20th week of 2016 patent applcation highlights part 50 |
Patent application number | Title | Published |
20160140272 | METHOD TO MEASURE EDGE-RATE TIMING PENALTY OF DIGITAL INTEGRATED CIRCUITS - Methods for evaluating timing delays in unbalanced digital circuit elements and for correcting timing delays computed by static-timing models are described. Unbalanced circuit elements have large edge-rates at their input and small edge-rates at their output. Unbalanced circuit elements may be analyzed using a modified loaded ring oscillator. A statistical model and a fixed-corner model may be used to calculate timing delays associated with the unbalanced circuit elements and a timing delay error between the two models. The timing delay error may then be used to correct timing delays computed by static-timing models for similar unbalanced circuit elements within a more complex digital circuit. | 2016-05-19 |
20160140273 | INTEGRATED CIRCUIT PERFORMANCE MODELING USING A CONNECTIVITY-BASED CONDENSED RESISTANCE MODEL FOR A CONDUCTIVE STRUCTURE IN AN INTEGRATED CIRCUIT - Disclosed are a system and a method for integrated circuit (IC) performance modeling, wherein a design layout of an IC is analyzed to identify a first conductive shape (e.g., an internal local interconnect or contact bar shape) on a diffusion boundary shape of a semiconductor device and to also identify the first conductive shape's connectivity to any second conductive shapes (e.g., a via, via bar, or external local interconnect shapes) inside and/or outside the limits of the diffusion boundary shape. A condensed resistance model for the first conductive shape is selected from a model library based on the previously identified connectivity. The selected condensed resistance model will have a lesser number of nodes and/or resistive elements than a full resistance model for the conductive shape. The selected condensed resistance model is used to construct a condensed netlist, which is used in a combined netlist to simulate IC performance. | 2016-05-19 |
20160140274 | ENERGY ANALYSIS FOR DIFFERENTIAL POWER ANALYSIS RESISTANCE - A first and second set of simulation information of a circuit design may be received. Energy consumption values associated with signals may be calculated for each of the first and second sets of simulation information of the circuit design. The energy consumption values associated with the transitions of the plurality of signals for each time point of a plurality of time points may be aggregated based on when each of the transitions of the signals occurs for each of the first and second sets of simulation information. Furthermore, a possible Differential Power Analysis (DPA) leak may be identified at one of the time points based on a difference in aggregated energy consumption values between the first and second sets of simulation information. | 2016-05-19 |
20160140275 | USER EXPERIENCE BASED MANAGEMENT TECHNIQUE FOR MOBILE SYSTEM-ON-CHIPS - A method for designing a system-on-chip (SOC) for a wireless device includes receiving, at a design processor, first usage conditions for a first module of the SOC and second usage conditions for a second module of the SOC. The method further includes determining design parameters for the SOC. The design parameters are based on the first usage conditions and the second usage conditions. | 2016-05-19 |
20160140276 | 3D CIRCUIT DESIGN METHOD - The invention concerns a 3D circuit design method implemented by a processing device involving partitioning a 2D circuit representation into two or more tiers, the 2D circuit representation defining circuit elements interconnected by interconnecting wire each weighted based on at least one of: its length; its propagation delay; and its priority level, the 2D circuit representation initially forming a first tier, the partitioning involving: a) selecting a first highest ranking wire, interconnecting at least first and second circuit elements in the first tier; b) moving one of the first and second circuit elements connected by the selected wire to a further tier of the 3D circuit representation and replacing the interconnecting wire with a connecting via between the first and further tiers; and c) repeating a) and b) for one or more further interconnecting wires of the first tier. | 2016-05-19 |
20160140277 | INFORMATION PROCESSING APPARATUS AND DESIGN SUPPORT METHOD - An information processing apparatus includes a storage unit and a processor. The storage unit is configured to store therein plural pieces of shape data indicating shapes of a plurality of components. The plural pieces of shape data are associated with a first window for displaying unarranged components. The processor is configured to generate, using the plural pieces of shape data stored in the storage unit, display information for displaying a shape of a substrate on a screen and for displaying the first window including the shapes of the plurality of components on the displayed substrate. The processor is configured to output the display information. | 2016-05-19 |
20160140278 | Modeling Photoresist Shrinkage Effects In Lithography - Aspects of the disclosed techniques relate to techniques for resist simulation in lithography. Local light power values are determined for a plurality of sample points in boundary regions of an aerial image of a feature to be printed on a resist coating, wherein each of the local light power values represents a light power value for an area surrounding one of the plurality of sample points. Based on the local light power values, a vertical shrinkage function is constructed. Resist contour data of the feature are then computed based at least on resist shrinkage effects modeled using the local light power values and the vertical shrinkage function. | 2016-05-19 |
20160140279 | METHOD AND DEVICE FOR DESIGNING ELECTRICAL CIRCUIT - A method may be used for designing an electrical circuit. The method may be implemented using a device that includes hardware. The method may include the following steps: generating a schematic model that represents the electrical circuit; placing representations of a set of elements of the electrical circuit for forming a pre-route layout model; and using the pre-route layout model and a set of layout-dependent effect parameter values to perform a pre-route simulation. The set of layout-dependent effect parameter values may pertain to the set of elements of the electrical circuit. | 2016-05-19 |
20160140280 | REDUCING DYNAMIC CLOCK SKEW AND/OR SLEW IN AN ELECTRONIC CIRCUIT - Reducing dynamic clock skew and/or slew in an electronic circuit is provided by: referencing a layout database and/or netlist of a design for the electronic circuit; identifying a set of neighboring buffer pairs with active buffers and adjacent sub-meshes, which are connected by a shorting bar; for each neighboring buffer pair of the set: placing a dummy buffer for each of their active buffers in the adjacent sub-meshes close to the active buffers; routing an input of a first dummy buffer located in a first sub-mesh to an output of an active buffer in a second sub-mesh; routing an input of a second dummy buffer located in the second sub-mesh to an output of an active buffer in the first sub-mesh; and connecting inputs of the first and second dummy buffers to the shorting bar. | 2016-05-19 |
20160140281 | System On Chip I/O Connectivity Verification In Presence Of Low Power Design Considerations - Formal verification of connectivity of a circuit, for example, a circuit representing a system on chip I/O ring is performed with low power considerations. The formal verification determines whether the connectivity of a circuit remains valid when low power design specification is introduced. The system receives assertions representing connectivity of the circuit. The system receives low power design specification for a circuit that describes power states of power domains of the circuit. The system generates combinational constraints representing valid power states of power domains of the circuit. The system performs formal verification based on the assertions representing the connectivity of the circuit and the combinational constraints representing the power states of power domains of the circuit. The result of the formal verification is used to determine whether the connectivity of the circuit is valid in view of the low power design specification. | 2016-05-19 |
20160140282 | METHODS AND SYSTEMS FOR DETERMINING OBSTRUCTION SETBACKS IN A PHOTOVOLTAIC SYSTEM - A computer-implemented method for determining boundary offsets in a photovoltaic (PV) system based on shadow simulations is implemented by a design automation computer system in communication with a memory. The method includes identifying a set of obstructions wherein the set of obstructions includes a set of obstruction elevations and a set of obstruction offsets, simulating a set of shadow effects using a first coarse shadow algorithm based on the set of obstructions, refining the set of shadow effects using a second fine shadow algorithm based on the set of obstructions and the set of shadow effects, and defining a plurality of boundary of boundary offsets based on the refined set of shadow effects. | 2016-05-19 |
20160140283 | METHODS AND SYSTEMS FOR DETERMINING A PHOTOVOLTAIC SYSTEM LAYOUT - A computer-implemented method for determining a system layout of a photovoltaic (PV) system is implemented by a design automation computer system in communication with a memory. The method includes receiving a first selection of a system table, receiving a layout mode designation, identifying a system orientation, identifying a system spacing, receiving a layout detail designation, and applying a layout algorithm based on the first selection of a system table, the layout mode designation, the layout mode designation, the system orientation, the system spacing and the layout detail designation. | 2016-05-19 |
20160140284 | TESTBENCH BUILDER, SYSTEM, DEVICE AND METHOD INCLUDING A DISPATCHER - A testbench for testing a device under test (DUT), wherein the testbench has a verification environment including a reference model, a scoreboard and a customized agent for each interface that the DUT needs to receive input from and/or transmit output on. The testbench system is able to be generated by a testbench builder that automatically creates a scoreboard, a reference model, a dispatcher and generic agents including generic drivers, loopback ports, sequencers and/or generic monitors for each interface and then automatically customize the generic agents based on their corresponding interface such that the agents meet the requirements of the interface for the DUT. | 2016-05-19 |
20160140285 | TESTBENCH BUILDER, SYSTEM, DEVICE AND METHOD INCLUDING A GENERIC MONITOR AND TRANSPORTER - A testbench for testing a device under test (DUT), wherein the testbench has a verification environment including a reference model, a scoreboard and a customized agent for each interface that the DUT needs to receive input from and/or transmit output on. The testbench system is able to be generated by a testbench builder that automatically creates a scoreboard, a reference model, a dispatcher and generic agents including generic drivers, loopback ports, sequencers and/or generic monitors for each interface and then automatically customize the generic agents based on their corresponding interface such that the agents meet the requirements of the interface for the DUT. | 2016-05-19 |
20160140286 | TESTBENCH BUILDER, SYSTEM, DEVICE AND METHOD WITH PHASE SYNCHRONIZATION - A testbench for testing a device under test (DUT), wherein the testbench has a verification environment including a reference model, a scoreboard and a customized agent for each interface that the DUT needs to receive input from and/or transmit output on. The testbench system is able to be generated by a testbench builder that automatically creates a scoreboard, a reference model, a dispatcher and generic agents including generic drivers, loopback ports, sequencers and/or generic monitors for each interface and then automatically customize the generic agents based on their corresponding interface such that the agents meet the requirements of the interface for the DUT. | 2016-05-19 |
20160140287 | Template Creation Device for Sample Observation Device, and Sample Observation Device - A template creation device for a sample observation device for creating a template for image processing using design data includes a storage unit for storing process information in which information concerning a plurality of process processings is defined, and a template creation unit for processing the design data using the process information and creating the template for the image processing. | 2016-05-19 |
20160140288 | METHOD FOR FORMING PERSONAL NUTRITION COMPLEX ACCORDING TO INCIDENCE OF DISEASE AND GENETIC POLYMORPHISM BY A PREDICTION SYSTEM - The present invention relates to a system for predicting an incidence of disease from genetic polymorphism and uses the prediction result to form a personal nutrition complex. The system collects at least one personal information and single nucleotide polymorphism (SNP) information then exchanges the above information with databases including a personal database, a genetic risk database, an allelic frequency database, and a prevalence database. Finally, the system will output a prediction report and indicates a risk of specific disease and a plurality of abnormal genes. According to the prediction results, the system also can provide a plurality of nutritional supplement ingredients to form a personal nutrition complex. Users can receive a comprehensive and an effective nutritional supplement countermeasure about abnormal genes for prevention of the specific disease. | 2016-05-19 |
20160140289 | VARIANT CALLER - Processes and systems for reading variants from a genome sample relative to a reference genomic sequence are provided. An exemplary process includes collecting a set reads and generating a k-mer graph from the reads. For example, the k-mer graph can be constructed to represent all possible substrings of the collected reads. The k-mer graph may be reduced to a contiguous graph, and a set of possible haplotypes generated from the contiguous graph. The process may further generate, the error table providing a filter for common sequencer errors. The process may then generate a set of diplotypes based on the set of haplotypes and the generated error table and score the set of diplotypes to identify variants from the reference genome. Scoring the diplotypes may include determining a posterior probability for each of the diplotypes, with the highest scoring diplotype(s) reported as the result. | 2016-05-19 |
20160140290 | Bioinformatics Systems, Apparatuses, and Methods Executed on an Integrated Circuit Processing Platform - A system, method and apparatus for executing a sequence analysis pipeline on genetic sequence data includes a structured ASIC formed of a set of hardwired digital logic circuits that are interconnected by physical electrical interconnects. One of the physical electrical interconnects forms an input to the structured ASIC connected with an electronic data source for receiving reads of genomic data. The hardwired digital logic circuits are arranged as a set of processing engines, each processing engine being formed of a subset of the hardwired digital logic circuits to perform one or more steps in the sequence analysis pipeline on the reads of genomic data. Each subset of the hardwired digital logic circuits is formed in a wired configuration to perform the one or more steps in the sequence analysis pipeline. | 2016-05-19 |
20160140291 | Systems and Methods for Sequence Data Alignment Quality Assessment - A computer-implemented method for classifying alignments of paired nucleic acid sequence reads is disclosed. A plurality of paired nucleic acid sequence reads is received, wherein each read is comprised of a first tag and a second tag separated by an insert region. Potential alignments for the first and second tags of each read to a reference sequence is determined, wherein the potential alignments satisfies a minimum threshold mismatch constraint. Potential paired alignments of the first and second tags of each read are identified, wherein a distance between the first and second tags of each potential paired alignment is within an estimated insert size range. An alignment score is calculated for each potential paired alignment based on a distance between the first and second tags and a total number of mismatches for each tag. | 2016-05-19 |
20160140292 | SYSTEM AND METHOD FOR SORTING A PLURALITY OF DATA RECORDS - A system and method is provided for sorting a plurality of data records. The method includes the steps of collecting a plurality of data entries from a data record of the plurality of data records. The method further assigns each data entry of the plurality of data entries with a unique entry ID. An initial state of a given data entry of the plurality of data entries is also identified, and a given state is assigned to the given data entry. A change in state of the given data entry is determined from the initial state to the given state. The given data entry is sorted according to a first criteria and a second criteria, with the sorting comprising assigning a score to the given data entry. The given data entry is prioritized based on the score assigned to the given data entry respective of a score assigned to each remaining data entry of the plurality of data entries. An output representing a prioritized list of the plurality of data entries is generated based on a respective score that can be displayed in a display. | 2016-05-19 |
20160140293 | PROTOCOL ADJUSTMENT FOR MEDICAL IMAGING - A method and a device for protocol adjustment for medical imaging, and a medical imaging device and a computer program product for carrying out the method, wherein the method includes providing a location-specific feature of an imaging device, ascertaining at least one location-dependent protocol boundary condition from a comparison with at least one database, and creating at least one protocol adjusted to the at least one location-dependent protocol boundary condition. At least one of the providing, ascertaining, or creating occurs automatically. | 2016-05-19 |
20160140294 | SYSTEMS AND METHODS OF PRESENTING DISCRETE PRESCRIPTION DRUG INFORMATION - A system and method is disclosed for receiving information about a particular drug, subdividing the information into one or more subgroups based on the format of the information, associating a link with each particular subgroup and associating one or more questions with each particular subgroup of information. The system then presents each link to an end user over a mobile computing device that allows the user to select to view one or more of the subgroups of information. Upon receiving a request to view one of the subgroups of information, the system presents the subgroup of information and the questions to the end-user. The system then receives answers to the one or more questions, which subgroups of information that user viewed and the time spend reviewing the information. The system stores the various tracked information and uses the information to improve the information presented to the end-user. | 2016-05-19 |
20160140295 | Health Care Event Matching - A computer-implemented method includes generating a matching rule defined by a user, where the matching rule is a clear text rule, and receiving a transaction message that includes patient data from one or more health care facilities, where the patient data includes one or more patient health care events. A custom extension to a relational database is generated based on the received patient data, and the generated matching rules is applied to the received patient data at the custom extension to the relational database. Related patient event records within the custom extension to the relational database are identified and the related patient event records are configured based on the applied matching rule. | 2016-05-19 |
20160140296 | Methods and Apparatus for Processing Medical Data From A Plurality Of Users - In one embodiment, a computer-implemented method that comprises receiving, a user request from a first system user of a plurality of system users for a communication of health data with a health information system. The health information system includes a data store that stores health data related to the plurality of system users. The method further comprises providing to the first system user health data stored by a second system user in the data store based on access approval by the second system user in response to a user request for health data associated with the second system user; analyzing health data for a first group of system users if the user request is an analysis of health data associated with the first group of system users; providing to the first system user the analyzed health data; and communicating health data associated with the first system user to a second group of system users if the user request is a request to communicate and the first system user has designated the system users of the second group of system users. | 2016-05-19 |
20160140297 | Clinical information management system - The present invention is generally directed to an information management system, where the managed information relates to past, current and future medical services rendered to a patient. In one aspect, the present invention provides a method of collecting and transmitting information related to a physician's revenue. The method comprises the steps of: 1) collecting information from a patient using a dialogue box presented to a patient through a graphical user interface displayed on an electronic device, where the information includes answers to one or more questions, and where the questions are directed to a particular medical area (e.g., ophthalmology), and where the questions are leading, and where the answers can be used by a physician to increase revenue; 2) transmitting the information to a physician. | 2016-05-19 |
20160140298 | RISK EVALUATION AND MANAGEMENT STRATEGY INVOLVING PATIENT FOLLOW-UPS RELATING TO THE USE OR DISCONTINUATION OF A COMPLEMENT INHIBITOR - This invention provides, inter alia, a complement-inhibitor-based treatment plan coupled with a risk evaluation and management strategy (“REMS”) and a safety support program (“SSP”) for reinforcing the REMS. The REMS and SPP are implemented using one or more computer devices with software tools programmed to enforce conditions of the REMS and/or prompt follow-ups by registered nurses enrolled in the SSP. The software tool(s) determines whether a prescriber requesting the complement inhibitor has agreed to abide by the REMS, and can prompt a provider of the complement inhibitor to provide updated educational materials to the prescriber at predetermined times or intervals, to monitor the prescriber for compliance with the REMS, and/or to monitor patients for signs of adverse events. Using exemplary embodiments described herein, a risk of adverse events (especially, but not limited to, meningococcal infections) can be managed and an incidence of the adverse events can be reduced. | 2016-05-19 |
20160140299 | AUTO DIRECTOR FOR THE AMBULANCE AND EMERGENCY - An emergency response system includes at least one server with circuitry configured to receive an emergency report from an external device regarding injuries and location of at least one victim. A scope of the emergency is determined based on the emergency report that describes a location of the victim and the injuries of the victim. The circuitry outputs instructions to the external device related to providing first aid based on the injuries of the victim. At least one emergency response team is assigned to respond to the emergency, and information related to one or more incoming patients is output to a medical facility. | 2016-05-19 |
20160140300 | METHOD AND SYSTEM FOR AUTOMATED QUALITY ASSURANCE AND AUTOMATED TREATMENT PLANNING IN RADIATION THERAPY - Methods and systems for evaluating a proposed treatment plan for radiation therapy, for evaluating one or more delineated regions of interest for radiation therapy, and/or for generating a proposed treatment plan for radiation therapy. Machine learning based on historical data may be used. | 2016-05-19 |
20160140301 | VALIDATION OF DIGITAL SURGICAL VIDEOS - Computer-implemented methods and systems for validating digital surgical videos are disclosed herein. According to an embodiment, an Internet-based method for validating a digital video comprises submitting the digital surgical video to a video hosting website; analyzing and accepting the video for a pre-publication review, wherein the pre-publication review comprises automatically assigning the accepted video to at least two randomly selected reviewers using a computer algorithm; automatically associating an approved for publication status identifier with the video; and embedding an indicia representative of validation of the video content in the approved for publication video. | 2016-05-19 |
20160140302 | LOCATION-BASED HEALTHCARE COLLABORATION, DATA MANAGEMENT AND ACCESS CONTROL - The locations of electronic devices in an institutional facility are determined based on interaction with the wireless mobile devices of users who roam though the facility and interact with (or are detected by) the devices. | 2016-05-19 |
20160140303 | VALUE-BASED HEALTH CARE MANAGEMENT SYSTEMS AND METHODS - A system and method are disclosed for management of patient care and research using a combination of value-based methodology and translational research methodology. The system includes software to generate a single outcome measurement, or “Value-Quotient (VQ)” expressing a delivered health value and the associated costs. The software may also include a user interface to generate and manage coordinated care pathways (i.e. tight control scenarios) aimed at complication prevention and disease control. The software also may include functionality for direct task differentiation for provider teams, shifting work load from physicians to trained nurses and administration. | 2016-05-19 |
20160140304 | SYSTEM AND METHOD FOR VISUAL ANALYSIS OF HEALTHCARE CLAIMS - Methods and systems are provided for dynamically presenting visually codified information associated with healthcare claims for payment of medical services and/or products provided to respective patients. Received healthcare claim information is stored in a healthcare claim database, and a healthcare claim graphic is created for each healthcare claim according to pre-determined specifications and using the healthcare claim information. Each healthcare claim graphic includes data fields for displaying different categories of information, a color scheme for representing information included in each of a first group of data fields, and one or more symbols for representing information included in each of a second group of data fields. A collection of healthcare claim graphics is displayed with a plurality of zoom options for dynamically toggling between a summary view of the entire collection, a semi-detailed view of a group of graphics, and a detailed view of one graphic. | 2016-05-19 |
20160140305 | INFORMATION COLLECTION APPARATUS AND SYSTEM FOR DIAGNOSIS SUPPORT PROGRAM, AND OPERATING METHOD - An information collection apparatus for collecting information related to a diagnosis support program with a purpose for performance monitoring is provided. The diagnosis support program is for data processing of patient health data of a patient body and for outputting diagnosis support information for reference in determining a treatment plan for the patient body. A first information collector collects judgment information of approval or non-approval as to whether the treatment plan for the patient body for which the diagnosis support program is used is based on the diagnosis support information. A second information collector collects treatment result information of a treatment result of the patient body. Preferably, the treatment result information includes at least one of occurrence or non-occurrence of rehospitalization of the patient body, a cost of hospitalization of the patient body, and a cure level of a symptom of the patient body. | 2016-05-19 |
20160140306 | SYSTEMS, DEVICES, AND METHODS FOR REVISING OR SUPPLEMENTING ROM-BASED RF COMMANDS - Systems, devices, and methods are provided that enable the revision of RF command handling software stored in ROM, and that enable to supplementation of RF command handling software stored in ROM. Examples of the systems, devices, and methods make use of a lookup data structure stored within writable non-volatile memory. | 2016-05-19 |
20160140307 | MEDICAL APPARATUS WITH SELECTIVELY ENABLED FEATURES - A medical system includes a medical apparatus, a computer, a user input device, and at least one feature in communication with and controlled by the computer. The computer is in communication with the user input device, which is configured and arranged to allow a user to purchase the use of the feature. The computer is configured to enable the use of the feature after the user purchases use of the feature. | 2016-05-19 |
20160140308 | SYSTEMS AND METHODS OF NOTIFYING A PATIENT TO TAKE MEDICATION - Systems and methods of scheduling and sending notifications to, and receiving acknowledgements from, patients regarding specific health care events, such as the taking of medications at scheduled times and in prescribed dosages. By directing a patient to take their prescribed dosages of medication at scheduled times based on a schedule of medications prepared for the patient by a health care provider, a caregiver, etc., and enabling the patient to provide acknowledgements of having taken their prescribed dosages of medication, improved health care outcomes can be achieved. Further, by allowing the patient to receive such directives to take their medication, as well as to send such acknowledgements, using a set top box connected to a television set, a mobile device such as a mobile phone, and/or a patient notification device such as a wireless pendant, desired improvements in health care outcomes can be achieved with an increased level of convenience. | 2016-05-19 |
20160140309 | AUTO ATTENDANT SYSTEM WITH STATUS NOTIFICATION COMPONENTS - A mounted or portable device that allows for instant communication and notification between two parties is provided. Directed primarily at elderly family members and the like that live on their own, such a device includes a video screen for display of various media in order to provide memory inducements, as well as video communication on demand. Furthermore, such a device permits a remote user to contact the person with a request for instant verification of the person's condition. Failure to respond to such a request leads to automatically sent communications to pre-assigned recipients that attention for the person user may be required, thereby seeking the closest recipient proximally at that specific moment to provide such attention and/or notification to proper authorities that medical or other help is needed. The system also allows the direct user the capability of contacting medical/police/etc. authorities if attention is needed immediately as well. | 2016-05-19 |
20160140310 | SYSTEM AND METHOD FOR MAKING A HUMAN HEALTH PREDICTION FOR A PERSON THROUGH DETERMINATION OF THEIR HEALTH KNOWLEDGE - A system and method for predicting a health outcome of a user based on a determination of knowledge the user possesses regarding issues of physiological or mental health. | 2016-05-19 |
20160140311 | SYSTEM AND METHOD FOR CONDUCTING REAL TIME ACTIVE SURVEILANCE OF DISEASE OUTBREAK - A system and method is disclosed for the real-time active surveillance of disease. The system generates an outbreak detection model by analyzing the spending records of individuals who are known to be infected to identify purchases and purchase patterns that correlate to infection in the population with a disease. Based on the identified purchases, the system generates probabilistic identification criteria and merges the criteria to simulation models of infection spread by geography to generate a geospatial outbreak detection model. The system applies the generated model to spending records, in real time, to identify and monitor disease spread in the population. The system can also generate alerts if the likelihood that an individual is infected, or one or more individuals in a set or population is infected exceeds a threshold. Actions are taken at remote devices, such as mobile phones, computers and POS terminals in certain embodiments. | 2016-05-19 |
20160140312 | GENERATING DRUG REPOSITIONING HYPOTHESES BASED ON INTEGRATING MULTIPLE ASPECTS OF DRUG SIMILARITY AND DISEASE SIMILARITY - Various embodiments predict drug-disease associations. In one embodiment, a plurality of disease similarity matrices and a plurality of disease similarity matrices are accessed. Each of the plurality of drug similarity matrices is associated with a different drug information source. Each of the plurality of disease similarity matrices is associated with a different disease information source. A known drug-disease association matrix is also accessed. The known drug-disease association matrix indicates if a given drug identified is known to treat a given disease. At least one drug-disease association prediction is generated based on the plurality of drug similarity matrices, the plurality of disease similarity matrices, and the known drug-disease association matrix. The at least one drug-disease association prediction identifies a previously unknown association between a given drug and a given disease, and a probability that the given disease is treatable by the given drug. | 2016-05-19 |
20160140313 | METHOD AND SYSTEM FOR IMAGE PROCESSING TO DETERMINE PATIENT-SPECIFIC BLOOD FLOW CHARACTERISTICS - Embodiments include a system for determining cardiovascular information for a patient. The system may include at least one computer system configured to receive patient-specific data regarding a geometry of the patient's heart, and create a three-dimensional model representing at least a portion of the patient's heart based on the patient-specific data. The at least one computer system may be further configured to create a physics-based model relating to a blood flow characteristic of the patient's heart and determine a fractional flow reserve within the patient's heart based on the three-dimensional model and the physics-based model. | 2016-05-19 |
20160140314 | CONCEIVABLE BASAL BODY TEMPERATURES AND MENSTRUAL CYCLE - The present invention discloses software programs, systems and methods for increasing the chances of users conception by maximizing the user's fertility potential by providing a software program that combines identifying the underlying causes of infertility and using best practices as described by current medical literature for fertility changes along with herbal recommendations to provide personalized wellness recommendations that give the individual user the power to improve their natural fertility. | 2016-05-19 |
20160140315 | MEDICATION WORKFLOW MANAGMEENT - Methods for managing preparation, delivery, and recycling of a medication for a patient are provided. In one aspect, a method includes interfacing with a medication preparation component, an inventory management component, a delivery management component, and a medication recycling management component. The medication preparation component fulfills a plurality of medication orders based on a first set of parameters. The medication preparation component cannot interface directly with the parameters for the other components. The method includes providing the medication preparation component the first set of parameters based on the parameters for the other components. In another aspect, a method includes receiving a plurality of medication orders, providing preparation instructions when a medication order cannot be fulfilled by unused medications, providing delivery instructions for the medications, and receiving delivery verifications. Machine-readable media are also provided. | 2016-05-19 |
20160140316 | SYSTEMS AND METHODS FOR AUTOMATICALLY EVALUATING MEDICAL PATIENT SYMPTOMS AND PROVIDING TAILORED PRESCRIPTIONS - The present disclosure is generally related to automatically evaluating medical patient symptoms and, more specifically, to systems and methods for providing tailored prescriptions, multi-dimensional patient matching and symptom monitoring. In particular, a medical patient completes a questionnaire, responses to the questionnaire are correlated with information obtained from a medical knowledge resource and an integrated symptoms summary is generated based on the responses to the questionnaire and the information obtained from the medical knowledge resource. A tailored prescription is provided to the patient based on the integrated symptoms summary and physician consultation (if applicable), patients are compared to other patients according to questionnaire responses so that they can connect with each other if they chose, and patients are able to monitor symptoms over time so that they can gain insight into whether treatments are working. | 2016-05-19 |
20160140317 | DETERMINING TREATMENT COMPLIANCE USING PASSIVELY CAPTURED ACTIVITY PERFORMANCE PATTERNS - Methods and systems are described for unobtrusively monitoring patient activity to determine compliance of the patient with a prescribed regimen for treating a brain-related disorder. Patient activity associated with routine activities is detected with an activity sensor at the patient location, and activity data is transmitted to a monitoring location. The activity sensor and other components at the patient location may be incorporated into, or associated with, a cell phone, computing system, game system, appliance, or vehicle system, for example. Patient activity is processed at the patient location and/or monitoring location to identify activity parameters and/or patterns that indicate whether the patient has complied with the prescribed treatment regimen. Patient identity may be determined through biometric identification or other authentication techniques. The system may provide a report to an interested party, for example a medical care provider or insurance company, regarding compliance of the patient with the prescribed treatment regimen. | 2016-05-19 |
20160140318 | MEDICAL ARTIFICIAL INTELLIGENCE SYSTEM - In an embodiment, a computer implemented software method and system performs medical artificial intelligence with the goal of guiding healthcare toward better health outcomes by learning, by deductive and inferential logic, the clinical interventions that produce, better clinical outcomes and learning, by deductive and inferential logic, the clinical presentations for deployment of theses interventions, on a continuous and ongoing process of tracking, compiling, collating and organizing electronically stored and entered clinical information. | 2016-05-19 |
20160140319 | REMOTE MONITORING OF A PATIENT - Orthoses with microprocessor control placed around the joint of a patient are used to perform and to monitor isometric, range-of-motion, proprioception and isotonic exercises of the joint. A variety of improved hardware elements result in an orthosis that is easier to use and interacts more efficiently with the controller to allow the monitoring of a greater range of motions while holding down cost and provide suitable accurate evaluation of the exercises. Efficient ways of programming the exercises, monitoring the exercises and evaluating the exercise provide a comprehensive program for the rehabilitation of an injured or weakened joint. | 2016-05-19 |
20160140320 | METHOD FOR PROVIDING THERAPY TO AN INDIVIDUAL - A method and system for providing therapy to an individual, the method comprising: transmitting a log of use dataset associated with communication behavior of the individual during a time period; receiving a supplementary dataset characterizing mobility of the individual in association with the time period; generating a survey dataset upon retrieving responses provided by the individual to at least one of a set of surveys, associated with a set of time points of the time period; generating a predictive model from a passive dataset derived from the log of use dataset and the supplementary dataset and the survey dataset; generating a report summarizing a mental health state of the individual, associated with at least a portion of the time period, from the passive dataset, the survey dataset, and an output of the predictive model; and rendering information from the report to a coach associated with the individual. | 2016-05-19 |
20160140321 | MONITORING TREATMENT COMPLIANCE USING SPEECH PATTERNS PASSIVELY CAPTURED FROM A PATIENT ENVIRONMENT - Methods and systems are described for monitoring patient speech to determine compliance of the patient with a prescribed regimen for treating for a brain-related disorder. Patient speech is detected with an audio sensor at the patient location, and speech data is transmitted to a monitoring location. Patient speech is processed at the patient location and/or monitoring location to identify speech parameters and/or patterns that indicate whether the patient has complied with the prescribed treatment regimen. Patient identity may be determined through biometric identification or other authentication techniques. The system may provide a report to an interested party, for example a medical care provider, based on whether (and/or the extent to which) the patient has complied with the prescribed treatment regimen. The monitoring system may transmit a report to a wireless device such as a pager or cell phone, generate an alarm or notification, and/or store information for later use. | 2016-05-19 |
20160140322 | System and Method for Conducting Cohort Trials - A computer-assisted method that includes: receiving data encoding parameters defining a study plan of a clinical trial with more than one participant clinical sites; adding a first cohort to the study plan; adding a second cohort to the study plan, the second cohort having no overlapping patient with the first cohort; subsequent to onset of the clinical trial, receiving de-identified information encoding attributes of participant human subjects at each of the clinical sites; parsing the received de-identified information to map the participant human subjects to a particular cohort of the study plan; in response to receiving update information encoding attributes of the participant human subjects at each of the clinical sites, longitudinally tracking the de-identified participant human subjects as mapped to corresponding cohorts of the study plan while the clinical trial progresses at the clinical sites; and providing analytics of the cohorts of the study plan. | 2016-05-19 |
20160140323 | SYSTEM AND METHOD FOR PROVIDING A HEALTH DETERMINATION SERVICE BASED ON USER KNOWLEDGE AND ACTIVITY - Examples are provided herein for providing a service in connection with determining a health of a user. A collection of questions are stored for the user, with each question being based on a documented assertion pertaining to human health. Each question in the collection of questions is associated with a correlative health parameter that is based at least in part on (i) persons in a control population that have independent knowledge of an assertion that is a basis of that question, and (ii) a value of a predetermined health parameter for each person in the control population, the value of the predetermined health parameter for each person being indicative of that person's health. Based on data generated by one or more activity monitoring devices, questions from the collection are selected for display to the user. | 2016-05-19 |
20160140324 | DYNAMICALLY INFERRING VARIABLE DIMENSIONS IN USER-ADDED EQUATIONS - A processor executable method, system, and computer-readable media expedite the process of entering equations for use in developing simulations of chemical processes. The process of entering equations is expedited by dynamically inferring the dimensions of variables. The process infers the dimensions of all variables in user-added equations, and infers the dimensions of each variable in a user-added equation sequentially. The process automatically creates variables with unassigned dimensions in response to indications, such as inputs from a user, to declare new equations. The process assigns dimensions to variables based on relations between variables, such as logical relations between the dimensions of variables. | 2016-05-19 |
20160140325 | MOLECULAR ORBITAL LIBRARY HAVING EXCLUSIVE MOLECULAR ORBITAL DISTRIBUTION, MOLECULAR ORBITAL DISTRIBUTION REGION EVALUATION METHOD USING SAME, AND SYSTEM USING SAME - Disclosed herein are a method for constructing an extended R-MO library with mutually exclusive molecular orbital distribution, calculation method of molecular orbital distributing region and a system using the same. The molecular orbital distributing region estimation method using a molecular orbital library with a mutually exclusive orbital distribution can accurately molecular orbital distributing regions in a quantitative manner by means of an extended R-MO library that expresses intrinsic molecular distributing region properties in various patterns. In addition, the coverage of the quantitative molecular orbital distribution estimation method can be extended to the systemic utilization of molecular orbital information in developing materials. | 2016-05-19 |
20160140326 | SIMULATED CARBON AND PROTON NMR CHEMICAL SHIFTS BASED BINARY FINGERPRINTS FOR VIRTUAL SCREENING - The invention discloses a method to generate and analyze NMR chemical shift based binary fingerprints for virtual high throughput screening in drug discovery. Further, the invention provides a method to analyze NMR chemical shifts based binary fingerprints that has implications for encoding several properties of a molecule besides the basic framework or scaffold and determine its propensity towards a particular bioactivity class. | 2016-05-19 |
20160140327 | GENERATING DRUG REPOSITIONING HYPOTHESES BASED ON INTEGRATING MULTIPLE ASPECTS OF DRUG SIMILARITY AND DISEASE SIMILARITY - Various embodiments predict drug-disease associations. In one embodiment, a plurality of disease similarity matrices and a plurality of disease similarity matrices are accessed. Each of the plurality of drug similarity matrices is associated with a different drug information source. Each of the plurality of disease similarity matrices is associated with a different disease information source. A known drug-disease association matrix is also accessed. The known drug-disease association matrix indicates if a given drug identified is known to treat a given disease. At least one drug-disease association prediction is generated based on the plurality of drug similarity matrices, the plurality of disease similarity matrices, and the known drug-disease association matrix. The at least one drug-disease association prediction identifies a previously unknown association between a given drug and a given disease, and a probability that the given disease is treatable by the given drug. | 2016-05-19 |
20160140328 | APPLICATION OF DIGITAL RIGHTS MANAGEMENT TO EMAILS BASED ON USER-SELECTED EMAIL PROPERTY SETTINGS - A method for automatically applying digital rights management (DRM) to outgoing emails based on a color category of the email set by the sending user. A plugin module on the user's computer interacts with the email application to extract the color category setting for the email and converts it to a category ID recognized by the digital rights management (RMS) server. The RMS server determines the DRM policy corresponding to the category ID using an association table, and applies that DRM policy to protect the email before sending the email to an exchange server. When a recipient receives the email, the application program on the recipient's computer cooperates with the RMS server to determine whether the recipient is allowed to access the email based on the DRM policy that has been applied to the email. | 2016-05-19 |
20160140329 | ENHANCED SECURITY MECHANISM FOR AUTHENTICATION OF USERS OF A SYSTEM - A method and structure for authenticating users of a system that prevents theft of passwords and re-use of passwords. The method and structure use one-time passwords and a Secure CPU technology that cryptographically protects a software module known as a Secure Object from other software on a system. The method and structure generate and validate one-time passwords within Secure Objects and use a communications mechanism to securely communicate passwords or information used to generate passwords that makes use of cryptography and the protected and unprotected regions of a Secure Object to provide strong end-to-end security. | 2016-05-19 |
20160140330 | System And Method For Installing Authentication Credentials On A Network Device - A method for installing authentication credentials on a network device. An intermediary computing device (e.g., client computer) downloads an application for installing the authentication credentials from a secure website. The application on the intermediary computing device requests authentication credentials from a Network Access Control (NAC) credential service. The application passes the authentication credentials received from the NAC credential service through the intermediary computing device to an endpoint (e.g., video conferencing device). The application installs the authentication credentials on the endpoint. | 2016-05-19 |
20160140331 | Method and system for biometric identification and verification - Financial entities and other organizations that have customers who set up accounts with the entity are at risk of having people set up multiple accounts at different branches of an entity or at different entities and their different branches. Many of these accounts will be set up under different names and may use false identities. A single customer, often a Money Mule, will then have multiple accounts across multiple branches of multiple entities and will use the multiple accounts to facilitate the illegal transfer of funds from the customer accounts of the entity. The entities have no way of knowing that the person has set up multiple accounts under the same name or multiple accounts under various identities and is thus not equipped to prevent cybercrimes that use those multiple accounts. Using the biometric identification system and method described in this invention disclosure solves that problem for the participating entities. | 2016-05-19 |
20160140332 | SYSTEM AND METHOD FOR FEATURE-BASED AUTHENTICATION - A system and method for capturing an image of a user. An image is captured with a camera, wherein the image includes a user's image. A first avatar is displayed in a display, wherein displaying includes positioning an avatar in at least some of the user's image. The user is then encouraged to move so the first avatar moves to a second position in the display. | 2016-05-19 |
20160140333 | SYSTEMS AND METHODS FOR DIFFERENTIAL ACCESS CONTROL BASED ON SECRETS - Differential access to data for a user of a processor-based system is disclosed wherein the user may select one secret from among a plurality of secrets that allows and/or enables access to potentially different sets of data, different resources for accessing the data and/or different tasks for the user to interact with the system. The selection of any particular secret may arise as to the user's feeling as to how secure the environment is for accessing the data. For example, if the user is in a very secure environment, the user may select a secret that allows substantially broad access to data, resources and tasks. If the environment is not secure, or if the user is under duress, the user may select a secret that provides limited access, or a decoy set of data and/or may provide the user with access to defensive measures to protect the data. | 2016-05-19 |
20160140334 | Device Functionality Access Control Using Unique Device Credentials - Apparatus and method for controlling access to protected functionality of a data storage device. In some embodiments, a plurality of identification (ID) values associated with a data storage device are combined to form a combined ID value. The combined ID value is cryptographically processed using a secret symmetric encryption key in combination with a hash function or a key derivation function to generate a unique device credential for the data storage device. The unique device credential is used as an input to a selected cryptographic function to control access to a protected function of the data storage device. | 2016-05-19 |
20160140335 | ACCOUNT RECOVERY PROTOCOL - The present disclosure relates to receiving a request for recovery of an account associated with a user, sending a CAPTCHA challenge to a user device associated with the user, receiving an answer to the CAPTCHA challenge and a confirmation code wrapped by an encryption key derived from a provisional master password, sending a notification of the request for recovery to one or more trusted entities associated with the user, and receiving a confirmation of the request from one or more of the trusted entities. The confirmation includes a recovery token associated with the particular trusted entity and an encrypted confirmation code. | 2016-05-19 |
20160140336 | Password Generator - Methods and apparatus are disclosed for generating a short term password that may be used to access a data warehouse. According to aspects of the disclosure, a user may request a password after inputting a data warehouse environment, an ID name, and a reason for the password reset. A server may receive the request and determine whether the difference in time of the present request and a previous request for the same ID name and data warehouse environment is greater than a time limit. Additionally, the server may determine whether a previous user has logged in using a password for the same ID name and data warehouse environment. Thereafter, the server may generate and output a short term password that expires after the time limit. | 2016-05-19 |
20160140337 | System to Create Mobile Digital Identifier - A method, system and computer-usable medium are disclosed for producing a digital identifier. A set of design elements are selected for inclusion in the digital identifier, followed by the selection of an associated digital identifier template and a set of user credentials. The selected design elements, template and user credentials are then used to produce the digital identifier. | 2016-05-19 |
20160140338 | DYNAMIC RENDERING OF A DOCUMENT OBJECT MODEL - The present application relates to a computer having a processor configured to execute a set of instructions to render a customised version of a restricted document object model. A restricted element in a document object model is identified and at least one rule associated with the restricted element is accessed. The at least one rule is applied to the restricted element to generate a modified document object model which is then rendered. A related computer-implemented method is also covered by the present application. The present application relates to server-side authentication techniques; content filtering based on user-specific and context-based requirements; and audit trail techniques. | 2016-05-19 |
20160140339 | METHOD AND APPARATUS FOR ASSEMBLING COMPONENT IN ROUTER - A method and apparatus for assembling a component in a router are provided. The router includes at least one reconfigurable component, the at least one reconfigurable component has a unique function, the method includes: obtaining attribute information of the at least one reconfigurable component in the router, wherein the attribute information comprises information on an importance and/or a using frequency of the at least one reconfigurable component in the router; coding the at least one reconfigurable component based on Huffman Coding to generate a Huffman code according to the attribute information of the at least one reconfigurable component; selecting the at least one reconfigurable component, and assembling the selected reconfigurable component to realize a routing function and to form an assembly code; and generating a routing paradigm table according to a user security requirement and the assembly code, such that the router performs the routing function according to the routing paradigm table. | 2016-05-19 |
20160140340 | SIDE-CHANNEL LEAKAGE EVALUATOR AND ANALYSIS KIT - A method for analyzing side-channel leakage of an application running on a device including loading the application on a system comprising a device simulator, wherein the application is configured to accept public inputs and secret inputs and selecting a set of public inputs. The method includes, for each public input in the set of public inputs, executing the application on the system comprising the device simulator based on a respective public input and a first value for a secret input and extracting first intermediate values for the simulated device, and executing the application on the system based on the respective public input and a second value for the secret input and extracting second intermediate values for the simulated device. The method includes determining an amount of dependency of a location of the simulated device on the secret input based on a plurality of the first and second intermediate values. | 2016-05-19 |
20160140341 | SYSTEMS AND METHODS FOR INCREASING SECURITY SENSITIVITY BASED ON SOCIAL INFLUENCE - Systems, methods, and non-transitory computer-readable media can provide a set of security features capable of being enabled by a user associated with an online service. In some implementations, it can be determined that at least one security feature in the set has yet to be enabled by the user. A communication can be provided to the user. In some instances, the communication can indicate that a quantity of social connections associated with the user has already enabled the at least one security feature. One or more options to enable the at least one security feature can be provided to the user. | 2016-05-19 |
20160140342 | METHOD FOR INDICATING OPERATING ENVIRONMENT OF MOBILE DEVICE AND MOBILE DEVICE CAPABLE OF INDICATING OPERATING ENVIRONMENT - The invention discloses a method for indicating an operating environment of a mobile device and a mobile device capable of indicating an operating environment. The method comprises the following steps: generating personalized information and storing the personalized information in a storage area that can be only accessed by a secure operating system, and displaying the personalized information on a display area of the mobile device when the mobile device enters the secure operating system so as to inform the user of the currently running operating system | 2016-05-19 |
20160140343 | Secure Creation of Encrypted Virtual Machines from Encrypted Templates - Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further includes the target machine determining that it needs provisioning data to continue booting. The target machine contacts a secure infrastructure to obtain the provisioning data. The target machine provides an identity claim that can be verified by the secure infrastructure. As a result of the secure infrastructure verifying the identity claim, the target machine receives a request from the secure infrastructure to establish a key sealed to the target machine. The target machine provides the established key to the secure infrastructure. The target machine receives the provisioning data from the secure infrastructure. The provisioning data is encrypted to the established key. The target machine decrypts the encrypted provisioning data, and uses the provisioning data to finish booting. | 2016-05-19 |
20160140344 | SECURITY INFORMATION MANAGEMENT SYSTEM AND SECURITY INFORMATION MANAGEMENT METHOD - In a security information management device, security information, which is information related to security, is collected. The security information management device extracts, by referring to a security dictionary storing therein a keyword related to security for each attribute, a keyword from referer security information that becomes a source to be compared with security information for relevance thereto, and calculates, by comparing the extracted keyword with a keyword included in the collected security information, relevance between the referer security information and the security information. The security information management device then output security information having higher calculated relevance more preferentially. | 2016-05-19 |
20160140345 | INFORMATION PROCESSING DEVICE, FILTERING SYSTEM, AND FILTERING METHOD - An information processing device includes a processor configured to generate one or more sets of data corresponding to information about a testing method set in advance, to input the sets of generated data into a test device, to identify sets of data making the test device exhibit predetermined behavior, among the sets of generated data, and to refer to information common among the sets of identified data, to aggregate the sets of generated data. | 2016-05-19 |
20160140346 | DATA CONCEALMENT APPARATUS AND METHOD USING AN ERROR CORRECTION CODE - Disclosed are a data concealment apparatus and a data concealment method using an Error Correction Code. According to exemplary embodiments of the present invention, it is possible to prevent important information from being easily exposed to a third person by generating encoding data through convolution encoding of input data and thereafter, concealing the encoding data on an image through adjustment of a pixel value on the image and minimize an error which can occur at the time of recovering the input data by extracting the encoding data from the image in a soft decision scheme and performing Viterbi-decoding on the extracted encoding data in order to recover the input data concealed in the image. | 2016-05-19 |
20160140347 | AUTOMATICALLY GENERATE ATTRIBUTES AND ACCESS POLICIES FOR SECURELY PROCESSING OUTSOURCED AUDIT DATA USING ATTRIBUTE-BASED ENCRYPTION - Methods, systems, and computer-readable storage media for secure storage of and selective access to encrypted audit data. Implementations include actions of receiving a set of audit data in response to occurrence of an incident, determining a set of static audit data and a set of dynamic audit data based on the set of audit data, encrypting items in the set of static audit data using a first attribute-based encryption scheme to provide a set of encrypted static audit data, and items in the set of dynamic audit data using a second attribute-based encryption scheme to provide a set of encrypted dynamic audit data, and transmitting the set of encrypted static audit data and the set of encrypted dynamic audit data to an off-premise database for storage and selective access. | 2016-05-19 |
20160140348 | SYSTEM AND METHOD FOR MATCHING DATA SETS WHILE MAINTAINING PRIVACY OF EACH DATA SET - A system and method that allows two parties to find common records in their data sets without having to actually share the data sets with each other or a third party. Two primitives, perfect hash functions and public key cryptography, are combined in a unique way to obtain a secure and efficient private matching solution. Since the data that is exchanged is always encrypted during the match process, neither party reveals its data to the other party. This solution enables two parties to match sensitive data such as PII (Personally Identifiable Information) or PHI (Protected Health Information) without having to disclose the data to other or to any third party. One or both of the parties only learn of matching records without learning any information about the records that do not match. | 2016-05-19 |
20160140349 | SYSTEMS AND METHODS FOR ENCRYPTING INFORMATION DISPLAYED ON A USER INTERFACE OF A DEVICE - Embodiments of the present disclosure relate to a device having a display component that displays encrypted information. In an embodiment, a system includes a user interface of a device comprising a display module, wherein the user interface receives information entered by a user of the device. The system also includes a detector that detects surroundings around the device or the user of the device. The system further includes at least one hardware processor in communication with the user interface and the detector that automatically encrypts all or portions of the information based on the detected surroundings and causes the automatically encrypted information to be displayed on the display module. | 2016-05-19 |
20160140350 | METHOD OF SECURING IMAGE DATA AND ELECTRONIC DEVICE ADAPTED TO THE SAME - An electronic device and method is disclosed herein. The electronic device may include a memory configured to store image data including at least one object, user identification information, and a specific object mapped to the user identification information, and a processor. The processor may execute the method, including extracting an object from the image data, determining whether the extracted object matches the specific object, if the extracted object matches the specific object, encrypting the image data using the user identification information mapped to the specific object as an encryption key, and storing the encrypted image data in the memory. | 2016-05-19 |
20160140351 | VALIDATING USER CONTROL OVER CONTACT INFORMATION IN A DOMAIN NAME REGISTRATION DATABASE - An example embodiment of a method and system of validating a user's control over contact information may comprise at least one server computer receiving contact information for a user and determining whether the contact information for the user is valid. If the contact information for the user is determined to be valid, the server computer(s) may store the contact information in a registered contacts database, monitor a plurality of record updates, including a request to register a domain name, in a domain name registration database for the contact information and determine whether the contact information appears in the record updates. If the contact information is determined to appear in the record updates, the server computer(s) may notify the user that the contact information appears in the record updates. In some embodiments, the registration of the domain name may be declined if the information matches. | 2016-05-19 |
20160140352 | COMMUNICATING DATA BETWEEN CLIENT DEVICES USING A HYBRID CONNECTION HAVING A REGULAR COMMUNICATIONS PATHWAY AND A HIGHLY CONFIDENTIAL COMMUNICATIONS PATHWAY - A technique communicates data between a first client device and a second client device. The technique involves establishing a regular communications pathway from the first client device to the second client device through a communications server, and establishing a highly confidential communications pathway from the first client device to the second client device. The highly confidential communications pathway circumvents the communications server. The technique further involves, after the regular communications pathway and the highly confidential communications pathway are established, conveying highly sensitive information from the first client device to the second client device only through the highly confidential communications pathway to avoid exposing the highly sensitive data to the communications server through the regular communications pathway. | 2016-05-19 |
20160140353 | METHOD AND APPARATUS FOR PROTECTING LOCATION DATA EXTRACTED FROM BRAIN ACTIVITY INFORMATION - An approach is provided for protecting location data extracted from brain activity information. A privacy platform causes, at least in part, a mapping of brain activity information associated with at least one user to one or more locations visited by the at least one user. The privacy platform further determines one or more privacy policies associated with the one or more locations. The privacy platform then causes, at least in part, a transmission of at least the brain activity information, the one or more locations, or a combination thereof based, at least in part, on the one or more privacy policies. | 2016-05-19 |
20160140354 | DBFS PERMISSIONS USING USER, ROLE, AND PERMISSIONS FLAGS - A method for authenticating file operations on files and folders stored in a database file system where the database file system can authenticate a client-user request based upon the client-user's database credentials. The database file system has the capability of storing file permissions based on database credentials. Once a client requests a certain file operation, the client's operating system first determines whether the client has sufficient privileges to perform the requested file operation. If the client has privileges, the client operating system forwards the file operation request to the database file system. The database file system then authenticates the client, based on his database credentials, to determine whether or not to perform the requested file operation. | 2016-05-19 |
20160140355 | USER TRUST SCORES BASED ON REGISTRATION FEATURES - User trust scores based on registration features is described. A system identifies registration features associated with a user registered to interact with a database. The system calculates a registration trust score for the user based on a comparison of multiple registration features associated with the user to corresponding registration features associated with previous users who are restricted from interacting with the database and/or corresponding registration features associated with previous users who are enabled to interact with the database. The system restricts the user from interacting with the database if the registration trust score is above a registration threshold. | 2016-05-19 |
20160140356 | SECURE DATA STORAGE DEVICE AND DATA WRITING AND READ METHODS THEREOF - A secure data storage device for preventing tampering with data stored thereon includes a two-dimensional memory array for storing data, the array includes a predetermined number of data words. Each data word includes a set of bits, and is associated with a single physical address in the memory array. A key storage area for storing a key of the data storage device is included in the device. The secure data storage device includes an address conversion unit configured to convert a logical address to a corresponding physical address which points to a location in the memory array. The device includes a bit mixing unit for mixing bit values of an input data word to obtain a mixed word value, such that the mixed word value is a rearrangement of the bit values of the input data word. The device is electrically connectable to a host. | 2016-05-19 |
20160140357 | SECURITY METHOD AND APPARATUS TO PREVENT REPLAY OF EXTERNAL MEMORY DATA TO INTEGRATED CIRCUITS HAVING ONLY ONE-TIME PROGRAMMABLE NON-VOLATILE MEMORY - A method for generating a secure nonce using a one-time programmable (OTP) memory within an integrated circuit to provide persistence, the method including randomly selecting k currently-unprogrammed bits in the OTP memory, creating a data set using data derived from current contents of the OTP memory altered by changing the states of the k currently-unprogrammed bits of the OTP memory, and employing as the secure nonce the data set or data derived from the data set. The selected k bits are programmed in the OTP memory. | 2016-05-19 |
20160140358 | TERMINAL DEVICE, METHOD FOR PROTECTING TERMINAL DEVICE, AND TERMINAL MANAGEMENT SERVER - A terminal device includes: a memory unit to store a lock program for locking the terminal device; a condition checking unit to determine whether the terminal device is in a state of a preset condition for terminal protection when the lock program is executed; a lock control unit to allow the terminal device to be locked by the lock program when the terminal device is determined to be in a state of the preset condition for terminal protection; and a information deleting unit to delete an unlock key for use in unlocking the locked terminal device from the memory unit after the terminal device is locked. | 2016-05-19 |
20160140359 | SYSTEM AND METHOD FOR DISTRIBUTED COMPUTATION USING HETEROGENEOUS COMPUTING NODES - This disclosure relates generally to the use of distributed system for computation, and more particularly, relates to a method and system for optimizing computation and communication resource while preserving security in the distributed device for computation. In one embodiment, a system and method of utilizing plurality of constrained edge devices for distributed computation is disclosed. The system enables integration of the edge devices like residential gateways and smart phone into a grid of distributed computation. The edged devices with constrained bandwidth, energy, computation capabilities and combination thereof are optimized dynamically based on condition of communication network. The system further enables scheduling and segregation of data, to be analyzed, between the edge devices. The system may further be configured to preserve privacy associated with the data while sharing the data between the plurality of devices during computation. | 2016-05-19 |
20160140360 | SYSTEM AND METHOD FOR NETWORK ADMINISTRATION AND LOCAL ADMINISTRATION OF PRIVACY PROTECTION CRITERIA - Cookie files are screened in a client machine, wherein a cookie file includes a cookie file source. A request from a subscriber is received at a server to send a list of untrusted cookie file sources to the client machine. The list of untrusted cookie file sources is downloaded from the server to the client machine. The downloaded list of untrusted cookie file sources is used to detect cookie files received at the client machine from cookie file sources on the downloaded list by comparing the cookie file source of any received cookie file to the untrusted cookie file sources on the downloaded list. | 2016-05-19 |
20160140361 | METHODS FOR ANTI-FRAUD MASKING OF A UNIVERSAL RESOURCE INDENTIFIER ("URI') - Methods may display a URI of a resource. Methods may determine the presence of a non-public data element in the URI. Methods may generate a random number in response to the determination of the presence of the non-public data element. Methods may compute a resultant number based on the exclusive or of the random number and the non-public data element. Methods may substitute the resultant number for the non-public data element in the URI. Methods may transmit the URI and the random number to a server. Methods may receive a resource from the server, in response to the transmission of the URI and the random number to the server. Methods may compute the non-public data element using the random number and the resultant number. Methods may substitute the non-public data element for the resultant number in the URI. Methods may re-determine the URI of the resource. | 2016-05-19 |
20160140362 | HEALTHCARE AS A SERVICE - DOWNLOADABLE ENTERPRISE APPLICATION - An application as a service provided in a secure environment. A sandbox in a user's computing environment may be created. An application may be downloaded to the user's computing environment to run within the sandbox. Data sources associated with the user's computing environment may be searched and connectivity established with data registry of the data sources based on data description received with the application. The application may be run within the sandbox using the established connectivity. Metering may be performed to monitor usage of the application at the user's computing environment. | 2016-05-19 |
20160140363 | PROGRAMMABLE UNIT FOR METADATA PROCESSING - A system and method for metadata processing that can be used to encode an arbitrary number of security policies for code running on a stored-program processor. This disclosure adds metadata to every word in the system and adds a metadata processing unit that works in parallel with data flow to enforce an arbitrary set of policies, such that metadata is unbounded and software programmable to be applicable to a wide range of metadata processing policies. This instant disclosure is applicable to a wide range of uses including safety, security, and synchronization. | 2016-05-19 |
20160140364 | SECURE CONTROL OF SELF-ENCRYPTING STORAGE DEVICES - Generally, this disclosure provides systems, devices, methods and computer readable media for secure control of access control enablement and activation on self-encrypting storage devices. In some embodiments, the device may include a non-volatile memory (NVM) and a secure access control module. The secure access control module may include a command processor module configured to receive a request to enable access controls of the NVM from a user, and to enable the access controls. The secure access control module may also include a verification module configured to verify a physical presence of the user. The secure access control module may further include an encryption module to encrypt at least a portion of the NVM in response to an indication of success from the verification module. | 2016-05-19 |
20160140365 | CARD READER AND DETECTION MECHANISM - A card reader which is attached and used in a host device may include a detection switch disposed on the card reader side attaching face and structured to detect whether the card reader has been detached from the host device; and a first sealing member disposed so as to be sandwiched between the host device side attaching face and the detection switch, the first sealing member covering the detection switch and being structured to prevent penetration of water to the detection switch. The detection switch may include a pressed part and is structured to turn to “ON” or “OFF” when the pressed part is pressed. The first sealing member may be formed with a pressing protruded part structured to press the pressed part. | 2016-05-19 |
20160140366 | CARD READER AND CONTROL METHOD THEREFOR - Provided is a card reader that accepts and processes the short side of a substantially rectangular IC card conforming to international and JIS standards, said card reader being capable of easily determining whether or not the orientation of the inserted IC card is correct. This card reader comprises: an insertion port wherein a card having a built-in IC chip is inserted; a metal detection mechanism for detecting an external connection terminal of the IC chip formed in the card; and a tip detection mechanism for detecting the tip, in the insertion direction, of the card inserted from the insertion port. In this card reader, the metal detection mechanism and the tip detection mechanism are provided such that, when the tip detection mechanism detects the tip, in the insertion direction, of the card inserted in the correct orientation from the insertion port, the metal detection mechanism is arranged at a position that detects the external connection terminal. | 2016-05-19 |
20160140367 | Automated Tracking And Identification In A Crop Production Cycle - An improved system for tracking the application of crops and field amendments being applied to fields is disclosed. A series of passive communication devices are included in products being applied to the field. As seed and other products are supplied to the field, the passive communication devices are delivered to the field as well A reader is mounted to the agricultural vehicle and is in communication with the passive devices to read data stored on each device. The data may include the type and variety of product in which the passive devices were supplied. A controller on the vehicle receives data from the reader to identify what product has been applied to the field. The controller may store data on any additional product subsequently applied to the field and/or may verify that subsequent product is acceptable for application to a crop in the field prior to application. | 2016-05-19 |
20160140368 | RFID TAG AND RFID SYSTEM - An RFID tag includes a base part, a loop antenna around the base part including a first antenna element and a second antenna element, and a loop-length shorter than a wavelength of a resonant frequency, and an IC chip at a first surface side of the base part. The IC chip is connected between a first terminal disposed on a first end of the first antenna element and a second terminal disposed on a first end of the second antenna element. The loop antenna includes an overlapping part at a second surface side of the base part, and a capacitance of the overlapping part is adjusted such that a difference between an imaginary component of a first synthetic impedance and an imaginary component of a second synthetic impedance is less than or equal to a predetermined value. | 2016-05-19 |
20160140369 | BARCODE READER AND ACCESSORY FOR THE BARCODE READER - A barcode reader and an accessory are disclosed. A barcode reader may include an interface for communication with a host computer via a wireless or wired link and an authentication system to establish mutual authentication with the host computer. The barcode reader may include a connector for connecting the barcode reader to the external power source or the host computer. The connector may be a combined power and data connector. An accessory may provide operating power to a barcode reader and provide decoded data of an image of a barcode received from the barcode reader to a host computer. The accessory may include connectors and an interface system. The interface system may include a processor configured to send the decoded data to the host computer, an authentication system, and a power interface. The accessory may include RF circuits for communicating with the host computer via a wireless link. | 2016-05-19 |
20160140370 | BARCODE READER AND ACCESSORY FOR THE BARCODE READER - A barcode reader and an accessory are disclosed. The accessory may include an interface system and a wireless and/or wired interface for communication with a host computer such that the barcode reader may communicate with the host computer via the accessory. The interface system includes an authentication coprocessor such that the barcode reader may establish mutual authentication with the host computer using the authentication coprocessor of the interface system. The barcode reader may send a request for an accessory identifier, and the accessory may then query the authentication coprocessor for the accessory identifier and provide the accessory identifier to the barcode reader. The barcode reader may send an authentication challenge to the accessory, and the accessory may then present the authentication challenge to the authentication coprocessor to obtain an authentication response, and provide the authentication response to the barcode reader. | 2016-05-19 |
20160140371 | BARCODE READER AND ACCESSORY FOR THE BARCODE READER - A barcode reader and an accessory are disclosed. The accessory may include an interface system and a wireless and/or wired interface for communication with a host computer such that the barcode reader may communicate with the host computer via the accessory. The interface system includes an authentication coprocessor such that the barcode reader may establish mutual authentication with the host computer using the authentication coprocessor of the interface system. The barcode reader may send a request for an accessory identifier, and the accessory may then query the authentication coprocessor for the accessory identifier and provide the accessory identifier to the barcode reader. The barcode reader may send an authentication challenge to the accessory, and the accessory may then present the authentication challenge to the authentication coprocessor to obtain an authentication response, and provide the authentication response to the barcode reader. | 2016-05-19 |