14th week of 2016 patent applcation highlights part 33 |
Patent application number | Title | Published |
20160098483 | AUTOMATIC DOCUMENT CLASSIFICATION VIA CONTENT ANALYSIS AT STORAGE TIME - Techniques are disclosed for efficiently and automatically classifying textual documents or files. In some embodiments, the classification process is integrated into or otherwise made part of the storage function, such that when the user initiates a save process for a given file, the file is processed through a classifier prior to (or contemporaneously with) completing the save function. In some such embodiments, textual content of the file is analyzed using natural language processing to identify a main or substantial concept discussed in the file, and one or more corresponding tags are then assigned to that file. Subsequently, the user can access that file based on the one or more tags, for instance, through a user interface that allows the user to select one or more content categories associated with the assigned tags. The files can be text-based, but may include other content as well, such as images, video, and audio. | 2016-04-07 |
20160098484 | DATA SOURCE SECURITY CLUSTER - Methods, systems, and computer program for implementing data source security cluster are provided. Security tokens may be generated for a plurality of data sources. Clients may request a security token from each data source. The client may send the security tokens and a data query to a federation engine. The federation engine may generate a plurality of sub-queries from the query. The federation engine may match a sub-query and particular security token to a data source. The federation engine may validate each security token and send, to each data source, the matching sub-query for that data source. Each data source may send a result to a sub-query to the federation engine, which may join all of the results into a virtual view. | 2016-04-07 |
20160098485 | Field Value Search Drill Down - In embodiments of field value search drill down, a search system exposes a search interface that displays one or more events returned as a search result set. A field-value pair can be emphasized in the field-value pairs of an event displayed in the search interface, and a menu is displayed with search options that are selectable to operate on the emphasized field-value pair of the event. The menu includes the search options to add search criteria of the emphasized field-value pair to a search command in a search bar of the search interface, exclude the search criteria of the emphasized field-value pair from a search, or create a new data search based on the emphasized field-value pair. A selection of one of the search options in the menu can be received, and the search command in the search bar is updated based on the search option that is selected. | 2016-04-07 |
20160098486 | SEARCHING SYSTEM, METHOD AND P2P DEVICE FOR P2P DEVICE COMMUNITY - A searching system, searching method and P2P devices for a P2P device community are provided. An online server connects to a content management server and a P2P device community, respectively. The content management server includes a search engine and an index database, and each of the P2P devices of the P2P device community is provided with an indexed data and a weighted data. The index database is recorded with the indexed data associated with each of the P2P devices of the P2P device community, and the search engine searches the index database to generate a search result and then generates a weighted and sorted search result based on the weighted data, thereby achieving the object of searching important file data in the P2P device community. | 2016-04-07 |
20160098487 | SYSTEM AND METHOD FOR SEARCHING USING ORTHOGONAL CODES - A system for searching in accordance with an embodiment of the present invention includes: one or more sub nodes configured to generate one or more sub bloom filters corresponding to one or more object identification information; and a representative node configured to generate a representative bloom filter by applying an orthogonal code to each of said sub bloom filters and aggregating the sub bloom filters having the orthogonal code applied thereto, wherein, when the representative node receives a search request, the representative node is configured to apply the orthogonal code to the representative bloom filter and to determine whether object identification information included in the search request is included in sets corresponding to the sub bloom filters by referring to the representative bloom filter having the orthogonal code applied thereto. | 2016-04-07 |
20160098488 | Deriving and Using Interaction Profiles - Systems and methods for deriving and using an interaction profile are described. In one described method, a plurality of metrics indicating a level of satisfaction for search results is determined. The metrics comprise at least one of click-duration data, multiple-click data, and query-refinement data. The values of the metrics for a plurality of instances of an object, such as search results from a search engine, are determined. An interaction profile for the object, based at least in part on the values of the metrics for a plurality of instances of the first object, is then determined. This interaction profile may be used in a variety of ways, such as determining the quality of ranking algorithms and detecting undesirable search results. | 2016-04-07 |
20160098489 | LANDING PAGE SEARCH RESULTS - Systems and methods for providing content are disclosed. In an embodiment, information encoding at least one keyword that is associated with first content accessed by a user is received. A search query based at least in part on at least one keyword is executed to identify items. In response to a request from the user to access second content, a response is generated to the request that includes item information associated with at least a subset of the identified items. The response is provided to the user. | 2016-04-07 |
20160098490 | SUGGESTING ACTIONS FOR EVALUATING USER PERFORMANCE IN AN ENTERPRISE SOCIAL NETWORK - Disclosed are systems, methods, and computer program products for suggesting actions for evaluating user performance in an enterprise social network. In some implementations, a server of the enterprise social network identifies a message configured to be published to a feed of the enterprise social network. The message may comprise textual input received from a client machine associated with a first user of the enterprise social network. The server determines that the textual input comprises information evaluating a second user associated with the enterprise social network. The server provides data for display at the client machine, the data comprising a prompt to the first user to include the information related to the second user in a performance evaluation record for the second user. | 2016-04-07 |
20160098491 | SERVICE PROVIDER SYSTEM AND SERVICE PROVIDER METHOD - A service provider system and a service provider method are disclosed herein. The service provider system includes a service provider device and a mobile device. The mobile device includes a network module, a processing module and a storage module. The network module of the mobile device connects to the service provider device through a wireless network and receives a service description file provided by the service provider device. The processing module is configured to execute a program code stored in the storage module so as to implement a synthesizing method of an application program. The synthesizing method includes the following steps: parsing multiple service description data from the service description file; and generating an application program corresponding to the service description file according to the service description data and a resource list corresponding to the mobile device. | 2016-04-07 |
20160098492 | ADMINISTRATIVE TOOL AND PHYSICAL EXECUTION PLAN INTERFACE FOR PLUG-IN ARCHITECTURE OF BUSINESS INTELLIGENCE PLATFORM USING DATA SOURCE CARTRIDGES - Embodiments implement a plug-in architecture supporting adding new data sources to a legacy federated database without the need to recode a federated database manager software module. The federated database manager software module includes an administrative tool and a plug-in framework for interfacing with a data source cartridge. The data source cartridge supplies metadata including a feature table of a newly added data source to the framework and creates a physical query for the newly added data source based on an execution plan generated by the federated database manager software module. The administrative tool generates presentation panes including new data sources added to the legacy federated database. | 2016-04-07 |
20160098493 | Constructing Queries Using Query Filters on Online Social Networks - In one embodiment, a method includes receiving a first search query including a selection of a first query-domain. The first query-domain may correspond to a first object-type. The method includes identifying a first set of objects of the plurality of objects matching the first object-type. The method includes sending a first search-results page responsive to the first search query. The first search-results page may include references to one or more of the identified objects from the first set of objects and one or more query-filter elements. Each query-filter element may correspond to a query-filter associated with the first query-domain. Each query-filter element may be activatable to apply the associated query-filter to the identified objects. The method includes receiving a second search query including a selection of one or more of the query-filters in response to the first user activating the corresponding query-filter elements. | 2016-04-07 |
20160098494 | INTEGRATION OF ANALYSIS WITH MULTI-USER CAD - As disclosed herein, a computer-implemented method includes detecting a first change made to a local CAD model by an analysis module on a first CAD client, propagating the first change to a centralized CAD model via a collaborative CAD server, receiving a second change from the centralized CAD model via the collaborative CAD server, wherein the second change was communicated to the centralized CAD model by a second CAD client that originated the second change, and updating the local CAD model with the second change. A corresponding computer system and computer readable medium are also disclosed herein. | 2016-04-07 |
20160098495 | SURFACE MODIFIED UNIT CELL LATTICE STRUCTURES FOR OPTIMIZED SECURE FREEFORM FABRICATION - Aspects of the present disclosure relate generally to preparing models of three-dimensional structures. In particular, a model of a three-dimensional structure constructed of porous geometries is prepared. A component file including a porous CAD volume having a boundary is prepared. A space including the porous CAD volume is populated with unit cells. The unit cells are populated with porous geometries having a plurality of struts having nodes on each end. The space is populated with at least one elongated fixation element extending beyond the boundary to produce an interlocking feature enabling assembly or engagement with a mating structure. | 2016-04-07 |
20160098496 | JOINT PROBABILISTIC MODELING AND INFERENCE OF INTERSECTION STRUCTURE - A method of modeling an intersection structure of a roadway. The method includes receiving a first data set including road lane information, and receiving a second data set including vehicle trajectory information for an intersection structure of a roadway. The method includes determining lane node locations from at least one of the first and second data sets. A set of potential links between the lane node locations may be compiled. The method may further include assessing, for each link, a probability that the link is a valid link, and assigning each link with a probability value. The links may be filtered based on a predetermined threshold probability value and a set of valid links is generated. A model of the intersection structure is created based on the set of valid links. | 2016-04-07 |
20160098497 | BOUNDARY BASED POWER GUIDANCE FOR PHYSICAL SYNTHESIS - A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a logical design, and a processor to execute a synthesis engine. The processor performs a baseline synthesis to obtain a baseline physical design using timing constraints and an overall power budget, computes power assertions, performs a re-synthesis using the timing constraints and the power assertions to obtain a new physical design, compares the new physical design with the baseline physical design to determine a degradation of the new physical design in comparison with the baseline physical design, reduces a weighting of the power assertions relative to the timing constraints based on the degradation, and iteratively performs the re-synthesis, compares the new physical design with the baseline physical design, and reduces the weighting until the degradation is below a threshold value. | 2016-04-07 |
20160098498 | TUNABLE MINIATURIZED PHYSICAL SUBSURFACE MODEL FOR SIMULATION AND INVERSION - Conventional computational simulation and inversion of subsurface flow is expensive, which is wasteful in terms of time and energy consumption. The present invention discloses a process for implementation of mathematical techniques such as forward simulation, sensitivity analysis, and inversion to physical microstructure models for subsurface fluid simulation. This process not only offers accurate and reliable results, but also is cost effective. | 2016-04-07 |
20160098499 | CONTACT MODELING BETWEEN OBJECTS - To deal with lightweight and other gear modification in contact modeling, the compliance of the gear is refined for the simulation. The compliance of the teeth of the gear due to contact is separated into bulk and local contact compliance. The bulk compliance accounts for the web variation and is pre-calculated to reduce processing time during simulation. The local compliance is treated quasi-statically to limit time integration during the simulation. One or more of other possible features are included in the simulation, such as calculating compliance resulting from contact of one gear with multiple objects instead of just one pair of gears, neglecting compliance of a stiff gears, accounting for coupling between successive teeth pairs without bulk compliance calculation in the simulation, accounting for gear blank geometry, accounting for a dynamic response of the gear flexibility by assuming that only a part of the gear bulk compliance responds quasi-statically, and modeling non-wheel like shapes for the gear. | 2016-04-07 |
20160098500 | MODEL-BASED ECHO CURVE PREDICTION FOR PULSED RADAR - A method of modeling a pulsed radar gauge (PRG) that includes a transceiver coupled by a process connection to a probe installed on a tank having at least one product material therein. A mathematical model is provided that includes (i) dielectric properties and dimensions of materials used in the process connection, (ii) at least one tank dimension, (iii) dielectric characteristics of the product material, and (iv) a probe length. Using a processor implementing a stored echo prediction algorithm that utilizes the mathematical model inputting pulse characteristics including a shape of an input radar pulse launched by a transmitter of the transceiver onto the probe into the mathematical model, and generating a predicted echo curve from the mathematical model. | 2016-04-07 |
20160098501 | VIRTUAL SENSORS SUPPORTED BY A COMPUTER AIDED DESIGN (CAD) MODEL AND SOFTWARE - Virtual sensors may be provided to accept outputs of physical sensors as inputs in a model of a system that represents a product. The outputs of the virtual sensors are calculated from physical sensor outputs. In particular, the virtual sensors are calculated by exploiting information and analysis provided in a computer aided design (CAD) environment, including a CAD model and CADs simulation engine. | 2016-04-07 |
20160098502 | MULTIPHASE FLOW SIMULATOR SUB-MODELING - A method can include receiving a model of a fluid production network where the model includes a plurality of sub-models; synchronizing simulation of the plurality of sub-models with respect to time; and outputting values for fluid flow variables of the model. | 2016-04-07 |
20160098503 | ANALYSIS OF A STRUCTURE MODELED WITH INTRAPLY INTERFACE ELEMENTS - A method of analyzing a structure includes producing a finite element model of the structure having fibers embedded therein, and including one or more plies. This may include performing a discretization of a digital model of the structure in which each ply of the one or more plies is represented by a mesh of finite elements aligned with a direction of uni-directional fibers embedded in the ply. Producing the finite element model may also include adding a fiber-aligned intraply interface element between selected adjacent finite elements in the mesh of each ply to capture potential intraply failure modes. And the method may include performing a finite element method (FEM) failure analysis of the finite element model under a load, with the FEM failure analysis producing an output that indicates an extent of any of the potential intraply failure modes that result from the finite element model under the load. | 2016-04-07 |
20160098504 | EFFICIENT POWER ANALYSIS - Embodiments relate to the emulation of circuits, and tracking states of signals in an emulated circuit for performing power analysis. A host system incorporates power analysis logic into a design under test (DUT). An emulator emulates the DUT along with the incorporated power analysis logic. Based on the power analysis logic, during a power analysis clock cycle, the emulator selects a signal from a plurality of signals of the DUT. The emulator determines whether a state event is detected for the selected signal. If the state event is detected, a state count is updated for the selected signal that indicates a number of state events detected for the selected signal during emulation of the DUT. If the state count reaches a threshold number based on the update, the emulator transmits a count update signal to the host system indicating that the state count reached the threshold number. | 2016-04-07 |
20160098505 | EFFICIENT EMULATION AND LOGIC ANALYSIS - An emulation environment includes a host system and an emulator. The host system configures the emulator to load a design under test (DUT) and the emulator emulates the DUT. The emulator includes one or more design field-programmable gate arrays (FPGAs) that emulate the DUT. In addition, the emulator includes at least one system FPGA with a logic analyzer and multiple virtual FPGA. The virtual FPGAs emulate sections of the DUT. By the virtual FPGAs emulating sections of the DUT, the logic analyzer is able to obtain for performing logic analysis certain signals from the virtual FPGAs, rather than from the design FPGAs. | 2016-04-07 |
20160098506 | SIGNAL DELAY FLIP-FLOP CELL FOR FIXING HOLD TIME VIOLATION - A signal delay cell for use in resolving hold time violations in an IC has a first multiplexer having a first functional data input node and a scan data input node TI and a second multiplexer having a second functional data input node, a second input node connected to the output of the first multiplexer and a flip-flop module. The propagation of a data input signal applied to the first multiplexer is delayed, and the hold margin of the flip-flop module is increased by transit through the first multiplexer. The signal delay cell is available to replace a flip-flop having a scan data hold problem, and also for use in solving a functional data violation in the same or another cell. | 2016-04-07 |
20160098507 | INTEGRATED CIRCUIT DEVICE CONFIGURATION METHODS ADAPTED TO ACCOUNT FOR RETIMING - A method of configuring an integrated circuit device with a user logic design includes analyzing the user logic design to identify timing requirements of paths within the user logic design, determining latency requirements along those paths, routing the user logic design based on availability of storage elements for incorporation into those paths to satisfy the latency requirements, and retiming the user logic design following that routing by incorporating at least some of the storage elements. | 2016-04-07 |
20160098508 | METHOD AND SYSTEM FOR DESIGNING SEMICONDUCTOR DEVICE - A method of designing a semiconductor device and system for designing a semiconductor device are provided. The method of designing a semiconductor device includes providing a standard cell layout which includes an active region and a dummy region; determining a first fin pitch between a first active fin and a second active fin in the active region and a second fin pitch between a first dummy fin and a second dummy fin in the dummy region; placing the first and second active fins in the active region and the first and second dummy fins in the dummy region using the first and second fin pitches; and verifying the standard cell layout. | 2016-04-07 |
20160098509 | INTEGRATED CIRCUIT AND METHOD OF DESIGNING LAYOUT OF INTEGRATED CIRCUIT - A method of designing a layout of an integrated circuit (IC) includes placing a first cell in the layout, placing a second cell in the layout adjacent to the first cell at a first boundary between the first and second cells, and generating a plurality of commands executable by a processor to form a semiconductor device based on the layout. The first cell includes a first pattern and a second pattern. The first and second patterns are adjacent to the first boundary, the first and second patterns have different colors, and a first boundary space between the first pattern and the first boundary is different from a second boundary space between the second pattern and the first boundary. | 2016-04-07 |
20160098510 | Integrated Circuit Design Using Pre-Marked Circuit Element Object Library - This disclosure describes an approach to create a library of pre-marked circuit element objects and use the pre-marked circuit element object library to design and fabricate an integrated circuit. Each of the circuit element objects are “pre-marked” and include embedded voltage markers having independent pre-assigned voltage values for each terminal in the circuit element object. When a circuit designer inserts a pre-marked circuit element object in a schematic design, the design tool determines whether each of the circuit element object terminal's pre-assigned voltage values match their corresponding nets to which they are connected. When the circuit designer completes the schematic design that includes valid nets throughout the schematic design, the design tool generates a layout design from the schematic design. The design tool, in turn, generates mask layer data from the layout design when the layout design passes verification testing. | 2016-04-07 |
20160098511 | MATRIX REDUCTION FOR LITHOGRAPHY SIMULATION - A matrix is produced for a semiconductor design. Interactions between mask edges in forming semiconductor shapes are determined and a graph created that shows those interactions. The graph is then partitioned into groups using a coloring algorithm, with each group representing one or more non-interacting mask edges. A lithography simulation is performed for each group, with the edges of that group perturbed, but the edges of other groups unmoved. The partial derivatives are calculated for the edges of a group based on the simulation with those edges perturbed, and used to populate locations in a Jacobian matrix. The Jacobian matrix is then used to solve an Optical Proximity Correction (OPC) problem by finding a mask edge correction vector for a given wafer targeting error vector. | 2016-04-07 |
20160098512 | HIERARCHICAL FILL IN A DESIGN LAYOUT - This application discloses a computing system implementing one or more tools or mechanism configured to capture a hierarchy of a circuit design layout generated by a downstream tool. The hierarchy can include multiple cells that identify corresponding portions of the circuit design layout. The tools or mechanism can be further configured to modify the circuit design layout based, at least in part, on the captured hierarchy, which alters the portions of the circuit design layout identified by the cells separately from other portions of the circuit design layout. | 2016-04-07 |
20160098513 | CONFLICT DETECTION FOR SELF-ALIGNED MULTIPLE PATTERNING COMPLIANCE - Among other things, one or more techniques and systems for performing design layout are provided. An initial design layout is associated with an electrical component, such as a standard cell. A conflict graph is generated based upon the initial design layout. The conflict graph comprises one or more nodes, representing polygons within the initial design layout, connected by one or more edges. A same-process edge specifies that two nodes are to be generated by the same pattern process, while a different-process edge specified that two nodes are to be generated by different pattern processes, such as a mandrel pattern process and a passive fill pattern process. The conflict graph is evaluated to identify a conflict, such as a self-aligned multiple pattering (SAMP) conflict, associated with the initial design layout. The conflict is visually displayed so that the initial design layout can be modified to resolve the conflict. | 2016-04-07 |
20160098514 | Predictive Test for Aggressiveness or Indolence of Prostate Cancer from Mass Spectrometry of Blood-Based Sample - A programmed computer functioning as a classifier operates on mass spectral data obtained from a blood-based patient sample to predict indolence or aggressiveness of prostate cancer. Methods of generating the classifier and conducting a test on a blood-based sample from a prostate cancer patient using the classifier are described. | 2016-04-07 |
20160098515 | METHODS FOR SEQUENCE-DIRECTED MOLECULAR BREEDING - The present invention provides breeding methods and compositions to enhance the germplasm of a plant by the use of direct nucleic acid sequence information. The methods describe the identification and accumulation of preferred nucleic acid sequences in the germplasm of a breeding population of plants. | 2016-04-07 |
20160098516 | METHODS AND SYSTEMS FOR DETECTION OF A GENETIC MUTATION - Methods and systems for the detection of genetic mutations from a tissue sample (e.g., a preserved tissue sample) are provided. The method includes the steps of a) extracting a nucleic acid from a tissue or biological sample; b) preparing a targeted nucleic acid amplicon library from the extracted nucleic acid; c) sequencing the targeted nucleic acid amplicon library to produce tissue sample target nucleic acid sequence data; and d) analyzing the sample target nucleic acid sequence data to determine whether it contains a mutation (e.g., a mutation associated with a risk for a particular disease). The methods described herein advantageously can be performed in less than 36 hours. | 2016-04-07 |
20160098517 | APPARATUS AND METHOD FOR DETECTING INTERNAL TANDEM DUPLICATION - According to an illustrative embodiment, provided herein is an internal tandem duplication (ITD) detection apparatus which includes a breakpoint identification unit for identifying two breakpoints in a reference genome sequence based on a plurality of reads, each of which partially matches the reference genome sequence; and an ITD detection unit for generating an ITD reference sequence which includes a base sequence portion spanning between the two breakpoints in the reference genome sequence and a sequential repetition of the base sequence portion. | 2016-04-07 |
20160098518 | HLA TYPING USING SELECTIVE AMPLIFICATION AND SEQUENCING - Presented herein are methods and compositions for determining haplotypes in a sample. The methods are useful for obtaining sequence information regarding, for example, HLA type and haplotype. Also presented herein are methods of determining haplotypes in a sample based on a plurality sequence reads. | 2016-04-07 |
20160098519 | SYSTEMS AND METHODS FOR SCALABLE UNSUPERVISED MULTISOURCE ANALYSIS - Systems and methods for identifying genetic variations in a disease and diagnosing a patient with a mental illness, or a generic variant of same. The systems and methods use genomics and phenomics in a computer-implemented methods to identify biclusters in phenomic and genomic data, discover relationships among the biclusters, organize the relations into partitions, rank the predictive utility of features, and map the disease risk function. This can in turn be used to diagnose a patient in a person-centered fashion. | 2016-04-07 |
20160098520 | HEALTHCARE UTILIZATION VISUALIZATION - Provided is a system including a data store module is configured to store aggregated patient medical data collected from electronic devices associated with a number of discrete healthcare entities; and a data analytics module configured to calculate a metric, based on the aggregated patient medical data for each discrete healthcare entity of the number of discrete healthcare entities. The data analytics module is further configured to generate a report associated therewith. The system also includes a messaging module configured to transmit the report to one or more electronic devices associated with the number of discrete healthcare entities response to the report generation. | 2016-04-07 |
20160098521 | Data Encoding and Retrieval System and Method - System platform, software and hardware equipment and components, and methodologies are provided for generating, organizing, storing and retrieving medical records using voice recognition in combination with unique codes assigned to data elements, and include microprocessor and memory, such as non-transient computer readable medium, having stored thereon a database including vocabulary terms. Speech recognition interface receives spoken language. Display generates an output according to vocabulary terms uniquely associated with the spoken language. Data stored in the database can include records organized into specific modules having specified vocabulary terms synced with each module and unique computer code to key vocabulary terms in the database. Using an associated unique code can cause specific data field to open on display when recognizing specific spoken word or phrase by the speech recognition interface. | 2016-04-07 |
20160098522 | METHOD AND SYSTEM FOR CREATING AND MANAGING PERMISSIONS TO SEND, RECEIVE AND TRANSMIT PATIENT CREATED HEALTH DATA BETWEEN PATIENTS AND HEALTH CARE PROVIDERS - The recent explosion in the number of consumer devices able to read and transmit remote patient health data has provided a technical foundation for health care providers to cost effectively monitor chronically ill patients when they are not at the providers places of practice. In an embodiment of the invention, an invitation from a health care provider to share patient created health data is offered to a patient who may accept or reject said invitation. Furthermore, at any time subsequent to the acceptance of said invitation by said patient, either party may elect to revoke its agreement to share data established through said invitation offer and acceptance process. Using the invention, patients and providers may manage permissions to share patient created health data to meet their privacy and business needs and systems that facilitate communications of patient created health data can use these permissions to meet the needs of users. | 2016-04-07 |
20160098523 | RECORD BUILDER - A record builder may include a device input module configured to capture an identifier for one or more devices used in a medical procedure, a data access component configured to capture procedure information for a procedure based on the identifier, an instruction interpretation component for analyzing the procedure information and identifying areas of variability, a combination assessment component configured for melding instructions relating to a plurality of devices, a detailed procedure dictator configured to prepare a dictation of the procedure, and a medical record population element configured to populate a medical record with the dictation. | 2016-04-07 |
20160098524 | Medical inventory tracking - Managing inventory and providing robust analytics related to the use of such inventory. In one embodiment a system is provided that includes terminals for collecting information about one or more medical consumables in a medical setting, an inventory tracker for processing and storing the information about the one or more medical consumables and making inventory information about the medical consumables available, and an analytics engine for generating usage information about a medical consumable within the medical setting. | 2016-04-07 |
20160098525 | SYSTEM AND METHOD FOR REAL TIME INTEGRATION WITH HEALTH CARE APPOINTMENT MANAGEMENT SYSTEMS - A health care appointment management system is provided. The health care appointment management system includes an integration module communicatively coupled to one or more electronic practice management systems (EPMs) of one or more health care providers. The integration module is configured to receive appointment scheduling data and appointment scheduling rules corresponding to the one or more health care providers. The health care appointment management system also includes a database configured to store the appointment scheduling data and the appointment scheduling rules corresponding to the one or more health care providers. In addition, the health care appointment management system includes a processing module configured to process the appointment scheduling data and to manage appointment updates for each of the one or more health care providers in accordance with the appointment scheduling rules of the respective health care provider. | 2016-04-07 |
20160098526 | SYSTEMS AND METHODS FOR EXTRACTION OF CLINICAL KNOWLEDGE WITH REIMBURSEMENT POTENTIAL - A computerized Medical Information Navigation Engine (“MINE”) extracts clinical knowledge, by identifying coded elements with reimbursement potential contributing to payoff based on clinical history, and subtracting coded elements documented in an encounter from the coded elements, based on business logic. The MINE sorts the remaining coded elements in accordance with one optimization criteria to payoff based on clinical history. | 2016-04-07 |
20160098527 | PREDICTED AND TRACKED PERSONALIZED PATIENT TREATMENT EFFECTS ON BODY FUNCTIONS - A medical information system ( | 2016-04-07 |
20160098528 | SYSTEMS AND METHODS FOR ENABLING CUSTOMERS TO OBTAIN VISION AND EYE HEALTH EXAMINATIONS - Systems and methods are provided for eye health and vision examinations. A customer diagnostic center is configured to generate customer examination data pertaining to an examination of a customer's eye. The customer diagnostic center provides a user interface for communicating with a customer and ophthalmic equipment for administering tests to the customer. A diagnostic center server is configured to receive the customer examination data from the customer diagnostic center over a network and allow the customer examination data to be accessed by an eye-care practitioner. A practitioner device associated with the eye-care practitioner is configured to receive the customer examination data from the diagnostic center server and display at least a portion of the customer examination data to the eye-care practitioner. Customer evaluation data is generated pertaining to the eye-care practitioner's evaluation of the customer examination data. An eye health report is provided to the customer via the network. | 2016-04-07 |
20160098529 | DISPLAY APPARATUS AND IMAGE DISPLAY METHOD USING THE SAME - Disclosed herein are a display apparatus which facilitates a simultaneous comparison of a plurality of images which respectively illustrate different features on one divided display screen such that the images are seamlessly displayed on the screen, and an image display method which is performable by using the apparatus. The display apparatus includes a memory configured to store a plurality of different types of images of an object, an input device configured to receive an input of a command relating to simultaneously displaying the different types of images, and a display device configured to display images. Upon receiving the command, the display device divides a screen upon which an image of the object is displayable into a first region within which a first image showing one portion of the object is displayed and a second region within which a second image showing the remaining portion of the object is displayed. | 2016-04-07 |
20160098530 | DEVICES AND METHODS FOR MANAGING RISK PROFILES - The present application provides a method for determining and managing a subject's risk profile. The risk profile may include the presence or absence of nocturia. The present application further provides methods of using such a risk profile, such methods for underwriting or managing the cost of life insurances or health insurances, methods for calculating risk associated with the risk profile in an insurance candidate/insured subject, and methods for improving lifespan of the insured based on the risk profile. | 2016-04-07 |
20160098531 | METHOD FOR ASSESSING STENOSIS SEVERITY IN A LESION TREE THROUGH STENOSIS MAPPING - A method of assessing stenosis severity for a patient includes generating a three dimensional model of a lesion specific vessel tree of the patient. A plurality of inlet and outlet positions are identified in the lesion tree. A total flow rate from the vessel tree model is estimated. A processor and task specific software are utilized to perform computational fluid dynamic simulation on the vessel tree. A flow rate and apparent flow resistance for each of the outlets is then determined. At least one ideal model is generated. A computational fluid dynamic simulation is performed on the at least one ideal model. A level of stenosis severity is determined for each of the outlets. | 2016-04-07 |
20160098532 | HEALTHCARE PROTOCOLS AND HEALTHCARE PLANNING SYSTEMS AND METHODS - Technology is disclosed for generating patient-specific healthcare protocols and systems and methods for generating and providing patient-specific healthcare protocols for facilitating medical examinations. | 2016-04-07 |
20160098533 | System and Method for Improving Health Care Management and Compliance - A computer implemented system and method for quantifying a risk associated with medical and health care, the steps of which have; calculating, via a processor, a first value; the first value equal to the medications prescribed to a plurality of individuals in a specified population; calculating, via a processor, a second value; the second value equal to the prescribers of the first value of the plurality of individuals in a specified population; calculating, via a processor, a third value; the third value equal to the associated therapeutic classifications of the first value of the plurality of individuals in a specified population; calculating, via a processor, an average value of each first, second and third value; comparing, via a processor, the average value of each first, second and third value against a fourth value; the fourth value equal to a single individual of the first, second and third value; transforming, via a processor, the first, second, third and fourth values into a fifth value, calculating, via a processor, the fifth value which corresponds to a degree of risk of adverse outcomes related to the healthcare management of an individual. | 2016-04-07 |
20160098534 | PRESCRIPTION MONITORING PROGRAM ACCESSING SYSTEM - Method, system, web-based, or stand-alone software application which enables a PMP user, through integration with an existing electronic health record (EHR) or other database, to easily, and quickly transfer patient demographic information for submission to a regional, state, provincial, multi-state, private, or national system PMP. This PMP accessing method and system may be web-based or stand-alone software application provide a user-interface that easily enables the direct transfer of individual demographic information required by the prescription monitoring program (PMP) to the PMP database to obtain a prescription report quickly and efficiently circumventing manual data entry. | 2016-04-07 |
20160098535 | Cabinet System - A cabinet system for securely storing items includes a cabinet housing, a controller, and at least one drawer unit. The cabinet housing has a locking mechanism, and the controller is in communication with the cabinet housing and configured to operate the locking mechanism. The drawer unit is designed to be releasably locked at least partially within the cabinet housing by the locking mechanism, and slidable within a portion of the cabinet housing when released by the locking mechanism. The drawer unit includes at least one storage compartment, a cover, memory, and a power source. The storage compartment is configured to store at least one item therein. The cover is movable to an open configuration and a closed configuration. When the cover is in the closed configuration, the cover limits access to the item of the storage compartment. The memory is powered by the power source and is configured to store data associated with a movement of the cover. | 2016-04-07 |
20160098536 | CARE PLAN ADMINISTRATION: PATIENT FEEDBACK - Embodiments presented herein describe techniques for providing feedback for a care plan for a patient. Embodiments receive a care plan specifying a plurality of assigned tasks for the patient to perform, timing information specifying when each of the plurality of assigned tasks should be performed, and a plurality of observation metrics that each indicate a type of biometric data to monitor. Biometric data corresponding to the plurality of observation metrics is collected using at least one monitoring device. Embodiments receive symptom information specifying one or more reported symptoms experienced by the patient and monitor adherence of the patient to completing the plurality of assigned tasks according to the timing information specified in the care plan. Embodiments further include providing feedback to the patient, based on the collected biometric data, received symptom information and monitored adherence. | 2016-04-07 |
20160098537 | DERIVED OBSERVATIONS IN CARE PLAN ADMINISTRATION - Techniques presented herein disclose a method for generating a derived observation for a care plan assigned to a patient. According to one embodiment, an application executing on a care platform server receives an event log having a plurality of events. Each event includes one or more types of biometric data for the patient. The care plan includes one or more definitions for metrics that are derived from the one or more types of biometric data. A temporal slice of the event log is selected based on one or more of the definitions. The derived metrics are generated by evaluating events within the selected temporal slice of the event log against one or more of the definitions. A condition of the patient is evaluated based on the derived metrics | 2016-04-07 |
20160098538 | CARE PLAN ADMINISTRATION - Techniques for administering a care plan. Embodiments receive the care plan specifying observation metrics to monitor biometric data collected from a patient. At least one monitoring device available is identified and embodiments receive biometric data collected using the at least one monitoring device, where the biometric data is initially classified as a first type of event by the at least one monitoring device. Additionally, embodiments analyze the received biometric data to reclassify the first event as an occurrence of a second type of even, and, upon determining that the occurrence of the second type of event satisfies at least one threshold condition specified in the care plan, initiate at least one treatment plan specified in the care plan and corresponding to the satisfied at least one threshold value. | 2016-04-07 |
20160098539 | SYSTEM AND METHOD FOR DATA ANALYTICS AND VISUALIZATION - Systems and methods are described that provide a dynamic reporting functionality that can identify important information and dynamically present a report about the important information that highlights important findings to the user. The described systems and methods are generally described in the field of diabetes management, but are applicable to other medical reports as well. In one implementation, the dynamic reports are based on available data and devices. For example, useless sections of the report, such as those with no populated data, may be removed, minimized in importance, assigned a lower priority, or the like. | 2016-04-07 |
20160098540 | SYSTEM AND METHOD FOR DATA ANALYTICS AND VISUALIZATION - Systems and methods are described that provide a dynamic reporting functionality that can identify important information and dynamically present a report about the important information that highlights important findings to the user. The described systems and methods are generally described in the field of diabetes management, but are applicable to other medical reports as well. In one implementation, the dynamic reports are based on available data and devices. For example, useless sections of the report, such as those with no populated data, may be removed, minimized in importance, assigned a lower priority, or the like. | 2016-04-07 |
20160098541 | SYNTHESIZING COMPLEX POPULATION SELECTION CRITERIA - System and method to determine a reduced cohort criteria, the method including: defining N selection criteria to select a cohort from among a universe of patient data; querying a patient database, by use of a processor, and by use of the N selection criteria, in order to define a full patient population; selecting a subset of size M of the N selection criteria, to produce a subset criteria; selecting a permutation of the subset criteria, to produce a permuted subset criteria in a predetermined order; for each member of the permuted subset criteria: querying the patient database by use of the member of the permuted subset criteria to produce a respective interim patient population; combining all respective interim patient populations to produce a partial patient population; and calculating, by a processor, a coverage figure of merit that compares the partial patient population to the full patient population. | 2016-04-07 |
20160098542 | MEDICAL DIAGNOSIS AND TREATMENT SUPPORT APPARATUS, SYSTEM, AND METHOD - Embodiments of the inventive concept provide an automated medical computer logic apparatus, which can provide automated medical diagnosis and treatment support to HCPs and patients. A patient can indicate a chief complaint such as chest pain, ear discomfort, a rash, or the like. A rules engine can include clinical modules and a module selector. The module selector can receive the chief complaint and select a particular clinical module. An evaluator logic section can receive and process the selected clinical module. Based on the selected clinical module, the evaluator logic section can cause a dynamic interview to be conducted with the patient, and can map individual question responses to various possible diagnoses, indicating how much each diagnosis should be weighted. The evaluator logic section can suggest treatment options. The automated medical computer logic apparatus can analyze patient responses and automatically generate a customized treatment plan, an automated chart note narrative, a detailed clinical summary, and/or patient education information. | 2016-04-07 |
20160098543 | METHOD OF QUANTIFYING HYDROCARBON FORMATION AND RETENTION IN A MOTHER ROCK - The method according to the invention allows the formation of oil and the retention phenomenon in the source rock to be modelled. Organic matter characterization experiments are used to establish the molecular model (MM) of the initial sample (E). The thermal cracking reaction of this molecular model is reproduced by dynamic molecular simulation computations with a reactive force field (RMD) and validated by comparison with experimental data. The reaction mechanism obtained (SR) allows to carry out a kinetic study (C) by variation of the temperature parameter. The phase equilibria (PES) of the reaction medium are determined at any time from dynamic simulation. The successive phase equilibrium assessments at various progress stages of the cracking reaction allow following the physicochemical evolution (PC) of the thermal maturation of the organic sample studied. The free hydrocarbons (liquid and gaseous) that are not retained in the solid residue can be quantified throughout numerical modelling of the sample maturation; representing, in the sedimentary basins, the hydrocarbons that are not retained in the organic matrix of the source rock (Q). This quantity can be used as an indicator or an input value for the retention threshold in basin models. | 2016-04-07 |
20160098544 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An image processing apparatus includes: a signal receiver configured to receive an encrypted image signal; a storage configured to temporarily store the encrypted image signal received in the signal receiver; a signal decryptor configured to convert the encrypted image signal into a decrypted image signal by decrypting the encrypted image signal output from the storage with a preset first secret key; and a decoder configured to decode the decrypted image signal output from the signal decryptor to be displayed an image. | 2016-04-07 |
20160098545 | Location and Date/Time Constrained Content Windowing - The present invention is in the technical field of content windowing. Specifically, the present invention provides a content creator the ability to make content available at one or more particular locations and for one or more defined periods of time. A marketplace is further provided for content creators to make available content to be licensed by content licensors for providing content at one or more particular locations and for one or more defined periods of time. | 2016-04-07 |
20160098546 | Digital Media Content Creation and Distribution Methods - A system and methods for digital content creation and upload through a managed website for providing network-based access to authorized users who pay for predetermined rights that allow for use of the content by the authorized user on a multiplicity of devices, without having to repurchase access to the same content. | 2016-04-07 |
20160098547 | SYSTEM AND METHOD FOR AUTOMATIC DIGITAL COPY FOR PHYSICAL MEDIA PURCHASE - A system and method for giving access to streaming media that is associated with purchased physical media item is disclosed herein. Upon the purchase of a physical media item, a unique identifier is received. The unique identifier is analyzed to determine if the unique identifier is associated with a streaming service account. If so, the streaming service account is modified to grant access to streaming media that is associated with the physical media. The user is notified of the availability of the streaming media. The user can then initiate playback of the streaming media. Other embodiments are also disclosed herein. | 2016-04-07 |
20160098548 | SETTING AN AUTHORIZATION LEVEL AT ENROLLMENT - Systems, methods, and other embodiments associated with setting an authorization level at enrollment. According to one embodiment, a method includes a accessing an interface on a device. Initiation information for a user of the device is provided to an authorizer. The authorizer is associated with a class. Verification data is received from the authorizer. An enrollment token is then generated based on the verification data. The enrollment token includes an authorization level that defines security parameters for the device. | 2016-04-07 |
20160098549 | RHYTHM-BASED USER AUTHENTICATION - The present invention is directed to an apparatus, a method, and a computer program product for authenticating a user based on a sequence of rhythmic inputs. The user via a mobile device provides one or more inputs (e.g., pushing a button, tapping a touchscreen, a biometric, or the like) to one or more sensors associated with the mobile device as an attempt of authorization. The one or more inputs may be provided in a rhythmic manner (e.g., provided in time with music). The present invention then compares the provided one or more inputs to one or more predetermined sequences of inputs that are associated with positive authentication of the user (e.g., a known password). The phone determines that the one or more provided inputs match one or more predetermined rhythmic sequences associated with positive authentication of the user and authenticates the user. | 2016-04-07 |
20160098550 | Method and Apparatus of Three-Type or Form Authentication with Ergonomic Positioning - A system and methods for authenticating a user for access to a system input terminal comprising an infrared imager, a user input terminal, and a processing section including a plurality of processing instructions operable to perform image capture for wrist areas of a user in proximity to an input terminal or other structures requiring authentication and comparison to determine access or deny access. An aspect of an embodiment of the invention permits initial and frequent authentication that reduces or eliminates user action to perform such authentication. Also provided are user interfaces, and additional authentication sections operable with the infrared section. Alternative embodiments of the invention include a mobile embodiment as well as an embodiment including a sensor positioned with respect to a user in an operational position where the user is performing a task in relation to an input terminal or structure requiring authentication (e.g. a keyboard). | 2016-04-07 |
20160098551 | OPTICAL AUTHENTICATION OF OPERATIONS FOR A MOBILE DEVICE - An operation at a mobile device is authenticated by using a random visual presentation displayed at the device for the authentication. The mobile device generates and displays the random visual presentation which is optically captured (e.g., by a camera) at a capturing device. The capturing device uses the captured random visual presentation to generate an authentication value (e.g., a hash) based on a defined security protocol. The authentication value is compared to an expected value and if the values match the mobile device executes the operation. | 2016-04-07 |
20160098552 | WEARABLE USER DEVICE AUTHENTICATION SYSTEM - Systems and methods for authenticating a user include a wearable user device receiving a first request to access a secure system. A plurality of authentication elements are then displayed on a display device to a user eye in a first authentication orientation about a perimeter of an authentication element input area. A user hand located opposite the display device from the user eye is then detected selecting a sequence of the plurality of authentication elements. For each selected authentication element in the sequence, the wearable user device moves the selected authentication element based on a detected movement of the user hand and records the selected authentication element as a portion of an authentication input in response to the user hand moving the selected authentication element to the authentication element input area. The user is authenticated for the secure system if the authentication input matches stored user authentication information. | 2016-04-07 |
20160098553 | GRAPHICAL USER PASSWORDS - A method includes a computer device receiving a set of images for at least one user; the computer device receiving unique visual clue inputs from the at least one user for each image of the set of images; the computer device receiving drawing gesture inputs from the at least one user for each image of the set of images; and the computer device using the visual clue and drawing gesture inputs to create passwords to provide a locked access point for at least one device. | 2016-04-07 |
20160098554 | In-Band Peripheral Authentication - This document describes techniques ( | 2016-04-07 |
20160098555 | PROGRAM CODE ATTESTATION CIRCUITRY, A DATA PROCESSING APPARATUS INCLUDING SUCH PROGRAM CODE ATTESTATION CIRCUITRY AND A PROGRAM ATTESTATION METHOD - Program code attestation circuitry and a method of operating such circuitry are provided. The program code attestation circuitry includes first storage, and measurement value generation circuitry that is arranged to store within that first storage a measurement value that is determined by applying a first hash algorithm to input data determined from a code block of the program code. Within a second storage a private key is stored. Further, signature generator circuitry is responsive to an attestation request from a request source external to the program code attestation circuitry to apply, to a derived value derived from the measurement value, a signature algorithm using the private key, in order to generate a signature for output to the request source. From this signature, the request source can then derive information about the stored measurement value sufficient to enable it to ascertain whether that stored measurement value agrees with an expected measurement value for the code block in question. This provides a simple and secure mechanism for attesting as to the correctness of code blocks of program code within a data processing apparatus. | 2016-04-07 |
20160098556 | Preventing stack buffer overflow attacks - Improved buffer overflow protection for a computer function call stack is provided by placing a predetermined ShadowKEY value on a function's call stack frame and copying the ShadowKEY, a caller EBP, and a return pointer are pushed onto a duplicate stack. The prologue of the function may be modified for this purpose. The function epilogue is modified to compare the current values of the ShadowKEY, caller EBP, and the return pointer on the function stack to the copies stored on the duplicate stack. If they are not identical, an overflow is detected. The preserved copies of these values may be copied back to the function stack frame thereby enabling execution of the process to continue. A function prologue and epilogue may be modified during compilation of the program. | 2016-04-07 |
20160098557 | METHOD AND APPARATUS FOR MANAGING APPLICATION DATA OF PORTABLE TERMINAL - A method for managing application data of a portable terminal according to the present invention comprises the steps of: allocating a plurality of data areas required for a data management policy for an application program; when the application program is executed, permitting connection to a specific data area of the plurality of data areas allocated for the application program on the basis of the data management policy; and executing the application program while performing the permitted connection to the specific data area. | 2016-04-07 |
20160098558 | SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SECURITY VERIFICATION OF THIRD PARTY INTELLECTUAL PROPERTY CORES - An exemplary system, method and computer-accessible medium for detecting the presence of a Trojan(s) in a circuit(s), can include, for example, receiving information related to a property(s) configured to determine the presence of the Trojan(s), and determining the presence of the Trojan(s) based on the property(s) and a design(s) of the circuit(s) using a bounded model checking tool. | 2016-04-07 |
20160098559 | VIRUS CO-PROCESSOR INSTRUCTIONS AND METHODS FOR USING SUCH - Circuits and methods for detecting, identifying and/or removing undesired content are provided. According to one embodiment, a virus processing system includes a virus co-processor, a first memory, a general purpose processor (GPP) and a second memory. The first memory is communicably coupled to the co-processor via a first memory interface. The first memory includes a first signature compiled for execution on the co-processor. The GPP is communicably coupled to the co-processor. The second memory is communicably coupled to the co-processor via a second memory interface and to the GPP. The second memory includes a second signature compiled for execution on the GPP. The co-processor is operable to retrieve the first signature stored within the first memory through an instruction cache. The co-processor is operable to retrieve a data segment to be scanned from second memory through a data cache that is separate from the instruction cache. | 2016-04-07 |
20160098560 | METHOD AND APPARATUS FOR RETROACTIVELY DETECTING MALICIOUS OR OTHERWISE UNDESIRABLE SOFTWARE AS WELL AS CLEAN SOFTWARE THROUGH INTELLIGENT RESCANNING - Techniques are provided for the detection of malicious software (malware) on a general purpose computing device. A challenge in detecting malicious software is that files are typically scanned for the presence of malicious intent only once (and subsequent rescanning is typically performed in a simplistic manner). Existing methods in the art do not address how to most effectively rescan collections of files in a way that tries to optimize performance and efficacy. These methods may also be useful if additional information is now available regarding a file that might be useful to an end-user or an administrator, even though the file's core disposition might not have changed. More specifically, we describe methods, components, and systems that perform data analytics to intelligently rescan file collections for the purpose of retroactively identifying malware and retroactively identifying clean files. | 2016-04-07 |
20160098561 | DETECTION OF MALICIOUS SOFTWARE, FIRMWARE, IP CORES AND CIRCUITRY VIA UNINTENDED EMISSIONS - An apparatus for testing, inspecting or screening an electrically powered device for modified or unmodified hardware, firmware or software modifications including Malware, Trojans, adware, improper versioning, worms, or virus and the like, includes an antenna positioned at a distance from the electrically powered device and a signal receiver or sensor for examining a signal from the electrically powered device. The receiver or sensor collects unintended RF energy components emitted by the electrically powered device and includes one or more processors and executable instructions that perform analysis in a response to the acquired signal input while the electrically powered device is active or powered. The characteristics of the collected RF energy may be compared with RF energy characteristics of an unmodified device. The comparison determines one of a modified, unmodified or score of certainty of modified condition of the electrically powered device. | 2016-04-07 |
20160098562 | Automated Verification of a Software System - Software code of a software system (e.g., a software stack) may be verified as conforming to a specification. A high-level language implementation of the software system may be compiled using a compiler to create an assembly language implementation. A high-level specification corresponding to the software system may be translated to a low-level specification. A verifier may verify that the assembly language implementation functionally conforms to properties described in the low-level specification. In this way, the software system (e.g., a complete software system that includes an operating system, device driver(s), a software library, and one or more applications) may be verified at a low level (e.g., assembly language level). | 2016-04-07 |
20160098563 | SIGNATURES FOR SOFTWARE COMPONENTS - A facility for analyzing a pair of code files is described. From each of the code files, the facility extracts a hierarchy of textual names. The facility then determines the score reflecting a level of similarity between the extracted hierarchies of textual names for attribution to the pair of code files. | 2016-04-07 |
20160098564 | ASSESSMENT AND ANALYSIS OF SOFTWARE SECURITY FLAWS - Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports. | 2016-04-07 |
20160098565 | SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SECURITY VERIFICATION OF THIRD PARTY INTELLECTUAL PROPERTY CORES - An exemplary system, method and computer-accessible medium for detecting the presence of a Trojan(s) in a circuit(s), can include, for example, receiving information related to a property(s) configured to determine the presence of the Trojan(s), and determining the presence of the Trojan(s) based on the property(s) and a design(s) of the circuit(s) using a bounded model checking tool. | 2016-04-07 |
20160098566 | PROVIDING APPLICATION PRIVACY INFORMATION - A system includes a data processing device, a memory, identifications of applications, and a privacy indication module. Each identification of the application has associated therewith a privacy indicator that indicating a degree of expected privacy of each of the corresponding applications. The privacy indication module is configured to control the data processing device to set each of the privacy indicators of each of the identifications of the applications and to provide at least one of the privacy indicators to control publication of information corresponding to at least one of the applications. | 2016-04-07 |
20160098567 | METHOD, ELECTRONIC DEVICE, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIA FOR IDENTIFYING CONFIDENTIAL DATA - A method, an electronic device, and a non-transitory computer readable recording medium for identifying confidential data are provided. The electronic device determines whether a data has special formats by a format feature representing the special format. Then the electronic device further determines whether the special format of the data is the confidential data by confidential factors representing the special format to be the confidential data. Therefore, the method, the electronic device, and the non-transitory computer readable recording medium for identifying confidential data can correctly provide the confidential degree for the data having many confidential descriptions but few numbers and can identify the confidential data having the special format, thereby preventing the data leakage. | 2016-04-07 |
20160098568 | CLIENT-SIDE ENCRYPTION IN A DEDUPLICATION BACKUP SYSTEM - Client-side encryption in a deduplication backup system. In one example embodiment, a method includes a backup phase in which various steps are performed for each allocated plain text block stored in a source storage. One step includes hashing, using a first cryptographic hash function, the plain text block to generate a first hash. Another step includes hashing, using a second cryptographic hash function, the first hash to generate a second hash. Another step includes searching a key-value table of a deduplication storage to determine whether the second hash matches any key in the key-value table. Another step includes, upon determining that the second hash does not match any key in the key-value table, encrypting, using an encrypt/decrypt function, the plain text block using the first hash as an encryption password and inserting a key-value pair into the key-value table with the key being the second hash and the value being the encrypted block. | 2016-04-07 |
20160098569 | AVOIDING ENCRYPTION IN A DEDUPLICATION STORAGE - Avoiding encryption in a deduplication vault. In one example embodiment, a method may include analyzing an allocated plain text block stored in the source storage to determine if the block is already stored in the deduplication storage, in response to the block not being stored, encrypting the allocated plain text block and analyzing the encrypted block to determine if the encrypted block is already stored in the deduplication storage, analyzing a second allocated plain text block stored in the source storage to determine if the block is already stored in the deduplication storage, in response to the block already being stored, avoiding encryption of the second allocated plain text block by not encrypting the second allocated plain text block and instead associating the location of the second allocated plain text block in the source storage with the location of the duplicate block already stored. | 2016-04-07 |
20160098570 | Method and Apparatus for Determining Permission of Application Program - A method for determining a permission of an application program is presented. The method for determining a permission of an application program in the present disclosure includes receiving an installation request of a first application, where the installation request carries a first permission list that the first application applies for and a first shared user identifier requested by the first application; searching, according to the first shared user identifier, for at least one second application that uses the first shared user identifier and is already installed in a system; and if the first application is a plug-in of the second application already installed in the system, determining a permission of the first application according to the first permission list that the first application applies for and a permission in a second permission list corresponding to the first shared user identifier. | 2016-04-07 |
20160098571 | TRUSTED USER CIRCLES - A trusted user circle server for encryption key distribution and authentication support, as well as a client-side application which resides on user's devices are disclosed. In particular, the trusted user circle server manages a repository for static public keys (SPUK) which are used for authentication and secure distribution of a dynamic private context key (DPCK) used for the end-to-many encryption. Accordingly, posting users encrypt posted document using the DPCK and viewing users retrieve the DPCK to decrypt the posted document. These keys are associated to the trusted user circle and are generated dynamically for a given circle policy context (CPC). The CPC is an identifier that represents a group of members of a trusted user circle. It changes whenever any member of the trusted user circle leave it, when a new trusted user circle is created or when the DPCK expires after a pre-determined period of time. | 2016-04-07 |
20160098572 | Providing Integrated Role-based Access Control - An example method includes, identifying a request from a user associated with a user role. The request corresponds to: an application request to access a first module in an enterprise application; and a data request to access a first portion of a database through the first module. The method also includes: responsive to a first determination that, based on the user role, the application request by the user is permissible: granting the application request; and responsive to a second determination that, based on the user role, the data request by the user is permissible: granting the data request to access the first portion of the database through the first module. The user role is associated with a plurality of access permissions, each specifies: an exhaustive set of application requests permitted to the user role; and an exhaustive set of data requests permitted to the user role. | 2016-04-07 |
20160098573 | Securing a Distributed File System - System and methods for a secured distributed file system (DFS) achieved by providing access control to the data stored in the DFS based on mapping of access privileges from a data warehouse to the DFS. A preferred embodiment of the invention uses a Hive data warehouse in concert with a Hadoop Distributed File System (HDFS). The invention provides an enhanced access control framework in HDFS. Since direct data access requests to files in HDFS corresponding to Hive tables, objects or other constructs can be unrestricted, present invention overcomes this problem by mapping the access privileges on Hive tables, objects and other constructs as defined in Hive metastore to file permissions on the corresponding files in HDFS. It then uses this mapping to provide access control for file(s) stored in HDFS. | 2016-04-07 |
20160098574 | SYSTEMS AND METHODS TO MANAGE FILE ACCESS - A file system configured to use tags to control operations on files stored in the system. Each tag is usable to tag one or more of the files stored in the system and/or one or more other tags in the system. Each tag identifies one or more privileges for a user of the tag to operate on tagged files. Tags are sharable in the system for use by various users, which may create tags, modify tags, share tags, apply tags to selected tags and/or files in the system, and follow chains of tagging to access tagged files. The chains of tagging may include loops/circles in a graph of tags in the system. | 2016-04-07 |
20160098575 | ELECTRONIC SYSTEMS OF ELECTRONIC TERMINALS AND SERVERS FOR SECURING INFORMATION INTEGRITY IN THE DISTRIBUTED TECHNOLOGICAL ENVIRONMENT AND METHODS OF USING THEREOF - In some embodiments, the present invention provides for a computer-implemented method, including: electronically receiving, first terminal data where the first terminal data includes at least one first alphanumerical data sequence; electronically generating at least one first computer-generated barcode; electronically storing the first terminal data and the at least one first computer-generated barcode in at least one database residing in a non-transient computer memory; automatically and electronically transmitting the at least one first computer-generated barcode to the at least one first terminal machine; electronically receiving second terminal data; automatically validating, in real-time, the user input as being representative of the user output. | 2016-04-07 |
20160098576 | Cognitive Digital Security Assistant - An approach is provided in which a cognitive digital security assistant intercepts a personal data request from a client that is requesting personal data from a user. The cognitive digital security assistant analyzes the personal data request against the user's security statements to determine whether to provide the user's personal data to the client. During the analysis, the cognitive digital security assistant determines whether the personal data request includes benefits that meet the user's benefit thresholds included in the user's security statements. When the benefits meet the user's benefit thresholds, the cognitive digital security assistant provides the requested personal data to the client in exchange for the benefit from the client. | 2016-04-07 |
20160098577 | Systems and Methods for Context-Based Permissioning of Personally Identifiable Information - A method is provided, including establishing a plurality of context profiles for a user, at least one context profile is associated with: (i) subject areas pertinent to the at least one context profile (ii) permissions identifying respective third parties with which personal information can be shared when the at least one context profile is active; (iii) permissions identifying what personal information can be shared with respective third parties when the at least one context profile is active; (iv) permissions identifying respective third parties that are permitted to contact the user when the at least one context profile is active; and (v) permissions identifying how respective third parties may contact the user when the at least one context profile is active; when the at least one context profile is active, operating in one of two or more modes (e.g., a regular mode or a discovery mode). | 2016-04-07 |
20160098578 | SYSTEM AND METHOD FOR PERSISTENT DATA INTEGRITY IN DOCUMENT COMMUNICATION - A system, method, and computer readable medium for verifying data integrity of documents involves adding a machine-readable stamp on a document generated by a device of a first user. The machine-readable stamp allows another user which receives a copy of the document to use another device to verify the integrity of data in the copy. | 2016-04-07 |
20160098579 | SYSTEMS AND METHODS FOR UNLOCKING A WEARABLE DEVICE - Systems and methods allow a user to interact with an augmented reality device. In one implementation, a lockable, wearable device is provided. The wearable device comprises a display; at least one sensor configured to provide an output indicative of a viewing direction of a user; and at least one processing device. The at least one processing device is configured to track a pattern of the viewing direction of the user; and unlock the lockable, wearable device to provide the user with access to information on the display of the device when the tracked pattern of movement matches a predetermined pattern of movement. | 2016-04-07 |
20160098580 | BUS PROTECTION WITH IMPROVED KEY ENTROPY - An apparatus includes a processor and a bus encryption unit. The processor is configured to communicate information over a secured data bus, and to communicate respective addresses over an address bus. The bus encryption unit is configured to generate an encryption key based on multiple addresses that appeared on the address bus, and to encrypt the information communicated between the processor and the secured data bus with the encryption key. | 2016-04-07 |
20160098581 | Method And System For Tracking And Authenticating Articles - The present invention relates to a method and system for tracking, issuing, and authenticating gear or articles, such as uniforms, badges, equipment, weapons, etc, for use in law enforcement or other official capacity. An authentication system retrieves encoded information read by a reader from a plurality of different markers. A database is queried to retrieve biometric data corresponding to each marker whereby the biometric data is displayed on a display. A uniform having a computer-readable marker visible under ultraviolet light and an additional marker. A system for issuing one of the articles by authenticating an officer and storing the identity and encoded information in a database. An apparatus for applying a plurality of markers by way of a conveyor belt conveying the article by an ink jet printer and a laser engraver. | 2016-04-07 |
20160098582 | WORKING METHOD OF A MULTI-SLOT CARD READER BASED ON THE STANDARD CCID PROTOCOL - A working method of a multi-slot card reader based on the standard CCID protocol comprises: powering up to perform initialization, and establishing a connection with a host through a USB interface; when a USB configuration instruction is received, returning configuration information of the USB interface to the host; waiting to receive an instruction delivered by the host, when a flag bit of a reset is detected, determining the type of the flag bit of the reset, for example, if the flag bit is a contact card flag bit, recording, according to the type of a change of a card placement pin level of a current contact card slot, a corresponding state of the contact card slot, or for example, if the flag bit is a periodic flag bit, sending a card search instruction corresponding to a current non-contact card slot, and recording a corresponding state of the non-contact card slot; and if the flag bit is a USB flag bit, performing a corresponding operation on a current card slot according to the received instruction. The card reader adopts a USB chip having multiple terminations and serves as a composite device of the standard CCID. When accepting access of a host, the card reader access different card slots through different terminations, so that the compatibility is desirable. | 2016-04-07 |