard cell layout of the integrated circuit, the standard cell layout having standard cells and a second set of vias arranged in the standard cells, each via of the second set of vias being separated from each other by at least a minimum pitch;
generating a via color layout of the integrated circuit based on the first layout and the standard cell layout, the via color layout having a third set of vias, the third set of vias including a portion of the second set of vias and corresponding locations, and color of the corresponding sub-set of vias;
performing a color check on the via color layout based on design rules, and
at least one of the above operations being performed by a hardware processor, and
fabricating the integrated circuit based on at least the via color layout.

US Pat. No. 10,366,199

CELL-BASED POWER GRID (PG) ARCHITECTURE

QUALCOMM Incorporated, S...

1. A power grid (PG) architecture, comprising:a cell building block structure with a N×M grid configuration including N cell building blocks arranged in a first direction and M cell building blocks arranged in a second direction, wherein the first direction and the second direction are orthogonal to one another; and
a plurality of power grid (PG) cells, wherein each of the N cell building blocks and each of the M cell building blocks are occupied by a PG cell of the plurality of PG cells and wherein the plurality of PG cells includes at least one optimized PG cell having cell characteristics optimized by varying a quantity of metal traces for routability or voltage drop or a balance between routability and voltage drop.

US Pat. No. 10,366,198

SYSTEM AND METHOD FOR PRODUCT DATA MANAGEMENT AND 3D MODEL VISUALIZATION OF ELECTRICAL WIRING DESIGN AND SPECIFICATIONS

SAFRAN AIRCRAFT ENGINES, ...

1. A computer-implemented method for generating a three-dimensional (3D) computer model of an assembly including wiring routing, comprising:creating a part data structure defining a part in a virtual product management system and storing the part data structure in a virtual product management database, the part data structure including a plurality of nodes defining at least 3D part design data, 3D wiring routing design data and wiring routing annotation data of the part;
importing at least the 3D part design data the 3D wiring routing design data and the wiring routing annotation data to the part data structure from a computer-aided design (CAD) model system, wherein a 3D representation of a wiring routing harness, a 3D representation of a mockup part, and a 3D representation of wiring routing harness standards are electronically linked to the part data structure, the CAD model system operably connected for computer communication to the virtual product management system and the virtual product management database, wherein importing the 3D part design data further includes linking 3D representations of a geometric context of the part from the CAD model system to the part data structure;
generating a 3D computer model of the assembly including one or more parts based on one or more part data structures stored in the virtual product management database, the 3D computer model of the assembly combining the 3D part design data, the 3D wiring routing design data and the wiring routing annotation data; and
transmitting the 3D computer model of the assembly to an electronic end user device, wherein the electronic end user device is controlled to present a graphical user interface that includes the 3D computer model that includes 3D physical and logical data that incorporates a 3D representation of parts with specification data to provide real-time electronic virtual visualization of 3D views with two-dimensional data to facilitate production of systems that include multiple parts that are interconnected to form the assembly.

US Pat. No. 10,366,197

COUPLING AWARE WIRE CAPACITANCE ADJUST AT GLOBAL ROUTING

INTERNATIONAL BUSINESS MA...

1. A computer implemented method for calculating a ground capacitance adjust for a wire segment going through a given routing tile comprising:providing the routing tile having a plurality of wires wherein the wire segment being a victim wire and neighboring wires being aggressor wires;
computing a plurality of ground capacitance adjusts for the victim wire averaged across a plurality of aggressor slew values and across a plurality of spacing values between the victim wire and the neighboring aggressor wires to take into account a potential coupling effect by the neighboring aggressor wires, assuming a distribution of signal slews of wires belonging to the routing tile and assuming the neighboring wires of the victim wire have signal slews from the distribution of slews for the routing tile for the plurality of spacing values responsible for the coupling effect, to guide placement of the wire segment in the routing tile to avoid coupling noise; and
manufacturing a chip based on the placement of the wire segment in the routing tile.

US Pat. No. 10,366,196

STANDARD CELL ARCHITECTURE FOR DIFFUSION BASED ON FIN COUNT

QUALCOMM Incorporated, S...

1. A method of designing an integrated circuit with finfet based logic cells, the method comprising forming at least a first logic cell with at least one of:two or more p-diffusion regions, stacked in a y-direction, with each of the two or more p-diffusion regions comprising two or more fins in an x-direction, and each of the two or more p-diffusion regions comprising an island with p-type doping in an n-type well; or
two or more n-diffusion regions, stacked in the y-direction, with each of the two or more n-diffusion regions comprising two or more fins in the x-direction, and each of the two or more n-diffusion regions comprising an island with n-type doping in a p-type well.

US Pat. No. 10,366,194

ELEMENT REMOVAL DESIGN IN MICROWAVE FILTERS

Resonant Inc., Santa Bar...

1. A system for creating a narrowband acoustic wave microwave filter comprising:an interface configured to receive input from a user;
a memory configured to store filter design software; and
a processor configured to execute the filter design software, wherein upon execution of the filter design software the system performs actions comprising:
(a) generating a first filter circuit design based on one or more performance specifications, the first filter circuit design comprising a plurality of circuit elements, wherein the plurality of circuit elements comprises a plurality of resonant elements and one or more non-resonant elements;
(b) generating a final filter circuit design with fewer circuit elements than the first filter circuit design, wherein the final filter circuit design exhibits a flatter passband frequency response than the first filter circuit, generating the final filter design further comprising:
determining that at least one of the non-resonant elements in the first filter circuit design is insignificant by comparing an impedance value of the non-resonant element to a threshold value,
determining whether the insignificant non-resonant element has previously been transformed, and
removing the insignificant non-resonant element from the first filter circuit design based in part on a determination that the insignificant non-resonant element has previously been transformed; and
(c) providing the final filter design as an input to a manufacturing process.

US Pat. No. 10,366,193

SYSTEM AND METHOD FOR DESIGNING POWER SYSTEMS

TEXAS INSTRUMENTS INCORPO...

1. An apparatus comprising:a user interface unit; and
a power architect unit comprising a processor and a transceiver, the power architect unit coupled to the user interface unit;
the transceiver in the power architect unit configured to receive a power system design requirement from the user interface, wherein the power system design requirement requirements includes sequencing requirements and Double Data Rate (DDR) memory load termination requirements; and
the processor in the power architect unit configured to generate a power circuit diagram based at least in part on the power system design requirement, the power circuit diagram using at least one power sequencer.

US Pat. No. 10,366,192

NETWORK SYNTHESIS DESIGN OF MICROWAVE ACOUSTIC WAVE FILTERS

Resonant Inc., Santa Bar...

1. A non-transitory computer-readable medium for designing a multiband filter of a duplexer used in the front-end of a telecommunications system, the medium having stored thereon instructions that, when executed by a processing device, cause the processing device to:generate an initial circuit structure comprising a desired number and type of circuit elements, wherein the circuit elements are selected based on a desired one or more frequency response requirements;
generate an initial circuit design by at least mapping the frequency response requirements of the initial circuit structure into normalized space, selecting a lossless circuit response in the form of a polynomial ratio and calculating mapped and normalized circuit element values in the initial circuit structure using a circuit synthesis technique;
generate an acoustic filter circuit design by at least performing a transformation on the initial circuit design, wherein the transformation comprises dividing the initial circuit design into multiple sub-set circuit designs;
generate a pre-optimized circuit design by at least unmapping one or more circuit elements of the acoustic filter circuit design into real space and introducing parasitic effects; and
communicate the pre-optimized circuit design to a filter optimizer that generates a final circuit design comprising a plurality of resonators, wherein a first resonator exhibits a high resonant frequency, a second resonator demonstrates a low resonant frequency and the difference between the low resonant frequency and the high resonant frequency is at least 1.25 times the average frequency separation of the resonators.

US Pat. No. 10,366,191

LAYOUT OF LARGE BLOCK SYNTHESIS BLOCKS IN INTEGRATED CIRCUITS

International Business Ma...

1. A computer-implemented method, comprising:generating, by the one or more processors, a layout of an integrated circuit chip area from a description of an integrated circuit (IC), the description comprising a register-transfer-level (RTL) design, wherein the RTL design is partitioned into large blocks for synthesis of large block synthesis (LBS) blocks, the description of the IC further comprising a first floorplan for the IC, wherein LBS blocks to be synthesized are assigned to respective rectilinear shapes in the first floorplan and said rectilinear shapes do not overlap each other, the generating comprising:
selecting a pair of the LBS blocks having their cells synthesized and placed according to the RTL design and the first floorplan and routed according to the RTL design;
generating a further floorplan in which the rectilinear shapes of the selected LBS blocks overlap each other;
generating layouts of the selected LBS blocks, the generating comprising executing synthesis and placement of their cells according to the RTL design and the further floorplan and routing internal interconnects of each of the selected LBS blocks according to the RTL design;
based on a first case in which the first value is less than the first target density value and the second value is greater than or equal to the second target density value, updating the further floorplan such that the overall geometric area assigned to the one of the selected LBS blocks in the cross-over shape is increased; and
based on a second case in which the second value is less than the first target density value and the first value is greater than or equal to the second target density value, updating the further floorplan such that the overall geometric area assigned to the other one of the selected LBS blocks in the cross-over shape is increased; and
fabricating an IC chip utilizing the layout.

US Pat. No. 10,366,190

SAFETY FEATURES FOR HIGH LEVEL DESIGN

ALTERA CORPORATION, San ...

1. A tangible, non-transitory, and computer-readable medium storing instructions that, when executed by one or more processors, cause one or more processors to:identify at least one protection version of a data type of an algorithmic description representation of a circuit design, wherein the protection version includes at least one protection mechanism that is based at least in part on the protection version for the data type; identify at least one programming language construct associated with the protection version of the data type, wherein the algorithmic description representation is specified in a first language; and
generate a second representation of the circuit design based on the algorithmic description representation and a definition for the protection version of the data type, wherein the second representation is specified in a second language and includes at least one protection mechanism that is based at least in part on the protection version of the data type wherein the second representation is used to configure a manufactured programmable logic device after manufacturing of the programmable logic device has been completed.

US Pat. No. 10,366,189

CONFIGURING A PROGRAMMABLE DEVICE USING HIGH-LEVEL LANGUAGE

Altera Corporation, San ...

13. A non-transitory computer readable medium including a sequence of instructions stored thereon for causing a computer to execute a method for configuring a programmable integrated circuit device, comprising:compiling a plurality of virtual programmable devices from descriptions in a high-level language;
storing the compiled plurality of virtual programmable devices;
selecting and instantiating one of the compiled plurality of virtual programmable devices in response to a user configuration that includes a first configuration having a first group of functions and a second configuration having a second group of functions different from the first group of functions;
configuring the instantiated one of the compiled virtual programmable devices with the first configuration without the second configuration implement the first group of functions;
uploading the first configuration and configuring the instantiated one of the compiled virtual programmable device with the second configuration to implement the second group of functions in response to a result from testing the first configuration on the virtual programmable device; and
configuring the programmable integrated circuit device to transform programmable resources on the programmable integrated circuit device to implement the instantiated one of the compiled virtual programmable device with the second configuration.

US Pat. No. 10,366,188

DESIGNING APPARATUS FOR DESIGNING A PROGRAMMABLE LOGIC DEVICE, METHOD OF DESIGNING A PROGRAMMABLE LOGIC DEVICE AND RECORDING MEDIUM FOR STORING A PROGRAM FOR DESIGNING A PROGRAMMABLE LOGIC DEVICE

FUJITSU LIMITED, Kawasak...

1. A designing apparatus comprising:a memory configured to store disposition and wiring information used for disposition and wiring of a logic circuit on a programmable logic device, and store delay amount information indicating a relationship between a power supply voltage value and a delay amount for each type of element in the logic circuit; and
a processor configured to
determine, based on the disposition and wiring information, a critical path of which a delay margin is least among paths included in the logic circuit,
determine, based on the delay amount information, a first power supply voltage value at which the delay margin of the critical path is in a positive value and is a minimum value,
generate first voltage information indicating the first power supply voltage value, and
output the disposition and wiring information and the first voltage information to a first device, the first device including the programmable logic device, and the first device being configured to form the logic circuit on the programmable logic device in accordance with the disposition and wiring information, and
output configuration data and second voltage information to the first device, the second voltage information indicating a unique voltage value corresponding to a fabric condition of the programmable logic device, the configuration data being configured to cause the first device to form a voltage control circuit on the programmable logic device, the voltage control circuit being configured to control a operation voltage that is supplied to the logic circuit on the programmable logic device in accordance with the first power supply voltage indicated in the first voltage information and the unique voltage value indicated in the second voltage information.

US Pat. No. 10,366,187

CLOCK VERIFICATION

Imagination Technologies ...

1. A method of verifying a function of a derived clock signal in an integrated circuit hardware design, the derived clock signal being derived in the hardware design from a reference clock signal to have a particular duty cycle and period, the method comprising:generating, in a processor, a verification system comprising:
at least one first state machine configured to count a number of full or half cycles of a first clock signal that occur between a rising edge and a falling edge of a second clock signal, the second clock signal operating at a lower frequency than the first clock signal, wherein the faster of the reference clock signal and the derived clock signal is designated as the first clock signal, and the slower of the reference clock signal and the derived clock signal is designated as the second clock signal,
at least one second state machine configured to count a number of full or half cycles of the first clock signal that occur between a falling edge and a rising edge of the second clock signal, and
an assertion verification unit configured to evaluate one or more assertions written in an assertion-based language that compare the counts from said at least one first and second state machines to one or more predetermined numbers;
binding, in a processor, the verification system to the integrated circuit hardware design;
loading, in a processor, the verification system, integrated circuit hardware design and bindings into a formal verification tool;
verifying, in a processor, the duty cycle and period of the derived clock signal by formally verifying, by the formal verification tool, that the one or more assertions are true for the integrated circuit hardware design; and
if at least one of the one or more assertions are not verified to be true for the integrated circuit hardware design, modifying the integrated circuit hardware design to correct an error in the integrated circuit hardware design that caused the at least one of the one or more assertions not to be true for the integrated circuit hardware design.

US Pat. No. 10,366,186

SYSTEM AND PROCESS FOR SIMULATING THE BEHAVIORAL EFFECTS OF TIMING VIOLATIONS BETWEEN UNRELATED CLOCKS

THE CHARLES STARK DRAPER ...

1. A Clock Domain Crossing (CDC) simulation system comprising:an interface configured to communicate with an external system and to receive a Behavioral Description Language (BDL) based circuit design from the external system;
a timing analysis module configured to receive the BDL based circuit design from the interface, analyze the BDL based circuit design to identify at least one CDC within the circuit design, and generate a report including information related to the at least one CDC;
a CDC simulation module configured to communicate with the timing analysis module and to receive the report from the timing analysis module; and
a test bench module configured to communicate with the CDC simulation module and the interface, to receive the BDL based circuit design from the interface, and to operate a test bench code to simulate the operation of the BDL based circuit design,
wherein the CDC simulation module is further configured to edit a top level of the test bench code, based on the received report, such that the test bench module is configured to identify timing violations in the BDL based circuit design due to the at least one CDC,
wherein, in analyzing the BDL based circuit design to identify the at least one CDC within the circuit design, the timing analysis module is further configured to:
identify a source element of the at least one CDC having a first output;
identify a destination element of the at least one CDC having a second output;
identify a first clock of the source element;
identify a second clock of the destination element, the first clock and the second clock being asynchronous; and
include identifications of the source element, the destination element, the first clock, and the second clock in the report,
wherein, in editing the top level of the test bench code, based on the received report, such that the test bench module is configured to identify timing violations in the BDL based circuit design as a result of the at least one CDC, the CDC simulation module is further configured to edit the top level of the test bench code such that the test bench module is configured to:
monitor the first output of the source element;
monitor the second clock of the destination element;
timestamp a change in the first output of the source element;
identify an active edge of the second clock of the destination element;
determine whether an amount of time between the timestamped change in the first output of the source element and the identified active edge of the second clock of the destination element is greater than a minimum setup period of time;
identify a setup timing violation in response to the amount of time between the timestamped change in the first output of the source element and the identified active edge of the second clock of the destination element being less than the minimum setup period of time; and
provide an indication of the setup timing violation.

US Pat. No. 10,366,185

GENERATING A FLOW MODEL GRID BASED ON TRUNCATION ERROR THRESHOLD VALUES

Halliburton Energy Servic...

1. A fluid flow modeling method comprising: accessing, at a computer system, truncation error threshold data for a one-dimensional flow model, the one-dimensional flow model including nodes representing locations along a flow path for well system fluid in a subterranean region, the truncation error threshold data indicating a truncation error threshold value for each of the nodes;accessing, at the computer system, discretization data for the one-dimensional flow model, the discretization data indicating, for each of the nodes, a lowest-order term truncated from a discretized governing flow equation for the node; and
computing, by operation of the computer system, locations for the nodes based on a scalar cost function, such that each of the lowest order terms is less than or equal to the truncation error threshold value for the respective node, thereby improving efficiency of the computer system by eliminating unnecessary use of resources of the computer system wherein the scalar cost function is defined based on a length of the flow path and a sum of distance s between pairs of the nodes and locations of the nodes are based on the scalar cost function according to an iterative root-finding algorithm wherein on each iteration of the root-finding algorithm:
an estimated spacing for a first pair of the nodes is obtained;
spacings for all other adjacent pairs of the nodes based on the estimated spacing for the first pair are computed, such that the lowest order terms are less than or equal to the truncation error threshold value for each respective node; and
a new estimate for the first pair of the nodes is computed based on the scalar cost function.

US Pat. No. 10,366,184

STABLE NEO-HOOKEAN FLESH SIMULATION

Pixar, Emeryville, CA (U...

1. A computer-implemented method for rendering one or more images depicting a material, comprising:receiving a volumetric mesh in an initial configuration;
determining a configuration of the volumetric mesh which substantially minimizes an energy model characterizing deformation of the volumetric mesh, wherein the energy model includes a length-preserving term, one or more volume-preserving terms, and an origin barrier term, and wherein the volume-preserving terms do not include singularities;
posing a surface mesh based, at least in part, on the determined configuration of the volumetric mesh; and
rendering one or more images using at least the posed surface mesh.

US Pat. No. 10,366,182

METHODS AND APPARATUS TO MODEL THERMAL MIXING FOR PREDICTION OF MULTI-STREAM FLOWS

The Boeing Company, Chic...

1. A method, comprising:receiving, at a processor, characteristics of a nozzle of an aircraft to be tested, the characteristics input by a person via an interface, the characteristics including a shape of the nozzle;
generating, via the processor, a domain representation of the nozzle based on the characteristics of the nozzle, the domain representation divided into a plurality of cells;
estimating, via the processor, momentum diffusion due to turbulence associated with the nozzle based on the determined characteristics;
estimating, via the processor, thermal diffusion due to the turbulence associated with the nozzle based on the estimated momentum diffusion and a spatially varying turbulent Prandtl number, wherein the spatially varying turbulent Prandtl number is calculated using the equation

 wherein ?? is turbulent viscosity, T is static temperature, ? is density, and u?jT? is a turbulent heat flux vector, and wherein the turbulent heat flux vector is calculated using the equations

 and ?u?jT?(N)=?u?jT?*?r+?u?jT?(N?1)(1??r), wherein the star superscript denotes the turbulent heat flux vector before relaxation, k/? is turbulence dissipation time, ?/k is dissipation rate, C1?=3.0, Pk is rate of production of turbulent kinetic energy, ? is rate of dissipation of turbulent kinetic energy, xm is a coordinate location, C2?=0.4, C1?,w=0.75, nj is a wall normal vector of a nearest wall face, k is turbulent kinetic energy, dw represents a distance of the nozzle from a wall, the superscript N and N?1 denotes the turbulent heat flux vector on previous and current iterations, and ?r is a relaxation coefficient of 10%;
determining, via the processor, using an energy equation, a temperature distribution throughout the domain representation of the nozzle based on the estimated thermal diffusion; and
using the temperature distribution in designing the nozzle.

US Pat. No. 10,366,181

SIMPLIFICATION OF DATA FOR REPRESENTING AN ENVIRONMENT, VIA THE REDUCTION OF VERTICES THAT DEFINE STRUCTURES REPRESENTED IN THE DATA

Polaris Wireless, Inc., ...

1. A method for determining visibility between points in a geographic region in which buildings are present, the method comprising:receiving, by a data-processing system, a first dataset that is representative of a first building that is defined by a first polyhedron having a footprint defined by a first polygon, wherein a first vertex and a second vertex define a first edge of the first polygon, and wherein the second vertex and a third vertex define a second edge of the first polygon;
reducing, by the data-processing system, the number of vertices in the first polygon, at least in part by i) removing the second vertex only if the first edge does not exceed a predetermined first length and ii) removing the third vertex, resulting in a second polygon;
transmitting, by the data-processing system to an application engine, a second dataset that comprises a second polyhedron having a footprint defined by the second polygon, wherein the second polyhedron defines the first building in the geographic region, and wherein at least some faces of the second polyhedron define outer walls of the first building;
calculating, by the application engine, visibility between two points in the geographic region that are represented in the second dataset, by determining whether any of the at least some faces of the second polyhedron obstruct a line-of-sight line between the two points; and
presenting, to a user, a result that is based on the visibility calculated.

US Pat. No. 10,366,180

COMPUTER-IMPLEMENTED LAND PLANNING SYSTEM AND METHOD WITH AUTOMATED PARKING AREA DESIGN TOOLS

Bentley Systems, Inc., E...

1. A computer-implemented land planning system designed to generate at least one conceptual fit and optimized solution to a user-defined land development problem, the solution comprising a conceptual site layout including at least one building pad and a vehicle parking area within an undeveloped land site, said system comprising:a processor configured to conceptually designing said vehicle parking area within the undeveloped land site, said vehicle parking area comprising a plurality of user defined constraints selected from a group consisting of a predetermined minimum size of said parking area, a predetermined minimum number of parking spaces within said parking area, a width of each parking space, a depth of each parking space, custom-sized parking spaces, aisle width, number of handicap parking spaces, and number of divided parking lots within said parking area;
said processor further configured to electronically generating at least one candidate solution to the land development problem given the user defined constraints of said vehicle parking area, said candidate solution comprising a plurality of interrelated engineering measurements applicable in development of the undeveloped land site, and said engineering measurements comprising site layout measurements selected from a group consisting of building pad location within said undeveloped land site, building pad orientation relative to said vehicle parking area, a paving surface measurement, curb length, and a sidewalk surface measurement;
an optimization engine comprising a heuristic problem-solving strategy utilizing nonlinear processes to manipulate said engineering measurements of said candidate solution given the user defined constraints of said vehicle parking area until at least one optimized fit solution to the land development problem is achieved, whereby a change relative to one of said plurality of engineering measurements for said candidate solution effects a change relative to another of said plurality of engineering measurements for that candidate solution; and
an output device configured to output to a user documentation illustrating said optimized fit solution to the land development problem, wherein the optimized fit solution comprises a site plan applicable for use in development of the land site.

US Pat. No. 10,366,179

COMPUTER-READABLE STORAGE MEDIUM AND INFORMATION PROCESSING DEVICE

FUJITSU LIMITED, Kawasak...

1. A non-transitory computer-readable storage medium storing a facet extracting program that causes a computer to execute a process for extracting an exterior of a product based on three-dimensional shape data of the product, the three-dimensional shape data being created by a three-dimensional CAD (Computer Aided Design) and received by the computer, the process comprising:voxelizing the three-dimensional shape data to generate first voxels corresponding thereto;
specifying an area surrounded by the generated first voxels, the area including an area in which a sphere or a cube of a certain size continuously passes over the first voxels;
setting the specified area as second voxels; and
extracting facets and phase/geometric information that are included in the three-dimensional shape data and correspond to a boundary between voxels including the first voxels and the second voxels and a non-voxel area, the extracted facets and phase/geometric information corresponding to the exterior.

US Pat. No. 10,366,178

MULTI-USER CAX EDITING OF A MODEL OF A DESIGN OBJECT

Brigham Young University,...

1. A method, executed by one or more computers, for multi-user CAx editing of a model of a design object, the method comprising:creating a geometric element;
while maintaining a feature record that records an order in which feature operations are performed in editing the model of the design object, delaying identifying and naming the geometric element until a feature operation references the geometric element;
identifying the geometric element in response to creating a feature within the model of the design object that references the geometric element, wherein identifying the geometric element comprises identifying a body on which the geometric element resides and identifying a feature that created the body;
receiving a feature operation that references the geometric element referenced in response to creating the feature;
in response to receiving the feature operation, identifying the geometric element referenced by the feature operation; and
generating a unique persistent label for the geometric element after the geometric element is referenced by the feature operation and assigning the unique persistent label to the geometric element.

US Pat. No. 10,366,177

CUTTING DRUM AND METHOD OF DESIGNING A CUTTING DRUM

COMMONWEALTH SCIENTIFIC A...

1. A method of designing a cutting drum for earth moving equipment, the cutting drum comprising two or more ring segments, each ring segment comprising a plurality of cutting tools, and the rotational position of at least one ring segment being rotatable relative to one or more other ring segment about a rotation axis of the cutting drum and fixable in a new rotational position, the method comprising the steps of:(A) inputting a plurality of design parameters of a cutting drum into a computer program;
(B) performing a computer simulated analysis of the cutting drum using the computer program to determine at least one operational value associated with at least one design objective;
(C) using the computer simulated analysis to determine the relative rotations of the ring segments that correspond to the at least one design objective; and
(D) rotating the or each rotatable ring segment relative to at least one other ring segment so that the relative rotations of the ring segments correspond to the at least one design objective.

US Pat. No. 10,366,175

SYSTEM AND METHOD FOR AUTOMATED MANUFACTURING OF CUSTOM APPAREL

3D Tech LLC, Malibu, CA ...

1. A method for preparing a personalized custom-fit garment, comprising:receiving a 3-dimensional (“3D”) digital point cloud representation of an individual's body produced from data obtained during a scan of the individual's body;
preparing and storing a digital self of the individual, said digital self including the 3D digital point cloud representation of the individual's body;
receiving an individual's selection of a garment, said garment defined by a digital pattern;
scaling the digital pattern of the garment to the individual's body shape by extracting sizing parameters from the 3D point cloud obtained from the individual's digital self and parametrically scaling the digital pattern according to said extracted sizing parameters to adjust a shape and fit of the garment to the individual's body shape and size so that a resultant personalized custom-fit garment can be manufactured to the individual's selections, wherein said digital pattern comprises digital information used to prepare the garment by an automated garment-making machine and the scaling includes modifying a stored version of said digital pattern according to the extracted sizing parameters and permitted customizations specified by the individual in an interactive process in which updated, dimensionally-accurate, 3D representations of the personalized custom-fit garment are presented to the individual as the individual selects style and fit options associated with the garment, said scaling providing a two-dimensional representation of the digital pattern adjusted for the individual's body shape and size and permitted customizations;
converting the two-dimensional representation of the adjusted digital pattern to machine instructions for manufacturing of the personalized custom-fit garment; and
transferring the machine instructions for manufacturing of the personalized custom-fit garment to the automated garment-making machine for producing the personalized custom-fit garment according to the adjusted digital pattern.

US Pat. No. 10,366,174

SOCIAL FITTING ROOM EXPERIENCE UTILIZING INTERACTIVE MIRROR AND POLLING OF TARGET USERS EXPERIENCED WITH GARMENT TYPE

eBay Inc., San Jose, CA ...

1. A system comprising:an interactive mirror display;
a camera configured to produce an image feed, the image feed including an image of an individual wearing a garment; and
a controller comprising one or more processors configured to perform operations comprising:
determining a garment type of the garment worn by the individual based on detailed product information about the garment obtained from a product database;
identifying a plurality of users with a known experience related to the garment type;
selecting the plurality of users as a target audience to poll for feedback related to the image of the individual wearing the garment based on the plurality of users having the known experience related to the garment type;
transmitting image data to a computing device of each member of the target audience, the image data including the image of the individual wearing the garment;
compiling feedback data from feedback information received from members of the target audience, the feedback information being related to the image of the individual wearing the garment; and
displaying, on the interactive mirror display, a feedback interface to present the feedback data.

US Pat. No. 10,366,173

DEVICE AND METHOD OF SIMULTANEOUS INTERPRETATION BASED ON REAL-TIME EXTRACTION OF INTERPRETATION UNIT

ELECTRONICS AND TELECOMMU...

1. A device of simultaneous interpretation based on real-time extraction of an interpretation unit, the device comprising:a voice recognition module configured to recognize voice units as sentence units or translation units from vocalized speech that is input in real time;
a real-time interpretation unit extraction module configured to form one or more of the voice units into an interpretation unit; and
a real-time interpretation module configured to perform an interpretation task for each interpretation unit formed by the real-time interpretation unit extraction module.

US Pat. No. 10,366,172

INTELLIGENT PSEUDO TRANSLATION

International Business Ma...

1. A computer system comprising:a processing unit in communication with a memory;
a functional unit in communication with the processing unit, the functional unit comprising one or more tools to adaptively generate a pseudo translation, the memory comprising instructions to cause the one or more tools to:
receive data from an accessing entity;
dynamically analyze the received data, the dynamic analysis comprising:
extract a string from the received data; and
automatically detect an encoding and an origin language of the extracted string utilizing natural language processing;
proactively select a first target language utilizing a parameter associated with the accessing entity;
responsive to the selection of the first target language, dynamically determine a first buffer size based on the detected origin language, the detected encoding, and the selected first target language;
generate one or more first buffer characters based on the determined first buffer size; and
dynamically transform the extracted string into a first pseudo translated text comprising:
combine the one or more first buffer characters and the extracted string; and
encapsulate the combined first buffer characters and the extracted string within a first placeholder character set.

US Pat. No. 10,366,171

OPTIMIZING MACHINE TRANSLATIONS FOR USER ENGAGEMENT

FACEBOOK, INC., Menlo Pa...

1. A method comprising:(a) identifying a first machine-generated candidate translation and a second machine-generated candidate translation for a source text, the first machine-generated translation and second machine-generated translation differing from each other and being provided to different groups of users;
(b) receiving one or more indications of engagement with the first machine-generated candidate translation and the second machine-generated candidate translation, wherein engagement with the first translation and engagement with the second translation are measured based on at least one of: a number of times that the respective translations are liked on a social network, a number of times that the respective translations are shared on the social network, a number of comments written with respect to the respective translations, or a number of times that a link associated with the respective translation is followed;
(c) determining, based on the one or more indications of engagement, that the first candidate translation was favored over the second candidate translation, the determining comprising accessing a first engagement score for the first candidate translation based on the one or more indications of engagement, accessing a second engagement score for the second candidate translation based on the one or more indications of engagement, and comparing the first engagement score to the second engagement score; and
(d) transmitting an indication that the first machine-generated candidate translation was favored over the second machine-generated candidate translation to a machine translation system used to generate the first machine-generated candidate translation and the second machine-generated candidate translation in favor of the first candidate translation.

US Pat. No. 10,366,170

SYSTEMS AND METHODS FOR MULTI-USER MULTI-LINGUAL COMMUNICATIONS

MZ IP Holdings, LLC, Pal...

1. A method, comprising:performing by one or more computer processors:
providing an online chat system;
selecting, from a data store, a word or phrase associated with a failure to translate a message from a first language to a second language in the online chat system;
selecting a user from whom to solicit feedback for the translation failure;
generating a query to request feedback from the user;
offering an incentive to the user, wherein the incentive is determined based on a complexity of the word or phrase or an importance of the word or phrase;
receiving the feedback from the user, the feedback potentially assisting to translate the word or phrase;
rewarding the user with the incentive;
updating at least one of a transformation module and a translation data store according to the feedback from the user,
wherein the transformation module is implemented on at least one server and is configured to transform messages to a form more suitable for translation, and
wherein the translation data store is implemented on the at least one server and is configured to store and provide translated text;
using at least one computer processor and at least one of the updated transformation module and the updated translation data store to translate a second message comprising the selected word or phrase; and
providing the translation of the second message in the online chat system.

US Pat. No. 10,366,169

REAL-TIME NATURAL LANGUAGE PROCESSING OF DATASTREAMS

Intel Corporation, Santa...

1. A method performed by a second screen device for outputting content related to a media content item provided from a first electronic device, comprising:receiving a stream of text from the first electronic device, the stream of text corresponding to subtitle text of the media content item, wherein the media content item includes video content that is being displayed by the first electronic device, and wherein the stream of text is provided from the first electronic device to the second screen device separately from the video content;
processing of the stream of text, in response to receiving the stream of text from the first electronic device, wherein the processing identifies a set of terms from the stream of text that are related to the video content that is being displayed by the first electronic device, and selects context-relevant terms from the set of terms based on frequency of occurrence in the set of terms;
identifying a related content item from a content source using the selected context-relevant terms, in response to the processing of the stream of text; and
displaying the related content item in a graphical user interface of the second screen device, wherein the related content item is displayed by the second screen device based on the video content being displayed by the first electronic device.

US Pat. No. 10,366,168

SYSTEMS AND METHODS FOR A MULTIPLE TOPIC CHAT BOT

MICROSOFT TECHNOLOGY LICE...

1. A system for a multiple topic chat bot, the system comprising:at least one processor; and
a memory for storing and encoding computer executable instructions that, when executed by the at least one processor is operative to:
collect user inputs in a conversation to form a collection;
analyze the collection to determine topics in the conversation;
assign an emotion label to each topic;
identify a relationship between different users;
score a closeness of the relationship based on social connection, agreement, and sentiment analysis to form a scored first feature;
score each user's interest in each topic based on user sentiment toward each topic and engagement frequency in each topic to form a scored second feature;
score an engagement rate for each topic of the topics based on a number of users engaged in a topic, frequency of the topic in the conversation, timing of the topic, and the user sentiment toward the topic to form a scored third feature;
create a knowledge graph of the topics that graphs relationships between the topics utilizing topic keywords based on the collection and world knowledge;
determine that a first topic meets a relevancy threshold based on scored features for the first topic, wherein the scored features include the scored first feature, the scored second feature, and the scored third feature for the first topic;
predict, utilizing a trained model, one or more first responses based on the knowledge graph and the user inputs associated with the first topic;
provide the one or more first responses to the conversation;
predict one or more second responses utilizing the knowledge graph and the user inputs associated with a second topic; and
provide the one or more second responses to the conversation.

US Pat. No. 10,366,167

METHOD FOR INTERPRETATION OF CHARTS USING STATISTICAL TECHNIQUES AND MACHINE LEARNING AND CREATING AUTOMATED SUMMARIES IN NATURAL LANGUAGE

Marlabs Innovations Priva...

1. A method of generating a contextual summary of one or more charts, the method comprising:extracting, by a summary generating system (107), chart data (209) associated with each of the one or more charts received from one or more sources (103);
determining, by the summary generating system (107), context of the chart data (209) based on one or more attributes of the chart data (209) and one or more characteristics corresponding to each of the one or more attributes;
computing, by the summary generating system (107), statistical data (215) of each of the one or more charts by analysing the chart data (209) based on one or more predefined rules corresponding to the context of the chart data (209);
generating, by the summary generating system (107), insights of each of the one or more charts by mapping the statistical data (215) with one or more predefined narratives corresponding to the context of the chart data (209); wherein the one or more predefined narratives provide a description of the statistical data (215); and
generating, by the summary generating system (107), the contextual summary of the one or more charts in a predefined template format corresponding to the context of the chart data (209) using the generated insights of each of the one or more charts.

US Pat. No. 10,366,166

DEEP COMPOSITIONAL FRAMEWORKS FOR HUMAN-LIKE LANGUAGE ACQUISITION IN VIRTUAL ENVIRONMENTS

Baidu USA LLC, Sunnyvale...

1. A computer-implemented method of human-like language acquisition for a compositional framework, the method comprising:receiving, at a perception module, a vision input;
receiving, at a language module, a natural language input comprising one or more words related to the vision input;
transforming the vision input, at the perception module, into a feature map comprising a visual feature map and a spatial feature map;
obtaining, at the language module, an attention distribution over words in the natural language input;
obtaining an averaged word embedding based on the attention distribution;
using a convolution of a masked portion of the averaged word embedding with at least portion of the feature map, at the language module, to generate an attention map; and
responsive to the natural language input being a question, using a recognition module to output an answer by performing steps comprising:
obtaining a question intention from the question using an embedding mask;
obtaining extracted features using at least a portion of the feature map weighted by the attention map;
generating an embedding mask from the question intention;
masking the extracted image features with the embedding mask to obtain one or more masked features; and
classifying the one or more masked features to output the answer in response to the question.

US Pat. No. 10,366,165

APPARATUS AND METHOD FOR PRINTING STEGANOGRAPHY TO ASSIST VISUALLY IMPAIRED

Tata Consultancy Services...

1. An apparatus for printing steganography to assist a visually impaired reader, the apparatus comprising:a memory storing instructions;
a processor coupled to said memory, wherein said processor programmatically controls:
a controlling unit configured to generate steganography to be embedded in a printed product before it is published, the controlling unit comprising:
a phoneme text processor for processing a content of the printed product to be published; and
a layout manager for generating an xml file comprising a content layout map, markers and QR code for each page of the processed content, wherein the layout manager is further configured to generate a grid with location co-ordinates as per page layout; arrange a block data (D) as per the location co-ordinates; and generate markers to enable reading of the block data;
a wearable unit coupled to the controlling unit, wherein the wearable unit further comprises:
a reading module coupled with a light emitting device and a camera attachment for processing the processed content, wherein the reading module of the wearable unit further captures the QR code and the block data (D) using the camera attachment and extracts the phoneme data using ultra violet light emitted by the light emitting device;
a navigator module further comprising sensors for determining neck and body movements in navigating through the processed content;
an I/O module for outputting an audio signal corresponding to the processed content to be published in a specific manner thereby printing steganography, wherein the specific manner is further described as a stop or a pause or a repeat command from the navigator module for the output audio signal; and
a database to store content translation and dictionaries to assist in reading.

US Pat. No. 10,366,164

CONTEXTUAL FIT DETERMINATION FOR PROPOSED MESSAGES

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method comprising:obtaining a proposed message to be sent in a messaging session between a plurality of users of a messaging service;
identifying a context of the proposed message;
determining whether the proposed message contextually fits the messaging session based on characteristics of an expected response to the proposed message, the characteristics of the expected response being based on patterns of communication between the plurality of users, wherein the determining whether the proposed message contextually fits the messaging session comprises:
identifying a pre-established stored context to which the context of the proposed message matches, the per-established stored context having stored expected response characteristics pre-associated therewith;
using the expected response characteristics pre-associated with the stored context as the characteristics of the expected response; and
comparing the characteristics of the expected response to expected response thresholds applied to the messaging session, wherein contextual fit of the proposed message is based at least partially on whether one or more characteristics of the expected response exceeds one or more of the expected responses threshold; and
performing processing based on whether the proposed message contextually fits the messaging session.

US Pat. No. 10,366,163

KNOWLEDGE-GUIDED STRUCTURAL ATTENTION PROCESSING

Microsoft Technology Lice...

1. A computer implemented method for providing structural linguistic knowledge to a semantic tagging process, the method comprising:receiving, at a Knowledge-Guided Structural Attention Process (K-SAP), an input phrase to be semantically tagged;
generating a hierarchical structure of the input phrase, the hierarchical structure comprising one or more discrete sub-structures;
encoding each of one or more discrete sub-structures into an encoded vector;
for each of the discrete sub-structures, determining an attention weight according to a linguistic importance of the discrete sub-structure, and associating the attention weight to each of the one or more discrete sub-structures to generate a weighted, encoded vector for each of the discrete sub-structures;
generating a weighted sum vector, wherein the weighted sum vector is generated according to a content of each of the one or more discrete sub-structures and according to the corresponding attention weight of each of the one or more discrete sub-structures by combining the weighted, encoded vectors;
combining the weighted sum vector with an input phrase vector, thereby generating a knowledge-guided vector corresponding to the input phrase, wherein the input phrase vector is generated by encoding the input phrase; and
providing the knowledge-guided vector and the input phrase to a recurrent neural network (RNN) for semantic tagging.

US Pat. No. 10,366,162

COGNITIVE ENTITY REFERENCE RECOGNITION

International Business Ma...

1. A computer implemented method for recognizing a reference to an entity from a conversation, comprising:monitoring, by one or more processor, one or more message of the conversation between two or more users for an entity reference, wherein the two or more users have respective user profiles including respective user names;
detecting the entity reference in a message of the one or more message from the monitoring, the entity reference being not present in an entity reference list, wherein the entity reference list includes zero or more alternate name referring to a user of the two or more users, wherein an alternate name is distinctive from the respective user names;
analyzing the message and following messages in the conversation for relevance of the entity reference and sentiment associated with the entity reference;
determining that the entity reference is appropriate for later use based on the analyzing and respective thresholds for relevance and sentiment; and
updating the entity reference list with the entity reference as a new alternate name for the user such that the user may be identified by use of the new alternate name in subsequent messages.

US Pat. No. 10,366,161

ANAPHORA RESOLUTION FOR MEDICAL TEXT WITH MACHINE LEARNING AND RELEVANCE FEEDBACK

International Business Ma...

1. A method for directing a computer processor to resolve an anaphor in electronic natural language text, comprising:detecting a plurality of entities and an anaphor in a span of parsed natural language text comprising one or more sentences;
extracting pairs of related entities among the plurality of entities, based on domain knowledge;
constructing a set of tuples, wherein each tuple is a data type comprising an anaphor, an antecedent entity (AE) appearing before the anaphor in the span of parsed natural language text, and an entity (E) appearing after the anaphor in the span of parsed natural language text, wherein the anaphor refers to the AE and relates the AE to the E, and wherein the constructing is based on initial training data and the extracted pairs of related entities; and
resolving the anaphor by determining which entity in the plurality of entities the anaphor references, using the constructed set of tuples, and selecting an AE among one or more candidate AEs.

US Pat. No. 10,366,160

AUTOMATIC GENERATION AND DISPLAY OF CONTEXT, MISSING ATTRIBUTES AND SUGGESTIONS FOR CONTEXT DEPENDENT QUESTIONS IN RESPONSE TO A MOUSE HOVER ON A DISPLAYED TERM

INTERNATIONAL BUSINESS MA...

1. A computer-implemented method for assisting users in a conversation, comprising:identifying concepts in the conversation;
linking identified concepts in the conversation by matching the identified concepts in the conversation to concepts in a knowledge base; and
generating and displaying on a display device, one or more domain and language independent user-specific context dependent suggestions for discussion questions for the conversation based on attributes and values associated with the linked concepts in the knowledge base by automatically disambiguating concepts identified as important, and inferring missing attributes for the matching concepts in the knowledge base based on additional attributes present in sibling concepts in a taxonomy in the knowledge base,
wherein the context-dependent suggestions for discussion questions are automatically generated and presented to one or more of the particular users in real-time using a personalized interface of the display device, the context-dependent suggestions including one or more suggestions for discussion questions generated based on the inferred missing attributes, and
wherein important topics not explicitly mentioned in the conversation are identified, presented, and highlighted in real-time to aid the users during the conversation in response to a user mouse hover or click on a displayed term.

US Pat. No. 10,366,159

ADDRESS PARSING SYSTEM

Workday, Inc., Pleasanto...

1. A system for identifying address components, comprising:an interface configured to receive an address for parsing; and
a processor configured to:
determine a tokenized address based at least in part on the address for parsing, wherein the tokenized address comprises an ordered set of components having a component list length;
determine a matching probability for each model of a set of models, each model of the set of models comprising an ordered set of identifiers having an identifier list length, wherein determining the matching probability comprises to:
in response to determining that the component list length and an identifier list length of a model of the set of models are of equivalent length, determine, based at least in part on training addresses, a probability that a component of the ordered set of components is associated with a corresponding identifier of the model of the set of models;
determine a matching model of the set of models based at least in part on the matching probability for each model of the set of models;
associate each component of the ordered set of components with a corresponding identifier of the matching model; and
store the ordered set of components and the corresponding identifiers of the matching model.

US Pat. No. 10,366,158

EFFICIENT WORD ENCODING FOR RECURRENT NEURAL NETWORK LANGUAGE MODELS

Apple Inc., Cupertino, C...

1. A non-transitory computer-readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by one or more processors of an electronic device, cause the electronic device to:receive a user input including a word sequence;
provide a representation of a current word of the word sequence, wherein the representation of the current word is indicative of a class of a plurality of classes and a word associated with the class;
determine a current word context based on a weighted representation of the current word and a weighted previous word context,
wherein the current word context is a context at a first time and the previous word context is a context at a second time, and
wherein the weighted representation of the current word is weighted with a first weight factor and the weighted previous word context is weighted with a second factor different than the first weight factor;
provide a representation of a next word of the word sequence, wherein the representation of the next word of the word sequence is based on the current word context; and
display, proximate to the user input, the next word of the word sequence.

US Pat. No. 10,366,157

IMAGES ON CHARTS

Microsoft Technology Lice...

1. A method for creating a chart, the method comprising:receiving a selection of one or more cells within a spreadsheet;
identifying at least one image associated with the selected one or more cells, wherein the at least one image is associated with one or more parameters;
receiving a selection of a charting function;
creating a chart;
incorporating the at least one image into the chart by displaying an icon representing the at least one image within the chart; and
in response to activation of the icon, displaying the at least one image.

US Pat. No. 10,366,156

DYNAMICALLY TRANSFERRING DATA FROM A SPREADSHEET TO A REMOTE APPLCATION

APTTEX CORPORATION, San ...

1. A computer-implemented method, comprising:in a computing device communicably connected to a remote application through a network:
scanning a spreadsheet in order to identify potential record cells;
selectively converting each identified potential record cell into an actual record cell in said spreadsheet for said remote application;
identifying record attributes associated with each said actual record cell, wherein the selective conversion of each identified potential record cell into the actual record cell comprises retrieval of data in plurality of cells in the spreadsheet based on a save map component associated with the spreadsheet and based on at least one user input corresponding to a selection from a list of predefined records associated with a plurality of predefined tables included in the remote application, and wherein the remote application is associated with a database for exchange of data;
executing a record construction component associated with the spreadsheet, wherein the record construction component assembles a record for the remote application based on the record attributes of each said actual record cell; and
transmitting the assembled record to the remote application.

US Pat. No. 10,366,155

METHOD AND APPARATUS FOR DISPLAYING DATA GRIDS

Oracle International Corp...

1. A non-transitory computer-readable medium including instructions executable by a digital processor, the computer-readable medium including one or more instructions for:generating a document object model that includes a first element and a second element;
storing, in the first element, a grid object that represents column headers of a table, wherein the first element is configured to form an encapsulated frozen section of the table as a first layer with a higher z-index which overlays the second element forming a second layer of the table;
storing, in the second element, a grid object that represents rows of the table including the column headers, wherein the first element and second element form a visual representation of the table;
detecting a scroll event;
in response to detecting the scroll event, invoking one or more programmatic methods that modify data within the second element representing vertical scrolling without modifying data within the first element in response to the vertical scrolling; and
rendering the table based on the document object model following the invoking of the one or more programmatic methods.

US Pat. No. 10,366,154

INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT

KABUSHIKI KAISHA TOSHIBA,...

1. An information processing device comprising:processing circuitry configured to function as:
a keyword extracting unit that extracts one or more keywords from time-series texts where a keyword has a time of appearance in the time-series texts within a first time range that is set according to a user operation;
a tag generating unit that generates one or more tags each corresponding to a keyword among the one or more keywords and having a time period from a first appearing time through a last appearing time of the keyword in the time-series texts within the first time range; and
a UI control unit that creates a UI screen including a first display area in which a first time axis representing the first time range is displayed and a second display area in which the one or more tags are displayed while causing each of the one or more tags to correspond to the time period on the first time axis, wherein
when one of the one or more tags displayed in the second display area is selected,
the keyword extracting unit extracts one or more new keywords from time-series texts within a second time range that is a time range equivalent to the time period of the selected tag,
the tag generating unit generates one or more new tags each corresponding to a new keyword among the one or more new keywords and having a time period from a first appearing time through last appearing time of the new keyword in the time-series texts within the second time range, and
UI control unit updates the UI screen so that a second time axis representing the second time range is displayed in the first display area and the one or more new tags are displayed in the second display area while causing each of the one or more new tags to correspond in time along the time period on the second time axis.

US Pat. No. 10,366,153

SYSTEM AND METHOD FOR CUSTOMIZING NOTE FLAGS

MICROSOFT TECHNOLOGY LICE...

1. A method for customizing note flags comprising:receiving, via a touch user interface coupled to a processing device, handwritten gestures defining a first note that is displayed within a note-taking application executing on the processing device and recognizing the handwritten gestures as text;
receiving, via the touch user interface, a second note that is displayed within the note-taking application;
receiving input indicating that both the first note and the second note are to be flagged, wherein the received input comprises indication of a first note type for the first note and a second note type, which is different from the first note type, for the second note, and wherein the both the first and second note types are selected from the group comprising a calendar item associated with a calendar application, an e-mail item associated with an e-mail application, and an action item associated with a task application;
flagging, by the processing device, the first note with the first note type and the second note with the second note type;
when the first and second notes are flagged:
automatically linking the flagged first note with the application associated with the first note type;
automatically linking the flagged second note with the application associated with the second note type; and
automatically associating the flagged first and second notes with a note flag summary of the note-taking application that comprises a singular listing of the flagged first and second notes;
displaying in the singular listing the flagged first and second notes including the flagged first note in a typed text format;
receiving a selection of the flagged first note from the singular listing and, when the selection of the flagged first note is received, opening the application associated with the first note type, including opening with the application associated with the first note type a first new content receiving document, and placing the content of the first note in typed text format within the first new content receiving document; and
receiving a selection of the flagged second note from the singular listing and, when the selection of the flagged second note is received, opening the application associated with the second note type, including opening with the application associated with the second note type a second new content receiving document, and placing the content of the second note within the second new content receiving document.

US Pat. No. 10,366,152

ONLINE CONTENT MANAGEMENT SYSTEM WITH UNDO AND REDO OPERATIONS

Adobe Inc., San Jose, CA...

1. A content modification tracking method comprising:detecting a plurality of modifications to an electronic document, wherein the modifications are received via a document editing user interface provided at a client computer;
in response to detecting a modification of binary data in the electronic document, generating a first snapshot representing an original state of the binary data and sending the first snapshot to a server computer; and
generating, at the client computer, a modification history comprising (a) a first update action that indexes the modification of the binary data and that includes an address indicating a location where the first snapshot is stored, and (b) a second update action that indexes a modification of non-binary data in the electronic document and that includes a representation of an original state of the non-binary data in the electronic document.

US Pat. No. 10,366,151

CONTEXTUALLY RELEVANT KNOWLEDGE PANELS IN AN APPLICATION ENVIRONMENT

Google LLC, Mountain Vie...

1. A method performed by a data processing apparatus, the method comprising:receiving content of a document that is displayed on a user device as the content is being typed into the document by a user;
determining, while receiving a first portion of the content being typed and based on a second portion of the received content that (i) was previously typed and (ii) is behind an input cursor, a first factual entity related to the second portion of the received content that is behind the input cursor;
after determining the first factual entity and while receiving a third portion of the content being typed and based on (i) the first portion of the received content that was previously typed and (ii) the second portion of the received content that was previously typed that both collectively comprise an updated portion of received content that occurs in the document behind the input cursor;
determining that a measured level of intent for the third portion of the received content is greater than a threshold level of intent; and
in response to determining that the measured level of intent for the third portion of the received content is greater than the threshold level of intent, determining a second factual entity that is related to the first portion of the content, the second portion of the content, and the third portion of the content;
requesting content of a knowledge panel for the first factual entity and the second factual entity, wherein the knowledge panel is a user interface element that provides a collection of content related to the first factual entity and the second factual entity;
receiving the contents of the knowledge panel for contemporaneous display on the user device with the content of the document while receiving the third portion of the content being typed, wherein the third portion of the content being typed includes any subsequent portion of content being typed after the first portion of the received content and the second portion of the received content; and
providing, to the user device, instructions to cause display of the contents of the knowledge panel with the document;
receiving an indication that the user selected the display of the knowledge panel; and
responsive to receiving the indication that user selected the display of the knowledge panel, inserting the collection of content related to the first factual entity and the second factual entity into the document.

US Pat. No. 10,366,150

GENERATING A SECTION OF A DIGITAL MAGAZINE INCLUDING CONTENT FROM ONE OR MORE USERS

Flipboard, Inc., Palo Al...

1. A method for generating a digital magazine, the method comprising:receiving a request to create a section of the digital magazine from a user of a digital magazine server at the digital magazine server, the request including a location and a threshold distance from the location;
retrieving, at the digital magazine server, location information associated with one or more users of the digital magazine server;
identifying, by the digital magazine server, one or more users associated with location information stored by the digital magazine server within the threshold distance included in the request of the location included in the request as additional users of the digital magazine server authorized by the user to modify content included in the section of the digital magazine;
presenting an indication to each of the identified one or more additional users identifying the section of the digital magazine, identifying an authorization to modify content included in the section of the digital magazine, and identifying the user of the digital magazine server from whom the request to create the section of the digital magazine was received;
receiving a content item from an additional user of the plurality of additional users for inclusion in the section of the digital magazine;
generating the section of the digital magazine including the received content item from the additional user and one or more content items identified by the user by the digital magazine server computing scores for the one or more content items identified by the user and for the content item received from the additional user, the digital magazine server ranking the content items identified by the user and the content item received from the ranking based on the scores, the digital magazine server selecting a set of the one or more content items identified by the user and the additional content item based on the ranking, scoring page templates stored by the digital magazine server based on characteristics of slots in each of at least a set of page templates stored by the digital magazine server and characteristics of each of the set of the one or more content items identified by the user and the additional content item, selecting a page template stored by the digital magazine server specifying positions of each of the set of the one or more content items identified by the user and the additional content item relative to each other based on the scoring and the digital magazine server presenting the one or more content items and the additional content items in positions relative to each other specified by the selected page template in the section based on the ranking; and
presenting the section of the digital magazine including information identifying the additional user in conjunction with the content item received from the additional user and information identifying the user as associated with the section of the digital magazine to one or more other users of the digital magazine server.

US Pat. No. 10,366,149

MULTIMEDIA PRESENTATION AUTHORING TOOLS

Wolfram Research, Inc., ...

1. A method for facilitating generation of a multimedia presentation, the method comprising:providing, using one or more processors, an electronic workspace in which script information can be entered, the script information associated with a script for the multimedia presentation;
providing, using one or more processors, one or more first user interface mechanisms to permit a user to include in the electronic workspace indications of visual information to be displayed during the multimedia presentation;
providing, using one or more processors, one or more second user interface mechanisms to permit the user to include in the workspace indications of actions to be taken during the multimedia presentation;
analyzing, using one or more processors, script information included in the workspace, wherein analyzing the script information included in the workspace includes (a) analyzing the indications of visual information to be displayed during the multimedia presentation, (b) analyzing the indications of actions to be taken during the multimedia presentation, and (c) analyzing respective positions of the indications of visual information within the workspace relative to respective positions of the indications of actions to be taken during the multimedia presentation within the workspace to determine (i) a sequence in which the visual information is to be displayed during the multimedia presentation and (ii) timing of the actions to be taken during the multimedia presentation in relation to the determined sequence in which the visual information is to be displayed; and
generating, using one or more processors, based on the analysis of the script information, including the determined sequence in which the visual information is to be displayed during the multimedia presentation and the timing of the actions to be taken during the multimedia presentation, (i) a performance script document to be referenced by a speaker and/or an assistant during the multimedia presentation, and (ii) a visual display document including information that specifies the visual information to be displayed on a display device during the multimedia presentation,
wherein the performance script document is generated to include performance information that i) is not included in the visual display document and ii) is not for display to an audience, the performance information specifying at least one of i) words to be spoken by the speaker during the multimedia presentation, and ii) actions to be taken by the speaker and/or the assistant during the multimedia presentation,
wherein the performance script document is generated to be linked to the visual display document such that (i) the words to be spoken by the speaker during the multimedia presentation and/or (ii) the actions to be taken by the speaker and/or the assistant during the multimedia presentation are prompted at times that correspond to the determined timing of the actions to be taken during the multimedia presentation in relation to the determined sequence in which the visual information is to be displayed, and
wherein at least a portion of the information that specifies the visual information to be displayed on a display device during the multimedia presentation is not included in the performance script document.

US Pat. No. 10,366,148

LIGHTWEIGHT BROWSER MONITORING AND VIEWING

Amazon Technologies, Inc....

1. A computer-implemented method, comprising:causing a document to be transmitted for display on a first screen that corresponds to a client computing device, the document comprising executable code configured to enable creation of document data associated with a client application and to enable creation of an event message associated with the client application;
enabling the client application to create the event message at least in response to an interaction with the document on the first screen;
generating, based at least in part on the document data, a copy of the document to be displayed on a second screen that corresponds to a monitoring device;
enabling the client application to send a link pointing to the copy of the document to a queue service;
receiving the event message associated with the client application created on the client computing device at least in response to the interaction with the document rendered on the first screen, the event message identifying at least a screen location of a pointer that interacts with the document; and
causing the copy of the document with the pointer located at the screen location to be displayed on the second screen of the monitoring device.

US Pat. No. 10,366,147

TECHNIQUES FOR PROGRAMMATIC MAGNIFICATION OF VISIBLE CONTENT ELEMENTS OF MARKUP LANGUAGE DOCUMENTS

Freedom Scientific, Inc.,...

1. A method for adjusting a display size, relative to a default display size, of one or more visible content elements of a markup language document on a computing device, the method comprising:in response to receiving user input requesting increase of the display size of the one or more visible content element:
selecting a first zoom technique from a plurality of zoom techniques to be applied to the one or more visible content elements to increase the display size thereof;
determining a threshold zoom value above which the first zoom technique will result in at least one visible content element becoming at least partially obscured by another visible content element;
selecting a second zoom technique from the plurality of zoom techniques to be applied to the one or more visible content elements to increase the display size thereof such that, at zoom levels above the threshold zoom value, the second zoom technique results in a lower area of obscured content than the first zoom technique without hiding the one or more visible content elements;
determining a current zoom level;
comparing the current zoom level against the threshold zoom value;
determining whether the current zoom level is below the threshold zoom value;
responsive to determining that the current zoom level is below the threshold zoom value, applying the first zoom technique to increase the display size of the one or more visible content elements; and
responsive to determining that the current zoom level exceeds the threshold zoom value, applying the second zoom technique, different from the first zoom technique, to increase the display size of the one or more visible content elements.

US Pat. No. 10,366,146

METHOD FOR ADJUSTING CONTENT OF A WEBPAGE IN REAL TIME BASED ON USERS ONLINE BEHAVIOR AND PROFILE

ADOBE INC., San Jose, CA...

1. A method comprising:monitoring traffic from a plurality of users to a website;
tracking a user from the plurality of users visiting the web site to identify a plurality of parameters relating to the user, including a first parameter associated with an identity of the user and a second parameter associated with navigation behavior for the user within the website;
based on selecting a statistical algorithm for each of the plurality of parameters corresponding to a type of parameter, applying a first statistical algorithm to analyze the first parameter associated with the identity of the user and a second statistical algorithm to analyze the second parameter associated with the navigation behavior for the user within the website;
based on applying the first statistical algorithm and the second statistical algorithm, identifying an organization to which the user belongs;
selecting content for the website to be presented to the user based on an analysis of each of the plurality of parameters according to the selected statistical algorithm, the organization to which the user belongs, and a marketing stage in a sale process for the user, wherein the content is selected from a plurality of content items stored in a content database; and
presenting the selected content in a webpage of the website to the user.

US Pat. No. 10,366,145

SYNDICATION OF SLIDESHOW CONTENT THROUGH A WEB FEED

Oath Inc., Dulles, VA (U...

1. A computer-implemented method for syndicating slideshow content in a web feed, the method comprising:receiving, at a server, a request initiated from a feed reader for slideshow content, wherein the feed reader is executable at a user device, and wherein a first XML Schema Definition (“XSD”) stored on the user device enables the feed reader to process slideshow content conforming to XSD;
generating, by a feed generator at the server, data for a content feed associated with a web page in response to the request, wherein a second XSD stored on the server enables the feed generator to generate the data conforming to XSD;
sending, from the server, the generated data to the feed reader in response to the request;
identifying, by the feed reader, a slideshow included within the web page based on analysis of the generated data according to the first XSD;
extracting, by the feed reader, a first set of properties for the identified slideshow content, from the generated data, based on the first XSD;
identifying a set of slides of the slideshow based on the first set of properties extracted for the identified slideshow;
extracting a first message stream slide type and a second message stream slide type of each of one or more slides in the identified set of slides, wherein the first message stream slide type and the second message stream slide type includes at least one of an image, video, and text; and
displaying, at the feed reader of the user device, the content feed including the set of slides of the slideshow along with the first set of properties, a first message stream of the first message stream slide type, and a second message stream of the second message stream slide type.

US Pat. No. 10,366,144

ANALYZING AND LINKING A SET OF IMAGES BY IDENTIFYING OBJECTS IN EACH IMAGE TO DETERMINE A PRIMARY IMAGE AND A SECONDARY IMAGE

eBay Inc., San Jose, CA ...

1. A system comprising:an image processing module comprising one or more processors and configured to:
access a set of images from a server;
analyze the set of images to identify objects in each image using object recognition algorithms;
determine a primary image of the set that includes more of the identified objects than any of the other images of the set;
for each of the identified objects in the primary image,
search the set of images for another image that includes the identified object,
in response to identifying the other image including the identified object,
determine whether the identified object in the other image has a higher magnification than the primary image, and
identify the other image as a secondary image in response to the identified object in the other image having the higher magnification than the primary image:
insert zooming links into the primary image at the locations in the primary image that include an identified object that is also in a secondary image;
show the primary image on a display;
show on the display, based on receiving a selection of one of the zooming links, the secondary image that includes the identified object at the location of the selected zooming link.

US Pat. No. 10,366,143

METHOD AND SYSTEM FOR SELECTING ENCODING FORMAT FOR READING TARGET DOCUMENT

PEKING UNIVERSITY FOUNDER...

1. A method for selecting an encoding format used for reading a target document, characterized in comprising:reading each reference document with at least two reference encoding formats in a set of multiple encoding format and determining a disorder code pattern, comprising:
reading the reference document with the reference encoding format to obtain a disorder code string,
removing invalid determination codes in the disorder code string and obtaining valid determination codes,
counting the number of times disorder codes appear in the valid determination codes to obtain the disorder code pattern, wherein all disorder codes appear a number of times larger than a threshold are stored as the disorder code pattern, the invalid determination codes being English characters, numbers and blank characters, and the valid determination codes being all of other codes except for the invalid determination codes;
reading the target document with at least two encoding formats;
for each encoding format, comparing data generated when reading the target document with this encoding format and the determined disorder code patterns to determine disorder codes generated when reading the target document with this encoding format;
counting a proportion of disorder codes generated when reading the target document with each encoding format and selecting an encoding format having a proportion of disorder codes less than a predetermined threshold as the encoding format used for reading the target document.

US Pat. No. 10,366,142

IDENTIFIER BASED GLYPH SEARCH

Adobe Inc., San Jose, CA...

1. A method comprising:receiving, by one or more computing devices, a user input from a user for locating a glyph, the user input specifying a query;
analyzing, by the one or more computing devices, the query to generate one or more search tokens;
identifying, by the one or more computing devices, a font indicated by the user input;
identifying, by the one or more computing devices, a plurality of glyphs contained within the font and a plurality of identifiers contained within the font, each of the plurality of glyphs associated with at least one of the plurality of identifiers;
performing, by the one or more computing devices, a search within the font to locate one or more identifiers of the plurality of identifiers, the one or more identifiers containing at least one of the one or more search tokens;
performing, by the one or more computing devices, a search within the font to locate one or more glyphs of the plurality of glyphs, the one or more glyphs associated with the located identifiers;
configuring, by the one or more computing devices, a glyph search result to include the located glyphs; and
outputting, by the one or more computing devices, the glyph search result within a user interface, the glyph search result configured to display the located glyphs as candidates for placement in a document by the user.

US Pat. No. 10,366,141

COMPUTER ARCHITECTURE FOR EMULATING N-DIMENSIONAL WORKSPACES IN A CORRELITHM OBJECT PROCESSING SYSTEM

Bank of American Corporat...

1. A device configured to emulate a node in a correlithm object processing system, comprising:a memory operable to store:
a node table that identifies:
a plurality of source correlithm objects, wherein each source correlithm object is a point in a first n-dimensional space represented by a binary string; and
a plurality of target correlithm objects, wherein:
each target correlithm object is a point in a second n-dimensional space represented by a binary string, and
each target correlithm object is linked with a source correlithm object from among the plurality of source correlithm objects; and
a node engine operably coupled to the memory, configured to emulate a node configured to:
receive an input correlithm object;
determine distances between the input correlithm object and each of the source correlithm objects in the node table in response to receiving the input correlithm object, wherein the distance between the input correlithm object and a source correlithm object is determined based on differences between a binary string representing the input correlithm object and binary strings linked with each of the source correlithm objects;
identify a source correlithm object from the node table with the shortest distance;
fetch a target correlithm object from the node table linked with the identified source correlithm object; and
output the identified target correlithm object.

US Pat. No. 10,366,140

METHOD FOR REPLAYING USER ACTIVITY BY REBUILDING A WEBPAGE CAPTURING CONTENT AT EACH WEB EVENT

1. An apparatus, comprising:memory comprising instructions; and
at least one processor, wherein
the instructions, with the at least one processor, are configured to cause the apparatus to
capture a skeleton of a webpage without collecting JavaScript, cascading style sheets, and markup language code associated with the webpage, wherein
the capturing of the skeleton comprises extracting structural data of the webpage from a document object model and collecting style information of the webpage from a web browser,
the structural data comprising one or more elements of the webpage and a hierarchical relationship between the one or more elements of the webpage; and the style information comprising layout and arrangement of the webpage; and
transmit the captured skeleton of the webpage to a server, allowing the server to recreate a webpage that was presented to a visitor, wherein
the transmission of the captured skeleton of the webpage occurs when the visitor visits the webpage, during each web event triggered by the visitor, or both, and
the instructions comprise a client-side code or script configured to cause the apparatus to collect the style information of the webpage from the web browser.

US Pat. No. 10,366,139

PORTAL CONNECTED TO A SOCIAL BACKEND

International Business Ma...

1. A portal system comprising:a portal connected to at least one social backend, wherein said at least one social backend supports a social media service for a user of the portal;
a portal object generator for creating a page in the portal, wherein creating the page in the portal changes a portal model of the portal; and
a backend processing component for keeping the portal synchronized with said at least one social backend in response to changes in the portal, wherein the changes in the portal comprise at least one of a group consisting of: creation of a new page, deletion of an existing page, modification of an existing page, creation of a new portlet, and deletion of an existing portlet, wherein said portal comprises an integration component communicating with said at least one social backend, the portal system further performing a method comprising:
integrating functionality of said at least one social backend into said portal system by creating at least one portal object that is associated with at least one social object, wherein a representative social object is created in response to a web content item with social content being created, wherein content is retrieved from a web content manager in response to said web content item with social content being enriched with associated information, and wherein said associated information comprises access statistics;
implementing said association information as meta data entries containing information about a social object of said at least one social backend;
receiving a notification about creation of new portal objects by said integration component;
creating a new instance of a social object within said social backend by said integration component;
receiving a new identification from a newly created social object by said integration component;
inserting new social object identification into meta data of said newly created social object; and
representing said social object as a portal object to a portal user, wherein said representing reflects deletion and updates of portal objects in said at least one social backend.

US Pat. No. 10,366,138

METHOD AND APPARATUS FOR GENERATING A WEB PAGE

1. A method comprising:receiving a plurality of keywords, each of the plurality of keywords based on user input and user communications associated with a particular user, each of the plurality of keywords associated with a respective ranking based on a number of times a respective keyword occurred in the user input and the user communications, wherein each ranking is generated by an intercept module located on a user device;
reducing a ranking associated with one of the plurality of keywords based on expiration of a period of time defined by the particular user that begins on a date and a time identified by a date and time stamp associated with the one of the plurality of keywords;
identifying items of interest based on the plurality of keywords and associated rankings; and
generating a webpage based on the items of interest.

US Pat. No. 10,366,137

METHODS AND APPARATUS FOR CONTENT DELIVERY VIA BROWSER CACHE EXTENSION

InterDigital Patent Holdi...

1. A method of content delivery using a shared cache, the method comprising:receiving access to a read-only shared folder located in a remote cache of an edge server of a small cell network over a network file system (NFS) protocol, wherein the read-only shared folder comprises pre-fetched content retrieved from a content owner, and wherein the pre-fetched content is indicated to the edge server by a mobile-content distribution/delivery network (mobile-CDN) having a first interface with the edge server and a second interface with the content owner;
mounting the read-only shared folder at a local browser cache of a user device using the NFS protocol;
reading a remote index file from the read-only shared folder, wherein the remote index file comprises one or more remote entries indicating the pre-fetched content;
merging the remote index file with a local index file in the local browser cache to create a merged index file, wherein the local index file comprises one or more local entries indicating local content;
checking the merged index file for an entry corresponding to a HTTP/HTTPS request; and
upon determining that content matching the HTTP/HTTPS request is present in the pre-fetched content in the remote cache, reading the requested content over the NFS protocol.

US Pat. No. 10,366,136

METHOD FOR INTERACTING WITH A WEB BROWSER EMBEDDED IN ANOTHER SOFTWARE APPLICATION

WOLTERS KLUWER ELM SOLUTI...

1. A method for manipulating objects in a framework software application that embeds another software application, wherein the embedded software application does not support object manipulation controls of the framework software application, the method comprising:providing, by one or more processors, a user interface of the embedded software application in an embedded window disposed within a framework window, wherein the user interface of the framework software application is provided in the framework window;
generating, by the one or more processors, a transparent interface element configured to detect events generated by the object manipulation controls of the framework software application;
positioning, by the one or more processors, the transparent interface element over the embedded window;
detecting, by the transparent interface element, an object repositioning event related to repositioning, via the user interface of the framework software application, an object visible from the framework window to the embedded window, including detecting a trajectory of the object repositioning event; and
in response to detecting the object repositioning event, providing information related to the repositioned object to the embedded software application, including providing the detected trajectory, and
wherein the embedded software application is configured to:
process the detected trajectory of the object repositioning event, and
display a visible indicator of the trajectory of the object repositioning event in the user interface of the embedded software application.

US Pat. No. 10,366,135

ZERO FOOTPRINT APPLICATION VIRTUALIZATION

CERNER INNOVATION, INC., ...

1. One or more non-transitory computer storage media (the “media”) storing computer-useable instructions that, when executed by one or more computing devices, cause the one or more computing devices to perform a method for establishing bi-directional communication for an application virtualization platform, the method comprising:determining, based on capabilities of a browser, one or more supported communication protocols of the browser;
determining that a first communication protocol from the one or more supported communication protocols of the browser is a supported communication protocol of a server;
establishing a communication link between the browser and the server according to the first communication protocol;
streaming a representation of an application to the browser, the representation of the application comprising a plurality of encoded tiles encoded according to the supported communication protocol, wherein the representation is streamed in a format corresponding to the first communication protocol that allows the representation to be rendered without requiring installation of software or codecs by the browser;
receiving a human input device (HID) event associated with the representation via the browser; and
interactively updating the representation in response to receiving the HID event.