09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for content services, namely, the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form and the integration with third-party computer software applications for the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form; downloadable computer software for imaging and document management; downloadable mobile application for content services, namely, the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form and the integration with third-party computer software applications for the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form; downloadable mobile application for imaging and document management Design and development of non-downloadable software for content services management, namely, the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form and the integration with third-party computer software applications for the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form; consultation services in the fields of selection, implementation and use of computer software systems for others; customization of computer software for others; installation, repair, maintenance of computer software; technical support services, namely, troubleshooting of computer hardware and software problems; computer support services, namely, computer hardware, software and computer peripheral advisory and information services in the nature of consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; computer hosting services, namely, cloud hosting provider services
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for content services, namely, the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form and the integration with third-party computer software applications for the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form; downloadable computer software for imaging and document management; downloadable mobile application for content services, namely, the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form and the integration with third-party computer software applications for the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form; downloadable mobile application for imaging and document management Design and development of non-downloadable software for content services management, namely, the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form and the integration with third-party computer software applications for the capturing, storing, retrieving, accessing, processing, measuring and modifying of content, processes, and cases in the nature of data in electronic form; consultation services in the fields of selection, implementation and use of computer software systems for others; customization of computer software for others; installation, repair, maintenance of computer software; technical support services, namely, troubleshooting of computer hardware and software problems; computer support services, namely, computer hardware, software and computer peripheral advisory and information services in the nature of consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; computer hosting services, namely, cloud hosting provider services
3.
METHOD AND SYSTEM FOR DETECTION OF ABNORMAL AUTHENTICATION AND REGISTRATION ATTEMPTS
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bhandarkar, Pranay
Abstract
A method, a non-transitory computer readable medium, and a computer system that includes a method for detection of abnormal authentication and registration attempts. The method includes receiving, by a computer system, data associated with an authentication or registration on a secured device by a user; scoring, by the computer system, the received data associated with the authentication or registration on the secured device by the user using a machine learning algorithm; and issuing, by the computer system, an alert when the score of the received data associated with the authentication or registration on the secured device by the user exceeds a predetermined score.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
In a form recognition system, a deep learning system may be trained to perform stamp localization for stamp removal to facilitate form recognition. In embodiments, a stamp mask identifies locations of stamps or seals on forms, and a line mask identifies pixels of the stamps. Where a stamp or seal overlaps with underlying text on a form, and a color or grayscale of the stamp or seal is sufficiently similar to that of the underlying text, a combination of the stamp mask and the line mask may enable removal of the stamp or seal without degrading the underlying text in the form, and facilitate form recognition.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Suraparaju, Rahul
Abstract
A method, a non-transitory computer readable medium, and an identify and management device for area-based access control. The method includes receiving, by a first computer system, data associated with one or more users within one or more zones, the data associated with the one or more users within the one or more zones including facial recognition data; determining, by the first computer system, based on the received facial recognition data if the one or more users are permitted within the one or more zones; and generating, by the first computer system, a response as to a presence of the one or more users within the one or more zones.
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
6.
METHOD AND APPARATUS TO ORIENT, DETECT AND CLASSIFY ROTATED TEXT IN IMAGES
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
A text location technique identifies printed characters, words, and sentences appearing at different orientations. Embodiments apply known skyline techniques in different rotational positions to train a deep learning system to recognize when text is at an orientation other than horizontal. The inventive technique is efficient in training deep learning systems to identify text.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Kulbida, Jie
Abstract
A method of processing a video stream from a non-rectilinear (NR) camera includes: obtaining an activity score map that corresponds to a view of the NR camera; obtaining, from the NR camera, an NR image that includes the view of the NR camera; detecting motion in the NR image; generating an updated activity score map by incrementing the activity score map based on the detected motion in the NR image; performing clustering on the updated activity score map to identify a region of interest (ROI) in the NR image; generating dewarping information of the ROI based on a constraint of the NR camera (the dewarping information includes parameters to convert the ROI into a rectilinear output); and outputting the dewarping information of the ROI.
G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
G06V 10/762 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
8.
Method and system for assisting a user with operation of multifunction printer using mobile device
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Soriano, Randy Cruz
Badri, Subramanyam
Abstract
A method, a non-transitory computer readable medium, and a multifunction peripheral or multifunction printer that includes a method of operating a multifunction printer. The method includes receiving, by the multifunction printer, a selection of a function of the multifunction printer; displaying, on a display panel of the multifunction printer, a code for the selection of the function of the multifunction printer; receiving, by the multifunction printer, a request for operating assistance for the function of the multifunction printer based on the displayed code from the client device; and sending, by the multifunction printer, the operating assistance to the client device of the user on the function of the multifunction printer.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
9.
METHOD AND APPARATUS FOR FORM IDENTIFICATION AND REGISTRATION EMPLOYING PREDEFINED TEXT GROUPING
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
Aspects of the present invention provide a computer-implemented method of training a machine learning system to identify forms. In embodiment, the method may include: receiving a form as an input image; identifying one or more fields in the input image; for each identified field, identifying one or more sub-regions in the identified field; responsive to identification of the one or more fields, categorizing the one or more fields; identification of relative locations of the one or more fields in the input image; and, responsive to the identification of the relative locations, categorizing the form. Other aspects of the present invention provide a computer-implemented method of using a machine learning system to identify forms, using the just-enumerated method.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bellert, Darrell Eugene
Abstract
A method for management of a visitor workflow includes receiving a video stream from a camera and using a first thread and a second thread. The first thread generates one or more expiring buffers by: processing frames of the video stream; using an object recognition algorithm to detect and track each face in the frames of the video stream and assign a universal unique identifier (UUID) for each face; and maintaining, for each UUID, a corresponding expiring buffer that includes a timer and the frames of the video stream showing the face corresponding to the UUID. The second thread processes a given expiring buffer by: allocating frames of the given expiring buffer to a biometric thread pool comprising a biometric subthread for each algorithm of a biometric algorithm list; executing the biometric thread pool in parallel; and determining a workflow based on the biometric results.
G06V 10/96 - Management of image or video recognition tasks
G06V 10/98 - Detection or correction of errors, e.g. by rescanning the pattern or by human interventionEvaluation of the quality of the acquired patterns
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/40 - Spoof detection, e.g. liveness detection
11.
METHOD, APPARATUS, AND SYSTEM FOR CHARACTER RECOGNITION USING CONTEXT
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Xu, Ting
Abstract
A neural network-based optical character recognition (OCR) method, system, and apparatus may use context provided by a neural network-based language model (LM) to improve character recognition in images. In embodiments, a fuzzy OCR system receives an input image and uses aggregated classes of visually similar characters to identify a most probable aggregated class of visually similar characters. That aggregated class is used as an input to the LM, which, in embodiments, employs a portion of text, for example a word, a phrase, a sentence, or a paragraph, from the input image to provide sufficient context to identify the correct character from the aggregated class of visually similar characters.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Suraparaju, Rahul
Abstract
A method, a non-transitory computer readable medium, and a computer system for accessing protected resources. The method includes receiving, by a processor, a request from an OpenID-unaware application for access to a protected resource; authenticating, by the processor, the OpenID-unaware application; establishing, by the processor, an OpenID connection with an OpenID relying party upon authentication of the OpenID-unaware application; and receiving, by the processor, an access token issued by an OpenID identity provider for the OpenID-unaware application for access to the protected resource.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Kulbida, Jie
Abstract
A system for measuring planar features includes a 2D camera, a depth camera, and a computer system. The 2D camera captures a 2D image of an object, and the depth camera captures a depth image of the object. The object includes a feature in an object plane. The computer system obtains calibration data that establish a correspondence between the 2D camera, the depth camera, and a calibration plane. The computer system further determines a distance between the 2D camera and the object plane using the depth image and the calibration data, and computes a true measurement of the feature based on the feature captured in the 2D image and the distance.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Amano, Jun
Abstract
A system, for tracking fingers of a hand, includes: a sensor patch and a processor. The sensor patch includes: a flexible substrate layer; a light emitting layer attached to the flexible substrate layer; and a photodiode disposed between the light emitting layer a surface of the sensor patch that contacts the hand. The light emitting layer is configured to conform to a skin surface of a backside of the hand and to emit a first wavelength of light. The processor is configured to: control emission of the first wavelength of light by the light emitting layer; analyze backscattered light intensities from the skin surface of the backside of the hand that are detected by the photodiode; determine finger pose information based on the backscattered light intensities; and transmit the finger pose information.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Prebble, Tim
Abstract
Systems, methods, apparatuses, and computer program products for detecting and tagging of paragraphs that span columns, pages, or other reading units are provided. For example, a method can include obtaining a set of candidate paragraphs for a document. The method can also include identifying a pair of candidate paragraphs spanning columns from among the set of candidate paragraphs. The method can further include outputting a tagged paragraph corresponding to the pair of candidate paragraphs spanning columns.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Badri, Subramanyam
Soriano, Randy Cruz
Abstract
A method, a system, and a non-transitory computer readable program code are disclosed for generating a virtual authenticator for access to relying party applications hosted by a service provider. The method includes receiving, by a processor, authentication information from an authenticator device for a user with a request for access to one or more relying party applications hosted by the service provider; identifying, by the processor, a virtual authenticator profile for the user based on the authentication information received from the authenticator device; and generating, by the processor, an authentication token for the user based on the virtual authenticator profile for the user and in accordance with an authentication method of the service provider.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bellert, Darrell Eugene
Abstract
A nested closed shapes detection method includes detecting contours of an object in an image and obtaining pixel coordinates and hierarchy information of the contours; grouping, based on the hierarchy information, the contours into groups of sibling contours; for each of the groups, mending adjacent ones of the sibling contours separated by a gap equal to or less than a predetermined number of pixels; fitting a closed shape to each of the mended sibling contours and extending each of the mended sibling contours to mirror the closed shape; and building a hierarchy of nested closed shapes.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
Aspects of the present invention provide, in an optical/image character recognition (OICR) system comprising an OICR engine and a machine learning system, a method of training the machine learning system involving generation of degraded data for use in training the machine learning system. Other aspects of the present invention provide, in a similar OICR system, a method of restoring degraded end user data. Other aspects provide the OICR systems which function as described.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bhandarkar, Pranay
Abstract
A method, a non-transitory computer readable medium, and a multifunction peripheral that includes a method for accessing the multifunction peripheral. The method includes receiving, by a processor, a Fast Identity Online-based (FIDO-based) authentication from a client device via a wireless communication, the FIDO-based authentication configured to provide a user of the client device access to the multifunction peripheral; determining, by the processor, a validity of the FIDO-based authentication from the client device of the user; and granting, by the processor, the user access to the multifunction peripheral when the validity of the FIDO-based authentication from the client device of the user has been validated.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
20.
METHOD AND APPARATUS FOR FORM IDENTIFICATION AND REGISTRATION
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
Aspects of the present invention relate to a machine learning system that is trained to identify forms, performing a method that includes receiving a form as an input image; identifying a field in the input image; identifying boundaries of the field; identifying locations of characters in the field; creating a two-dimensional space containing special characters; replacing the special characters with the characters in the field; identifying one or more keywords in the field based on identification of words and/or location of words; and responsive to an indication that the identifying one or more keywords yielded an incorrect result, updating the machine learning system. In another aspect, the machine learning system is used to identify forms, and can identify whether a form requires registration and, if registration is required, performing the registration.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Soriano, Randy Cruz
Badri, Subramanyam
Abstract
A method, a system, and a non-transitory computer readable program code are disclosed for authentication of users for access to web applications. The method includes receiving, by a processor, a user identifier and a biometric identifier for a user with a request to access one or more relying party applications; validating, by the processor, the user identifier and the biometric identifier for the user with the request to access the one or more relying party applications; retrieving, by the processor, an authentication token for the user from an external trusted source; forwarding, by the processor, the authentication token for the user retrieved from the external trusted source to the one or more relying party applications; and receiving, on the processor, authentication from the one or more relying party applications for the user to access the one or relying party applications.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Badri, Subramanyam
Soriano, Randy Cruz
Abstract
A method, a system, and a non-transitory computer readable program code are disclosed for offline authentication of users for access to web applications. The method includes requesting, by a processor, access for a user to one or more relying party applications; receiving, by the processor, a redirection request from the one or more relying party applications to retrieve an authentication token for the user from an identity service provider; determining, by the processor, that the identity service provider is not available to provide the authentication token for the user; retrieving, by the processor, the authentication token for the user from a trusted source; forwarding, by the processor, the authentication token for the user retrieved from the trusted source to the one or more relying parties; and receiving, on the processor, authentication from the one or more relying parties for the user to access the one or relying party applications.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Emami, Hajar
Wei, Junchao
Abstract
Synthetic disease face image and disease facemask generation can provide training data for supervised learning of a variety of machine learning systems, including neural networks, which serve as detection models to detect disease or disorder affecting part or all of a person's face and/or cranium. Geometric transformations can be applied to facial images to generate the synthetic disease face images and disease facemasks.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Zhang, Yongmian
Abstract
Method and apparatus to identify field labels from filled forms using image processing to compare two or a few copies of the same kind of form, possibly filled out differently. Filled forms are processed to provide text strings, one for each line of text on each filled form. The text strings are converted to vectors. Vectors from different filled forms are compared to identify common words which are indicative of field labels. In an embodiment, a histogram may be generated to show frequency of occurrence of characters and words, the histogram values also being indicative of field labels.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for workflow automation, support handling, and ticketing; downloadable computer software for telemetry monitoring; downloadable software for workflow automation, support handling, and ticketing Providing temporary use of non-downloadable cloud-based computer software for workflow automation, support handling, and ticketing; providing temporary use of non-downloadable augmented reality computer software for integration with Augmented Reality platform; providing temporary use of non-downloadable computer software for telemetry monitoring; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support ticket handling and management services in connection with computer software; IT integration services, namely, comprising the integration of artificial intelligence, augmented reality technologies, and remote service platform capabilities into existing software platforms, specifically for enabling use to perform one-click firmware updates of computer hardware and peripherals; cloud computing services featuring software for workflow automation, support handling, and ticketing; customer support services involving the integration of remote service platforms to enable one-click firmware updates for networked computer devices; providing temporary use of non-downloadable augmented reality software for integration with Augmented Reality platform
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Voice over internet protocol (VOIP) services Training services in the field of best practices for email security, best practices for mobile device security, computer security, data security, internet security, business information security Computer security threat analysis for protecting data; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer technology support services, namely, help desk services; Consulting services in the field of cloud computing; Data security consultancy; Design and development of electronic data security systems; Design of information technology infrastructure for others; Design, deployment and management of wireless computer networks for others; Outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software; Planning, design and management of information technology systems; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
27.
Autonomous detection of concealed weapons at a distance by sensor fusion
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Amano, Jun
Abstract
An apparatus for distant detection of ferrous metallic objects includes a plurality of magnetic field sensors and a fingerprint processing system. The plurality of magnetic field sensors each measure an ambient magnetic field. The fingerprint processing system receives, from the plurality of magnetic field sensors, magnetic field data corresponding to the ambient magnetic field. The fingerprint processing system also generates, from the magnetic field data, a magnetic fingerprint image of one or more perturbations of the ambient magnetic field. The plurality of magnetic field sensors is separated from the ferrous metallic objects being detected by a detection distance that is greater than or equal to 0.5 meters.
G01V 3/08 - Electric or magnetic prospecting or detectingMeasuring magnetic field characteristics of the earth, e.g. declination or deviation operating with magnetic or electric fields produced or modified by objects or geological structures or by detecting devices
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/774 - Generating sets of training patternsBootstrap methods, e.g. bagging or boosting
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Soriano, Randy Cruz
Badri, Subramanyam
Abstract
A method, a system, and a non-transitory computer readable program code are disclosed for authenticating users. The method includes registering, on a processing device, one or more users in an authentication system, each of the one or more users having at least one corresponding client device; receiving, on the processing device, location data from the at least one corresponding client device; receiving, on the processing device, location data from one or more computer systems; calculating, on the processing device, a distance from the one or more computer systems to the at least one corresponding client device; receiving, by the processing device, an orientation or orientations of the at least one corresponding client device; and sending, by the processing device, a notification to the at least one corresponding client device.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Stopa, Michael
Amano, Jun
Abstract
A method for automated generation of representative icons from images involves obtaining an image, generating an image vector from the image using an encoder deep neural network, generating an icon based on the image vector using a generative adversarial network (GAN), and outputting the icon.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Nordback, Kurt Nathan
Abstract
A method for visualizing a reference object in an augmented reality (AR) workspace includes: calibrating the AR workspace by mapping a first coordinate space to the AR workspace; projecting an interface with control elements onto the AR workspace; obtaining an image of the AR workspace that includes the interface and the reference object; identifying the reference object in the image using an image recognition algorithm; retrieving a reference file associated with the reference object, where the reference file includes structural information describing one or more layers of the reference object; identifying a first point of interest (POI) on the reference object; generating, based on the structural information of the reference file, a virtual x-ray representation of structures of the reference object; projecting the virtual x-ray representation onto the AR workspace. The virtual x-ray representation includes a rendering of an internal structure of the reference object.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Grams, Jason James
Abstract
A method for generating training data for hand-printed text recognition includes obtaining a structured document, obtaining a set of hand-printed character images and database metadata from a database, generating a modified document page image, and outputting a training file. The structured document includes a document page image that includes text characters and document metadata that associates each of the text characters to a document character label. The database metadata associates each of the set of hand-printed character images to a database character label. The modified document page image is generated by iteratively processing each of the text characters. The iterative processing includes determining whether an individual text character should be replaced, selecting a replacement hand-printed character image from the set of hand-printed character images, scaling the replacement hand-printed character image, and inserting the replacement hand-printed character image into the modified document page image.
G06V 30/244 - Division of the character sequences into groups prior to recognitionSelection of dictionaries using graphical properties, e.g. alphabet type or font
32.
Method and system for mapping a virtual smart card to a plurality of users
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Suraparaju, Rahul
Abstract
A method, a non-transitory computer readable medium, and a personal computer for mapping a virtual smart card to a plurality of users. The method includes hosting, on a personal computer, an identity and access management (IAM) client, the IAM client configured to store a master virtual smart card for the plurality of users on the personal computer; authenticating, on the personal computer, a first user of the plurality of users; injecting, by the IAM client on the personal computer, an identity of the first user of the plurality of users and a personal identification number of the virtual smart card into a Kerberos communication application programming interface (API) with an Active Directory (AD), the Active Directory (AD) including the plurality of users; and mapping, on the personal computer, the master virtual smart card to the first user of the plurality of users.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Suraparaju, Rahul
Abstract
A method, a non-transitory computer readable medium, and multifunction printer for accessing a resource hosted on one or more cloud servers from a cloud ready application on the multifunction printer are disclosed. The method includes receiving, on the multifunction printer, a redirection request from an authentication server for an authentication token for a pre-authenticated user in response to a request for the resource hosted on the one or more cloud servers from the multifunction printer; sending, from the multifunction printer, the authentication token for the pre-authenticated user to the authentication server in response to the redirection request form the authentication server; receiving, on the multifunction printer, an authentication assertion from the authentication server; sending, by the multifunction printer, the authentication assertion to the one or more cloud servers; and accessing, by the cloud ready application on the multifunction printer, the resource hosted on the one or more cloud servers.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
A text correction method and apparatus can take advantage of a greatly reduced number of error-ground truth pairs to train a deep learning model. To generate these error-ground truth pairs, different characters in a ground truth word are replaced with a symbol, not appearing in any ground truth words, to generate error words which are paired with that ground truth word to provide error-ground truth word pairs. This process may be repeated for all ground truth words for which training is to be performed. In embodiments, pairs of characters in a ground truth word may be replaced with a symbol to generate the error words which are paired with that ground truth word to provide error-ground truth word pairs. Again, this process may be repeated for all ground truth words for which training is to be performed.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Amano, Jun
Abstract
A cloud server is connected to a plurality of edge devices via a network, and includes: a storage that stores a common machine learning (ML) model that is pretrained and used for optimizing image analysis; and a processor that repeatedly executes: distributing the common ML model to each of the edge devices that optimize the image analysis using local data and that modify the common ML model to create a locally optimized ML model, collecting a key parameter of an optimization result, without collecting the locally optimized ML model or accessing the local data, from each of the edge devices, and updating the common ML model stored in the storage by reflecting the key parameter in the common ML model at a predetermined timing to continuously improve the common ML model for more accurate image analysis.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Prebble, Tim
Abstract
A method for extracting text from an input image and generating a document includes: generating an edges mask from the input image; generating an edges image that is derived from the edges mask; identifying, within the edges mask, one or more probable text areas; extracting a first set of text characters by performing a first optical character recognition (OCR) operation on each of one or more probable text portions, of the derived edges image, corresponding to each of the probable text areas; generating a modified image by erasing, from the input image, image characters corresponding to the first set of text characters extracted by the first OCR operation; and generating a document by overlaying the extracted first set of text characters on the modified image.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Aher, Pritam
Abstract
A method, a non-transitory computer readable medium, and a system are disclosed for processing and scheduling print jobs on a plurality of printers. The method includes: collecting job information on one or more past print jobs; collecting job information on a plurality of print jobs currently being processed, each of the plurality of print jobs being assigned to one or more operators from a plurality of operators; generating a process workflow visualization for the plurality of print jobs currently being processed with a processing mining algorithm based on the job information collected on the one or more past print jobs and the job information collected on the plurality of print jobs currently being processed; and displaying the process workflow visualization for the plurality of print jobs currently being processed.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
A text correction engine meets different and changing end user requirements, with the ability to change a desired output by providing sufficient amounts of data, and by finetuning the appropriate text correction engine at the point of origin of the data. It is possible to retain confidentiality of data by retraining the base deep learning model at the base deep learning model's point of origin, to improve the base deep learning model's performance, making the base deep learning model more accurate for different contexts. Separate training of an end user model, leaving the base deep learning model intact, streamlines end user model training, and highlights desirable changes in the base deep learning model for further training or retraining.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Ikari, Hiroki
Abstract
A method, a non-transitory computer readable medium, and a mobile device are disclosed for reducing battery consumption of mobiles devices with location settings. The method includes: enabling a location setting on the mobile device, the location setting having an on state and an off state, the on state being a state in which location services are available to applications on the mobile device and the off state being a state in which location services are not available to applications on the mobile device; checking a battery life of the mobile device; and when the battery life of the mobile device is less than or equal to a preset threshold: changing a status of the location setting on the mobile device to the off state when the mobile device is not running an application that is using the location services; or maintaining the location setting in the on state.
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Xu, Ting
Abstract
A content aware and style aware neural network based data augmentation model generates augmented data sets to train neural network based handwriting recognition models to recognize individuals' handwriting. The augmented data sets may be generated so as to be artificial, and to lack personal or confidential information. The data augmentation model may generate content reference sets of individual characters generated in different fonts, and style reference sets of pluralities of characters of a particular style, for example, an individual's handwriting.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Kulbida, Jie
Abstract
A method is disclosed for eliminating potential video echo effect for a collaboration session that utilizes AR environments. During the collaboration session and in the local AR environment, a contact overlap mask is generated that identifies a content overlap region where the projected remote content superimposes over the physical object placed on the local workspace surface. Based on the contact overlap mask, the local AR environment is temporarily modified throughout a short time period when the projected remote content is prevented from superimposing over the physical object within the content overlap region. A local image is generated based on the temporarily modified local AR environment and sent to the remote workstation for sharing in the collaboration session. By excluding any projected remote content from superimposing over the physical object in the local image, a potential video feedback loop is eliminated so as to eliminate any potential video echo effect.
G03B 17/54 - Details of cameras or camera bodiesAccessories therefor adapted for combination with other photographic or optical apparatus with projector
H04N 5/272 - Means for inserting a foreground image in a background image, i.e. inlay, outlay
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effectsMasking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
42.
Method and system for transparently injecting custom screens into existing third-party workflows
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Pinney, Shaun
Abstract
A method, a non-transitory computer readable medium, and multifunction printer are disclosed for injecting screens into a third-party workflow on a display panel of a multifunction printer. The method includes displaying, on the display panel of the multifunction printer, a first screen from a third-party workflow; detecting, on the multifunction printer, a first authentication attempt from a user; inserting, on the display panel of the multifunction printer, a first screen from an authentication workflow into the third-party workflow upon the detection of the first authentication attempt from the user; sending, from the multifunction printer, authentication data associated with the first authentication attempt to an authentication server; receiving, from the authentication server, an authentication result associated with the first authentication attempt; and displaying, on the display panel of the multifunction printer, a second screen from the third-party workflow following a successful authentication result from the authentication server.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
In different kinds of forms with incomplete lines, or with different color cells in lieu of lines, virtually completing or providing the lines enables formation of tables from which keywords and content in the forms may be identified. Where a form may have one or more such tables, as can be the case with forms with irregular formats, multiple tables may be identified, to facilitate identification of keywords and content in each such table. In embodiments, deep learning techniques may be applied. Cost analysis involving minimum distances between keywords and content may be performed, with the cost analysis also facilitating formation of a keyword dictionary and a content dictionary.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
In some forms containing keywords and content, there may be nested levels of keywords, also referred to as a hierarchy. Content in the forms may be associated with one or more keywords in one or more of the nested levels, or in the hierarchy. Identifying keywords in adjacent cells in a table (with a nested keyword being either to the right of or below another keyword) enables distinguishing between keywords and content in filled forms, and enables correct association of content with respective keywords.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Gohari, Ebrahim Emami
Abstract
A blank template form generation method and system may employ synthetically generated blank template forms, differing from each other in one or more respects, to train a neural network to recognize relevant differences between otherwise similar forms, including types and locations of keywords and potential locations of values corresponding to the keywords. In an embodiment, filled or partly filled forms as well as blank template forms may be used later in training. Forms are input in pairs to identify differences between the two. Depending on the differences, weights of a neural network may be adjusted. After training, when a form is input into the system, whether the form is filled or blank, a blank template may be generated for future use.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bellert, Darrell Eugene
Abstract
A method to extract static user content on a marker board is disclosed. The method includes generating a sequence of samples from a video stream comprising a series of images of the marker board, generating at least one center of mass (COM) of estimated foreground content of each sample in the sequence of samples, detecting, based on a predetermined criterion, a stabilized change of the at least one COM in the sequence of samples, wherein the stabilized change of the at least one COM identifies, in the sequence of samples, a stable sample with new content, generating, in response to the stabilized change of the at least one COM and from the stable sample with new content, a mask of full foreground content, and extracting, based at least on the mask of full foreground content, a portion of the static user content from the video stream.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Grams, Jason James
Abstract
An optical shutter device includes: a projection shutter disposed in front of a projection device that projects an AR image onto an object surface with a local content; an imaging shutter disposed in front of an image capturing device that captures a local image of the local content; and a controller that electrically drives the projection and imaging shutters and switches the optical shutter device between a projection state and an imaging state. In the projection state, the controller electrically drives: the projection shutter to an open state, and the imaging shutter to a closed state. In the imaging state, the controller electrically drives: the projection shutter to the closed state, and the imaging shutter to the open state.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Prebble, Tim
Abstract
An image processing method includes: generating, from combined connected components (CCs) of a document image, candidate text CCs, candidate background CCs, and candidate natural image CCs where the candidate background CCs are excluded from the combined CCs to generate the candidate natural image CCs with a predetermined criterion dependent on the candidate text CCs; generating a final natural image bounding box by expanding a candidate natural image bounding box of the candidate natural image CCs and including in the expanded candidate natural image bounding box at least one combined CC that intersects the expanded candidate natural image bounding box; and modifying, based on the final natural image bounding box, the document image and displaying the modified document image to a user.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Prebble, Tim
Abstract
A method to reduce background noise in a document image includes: extracting, from the document image, a connected component corresponding to a background of the document image; generating a histogram of pixel values of the connected component; generating a replacement range using a range pruning algorithm that narrows a range of the histogram by iteratively discarding at least one pixel value and corresponding pixel count of the histogram from at least one side of the histogram; selecting, from the connected component, at least one pixel having a corresponding pixel value within the replacement range; converting the corresponding pixel value of the at least one pixel to a uniform background color; and outputting, subsequent to the converting, the document image.
H01L 27/32 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including components using organic materials as the active part, or using a combination of organic materials with other materials as the active part with components specially adapted for light emission, e.g. flat-panel displays using organic light-emitting diodes
H01L 51/52 - Solid state devices using organic materials as the active part, or using a combination of organic materials with other materials as the active part; Processes or apparatus specially adapted for the manufacture or treatment of such devices, or of parts thereof specially adapted for light emission, e.g. organic light emitting diodes (OLED) or polymer light emitting devices (PLED) - Details of devices
H01L 51/50 - Solid state devices using organic materials as the active part, or using a combination of organic materials with other materials as the active part; Processes or apparatus specially adapted for the manufacture or treatment of such devices, or of parts thereof specially adapted for light emission, e.g. organic light emitting diodes (OLED) or polymer light emitting devices (PLED)
H01L 33/38 - SEMICONDUCTOR DEVICES NOT COVERED BY CLASS - Details thereof characterised by the electrodes with a particular shape
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Nordback, Kurt Nathan
Abstract
A method for processing images in an information sharing and collaboration environment includes: receiving a plurality of graphical contents including a first graphical content from a first source and a second graphical content from a second source different from the first source within the information sharing and collaboration environment and overlapping the first and second graphical contents; determining a probability that the first graphical content was created before the second graphical content; rendering, using a transparency blending formula and based on the probability that the first graphical content was created before the second graphical content, an opacity of an overlapped portion of the first and second graphical contents; and displaying, on a display, the overlapped first and second graphical contents.
G09G 5/377 - Details of the operation on graphic patterns for mixing or overlaying two or more graphic patterns
G09G 5/38 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators characterised by the display of individual graphic patterns using a bit-mapped memory with means for controlling the display position
G06V 10/50 - Extraction of image or video features by performing operations within image blocksExtraction of image or video features by using histograms, e.g. histogram of oriented gradients [HoG]Extraction of image or video features by summing image-intensity valuesProjection analysis
52.
Online training data generation for optical character recognition
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Xu, Ting
Abstract
A method and system to generate training data for a deep learning model in memory instead of loading pre-generated data from disk storage. A corpus may be stored as lines of text. The lines of text can be manipulated in the memory of a central processing unit (CPU) of a computing system, using asynchronous multi-processing, in parallel with a training process being conducted on the system's graphics processing unit (GPU). With such an approach, for a given line of text, it is possible to take advantage of different fonts and different types of image augmentation without having to put the images in disk storage for subsequent retrieval. Consequently, the same line of text can be used to generate different training images for use in different epochs, providing more variability in training data (no training sample is trained on more than once). A single training corpus may yield many different training data sets. In one aspect, the model being trained is a deep learning model, which may be one of several different types of neural networks. The training enables the deep learning model to perform OCR on line images.
G16H 20/00 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
G16H 50/30 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indicesICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for individual health risk assessment
G16H 20/60 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to nutrition control, e.g. diets
G16H 20/30 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to physical therapies or activities, e.g. physiotherapy, acupressure or exercising
54.
Method and system for temporary use of biometric information of another for access to a system
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Chen, Yu-Shing
Young, Kenneth Huang
Soriano, Randy Cruz
Feng, Ann Qiongying
Abstract
A method and system for temporarily gaining access to a system is disclosed, The method includes: receiving biometric data from a first biometric device of a first user on a computer processor; generating a temporary code on the computer processor in response to receipt of the biometric data from the first biometric device of the first user; sending the temporary code from the computer processor to the first biometric device of the first user; receiving biometric data from a second biometric device of a second user on the first biometric device of the first user; generating an access code on the first biometric device, the access code including one or more of the biometric data of the first user, the temporary code from the computer processor, and the biometric data of the second user; and sending the access code to the biometric device of the second user.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/33 - User authentication using certificates
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Young, Kenneth Huang
Soriano, Randy Cruz
Chen, Yu-Shing
Feng, Ann Qiongying
Abstract
A method and system for securely registering a user in a biometric system. The method includes: receiving, on a computer processor of the biometric system, an identifier of a biometric device and user information; sending, with the computer processor, a request that the biometric device be sent to the user of the biometric device upon the receipt of the identifier of the biometric device and user information; receiving, on the computer processor, the identifier of the biometric device and one or more authenticators from the user; initiating, with the computer processor, a registration of the user based on the receipt of the identifier of the biometric device and the one or more authenticators from the user; and receiving, on the computer processor, biometric data of the user from the biometric device to complete a registration of the user in the biometric system.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Kulbida, Jie
Abstract
An image processing method, for collaborating between a first augmented reality (AR) workspace and a second AR workspace, includes: calibrating the first AR workspace by creating a camera-to-shared space transformation between a camera coordinate space and a shared coordinate space, and a shared space-to-projector transformation between the shared coordinate space and a projector coordinate space; obtaining a remote composite image of a foreground content in the second AR workspace; generating a projector image by applying the shared space-to-projector transformation to the remote composite image; projecting the projector image into the first AR workspace; obtaining an input image of the first AR workspace that includes the projector image and a foreground content of the first AR workspace; generating an output image by applying the camera-to-shared space transformation to the input image; and obtaining a remote mask based on the remote composite image.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Ikari, Hiroki
Abstract
An authentication server is connected to a client device via a network and includes: an uninterruptible power supply (UPS) that supplies power to the authentication server upon interruption of a main power supply; a storage that stores a database including: a piece of user information of a user of the client device; and a piece of authentication information for the user to log into the client device or a predetermined server on the network via the client device; and a processor that, once the UPS starts to supply the power to the authentication server, transmits to the client device the piece of authentication information corresponding to the piece of user information before the authentication server is shut down.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bruening, Karsten
Amano, Jun
Abstract
A testing apparatus for obtaining mechanical properties of a polymer composite extruded from a nozzle of a compounding extruder includes a plurality of pairs of roller units that roll the polymer composite along a first direction. Each of the pairs of roller units includes a first roller unit and a second roller unit disposed such that a center of the first roller unit and a center of the second roller unit are separated by a predetermined distance in a second direction that is perpendicular to the first direction. The pairs of roller units are disposed along the first direction such that the predetermined distance of each of the pairs of roller units increases stepwise along the first direction. The pairs of roller units strain a vulnerable portion of the polymer composite in the second direction. The testing apparatus further includes a sensor that measures stress in the vulnerable portion.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Zhang, Yongmian
Abstract
Method and apparatus to match bounding boxes around text to align forms. The approach is less computationally intensive, and less prone to error than text recognition. For purposes of achieving alignment, information per se is not as important as information location. Information within the bounding boxes is not as critical as is the location of the area which the bounding boxes occupy. Scanning artifacts, missing characters, or noise generally do not affect bounding boxes themselves so much as they do the contents of the bounding boxes. Thus, for purposes of form alignment, the bounding boxes themselves are sufficient. Using bounding boxes also avoids misalignment issues that can result from stray marks on a page, for example, from holes punched in a sheet, or from handwritten notations.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Tashiro, Masayuki
Abstract
A method, a non-transitory computer readable medium, and a system are disclosed for comparing usage of plural printers. The method includes collecting print information on each of a plurality of printers, the print information including print volume, printer run time, printer print time, printer stop time, and raster image processing time; and displaying, on a graphical user interface, a printer usage dashboard, the printer usage dashboard including a line chart of print volume for the plurality of printers, a bar chart of printer stop time for each of the plurality of printers, and a scatter chart of printer usage for the plurality of printers.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Suraparaju, Rahul
Abstract
A method, a non-transitory computer readable medium, and a system are disclosed for user registration with mirrored identities to achieve federation without on-premises identities. The method including: forwarding, from a computer processor, a password-based authentication request for a user to an active directory for access to cloud services; receiving, on the computer processor, a cloud authentication from the active directory for the user; piggybacking, on the computer processor, the cloud authentication for the user from the active directory with a FIDO2 registration to an authentication server; requesting, by the computer processor, an application or service from a cloud provider with the cloud authentication for the user from the FIDO2 registration; and receiving, on the computer processor, the application or service from the cloud provider.
Konica Minolta Business Solution U.S.A., Inc. (USA)
Inventor
Suraparaju, Rahul
Abstract
A method, a non-transitory computer readable medium, and a system are disclosed for a single sign-on for services. The method includes: receiving, on a computer processor, user identification captured by a biometric device of a user; forwarding, by the computer processor, the user identification to an authentication server; receiving, on the computer processor, a user JSON Web Token (user-JWT), user principle name, active directory domain name, and user domain name password, upon authentication of the user by the authentication server; performing, by the computer processor, an active directory join operation with an active directory using the user principle name, the active directory domain name, and the user domain name password; launching, on the computer processor, a browser that communicates with the authentication server; and receiving, on the computer processor, an HTML page constructed with JavaScript code with clickable icons for provisioned services from the authentication server.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
G06F 21/41 - User authentication where a single sign-on provides access to a plurality of computers
63.
Authentication server and method that allow user to log into application or service provided via client devices
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Ito, Hiroyasu
Abstract
An authentication server is connected to a plurality of client devices via a network and includes: a storage that stores a database including: a plurality of pieces of user information; and multiple kinds of a plurality of pieces of credential information for logging into an application or service provided by an external server via each of the client devices; and a processor that: upon receiving a first piece of user information from a first client device, determines whether the database contains a first piece of credential information corresponding to the first piece of user information, and upon determining that the database contains the first piece of credential information, sends to the first client device the first piece of credential information required to allow a user to log into the application or service provided via the first client device.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
A method and system to detect visual spoofing of a process of authenticating a person's identity employs computer vision techniques to define characteristics of different kinds of spoofing. Embodiments identify a foreground object within an image and by examining positions and/or orientations of that foreground object within the image, determine whether the presentation of the foreground object is an attempt to spoof the authentication process.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Wei, Junchao
Abstract
Aspects of the present invention provide a new text location technique, which can be applied to general handwriting detection at a variety of levels, including characters, words, and sentences. The inventive technique is efficient in training deep learning systems to locate text. The technique works for different languages, for text in different orientations, and for overlapping text. In one aspect, the technique's ability to separate overlapping text also makes the technique useful in application to overlapping objects. Embodiments take advantage of a so-called skyline appearance that text tends to have. Recognizing a skyline appearance for text can facilitate the proper identification of bounding boxes for the text. Even in the case of overlapping text, discernment of a skyline appearance for words can help with the proper identification of bounding boxes for each of the overlapping text words/phrases, thereby facilitating the separation of the text for purposes of recognition.
G06K 9/72 - Methods or arrangements for recognition using electronic means using context analysis based on the provisionally recognised identity of a number of successive patterns, e.g. a word
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Amano, Jun
Abstract
A method and system providing an anti-counterfeiting label or mark, using ordinary inkjet printers, take advantage of a phenomenon called a coffee ring pattern, something that inkjet printers. Even the same inkjet printer can output different patterns under different conditions. As a result, the likelihood of reproduction of a particular printer's coffee ring pattern using another printer is so low as to be negligible. It is possible to capture images of the coffee rings using a smartphone camera. The coffee ring approach may be used on any labels or packages on which inkjet printing can be used.
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
67.
Document image content protection in the context of noise reduction
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Prebble, Tim
Abstract
A method, non-transitory computer readable medium, and system to reduce visual background noise in an image, especially in images of document pages, without destroying and/or deteriorating the content of that image. In particular, natural images, filled and stroked vector graphics, and text are protected from being destroyed and/or deteriorated by the noise removal process.
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Installation and maintenance of computers, computer servers, and computer peripherals Installation and maintenance of computer software; technical support, namely, troubleshooting computer software and hardware problems via phone, e-mail, and in person; technological consultation in the technology field of computer software, computer hardware systems, computer networks, and computer connectivity via electronic communication networks; custom computer programming for others
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bellert, Darrell Eugene
Abstract
An image processing method to generate a layout of searchable content from a physical document. The method includes generating extracted content blocks in the physical document, generating, based on a bounding box of a text block, a layout rectangle that identifies where machine-encoded text is placed in the layout of the searchable content, generating, based on a bounding box of a non-text block, an avoidance region that identifies where the machine-encoded text is prohibited in the layout of the searchable content, generating, based on the layout rectangle and the avoidance region, a draft layout of the searchable content, and iteratively adjusting a point size of the machine-encoded text in the draft layout to generate the layout of the searchable content.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Prebble, Tim
Abstract
A method to reduce background noise in a document image. The method includes extracting, from the document image, a connected component corresponding to a background of the document image, generating a histogram of pixel values of the connected component, generating, using a non-linear mapping function based on the histogram, a non-linear probability distribution of the pixel values in the connected component, generating, based at least on a comparison between the non-linear probability distribution and a predetermined threshold, a replacement range of the pixel values, selecting, from the connected component, a pixel having a pixel value within the replacement range, and converting the pixel value of the pixel to a uniform background color.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Amano, Jun
Abstract
An integrated sensing system to perform multi-modality sensing of an environment. The integrated sensing system includes a first sensing element that generates a first modality sensing output of the environment, a first edge artificial intelligence (AI) engine that controls the first sensing element and generates a first data analysis result based on the first modality sensing output, a second sensing element that generates a second modality sensing output of the environment, a second edge AI engine that controls the second sensing element and generates a second data analysis result based on the second modality sensing output, and a computer processor that generates, using a central AI algorithm, a classification result of the environment based on the first data analysis result and the second data analysis result, where the computer processor is directly coupled to the first edge AI engine and the second edge AI engine.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
G06N 3/04 - Architecture, e.g. interconnection topology
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Generation of translated electronic document from an input image by consolidating each of identical untranslated text strings into a single element for translation
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Dozier, Iii, Mabry Frazier
Grams, Jason James
Abstract
A method of generating an editable translated electronic document from an input image of an original document with a first layout includes: segmenting the input image to generate a first region including first untranslated text; extracting, from the first region, the first untranslated text and a first layout information; generating an editable output data including the first untranslated text and the first layout information; translating the first untranslated text into a translated text; editing the output data to include the translated text; and generating, using the first layout information, the translated electronic document including the translated text and a second layout that is identical to the first layout.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Soriano, Randy Cruz
Abstract
In providing cloud services, key-based security measures specific to a local network are utilized when an internal client terminal logs into the network to access cloud services, and when a remote client terminal connects directly to the cloud services. A cloud service computer references the credential authorization service of the local network, allowing key-based security measures of that network to be applied even when a remote client terminal connects directly to a cloud service computer. By referencing the local credential authorization service, it is possible to provide cloud services to different organizations that administer key-based security measures independently of each other.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
74.
Aligning and merging contents from multiple collaborative workstations
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Kulbida, Jie
O'Farrell, Ronald
Beck, David
Beck, Kevin
Grams, Jason
Abstract
A method for aligning and merging contents from multiple collaborative workstations. Collaborative workstations are multiple workstations that contribute respective contents to be combined into a single computer-generated output. The content generated from each collaborative workstation is the collaborative content. Individual collaborative content is created from each workstation by a user drawing on a piece of paper that is placed on a workspace surface of the workstation. Collaborative contents contributed by multiple workstations are aligned such that a combined product (i.e., a single computer-generated output) including both virtual and physical content appears to be collaboratively drawn by multiple users on a single piece of paper.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Ito, Hiroyasu
Abstract
An authentication server that connects a client device and a target server via a first network. The authentication server includes: a storage and a processor. The storage stores user-specific information that includes a plurality of data items. The processor: upon receiving an authentication request including a user ID and a user password, an authentication ID, a biometric device ID unique to a user, or biometric data of a user, identifies a corresponding credential data of the user; determines which of the items in the user-specific information will be sent to the client device; and returns the determined items to the client device, and causes the client device to store the determined items as cache data used for logging into at least one of the client device and the target service, wherein the client device and the target server have given a login authority to the user.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Amano, Jun
Abstract
A single-step method of generating a three dimensional (3D) printed article includes: selecting a first metastructure and a second metastructure; designing and constructing a first transitional metastructure that transitions from the first metastructure to the second metastructure; depositing a first layer comprising the first metastructure; seamlessly connecting the first and first transitional metastructures by depositing a first transitional layer comprising the first transitional metastructure on the first layer; and seamlessly connecting the first transitional and second metastructures by depositing a second layer comprising the second metastructure on the first transitional layer.
B29C 64/386 - Data acquisition or data processing for additive manufacturing
B33Y 50/00 - Data acquisition or data processing for additive manufacturing
77.
Method and system for sales recommendations with graphical analysis of multifunctional printer and customer data using demographic, economic, multifunctional printer usage characteristics
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Stopa, Michael
Bruening, Karsten
Abstract
A method, a non-transitory computer readable medium, and a system are disclosed for recommending products based on usage of one or more multifunctional printers. The method includes collecting usage data from a multifunctional printer; classifying the usage data from the multifunctional printer into one or more categories; comparing the usage data from the multifunctional printer in each of the one or more categories to usage data from one or more other multifunctional printers; determining one or more usage patterns for the multifunctional printer from the comparison of the usage data between the multifunctional printer in each of the one or more categories to the usage data from one or more other multifunctional printers; identifying one or more products or services based on the one or more usage patterns for the multifunctional printer; and recommending one or more products or services for the multifunctional printer on a graphical user interface (GUI).
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bellert, Darrell
Abstract
A method, non-transitory computer readable medium, and system for inferring certain texts as stylized section headings in an electronic document (ED). Stylized section headings are section headings that have unique styling distinct from the body of text below each stylized heading. In particular, the stylized section headings are identified based on styling information in the ED. Identifying stylized section headings includes grouping candidate headings based on identification of dominant styling, locating high level fragments, and repeatedly locating nested fragments from within higher level fragments. The ED may or may not include explicitly identified headings in the document.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bellert, Darrell
Abstract
A method for processing an electronic document (ED) to infer a sequence of section headings in the ED. The method includes generating, by a computer processor, based on regular expression matching of a predetermined section heading pattern and a plurality of characters in the ED, a list of candidate headings in the ED; generating, by the computer processor and based on the list of candidate headings, a list of chain fragments for inferring a portion of the sequence of section headings; and generating, by the computer processor and based on predetermined criteria, the sequence of section headings by merging at least two chain fragments in the list of chain fragments.
Konica Minolta Business Solutions, U.S.A., Inc. (USA)
Inventor
Aher, Pritam
Yokoohji, Ryoichi
Abstract
A method, a non-transitory computer readable medium, and a system are disclosed for scheduling print jobs on a plurality of printers. The method includes: collecting job information on each of a plurality of print jobs; obtaining a predicted success rate for each of the plurality of print jobs with each of the plurality of printers based on the job information on the each of the plurality of print jobs, the predicted success rate being a likelihood that a print job can be successfully completed by a printer; and assigning each of the plurality of print jobs to one or more printers of the plurality of printers with the predicted success rate for each of the one or more printers of the plurality of print jobs being greater than a predicted success threshold.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Wei, Junchao
Abstract
In a color to grayscale image conversion particularly method suitable for processing color document images such as forms, the color image is analyzed to determined which of the red, green and blue channels are the most dominant, second most dominant, and least dominant channels, based on the amount of information contained in each channel. Then, coefficients are assigned to the three channels, where the coefficient for the most dominant channel is smaller than the coefficient for the second most dominant color channel, which is in turn smaller than the coefficient for the least dominant color channel. The grayscale pixel value is then calculated using a linear combination of the red, green and blue pixel values weighted by their assigned coefficients. In one example, the ratio of the coefficients for the least dominant, the second most dominant and the most dominant channels is 10:3:1.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Kulbida, Jie
Abstract
A method to detect a finger press in an augmented reality (AR) workspace. The method includes obtaining, using an image sensor, an image of the AR workspace, where the image includes an icon of a graphic user interface (GUI), where the GUI is hovered over by a hand of a user, extracting, by a computer processor based at least on a skin tone color filter, a hand candidate from the image of the AR workspace, extracting, by the computer processor based on a pre-determined confidence measure, a finger candidate from a contour of the hand candidate, and detecting, by the computer processor based on a location of the finger candidate with respect to the icon of the GUI, the finger press performed by the hand of the user.
G06F 3/042 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means by opto-electronic means
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06K 9/46 - Extraction of features or characteristics of the image
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer security consultancy; computer security threat analysis for protecting data; computer software consultation; consulting in the field of IT project management; data security consultancy; information technology consulting services; internet security consultancy; IT consulting services
85.
Method of generating infill geometry from a native computer aided design (CAD) file
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Nordback, Kurt Nathan
Abstract
The method includes: obtaining a first file of a computer-aided design (CAD) application; identifying, within the first file, a first 3D shape associated with a 3D infill pattern; generating a second file including: a first section specifying the 3D infill pattern; and a second section including instructions describing the first 3D shape filled with multiple instances of the 3D infill pattern by referencing the first section. The first section and the second section are separate in the second file.
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Tecu, Kirk Steven
Abstract
A method for processing an image of a physical document to show a redacted portion including: identifying a tag associated with the redacted portion and including first user rights; obtaining, using the identified tag, a digital copy of the physical document including a non-redacted form of the redacted portion; receiving, from an external device, second user rights; determining that the second user rights match the first user rights; outputting, based on the determination, information indicating that the non-redacted form of the redacted portion is able to be shown; receiving, in response to the non-redacted form being able to be shown, an instruction to display the non-redacted form; and displaying, based on the instruction and using a projector onto a surface a predetermined distance from the physical document, the non-redacted form of the redacted portion.
KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. (USA)
Inventor
Bruening, Karsten
Abstract
A method for generating a thermo set Fiber- Reinforced Polymer (FRP) composite preform includes: dispensing, from a print head of a 3D-printer, a dual-cure resin coated fiber including a dual-cure resin with a ultra-violet (UV)-curable component and a thermally-curable component; curing, during the dispensing of the dual-cure resin coated fiber, the UV-curable component with a UV light source such that the dual-cure resin coated fiber is partially cured and contacting lengths of the partially-cured dual-cure resin coated fiber bond together; and positioning the print head during the dispensing and curing of the dual-cure resin coated fiber to three- dimensionally print the thermoset FRP composite preform.
B33Y 70/00 - Materials specially adapted for additive manufacturing
C08G 59/68 - Macromolecules obtained by polymerising compounds containing more than one epoxy group per molecule using curing agents or catalysts which react with the epoxy groups characterised by the catalysts used
C08L 63/00 - Compositions of epoxy resinsCompositions of derivatives of epoxy resins
88.
Process for fabrication of fiber composites using dual-cure free-form 3D-printed tailored fiber placement preform
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Bruening, Karsten
Abstract
A method for generating a thermoset Fiber-Reinforced Polymer (FRP) composite preform includes: dispensing, from a print head of a 3D-printer, a dual-cure resin coated fiber including a dual-cure resin with a ultra-violet (UV)-curable component and a thermally-curable component; curing, during the dispensing of the dual-cure resin coated fiber, the UV-curable component with a UV light source such that the dual-cure resin coated fiber is partially cured and contacting lengths of the partially-cured dual-cure resin coated fiber bond together; and positioning the print head during the dispensing and curing of the dual-cure resin coated fiber to three-dimensionally print the thermoset FRP composite preform.
B33Y 30/00 - Apparatus for additive manufacturingDetails thereof or accessories therefor
B33Y 50/02 - Data acquisition or data processing for additive manufacturing for controlling or regulating additive manufacturing processes
B29B 13/08 - Conditioning or physical treatment of the material to be shaped by using wave energy or particle radiation
B29C 70/48 - Shaping or impregnating by compression for producing articles of definite length, i.e. discrete articles using matched moulds, e.g. for deforming sheet moulding compounds [SMC] or prepregs and impregnating the reinforcements in the closed mould, e.g. resin transfer moulding [RTM]
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Stopa, Michael
Amano, Jun
Bruening, Karsten
Abstract
A carbon nanotube (CNT) resonator includes: a first CNT having a first end and a second end both fixed to a substrate; and a second CNT having a first end fixed to the substrate. The second CNT creates a Van der Waals (VdW) bond with the first CNT where the second CNT overlaps the first CNT. A length of the VdW bond along a distance between the first and the second CNTs oscillates based on a DC voltage applied between the first end of the first CNT and the first end of the second CNT. An electrical current passing through the first and the second CNTs using the VdW bond oscillates based on the oscillation of the length of the VdW bond.
H03H 3/02 - Apparatus or processes specially adapted for the manufacture of impedance networks, resonating circuits, resonators for the manufacture of electromechanical resonators or networks for the manufacture of piezoelectric or electrostrictive resonators or networks
B82Y 40/00 - Manufacture or treatment of nanostructures
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Tecu, Kirk Steven
Abstract
A method for generating a searchable file from a document. The method includes identifying an object within the document and a formatting attribute of the object, determining an inferred semantic characteristic of the object by comparing the formatting attribute with a plurality of inference rules, wherein the inferred semantic characteristic comprises an estimation of author-defined semantic characteristic of the object, generating metadata based at least on the inferred semantic characteristic and the formatting attribute of the object, wherein the metadata comprises text data that is searchable by a search application for the searchable file to identify the object within the searchable file, and generating, based on the document, the searchable file comprising the metadata.
G06F 16/14 - Details of searching files based on file metadata
G06F 16/80 - Information retrievalDatabase structures thereforFile system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Grams, Jason James
Abstract
A method is disclosed for training a machine learning model to process electronic documents (EDs). The method includes obtaining a structured ED (SED) from a document repository, where the SED includes a first metadata. The method further generates, based on the SED, a bitmap and a second metadata. The method also determines whether the second metadata is within a predetermined threshold of the first metadata and generates, based on the SED and in response to determining that the second metadata is not within the predetermined threshold of the first metadata, a third metadata. The method additionally determines whether the third metadata is within the predetermined threshold of the first metadata and stores, in response to determining that the third metadata is within the predetermined threshold of the first metadata, a second SED comprising the bitmap and the third metadata.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/80 - Information retrievalDatabase structures thereforFile system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Amano, Jun
Abstract
A thermochromic device includes a film and a number of vanadium dioxide nanowires disposed within the film. The film is manufactured by hot extruding a material that includes a polymer and a plurality of vanadium dioxide nanowires on a drum to form a rough film.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer security consultancy; Computer security threat analysis for protecting data; Computer software consultation; Consulting in the field of IT project management; Data security consultancy; Information technology consulting services; Internet security consultancy; IT consulting services
97.
Multi-spectral gas analyzer system with multiple sets of spectral sensitivity
Konica Minolta Business Solutions U.S.A., Inc. (USA)
Inventor
Wang, Leiming
Hung, Po-Chieh
Abstract
A system and method for multi-spectral gas concentration analysis that includes using a library of multiple sets of optimized spectral sensitivities prepared in advance, and a multi-spectral IR gas analyzer tuned to a set of optimized spectral sensitivity. The multi-spectral IR gas analyzer measures spectral absorption of gas using one or more different sets of optimized spectral sensitivities.
G01N 21/3504 - Investigating relative effect of material at wavelengths characteristic of specific elements or molecules, e.g. atomic absorption spectrometry using infrared light for analysing gases, e.g. multi-gas analysis
Copier/printer exterior part using halogen-free flame-retardant resin composition including recycled polycarbonate and recycled polyethylene terephthalate
Konica Minolta Business Technologies, Inc. (Japan)
Inventor
Xin, Minqi
Luo, Minghua
Li, Wenqiang
Gao, Lei
Li, Qiang
Kitani, Ryuji
Saita, Yasuharu
Abstract
A copier/printer exterior part uses a halogen-free flame-retardant resin composition. The halogen-free flame-retardant resin composition includes 5 wt % to 50 wt % of unused polycarbonate, 20 wt % to 63 wt % of recycled polycarbonate, 5 wt % to 35 wt % of recycled polyethylene terephthalate, 0.2 wt % to 2 wt % of a styrene-acrylonitrile-glycidyl methacrylate terpolymer, 5 wt % to 15 wt % of a toughener, 10 wt % to 20 wt % of a flame retardant, 0.1 wt % to 0.8 wt % of a flame-retardant antidrip agent, 0.1 wt % to 1 wt % of an antioxidant, and 0.1 wt % to 2 wt % of a lubricant. The styrene-acrylonitrile-glycidyl methacrylate terpolymer includes 1 wt % to 5 wt % of glycidyl methacrylate and 20 wt % to 33 wt % of acrylonitrile.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Application service provider (ASP) featuring software for use in knowledge management, document management, and for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information
09 - Scientific and electric apparatus and instruments
Goods & Services
Software for enterprise resource planning and management of information technology hardware, specifically for use in connection with office automation and imaging products and services