-
公开(公告)号:US20250164860A1
公开(公告)日:2025-05-22
申请号:US18884460
申请日:2024-09-13
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Stephen G. Lamberti
IPC: G03B17/56
Abstract: In an example, a cover device is used for a target device having an activation button. The cover device has a body which comprises: a front member configured to cover the activation button at least partially; a first side member disposed on a first side of the front member; a second side member disposed on a second side of the front member; a first rear member connected to the first side member and extending partially toward the second side member; and a second rear member connected to the second side member and extending partially toward the first side member. The first rear member and the second rear member are spaced by a rear distance smaller than a distance between the first side member and the second side member.
-
公开(公告)号:US12242582B2
公开(公告)日:2025-03-04
申请号:US18209332
申请日:2023-06-13
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Arun Vemury
Abstract: Systems and methods for providing exception failover augmented, homomorphic encrypted (HE) distributing, end-to-endpoint persistent encryption, and distributed HE domain non-decrypting, privacy-protective biometric processing are provided. Some configurations may include generating HE biometric feature data, based on homomorphic encrypting the biometric feature data. Some configurations determine an exception status of the HE biometric feature data between exception and non-exception. Systems and methods may include performing a HE domain, non-decrypting biometric classifying of the HE biometric feature data.
-
公开(公告)号:US20240422553A1
公开(公告)日:2024-12-19
申请号:US18820744
申请日:2024-08-30
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Jason Lim , Daniel Boyd , Chang Ellison , Michelle Wilson
Abstract: In an example, a provider system receives from a user device a request for user access through a checkpoint. The provider system sends to the user device a request for identification information of the user. The provider system receives user information associated with a mobile identification credential (MIC) which the user device received from an authorizing party system (APS), the user having consented to release the user information to the provider system, and the user information having been verified by the APS. The provider system uses the verified user information associated with the MIC to verify or not verify the identity of the user. The provider system verifies the identity of the user before granting the user the request for user access through the checkpoint.
-
公开(公告)号:US20240411957A1
公开(公告)日:2024-12-12
申请号:US18738428
申请日:2024-06-10
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Sean Warnick , Alexandria Phounsavath , Garfield Jones
IPC: G06F30/20
Abstract: A system for building a high fidelity model of a cyber physical human system (CPHS) is disclosed. The CPHS modelling system may comprise a database containing database information and an interface configured to receive a schema and operational data from a user. The CPHS modelling system may comprise an assembler configured to: receive the schema and database information; and generate a generic model of the CPHS. The CPHS modelling system may comprise a machine learning module configured to: receive the operational data; execute a machine learning process; and use the operational data to generate the high fidelity model.
-
公开(公告)号:US20240404261A1
公开(公告)日:2024-12-05
申请号:US18799455
申请日:2024-08-09
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Mark Fry
IPC: G06V10/776 , G06V10/74 , G06V20/52
Abstract: Systems and methods of detecting a vortex made by a travelling object is disclosed. In some configurations, a graphic recognition algorithm and vortex similarity engine are used to determine whether a visual media file captured by a media collector contains a vortex. The vortex similarity engine may be configured to determine or identify certain properties about the travelling object based on the travelling object vortex. In some configurations, a computer may trigger an alert if a travelling object vortex is not expected to be in the visual media file.
-
公开(公告)号:US12138948B2
公开(公告)日:2024-11-12
申请号:US18389913
申请日:2023-12-20
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Joel Zlotnick , Jordan Brough , Troy Eberhardt , Tyra McConnell , Elizabeth Gil , Traci Moran
IPC: B42D25/29 , B41F1/16 , B41F7/02 , B41F31/00 , B41F33/00 , B41M1/10 , B41M1/14 , B41M3/14 , B42D25/342 , B42D25/351 , B42D25/378 , B42D25/405 , B42D25/333
Abstract: A substrate is printed with front side and back side markings. The front side when viewed with reflected light includes: a first marking printed with a first gradient of two colors; a second marking printed with a second gradient of two colors; a first symbol printed with a third gradient of two colors; a second symbol printed with a fourth gradient of two colors; a third symbol printed with a fifth gradient of two colors; and a fourth symbol printed with a sixth gradient of two colors. The back side when viewed with reflected light includes: a third marking printed with the fourth gradient; a fourth marking printed with the third gradient; a fifth symbol printed with the second gradient; a sixth symbol printed with the first gradient; a seventh symbol printed with the sixth gradient; and an eighth symbol printed with the fifth gradient.
-
公开(公告)号:US20240320979A1
公开(公告)日:2024-09-26
申请号:US18609209
申请日:2024-03-19
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: John F. Jasinski, JR.
IPC: G06V20/52
CPC classification number: G06V20/52 , G06V2201/07
Abstract: In an example, a prescreening method includes: capturing an image of one or more items for a user; processing the image of the one or more items by image recognition; analyzing the image processed by image recognition to determine whether any of the one or more items are listed on a list; if none of the one or more items in the image is listed on the list, informing the user that none of the one or more items in the image is listed on the list; and if any of the one or more items in the image is listed on the list, identifying each item in the image which is listed on the list to the user.
-
公开(公告)号:US20240301987A1
公开(公告)日:2024-09-12
申请号:US18595556
申请日:2024-03-05
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Andrew P. Armstrong , Guy P. Tharpe
CPC classification number: F16M5/00
Abstract: In an example, a chocking compound dam includes a plurality of prefabricated dam walls. Each prefabricated dam wall has two side edges each being configured to connect to a side edge of another prefabricated dam wall. The plurality of prefabricated dam walls are connected to form a dam surrounding a chocking compound pour area. Each prefabricated dam wall has a height and a length. At least one of the prefabricated dam walls includes a longitudinal stiffener. The longitudinal stiffener extends along the length of the prefabricated dam wall and has a width protruding transversely from the prefabricated dam wall.
-
公开(公告)号:US12083814B2
公开(公告)日:2024-09-10
申请号:US18232199
申请日:2023-08-09
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Joel Zlotnick , Jordan Brough , Troy Eberhardt , Tyra McConnell , Elizabeth Gil , Traci Moran
IPC: B42D25/29 , B41F1/16 , B41F7/02 , B41F31/00 , B41F33/00 , B41M1/10 , B41M1/14 , B41M3/14 , B42D25/342 , B42D25/351 , B42D25/378 , B42D25/405 , B42D25/333
CPC classification number: B42D25/29 , B41F1/16 , B41F7/025 , B41F31/008 , B41F33/0036 , B41M1/10 , B41M1/14 , B41M3/14 , B41M3/148 , B42D25/342 , B42D25/351 , B42D25/378 , B42D25/405 , B41M2205/34 , B41P2227/10 , B42D25/333
Abstract: Examples are directed toward anticounterfeit markings printed on a substrate. A method includes determining with a microprocessor running computer executable code non-transitorily stored on tangible computer readable media that: a first microprinting appears on a front side of the substrate as front side markings of first portions of a plurality of characters having dimensions in a micrometer range when viewed from the front side with reflected light, a second microprinting appears on a back side of the substrate as back side markings of second portions of the plurality of characters having dimensions in the micrometer range when viewed from the back side with reflected light, and the first microprinting and the second microprinting in combination appear as microprinting of whole characters of the plurality of characters when viewed with transmitted light.
-
公开(公告)号:US12081991B2
公开(公告)日:2024-09-03
申请号:US18517807
申请日:2023-11-22
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: Jason Lim , Daniel Boyd , Chang Ellison , William Washington
Abstract: In an example, a provider system receives from a client device a request for client access. The provider system sends to the client device a request for identification information of the client. The provider system receives client information associated with a mobile identification credential (MIC) which the client device received from an authorizing party system (APS), the client having consented to release the client information to the provider system, and the client information having been verified by the APS. The provider system uses the verified client information associated with the MIC to verify or not verify the identity of the client. The provider system verifies the identity of the client before granting the client the request for client access.
-
-
-
-
-
-
-
-
-