37th week of 2015 patent applcation highlights part 44 |
Patent application number | Title | Published |
20150254396 | INFORMATION PROCESSING APPARATUS - A communication section receives a connection request from a game controller to connect the game controller with an information processing apparatus. A registered user information holding section holds biometric information of a user registered in the information processing apparatus. A biometric authentication portion compares biometric information of a user included in a taken image with biometric information held in the registered user information holding section to determine whether the imaged user is a user registered in the information processing apparatus. After the imaged user is found to be a user registered in the information processing apparatus, a login controller executes login processing of the user, or to be more specific, stores information for identifying a device included in the taken image and information for identifying the user into a login user storage portion by relating these items of information with each other. | 2015-09-10 |
20150254397 | Method of Validating mRNA Splciing Mutations in Complete Transcriptomes - A method is described for the automatic validation of DNA sequencing variants that alter mRNA splicing from nucleic acids isolated from a patient or tissue sample. Evidence the a predicted splicing mutation is demonstrated by performing statistically valid comparisons between sequence read counts of abnormal RNA species in mutant versus non-mutant tissues. The method leverages large numbers of control samples to corroborate the consequences of predicted splicing variants in complete genomes and exomes for individuals carrying such mutations. Because the method examines all transcript evidence in a genome, it is not necessary a priori to know which gene or genes carry a splicing mutation. | 2015-09-10 |
20150254398 | ELECTRONIC METHODS AND SYSTEMS FOR MICROORGANISM CHARACTERIZATION - Systems and methods to characterize one or more microorganisms or DNA fragments thereof are disclosed. Exemplary methods and systems use comparison of DNA sequencing information to information in one or more databases to characterize the one or more microorganism or DNA fragments thereof. Exemplary systems and methods can be used in a clinical setting to provide rapid analysis of microorganisms that may be a cause of infection. | 2015-09-10 |
20150254399 | NUCLEIC ACID AMPLIFICATION SIGNAL ACQUISITION AND SIGNAL ANALYSIS - Methods and systems are disclosed herein for improvements in real-time data collection and real-time signal analysis for nucleic acid amplification reactions. | 2015-09-10 |
20150254400 | GROUPING FOR CLASSIFYING GASTRIC CANCER - There is provided a grouping for classifying a gastric cancer tumor sample obtained from a patient suffering or suspected to suffer from gastric cancer, wherein the grouping comprises an invasive subtype, a proliferative subtype and a metabolic subtype. There is also provided a predictor and methods of using the grouping. | 2015-09-10 |
20150254401 | FILM TO DICOM CONVERSION - Embodiments digitize radiology films into DICOM format. Radiology films typically include an array of captured images laid out in a grid pattern. To comply with DICOM format, the scanned image of a radiology film is segmented into sub-images and text is extracted from the sub-images to generate DICOM metadata. The sub-images and extracted text metadata are then combined to generate a DICOM-compliant multi-image file. | 2015-09-10 |
20150254402 | Consumer Health Score Bureau System and Method to Facilitate a Multi-Sponsor Model of Health Improvement - Certain exemplary embodiments of the invention can provide computer-based systems and methods for an online health service bureau that allows participant consumers to accurately quantify their health by calculating, on behalf of each consumer, a personal health score that is based on each consumer's own measured biomarkers and other related information. The health service bureau may also provide secure mechanisms by which interested third parties, such as employers and insurance companies, can incentivize participant consumers to undertake health-improving activities and thereby improve the consumers' overall health scores, without compromising the privacy of individual consumer identity and health information | 2015-09-10 |
20150254403 | Electronic Medical Record Interface - Provided is an interface for an electronic medical record (EMR) or electronic health record (EHR) and methods, and systems including the same. | 2015-09-10 |
20150254404 | AUTOMATIC STOCK AND REQUISITION ADMINISTRATION SYSTEM AND METHOD FOR MEDICAL AND NURSING APPLICATION - The present invention discloses an automatic stock and requisition administration system and method for medical and nursing application. The system comprises a cloud platform, at least one intelligent handheld device, and at least one automatic material supply machine. The automatic material supply machine links to the cloud platform through a network. The cloud platform generates requisition forms automatically according to nursing requirements or physician orders and provides the requisition forms for the automatic material supply machine and the intelligent handheld devices according to nursing schedules in user information. The users confirmed by a user recognition process can fast pick required materials from the automatic material supply machine in correct types and quantities. The information of the picked materials is transmitted to the cloud platform, and the cloud platform undertakes statistics and administration of materials. Thus can be improved inefficient medical material administration resulting from overstocking or undersupplying medical materials. | 2015-09-10 |
20150254405 | SYSTEMS AND METHODS FOR AUTOMATED REPATRIATION OF A PATIENT FROM AN OUT-OF-NETWORK ADMITTING HOSPITAL TO AN IN-NETWORK DESTINATION HOSPITAL - A system server stores and allows access to patient data, and can include a repatriation management system and/or a discharge management system. The repatriation management system provides for transfer of a patient from an admitting out-of-network hospital to a destination in-network hospital. The repatriation management system includes a computer program for analyzing the patient data, analyzing candidate destination hospital data, and calculating matches between the two. The discharge management system provides for transfer of a patient from an acute care hospital environment to a remote care facility. The discharge management system includes a computer program for analyzing the patient data, identifying and formulating resolutions to placement problems, and determining if the patient will be discharged. The system server is networked to allow remote access to the stored data and communication between the admitting hospital, destination hospitals, remote care facilities, and medical transport providers. | 2015-09-10 |
20150254406 | System and Method for Managing Cognitive Bandwidth to Prevent Failure of Valuable Tasks Requiring Cognition - Cognitive bandwidth of a healthcare delivery team is managed by managing cognitive bandwidth of the healthcare providers and the overall support team for those providers on the healthcare delivery team. A performance improvement coordinator allocates health care delivery tasks and educational tasks to ensure that no healthcare provider or team member on the healthcare provider team reaches a tipping point to increase the likelihood that tasks at risks are performed adequately. Patient care tasks performed by the patient can also be considered by the performance improvement coordinator to avoid the patient reaching a tipping point that will adversely affect the patient's ability to learn and perform required patient care tasks effectively and efficiently. | 2015-09-10 |
20150254407 | METHOD AND COMPUTING DEVICE FOR ASSIGNING A DIAGNOSIS CODE - A method, a computing device and a computer program product are provided for associating a diagnosis code, such as an ICD-10 code, with an encounter. In the context of a method, an indication is received that a diagnosis code from a prior encounter is also to be utilized in conjunction with a subsequent encounter. The method further includes determining whether the diagnosis code from the prior encounter is associated with an initial encounter for a respective condition. In an instance in which the diagnosis code from the prior encounter is associated with an initial encounter for the respective condition, the method also determines whether the diagnosis code should be modified to be associated with the subsequent encounter. As such, the method, computing device and computer program product can facilitate the creation of a medical record with accurate diagnosis codes. | 2015-09-10 |
20150254408 | PERSONALIZING PATIENT PATHWAYS BASED ON INDIVIDUAL PREFERENCES, LIFESTYLE REGIME, AND PREFERENCES ON OUTCOME PARAMETERS TO ASSIST DECISION MAKING | 2015-09-10 |
20150254409 | PATIENT DATA EXCHANGE - The invention relates to a method for simplified patient data exchange, e.g. between a patient and a hearing device dispenser. The information provided by the patient in visual form is digitally imaged, and the relevant patient information is extracted from thus-generated image data. This data is then applied for various hearing device dispensing and controlling functions. | 2015-09-10 |
20150254410 | SYSTEMS AND METHOD FOR MANAGEMENT AND DELIVERY OF ORTHODONTIC TREATMENT - The present invention provides systems and methods of managing delivery of an orthodontic treatment plan using treatment guidelines, instructions and appointment planning tools customized to the individual patient being treated. A method includes, e.g., generating a treatment plan for a patient, generating a customized set of treatment guidelines, providing the set of customized treatment guidelines to the practitioner; and providing a set of orthodontic appliances to the practitioner. | 2015-09-10 |
20150254411 | METHOD OF EVALUATING PANCREATIC CANCER, PANCREATIC CANCER-EVALUATING APPARATUS, PANCREATIC CANCER-EVALUATING METHOD, PANCREATIC CANCER-EVALUATING PROGRAM PRODUCT, PANCREATIC CANCER-EVALUATING SYSTEM, AND INFORMATION COMMUNICATION TERMINAL APPARATUS - A method of evaluating pancreatic cancer includes (I) an obtaining step of obtaining amino acid concentration data on a concentration value of an amino acid in blood collected from a subject to be evaluated, and (II) an evaluating step of evaluating a state of pancreatic cancer in the subject by calculating a value of a formula using the amino acid concentration data of the subject obtained at the obtaining step and the formula previously established for evaluating the state of pancreatic cancer, including an explanatory variable to be substituted with the concentration value of the amino acid. The amino acid concentration data includes the concentration values of at least two amino acids of Asn, His, Thr, Ala, Cit, Arg, Tyr, Val, Met, Lys, Trp, Gly, Pro, Orn, Ile, Leu, Phe, Ser, and Gln, and the formula includes at least two explanatory variables to be substituted with the concentration values of at least two amino acids of Asn, His, Thr, Ala, Cit, Arg, Tyr, Val, Met, Lys, Trp, Gly, Pro, Orn, Ile, Leu, Phe, Ser, and Gln. | 2015-09-10 |
20150254412 | CAREGIVER CENTRIC AND ACUITY ADAPTING MULTI-PATIENT SYSTEM - A workflow system includes a workflow unit ( | 2015-09-10 |
20150254413 | STIMULATION LEADWIRE AND VOLUME OF ACTIVATION CONTROL AND DISPLAY INTERFACE - A method and system include a processor that outputs a model of anatomical structures of a region in which a leadwire is implanted, the structures being distinguished by graphical indicia associated with respective textual descriptions in a legend. Electrodes of a model of the leadwire overlaid on the anatomical structure models are selectable, in response to which selection the processor displays a control for modifying an electrical setting of the selected contact. | 2015-09-10 |
20150254414 | MOBILE DEVICE CASING FOR HEALTH MONITORING - A casing adapted to use with a mobile device for monitoring health condition of a user is provided. The casing includes (a) a memory unit, (b) a sensor unit at a surface of the casing, (c) a plurality of health parameter measuring sensors embedded within the sensor unit for measuring raw health parameters data of the user, (d) a processor which is activated from a sleep mode based on a user input including contacting at least one predetermined sensor surface on the casing for a predetermined period, and (e) a power unit for controllably supplying power to the sensors and the processor upon detecting the user input. The processor (i) initializes and configures the sensors, and (ii) receives the raw health parameters data from the sensors. The casing further includes a communication unit for communicating the raw health parameters data to a mobile device for processing. | 2015-09-10 |
20150254415 | Methods and Systems for Context Driven Real Time Messaging in Healthcare Information - A computer implemented communication method between healthcare professionals. includes receiving, from a first electronic device, a text communication having a patient identifier corresponding to a patient and identifying, via a computer, the patient identifier of the text communication. The method also includes retrieving, via the computer, one or more portions of electronic patient medical records corresponding to the patient identifier and transmitting, via a real time messaging server, the text communication and the one or more portions of the electronic patient medical records to a second electronic device. The method further includes simultaneously displaying the text communication and the one or more portions of the electronic patient medical records at the second electronic device. | 2015-09-10 |
20150254416 | METHOD AND SYSTEM FOR PROVIDING MEDICAL ADVICE - A method and system for providing medical services wherein a server establishes a wireless connection with a mobile device or computer of a user. The mobile device or computer has already been provided with an application for the entry of user information. The server receives encrypted user information from the mobile device or computer, decrypts the user information, and forwards the user information to experts selected on the basis of the user information. The server collects responses from the experts, and provides expert advice to the user of the mobile device or computer. | 2015-09-10 |
20150254417 | Group-Sparse Nonnegative Supervised Canonical Correlation Analysis (GNCCA) - Methods, apparatus, application specific integrated circuits (ASIC)s and other embodiments associated with analyzing a cancerous prostate using group-sparse non-negative canonical correlation analysis (GNCCA) with a variable importance in the projections (VIP) score are described. One example apparatus includes a set of logics that acquires a set of features from a plurality of feature views of a region of tissue demonstrating cancerous pathology, produces a ranked set of discriminative features using GNCCA with the VIP score, optimizes computation of the GNCCA using a vector-block coordinate descent (BCD) approach, and provides a prostate cancer (CaP) grade or a biochemical recurrence (BcR) score based on the set of discriminative features. Embodiments of example apparatus may generate and display the CaP grade, BcR score, or set of discriminative features. | 2015-09-10 |
20150254418 | METHODS AND SYSTEMS FOR PREDICTING SENSITIVITY OF BLOOD FLOW CALCULATIONS TO CHANGES IN ANATOMICAL GEOMETRY - Embodiments include methods and systems and for determining a sensitivity of a patient's blood flow characteristic to anatomical or geometrical uncertainty. For each of one or more of individuals, a sensitivity of a blood flow characteristic may be obtained for one or more uncertain parameters. An algorithm may be trained based on the sensitivities of the blood flow characteristic and one or more of the uncertain parameters for each of the plurality of individuals. A geometric model, a blood flow characteristic, and one or more of the uncertain parameters of at least part of the patient's vascular system may be obtained for a patient. The sensitivity of the patient's blood flow characteristic to one or more of the uncertain parameters may be calculated by executing the algorithm on the blood flow characteristic of at least part of the patient's vascular system, and one or more of the uncertain parameters. | 2015-09-10 |
20150254419 | MEDICAL DEVICES FOR MAPPING CARDIAC TISSUE AND METHODS FOR DISPLAYING MAPPING DATA - Methods for displaying summarized physiological mapping data are disclosed. An example method may include storing a set of three-dimensional positional data on a memory, storing a set of metric data on the memory, and storing a set of electrogram data on the memory. The method may also include outputting the set of three-dimensional positional data, the set of two-dimensional metric data, and the set of electrogram data from the memory to a display unit and displaying the set of three-dimensional positional data, the set of two-dimensional metric data, and the set of electrogram data on the display unit as a summarized static display. | 2015-09-10 |
20150254420 | PRIORITIZATION OF THREE DIMENSIONAL DENTAL ELEMENTS - The present disclosure includes methods, systems, and devices for prioritization of three dimensional dental elements. One method for prioritizing three dimensional dental elements includes receiving a virtual initial dental data set (IDDS) of teeth having spatial information regarding the positions of a number of teeth in the virtual IDDS with respect to each other for presentation of the teeth in a virtual three dimensional space to be viewed on a user interface, setting prioritization values of a number of elements of one or more of the number of teeth, and prioritizing the number of elements to be selected by a user based upon their prioritization values. | 2015-09-10 |
20150254421 | METHODS OF DIAGNOSING AMYLOID PATHOLOGIES USING ANALYSIS OF AMYLOID-BETA ENRICHMENT KINETICS - A method of diagnosing an amyloid pathology in the central nervous system of a patient using measurements of enrichment kinetics of at least one amyloid-β isoform is provided. In addition, a model to predict enrichment kinetics of at least one amyloid-β isoform, methods of calibrating the model, and methods of using the model to diagnosing an amyloid pathology in the central nervous system of a patient are provided. | 2015-09-10 |
20150254422 | METHOD AND SYSTEM FOR SIMULATING SURGICAL PROCEDURES - A system and method for converting static/still medical images of a particular patient into dynamic and interactive images interacting with medical tools including medical devices by coupling a model of tissue dynamics and tool characteristics to the patient specific imagery for simulating a medical procedure in an accurate and dynamic manner. | 2015-09-10 |
20150254423 | COMPUTER-BASED PRESCRIPTION SYSTEM FOR MEDICAMENTS - In a method and system for processing and exchanging prescription data in a distributed network system that includes a database, a medical server, a smartphone and a provider, such as a pharmacy's computer. The medical server may be operated by a physician, who issues a prescription for a respective patient. The medical server is adapted to generate a prescription package and to transmit the package over a second network to a mobile device, which is associated with the patient. The mobile device includes a prescription module that is adapted to generate a prescription dataset for transmission to the provider. The provider in turn resolves the received dataset by extracting an identification of a digital certificate, and generates a medication dataset, which may be sent to the mobile device. | 2015-09-10 |
20150254424 | SYSTEM AND APPARATUS FOR IMPROVING MEDICATION REGIMEN ADHERENCE - A computer-based system for improving medication regimen adherence, including: a container arranged to hold a first medication and including a wireless transceiver and a unique identifier; and a wireless communications device (WCD) including: a memory element configured to store a medication regimen including a prescription for the medication and the unique identifier, the unique identifier associated with the medication regimen; and a processor configured to when the container is within a predetermined distance of the WCD obtain, via the wireless transceiver, the unique identifier from the container, confirm that the unique identifier from the container matches the unique identifier stored in the memory element, obtain data from the container regarding instances of the container being opened, determine, according to the data and the medication regimen, that a reminder to take the medication is desired, and output a sensory reminder signal. | 2015-09-10 |
20150254425 | HANDWRITING RECOGNITION TOOL - Some implementations may provide a method implemented on a processor, the method includes: receiving, on a computer host, an electronic document representing a pharmaceutical prescription; identifying constituent regions that include at least a first portion and a second portion within the electronic document; identifying first spatial frequencies for the first portion within the electronic document; identifying second spatial frequencies for the second portion within the electronic document; identifying a header based upon the first spatial frequencies; using the header to identify a prescriber; retrieving a profile for the prescriber; analyzing the second spatial frequencies using the profile for the prescriber; and creating, based upon analyzing the second spatial frequencies using the profile for the prescriber, a transaction record on the computer host for a medical transaction associated with the pharmaceutical prescription. | 2015-09-10 |
20150254426 | Method and Apparatus for Preparing Medications for Administration to Subjects - A method and apparatus for preparing a plurality of medications for administration to a subject during one session, which medications include active ingredients each of a specified concentration for the respective medication, by: preparing a supply of each of the active ingredients; separating from each supply a quantity of the respective active ingredient corresponding to the specified concentration for the respective medication; mixing the separated quantities of active ingredients with at least one additive to produce a formulation mixture; and forming the resulting formulation mixture into a batch of personalized single units for administration to, and personalized for, the subject during the one session. | 2015-09-10 |
20150254427 | Medication Adherence System for and Method of Monitoring a Patient Medication Adherence and Facilitating Dose Reminders - A medication adherence system for and method of monitoring a patient's medication adherence and facilitating dose reminder notifications is disclosed. The medication adherence system includes data-enabled pharmaceutical containers, wherein the data-enabled pharmaceutical containers provide mechanisms for reminding at dose time, then tracking and communicating valid dose events, as well as missed, extra, early, and/or late dose events. The medication adherence system includes a centralized server for collecting and processing the patient-specific information from the data-enabled pharmaceutical containers. Information may be exchanged between the centralized server and the data-enabled pharmaceutical containers via a cellular network and/or the Internet. | 2015-09-10 |
20150254428 | OPT-IN COLLECTOR SYSTEM AND METHOD - A method delivers a purchase discount to a communications device, such as a cellular phone. The communications device is capable of capturing and sending over a telecommunications network a token representing a purchasable item associated with the purchase discount. The method includes receiving the token by a server computer from the communications device over the telecommunications network, looking-up in an eligibility database by the server computer at least a portion of the token, obtaining at least one eligibility record from the step of looking-up in the eligibility database, looking-up in a discount database by the server computer at least a portion of the at least one eligibility record, obtaining at least one discount artifact from the step of looking-up in the discount database, sending a discount coupon corresponding to the at least one discount artifact by the server computer over the telecommunications network to the communications device, the discount coupon representing the purchase discount, and discounting price of the purchasable item associated with the purchase discount upon presentation of the discount coupon via the communications device. | 2015-09-10 |
20150254429 | SYSTEMS AND METHODS FOR VALUE-BASED DECISION SUPPORT - An example system includes a care decision subsystem to process a patient problem and clinical patient attribute to (a) identify a plurality of patient care path options for evaluation by a patient and/or provider and to (b) generate a mashup of the plurality of patient care path options based on a combination of patient-specific criteria including (i) clinical efficacy and (ii) cost associated with each of the plurality of patient care path options. Each of the plurality of patient care path options is generated for visual representation to be displayed and utilized in an evaluation by the patient/provider with respect to an objective associated with the patient problem. A user interface displays the mashup of the plurality of patient care path options for interaction to facilitate a data-driven selection of at least one of the plurality of patient care path options based on comparative efficacy and cost. | 2015-09-10 |
20150254430 | MEDICAL TEST RESULT DISPLAY DEVICE AND METHOD FOR OPERATING THE SAME - A medical test result display device and an operating method thereof are provided. An integration server reads out medical information from a medical case DB on the basis of a patient ID of a delivery request. A screen producing section reads out important test items from important test item information in accordance with an injury/disease code in the delivery request, and extracts test values on the important test items from the medical information. A case list creating section reads out representative case information from the medical case DB on the basis of the injury/disease code. The screen producing section produces a comparative display screen showing a test value graph based on the test values extracted from the medical information and a representative case graph based on test values in the representative case information in a manner allowing comparison therebetween, and delivers the screen to a department terminal to display same. | 2015-09-10 |
20150254431 | PATIENT INFORMATION DELIVERY AND COLLECTION SYSTEM - A multi-level patient information delivery system and data collection application. More specifically, an enhanced patient communication and data collection system that functions for pre-, peri-, and post-operative settings. One component of the system is a modified patient portal designed to guide patients through specific surgical experiences by giving access to time-relevant and needs-specific information as the patient moves from pre-operative assessment through post-operative recovery. A second component of the system is a database collection and analysis program for the doctor, surgeon, or other attending physician. | 2015-09-10 |
20150254432 | CLINICAL TRIAL ENGAGEMENT TOOL - A clinical trial engagement tool and method execute on a mobile computing device. The tool includes displays of information containing pre-enrollment content based on searches executed on the mobile computing device, wherein access thereto is enabled without requirement of a user-specific login or security key. The tool includes displays containing clinical trial patient participation content, wherein access thereto is enabled only upon completion of a user authentication and authorization process. A tracking mechanism of the tool generates data that tracks which of the plurality of displays containing pre-enrollment content are accessed. The tool displays information containing notification content that is automatically selected for display based on the tracked data, thereby transforming the data into parameters that define which displays of notification content are automatically selected for display. The notification content includes information related to upcoming clinical trials having a potential to be of interest to the user of the device. | 2015-09-10 |
20150254433 | Methods and Models for Determining Likelihood of Cancer Drug Treatment Success Utilizing Predictor Biomarkers, and Methods of Diagnosing and Treating Cancer Using the Biomarkers - A method of identifying one or more biomarkers associated with one or more drugs effective to stop or repress proliferation of cancer cells, and a system for predicting effectiveness of the same. The method includes statistically analyzing (i) a first dataset of expression levels of proteins or glycoproteins in the cancer cells and (ii) a second dataset of responses of the cancer cells to drugs to identify at least one biomarker associated with effective repression of the cancer cells, and correlating or associating at least one protein or glycoprotein biomarker with a response of the cells to at least one of the drugs effective to stop or repress the proliferation of the cancer cells. The protein and/or glycoprotein expression level datasets may be generated experimentally or taken from published information. The method advantageously determines and/or predicts drug sensitivity of various cancer cells using protein and glycoprotein biomarkers. | 2015-09-10 |
20150254434 | Systems and Methods for Identifying Drug Targets Using Biological Networks - Certain embodiments of the invention may include systems and methods for identifying drug targets using biological networks. According to an example embodiment of the invention, a method is provided for predicting the effects of drug targets on treating a disease. The method can include constructing a structure of a Bayesian network based at least in part on knowledge of drug inhibiting effects on a disease; associating a set of parameters with the constructed Bayesian network; determining values of a joint probability distribution of the Bayesian network via an automatic procedure; deriving a mean Bayesian network with one or more averaged parameters based at least in part on the joint probability values; and calculating a quantitative prediction based at least in part on the mean Bayesian network. | 2015-09-10 |
20150254435 | CONTENT PROTECTION - The information marked on one electronic content is compared to that marked on another electronic content in order to determine if either are unauthorised. There are a number of ways of comparing the information in order to make this determination. One way is to detect if two electronic content accessed by the same device have information associated with different users. Another way is to detect if two electronic content accessed by different devices have information associated with a single user. A further way is to use the time or sequence of access in conjunction with the information. Other ways of determining unauthorised content are disclosed. | 2015-09-10 |
20150254436 | DATA PROCESSING METHOD AND ELECTRONIC DEVICE THEREOF - A method of operating an electronic device is provided. The method includes creating a security key based on data shared with a specific electronic device, creating security configuration information and a watermarking content based on the security key, and transmitting the security configuration information and the watermarking content to the specific electronic device. | 2015-09-10 |
20150254437 | METHOD AND SYSTEM FOR DISTRIBUTING MEDIA CONTENT - Aspects of the subject disclosure may include, for example, receiving from a communication system media content with metadata, recording the media content, detecting in the metadata a description of the media content correlating with a preference profile, presenting a first prompt requesting an acceptance or rejection of the media content, presenting a second prompt requesting a selection from a plurality of communication devices to direct in whole or in part the media content thereto, detecting the selection from the plurality of communication devices, and transmitting in whole or in part the media content to the selected communication device. Other embodiments are disclosed. | 2015-09-10 |
20150254438 | SYSTEM, METHOD, AND DEVICE FOR DELIVERING COMMUNICATIONS AND STORING AND DELIVERING DATA - A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server. | 2015-09-10 |
20150254439 | LICENSING USING A CLOUD PUBLIC-MESSAGING INFRASTRUCTURE - In various embodiments, methods and systems for license-messaging using cloud public-messaging infrastructures are provided. A cloud public-messaging infrastructure supports license message communication between applications. The cloud public-messaging infrastructure may implement license-messaging that circumvents network control units that control communication to the network components. A license-messaging channel is initialized with an on-premise relay service using the cloud public-messaging infrastructure. A cloud-based relay service listens for a license request from the cloud-based application. The license request is pushed using the cloud public-messaging infrastructure such that the license request is pulled through the license-messaging channel via the on-premise relay service to the on-premise license server. A response to the license request is received at the cloud-based relay service, via the on-premise relay service using the license messaging channel, and forwarded to the cloud-based application. | 2015-09-10 |
20150254440 | Method, Apparatus and System for Software Management - A method, apparatus and system for software management are provided that relate to the technical field of communications, and that allow software installed on a Universal Plug and Play (UPnP) device by a service provider to be managed only by that service provider. The method comprises receiving a software installation command sent by a first control device, installing software according to the software installation command and storing a first authentication information required during management of the software; receiving a software management command sent by a second control device, and acquiring a second authentication information corresponding to the software management command, which command is used in managing the software; when the second authentication information is consistent with the first authentication information, executing the software management command. | 2015-09-10 |
20150254441 | Authentication for Online Content using an Access Token - Techniques for authentication for online content using an access token are described. According to various embodiments, online content (e.g., webpages and other types of web content) can be served across a variety of different online resources. According to one or more embodiments, an access token is leveraged to enable a user to authenticate with multiple different distributed content resources for access to online content, and without requiring the user to input authentication credentials for each of the content resources. | 2015-09-10 |
20150254442 | System and Method of Data Cognition Incorporating Autonomous Security Protection - Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations. Intelligent Agents, a comprehensive data structure, and intelligent document means are leveraged for implementation. | 2015-09-10 |
20150254443 | METHOD AND SYSTEM FOR ENFORCED BIOMETRIC AUTHENTICATION - A method for biometric authentication of a user by a challenge/response procedure with a mobile station includes authenticating the enrolled user before performing a transaction by: setting up a communication channel between the mobile station and the authentication server; forwarding a challenge from the authentication server to the mobile station; recording a response sequence expressed by the user and recording simultaneously ambient signals or a response of the ambience; forwarding the recorded response sequence and the recorded ambient signals to the authentication server; evaluating the recorded response sequence based on related biometric data retrieved from the database and verifying whether the user corresponds to the enrolled user; evaluating the ambient signals and identifying signal changes within the ambient signals; and determining whether the identified signal changes represent a logical sequence of events in the user's vicinity. | 2015-09-10 |
20150254444 | CONTEMPORANEOUS GESTURE AND KEYBOARD ENTRY AUTHENTICATION - A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process. | 2015-09-10 |
20150254445 | BIOMETRIC AUTHENTICATION APPARATUS AND METHOD - A biometric authentication apparatus includes processing apparatuses allocated with biometric data to be matched, a storage unit that stores a distribution of the biometric data for each of a plurality of quality levels, and an authentication processing time required by an authentication process of each of the processing apparatuses, and a management apparatus. The management apparatus extracts first and second processing apparatuses from the processing apparatuses based on the authentication processing time, identifies a quality level for which a difference between the distributions of the first and second processing apparatuses is greater than or equal to a threshold value, and exchanges the biometric data having the identified quality level between the first and second processing apparatuses. | 2015-09-10 |
20150254446 | UTILIZATION OF BIOMETRIC DATA - A method for authenticating a user on a device is provided. In one embodiment, a method for authenticating a user on a device comprises receiving an authentication request. The method may also comprise checking a memory cache for available biometric data. The method may also comprise retrieving the available biometric data from the memory cache. Retrieving available biometric data may comprise, in one embodiment retrieving available biometric data in reverse order based on a time stamp associated with the available biometric data such that the most recent biometric data is pulled first. Retrieving available biometric data may also comprise determining whether each portion of retrieved biometric data comprises verified or non-verified biometric data. The method may also comprise comparing the retrieved biometric data to an enrollment template and, upon determining that the retrieved biometric data matches the enrollment template, indicating that an authentication is complete. In one embodiment, the method is configured to be implemented on a computing device with a processor. | 2015-09-10 |
20150254447 | EXPRESSION RECOGNITION IN MESSAGING SYSTEMS - Some embodiments include a messaging system capable of expression-based communication and/or expression-based actions. The messaging system can run on a computing device. For example, the messaging system monitors a camera feed from a camera of the computing device to detect a biometric signature when a messaging interface of the messaging application is actively being used. The messaging system can match the detected biometric signature against a known profile utilizing a facial recognition process to authenticate an operating user to use the messaging application. The messaging system can determine a human expression based on the detected biometric signature utilizing an expression recognition process to associate a contextual tag with an activity on the messaging interface. The messaging system can then communicate with a message server system to associate the contextual tag with content presented to the operating user or a conversation participated by the operating user via the messaging application. | 2015-09-10 |
20150254448 | Verifying Human Use of Electronic Systems - Described herein are techniques related to verifying human use of electronic systems. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope and meaning of the claims. A user-interaction module obtains a user's request to access and/or utilize an electronic system. A plain-text call generator in conjunction with a randomizer generates a random plain-text call. A modifier rule generator in conjunction with the randomizer generates a modifier rule. The user-interaction module transmits the random plain-text call and the random modifier rule to the user and obtains a response from the user. A comparison module compares the response by the user with an expected response and informs a verification module of the result. The verification module indicates a denial of access if the obtained response and expected response differ, and grants access if the obtained response and expected response match. | 2015-09-10 |
20150254449 | Coordinated Passcode Challenge for Securing a Device - Described is a device that secures low level software on the device such as a boot loader. In addition, the device may coordinate a passcode challenge between a boot module, which may be provided by a first manufacturer, and an operating system of the device, which may be provided by a second distinct manufacturer. By coordinating passcodes challenges, a user may not be required to establish and/or remember two separate passcodes for securing the device. | 2015-09-10 |
20150254450 | DISPOSITION ENGINE FOR SINGLE SIGN ON (SSO) REQUESTS - Systems and methods are described for evaluating disposition of an SSO request. In one example, the method includes receiving the SSO request, the SSO request for accessing a secure service, the request having been denied authorization to access a first service, determining, based upon one or more criteria, where to direct the SSO request, and routing the SSO request to a second service, the routing based on the determining where to direct the SSO request. | 2015-09-10 |
20150254451 | AUTHENTICATION OF VIRTUAL MACHINE IMAGES USING DIGITAL CERTIFICATES - A vendor of virtual machine images accesses a virtual computer system service to upload a digitally signed virtual machine image to a data store usable by customers of the virtual computer system service to select an image for creating a virtual machine instance. If a digital certificate is uploaded along with the virtual machine image, the virtual computer system service may determine whether the digital certificate has been trusted for use. If the digital certificate has been trusted for use, the virtual computer system service may use a public cryptographic key to decrypt a hash signature included with the image to obtain a first hash value. The service may additionally apply a hash function to the image itself to obtain a second hash value. If the two hash values match, then the virtual machine image may be deemed to be authentic. | 2015-09-10 |
20150254452 | METHODS AND APPARATUS TO MANAGE PASSWORD SECURITY - Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes an alarm action engine to invoke a provisional transmission block in response to detecting entry of a candidate password, a password linkage monitor to retrieve a list of password hash values associated with previously used passwords, and to compare the list of password hash values to a hash of the candidate password, the alarm action engine to invoke a permanent block of the candidate password when a match condition occurs between the hash of the candidate password and a hash of one of the list of password hash values. | 2015-09-10 |
20150254453 | PASSWORD MANAGEMENT SYSTEM - A password management system includes a character string conversion unit that converts an input character string to a character string different from the input character string using a predetermined arithmetic expression, the predetermined arithmetic expression being capable of giving a same converted result for a same character string and capable of converting a character string such that a plurality of original character string candidates exist for a converted character string; a password data storage unit that stores, for each user, a converted past password character string CPP that is a converted state of a past password character string PP of the user using the predetermined arithmetic expression and is different from the past password character string PP; and a strength determining unit that determines strength of a password. | 2015-09-10 |
20150254454 | INTEGRATED MESSAGE VEILING SYSTEM - An integrated veiled message system for securely delivering messages over a communications network. Client devices transmit and receive messages over the communication network. Each client device is network enabled, associated with a user and has a client processor and a screen to compose and display messages. The network router routes each message to the recipient's client device. The client processor of the recipient's client device receives the recipient's message with a veil from the sender's client device. The veil being selected by the sender which partially or entirely covers the message when displayed on the screen on the recipient's client device. The client processor of the recipient's client device renders and displays the recipient's message and accompanying veil on the screen to reveal and display only a portion of the message not covered by the accompanying veil. | 2015-09-10 |
20150254455 | SYSTEMS AND METHODS FOR RADE SERVICE ISOLATION - The present invention is directed towards systems and methods of streaming an application from a remote location to a local machine system, and using local machine system resources in executing that application. In various embodiments, services needed by a streamed application may be started with high local system privileges in their own isolation environment. These service may be started, stopped, and otherwise managed by a Service Control Manager. In order for an application to both access services that operate at high local system privileges and the network so that it can access remotely stored, streaming, information; a streaming application may rely on privileges of the user when accessing network information rather than the higher privileges of the services running in isolation. | 2015-09-10 |
20150254456 | LOW-COST SPECIFICATION AND ENFORCEMENT OF A PRIVACY-BY-CONSENT- POLICY FOR ONLINE SERVICES - A system and method for implementing a privacy policy in an application to be run are provided. Definitions are received for a set of fields. At least one of the fields is designated as sensitive by a default privacy policy. A user is provided with a consent editor whereby the user can consent to relaxing the default privacy policy for at least one of the sensitive fields. A consent privacy rule is generated based on the received consent. A mapping aspect is provided which identifies joins at which code of the application is to be augmented by calling a minimization service to apply the default privacy policy by generating a minimized value of data in each of the designated sensitive fields used by the application unless there is a generated consent privacy rule which authorizes relaxation of the default privacy policy for the user's data in a respective sensitive field. | 2015-09-10 |
20150254457 | SYSTEM AND METHOD FOR CREATING SECURE APPLICATIONS - A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application. | 2015-09-10 |
20150254458 | ELECTRONIC SYSTEM HAVING INTEGRITY VERIFICATION DEVICE - Provided are an electronic system, an integrity verification device, and a method of performing an integrity verification operation. The electronic system includes: a memory device; a processor configured to provide a plurality of configuration records corresponding to a plurality of verification data stored in the memory device, each of the configuration records including a start address, a data length, and a reference hash value for a corresponding verification data; and an integrity verification device configured to: store the configuration records, select a configuration record, directly access the memory device to read verification data, corresponding to the selected configuration record, based on the start address and the data length included in the selected configuration record, perform a hash operation on the verification data to obtain a verification hash value, and output an interrupt signal based on the verification hash value and the reference hash value comprised in the selected configuration record. | 2015-09-10 |
20150254459 | Proving Age and Integrity of Website Pages - Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection. | 2015-09-10 |
20150254460 | DYNAMIC FEATURE ENHANCEMENT IN CLIENT SERVER APPLICATIONS AND HIGH VOLUME SERVER DEPLOYMENT WITH DYNAMIC APP STORE INTEGRATION - Generally, this disclosure provides methods and systems for dynamic feature enhancement in client server applications and for high volume server deployment with dynamic app store integration and further enable the delivery of a secure server in a pre-configured turnkey state through an automated process with increased efficiency tailored to mass production. The system may include a server application module configured to receive request packets from, and send response packets to, a web based client application, the packets comprising input data, output data and control commands associated with a feature; and a script engine module coupled to the server application module, the script engine module configured to identify a plug-in application on a remote server, download the plug-in application and execute the plug-in application under control of the server application module, wherein the plug-in application implements the feature. | 2015-09-10 |
20150254461 | TESTING INTEGRATED INDEPENDENT LEVELS OF SECURITY COMPONENTS HOSTED ON A VIRTUALIZATION PLATFORM - A virtualization platform that provides a systematic, transparent and local testing of components hosted by the virtualization platform in their integrated context. The virtualization platform comprises integrated interceptor modules connected to the components via communication channels, each interceptor module being interposed in the communication channel connecting two components, and an integrated analyzing device connected to the interceptor modules and comprising a control device and a testing device. The control device is configured to put each interceptor module in an operational mode selected out of a set of predetermined operational modes including a testing mode. The testing device is configured to locally test the components connected to the interceptor modules being put in the testing mode. | 2015-09-10 |
20150254462 | INFORMATION PROCESSING DEVICE THAT PERFORMS ANONYMIZATION, ANONYMIZATION METHOD, AND RECORDING MEDIUM STORING PROGRAM - The present invention provides an information processing device that performs anonymization such that information on correspondence relationships between records does not become too unclear. | 2015-09-10 |
20150254463 | SECURITY AND DATA PRIVACY FOR LIGHTING SENSORY NETWORKS - In various example embodiments, a system and method are provided for protection customer data collected at sensor nodes within a networked system. A key recovery module determines the encrypted sensor data in a request was encrypted with a certified public key associated with a first customer key-pair. The first customer key-pair represents a recovered private key. The key recovery module determines the private key associated with the first customer key-pair is encrypted with the private key associated with a second customer key-pair. The private key associated with the first customer key-pair is decrypted by using the private key associated with the second customer key-pair. The encrypted sensor data in the request is decrypted using the decrypted private key associated with the first customer key-pair. | 2015-09-10 |
20150254464 | METHOD AND SYSTEM TO PROVIDE CUSTOMIZABLE AND CONFIGURABLE LOCK SCREEN IN A USER DEVICE - The proposed embodiment provides a method and system to customize the keyguard and lock screen and provide custom ways of unlocking device/workspace. A password is configured dynamically in the electronic device in at least one format and accordingly a lock is triggered in the electronic device to enable screen lock. A customization application is selected through a predesigned interface for enabling a customized view to the lock mode of the screen. The lock customization application is selected to provide an access to one or more options for customizing the view of the lock screen. | 2015-09-10 |
20150254465 | Method And Apparatus For Security Mechanism For Proximity-Based Access Requests - An approach is provided for providing security mechanism for proximity-based interactions among devices. A first device (e.g., a memory tag) may determine a request for interaction between the first device and a second device (e.g., a mobile phone), wherein at least the first device is associated with at least one first antenna and at least one second antenna. The first device may determine a first signal received by the at least one first antenna and a second signal received by the at least one second antenna. Further, the first device may determine one or more differences in one or more characteristics of the first signal and the second signal. Furthermore, the first device may process or facilitate a processing of the one or more differences to determine whether to allow the interaction. | 2015-09-10 |
20150254466 | METHOD AND APPARATUS FOR INPUTTING DATA - Embodiments of the present invention provide a method and an apparatus for inputting data. The present invention relates to the communications field and aims to improve security of input information. The method includes: acquiring, by a virtual machine manager, input data; performing, by the virtual machine manager, encryption processing on the input data according to an encryption rule of a security connection to obtain encrypted data; and sending, by the virtual machine manager, the encrypted data to the server. The present invention is applicable to a data input scenario. | 2015-09-10 |
20150254467 | MESSAGE SENDER SECURITY IN MESSAGING SYSTEM - Some embodiments include a method of providing security and privacy for a message sender. The method can include a messaging application determining that a messaging interface of the computing device is active and is revealing or about to reveal the electronic message. The messaging application can identify a recipient account of a messaging server system that is associated with the electronic message according to the electronic message or the messaging server system. The messaging application can then monitor a data feed from a sensor of the computing device to detect a biometric pattern that matches against a biometric profile model associated with the recipient account utilizing a biometric recognition process. In response to determining that the detected biometric pattern does not match the biometric profile model associated with the recipient account, the messaging application can activate a privacy shield to prevent content of the electronic message from being revealed. | 2015-09-10 |
20150254468 | METHOD AND SYSTEM FOR EXECUTING APPLICATIONS IN AN UNTRUSTED ENVIRONMENT - A method for executing applications on an untrusted device includes selecting one or more applications as sensitive applications. One or more instruction sequences of the said one or more sensitive applications are modified by an external dongle. The one or more sensitive applications are executed on the untrusted device according to the modified instruction sequences. Whether correct execution of the instructions of the said modified instruction sequences has Occurred is checked by the external dongle. | 2015-09-10 |
20150254469 | DATA LEAK PREVENTION ENFORCEMENT BASED ON LEARNED DOCUMENT CLASSIFICATION - The present disclosure relates generally to the field of automatically learning and automatically adapting to perform classification of protected data. In various examples, learning and adapting to perform classification of protected data may be implemented in the form of systems, methods and/or algorithms. | 2015-09-10 |
20150254470 | Apparatus and Methods for Displaying Information Regarding Objects - Apparatus, and methods utilizing such apparatus, are described for displaying information regarding an object including a terminal for collecting, manipulating, and displaying information regarding the object, and a location processor for determining the location of the terminal with respect to the object. The apparatus further includes an access processor programmed to deny a user of the terminal access to the information when the distance between the terminal and the object exceeds a specified value. The apparatus and methods are particularly useful when implemented in a hospital setting in which the user is a medical provider, the object is a patient, and the terminal is a mobile terminal. | 2015-09-10 |
20150254471 | MOBILE TERMINAL AND METHOD FOR CONTROLLING THE SAME - A mobile terminal including a wireless communication unit configured to provide wireless communication; a touch screen; and a controller configured to receive a user signature that identifies a user and has a predetermined trace on the touch screen, and enter a user-only accessible folder based on the received user signature. | 2015-09-10 |
20150254472 | System and Method of Owner Application Control of Electronic Devices - Systems and methods of owner application control of an electronic device are provided. Owner application control information is stored on the electronic device and/or one or more remote servers. Owner application control information is consulted to determine if one or more required applications are available for execution on the electronic device. If not, one or more required applications not available are downloaded and installed. This could be in a manner transparent to the user of the electronic device. If one or more required applications are not available on the electronic device, the device can be functionally disabled in whole, or in part, until one or more required applications are available. | 2015-09-10 |
20150254473 | PROVIDING LOGICAL PARTITIONS WITH HARDWARE-THREAD SPECIFIC INFORMATION REFLECTIVE OF EXCLUSIVE USE OF A PROCESSOR CORE - Techniques for simulating exclusive use of a processor core amongst multiple logical partitions (LPARs) include providing hardware thread-dependent status information in response to access requests by the LPARs that is reflective of exclusive use of the processor by the LPAR accessing the hardware thread-dependent information. The information returned in response to the access requests is transformed if the requestor is a program executing at a privilege level lower than the hypervisor privilege level, so that each logical partition views the processor as though it has exclusive use of the processor. The techniques may be implemented by a logical circuit block within the processor core that transforms the hardware thread-specific information to a logical representation of the hardware thread-specific information or the transformation may be performed by program instructions of an interrupt handler that traps access to the physical register containing the information. | 2015-09-10 |
20150254474 | GENERATION OF ANALYSIS REPORTS USING TRUSTED AND PUBLIC DISTRIBUTED FILE SYSTEMS - The invention provides for a data processing system comprising an application server comprising at least one processor. Execution of the instructions cause the processor to: receive an analysis request, the analysis request comprising multiple data analysis commands for generating an analysis report descriptive of a structured data file; divide the commands into private analysis commands and public analysis commands; send the private analysis commands to a trusted distributed file system; send a portion of the public analysis commands to a public distributed file system; send a remainder of the public analysis commands to the trusted distributed file system; and generate the analysis report using public analysis results from the public distributed file system and trusted analysis results from the trusted distributed file system. | 2015-09-10 |
20150254475 | PRIVATE BROWSING MODE ACCESS FOR DEVELOPERS - Activating a private browsing mode for a browser can include receiving an electronic document within the browser and detecting an indicator associated with the electronic document using a processor, wherein the indicator is correlated with the private browsing mode of the browser. Responsive to detecting the indicator, the electronic document can be rendered within a view of the browser in which private browsing mode is activated. | 2015-09-10 |
20150254476 | ENCODER AND METHOD FOR ENCODING THEREOF - A method of encoding and an encoder are provided. The method includes generating first one-hot bits for most significant bits (MSBs) and second one-hot bits for least significant bits (LSBs) using input one-hot bits; encoding the first one-hot bits to the MSBs and complementary MSBs through a first logical operation using a cross-connection; and encoding the second one-hot bits to the LSBs and complementary LSBs through a second logical operation using a cross-connection. The encoder includes a first bit generator, a first encoder, a second bit generator and a second encoder. | 2015-09-10 |
20150254477 | ENCRYPTION/DECRYPTION SYSTEM WHICH PERFORMS ENCRYPTION/DECRYPTION USING REGISTER VALUES, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An encryption/decryption system which is capable of preventing encrypted data from being easily decrypted. A program for carrying out an encryption process or a decryption process on data sent and received to and from a host apparatus is stored in encrypted form. A key for decrypting the stored program is generated in response to startup of the encryption/decryption system. The stored program is decrypted using the generated key, and the decrypted program is executed. | 2015-09-10 |
20150254478 | INFORMATION PROTECTION METHOD AND SYSTEM - Techniques described herein generally relate to protecting information stored in a mobile communication device. In one embodiment, a mobile communication device may include a data security module, a control circuitry, a first memory unit configured to store a first information, a first battery unit configured to supply power to the mobile communication device, and a second battery unit configured to supply power to the data security module and the control circuitry in response to a trigger event. The data security module is further configured to activate the control circuitry to perform a particular action on the first information, such as at least a partial erasure of the first information. | 2015-09-10 |
20150254479 | Printing Device, Printing System, and Control Method of a Printing Device - A printing device, a printing system, and a control method of a printing device can easily adjust how a barcode is printed. The printer stores a constant for adjusting how to print a barcode in a printer storage unit, interprets commands received from a host computer, and acquires a specified additional adjustment value when the interpreted command is a command specifying an additional adjustment value. When a command instructing printing a barcode is received, the printer prints the barcode based on the previously stored constant and the additional adjustment value acquired from a command. | 2015-09-10 |
20150254480 | SYSTEMS AND METHODS FOR CONTROLLING ACTIVATION OF OPTIONS PRELOADED ON A MATERIAL HANDLING VEHICLE - Systems and methods for a material handling vehicle include a controller and a near field communication reader adapted to communicate with the controller. The controller is configured to activate at least one of a software option and a hardware option when a near field communication device encoded with option information is placed within an operable range to the near field communication reader. | 2015-09-10 |
20150254481 | COMMUNICATION DEVICE, COMMUNICATION METHOD, INTEGRATED CIRCUIT, AND ELECTRONIC INSTRUMENT - The present technology relates to a communication device, a communication method, an integrated circuit, and an electronic instrument, which are capable of reducing a manufacturing cost of a communication device having both functions of an RF tag and reader/writer or an electronic instrument equipped with the communication device. A transmitting circuit transmits transmission data to a communication target by performing load modulation of changing an impedance of an antenna unit according to the transmission data using a first carrier generated in the antenna unit when the transmitting circuit operates in a first operation mode in which the transmitting circuit operates as an RFID reader/writer is performed, and the transmitting circuit transmits the transmission data to the RFID reader/writer by performing the load modulation of changing the impedance of the antenna unit according to the transmission data using a second carrier received by the antenna unit when the transmitting circuit operates in a second operation mode in which the transmitting circuit operates as a communication target of the RFID reader/writer is performed. For example, the present technology can be applied to a communication device having both functions of a reader/writer and an RF tag or an electronic instrument equipped with the communication device. | 2015-09-10 |
20150254482 | ELECTRICAL ACTIVITY SENSOR DEVICE FOR DETECTING ELECTRICAL ACTIVITY AND ELECTRICAL ACTIVITY MONITORING APPARATUS - An electrical activity monitoring device based on a sensor device attachable to a power cable of an electrical device for monitoring the electrical status of the electrical device. The device comprises an antenna element which performs the dual functions of magnetically coupling with an electrical pulse generated in the power cable in response to a change of electrical power state of the electrical device and to transmit data to a reader via the power cable. An electrical activity monitoring apparatus is also provided for monitoring the electrical status of at least one electrical device connected to a power supply network by a respective power cable provided with a sensor device. The electrical activity monitoring apparatus comprises a reader and a reader-power line interface device. | 2015-09-10 |
20150254483 | RFID Sensor - Various switchable RFID devices are disclosed. These switchable RFID devices may include one or more RFID tags and one or more switches. Some of these one or more switches are optionally wireless. In various embodiments, the switchable RFID devices include cellular phones, security devices, identity devices, financial devices, remote controls, and the like. In some embodiments, switches are configured to enter data into a switchable RFID device, for example to select a financial account. Switches are optionally configured to program the RFID device or to operate as sensors. | 2015-09-10 |
20150254484 | SENSOR ASSEMBLY, DEVICE AND METHOD FOR DETERMINING VIBRATIONS OF A MEASUREMENT OBJECT, AND MEASUREMENT OBJECT HAVING AT LEAST ONE SUCH SENSOR ASSEMBLY - A sensor assembly for determining vibrations of a measurement object, which sensor assembly is or can be fastened to the measurement object in a bonded, form-closed, and/or force-closed manner, an RFID transponder and an acceleration sensor unit coupled to the RFID transponder, wherein sensor data of the acceleration sensor unit are to be sent by means of the RFID transponder. Also disclosed is a device for determining vibrations of a measurement object, to a measurement object having at least one sensor assembly, and to a method for determining vibrations of a measurement object. | 2015-09-10 |
20150254485 | INDICIA READER FOR SIZE-LIMITED APPLICATIONS - An indicia-reading module is capable of integration into the smallest face of thin-profile smart device. The module employs chip-on-board packaging and a customized sensor enclosure to eliminate the stack-up height found in conventional packaging. The module also employs a customized frame to reduce volume by integrating circuit subassembly circuit boards into a unique architecture and by serving as the lenses for the illuminator and the aimer, thereby eliminating the need for any extra lenses or holders. | 2015-09-10 |
20150254486 | COMMUNICATION SYSTEM, IMAGE PICKUP DEVICE, PROGRAM, AND COMMUNICATION METHOD - A projector includes: a storage unit which stores data; a dividing unit which divides the data; an encoding unit which encodes each of the divided data and order information indicating an order of the data and thus generates a plurality of code images; and a projection unit which displays the plurality of code images at a first frame rate. A tablet terminal includes: an image pickup unit which sequentially picks up images of the plurality of code images displayed by the projection unit, at a second frame rate that is higher than the first frame rate; a decoding unit which extracts and decodes the code images from pickup images; and a combining unit which combines the data decoded by the decoding unit. | 2015-09-10 |
20150254487 | 2D BARCODE SCANNER - A 2D barcode scanner ( | 2015-09-10 |
20150254488 | CODE SYMBOL READING APPARATUS AND METHOD FOR READING CODE SYMBOL - In accordance with one embodiment, a code reading apparatus comprises a camera, illuminator and an image capturing control section. The camera photographs a code symbol at fixed time intervals to capture an image of the code symbol. The illuminator illuminates an image capturing area of the camera. The image capturing control section controls the camera and the illuminator so that the camera captures images in a synchronous frame in which an image capturing timing of the camera is synchronized with a turning-on timing of the illuminator and in an asynchronous frame in which the image capturing timing of the camera is not synchronized with the turning-on timing of the illuminator. | 2015-09-10 |
20150254489 | METHODS AND SYSTEMS FOR REDUCING THE LIKELIHOOD OF FALSE POSITIVE DECODES - Systems and methods for reducing the likelihood of false positive decodes within a set of barcodes are disclosed. The method can be implemented in a computing device, which includes: providing a list of barcode configurations that meet damage tolerance criteria; reducing, if possible, each configuration list to barcode configurations that have a compatible configuration pair between sets; and comparing all possible combinations of barcode type configurations to find at least one set of configurations that are resistant to false positives decodes between barcode types during decoding processes. | 2015-09-10 |
20150254490 | FIELD SHAPING CHANNELS IN A SUBSTRATE ABOVE A BIOMETRIC SENSING DEVICE - An electronic device may include a biometric sensing device that has a sensing area, and a substrate positioned above the sensing area and/or the biometric sensing device. The substrate can include vias that are formed through at least a portion of the substrate. The vias can be positioned at least above the sensing area of the biometric sensing device. The vias may be filled with a conductive material or a dielectric material. Alternatively, some vias can be filled with a conductive material while other vias are filled with a non-conductive or dielectric material. | 2015-09-10 |
20150254491 | DISPLAY DEVICE, DRIVING CIRCUIT, METHOD FOR DRIVING DISPLAY DEVICE, AND ELECTRONIC APPARATUS - A display device is provided. The display device includes: a display panel provided with a plurality of display electrodes, where the display electrodes are configured for displaying images, display electrodes located within a predetermined region of the display panel are defined as first electrodes, the first electrodes are configured for fingerprint sensing, and a stage during which the first electrodes perform the fingerprint sensing is defined as a fingerprint sensing stage; and a driving circuit configured to, provide display signals to the display electrodes to display the images, and provide a fingerprint sensing signal to the first electrodes during the fingerprint sensing stage and perform a self-capacitance detection on the first electrodes, to implement the fingerprint sensing. A driving circuit, a method for driving the display device, a liquid crystal display device and an electronic apparatus including the display device are provided. | 2015-09-10 |
20150254492 | IMAGE PROCESSING APPARATUS, BIOMETRIC AUTHENTICATION APPARATUS, AND IMAGE PROCESSING APPARATUS - An image processing apparatus includes a light source to irradiate light on an object, an imaging device to capture the object, a luminance computing unit to compute a luminance at a plurality of positions on the object, and a coefficient computing unit. The coefficient computing unit computes a correction coefficient for each of the plurality of positions, according to a distance from the light source to each of the plurality of positions and the luminance at each of the plurality of positions. | 2015-09-10 |
20150254493 | Tumor Plus Adjacent Benign Signature (TABS) For Quantitative Histomorphometry - Methods, apparatus, and other embodiments associated with predicting prostate cancer (CaP) progression using tumor cell morphology features and benign region graph features are described. One example apparatus includes a set of logics that acquires an image of a region of tissue, detects and segments cells in the image, extracts a set of morphological features from cells in a first region in the image, constructs a graph of a localized cellular network in a second region of the image, extracts a set of graph features from the graph, generates a set of tumor plus adjacent features signature (TABS) features from the sets of graph features and the set of morphological features, and calculates the probability that the image is a progressor or non-progressor based, at least in part, on the set of TABS features. The first region may concern cancerous cells and the second region may concern benign cells. | 2015-09-10 |
20150254494 | Histogram of Hosoya Index (HoH) Features For Quantitative Histomorphometry - Methods, apparatus, and other embodiments associated with classifying a region of cancerous tissue using a Histogram of Hosoya are described. One example apparatus includes a set of logics that acquires an image of a region of tissue demonstrating cancerous pathology, constructs a cell graph of the region of tissue, decomposes the cell graph into a set of subgraphs, computes a Hosoya Index for a subgraph, constructs a Histogram of Hosoya for the image based on the distribution of the subgraphs, and classifies the image based on the Histogram of Hosoya. Embodiments of example apparatus may generate and display the Histogram of Hosoya for the image. A prognosis for the patient may be provided based on the distribution of the histogram. | 2015-09-10 |
20150254495 | MINIATURIZED OPTICAL BIOMETRIC SENSING - Systems and methods are described for providing reliable biometric access control using an optical biometric sensor in a miniaturized form factor. Some implementations include multiple light sources that can illuminate skin or other tissue at multiple locations during a single measurement session. An imaging array can be arranged to form images of the light exiting the tissue only after undergoing diffuse reflectance in the tissue. Some implementations use the images to perform biometric functions. For example, the images can be used to identify an individual, verify identity of an individual, estimate demographic characteristics of an individual, etc. Such biometric functions can further be used to determine and affect access to secured assets. | 2015-09-10 |