28th week of 2015 patent applcation highlights part 38 |
Patent application number | Title | Published |
20150193529 | OPINION ANALYZING SYSTEM AND METHOD - Provided are an opinion analyzing system and method that analyze an opinion change based on an elapse of time and provide an analysis result. The opinion analyzing system includes a user terminal configured to transmit an opinion analysis request signal including an opinion analysis target keyword and analysis target period information, and an opinion analyzing server configured to, when the opinion analysis request signal is received from the user terminal, collect text information including the opinion analysis target keyword from a database according to the opinion analysis request signal, and analyze the collected text information to generate a summary text of an opinion. | 2015-07-09 |
20150193530 | Methods and Systems for Clustering Emails Using Email Addresses - A computer-implemented method of automatically organizing email messages is performed at a computer system. In the method, a plurality of email messages is accessed. A set of email addresses included in the email messages is identified, respective weights are assigned to respective email addresses in the set of email addresses, and the plurality of email messages is divided into clusters in accordance with the respective weights. Email messages of the plurality of email messages are provided for display, organized by the respective clusters. | 2015-07-09 |
20150193531 | MODELING AND VISUALIZING LEVEL-BASED HIERARCHIES - Flexibly modeling and visualizing a level-based hierarchy. A first level set and a second level set are identified from a first data set and a second data set in a first domain and a second domain, respectively. A first relationship type to be used between the first level set and the second level set is received. A first hierarchy is formalized, including at least the first level set and the second level set joined in a hierarchical relationship according to the first relationship type. | 2015-07-09 |
20150193532 | LABELING/NAMING OF THEMES - By formulizing a specific company's internal knowledge and terminology, the ontology programming accounts for linguistic meaning to surface relevant and important content for analysis. The ontology is built on the premise that meaningful terms are detected in the corpus and then classified according to specific semantic concepts, or entities. Once the main terms are defined, direct relations or linkages can be formed between these terms and their associated entities. Then, the relations are grouped into themes, which are groups or abstracts that contain synonymous relations. The disclosed ontology programming adapts to the language used in a specific domain, including linguistic patterns and properties, such as word order, relationships between terms, and syntactical variations. The ontology programming automatically trains itself to understand the domain or environment of the communication data by processing and analyzing a defined corpus of communication data. | 2015-07-09 |
20150193533 | Finding Data in Connected Corpuses Using Examples - In one embodiment, datasets are stored in a catalog. The datasets are enriched by establishing relationships among the domains in different datasets. A user searches for relevant datasets by providing examples of the domains of interest. The system identifies datasets corresponding to the user-provided examples. The system them identifies connected subsets of the datasets that are directly linked or indirectly linked through other domains. The user provides known relationship examples to filter the connected subsets and to identify the connected subsets that are most relevant to the user's query. The selected connected subsets may be further analyzed by business intelligence/analytics to create pivot tables or to process the data. | 2015-07-09 |
20150193534 | SYSTEMAND METHOD FOR GENERATING MEDIA THUMBSCAPES - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a visualization of video content. The method includes receiving video content, receiving user input associated with the received video content, extracting each frame in the video content, processing the extracted frames based on the received user input, and outputting a still image including each of the processed extracted frames positioned sequentially. The still image can include a histogram of sound data associated with the processed extracted frames. The user input can indicate an image adjustment to be applied when processing the extracted frames, a number of frames of video content per column, a paper size, and/or a frame size. The frames can be positioned sequentially in columns and/or rows. The image can be output as an image file or on a printable medium. The image can contain more than one video clip, such as films in a trilogy. | 2015-07-09 |
20150193535 | IDENTIFYING INFLUENCERS FOR TOPICS IN SOCIAL MEDIA - A computer determines social media influencers in a specific topic. The computer receives a dataset of information on a website, the information including a list of users of the website and a list of content that each user posts, wherein each user is associated with one or more other users. The computer identifies a plurality of variables associated with the dataset, wherein the plurality of variables represent the information of the dataset on the website. The computer executes a topic specific search based on the plurality of variables, the topic search providing at least another list of users representing influencers in a specific topic. | 2015-07-09 |
20150193536 | Methods, Systems, and Products for Assessing Risks of Internet Searches - A risk associated with an Internet search is determined. Once a search result of the Internet search has been obtained, the risk is determined based on the search result. | 2015-07-09 |
20150193537 | NAVIGATION THROUGH A COLLECTION OF ELECTRONIC DOCUMENTS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for improving navigation through an electronic document collection. In one aspect, an apparatus includes a search engine system comprising a communication interface in data communication with a client terminal, a database persistently storing information characterizing electronic documents available on the Internet, a search constraint setting database persistently storing information characterizing settings for supplemental searches, and a search engine programmed to perform, in response to receipt of the information characterizing the entities named in the electronic document displayable at the client terminal, supplemental searches on the database to identify a responsive subset of the electronic documents available on the Internet. The supplemental searches are constrained by at least one of the named entities and the supplemental search settings stored at the search constraint setting database. | 2015-07-09 |
20150193538 | SYSTEM AND METHOD FOR RECOMMENDING TELEVISION PROGRAMS BASED ON USER SEARCH QUERIES - A computer implemented method for recommending television programs based on search queries. The method is performed at a server, the server including a plurality of processors and storage and having access to a database of television program related information. The server receives from an electronic device search terms during a time window. The server determines one or more categories of interest associated with the received search query. The server then determines, in accordance with a location associated with the electronic device and the categories determined to be of interest in accordance with the received search query, at least one television program from a plurality of television programs available during the time window. The server then sends a recommendation to the electronic device to view the determined television program, in accordance with a determination that at least one television program is available and is sufficiently related to the determined categories of interests. | 2015-07-09 |
20150193539 | OBJECT RECOMMENDATION BASED UPON SIMILARITY DISTANCES - Exemplary methods, apparatuses, and systems receive a candidate object with which a user can interact within a network service. For each of a first plurality of objects with which the user has had a positive interaction, a first value representing a commonality between the candidate object and each of the first plurality of objects is determined. For each of a second plurality of objects with which a user has had a negative interaction, a second value representing a commonality between the candidate object and each of the second plurality of objects is determined. An aggregate positive distance is determined using a plurality of the first values. An aggregate negative distance is determined using a plurality of the second values. The candidate object is displayed or not displayed to the user as a recommendation based upon a difference between the aggregate positive distance and the aggregate negative distance. | 2015-07-09 |
20150193540 | CONTENT RANKING BASED ON USER FEATURES IN CONTENT - Methods, systems, and computer programs are presented for providing a personalized news stream to a user. One method includes an operation for identifying user features associated with a user. The user features include personal features and social features. The personal features are based on activities of the user and the profile of the user. The social features are based on information about social connections of the user. The method further includes operations for extracting content features from a corpus of content items, for identifying intersections between user features and content features, and for assigning weights to the content features from the corpus based on the identified intersections. A score for each content item is determined based on the content features and the respective weights of the content items. The content items are then ranked based on the scores. One or more of the ranked content items are displayed. | 2015-07-09 |
20150193541 | QUERY DATA SPLITTING - Implementations for query data splitting are disclosed. In one example, the method includes receiving, by a processing device, a first query and a second query, determining that the second query is a subset of the first query, determining a first set of attributes associated with the first query and a second set of attributes associated with the second query, and determining, by the processing device, whether to submit the second query or the first query to a database in view of the first set of attributes and the second set of attributes. | 2015-07-09 |
20150193542 | RESULT PROMINENCE IN SEARCH - Architecture that computes a definitive answer to a user's top intent of a search query, and positions the top intent answer in a prominent way and at a prominent location of a results page or other search user interface, where the user is most likely to see the top intent answer in an expeditious manner. This may be at the top-most position of the page, above the search results and advertisements, but below the page header and search box. Additionally, the definitive and prominently-placed answer can be presented with an interactive, animated, and/or visually rich element that supplements the original intent. The top intent location can be the boldest element on the page, extend at least one full dimension of the page, use larger fonts and bolder colors than the rest of the search results, and which makes finding the answer easier and faster for the user to locate. | 2015-07-09 |
20150193543 | INTEREST PROFILE OF A USER OF A MOBILE APPLICATION - A method and electronic device are disclosed. A user is the user of at least one application executable on or accessible via an electronic device. The at least one application is executable to communicate with a check-in service configured to receive check-in data comprising identification data of the user, location data of a venue for which the user is able to perform a check-in event via said application or said service, and time data for the check-in event indicative of when the check-in event took place. The check-in data is obtained and then analyzed to identify at least one activity taking place within the given geographical area and at least one corresponding venue within the given geographical area. Said at least one corresponding venue with regard to the corresponding at least one activity is categorized. The interest profile is generated or amended by the user based on the step of analysing. Said interest profile comprises data of the user's interaction with the at least one activity corresponding to the at least one venue. | 2015-07-09 |
20150193544 | SYSTEM AND METHOD FOR SCORING FACTORS FOR CUSTOMER RELATIONSHIP MANAGEMENT RECORDS - In an example, a processing system of a database system may be configured to cause a user system that is coupled to the database system over a network to display a list of a plurality of factors from which the processing system derived a first value of a customer relationship management record. The processing system may be configured to determine whether a person selects a factor of the list. The processing system may be configured to deriving a second value that is different than the first value from at least a subset of the plurality of factors in response to determining that the person selects the factor from the list. The processing system may perform at least one of causing the second value to be displayed on the user system or retaining an association of the second value to the customer relationship management record. | 2015-07-09 |
20150193545 | SYSTEM AND METHOD OF DATA COMPRESSION - This disclosure relates to systems and methods for adaptively compressing data based on compression parameters. In one embodiment, a method for compressing a dataset is disclosed, including filtering a dataset based on occurrence of an event, and determining a quality of information index indicating a measure of quality of the dataset based on a quality of information estimation function. The method may include comparing the quality of information index with a list of indices stored in a lookup table to identify a target quality of information index and corresponding compression parameters, wherein the target quality of information index is indicative of a reference measure of quality of the dataset applicable for deriving statistical inferences based on analysis of the dataset. Also, the method may include inputting the compression parameters in a compression algorithm for compressing the dataset to achieve the target quality of information index for the analysis. | 2015-07-09 |
20150193546 | Searching and Accessing Application Functionality - A method includes receiving, at a computing device, search results transmitted from a search system in communication with the computing device. The search results include a header for an application executable on the computing device and application access mechanisms associated with the header. Each application access mechanism has a reference to the application and indicates one or more performable operations for the application. The method further includes displaying, on a display in communication with the computing device, a graphical user interface including the header and user selectable access links grouped with the header. Each access link is associated with an application access mechanism for the application. | 2015-07-09 |
20150193547 | ACCESS TO NETWORK CONTENT - A method and system for improving access to network content are described. Aspects of the disclosure minimize the delay between a navigation event and a network response by prerendering the next navigation event. For example, the method and system may predict a likely next uniform resource locator during web browsing to preemptively request content from the network before the user selects the corresponding link on a web page. The methods and systems describe a variety of manners for prerendering content and managing and configuring prerendering operations. | 2015-07-09 |
20150193548 | Recommendation System With Metric Transformation - Example apparatus and methods transform a non-metric latent space produced by a matrix factorization process to a higher dimension metric space by applying an order preserving transformation to the latent space. The transformation preserves the order of the results of an inner product operation defined for the latent space. The higher dimension metric space may be queried for the results to different requests. Example apparatus and methods may assign every user i a vector u | 2015-07-09 |
20150193549 | HISTORY AS A BRANCHING VISUALIZATION - Architecture that enables the visualization of history data of a prior content (or document) navigation session in a user interface (UI), the session presented as a structure of nodes and branches between the nodes that represent the paths navigated by the user during the session. The user can then choose to go back to a previous state of the session via the structure, and then take another route. This capability enables the user to more effectively revisit a decision-making process at least with respect to retracing navigation over numerous documents. The history data of a prior navigation session is presented to the user as a graphical view structured as a branching visualization of the nodes and node branches. The user can interact with the graphical view to move forward and backward in the time span of the session and retrieve the document as any given point in the previous session. | 2015-07-09 |
20150193550 | PRESENTING TAGS OF A TAG CLOUD IN A MORE UNDERSTANDABLE AND VISUALLY APPEALING MANNER - A method, system and computer program product for presenting tags of a tag cloud in a more understandable and visually appealing manner. Tags of a tag cloud that are associated with an object (e.g., web page) are retrieved. The retrieved tags are then assigned to parts of speech (e.g., noun, verb, adjective, adverb). Combinations of the tags are then generated based on the parts of speech assigned to the tags. For example, the combinations of the tags may be based on a template, such as , , is and so forth. The combinations of the tags are then presented after determining the layout to display the generated combinations of tags. Since the tags of the tag cloud are presented in a combination based on the parts of speech assigned to the tags, the tag cloud is more understandable and visually appealing. | 2015-07-09 |
20150193551 | SYSTEM AND METHOD FOR FACILITATING RESEARCH COLLABORATION CROSS REFERENCE - A system and method for facilitating research collaboration is disclosed. The invention provides an interface configured for enabling the potential research collaborations from the web based resource on the basis of social network aspect and data parameters etc. The present invention further provides a facility of creating a structured database for the collaborated research study with automated outputs for collaborating members. The present invention also enables the user to evaluate, monitor the data and to generate a research study output at any point of time. | 2015-07-09 |
20150193552 | GENERATION OF MULTI-FACETED SEARCH RESULTS IN RESPONSE TO QUERY - Aspects retrieve, organize and display different classifications of sets of search results in different, respective tabbed sheets that are nested on top of one another in a web-based interface dashboard. A text string search query is classified into constituent primary search terms that are likely to return satisfactory search results as indicated by retrieved search history data as a function of search resources and language classification rules associated with the user identity indicia. Secondary search terms related to the primary search terms and including synonyms and antonyms are determined as substitutes for the primary search terms in response to search history indicating follow-up searches immediately subsequent to searches of the primary search terms at less than a specified threshold of frequency. The set of peripheral knowledge article results is generated by searching knowledge article resources for background information on the primary search terms or the secondary search terms. | 2015-07-09 |
20150193553 | SYSTEMS AND METHODS FOR PROCESSING MACHINE READABLE CODES BY A LOCKED DEVICE - The disclosed technology includes automatically activating an image capture device responsive to determining that a mobile device in a restricted access state (e.g., a locked mobile device), is being held by a user. The image capture device may take pictures and the mobile device may determine whether the pictures contain a readable code, such as a QR Code or foreign text. Responsive to determining the pictures contain a readable code, the mobile device may process the readable code and display an indication of the readable code, for example, a decoded URL or translated text. In some implementations, the mobile device may automatically exit the restricted access state responsive to detecting or resolving a readable code and launch a corresponding application for viewing the indication of the readable code. In another implementation, the mobile device may wait for an authentication pattern or other confirmatory user input, before exiting the restricted access state and displaying the indication of the readable code. | 2015-07-09 |
20150193554 | SYSTEM AND METHOD FOR SELECTING INFORMATION FOR DISPLAY - A system and method is provided that automatically predicts the link that a user would like to follow by collecting and modeling user actions, and navigates to the link. In one aspect, the system may store a history of the user's manipulation of a browser's user interface, and predict the link of greatest interest to the user by comparing the visual similarity of potential links with previously selected and non-selected links, and estimating the location of the screen that the user is currently viewing. | 2015-07-09 |
20150193555 | Method and device for pushing media information in real time - It is described a method for pushing media information in real time, where information of user focus on a current page is determined, a keyword is searched for according to the information of user focus, and media information matching the found keyword is pushed in real time. It is also described a device for pushing media information in real time. With what described, it is possible to improve real-time performance and accuracy in pushing media information. | 2015-07-09 |
20150193556 | GENERATING A VIEW FOR A SCHEMA INCLUDING INFORMATION ON INDICATION TO TRANSFORM RECURSIVE TYPES TO NON-RECURSIVE STRUCTURE IN THE SCHEMA - Provided are a computer program product, system, and method for generating a view for a schema. A schema provides a definition of elements, wherein at least one of the elements comprises a recursive element of a recursive data type, wherein the recursive data type allows for instances of the recursive element to include instances of that same recursive data type at different levels in a hierarchy. Indication is received to transform the recursive types to non-recursive structures. A view for the schema is generated including information on the indication to transform the recursive types to non-recursive structure, wherein the processing of the data defined by the view causes a parser to generate a structured element for each instance of the recursive element in schema data being parsed, wherein the generated structured element includes a unique identifier of the instance of the recursive element. | 2015-07-09 |
20150193557 | DESIGN SUPPORT SYSTEM, DESIGN SUPPORT PROCESSING METHOD, AND DESIGN SUPPORT PROCESSING PROGRAM - The present invention provides a design support system for easily identifying extent of impact of design change while saving the labor involved in working on the design change. The system includes: a simulation execution unit that executes a simulation by executing a program on a server using predetermined parameters regarding the design of an object; an extent-of-impact extraction unit that extracts extent of impact that parts are subject to due to design change, from an analysis result obtained through execution of the simulation by the simulation execution unit; and an output unit that outputs the extent of impact extracted by the extent-of-impact extraction unit. | 2015-07-09 |
20150193558 | METHOD AND DEVICE FOR GENERATING ENGINEERING TOPOLOGY OF DIGITAL SUBSTATION - The present invention relates to a method and device for generating an engineering topology of a digital substation. The method may include: generating, by a single line diagram generation module, a single line diagram of the digital substation based on input information regarding a plurality of substation component devices and connection relations therebetween; converting, by a topology conversion module, the single line diagram of the digital substation into an engineering topology conforming to international standards by use of conversion conditions stored in a topology component management module; verifying, by a topology verification module, whether the engineering topology is suitable for the digital substation based on the international standards; and generating, by an international standard file generation module, a single line diagram engineering file of the digital substation as a system specification description (SSS) by use of the verified engineering topology. | 2015-07-09 |
20150193559 | METHOD FOR CREATING THREE DIMENSIONAL LATTICE STRUCTURES IN COMPUTER-AIDED DESIGN MODELS FOR ADDITIVE MANUFACTURING - Methods for creating three dimensional lattice structures in computer-aided design models. A method includes receiving a solid model containing a plurality of boundary surfaces for a void region, computing a bounding box of the solid model and a plurality of grid points on an axis-aligned grid within the bounding box, creating a lattice cell layout for a lattice structure within the void region, computing an implicit model defined by a scalar value for each of the grid points on the axis-aligned grid, extracting the lattice structure in the solid model based on the implicit model. | 2015-07-09 |
20150193560 | METHOD FOR CREATING CUSTOM ORTHOPEDIC SUPPORTS FROM COMPUTERIZED DATA INPUTS - Systems and methods of measuring feet and designing and creating orthopedic inserts are described. A leg length discrepancy of a user is measured and this data, along with a shoe model and size are input into a computer. The computer has stored information regarding foot bed dimensions of various shoe models and sizes and matches the input shoe model with the stored information. The information regarding the selected shoe model is used along with the leg length discrepancy to create a computer model of a custom shoe insert to be used with the selected shoe. The computer model is then sent to a 3D printer to print the insert. | 2015-07-09 |
20150193561 | AUTOMATED PREFABRICATED WALL FRAME ASSEMBLY - A method for generating a three-dimensional model of a building includes providing a processor, receiving an indication from a user for a two-dimensional path for a wall, and retrieving parameters for the wall from a database. The method also includes determining that part of the wall may be constructed using a prefabricated component and preparing, using the parameters for the wall and the path for the wall, a model for the prefabricated component for use in construction of the wall. The method further includes preparing, using the processor, a three-dimensional model of the wall using the two-dimensional path, the parameters for the wall and the model for the prefabricated component and adding the three-dimensional model of the wall to a model of a building. | 2015-07-09 |
20150193562 | METHOD AND APPARATUS FOR COMPUTER GENERATION OF A GEOMETRIC LAYOUT REPRESENTING A CENTRAL ISLAND OF A TRAFFIC ROUNDABOUT - A method, apparatus and computer readable medium for computer generation of a geometric layout representing a central island of a traffic roundabout is disclosed. The method involves generating a vehicle path associated with travel of a vehicle through the roundabout, generating vehicle extent locations associated with travel of the vehicle along the vehicle path, using the vehicle extent locations to determine a geometric layout of the central island corresponding to the vehicle extents, and generating output data representing the geometric layout of the central island. | 2015-07-09 |
20150193563 | METHOD FOR CREATING TEMPLATE OF BUILDING COMPONENT, METHOD FOR CREATING PRIMITIVE, AND APPARATUS FOR MODELING BUILDING COMPONENT - A building component modeling apparatus records a process of creating the first component through at least one first primitive among a plurality of building primitives. The building component modeling apparatus analyzes the process of creating the first component to extract at least one first parameter defining the first component. The building component modeling apparatus creates a template of the first component by using the at least one first parameter. | 2015-07-09 |
20150193564 | SYSTEM AND METHOD FOR USING CLOCK CHAIN SIGNALS OF AN ON-CHIP CLOCK CONTROLLER TO CONTROL CROSS-DOMAIN PATHS - An on-chip clock controller configured to control cross-domain paths using clock chain signals is disclosed. The on-chip clock controller includes a clock bits module configured to receive a clock chain signal and to output an enable signal based upon the clock chain signal. The on-chip clock controller also includes a clock gating module that is communicatively coupled to the clock bits module. The clock gating module is configured to receive a clock signal and to selectively output either a signal corresponding to the clock signal or a non-transitioning signal based upon the enable signal for operating a state storage module. | 2015-07-09 |
20150193565 | METHOD OF SIMULATING OUTPUT OF NONLINEAR DYNAMICAL SYSTEM IN AN EVENT DRIVEN WAY - A method of simulating an output of a nonlinear system modeling the output of the nonlinear system with a set of differential equations, the set of differential equations being expressed with a combination of first order to n-th order output responses, and an input signal with coefficients thereof, updating the coefficients of the first order to n-th order output responses when the coefficients of the input signal change to obtain the first order to n-th order output responses, and obtaining the output of the nonlinear system by summing the firstfirst order to n-th order output responses. | 2015-07-09 |
20150193566 | CAPACITY PLANNING SYSTEM - A capacity planning system ( | 2015-07-09 |
20150193567 | SYSTEM AND METHOD OF PERFORMING ANALYTICS WITH RESPECT TO CONTENT STORING SERVERS CACHING POPULAR CONTENT - Methods and systems are provided for generating a traffic simulation respective of at least one content storing server, the content storing server operative for caching popular content. One method includes sniffing traffic between at least a first portion of a network and at least a second portion of the network, identifying, from the sniffed traffic, at least a source of content and at least a destination of the content, determining if the content is stored on a cache, simulating a notification respective of the content, and generating a simulation of traffic respective at least of: the content and the simulated notification. | 2015-07-09 |
20150193568 | METHOD AND APPARATUS FOR ELECTRONIC SYSTEM MODEL GENERATION - A method of transmitting data is disclosed. At least one system block of a system-on-chip (SoC) is modeled at an untimed functional level in first and second untimed functional models. First and second transaction level (TL) models of the at least one system block system block are modeled at a transaction level (TL) using the first and second untimed functional models, respectively. First and second cycle accurate (CA) models are modeled at a cycle accurate (CA) level using the first and second TL models, respectively. Data is transmitted from the first untimed functional model to the first CA model, from the first CA model to the second CA model via a CA bus, and from the second CA model to the second untimed functional model. | 2015-07-09 |
20150193569 | CHARACTERIZING CELL USING INPUT WAVEFORM GENEARTION CONSIDERING DIFFERENT CIRCUIT TOPOLOIGES - In some embodiments, in a method performed by at least one processor, a cell is characterized, by the at least one processor, with respect to an input transition characteristic considering different circuit topologies of a pre-driver driving the cell resulting in the same input transition characteristic. | 2015-07-09 |
20150193570 | Methods of Patterning Wafers Using Self-Aligned Double Patterning Processes - Provided are methods of forming patterns of wafers using self-aligned double patterning processes. The methods include preparing an initial layout having a first design pattern, a second design pattern, and a third design pattern disposed between the first design pattern and the second design pattern, extracting a first sub-layout including the first design pattern and a second sub-layout including the second design pattern from the initial layout using a computer, forming a first modified sub-layout including a first modified design pattern obtained by modifying the first design pattern of the first sub-layout using the computer, generating a modified layout including the first modified sub-layout and the second sub-layout using the computer, and performing a double patterning process using the modified layout. | 2015-07-09 |
20150193571 | METHOD OF GENERATING VOLTAGE ISLAND FOR 3D MANY-CORE CHIP MULTIPROCESSOR - Provided is a method of forming a voltage island for a 3D many-core chip multiprocessor, the method including setting the priority of a voltage zone based on the heat emission characteristic of the voltage zone; and forming a voltage island by using the priority. | 2015-07-09 |
20150193572 | TRACE ROUTING ACCORDING TO FREEFORM SKETCHES - Methods and apparatuses for routing traces in a layout design, such as for example a layout design for an integrated circuit, are disclosed. In various implementations, a group of netlines within a layout design and a freeform sketch are identified. Subsequently, the netlines are routed as traces according to the freeform sketch. More particularly, the geometry of the traces is determined by approximating the geometry of the freeform sketch. Various implementations of the invention provide for the netlines to be routed by an automated trace routing engine. With further implementations of the invention, ball grid array escapes and trace fanouts are additionally routed. For example, ball grid array escapes may be routed prior to netlines being routed according to the freeform sketch. In further implementations of the invention, the freeform sketch is deleted after the traces have been routed. With various implementations of the invention, the netlines are routed as traces by forming a container shape around the freeform sketch, approximating the geometry of the freeform sketch within the container shape, and routing traces within the container shape using the approximation of the freeform shape as a guide. | 2015-07-09 |
20150193573 | METHOD FOR GENERATING LAYOUT OF PHOTOMASK - A method for generating a layout pattern of integrated circuit (IC) is provided. First, feature patterns are provided to a computer system and dummy pad patterns are generated in a space among the feature patterns. The layout pattern is then split into first feature patterns and second feature patterns. The dimensions of the first feature patterns are less than the dimensions of the second feature patterns. Afterwards, the dummy pad patterns are combined with the second features pattern to form a combined pattern. Then, mandrel patterns are generated in a space between the first feature patterns and the geometric patterns are generated according to the positions of the first feature patterns. Finally, the combined pattern, the mandrel patterns, and the geometric patterns are respectively outputted to form a first, a second, and a third photomasks. | 2015-07-09 |
20150193574 | DEVICE AND COMPUTED TOMOGRAPHY SCANNER FOR DETERMINING AND VISUALIZING THE PERFUSION OF THE MYOCARDIAL MUSCLE - A device is disclosed for determining and visualizing the perfusion of the myocardial muscle with the aid of static CCTA images. In at least one embodiment, the device includes a segmentation unit for segmenting the coronary blood vessels and the left myocardial muscle from a CCTA image of the heart; a first simulation unit for simulating the blood flow through the coronary blood vessels; and a second simulation unit by which the local perfusion of the myocardial muscle is determined on the basis of the ascertained blood flow into different regions of the myocardial muscle. The perfusion of the different regions of the myocardial muscle is visualized in a schematized image on a visualization unit. By virtue of the proposed device it is possible to dispense with further imaging examinations after the performance of a CCTA scan, thereby relieving the pressure both on the part of the physician and on the part of the patient. | 2015-07-09 |
20150193575 | SYSTEMS AND METHODS OF SELECTING COMPOUNDS WITH REDUCED RISK OF CARDIOTOXICITY - Provided herein are systems and methods for selecting compounds that have reduced risk of cardiotoxicity or which are not likely to be cardiotoxic. As an example, a system and method can include a computational dynamic model combined with a high throughput screening in silico that mimics one of the most important ion channels associated with cardiotoxicity, namely the human Ether-a-go-go Related Gene (hERG) channel. Also provided herein are systems and methods for redesigning compounds that are predicted to be cardiotoxic based on the model and the high throughput screening. | 2015-07-09 |
20150193576 | SEQUENCE-CENTRIC SCIENTIFIC INFORMATION MANAGEMENT - According to various embodiments, aspects of the invention provide a highly efficient meta-analysis infrastructure for performing research queries across a large number of studies and experiments from diverse sequencing technologies as well as different biological and chemical assays, data types and organisms, as well as systems to build and add to such an infrastructure. The methods, systems and apparatuses described enable combining orthogonal types of data and available public knowledge to elucidate mechanisms governing normal development, disease progression, as well as susceptibility of individuals to disease or response to drug treatments. | 2015-07-09 |
20150193577 | SYSTEMS AND METHODS FOR GENERATING BIOMARKER SIGNATURES - The systems and methods described herein include a technique for generating both reproducible and interpretable gene signatures. The technique involves resampling a data set and choosing genes having a high frequency of emergence. In particular, the systems and methods described herein include repeated sampling of data sets, ranking genes based on frequency of occurrence in gene signatures generated through the repeated sampling process, and iteratively selecting the best gene signature. | 2015-07-09 |
20150193578 | SYSTEMS AND METHODS FOR GENOMIC VARIANT ANALYSIS - A genomic variant analysis method and computer system utilizing information related to variant frequency and biological consequence to determine the relative statistical significance of each variant in given genome sequence datasets. The method and system perform both variant frequency normalization and universal pairwise variant comparisons across the given genome sequence datasets to automatically identify the likelihood of any given variant as contributing to disease process or biological phenomenon under study and organize the results into a priority ranking. The priority ranking is then used to categorize the results into biologically-related data subsets for display to indicate potential for importance. | 2015-07-09 |
20150193579 | Exchanging Medical Imaging Data Between Computer Systems - In one example of exchanging medical imaging data between computer systems, input to execute a computer software application to exchange data with a server in a computer session is received while the computer executes another computer software application to exchange data with another server. In response to receiving the input, the computer software application is executed to provide multiple functionalities, one of which is a functionality to provide additional data to the server system using a mobile computer. In response to detecting the selection of the functionality to provide additional data to the server using the mobile computer, an identifier that identifies the computer session in which the data is being exchanged between the computer and the server is displayed at the computer. Data can be received using the mobile computer by scanning the identifier. | 2015-07-09 |
20150193580 | ELECTRONIC MEDICAL RECORD SYSTEM WITH AUTOMATED HEALTH CARE SERVICES EVALUATION - A system for processing medical data comprising an order processing system operating on a first processor and configured to receive an order generated from within a patient profile of an electronic medical records system and to generate an order message. A health services system operating on a second processor and configured to receive the order message and to process the order message to identify an alternate identification field and one or more health services provider fields and to generate an insurance services provider request as a function of the alternate identification field and to transmit the insurance services provider request to an insurance services provider system. An insurance services interface system configured to receive a response message from the insurance services provider system and to transmit the response message to the order processing system. | 2015-07-09 |
20150193581 | SYSTEMS AND METHODS FOR PROVIDING A STEM CELL BANK - Methods, computer systems, and computer program products for maintaining a stem cell registry comprising information about a plurality of stem cell units. A donor is enrolled in the stem cell registry. A stem cell unit from the donor is characterized. Information about the stem cell unit, obtained by the characterizing, is recorded in the stem cell registry. Computer readable media comprising a plurality of data records. One or more respective data records in the plurality of data records, comprises (i) a collection identifier number that uniquely corresponds to a stem cell donation, (ii) a cord blood cell count associated with the stem cell donation, and (iii) a placenta blood cell count associated with the stem cell donation. Additional computer readable media comprising a plurality of data records. One or more respective data records in the plurality of data records comprises (i) a cord blood cell count associated with a stem cell donation, (ii) a placenta blood cell count associated with the stem cell donation, and (iii) an indication of at least two stem cell transplant units in the stem cell donation. | 2015-07-09 |
20150193582 | Healthcare Management System Using Patient Profile Data - The present disclosure is directed to a system and method which gathers information from all of a person's healthcare providers and abstracts from that information the data necessary for a healthcare provider to render informed medical decisions. In one embodiment, information necessary to process proper payment to a provider (re: reimbursement to the insured patient) is used to develop a holistic view of the medical condition pertaining to the patient. Since this information comes from a myriad of providers, including physicians, surgeons, nursing care, druggists, testing labs, mental health counselors, dentists, oral surgeons, etc., the holistic view that is developed is comprehensive. In one embodiment, the system and method could set parameters on critical data such that if that data is outside the set parameters, alerts can be sent to the appropriate caregivers and/or patients. | 2015-07-09 |
20150193583 | Decision Support From Disparate Clinical Sources - Systems, methods and computer-readable media are provided for facilitating clinical decision support and managing patient population health by health-related entities including caregivers, health care administrators, insurance providers, and patients. Embodiments of the invention provide decision support services including providing timely contextual patient information including condition risks, risk factors and relevant clinical information that are dynamically updatable; imputing missing patient information; dynamically generating assessments for obtaining additional patient information based on context; data-mining and information discovery services including discovering new knowledge; identifying or evaluating treatments or sequences of patient care actions and behaviors, and providing recommendations based on this; intelligent, adaptive decision support services including identifying critical junctures in patient care processes, such as points in time that warrant close attention by caregivers; near-real time querying across diverse health records data sources, which may use diverse clinical nomenclatures and ontologies; improved natural language processing services; and other decision support services. | 2015-07-09 |
20150193584 | SYSTEM AND METHOD FOR CLINICAL PROCEDURE TIMELINE TRACKING - Described herein is system and method for enabling a real-time clinical procedure timeline. In one embodiment, a patient timeline is created based on a pre-existing template. The user interface displays the steps for an admitted patient with a given diagnosis, tracks the time for completion of each step, and allows users to add notes, attach documents, and build reports. Individual medical practices can create custom templates in the system to meet their specific requirements. Multiple methods of accessing and using the system are supported such as mobile devices, motion sensing devices, optical head-mounted displays, etc. | 2015-07-09 |
20150193585 | SYSTEM WITH BREATHING APPARATUS AND TOUCH SCREEN - A system includes a breathing apparatus, a touch screen unit and a processing unit. A first content is displayed at a first screen location of the touch screen. Upon a user input, comprising a gesture of one or more gestures, at the first screen location, a second content related to the first content is selected and displayed in dependence of the gesture and the first content. The first content ( | 2015-07-09 |
20150193586 | MULTI-SITE VIDEO BASED COMPUTER AIDED DIAGNOSTIC AND ANALYTICAL PLATFORM - A computer program product according to another embodiment includes a computer readable storage medium having program code embodied therewith, the program code being executable by a device for causing the device to perform a method that includes receiving biometric imaging data from a medical device; transmitting a stream of the biometric imaging data of a patient to a remote location; transmitting a video stream depicting a source of the biometric imaging data; receiving instructions to alter an acquisition characteristic of the biometric imaging data from the remote location; and outputting the instructions to alter the acquisition characteristic of the biometric imaging data. | 2015-07-09 |
20150193587 | DIABETES-RELATED BIOMARKERS AND METHODS OF USE THEREOF - The invention describes biomarkers which can be used to predict the likelihood that an individual will develop Diabetes. The biomarkers can also be used to screen large groups in order to identify individuals at risk of developing Diabetes. | 2015-07-09 |
20150193588 | HEALTH INFORMATION PROCESSING APPARATUS AND METHOD, AND HEALTH INFORMATION DISPLAY APPARATUS AND METHOD - A health information processing apparatus according to an embodiment includes an accumulation unit, an analysis unit, and an estimation unit. The accumulation unit that stores genome information and biological information and behavior information being continuously collected, which are health information of each user, that correspond to a plurality of users. The analysis unit that analyzes the stored health information corresponding to the plurality of users. The estimation unit that estimates a future health risk of a predetermined user by using a result of the analysis and the health information of the predetermined user. | 2015-07-09 |
20150193589 | Computer Simulation for Testing and Monitoring of Treatment Strategies for Stress Hyperglycemia - Time-varying hyperglycemic stresses are derived from actual ICU patients and applied to non-critically ill virtual patients, using any model of normal glucose-insulin physiology that fulfills certain requirements, in order to model and simulate stress hyperglycemia. Other aspects provide: 1) a methodology to perform sensitivity analyses of the parameters of ICU insulin infusion therapy protocols and to improve the protocols; and 2) a training system for clinicians about the course and management of stress hyperglycemia in the ICU or other facility. | 2015-07-09 |
20150193590 | METHOD INCORPORATING COMPUTER-IMPLEMENTED STEPS FOR PROVIDING SURGICAL PARAMETER DATA - The present disclosure relates to a method for providing surgical parameter data. The method comprises the computer-implemented steps of being responsive to patient specific information data for deriving patient data, where the patient specific information data is indicative of one or more dynamic characteristics, and determining a set of possible surgical parameter data according to the patient data and patient acquired data, the patient acquired data being indicative of one or more desired post-surgery activities, the patient acquired data comprising post-surgery activities preference data; and a further step of selecting the surgical parameter data from the set of possible surgical parameter data according to the post-surgery activities preference data. | 2015-07-09 |
20150193591 | SYSTEM AND METHOD FOR DETERMINING AN OPTIMAL TYPE AND POSITION OF AN IMPLANT - A computer-assisted orthopaedic surgery system includes a device for generating a three dimensional geometrical surface model of a first bone and a database containing three 3 dimensional implant models of a plurality of available implants. The system includes a computer that is configured to permit a user to select from the database a first implant and display on a screen the three dimensional implant model of the first implant. The computer superimposes on the screen the implant model on top of the model of the first bone such that the two models are visually identifiable from one another. | 2015-07-09 |
20150193592 | METHOD AND APPARATUS FOR GROUPING PRESCRIPTIONS - A method, apparatus, and computer program product are provided in order to group prescriptions for the same patient into a single order so as to provide for more efficient fulfillment and shipping. In the context of a method, a plurality of prescriptions are received in an electronic or facsimile format. In this regard, the method includes receiving a first prescription and thereafter receiving a second prescription. The method also includes determining if the first and second prescriptions are associated with the same patient and also determining if the first and second prescriptions are received within a predefined window of time. In an instance in which the first and second prescriptions are associated with the same patient and are received within the predefined window of time, the method includes grouping, with processing circuitry, the first and second prescription into a single order. | 2015-07-09 |
20150193593 | PATIENT CUSTOMIZED THERAPEUTIC REGIMENS - Methods, systems and compositions that allow for treating a patient according to a patient customized therapeutic regimen are provided. Embodiments of the invention include obtaining dosage administration information from a patient and using the same to tailor a therapeutic regimen for the patient. Embodiments of the invention further include preparing and forwarding to the patient physical pharmaceutical dosages based on the customized therapeutic regimen. | 2015-07-09 |
20150193594 | SYSTEMS AND METHODS FOR IMPROVING PATIENT COMPLIANCE WITH A PRESCRIPTION DRUG REGIMEN - A system for improving patient compliance with a prescription drug regimen is described. The system includes a patient database for storing patient information, the information including contact information for a patient communication device (such as a telephone, cell phone, computer, or PDA) along with a method for communicating with that device. The system further includes an alert database for storing information about prescription reminder alerts to be sent to patients. A send program running on a computer retrieves information about prescription reminder alerts from the alert database and transmits the prescription reminder alerts to a patient communications device over a communications network using the contact information and contact method stored in the patient database. | 2015-07-09 |
20150193595 | SYSTEMS AND METHODS FOR REPORTING PATIENT HEALTH PARAMETERS - A method for displaying health data may include receiving two or more health data sets. Each health data set may be physiological data of a patient as a function of time. The method may also include generating a display of the two or more health data sets such that a first health data set of the two more health data sets is visually aligned with a second health data set of the two or more health data sets at multiple points in time. | 2015-07-09 |
20150193596 | METHOD FOR CONDUCTING CLINICAL TRIALS BASED ON SUBSTANTIALLY CONTINUOUS MONITORING OF OBJECTIVE QUALITY OF LIFE FUNCTIONS - A system and method for conducting a clinical trial of a medical treatment of human patients. The system uses an array of sensors in the patient's home for substantially continuously monitoring one or more objective functions of the patient. The monitored objective functions of the patient are compared against a baseline set of data for the monitored objective functions for the patient or a set of patients. The comparison includes detecting a trend of deviation between the one or more monitored objective functions of the patient and the baseline set of data. The trend of deviation can be correlated with an application or nonapplication of the medical treatment to the patient. | 2015-07-09 |
20150193597 | PHARMACEUTICAL PRODUCT AND COMMUNICATION TOOL - A substance with pharmaceutical activity against a medical condition for use in a treatment of the medical condition in combination with a computer program product including instructions causing a computer to perform a method including:
| 2015-07-09 |
20150193598 | METHOD AND APPARATUS FOR DRIVER NOTIFICATION HANDLING - A system includes a processor configured to receive a notification request from an entity in communication with a vehicle computing system (VCS). The processor is also configured to receive notification content and parameters. The processor is further configured to validate a right of the entity to display a notification on the VCS. Also, the processor is configured to validate the content based on permitted content. The processor is additionally configured to validate the parameters based on permitted parameters and queue a notification for display following successful right, the content and parameter verification. | 2015-07-09 |
20150193599 | MULTIPLE CONTENT PROTECTION SYSTEMS IN A FILE - Supporting a plurality of content protection systems in a single container file. The protection systems share an encryption method which is accessible from a sample encryption box in the file. Each of the protection systems stores, in a protection system header box, information for decrypting the content in accordance with the corresponding protection system. In some embodiments, separate protection system header boxes in the file correspond to each of the protection systems. By using the common encryption method and sharing encryption expressions across the protection systems, the multiple content protection systems are supported in the file without creating additional copies of the content. In some embodiments, aspects of the disclosure extend the International Organization for Standardization (ISO) base media file format to support multiple digital rights management (DRM) systems in the single container file. | 2015-07-09 |
20150193600 | RIGHTS MANAGEMENT SERVER AND RIGHTS MANAGEMENT METHOD - By delegating an access right to a resource from a user having the access right to a client, the client can also access the resource. At this time, an upper limit is set for the number of accesses per predetermined period of time and per client, and when the upper limit is exceeded, access is restricted. For a client that desires a number of accesses exceeding the upper limit, raising the upper limit by a predetermined number of times is permitted in exchange for payment of an additional fee. | 2015-07-09 |
20150193601 | Method of and system for providing access to access restricted content to a user - According to an example embodiment of the invention, there is provided a system for providing access to access restricted content to a user, the system including a communication arrangement operable to receive a content request message, the content request message including a content identifier, a processor configured to cause a first determination to be performed to yield a positive or a negative result, a validation module configured to, in response to the first determination yielding a positive result, obtain a first digital rights management key, the processor being further configured to cause a second determination to be performed to yield a positive or a negative result, and responsive to the first and second determinations yielding a positive result, the validation module is configured to cause access to the access restricted content to be provided to the user. | 2015-07-09 |
20150193602 | METHODS AND APPARATUS FOR SHARING, TRANSFERRING AND REMOVING PREVIOUSLY OWNED DIGITAL MEDIA - The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal (or private) computers, laptops, dedicated music devices, electronic book readers, and so forth) that are in communications coupling with one or more stores (e.g, dedicated disk drives, flash drives, cloud storage, etc.). At least one digital media object (DMO) or copy thereof is stored in one or more of those stores and is accessible by at least one of the first and second client digital data processors. | 2015-07-09 |
20150193603 | METHOD AND SYSTEM TO SUPPORT DYNAMIC RIGHTS AND RESOURCES SHARING - The invention relates to method for deriving a sub-right from a right, the right comprising a plurality of components, each of which specifies an aspect of the right. A component may be, for example, a principal, an action, a resource, and a condition. The invention also relates to a method for integrating a first right with a second right. Furthermore, the invention relates to a method of sharing rights by deriving a sub-right from a right, allowing use of the sub-right, and integrating the sub-right with the right. In addition, the invention relates to a system to support rights sharing by enabling the derivation of a sub-right from a right, the right comprising plural components each of which specifies an aspect of the right, the system comprising a receiving module for receiving a sub-right, the sub-right comprising plural components each of which specifies an aspect of the sub-right, and a confirmation module for confirming that the values of the components of the sub-right can be derived from the values of the corresponding components of the right. The invention further relates to a method for deriving a sub-right from a pool of rights granted by a grantor to a grantee for controlling use of resources within a computing environment, the computing environment having a mechanism for enforcing rights within the environment to control use of resources in accordance with the rights. | 2015-07-09 |
20150193604 | APPLICATION LICENSING USING SYNC PROVIDERS - A method, system, and computer-readable storage media for licensing an application using sync providers are provided herein. The method includes receiving a request for a license for an application from a client sync provider at a licensing service and receiving information relating to the license from a commerce partner offering the application via a commerce partner sync provider. The method also includes returning the license for the application to a client computing device, receiving information relating to a state of the license from the client sync provider, and adjusting conditions of the license according to the state of the license. | 2015-07-09 |
20150193605 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 2015-07-09 |
20150193606 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 2015-07-09 |
20150193607 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 2015-07-09 |
20150193608 | USER AUTHENTICATION - A method and system for authenticating a user is provided. The method includes receiving keyboard entries from a user while a cursor of a computer screen is positioned in a password field of the user. The keyboard entries include a series of alphanumeric characters forming part of a password of the user and one or more function keys that either delete one or more of the alphanumeric characters or do not affect the alphanumeric characters as entered into the password field. The key board entries are logged. The logged keyboard entries checked to determine whether they match a stored valid password for the user such that the one or more function keys that either delete one or more of the alphanumeric characters or do not affect the alphanumeric characters are considered part of the submitted password which is compared to the stored valid password for authentication of the user. | 2015-07-09 |
20150193609 | DEVICE, METHOD, AND SYSTEM FOR AUGMENTED REALITY SECURITY - Devices and methods for authenticating a user of a mobile computing device to a content server include establishing a communication session between a target computing device and the content server that is identified by a session ID. The target computing device generates a pairing token using the session ID, which pairing token may be a two-dimensional bar code such as a quick response (“QR”) code, and presents the pairing token to the mobile computing device. The mobile computing device captures the pairing token and authenticates the user of the mobile computing device to an authentication server. The target computing device receives an authentication token from the authentication server in response to the mobile computing device successfully authenticating the user to the authentication server. The target computing device accesses content on the content server using the authentication token. Other embodiments are described and claimed. | 2015-07-09 |
20150193610 | AUTOMATIC PIN CREATION USING PASSWORD - A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password. | 2015-07-09 |
20150193611 | LOCKING AND UNLOCKING A MOBILE DEVICE USING FACIAL RECOGNITION - In an embodiment of the invention, an unlocked mobile device is configured to capture images, analyze the images to detect a user's face, and automatically lock the device in response to determining that a user's face does not appear in the images. The camera capturing and face recognition processing may be triggered by the device having detected that it has been motionless for a threshold period of time. In another embodiment, a locked mobile device is configured to capture an initial image using its camera, capture a new image in response to detecting movement of the device, determine that the device moved to a use position, capture a subsequent image in response to determining that the device moved to a use position, analyze the subsequent image to detect a user's face, and unlock the device in response to detecting the user's face. Other embodiments are also described and claimed. | 2015-07-09 |
20150193612 | MULTIPLE USER ACCOUNTS FOR MANAGING STORED INFORMATION IN AN IMPLANTABLE MEDICAL DEVICE SYSTEM - Techniques for managing stored information in an implantable medical device system using multiple user accounts are described. An implantable medical device system may provide a general user account and a set of authenticable user accounts. In some examples, the general user account does not require a user of a programmer in an implantable medical device system to enter user identity information to manage information stored in the implantable medical device system. The general user account may be permitted to perform a subset of actions available to an authenticable user account. In some examples, an authenticable user account may rollback changes made to the stored information by the general user account. An authenticable user account may also be able to synchronize changes made to the stored information across all or some of the user accounts. | 2015-07-09 |
20150193613 | PORTABLE APPARATUS AND METHOD OF CONNECTING TO EXTERNAL APPARATUS - Provided are a portable apparatus and a method of connecting the portable apparatus to an external apparatus. The portable apparatus includes a communicator, a storage configured to store a connection unlock pattern and an external apparatus connection information, a touchscreen configured to display a lock screen; and a controller configured to control communicator, the storage, and the touchscreen. The controller is configured to unlock the lock screen by detecting the connection unlock pattern that is input to the lock screen, and connects the portable apparatus to the external apparatus via the communicator by using the connection unlock pattern and the external apparatus connection information. | 2015-07-09 |
20150193614 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, a kernel mode driver monitors events occurring within a file system or an operating system. Responsive to observation of a trigger event performed by or initiated by an active process, in which the active process corresponds to a first code module within the file system and the event relates to a second code module within the file system, performing or bypassing a real-time authentication process on the second code module with reference to a whitelist containing content authenticators of approved code modules, which are known not to contain viruses or malicious code. The active process is allowed to load the second code module into memory when the real-time authentication process is bypassed or when it is performed and determines a content authenticator of the code module matches one of the content authenticators. | 2015-07-09 |
20150193615 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - An information processing apparatus comprises: a manual login unit configured to display a login screen, and to perform user authentication using user information input through the login screen; an auto login unit configured to perform user authentication using user information held beforehand, without displaying the login screen; a determination unit configured to determine whether or not a password included in user information of a user who is to log in is required to be changed; and a control unit configured to cause not the auto login unit but the manual login unit to perform the user authentication, in the case where the determination unit determines that the password is required to be changed. | 2015-07-09 |
20150193616 | MITIGATING JUST-IN-TIME SPRAYING ATTACKS IN A NETWORK ENVIRONMENT - An example method for mitigating JIT spraying attacks in a network environment is provided and includes protecting an output of a just-in-time (JIT) compiler against attacks during application execution at least by intervening from outside the application into a JIT page generated by the JIT compiler in a memory element of a host. In a specific embodiment, the intervening can include rewriting the JIT page. In specific embodiments, the method can further include generating a shadow page corresponding to the JIT page in the memory element. The method can further include randomly choosing at least one block of instructions in the JIT page, moving the at least one block of instructions to the shadow page, and replacing the at least one block of instructions in the JIT page with at least one of invalid opcodes and halt instructions. | 2015-07-09 |
20150193617 | SIGNATURE VERIFICATION DEVICE, SIGNATURE VERIFICATION METHOD, AND PROGRAM - Whether or not there is an attack that cannot be detected using signature information is determined without performing an enormous number of verifications. A signature detection not-applicable data pattern extracting part analyzes signature information and extracts a pattern of data which is not detected using the signature information. An attack data pattern extracting part analyzes a target program to which the signature information is to be applied, and extracts a pattern of attack data that attacks the target program. A pattern comparing part compares a signature detection not-applicable data pattern extracted by the signature detection not-applicable data pattern extracting part with an attack data pattern extracted by the attack data pattern extracting part, and extracts an attack data pattern coinciding with the signature detection not-applicable data pattern, as an attack data pattern not detected using the signature information. | 2015-07-09 |
20150193618 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - Startup of a program and generation or change of a program is detected, or a program is searched for. It is determined, based on program information of a program whose startup is detected or a program which is found, whether or not the program meets a predetermined criterion. The program determined to meet the predetermined criterion is registered in a white list or black list. | 2015-07-09 |
20150193619 | TECHNIQUE FOR DETERMINING A MALIGN OR NON-MALIGN BEHAVIOR OF AN EXECUTABLE FILE - A technique for determining a malign or non-malign behavior of an executable file is disclosed. In a first method aspect, the method comprises the steps of first acquiring a first behavior profile of the executable file, the first behavior profile comprising a first observable execution trace of the executable file from an emulated environment, second acquiring a second behavior profile of the executable file, the second behavior profile comprising a second observable execution trace of the executable file from a real environment, and comparing the first and second observable execution traces so as to determine the malign or non-malign behavior of the executable file. In another method aspect, the method comprises the steps of receiving a trigger condition, collecting, responsive to the trigger condition, first and second behavior profiles of the executable file from first and second one of two or more file-execution devices, the first and second behavior profiles comprising first and second observable execution traces of the executable file, and the first and second observable execution traces being non-mapped to the first and second file-execution device, respectively. | 2015-07-09 |
20150193620 | System and Method for Managing UEFI Secure Boot Certificates - A service processor of an information handling system receives a Secure Boot database from a provisioning server coupled to the service processor by a data communication network. The Secure Boot database is stored at a memory device included at the service processor. The Secure Boot database is provided to a basic input output system (BIOS) at the information handling system in response to a request issued by intrinsic BIOS instructions executed during initialization of the information handling system. | 2015-07-09 |
20150193621 | SECURITY SCAN USING ENTITY HISTORY - An illustrative embodiment of a computer-implemented process for security scanning using entity history responsive to a determination that a set of vulnerabilities exist for a selected security entity, tests the selected entity using a vulnerability set selected from an issues history and responsive to a determination that all vulnerabilities are not found, determining whether more vulnerabilities sets exist. Responsive to a determination that more vulnerabilities sets exist, obtains a next set of vulnerabilities and tests the selected security entity using another vulnerability set selected from the issues history. Responsive to a determination that a set of vulnerabilities does not exist for the selected security entity, performs a full scan of the selected security entity and responsive to a determination that security issues are identified, records the security issues identified in the issues history. | 2015-07-09 |
20150193622 | CODE PROPERTY ANALYSIS FOR SECURITY MITIGATIONS - Attempts to make code secure often are associated with performance penalties. To facilitate striking an acceptable balance between performance and security, vulnerable areas of source code are identified. The vulnerable areas are examined for areas that are actually safe and the safe areas are filtered from the universe of code that receives security mitigations. The remaining code receives security mitigations appropriate to the level of risk of the code. | 2015-07-09 |
20150193623 | Quantitative Analysis Of Information Leakage Vulnerabilities - A method includes recording, during execution of a program and by a computing system, concrete values exhibited at source and sink statements in the program. The source statements read confidential information and the sink statements release the confidential information to an outside environment. The method includes determining, by the computing system, using at least the recorded concrete values and source-sink pairs whether information leakage meeting one or more quantitative criteria occurs by the program. Apparatus and program products are also disclosed. | 2015-07-09 |
20150193624 | SECURITY PROTECTION SYSTEM AND METHOD - A security protection system is provided. The system includes: a vulnerability identification device, to collect patch file information, identify a vulnerability of a to-be-fixed object corresponding to the patch file information and generate vulnerability protection information according to the vulnerability; and a vulnerability protection device, to protect the vulnerability of the to-be-fixed object corresponding to the patch file information according to the vulnerability protection information. A security protection method is provided in the present disclosure. The present disclosure may provide effective protection to the computer actively and timely and protect the vulnerability of the computer from illegal utilization. | 2015-07-09 |
20150193625 | DISPLAY DEVICE - A controlling method of a display device is provided. The display device includes an optical modulating panel with an optical modulating layer and a display panel with a display layer. Firstly, a viewing position is sensed, and an azimuthal angle and a polar angle of the display device with respect to the viewing position are obtained accordingly. Then, an orientation mode of the display device is judged according to the azimuthal angle. Then, one of the optical modulating layer and the display layer is selectively adjusted according to the orientation mode and the polar angle of the display device. | 2015-07-09 |
20150193626 | METHOD AND SYSTEM FOR USER CONTENT VIEW PROTECTION - A user content protection system and method that may include a content-sharing application associated with a user device and/or an access monitor configured to monitor access limitations placed on content shared by the content sharing application. The content-sharing application may be configured to share content from the user device to one or more other user devices. The access monitor may provide conditional access to the content depending on whether or not certain access limitations have been exceeded. | 2015-07-09 |
20150193627 | METHOD AND SYSTEM OF PROTECTING FILES - Provided is a method of protecting files of an electronic device. In the method, a pre-setting return information is read in a wireless communication tag; a setting interface is provided; the files of the electronic device is selected through the setting interface; a predetermined protection time period and a pre-setting return information are set through the setting interface; wireless communication signal having a fixed frequency is transmitted by the electronic device; the selected files are encrypted if no pre-setting return information is obtained by the electronic device from the wireless communication tag; the selected files are deleted upon the condition that the selected files are encrypted for the predetermined protection time period. | 2015-07-09 |
20150193628 | HOMOMORPHICALLY ENCRYPTED ONE INSTRUCTION COMPUTATION SYSTEMS AND METHODS - A homomorphically encrypted one instruction computation (“HEROIC”) computing system is described. The described HEROIC cloud computing system utilizes a homomorphic encryption scheme. The homomorphic encryption scheme allows for meaningful manipulation of encrypted data directly within the encrypted domain (i.e., without the need to first decrypt the data and then re-encrypt the data after processing). The HEROIC cloud computing system eliminates the need for the cloud computing processor to first decrypt data prior to processing thereby eliminating the need for the cryptographic keys to be provided to the provider of the cloud computing system. | 2015-07-09 |