44th week of 2015 patent applcation highlights part 50 |
Patent application number | Title | Published |
20150310131 | SYSTEMS AND METHODS OF PROVIDING OUTCOMES BASED ON COLLECTIVE INTELLIGENCE EXPERIENCE - Embodiments of a collective intelligence experience system and method may include a processor and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to provide one or more recommended searches to an interface based on collective information and in response to input data at the interface. In some embodiments, with respect to the one or more recommended searches, the system may provide recommendations, advice, associated data, or any combination thereof. In some embodiments, the collective intelligence experience system may determine a true value of a product, a service, or information based on a context of the request at a point in time. | 2015-10-29 |
20150310132 | EVENT-TRIGGERED DATA QUALITY VERIFICATION - A method is directed to associating quality metadata with underlying data. The method includes, for one or more data items, a computing system identifying one or more threshold conditions related to the data items. The computing system determines that the one or more threshold conditions related to the data items have been met. As a result of determining that the one or more threshold conditions related to the data items have been met, the computing system associates quality metadata with the data items. | 2015-10-29 |
20150310133 | METHOD AND DEVICE FOR ESTIMATING A THICKNESS OF A CERAMIC THERMAL BARRIER COATING - An estimation method for estimating thickness of a ceramic thermal barrier coating that is to be deposited by physical vapor deposition from at least one target and onto a gas turbine hot part mounted on a support tooling, the method including: digitally modeling a geometrical shape of the hot part and its movements relative to the target; representing the modeled hot part as a surface mesh; and estimating, for at least one mesh element of the hot part exposed to the radiation from the target during deposition of the coating, a coating thickness to be deposited on the mesh element at a given instant by using a radiation model modeling radiation from the target and taking account of the position of the mesh element at that given instant relative to the target. | 2015-10-29 |
20150310134 | INTERFERENCE DETECTION IN A THREE-DIMENSIONAL DATA MODEL - A computer implemented method for detecting interference between elements in a three-dimensional data model. In the method the three-dimensional data model is received as an input ( | 2015-10-29 |
20150310135 | 4D VIZUALIZATION OF BUILDING DESIGN AND CONSTRUCTION MODELING WITH PHOTOGRAPHS - A system and method are disclosed for, using structure-from-motion techniques, projecting a building information model (BIM) into images from photographs taken of a construction site, to generate a 3D point cloud model using the BIM and, when combined with scheduling constraints, facilitates 4D visualizations and progress monitoring. One of the images acts as an anchor image. Indications are received of first points in the anchor image that correspond to second points in the BIM. Calibration information for an anchor camera is calculated based on the indications and on metadata extracted from the anchor image, to register the anchor image in relation to the BIM. A homography transformation is determined between the images and the anchor camera using the calibration information, to register the rest of the images with the BIM, where some of those images are taken from different cameras and from different angles to the construction site. | 2015-10-29 |
20150310136 | ARCHITECTURAL DESIGN DASHBOARD - Systems and methods of automated architectural design are disclosed. A user can access a user account associated with information such as model prototypes, families, component models useable to assemble a complete building model based configuration selections, etc., and can be associated with one or more entities (e.g., a company that uses similar building designs at various stores, etc.). Building configuration options can be presented to a user, and various configuration options selected by the user can be received. Appropriate component models having attributes (e.g., including appropriate building materials, etc. corresponding to the building code, appropriate building design for wind considerations, etc.) corresponding to the received configuration inputs can be selected. A building model can be constructed as a kit-of-parts from the component models selected based on the received user inputs. | 2015-10-29 |
20150310137 | Minimizing Uncertainty Envelopes in Trajectories of Evolving Ensemble Members - A mechanism is provided in a data processing system for minimizing uncertainty envelopes in trajectories of evolving ensemble members. The mechanism generates a trajectory forecast of each member object of an ensemble based on an initial state-space and a model for predicting trajectories of the member objects to generate a plurality of trajectory forecasts. Each of the plurality of trajectory forecasts has an individual uncertainty envelope. The mechanism applies a classification algorithm on the plurality of trajectory forecasts to identify at least one group of member objects having similar trajectory forecasts, generates a reduced ensemble of member objects including the identified group of member objects, and reconfigures the state-space and the model for predicting trajectories. The mechanism generates an updated trajectory forecast of each member object of the reduced ensemble based on the reconfigured state-space and the reconfigured model for predicting trajectories of the member objects. | 2015-10-29 |
20150310138 | METHOD FOR ANALYZING OXIDATION IN AN INTERNAL COMBUSTION ENGINE - A process for analyzing incomplete fuel oxidation in an internal combustion engine is provided. The process includes simulating a cylinder with a cylinder wall and a piston within the cylinder for the internal combustion engine. Based on the simulation of the internal combustion engine operation, a pressure and a temperature are determined at a predetermined location within the cylinder for at least one piston crank angle. In addition, combustion of fuel at the predetermined location within the cylinder is simulated and a determination of combustion products is provided. In this manner, simulation of incomplete oxidants produced during operation of the internal combustion engine is afforded and can be used for the design of engine components such as cylinder walls, piston heads, piston rings, valves, spark plugs, and the like. | 2015-10-29 |
20150310139 | APPLICATION BEHAVIOR LEARNING BASED CAPACITY FORECAST MODEL - Various techniques employed by an application performance management service to generate an application behavior learning based capacity forecast model are disclosed. In some embodiments, such a capacity forecast model is at least in part generated by clustering collected transaction data into one or more usage patterns, analyzing collected usage pattern data, and solving a mathematical model generated from the usage pattern data to determine a sensitivity of a resource to each type of transaction associated with an application. | 2015-10-29 |
20150310140 | Systems and Methods for Modeling Subterranean Formations that Include Gaseous Hydrocarbons and Adsorbed Hydrocarbons - Systems and methods for modeling subterranean formations that include both gaseous hydrocarbons and adsorbed hydrocarbons. The systems and methods include determining a formation volume factor for gaseous hydrocarbons that may be present within the subterranean formation and correcting the formation volume factor to generate a compensated formation volume factor. The systems and methods further may include simulating a fluid flow within the subterranean formation, with the simulating being based, at least in part, on the compensated formation volume factor. Correcting the formation volume factor may include adjusting the formation volume factor based, at least in part, on a fraction of the adsorbed hydrocarbons within the subterranean formation that desorbs from the subterranean formation and/or transitions to gaseous hydrocarbons during production of the gaseous hydrocarbons from the subterranean formation. | 2015-10-29 |
20150310141 | Novel Methodology for Determining Curves of Productivity of Wells for Exploiting Stockpiles and Reserves of Compressible Fluids - The invention relates to a characterization method for characterizing the performance of wells in a stockpile or deposit of compressible fluid, the method comprising the steps of:
| 2015-10-29 |
20150310142 | METHODS AND SYSTEMS OF PROVIDING ITEMS TO CUSTOMERS VIA A NETWORK - In one or more embodiments, a system can simulate one or more physical mobile devices and can allow respective one or more users to utilize respective one or more simulations via a network. For example, a user, utilizing an application such as a web browser, can interact with a simulated mobile device. For instance, the user can select a function of the simulated mobile device, the simulated mobile device can provide, to the user, a simulation of the function, the first user can manipulate the simulated mobile device, and output of the function can be displayed to the user in accordance with the manipulation of the simulated mobile device. In one or more embodiments, the system can determine and display multiple images, of the simulated mobile, device based on multiple directions of a pointer path. For example, the system can determine the directions based on positions acquired at time intervals. | 2015-10-29 |
20150310143 | DEFORMATION ANALYSIS DEVICE, DEFORMATION ANALYSIS METHOD, AND PROGRAM - The deformation analysis device includes: a storage unit ( | 2015-10-29 |
20150310144 | METHOD AND DEVICE FOR PREDICTIVE EVALUATION OF THE INTERMODULATION POWER IN AN ELECTRONIC DEVICE - A method and a device for predictive evaluation of intermodulation power in an electronic device in which a predictive function f makes it possible to evaluate in a predictive manner values of power of an intermodulation component produced by an intermodulation distortion of an input signal, characterized in that the predictive function f includes an odd part V obtained by multiplication of an odd function F and of a function G, obtained by composition of a positive real-valued even function g and of a function Q in the form of a real series including at least one term of degree q belonging to the non-integer reals. | 2015-10-29 |
20150310145 | METHOD FOR ASSESSING THE CONTROLLABILITY OF A VEHICLE - The invention relates to a method the assessing the controllability of a vehicle by a driver in a risky or problematic situation. In order to carry out assessment of the controllability of a vehicle early, the following steps are provided: a. modelling the drive train and the movement dynamics of the vehicle, b. modelling situation conditions and environmental conditions, c. selecting a risky or problematic situation, d. selecting a driver capability type, e. modelling the driver's reaction as a function of the selected driver capability type. f. simulating the dynamic vehicle behaviour in the longitudinal and transverse directions of a planned trajectory on the basis of the drive train model and movement dynamics model for the predefined situation and environmental conditions when the selected risky or problematic situation occurs, g. calculating the maximum lateral and longitudinal deviation from the planned trajectory between the occurrence of the risky or problematic situation and the regaining of complete control by the driver, h. evaluating the controllability of the vehicle by the driver in the risky or problematic situation on the basis of the maximum lateral and/or longitudinal deviation. | 2015-10-29 |
20150310146 | Detecting Static and Dynamic Objects - For detecting static and dynamic objects, the objects are statistically detected by way of a particle card, and new particles are respectively added in repeating steps. The method is characterized by the fact that static particles are also added, which makes it possible to model static objects in a very precise manner. An environmental model is also generated that has a two-dimensional arrangement of cells, and each cell represents a specific location. To each cell at least two continuous classification values are assigned that describe different attributes of the cells, for example, whether a cell has an object, a static object, a dynamic object, or whether it represents a free space, or whether none of these classes can be assigned. | 2015-10-29 |
20150310147 | DYNAMIC SIMULATION OF FLUID FILLED VESSELS - A system is provided. The system comprises a computer system comprising at least one processor, a thermodynamic state solver application, and a thermodynamic system solver application. When executed by the at least one processor, the thermodynamic state solver application computes a flash equilibrium state solution for each of a plurality of nodes in a thermodynamic network and determines for each of the plurality of nodes at least one sensitivity of a first thermodynamic property with reference to at least one second thermodynamic property. When executed by the at least one processor, the thermodynamic system solver computes a pressure at each of the nodes and flows between the nodes based at least in part on the sensitivities, wherein a result based on the pressures and flows is determined. | 2015-10-29 |
20150310148 | Structural Analysis for Additive Manufacturing - The system described assumes that the physical properties of the bind sites will be sufficiently repeatable to be tabulated based on a limited set of control constraints: filament material, temperature of the print head, feed rate, temperature of the substrate, and filament orientations at the bind site, etc. The main idea of this system is to utilize the bind sites and the connection and directionality of the threads as a lattice that can then be fed into a finite element analysis (FEA) algorithm for simulation in order to extract the macro physical properties of the part being produced. These repeatable bind site tabulated values can then be used to provide the cell properties for the FEA. The micro properties of the bind site can also be encoded into explicit equations, neural networks or other approximators. | 2015-10-29 |
20150310149 | ESD/EOS SYSTEM LEVEL SIMULATION TOOL - Disclosed are exemplary embodiments of methods and systems for numerical simulation of Electrostatic Discharge (ESD) and Electrical Overstress (EOS) events applied to one or more component devices under test or devices under protection. In an example embodiment, a method generally includes providing access to centralized resources for industry standard nodal circuit or finite element analysis numerical simulation of electromagnetic events, as well as protecting intellectual property for some or all of the numerical models used in the simulation. In an exemplary embodiment, a numerical simulation system provides a platform for multiple users to utilize this platform simultaneously, select independent combinations of models and simulation parameters, execute these simulations and view, and store and retrieve these results independently. With such a simulation platform, a central or distributed repository of protected device models can be used as “black boxes” by system integrators to compare and contrast results in various combinations. | 2015-10-29 |
20150310150 | Modifying a Virtual Processor Model for Hardware/Software Simulation - A method or apparatus for transforming a provided virtual processor model to a user virtual processor model. The method in on embodiment comprises transforming a virtual processor model to simulate a user target processor, by receiving a transformable virtual processor model having a transformable instruction set and a transformable pipeline, and transforming the transformable virtual processor model to a user virtual processor model designed to simulate a user target processor. | 2015-10-29 |
20150310151 | System and Method for Efficient Statistical Timing Analysis of Cycle Time Independent Tests - A method and a system performing selected timing comparisons in a digital electronic design includes propagating from signal sources to timing comparisons of one or multiple signal labels. The signal label includes signal source identifiers and signal path cycle adjust information. Timing comparisons are determined in which signal label values at each input of the timing comparison are required to compute the selected timing comparisons. The propagation back from the timing comparisons are needed signal labels, followed by the propagation and computing timing data from the signal source applied to the propagated signal labels corresponding to the required signal labels. | 2015-10-29 |
20150310152 | METHOD AND APPARATUS FOR CALCULATING DELAY TIMING VALUES FOR AN INTEGRATED CIRCUIT DESIGN - A method of calculating at least one delay timing value for at least one setup timing stage within an integrated circuit design includes applying Negative/Positive Bias Temperature Instability (N/PBTI) compensation margins to delay values for elements within the at least one setup timing stage, and calculating the at least one delay timing value for the at least one setup timing stage based at least partly on the N/PBTI compensated delay values. The method further includes identifying at least partially equivalent elements within parallel timing paths of the at least one setup timing stage, and applying reduced N/PBTI compensation margins to delay values for the identified at least partially equivalent elements within parallel timing paths of the at least one setup timing stage. | 2015-10-29 |
20150310153 | Methods and Computer-Readable Media for Synthesizing a Multi-Corner Mesh-Based Clock Distribution Network for Multi-Voltage Domain and Clock Meshes and Integrated Circuits - One aspect of the invention provides a including: (a) placing N×N max size buffers at an (n−1)st level of one of the voltage domains i until a maximum slew slew | 2015-10-29 |
20150310154 | METHOD AND APPARATUS FOR TESTING - A computer-implemented method, apparatus and computer program product for testing a design, the method comprising receiving a design; receiving a description of a scenario, wherein the scenario relates to execution of the design, wherein the scenario is used for verifying the design; translating the scenario to an input for a verification engine, wherein the verification engine is selected from the group consisting of a simulation engine and a formal analysis engine; activating the engine and providing the input to the engine, whereby the engine outputting a result; and displaying the result. | 2015-10-29 |
20150310155 | NET-VOLTAGE-AWARE OPTICAL PROXIMITY CORRECTION (OPC) - Various embodiments include computer-implemented methods, computer program products and systems for verifying an integrated circuit (IC) layout. In some cases, approaches include a computer-implemented method of verifying an IC layout, the method including: obtaining data about a process variation band for at least one physical feature in the IC layout; determining voltage-based process variation band thresholds for the at least one physical feature in the IC layout; determining whether the process variation band for the at least one physical feature in the IC layout meets design specifications for the IC layout based upon the voltage-based process variation band thresholds for the at least one physical feature in the IC layout; and modifying the IC layout in response to a determination that the process variation band for the at least one physical feature does not meet the design specifications. | 2015-10-29 |
20150310156 | METHOD AND APPARATUS FOR OPTICAL PROXIMITY CORRECTION - Some embodiments of the present disclosure provide an integrated circuit (IC) design method. The method includes (1) receiving a first layout comprising stripe patterns with a first separation and a first width; (2) receiving a second layout comprising stripe patterns with a second width narrower than the first separation, each stripe on the second layout is configured to situate between two adjacent stripes on the first layout when overlaying the first layout and the second layout; (3) performing a separation check by identifying a spacing between a stripe on the second layout and one of the two adjacent stripes on the first layout; and (4) adjusting the spacing between the stripe on the second layout and one of the two adjacent stripes on the first layout when the separation check determining the spacing is greater than a predetermined value. | 2015-10-29 |
20150310157 | MASK ERROR COMPENSATION BY OPTICAL MODELING CALIBRATION - Methodologies and an apparatus for enabling OPC models to account for errors in the mask are disclosed. Embodiments include: determining a patterning layer of a circuit design; estimating a penetration ratio indicating a mask corner rounding error of a fabricated mask for forming the patterning layer in a fabricated circuit; and determining, by a processor, a compensation metric for optical proximity correction of the circuit design based on the penetration ratio. | 2015-10-29 |
20150310158 | Method for Integrated Circuit Manufacturing - Provided is an integrated circuit (IC) manufacturing method. The method includes receiving a design layout of an IC, wherein the design layout includes a plurality of non-overlapping IC regions and each of the IC regions includes a same initial IC pattern. The method further includes dividing the IC regions into a plurality of groups based on a location effect analysis such that all IC regions in a respective one of the groups are to have substantially same location effect. The method further includes performing a correction to one IC region in each of the groups using a correction model that includes location effect; and copying the corrected IC region to other IC regions in the respective group. The method further includes storing the corrected IC design layout in a tangible computer-readable medium for use by a further IC process stage. | 2015-10-29 |
20150310159 | COMPUTER-IMPLEMENTED VERIFICATION SYSTEM FOR PERFORMING A FUNCTIONAL VERIFICATION OF AN INTEGRATED CIRCUIT - A computer-implemented verification system for performing a system level or a system on chip level functional verification of integrated circuit is provided. The computer-implemented system includes one or more processors and a memory storing instructions defined by one or more modules of including a scenario compiler, a verification component and a software library component. The scenario compiler receives a set of verification scenario intents including at least one of test-application intents, constraints, device-programming intents and scenario-control intents. The scenario compiler generates one or more open verification methodology (OVM) and/or universal verification methodology (UVM) compliant test bench sequences and one or more scenario software implementations based on the set of verification scenario intents. The verification component interacts with the integrated circuit using the OVM and/or UVM compliant test bench sequences. The software library component enables execution of the scenario software implementations on a processing unit core of the integrated circuit. | 2015-10-29 |
20150310160 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR GENERATING HIGH DENSITY REGISTRATION MAPS FOR MASKS - A method and system for generating high density registration maps for masks is disclosed. A data preparation module generates a plurality of anchor points of the mask. Additionally, the data preparation module generates a plurality of sample points. Weights are generated as well in the data preparation module and the weights are used later on in the data fusion module. The positions of anchor points are measured with a registration tool in a mask coordinate system according to a generated recipe. The positions of sample points are determined with an inspection tool in a mask coordinate system according to a generated recipe. The measured positions of the anchor points and the measured positions of the sample points are passed to a data fusion module where a registration map is determined. | 2015-10-29 |
20150310161 | METHOD OF DESIGNING CIRCUIT BOARD INSPECTING JIG, CIRCUIT BOARD INSPECTING JIG, AND CIRCUIT BOARD INSPECTING APPARATUS - Provided is a method of designing a circuit board inspecting jig having a contact to be brought into conductive contact with a test point on a circuit board to be inspected. The method includes: preparing temporary design data by temporarily designing the circuit board inspecting jig based on design data for the circuit board to be inspected (a first designing process); acquiring an expansion and contraction ratio of the circuit board based on a condition upon manufacturing the circuit board (and an environmental condition upon inspecting the circuit board) (an expansion and contraction ratio acquiring process); and obtaining design data for the circuit board inspecting jig to be actually manufactured by scaling the temporary design data up and down by the expansion and contraction ratio (a second designing process). | 2015-10-29 |
20150310162 | Compound Design Device, Compound Design Method, And Computer Program - When the interaction of a compound is predicted by using a computer, a technique to highly precisely design a compound having a novel structure has been required. A compound designing device is provided which includes an input unit configured to receive, at least about one or more query proteins, one or more pieces of query protein information corresponding to the one or more query proteins; and a processing unit configured to perform steps of (a) generating one or more pieces of compound information, (b) computing a score indicating interaction potential between a compound corresponding to the compound information and each of the one or more query proteins, (c) updating the compound information by an optimization method with reference to the score computed at step (b) such that the interaction potential increases, and (d) repeating steps (b) and (c) a plurality of times. | 2015-10-29 |
20150310163 | SYSTEM FOR GENOME ANALYSIS AND GENETIC DISEASE DIAGNOSIS - The method for genome analysis translates the clinical findings in the patient into a comprehensive test order for genes that can be causative of the patient's illness, delimits analysis of variants identified in the patient's genome to those that are “on target” for the patient's illness, and provides clinical annotation of the likely causative variants for inclusion in a variant warehouse that is updated as a result of each sample that is analyzed and that, in turn, provides a source of additional annotation for variants. The method uses a genome sequence having the steps of entering at least one clinical feature of a patient by an end-user, assigning a weighted value to the term based on the probability of the presence of the term, mapping the term to at least one disease by accessing a knowledge base containing a plurality of data sets, wherein the data sets are made up of associations between (i) clinical features and diseases, (ii) diseases and genes, (iii) genes and genetic variants, and (iv) diseases and gene variants, assigning a truth value to each of the mapped terms based on the associated data sets and the weighted value, to provide a list of results of possible diagnoses prioritized based on the truth values, with continuous adjustment of the weightings of associations in the knowledge base based on updating of each discovered diagnosis and attendant clinical features, genes and gene variants. This method can be performed in fifty hours or twenty-four hours or less. | 2015-10-29 |
20150310164 | SYSTEM AND METHOD FOR PROCESSING GENOTYPE INFORMATION RELATING TO PAIN PERCEPTION - There are systems and methods for preparing or using prognostic information about pain perception or performing an assay based on such information. The information may include whether subject has a subject genotype that includes a COMT haplotype diploid, at least two SNP diploids, one or more demographic phenotypes or a combination thereof. The COMT haplotype diploid is a combination of two COMT haplotypes selected from an LPS haplotype, an APS haplotype, a HPS haplotype or a combination thereof in the COMT gene. The at least two SNP diploids are each a combination of two SNP alleles associated with one SNP location in the DRD1 gene, the COMT gene, the OPRK1 gene, the DRD2 gene, the MTHFR gene, the SLC6A4 gene, the HTR2A gene, the DBH gene, the GABRG2 gene, the OPRM1 gene or the SLC6A3 gene. | 2015-10-29 |
20150310165 | EFFICIENT COMPARISON OF POLYNUCLEOTIDE SEQUENCES - The disclosure relates to rapid detection of oligonucleotide sequence in a nucleic acid sequence database through the configuration of the database into rapidly searchable index classes built around perfect Hamming code oligonucleotides. | 2015-10-29 |
20150310166 | METHOD AND SYSTEM FOR PROCESSING DATA FOR EVALUATING A QUALITY LEVEL OF A DATASET - A method processes data for evaluating quality level of an original dataset. The original dataset is obtained from an automated sequencing of a chain of nucleotides and represents a plurality of total mapped reads. The method includes sampling of a plurality of total mapped reads of the original dataset to produce a subset of mapped reads. The method also includes computing a dispersion indicator for the subset. The dispersion indicator represents divergence between an actual read count intensity and a theoretical read count intensity. The actual read count corresponds to the number of sampled mapped reads. The theoretical read count corresponds to a theoretical number of sampled mapped reads, which does not depend on the current sampling. | 2015-10-29 |
20150310167 | SYSTEMS AND METHODS FOR USING PAIRED-END DATA IN DIRECTED ACYCLIC STRUCTURE - Methods of analyzing a transcriptome that involves obtaining at least one pair of paired-end reads from a transcriptome from an organism, finding an alignment with an optimal score between a first read of the pair and a node in a directed acyclic data structure (the data structure has nodes representing RNA sequences such as exons or transcripts and edges connecting pairs of nodes), identifying candidate paths that include the node connected to a downstream node by a path having a length substantially similar to an insert length of the pair of paired-end reads, and aligning the paired-end rends to the candidate paths to determine an optimal-scoring alignment. | 2015-10-29 |
20150310168 | METHOD FOR PREDICTING GENE CLUSTER INCLUDING SECONDARY METABOLISM-RELATED GENES, PREDICTION PROGRAM, AND PREDICTION DEVICE - This invention provides a method for predicting a gene cluster including secondary metabolism-related genes with high accuracy, independent of information concerning core genes. Such method comprises: a step of identifying a region the gene arrangement of which is conserved in nucleotide sequence information of another genome as a gene cluster on the basis of the results of homology search conducted with the use of nucleotide sequence information of at least a pair of genomes; and a step of determining whether or not the gene cluster of interest includes secondary metabolism-related gems on the basis of the proportion of synteny-like regions within the gene cluster identified by the above step. | 2015-10-29 |
20150310169 | METABOLIC PROFILING IN TISSUE AND SERUM IS INDICATIVE OF TUMOR DIFFERENTIATION IN PROSTATE CANCER - The invention provides methods and products to detect the presence of unidentified high grade prostate tumors in a subject with a Gleason score 7 prostate tumor. The method comprises obtaining a biological sample from a subject in need thereof, measuring a profile of metabolites in the biological sample, wherein the metabolites are differentially expressed in Gleason score 6 versus Gleason score 8 prostate tumors, and classifying the profile of the metabolites to assign a grade to the sample based on the profile of the metabolites. | 2015-10-29 |
20150310170 | MEDICAL IMAGE BASED COLLABORATION - Medical image based collaboration system and methods are provided. A collaboration server | 2015-10-29 |
20150310171 | MEDICAL DEVICE DATA FILTERING FOR REAL TIME DISPLAY - An ocular surgical apparatus is provided, including a processor configured to receive ocular surgical data and a graphical user interface configured to display the ocular surgical data to a user. The processor configured to filter the ocular surgical data and the graphical user interface configured to display filtered ocular surgical data. The processor is configured to receive a number of ocular surgical data samples, discard selected ocular surgical data samples thereby yielding a number of emphasized samples, and perform an operation on the number of emphasized samples to produce filtered ocular surgical data. | 2015-10-29 |
20150310172 | SIMILAR CASE RETRIEVAL APPARATUS, SIMILAR CASE RETRIEVAL METHOD, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, SIMILAR CASE RETRIEVAL SYSTEM, AND CASE DATABASE - A similar case retrieval apparatus includes: a lesion portion acquirer that acquires partial images including lesion portion images, an image feature extractor that extracts image features of each of the plurality of partial images; a location information acquirer that acquires location information of each of the partial images; a lateral position determiner that determines the right organ or the left organ in which each of the lesion portions exists based on the location information; a unilateral distribution identifier that determines whether or not a distribution of the lesion portions is a unilateral distribution; and a similar case retriever that retrieves case data from a case database including both case data for the unilateral distribution in the right organ and case data for the unilateral distribution in the left organ when the unilateral distribution identifier identifies that the distribution of the lesion portions is the unilateral distribution. | 2015-10-29 |
20150310173 | SECURE HEALTHCARE MANAGEMENT AND COMMUNICATION SYSTEM - A healthcare management and communication system including a central server, home base devices, and portable medical assistant devices (PMAD) providing secure electronic communications among medical facilities and healthcare providers, while ensuring privacy of patient medical records. In an embodiment, the central server communicates with the home base device(s) and the PMAD providing information necessary for a healthcare provider to perform a procedure for a patient. The healthcare communication system provides security for patient information by allowing the healthcare provider to access some basic patient information on the PMAD, including directions to the patient's house, when the PMAD is in all locations. Only when the PMAD is within a physical proximity to a selected home base device can the healthcare provider access the corresponding patient's confidential information necessary for the on-site visit. Notes and data recorded during the procedure may be securely transmitted to the central server, updating the patient's record. | 2015-10-29 |
20150310174 | METHOD OF SECURE ACCESS TO CONFIDENTIAL MEDICAL DATA, AND STORAGE MEDIUM FOR SAID METHOD - A process for generating a digital medical file stored on a secure server ( | 2015-10-29 |
20150310175 | METHOD AND SYSTEM OF HANDLING BIOLOGICAL ASSETS THROUGH A BIO-REPOSITORY - Embodiments of the disclosure relate to system and a method for handling biological assets through a bio-repository. In an embodiment, the present disclosure provides a system by which owner of the biological asset can store their biological samples and control the usage of the biological sample. Each time the biological sample is used, consent is requested by the bio-repository from the owner of the biological sample. | 2015-10-29 |
20150310176 | HEALTHCARE EVENT RESPONSE AND COMMUNICATION CENTER - The present teaching relates to a Healthcare Event Response and Communication Center. In one example, a healthcare message is received. The healthcare message is processed to automatically identify one or more healthcare events. For each identified healthcare event, one or more responsive entities that are configured to be responsive to the healthcare event are identified. Each responsive entity is associated with one or more healthcare workflows that are configured to receive the healthcare event. Each identified healthcare event is provided in real-time to each of the one or more responsive healthcare workflows with respect to each responsive entity. | 2015-10-29 |
20150310177 | SOCIAL MEDICAL NETWORK FOR DIAGNOSIS ASSISTANCE - A method for diagnosis assistance exploits similarity between a new medical case and existing medical cases and experts when embedded in a common embedding space. Different types of queries are provided for, including a query-by-cases and a query-by-experts. These may be associated with different cost structures that encourage the requester to use the query-by-cases first and seek expert assistance if this proves unsuccessful. Depending on whether the query-by-cases or query-by-experts is requested, a subset of the existing cases or experts is identified based on the similarity of their representations, in the embedding space, with a representation of the new case in the embedding space. There may then be provision for communicating the new case to a selected one or more of the subset of experts for the expert to attempt to provide a diagnosis. | 2015-10-29 |
20150310178 | DIAGNOSTIC METHODS AND DEVICES FOR CONTROLLING ACUTE GLYCEMIA - Devices, systems and methods for monitoring glycemic levels in a patient, by calculate a plurality of blood glucose values from a plurality of blood samples taken, calculating a quantile of the blood glucose values taken over a period of days; and creating a Lorenz plot for the blood glucose values in the quantile. | 2015-10-29 |
20150310179 | SYSTEM AND METHOD THAT APPLIES RELATIONAL AND NON-RELATIONAL DATA STRUCTURES TO MEDICAL DIAGNOSIS - A medical diagnosis system comprises one or more databases configured to store a plurality of relational tables within a relational data structure and a non-relational table within a non-relational data structure. The plurality of relational tables comprise a symptom table configured to associate a plurality of symptoms having symptom name fields with a corresponding plurality of symptom identifier fields (Symptom ID). A cause table is configured to associate a plurality of causes having caused name fields with a corresponding plurality of cause identifier fields (Cause ID). A symptom-cause relational table is linked to the symptom table and the cause table to associate the plurality of cause identifier fields with the plurality of symptom identifier fields. The plurality of symptom identifier fields comprise first foreign keys that link the symptom table to the symptom-cause relational table. The plurality of symptom identifier fields comprise second foreign keys that link the cause table to the symptom-cause relational table. One or more processors provide interfaces for receiving one or more symptom names and presenting one or more cause names based on associations of symptom names and cause names in the non-relational table. The associations of symptom names and cause names in the non-relational table are derived from mapping the plurality of cause name fields in the cause table and the plurality of symptom name fields in the symptom table into the non-relational table. The mapping being based on the association of the plurality of cause identifier fields with the plurality of symptom identifier fields in the symptom-cause relational table. | 2015-10-29 |
20150310180 | Computer-Implemented System And Method For Tracking Entity Locations And Generating Histories From The Locations - A computer-implemented system and method for tracking entity locations and generating histories from the locations is provided. A tracker is associated with identification data for an entity and placed with the entity. A location of the tracker is determined. Three or more reader systems that receive location readings from the tracker are identified. A reading range of each of the reader systems is determined. An overlapping interrogation zone having a region that is shared by the reading ranges of the reader systems is located. The location of the tracker is calculated based on the overlapping zone. The location and an associated time stamp are stored on a central server with other locations of the tracker and time stamps obtained over time. A request is received for a location history of the entity. A portion of the locations are collected from the central database for the tracker as the location history. | 2015-10-29 |
20150310181 | Portable System and Method for Guiding Treatment of Patients - The inventors have recognized that precise synchronization of remote data coupled with local compression and verification technologies enables healthcare providers to employ a device with locally stored patient information and clinical pathways for providing improved healthcare services in dynamic and remote environments. Patient information may be mapped to code sets and reported to patients and/or exchanged with health care organizations accordingly. In addition, patient information may be aggregated with other patient information to provide further improved localized results. Accordingly, more efficient, consistent and reliable healthcare services may be provided to patients in dynamic and remote environments. | 2015-10-29 |
20150310182 | DATA PROCESSING AND COMMUNICATION UNIT FOR RECORDING PATIENT DATA IN THERAPY-FREE INTERVALS - A patient data monitoring system is disclosed for central monitoring of vital parameters of at least one dialysis patient in a therapy-free interval. The system includes a central patient database for storing patient data, at least one measuring device carried along or kept at home by a patient during the therapy-free interval, and a portable data processing and communication device carried along or kept at home by the patient in the therapy-free interval that assigns a corresponding patient ID to each measured vital parameter received from the at least one measuring device via data communication, automatically sets up a remote data connection to the central patient database and, once the connection to the central patient database is set up, automatically transmits a data set including patient ID and the at least one measured vital parameter to the central patient database. | 2015-10-29 |
20150310183 | TELEMEDICINE COMPONENTS, DEVICES, APPLICATIONS AND USES THEREOF - The present invention relates to equipment including hardware, software, and methods of use thereof for enabling medical interactions between individuals in separate locations. More specifically, the present invention relates to telemedicine components, devices, applications, and uses thereof. Embodiments of the present invention enable video, audio, textual, and graphical information to be securely exchanged between doctors and patients, as well as data files. A doctor located remotely from a patient may receive information from and control one or more medical devices located proximate to the patient using software operating on a computing device. | 2015-10-29 |
20150310184 | Regional Medical Cooperation System - The task is to provide a system which supports smooth patient referral from a referral source medical institution to a referral destination medical institution and which particularly prevents readmission due to cases that are difficult to determine simply based on patient attributes or due to the quality of medical services. To achieve this task, a referral difficult degree calculation unit calculates a referral difficulty degree which quantifies the risk that a patient cannot be discharged because a referral destination cannot be found, in consideration of a readmission risk calculated by a readmission risk calculation unit, the geographical distance between the patient and the referral destination medical institution, the total number of patients accepted, and the number of beds available. This referral difficulty degree is outputted to an output unit of the referral source medical institution or the referral destination medical institution. | 2015-10-29 |
20150310185 | IN-HOME IOT MEDICATION DEVICE - Technologies for implementing an IOT medication device for use in the home of a patient are described herein. The IOT medication device comprises a controller, at least one near-field communication (“NFC”) transceiver, and one or more displays. The NFC transceiver is operably connected to the controller and configured to read data from an NFC tag attached to a medication container placed in proximity to the transceiver. The controller can then display information related to a medication contained in the medication container on the one or more displays. | 2015-10-29 |
20150310186 | Ambulatory Medication on Demand Dipsenser - A medication dispenser. The dispenser comprises a sensor for receiving biometric information from a user, a memory for storing a minimum dosing interval, a controller for determining whether the user is an authorized user, a belt having medication-carrying slots, a dose opening defined in an exterior surface of the dispenser, and a signaling device. The controller activates the signaling device and the sensor only when the minimum dosing interval has elapsed as measured from a last successful user authentication. The sensor is responsive to user biometric information provided any time after activation of the signaling device and the sensor, but not before activation of the signaling device and the sensor. After determining the use is an authorized user, a medication-carrying slot is aligned with the dose opening. | 2015-10-29 |
20150310187 | METHODS AND DEVICES FOR IDENTIFYING IMPROPER MEDICAL REPORTING - Some embodiments of the invention relate to pharmaceuticals, clinical trials and reporting, and more specifically to finding duplicate medical reporting in clinical trials or when reporting adverse events attributed to drug use. Some embodiments of the invention relate to clinical trials, and more particularly to methods and devices for improving the results of clinical trials by preventing improper participation in clinical trials. | 2015-10-29 |
20150310188 | SYSTEMS AND METHODS OF SECURE DATA EXCHANGE - In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment through a secure exchange facility managed by an intermediate organizational entity amongst users of a plurality of other organizational entities, wherein computer data content and access rights for the computer data content is shared between a first and second user, the computer data content and access rights for the computer data content are transformed into a DRM protected computer data content through communications with a DRM engine, wherein the DRM engine is selected based on a content type of the computer data content, and the DRM engine is provided by an entity other than the intermediate organizational entity and other than any of the plurality of other organizational entities. | 2015-10-29 |
20150310189 | ENCRYPTION METHOD FOR DIGITAL DATA MEMORY CARD AND ASSEMBLY FOR PERFORMING THE SAME - Embodiments of a portable data storage device and a method of protecting data stored in the portable data storage device are provided. In one embodiment, the portable data storage device includes a device identification unique to the portable data storage device, a rights object containing information indicative of access rights and a verification identification, a memory to store the device identification and the verification identification, and controller logic. The memory is partitioned into a plurality of areas of memory, including: a first area as a protection area to store an instruction code, a second area as a partition table area to store a partition table, and a third area as a file area to store data files. In response to a request from a client external to the portable data storage device, the controller logic compares the verification identification with the device identification to allow the client to access of the data files if the verification identification matches the device identification. | 2015-10-29 |
20150310190 | METHOD AND SYSTEM FOR ENSURING SEQUENTIAL PLAYBACK OF DIGITAL MEDIA - Techniques for ensuring that media playback proceeds sequentially through media content of a digital media asset are disclosed. In one embodiment, distinct portions (e.g., segments) of a digital media asset can be separately encrypted such that on playback decoded data being output from at least one prior portion can be used to derive a cryptographic key that is used in decrypting a subsequent portion of the digital media asset. | 2015-10-29 |
20150310191 | SECURITY THROUGH LAYERS IN AN INTELLIGENT ELECTRONIC DEVICE - The present disclosure provides for improving security in a meter or an intelligent electronic device (IED) through the use of a security key which is unique to each meter or IED. Such a key may be used to prevent password reuse among multiple meters. Such a key may also be used to encrypt critical components of the software, such that only when running on the correct meter can the components of the software be decrypted. Such a key may also be used to uniquely identify the device in a larger data collection and management system. The security key can also be used to prevent the direct copying of meters. The present disclosure also provides for a meter or IED that stores functional software separately from core software. | 2015-10-29 |
20150310192 | METHOD FOR PROTECTING A COMPUTER PROGRAM PRODUCT, COMPUTER PROGRAM PRODUCT AND COMPUTER-READABLE STORAGE MEDIUM - A method for protecting a computer program product, the computer program product being configured for operation in an operating environment (e.g., a virtual operating environment), includes: detecting at least one operating parameter of the operating environment in which the computer program product is executed, the at least one operating parameter having been defined outside of the operating environment; comparing the detected at least one operating parameter to a comparison value stored for each operating parameter; and outputting a warning signal if a plurality of comparison results exceeds a predetermined threshold value, wherein the comparison results indicate an execution of the computer program product in a different operating environment. | 2015-10-29 |
20150310193 | CONTROL FLOW FLATTENING FOR CODE OBFUSCATION WHERE THE NEXT BLOCK CALCULATION NEEDS RUN-TIME INFORMATION - A method of obscuring software code including a plurality of basic blocks wherein the basic blocks have an associated identifier (ID), including: determining, by a processor, for a first basic block first predecessor basic blocks, wherein first predecessor basic blocks jump to the first basic block and the first basic block jumps to a next basic block based upon a next basic block ID; producing, by the processor, a mask value based upon the IDs of first predecessor basic blocks, wherein the mask value identifies common bits of the IDs of the first predecessor basic blocks; and inserting, by the processor, an instruction in the first basic block to determine a next basic block ID based upon the mask value and an ID of one of the first predecessor basic blocks. | 2015-10-29 |
20150310194 | Authentication Using Device ID - A system for authenticating a customer is disclosed. The customer may attempt to access protected resources located at an authentication server. The customer may log in to the authentication server's website, thereby submitting an authentication request. The authentication request may comprise attributes of the device the customer uses to log in. The authentication server may generate a device ID using the received device attributes and generate an authentication token that is signed with the device ID. The authentication server may transmit the authentication token to the client device. Subsequent requests to access protected resources from the client device may include the authentication token that is signed with the device ID. | 2015-10-29 |
20150310195 | CHARACTERIZING USER BEHAVIOR VIA INTELLIGENT IDENTITY ANALYTICS - Methods, devices, and systems are provided to rapidly detect and prevent cyber-attacks that are enabled by either misuse of identity credentials or weaknesses within the identity credential lifecycle. An Identity Analytics and Intelligence Engine provides an automated process for the collection, exchange, analysis, correlation, and reporting of identity credential lifecycle data. The Identity Analytics and Intelligence Engine may be implemented as a Software as a Service (SaaS) capability. The Identity Analytics and Intelligence Engine applies Semantic Web concepts/technologies and graph databases to automatically capture the identity credential lifecycle data along with the associated data exchanges within one or more Trust Frameworks. | 2015-10-29 |
20150310196 | DEVICE, METHOD, AND SYSTEM OF DETECTING REMOTE ACCESS USERS AND DIFFERENTIATING AMONG USERS - Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, detecting a possible cyber-attacker, detecting a remote access user, and detecting an automated script or malware. The methods include monitoring of user-side input-unit interactions, in general and in response to an interference introduced to user-interface elements. The monitored interactions are used for detecting an attacker that utilizes a remote access channel; for detecting a malicious automatic script, as well as malicious code injection; to identify a particular hardware assembly; to perform user segmentation or user characterization; to enable a visual login process with implicit two-factor authentication; to enable stochastic cryptography; and to detect that multiple users are utilizing the same subscription account. | 2015-10-29 |
20150310197 | METHOD OF PROCESSING INPUT AND ELECTRONIC DEVICE THEREOF - A method of operating an electronic device is provided. The method includes detecting a knock on a predetermined area of the electronic device, analyzing a pattern of the detected knock, and performing a function associated with the analyzed pattern. | 2015-10-29 |
20150310198 | Methods of Creating a Corpus of Spoken CAPTCHA Challenges - Methods of creating a corpus of spoken CAPTCHA challenges are disclosed. The methods involve training a computing system with samples of human voices and computer synthesized voices articulating a set of reference challenge items, scoring the reference challenge items based on differences in articulation between human and machine articulation of each challenge item, and selecting suitable challenge items from among the reference challenge items based on the score. | 2015-10-29 |
20150310199 | SECURE DATA ENTRY - A first computing device is configured to receive a request for validation, to generate, based on the request, a virtual data entry mechanism that includes randomly arranged data entry elements, and to provide the virtual data entry mechanism to a second computing device. | 2015-10-29 |
20150310200 | ANTI-SNOOPING PASSWORD INPUT METHOD AND APPARATUS - An anti-snooping password input method and apparatus. The method includes a mobile terminal determining password elements in a password to be inputted and generating a password pattern using the password elements, the password pattern including all the password elements in the password to be inputted; the mobile terminal displaying the password pattern in a password selection interface; the mobile terminal receiving an instruction that a user slides the password elements in the password pattern sequentially in the password selection interface, and determining a password currently inputted by the user using the instruction; and the mobile terminal verifying whether the password currently inputted by the user corresponds to the password to be inputted. | 2015-10-29 |
20150310201 | USER AUTHENTICATION SYSTEM - A user authentication system | 2015-10-29 |
20150310202 | MOBILE APPLICATION, IDENTITY INTERFACE - Techniques for managing identities are provided. In some examples, identity management, authentication, authorization, and token exchange frameworks may be provided for use with mobile devices, mobile applications, cloud applications, and/or other web-based applications. For example a mobile client may request to perform one or more identity management operations associated with an account of a service provider. Based at least in part on the requested operation and/or the particular service provider, an application programming interface (API) may be utilized to generate and/or perform one or more instructions and/or method calls for managing identity information of the service provider. | 2015-10-29 |
20150310203 | Nonvolatile Memory Device Having Authentication, and Methods of Operation and Manufacture Thereof - A memory device package encloses two separate die, one being a standard nonvolatile memory integrated circuit (“IC”) die, and the other being any suitable authentication IC die. Either die may be stacked upon the other, or the die may be placed side-by-side. The external contacts may correspond to the power and signal requirements of the standard nonvolatile memory IC die so that the pin-out of the memory device package may present a standard pinout. The power and signal requirements of the authentication IC die may be satisfied with some or all of the pins for the nonvolatile memory integrated circuit die, or with other unused pins of the device package. One or more additional external contacts may be added exclusively for the authentication integrated circuit die. One or more signals may be dedicated as between the standard nonvolatile memory IC die and the authentication IC die. | 2015-10-29 |
20150310204 | Evaluating Customer Security Preferences - Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a security dashboard computing platform, a request for a security score associated with a customer. In response to receiving the request for the security score associated with the customer, the computer system may request, from a customer portal computing platform, one or more security preferences associated with the customer. Subsequently, the computer system may receive, from the customer portal computing platform, the one or more security preferences associated with the customer. The computer system then may determine, based on at least one security score definition file and based on the one or more security preferences associated with the customer, a security score for the customer. Thereafter, the computer system may provide, to the security dashboard computing platform, the determined security score for the customer. | 2015-10-29 |
20150310205 | Evaluating Customer Security Preferences - Methods and systems for evaluating customer security preferences are presented. In some embodiments, a computer system may receive, from a customer portal computing platform, a request for a security dashboard user interface for a customer. In response to receiving the request for the security dashboard user interface, the computer system may request, from a security score computing platform, a security score for the customer. Subsequently, the computer system may receive, from the security score computing platform, the security score for the customer. The computer system then may generate, based on the security score for the customer, the security dashboard user interface for the customer. Thereafter, the computer system may provide, to the customer portal computing platform, the generated security dashboard user interface for the customer. | 2015-10-29 |
20150310206 | PASSWORD MANAGEMENT - A method of generating a password. An embodiment includes: receiving a first user input defining a seed for the password, receiving a second user input defining a destination for the password, operating a coding function to generate the password from the first user input and the second user input, and outputting the password generated by the coding function. | 2015-10-29 |
20150310207 | METHOD FOR ANALYSING PROGRAM CODE OF ELECTRONIC DEVICE AND ELECTRONIC DEVICE - A method of analyzing a program code of an electronic device includes configuring a tree by using a key string included in the program code and; in response to a command to find a specific key being received, performing a predetermined order traversal of the tree by using a string included in the specific key; in response to a node which matches a last string included in the specific key having a leaf node as a result of the predetermined order traversal, returning a value of the leaf node; and analyzing the program code by using the return value. | 2015-10-29 |
20150310208 | CONTROLLING DISTRIBUTION AND USE OF A DEVELOPER APPLICATION IN A NETWORK ENVIRONMENT - A method is disclosed for controlling distribution and use of a developer application in a network environment. A portal is provided for a developer to submit the developer application for use in the network environment. The developer application is operated for network devices that request use of the developer application. The developer application is operated to generate an output for individual network devices that request use of the developer application. The developer application is prevented from being operated on any of the individual network devices to access a service that is not part of a predetermined set of specified services that are allowed for that developer application. | 2015-10-29 |
20150310209 | EXECUTING THIRD-PARTY APPLICATION - After a data request sent by a third-party developer is received, metadata description information of requested data is sent to the third-party developer for the third-party developer to develop a third-party application based on the metadata description information. Program information of the third-party application submitted by the third-party developer is received and the third-party application is deployed in a data container environment. The data container environment stores specific data needed during the execution of the third-party application. The third-party application is executed in the data container environment. The present disclosure solves a conflict between data security risk and opening of high value data. | 2015-10-29 |
20150310210 | SECURING AND MANAGING APPS ON A DEVICE USING POLICY GATES - A method of securing an app for execution on a device using an app security program with policy gates is described. First, Java class files are generated for the app security program, where the generating is dictated by a plurality of app security policies located in a plurality of policy gates. The plurality of policy gates are managed by a policy gate manager. Next, Java class files are replaced for the app with the Java class files for the app security program. Third, a security-wrapped app is created upon completion of replacing the Java class files for the app. Further, the security-wrapped app is prepared for execution on the device. Last, the security-wrapped app is re-signed with a new key. | 2015-10-29 |
20150310211 | METHOD, APPARATUS AND SYSTEM FOR DETECTING MALICIOUS PROCESS BEHAVIOR - A method, apparatus and system for detecting a malicious process behavior. A detection apparatus monitors a process to obtain behavior information about a target process behavior, and then sends the behavior information to a server, which determines whether the target process behavior is a malicious process behavior. The detection apparatus can receive first operation indication information returned by the server according to a detection result of the target process behavior, and perform an operation on the target process behavior according to the first operation indication information. The target process behavior is subjected to a comprehensive detection by the server according to the behavior information, rather than depending on a specified feature analysis of a single sample of the target process behavior by the detection apparatus, so that malicious process behavior can be detected in time, thereby improving the security performance of the system. | 2015-10-29 |
20150310212 | Detecting Script-Based Malware using Emulation and Heuristics - The subject disclosure is directed towards running script through a malware detection system including an emulator environment to detect any malware within the script. Statistics are collected as part of processing the script, with parameterized heuristic analysis used to determine whether to run the emulation. The processing through the malware detection system may be iterative, to de-obfuscate layers of obfuscated malware. The emulator may be updated via signatures. | 2015-10-29 |
20150310213 | ADJUSTMENT OF PROTECTION BASED ON PREDICTION AND WARNING OF MALWARE-PRONE ACTIVITY - Disclosed herein is a system and method for a system and method for determining whether the protection level of a protection system is appropriate for the way the user of a computing system is using the device. The protection system monitors the user's activity while they are using the various applications on the device. The protection system identifies an activity record that is the most similar to the user's activity and compares the current protection level with the associated record's protection level. The protection system may change the protection level when the user's protection level and the associated record's protection level are different. | 2015-10-29 |
20150310214 | ENABLING AN EXTERNAL OPERATING SYSTEM TO ACCESS ENCRYPTED DATA UNITS OF A DATA STORAGE SYSTEM - The present invention is notably directed to a method for allowing an operating system, or OS, to access an encrypted data storage system of a computer ( | 2015-10-29 |
20150310215 | DISCOVERY AND CLASSIFICATION OF ENTERPRISE ASSETS VIA HOST CHARACTERISTICS - Techniques are presented herein for classifying a variety of enterprise computing resources based on asset characteristics. In particular, a computing asset, e.g., a server, may be classified based on any digital certificates provisioned on that server. That is, the properties of a digital certificate may be used to determine a measure of business value or importance of a server (or data hosted on that server). Once classified, a monitoring system may use the assigned classifications to prioritize security incidents for review. | 2015-10-29 |
20150310216 | Computer Health Index Display Apparatus and Method - The disclosure discloses an apparatus for displaying a computer health index comprising: a health index calculator configured to calculate one or more health sub-indices, and calculate a computer health index based on the one or more health sub-indices, wherein each health sub-index is associated with one of one or more computer states, and reflects the health degree of the associated computer state; and a simple index display configured to receive the computer health index from the health index calculator, and displaying a small icon reflecting a value of said computer health index. | 2015-10-29 |
20150310217 | THREAT AND DEFENSE EVASION MODELING SYSTEM AND METHOD - A system and method for modeling viable threats and for evading deployed defenses on a network are described. As a defensive tool used for threat modeling, the system and method allows those responsible for the safety of their critical infrastructure and intellectual property to have a clear view of all failures in the security countermeasure products they have deployed. As an offensive tool used for defense evasion modeling, the system and method can be used to quickly ascertain a viable attack vector, select exploitation code, and cross-reference those exploits that will bypass every layer of countermeasure technologies to commercially- and publicly-accessible crimeware and security testing tools. | 2015-10-29 |
20150310218 | SYSTEMS AND METHODS FOR SECURE DISTRIBUTION OF CODES - Systems and methods for secure distribution of codes involve providing messages to end-users that include links. When one of the messages is accessed by an end-user, one of the links is accessed and a code is rendered in the message based on the accessed link. The end-user can then redeem the code for something of value. | 2015-10-29 |
20150310219 | SYSTEMS AND METHODS FOR SECURITY HARDENING OF DATA IN TRANSIT AND AT REST VIA SEGMENTATION, SHUFFLING AND MULTI-KEY ENCRYPTION - Systems and methods for security hardening of a file in transit and at rest via segmentation, shuffling and multi-key encryption are presented. The method including segmenting at a first computer system a file into a plurality of file segments, and encrypting the plurality of file segments using a plurality of encryption keys in order to generate a corresponding plurality of encrypted file segments, wherein each file segment of the plurality of file segments is encrypted using a respective encryption key of the plurality of encryption keys. Additionally included is bidirectional data transformation of a file by obfuscating at a first computer system digital values of the file in order to generate corresponding obfuscated digital values of the file, wherein the obfuscated digital values of the file retain their contextual integrity and referential integrity | 2015-10-29 |
20150310220 | CLIPBOARD MANAGEMENT - Embodiments provide methods, devices and computer program arranged to control access to clipboards by applications. In one embodiment a user device comprises: at least one processor; and at least one memory comprising computer program code and an application that has been provisioned by an application provisioning entity, the application having access to a first clipboard of a first type, to which data can be transferred and/or from which data can be retrieved by a further, different, application on the user device, wherein the application is configured with an encryption key for the transfer of data to and/or retrieval of data from a second clipboard of a second, type, clipboard, the encryption key being associated with the application provisioning entity. The user device can control the transfer of data to and/or retrieval of data from the second clipboard by the application via the encryption key. | 2015-10-29 |
20150310221 | METHOD AND APPARATUS TO ROTATE DATA ENCRYPTION KEYS IN DATABASES WITH NO DOWN TIME - A database includes a first instance and a second instance. The first and second instances of the database are encrypted with a first encryption key and have content that is synchronized. Database queries from a user computing device are directed to the first instance of the database. A third instance of the database is created from one of the existing two instances of the database. The third instance is decrypted from the first encryption key and is encrypted with a second encryption key. Database queries from the user computing device are redirected from the first instance of the database to the third instance of the database without interrupting service to the user computing device. The process is repeated by creating additional instances of the database, encrypting the additional instances with new encryption keys, and by redirecting database queries to the additional instances of the database. | 2015-10-29 |
20150310222 | SYSTEM AND METHOD FOR PREVENTING ACCESS TO DATA ON A COMPROMISED REMOTE DEVICE - This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified. | 2015-10-29 |
20150310223 | Systems, Methods, and Computer Program Products for Interfacing Multiple Service Provider Trusted Service Managers and Secure Elements - System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM) and one of a plurality of secure elements (SE). A first request including a mobile subscription identifier (MSI) is received from an SP TSM over a communications network. At least one memory is queried for SE data including an SE identifier corresponding to the MSI. The SE data is transmitted to the SP TSM over the communications network. A second request based on the SE data is received from the SP TSM over the communications network. A third request, based on the second request, is transmitted, over a mobile network, to an SE corresponding to the SE data. The mobile network is selected from multiple mobile networks, and is determined based on the SE data queried from the memory. | 2015-10-29 |
20150310224 | ABSTRACTIONS AND AUTOMATION FOR ENHANCED SHARING AND COLLABORATION - The present invention provides methods for using abstractions of people, including dynamic and static groups of people, to enhance the efficiency of the specification and automation of policies for sharing information between users with a “need-to-know.” An instance of the present invention can also provide these users information based on a “time-to-know.” By providing access to information based on group affiliation and properties of the content of the information, the present invention maintains optimal information privacy while minimizing encumbrances to sharing data with appropriate users and even at appropriate times. The present invention can be integrated with other communication technologies to facilitate access to information in a time appropriate manner. Other instances of the present invention employ automated and semi-automated, mixed-initiative techniques, to make information-sharing decisions. Additional instances of the present invention include the employment of machine-learning techniques to facilitate construction of access policies from the actions or profile of a single user or a community of users, including the construction of automated sharing agents that work in an automated or mixed-initiative manner to respond to real-time requests for information. | 2015-10-29 |
20150310225 | PRIVACY VERIFICATION TOOL - Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool. The verification tool uses the expressed privacy policies along with language-level assumptions and assertions in the verification process. For example, high-level models of the privacy policies can be reduced to a simpler verification representation (e.g., a Boolean representation) based on a set of assertions. This verification representation can then be submitted to a constraint solver (e.g., Satisfiability Modulo Theories solver) for verification. | 2015-10-29 |
20150310226 | Methods, Systems, and Products for Anonymous Loan Documents - Methods, systems, and products create anonymous loan documents. Electronic loan documents are prepared for a borrower of a loan. An anonymous shadow copy of the electronic loan documents is generated that removes personally identifying information, such as names, addresses, and social security numbers. The anonymous shadow copy of the electronic loan documents may then be electronically published. | 2015-10-29 |
20150310227 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - Disclosed are an information processing system and an information processing method which enable coordination of information pertaining to a user while taking security into consideration. The information processing system includes a cookie issuance unit | 2015-10-29 |
20150310228 | SECURED MOBILE GENOME BROWSING DEVICES AND METHODS THEREFOR - A secured mobile genome browsing device is disclosed. The device can store genome data in a webapp format within an isolated, secured container in memory. The device further comprises a genome browser module that identifies relevant genome data and renders the relevant genome data, including drug interacting information, on a display of the device according to genome browsing constraints. | 2015-10-29 |
20150310229 | SYSTEM ON CHIP - A system on chip having two or more responder units and two or more protection units is provided. Each of the responder units comprises a set of responder elements. Each of the protection units is associated with and protects one of the responder units and is arranged to provide a group mapping. The group mapping assigns one or more group identifiers to each of the responder elements of the respective responder unit. | 2015-10-29 |
20150310230 | CRYPTOGRAPHIC PROCESSING APPARATUS, CRYPTOGRAPHIC PROCESSING SYSTEM, AND CRYPTOGRAPHIC PROCESSING METHOD - A process mode of either of an encryption process and a decryption process is set for at least one of a plurality of pieces of key data, in association with the key data. Then, a mode specifying command for specifying a process mode in association with key data is received from another apparatus, and if the received process mode and the process mode associated with the key data coincide with each other, the process in the process mode using the key data is permitted. | 2015-10-29 |