The disclosure is directed to systems and methods for operating or controlling an ADAS mechanism. A first sensor of an ADAS mechanism can determine a potential obstacle to a vehicle, and a position of the potential obstacle relative to the first sensor. A second sensor can determine a gaze angle of a user of the vehicle. An activation engine in communication with the first sensor and the second sensor can determine a proximity of the gaze angle of the user to the determined position of the potential obstacle. The activation engine can control, in response to the determined proximity, an operation of the ADAS mechanism for responding to the potential obstacle.
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestriansRecognition of traffic objects, e.g. traffic signs, traffic lights or roads
G06V 20/59 - Context or environment of the image inside of a vehicle, e.g. relating to seat occupancy, driver state or inner lighting conditions
Apparatus and methods relating to persistent network resource and virtual area associations for realtime collaboration include managing and displaying an object associated with a virtual area that supports establishment of respective presences of communicants operating respective client network nodes. Examples of the object include an object that has one or more user-modifiable property fields and an object that is associated with screen sharing functionality of the client network node.
H04L 12/24 - Arrangements for maintenance or administration
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
H04L 29/06 - Communication control; Communication processing characterised by a protocol
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Hanna, Keith J.
Abstract
The disclosure is directed to systems and methods for operating or controlling an ADAS mechanism. A first sensor of an ADAS mechanism can determine a potential obstacle to a vehicle, and a position of the potential obstacle relative to the first sensor. A second sensor can determine a gaze angle of a user of the vehicle. An activation engine in communication with the first sensor and the second sensor can determine a proximity of the gaze angle of the user to the determined position of the potential obstacle. The activation engine can control, in response to the determined proximity, an operation of the ADAS mechanism for responding to the potential obstacle.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoarinejad, Kambiz
Soltan, Maryam
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 7/00 - Methods or arrangements for sensing record carriers
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Hanna, Keith J.
Abstract
The disclosure is directed to systems and methods for operating or controlling an ADAS mechanism. A first sensor of an ADAS mechanism can determine a potential obstacle to a vehicle, and a position of the potential obstacle relative to the first sensor. A second sensor can determine a gaze angle of a user of the vehicle. An activation engine in communication with the first sensor and the second sensor can determine a proximity of the gaze angle of the user to the determined position of the potential obstacle. The activation engine can control, in response to the determined proximity, an operation of the ADAS mechanism for responding to the potential obstacle.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Yadhunandan, Ullam Subbaraya
Kalra, Ankita
Jain, Rahul
Abstract
Disclosed subject matter relates generally to image processing that includes a method for detecting drowsiness state of a vehicle user independent of factors such ethnicities, gender and other differences of an individual. A drowsiness detection system receives current images of the vehicle user from an image capturing device in a current time frame. Further, an eye closure ratio of the vehicle user is determined in the current time frame using eye closure parameters extracted from the current images in real-time and a profile of the vehicle user. Further, the eye closure ratio is normalized using a scaling factor computed in real-time using normalizing parameters extracted from the current images in real-time and the profile. Finally, a Percentage Eye Closure (PEC) value of the vehicle user is determined in the current time frame using the normalized eye closure ratio of the vehicle to detect drowsiness state of the vehicle user.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pal, Shyam Sundar
Abstract
Method of controlling an autonomous vehicle and a collision avoidance device thereof are disclosed. The method includes gathering obstacle information associated with an obstacle around a current navigation path of the autonomous vehicle and vehicle information associated with the autonomous vehicle. The method further includes determining a relative velocity and a collision distance between the obstacle and the autonomous vehicle and an obstacle state of the obstacle based on an analysis of the obstacle information and the vehicle information. The method includes computing a collision factor based on the relative velocity and the obstacle state. When the collision factor is above a collision threshold, the method further includes stopping the autonomous vehicle before exhausting the collision distance, when at least one alternate navigation path is not available and modifying the current navigation path of the autonomous vehicle, when the at least one alternate navigation path is available.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Hanna, Keith J.
Abstract
The disclosure is directed to systems and methods for operating or controlling an ADAS mechanism. A first sensor of an ADAS mechanism can determine a potential obstacle to a vehicle, and a position of the potential obstacle relative to the first sensor. A second sensor can determine a gaze angle of a user of the vehicle. An activation engine in communication with the first sensor and the second sensor can determine a proximity of the gaze angle of the user to the determined position of the potential obstacle. The activation engine can control, in response to the determined proximity, an operation of the ADAS mechanism for responding to the potential obstacle.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Wiklof, Christopher A.
Abstract
An apparatus, system, and method allow a user to initiate a live stream that includes retrospectively captured images. Initiating the live stream includes providing provisional data that includes retrospectively captured images to a wireless radio.
KNAPP INVESTMENT COMPANY LIMIT (Virgin Islands (British))
Inventor
Pizano, Erix
Abstract
A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository and automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user. Additionally, the program destroys the key after termination of each encryption/decryption session.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoarinejad, Kambiz
Soltan, Maryam
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 7/00 - Methods or arrangements for sensing record carriers
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Svendsen, Hugh Blake
Abstract
Apparatus are described for comparing a search criterion from a first device to a image collection digest of a second device. Based on the comparison, a presentation may be presented at the first device reflecting that the second device is communicatively coupled over a network. In one embodiment, the image collection digest is obtained from the second device, and the comparison is made at the first device. In another embodiment, the image collection digest is obtained at a server device, and the comparison is made at the server device. The search criterion may comprise one or more of subject face information, geographic information, temporal information, event information, and keyword information.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
A speech recognizer on a portable computing device is trained and configured to reject machine articulations of utterances attempting access to resources on such device. The recognizer is trained with scoring feedback from human listeners identifying articulations as originating from a machine.
G10L 15/06 - Creation of reference templatesTraining of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectorsRecognition of animal voices
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G10L 13/027 - Concept to speech synthesisersGeneration of natural phrases from machine-based concepts
G10L 17/00 - Speaker identification or verification techniques
G10L 17/02 - Preprocessing operations, e.g. segment selectionPattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal componentsFeature selection or extraction
G10L 17/04 - Training, enrolment or model building
G10L 17/06 - Decision making techniquesPattern matching strategies
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G10L 15/02 - Feature extraction for speech recognitionSelection of recognition unit
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
An electronic challenge system is used to control access to resources by using a spoken test to identify an origin of a voice. The test is based on a series of questions posed during an interactive dialog session with the entity attempting access.
G06F 7/04 - Identity comparison, i.e. for like or unlike values
G10L 15/06 - Creation of reference templatesTraining of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectorsRecognition of animal voices
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G10L 13/027 - Concept to speech synthesisersGeneration of natural phrases from machine-based concepts
G10L 17/00 - Speaker identification or verification techniques
G10L 17/02 - Preprocessing operations, e.g. segment selectionPattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal componentsFeature selection or extraction
G10L 17/04 - Training, enrolment or model building
G10L 17/06 - Decision making techniquesPattern matching strategies
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G10L 15/02 - Feature extraction for speech recognitionSelection of recognition unit
15.
Computer program and method for biometrically secured, transparent encryption and decryption
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pizano, Erix
Abstract
A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository and automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user. Additionally, the program destroys the key after termination of each encryption/decryption session.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoarinejad, Kambiz
Soltan, Maryam
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 7/00 - Methods or arrangements for sensing record carriers
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Moyers, Josh
Leacock, Matthew
Brody, Paul J.
Van Wie, David
Butler, Robert J.
Abstract
Apparatus and methods relating to persistent network resource and virtual area associations for realtime collaboration include managing and displaying an object associated with a virtual area that supports establishment of respective presences of communicants operating respective client network nodes. Examples of the object include an object that has one or more user-modifiable property fields and an object that is associated with screen sharing functionality of the client network node.
H04L 12/24 - Arrangements for maintenance or administration
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
H04L 29/06 - Communication control; Communication processing characterised by a protocol
18.
Methods of creating a corpus of spoken CAPTCHA challenges
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
Methods of creating a corpus of spoken CAPTCHA challenges are disclosed. The methods involve training a computing system with samples of human voices and computer synthesized voices articulating a set of reference challenge items, scoring the reference challenge items based on differences in articulation between human and machine articulation of each challenge item, and selecting suitable challenge items from among the reference challenge items based on the score.
G06F 7/04 - Identity comparison, i.e. for like or unlike values
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectorsRecognition of animal voices
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
G10L 13/027 - Concept to speech synthesisersGeneration of natural phrases from machine-based concepts
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Vaananen, Mikko
Abstract
A method and system for displaying and producing computer based documents seamlessly to users that relate to their telephone calls is provided. The invention is able to be used with social media, where the mobile station searches for the social media page of the caller based on the Caller ID and displays it to the recipient of the call on the mobile station screen, possibly with other Internet search results. The method and system allow the user to obtain the newest public information about the person who calls him or he decides to call, or any documents that might be intermittent between the people. The system adds “bandwidth”, i.e. speed, efficiency and more dimensions to personal communication, as the users of the inventive system can also visually see by documentation what is going on in the relationship between two or more people.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Wiklof, Christopher A.
Abstract
A system and method allows a user to enter a command capture audio, video, and/or still pictures that commence at a moment in time earlier than entering the command.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Vaananen, Mikko
Abstract
A method and system for displaying and producing computer based documents seamlessly to users that relate to their telephone calls is provided. The invention is able to be used with social media, where the mobile station searches for the social media page of the caller based on the Caller ID and displays it to the recipient of the call on the mobile station screen, possibly with other Internet search results. The method and system allow the user to obtain the newest public information about the person who calls him or he decides to call, or any documents that might be intermittent between the people. The system adds “bandwidth”, i.e. speed, efficiency and more dimensions to personal communication, as the users of the inventive system can also visually see by documentation what is going on in the relationship between two or more people.
H04M 1/56 - Arrangements for indicating or recording the called number at the calling subscriber's set
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/16 - Communication-related supplementary services, e.g. call-transfer or call-hold
H04M 1/2745 - Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time using static electronic memories, e.g. chips
H04M 1/57 - Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Svendsen, Hugh Blake
Abstract
Apparatus are described for performing an action based on determining that the contents of a first image collection and a second image collection are similar. In one aspect, the present disclosure relates to comparing digests representing the two image collections to determine proximity. The digest may be obtained and the comparison made at a server. The actions performed based on a proximity determination may comprise notifying a user of a first collection sharing device of the availability of a second collection sharing device, and/or the retrieval of one or more images from the second image collection. In another aspect of the present disclosure, proximity may be measured by comparing subject faces present in a first image collection to subject faces present in the second image collection.
G06K 9/68 - Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of reference, e.g. addressable memory
G06K 9/62 - Methods or arrangements for recognition using electronic means
23.
System for using spoken utterances to provide access to authorized humans and automated agents
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
Voice verification systems for controlling access to electronic accounts using spoken utterances are disclosed. These systems include a database of words and a sentence synthesis engine that uses the dictionary to construct challenge sentences. A challenge logic routine selects a challenge sentence and processes a spoken response from an entity to determine if the entity is authorized to access an electronic account. Both human and machine spoken utterances can be processed as responses, and in some embodiments, the entity may be an automated agent authorized by a human to conduct transactions in said electronic account.
G10L 21/00 - Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectorsRecognition of animal voices
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
G10L 13/027 - Concept to speech synthesisersGeneration of natural phrases from machine-based concepts
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoarinejad, Kambiz
Soltan, Maryam
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
H04Q 5/22 - Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange with indirect connection, i.e. through subordinate switching centre the subordinate centre not permitting interconnection of subscribers connected thereto
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 7/00 - Methods or arrangements for sensing record carriers
25.
Prioritization in a continuous video playback experience
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Mcintosh, David
Crane, Max
Pennello, Chris
Abstract
Methods, systems, and apparatus can provide ordered (e.g. ranked) lists of content items as a suggested list of items to watch. The ordered list can be based on feedback from other users. The content items can also be presented (e.g. in a continuous playback mode) to a passive user so that the user does not have to actively select a next item to watch. This passive mode can select a next item (e.g. from a list that is updated based on recent user feedback), and the item can be queued on a client device for playing to a user. Content items can also be provided from different independent servers.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
H04N 21/482 - End-user interface for program selection
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
26.
Computer program and method for biometrically secured, transparent encryption and decryption
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pizano, Erix
Abstract
A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository and automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user. Additionally, the program destroys the key after termination of each encryption/decryption session.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Xu, Shijie
Song, Xuefeng
Abstract
In some examples, a method for rebuilding a source provider service environment in a target provider environment is described. The method may include identifying, using a service meta-app describing a service in a source provider environment, an internal direct dependency of the service. The method may also include accessing a dependency meta-app describing the internal direct dependency. The method may also include building the internal direct dependency according to the dependency meta-app in a target provider environment. The method may also include fetching an image of the service. The method may also include installing the image of the service in the target provider environment. The method may also include configuring the installed image of the service to depend from the internal direct dependency according to the service meta-app.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
Methods for creating statistical language models (SLMs) for spoken Completely Automated Turing Tests for Telling Computers and Humans Apart (CAPTCHAs) are disclosed. In these methods, candidate challenge items including one or more words are automatically selected from a document corpus. Selected ones of the challenge items are articulated by a machine text-to-speech (TTS) system as candidate articulations. Those articulations are ranked based on a human listener score indicating whether a candidate articulation originated from a machine. The SLM is then trained to recognize machine TTS articulations according to those rankings, by using a subset of the plurality of candidate challenge items identified as machine articulations as a seed set.
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
G10L 13/027 - Concept to speech synthesisersGeneration of natural phrases from machine-based concepts
29.
Method and computer program product for providing a response to a statement of a user
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Antebi, Amit
Rahimi, Hanoch
Abstract
A data processing system, computer program, and method for providing a response to a statement of a user before receiving a complete user statement involves, in response to receiving a partial user input, calculating for each of a plurality of predefined answerable statements, a metric based on a frequency with which the predefined answerable statement had been selected by previous users. If the metrics for none of the predetermined answerable statements exceed a threshold, the computer sends the user suggested predefined answerable statements. If one of metrics exceeds the threshold, and not otherwise, the computer sends the user information representative of a response to the predefined answerable statement associated with that metric.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Opaluch, Robert E.
Abstract
An apparatus includes a plurality of applications and an integrator having a voice recognition module configured to identify at least one voice command from a user. The integrator is configured to integrate information from a remote source into at least one of the plurality of applications based on the identified voice command. A method includes analyzing speech from a first user of a first mobile device having a plurality of applications, identifying a voice command based on the analyzed speech using a voice recognition module, and incorporating information from the remote source into at least one of a plurality of applications based on the identified voice command.
G10L 21/00 - Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
G10L 17/00 - Speaker identification or verification techniques
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Zhang, Fan
Cao, Junwei
Abstract
Technologies are presented for a hybrid cloud-based service model combining separate database/separate schema, shared database/separate schema, and shared database/shared schema architectures suitable for serving multiple tenants while addressing varying security needs. Roles and security level needs of different tenants may be determined based on tenant declaration or inference from tenant attributes. Tenants may then be assigned to suitable clouds or sub-clouds based on their security level needs. In some examples, a claims-based access control authorization model such as federation may be employed to support interactions between the three different types of clouds or sub-clouds under the umbrella of a single cloud-based service provider while maintaining application and data security.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
Systems and methods for controlling access to resources using spoken Completely Automatic Public Turing Tests To Tell Humans And Computers Apart (CAPTCHA) tests are disclosed. In these systems and methods, entities seeking access to resources are required to produce an input utterance that contains at least some audio. That utterance is compared with voice reference data for human and machine entities, and a determination is made as to whether the entity requesting access is a human or a machine. Access is then permitted or refused based on that determination.
G10L 17/00 - Speaker identification or verification techniques
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectorsRecognition of animal voices
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
33.
Method and system for sharing image content based on collection proximity
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Svendsen, Hugh Blake
Abstract
Systems, methods, and computer readable medium are described for performing an action based on determining that the contents of a first image collection and a second image collection are similar. In one aspect, the present disclosure relates to comparing digests representing the two image collections to determine proximity. The digest may be obtained and the comparison made at either a collection sharing device or at a proxy server. The actions performed based on a proximity determination may comprise notifying a user of a first collection sharing device of the availability of other collection sharing devices, or the retrieval of one or more images from the other image collections. In another aspect of the present disclosure, proximity may be measured by comparing subject faces comparing in a first image collection to the faces present in a second image collection.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Antebi, Amit
Rahimi, Hanoch
Abstract
A method for providing a response to a statement of a user, the method includes: receiving user input that comprises a portion of a user statement; selecting, before receiving a whole user statement, an answerable statement response between an answerable statement, multiple answerable statements and a response to an answerable statement; wherein the selecting is responsive to user input and to structured representations of answerable statements answerable by an answering entity; and sending to the user information representative of response to the user statement.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
He, Zhiqin
Abstract
Embodiments of the present invention disclose a method and an apparatus for communication between a home gateway and a cloud server. The cloud server has a home gateway software running unit, and various software modules are arranged in the home gateway software running unit. The method includes the following: The cloud server establishes a data communication channel with the home gateway through a TCP/IP protocol, where a terminal is connected to the home gateway through a short-distance communication protocol; and the home gateway software running unit sends a first software message to the home gateway through the data communication channel so that the home gateway forwards the first software message to a first terminal to which the first software message is directed; or the home gateway software running unit receives a second software message from the home gateway through the data communication channel.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
36.
Computer program and method for biometrically secured, transparent encryption and decryption
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pizano, Erix
Abstract
A computer program for enabling secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository and automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user. Additionally, the program destroys the key after termination of each encryption/decryption session.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
37.
Systems and methods for performing secure financial transactions
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoarinejad, Kambiz
Soltan, Maryam
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
H04Q 5/22 - Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange with indirect connection, i.e. through subordinate switching centre the subordinate centre not permitting interconnection of subscribers connected thereto
38.
Method and computer program product for providing a response to a statement of a user
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Antebi, Amit
Rahimi, Hanoch
Abstract
A method for providing a response to a statement of a user, the method includes: receiving user input that comprises a portion of a user statement; selecting, before receiving a whole user statement, an answerable statement response between an answerable statement, multiple answerable statements and a response to an answerable statement; wherein the selecting is responsive to user input and to structured representations of answerable statements answerable by an answering entity; and sending to the user information representative of response to the user statement.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
Challenge items for an audible based electronic challenge system are generated using a variety of techniques to identify optimal candidates. The challenge items are intended for use in a computing system that discriminates between humans and text to speech (TTS) system.
G10L 17/00 - Speaker identification or verification techniques
G10L 13/00 - Speech synthesisText to speech systems
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
H04M 1/66 - Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
G06F 7/04 - Identity comparison, i.e. for like or unlike values
Knapp Investment Company Limited (Virgin Islands (British))
Inventor
Haddock, James W.
Abstract
A method for managing the exchange of information is provided, wherein the method includes receiving at least one information location identifier, wherein the at least one information location identifier may be associated with at least one information portal and associating with at least one network browser. The method further includes generating an information location identifier template responsive to the at least one information portal and communicating with the at least one information portal to identify resultant information.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Cardoso Lopes, Gonçalo
Gomes Da Silva Frazão, João Pedro
Rui Soares Pereira De Almeida, André
Sequeira Cardoso, Nuno Ricardo
De Almeida Soares Franco, Ivan
Moura E Silva Cruces, Nuno
Abstract
Various apparatus and methods are described for a simulation and/or user interface environment. Image data and actual measured depth data of a real object from a real-world scene is acquired via one or more sensors. There is matching of the resolution of the image data and actual measured depth data as well as a linking formed between the image data and actual measured depth data for each pixel representing the real-world object in the scene. The actual measured depth data of the real-world object is processed to extract normal vector data to the surface of the real-world object. occlusion, lighting, and any physics-based interaction effects are based on at least the image data and actual measured depth data.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Vaananen, Mikko
Abstract
The invention relates to the field of computer telephony integration, displaying and producing computer based documents seamlessly to users that relate to their telephone calls. The best mode is considered to be the use of the invention with social media, such as Facebook, where the mobile station (30) searches for the social media page of the caller based on the Caller ID and displays it to the recipient of the call on the mobile station screen, possibly with other Internet search results. The methods and arrangements allow the user to obtain the newest public information about the person who calls him or he decides to call, or any documents that might be intermittent between the people. In other words the Desktop or screen automatically arranges itself to a state in which it is easiest to work during the call, using searches made based on call parameters, such as caller ID.
H04M 1/2745 - Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time using static electronic memories, e.g. chips
43.
Method and device for managing devices in device management system
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Jin, Zhihao
Wang, Rui
Chang, Xinmiao
Lui, Haitao
Abstract
A method for managing devices in a device management system includes: sending, by a server, target device condition information to a gateway; and sending, by the server, management information for a target device to the gateway, and triggering the gateway to determine the target device according to the target device condition information and send the management information to the target device. According to a trigger of the server and the target device condition information sent by the server, the gateway searches for the target device; and according to a trigger of the server, the gateway sends the management information sent by the server to the target device. Embodiments of the present disclosure also provide a server and a gateway in a device management system. Thereby, a type of target devices can be managed in batches.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Moyers, Josh
Leacock, Matthew
Brody, Paul J.
Van Wie, David
Butler, Robert J.
Abstract
Apparatus and methods relating to persistent network resource and virtual area associations for realtime collaboration include managing and displaying an object associated with a virtual area that supports establishment of respective presences of communicants operating respective client network nodes. Examples of the object include an object that has one or more user-modifiable property fields and an object that is associated with screen sharing functionality of the client network node.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
45.
Persistent network resource and virtual area associations for realtime collaboration
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Moyers, Josh
Leacock, Matthew
Brody, Paul J.
Van Wie, David
Butler, Robert J.
Abstract
Apparatus and methods relating to persistent network resource and virtual area associations for realtime collaboration include managing and displaying an object associated with a virtual area that supports establishment of respective presences of communicants operating respective client network nodes. Examples of the object include an object that has one or more user-modifiable property fields and an object that is associated with screen sharing functionality of the client network node.
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
46.
Apparatus and method for a web programmable telephone
KNAPP INVESTMENT COMPANY (Virgin Islands (British))
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Ho, Chi Fai
Abstract
A web programmable telephone and a method for operating a web programmable telephone are disclosed. In one embodiment of the present invention, a voice module of a wireless household telephone is controlled by an internal web module that can retrieve and execute data operations from a remote portal or server thus adding data functionality to the conventional functions of a telephone. The programmable web module controls all functionality of the web programmable telephone so that every function of the telephone can be programmed and customized by a user.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoarinejad, Kambiz
Soltan, Maryam
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pizano, Erix
Abstract
A computer program for secure encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository, wherein the program automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user. Additionally, the program destroys the key after termination of each encryption/decryption session.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Antebi, Amil
Rahimi, Hanoch
Abstract
A method for interacting with a person, the method comprising: receiving a user textual input; matching a structured representation of the user textual input against expected user statement fields of knowledge database entries; wherein a knowledge database entry comprises an expected user statement field and at least one action field; wherein multiple entries of the knowledge database form a data structure that comprises multiple expected user statements fields that match an expected sequence of user textual inputs.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Mcintosh, David
Crane, Max
Pennello, Chris
Abstract
Methods, systems, and apparatus can provide ordered (e.g. ranked) lists of content items as a suggested list of items to watch. The ordered list can be based on feedback from other users. The content items can also be presented (e.g. in a continuous playback mode) to a passive user so that the user does not have to actively select a next item to watch. This passive mode can select a next item (e.g. from a list that is updated based on recent user feedback), and the item can be queued on a client device for playing to a user. Content items can also be provided from different independent servers.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Väänänen, Mikko
Abstract
A method and system for displaying and producing computer based documents seamlessly to users that relate to their telephone calls is provided. The invention is able to be used with social media, where the mobile station searches for the social media page of the caller based on the Caller ID and displays it to the recipient of the call on the mobile station screen, possibly with other Internet search results. The method and system allow the user to obtain the newest public information about the person who calls him or he decides to call, or any documents that might be intermittent between the people. The system adds “bandwidth”, i.e. speed, efficiency and more dimensions to personal communication, as the users of the inventive system can also visually see by documentation what is going on in the relationship between two or more people.
H04M 1/56 - Arrangements for indicating or recording the called number at the calling subscriber's set
H04M 1/57 - Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
H04M 3/42 - Systems providing special services or facilities to subscribers
H04M 1/2745 - Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time using static electronic memories, e.g. chips
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Vaananen, Mikko
Abstract
The invention relates to the field of computer telephony integration. In particular the invention relates to displaying and producing computer based documents seamlessly to users that relate to their telephone calls. The best mode of the invention is considered to be the use of the invention with social media, such as Facebook, where the mobile station (30) searches for the social media page of the caller based on the Caller ID and displays it to the recipient of the call on the mobile station screen, possibly with other Internet search results. The methods and arrangements of the invention allow the user to obtain the newest public information about the person who calls him or he decides to call, or any documents that might be intermittent between the people. In other words the Desktop or screen of the invention automatically arranges itself to a state in which it is easiest to work during the call, using searches made based on call parameters, such as caller ID. The invention adds “bandwidth”, i.e. speed, efficiency and more dimensions to personal communication, as the users of the inventive system can also visually see by documentation what is going on in the relationship between two or more people.
H04M 1/64 - Automatic arrangements for answering callsAutomatic arrangements for recording messages for absent subscribersArrangements for recording conversations
H04M 11/00 - Telephonic communication systems specially adapted for combination with other electrical systems
G06Q 99/00 - Subject matter not provided for in other groups of this subclass
53.
System and method for biometrically secured, transparent encryption and decryption
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pizano, Erix
Rohatgi, Ryan
Abstract
A computer program for enabling biometrically secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository, wherein the program automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoarinejad, Kambiz
Soltan, Maryam
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Opaluch, Robert Edward
Abstract
An apparatus includes a plurality of applications and an integrator having a voice recognition module configured to identify at least one voice command from a user. The integrator is configured to integrate information from a remote source into at least one of the plurality of applications based on the identified voice command. A method includes analyzing speech from a first user of a first mobile device having a plurality of applications, identifying a voice command based on the analyzed speech using a voice recognition module, and incorporating information from the remote source into at least one of a plurality of applications based on the identified voice command.
G10L 21/00 - Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
G10L 19/00 - Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocodersCoding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
G10L 15/06 - Creation of reference templatesTraining of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
G10L 17/00 - Speaker identification or verification techniques
G10L 11/00 - Determination or detection of speech or audio characteristics not restricted to a single one of groups ; G10L 15/00-G10L 21/00
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pizano, Erix
Abstract
A computer program, system, and method for granting multiple users access to a secure repository. Embodiments of the present invention provide for authenticating either of first or second users desiring access to the secure repository. In embodiments of the present invention, a respective encryption or decryption operation of files or folders transferred in or out of the secure repository is performed using a key created, at least in part, on an enrolled security template provided by said first user. Thus, even if the second user is authenticated and allowed access to the secure repository, said creation of the key is performed using the security template associated with the first user. In even further embodiments of the present invention, a single storage device contains a plurality of secure repositories.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
57.
CAPTCHA using challenges optimized for distinguishing between humans and machines
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
An audible based electronic challenge system is used to control access to a computing resource by using a test to identify an origin of a voice. The test is based on analyzing a spoken utterance using optimized challenge items selected for their discrimination capability to determine if it was articulated by an unauthorized human or a text to speech (TTS) system.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
Challenge items for an audible based electronic challenge system are generated using a variety of techniques to identify optimal candidates. The challenge items are intended for use in a computing system that discriminates between humans and text to speech (TTS) system.
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
59.
System and method for verifying origin of input through spoken language analysis
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gross, John Nicholas
Abstract
An audible based electronic challenge system is used to control access to a computing resource by using a test to identify an origin of a voice. The test is based on analyzing a spoken utterance to determine if it was articulated by an unauthorized human or a text to speech (TTS) system.
KNAPP INVESTMENT COMPANY LIMITED. (Virgin Islands (British))
Inventor
Ho, Chi Fai
Chiu, Shin Cheung Simon
Abstract
Embodiments of the present invention include apparatuses for a console controller in a network device. In one embodiment, the present invention includes a console controller, a display module and an input module in a network device so that a user can view, enter, or program network or network device settings at the network device. In another embodiment, the present invention can be programmed to include automated out-of-the-box initial setup procedures to guide a user in the setup, management and operation of a network devices such a DSL/Cable modems or routers, VoIP routers, wireless access points or gateways with or without remote or onsite technical support or update services.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
G06F 15/177 - Initialisation or configuration control
61.
Self-configuring emergency event alarm system with autonomous output devices
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Mckenna, Daniel Bernard
Graziano, James Michael
Abstract
The present Self-Configuring Alarm System uses a decentralized (ad hoc or mesh) architecture where any node is capable of autonomously reporting the alarm event directly to all other nodes in the ad hoc network independent of where the alarm event occurred. In addition, the Self-Configuring Alarm System includes a plurality of autonomous output devices which function to provide an audible alarm that directs the occupants to the location of the hazard and/or provides an indication of the nature of the detected hazard or whether an indication of the hazard has been received at a Public Safety Answering Point (PSAP) that serves the dwelling or locale. The alarm networks and output networks may not be coextensive in their coverage areas.
Knapp Investment Company Limited (Virgin Islands (British))
Inventor
Chang, Peter Hon-You
Abstract
Target file generation systems and methods are described, which are optionally for use by ordinary computer users enable those users to readily generate target files without the requirement that they know the internal layout structures of the target files. A user is enabled to select a template file from a plurality of template files via a user interface configured to be displayed on a computer display to the user, wherein the template files include changeable fields associated with corresponding field delimiters and prompting labels. An incomplete software program file containing variable name locations is accessed from memory. The program file is parsed to locate the variable name locations. The label names obtained from the template file selected by the user are inserted into the variable name locations to further complete the software program file. The software program file is stored in computer memory.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoarinejad, Kambiz
Soltan, Maryam
Abstract
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Mckenna, Daniel Bernard
Graziano, James Michael
Abstract
The present Self-Configuring Alarm System uses a decentralized (ad hoc or mesh) architecture where any node is capable of autonomously reporting the alarm event directly to all other nodes in the ad hoc network independent of where the alarm event occurred. In addition, the Self-Configuring Alarm System includes a plurality of autonomous output devices which function to provide an audible alarm that directs the occupants to the location of the hazard and/or provides an indication of the nature of the detected hazard or whether an indication of the hazard has been received at a Public Safety Answering Point (PSAP) that serves the dwelling or locale. The alarm networks and output networks may not be coextensive in their coverage areas.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Haot, Maxime G. G.
Moore, Richard G.
Rachamadugu, Sreenivas
Abstract
An approach provides control of digital media. A stream of digital media that includes an advertisement is received. The stream is selectively skipped to avoid the advertisement. In addition, the amount of advertisement played back is tracked. Further, tracking information is generated based on the tracking.
Knapp Investment Company Limited (Virgin Islands (British))
Inventor
Chang, Peter Hon-You
Abstract
A target file generation system and method for use by ordinary computer users enable those users to readily generate target files without the requirement that they know the internal layout structures of the target files. The system enables a user to select a template file from a plurality of template files, wherein a template file includes changeable fields associated with corresponding field delimiters and prompting labels, wherein at least two different template files have different quantities of changeable fields. An incomplete software program file containing identifier of variable name locations is accessed. The program file is parsed to locate the variable name locations. Label names obtained from the template file selected by the user are inserted in the variable name locations. The program generates a user interface including inserted label names and user input fields via which the user can provide data corresponding to changeable fields in the template file.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Sharma, Rajesh
Abstract
A resource management system and methods for managing resources are disclosed. A resource management system may include a first communication interface configured to provide access to a first device, a second communication interface configured to provide access to a datastore, and a multimodal system in communication with the first and second communication interfaces. The multimodal system may be configured to receive a first communication request from the first device, generate a multimodal document in response to the first communication request, and serve the multimodal document to the first device using the first communication interface. The multimodal document may include instructions allowing for communication with the first device using at least one of a plurality of device interface modalities.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
68.
Method and a computer program product for providing a response to a statement of a user
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Antebi, Amit
Rahimi, Hanoch
Abstract
A method for providing a response to a statement of a user, the method includes: receiving user input that comprises a portion of a user statement; selecting, before receiving a whole user statement, an answerable statement response between an answerable statement, multiple answerable statements and a response to an answerable statement; wherein the selecting is responsive to user input and to structured representations of answerable statements answerable by an answering entity; and sending to the user information representative of response to the user statement.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Sharma, Rajesh
Abstract
Systems, methods, devices, and computer program products are provided for providing a user with access to information stored in a datastore. A multimodal system operatively coupled to the datastore is configured to communicate with the user via a user device. The multimodal system is configured to receive a request from the user to communicate with the user through a user interface of the user device. In response to the received request, the multimodal system generates a multimodal document. The generated multimodal document includes instructions allowing for communication with the user using a plurality of different user interface modalities that may be available on a user device. The multimodal system then serves the multimodal document to the user device using a communication interface. The multimodal system is configured to only publish one multimodal document at a time for a given user session so that the user may seamlessly switch between user interface modalities that may be available on the user device or on another user device.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pizano, Erix
Abstract
An apparatus (200) for interfacing with a restricted access computer (10) includes a data storage component (202), a peripheral component (204), and an interface controller (206). The interface controller (206) enables electronic communication between the peripheral component (204) and the computer (10) and between the data storage component (202) and the computer (10). The interface controller (206) communicates data to the computer (10) indicating to the computer (10) that the computer (10) is operable to interact with the peripheral component using software already installed on the computer (10). The computer (10) automatically executes a computer program stored on the data storage component (202) of the apparatus (200) that enables the computer (10) to transparently encrypt and decrypt data via a biometrically secure process.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Mckenna, John Daniel
Mckenna, Daniel Bernard
Graziano, James Michael
Abstract
The present self-configuring alarm network uses a decentralized (ad hoc or mesh) architecture that does not have a centralized “master” node. In this ad hoc network, any node is capable of behaving as if it were the “master node” by autonomously reporting the alarm event directly to all other nodes in the ad hoc network independent of where the alarm event occurred. The network of alarm devices, therefore, can spread the alarm indication to the entirety of the area covered by the network of alarm devices and can also differentiate between a general alarm indication and the locus of the alarm event.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Gao, Xiuzhi
Johnson, Timothy
Crowell, Jeffrey P.
Born, Joseph
Abstract
A portable media playing device incorporating a menu structure. The device includes a display mechanism, a navigation database, including a navigation record with a navigation description, and an action database, including an action record with an action description. The action database is customizable. A display driver displays the navigation description. When the navigation description is selected, the display driver displays the action description. When the action description is selected, a digital synchronization system generates an extra action request (EAR) record that includes an action identifier and action data for storage in an EAR database. When the device is synchronized with a computer, a synchronization manager accesses the EAR database and updates the action database with any new action records.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
73.
Dynamic generation of target files from template files and tracking of the processing of target files
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Chang, Peter Hon-You
Abstract
A target file generation system and method for use by ordinary computer users to readily generate target files. The program includes various components. The first component promps for and receives user's selections of a folder or directory location where a new target file will reside, of an operating system command or application program that will process this new target file, of an optional global activity summary data repository that stores user'summaries of the processing of the target file. The second component dynamically generates an information exchange user interface that prompts for and receives input data provided by the user on information of menu configuration file and name of template file. The third component dynamically generates an information exchange user interface. The fourth component provides graphics user interfaces to start a menu program, a a merge programe, and a search program, respectively.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Haddock, James Walter
Abstract
A method for managing the exchange of information is provided, wherein the method includes receiving at least one information location identifier, wherein the at least one information location identifier may be associated with at least one information portal and associating with at least one network browser. The method further includes generating an information location identifier template responsive to the at least one information portal and communicating with the at least one information portal to identify resultant information.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Pizano, Erix
Rohatgi, Ryan
Abstract
A computer program for enabling biometrically secured, transparent encryption and decryption provides a user interface that allows a user to drag and drop files into and out of a secure repository, wherein the program automatically encrypts files transferred into the repository and automatically decrypts files transferred out of the repository. The user can transfer file folders into the repository, wherein the program encrypts all of the files within the folder and retains the original file/folder structure, such that individual files can be moved within the repository, moved out of the repository, and opened or executed directly from the repository. The program requires the user to submit biometric data and grants access to the secure repository only if the biometric data is authenticated. The program generates an encryption key based at least in part on biometric data received from the user.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Kim, Wook-Joong
Ki, Myung-Seok
Kim, Kyu-Heon
Kim, Jin-Woong
Jang, Euee-Seon
Lee, Sun-Young
Oh, Hyun-Jong
Park, Sung-Won
Won, Jong-Woo
Abstract
Disclosed are a system and method for encoding and decoding an image. The image compression system includes an image segmentation unit (110) for segmenting a first image into a plurality of sub-images; a first encoding unit (120) for encoding the sub-images to output sub-image bitstreams; a BMAP construction unit (130) for calculating the quantity of information of each sub-image bitstream and generating BMAP information using the calculated quantity of information and information on construction of each sub-image; and a bitstream combining unit (150) for combining the sub-image bitstreams and BMAP information.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Haot, Maxime G. G.
Moore, Richard G.
Rachamadugu, Sreenivas
Abstract
An approach provides for recording and editing digital media. A digital media stream is generated from an input signal (such as a live broadcast feed). The digital media stream is transmitted to a browser application configured to concurrently record and edit the digital media stream.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Mckenna, John Daniel
Mckenna, Daniel Bernard
Graziano, James Michael
Abstract
The present self-configuring emergency event alarm network uses a decentralized (ad hoc or mesh) architecture that does not have a centralized “master” node. In this ad hoc network, any node is capable of behaving as if it were the “master node” by autonomously reporting the alarm event directly to all other nodes in the ad hoc network independent of where the alarm event occurred. The network of alarm devices, therefore, can spread the alarm indication to the entirety of the area covered by the network of alarm devices and can also differentiate between a general alarm indication and the locus of the alarm event.
KNAPP INVESTMENT COMPANY (Virgin Islands (British))
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Ho, Chi Fai
Abstract
A web programmable telephone and a method for operating a web programmable telephone are disclosed. In one embodiment of the present invention, a voice module of a wireless household telephone is controlled by an internal web module that can retrieve and execute data operations from a remote portal or server thus adding data functionality to the conventional functions of a telephone. The programmable web module controls all functionality of the web programmable telephone so that every function of the telephone can be programmed and customized by a user.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Wilson, Brian
Feinstein, Jacob
Suraci, Mike
Simsarian, Kristian
Bray, Duane
Givechi, Roshi
Paharia, Rajat
Weiss, Laura
Gosling, Marcus
Abstract
A system and associated method receives a command from a user's mobile device to locate points of interest near the mobile device's location. The points of interest are associated with different, user-identified, point of interest categories. Based at least in part on the mobile device's location, the system substantially simultaneously provides a list of points of interest for at least some of the point of interest categories.
H04W 24/00 - Supervisory, monitoring or testing arrangements
H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
H04M 1/00 - Substation equipment, e.g. for use by subscribers
H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
81.
Service and method for providing a single point of access for multiple providers' video and audio content
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Davidson, Robert Steven
Abstract
A method that uses a computer network to provide a single point of access between a plurality of video & audio devices and a plurality of video & audio content provider systems. The present invention is a method for providing a searchable, aggregated directory view of available video & audio content from multiple content providers as well as additional services such as content renting. The present invention includes a method for identifying users as subscribers of content providers' memberships.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Sayed, Omar Farooq
Abstract
A system and method for a web-based services architecture providing integrated modular building blocks for creating and maintaining a web site and related transaction processing to support electronic commerce and the sales of products and services using the web site. The transaction processing may include the handling of transactions and communications related to product and service sales and fulfillment involving customers, merchants and the web site owner. The services architecture may combine software front-end, back-end, and marketing tools to assist business owners to create or expand an Internet-based business. The services architecture also may provide a warehouse of predefined products that may be integrated into a merchant's existing online inventory.
KNAPP INVESTMENT COMPANY LIMITED (Virgin Islands (British))
Inventor
Shoemaker, Daniel D.
O'Donnell, Lee Thomas
Broder, James P.
Shoemaker, Scott D.
Abstract
A system for transmission of data between a first device operated by a first user and a second device includes a database that receives a first set of data input by the first user and a second set of data input by the second user. In one embodiment, the first set of data includes an immediate mode of access and/or one or more future modes of access of the first user which correlate to one or more specific time periods during which the future mode of access will become the immediate mode of access. Additionally, the first set of data can include a time-dependent schedule of the future mode of access of the first user.