42nd week of 2015 patent applcation highlights part 47 |
Patent application number | Title | Published |
20150294042 | SIMULATION CONSTRUCTION METHOD FOR THE MEASUREMENT OF CONTROL ROD INSERTION TIME - Provided is a method of the simulation construction for measurement of the control rod insertion time including a three-dimensional modeling operation of an inside wall of the nuclear reactor, a control rod, etc; a flow field configuration operation wherein the flow field is differentially configured by a variable grid system comprising variable cells which change the configuration and by an aligned grid system comprising fixed cells which maintains the configuration; a calculation operation of simulation estimated value for the insertion time by analyzing the thermal-hydraulic phenomenon using the three-dimensional CFD; and a cell change operation, wherein an error between the estimated value and the actual value is verified whether the error lies within the reference range, and, when the error exceeds the reference range, the size of the variable cell and/or of the size of the fixed cell is changed. | 2015-10-15 |
20150294043 | METHOD FOR SPECIFYING STRETCH FLANGE LIMIT STRAIN AND METHOD FOR DETERMINING FEASIBILITY OF PRESS FORMING - A method for specifying stretch flange limit strain includes specifying stretch flange limit strain so as to satisfy a relation in the following formula by using: strain gradient in an inward direction directed from an end portion of a metal sheet at a time a press load is applied; and strain gradient in a sheet thickness direction of the metal sheet intersecting the loading direction: | 2015-10-15 |
20150294044 | Method for the determination of workpiece transport trajectories in a multiple station press - A method for the determination of workplace transport trajectories in a multiple station press, comprises the steps of providing a set of constraints for the workplace transport trajectories, the constraints comprising at least pickup and deposit positions for a workplace in a plurality of stations of the multiple station press, providing machine properties of the plurality of stations and of at least one transfer device for transporting the workplace from a first of the plurality of stations to a second of the plurality of stations, providing information on a candidate workplace transport trajectory, simulating the plurality of stations and the at least one transfer device based on the provided information for determining whether the candidate workplace transport trajectory conforms with the provided machine parameters, and displaying the result of the determination. | 2015-10-15 |
20150294045 | APPARATUS AND METHOD FOR MODELING OF HYBRID SYSTEM - Disclosed is an apparatus for modeling of a hybrid system and the apparatus includes: a model configuring unit modeling ports, structures, and constraints for one or more cyber physical systems implemented in the hybrid system and constituting a core model including a port model, a structure model, and a constraint model constituted for each cyber physical system; and a model setting unit setting a connection relationship of the port model, the structure model, and the constraint model for each core model and defining a discrete component and a continuous component for each model. | 2015-10-15 |
20150294046 | Optimization of Thermodynamic Efficiency vs. Capacity for a Communications Systems - The present disclosure relates to the modeling of communications systems using information theory and thermodynamic principles. The disclosure establishes a fundamental relationship between thermodynamic efficiency and capacity for communications systems based on fundamental physical principles, applicable to communications processes. Further, principles of efficiency optimization with an emphasis on electronic communications platforms are introduced herein. | 2015-10-15 |
20150294047 | System for Continuous Modeling and Dissemination of Threat Zones Associated with Hazardous Release Materials - A computer cloud implemented method and system for manually or electronically inputting real time geophysical location data, physical properties of the substance, associated release parameters of the physical substance into the open earth atmosphere, and weather data (historical, current or future forecasted data) on the assumption the release of the substance occurred at the same instantaneous time the weather data was entered and repeatedly calculating the results with new updated data for any of the above data parameters using algorithmic modeling of toxic substance releases to compute a model of the predicted toxic threat zone (Gaussian model) or a model of the predicted toxic plume pathway and associated exposure levels (CFD) and rendering the results electronically for visual display in, on or over any multi-coordinate display system in any medium and distributed or distributable to users electronically or manually when input parameters are updated, and displaying other related information associated with toxic substance release, are provided. | 2015-10-15 |
20150294048 | Future Reliability Prediction Based on System Operational and Performance Data Modelling - Systems, methods, and apparatuses for improving future reliability prediction of a measurable system by receiving operational and performance data, such as maintenance expense data, first principle data, and asset reliability data via an input interface associated with the measurable system. A plurality of category values may be generated that categorizes the maintenance expense data by a designated interval using a maintenance standard that is generated from one or more comparative analysis models associated with the measureable system. The estimated future reliability of the measurable system is determined based on the asset reliability data and the plurality of category values and the results of the future reliability are displayed on an output interface. | 2015-10-15 |
20150294049 | BRAKE HILS SYSTEM FOR A RAILWAY VEHICLE - Disclosed is a brake HILS system for a railway vehicle, comprising: a user terminal that receives values relating to braking conditions of a railway vehicle through a user interface and monitors simulation results; a pneumatic brake that includes an electronic control unit, a brake operation unit, a wheelset, a brake caliper, and a wheel slide protection valve and produces pneumatic pressure and transmits a braking force to the wheelset in accordance with the braking conditions from the user terminal; a load cell that is disposed on a wheel or a disc and measures a braking force from the pneumatic pressure; and a modeling unit that simulates the running and braking dynamic characteristics of a railway vehicle in real-time using mathematical models. | 2015-10-15 |
20150294050 | Method, Apparatus and System for Improved Groundwater Modeling - A method of groundwater modeling is disclosed comprising: collecting, inputting, organizing and managing raw data concerning an aquifer in a data workspace; developing a conceptual groundwater model, by creating a structural sub-model, a property sub-model and a boundary condition sub-model; using the conceptual groundwater model to define a set of one or more simulation models; converting the one or more simulation models into one or more numerical groundwater models having one or more grid types; and running a simulation using one or more of the numerical models and analyzing the results. | 2015-10-15 |
20150294051 | METHOD AND SYSTEM FOR DETERMINING WELDING SEQUENCES - A system for determining a welding sequence is disclosed. The system may have a welding sequence generator configured to create an initial population of welding sequences based on a user-generated constraint. The system may also have a welding simulator configured to simulate welding for at least one welding sequence in the initial population of welding sequences to model distortion for the at least one welding sequence. The welding sequence generator may be further configured to receive the distortion for the at least one welding sequence in the initial population from the welding simulator, determine whether a merit value derived from at least the distortion for the at least one welding sequence satisfies one or more predetermined criteria, output the at least one welding sequence as a potential welding sequence if the merit value satisfies the predetermined criteria. | 2015-10-15 |
20150294052 | ANOMALY DETECTION USING TRIPOINT ARBITRATION - Systems, methods, and other embodiments associated with anomaly detection using tripoint arbitration are described. In one embodiment, a method includes identifying a set of clusters that correspond to a nominal sample of data points in a sample space. A point z is determined to be an anomaly with respect to the nominal sample when, for each cluster, a tripoint arbitration similarity between data points in the cluster calculated with z as arbiter is greater than a threshold. | 2015-10-15 |
20150294053 | Pattern Optical Similarity Determination - Aspects of the invention relate to techniques for determining pattern optical similarity in lithography. Optical kernel strength values for a first set of layout features and a second set of layout features are computed first. Based on the optical kernel strength values, optical similarity values between the first set of layout features and the second set of layout features are then determined. Subsequently, calibration weight values for the first set of layout features may be determined based on the optical similarity values, which, along with the first set of layout features, may be employed to calibrate lithography process model parameters. | 2015-10-15 |
20150294054 | Incremental Functional Verification of a Circuit Design - A system and a method are disclosed for verifying the implementation of a computer chip design. A design including one or more interpretive computer programing language modules and one or more hardware description language (HDL) modules is received. When one of the interpretive programing language modules requests to communicate with one of the HDL modules, the HDL module is enabled and the input arguments from the interpretive programing language module are pipelined into the HDL module. Pipelined output data is received from the HDL module. The received output data is formatted and returned to the interpretive programing language module. | 2015-10-15 |
20150294055 | SYSTEMS AND METHODS FOR INCREASING DEBUGGING VISIBILITY OF PROTOTYPING SYSTEMS - User's register transfer level (RTL) design is analyzed and instrumented so that signals of interest are preserved and can be located in the netlist after synthesis. Then, the user's original flow of RTL synthesis and design partition is performed. The output is analyzed to locate the signals of interest. Latches are selectively inserted to the netlist to ensure that signal values can be accessed at runtime. After that, a place and route (P&R) process is performed, and the outputs are analyzed to correlate signal names to registers (flip-flops and latches) or memory blocks locations is field programmable gate array (FPGA) devices. A correlation database is built and kept for runtime use. During runtime, a software component may be provided on a workstation for the user to query signal values corresponding to RTL hierarchical signal names. | 2015-10-15 |
20150294056 | Method of Fabricating an Integrated Circuit with Optimized Pattern Density Uniformity - The present disclosure provides an IC method that includes receiving an IC design layout having main features; generating a plurality of space block layers to the IC design layout, each of the space block layers being associated with an isolation distance and a plurality of space blocks; calculating main pattern density PD | 2015-10-15 |
20150294057 | Method of Fabricating an Integrated Circuit with Block Dummy for Optimized Pattern Density Uniformity - The present disclosure provides one embodiment of an IC method that includes receiving an IC design layout including a plurality of main features; choosing isolation distances to the IC design layout; oversizing the main features according to each of the isolation distances; generating a space block layer for the each of the isolation distances by a Boolean operation according to oversized main features; choosing an optimized space block layer and an optimized block dummy density ratio of the IC design layout according to pattern density variation; generating dummy features in the optimized space block layer according to the optimized block dummy density ratio; and forming a tape-out data of the IC design layout including the main features and the dummy features, for IC fabrication. | 2015-10-15 |
20150294058 | MARK SEGMENTATION METHOD AND METHOD FOR MANUFACTURING A SEMICONDUCTOR STRUCTURE APPLYING THE SAME - In this disclosure, a mark segmentation method and a method for manufacturing a semiconductor structure applying the same are provided. The mark segmentation method comprises the following steps. First, a plurality of segments having a width W | 2015-10-15 |
20150294059 | DESIGN SUPPORT APPARATUS AND DESIGN SUPPORT METHOD - A non-transitory computer-readable recording medium having stored therein a program for causing a computer to execute a process is provided. The process includes calculating and outputting difficulty degrees on an index basis when a change instruction to change an arrangement of parts is received with respect to parts and wirings on a substrate in a design diagram, the difficulty degrees being related to the wiring between the parts after the change according to the change instruction; and calculating and outputting difficulty degrees on an index basis when a change instruction to change the wiring between the parts is received, the difficulty degrees being related to the wiring between the parts after the change according to the change instruction. | 2015-10-15 |
20150294060 | VIEWING MULTI PAIRED SCHEMATIC AND LAYOUT WINDOWS ON PRINTED CIRCUIT BOARD (PCB) DESIGN SOFTWARE AND TOOLS - A method according to one embodiment includes receiving a printed circuit board design in a memory; generating, using a processor, multiple schematic windows of the printed circuit board design; generating, using the processor, multiple layout windows of the printed circuit board design; and outputting the multiple schematic windows of the printed circuit board design simultaneously with outputting the multiple layout windows of the printed circuit board design. A first of the schematic windows is paired with a first of the layout windows, the paired windows depicting representations of a common sub-portion of the printed circuit board design. | 2015-10-15 |
20150294061 | Graphical Design Verification Environment Generator - A graphical tool creates design-verification environments. The tool includes a graphical environment builder that allows for the drag and drop addition of verification IP (“VIP”) modules to a graphical verification environment. The tool assigns connector signals associated with source code that simulates a connection between a VIP module and the device under test (“DUT”). The tool learns which connection signals are suitable to connect a VIP to the DUT and facilitates selecting of the suitable signals in the environment development process. The tool converts the graphical environment to source code that can be executed to simulate testing on the DUT. The tool also allows a user to navigate between view modes that display the verification environment graphically, and that display the source code associated with components of the verification environment. | 2015-10-15 |
20150294062 | Method for Identifying a Target Molecular Profile Associated with a Target Cell Population - A method for identifying a target molecular profile associated with a target cell population. A set of reference molecular profiles and a set of sample molecular profiles are received. Each sample molecular profile is associated with a sample cell from a sample cell population, which includes a mixture of target cells and reference cells. Each of the sample molecular profiles is indicative of a respective target molecular profile. An average target molecular profile is calculated. A proportion value is calculated for each sample molecular profile. A respective target molecular profile is calculated for each sample molecular profile based on the respective calculated proportion value and a closest similarity to the average target molecular profile. | 2015-10-15 |
20150294063 | DIAGNOSTIC GENETIC ANALYSIS USING VARIANT-DISEASE ASSOCIATION WITH PATIENT-SPECIFIC RELEVANCE ASSESSMENT - Relevance of a study genetic variant observed in diagnostic subject genetic data that is associated by a clinical study with a phenotype characteristic is assessed as follows. A set of polymorphisms functionally related to the study genetic variant are identified. A foreground distribution is computed of variants observed in the diagnostic subject genetic data for the set of polymorphisms. A background distribution is computed of variants observed in genetic data of subjects of the clinical study for the set of polymorphisms. A comparison metric is computed comparing the foreground distribution and the background distribution. Relevance of the study variant to the diagnostic subject is quantified based on the comparison metric, with higher similarity of the foreground and background distributions corresponding to higher relevance. | 2015-10-15 |
20150294064 | IDENTIFICATION, MONITORING AND TREATMENT OF INFECTIOUS DISEASE AND CHARACTERIZATION OF INFLAMMATORY CONDITIONS RELATED TO INFECTIOUS DISEASE USING GENE EXPRESSION PROFILES - A method is provided in various embodiments for determining a profile data set for a subject with infectious disease or inflammatory conditions related to infectious disease based on a sample from the subject, wherein the sample provides a source of RNAs. The method includes using amplification for measuring the amount of RNA corresponding to at least 2 constituents from Table 1. The profile data set comprises the measure of each constituent, and amplification is performed under measurement conditions that are substantially repeatable. | 2015-10-15 |
20150294065 | Database-Driven Primary Analysis of Raw Sequencing Data - The present invention relates to methods for identifying the source of a biological sequence containing sample from raw sequencing reads. The method may be used to identify the source of unknown DNA and can be used for diagnostic, biodefense, food safety and quality, and hygiene applications. In another aspect the invention relates to a database of reference sequences which can be used in the method of the invention. | 2015-10-15 |
20150294066 | Combination dental imaging system and dental practice management and charting system with a bi-directional communication interface - A combination dental imaging system and dental practice management and charting system includes a dental imaging device, a dental practice management and charting system and a bi-directional communication interface which couples the dental imaging system to the dental practice management and charting system. The combination dental imaging system and dental practice management and charting system also includes a code generator, a translator and a correlator. The code generator generates an ADA CDT code. The translator translates the ADA CDT code into at least one property required by the dental imaging system in order to acquire dental images of a specific image type, format and quantity. The correlator correlates the dental images to be acquired by the dental imaging system to the ADA CDT code so that the dental images are acquired by having at least one property set. | 2015-10-15 |
20150294067 | DEVICES, SYSTEMS, AND METHODS FOR AUTOMATED ENHANCED CARE ROOMS - Disclosed are various embodiments of systems and methods related to determining beneficial and customized surroundings for a subject in a healthcare setting or related type setting, based at least in part on the subject's personal profile including one or more of personal health information, detected biological data, input from the subject itself, or input from a healthcare worker. | 2015-10-15 |
20150294068 | SYSTEM AND METHOD FOR DOCUMENTING PATIENT INFORMATION - A method for providing access to patient information from within an electronic medical record may involve: receiving, from a user, at least one piece of identifying information, identifying the user as a person authorized to access the patient information; providing an encrypted link on an electronic medical record of the patient, wherein the encrypted link is preloaded with the at least one piece of identifying information and a patient medical record number corresponding to the patient; decrypting the encrypted link in response to the user clicking on the encrypted link, without requiring the user to provide any further identifying information; and providing the patient information to the user via a secure web site, in response to the user clicking on the link. | 2015-10-15 |
20150294069 | MULTI-SOURCE PATIENT GENERATED HEALTHCARE DATA INTEGRATION IN A TRANSACTIONAL SYSTEM - A system and method for aggregating patient generated healthcare data associated with a patient from a plurality of computing machines located separately without patient intervention. Metadata is stored associated with the patient generated healthcare data in a medical record repository database to perform natural language processing and metadata analysis of the patient generated healthcare data to identify patient verified data and patient unverified data. A data object including query statements and approval options is generated and presented on a remotely located display unit accessible by the patient. An input against each of the plurality of query statements is received and the system provides updating of the unverified data based on the received input. The patient generated healthcare data is then pushed into the electronic medical transactional system which may communicate medical data messages among a plurality of computer stations. | 2015-10-15 |
20150294070 | System and Method For Facilitating the Collection, Analysis, Use and Management of Clinical Analytics Results to Improve Healthcare - Systems and process for performing analytical processes on the health-related data for a person include components and steps for processing system multiple files from multiple sources containing health-related data for numerous individual. Such processing may include: staging health-related data; matching pieces of staged data to a person using one or more matching rules; compressing the matched staged data for the person into a compressed file through assignment of a universal identifier which is associated with the person; providing the compressed file to an analytics engine; and decompressing the at least one analytics results file using universal identifier to access the analytics results for the person. Additionally, the analytics results for the person may be provided to a user for intervention into the health of the person. | 2015-10-15 |
20150294071 | METHOD AND COMPUTER PROGRAM FOR RESOURCE SCHEDULING - A method of operating a data processing system for resource scheduling in which, for large scale scheduling tasks, the data processing system is operated according to a first method of operation including the steps of calculating an initial solution space including at least one valid scheduling solution, and displaying the at least one valid scheduling solution. | 2015-10-15 |
20150294072 | DEVICES, SYSTEMS AND METHODS FOR SUPPORTING A VETERINARY PRACTICE - Systems and techniques for supporting a veterinary practice are provided. Further, systems and techniques for the collection and display of animal wellness information are provided. Animal wellness data relating to a single animal patient or group of animal patients are collected and subsequently displayed at a desired remote location or on a mobile device so that a veterinarian can review the information. | 2015-10-15 |
20150294073 | Temperature-Corrected Blood Glucose Concentration and Decision Making in a Patient-Interactive System - Disclosed is a deriving a rate constant to correct for the effect of heat on readings from a glucometer, when the glucometer is part of an interactive system of sending data from the glucometer to a server, and receiving messages and recommendations for action from the server. The heat from the glucometer is determined based on an estimate of the time the device has been activated and the ambient temperature, or by direct measurement. The rate constant is based on derivatives of the Arrhenius and Michaelis-Menten equations. | 2015-10-15 |
20150294074 | BRAIN ACTIVITY TRAINING APPARATUS AND BRAIN ACTIVITY TRAINING SYSTEM - Provided is a brain activity training apparatus for training to cause a change in correlation of connectivity among brain regions, utilizing measured correlations of connections among brains regions as feedback information. From measured data of resting-state functional connectivity MRI of a healthy group and a patient group (S | 2015-10-15 |
20150294075 | Computer-Based Dynamic Data Analysis - A computer-implemented method for identifying a status of a particular patient with respect to one or more medical conditions includes storing at a computer system data that aggregates statuses of a plurality of patients other than the particular patient with respect to a plurality of medical conditions; receiving, at the computer system, data that characterizes the status of the particular patient with respect to one or more of the plurality of medical conditions; comparing the data that characterizes the particular patient to the data that aggregates statuses of the plurality of patients, to generate for each of one or more conditions of the plurality of conditions, a score for the particular patient that indicates the particular patient's relative position in comparison to the plurality of patients other than the particular patient; and providing, over a computer network and for review by a registered user of the computer system, data that shows multiple scores for the particular patient for each of multiple different medical conditions. | 2015-10-15 |
20150294076 | SYSTEM AND METHOD FOR SERUM BASED CANCER DETECTION - A system and method for analyzing biological samples, such as dried human blood serum, to determine a disease state such as colorectal cancer (CRC). Using dried samples may hold potential for enhancing localized concentration and/or segmentation of sample components. The method may comprise illuminating at least one location of a biological sample to generate a plurality of interacted photons, collecting the interacted photons and generating at least one Raman data set representative of the biological sample. A system may comprise an illumination source to illuminate at least one location of a biological sample and generate at least one plurality of interacted photons, at least one mirror for directing the interacted photons to a detector. The detector may be configured to generate at least one Raman data set representative of the biological sample. The system and method may utilize a FAST device for multipoint analysis or may be configured to analyze a sample using a line scanning configuration. | 2015-10-15 |
20150294077 | APPARATUS, SYSTEM, AND METHOD TO ADAPTIVELY OPTIMIZE POWER DISSIPATION AND BROADCAST POWER IN A POWER SOURCE FOR A COMMUNICATION DEVICE - Provided is an apparatus, system, and method for stabilizing battery voltage of a battery device while optimizing power delivered to a receiver during communication of a broadcast packet. A logic circuit is configured to receive a broadcast packet having a predetermined number of bits for communication by a controller to a receiver located remotely from the controller, determine a number of cycles in which a sampled battery voltage is either greater than or less than or equal to a nominal battery voltage over a first subset of the predetermined number of bits of the broadcast packet and performs either a tune-up or a tune-down procedure based on the number of cycles counted in which the sampled battery voltage is not equal to the nominal battery voltage for more than one half of a total number of cycles counted. | 2015-10-15 |
20150294078 | SCHEDULING INSTRUCTION ITEMS | 2015-10-15 |
20150294079 | TELEHEALTH SYSTEM AND PROCESS - A telehealth system and process including a telehealth cart having one or more processors configured to execute computer-executable instructions; a video interface; an audio interface; a vital sign unit; and one or more medical devices connected to the vital sign unit; a patient located proximate to the telehealth cart; a nurse located proximate to the telehealth cart and the patient; a remote physician at a location distal from the patient and the nurse; where the remote physician establishes a secure connection to the telehealth cart and interacts with the patient via the video interface and the audio interface of the telehealth cart; and where the nurse uses at least one of the one or more medical devices on the patient at the direction of the remote physician. | 2015-10-15 |
20150294080 | BALANCED ULTRAVIOLET LIGHT EXPOSURE RECOMMENDATIONS - Ultraviolet light poses both health benefits and health risks. A method, device and computer storage program balances the health risks and benefits ultraviolet light exposure with personal sensitivities and preferences for these health risks and benefits. An ultraviolet violet light exposure level of a subject person is estimated by monitoring data from a plurality of sources. A personal sensitivity to ultraviolet light exposure is also estimated from data from various sources. A recommendation for the subject person is generated based upon the estimated risks and benefits of ultraviolet light exposure. | 2015-10-15 |
20150294081 | METHODS AND SYSTEMS FOR DETERMINING AUTISM SPECTRUM DISORDER RISK - In certain embodiments, the invention stems from the discovery that analysis of population distribution curves of metabolite levels in blood can be used to facilitate predicting risk of autism spectrum disorder (ASD) and/or to differentiate between ASD and non-ASD developmental delay (DD) in a subject. In certain aspects, information from assessment of the presence, absence, and/or direction (upper or lower) of a tail effect in a metabolite distribution curve is utilized to predict risk of ASD and/or to differentiate between ASD and DD. | 2015-10-15 |
20150294082 | SYSTEM AND METHOD FOR PATIENT-SPECIFIC IMAGE-BASED GUIDANCE OF CARDIAC ARRHYTHMIA THERAPIES - A method and system for image-based patient-specific guidance of cardiac arrhythmia therapies is disclosed. A patient-specific anatomical heart model is generated from medical image data of a patient. A patient-specific cardiac electrophysiology model is generated based on the patient-specific anatomical heart model and electrophysiology measurements of the patient. One or more virtual electrophysiological interventions are performed using the patient-specific cardiac electrophysiology model. One or more pacing targets or ablation targets based on the one or more virtual electrophysiological interventions are displayed. | 2015-10-15 |
20150294083 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes a first acquisition unit configured to acquire medical information of a patient, a second acquisition unit configured to acquire medical information of the patient's blood relatives, a determination unit configured to determine a degree of association between the patient's symptoms and the patient's family medical history based on the patient's medical information acquired by the first acquisition unit and the medical information of the patient's blood relatives acquired by the second acquisition unit, and a display control unit configured to display a family medical history on a display unit based on the degree of association determined by the determination unit. | 2015-10-15 |
20150294084 | LOCATION TRIGGERING FOR PRESCRIPTIONS READY NOTIFICATIONS - Methods, systems, and apparatus are disclosed to notify and route a customer to a prescription pickup location. A communication device detects the proximity of a prescription customer to an associated pharmacy location. The customer is then notified when the prescription is available at the pharmacy location based on identifying customer information and the location information. Once the pharmacy location is detected, the communication device sends the identifying customer information and the location information to a pharmacy computing device. The communication device then displays a notification that a prescription is available for the prescription customer at the pharmacy based on a determination made by the pharmacy computing device using the location information and the identification information. In addition, the communication device can display a map of the pickup location, various prompts to the customer to establish payment and/or to determine whether the customer has questions for pharmacy staff. | 2015-10-15 |
20150294085 | DEVICES, SYSTEMS, AND METHODS FOR AUTOMATED ENHANCED CARE ROOMS - Disclosed are various embodiments of systems and methods related to determining beneficial and customized surroundings for a subject in a healthcare setting or related type setting, based at least in part on the subject's personal profile including one or more of personal health information, detected biological data, input from the subject itself, or input from a healthcare worker. | 2015-10-15 |
20150294086 | DEVICES, SYSTEMS, AND METHODS FOR AUTOMATED ENHANCED CARE ROOMS - Disclosed are various embodiments of systems and methods related to determining beneficial and customized surroundings for a subject in a healthcare setting or related type setting, based at least in part on the subject's personal profile including one or more of personal health information, detected biological data, input from the subject itself, or input from a healthcare worker. | 2015-10-15 |
20150294087 | ENGAGEMENT REPORTING TOOL FOR TRIAGE SUPPORT - Embodiments of the invention are directed to a system, method, or computer program product for a high priority incident engagement reporting tool for triage support. The tool reviews triage engagements, generates a report, and directs the report to the appropriate audience for triage. Furthermore, the invention may take incidents from across the entity and weigh the incidents for priority and impact. In this way, the invention receives, weighs, and triages any high priority incident that the entity may encounter. Thus the engagement reporting tool may allow for daily triage reporting in an efficient manner, thus streamlining formatting and sending of high priority incidents to the appropriate audiences. | 2015-10-15 |
20150294088 | Patient Summary Generation - Patient summary generation may involve receiving a request for summary data relating to treatment of a patient over a period of time and accessing a medical record of the patient to determine at least one condition of the patient for the period of time. Summary generation may also involve determining reporting categories relating to the at least one condition, identifying elements of the medical records associated with the reporting categories, determining data of the identified elements indicative of the summary data for the at least one condition, and compiling the summary data into a summary report. | 2015-10-15 |
20150294089 | SYSTEM AND METHOD FOR AUTOMATED DATA ENTRY AND WORKFLOW MANAGEMENT - A system and method that provides for integrated data entry and workflow capabilities through one or more computing devices provided to personnel who work at various stations throughout a facility. Automated identification, record updates, workflow management, and alerts are facilitated through the computing devices, which include a headset that includes one or more input devices such as a microphone, a speaker, a camera, and/or a visual display device. | 2015-10-15 |
20150294090 | SYSTEM AND METHOD FOR CREATING AND DISTRIBUTING A HEALTHCARE RESEARCH AND DATA COLLECTION APPLICATION - A method includes the step of implementing a computerized health-care related template definition platform. The health-care related template definition platform comprises a computing platform on which a computerized health-care related template application is implemented and managed. The health-care related template definition platform is accessed by user-side computing device via the health-care related application operating, in the user-side computing device or via a web-page interface accesses by a web browser operating in the user-side computing device. A step includes providing a health-care related template. The health-care related template comprises a set of health-care related measurements that are tracked for a disease and/or a health goal. The health-care related template is implemented without a central-study administrator that decides the health-care related measurements that are tracked by the health-care related template. A step includes presenting the health-care related template to a user via the health-care related application. A step includes allowing a user to use multiple templates to track multiple healthcare goals. A step includes the ability of a user to customize template for their own needs. A step includes a rating system for a user to see which healthcare templates are highly rated by other users and experts. | 2015-10-15 |
20150294091 | PREDICTION METHOD FOR MIXED SOLVENT FOR MINIMIZING AMOUNT OF SINGLE SOLVENT USED, AND SYSTEM USING SAME - The present invention relates to a prediction method for a mixed solvent for minimizing the amount of single solvents used, and to a system using same, and more specifically to a novel evaluation method that can predict a mixed solvent that minimizes the amount of single solvents used by using a graph-based mixing ratio dependent solubility estimation (G-MRDSE) that can calculate the maximum composition of additional solvents in a mixed solvent, and a system using same. | 2015-10-15 |
20150294092 | APPLICATION SECURITY FRAMEWORK - In accordance with the teaching described herein, systems and methods are provided for prodding secure access to a software application on a computing device. The software application may include a security framework having a set of predetermined security requirements. Prior to enabling access to the software application by a user, the computing device may, (i) verify installation of a device security configuration profile on the computing device, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements, (ii) receive identifying information from the user via a user interface, (iii) verify the identifying information with an authentication server, and (iv) based on a successful verification of the identifying information, receive and store a security token. Access to the software application on the computing device may be provided for a specified period identified by the security token. | 2015-10-15 |
20150294093 | MANAGEMENT SYSTEM, INFORMATION PROCESSING DEVICE, MANAGEMENT SERVER, CONTROL METHOD THEREFOR, AND PROGRAM - When software as the object of issuance of license is software for which movement of license to another information processing device is prohibited or which is in dependence relationship with the software for which movement of license to the other information processing device is prohibited, the license is issued to which transfer prohibition information is attached indicating that movement of the license to the other information processing device is prohibited. | 2015-10-15 |
20150294094 | SYSTEM AND METHOD FOR MULTIMEDIA CONTENT PROTECTION ON CLOUD INFRASTRUCTURES - A system and method for multimedia content protection on elastic cloud infrastructures is presented. The system can be used to protect various multi-media contents, including regular 2D videos, new 3D videos, animated graphics, images, audios clips, songs, and music clips. The system can run on private clouds, public clouds, or any combination of public-private clouds. The system is scalable and cost effective. | 2015-10-15 |
20150294095 | SECURE MANAGEMENT OF A SMART CARD - A smart card comprises: a processing circuit; a memory that contains a protected object; an activity detector that receives a signal that describes a planned activity of a person who is in physical possession of the smart card; and an activity analyzer that evaluates features of the planned activity. In response to the activity analyzer determining that a predefined risk associated with the planned activity exceeds a predetermined value, the activity analyzer: issues an instruction to the person who is in physical possession of the smart card to provide a biomarker to a biosensor that is physically contained within the smart card; and receives, from the biosensor, real-time biometric data for the person who is in physical possession of the smart card. | 2015-10-15 |
20150294096 | RHYTHM-BASED USER AUTHENTICATION - The present invention is directed to an apparatus, a method, and a computer program product for authenticating a user based on a sequence of rhythmic inputs. The user via a mobile device provides one or more inputs (e.g., pushing a button, tapping a touchscreen, a biometric, or the like) to one or more sensors associated with the mobile device as an attempt of authorization. The one or more inputs may be provided in a rhythmic manner (e.g., provided in time with music). The present invention then compares the provided one or more inputs to one or more predetermined sequences of inputs that are associated with positive authentication of the user (e.g., a known password). The phone determines that the one or more provided inputs match one or more predetermined rhythmic sequences associated with positive authentication of the user and authenticates the user. | 2015-10-15 |
20150294097 | USER BIOMETRIC PATTERN LEARNING AND PREDICTION - A user device collects timing data that indicates screen touch timing behavior during multiple touch events associated with at least one of a hold time for a particular button or a transition time between two particular buttons. The user device also collects force data indicating screen touch force behavior during the multiple touch events. The user device identifies a user biometric pattern for the touch event based on the timing data and the force data, and stores the user biometric pattern. | 2015-10-15 |
20150294098 | INFORMATION PROCESSING DEVICE - An information processing device includes: an input receiving section receiving an input; a display control section changing a display screen to a first screen when the input receiving section has not received any input for a predetermined time; a registered user information retaining section retaining biological information of a plurality of users registered in the information processing device; a biological information obtaining portion obtaining biological information; and a biometric authenticating portion determining whether a user whose biological information is obtained by the biological information obtaining portion is a registered user by comparing the obtained biological information with the biological information of the plurality of users retained in the registered user information retaining section. When the biometric authenticating portion determines that the user whose biological information is obtained is a registered user, the display control section changes the first screen to a second screen. | 2015-10-15 |
20150294099 | BIOMETRIC SENSOR FOR TOUCH-ENABLED DEVICE - One or more techniques and/or systems are disclosed for a biometric imager that can be integrated into a touch enabled computing device, and may be used to interact with the device. Upon touching the touch-enabled surface of the device, an image of at least a portion of the touch object can be captured and used in conjunction with identification of the user and/or for input to the device. The systems or techniques, described herein, may be integrated into a portion of the surface of such a device, and may comprise a luminescent layer that can emit photons upon touch, and an image capture component that can generate data indicative of an image of at least a portion of the touch object. | 2015-10-15 |
20150294100 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR COMPARING IMAGES - A method of verifying, by a processing system, whether a user of a device corresponds to a previously authenticated user. The processing system has access to a first image and a second image. The first image is an image of an identity document comprising an image of the previously authenticated user. The second image is an image captured by the device. The method comprises: comparing said first image to said second image, whereby to determine whether they are images of the same user; and, in the event that it is determined that the first and second images are images of the same user: designating one of the first and second images as a higher quality image; and, storing said designated image as a validated image of the previously authenticated user. | 2015-10-15 |
20150294101 | RUNNING APPLICATIONS, AND AUTHENTICATING USERS - Various examples provide a method and an apparatus of running applications. When a user clicks on an icon of an application displayed on a touch screen, a fingerprint is collected. It is judged whether the collected fingerprint matches with a stored fingerprint. A user interface of the application is displayed if the collected fingerprint matches with the stored fingerprint. Various examples also provide a method and an apparatus of authenticating users. When a user clicks on an area for authentication in a user interface of an application displayed on a touch screen, a fingerprint is collected. It is judged whether the collected fingerprint matches with a stored fingerprint. It is determined the user has passed user authentication if the collected fingerprint matches with the stored fingerprint. | 2015-10-15 |
20150294102 | METHOD FOR JAVA APPLICATION TO ACCESS INTELLIGENT KEY APPARATUS - A method for a java application to access an intelligent key apparatus. The apparatus comprises: a java application calling a JNI interface; obtaining a corresponding lower level interface function according to a correspondence table of a JNI interface function and the lower level interface function; converting a source parameter list of the JNI interface function into a target parameter list of the corresponding lower level interface function according to the target parameter list of the lower level interface function; calling a lower level interface; accessing an intelligent key apparatus; obtaining a returned result; and returning a value of the returned result to the java application. By means of the method in the present invention, it is not easy to obtain a source code by decompiling a java application, thereby improving the security of the java application accessing an intelligent key apparatus. | 2015-10-15 |
20150294103 | Method and Password Verifying Device for Verifying an Input Password, and Computer System including the Password Verifying Device - In a method for verifying an input password, a password verifying device coupled between a electronic device and an input device is configured to: in response to a password input request from the electronic device, generating image data associated with a virtual keyboard and transmitting the image data to the electronic device; in response to password data from the electronic device, composing an input password according to the password data; and in response to a password confirm request from the input device, comparing the input password and a preset password stored therein. | 2015-10-15 |
20150294104 | METHOD AND SYSTEM FOR DEVICE AUTHENTICATION - Various aspects of a system and a method for device authentication are disclosed herein. The method includes generating one or more vibrations in an electronic device in response to receiving a first user input. In response to the received first user input, a plurality of user interface (UI) objects are displayed. Each of the displayed plurality of UI objects is associated with a corresponding pre-configured number of vibrations. In response to the displayed plurality of UI objects, a second user input is received that enables selection of one or more of the displayed plurality of UI objects. An access to the electronic device is authenticated when the pre-configured number of vibrations associated with the received second user input matches the generated one or more vibrations. | 2015-10-15 |
20150294105 | Storage Medium Recording Display Control Program for Function Setting, Method for Operating Display Control Program, and Electronic Device Including the Same - An electronic device includes an authentication section that authenticates a user of the electronic device, an operation section that includes a display section and operates the electronic device, a storage section that stores programs that each cause the electronic device to perform a job in accordance with a preliminarily set content, and a program processing section that generates a program associated with the user authenticated in the authentication section. Using the operation section, a first user specifies a program to be shared and a second user permitted to use the shared program. As such, the first user who permits to share the program shares the program with the second user. | 2015-10-15 |
20150294106 | System For Processing Lost Password Using Password Long-Term Memory Of User, and Method For Processing Lost Password - The present invention relates to a system and method for processing a lost password by selectively providing a reset process under the password in the long-term memory of the user. According to the present invention, the system includes a user terminal including: a long-term memory condition registration unit receiving the registration of long-term memory conditions; a long-term condition determination unit determining the long-term memory conditions are satisfied; a user identification unit, after the occurrence of a lost password, authenticating the user through a user identification verification scheme or through a enhanced user identification verification scheme whether or not the password resides in the long-term memory of the user, and a lost state resetting unit cancelling the lost password occurrence state. According to the present invention, provided are an identification verification service or an enhanced identification authentication service whether or not the password resides in the long term memory of user. | 2015-10-15 |
20150294107 | SECURITY-FUNCTION-DESIGN SUPPORT DEVICE, SECURITY-FUNCTION-DESIGN SUPPORT METHOD, AND PROGRAM - A display unit displays a configuration of a system in a display device. An implementation scheme configuration support unit provides a candidate of a security implementation scheme configurable for a component of the system and configures a security implementation scheme selected by a user to a component selected by a user. An associated function element configuration support unit provides a candidate of an associated function element configurable for a component of the system and configures an associated function element selected by a user to a component selected by a user. An evaluation unit determines whether or not the associated function element configured for the component of the system is appropriate based on a condition to determine appropriateness of the configuration of the certain associated function element. An output unit outputs a result of the determination by the associated function element evaluation unit. | 2015-10-15 |
20150294108 | METHOD AND APPARATUS FOR MANAGING AUTHENTICATION - A method of and an apparatus for managing authentication in an electronic apparatus are provided. The method includes obtaining authentication information using an authentication module; pairing the authentication information with an object to which access is controlled; and displaying an image related to the object together with the authentication information. The electronic apparatus includes an authentication module configured to obtain authentication information; a control module configured to pair the authentication information with an object to which access is controlled; and a display module configured to display an image related to the object together with the authentication information. | 2015-10-15 |
20150294109 | Generating or Changing Passwords Using a Degree of Simplicity - A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a password in accordance with the established degree of simplicity. The technique also includes superimposing and displaying a secondary object icon for at least one secondary object available to a primary object on top of the primary object icon for the primary object, and the superimposing and display entails either superimposing and displaying a display on the superimposed secondary object icon to indicate whether or not the superimposed secondary object is available on the basis of the degree of simplicity, or changing the superimposed secondary object icon so as to differentiate the availability of the superimposed secondary object on the basis of the degree of simplicity. | 2015-10-15 |
20150294110 | PROCESS FOR REPORTING AND REMEDIATING APPLICATION DEVELOPMENT STANDARDS - Embodiments disclosed herein relate to systems, methods, and computer program products for a system for monitoring application development standards. The system, method, and computer program product are configured to access application code on a server associated with a network, wherein the application code is installed on the server; scan the application code to identify applications that are integrated into the application code; identify products in the application code based on the scan, wherein the products are identified based on a textual analysis of the application code; compare the products identified in the application code to a list of non-allowed products; identify non-allowed products in the application code based on the comparison of the products to the list; determine an allowed product as an alternative to the non-allowed product; and provide a report to a user comprising the non-allowed product and the alternative allowed product. | 2015-10-15 |
20150294111 | UNAUTHORIZED-COMMUNICATION DETECTING APPARATUS, UNAUTHORIZED-COMMUNICATION DETECTING METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM - There is provided an unauthorized-communication detecting apparatus. A measuring unit measures a transition of a communication state value between the unauthorized-communication detecting apparatus and a client apparatus. A transition pattern storage unit stores a transition pattern of the communication state value. An unauthorized-communication detecting unit detects unauthorized communication of the client apparatus on the basis of the transition pattern and a transition of the measured communication state value. | 2015-10-15 |
20150294112 | SYSTEM AND METHOD FOR EMULATION OF FILES USING MULTIPLE IMAGES OF THE EMULATOR STATE - Disclosed are systems, methods, and computer program products for emulation of files using multiple images of the emulator state. In one example, the method includes loading the file into an emulator of the computer system; initiating emulation of the file by the emulator; storing an initial image of an initial state of the emulator; continuing the emulation of the file and detecting occurrence of a condition that results during the emulation of the file; creating and storing a new image of a next state of the emulator when an occurrence of the condition is detected; determining whether the emulation of the file has terminated correctly or incorrectly; and upon determining that the emulation of the file has terminated incorrectly, loading the new image of the next state into the emulator and resuming the emulation of the file from the next state of the emulator. | 2015-10-15 |
20150294113 | METHOD AND SYSTEM FOR PERFORMING A MEMORY SAFETY CHECK OF A PROGRAM WRITTEN IN AN UNMANAGED PROGRAMMING LANGUAGE - A method for performing a memory safety check of a program coded in an unmanaged programming language includes receiving an intermediate representation (IR) of the program and performing a static analysis pass of the IR to generate annotations including a safe pointer and an unsafe pointer. The method further includes removing, during a static analysis pass of the IR, the safe pointer from the annotations, inserting, into the IR using the annotations, a sandbox function call at the unsafe pointer to generate a modified IR, compiling the modified IR to generate an executable version of the program, executing, inside a sandbox framework, the executable version of the program, generating, during runtime and upon reaching the sandbox function call, a metadata entry and an enhanced pointer for atomicity, and comparing, during runtime and upon reaching a use of the unsafe pointer, the metadata entry with the enhanced pointer. | 2015-10-15 |
20150294114 | APPLICATION RANDOMIZATION - In one implementation, an application randomization system accesses an annotated intermediate representation of an application, identifies a first instruction block within the annotated intermediate representation, and randomly selects a first modification for the first instruction block. The application randomization system then identifies a second instruction block within the annotated intermediate representation and randomly selects a second modification different from the first modification for the second instruction block. The application randomization system then generates a native-code representation of the application in which the first modification is applied to the first instruction block and the second modification is applied to the second instruction block. | 2015-10-15 |
20150294115 | SYSTEMS AND METHODS FOR SECURING VIRTUAL MACHINE COMPUTING ENVIRONMENTS - Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first virtual machine operating in a host operating system of a first device. In response to receiving the request, a first security module executes the security operation, the first security module implemented in a kernel of the host operating system. The result of the security operation is provided to the first virtual machine. | 2015-10-15 |
20150294116 | BOOTING A MULTI-NODE COMPUTER SYSTEM FROM A PRIMARY NODE DYNAMICALLY SELECTED BASED ON SECURITY SETTING CRITERIA - A method includes identifying, from among nodes within a multi-node system, a node that has a security setting satisfying a security setting criteria, booting the multi-node system with the identified node as the primary node, and operating the multi-node system using the security setting of the identified node. Accordingly, the method may provide dynamic selection of a primary node based upon the security setting criteria and the security settings of the nodes within the multi-node system. Optionally, the security setting of each node is stored in a trusted platform module. In non-limiting examples, the security setting criteria may be the highest security setting among all nodes within the multi-node system or a predetermined minimum security setting, such as a trusted execution technology setting. | 2015-10-15 |
20150294117 | SECURE DATA PROCESSING - A technique for secure data processing includes a trusted domain comprising a trusted bus coupled with a trusted data processing apparatus adapted to process incoming user data received over the trusted bus and to generate outgoing user data. A trusted domain controller couples the trusted bus with an untrusted bus of an untrusted domain. The trusted domain controller ensures that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus, and ensures that outgoing user data is encrypted and provided over the untrusted bus. A data store access controller couples the trusted domain controller and the trusted data processing apparatus with a memory bus of a data store. The data store access controller restricts successful requests to use the data store received from the trusted domain controller and the trusted data processing apparatus to those addressed to a trusted region of the data store. | 2015-10-15 |
20150294118 | METHOD AND SYSTEM FOR SECURING DATA - A method for securing user data includes the steps of: a) setting the user data as input data; b) randomly fragmenting the input data into a plurality of Atoms and randomly distributing the Atoms into an AtomPool and an AtomKey; and c) recording information about the fragmentation and the distribution of step b) into an AtomMap. | 2015-10-15 |
20150294119 | BOOTING A MULTI-NODE COMPUTER SYSTEM FROM A PRIMARY NODE DYNAMICALLY SELECTED BASED ON SECURITY SETTING CRITERIA - A computer program product including a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a processor to cause the processor to perform a method including identifying, from among nodes within a multi-node system, a node that has a security setting satisfying a security setting criteria, booting the multi-node system with the identified node as the primary node; and operating the multi-node system using the security setting of the identified node. Accordingly, the method may provide dynamic selection of a primary node based upon the security setting criteria and the security settings of the nodes within the multi-node system. In non-limiting examples, the security setting criteria may be the highest security setting among all nodes within the multi-node system or a predetermined minimum security setting, such as a trusted execution technology setting. | 2015-10-15 |
20150294120 | Policy-based data-centric access control in a sorted, distributed key-value data store - A method, apparatus and computer program product for policy-based access control in association with a sorted, distributed key-value data store in which keys comprise n-tuple structure that includes a cell-level access control. In this approach, an information security policy is used to create a set of pluggable policies. A pluggable policy may be used during data ingest time, when data is being ingested into the data store, and a pluggable policy may be used during query time, when a query to the data store is received for processing against data stored therein. Generally, a pluggable policy associates one or more user-centric attributes (or some function thereof), to a particular data-centric label. By using pluggable policies, preferably at both ingest time and query time, the data store is enhanced to provide a seamless and secure policy-based access control mechanism in association with the cell-level access control enabled by the data store. | 2015-10-15 |
20150294121 | ANONYMIZED DATA GENERATION METHOD AND APPARATUS - A method for generating anonymized data includes: (A) extracting, from plural data blocks, each of which includes a secret attribute value and a numeric attribute value, plural groups of data blocks, wherein each of the plural groups includes data blocks that include a first data block, which has not been grouped, whose frequency distribution of the secret attribute value satisfies a predetermined condition and whose numeric attribute values are within a certain area that has a predetermined size; and (B) replacing the numeric attribute values of the data blocks that belong to each group of the plural groups with a numeric attribute value calculated for the group. And, the certain area is determined without any relation with other certain areas for other groups. | 2015-10-15 |
20150294122 | METHOD AND APPARATUS FOR DOWNLOADABLE DRM IN A TRUSTED EXECUTION ENVIRONMENT - An apparatus, system, and method to support downloadable DRM in a trusted execution environment is disclosed. A determination is made whether a platform supports the DRM requirements for protected content and an appropriate DRM module is downloaded if it is required. A DRM coordination agent in the trusted execution environment supports downloading a DRM module. A browser may include features to support utilizing the downloadable DRM module. | 2015-10-15 |
20150294123 | SYSTEM AND METHOD FOR SHARING DATA SECURELY - Embodiments of systems and methods disclosed herein provide simple and effective methods for secure processes to share selected data with other processes, either secure or not, in a safe and secure manner. More specifically, in certain embodiments, systems and methods are disclosed that enable a secure data cache system to write certain data to main memory unencrypted. In other embodiments, systems and methods are disclosed that enable a secure data cache system to write encrypted data from one secure process to main memory, and to enable the decryption of the data by another secure process. In other embodiments, the ownership of data lines in a secure data cache is selectively changed from one process to another, effectively allowing different secure processes to share data. | 2015-10-15 |
20150294124 | DEVICE MONITORING USING MULTIPLE SERVERS OPTIMIZED FOR DIFFERENT TYPES OF COMMUNICATIONS - An electronic device monitoring system uses two different types of servers to communicate with electronic devices of users. One type of server, which may be a rapid contact server, is optimized or configured for relatively short and frequent communications with the electronic devices. The other type of server is optimized or configured for less frequent but (typically) longer communications with the electronic devices. In some embodiments, the electronic devices are configured to communicate relatively frequently (e.g., every few minutes) with the rapid contact server. When an electronic device is reported as lost or stolen, the rapid contact server may instruct the electronic device to contact the other type of server to obtain security-related instructions. | 2015-10-15 |
20150294125 | CONNECTOR - The connector comprises a holding member and a contact which is held by the holding member. The contact has a fixed portion, a first spring portion and a second spring portion. The fixed portion is held by and fixed on the holding member. The first spring portion extends from the fixed portion. The first spring portion includes two pressed portions, a movable starting point and a movable end portion which is movable. When an inserting object is moved along a moving direction which is a forward direction or a rearward direction, the pressed portions are pressed by a press portion to be moved downward perpendicular to the moving direction. The inserting object is a card or a card adapter. The inserting object has the press portion. The second spring portion is provided with a free end and a contact point. When the inserting object is moved in the moving direction, the second spring portion is moved downward together with a movement of the movable starting point so that the inserting object is prevented from being brought into contact with the free end of the second spring portion. | 2015-10-15 |
20150294126 | Mechanically Programmable RFID - Various switchable RFID devices are disclosed. These switchable RFID devices may include one or more RFID tags and one or more switches. Some of these one or more switches are optionally wireless. In various embodiments, the switchable RFID devices include cellular phones, security devices, identity devices, financial devices, remote controls, and the like. In some embodiments, switches are configured to enter data into a switchable RFID device, for example to select a financial account. Switches are optionally configured to program the RFID device or to operate as sensors. | 2015-10-15 |
20150294127 | ELECTRICAL ACTIVITY SENSOR DEVICE FOR DETECTING ELECTRICAL ACTIVITY AND ELECTRICAL ACTIVITY MONITORING APPARATUS - An electrical activity sensor attachable to a power cable of an electrical device for detecting an impulse generated in the power cable in response to a change in electrical power state of the electrical device, the electrical activity sensor comprising an antenna assembly comprising an antenna element operable to magnetically couple with an electrical pulse generated in the power cable to induce an electrical signal in response to a change in electrical power state of the electrical device; and at least one dipole type antenna configured operate as a half wave dipole in the operating frequency range of the antenna element and to magnetically couple to the antenna element wherein the dipole type conductor is operable to wirelessly transmit data representative of the power state change of the electrical device to a remote reader. | 2015-10-15 |
20150294128 | OPTICAL INFORMATION READING DEVICE - In an optical information reading device configured to read a code symbol on a subject to be read by acquiring an image of the subject to be read with an image pickup portion and analyzing the image, a laser light source and an irradiation optical system is provided as an irradiator configured to irradiate the subject to be read to form a guide mark indicating an image pickup resolution of the image pickup portion. It is preferable that the irradiator is configured to emit a plurality of radially diffused light beams so as to form the guide mark at equal intervals on the subject to be read. | 2015-10-15 |
20150294129 | METHOD AND DEVICE FOR IDENTIFYING A TWO-DIMENSIONAL BARCODE - A method of identifying a two-dimensional bar code in digital image data of the bar code, the bar code comprising first and second type elements arranged in an ordered grid and having an outline that comprises an L-shape solid line without transitions between the first and second type elements, the method comprising calculating a gradient field from the digital image data, the gradient field specifying a gradient of the pixel value in the digital image data; calculating gradient magnitude data from the gradient field; performing a thresholding operation on the calculated gradient magnitude data and obtaining edge segment image data; detecting linear segments in the edge segment image data; identifying pairs of the detected linear segments based on an angular criterion between two of the detected linear segments and based on a distance criterion considering a distance between one extremity of each of the two linear segments; and sampling partial digital image data corresponding to a rectangle area in the digital image data and detecting a presence of the first and second type elements in partial digital image data, the rectangle area being defined by one of the identified pairs of detected linear segments. | 2015-10-15 |
20150294130 | Decoding Machine-Readable Optical Codes With Aesthetic Component - Techniques are provided for decoding machine-readable optical codes that have an aesthetic component that is integrated into the codes themselves. In this manner, the machine-readable optical codes can be designed to be aesthetically pleasing and/or can convey information to human viewers, and can even be disguised so that they do not appear to be machine-readable optical codes at all. Such information can be (but need not be) distinct from the information encoded for reading by a machine, even when the information is integrated into the code itself. The techniques described herein can be applied to any type of machine-readable optical code. | 2015-10-15 |
20150294131 | FINGERPRINT ENROLMENT ALGORITHM - A method of enrolling a fingerprint using a narrow-width fingerprint scanner is described. The method may include the steps of receiving first, second, and third fingerprint image strips, respectively representing overlapping portion of the fingerprint, extracting minutiae from each of the fingerprint image strips, matching the extracted minutiae to determine relative positions of the fingerprint image strips, combining the extracted minutiae based on their relative positions to produce a combined set of minutiae representing a larger portion of the fingerprint, and determining that the fingerprint has been successfully enrolled if a width of the larger portion is greater than a predetermined minimum width, or, if not, requesting further fingerprint image strips until the width of the larger portion of the fingerprint is greater than the predetermined minimum width. | 2015-10-15 |
20150294132 | Smart switching using multispectral imaging - A multispectral sensor is provided with an illumination source and a digital imaging system. The illumination source is disposed to provide light at multiple wavelengths to an object. The digital imaging system is disposed to receive light scattered from the object and has a digital array of light detectors and a color filter array. The color filter array has a multiple distributed filter elements, each of which is adapted to transmit light of one of a limited number of specified narrowband wavelength ranges. The color filter array is disposed to filter the light scattered from the object prior to encountering the digital array of light detectors. | 2015-10-15 |
20150294133 | METHOD FOR SEGMENTING FINGERS - A method for segmenting fingers may include: a capture step during which the acquisition device captures an image of the fingers and of the sight; a computing step during which the processing unit computes the unrolled phase image from the image of the thus captured; a derivation step during which, for each pixel of the phase image thus computed, the processing unit computes the derivative of the phase along the isointensity axis of the sight; a regionalisation step during which the processing unit associates each pixel where the derivative of the phase has been computed with a region grouping all the adjoining pixels step by step where the derivative of the phase has the same polarity; and a recognition step during which the location of each finger is recognised from the analysis of the regions thus determined. | 2015-10-15 |
20150294134 | METHOD AND APPARATUS FOR MEASURING ABERRATIONS OF A OCULAR OPTICAL SYSTEM - The present invention refers in general to the measurement of aberrations of the optical system (E) of a living being, in particular human. More specifically, the invention refers to methods and systems for reconstructing a wavefront (W(z,p)) and/or for constructing a refracting error map. | 2015-10-15 |
20150294135 | Fingerprint Sensor Module, Portable Electronic Device Including Same, and Method for Manufacturing Same - The present invention relates to a fingerprint sensor module having excellent sensing sensitivity, to a portable electronic device including same, and to a method for manufacturing same. According to one embodiment of the present invention, a fingerprint sensor module is provided which includes: a sensing unit formed on a substrate using a conductive body; a fingerprint sensor having a sensor circuit unit electrically connected to the sensing unit; a bracket accommodating the sensing unit and receiving the fingerprint sensor; and a post-processing layer positioned on a contact surface formed on the bracket so as to face the upper surface of the sensing unit. The sum of the thickness of a supporting layer between the upper surface of the sensing unit and the contact surface, and the thickness of the post-processing layer is 0.04 mm to 0.06 mm. | 2015-10-15 |
20150294136 | FACIAL RECOGNITION WITH BIOMETRIC PRE-FILTERS - Embodiments of the present invention disclose a method for facial recognition processing using biometric pre-filters. The computer determines a first eye-to-eye distance of a first detected face of a first image, and wherein the eye-to-eye distance is a biometric measurement. The computer receives a selection of a demographic characteristic. The computer determines a search range for the first eye-to-eye distance based, at least in part, on the selection of the demographic characteristic, and the first eye-to-eye distance. The computer identifies a second image from a plurality of images, wherein the second image includes a second eye-to-eye distance that is included in the determined search range for the first eye-to-eye distance. The computer applies a facial recognition algorithm to the second image to determine at least one potential identity that is associated with the first detected face. | 2015-10-15 |
20150294137 | IMAGE PROCESSING DEVICE, IMAGE PROCESSING METHOD, AND PROGRAM - There is provided an image processing device including a person recognition unit that recognizes a person included in each of a plurality of captured images, an image evaluation unit that evaluates one or more captured image groups extracted from among the plurality of captured images, on the basis of a degree of appearance for each person of interest recognized by the person recognition unit, and an image selection unit that selects a captured image group having the highest result of the evaluation by the image evaluation unit. | 2015-10-15 |
20150294138 | TAG SUGGESTIONS FOR IMAGES ON ONLINE SOCIAL NETWORKS - In one embodiment, a method includes accessing an image portraying at least a first person, accessing a social graph, determining a social-graph affinity for a first set of users, determining a facial-recognition scores for the first set of users based on the social-graph affinity for each user and a facial-representation associated with each user, where the facial-representation for each user is compared with the image, and generating one or more tag suggestions for the first person portrayed in the image based on the facial-recognition scores. | 2015-10-15 |
20150294139 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR VALIDATING A FACIAL IMAGE-BEARING IDENTITY DOCUMENT - A method, system and computer program product for validating a facial image-bearing identity document from the face pictured thereon, in which an image of a presented facial image-bearing identity document is compared with images of the faces of persons previously linked with the handling of an illegitimate document. In the event that a match is found, an alert message is transmitted and displayed to an operator and if no match is found a clearance message is transmitted to the operator. | 2015-10-15 |
20150294140 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD AND PROGRAM - Provided are an information processing system, an information processing method and a program capable of suitably monitoring a moving body related to a plurality of imaging apparatuses. The information processing system of the present invention includes: an input unit | 2015-10-15 |
20150294141 | Athletic Performance Monitoring Systems and Methods in a Team Sports Environment - Systems, apparatuses, and methods estimate the distance between a player and a ball by transmitting a chirp (sweep signal) to a radio tag located on the ball. During the chirp, the frequency of the transmitted signal is changed in a predetermined fashion. The radio tag doubles the transmitted frequency and returns the processed signal to a transceiver typically located on the player. The currently transmitted frequency is then compared with the received frequency to obtain a difference frequency from which an apparatus may estimate the distance. The apparatus may simultaneously receive the processed signal from the radio tag while transmitting the sweep signal. | 2015-10-15 |