Follow us on Twitter
This page is updated frequently with new Finger-related patent applications. Subscribe to the Finger RSS feed to automatically get the update: related Finger RSS feeds. RSS updates for this page: Finger RSS
Systems and methods for introducing variation in sub-system output signals to prevent device fingerprinting
System and method for imaging evidence deposited on curved surfaces
Apparatus for sensing touch input in electronic device
|| List of recent Finger-related patents
| Methods, apparatuses and computer program products for providing automatic maintenance of a geoposition system|
An apparatus for augmenting associations between places and fingerprints includes a processor and memory storing executable computer code causing the apparatus to at least perform operations including detecting fingerprint data from a beacon device(s), as the apparatus traverses one or more physical places. The fingerprint data corresponds to generated summaries of radio information corresponding to the physical places.
| Method and time of flight fingerprint and geo-location|
The disclosure relates to locating a device in an environment. In one embodiment, the disclosure is directed to a method to determine a device location.
| Authorizing devices based on identifying content distributor|
Methods and systems to authorize devices and/or perform other actions based on identifying content distributors are described. In some example embodiments, the methods and systems access video content playing at a client device, calculate fingerprints of a portion of the video content, identify a distributor of the video content based on the fingerprints, and perform an action in response to the identification of the distributor of the video content, such as actions to authorize the client device or other associated devices (e.g., second screens) to receive content from the distributor, actions to present sponsored content to the client device or associated devices, and so on..
| Device and identity authentication|
A device for identity authentication is disclosed in the invention, which comprises a client and a background, wherein the client comprises a plurality of terminal units and fingerprint sensors interconnecting with each terminal unit, each fingerprint sensor includes a collection and recognition device for collecting fingerprint information and a memory for storing fingerprint information and user information of the user corresponding to the fingerprint information. The background includes a identity authentication server interconnecting with the terminal units, and multiple application servers interconnecting with the identity authentication server.
Wwtt Technology China
| Systems and methods for introducing variation in sub-system output signals to prevent device fingerprinting|
A computer-implemented method for introducing variation in sub-system output signals to prevent device fingerprinting may include (1) intercepting, on a computing device, an output signal sent from a sub-system device on a computing device to a software component on the computing device, (2) identifying a margin of error for the output signal, (3), creating a modified output signal by introducing variation into the output signal in such a way that (a) the variation does not exceed the margin of error for the output signal and (b) the modified output signal cannot be used to identify the computing device, and (4) sending the modified output signal to the software component. Various other methods, systems, and computer-readable media are also disclosed..
| System and imaging evidence deposited on curved surfaces|
Systems and methods are disclosed for capturing images of latent evidence such as a latent fingerprint provided on a curved or irregular surface of an object. According to certain embodiments, a latent fingerprint provided on a curved or irregular surface of an object is illuminated by a uv lamp.
| System for estimating gender from fingerprints|
A method for detecting the gender only from a persons fingerprint data in real time. Testing consists of determining if the fingerprint is taken from the right hand or the left hand, taking a core point as reference from a selected fingerprint, analyzing the size of an obtained fingerprint part, drawing a diagonal line, then automatically determining ridge lines crossed by the diagonal line, calculating the ridge counts, determining ridge thicknesses, determining the numbers of black and white pixel from the obtained values, determining average fingerprint ridge counts for men and women, combining these parameters for applying them to intelligent system, preparing the structure of the system, training and testing the system, and performing these processes automatically on a computer or a web-based intelligent system which consists of different modules..
| Authentication frequency and challenge type based on environmental and physiological properties|
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties.
| Successive data fingerprinting for copy accuracy assurance|
Systems and methods are disclosed for checking the data integrity of a data object copied between storage pools in a storage system by comparing data fingerprints of data objects, by scheduling a series of successive copy operations over time for copying a data object from a source data store to a target data store; generating a partial fingerprint of the data object at the source data store using a data fingerprinting operation that creates a fingerprint from a subset of data of the data object; sending the partial fingerprint of the data object to the target data store; sending any new data contents for the data object to the target data store; and creating a partial fingerprint of the data object at the target data store and comparing it to the partial fingerprint sent to the target data store to determine if they differ.. .
| Ambient noise based augmentation of media playback|
Ambient noise sampled by a mobile device from a local environment is used to automatically trigger actions associated with content currently playing on the mobile device. In some implementations, subtitles or closed captions associated with the currently playing content are automatically invoked and displayed on a user interface based on a level of ambient noise.
Apparatus for sensing touch input in electronic device
A touch screen apparatus having a fingerprint sensing function is provided. The touch screen apparatus includes a color filter layer including a first black matrix line, which is located between each of pixels or each of sub-pixels and is arranged in a first direction, and including a second black matrix line, which is arranged in a second direction that is perpendicular to the first direction.
Samsung Electronics Co., Ltd.
Spatial frequency spectrometer for and detection of spatial structures in materials
Spatial frequency spectra from periodic, aperiodic and quasi-random structures in materials are shown and used to detect differences among objects via internal coding from the spatial frequencies. The method is applied to different grades of human tissues for a new form of histology and pathology, and to detect art forgeries and coding boxes, money and papers and gems.
Lipase-containing polymeric coatings for the facilitated removal of fingerprints
A substrate or coating is provided that includes a lipase with enzymatic activity toward a component of a fingerprint. Also provided is a process for facilitating the removal of fingerprints is provided wherein an inventive substrate or coating including a lipase is capable of enzymatically degrading of one or more components of the fingerprint to facilitate fingerprint removal from the substrate or said coating.
Regents Of The University Of Minnesota
Motorized nail file
An apparatus comprises a housing having a shape and size suitable for being held in a single hand of a user. A nail file head is coupled to the housing.
Geminivirus replication inhibitor
A replication inhibitor for a virus belonging to the genus mastrevirus of the family geminiviridae, which comprises a zinc finger protein that can specifically bind to full length dna of stem loop region of the virus, or one or more partial dnas selected from the full length dna, and can inhibit formation of a stem loop structure.. .
Sharing timed fingerprint location information
Sharing timed fingerprint location information is disclosed. In an aspect, timed fingerprint location information can be associated with a location of a user equipment.
At&t Mobility Ii Llc
Method, a system and a computer program product for certifying that a destination email server has received an email message sent from a sender to at least one destination adress
The invention relates to a method of certifying that an email message sent through a sender email server from a sender to at least one destination address has been received by a destination email server managing the destination address, the method comprising providing a certification email server, which performs: receiving the email message sent through the sender email server; obtaining an electronic fingerprint of the message; obtaining the destination address from the field of the header of the message relating to the destination address of the message; sending the message to the obtained destination address; receiving from the destination email server a confirmation of the acceptance or refusal of the email message; generating a certification file comprising at least the electronic fingerprint of the email message and the confirmation of the acceptance or refusal of the email message from the destination email server.. .
Distributed audience measurement systems and methods
Systems and methods are disclosed for customizing, distributing and processing audio fingerprint data. An example method includes receiving, at a first device, an activation signal and a first audio fingerprint via first wireless communications between the first device and a communications network, the receiving occurring while the first device is not recording audio via a microphone of the first device; based on the activation signal, recording audio using the microphone during a first time period; generating a second audio fingerprint representative of the recorded audio; determining whether the second audio fingerprint matches the first audio fingerprint; and sending an indication of whether the second audio fingerprint matches the first audio fingerprint to an audience measurement entity via second wireless communications between the first device and the communications network..
The Nielsen Company (us), Llc
Audio fingerprint differences for end-to-end quality of experience measurement
Implementations and techniques for audio fingerprint differences for end-to-end quality of experience measurement are generally disclosed.. .
Empire Technology Development Llc
A machine may be configured to generate one or more audio fingerprints of one or more segments of audio data. The machine may access audio data to be fingerprinted and divide the audio data into segments.
Second screen recipes function
Systems for, and methods of, displaying video information comprising: a second screen device obtaining current play position data of a video being played on a primary screen device (e.g., obtaining from the primary screen device an identification of a current play position of the video, or obtaining information to generate an acoustic fingerprint of the video); determining a current play position of the video playing on the primary screen device based upon the current play position data (e.g., identification of the current play position or the acoustic fingerprint); downloading information (e.g., video map, subtitles, moral principles, objectionable content, memorable content, performers, geographical maps, shopping, plot point, item, ratings, trivia information, and recipe information) over a computer communications network into the memory of the second screen device; and displaying information on the second screen device synchronized with the contemporaneously played video on the primary screen device.. .
Method and authenticating biometric scanners
Methods and systems involving image processing extract from an image and estimate unique intrinsic characteristics (scanner pattern) of a biometric scanner, such as area type fingerprint scanner. The scanner pattern is permanent over time, can identify a scanner even among scanners of the same manufacturer and model, and can be used to verify if a scanner acquired an image is the same as the scanner used for biometric enrollment, i.e., to authenticate the scanner and prevent security attacks on it.
The University Of Maryland College Park
Fingerprint preview quality and segmentation
A ridge flow based fingerprint image quality determination can be achieved independent of image resolution, can be processed in real-time and includes segmentation, such as fingertip segmentation, therefore providing image quality assessment for individual fingertips within a four finger flat, dual thumb, or whole hand image. A fingerprint quality module receives from one or more scan devices ridge-flow—containing imagery which can then be assessed for one or more of quality, handedness, historical information analysis and the assignment of bounding boxes..
Fingerprint reading system
A fingerprint reading system includes a camera module, a control module, and a signal processing module. The camera module has a detection unit, an image capture unit, a liquid lens unit, and an illumination unit.
Lustrous Electro-optic Co.,ltd.
Fingerprint sensing system and method
The present invention relates to a method of determining a representation of a fingerprint pattern. The method comprises the steps of acquiring a reference signal indicative of an electric coupling between a hand surface having friction ridges and a reference sensing structure extending across a plurality of the friction ridges; and determining the representation of the fingerprint pattern based on the reference signal and a capacitive coupling between the finger and each of a plurality of sensing elements.
Fingerprint Cards Ab
Fake finger discrimination device and method
A fake finger discrimination device includes a fingerprint sensor and a control processor. The fingerprint sensor senses a rotating finger to obtain fingerprints in a fake finger discrimination mode.
Egis Technology Inc.
Electronic device and logging in application program of the electronic device
A method for logging in to an application program of an electronic device presets a plurality groups of account information of the application program, and presets fingerprints corresponding the plurality of groups of account information in a storage device. When the application program is executed and a user interface of the application program is displayed, the method receives fingerprint data input.
Chiun Mai Communication Systems, Inc.
Fingerprint enhanced authentication for medical devices in wireless networks
An infusion system to administer fluid is disclosed. The infusion system includes an infusion pump having a pump processor, a pump memory and a pump radio to enable bi-directional communication.
Medtronic Minimed, Inc.
Capturing cognitive fingerprints from keystroke dynamics for active authentication
A method for authenticating identity of a user using keystrokes of the user includes receiving as input the keystrokes made by the user, extracting cognitive typing rhythm from the keystroke to provide features, wherein each of the features is a sequence of digraphs of a specific word, and providing active authentication using the features where the user is a legitimate user. A system for authenticating identity of a user using keystrokes of the user includes a plurality of stored profiles stored on a non-transitory computer readable medium, a sensor module for acquiring the keystrokes of the user to provide biometric data, a feature extraction module to process the biometric data and extract a feature set to represent the biometric data, a matching module to compare feature from the feature set with the stored profiles using a classifier to generate matching scores, a decision module configured to use the matching scores from multiple classifiers to verify a user's identity..
Iowa State University Research Foundation, Inc.
Controlling execution of a software application on an execution platform in a local network
A method for controlling an execution of a software application on an execution platform in a first local network comprises: determining a first environment fingerprint including a first network fingerprint characteristic for the first local network using predetermined rules; generating a license including the first environment fingerprint and defining terms of allowed execution of the software application; and controlling the execution by: determining a second environment fingerprint including a second network fingerprint of a local network in which an execution platform for the software application is included using the predetermined rules; comparing the second environment fingerprint with the first environment fingerprint of the license; allowing execution of the software application according to the terms of the license where the second environment fingerprint complies with the first environment fingerprint, and preventing the execution of the software application where the second environment fingerprint does not comply with the first environment fingerprint.. .
Sfnt Germany Gmbh
Receiver-side data deduplication in data systems
Methods and apparatus for receiving uploaded data from a sender at a receiver. A data deduplication technique is described that may reduce the bandwidth used in uploading data from the sender to the receiver.
Amazon Technologies, Inc.
Methods and systems for providing hardware security functions using flash memories
Methods and system for providing a security function, such as random number generation, fingerprinting and data hiding, using a flash memory. The methods and systems do not require carefully design specific circuits, can be implemented in all flash memory device.
Electronic device and task configuring electronic device
A task configuring method of an electronic device using fingerprint recognition is provided. The method including displaying a first area including at least one item which a user can select and a second area which displays the selected at least one item, sensing a touch event used to move the at least one item from the first area to the second area, identifying a fingerprint of a finger which generates the touch event, and configuring a task by combining the at least one moved item and the identified fingerprint..
Samsung Electronics Co. Ltd.
Micromechanical ultrasonic transducers and display
An apparatus may include a one- or two-dimensional array of micromechanical ultrasonic transducer (pmut) elements positioned below, beside, with, on, or above a backplane of a visual display. The backplane may be a thin-film transistor (tft) backplane.
Prediction of a small-for-gestational age (sga) infant
A method of predicting a sga infant in a patient at a pre-symptomatic gestational stage is described. The method comprises a step of assaying a biological sample from the patient for an abundance of a plurality of metabolite biomarkers selected from the 19 metabolite biomarkers of table iv, correlating the abundance of the plurality of metabolite biomarkers with a metabolite fingerprint of sga shown in table iv, and predicting sga based on the level of correlation between the abundance of the plurality of metabolite biomarkers and the metabolite fingerprint of table iv..
University College Cork - National University Of Ireland, Cork
Baseball catcher's protective handwear
Baseball catcher's protective handwear including a catcher's mitt and an improved non-connected inner glove for wearing inside the mitt, the inner glove including (1) a tactile palm-surrounding portion which leaves at least the little finger, ring finger, middle finger and thumb substantially uncovered, (2) a supple index-finger portion that has padding affixed thereto over the phalanges, and (3) padding affixed over the metacarpal region of the palm adjacent to the index finger, thereby to provide continuous protection to the most crucially-vulnerable parts of a baseball player's hand, while simultaneously providing properties of gripping-finger-and-thumb freedom, glove-interior surface feel and in-mitt hand adjustment closely similar to that of a naked hand inside an outer glove.. .
Trigger finger strengthening device
A trigger strengthening device that is made of a plastic, rubber or metal handle with a metal coil spring device molded into the pistol grip handle of the device so the user can exercise and strengthen the trigger finger while holding the device in a pistol grip fashion. This will isolate the exercise to the trigger finger alone, while keeping the rest of the hand gripped firmly on the pistol grip/handle of the device.
Targeted disruption of t cell receptor genes using engineered zinc finger protein nucleases
Disclosed herein are methods and compositions for inactivating tcr genes, using zinc finger nucleases (zfns) comprising a zinc finger protein and a cleavage domain or cleavage half-domain in conditions able to preserve cell viability. Polynucleotides encoding zfns, vectors comprising polynucleotides encoding zfns and cells comprising polynucleotides encoding zfns and/or cells comprising zfns are also provided.
Ospedale San Raffaele Srl
Dynamic network configuration based on passive location analytics
Passive location estimation of mobile devices within a wireless network is provided. The passive location estimation is determined based on one or more measurements that are received from the mobile device and/or from one or more network elements.
At&t Intellectual Property I, L.p.
Method and detecting and measuring for home node-bs
Methods and apparatus are disclosed for a wireless transmit/receive unit (wtru) to detect and perform measurements with respect to home node-bs (hnb) and home evolved node-bs (h(e)nb) (collectively “hnb”). The methods may include generating and transmitting a request for a measurement configuration that may include gap allocations to detect and measure a primary scrambling code or a physical cell identity of a target hnb for at least one frequency or radio access technology (rat).
Interdigital Patent Holdings, Inc.
Systems, methods, and computer-readable storage devices for generating and using a radio-frequency map of an area
A method comprising obtaining, by a system using a processor, a wireless fingerprint corresponding to a mobile communication device and a subject area in which the mobile communication device is or was positioned. The method also includes obtaining, by the system, an area wireless signal distribution map indicating wireless signal strength values corresponding to multiple wireless transmitters positioned in the subject area, and determining, by the system, based on the wireless fingerprint and the area wireless signal distribution map, a location of the mobile communication device..
At&t Mobility Ii Llc
Video display apparatus and operating method thereof
Provided is a operating method of a video display device including a display unit. A receiving unit receiving a broadcasting signal through a tuner; obtaining an uncompressed audio or video (av) content through a receiving unit, wherein the uncompressed av content includes a promotion content; extracting a characteristic information, including at least one of a watermark and a fingerprint, from a part of the uncompressed av content; transmitting a first query to a first server, wherein the first query corresponds to the characteristic information; receiving a first response from the first server, based on the transmitted first query; transmitting a second query to a second server based on the first response; receiving a second response from the second server, based on the transmitted second query; and executing a promotion application based on the second response.
Lg Electronics Inc.
Venue identification using sensor fingerprints
When a mobile device is known to be at a venue, readings from one or more sensors of the device are used to generate a sensor fingerprint of the venue and/or a venue category corresponding to the venue. The sensor fingerprint indicates typical sensor readings for the one or more physical sensors for devices that are located at the venue and/or venues of the same category.
Method for acquiring information of client terminal, server and computer-readable medium
The server disclosed in the present disclosure receives a feature identification transmitted by a feature acquisition device, acquires information of a client terminal corresponding to the feature identification according to the feature identification, and transmits the acquired information of the client terminal to the feature acquisition device. The present disclosure can apply feature identification techniques such as a fingerprint sensor to the social life, thus not only facilitating a client terminal (e.g., a user) to exchange personal information rapidly but also avoiding problems such as information loss or record error..
Tencent Technology (shenzhen) Company Limited
Combined watermarking and fingerprinting
Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa.
Methods and systems for providing control of a device using a fingerprint sensor
Methods and apparatuses for operating a portable device based on a fingerprint sensor are described. According to one embodiment of the invention, a fingerprint sensor attached to a portable device detects fingerprint from a particular finger at a particular orientation.
Preventing display of age inappropriate advertising
Advertisements are screened for age-appropriateness prior to inclusion and display within an application. An advertisement that is available for display within an application is analyzed to determine if either the advertisement itself or if a landing page for the advertisement contains content that is inappropriate for a target age of users such as children.
Electronic device and unlocking the electronic device
A method for unlocking an electronic device stores a user fingerprint in a storage device and presets account information corresponding to each application for each of the user fingerprints. The method further receives fingerprint data input from the electronic device.
Chiun Mai Communication Systems, Inc.
Fingerprint ridge image synthesis system, fingerprint ridge image synthesis method, and program thereof
A fingerprint ridge image synthesis system, configured to accurately extract the shape of the ridges contained in a fingerprint image and clearly reproduce the fingerprint of the fingerprint image on an image, includes: a ridge pixel parameter calculation unit that calculates parameter values including wavelet phase, ridge angle, and inter-ridge distance corresponding to each pixel by means of applying continuous wavelet conversion with respect to the gradient of each pixel contained in the fingerprint image; a label optimization processing unit that optimizes/converts the parameter values corresponding to each pixel to values indicating the mutual continuity with the parameter values in surrounding pixels; and a ridge image generation unit that generates the ridge image by means of converting each pixel gradient in the fingerprint image on the basis of the optimal value.. .
Nec Solution Innovators, Ltd.
Fingerprint minutia display input device, fingerprint minutia display input method, and fingerprint minutia display input program
A fingerprint minutia display input device includes: an image output controller for displaying a fingerprint image and a pointer for designating a minutia; and a minutia input setting unit for displaying a minutia display mark on the minutia; wherein the fingerprint minutia display input device includes a gray-scale value adjustment unit for setting the gray-scale intensity of the entire fingerprint image on which the pointer is positioned, the setting being performed within a range of a display gray-scale width constituted with upper-limit and lower-limit gray-scale values. The screen output controller includes a gray-scale width update function for displaying an updated output display of the fingerprint image in the set display gray-scale width, and a gray-scale width fixing/holding function for fixedly holding the set display gray-scale width as a set display gray-scale width for the minutia display input when there is no new setting information regarding the display gray-scale width..
Nec Solution Innovators, Ltd.
Tamper-protected hardware and using same
One of the various aspects of the invention is related to suggesting various techniques for improving the tamper-resistibility of hardware. The tamper-resistant hardware may be advantageously used in a transaction system that provides the off-line transaction protocol.
Mobile wireless hand-held biometric capture, processing and communication biometric identification
A mobile, wireless biometric identification system includes a biometric capture device, associated software and processes which enable a commercially available wireless communication device, such as a smartphone, using a commercially established wireless communication networks, to capture a digital image of a human biometric (iris, fingerprint, etc.) for transmission via a secure connection to a central server. The capture device is designed to focus on the difficult task of capturing the highest possible quality image for encoding and comparison, while the overall system is designed to leverage the existing cellular communication network.
Bi2 Technologies, Llc
Methods of predicting and decreasing the risk of pre-term birth
Provided are methods for predicting the risk of pre-term birth in a pregnant subject, for identifying a subject having an increased risk of pre-term birth, for selecting a subject for participation in a clinical study, and for decreasing the risk of pre-term birth in a subject. These methods include providing a sample from the subject and detecting the level of one or more of growth arrest-specific protein 1 (gasi), alli-fused gene from chromosome 4 protein (ar4)/fragile x mental retardation 2 (fmr2) family member 3 (aff3), transthyretin (ttr), ryanodine receptor 1 (ryri), e26 transformation specific variant 6 (etv6), claudin-10, zinc finger protein 23 (znf23), collagen type xxvii α1 (col27ai), kazrin isoform-1, keratin-associated protein 10-9 (krtapio-9), huntingtin (htt), microtubule associated protein 9 (map9), coiled-coil domain-containing protein 13 (ccdc13), inositol hexakisphosphate and diphosphoinositol-pentakisphosphate kinase isoform 2 (hisppdi), immunoglobulin gamma-3 chain c (ig-hg3), cysteine- and histidine-rich protein-1 (cyhri), and xp 002348181..
University Of Louisville Research Foundation, Inc.
Integrated device for analyte testing, confirmation, and donor identity verification
The present invention provides an apparatus for fluid sample collection and analyte testing, including a sample receiving member and at least one membrane test strip, and optionally a sample retention member, fingerprint acquisition pad, and/or fluid collector. It also provides a fluid collection apparatus having an absorbent material, compression element, and closure element, and optionally a lid that allows the apparatus to be used in conjunction with a fluid container.
Substance detection device and watch-type body fat burning measurement device
A substance detection device includes: a detection sample collection section which collects a biological gas released from the human skin, allows only this biological gas to pass through a permeable membrane, and stores the gas in a sensor chamber; a light source which excites a raman scattered light from acetone in the collected biological gas; a sensor section which enhances the raman scattered light by localized surface plasmon resonance; a spectrometer which disperses the enhanced raman scattered light; a light receiving element; a signal processing and control circuit section which compares the acquired spectrum with the fingerprint spectrum of acetone which has been stored in advance and thereby identifies acetone, which is the collected substance to be detected, and calculates the amount of fat burning having a correlation with the concentration of acetone; and a display section.. .
Using client tuner devices to provide content fingerprinting in a networked system
A tuner device, such as a television set, set top box, game console, personal computer with a dongle or device, creates digital fingerprints indicative of information received over a channel. The digital fingerprints are uploaded to a server along with metadata indicative of the specific tuner device that obtain them.
Communication system utilizing fingerprint information and use thereof
The invention discloses a communication system utilizing fingerprint information, which comprises a fingerprint sensor and a communication application unit, the communication application unit includes a communication software, an encrypting software and a decrypting software reverse to the encrypting software. The communication system comprises a step (a) of adding friends, a step (b) of encrypting and sending a message, and a step (c) of decrypting and recognizing a message.
Wwtt Technology China
Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account
A network security system includes a server configured to receive an access request via a network from a remote computing device, a database storing customer account information accessible by the server, and memory accessible by the server and storing a customer notification program. When executed by the server, the program identifies the remote computing device by a device fingerprint and requesting location, determines whether the device fingerprint matches any authorized device fingerprints stored in the database, and sends, responsive to a mismatch between the device fingerprint and the authorized device fingerprints, a notification of the request to a customer-specified address.
Uniloc Luxembourg S.a.
Method and system for generating an advanced storage key in a mobile device without secure elements
A method for building an advanced storage key includes: storing, in a mobile device, at least (i) device information associated with the mobile device, (ii) program code associated with a first program including an instance identifier, and (iii) program code associated with a second program including a first key; generating a device fingerprint associated with the mobile device based on the device information via execution of the code associated with the first program; generating a random value via execution of the code associated with the first program; building a diversifier value based on the generated device fingerprint, the generated random value, and the instance identifier included in the code associated with the first program; and decrypting the built diversifier value using the first key stored in the code associated with the second program via execution of the code associated with the second program to obtain a storage key.. .
Mastercard International Incorporated
Preserving redundancy in data deduplication systems by encryption
A system and non-transitory computer program product for preserving data redundancy in a data deduplication system in a computing environment is provided. A selected data segment, to be written through the data deduplication system, is encrypted such that the selected data segment is not subject to a deduplication operation.
International Business Machines Corporation
Preserving redundancy in data deduplication systems by encryption
A method for preserving data redundancy in a data deduplication system in a computing environment is provided. A selected data segment, to be written through the data deduplication system, is encrypted such that the selected data segment is not subject to a deduplication operation.
International Business Machines Corporation
Optimizing virus scanning of files using file fingerprints
In a method for determining if a file should be scanned for malware before a deduplication process, receiving an indication that a first file is stored or modified to a computing system. The one or more processors create a fingerprint for the first file.
International Business Machines Corporation
Methods and apparatuses using molecular fingerprints to provide targeted therapeutic strategies
Methods and apparatuses using molecular fingerprints to provide targeted therapeutic strategies are disclosed herein. The molecular fingerprints can be maintained and dynamically updated based on newly discovered and relevant information to improve individualized care..
H. Lee Moffitt Cancer Center And Research Institute, Inc.
Integrated fingerprint sensor and navigation device
An apparatus is disclosed in a first embodiment of the invention as including a non-conductive substrate providing a first surface onto which a user can apply a fingerprint. A fingerprint sensing circuit is applied to a second surface of the non-conductive substrate opposite the first surface.
Touch screen device aid
A device for aiding in the activation of a touchscreen includes an attachment portion and a conductive nipple coupled to and extending through the attachment portion. The attachment portion can include a plurality of non-conductive layers that are configured to attach to the fingertip of a user.
Identifying and destroying potentially misappropriated access tokens
A computer receives a request for protected user data with an access token presented by a client as authorization for the client to access the protected user data in a delegated environment. The computer parses the request to create a device fingerprint identifying the device submitting the request for the client.
International Business Machines Corporation
Generating fingerprinted content data for provision to receivers
A method for generating, from initial content data, output content data for provision to one or more receivers, wherein the initial content data is encoded according to a coding scheme, wherein for a quantity of data encoded according to the coding scheme, the coding scheme provides a mechanism for including in the quantity of encoded data additional data such that a decoder for the coding scheme, upon decoding the quantity of encoded data, does not use the additional data to generate decoded data, the method comprising: selecting one or more portions of the initial content data; for each selected portion, generating a data construct that comprises a plurality of data structures, each data structure comprising data, including a version of the selected portion, that is encrypted using a corresponding encryption process different from each encryption process used to encrypt data in the other data structures, wherein the data construct is arranged such that using a decryption process that corresponds to the encryption process for one data structure on the encrypted data in each data structure in the data construct produces a quantity of data encoded according to the coding scheme that uses the mechanism so that a decoder for the coding scheme would not use any data structure in the data construct other than said one data structure; and using the generated data constructs in the initial content data instead of their corresponding selected portions to form the output content data.. .
Communication method utilizing fingerprint information authentication
A communication method utilizing fingerprint information authentication comprises the following steps: (a) extracting fingerprint information of first, and sending a request instruction to second user via the fingerprint information by a first user on an information exchange platform, and extracting fingerprint information of second user after receiving the request by the second user, and storing the fingerprint information in the information exchange platform and exchanging it with first user by the second user to confirm their identity; (b) inputting a message to be sent in an encrypting unit to obtain encrypted message by the first user after passing authentication, and transmitting the encrypted message to a communication application unit and sending it to second user, and receiving the encrypted message via the communication application unit by the second user; (c) decrypting the encrypted message by means of the decrypting unit by the second user after passing authentication.. .
Wwtt Technology China
Methods and systems for applications for z-numbers
Specification covers new algorithms, methods, and systems for artificial intelligence, soft computing, and deep learning/recognition, e.g., image recognition (e.g., for action, gesture, emotion, expression, biometrics, fingerprint, facial, ocr (text), background, relationship, position, pattern, and object), large number of images (“big data”) analytics, machine learning, training schemes, crowd-sourcing (using experts or humans), feature space, clustering, classification, similarity measures, optimization, search engine, ranking, question-answering system, soft (fuzzy or unsharp) boundaries/impreciseness/ambiguities/fuzziness in language, natural language processing (nlp), computing-with-words (cww), parsing, machine translation, sound and speech recognition, video search and analysis (e.g. Tracking), image annotation, geometrical abstraction, image correction, semantic web, context analysis, data reliability (e.g., using z-number (e.g., “about 45 minutes; very sure”)), rules engine, control system, autonomous vehicle, self-diagnosis and self-repair robots, system diagnosis, medical diagnosis, biomedicine, data mining, event prediction, financial forecasting, economics, risk assessment, e-mail management, database management, indexing and join operation, memory management, and data compression..
Allyl group-modified fluorooxyalkylene group-containing polymer and producing the same
There can be provided a fluorooxyalkylene group-containing polymer that is excellent in thermal stability and chemical stability, in addition to water- and oil-repellency, releasability, chemical resistance, lubricity, durability, antifouling property, and fingerprint-wiping property.. .
Photosensitive resin composition and antireflection film
[problem] to provide: a photosensitive resin composition which is cured by radiation and exhibits excellent wear resistance, antifouling properties, marker pen ink wiping-off properties, fingerprint wiping-off properties and low refractive index, and which provides low reflectance in cases where the photosensitive resin composition is used for an antireflection film; and an antireflection film which has a cured coating film of this photosensitive resin composition. [solution] a photosensitive resin composition for an antireflection film that is characterized in that a low refractive index layer contains an acrylate, a colloidal silica, and an organic modified dimethyl polysiloxane having an acryloyl group and an acrylate-modified perfluoropolyether that serve as surface modification agents; and an antireflection film which is obtained by curing the photosensitive resin composition..
Polatechno Co., Ltd.
Popular terms: [SEARCH]
Follow us on Twitter
This listing is a sample listing of patent applications related to Finger for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Finger with additional patents listed. Browse our RSS directory or Search for other possible listings.