Entries |
Document | Title | Date |
20080208751 | Method, Apparatus and System for Providing Added Value Content to Feature Content End Users - A system, method and apparatus are provided for offering or providing added value content associated with feature content to feature content end users. The system includes a receiver that has a processor or controller for reading end user or feature content, such as a film or programming event. The feature content is broadcast or downloaded as an encoded video stream from a suitable source, such as a video server. Metadata associated with the feature content includes information about available added value content that is associated with the feature content. The method includes providing, based on reading the associated metadata, the ability for the end user to obtain added value content associated with the feature content that has been selected and/or obtained by the end user. The added value content can be obtained by the end user and packaged with the feature content and recorded on a suitable recording medium. | 08-28-2008 |
20080208752 | Content communication and purchase using a computer-based media component - Content communication and purchases using a computer-based media component are described. A tuner component can individually interact with client components, where each communication of content may be varied or configured independent of interactions with other client components. Additionally, content can be purchased using the computer-based media component, where the purchase and/or presentation of the content may utilize the computer-based media component and/or coupled client components. | 08-28-2008 |
20080208753 | METHOD AND SYSTEM FOR PROVIDING INFORMATION ON PRE-PURCHASE AND POST-PURCHASE ITEMS USING RFID AND COMPUTER-READABLE STORAGE MEDIA STORING PROGRAMS FOR EXECUTING THE METHOD - Pre-purchase and post-purchase item information provision methods and systems using an RFID technology and computer readable storage media storing programs for executing the methods are provided. A pre-purchase item information provision method for a radio frequency identification system according to the present invention includes transmitting, if a mobile reader is detected by a local server installed in a salesroom, a certificate containing information on a location of an object information service server and an authentication value to the mobile reader; transmitting, at the mobile reader, a query requesting an item ID to a tag attached to a target item; transmitting, at the tag, a item ID information generated by encrypting the item ID using the authentication value to the mobile reader; transmitting, at the mobile reader, the item ID information and the authentication value to the object information service server; and transmitting, at the object information service server, data retrieved in a database in correspondence to the item ID, the data being retrieved when the authentication value exists in the database. The item information provision method and system of the present invention can guarantee reliability of information on an item in the pre-purchase state and prevent the information from being eavesdropped in both the pre-purchase and post-purchase states. Also, the item information provision method and system can prevent the tag ID from being tracked, thereby protecting purchaser's privacy, preventing the tag from being forged, and improving computation efficiency. | 08-28-2008 |
20080215490 | INTELLIGENT ASSISTANT FOR CONTENT PURCHASING - A method, apparatus, and electronic device for optimizing content acquisition are disclosed. A memory may store usage of a previous set of media content by the mobile device. An input/output device may receive a request for a current set of media content. A processor may create a user profile based on the usage and provides a first recommendation of a first digital rights agreement based on the user profile. | 09-04-2008 |
20080222040 | Disaggregation/reassembly method system for information rights management of secure documents - The present invention pertains to a computerized system and method that provides for the secure storage and retrieval of electronic digital healthcare information; and, more particularly, to such a computerized system and method that provides for multiple access levels of such secure information; provides for secure access to portions of secure information dependent upon access privileges of the authorized user; provides virtually limitless data expansion capabilities; and provides for rapid access to such secure information by authorized users. | 09-11-2008 |
20080222041 | Methods and Systems for Electronic Agency in Performance of Services - A computer implemented method for a principal to electronically establish and use an agent. The method comprising the steps of: the principal identifying a service requirement, the principal entering a communication medium to interact with a potential agent, the principal submitting an electronic request for service, the principal and the agent negotiating terms, establishing an electronic power of attorney between the principal and the agent, the agent performing the requested service; and the principal paying the agent. | 09-11-2008 |
20080235137 | Apparatus and method for the secure distribution of digital content to portable multimedia devices in an unsecured environment - The ability of retail stores to sell digital products through the secure distribution and delivery of digital video and/or audio content directly to a Portable Multimedia Device or a memory module that inserts into a portable media device. | 09-25-2008 |
20080243692 | CONTENT INGEST, MAINTENANCE, AND DELIVERY - A method may include receiving content in a server from a remote device; receiving a request to manufacture an optical medium including the content by a manufacture remote from the device; burning the optical medium including the content by the manufacturer; and receiving an identity of an intended recipient of the medium for delivering the optical medium. A method may include receiving first content in a first format and storing the first content in a server; receiving a request for the first content from a first user device; determining format information associated with the first user device; transcoding the first content for the first user device, wherein transcoding includes changing the first format of the first content based on the format information associated with the first user device; and transmitting the transcoded first content to the first user device. | 10-02-2008 |
20080243693 | TITLE-ACCEPTANCE AND PROCESSING ARCHITECTURE - Methods and apparatus are described for facilitating donation of a digital asset from a user to an entity. A mechanism is provided by which the user may designate the digital asset to be donated. The mechanism is configured to receive at least a representation of the digital asset. A type of the digital asset is identified with reference to the received representation of the digital asset. Further processing of the received representation of the digital asset is effected with reference to the type. At least the representation of the digital asset is stored in a repository associated with the entity. A notification is provided to the user that ownership of the digital asset has been transferred to the entity. | 10-02-2008 |
20080249942 | Modifying A Digital Media Product - Producing, by a digital media production hub from users' digital expressions of preferences, information describing a user community's preference for replacing the modifiable part of the digital media product with a replacement part; receiving, in the digital media production hub from a media product owner, the digital media product and a digital grant of rights to modify and distribute the digital media product; receiving, by the digital media production hub from a media parts provider, at least one replacement part, a digital grant of rights to use the replacement part to modify the digital media product, and a digital grant of rights to distribute the replacement part with the digital media product; and replacing, by the digital media production hub in accordance with the information describing the user community preference and the digital grants of rights, the modifiable part with the replacement part. | 10-09-2008 |
20080249943 | Modifying A Digital Media Product - Storing by a media parts provider a replacement part in a distributed media library, the library including a digital grant of rights to use the replacement part to modify a digital media product and a digital grant of rights to distribute the replacement part with the digital media product; producing, by a digital media production hub, information describing a user community preference for replacing the modifiable part of the product with the replacement part; receiving the digital media product and a digital grant of rights to modify and distribute the digital media product; retrieving the replacement part, the digital grant of rights to use the replacement part, and the digital grant of rights to distribute the replacement part with the digital media product; and replacing, in accordance with the information describing the user community preference and the digital grants of rights, the modifiable part with the replacement part. | 10-09-2008 |
20080249944 | System of offering digital broadcasting using pip of portable terminal, method thereof, and apparatus thereof - A system, method and apparatus for providing digital broadcasting using a PIP function of a portable terminal. The method includes: transmitting a request message based on additional broadcasting information; receiving an entitlement management message (EMM) corresponding to the request message; and decrypting the EMM, displaying pay-per-view broadcasts while displaying advertisements through the PIP screen, simultaneously. The system and apparatus are configured to perform the method. Therefore, users can view pay-digital broadcasts for free, as advertising is broadcasted through the PIP screen during the pay-digital broadcasts. The broadcasting service providers can apportion charges to one or more sponsors corresponding to advertisement view times recorded in a billing server. | 10-09-2008 |
20080262968 | SOFTWARE LICENSING CONTROL VIA MOBILE DEVICES - Methods and systems to control a license for a software application are disclosed. The methods and systems can include requesting a central licensing server for initial verification and authentication of at least one user of a software application and sending a identification application from the central licensing server to at least one of the first device or the second device. A license identifier can be generated in the first device or the second device and sent to the central licensing server. The central licensing server can respond by sending a license key generator program to generate a dynamic key. The dynamic key can be input in the second device to execute the software application. | 10-23-2008 |
20080270307 | Method and Apparatus for Enabling Digital Rights Management in File Transfers - Embodiments of the invention generally provide a method and apparatus for enabling digital rights management in file transfers. One embodiment of a method for transferring digital content from a first user to a second user, includes transferring ownership of an instance of the digital content to the second user, where the instance of the digital content resides on a first device belonging to the first user. Copies of the digital content are then deleted from one or more additional devices belonging to the first user (including at least one offline device). | 10-30-2008 |
20080270308 | Method and Apparatus for Providing a Secure Trick Play - A process may be utilized by a DVR. The process characterizes a set of content as a plurality of segments as the set of content is received. Each of the segments has a segment length according to a predetermined time interval. Further, the process encrypts each of the segments with a corresponding content encryption key to generate a plurality of encrypted segments. The corresponding content encryption key for each of the segments is generated by the DRM component. In addition, the process stores each of the encrypted segments for playback with trick play features in accordance with an expiration content rule having a time limit on the temporary playability of the set of content. | 10-30-2008 |
20080294560 | Method of storing content - A method comprising receiving at a user equipment encrypted content. The content is stored in said user equipment in an encrypted form. At least one key for decryption of said stored encrypted content is stored in the user equipment. | 11-27-2008 |
20080294561 | Media content deciphered when initiated for playback - Media content being deciphered when initiated for playback is described. In embodiment(s), encrypted media content can be received from a content distributor without deciphering the encryption that is applied by the content distributor. Optionally, the encrypted media content can also be recorded without deciphering the applied encryption. The encrypted media content can be initiated for viewing or playback from the recording, and at that time, the credentials to decipher the encrypted media content can be obtained, such as from the content distributor. The encrypted media content can then be decipher with the credentials such that the media content can be rendered for viewing. | 11-27-2008 |
20080306871 | System and method of managing digital rights - A method of managing digital rights is disclosed that includes recording media content at one or more servers supporting a multimedia content distribution service. The one or more servers are configured to transmit multimedia data to multiple customer premises equipment (CPE) devices. The method further includes determining recorded media content at the one or more servers that is associated with a content source and providing a graphical user interface (GUI) accessible to a content manager at the content source to manage digital rights. The GUI includes a list of the recorded media content and at least one selectable element associated with each item of the list accessible to select media content and to configure digital rights associated with the selected media content. | 12-11-2008 |
20080306872 | INFORMATION RECORD INFRASTRUCTURE, SYSTEM AND METHOD - A method for controlling access to a medical record of a patient hosted by at least one medical record repository, comprising a plurality of sub-records, each sub-record having an associated different patient-controlled access control criteria, comprising: receiving, by an intermediary, a request for a medical record from a requester, said request comprising a medical record identifier, a requester identifier, requester authentication information, and patient-provided access control authorization; automatically processing, by the intermediary, the request for the medical record to authenticate the requester and determine sufficiency of the patient-provided access control authorization to meet the patient-controlled access control criteria for each respective sub-record encompassed by the request; and selectively communicating, from the intermediary to the at least one medical record repository, an identification of each sub-record for which access control criteria are determined to be sufficient for access by the requestor. An electronic payment authorization associated with the request may be generated, for compensation of at least one of the intermediary and a medical record repository. | 12-11-2008 |
20090018962 | Method for activating application module - A method for activating an application module is applied to an application program installed in an electronic device, wherein the application program includes at least more than one application module. When activating one of the application modules, the electronic device must firstly receive an activation code corresponding to the application module from a server of a program provider via the Internet, and the activation code is encrypted by the server of the program provider based on an activation information (such as a user name) and a module code corresponding to the application module, both of which are transmitted from the electronic device. | 01-15-2009 |
20090037334 | ELECTRONIC MEDICAL RECORD SYSTEM, METHOD FOR STORING MEDICAL RECORD DATA IN THE MEDICAL RECORD SYSTEM, AND A PORTABLE ELECTRONIC DEVICE LOADING THE ELECTRONIC MEDICAL RECORD SYSTEM THEREIN - An electronic medical record system is disclosed. The disclosed electronic medical record system comprises a data input module for receiving medical record data; a certificate module for receiving the medical record data from the data input module and processing the medical record data; a medical record data module for receiving the medical record data from the certificate module and storing the medical record data therein; and a data output module for receiving the medical record data from the certificate module and outputting the medical record data. A method for storing the medical record data into the electronic medical record system and a portable electronic device loading the electronic medical record system are also disclosed. | 02-05-2009 |
20090043707 | SYSTEM OF PERFORMING A RETROSPECTIVE DRUG PROFILE REVIEW OF DE-IDENTIFIED PATIENTS - An apparatus and method for delivering targeted informational messages includes a computer system for creating a de-identified encrypted PID and de-identified patient transaction data in a retail store for transmission and storage. A subset of de-identified encrypted PIDs are associated with targeted informational messages by the system and transmitted to retail stores, where a targeted message is printed on behalf of the patient corresponding to the de-identified encrypted PID. | 02-12-2009 |
20090048978 | Systems and methods for secure transaction management and electronic rights protection - The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing arrangements that may establish secure, protected environments at each node. These techniques may be used to support an end-to-end electronic information distribution capability that may be used, for example, utilizing the “electronic highway.” | 02-19-2009 |
20090070266 | SYSTEM AND METHOD FOR PHYSIOLOGICAL DATA AUTHENTICATION AND BUNDLING WITH DELAYED BINDING OF INDIVIDUAL IDENTIFICATION - A system and method for physiological data authentication and bundling with delayed binding of individual identification. In embodiments, the invention utilizes biometric data within a physiological data stream to allow for the late or delayed binding of the individual's identity to that data stream. In addition, the source of one or more additional data streams may be identified by cryptographically binding them to an original data stream. Other embodiments are described and claimed. | 03-12-2009 |
20090094159 | STOCK VIDEO PURCHASE - A computer enabled method of assembling at least one section of a media object to form an assembled media object is provided. The method includes receiving a segment description that identifies a portion of the media object, generating an assembled media object that includes the portion, providing the assembled media object for subsequent viewing, wherein the segment description is associated with the assembled media object. The media object may include video, audio, a graphical image, vector graphics animation, an online application, or an applet. The assembled media object may be associated with a content user, and the method may further include associating the segment description with a content owner, where the content owner holds rights to the at least one portion, and transferring consideration between the content owner and the content user, where the amount of consideration is based upon a price associated with the at least one portion. | 04-09-2009 |
20090094160 | Portable digital content device and methods for use therewith - A portable digital content device and methods for use therewith are disclosed. In one embodiment, a portable digital content device and method are disclosed for tracking usage activity to support digital asset management in a mobile environment. In another embodiment, an offline/disconnected advertisement inventory management and advertisement decision system and method are disclosed. While these systems and methods can be used with any suitable portable digital content device, an exemplary portable digital content device is disclosed, which can be used for purposes in addition to or instead of implementing the usage activity tracking and advertisement decision system functions. Any of the embodiments described herein can be used alone or in combination. | 04-09-2009 |
20090106155 | System and Method for Archival of Electronic and Tangible Records - Systems and methods for record management are provided. The record management system may be used to track the location and ultimate disposition of tangible records and electronic record. | 04-23-2009 |
20090112769 | SYSTEMS AND METHODS FOR REMOTE PATIENT MONITORING - A method according to one aspect of the present invention includes receiving patient information, analyzing the patient information to identify a condition for the patient, and formatting a report based on the patient information and the patient condition. Embodiments of the present invention may be used to monitor any appropriate medical device from essentially any location from which a communications signal can be sent and received. This enables patients to enjoy an active lifestyle by not being tied to medical device monitoring equipment that is difficult or impossible to transport or having to routinely visit health care facilities. The present invention can be used to monitor, process, and transport any amount and type of data from any medical device to any suitable user, such as a healthcare provider. | 04-30-2009 |
20090112770 | METHOD FOR GENERATING A CONTEXT OF MEDICAL DATA FOR MEDICAL TREATMENT - A method for making accessible to a peer from a plurality of peers in a network items of medical data owned by an agent, the method comprising interfacing with a context of medical data, the context of medical data having at least one reference to contextual items of medical data, the contextual items of medical data comprising the items of medical data to be made accessible. | 04-30-2009 |
20090132421 | Secured Disc - A secured disc. | 05-21-2009 |
20090138402 | PRESENTING PROTECTED CONTENT IN A VIRTUAL WORLD - Embodiments of the present invention provide a method, system and computer program product for protecting content in a virtual world. In an embodiment of the invention, a method for securing confidential data in a virtual world can include generating a virtual world for different participants over a computer communications network and placing avatars for a selected set of the participants in a bounded view of the virtual world for viewing by others of the selected set of participants in the bounded view. The method further can include selecting an inanimate object containing private data in the bounded view of the virtual world. Finally, for each participant in the selected set, the method can include determining access rights for viewing the private data and displaying the private data in connection with a display of the inanimate object in the bounded view only if permitted by the access rights and otherwise obscuring the private data in connection with a display of the inanimate object in the bounded view. | 05-28-2009 |
20090150291 | Customer Support Using Virtual Machines - A customer support system includes at least one subsystem to communicate with a customer about a problem with a customer information handling system (IHS), wherein the customer IHS includes a plurality of first customer IHS data. The plurality of first customer IHS data is received from the customer and used to create a virtual IHS having substantially the same characteristics as the customer IHS. A problem with the customer IHS is then diagnosed using the virtual IHS. | 06-11-2009 |
20090192941 | DIGITAL MARKETPLACE FOR HEALTHCARE DATA - A system for facilitating commercial exchange of packages of electronic health records, including practice nodes in communication with one another via a peer to peer network, each practice node having a plurality of electronic medical records including medical data and patient identification data, a digital marketplace server including software for receiving a query for medical data from a user and identifying practice nodes having the medical data responsive to the query, software executing on the practice nodes for generating summaries of the medical data responsive to the query, blinding the summaries and transferring the blinded summaries to the digital marketplace server, software executing on the server for displaying the blinded summaries and receiving an order for the medical data described in the blinded summaries, and software executing on the practice nodes for blinding electronic medical records containing the ordered medical data and transferring the blinded medical data to the user. | 07-30-2009 |
20090204543 | SYSTEM AND METHOD OF SELECTIVELY DISTRIBUTING MEDIA CONTENT TO A CONSUMER AND PREVENTING THE UNAUTHORIZED SHARING OF MEDIA CONTENT - The present invention is a system and method of selectively distributing media content to consumers, the system comprising essentially of a USB-type storage device loaded with media content, a network and a user interface system. The method comprises essentially of providing a USB-type storage device loaded with media content, distributing the device to retail outlets, instructing a user to contact a network that is in electronic communication with the USB-type storage device, selectively registering the media content on the network, activating the USB-type storage device, displaying the activated media content to the consumer on a display device associated with the user interface system, and providing a means to upload media content onto the USB-type storage device in the event the media content becomes corrupted or erased. | 08-13-2009 |
20090254481 | METHOD AND APPARATUS FOR PROVIDING PERSONALIZED SERVICE IN BROADCASTING SYSTEM AND SYSTEM THEREOF - A method and apparatus for providing a personalized service in a broadcasting system, and a system thereof. A BCAST Subscription Management (BSM) sends a service creation request message to a BCAST Service Distribution/Adaptation (BSDA), the service creation request message including at least one purchase data fragment to which maximum allowed content and maximum allowed service elements are added. The BSDA creates a service guide using the purchase data fragments, and delivers it to a terminal. The terminal checks a service type in the service guide, sends a subscription request for the personalized service to the BSM, receives an encryption key associated with the personalized service, and receives the personalized service with the encryption key. | 10-08-2009 |
20090265277 | Universal content catalog - A content catalog suitable for electronic distribution of digital media to interactive media services devices such as cellular phones, digital cameras, television, and printers over the internet. The content catalog includes digital media sourced from online catalog and different content providers. The content catalog also includes metadata associated with the digital media, as well as commercial agreements such as revenue sharing, and payment contracts associated with the distribution of the digital media. The digital media in the content catalog are validated and stored in an electronic database. | 10-22-2009 |
20090271317 | METHOD AND APPARATUS FOR A CRYPTOGRAPHICALLY ASSISTED COMMERCIAL NETWORK SYSTEM DESIGNED TO FACILITATE BUYER-DRIVEN CONDITIONAL PURCHASE OFFERS - The present invention is a method and apparatus for effectuating bilateral buyer-driven commerce. The present invention allows prospective buyers of goods and services to communicate a binding purchase offer globally to potential sellers, for sellers conveniently to search for relevant buyer purchase offers, and for sellers potentially to bind a buyer to a contract based on the buyer's purchase offer. In a preferred embodiment, the apparatus of the present invention includes a controller which receives binding purchase offers from prospective buyers. The controller makes purchase offers available globally to potential sellers. Potential sellers then have the option to accept a purchase offer and thus bind the corresponding buyer to a contract. The method and apparatus of the present invention have applications on the Internet as well as conventional communications systems such as voice telephony. | 10-29-2009 |
20090292640 | Method and system for synchronizing an online application and a portable device - There is provided a method of synchronizing a portable device with an online user account. The method comprises establishing a first connection between the portable device and an online application, receiving data from the online application concerning the online user account, including a persona, updating the portable device with a portable user account corresponding to the online user account, including the persona, terminating the first connection between the portable device and the online application, recording modifications to the portable user account on the portable device after terminating the first connection, establishing a second connection between the portable device and the online application, uploading the modifications to the portable user account recorded on the portable device to the online application, and updating the portable user account according to modifications to the online user account performed by the online application to synchronize the portable user account with the online user account. | 11-26-2009 |
20090307137 | MANAGING PROVENANCE OF DIGITALLY SIGNED DATA IN USER EDITABLE RECORDS - A system and method for managing health information. The system may include a server configured to execute an account interface module enabling a user to access a user account, wherein a plurality of healthcare record items are stored on a server, via a user client device. The server may also be configured to execute an upload module that is configured to receive a digitally signed, original version of a healthcare record item from a content supplier, and an editor module configured to enable a user to make a user edit, thereby producing an updated version of the healthcare record item. The server may also be configured to execute a provenance module to determine whether the user edit affects the digitally signed data, and accordingly remove or replace the digital signature, and a download module to download the updated version of the healthcare record item to a content recipient. | 12-10-2009 |
20090307138 | Innovation Marketplace Systems - This invention relates to a ready system for providing secure innovation-maturation marketplace systems that increase innovation-maturation efficiencies while safely exposing innovative concepts to expert-ranking information, and while providing expert-innovation rankers with opportunities to enhance and monetize their innovation ranking-credentials. | 12-10-2009 |
20090313171 | ELECTRONIC TRANSACTION VERIFICATION - Product registration of an electronic good (e.g., software) over the telephone is made easier by reducing the length of code that is communicated to the electronic good provider (e.g., software provider). More particularly, an electronic goods provider provides a product ID comprising a message and digital signature to a client purchasing their electronic good. The electronic good is registered over a telephone by providing only the digital signature portion of a product ID to a telephone registration server having the electronic good provider's private key. The telephone registration server computes a message from the digital signature and private key. If the message has an expected structure (e.g., zeros in certain places) the software is authentic. Therefore, the verification method ensures software authenticity using only a portion of the product ID and thereby reducing the amount of information that needs to be transferred over the telephone to perform the registration process. | 12-17-2009 |
20100023456 | SYSTEM AND METHOD OF PLANNING A FUNERAL - An apparatus, computer-implemented method and program product to arrange and fund a funeral or other memorial service. A program receives user input requesting information associated with funeral products, services and homes. The program associates the user input with a budgetary, profile, home locator, or step-based parameter. Each parameter logically links to an information field stored within the database. A central web server retrieves information associated with the parameter for inclusion within a funeral plan. | 01-28-2010 |
20100063930 | System for Secure Mobile Healthcare Selection - A method, system and device for secure mobile healthcare selection are presented in which a user can, from a mobile device, authorize the comparison of pangenetic (genetic and epigenetic) data with data profiles corresponding to healthcare products, services and service providers to determine which are the most appropriate for a particular consumer. Data masking is used to maintain privacy of sensitive portions of the pangenetic data. | 03-11-2010 |
20100063931 | METHOD OF CONSTRUCTING AND HANDLING REQUESTS FOR DATA FILES - A method of constructing and handling a request for a desired data file relating to a broadcast segment of a broadcast signal is described. The method comprises receiving an information signal at a receiving device. The information signal comprises at least a data element, and the data element relates to a segment of the broadcast signal. The method also comprises presenting the data element to a user interface of the receiving device, obtaining a user selection of the data element from the user interface, and constructing and transmitting a request for the desired data file relating to the selected data element, the request including an identifier relating to the desired data file. | 03-11-2010 |
20100070417 | NETWORK REGISTRATION FOR CONTENT TRANSACTIONS - System(s) and method(s) are provided for registration of non-mobile devices with a mobile network platform for secure content transactions among the mobile network platform and registered non-mobile devices, and mobile and registered non-mobile devices. Through various secure protocols, a registration component within the mobile network platform records non-mobile devices provisioned through a non-mobile network platform. Recordation includes validation of devices associated with the non-mobile devices and retention of devices records. Content transaction(s), e.g., content delivery and exchange, are conducted securely, and abide by license terms for content dissemination. Content transaction(s) can be billed based at least in part on license terms, or subscriber intelligence. Transacted content can be received and formatted by a master non-mobile within a network of provisioned non-mobile devices. The master non-mobile device securely delivers transacted contents to slave non-mobile devices and to the mobile network platform. Advertisement(s) also can be transacted. | 03-18-2010 |
20100100485 | System for the safe, private transmission of motor vehicle records - The present invention is a method which can be used to select an insurer, such as for a motor vehicle operator. The method comprises the use of an agent interface and an MVR bridge for receiving motor vehicle record data from multiple sources and calculating insurance rates while minimizing the potential for compromising the privacy of the motor vehicle operator. | 04-22-2010 |
20100125523 | METHOD AND A SYSTEM FOR CERTIFYING A DOCUMENT FOR ADVERTISEMENT APPROPRIATENESS - A method for selecting advertisement spots. The method comprises certifying a digital document having a placeholder for at least one advertisement, identifying at least one characteristic indicative of appropriateness of the digital document, assigning an appropriateness score to the digital document according to the at least one characteristic and associating a digital certificate indicative of the appropriateness score with the digital document, wherein the digital certificate is used for associating an advertisement with the placeholder. | 05-20-2010 |
20100169219 | PLUGGABLE HEALTH-RELATED DATA USER EXPERIENCE - A pluggable user experience (UX) system that enables users to access third party wellness applications and services that leverage centralized healthcare data is provided. The UX can be accessed by way of an employer's intranet, Internet or other suitable network. The system is capable of verifying user identity as well as authorization to third party wellness applications. These wellness applications can be used to leverage centralized healthcare data in accordance with permissions granted by the owner of the healthcare data/records. | 07-01-2010 |
20100169220 | WEARING HEALTH ON YOUR SLEEVE - The claimed subject matter provides systems and/or methods that effectuate accurate communication of health data. The system can include mechanisms that initiate data interchange with a records manager that controls personal health records, and that selectively causes a physicians portal to acquire and display the personal but circumscribed health records associated with the user of the system. | 07-01-2010 |
20100198731 | METHOD AND SYSTEM FOR PROVIDING A PAYMENT INCENTIVE FOR DISTRIBUTING DIGITAL FILES OVER A NETWORK - A method and system for providing a payment incentive for distributing digital files over a network are provided. The method and system allow a publisher, distributor(s), and/or users to receive a payment incentive for downloading digital files on the Internet. The present disclosure creates a method and system where every party along the distribution chain will have an incentive for further distribution of the digital content file. The method includes the steps receiving by a server of a file agent at least one digital content file from a content provider; presenting the at least one digital content file for purchase; downloading the at least one digital content file to at least one user for a transaction amount; distributing a first distribution amount of the transaction amount to the content provider; and distributing a second distribution amount of the transaction amount to the at least one user. | 08-05-2010 |
20100262545 | SYSTEMS AND METHODS FOR CONSTRUCTING A LOCAL ELECTRONIC MEDICAL RECORD DATA STORE USING A REMOTE PERSONAL HEALTH RECORD SERVER - Certain embodiments of the present invention provide systems and methods for managing medical information. Certain embodiments provide a local electronic medical record system including a local personal health record (PHR) client, the PHR client downloading encrypted patient documents from a remote PHR server and parsing the downloaded encrypted patient documents to form a local PHR database. The example system also includes an interface receiving user input including an encryption key to decrypt the downloaded encrypted patient documents and displaying patient medical information to the user based on the downloaded decrypted patient documents. | 10-14-2010 |
20100274724 | Encrypted E-Commerce Product - A system for conducting a financial transaction in e-commerce on the internet includes objects prepared by a seller and a buyer. The seller's object includes a clear text header file (advertisement), an encrypted overhead file which contains verification data pertaining to the financial transaction, and an encrypted content file containing the subject matter for sale by the seller. With a purchase solicitation from the buyer, an overhead key can be used by a transaction agency to ensure there is a compliance between the purchase solicitation and the verification data of the overhead (from seller's object). Next a revelation key is provided to give the buyer access to the content when such compliance has been ensured. | 10-28-2010 |
20100293096 | SOFTWARE KEY CONTROL FOR MOBILE DEVICES - A software key control system and method for mobile devices. When a customer orders a software product, the seller issues a temporary activation key which is posted to a key registration web server. The customer then locates the mobile device's unique device ID and accesses the web server to provide the temporary activation key. The web server creates a registration key based on the customer's temporary activation key and device ID. The registration key is transferred to the customer's mobile device and the customer can then register the ordered software product. The system and method of the present invention thereby automate the sale and distribution of keys for mobile devices. | 11-18-2010 |
20100306112 | ONLINE TRADING METHOD AND SYSTEM WITH MECHANISM FOR VERIFYING AUTHENTICITY OF A PRODUCT - An online trading method includes: configuring a marketplace server to receive a product verification request from a first user terminal and to send an authentication request to a second user terminal; configuring the second user terminal to receive the authentication request and to send a code request to a transponder that is associated with a product; configuring the transponder to receive the code request and to send a response signal that includes a unique identification (UID) code of the transponder, the second user terminal sending out the UID code of the transponder; and configuring an authentication center to receive the UID code of the transponder, to generate a verification result based on the UID code of the transponder, and to send out the verification result for notifying the first party accordingly. An online trading system for implementing the online trading method is also disclosed. | 12-02-2010 |
20100318467 | METHOD AND AN APPARATUS FOR GENERATING IMAGE CONTENT - A method and a system for generating image content. The method and system allow segments of a panoramic scene, to be generated with reduced distortion. The method and system reduce the amount of distortion by mapping pixel data onto a pseudo camera focal plane which is provided substantially perpendicularly to the focal location of the camera that captured the image. A camera arrangement can implement the method and system. | 12-16-2010 |
20110022519 | SYSTEM AND METHOD OF ADVERTISING MESSAGE DISTRIBUTION BY EMPLOYING PORTABLE MEDIA PLAYER - System and method is disclosed for distributing advertising messages by employing a portable media player. Selected media assets and advertising messages are pre-loaded to the media player based upon a targeted user's personal profile which indicates the user's personal interests in specific media asset groups and in specific advertising message groups. The operation of “pre-loading” may be performed at a manufacturing site or at a point of sales. The selected media assets may be encoded. At least one advertising message is delivered to the user through an output unit of the media player before a selected media asset is decoded and is delivered. The storage capacity of a storage unit of the device is managed by a software module. Each pre-loaded media asset and advertising message is assigned a priority in a sequential manner. The lower priority assets and messages are deleted, in a manner un-notified to the user, when the storage capacity is required as a result of the user's operation of the device. The priority of the delivered advertising message may be adjusted and advertising messages and media assets may be replaced by new ones when the device is connected to a server. | 01-27-2011 |
20110022520 | Systems and Methods for Secure Transaction Management and Electronic Rights Protection - The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.” | 01-27-2011 |
20110066554 | METHODS OF MEDIA ASSET DISTRIBUTION BY EMPLOYING ELECTRONIC APPARATUS - A method is disclosed for distributing media assets by employing a new electronic apparatus. Selected media assets are pre-loaded to the apparatus based upon a targeted user's personal profile. The operation of “pre-loading” may be conducted at a manufacturing site or at a point of sales. The selected assets are encoded. The user may purchase a pre-loaded asset through a pre-paid credit system or through an on-line payment facility. The purchased asset may be decoded based upon a public/private key method. The invention is characterized by that the storage system of the electronic apparatus is managed by a software module. Each pre-loaded media asset is assigned to a priority in a sequential manner. The lower priority assets are deleted, in a manner un-notified to the user, when the storage capacity is required as a result of the user's operation of the apparatus. | 03-17-2011 |
20110066555 | SYSTEMS AND METHODS FOR WIRELESS PROCESSING AND TRANSMITTAL OF MEDICAL DATA THROUGH AN INTERMEDIARY DEVICE - One method according to the present invention includes receiving data wirelessly from a medical device, transmitting the data to an intermediary device (such as a properly equipped mobile telephone or personal digital assistant), and formatting a message including the received data for transmission to a medical data server. The intermediary device includes software configured to receive the data and process the data into a format compatible with the medical data server. Once at the medical data server the information can be reviewed by a healthcare professional at a location remote to the patient. This method may be practiced automatically, either continuously or at set intervals, or may be initiated by someone utilizing the system (such as the patient or health care provider). The method preferably functions without the need for the patient to manually enter information into a device. | 03-17-2011 |
20110087600 | METHOD TO MANAGE PROTECTED FILE TRANSFERS BETWEEN PORTABLE MEDIA DEVICES - A method to authorize, facilitate, and mediate transfer of DRM protected files from one portable multimedia player ( | 04-14-2011 |
20110093395 | PORTABLE PROMOTIONAL CONTENT AND INTERFACE APPARATUS - A portable promotional content and interface apparatus ( | 04-21-2011 |
20110112970 | SYSTEM AND METHOD FOR SECURELY MANAGING AND STORING INDIVIDUALLY IDENTIFIABLE INFORMATION IN WEB-BASED AND ALLIANCE-BASED NETWORKS USING A TOKEN MECHANISM - Embodiments of a secure method to access a de-identified database on a website are described. A dual-portal web-based system is implemented that provides healthcare related information to healthcare users through a first website, and registry/management tools to care providers through a second website. No identifiable fields relating to the user are stored or accessible in the database of the first website. All user information is de-identified by total exclusion from the database. A re-identification process allows an authorized care provider view his or her clients in combination with registered personal information from the system. An alliance-based identification (ABID) key is used to index both the individually identifiable information and the personal health data/information that are stored in separate databases. A token generation process generates tokens that allow different ABID keys to be generated for use with different care providers through a single user account. | 05-12-2011 |
20110125649 | COMPUTER SYSTEM FOR MANAGING CONTENT AND CONTENT MANAGEMENT METHOD - It is an object of this invention to protect a copyright for each of subcontents of a digital content. A computer system, comprising: a content providing server for providing a user terminal with a digital content obtained through digitization; and a copyright management server for managing copyright information on the digital content, wherein the content providing server is configured to: obtain copyright information set for each of subcontents included in the digital content from the copyright management server; associate the obtained copyright information with the each of the subcontents, and add the copyright information to the digital content; and transmit the digital content to which the copyright information is added to the user terminal. | 05-26-2011 |
20110125650 | METHOD AND SYSTEM FOR SECURE NETWORK-BASED DISTRIBUTION OF CONTENT - A method and system for network-based distribution of content are disclosed. The distribution of content is not only secure but also controlled. The security restricts access to content within media files during downloads as well as while stored at a server or client. In one embodiment, each media file is encrypted with a different, randomly generated key. The control over the distribution of the media file can serve to limit the subsequent distribution of media files from clients to other clients. In another embodiment, the control can permit media files to be shared on a limited number of different clients affiliated with the same user. The clients can vary with application but generally are computing devices that have memory storage. Often, the clients are personal computers or other computing devices that are capable of storing and presenting content to their users. | 05-26-2011 |
20110153501 | BUSINESS OBJECT AND SYSTEM FOR ELECTRONIC TRANSACTIONS - A system and method for conducting electronic transactions are provided, in which a business object is employed that includes a plurality of modular object sections that function as agreed-upon standard descriptors of an electronic transaction. The sections of the object may include a quote section, an elections section and a fulfillment section. The quote section contains information relating to a seller's willingness to transfer rights in an asset to a purchaser. The elections section contains transaction parameters that are modifiable in response to input from the purchaser. The fulfillment section contains information pertaining to consummation of the transaction and is configured to enable and facilitate the performance of transaction-related fulfillment tasks by one or more third parties. | 06-23-2011 |
20110191245 | METHOD, SYSTEM AND COMPUTER PRODUCT FOR SECURING PATIENT IDENTITY - A method for securing patient identity comprising accessing an electronic medical records database including patient data for a plurality of patients. Each patient in the electronic medical records database is assigned a unique patient identifier. Patient data for a first patient, including a first patient identifier, is retrieved from the electronic medical records database. The first patient is de-identified from the patient data. De-identifying includes the creation of a first encoded patient identifier responsive to the first patient identifier. The de-identifying results in de-identified first patient data and includes the replacement of the first patient identifier with the first encoded patient identifier. The de-identified first patient data is transmitted to a data warehouse system. The method further comprises identifying a second patient in response to receiving report data that includes a second encoded patient identifier from the data warehouse system. The identifying includes the creation of a second patient identifier responsive to the second encoded patient identifier. | 08-04-2011 |
20110196795 | FINANCIAL, ACCOUNT AND LEDGER WEB APPLICATION AND METHOD FOR USE ON PERSONAL COMPUTERS AND INTERNET CAPABLE MOBILE DEVICES - The method and web application is for users of cellular mobile devices to keep track of their personal finances while the user is mobile. The web application is accessed via internet capable mobile devices to record financial transactions such as debit, credit, and cash transactions at the point of the transaction, to avoid lost or forgotten transactions and avoid bank overdraft charges. The method and web application will provide five sets of tools as a service to customers. These sets are: Account ledger, account balancing tools, bill and debt management, budgeting tools, and user management tools. | 08-11-2011 |
20110251960 | Medical Data Encryption for Communication Over a Vulnerable System - A method for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a demographics layer and a data layer, separately encrypting the demographic layer and data layer using different encryption keys, and providing servers in a communication and processing system with a decryption key for the layer processed by such server. Medical file data may be separated into more than two layers. Users accessing the system are authenticated using standard techniques. By separately encrypting different parts of a patient medical record, processing and communication of patient medical files by intermediary servers is enabled without risking disclosure of sensitive patient information if such servers are compromised. | 10-13-2011 |
20110270760 | METHODS AND APPARATUS FOR A FINANCIAL DOCUMENT CLEARINGHOUSE AND SECURE DELIVERY NETWORK - An electronic clearinghouse system (ECS) for securely delivering, retrieving, authenticating, storing, generating and distributing messages, such as financial documents and/or records are described. For message providers, the ECS can provide a secure and trusted venue for delivering messages, such as messages including financial data to their clients that reduces their delivery costs. For users of the ECS, the ECS can provide a central location where each user can receive and consolidate their messages, such as financial documents and associated financial data from a number of different financial data providers. To facilitate these functions, the ECS can include an automated system for recording delivery status as well as evidence of delivery of messages, including whether a message has been viewed by a particular user. Further, the ECS can include components for scheduling events, such as monetary transfers and bill payments, and providing reminders for such events. Also, the ECS can provide utilities that allow a user to package and securely deliver messages to other users. | 11-03-2011 |
20110270761 | METHODS AND APPARATUS FOR A FINANCIAL DOCUMENT CLEARINGHOUSE AND SECURE DELIVERY NETWORK - An electronic clearinghouse system (ECS) for securely delivering, retrieving, authenticating, storing, generating and distributing messages, such as financial documents and/or records are described. For message providers, the ECS can provide a secure and trusted venue for delivering messages, such as messages including financial data to their clients that reduces their delivery costs. For users of the ECS, the ECS can provide a central location where each user can receive and consolidate their messages, such as financial documents and associated financial data from a number of different financial data providers. To facilitate these functions, the ECS can include an automated system for recording delivery status as well as evidence of delivery of messages, including whether a message has been viewed by a particular user. Further, the ECS can include components for scheduling events, such as monetary transfers and bill payments, and providing reminders for such events. Also, the ECS can provide utilities that allow a user to package and securely deliver messages to other users. | 11-03-2011 |
20110282792 | CONTROLLING DATABASE COPYRIGHTS - Briefly, in accordance with one or more embodiments, a utilization permit key may be pre-defined to permit at least one of displaying, editing, storing, copying, and/or transferring of digital data. | 11-17-2011 |
20110313928 | METHOD AND SYSTEM FOR HEALTH INFORMATION EXCHANGE BETWEEN SOURCES OF HEALTH INFORMATION AND PERSONAL HEALTH RECORD SYSTEMS - A method and system for exchanging health information of an individual via the Internet is characterized by tagging of discreet consumer health encounter records, created by an electronic medical record system, with a unique identification number and encoding the identification number in an electronically readable identifier. The record includes the results of medical examinations, medical procedures, medical device measurements and other health information pertinent to the individual. The record is tagged using an electronic network service that creates the unique identification number and the electronically readable identifier. When provided with the unique identification number and the electronically readable identifier, the individual can transfer private medical information to a selected personal health record system. This allows the transfer of private medical information in a secure manner without the need to connect the electronic medical record system to the personal health record system, and without the need for the patient to disclose where the medical information will be stored. | 12-22-2011 |
20120005099 | Secure Electronic Records in Smart Devices - Methods and apparatus for creating secure electronic records using a smart device are disclosed. A smart device is authorized by connecting the device with a secure host computer. The host computer authorizes the smart device for a specified period of time. The user verifies that they are allowed to use the smart device to collect and create secure electronic records. Collecting electronic records then occurs. An encrypted wrapper for each record collected is created by encrypting each record. The smart device is then reconnected to the host computer. The host computer uploads the collected records and clears the device. | 01-05-2012 |
20120005100 | CAR NAVIGATION SYSTEM AND INDIVIDUAL FUNCTIONAL DEVICE - A car navigation system includes: an in-vehicle display device that includes: a central information display device that has a display and displays a video image on the display; an individual functional device that is formed independently of the central information display device and has a navigation function; and an expansion device that connects the central information display device and the individual functional device; and a map division distribution system that includes a map encrypting unit that encrypts a divided map with a map key uniquely assigned to the divided map formed by dividing a map; a decryption key generating unit that decrypts the map key with a user key uniquely assigned to a user; and a decryption key distributing unit that distributes the decryption key to the individual functional device. | 01-05-2012 |
20120030119 | SECURITY SYSTEM AND METHOD THAT ALLOWS USERS TO SECURELY SETUP AND MAINTAIN SYSTEM SECURITY FOR ALL BUSINESS SYSTEMS - A system, method and computer-readable medium for providing comprehensive security to business systems by distributing the security for accessing the business systems across databases at a plurality of locations. The distributed security simplifies security maintenance and is used to control all aspects of a business. The generation of bills, pings converter boxes, schedules pay per view, etc. are handled by the distributed security. | 02-02-2012 |
20120041880 | SYSTEMS AND METHODS FOR DEALING CONTENT - Systems and methods for dealing or exchanging content and currencies in transactions involving multiple users, whereas traded may be rights to content, such as copyrights, and bandwidth capacities. | 02-16-2012 |
20120072352 | Smart Super-Distribution of Rights-Protected Digital Content - Disclosed is a system and method for super-distribution of rights-protected digital content. A first terminal offers digital content to a second terminal, using a unique content identifier to identify the content in the request. The second terminal requests information regarding the content from a service provider platform. The content information request includes a terminal type identifier for the second terminal. The service provider platform obtains format capabilities information for the second terminal from a terminal capabilities database, and selects a format type for the content using the format capabilities information. The service provider platform obtains a content object in the selected format type from a content storage database. The service provider platform then delivers the content object in the selected format to the second terminal. | 03-22-2012 |
20120095922 | IMAGE DATA SALES SYSTEM, IMAGE DATA SALES METHOD, CAMERA, AND SERVER APPARATUS - In the present invention, a camera ID for specifying a camera that takes images to be sold is registered in a server in advance. The server issues an encryption key when the camera ID is registered, and the camera stores the encryption key and encrypts the camera ID by the encryption key to provide the camera ID to an image file including image data obtained by imaging. The server decrypts the encrypted camera ID provided to the image file transmitted from the user by a decryption key corresponding to the encryption key. If the camera ID obtained by the decryption coincides with the registered camera ID, the server authenticates that the image data included in the image file is imaged by the registered camera and discloses the image data to sell the image data. | 04-19-2012 |
20120095923 | SYSTEMS AND METHODS FOR CONSTRUCTING A LOCAL ELECTRONIC MEDICAL RECORD DATA STORE USING A REMOTE PERSONAL HEALTH RECORD SERVER - Certain embodiments of the present invention provide systems and methods for managing medical information. Certain embodiments provide a local electronic medical record system including a local personal health record (PHR) client, the PHR client downloading encrypted patient documents from a remote PHR server and parsing the downloaded encrypted patient documents to form a local PHR database. The example system also includes an interface receiving user input including an encryption key to decrypt the downloaded encrypted patient documents and displaying patient medical information to the user based on the downloaded decrypted patient documents. | 04-19-2012 |
20120173430 | PORTABLE PROMOTIONAL CONTENT AND INTERFACE APPARATUS - A portable promotional content and interface apparatus ( | 07-05-2012 |
20120179611 | Digital Content Vending, Delivery, And Maintenance System - A digital content vending machine in which a client on a personal computer, contains an infrastructure and an inventory. The infrastructure and inventory may both be stored in a hard drive, or the inventory may instead be stored on a removable media The infrastructure presents a graphical user interface on the client which metaphorically resembles a village containing a plurality of stores operated by vendors. Customers shop in the stores by selecting assets, constituting the inventory, and sending money and an identifier to a clearing house via a communications system such as telephone, private network, or the Internet. The clearing house returns a key used to at least partially remove a digital wrapper protecting the asset from unauthorized use. A master server may also be provided to update the infrastructure and inventory, and to provide additional keys used to remove the digital wrappers. | 07-12-2012 |
20120221474 | Secure Electronic Ticketing using Mobile Communication Devices over the Internet - The invention consists of a method and system for secure mobile ticketing through the use of a mobile device with display output and data input capabilities. The system utilizes a cryptographic security string appended to a URL and embedded in a 2D barcode to securely create an electronic ticket which is displayed on the mobile device display for redemption, redeem the displayed electronic ticket by means of optical scanning, and optionally register and authenticate a ticket scanning unit. The system utilizes real-time internet communication with a remote server for ticket distribution, redemption and ticket scanning unit registration and authentication to restrict unauthorized creation or redemption of electronic tickets and to reduce queuing. | 08-30-2012 |
20120310837 | Method and System For Providing Authenticated Access to Secure Information - A system and method for providing access to secure information. The method includes using a computing device to detect a connection between the computing device and an electronic key. The electronic key stores an encrypted unique electronic identifier (UEID). The method also includes using the computing device to authenticate a provider identifier (ID). If the provider ID is authentic and the electronic key is connected to the computing device the UEID is accessed. A request to access secure information is transmitted by the computing device to a secure storage device. Access to the secure information is granted based on the authenticated provider ID and a set of access preferences associated with the UEID. The computing device receives the requested secure information if the request is granted. | 12-06-2012 |
20120317033 | GENERATING BUSINESS PROCESS OBJECTS - Various embodiments of systems and methods for generating a business process object for integrating business process and business objects associated with a business activity are described herein. One or more business process definitions of a business activity are received from a business process model. Also, one or more business object instances used to execute the one or more business process definitions are retrieved from a business object model. Further, the business process object is generated by encapsulating the received one or more business process definitions and the retrieved one or more business object instances. Furthermore, during runtime, business process object data associated with the business process object is transferred to a business application client system using a transfer session key and business object specific way of encryption and decryption methods. | 12-13-2012 |
20120323792 | MULTI PLATFORM AND OPERATING SYSTEM DIGITAL CONTENT VENDING, DELIVERY, AND MAINTENANCE SYSTEM - A system to market digital content to a user on an electronics device. A storage media is installed in the device that contains an inventory of assets that are the digital content. Each asset is protected from unauthorized use by a digital wrapper. A logic in the device displays information about the inventory to the user, accepts their selection of a particular asset, transmits a payment for the selection and an identifier associated with it to a clearing house, receives a first key from the clearing house, transmit the first key to a master server, receives a second key from the master server, and unwraps the digital wrapper protecting the asset with the second key. | 12-20-2012 |
20130006867 | SECURE PATIENT INFORMATION HANDLING - The description relates to secure patient information handling. One example can receive encrypted patient data from a first entity. The example can receive a request to view the encrypted patient data from a second entity. The request can include a conditional access code and the example can validate the conditional access code. In an instance where the conditional access code is valid, the example can retrieve an encryption key for the encrypted patient data. The example can decrypt at least a portion of the encrypted patient data to produce decrypted patient data. The example can provide at least some of the decrypted patient data to the second entity. | 01-03-2013 |
20130006868 | METHOD AND APPARATUS FOR DETERMINING AND UTILIZING VALUE OF DIGITAL ASSETS - Systems and methods for protecting digital assets associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets associated with a device, computing at least one device worth value using the at least one asset worth value assigned to the digital assets associated with the device, identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets associated with the device based on the comparison. | 01-03-2013 |
20130006869 | METHOD TO IDENTIFY CONSUMER ELECTRONICS PRODUCTS - Systems and methods for identifying consumer electronic products using a playback device with a product identifier in accordance with embodiments of the invention are disclosed. In one embodiment, a playback device includes a processor and memory configured to store a product identifier, where the product identifier is associated with a specific product and is associated with cryptographic information, wherein the processor is configured by a client application to request content from a server, communicate the product identifier to a server, and receive encrypted content accessible using cryptographic information including the cryptographic information associated with the product identifier. | 01-03-2013 |
20130006870 | SYSTEM AND METHOD FOR PARTICIPATING IN TRANSACTIONS BETWEEN COMPUTING DEVICES - Apparatus, method, and media for participating in transactions between computing devices. An exemplary method comprises transmitting, to an external computing device, a registration identifier and a registration message including an identification certificate, receiving, from an external computing device, an authentication message to test the authenticity of a computing device, transmitting, to an external computing device, information validating the authenticity of a computing device in response to the receipt of the authentication message, and participating in a transaction with an external computing devices. The transaction may comprise generating a request for content, the request corresponding to a utilization of the content, determining whether the utilization corresponds to usage rights associated with the content, and granting access to the content in accordance with the usage rights based at least in part on a determination that the utilization corresponds to usage rights associated with the content. | 01-03-2013 |
20130024381 | SYSTEM FOR REMOTE REVIEW OF CLINICAL DATA OVER A VULNERABLE SYSTEM - A system for remotely reviewing medical data allows medical data to be transmitted over a vulnerable network to a physician's mobile device. The system includes a console, a data server and mobile devices. The system may include medical imaging equipment, medical records databases, and other sensors. Medical data is routed through the console to the data server to reach the mobile device via a wireless network. Patient's medical file may be separated into a demographics layer and a data layer, and separately encrypted using different encryption keys for the demographic layer and the data layer. Servers in the communication and processing system are provided with a decryption key for the layer processed by such server. Physicians may transmit comments to the requestor through the same system. A resident messaging system may notify users of messages or data awaiting review along with the urgency of the required review are also described. | 01-24-2013 |
20130024382 | COMMUNICATION OF EMERGENCY MEDICAL DATA OVER A VULNERABLE SYSTEM - Methods and systems for communicating a patient medical file having personal demographic information, medical data and a diagnostic image include separating the file into layers including a demographic layer demographic information and a data layer. Medical data may be evaluated using an auto-analysis. The demographic layer may be encrypted with a first encryption key, and the data layer may be encrypted with a second encryption key different from the first. The encrypted demographic and data layers may be sent to a server capable of decrypting one of the layers but not both. The data layer may be decrypted at the server and an operation performed to select a second portion of the diagnostic image. The portion of the processed data layer including the selected second portion of the image may be re-encrypted and the encrypted demographic layer and re-encrypted data layer may be transmitted to a mobile device. | 01-24-2013 |
20130041828 | Systems, Methods, and Apparatus for Managing Digital Content and Rights Tokens - Certain embodiments of the invention may include systems, methods, and apparatus for managing digital content and rights tokens. According to an example embodiment of the invention, a method is provide for managing digital content from one or more sources for multimedia on demand (MOD). The method can include receiving a rights token associated with the digital content; retrieving the digital content based at least in part on the received rights token; translating the digital content for MOD delivery when the digital content is not available in a MOD format; and preparing a unified listing of available content comprising the digital content, from one or more of internal sources, content ecosystems, or third parties. | 02-14-2013 |
20130054467 | SYSTEM FOR REMOTE REVIEW OF CLINICAL DATA - A system for remotely reviewing medical data allows medical data to be transmitted to a nurse's mobile handheld device from medical equipment or data storage. The system includes a console, a data server and mobile handheld devices; the data server may be a software component within the console. The system may further include medical imaging equipment, medical records databases, and other sensors and servers. Medical data is routed through the console to the data server to reach the mobile handheld device via a wireless network. After reviewing the data, nurses may transmit their comments from their mobile handheld device to the requester by going through the same system. The data server may further include a resident messaging system that communicates to the mobile handheld device such that the user is notified of messages or data awaiting review along with the urgency of the required review are also described. | 02-28-2013 |
20130060702 | METHODS AND APPARATUS FOR DEMOGRAPHICS INFORMATION COLLECTION - Various embodiments are directed to methods and apparatus which can be used to implement a system for collecting demographic information of users and/or devices in real-time or near real-time. Methods and apparatus directed to communicating and collecting demographic information via wireless signals, e.g., discovery signals, transmitted by one or more wireless devices, e.g., wireless communications devices supporting a peer to peer signaling protocol, are described. In various embodiments, at least some of the demographic information is transmitted in a secure manner. | 03-07-2013 |
20130060703 | Medical Data Encryption For Communication Over a Vulnerable System - A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a demographics layer and a data layer, separately encrypting the demographic layer and data layer using different encryption keys, and providing servers in a communication and processing system with a decryption key for the layer processed by such server. Medical file data may be separated into more than two layers. Users accessing the system are authenticated using standard techniques. By separately encrypting different parts of a patient medical record, processing and communication of patient medical files by intermediary servers is enabled without risking disclosure of sensitive patient information if such servers are compromised. | 03-07-2013 |
20130066784 | METHOD FOR REMOTE REVIEW OF CLINICAL DATA OVER A VULNERABLE SYSTEM - A method for remotely reviewing medical data allows medical data to be transmitted over a vulnerable network to a physician's mobile device. The method sends data to be transmitted through a console, and a data server to reach the mobile device. The method includes separating patient's medical file into a demographics layer and a data layer, separately encrypting the demographic layer and data layer using different encryption keys, and providing servers in a communication and processing system with a decryption key for the layer processed by such server. Medical file data may be separated into more than two layers. After reviewing the data, physicians may transmit their comments from their mobile device to the requestor by going through the same system. Separately encrypting different parts of a patient medical record enables processing and communication of patient medical files by intermediary servers without risking disclosure of sensitive patient information. | 03-14-2013 |
20130097086 | Medical Data Encryption For Communication Over a Vulnerable System - A system for securing patient medical information for communication over a potentially vulnerable system includes separating patient's medical file into a demographics layer and a data layer, separately encrypting the demographic layer and data layer using different encryption keys, and providing servers in a communication and processing system with a decryption key for the layer processed by such server. Medical file data may be separated into more than two layers. Users accessing the system are authenticated using standard techniques. By separately encrypting different parts of a patient medical record, processing and communication of patient medical files by intermediary servers is enabled without risking disclosure of sensitive patient information if such servers are compromised. | 04-18-2013 |
20130144790 | Data Automation - A user friendly process and system are provided for healthcare payers and providers to automate access to information from disparate systems accurately and in real time, to reduce healthcare costs and improve healthcare quality and outcomes. In some circumstances, it may be desirable to use the efficient process and system for other purposes. | 06-06-2013 |
20130159193 | METHOD AND APPARATUS FOR DELIVERING CONTENT IN A COMMUNICATION SYSTEM - An embodiment of the present invention provides a method of transferring content within a system having a credit managing device, a content providing device and a user device. The method includes: registering the user device with the credit managing device; providing a universal credit to the user device from the credit managing device; providing encrypted content and a pre-rights generator from the content providing device to the user device at a first time without consuming the universal credit; generating a decryption key from the pre-rights generator a second time after the first time; and decrypting, via the decryption key, the encrypted content at the user device and consuming a portion of the universal credit. | 06-20-2013 |
20130226811 | TRUSTED THIRD PARTY CLEARING HOUSE FOR LEAD TRACKING - A method and system for tracking sales leads includes receiving, with a processor of a lead clearing house server and over a network, messages that include personal lead information encrypted with a one-way hash algorithm, each message comprising at least one encrypted lead. The processor may store the received encrypted leads in memory of the server in relation to a log containing activity history with relation to respective encrypted leads. The processor may compare the encrypted personal lead information of the stored encrypted leads with personal lead information of received encrypted leads. The processor may update the log of respective encrypted leads responsive to identifying a match between personal lead information of a received and a stored encrypted lead. The processor may communicate, over the network to a participant that sent the matching encrypted lead, a status based on the updated log related to the matching encrypted lead. | 08-29-2013 |
20130290191 | METHOD OF TRANSFERRING ACCESS RIGHTS TO A SERVICE FROM ONE DEVICE TO ANOTHER - A method of transfer transferring a right to access a service from a device ( | 10-31-2013 |
20140032417 | METHOD AND APPARATUS FOR TOKENIZATION OF SENSITIVE SETS OF CHARACTERS - A method and system for secure handling of sensitive sets of characters in a distributed hierarchical system are disclosed, comprising at least one local server on a lower hierarchic level and at least one central server at a higher hierarchic level. The method comprises the steps: receiving a sensitive set of characters in said local server; replacing a part of said sensitive set of characters with a token to form a tokenized set of characters, said token belonging to a subset of possible tokens assigned to the local server by the central server; transferring at least one of said sensitive set of characters and said tokenized set of characters to the central server; and canceling said sensitive set of characters from said local server within a limited time from said transferring, while maintaining said tokenized set of characters in a local database connected to said local server. | 01-30-2014 |
20140046853 | SYSTEM FOR PROTECTING SENSITIVE DATA WITH DISTRIBUTED TOKENIZATION - A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information may include sensitive numbers such as social security numbers, credit card numbers or other private numbers. A tokenization system may include multiple physically distinct hardware platforms each having a tokenization server and a database. A tokenization server may run portions of a sensitive number through a predetermined number of rounds of a Feistel network. Each round of the Feistel network may include tokenizing portions of the sensitive number using a fractional token table stored an associated database and modifying the tokenized portions by reversibly adding portions of the sensitive number to the tokenized portions. The fractional token table may include partial sensitive numbers and corresponding partial tokens. A sensitive-information-recovery request including the token may be directed to the token generating organization from the token requestor to recover sensitive information. | 02-13-2014 |
20140067686 | Pre-Downloading Digital Content to Client Devices - Content is pre-downloaded to a client device used by user. The pre-downloaded content is received and stored at the client device and has an access restriction to prevent the user from consuming the pre-downloaded content. The client device interacts with the user to facilitate purchase transactions for the pre-downloaded content. After the pre-downloaded content is purchased, the client device removes the access restriction to allow the user to consume the pre-downloaded content on the client device. Pre-downloading digital content allows the user, for example, to access the pre-downloaded content without needing to download the content at the time of purchase. | 03-06-2014 |
20140089200 | Method and Apparatus for Synergistic Online Services - An online service that stores data securely for customers of businesses. The data is uploaded by the business and stored in a encrypted form that only the customer can cover. | 03-27-2014 |
20140108258 | SYSTEM AND METHOD FOR AN ANONYMOUS EXCHANGE OF PRIVATE DATA - Facilitating the purchase and sale of private data between anonymous entities based on the use of encryption and a centralized on-line entity to exchange the private data in a secure environment. The seeker of private data, such as consumer information, transmits an encrypted query to the centralized exchange entity. The query submission includes legal representations stating the legally permissible purpose for seeking the information. The centralized exchange entity compares the encrypted query to an encrypted data index collected from at least one data provider, to determine if the query matches any private data held by a data provider. The comparison is conducted within a secure, search component to ensure the privacy of all data and all parties to the transaction. The exchange entity facilitates the anonymous exchange between the data purchaser and the data provider. A payment invoice can be generated and electronically presented by maintainer. The payment may be electronically debited from the designated account of a data purchaser and remitted to a data provider. In addition, a portion of such funds may be retained by the centralized exchange entity. | 04-17-2014 |
20140143153 | INFORMATION DISTRIBUTION APPARATUS, INFORMATION DISTRIBUTION SYSTEM, INFORMATION DISTRIBUTION METHOD, AND RECORDING MEDIUM - An information distribution apparatus includes an acquiring unit that acquires individual identification information, product identification information, and user identification information. The information distribution apparatus includes a storing unit that stores the authentication information and the user identification information in an associated manner in a predetermined storing device. The information distribution apparatus includes a deciding unit that decides, whether the received authentication information and the received user identification information are stored in an associated manner in the predetermined storing device. The information distribution apparatus includes a distributing unit that distributes, when it is decided by the deciding unit that the received authentication information and the received user identification information are stored in an associated manner in the predetermined storing device, content that is identified by product identification information that is associated with the authentication information to the terminal device. | 05-22-2014 |
20140156533 | SYSTEM FOR DYNAMICALLY ENCRYPTING INFORMATION FOR SECURE INTERNET COMMERCE AND PROVIDING EMBEDDED FULFILLMENT SOFTWARE - A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment software, obviating the need for the customer to download fulfillment software prior to requesting secure data. The data distribution system is characterized by server technology which can dynamically encrypt secured data files just prior to a customer request to download the data file. A framework for building a universal data distribution infrastructure is provided which employs Requesters. | 06-05-2014 |
20140164247 | STORAGE OF KEYID IN CUSTOMER DATA AREA - A key identifier for an encryption key repository is stored with customer data on a logical device. When the customer data is compressible, the key identifier is stored in space freed by compressing the customer data. When the customer data is not compressible, a portion of the customer data is copied to a key record in the key repository identified by the key identifier, and the key identifier overwrites the copied customer data. | 06-12-2014 |
20140172718 | SYSTEM AND METHOD TO PROVIDE MEDICAL RECORD ACCESS VIA INTERNET ACCESSIBLE DEVICES - A system and method to provide medical record access to existing vendor centric and legacy networks by way of a pass-through mechanism that can process multiple disparate digital credentials and encryption algorithms. The system and method utilize a health information exchange (HIE). The HIE comprises a plurality of nodes which are configured to connect to any node via a traditional wired network or wirelessly, wherein each node comprises a server and a communication gateway. Communicating with the HIE are a plurality of entities, wherein each entity has a server functionally connected to a communications gateway configured to communicate with the HIE. | 06-19-2014 |
20140172719 | PRIVACY COMPLIANT CONSENT AND DATA ACCESS MANAGEMENT SYSTEM AND METHODS - An information management system for restricting access to personal data in compliance with law or regulation includes a database having restricted records stored therein, at least one of the records including an identification of a client or group of clients about whom said record concerns. A computer system under the control of a trusted information broker is configured to receive via a communication medium a request initiated by a requestor for access to at least one of the restricted records in the database, the request including an identification of the requestor. The computer system is further configured to transmit a request for consent to the client and receive an indication from the client that the client consents or does not consent to access to the restricted record by the requestor. The computer system grants or denies access to the restricted records based upon the indication from the client. | 06-19-2014 |
20140201083 | SYSTEM AND METHOD FOR OFFERING A MULTI-PARTNER DELEGATED PLATFORM - A system and method for offering a delegated platform that includes configuring a partner key of a partner record on a service platform with a partner; creating an account scoped within the partner record; receiving a session authentication request that specifies a partner assertion of a partner authenticated session request of the account; authenticating the session authentication request with the partner key; and rendering an embeddable account portal with a session of the account. | 07-17-2014 |
20140207686 | SECURE REAL-TIME HEALTH RECORD EXCHANGE - A method, an apparatus, and a computer program product for accessing electronic medical records are provided in which a portable computing device uniquely associated with a user authenticates an identification of the user and automatically retrieves information corresponding to the user from electronic healthcare records systems using the identification. The retrieved information may be combined with other information and electronically delivered to a healthcare provider or patient. Delivery may be initiated by the portable computing device and directed to a computing device of a healthcare provider or patient. Exchange of records and other information between the user and the provider is effected using a first channel to provide a network address of the records and cryptographic keys necessary to extract the records, and a second path to deliver the encrypted records. The first path may be implemented using a camera or optical scanner to read an encoded optical image. | 07-24-2014 |
20140214683 | TRANSFER SYSTEM FOR SECURITY-CRITICAL MEDICAL IMAGE CONTENTS - A transfer method, a system and a product are disclosed for transferring security-critical medical image data records with PHI sections from a source application to a destination application. In an embodiment, the method accesses a PKI infrastructure that provides a user-specific key for each user. Following detection of a copy command for at least one image data record in the source application, a data convolute is produced, including an anonymized and an encrypted image data record, which are forwarded to a trader module and/or a memory module. After a pasted command is detected, the key is used to access the clipboard and/or the memory module in order to decrypt the image data record from the encrypted image data record and to paste it (for a secure destination application), and/or to access the anonymized image data record and to paste it (for a nonsecure destination application). | 07-31-2014 |
20140244512 | Method for Separating Private Data from Public Data in a Database - An electronic voting terminal includes: a display; a data input device; a biometric input device; a case having an open and a closed position, the case protecting the display, the input device, and the biometric input device in the closed position, the case making the display, input device and biometric input device accessible by the voter in the open position; a communications medium; a microprocessor to control the display, the data input device, the biometric input device, and the communications medium; and a power supply that accepts alternating current and provides direct current to the microprocessor The device utilizes the biometric input device to validate the identity of the voter, utilizes the data input device to receive the ballot from the voter, and utilizes the communications medium to transmit the ballot. A system for voting also includes a centralized computer and voter registration database. | 08-28-2014 |
20140258130 | SYSTEM AND METHOD FOR PARTICIPATING IN TRANSACTIONS BETWEEN COMPUTING DEVICES - Apparatus, method, and media for participating in transactions between computing devices. An exemplary method comprises transmitting, to an external computing device, a registration identifier and a registration message including an identification certificate, receiving, from an external computing device, an authentication message to test the authenticity of a computing device, transmitting, to an external computing device, information validating the authenticity of a computing device in response to the receipt of the authentication message, and participating in a transaction with an external computing devices. The transaction may comprise generating a request for content, the request corresponding to a utilization of the content, determining whether the utilization corresponds to usage rights associated with the content, and granting access to the content in accordance with the usage rights based at least in part on a determination that the utilization corresponds to usage rights associated with the content. | 09-11-2014 |
20140324704 | SECURE CONTENT DISTRIBUTION SYSTEM - A user selection of one or more of a plurality of content is received. The selected content is encrypted by a first encryption key that is remote and unknown to the distribution server. Payment information associated with the user selection is also received and verified. The selected content from is retrieved from a remote database. The first encryption key corresponding to the selected content to decrypt the encrypted content corresponding to the user selection is obtained. Decryption is performed by a hardware-based engine of the distribution server that is isolated from a host processor of the distribution server. The content corresponding to the user selection is encrypted according to a second encryption key that is known to the distribution server. | 10-30-2014 |
20140372316 | SYSTEM TO INFORM ABOUT TRADEMARKS SIMILAR TO PROVIDED INPUT - Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input. Some embodiments of the present invention provide for a proactive system in which users are notified of similar trademarks before using specific term(s) and users proceed after understanding which trademarks actually exist and what areas those trademarks actually entail, and possibly being notified of newly applied trademarks and modified trademarks at later times that are similar to the specific term(s) being used. | 12-18-2014 |
20150032632 | Web-hosted Engine for Continuously Improving the Identification of Safer Products for Administration - Genetic information relating to clinically significant attributes are generated as unique molecular signatures, which are provided to a subscriber to be carried as a card or in another form, including for display by a subscriber's computer or smart-phone or PDA. The signature is periodically updated as new clinically significant attributes become known. The process of updating the signature and using it to obtain suitable products (which don't have an unacceptable risk of generating an adverse reaction or outcome) is also described. | 01-29-2015 |
20150032633 | AUTHENTICATION SYSTEM FOR MOBILE DEVICES FOR EXCHANGING MEDICAL DATA - An authentication system, a mobile electronic device, an instantiating unit and a method, as well as a computer program product are disclosed for the authentication of a patient against a central registry which exchanges data with a repository for the storage of medical data records. In an embodiment, an individualised application is loaded and installed on the mobile radio device in order to sign messages to the registry with a signature. The signature can be triggered in the registry to check the authenticity of the remote patient in order to provide data access. | 01-29-2015 |
20150052058 | Auction for medical image diagnostic services - A medical image interpretation services system and method is disclosed. The system or method determines a calculated workload based on reference workload values for the medical procedure codes associated with the medical image exams that a medical image interpreter has already won or has a probability of winning. The system or method can prevent a medical image interpreter (such as a radiologist, a pathologist, or a dermatologist) from bidding if the calculated workload exceeds workload limits set by the medical image interpreter or set by the system. | 02-19-2015 |
20150052059 | System and Method for Preventing Identity Theft or Misuse by Restricting Access - A system and method for network file filtering to prevent identity theft or misuse by restricting access to files likely to contain sensitive data is disclosed. The file filtering process includes scanning at least one data file for density of a selected pattern. Files identified as containing the selected pattern may be further analyzed to determine the likelihood of the presence of sensitive information. The process may also include restricting access to files that are identified as likely to contain sensitive information. | 02-19-2015 |
20150081563 | PRIVACY PRESERVING CONTENT ANALYSIS - Embodiments relate to privacy preserving content analysis. A recoverable hash operation is performed on text information to produce hashed text information in a business-to-business system. The business-to-business system includes a business-to-business transaction gateway coupled to a plurality of enterprise computer systems. A non-recoverable hash operation is performed on numerical information to produce hashed numerical information in the business-to-business system. The hashed text information and the hashed numerical information are provided from the business-to-business transaction gateway to an analytics engine to perform encrypted content analysis. The text information and the numerical information are provided from one of the enterprise computer systems as a producer system to another of the enterprise computer systems as a consumer system through the business-to-business transaction gateway. | 03-19-2015 |
20150081564 | PRIVACY PRESERVING CONTENT ANALYSIS - Embodiments relate to privacy preserving content analysis. A recoverable hash operation is performed on text information to produce hashed text information in a business-to-business system. The business-to-business system includes a business-to-business transaction gateway coupled to a plurality of enterprise computer systems. A non-recoverable hash operation is performed on numerical information to produce hashed numerical information in the business-to-business system. The hashed text information and the hashed numerical information are provided from the business-to-business transaction gateway to an analytics engine to perform encrypted content analysis. The text information and the numerical information are provided from one of the enterprise computer systems as a producer system to another of the enterprise computer systems as a consumer system through the business-to-business transaction gateway. | 03-19-2015 |
20150088752 | METHODS, APPARATUS, SYSTEMS AND COMPUTER READABLE MEDIUMS FOR ANONYMIZED IDENTIFICATION OF PAYMENT CARD ACCOUNTS BELONGING TO A SAME ENTITY - In one embodiment, a method includes receiving, by a processing device, data representing a plurality of payment card transactions made in association with payment card accounts, the data including personally identifiable information; anonymizing, by a processing device, the data by hashing the personally identifiable information; determining, by a processing device, a plurality of the payment card accounts that belong to a same entity based on the hashed personally identifiable information without decoding the hashed personally identifiable information to recover the personally identifiable information; and identifying, by a processing device, the determined plurality of payment card accounts as belonging to the same entity. | 03-26-2015 |
20150106273 | SECURE PORTABLE MEDICAL INFORMATION ACCESS SYSTEMS AND METHODS RELATED THERETO - Using a secure portable reference to medical information, stored on a portable storage medium, various embodiments allow a patient to give to their doctor an easy-to-use access key that will enable access to desired medical information stored on a computer network. The secure portable reference provides greater transportability of medical records to a patient or medical data repository including a doctor's office, clinic, or hospital, while maintaining data security to satisfy medical data privacy regulations and expectations. Some described embodiments use encrypted information inside the secure portable reference to hide, for example, who is allowed access to the stored medical information, and the network location of the stored information. Some embodiments use a secret PIN to authenticate the user attempting access to the referenced medical information. The secure portable reference contains information on network resources used to enable download access to medical information, including medical records and medical images. | 04-16-2015 |
20150112867 | Protecting Privacy Of Personally Identifying Information When Delivering Targeted Assets - Techniques are disclosed herein for protecting personally identifying information (PII) and behavioral data while delivering targeted assets. In one aspect, a profile is created based on a template and desired characteristics of users to receive one or more targeted assets. The template provides a framework for the user characteristics. One or more clients are provided the template. A manifest that identifies the targeted assets is encrypted based on the profile. The encrypted manifest is sent to the one or more clients. A user profile is generated at a client based on a template. The client attempts to decrypt the encrypted manifest based on the profile created at the client. The client sends a request for any targeted assets that were identified through the attempt to decrypt the encrypted manifest. | 04-23-2015 |
20150120566 | System and Method for Digital Media Rights Management - A method for digital rights management uniquely associates a user with their digital media player, and encrypts a digital media file upon sale of the media so that the media cannot be decrypted and played by any media player but the one associated with the user. | 04-30-2015 |
20150134532 | METHOD AND SYSTEM FOR CREATING A CONTROL GROUP FOR CAMPAIGN MEASUREMENTS - A method for creating a control group for campaign measurements includes: storing a plurality of consumer profiles, each profile including data related to a consumer including an account identifier, spend behavior, and microsegment associated with the consumer; receiving a plurality of measurement profiles, each profile including data related to a consumer including a specific account identifier and indication of participation or non-participation in a campaign; associating each consumer profile with a measurement profile where the included account identifier corresponds to the specific account identifier of the measurement profile; identifying a campaign group, the campaign group including consumer profiles, each profile including a common microsegment and spend behavior and associated with a measurement profile indicating participation in the campaign; and identifying a control group, the control group including consumer profiles, each profile including the common microsegment and spend behavior and associated with a measurement profile indicating non-participation in the campaign. | 05-14-2015 |
20150134533 | FAIR CREDIT SCREENED MARKET DATA DISTRIBUTION - The invention relates to systems and methods for distributing market data. In one implementation, the system may generate a new encryption key at each market data update, and use that key to encrypt each market participant's data in that update before it is sent. Among other factors, characteristics of modern computer networks may cause participants to be sent (and to receive) their encrypted data in that update at different times. After the participants have all been sent their data in that update the system may then simultaneously transmit to those participants the key that will enable them to decipher their data. In an implementation, the key may be transmitted via a multicast transport protocol which can be used to ensure all recipients receive it at the same time. In this manner the invention may ensure that although participants receive their data in a given update at different times, they are unable to decipher that data until substantially the same time. | 05-14-2015 |
20150149362 | Encryption and Distribution of Health-related Data - System and methods to reversibly encrypt health-related personally identifiable information (PII) are described allowing the distribution of health-related information to multiple subscribers while remaining under the control of patient consent directives. | 05-28-2015 |
20150294068 | SYSTEM AND METHOD FOR DOCUMENTING PATIENT INFORMATION - A method for providing access to patient information from within an electronic medical record may involve: receiving, from a user, at least one piece of identifying information, identifying the user as a person authorized to access the patient information; providing an encrypted link on an electronic medical record of the patient, wherein the encrypted link is preloaded with the at least one piece of identifying information and a patient medical record number corresponding to the patient; decrypting the encrypted link in response to the user clicking on the encrypted link, without requiring the user to provide any further identifying information; and providing the patient information to the user via a secure web site, in response to the user clicking on the link. | 10-15-2015 |
20150310448 | METHOD AND SYSTEM FOR IDENTIFYING DEFECTS IN GLASS - A method and system for identifying defects in glass are provided. The method includes identifying, using an identifier device, each of a plurality of sheets of glass with an identifier; generating, using a mapping device, a map of glass attributes for each of the plurality of sheets of glass; associating, using a computer system, the map of attributes of each of the plurality of sheets of glass with the identifier of a corresponding each of the plurality of sheets of glass; storing the map of glass attributes of each of the sheets of glass in a database; and providing a customer with a level of access to information in the database so as to allow the customer to retrieve at least part of the map of attributes of sheets of glass acquired by the customer. | 10-29-2015 |
20150317644 | METHOD AND APPARATUS FOR MARKING MANUFACTURED ITEMS USING PHYSICAL CHARACTERISTIC - A method of marking a manufactured item is described, comprising: creating a unique product identifier for a manufactured item; creating one or more encryption keys; generating a secret key using the unique product identifier and the one or more encryption keys; generating a system noise value by performing a hash function on the secret key and the unique product identifier; generating a physical key from a measured physical property of the manufactured item; generating a physical noise value by performing a hash function on the physical key and the unique product identifier; generating a secure identifier derived from or incorporating the system noise value and the physical noise value; and placing a mark on the manufactured item, the mark comprising the secure identifier or an identifier derived from the secure identifier. Also described are methods of authenticating items marked in accordance with the described method. | 11-05-2015 |
20150332338 | SYSTEM AND APPARATUS FOR IDENTIFIER MATCHING AND MANAGEMENT - Systems, methods, and apparatuses for identifier matching and management are described herein. In various embodiments, the system includes a distributed architecture for receiving and matching public and secure identifiers associated with a particular consumer. In particular embodiments, the system uses the matched public and secure identifiers to transmit one or more messages to the particular consumer. | 11-19-2015 |
20150339599 | SYSTEM, MOBILE DEVICE AND METHOD FOR ELECTRONIC TICKET PEER TO PEER SECURE TRANSFERRING BY NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY - The invention discloses system and method for electronic ticket peer-to-peer (P2P) secure transfer on mobile devices by NFC Technology, which supports mobile devices with NFC such as cell phone, and tablet. Electronic Ticket P2P Secure transfers on mobile devices by NFC. The system and method comprises two mobile devices with NFC technology, each of which comprises a secure element, an electronic ticket platform sub-system and a check-tickets reader sub-system. | 11-26-2015 |
20150339768 | Methods and Systems for Accessing Account Information Electronically - Methods and systems for accessing customer account information involve, for example, binding a computing device with a customer's profile via one or more attributes of the computing device and an encrypted token stored on the computing device and thereafter receiving an authentication request consisting at least in part of the computing device attributes and the encrypted token stored on the computing device. A determination is made as to whether or not entry of a customer credential was received within a pre-determined preceding interval of time, and predefined customer account information is displayed on the computing device without requiring entry of the customer credential when a determination is made that entry of the customer credential was received within the pre-determined preceding interval of time. | 11-26-2015 |
20150347685 | METHOD AND A SYSTEM FOR SHARING AND ANALYSING UNSTRUCTURED HEALTHCARE DATA - The present invention provides a method and a system for securely sharing and analyzing the unstructured healthcare data of patients. Specifically, the method comprises steps of collecting healthcare data, encrypting the healthcare data, uploading the encrypted healthcare data, fetching encrypted healthcare data, providing selective access to the healthcare data and extending the secure view to other users. Further, the method has a step of reducing the secure view to other users as per the user scope and analyzing the patient's healthcare data. The healthcare date is analysed with respect to extracted features for generating trends and by building/executing query against external healthcare data source. | 12-03-2015 |
20150347932 | Secure 3-D Printing Platforms, Systems, and Methods - Systems, methods, and platforms can be configured to provide services and devices that powers, controls and authenticates 3-D printed objects, such as through an adaptive control module for unique 3-D printer products. Secure processing of product specifications can also be performed to help maintain the anonymity of confidential user information used in the manufacture of products. | 12-03-2015 |
20150348087 | FULLY PRIVATE MARKETING CAMPAIGN SYSTEM AND METHOD - A system and method that allows a business to obtain statistics to measure the progress of a marketing campaign while maintaining the privacy of consumer information, is provided. Using Private Information Retrieval (PIR) and other cryptographic privacy enhancing technologies, the consumer can request actions and receive responses from the business. The requests and responses are kept private from the business using PIR. The marketing strategy is represented as a graph with nodes representing the consumer states and links representing allowed transitions. The consumer request contains information about the consumer's state in the business's marketing strategy so that only allowed responses are made to the consumer. The business can monitor the overall execution of the marketing plan but cannot see the states or transitions of individual customers or their actions, searches or responses. | 12-03-2015 |
20150356257 | PATIENT STATUS NOTIFICATION - A server receives data for obtaining an anonymous ID associated with a resident of an assisted living facility from a first computing device. The server obtains the anonymous identifier (ID) associated with the resident of the assisted living facility. The server provides a list of selectable status updates for display on the first computing device. The server receives data indicating selection of a status update from the list of selectable status updates from the first computing device. And the server sends a status notification about the resident to a second computing device that is registered to receive notifications associated with the anonymous ID, where the status notification is based on the selected status update. | 12-10-2015 |
20150356634 | Peer-To-Peer Email with Video and Advertising Aspects - A Peer-to-Peer (“P2P”) email and social networking system for use by plural users to exchange emails and attachments includes a mesh network that includes plural node computers, each running a P2P email client, and each constructed to transmit and receive emails. The emails are stored in mailboxes residing on each node computer, and may be encrypted during transmission, and may remain encrypted while stored at each node computer. | 12-10-2015 |
20150379202 | SYSTEM AND METHOD FOR SECURELY MANAGING MEDICAL INTERACTIONS - Disclosed are peer-to-peer mobile applications that manage secure and intelligent communication between medical providers, patients, and/or physicians. The mobile application can be configured to provide an encrypted mixed media messaging system between registered users that provide, for example, a HIPAA compliant messaging platform. A secure messaging system can controls delivery of the mobile application and provide functionality to enable providers to control the messaging environment. The secure messaging system can be architected to provide geographically located servers. The geographically located servers can be configured to manage secure communication and implement geographically based communication requirements. In various embodiments, a plurality of communication management servers can be located in multiple jurisdictions, each managing respective communication requirements and/or restrictions. | 12-31-2015 |
20150379283 | PORTABLE E-WALLET AND UNIVERSAL CARD - Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card. | 12-31-2015 |
20160005079 | SYSTEM FOR TARGETING LOCATION-BASED COMMUNICATIONS - Embodiments of the invention are directed to systems, methods and computer program products for providing targeted location-based communications. An exemplary apparatus is configured to receive an encoded signal, decode the encoded signal such that embedded data is retrieved, send the embedded data a remote server; and receive a message based at least partially on sending the embedded data. Another exemplary apparatus is configured to provide the encoded signal by receiving data input, receiving a host signal, embedding the data input within the host signal such that an encoded signal is generated, and transmitting the encoded signal. A third exemplary apparatus is configured to provide the targeted communications by storing one or more messages associated with an entity, receiving data, selecting at least one of the one or more messages based at least partially on the data received, and sending the at least one of the one or more messages selected. | 01-07-2016 |
20160012526 | ACCOUNT SECURITY VIA AN ELECTRONIC TOKEN | 01-14-2016 |
20160019475 | AUTHORIZING SECURED WIRELESS ACCESS AT HOTSPOT BY LOADING USER-SPECIFIC ACCESS CREDENTIAL FOR USER ACCORDING TO IDENTITY OF THE USER - A hotspot provides an open wireless network and a secure wireless network. The open wireless network has no network-level encryption and allows open association therewith. The secure wireless network employs network-level encryption and requires authentication of a received access credential from a client device before allowing association therewith. A system for authorizing the client device for secured access at the hotspot includes an access controller configured to establish an encrypted connection between the client device and a login portal of the hotspot over the open wireless network, and to store a user-specific access credential transmitted via the encrypted connection as a valid access credential in a credential database. The credential database is accessed by wireless access points of the hotspot to authenticate the received access credential from the client device in response to a request from the client device to associate with the secure wireless network. | 01-21-2016 |
20160026998 | IN-MARKET PERSONALIZATION OF PAYMENT DEVICES - Described are methods and systems for remotely personalizing a payment device. In an embodiment, a trusted service provider (TSP) personalization server receives a payment device personalization request from a remote personalization device (RPD), determines that a hardware security token (HST) permits issuance of the payment device, and transmits a personalization data request to an issuer. The TSP personalization server then receives the requested personalization data from a Mobile Over-the-Air Provisioning Service (MOTAPS) server, generates session keys, converts data from the MOTAPS server into payment device application process data unit (APDU) data, and then transmits the personalization data and APDU data to the RPD to load onto a payment device. | 01-28-2016 |
20160027229 | SYSTEM AND METHOD FOR SECURELY RECEIVING AND COUNTING VOTES IN AN ELECTION - The present invention generally relates to blockchain technology. Specifically, this invention relates to adapting blockchain technology for the storage of voting data in an electronic voting system. The system includes a distributed network of voting machines in communication with each other. Each voting machine has a barcode scanner, a network communications device and a computer system running a voting client. Votes are received through the barcode scanner or a voter interface system and stored securely on a blockchain. The tally for various candidates in the election is updated and stored as each vote is received and counted. This creates an auditable trail of votes and the tally which can be used to detect, correct, and prevent fraud and error in the vote counting process. | 01-28-2016 |
20160034990 | SYSTEM AND METHOD FOR SECURELY RETRIEVING PRIVATE DATA FROM CUSTOMER MOBILE DEVICE - A method and system for handling private user data in transactions between mobile devices and destination websites for e-commerce or other electronic transactions involving private user data. In particular, the present invention relates to a method and system for facilitating a secure transaction without requiring a user to login into the e-commerce website with a user name and password while allowing the user to maintain control over their personal information. In place of the traditional user login (e.g., user name and password) the login by the present invention occurs automatically by setting up a secure data channel between the e-commerce website and the mobile computing device utilizing an exchange server. The secure data channel may be created by exchanging private encryption keys (e.g., symmetric keys) between the destination website and the mobile computing device through the use of a secure data message exchange. | 02-04-2016 |
20160042133 | SYSTEM AND METHOD FOR BEHAVIORAL HEALTH CASE MANAGEMENT - In a data processing network comprising two or more remote workstations, such as a personal computer, mobile phone, tablet, or the like, at least one application server and at least one secure, HIPPA-compliant database management system, all connected over one or more communications networks enabling the transmission of both data and voice phone calls, a system for efficient, cost-effective, scalable, evidenced based case management for individuals suffering from mental illness. The system enables patient communication with an assigned care manager, who assists the patient with collecting and analyzing disparate elements of the patient's health records and data, navigating the mental health care system, making and keeping appointments, and tracking medication and treatment. The system also provides means for 24/7 personal communication and state assessment between patient and care manager. The method consists of administering a Discovery Assessment, logging all generated health care data, and revising the treatment and/or medication protocols based on same. | 02-11-2016 |
20160048845 | METHOD FOR ELIMINATING THE USE OF PAPER IN ELECTRONIC TRANSACTIONS BY LEGALLY VALID MANUSCRIPT BIOMETRICS, SO-CALLED FORMALISED PAPERLESS SOLUTION - The purpose of this instrument is to describe the invention patent classified in the field of operational control systems, which is characterized for being consisted of a negotiation simulator, data entry and capture of image that transmits the record (electronic signature card) for an electronic signature on the agreement (biometrics), through e-CNPJ and back-office (formalization), sending and receiving data for entry and recording, so as to verify the existence of frauds, and, if the process is in compliance, the record is send to the Treasury, and an email is sent to the client via encrypted electronic file (digital envelope) and forwarded right after to e-vault. | 02-18-2016 |
20160063187 | AUTOMATED SYSTEM FOR HANDLING FILES CONTAINING PROTECTED HEALTH INFORMATION - The current document is directed to methods and automated systems for handling files and other data during a data ingestion process that may contain PHI within the file content, filenames, file-associated metadata, and other such data-associated information. The methods and automated systems protect sensitive health information using encryption methods to prevent the protected health information from being exposed. In certain implementations, the currently disclosed automated system includes a client-network system, one or more client servers, an encrypted data-storage device including a source folder for temporarily storing original files downloaded from the client network system and a second folder for storing PHI-free files created from the original files, and processes that create the PHI-free files from the original files, remove the original files from the source folder, and securely copy the PHI-free files to a secure file-transfer protocol server to be processed for later use. | 03-03-2016 |
20160063223 | DISTRIBUTING PROTECTED CONTENT - A method apparatus and media for distributing protected content. An exemplary embodiment, including receiving a selection of content, packaging the selected content to generate packaged content, encrypting the packaged content to generate an encrypted content package, transmitting the encrypted content package to a content server, receiving content location information corresponding to the location of the encrypted content package on the content server, receiving a selection of one or more rights, combining the one or more rights with the content location information to generate a rights package including the content location information, transmitting the rights package to a license server, receiving license location information corresponding to the location of the rights package on the license server, and distributing the license location information. | 03-03-2016 |
20160063275 | METHOD OF PROTECTING CARE INFORMATION IN A CARE PROVIDER TERMINAL - A method protects care information in a care provider terminal. The method includes detecting if there is a network disconnection between the care provider terminal and an authorized access point (AP), operating the care provider terminal in an offline mode until a first predetermined time is over after the network disconnection is detected, activating an alarm operation when the first predetermined time is over, and deleting the care information when a second predetermined time is over after the alarm operation is activated. The method may further include determining whether or not the care provider terminal is connected to an unauthorized AP while counting the first predetermined time or the second predetermined time, and deleting the care information if it is determined that the care provider terminal is connected to the unauthorized AP. | 03-03-2016 |
20160092971 | CONTENT DISTRIBUTION SYSTEM, CONTENT DISTRIBUTION SERVER, STORAGE MEDIUM AND CONTENT DISTRIBUTION METHOD - A non-limiting example content distribution system comprises a content server that is connected communicably with a game apparatus via a network. If it is decided to reservation-purchase of a content according to an operation of a user, the content server distributes a reservation content to a game apparatus. The reservation content is a content that a part of a normal content that can be executed by the game apparatus is changed to be inexecutable (unable to start). If reaching a date and time of a sale start of the content or an executable date and time, the game apparatus is downloaded with a modifying program for the reservation content according to an operation of the user to modify the reservation content. Therefore, the reservation content can be changed to a normal content. | 03-31-2016 |
20160147944 | OFFLINE ELECTRONIC HEALTH RECORD MANAGEMENT - Embodiments include an offline application, encrypted patient medical data records, and an encryption key that are stored in a cache of a browser application on the local computing device when a network connection is available. The offline application is accessed when the network connection is subsequently lost. Embodiments allow the user to access decrypted patient medical data records stored in the browser application cache, as well as create and access new patient medical data records when a network connection is offline. Any access to a patient medical data record when the network connection is offline may be documented in an offline-access record, an audit record that satisfies HIPAA Security Rule restrictions, that is created and encrypted. When a network connection becomes available, corresponding patient medical data records in the EHR system are updated or created according to the offline-access record and/or an offline-updated patient medical data record. | 05-26-2016 |
20160147945 | System and Method for Providing Secure Check of Patient Records - Methods and systems are described for performing secure checks of details of patient health records stored across multiple healthcare institutions without disclosing identifying details of the patient in transit and without compromising commercial confidentiality. One method includes receiving an encrypted and de-identified request for health record information associated with an anonymized patient identifier from a collection computing system. The method includes obtaining patient data associated with the anonymized patient identifier from a set of source computing systems based on matching the anonymized patient identifier received from the collection computing system with the anonymized patient identifiers received from the set of source computing systems. The method includes generating a cumulative report based on analyzing the patient data obtained from the set of source computing systems and sending the cumulative report in response to the request for health record information associated with the anonymized patient identifier to the collection computing system. | 05-26-2016 |
20160155159 | OFFER INCLUSION FOR OVER THE TOP (OTT) CONTENT | 06-02-2016 |
20160162858 | SCREENING ARCHITECTURES ENABLING REVOCATION AND UPDATE - Methods, devices, systems and computer program products are provided to facilitate signaling of digital rights management (DRM) information that is carried within a multimedia content as digital watermarks. The embedded watermarks enable signaling of a change in trustworthiness of particular DRM technology, enable addition of new DRM technologies to a trusted list of technologies, and facilitate revocation of obsolete or untrustworthy technologies. Once a content is received at a receiver that is equipped with a watermark extractor, extraction of watermark symbols from the content allows the determination of change in trustworthiness of DRM technologies associated with the content. | 06-09-2016 |
20160164884 | CRYPTOGRAPHIC VERIFICATION OF PROVENANCE IN A SUPPLY CHAIN - Some embodiments includes a provenance management system. The provenance management system can authenticate an entity account to register a public identity key and an identity address that are associated with the entity account. The provenance management system can receive a logistic transaction record having a cryptographic signature thereon. The provenance management system can authenticate the cryptographic signature against the public identity key and publish the logistic transaction record to a distributed consensus system that implements a block chain. Each block in the block chain are in sequence with one another and can contain one or more logistic transaction records to ensure a sequence of the logistic transaction records is cryptographically irrepudiable. | 06-09-2016 |
20160171611 | Secure Analytical and Advisory System for Transaction Data | 06-16-2016 |
20160180308 | AUTOMATIC PURCHASING OF DIGITAL CONTENT | 06-23-2016 |
20160188801 | SECURE STORAGE AND TRANSMISSION OF MEDICAL INFORMATION - Disclosed are various embodiments for securely storing and transmitting medical- or health-related information. According to various embodiments described herein, a computing device may enroll or register a client device or a peripheral device associated with the client device in response to the client device or the peripheral device complying with at least one compliance rule. Health information received from the client device or the peripheral device is accessed in response a request received from a requesting service for the health information, wherein the health information as received is encrypted according to a cryptographic key. A determination is made whether consent to send the health information to the requesting service has been provided by a user of the client device. If consent has been provided, the health information received from the client device or the peripheral device is sent to the requesting service. | 06-30-2016 |
20160188805 | PRIVACY COMPLIANT CONSENT AND DATA ACCESS MANAGEMENT SYSTEM AND METHODS - An information management system for restricting access to personal data in compliance with law or regulation includes a database having restricted records stored therein, at least one of the records including an identification of a client or group of clients about whom said record concerns. A computer system under the control of a trusted information broker is configured to receive via a communication medium a request initiated by a requestor for access to at least one of the restricted records in the database, the request including an identification of the requestor. The computer system is further configured to transmit a request for consent to the client and receive an indication from the client that the client consents or does not consent to access to the restricted record by the requestor. The computer system grants or denies access to the restricted records based upon the indication from the client. | 06-30-2016 |
20160189461 | NEAR FIELD COMMUNICATION (NFC) BASED VENDOR/CUSTOMER INTERFACE - Methods and systems to interface between an intelligent vendor kiosk (e.g., a restaurant table), and a mobile user/customer device(s) based at least in part on near field communications, including targeting content (e.g., a menu and/or advertisements) based on context, determining context based on user/customer-selected personal profile attributes and/or customer-selected advertisements, and determining a group context for a group customers with an additive homomorphic voting protocol to preclude disclosure of the votes of each customer to other customers and to the kiosk. | 06-30-2016 |
20160203527 | AUTHENTICATION SYSTEM AND METHOD TO IMPROVE TRUST IN PUBLIC REVIEWS | 07-14-2016 |
20170236230 | SYSTEMS AND METHODS FOR ESTABLISHING TRUST ONLINE | 08-17-2017 |
20190147137 | System, Method, and Apparatus for Universally Accessible Personal Medical Records | 05-16-2019 |
20190147143 | DECOUPLING RIGHTS IN A DIGITAL CONTENT UNIT FROM DOWNLOAD | 05-16-2019 |