11th week of 2016 patent applcation highlights part 47 |
Patent application number | Title | Published |
20160078185 | SYSTEM AND METHOD FOR VERIFICATION OF PHARMACEUTICAL DRUGS PRESCRIPTION AND COSTS - A system and method of generating for determining appropriateness of a pharmaceutical prescription includes receiving, at a remote server, input data from a client device, the input data comprising at least one of a tradename of a pharmaceutical, a generic name of the pharmaceutical, drug category, drug sub category, or diagnosis data; searching, using a pharmaceutical clinical and expense module, a pharmaceutical usage/financial database (PUFD) to identify relevant data based on the input data; generating, using the pharmaceutical clinical and expense module, output data based, at least in part, on the identified relevant data; and transmitting the output data to the client device. | 2016-03-17 |
20160078186 | SYSTEMS, METHODS, AND SOFTWARE FOR PROVIDING A PATIENT-REPORTED OUTCOME MEASURE OF DYSPHAGIA PATIENTS WITH EOSINOPHILIC ESOPHAGITIS - Provided herein are computer-based systems, software, and methods of using the same including a daily patient questionnaire, the questionnaire comprising: a question for determining whether the patient avoided solid food; a question for determining whether the patient had difficulty swallowing solid food; a question for determining what action the patient took to correct or relieve difficulty swallowing food; a question for determining the amount of pain the patient experienced while swallowing food; and a software module configured to apply an algorithm to answers to one or more of said questions to determine a score, wherein said score illustrates one or more selected from the group consisting of: (1) severity, intensity, or frequency of patient dysphagia; (2) suitability of a patient for a particular diagnostic tool, diagnostic method, or therapy for dysphagia; and (3) efficacy of a particular therapy for dysphagia. | 2016-03-17 |
20160078187 | METHODS AND SYSTEMS FOR TISSUE DAMAGE IDENTIFICATION AND QUANTIFICATION - Example embodiments are described that relate to the analysis of tissue damage in an injured patient. Example embodiments are methods and systems for collecting medical imaging data, identifying tissue damage in the medical imaging data, analyzing the tissue damage shown in the medical imaging data, and/or quantifying the tissue damage shown in the medical imaging data. The disclosed methods allow for determining a risk for multiple organ failure and systemic inflammation in a multiply injured patient. | 2016-03-17 |
20160078188 | EVIDENCE BASED MEDICAL RECORD - Various embodiments provide systems, computer program products and computer implemented methods. In some embodiments, a system includes a method of providing a confidence-estimation-based inference, the method includes receiving a query concerning a patient from a user, accessing an electronic health record (EHR) for the patient, the EHR including a first component regarding the patient, querying the user, using a conversational interface, for a second component regarding the patient, receiving the second component regarding the patient in response to the query, calculating a first probability density function using the first component, and a second probability density function using the second component, combining the first and second probability density functions using a Gaussian mixture model, calculating at least one conditional probability table using the Gaussian mixture model and providing the confidence-estimation-based inference based on the at least one conditional probability table. | 2016-03-17 |
20160078189 | Sedation system and method providing enhanced safety - A computer assisted sedation system and methods for use by a non-anesthetist procedural physician comprising an electronic controller for a drug infusion system for infusing a sedative, analgesic and/or amnestic drug to a patient having data monitors for determining the patient' physiological data and transmitting same to the controller for determining whether the patient's physiological condition is normal and if not, for signaling an alarm and providing instructions to a non-anesthesiologiest procedural physician to return the patient to a normal condition. | 2016-03-17 |
20160078190 | REPORTING MODULES - Methods and apparatus, including computer program products, are provided for processing analyte data. In some exemplary implementations, there is provided a method. The method may include generating, by at least one processor, a view comprising an abstraction distilled from the sensor data over a time period. The view may further comprise a graphical representation comprising a plurality of different graphically distinct elements representative of whether the abstraction over the time period is at least one of at, above, or within a predetermined glucose concentration level for a host; a call out comprising value help for the graphical representation, and a textual legend comprising a description of the graphical representation and the abstraction. The method may further include providing the view as a module. Related systems, methods, and articles of manufacture are also disclosed. | 2016-03-17 |
20160078191 | REAL-TIME BIOMETRIC MONITORING AND ALERT GENERATION - System and methods are described for real-time biometric monitoring and alert generation. A system may receive biometric data from a mobile device associated with a patient, and may identify a rule defined by a clinician. The system may generate alert data corresponding to a portion of the biometric data in response to determining that the portion of the biometric data satisfies the rule, and the alert data may be transmitted to a device associated with the clinician. | 2016-03-17 |
20160078192 | PROCESSING MEDICAL DATA ON A CLOUD SERVER - The system includes a cloud server computer configured to receive at least two sets of raw data from at least two sensors carried by the user. Further, cloud server computer configured to process the at least two sets of raw data using a fuzzy set classifier to obtain a fuzzy set corresponding to each of the at least two sets of raw data. Yet further, the cloud server computer configured to combine the fuzzy sets corresponding to the at least two sets of raw data using a rule based processor to determine severity level for the user. Moreover, the cloud server computer configured to send an alert based on the determined severity level. | 2016-03-17 |
20160078193 | SYSTEMS AND METHODS FOR VISUALIZING PATIENT AND TELEPRESENCE DEVICE STATISTICS IN A HEALTHCARE NETWORK - Disclosed herein are various embodiments of systems and methods for visualizing, analyzing, and managing telepresence devices operating in a telepresence network of healthcare facilities. A user may selectively view a global view of all telepresence devices, telepresence devices within a particular region, the details of a particular telepresence device, and/or the details of a particular healthcare facility. At one viewing level, a user may view a plan view map of a healthcare facility and visualize the navigational history of a telepresence device. At another viewing level, a user may view a plan view map of a healthcare facility and visualize telemetry data of a patient associated with a selected room. At another viewing level, a user may selectively view various graphical representations of telepresence device statistics and usage information with respect to health ratings for each of a plurality of patients. | 2016-03-17 |
20160078194 | SYSTEM AND METHOD FOR MEDICAL TESTING - A method of analyzing a medical condition includes creating a wireless communication link between a base unit and a test device at a first location, initiating a test protocol utilizing the test device at the first location, remotely controlling the test protocol with the base unit, generating test data using the test device according to the test protocol, and transmitting the test data to a second location at a different site than the first location. The test data is indicative of performance of a physiological function. | 2016-03-17 |
20160078195 | System and Method for Using Decision Rules to Identify and Abstract Data from Electronic Health Sources - The present invention has to do with a method and system for generating condition-specific registries which are essential resources for supporting epidemiological, quality improvement, and clinical trial studies. The identification of potentially eligible patients for a given registry often involves a manual process or use of ad hoc software tools. With the increased availability of electronic health data, such as within Electronic Health Record (EHR) systems, there is potential to develop healthcare standards based approaches for interacting with these data. Arden Syntax, which has traditionally been used to represent medical knowledge for clinical decision support, is one such standard that may be adapted for the purpose of registry eligibility determination. | 2016-03-17 |
20160078196 | SPECIMEN FULFILLMENT INFRASTRUCTURE - A computer system hosts a centralized data repository and a fulfillment platform. The centralized data repository receives clinical data corresponding to patients from multiple remote clinical data sources, aggregates the received clinical data, and normalizes the aggregated clinical data. The received clinical data may be pre-filtered based on patient consent. The fulfillment platform receives requests from requester computing devices, e.g., biological specimen requests or requests for prospective patients for a clinical study. The requests include cohort definitions. The fulfillment platform performs queries on the aggregated clinical data based on the requests, identifies matches in the aggregated clinical data in response to the queries, and transmits notifications to source site computing devices (e.g., dedicated tablet devices) for the identified matches. The notifications may identify, for example, matching biological specimens or prospective patients for clinical trials. | 2016-03-17 |
20160078197 | SPECIMEN FULFILLMENT ANALYTICS AND PROCUREMENT PROCESS - A computer system automatically generates projected accrual rates for cohort definitions to assist researchers as they design cohorts for medical research projects. The projected accrual rates can help researchers to determine whether a particular cohort design is feasible for a particular research project, or if modifications may be necessary. The computer system also may automatically generate projected completion dates based on the projected accrual rates. The computer system can provide further assistance to researchers by automatically suggesting cohort criteria that may be relevant for a particular cohort design. For example, the computer system may generate a list of search results based on a search request, and provide a list of search results ordered by accrual rate. The computer system may assist a user in formulating such search requests by generating a suggested search term list. | 2016-03-17 |
20160078198 | DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols. | 2016-03-17 |
20160078199 | Method for Scalable Access Control Decisions - Content access may be provided and processed by assigning responsibility for obtaining entitlement data to the client's browser. Thus, in one example, the client may be configured to synchronize and coordinate data lookups associated with a content request, rather than relying on the server to do so. The network architecture may use a mediator design pattern, in which the client's browser acts as the mediator (i.e., middleman) between a content server and an entitlement data server. Accordingly, synchronous calls between server-side services might not be required. Instead, data necessary for the content server to process a client request for access to protected content may be received in the incoming request from the client's browser. | 2016-03-17 |
20160078200 | MERCHANDISING MEDIA BASED ON OWNERSHIP AUDIT - A machine performs an ownership audit on source media files whose media tracks are used, or proposed for use, in a mash-up media file. The machine may access a first group of media identifiers from a user's media library and identify authorized media files that the user is authorized to play or use in a mash-up. The machine may access a second group of media identifiers that identify source media files selected by the user for inclusion in a mash-up. The machine may determine whether all source media files are authorized and then present a notification that indicates whether the mash-up media file can be generated, or has been generated, exclusively from authorized media files. If a source media file is not authorized, the notification may include a suggestion that the user purchase an authorization to play the media file, use it in a mash-up, or both. | 2016-03-17 |
20160078201 | Methods and Systems For Processing Content Rights - A system and method for processing content access rights and/or entitlement rights are disclosed. A method, in one aspect, provides for receiving a selection of a content option, requesting access information associated with the selected content option, receiving access information comprising location information relating to a compatible format, requesting access rights from a first service associated with the location information, wherein the first service requests an access decision relating to the selected content option from a second service based upon the access rights, and receiving the access rights. | 2016-03-17 |
20160078202 | SOFTWARE LICENSE MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated. | 2016-03-17 |
20160078203 | Continuous Monitoring of Access of Computing Resources - Systems and methods are provided for monitoring access of computing resources. Usage rules may be created and stored that define a usage constraint based on actions available to be performed at the computing resources. An authenticator may verify login credentials received from a user and authorize the user to access a computing resource. A request to perform an action at the computing resource may be received, and a usage monitor may apply a usage rule to the requested action. If the requested action violates the usage constraint of the usage rule, the usage monitor may halt performance of the requested action and notify another user of the usage constraint violation. The authenticator may receive and verify another set of login credentials from that other user. In response to successful verification of the additional set of login credentials, the usage monitor may resume performance of the requested action. | 2016-03-17 |
20160078204 | ELECTRONIC DEVICE AND PROTECTION METHOD - A protection method for an electronic device includes generating a control command using a processor of the electronic device when it is determined to acquire information of a current user of the electronic device. The electronic device is controlled to acquire the information of the current user and to acquire data of the electronic device according to the control command. The acquired information is stored. The acquired information and the acquired data is transmitted to the server. | 2016-03-17 |
20160078205 | DISPLACEMENT SIGNATURES - In one implementation, a security management system accesses a displacement signature defined in relation to physical contact with a surface and determines that the displacement signature is correlated with a known displacement signature. The security management system then performs an operation in response to determining that the displacement signature is correlated with the known displacement signature. | 2016-03-17 |
20160078206 | TERMINAL DEVICE AND METHOD FOR CONTROLLING ACCESS TO SAME - A method for controlling access to a terminal device includes collecting light signals emitted by a lighting device of an electronic device. The light signals is converted to digital signals. Once the digital signals match a preset password of the electronic lock, the electronic lock is controlled to unlock the terminal device. | 2016-03-17 |
20160078207 | METHOD AND APPARATUS FOR PROVIDING COMBINED AUTHENTICATION SERVICE - Disclosed herein are a method and apparatus for providing a combined authentication service. Combined authentication information is set by acquiring an entry window location and authentication characters from a user, an entry window including the entry keypad is displayed at the entry window location, entry information including entry characters and entry coordinates is acquired from the user via the entry window, and combined authentication is performed by verifying the entry characters and the entry coordinates, thus strengthening the security of authentication of a mobile terminal while maintaining the user's existing password. Further, if a region to which the password entry coordinates are to be mapped is selected when the user sets a password, authentication is performed by additionally considering mapping coordinates in addition to the password even if the user enters the password into the existing password entry window, thus strengthening the security of password authentication. | 2016-03-17 |
20160078208 | DEVICE AND MANAGEMENT MODULE - A device holding control target data inside, includes a state management unit configured to manage the present life cycle state of the device; a user authentication unit configured to authenticate a user and output a group of the user; and an access control unit configured to acquire a present life cycle state when an access request to access the control target data is received, acquire the group of the authenticated user, acquire access possibility information based on the present life cycle state and the group of the user, and control access to the control target data based on the access possibility information. The state management unit manages a fixed life cycle state, and a variable life cycle state that can be added, changed, or deleted, and the access control unit implements control on the fixed life cycle state before the variable life cycle state. | 2016-03-17 |
20160078209 | METHOD AND APPARATUS FOR MEASURING BODY BALANCE OF WEARABLE DEVICE - A wearable device includes a communication unit that wirelessly communicates with a first external device; a motion sensor that senses the user's motion; and a control unit. The wearable device collects a first motion data generated by the user's motion and transmits the first motion data to the first external device, receives a first security level data and a second security level data from the first external device, and receives only the first security level data from the first external device when the wearable device is converted into a non-wearing state from a wearing state. | 2016-03-17 |
20160078210 | USER-AUTHENTICATION GESTURES - This document relates to user-authentication gestures. One example can capture multiple biometric features when a user-authentication gesture is performed as a device authentication attempt. The example can compare values of the multiple biometric features to previous values stored for the user. The example can further unlock the computing device in an instance where the values of the multiple biometric features satisfy a similarity threshold relative to the previous values. | 2016-03-17 |
20160078211 | LOCATION SIGNATURES - In one implementation, a security management system accesses a trusted location signature and a candidate location signature to determine that the candidate location signature is correlated with the trusted location signature, and establishes a trusted state of an entity in response to determining that the candidate location signature is correlated with the trusted location signature. | 2016-03-17 |
20160078212 | HYPERVISOR AND VIRTUAL MACHINE PROTECTION - A method, according to one embodiment, includes receiving a request for a hypervisor to run a virtual machine, determining using a processor whether the virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine, determining using a processor whether the hypervisor is authorized to run the virtual machine using a digital signature of the data structure, receiving a decryption key from a key authority when it is determined that the virtual machine is authorized to be run and it is determined that the hypervisor is authorized to run the virtual machine, unlocking and/or decrypting the virtual machine using the decryption key, and running the virtual machine on a computer system. Other systems, methods, and computer program products are described in additional embodiments. | 2016-03-17 |
20160078213 | SECURE INDUSTRIAL CONTROL SYSTEM - A secure industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which are provisioned during manufacture with their own unique security credentials. A key management entity of the secure industrial control system monitors and manages the security credentials of the industrial elements starting from the time they are manufactured up to and during their implementation within the industrial control system for promoting security of the industrial control system. An authentication process, based upon the security credentials, for authenticating the industrial elements being implemented in the industrial control system is performed for promoting security of the industrial control system. In one or more implementations, all industrial elements of the secure industrial control system are provisioned with the security credentials for providing security at multiple (e.g., all) levels of the system. | 2016-03-17 |
20160078214 | USER DEVICE SECURITY MANAGER - Techniques for authentication and authorization of a user, an application, or a user device for access to web resources are described. For example, a machine identifies an access request to access a remote resource associated with a web service. The access request may be received from an application executing at a user device. The machine retrieves at least one user artifact from a security manager identifier received from the web service. The machine performs fingerprinting of the user device based on the at least one user artifact. The machine transmits the access request to the web service based on the performing of the fingerprinting of the user device. The machine, in response to the transmitting of the access request to the web service, receives a resource access authorization from the web service for the application executing at the user device. | 2016-03-17 |
20160078215 | METHOD OF MUTUAL AUTHENTICATION BETWEEN A RADIO TAG AND A READER - A method of mutual authentication between a radio tag and a radio reader. The method includes: authentication of the tag by the reader, implemented on a first communication channel, during which a first authentication coupon and a first authentication response are transmitted from the tag to the reader; toggling from the first communication channel to a second communication channel, different from the first channel, on which there is implemented a phase of authentication of the reader by the tag; and dispatching from the reader to the tag of a second authentication coupon and of a second authentication response which are intended to authenticate the reader. The second authentication coupon is transmitted on the first communication channel. | 2016-03-17 |
20160078216 | AUTHENTICATION MECHANISM - A computer-implemented method for preventing password leakage into a non-password field includes detecting that a user of an electronic device has entered a character in a non-password field appearing on a display associated with the electronic device. The character is echoed to at least the display, and stored to provide a stored character string. The stored character string is compared to a set of valid entries for the non-password field, when length of the stored character string reaches a predetermined threshold value. An alert is transmitted when the stored character string fails to match at least a substring of an element of the set of valid entries for the non-password field. | 2016-03-17 |
20160078217 | Computer Implemented Systems and Methods for Generating and Recovering an Authorization Code - A computer implemented system and method for generating and recovering an authorization code. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system also has provisions to manage forgotten authorization code. This is done by fragmenting the base-sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question answer and with a secret key provided by the user. | 2016-03-17 |
20160078218 | LOGIN METHODOLOGY - Methods and apparatus to a login methodology. A method includes selecting a library of images stored in the computer device, setting nicknames for the selected library, uploading the selected library of images to the server, and generating a login account. A network includes a server including at least a processor and a memory, a computer device linked to the server, the computer device including at least a processor and a memory, the memory including at least an operating system and a login process, the login process including selecting a library of images stored in the computer device, setting nicknames for the selected library, uploading the selected library of images to the server and generating a login account. | 2016-03-17 |
20160078219 | AUTHENTICATION USING PROOF OF WORK AND POSSESSION - Password-based authentication in which the authenticating entity uses proof of work based on the password as well as proof of possession of the password in order to authenticate to an authentication system, both of which provided by the authenticating entity to the authentication system at setup. In subsequent authentication attempts, the authentication system will compare any proof of possession and proof of work received in the request against this initially set up proof of possession and proof of work to perform authentication. The authentication system might perform work on the proof of work to generate a further proof of work that is then compared against a further proof of work that the authentication system generated at the time the authentication mechanism was originally set up. Upon subsequent authentication requests, the authenticating entity need not regenerate the proof of work, but instead provides the stored proof of work. | 2016-03-17 |
20160078220 | POLICY ENFORCEMENT IN A TOPOLOGY ABSTRACTION SYSTEM - A capability for providing policy enforcement in a topology abstraction system is presented. The capability for providing policy enforcement in a topology abstraction system may support use of topology abstraction policies to control abstraction of topology information of a topology (e.g., a network topology of a communication network or any other suitable type of topology). The capability for providing policy enforcement in a topology abstraction system providing an abstract representation of a topology may support use of topology abstraction policies to control selection (or acceptance) of topology elements for inclusion within the abstract representation of a topology and filtering (or rejection) of topology elements from being included within the abstract representation of a topology. The capability for providing policy enforcement in a topology abstraction system providing an abstract representation of a topology may support use of topology abstraction policies to control clustering of topology elements selected for inclusion within the abstract representation of the topology. | 2016-03-17 |
20160078221 | AUTOMATED VULNERABILITY AND ERROR SCANNER FOR MOBILE APPLICATIONS - In an embodiment, a method comprises downloading an application program to a first storage coupled to a first device, wherein the application program comprises an encrypted portion based on a set of personally identifying data stored on the first storage; configuring the application program to load and execute a pre-compiled library when the application program is launched and which when executed by the first device, causes storing an unencrypted version of the application program on the first storage; launching the application program. | 2016-03-17 |
20160078222 | RETURNING TO A CONTROL TRANSFER INSTRUCTION - In an embodiment, the present invention includes a processor having a decode unit and an execution unit. The decode unit is to decode control transfer instructions and the execution unit is to execute control transfer instructions, the control transfer instructions including a call instruction and a return instruction. The processor is to operate in a first mode in which the processor is to raise a fault if a next instruction to be executed immediately after the return instruction is not the call instruction. | 2016-03-17 |
20160078223 | Hardware Isolated Secure Processing System Within A Secure Element - Systems and methods are provided that allow a secure processing system (SPS) to be implemented as a hard macro, thereby isolating the SPS from a peripheral processing system (PPS). The SPS and the PPS, combination, may form a secure element that can be used in conjunction with a host device and a connectivity device to allow the host device to engage in secure transactions, such as mobile payment over a near field communications (NFC) connection. As a result of the SPS being implemented as a hard macro isolated from the PPS, the SPS may be certified once, and re-used in other host devices without necessitating re-certification. | 2016-03-17 |
20160078224 | VALIDATING A TYPE OF A PERIPHERAL DEVICE - A plurality of virtual domains are isolated from one another by a virtual machine monitor (VMM), the plurality of virtual domains including a first guest domain and a privileged domain. Peripheral related instructions are isolated from the first guest domain. The privileged domain is to cause execution of the peripheral related instructions, where the peripheral related instructions upon execution validate a type of the peripheral device. | 2016-03-17 |
20160078225 | LABELING OBJECTS ON AN ENDPOINT FOR ENCRYPTION MANAGEMENT - Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility. | 2016-03-17 |
20160078226 | DETECTION OF A SECURITY EVENT - The present disclosure relates to an integrated circuit. The integrated circuit includes a memory controller. The integrated circuit includes a first memory coupled to the memory controller. The integrated circuit includes a processor core coupled to the memory controller. The integrated circuit includes a secure core that includes a second memory. The secure core is configured to inspect the first memory and detect a security event. | 2016-03-17 |
20160078227 | DATA PROCESSING SYSTEM SECURITY DEVICE AND SECURITY METHOD - Provided is a security device and method that protect a data processing system from various types of malicious code and prevent the divulgence of data and erroneous operation. The security device for a data processing system includes: an execution module configured to be called by a security loader when a stub file, including a security loader formed in a routine form and a stub composed of an original executable file, is executed, and to perform processing so that the original executable file restored from the stub by the security loader is executed; and a monitoring module configured to monitor the operation of the data processing system attributable to the execution of the restored original executable file. | 2016-03-17 |
20160078228 | METHOD AND APPARATUS FOR PROCESSING FILE - The embodiments of the present invention provide a method and apparatus for processing a file. By means of acquiring a target file to be scanned and then using recognition data of a deletable file to recognize the target file, so as to obtain a recognition result, the recognition result comprising the target file being a deletable file, the target file being an undeletable file or the target file being an unknown file, the embodiments of the present invention enable the deletion of the deletable file according to the recognition result. Since the recognized deletable file can be directly deleted without the need to perform virus scanning processing thereon and then pop up a corresponding alarm prompt regarding a confirmed virus file to remind a user to delete the virus file, the occupation of system resources of a terminal can be reduced, thereby improving the processing performance of the terminal. | 2016-03-17 |
20160078229 | System And Method For Threat Risk Scoring Of Security Threats - A system configured to generate a risk score for a threat activity including a digital device. The digital device configured to extract one or more threat events on a network based on metadata for one or more targeted digital devices on the network. Further, the digital device is configured to detect one or more incidents based on a correlation between at least a first threat event of the one or more threat events and a second threat event of the one or more threat events. And, the digital device is configured to generate a risk score for each of said one or more incidents. | 2016-03-17 |
20160078230 | CLIENT AUTHENTICATION AND DATA MANAGEMENT SYSTEM - Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function, role and rule-based policies, validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors and other virtual machine monitors or managers. | 2016-03-17 |
20160078231 | CLOUD-BASED SECURITY PROFILING, THREAT ANALYSIS AND INTELLIGENCE - An automated software vulnerability scanning and notification system and method provide an automated detection and notification regarding a software vulnerability. The operation of the system and the method includes obtaining software vulnerability information, periodically scanning a web application and a corresponding web server associated with an operator, and evaluating the periodic scans relative to the software vulnerability information to detect software vulnerabilities. Upon detection of a software vulnerability, a notification message is provided automatically to the operator regarding the software vulnerability. | 2016-03-17 |
20160078232 | COMPUTING DEVICE AND METHOD FOR ACCESSING FILES - A method for accessing files in a computing device includes presetting authorized electronic devices. When an electronic device is detected to be within a range of a wireless device of the computing device and an access request is received from the electronic device, the computing device determines whether the electronic device is authorized. When the electronic device is authorized, a user of the electronic device is allowed to access the computing device. When the electronic device is not authorized, the user is denied access to the computing device. | 2016-03-17 |
20160078233 | SYSTEM AND METHOD FOR DATA COLLECTION AND EXCHANGE WITH PROTECTED MEMORY DEVICES - A method, apparatus, and article of manufacture for collecting and exchanging data are disclosed. In one embodiment, the apparatus comprises a non-volatile memory device, which includes an interface for coupling the non-volatile memory device to a host system; non-volatile memory for storing data, including a plurality of executables at least two of which are executable on different operating systems or devices. The plurality of executables includes a data collection executable and a data transfer executable. The non-volatile memory device also includes a controller to cause execution of at least one executable in the plurality of executables, including the data collection executable and the data transfer executable, where execution of the data collection executable causes data to be collected and stored in the non-volatile memory, and execution of which causes the collected data to be transferred to a location external to the non-volatile memory device. | 2016-03-17 |
20160078234 | SYSTEM AND METHOD FOR AUTOMATED SECURITY TESTING - According to some embodiments, a list of files comprising each file in a data repository that is associated with the website is determined. A list of user roles comprising each user role in the data repository that is associated with the website is determined. Each file in the list of files based on each user role in the list of user roles is attempted to be accessed and a report indicating the success or failure of the attempt to access each file in the list of files based on each user role in the list of user roles is created. | 2016-03-17 |
20160078235 | DEVICE AND MANAGEMENT MODULE - A device holding control target data includes a management unit configured to manage the present life cycle state of the device; an authentication unit configured to authenticate a user and indicate a role of the user; a control unit configured to acquire a present life cycle state when a request to access the control target data is received, authenticate the user and acquire the role, acquire access possibility information based on the present life cycle state and the role, and control the access based on the access possibility information; and a prohibiting unit configured to compare a position/time allowed in operation plan information with a present position/time, and prohibit the access when these information items do not match, based on the operation plan information in which life cycle states are associated with positions and times that are allowed for state transitions of the life cycle states. | 2016-03-17 |
20160078236 | SYSTEM AND METHOD FOR PROGRAMMABLY CREATING AND CUSTOMIZING SECURITY APPLICATIONS VIA A GRAPHICAL USER INTERFACE - A system and method for programmably creating a security application via a graphical user interface. The method comprises: causing a display of a service stage GUI window including at least one security phase zone; receiving a selection of at least one security service including at least one security decision engine; causing a display of an event rule stage window including at least one event rule parameters zone; receiving a selection of at least one event rule related to the at least one SDE; causing a display of an event relationship stage GUI window including at least one rule selection zone; receiving a selection of at least one workflow rule and at least one action; and configuring the security application based on the selected at least one work rule and the selected at least one action. | 2016-03-17 |
20160078237 | PERVASIVE INTERMEDIATE NETWORK ATTACHED STORAGE APPLICATION - A Pervasive Intermediate Network Attached Storage Application (PINApp) enables users to digitally assign (pin/tack) a folder or drive to a public cloud storage service for the purpose of sharing their digital content with others. The PINApp enables users to engage the cloud storage services without the need to upload the digital content to the cloud in order for it to be viewed or shared. The PINApp can be used to unify all of the digital content stored on multiple devices and cloud services for a single owner or user. | 2016-03-17 |
20160078238 | DATA LEAKAGE PREVENTION SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING A PREDEFINED TYPE OF OPERATION ON PREDETERMINED DATA - A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use, an attempt to perform an operation on predetermined data that is protected using a data leakage prevention system is identified. Additionally, it is determined whether a type of the operation attempted includes a predefined type of operation. Furthermore, the operation on the predetermined data is conditionally prevented based on the determination to prevent circumvention of the protection of the data leakage prevention system. | 2016-03-17 |
20160078239 | DATA MANAGEMENT - An example method for managing data in accordance with aspects of the present disclosure includes receiving from a user in the computer network environment a policy about how a piece of data should be treated, an encryption of the piece of data, a signature of a cryptographic hash of the policy and a cryptographic key, requesting from a trust authority the cryptographic key to access the piece of data, transmitting an encryption of at least one share to the trust authority, wherein the at least one share is created by and received from the trust authority, receiving from the trust authority the cryptographic key, wherein the cryptographic key is recreated by a combiner using a subset of the at least one share, shares associated with the trust authority and shares associated with the combiner, and decrypting the encryption of the piece of data using the recreated cryptographic key. | 2016-03-17 |
20160078240 | DEVICE AND METHOD FOR PROVIDING SECURITY IN REMOTE DIGITAL FORENSIC ENVIRONMENT - An apparatus and method for collecting digital evidence from a target system to be analyzed at a remote location and then providing security in a remote digital forensic environment based on the collected digital evidence. The method of providing security includes making, by a security providing apparatus, an evidence collection request for collection of evidence of an evidence collection-target apparatus from an evidence collection agent in a remote digital forensic environment, collecting evidence data corresponding to the evidence collection request from the evidence collection agent, verifying the evidence data based on a signature value of the evidence data collected from the evidence collection agent, generating evidence analysis data based on the verified evidence data, verifying the evidence analysis data based on a signature value of the evidence analysis data, and providing security for the evidence collection-target apparatus based on results of the verification of the evidence analysis data. | 2016-03-17 |
20160078241 | GENERATION AND USE OF A MODIFIED PROTECTED FILE - Generating a modified protected file is disclosed, including: renaming a primary content object of a protected file; and creating a modified protected file based at least in part by inserting into the protected file a replacement object for the renamed primary content object. Using the modified protected file is disclosed, including: determining that a file includes a renamed primary content object; and redirecting a data access operation to the renamed primary content object. | 2016-03-17 |
20160078242 | APPARATUS FOR PROCESSING WITH A SECURE SYSTEM MANAGER - Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of non-secure executable instructions on secure data entities unless the non-secure executable instructions are recorded in a permitted instruction record, and prohibiting execution of non-secure executable instructions if the non-secure executable instructions are recorded in a prohibited instruction record. The apparatus includes a processor, at least one non-secure data entity, and secure data entities including: a communication monitor adapted to detect communication among secure and non-secure data entities; a permitted instruction record; a first prohibitor adapted to prohibit execution of non-secure executable instructions on secure data entities unless the non-secure executable instructions are recorded in the permitted instruction record; a prohibited instruction record; and a second prohibitor adapted to prohibit execution of non-secure executable instructions if the non-secure executable instructions are recorded in the prohibited instruction record. | 2016-03-17 |
20160078243 | SECURED FILE SYSTEM MANAGEMENT - Systems and methods for establishing a secure file system are disclosed, in which system endpoints such as files and directories in a file system are protected using a security appliance. The security appliance protects each endpoint in the file system from unauthorized access by making those endpoints invisible to unauthorized users. The security appliance organizes users and endpoints into various communities of interest (COI). A user COI groups users such that all users associated with that particular COI have authorization to view the same one or more endpoints located in file storage. | 2016-03-17 |
20160078244 | SECURED FILE SYSTEM MANAGEMENT - Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of interest (COI) key obtained from a security appliance matches a COI key associated with a file structure managed by the file system manager that is the subject of a file system request issued by a caller. The method further includes identifying an entry included in a key bank associated with the COI key and the file structure that is the subject of the file system request, the key bank storing encrypted versions of a metadata key. The method also includes decrypting the metadata key using the COI key, decrypting at least one block encryption key using the metadata key, and decrypting a block of data associated with the at least one block encryption key. | 2016-03-17 |
20160078245 | DATA STORAGE SYSTEMS AND METHODS - Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file. | 2016-03-17 |
20160078246 | Notification of Blocking Tasks - A computing device may be configured to generate and execute a task that includes one or more blocking constructs that each encapsulate a blocking activity and a notification handler corresponding to each blocking activity. The computing device may launch the task, execute one or more of the blocking constructs, register the corresponding notification handler for the blocking activity that will be executed next with the runtime system, perform the blocking activity encapsulated by the blocking construct to request information from an external resource, cause the task to enter a blocked state while it waits for a response from the external resource, receive an unblocking notification from an external entity, and invoke the registered notification handler to cause the task to exit the blocked state and/or perform clean up operations to exit/terminate the task gracefully. | 2016-03-17 |
20160078247 | SECURITY EVALUATION SYSTEMS AND METHODS FOR SECURE DOCUMENT CONTROL - A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score. The composite security score may be used to control access to a document, either alone or in addition to other criteria. | 2016-03-17 |
20160078248 | RULE-BASED ACCESS CONTROL LIST MANAGEMENT - Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user. | 2016-03-17 |
20160078249 | ENHANCED PRIVACY FOR PROVISION OF COMPUTER VISION - Methods, apparatuses and storage medium associated with providing enhanced privacy during usage of computer vision are disclosed. In embodiments, an apparatus may include one or more privacy indicators to indicate one or more privacy conditions of the apparatus in association with provision of computer vision on the apparatus. The apparatus may further include a privacy engine coupled with the one or more privacy indicators, and configured to pre-process images from an image source of the apparatus associated with the provision of computer vision to the apparatus, to increase privacy for a user of the apparatus, and to control the one or more privacy indicators. In embodiments, the apparatus may include means for blanking out one or more pixels with depth values identified as greater than a threshold. Other embodiments may be described and claimed. | 2016-03-17 |
20160078250 | REMAPPING CONSTANT POINTS IN A WHITE-BOX IMPLEMENTATION - A non-transitory machine-readable storage medium encoded with instructions for execution by a keyed cryptographic operation by a cryptographic system mapping an input message to an output message, wherein the cryptographic operation includes at least one round including a non-linear mapping function configured to map input data to output data, including: instructions for determining that the input data has a diversification number less than a diversification level threshold number; instructions for remapping the input data to a remapped input data, wherein the remapped input data corresponds to an input data having a diversification number greater than or equal to the diversification threshold value, and instructions for inputting the remapped input data into the non-linear mapping function to obtain output data. | 2016-03-17 |
20160078251 | KEY STORAGE AND REVOCATION IN A SECURE MEMORY SYSTEM - A technique for providing access to a first storage structure of a system includes exposing a first key of a plurality of first keys stored in a second storage structure in response to a select code based on a plurality of corresponding select records stored in one-time programmable storage elements of the second memory structure. The technique includes providing the first key as a current first key of a memory access controller. Only one of the plurality of first keys stored in the second storage structure may be exposed at a time and other first keys of the plurality of first keys stored in the second storage structure are inaccessible from the second storage structure at the time. | 2016-03-17 |
20160078252 | ADDRESS DEPENDENT DATA ENCRYPTION - Encryption of data within a memory | 2016-03-17 |
20160078253 | DEVICE HAVING A SECURITY MODULE - A device securely accesses data in a memory via an addressing unit which provides a memory interface for interfacing to a memory, a core interface for interfacing to a core processor and a first and second security interface. The device includes a security processor HSM for performing at least one security operation on the data and a remapping unit MMAP. The remapping unit enables the security processor to be accessed by the core processor via the first security interface and to access the memory device via the second security interface according to a remapping structure for making accessible processed data based on memory data. The device provides a clear view on encrypted memory data without requiring system memory for storing the clear data. | 2016-03-17 |
20160078254 | DISPLAY DEVICE HAVING SECURITY FUNCTION - Display device includes timing controller, display panel, data driver, and scan driver. The timing controller includes an authentication processing unit configured to generate an authentication result based on an authentication control signal. The timing controller converts an input image data signal to data driver control signal and scan driver control signal when the authentication result represents success. The timing controller deactivates the data driver control signal and the scan driver control signal when the authentication result represents fail. The display panel includes plurality of pixels. The data driver generates plurality of data signals based on the data driver control signal and provides the data signals to the pixels through plurality of data signal lines. The scan driver generates plurality of scan signals based on the scan driver control signal and provides the scan signals to the pixels through plurality of scan signals lines. | 2016-03-17 |
20160078255 | METHOD AND DEVICE FOR READING RFID/UHF LABEL BASED ON AUDIO INTERFACE - A method and a device for reading RFID/UHF label based on an audio interface are disclosed. According to the method, a built-in software module in an electronic device converts a first digital signal into an analogue signal capable of being transmitted via the audio interface; the analogue signal received by the audio interface is converted into a second digital signal via an audio communication circuit; then the RFID/UHF controller for digital signal control reads information from the RFID/UHF label; the RFID/UHF controller modulates and sends signals of a plurality of different frequency points, and the signal of every frequency point forms a signal channel. Compared with the prior art, the present invention can keep long-distance communication between the electronic device and a plurality of labels. | 2016-03-17 |
20160078256 | RFID SYSTEM AND METHOD TO MONITOR A SET OF OBJECTS - According to an aspect the present invention provides an RFID method to collate a set of objects. According to various aspects the method includes using an interrogator to radiate a field of radio-frequency energy to a correlated set containing at least a first object-transponder pair, energizing an ASIC portion of a transponder using energy received by said at least one transponder, and initializing the ASIC, and broadcasting an identity signal therefrom. According to an aspect, the interrogator an antenna and a unique ASIC. | 2016-03-17 |
20160078257 | ULTRAHIGH FREQUENCY RFID (RADIO FREQUENCY IDENTIFICATION) READER WITH SIGHTING FUNCTION - An ultrahigh frequency (UHF) radio frequency identification (RFID) reader with sighting function for reading RFID tag is mainly formed by a RF antenna and a controller, wherein the physical appearance of the RF antenna is formed with a sighting portion. In reading operation, users can aim the sighting portion of the RF antenna at a RFID tag at a remote location by visual mode so that the RF antenna can finish the reading operation promptly and accurately. Therefore, the reading accuracy and efficiency and power consumption can be improved. | 2016-03-17 |
20160078258 | IDENTIFICATION OF BIOLOGICAL SAMPLES - A method for coding and identification of biological samples for in vitro fertilisation comprises the steps of applying to receptacles intended for unfertilised eggs and sperm, respectively, an identification code characteristic of the patient; placing unfertilised eggs and sperm, respectively, in the receptacles; storing, transporting and admixing the respective samples in receptacles which each carry the same code; and implanting the resulting embryo in the patient. The identification code may based on RFID technology, in which sample vessels ( | 2016-03-17 |
20160078259 | SYSTEM AND METHOD FOR INTERACTION BETWEEN PHYSICAL OBJECTS AND DIGITAL APPLICATIONS - The present invention envisages a method and a system for interaction between physical objects and digital applications located, for example in mobile devices that comprises the steps of: a) the manufacturer generates an ID; b) stores the ID in a first storage element and c) attaches the first storage element to a physical object. Given that such storage elements has a low storage capability, the method envisages a step d) wherein the ID and a set of attributes of the physical object are stored in a server by a first device and a step e) wherein a second device communicates, by a digital application, with the server to retrieve the set of attributes stored therein. | 2016-03-17 |
20160078260 | ELECTRICAL INTERFACE MODULE - The object of the invention is an electrical interface module. The electrical interface module has a memory device for storing data and an integrated NFC interface that provides data to an external reading device, wherein the electrical interface module contains a carrier on which the memory device and the integrated NFC interface are arranged. | 2016-03-17 |
20160078261 | METHOD OF OPERATING AN RFID-ENABLED MOBILE TELEPHONE, MOBILE TELEPHONE, REMOTE UNIT AND APPLICATION PROGRAM PRODUCT - A method is disclosed of operating a RFID-enabled mobile telephone for indicating information of at least one portable object (e.g. key, passport, glasses or medical box). The mobile telephone has an RFID communication unit and the method includes operating the RFID communication unit for receiving an RFID signal from an RFID tag that is attached to the at least one portable object; evaluating the received RFID signal for determining tag information; and presenting the tag information to the user of the mobile telephone for indicating current information of the at least one portable object. This way, up-to-date information of the portable objects is available precisely when needed. | 2016-03-17 |
20160078262 | LOGISTICS SYSTEM - A logistics system wirelessly communicates with an internet of things (ITO) system. The logistics system includes a tag unit, a data collection unit and a control unit. The tag unit is coupled to goods and storing tag information of the goods. The data collection unit is coupled to a vehicle and configured to read the tag information of the goods from the tag unit and determine loading status of the goods. The control unit wirelessly communicates with the data collection unit and the ITO system, the control unit receiving the tag information and the loading status of the goods from the data collection unit and synchronizes to the ITO system. | 2016-03-17 |
20160078263 | INTERROGATOR SYSTEM, APPARATUS AND METHOD - The present invention relates to the identification of RFID devices that are arranged closely together and placed on shelving for logistical and storage purposes. Furthermore, the aspects of the present invention relate to an arrangement and/or layout of antenna coils for example in an interrogator. There is disclosed a RFID interrogator and/or method of interrogating comprising, in one form, an RFID docking station consisting of a stationary RFID interrogator with RFID shelving antennas and mobile cabinets with shelves where the docking station antennas and the cabinet shelves interpenetrate when the mobile cabinet is offered up to the docking station such that the antennas are able to identify tagged items on the cabinet shelves. | 2016-03-17 |
20160078264 | REAL TIME ELECTRONIC ARTICLE SURVEILLANCE AND MANAGEMENT - A real time electronic article surveillance system that can identify individual items with an RFID tag affixed and track the items using one or more than one computer communicatively connected to RFID detectors, at least one display and audio visual device operably connected to each other using network and peripheral interfaces. The computers comprising instructions for performing real time inventory and analysis of at least 90% of all the RFID tags and storing the inventory and analysis in a database by a user using a user interface. | 2016-03-17 |
20160078265 | SYSTEM FOR DETECTING UV-FLUORESCENT INDICA WITH A CAMERA - A system for detecting UV-light-fluorescent indicia ( | 2016-03-17 |
20160078266 | INDICIA DECODING DEVICE WITH SECURITY LOCK - A securable indicia encoding system with a lock receiving portion is disclosed herein. In one illustrative embodiment, a securable indicia decoding device may include an imaging subsystem, a memory, a processor, and a housing. The imaging subsystem may include an image sensor array and an imaging optics assembly operative for focusing an image onto the image sensor array. The memory may be capable of storing frames of image data comprising data communicated through the read-out portion of at least some of the pixels during the imaging operation. The processor may be operative for receiving one or more of the frames of image data from the data storage element and performing a decode operation for attempting to decode a decodable feature represented in at least one of the frames of image data. The housing may encapsulate the illumination subsystem and the imaging subsystem. The housing may include a lock receiving portion for receiving a security lock. | 2016-03-17 |
20160078267 | METHOD AND APPARATUS FOR OPTICALLY READING OUT INFORMATION STORED IN A BARCODE - In a method, whether there is a first bar having a width and located at at least one of both ends of a first black and white pattern is determined. The width of the bar is greater than a maximum width of a second bar. The maximum width of the second bar appears in a second black and white pattern assuming that the black and white pattern is part of the first barcode. The first black and white pattern is determined as readout data of the second barcode when it is determined that there is the first bar having the width greater than the maximum width of the second bar and located at at least one of both ends of the first black and white pattern. | 2016-03-17 |
20160078268 | FINGERPRINT SCANNING METHOD - A computer-implemented method entails capturing a digital fingerprint of a finger using a fingerprint-capturing device, collecting pressure measurements using pressure sensors associated with the fingerprint-capturing device as the finger contacts the fingerprint-capturing device, determining a finger-sensor contact direction from the pressure measurements and storing the finger-sensor contact direction in association with the digital fingerprint for subsequent biometric authentication. | 2016-03-17 |
20160078269 | FINGERPRINT SENSOR WITH SYNC SIGNAL INPUT - The present invention relates to a fingerprint sensor comprising a voltage supply interface for receiving a supply voltage; a sensor communication interface for providing the fingerprint pattern signal to external circuitry; a synchronization input for receiving a sync signal interpreted to correspond to a first logical state when the sensor ground potential is at the first potential and to a second logical state, different from the first logical state, when the sensor ground potential is at the second potential, and a plurality of sensing elements, each comprising a sensing structure. The sensing elements are configured such that the potential of the sensing structures follows the potential of the modulated fingerprint sensor ground potential, and the timing of the sampling of sensing signals from the sensing elements is based on perceived state transitions of the sync signal. | 2016-03-17 |
20160078270 | Fingerprint Sensing and Calibration Apparatus - Methods and Apparatuses are provided for a thin high contrast optical acquisition system for fingerprint recognition. In one embodiment, a method of capturing images of a fingerprint may include emitting light from a set of light sources to generate a scattered light from the fingerprint, determining a set of sensor arrays located between an inner boundary and an outer boundary from the set of light sources based on thickness and refractive index of one or more panels between the set of light sources and the fingerprint, activating the set of sensor arrays to capture the scattered light from the fingerprint, and processing the scattered light captured by the set of sensor arrays in parallel to generate a topography of the fingerprint. | 2016-03-17 |
20160078271 | TOUCHLESS FINGERPRINTING ACQUISITION AND PROCESSING APPLICATION FOR MOBILE DEVICES - This disclosure is of a biometric authentication system and method. The system includes a mobile device having a camera and a screen, and a database. The system is programmed to superimpose on the screen an overlay of a finger over a real-time image seen by the camera, capture an image of a fingerprint of a user with the camera, compare the captured image with an authenticated fingerprint image that is stored in the database, and return a positive result if the compared images match. | 2016-03-17 |
20160078272 | METHOD AND SYSTEM FOR DISMOUNT DETECTION IN LOW-RESOLUTION UAV IMAGERY - A method for dismount detection in low-resolution UAV imagery, comprising providing an input image, processing a greyscale distribution of the input image, determining a rough classification in the input image based on the grayscale distribution, determining the optimal parameters based on the rough classification, estimating one or more potential dismount locations, applying an area filter to the one or more potential dismount locations, removing undesired locations from the one or more potential dismount locations, applying one or more secondary filters to the resulting one or more potential dismount locations, assigning a probability to the one or more potential dismount locations, and assessing desirability of the one or more potential dismount locations. | 2016-03-17 |
20160078273 | GLOBAL-SCALE DAMAGE DETECTION USING SATELLITE IMAGERY - A system for performing global-scale damage detection using satellite imagery, comprising a damage detection server that receives and analyzes image data to identify objects within an image via a curated computational method, and a curation interface that enables a user to curate image information for use in object identification, and a method for a curated computational method for performing global scale damage detection. | 2016-03-17 |
20160078274 | METHOD AND FINGERPRINT SENSING SYSTEM FOR AUTHENTICATING A CANDIDATE FINGERPRINT - The present invention generally relates to a method for authenticating a candidate fingerprint using a fingerprint authentication system, and specifically to the possibility of using personalized fingerprint sensor setting for a fingerprint sensor comprised with the fingerprint authentication system. The invention also relates to a corresponding electronic device and to a computer program product. Advantages with the invention include a minimized processing time for acquiring a good quality fingerprint image, thus increasing user convenience. | 2016-03-17 |
20160078275 | Apparatus, Method, and System for Image-Based Human Embryo Cell Classification - Apparatuses, methods, and systems for automated cell classification, embryo ranking, and/or embryo categorization are provided. An apparatus includes a classification module configured to apply classifiers to images of one or more cells to determine, for each image, a classification probability associated with each classifier. Each classifier is associated with a distinct first number of cells, and is configured to determine the classification probability for each image based on cell features including one or more machine learned cell features. The classification probability indicates an estimated likelihood that the distinct first number of cells is shown in each image. The classification module is further configured to classify each image as showing a second number of cells based on the distinct first number of cells and the classification probabilities associated therewith. The classification module is implemented in at least one of a memory or a processing device. | 2016-03-17 |
20160078276 | GRAPHICAL USER INTERFACE FOR ANALYSIS OF RED BLOOD CELLS - Methods and systems for generating a graphical user interface for analysis of red blood cells. The method generates a first view of the graphical user interface by highlighting red blood cells in an image that are classified into at least one group indicated by a user input. The method also generates a second view by extracting individual red blood cells being classified into the at least one group indicated by the user input from the image of red blood cells and displaying them group-wise. | 2016-03-17 |
20160078277 | METHODS, SYSTEMS AND DEVICES FOR ELECTRONIC NOTARY WITH SIGNATURE AND BIOMETRIC IDENTIFIER - A method, system and device are provided for authenticating a signature made by a signer. When the signer is making the signature a biometric quantity associated with the signer may be sampled. The sampling generates a sequence of biometric samples of the biometric quantity. Continuity of generated sequence of biometric samples of the biometric quantity is validated. Each of the biometric samples of the biometric quantity in the generated sequence is validated. The signature of the signer may be authenticated when the generated sequence of biometric samples is validated, and a continuity of the biometric samples is validated. | 2016-03-17 |
20160078278 | WEARABLE EYEGLASSES FOR PROVIDING SOCIAL AND ENVIRONMENTAL AWARENESS - Eyeglasses include a left lens, a right lens and an IMU sensor and a GPS unit. A camera and a memory are coupled to the eyeglasses. A processor is connected to the IMU, the GPS unit and the at least one camera and is adapted to recognize objects by analyzing image data based on the stored object data and inertial measurement data or location data. The processor is also adapted to determine a desirable event based on the object, previously determined user data, and a time. The processor is also adapted to determine a destination based on the determined desirable event and determine a navigation path for navigating the eyeglasses to the destination based on the determined destination, image data, and inertial measurement data or location data. The processor is also adapted to determine output data based on the determined navigation path. A speaker is also provided. | 2016-03-17 |
20160078279 | IMAGE ANALYSIS USING A SEMICONDUCTOR PROCESSOR FOR FACIAL EVALUATION - Image analysis for facial evaluation is performed using logic encoded in a semiconductor processor. The semiconductor chip analyzes video images that are captured using one or more cameras and evaluates the videos to identify one or more persons in the videos. When a person is identified, the semiconductor chip locates the face of the evaluated person in the video. Facial regions of interest are extracted and differences in the regions of interest in the face are identified. The semiconductor chip uses classifiers to map facial regions for emotional response content and evaluate the emotional response content to produce an emotion score. The classifiers provide gender, age, or ethnicity with an associated probability. Localization logic within the chip is used to localize a second face when one is evaluated in the video. The one or more faces are tracked, and identifiers for the faces are provided. | 2016-03-17 |
20160078280 | IMAGE PROCESSING METHOD AND ELECTRONIC APPARATUS - An image processing method includes steps of: providing a source face image and a target face image; extracting facial features from the source face image and the target face image respectively; detecting feature dimensions of the facial features from the source face image and the target face image respectively; pairing the facial features from the source face image with the facial features from the target face image; and, forming an output face image by adjusting the facial features from the source face image in at least one of the feature dimensions according to the paired features from the target face image in the corresponding feature dimensions. | 2016-03-17 |
20160078281 | SECURE COMMUNICATION SYSTEMS AND METHODS - Systems and methods for determining whether a communication session is authorized are provided. In some aspects, a method includes initiating a communication session between a first user and a second user, and obtaining an identity attribute associated with a third user engaged in the communication session. The method also includes determining whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute. The method also includes determining whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user. | 2016-03-17 |
20160078282 | METHOD AND APPARATUS FOR EXTRACTING IMAGE FEATURE - At least one example embodiment discloses an image feature extracting method. The method includes determining a probabilistic model based on pixel values of pixels in a kernel, determining image feature information of a current pixel of the pixels in the kernel and determining whether to change the image feature information of the current pixel based on a random value and a probability value of the current pixel, the probability value being based on the probabilistic model. | 2016-03-17 |
20160078283 | METHOD OF EXTRACTING FEATURE OF INPUT IMAGE BASED ON EXAMPLE PYRAMID, AND FACIAL RECOGNITION APPARATUS - At least one example embodiment discloses a method of extracting a feature of an input image. The method includes constructing an example pyramid including at least one hierarchical level based on stored example images, generating a codebook in each of the at least one hierarchical level, calculating a similarity between the codebook and the input image, and extracting a feature of the input image based on the similarity. | 2016-03-17 |
20160078284 | OBJECT IDENTIFICATION APPARATUS AND OBJECT IDENTIFICATION METHOD - An object identification apparatus selects, for each partial area of an object in a registered image, a corresponding sample image from sample images based on feature quantities of the partial area, for objects in the registered image, sets a similarity of feature quantities for each partial area between objects of an identical individual and between objects of different individuals based on a similarity related to the selected sample images for each partial area, makes a discriminator learn based on the set similarity, acquires a similarity for each partial area between objects in an input image and the registered image, and determines whether the object in the input image is identical to the object in the registered image based on the acquired similarity and a result of discrimination by the discriminator. | 2016-03-17 |