20th week of 2017 patent applcation highlights part 49 |
Patent application number | Title | Published |
20170140086 | LAYOUT MODIFICATION METHOD AND SYSTEM - A layout modification method is performed by at least one processor. The layout modification method includes: analyzing, by the at least one processor, allocation of a plurality of specific layout segments of a circuit cell layout to determine a first specific layout segment and a second specific layout segment from the plurality of specific layout segments; determining, by the at least one processor, if the first specific layout segment and the second specific layout segment are coupled to a first signal level; and merging, by the at least one processor, the first specific layout segment and the second specific layout segment into a first merged layout segment when the first specific layout segment and the second specific layout segment are coupled to the first signal level. | 2017-05-18 |
20170140087 | Method and device for chip integration and storage medium - A method for chip integration is disclosed. The method includes: inputting the parameter file information of a parameter file required to be searched; obtaining a sub-module port list according to the input parameter file information; carrying out the connection between module ports and/or sub-module ports according to the obtained sub-module port list and a pre-configured netlist; and generating a top level file according to the connection between the module ports and/or the sub-module ports, so as to realize the chip integration. A device for chip integration and a storage medium are disclosed as well. | 2017-05-18 |
20170140088 | LAYOUTING OF INTERCONNECT LINES IN INTEGRATED CIRCUITS - The invention relates to an integrated circuit comprising: a row of sink cells, a first driver cell, a second driver cell, an interconnect line connecting the first driver cell to the sink cells of the row; and a shunt line connecting the second driver cell to a point between ends of the interconnect line, wherein a segment of the interconnect line between the point and the first driver cell is bigger than 60% of a length the interconnect line and less than 80% of the length of the interconnect line. | 2017-05-18 |
20170140089 | PARALLEL MULTI-THREADED COMMON PATH PESSIMISM REMOVAL IN MULTIPLE PATHS - A method, system, and computer program product to perform parallel multi-threaded common path pessimism removal in integrated circuit design include constructing, using a processor, a thread-specific graphical representation (TSGR) relating to each data node and clock node pair and performing processes in parallel for each TSGR. The processes include determining initial arrival times at the data node and the clock node, computing initial test slack based on the initial arrival times at the data node and the clock node, identifying fan-out nodes among the additional nodes, each fan-out node being an origin of at least two of the edges in the two or more paths to the clock node, generating one or more tags based the fan-out nodes, determining adjusted arrival times based on the one or more tags, and computing adjusted test slack based on the adjusted arrival times. | 2017-05-18 |
20170140090 | ANALYSIS OF COUPLED NOISE FOR INTEGRATED CIRCUIT DESIGN - A computer-implemented method includes identifying a noise cluster, representing the noise cluster according to a variational model, projecting the variational model onto one or more corners to yield a projected noise cluster, and determining a computed noise for the projected noise cluster. Optionally, the noise cluster includes one or more noise cluster elements, and each of the noise cluster elements are expressed as one or more circuit element terms, according to a canonical form. Optionally, at least one of the corners is a bounding corner. For the bounding corner, the projected noise cluster is generated by maximizing the circuit element terms for those noise cluster elements that tend to increase noise, and by minimizing the circuit element terms for those noise cluster elements that tend to decrease noise, whereby noise is maximized for the canonical form. A corresponding computer program product and computer system are also disclosed. | 2017-05-18 |
20170140091 | COMPUTER-IMPLEMENTED METHOD FOR SIMPLIFYING ANALYSIS OF A COMPUTER-AIDED MODEL - The present disclosure discloses a computer-implemented method for simplifying analysis of a computer-aided model. The method comprising acts of selecting at least one evaluation point in a standard computer-aided model, analyzing the standard computer-aided model by simplifying each of a plurality of simplification points for the selected at least one evaluation point. Further the computer-implemented method comprises acts of building a response surface using relationship between simplification parameters and evaluation parameter based on analysis of the standard computer-aided model and indicating effect of simplification of at least one simplification point in the computer-aided model by comparing calculated evaluation parameter of the computer-aided model with a threshold evaluation parameter, wherein, the calculated evaluation parameter is derived using the response surface. | 2017-05-18 |
20170140092 | MODELS AND METHODS FOR DETERMINING SYSTEMIC PROPERTIES OF REGULATED REACTION NETWORKS - The invention provides a model of a reaction network integrated with regulatory controls related to the reactions. A method is provided for determining a systemic property of a reaction network using a model of the invention. Also provided is a method for modeling changes that occur in a reaction network at various time points due to regulatory events. | 2017-05-18 |
20170140093 | METHODS AND SYSTEMS FOR IN SILICO DESIGN - Embodiments describe computer systems and computer programs for implementing BioCAD methods comprising one or more data models and one or more BioCAD tools, wherein the BioCAD tools enable users to design or refactor a biomolecule or to conduct a biological experiment in silico by user input of one or more components selected by the user from a database populated with information on components and scientific data of existing biomolecules and experiments. Data models of the programs are operable to manage development of the new biomolecule or experiment based on information in the databases. Computer programs also provide an output with information that enables the users to determine in silico if the newly designed or refactored molecule or biological experiment is satisfactory or not for its intended purpose in vitro and also provides the user the capability to re-design the biomolecule or experiment till it is satisfactory. | 2017-05-18 |
20170140094 | METHOD FOR DETERMINING THE RISK PROFILE OF NEOPLASTIC TISSUE - A method of computing the risk profile of a neoplastic tissue in a patient is disclosed. The method includes the steps of (a) processing a sample of tumor tissue or cancer cells from the patient in a form suitable for visualization and demarcation of cell nuclei, individually distinguishable centrosomes (iCTRs) and megacentrosomes (mCTRs) in a region of interest (ROI) defined by a plurality of cell nuclei; (b) determining the numbers of iCTRs and mCTRs associated with each cell nucleus in the ROI; (c) determining the volume of each iCTR and mCTR in the ROI; and (d) calculating one or more centrosome amplification scores (CASs) values for the sample based on steps (b) and (c), wherein the one or more CASs indicate the severity of centrosome amplification, the frequency of centrosome amplification, or both, and wherein the one or more scores provide a measure of a level of risk and/or a prognosis associated with the neoplastic tissue. | 2017-05-18 |
20170140095 | NUCLEIC ACID SEQUENCE SECURITY METHOD, DEVICE, AND RECORDING MEDIUM HAVING SAME SAVED THEREIN - A nucleic acid sequence security method comprises the steps of: (a) creating a plurality of composites each comprising at least one of target elements derived from a nucleic acid sequence of an analysis requester or disguising elements identical to or different from the target elements; and (b) providing the created plurality of composites to an analyst. | 2017-05-18 |
20170140096 | SYSTEMS AND METHODS FOR DETECTING THE PRESENCE OF A BIOLOGICAL STATUS USING CLUSTERING - A method for determining the presence of a biological entity. The method may include entering into a digital computer, at least a plurality of first input values associated with a first genetic element, a plurality of second input values associated with a second genetic element, and a plurality of third input values associated with a third genetic element associated with a plurality of samples. The method also includes determining a threshold value associated with the third genetic element, separating the samples using the threshold value into a first set of samples and a second set of samples, clustering the first set of samples in a feature space defined by the first genetic element and the second genetic element, defining a first boundary space using the first set of samples, and defining a second boundary space using the second set of samples. | 2017-05-18 |
20170140097 | Methods For Identifying Agents With Desired Biological Activity - Provided are methods, systems and apparatus for identifying agents with desired biological activity. Specifically, the methods, systems, and apparatus identify functional relationships between multiple agents and/or between one or more agents and a condition of interest. Data of multiple experimental batches are normalized, batch effects accounted for, and the adjusted data used to create a projection matrix or function. The projection matrix is used to project the data into a projection space, in which the distance between a query agent or a query condition and various candidate agents may be determined. | 2017-05-18 |
20170140098 | METHOD AND APPARATUS FOR PROCESSING MEDICAL IMAGE DATA - An apparatus for processing medical image data, includes a controller configured to select an image group including pieces of original image data according to a digital imaging and communication in medicine (DICOM) standard. The controller is also configured to generate hierarchy information regarding a hierarchy structure of the image group by analyzing each piece of the original image data included in the image group, generate common data information by extracting, from each piece of the original image data, common data elements regarding respective classes that form the hierarchy structure based on the hierarchy information, generate common information regarding the image group based on the hierarchy information and the common data information, and perform data processing on the image group based on the common information. The apparatus also includes a memory configured to store the common information including the hierarchy information and the common data information. | 2017-05-18 |
20170140099 | FACILITATING THE SHARING OF HEALTH INFORMATION - A system for facilitating the sharing of health information is provided herein. The system may be implemented at a server-side, intermediary location, or client-side (or combination of some or all). The system employs records of patient access to health to create a database of known locations and sessions in which the patient is assigned to a various network of health information exchanges (HIE). | 2017-05-18 |
20170140100 | Web application for distributing and working with contents for patients and clients in healthcare and elderly care. Through the web application users can distribute content with positive health effects that patients or clients automatically and unassisted, if needed, can take part in - The invention provides an inexpensive and natural way in today's world for a family as a whole to stay healthier and well longer and better. At the same time it supplies appropriate medical and health care material to the personnel. In addition a tool is conveniently created that can be used in many other fields of health care as well. | 2017-05-18 |
20170140101 | PORTABLE HEALTH RECORD SYSTEM AND METHOD - Systems and methods of creating, accessing, storing, and editing an individual's personal health information are provided. The health record or data for the user can be shared with medical or health personnel, while enabling the user or patient to keep it on their person at all times. Further, the user or patient can control the level and details of the information made available to such other persons or organizations. | 2017-05-18 |
20170140102 | Examination Result Sheet Creation Apparatus, Examination Result Sheet Creation Method, Non-Transitory Computer Readable Medium, Examination Result Sheet, and Examination Apparatus - A test result sheet creation device is provided with: a display unit which displays a test result of a saliva test, and a plurality of comment candidates corresponding to the test result; an input unit which accepts an input of the result of selection from the plurality of comment candidates; and a control unit which associates and stores, in a storage unit, at least one test result and a comment selected from the comment candidates, and creates a test result sheet including the at least one test result and the comment selected from the comment candidates. | 2017-05-18 |
20170140103 | SYSTEMS AND METHODS FOR PROVIDING COMPREHENSIVE CARE FOR STOMA PATIENTS - Embodiments of the invention include systems and methods for providing comprehensive care for stoma patients. According to one embodiment, a system for providing comprehensive care for a stoma patient includes: a sensor device for detecting a fill level of an ostomy bag fitted over and around a stoma, wherein the sensor device is configured to sense one or more parameters of an effluent received in the bag; communicating the measurements to a stoma care management software application for formatting and visualization on a patient mobile device; and transferring the formatted data to an interactive wireless stoma care management platform, wherein the platform is configured to maintain a patient related database and to periodically advise the patient of needed actions as well as to provide reminders, advice and coaching. | 2017-05-18 |
20170140104 | APPARATUS AND METHOD FOR GENERATING A PATIENT HEALTH DATA PROFILE - A healthcare workflow manager may include processing circuitry configured to receive health data relating to a plurality of patients currently admitted or expected to be currently admitted to a healthcare facility and generate a plurality of patient profiles based on the health data, the plurality of patient profiles enabling management of a labor and delivery process of each of the plurality of patients, where each patient profile of the plurality of patient profiles includes a plurality of data categories relating to the labor and delivery process of each of the plurality of patients. The processing circuitry may be even further configured to transmit and cause display of the plurality of patient profiles on a user interface. | 2017-05-18 |
20170140105 | Federated Collaborative Medical Records System - A cloud-based, federated collaborative medical records system and methods, in the preferred embodiments, features a variety of mechanisms to enable end users to store, access, edit, and share health information, on demand. A key aspect of said embodiments involves the circumvention of barriers preventing the transfer of health information placed upon other electronic medical records systems and related systems preventing users who are not part of a specific business entity from accessing the records. The preferred embodiments of the present invention delegate control over medical information to those individuals who need access to such medical information at the appropriate time. | 2017-05-18 |
20170140106 | PATIENT INTERACTIVE HEALING ENVIRONMENT - Systems, methods, and computer-readable media for providing an interactive healing environment to a patient are provided. Servers in a network may operate a set of modules to communicate with a client device of the patient. The set of modules may operate to enhance communication between the patient and the healthcare providers of patient in the healthcare facility. The modules may also interact with medical devices associated with the patient. The medical devices may be connected to a component, such as a bus, that receives data from the medical devices and determines where the data should be sent. | 2017-05-18 |
20170140107 | DEVICE AND METHOD FOR CROSS-REFERENCING - A sample, embedded in a paraffin block, is placed on a tissue cassette which carries a label which may be a bar code. When the sample is processed, the cassette is given to a microtome operator who scans the label. Scanning causes information to be displayed on a screen and the operator verifies that what is on the screen matches what was on the label. The paraffin block is then placed in a microtome chuck and sections are cut from the block. A number of slide labels related to the cassette label are printed for the sections. If the operator does not verify that the information displayed on the screen matches the information on the cassette label and/or does not place the paraffin block in the microtome chuck within an allocated time interval after scanning the cassette label, dispensing and labeling of slides and/or operation of the microtome is prevented. | 2017-05-18 |
20170140108 | DEVICE FOR PROVIDING HEALTH MANAGEMENT SERVICE AND METHOD THEREOF - A method performed in an electronic device includes displaying, on a display operatively connected to the electronic device, a service indication corresponding to a service to be provided through an application. The service indication including a first health information indication corresponding to first health information and a second health information indication corresponding to second health information. The method further includes obtaining an input to the displayed service indication, and allowing the application access to the first health information and the second health information based on the input. Another embodiment is an electronic device including a display circuit configured to display a health management UI, a user input circuit configured to obtain a user input, and a processor connected with the display circuit and the user input circuit. The processor configured to group at least one health information item corresponding to a service that a health management application can provide. | 2017-05-18 |
20170140109 | METHOD AND SYSTEM FOR PREDICTION OF MEDICAL TREATMENT EFFECT - A computerized system and method for planning a medical treatment for an individual under specific medical condition comprises a data input utility configured for receiving input data, and a data processor. The input data includes first input data comprising medical data of a specific individual, and second input data comprising data indicative of at least one endpoint of treatment. The data processor is configured for utilizing the medical data of the specific individual and the data indicative of the at least one endpoint and processing data indicative of disease progression models, each disease progression model corresponding to a treatment plan comprising one or more predetermined treatment protocols for treating the specific medical condition. The data processor generates output data indicative of a treatment effect on the individual with respect to each of the treatment plans and at least one endpoint to evaluate the treatment plans. | 2017-05-18 |
20170140110 | METHOD AND SYSTEM FOR GENERATING AND DISPLAYING STRUCTURED TOPICS OF A HEALTHCARE TREATMENT TAXONOMY IN DIFFERENT FORMATS - A computerized method for generating and displaying structured topics of a taxonomy in different formats is provided. The computerized method includes generating a categorized topic viewer graphical user interface allowing a user to select a textual model defining a corpus of documents to explore by delimiting a healthcare treatment product; generating in the categorized topic viewer graphical user interface, in response to an input of the user delimiting the healthcare treatment product, at least one of a plurality of tools; generating in a topic mapping graphical user interface an interactive map illustrating the number of documents for a first class for each corresponding country; generating in a trend generating graphical user interface at least one of a plurality of tools; and modifying each of the categorized topic viewer graphical user interface, the topic mapping graphical user interface and the trend generating graphical user interface in response to at least one input of the user into at least one taxonomy filter such that data displayed by each of the categorized topic viewer graphical user interface, the topic mapping graphical user interface and the trend generating graphical user interface display data related to a second class of the corpus of documents, the second class being a subcategory of the first class. | 2017-05-18 |
20170140111 | DEVICES, SYSTEMS, AND METHODS FOR INCREASING HAND HYGIENE COMPLIANCE - A hand hygiene compliance system. The hand hygiene compliance system may comprise: at least one wash station, at least one access station, and at least one room monitor. Each wash station may comprise a wash station computer for accessing patient data. The access station may comprise an access station computer configured to transmit the patient data to the wash station computer in order to display patient data to the user. The wash station computer may allow the user to select one or more target patients to receive images of user washing and to be visited after washing, and each target patient may be associated with the room monitors. The wash station computer may comprise a camera for capturing one or more images of the user washing, and these images may be transmitted to the room monitors associated with the target patients. | 2017-05-18 |
20170140112 | System and Method for Clinical Workforce Management Interface - Systems and methods for generating and presenting a clinical workforce management interface to assign staff in a clinical setting. The interface may present components including an aggregate patient population profile listing individual patients in a unit, the projected workload capacity the care for those patients represents, and an assignment bar depicting provider assignments for that patient over a designated time period. The interface may likewise present a provider population profile which lists available care providers in a unit, as well as their capacity ratings, skill sets, shifts, or other schedule data characterizing available clinical staff. A charge nurse or other staff manager may view and manipulate the provider-to-patient assignments, for instance by dragging and dropping visual elements to perform assignments. Compliance monitoring functions such as maintaining provider ratios may be automatically performed, and the staff manager may be alerted when ratios or criteria violate limits. | 2017-05-18 |
20170140113 | INTERACTIVE DISPLAY FOR USE IN OPERATING ROOMS - An interactive method of displaying information in an operating room can include receiving data via a reader from badges associated with persons to establish the presence of persons in the operating room or the like. The data can be processed and the identifying information can be displayed on a display device that is visually accessible within the operating room. The display device can also display other relevant information, including surgical pause checklists, retained object counts, and relevant medical data. | 2017-05-18 |
20170140114 | MACHINE LEARNING CLINICAL DECISION SUPPORT SYSTEM FOR RISK CATEGORIZATION - Improved risk categorization is provided for clinical decision support and forecasting future health care spend. A risk index is provided that improves on other risk stratification models by synthesizing electronic medical records and health questionnaires with an individual patient's claim histories. Machine learning algorithms catalogue patients into distinct group clusters, based on risk which may be associated with annual health care spending, thereby enabling administrators to forecast future health care spending on the individual and population level. | 2017-05-18 |
20170140115 | INTELLIGENT STROKE RISK PREDICTION AND MONITORING SYSTEM - Disclosed are a method and a system using user personal, CBC, CMP and Lipid Panel data to predict a user stroke risk and help user monitor the stroke risk. Most stroke screening and diagnosis are related with the markers, video, image data, etc. although past researches have shown that serum albumin, RBC, MCV, MPV and PDW are all significantly correlated with stroke, use of the blood test results of CBC, CMP and Lipid Panel data to predict and monitor stroke risk has never been reported. Traditionally, stroke risk prediction and monitoring have been managed by doctors and hospitals and a user is unable to do it by himself or herself. The purpose of this invention is to provide an intelligent stroke risk prediction and monitoring system enabling users to predict and monitor the stroke risk. | 2017-05-18 |
20170140116 | Artificial General Intelligence System and Method for Medicine - A medical general intelligence computer system and computer-implemented methods analyze morpho-physiological numbers for determining a risk of an emergent disease state, determining an emergent disease state, predicting a pre-emergent disease state, determining a pre-emergent disease state, and/or predicting a risk of a pre-emergent disease state. | 2017-05-18 |
20170140117 | METHOD AND SYSTEM FOR GENERATING AND DISPLAYING TOPICS IN RAW UNCATEGORIZED DATA AND FOR CATEGORIZING SUCH DATA - A computerized method for searching and organizing a healthcare textual data set is provided. The method includes receiving, by a server including a processor and a memory, an input of a user of a selected healthcare treatment product delimiting a subject data set; displaying, in response to the input subject data set received by the server, an intertopic distance map on a topic modeler graphical user interface displaying topics of the input subject data set as raw uncategorized data, the topic modeler graphical user interface displaying icons each representing a corresponding topic within the data set, the icons illustrating a prevalence of the topics in the data set by sizes of the icons and an interrelatedness of the topics by spacing and/or overlap of the icons; modifying, in response to a selection of one of the icons, a terms graph of the topic modeler graphical user interface to display representative keywords of the topic represented by the selected icon; receiving an input of a pattern in a taxonomy modifier graphical user interface generated by the server; displaying, in response to the input pattern, text of the data set corresponding to the input pattern on the taxonomy modifier graphical user interface; and adding, in response to a request of the user, the input pattern to one or more existing levels of a taxonomy of the data set to alter the structure of the taxonomy and provide a modified healthcare treatment taxonomy on the memory of the server. | 2017-05-18 |
20170140118 | METHOD AND SYSTEM FOR GENERATING AND VISUALLY DISPLAYING INTER-RELATIVITY BETWEEN TOPICS OF A HEALTHCARE TREATMENT TAXONOMY - A computerized method for displaying categorized healthcare textual data after a taxonomy has been applied to a data set is provided. The method includes generating a visual network generator graphical user interface configured to display a visual network comprised of a plurality of nodes and links, each of the nodes corresponding to a healthcare treatment topic, each of the links connecting two of the nodes; receiving a nodes input delimiting a number of the nodes to be displayed in the visual network; receiving at least one links input delimiting the links to be displayed in the visual network, the at least one links input including a first link input delimiting the links based on a modifiable metric representing a mixture of a first metric and a second metric, the first metric indicating a strength of potential links of each of the topics represented by one of the delimited nodes in the data set with each of the topics represented by the other delimited nodes of the data set, the second metric indicating a strength of each of the potential links of the delimited nodes in comparison to other potential links of the two respective delimited nodes each of the potential links is connecting; and generating, in response to the nodes input and the at least one links input, the delimited nodes and the delimited links in the visual network on the visual network generator graphical user interface to illustrate correlations between the healthcare treatment topics of different categories. | 2017-05-18 |
20170140119 | METHOD FOR MONITORING BEHAVIOUR OF A PATIENT IN REAL-TIME USING PATIENT MONITORING DEVICE - The present disclosure relates to a method for monitoring behaviour of a patient in real-time. The method comprises receiving, by a patient monitoring device, data related to the patient from one or more sources. Thereafter, the patient monitoring device classifies the received data into one or more categories based on one or more rules. Further, the patient monitoring device correlates the categorized data to identify one or more activity patterns corresponding to the patient, wherein each of the one or more activity patterns are associated with an activity performed by the patient at predefined time intervals. The patient monitoring devices compares the activity pattern with predefined activity patterns and detects abnormal behaviour of the patient if the identified activity pattern is different from one or more predefined activity patterns corresponding to the patient. | 2017-05-18 |
20170140120 | MOBILE DATA HUB FOR PATIENT MONITORS - A mobile device such as a smart phone or tablet computer is paired with a patient monitor. Data is then transferred between the two wirelessly and, via the mobile device, may also be uploaded to a remote server. The data may include annotation and comments, in either text or audio form, as well as executable code and images. | 2017-05-18 |
20170140121 | SYSTEMS AND METHODS FOR POST-OPERATIVE OUTCOME MONITORING - A system including a range of motion module, a quality of sleep module, an overall module, and a control module. The range of motion module, subsequent to performing a procedure on a patient, determines a first range of motion score of the patient based on a signal generated by a sensor. The quality of sleep module, subsequent to performing the procedure on the patient, determines a first quality of sleep score or a first pain score based on the signal generated by the sensor. The overall module determines a combined score based on (i) the first range of motion score, and (ii) the first sleep score or the first pain score. The control module (i) determines whether an outcome of the procedure is positive based on the combined score, and (ii) stores the determined outcome and the combined score in a memory. | 2017-05-18 |
20170140122 | METHODS AND COMPOSITIONS FOR MONITORING HEART FAILURE - The present invention provides methods and compositions for monitoring of subjects suffering from, or being evaluated for, heart failure. A filtered Natriuretic peptide time-series, alone or in combination with other clinical indicia such as weight gain, can be used to estimate a patient's hazard (risk of decompensation). The cumulative integral of Natriuretic peptide concentration can be used to estimate cumulative hazard (risk times exposure) over longer periods of exposure, e.g., 14 day periods, or 30 day periods. | 2017-05-18 |
20170140123 | METHOD FOR PROGNOSING A RISK OF OCCURRENCE OF A DISEASE - The present invention relates to a method for prognosing a risk of occurrence of a disease in a subject, comprising: a) determining respective values of a plurality of disease risk-factors for the subject; b) providing a database of individuals for whom the values of the plurality of disease risk-factors have been determined and the occurrence or not of the disease in the individuals is known; c) recoding each value of the plurality of disease risk-factors of the subject and of the database individuals on a same disease incidence scale; d) selecting, within the database, a number of individuals which are at the lowest Euclidian distance of the subject with respect to other individuals of the database, wherein the Euclidian distance is based on the recoded values of the plurality of disease risk-factors; e) determining the ratio of the quantity of selected individuals in whom the disease has occurred to the number of selected individuals, thereby prognosing the risk of occurrence of the disease in the subject. | 2017-05-18 |
20170140124 | MACHINE IMPLEMENTED METHODS, SYSTEMS, AND APPARATUSES FOR IMPROVING DIAGNOSTIC PERFORMANCE - A method for ultrasound diagnosis includes determining a first risk of malignancy based on a human assessment of a first set of features of one or more ultrasound images of a target; determining a second risk of malignancy based on an automatically extracted second set of features of the one or more ultrasound images; determining at least one overall risk value based on the first risk of malignancy and the second risk of malignancy; and characterizing the at least one overall risk value as one of a high confidence assessment or a low confidence assessment. | 2017-05-18 |
20170140125 | REAL TIME ADAPTIVE CONTROLLER MEDICATION DOSING - Systems and methods for monitoring accurate, real-time medicament device events, performing analytics on that data, and providing notifications are described. In various embodiments, an application server receives controller medication events, analyzes the events, associated event times, and controller medication dosage plans to characterize event times and send notifications for future doses. The controller medication dosage plan may specify a dose time for a planned dose, a narrow time window comprising the dose time, and an expanded time window comprising the narrow time window and longer in duration than the narrow time window, and the events may be characterized based on their time relative to the dose time, the time windows, and other events. | 2017-05-18 |
20170140126 | Integrated Medication and Infusion Monitoring System - A system manages IV pumps so that clinicians automatically receive alerts, decisions, and actions required to maintain a patient IV medication therapy according to a prescribed treatment protocol. An infusion pump monitoring system, includes an acquisition processor for acquiring fluid infusion parameters for administration of an infusion fluid to a patient using an infusion pump. A fluid infusion monitor uses acquired fluid infusion parameters for automatically searching a patient medical record for information concerning rate of fluid infusion of a particular infusion fluid and determining if a rate of a previously administered dose of the particular infusion fluid was a lower rate than indicated in the fluid infusion parameters. An interface processor automatically initiates generation of a message indicating a potential adverse reaction to the particular infusion fluid in response to a determination of a lower rate being employed for previously administering the particular infusion fluid. | 2017-05-18 |
20170140127 | SYSTEMS AND METHODS FOR PRE-OPERATIVE PROCEDURE DETERMINATION AND OUTCOME PREDICTING - A system including a range of motion, quality of sleep, overall, and control modules. The range of motion module, prior to a procedure being performed on a patient, determines a first range of motion score of the patient based on a first signal generated by a sensor. The quality of sleep module, prior to the procedure being performed on the patient, determines a first quality of sleep score or a first pain score based on the first signal. The overall module determines a combined score based on the first range of motion score and the first quality of sleep score or the first pain score. The control module compares the combined score to a predetermined threshold and predicts an outcome of the procedure based on the comparison. The control module, based on the combined score, determines whether to perform the procedure, adjust the procedure or refrain from performing the procedure. | 2017-05-18 |
20170140128 | MONITORING DEVICE AND A METHOD OF MONITORING DRUG ADHERENCE IN A CLINICAL TRIAL - The present disclosure relates to a monitoring device and a method of monitoring drug adherence in a clinical trial. In one embodiment, the monitoring device determines that an authenticated user has consumed the medication comprising the drug and further determines that the authenticated user who has consumed the drug is associated with the corresponding monitoring device. Furthermore, the monitoring device determines that the drug has successfully passed through gastrointestinal (GI) tract of the authenticated user based on analysis of biometric signatures of the GI tract. Based on the determination of valid proximity and successful passing of the medication within the GI tract of the authenticated user, the monitoring device reports that the drug adherence by the user is successful. Thus, the disclosed method and the monitoring device determine that only authenticated user has consumed the medication and not just if the medication has been taken by any person. | 2017-05-18 |
20170140129 | METHOD AND SYSTEM FOR CARE & HOST - A method or system is disclosed for assessing a level of care for a care guest and matching the care guest to at least one care host or to an assisted living place. The method includes steps of (a) assessing a suitable level of care for the care guest, by prompting the care guest to choose an answer from an array of possible answer choices to each question from a set of questions and assigning an answer score to each answer and compute an assessment score for the care guest; (b) assessing a care host by prompting the care host to select an answer from an array of possible answer choices to each question from a set of questions assigning an answer score to each answer and compute an assessment score for the care host; and (c) matching the care guest to at least one care host through evaluating the answer scores and assessment scores for the care guest and one or more care hosts. The questions are selected from a group consisting of bathing, hygiene, dressing, telephone use, snack preparation, eating, transfer, mobility, daily housekeeping, going to the bathroom, wellness, mental status, medications, and a means to getting medications. | 2017-05-18 |
20170140130 | TAMPER PROOF DEVICE CAPABILITY STORE - Systems and methods for facilitating a trusted platform module (TPM) or other protector mechanism that provides a device with a trusted device capability store. To provide the device with a trusted device capability store, a fingerprint of an endorsement key that is associated with the TPM or other protector mechanism can be imprinted into firmware of the device. By imprinting the fingerprint into the firmware, the device can determine whether or not the TPM or other protector mechanism the device is communicating with is the TPM or other protector mechanism associated with the device. The TPM or other protector mechanism can include the endorsement key, the trusted device capability store, and an access policy. The trusted device capability store can include one or more capabilities associated with the device. The access policy can indicate both unauthorized read access and authorized write access associated with the TPM or other protector mechanism. | 2017-05-18 |
20170140131 | Distributed Hardware Security System - A distributed hardware security system can include one or more anti-pirating/license verification devices, such a dongle (or other internal or external devices) that can be used prevent piracy of protected property such as devices, features, software, or selected functionalities thereof while reducing the potential for unintended termination or suspension of access to the licensed property. In some embodiments, a multi-processor system can include a distributed hardware security system having multiple computing devices, such as display nodes, PCs, workstations, or other devices. The security system can include functionality for detecting a plurality of authorized license verification devices on the same system, and for determining if continued access to the licensed property can continue if there is a failure to recognize one or more of the authorized license verification devices. | 2017-05-18 |
20170140132 | DEVELOP AND DEPLOY SOFTWARE IN MULTIPLE ENVIRONMENTS - Developing, deploying, and operating an application in a plurality of environments is disclosed, including: defining runtime specific configuration information for a plurality of environments, wherein the runtime environment specific configuration includes topology configuration and security configuration, wherein the runtime environment specific configuration information is stored separately from other configuration information and is protected by an identity management system; executing an application in one of the plurality of environments, wherein execution of the application is controlled by a first role; and presenting a credential associated with the first role to the identity management system to obtain a portion of the runtime environment specific configuration information corresponding to the environment associated with the executing application. | 2017-05-18 |
20170140133 | SYSTEM AND METHOD TO DETERMINE GEOGRAPHIC REGION PROPERTIES OF USERS FOR MEDIA SERVICES - This invention relates to innovative method and system based on Device DNA to determine geographic region properties of a media user which will not be masked through proxy or virtual private network (VPN) for media content delivery through Internet. | 2017-05-18 |
20170140134 | MEDICAL DEVICE USER CACHING - An example medical device includes a physiological measurement device, a device management engine, a user caching engine, and a login engine. The device management engine is configured to receive data captured by the physiological measurement device. The user caching engine is configured to store cache records associated with users in a user cache. The login engine is configured to receive a user identifier associated with a user and determine whether the user identifier is associated with a cache record stored in the user cache. When determined that the user identifier is associated with a cache record stored in the user cache, the login engine is configured to log the user in. When not determined that the user identifier is associated with an unexpired cache record stored in the user cache, the login engine is configured to prompt the user for a credential. | 2017-05-18 |
20170140135 | PASSWORD INPUT METHOD, TERMINAL APPARTUS AND ELECTRONIC DEVICE - The present disclosure provides a password input method, a terminal apparatus and an electronic device. Here, the password input method includes detecting press operations performed on a password input interface of a terminal apparatus by a user; and obtaining a first password by resolving pressures corresponding to the press operations. According to the password input method, the terminal apparatus and the electronic device, a password input is achieved by user's press operations on a password input interface, so that the operation is more convenient and secure. | 2017-05-18 |
20170140136 | IDENTITY VERIFICATION - A method of associating a person with a particular set of data, which method includes, digitally capturing an image of a trusted document on which the identity of a person is represented on a capturing device, capturing data with which the person is to be associated on the capturing device, transmitting the digitized document in combination with the captured data via a computer network from the capturing device to a remote receiver. | 2017-05-18 |
20170140137 | Multi-System Entering Method, Apparatus and Terminal - A multi-system entering method, a multi-system entering apparatus, and a terminal include: setting unlocking rules of multiple systems; detecting matching conditions between a received unlocking password and the unlocking rules of the multiple systems; and according to the matching conditions between the received unlocking password and the unlocking rules, entering a corresponding system. The method can solve the problem of poor operation experience of a user caused by the method in which only one system can be entered before another system is entered. | 2017-05-18 |
20170140138 | BEHAVIOR BASED AUTHENTICATION FOR TOUCH SCREEN DEVICES - A method, system, and one or more computer-readable storage media for behavior based authentication for touch screen devices are provided herein. The method includes acquiring a number of training samples corresponding to a first action performed on a touch screen of a touch screen device, wherein the first action includes an input of a signature or a gesture by a legitimate user. The method also includes generating a user behavior model based on the training samples and acquiring a test sample corresponding to a second action performed on the touch screen, wherein the second action includes an input of the signature or the gesture by a user. The method further includes classifying the test sample based on the user behavior model, wherein classifying the test sample includes determining whether the user is the legitimate user or an imposter. | 2017-05-18 |
20170140139 | METHOD FOR SECURE OPERATION OF A COMPUTING DEVICE - In a computing device, when a user requests to carry out an operation, the device determines the type of operation requested and the time period since the user was last authenticated. The operation is enabled only if the determined time period does not exceed a threshold for the requested operation. | 2017-05-18 |
20170140140 | INFORMATION PROCESSING SYSTEM, STORAGE MEDIUM, AND INFORMATION PROCESSING METHOD - [Object] To provide an information processing system, a storage medium, and an information processing method which can provide customized services according to a user's context. | 2017-05-18 |
20170140141 | SYSTEM FOR IDENTITY VERIFICATION - A system for a dynamically evolving cognitive architecture for the development of a secure key and confidence level based data derived from biometric sensors and a user's behavioral activities. The system comprises one or more processors, one or more sensors, one or more databases, and non-transitory computer readable memory. The non-transitory computer readable memory comprises a plurality of executable instructions wherein the instructions, when executed by the one or more processors, cause the one or more processors to process operations comprising creating a set of policies based on user data sets and inputs, creating a faceted classification, establishing a Trust Level, processing sensor data, comparing data to one or more databases, correlating data, updating Trust Levels, updating security keys, and storing the keys in memory. In certain embodiments, the stored data is used to create a usage schema independent from a user's actual identity. | 2017-05-18 |
20170140142 | METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 2017-05-18 |
20170140143 | MANAGING ACCESS TO AN ELECTRONIC SYSTEM - A method, system or computer usable program product for managing access to an electronic system through a touchscreen device including presenting a display of a first and a second scrolling stream of icons; responsive to user input, detecting contemporaneous selection of a first icon from the first scrolling stream and a second icon from the second scrolling stream; and responsive to the selection of the first and second icon matching an established unlock pattern, unlocking the electronic system. | 2017-05-18 |
20170140144 | SYSTEM AND METHOD FOR AUTHENTICATING A MOBILE DEVICE - In a mobile device including an image capturing device having an imaging element (CCD), and an illumination element, capturing an image of a hologram and sending the image of the hologram to a server for authenticating the image and authorizing a transaction. | 2017-05-18 |
20170140145 | COMPUTER-CONTROLLED PHYSICALLY DISTRIBUTED COLLABORATIVE ASYNCHRONOUS DIGITAL TRANSACTIONS - A system for facilitating asynchronous digital transactions among a plurality of computer-controlled devices associated with a plurality of respective nodes. The system includes a first digital information database to store computerized identity information pertaining to the plurality of respective nodes and the associated plurality of computer-controlled devices. The system further includes a cognitive interactive human-machine interface configured to allow the plurality of computer-controlled devices and the associated nodes to interact digitally among them and with the system and with an external authorized node. The cognitive interactive human-machine interface is configured to receive at least one sensed stimulus from at least one of the computer-controlled devices and transmit digital information contained in the at least one sensed stimulus at least in part to the external authorized node to annotate the digital information by generating a digital input. | 2017-05-18 |
20170140146 | UNLOCK AND RECOVERY FOR ENCRYPTED DEVICES - A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device. | 2017-05-18 |
20170140147 | MOBILE DEVICE AND MONITORING METHOD ADAPTABLE TO MOBILE DEVICE - A mobile device includes a memory and a processor. The memory is configured to store a plurality of commands; the processor is configured to receive the commands and execute the following steps: receiving a function call and datum of a mobile application; determining if the received function call is a call to an predetermined application programming interface; determining if the received datum is labeled datum; and processing the received function call with a predetermined monitoring procedure when the received function call is the call to the predetermined application programming interface and the received datum is the labeled datum. | 2017-05-18 |
20170140148 | METHOD AND APPARATUS FOR PROTECTING KERNEL CONTROL-FLOW INTEGRITY USING STATIC BINARY INSTRUMENTATION - An apparatus and a method for protecting kernel control-flow integrity using static binary instrumentation are provided. The method includes configuring a compiler to reserve a register in a processor, compiling source code into a binary based on the configured compiler, and modifying the binary to prevent exploits using the reserved register, wherein the reserved register stores a first encryption key for encrypting and decrypting return addresses. The reserved register stores an encryption key that is used to encrypt and decrypt return addresses to prevent control flow exploits. | 2017-05-18 |
20170140149 | DETECTING MALIGN CODE IN UNUSED FIRMWARE MEMORY - Systems and methods for preventing attachment of malign code to unused firmware memory are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: read contents of a non-volatile memory (NVM); and determine that the NVM does not include malign code stored thereon, at least in part, by determining that selected memory locations in the NVM where firmware is not stored contain pre-determined values. | 2017-05-18 |
20170140150 | Malware Removal - A method and apparatus for scanning for or removing malware from a computer device. Under normal circumstances, the computer device is controlled by a first operating system installed in a memory of the device. In order to scan for or remove the malware from the computer device, control of the computer device is passed from the first operating system to a second operating system and, under the control of the second operating system, the device is either scanned for malware or the malware is removed. This allows malware to be detected or removed, even if it has affected the first operating system in some way in order to evade detection or removal. | 2017-05-18 |
20170140151 | SECURELY PASSING USER AUTHENTICATION DATA BETWEEN A PRE-BOOT AUTHENTICATION ENVIRONMENT AND AN OPERATING SYSTEM - Systems and methods for securely passing user authentication data between a Pre-Boot Authentication (PBA) environment and an Operating System (OS) are described. In some embodiments, an Information Handling System (IHS) may include a processor; and a Basic I/O System (BIOS) coupled to the processor, the BIOS having program instructions stored thereon that, upon execution by the processor, cause the computer system to: identify an encrypted Single-Sign-On (SSO) token and a Trusted Platform Module (TPM) key pair provisioned by an Operating System (OS) and stored in an OS registry; extract a TPM public key from the TPM key pair; encrypt a PBA private key generated by a PBA application with the TPM public key; and store the encrypted PBA private key, the TPM key pair, and the encrypted SSO token in a shadow partition of a self-encrypting hard drive coupled to the IHS. | 2017-05-18 |
20170140152 | Identifying Security Boundaries on Computing Devices - During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in another security boundary. As part of booting the computing device measurements of (e.g., hash values or other identifications of) various modules loaded and executed as part of booting the computing device are maintained by a boot measurement system of the computing device. Additionally, as part of booting the computing device, public/private key pairs of one of the security boundaries is generated or otherwise obtained. Private keys of the public/private key pairs are provided to the one security boundary, and the public keys of the public/private key pairs are provided to the boot measurement system. | 2017-05-18 |
20170140153 | Providing A Trusted Execution Environment Using A Processor - In an embodiment, a system on a chip includes: a single core to execute a legacy instruction set, the single core configured to enter a system management mode (SMM) to provide a trusted execution environment to perform at least one secure operation; and a memory controller coupled to the single core, the memory controller to interface with a system memory, where a portion of the system memory comprises a secure memory for the SMM, and the single core is to authenticate and execute a boot firmware, and pass control to the SMM to obtain a key pair from a protected storage and store the key pair in the secure memory. Other embodiments are described and claimed. | 2017-05-18 |
20170140154 | DEPLOYMENT ASSURANCE CHECKS FOR MONITORING INDUSTRIAL CONTROL SYSTEMS - This disclosure provides an apparatus and method for deployment assurance checks for monitoring industrial control systems and other systems. A method includes identifying, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks. The method includes determining devices to be monitored from the plurality of connected devices. The method includes evaluating system resource usage, by the risk manager system, on each device to be monitored. The method includes providing recommendations to a user as to whether or not the user should proceed with the monitoring, based on the evaluation. | 2017-05-18 |
20170140155 | SYSTEMS, METHODS, AND APPARATUS TO ENHANCE THE INTEGRITY ASSESSMENT WHEN USING POWER FINGERPRINTING SYSTEMS FOR COMPUTER-BASED SYSTEMS - A power fingerprinting system is adopted for assessing integrity of a target computer-based system. In one implementation, the power fingerprinting system may receive, at a first module, side-channel information of a first target component of a system, the first module being collocated with the first target component; obtain a power fingerprint for the first target component based on the side-channel information for the first target component, the power fingerprint for the first target component representing a plurality of execution statuses of the first target component; receive, at a second module, side-channel information of a second target component of the system, the second module being collocated with the second target component, the power fingerprint for the second target component representing a plurality of execution statuses of the second target component; and obtain a power fingerprint for the second target component based on the side-channel information for the second target component. | 2017-05-18 |
20170140156 | SYSTEMS AND METHODS FOR PROTECTING BACKED-UP DATA FROM RANSOMWARE ATTACKS - The disclosed computer-implemented method for protecting backed-up data from ransomware attacks may include (1) determining that a backup system periodically backs up at least one file stored at a computing device to a remote storage system by storing a copy of the file at the remote storage system, (2) identifying one or more characteristics of the file backed up by the backup system, (3) storing a tripwire file with the one or more characteristics at the computing device, (4) determining that the file stored at the computing device has likely been encrypted by ransomware executing on the computing device by detecting that the tripwire file has been modified, (5) performing an action that prevents the backup system from replacing the copy of the file at the remote storage system with a copy of the encrypted file. Various other methods, systems, and computer-readable media are also disclosed. | 2017-05-18 |
20170140157 | AVOIDING ENCRYPTION IN A DEDUPLICATION STORAGE - Avoiding encryption in a deduplication vault. In one example embodiment, a method for avoiding encryption during a backup of a source storage into a deduplication storage may include analyzing an allocated plain text block stored in the source storage at the point in time to determine if the allocated plain text block is already duplicated in the deduplication storage, in response to the allocated plain text block already being duplicated in the deduplication storage, avoiding encryption of the allocated plain text block by skipping an encryption of the allocated plain text block and instead associating the location of the allocated plain text block in the source storage with the location of the duplicate block already duplicated in the deduplication storage. | 2017-05-18 |
20170140158 | SYSTEMS AND METHODS FOR CONTAINERIZED DATA SECURITY - Provided herein are systems and methods useful in facilitating containerized data security. The system may include a data store, a computer processing unit, a network interface, and memory. The memory may contain executable instructions for causing the system to perform a containerized data security method including obtaining a first external communication from a source external to the system; associating the first external communication with the first container; authenticating the first external communication with respect to the first container; providing the first external communication to an unencrypted instance of the first container in the memory; obtaining a first responsive communication from the unencrypted instance of the first container; and providing the first responsive communication to the source external to the system. | 2017-05-18 |
20170140159 | Access Privilege Analysis for a Securable Asset - Techniques for access privilege analysis for a securable asset are described. According to various embodiments, a securable asset represents an object that is subject to access control. Generally, embodiments discussed herein can be employed to identify a principal that can be leveraged to obtain an access privilege to a securable asset, whether or not the principal is expressly granted an access privilege to the securable asset. | 2017-05-18 |
20170140160 | SYSTEM AND METHOD FOR CREATING, TRACKING, AND MAINTAINING BIG DATA USE CASES - A system may register a use case with the use case including an application. An application identifier may be assigned to the application. The system may generate a transformation associated with the use case. The transformation may include logic to derive an output variable from a source variable. The system may also execute the transformation to derive output data for the output variable from source data of the source variable. The system may further lookup an access permission for the application using the application identifier in response to an access request. | 2017-05-18 |
20170140161 | Method and Apparatus for Storing, Sharing, and/or Organizing Personal Information - Embodiments of the subject invention relate to systems and methods for presenting and managing user information. Specific embodiments allow creating, editing, presenting, and storing user information. In a more specific embodiment, the systems and methods can be used to provide a digital safe deposit box (DSDB) that allows users to save, maintain, update, and/or share information about themselves and/or their organization. Specific embodiments provide a personal financial solution that is designed for customers interacting with professional institutions, such as accounting firms, banks, and insurance agencies, and/or interacting with family members and people that may need to access certain documents. Embodiments of the invention provide individuals, based on permission granted/allocated to them, access to specific information, while providing safety from fraud. | 2017-05-18 |
20170140162 | Steganography Detection - Systems and methods for detecting potential steganography use to hide content in computer files transmitted via electronic communications are provided. An electronic communication associated with a computer file may be identified. The communication and the computer file may be analyzed to determine whether the computer file potentially includes hidden content. To determine whether the computer file potentially includes hidden content, a set of steganographic criteria may be analyzed. If at least a portion of the steganographic criteria are satisfied, then it may be determined that the computer file potentially includes hidden content. If at least a portion of the steganographic criteria are not satisfied, then it may be determined that the computer file does not potentially include hidden content. If the computer file is determined to potentially include hidden content, an individual may be notified of the communication associated with the computer file. | 2017-05-18 |
20170140163 | Steganography Detection - Systems and methods for detecting potential steganography use to hide content in computer files transmitted via electronic communications are provided. An electronic communication associated with a computer file may be identified. The communication and the computer file may be analyzed to determine whether the computer file potentially includes hidden content. To determine whether the computer file potentially includes hidden content, a set of steganographic criteria may be analyzed. If at least a portion of the steganographic criteria are satisfied, then it may be determined that the computer file potentially includes hidden content. If at least a portion of the steganographic criteria are not satisfied, then it may be determined that the computer file does not potentially include hidden content. If the computer file is determined to potentially include hidden content, an individual may be notified of the communication associated with the computer file. | 2017-05-18 |
20170140164 | PRIVACY PROTECTING SENSING DEVICES - Information regarding one or more sensing devices in an environment is broadcasted. The broadcasted information is received by a user application running on a user device in the environment. The broadcasted information comprises information regarding presence of the one or more sensing devices in the environment and at least one of a capacity profile and an activity profile of the one or more sensing devices. | 2017-05-18 |
20170140165 | POSIXLY SECURE OPEN AND ACCESS FILES BY INODE NUMBER - A method for secure portable operating system interface (POSIX) directory traversing for opening and accessing files by inode number. The method includes receiving, by a process executed by a processor, a request for a ticket for traversing a file system. The process generates a secure key for a unique handle object based on the request for the ticket. An authentication code is generated for the ticket using a numeric file identifier and the secure key. In response to reading a directory with POSIX x and r permissions according to directory permission bits or an access control list (ACL), the ticket is returned including ticket information including the numeric file identifier, generation information and the authentication code. In response to a request to open a directory, the ticket information is validated based on the secure key. A directory is opened for reading using the validated ticket information and the unique handle. | 2017-05-18 |
20170140166 | DRIVE RECORDER, RECORDING METHOD OF DRIVE RECORDER, AND COMPUTER-READABLE MEDIUM - A drive recorder according to an embodiment includes a capture unit and an access controller. The capture unit captures an outside of a vehicle. The access controller sets access limitation, which limits an access from a person other than an occupant of the vehicle, for traveling images of the vehicle. The traveling images are captured by the capture unit and stored in a storage medium. When an event arising from the vehicle meets a predetermined condition that indicates at least level of urgency, the access controller removes the access limitation. | 2017-05-18 |
20170140167 | UNMASKING OF CONFIDENTIAL CONTENT - Facilities are provided herein for unmasking content presented on a display of a computing device. An unmask rule for unmasking the content on the display is determined based on confidentiality level of the content and includes an unmasking parameter indicating an extent to which a masked version of the content is to be physically shielded to unmask the content. A mask is selected and applied to the content in displaying the content on the display. The mask is selected based on the determined unmask rule to convey the unmasking parameter to a user. A shielding level indicating an extent to which the user has physically shielded the masked content on the display is detected and it is determined whether the detected shielding level satisfies the unmasking parameter. If so, the content is temporarily unmasked on the display. | 2017-05-18 |
20170140168 | EXECUTION ENVIRONMENT FILE INVENTORY - A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system. Each execution environment is in the group comprising a native binary execution environment configured to execute native machine language instructions and a non-native execution environment configured to execute at least one program to process non-native machine language instructions to yield native machine language instructions. The inventory is maintained based on a result of the considering step. The inventory may be used to exercise control over what executables are allowed to execute on the computer system. | 2017-05-18 |
20170140169 | SYSTEM AND METHOD FOR SIGNATURE PATHWAY AUTHENTICATION AND IDENTIFICATION - A computer-implemented security system and method provides signature pathway authentication and identification. The system and method include establishing a user-defined cognitive signature pathway through multiple graphical zones of a graphical user interface. The signature pathway enables authorized user access to an otherwise secured location. Subsequent entries of the signature pathway entered via the graphical user interface are then validated. For all valid entries of the signature pathway, user access is allowed to the secured location. | 2017-05-18 |
20170140170 | WEARABLE DEVICE MULTI-MODE SYSTEM - Systems and techniques are disclosed for detecting whether a wearable computing device is worn by a user or not. The detection can be made based on whether the device is secured to a user or based on a sensor. A device worn by a user may be operated in a private mode such that the user wearing the device is provided information that is useful while wearing the device. For example, the user may receive message notifications, news updates, telephone call information, or the like. A wearable computing device maybe operated in a public mode while not being worn by a user. While in the public mode, the device may provide non user specific information such as a current time, media items, or the like. | 2017-05-18 |
20170140171 | System for Managing Personal Data - A method for managing personal data of a user of a user device is provided. The user device is adapted to have installed thereon an application (APP). The APP is configured to require access to the personal data when running on the user device. The method comprises creating a certification for the APP, the certification being based on a corresponding statement providing information regarding the relationship between the APP and personal data; associating the certification to the APP for certifying the APP; allowing the user to provide user-defined policies about exploiting the user personal data; checking whether the user-defined policies provided by the user are compatible with requirements of the APP defined in the corresponding statement. If the user-defined policies are compatible with the requirements of the APP defined in the statement, the method executes operations when the APP running on the user device requires to access personal data. | 2017-05-18 |
20170140172 | PORTABLE ELECTRONIC DEVICE AND IC CARD - A portable electronic device has a confidential data storage, a disclosure method selection unit and a disclosure processing unit. The confidential data storage stores confidential data. The disclosure method selection unit selects disclosure method information indicating a data disclosure method for disclosing the confidential data stored in the confidential data storage, based on user identification information for identifying a user received from an external apparatus. The disclosure processing unit generates output data in which at least a portion of the confidential data is hidden in accordance with the disclosure method information selected by the disclosure method selection, and transmits the output data to the external apparatus. | 2017-05-18 |
20170140173 | VIRTUALIZATION INPUT COMPONENT - One or more systems and/or methods for storing personal information within a first device and/or for providing personal information from the first device to the second device are provided. The first device (e.g., a smartphone) may identify a user interface (e.g., a movie streaming website) populated with user specified data (e.g., a password). The user specified data may be evaluated to identify personal information of the user (e.g., a movie streaming website password). The personal information may be stored within the first device. Responsive to determining that a second device (e.g., a smart television) displays a personal information input field (e.g., a movie streaming website password input field), an input event comprising the personal information may be provided from the first device to the second device. The input event may invoke the second device to input the movie streaming website password into the movie streaming website password input field. | 2017-05-18 |
20170140174 | Systems and Methods for Obtaining Authorization to Release Personal Information Associated with a User - An exemplary method of obtaining authorization to release personal information associated with a user includes, at a server system, receiving a request for personal information associated with a user from a third party. The method further includes generating, in a system agnostic widget, a consent request for requesting authorization to release the personal information associated with the user to the third party and transmitting the consent request to a client device of the user via the widget. In response to receiving authorization to release the personal information from the client device via the widget: (1) facilitating provision of the personal information to the third party, and (2) storing the authorization in association with an account of the user. | 2017-05-18 |
20170140175 | SECURE REMOVABLE STORAGE FOR AIRCRAFT SYSTEMS - Techniques are disclosed for securing backup operational data (e.g., of an aircraft) maintained by a line-replaceable unit (LRU) in a removable storage media device. The LRU generates a first encryption key. The LRU encrypts the operational data using the first encryption key. The LRU generates a second encryption key based on key data of at least a second LRU. The LRU encrypts the first encryption key using the second encryption key. | 2017-05-18 |
20170140176 | SHAPE ACTUATION ENCAPSULANT OF A CRYPTOGRAPHIC MODULE - To provide for a physical security mechanism that forms a complete envelope of protection around the cryptographic module to detect and respond to an unauthorized attempt at physical access, a tamper sensing encapsulant generally encapsulates the cryptographic module. The tamper sensing encapsulant includes a first shape actuation layer associated with an electrically conductive first trace element and a second shape actuation layer associated with an electrically conductive second trace element. The first shape actuation layer is positioned against the second shape actuation layer such that the first trace element and the second trace element do not physically touch at an operating temperature of the cryptographic module and do physically touch when the first shape actuation layer and the second shape actuation layer are thermally loaded. Upon first trace element and the second trace element touching, a circuit is formed that disables the cryptographic module. | 2017-05-18 |
20170140177 | INFORMATION RECORDING MEDIUM, COLUMNAR BODY HAVING INFORMATION RECORDING MEDIUM AFFIXED THERETO, INFORMATION READING DEVICE THEREFOR, PHARMACEUTICAL INJECTION DEVICE USING THIS INFORMATION READING DEVICE, INFORMATION READING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - It is an object to provide an information recording medium with which information symbols can be suitably read. This information recording medium comprises a sheet-form member, a plurality of information symbols that are displayed on the surface of the sheet-form member and each have the same information, and an edge line that is provided at one end and/or the other end of the sheet-form member and allows an information reading device which reads the information symbols to recognize the end of the sheet-form member. | 2017-05-18 |
20170140178 | CARD READER - A card reader may include an IC contact block; an insertion port; an insertion posture detection mechanism; a tip end detection mechanism; a pulling-out prevention mechanism structured to prevent pulling-out of a card inserted in an inside of the card reader when it is detected that the card is inserted into the insertion port in a correct posture based on a detected result of the insertion posture detection mechanism and, when it is detected that the tip end face of the card in the inserting direction has been inserted to the predetermined position based on a detected result of the tip end detection mechanism; and a pushing-out mechanism structured to push out the card inserted into the inside of the card reader in an ejecting direction of the card which is an opposite direction of the inserting direction. | 2017-05-18 |
20170140179 | MAGNETIC CARD READER WITH ELECTROSTATIC DISCHARGE STRIP - A slidable magnetic card reader particularly suitable for magnetic payment cards having at least one longitudinal edge surface, the card reader including a magnetic card reading head operative to provide a data output in response to sliding thereby of a magnetic card bearing readable magnetically encoded data and a sliding track defining assembly including an elongate magnetic card edge engagement surface arranged for sliding engagement with a longitudinal edge surface of a magnetic card, the elongate magnetic card edge engagement surface extending at least to a location generally underlying the magnetic card reading head, at least a portion of the elongate magnetic card edge engagement surface being electrically conductive and being coupled to electrical ground. | 2017-05-18 |
20170140180 | MAGNETIC FIELD GENERATOR, CONTROL METHOD FOR MAGNETIC FIELD GENERATOR, AND MAGNETIC RECORDING MEDIUM PROCESSING DEVICE - A magnetic field generator may include a magnetic field generation part including a resonance part including an inductor and a capacitor connected with each other, and which is structured so that an AC current is flowed between the inductor and the capacitor by charging electric charge to the capacitor and discharging the electric charge to generate a magnetic field by a resonance; a current direction monitoring section structured to monitor a direction of a current flowing through the inductor of the magnetic field generation part; and a judging section structured to control a timing for charging in the magnetic field generation part depending on the direction of the current flowing through the inductor which is obtained by monitoring of the current direction monitoring section. | 2017-05-18 |
20170140181 | KINEMATIC ASSET MANAGEMENT - A system for managing kinematic assets is disclosed. In one embodiment, the system comprises an electronic identification device associated with an asset. The system further comprises a container comprising a reader disposed within the container for receiving a unique identification of the identification device. The container further comprises a reader node for maintaining an inventory record comprising the asset and for generating a report when the asset is not detected by said reader. The report further comprises a location of the container when said report is generated. The system further comprises a kinematic asset management platform comprising an asset registry for storing data conveyed by the report and a reports engine for generating a second report conveying the location of said container when the report is generated. | 2017-05-18 |
20170140182 | IDENTIFICATION SYSTEM - A technical problem to be solved by the present disclosure is to provide an identification system which utilizes an identification tag that stores multiple authentication factors identifies, through a camera or video image, an identification object, and accomplishes higher level identification accuracy and security in comparison with those of conventional technologies. Encrypted display information is generated using a unique factor registered in advance in a predetermined external list, and a composite text externally obtained, or internally retained, information is displayed by an identification tag as a two-dimensional code or a hologram, and the displayed information is read by a camera or a video. Through multi-factor authentication, whether the identification object carrying the identification tag is a registered identification object or a non-registered object is identified. | 2017-05-18 |
20170140183 | STORAGE CONCIERGE - Embodiments are generally, and without limitation, related to devices, systems, and methods that allow one or more users to store objects, in a fixed storage in a remote storage enclosure, that the user can have shipped to themselves anywhere. More specifically, but without limitation, a user sends objects directly or indirectly from a merchandise provider, to a fixed storage provided by a storage concierge at a Unique Address assigned to the user by the storage concierge. The storage concierge tags each object with an unique code and creates an inventory of each object it receives for the user. The storage concierge processes each object and then stores the objects in the user's fixed storage associated with the Unique Address. When the user needs one or more objects, the user requests the objects to shipped to a desired location. The storage concierge takes the objects from the fixed storage and ships them accordingly. When the user is finished using the objects, the user requests that the objects be returned to the closet. The storage concierge ships the objects to the storage enclosure, processes the objects, and returns them to the fixed storage associated with the users Unique Address. | 2017-05-18 |
20170140184 | System and Method for Tracking an Agricultural Asset Transferred Among Plural Asset Receiving Devices - A tracking system is capable of tracking a history of an agricultural asset transferred among a plurality of asset receiving devices using a communications network. The system uses radio-frequency identification tags intermixed with the agricultural asset. A main server, in communication with the network, stores the tag identification of each tag therein. A controller associated with each asset receiving device includes a controller identification, a receiving component for receiving the identification of the tags within the respective asset receiving device, and a transmitting component for transmitting the tag identifications to the main server together with the controller identification. The main server stores a historical record in association with each tag identification that primarily consists of the controller identification of each controller which has transmitted the tag identification to the main server with the respective controller identification associated therewith. | 2017-05-18 |
20170140185 | PAIRING METHOD FOR WIRELESS SCANNER VIA RFID - A wireless scanner is described that performs a pairing operation with a wireless scanner base before commencing scanning operations in a wireless scanner network. Radio frequency identification (RFID) is used to achieve the pairing operation of the wireless scanner with the wireless scanner base by using an RFID tag associated with the wireless scanner base. The RFID tag in the wireless scanner base may contain pairing information such as a network address of the wireless scanner base for use in automatically establishing a wireless communication session with the wireless scanner base in accordance with another wireless protocol. | 2017-05-18 |