31st week of 2015 patent applcation highlights part 47 |
Patent application number | Title | Published |
20150213177 | COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR GENERATING A LAYOUT OF A CELL DEFINING A CIRCUIT COMPONENT - The present invention provides a system and computer implemented method for generating a layout of a cell defining a circuit component, the layout providing a layout pattern for a target process technology. In accordance with the method, a process technology independent layout representation associated with the circuit component is input, the process technology independent layout representation being defined within a grid array providing a plurality of grid locations. A mapping database is provided having a priority ordered list of mapping entries, each mapping entry storing a process technology independent layout section and an associated layout pattern section for the target process technology. For selected grid locations within the grid array, a lookup operation is performed in the mapping database to determine a matching mapping entry, the matching mapping entry being a highest priority mapping entry within the priority ordered list whose process technology independent layout section matches a portion of the process technology independent layout representation at that selected grid location. The layout of the cell is then generated by incorporating, at each of the selected grid locations, the layout pattern section for the target process technology stored in the matching mapping entry. This provides an automated mechanism for generating cells whose layouts conform to a target process technology. | 2015-07-30 |
20150213178 | TIER BASED LAYER PROMOTION AND DEMOTION - Among other things, one or more systems and techniques for tier based layer modification, such as promotion or demotion, for a design layout are provided herein. A metal scheme describes one or more metal layers of the design layout, which are grouped into a set of tiers based upon resistivity similarity between the metal layers. Wire segments of the design layout are evaluated for promotion to tiers providing improved performance, for demotion to tiers providing decreased performance so that relatively faster routing resources are freed up for other wire segments, or for modification such as widening of wire segments. Via count penalties corresponding to timing delays of additional vias used to reassign wire segments are taken into account during promotion. Routing resource gains associated with reassigning wire segments are taken into account during demotion. In this way, wire segments of the design layout are promoted, demoted, or modified. | 2015-07-30 |
20150213179 | LEAKAGE POWER REDUCTION IN INTEGRATED CIRCUITS BY SELECTIVE REMOVAL AND/OR SIZING OF SWITCH CELLS - According to one general aspect, a method may include receiving a placed and routed circuit design, wherein the placed and routed circuit design includes a plurality of switch cells. The method may include performing a supply voltage drop analysis on the placed and routed circuit design. The method may also include creating a voltage drop map detailing a plurality of supply voltage drops across the placed and routed circuit design as a function of physical position. The method may further include determining one or more low voltage drop portions of the placed and routed circuit design that are associated with respective voltage drops below a predetermined threshold value. The method may include altering one or more switch cells included by the respective one or more low voltage portions. | 2015-07-30 |
20150213180 | INTEGRAL FABRICATION OF ASYMMETRIC CMOS TRANSISTORS FOR AUTONOMOUS WIRELESS STATE RADIOS AND SENSOR/ACTUATOR NODES - A method of arranging asymmetrically doped CMOS transistors in a semiconductor wafer that forms base cells within a plurality of logic standard cells in a CMOS process technology that includes conventional symmetric CMOS transistors having different threshold voltages. The asymmetrically doped CMOS transistors have a gate length exceeding 1.5 times the minimum gate length of the symmetric CMOS transistors. Regions defined by electrical junctions directly adjacent to the gate of the asymmetric transistors are formed by an implant mask exposing an area of the wafer on the source side of the transistor to receive the junction implant of the symmetric CMOS transistors with a higher threshold voltage while shielding the drain area, and a further implant mask exposing an area of the wafer on the drain side of the transistor to receive the junction implant of the symmetric CMOS transistors with a lower threshold voltage while shielding the source area. | 2015-07-30 |
20150213181 | Tag Based System For Leveraging Design Data - This application discloses a computing system implementing one or more tools or mechanism configured to integrate different design stages, phases, or levels of abstraction by relating objects based on one or more of their characteristics, such as physical or electrical attributes, properties, references, or the like. The tools or mechanism can generate tags corresponding to characteristics of objects in one or more designs representing at least a portion of an electronic system. The tools or mechanism can link the objects in the one or more designs based, at least in part, on tags, and, in response to receiving a selection corresponding to a portion of the one or more designs, present information corresponding to at least another portion in the one or more designs associated with the selected portion based, at least in part, on the linked objects. | 2015-07-30 |
20150213182 | COMMON TEMPLATE FOR ELECTRONIC ARTICLE - One or more techniques or systems for incorporating a common template into a system on chip (SOC) design are provided herein. For example, a common template mask set is generated based on a first set of polygon positions from a first vendor and a second set of polygon positions from a second vendor. A third party creates a third party SOC design using a set of design rules generated based on the common template mask set. The common template is fabricated based on the third party SOC design using the common template mask set. Because the common template is formed using the common template mask set and because the common template mask set is based on polygon positions from both the first vendor and the second vendor, a part can be connected to the SOC regardless of whether the part is sourced from the first vendor or the second vendor. | 2015-07-30 |
20150213183 | System and Method for Designing Cell Rows - A system and method for designing integrated circuits is disclosed. An embodiment comprises placing a standard cell with a first cell height into a cell row with a different height. The standard cell may have a height smaller than the cell row or else may have a height that is larger than the cell row. Vertical fillers and horizontal fillers are utilized to extend and connect the standard cell to adjacent cells without having to redesign the entire cell row. | 2015-07-30 |
20150213184 | METHOD AND APPARATUS FOR MODIFIED CELL ARCHITECTURE AND THE RESULTING DEVICE - A methodology for a modified cell architecture and the resulting devices are disclosed. Embodiments may include determining a first vertical track spacing for a plurality of first routes for an integrated circuit (IC) design, each of the plurality of first routes having a first width, determining a second vertical track spacing for a second route for the IC design, the second route having a second width, and designating a cell vertical dimension for the IC design based on the first and second vertical track spacings. | 2015-07-30 |
20150213185 | METHOD, COMPUTER SYSTEM AND COMPUTER-READABLE STORAGE MEDIUM FOR CREATING A LAYOUT OF AN INTEGRATED CIRCUIT - A method includes obtaining a plurality of design rules for an integrated circuit, including a first set of design rules and a second set of design rules. An automated layout construction process performed on the basis of the first set of design rules but not on the basis of the second set of design rules creates a layout of the integrated circuit. The layout of the integrated circuit is checked for design rule violations wherein at least one member of the second set of design rules is not satisfied. The layout of the integrated circuit is modified for bringing the layout into conformity with each of the plurality of design rules if one or more design rule violations are found in the checking of the integrated circuit. | 2015-07-30 |
20150213186 | TIMING DRIVEN CLOCK TREE SYNTHESIS - This application discloses performing a static timing analysis on a circuit design with an unbalanced clock tree, for example, to determine data arrival timing and clock arrival timing at multiple clock-driven circuits in a circuit design, and then performing clock tree synthesis on the circuit design to initially balance the unbalanced clock tree based, at least in part, on the data arrival timing relative to the clock arrival timing at the multiple clock-driven circuits. The clock tree after initial balancing includes a clock signal path configured to provide a clock signal to each of the multiple clock-driven circuits with a new clock arrival timing that corresponds to the data arrival timing. | 2015-07-30 |
20150213187 | System for Introspection and Annotation of Electronic Design Data - A system for introspection and annotation of electronic design data includes a tracked probe that interacts with an electronic circuit, a tracking system, schematics, design files, or models for the circuit, electronic design system software, and a user interface. The probe has a sensor that tracks the position of the probe within the circuit. The tracking system receives data from the sensor and translates it into coordinates reflecting the location of the probe within the circuit. The software uses the probe coordinates to locate the position of the probe on the circuit schematic, identify the circuit component at the probe location, and display information about the identified component. The displayed information preferably includes an annotated version of the circuit schematic. The system may include a measurement or instrumentation device, the probe may include at least one parameter measurement device, and the display may include information derived from the parameter measurements. | 2015-07-30 |
20150213188 | CONCURRENT TIMING-DRIVEN TOPOLOGY CONSTRUCTION AND BUFFERING FOR VLSI ROUTING - A system and method for topology construction for long and complex fan-out networks such as encountered in microprocessors include a modified Steiner tree algorithm with concurrent buffering to reduce post-buffer power/delay cost for a spanning tree. The system and method may prune Hanan points prior to calling a buffering tool to insert buffers and insert non-Hanan branching points. Embodiments may also include dividing a device into a plurality of super unit blocks, performing routing within each of the plurality of super units using a single crossing Steiner tree algorithm to determine a corresponding port, and aligning corresponding ports of each super unit to provide routing between the plurality of super units. | 2015-07-30 |
20150213189 | VIRTUAL LAYER GENERATION DURING FAILURE ANALYSIS - A layout design for a semiconductor chip includes two or more layers, each including a set of shapes, which are used for various fabrication processes during the manufacture of a physical semiconductor chip. Some manufacturing processes create physical features on the semiconductor chip that do not directly correspond to shapes in the layout design. To facilitate design analysis of such semiconductor chips, shapes from the layout design are selected and manipulated by performing one or more operations, such as Boolean operations, on the shapes to generate new shapes. The new shapes, which can represent physical features of the manufactured semiconductor chip, are then displayed, along with an image of the corresponding section of the physical semiconductor chip, to facilitate design analysis, such as failure analysis. | 2015-07-30 |
20150213190 | Method and Apparatus for Modeling Multi-terminal MOS Device for LVS and PDK - A method comprises identifying a semiconductor device layout region comprising a first n-type metal oxide semiconductor (MOS) device having a first pair of face-to-face diodes adjacent to a second n-type MOS device having a second pair of face-to-face diodes and adding a dummy device between a first body contact of the first n-type MOS device and a second body contact of the second MOS device. | 2015-07-30 |
20150213191 | Neural Interface Activity Simulator - Systems and methods to simulate activity that would be recorded using an interface to nerve fibers are provided. Signals, such as motor intent signals, can be converted to neural recordings, such as neural recordings by longitudinal intrafascicular electrodes (LIFEs). Spinal cord motor pools and neural interfaces can be jointly simulated. Realistic simulated neural recordings, such as from electrodes such as LIFEs, can be provided and can be used for the evaluation of decoding algorithms. Systems and methods described herein provide a framework for developing neural interface devices. | 2015-07-30 |
20150213192 | System For Genetic Surveillance and Analysis - A genetic surveillance system comprises a communications network and at least one reader-analyzer instrument. The reader-analyzer instrument has a communication interface to communicate over the network. The reader-analyzer instrument is adapted to perform genetic assay analysis of a sample obtained from a member of a population and to generate detection-related data based upon the analysis. The reader-analyzer instrument is adapted to associate qualifying information with the detection-related data and to communicate the associated qualifying information and detection-related data over the network. | 2015-07-30 |
20150213193 | METHOD AND SYSTEM FOR MICROBIOME ANALYSIS - A method and system for analyzing a microbiome of an individual, comprising: providing a sampling kit to the individual at a location remote from the sample processing network, the sampling kit including a sample container having a lysing component and a sample preservation component and configured to receive a sample from a collection site of the individual; receiving the sample container with the sample from the collection site of the individual; generating a microbiome sequence dataset based upon sequencing nucleic acid content of a microorganism portion of the sample; identifying a set of microorganisms represented in the microorganism portion based upon performance of a mapping operation on portions of the microbiome sequence dataset; generating an analysis based upon a set of features related to the microorganism portion; and transmitting information derived from the analysis to the individual. | 2015-07-30 |
20150213194 | Methods, Devices, And Systems For Multi-Format Data Aggregation - Methods, devices, and systems for multi-format data aggregation, from disparate sources. According to an aspect, a method of populating a personal health record (PHR) with data culled from a plurality of images of a plurality of printed documents provided by a plurality of medical providers to a patient at a plurality of points of care after the patient visits the plurality of medical providers may be provided. | 2015-07-30 |
20150213195 | ELECTRONIC HEALTH RECORDS - The system disclosed herein provides a method of populating an exclusively patient controlled record in a patient controlled electronic health record (PCHR) record repository, the method comprising: processing a request from a patient for a health information artifact; determining a supplier of the health information artifact; generating one or more information request templates required by the supplier of the health information artifact; generating an information request document using one or more of the information request templates; encrypting the information request document; sending the encrypted information request document to the supplier of the health information artifact; receiving the health information artifact; adding the health information artifact to the exclusively patient controlled record stored in the PCHR record repository; and controlling access of a user, human or machine, to the exclusively patient controlled record in the PCHR record repository based on (a) patient authorization of the user for future record access and (b) on consent from a registered device in response to the request of a patient-authorized user for current record access. | 2015-07-30 |
20150213196 | SYSTEM AND METHOD FOR SECURE OPERATION OF A MEDICAL RECORDS REPORTING SYSTEM - A system for accessing, updating, and maintaining health records of a medical data and reporting system. The system can comprise one or more data processors and a module configured to execute on the one or more data processors. The module can be configured to validate a particular user based upon patient identifying information, where the module is further configured to obtain patient identifying information from one or more computer-readable mediums, a voice response system, a mobile device, a global positioning system, and a biometric system. Additionally, the module can be configured to enable the user to securely access the medical data and reporting system and to report the data to the user. | 2015-07-30 |
20150213197 | Event Based Tracking, Health Management, and Patient and Treatment Monitoring System - The present invention relates to an event based tracking, health management, and patient and treatment monitoring system, and, more particularly, to an event based tracking, health management, and patient and treatment monitoring software system including a unique/custom scanable code (e.g., a quick-response (“QR”) code) created for a specific positive/negative event which is tied to at least one specific phone number or other unique identifier of a mobile device, and a software application stored on the mobile device which enables the mobile device to (i) scan the unique QR code (on a card or other item), and (ii) log QR code data indicating the completion (positive) or non-completion (negative) of the event (and related information) in real time into a particular profile in a database (e.g., in a cloud server) for event validation and authentication, health management, and/or patient and treatment monitoring, and for reporting the QR code data (and related information) to authorized clients. | 2015-07-30 |
20150213198 | SYSTEM AND METHOD FOR COORDINATING CARE OF A PATIENT ACROSS A CARE CONTINUUM - A care coordination system provides collection and coordination of patient information among subscribed users along a patient care continuum. The care coordination system further enables the subscribed users to interact with the patient data and with one another relative to the patient data. In addition, the care coordination system includes notification functionality to alert providers of events to enable collaboration among subscribed users for quicker response and provision of appropriate care for adverse events. | 2015-07-30 |
20150213199 | HEALTHCARE DATA MANAGEMENT SYSTEM - A system including computing devices operated by a covered entity, patients, dentists, and a data processor. The data processor receives first and second de-identified data from the patients and dentists, respectively. The first and second de-identified data includes first and second identified data, respectively, encrypted using a public key associated with the covered entity. The first and second identified data includes first and second oral health risk scores, respectively, generated for the patients. The data processor lacks both authorization to access the first and second identified data and a private key required to decrypt the first and second de-identified data. The data processor transfers the first and second de-identified data to a computing device operated by the covered entity that is configured to decrypt the first and second de-identified data using the private key to obtain the first and second identified data for use locally by the computing device. | 2015-07-30 |
20150213200 | FLEXIBLE CARE PLAN METHODS AND APPARATUSES - A care plan management system ( | 2015-07-30 |
20150213201 | SYSTEM AND METHOD FOR ELECTRONICALLY MANAGING MEDICAL DATA FILES - A network server arrangement including a processor with a machine readable storage encoded with software for execution by the processor. The network server arrangement is responsive to requests to access a medical record of an individual and generates summary medical record data including summary information having a plurality of data elements associated with the individual, at least one of the data elements conveying medical information about the individual, and a pointers component including at least one pointer pointing to a network location containing importable medical information in connection with the individual that is not contained in the summary information component. The pointer includes a machine readable address part for processing by the client, allowing the client to import the medical information from the network location, and a label part for displaying to a user the nature of the medical information residing at the network location. | 2015-07-30 |
20150213202 | HOLISTIC HOSPITAL PATIENT CARE AND MANAGEMENT SYSTEM AND METHOD FOR PATIENT AND FAMILY ENGAGEMENT - A holistic hospital patient care and management system comprises a data store operable to receive and store patient data including clinical and non-clinical data; a patient engagement logic module to display survey questions to solicit preference and medical and non-medical issue input from the patients; a risk logic module to apply at least one predictive model to the clinical and non-clinical data to determine at least one risk score associated with the patients, and to stratify the risks associated with the plurality of patients in response to the risk scores; and the patient engagement logic module further configured to display educational information including selected information from the data store, the at least predictive model, and the risk logic module. | 2015-07-30 |
20150213203 | SYSTEM AND METHOD OF EXPEDITING LEGAL ACCESS OF EMERGENCY MEDICAL RECORD OF PATIENT UTILIZING TWO DIMENTINAL INFORMATION-EMBEDDING SCANNABLE CODE AND PROPRIETARY SCANNER APPLICATION THEREFOR - A system and method of enabling expedited legal access of EMR record of a patient is provided. The system comprises means for receiving EMR data of a patient. The system further comprises propriety application means for retrieving EMR data of a patient. The proprietary application means comprises scanning means and data-retrieving means. The scanning means is configured to scan QR-code of the patient. The EMR-data-retrieving means is configured to retrieve full EMR data of the patient from a non-http-addressed server whose address is derived from http-address encoded in the scanned QR-code. The system further comprises means for verifying credential of a medical emergency professional (MEP) so as to enable the MEP to use the propriety application means. | 2015-07-30 |
20150213204 | DUAL SMART CARD E-PRESCRIPTION SYSTEM AND METHOD - A dual smart card system and method including a central exchange server which collects patient healthcare data from a plurality of healthcare providers and stores the data in its central data bases. Each healthcare provider and each patient has a smart card and both smart cards must be used when a provider prescribes a medication for the patient and when the pharmacy fills the prescription for the patient. The patients' medical information is stored on the patient's smart card and on the central database. The system makes the stored medical information immediately available to participating organizations and tracks the entire life cycle of the prescription and generates alerts for adverse drug events, fraud, and duplication. | 2015-07-30 |
20150213205 | METHOD AND SYSTEM FOR DETERMINING PATIENT STATUS - A system, method and tangible computer readable storage medium for receiving, from each of a plurality of sensors disposed in one of a plurality of patient rooms in a hospital ward, data relating to a corresponding patient housed in the one of the plurality of patient rooms, receiving data relating to an output destination, generating a prioritized list including one or more of the plurality of the patients based on the data relating to the plurality of patients and the data relating to the output destination and sending the list to the output destination. | 2015-07-30 |
20150213206 | HOLISTIC HOSPITAL PATIENT CARE AND MANAGEMENT SYSTEM AND METHOD FOR AUTOMATED STAFF MONITORING - A holistic hospital patient care and management system comprises a data store operable to receive and store patient data including clinical and non-clinical data; a plurality of presence sensors to detect a plurality of tags associated with medical staff to enable real-time tracking of location and availability status; a risk logic module to apply at least one predictive model to the patient clinical and non-clinical data to determine a risk score associated with patients, and to stratify the risks associated with the patients in response to the risk scores; a medical staff monitoring logic module to receive location data from the presence sensors, analyze medical staff real-time location and availability status, automatically assign a medical staff to attend to the patients in response to the patient stratified risks, at least one medical condition, and availability of the medical staff, and generate an alert about the assignment. | 2015-07-30 |
20150213207 | HOLISTIC HOSPITAL PATIENT CARE AND MANAGEMENT SYSTEM AND METHOD FOR AUTOMATED FACIAL BIOLOGICAL RECOGNITION - A holistic hospital patient care and management system comprises a data store operable to receive and store patient data including clinical and non-clinical data; a plurality of video cameras to capture images of the patients; a plurality of presence detection sensors to detect the presence and location of the patients; a risk logic module configured to apply at least one predictive model to the clinical and non-clinical data, including the captured images, to determine at least one risk score associated with the patients; a facial biological change logic module configured to receive location data from the plurality of presence detection sensors, the risk score and medical condition associated with the patients, and captured images of the patients, and generating an alert in response to a detected change in biological change of a patient. | 2015-07-30 |
20150213208 | WEARABLE DEVICE FOR MEDICAL CARE - The instant disclosure relates to a wearable device for medical care. The device can be worn by the medical staff to help care recipients. The device includes a measuring module, a storing module, and a processing module. The measuring module is utilized to examine the patient in obtaining character-based information. The storing module is used to store character-based data corresponding to the obtained character-based information. The processing module is in electrical connection with the measuring and storing modules. The processing module receives the character-based information from the measuring module, and converts the character-based information into character-based data for storing in the storing module. The conversion is performed after the medical staff has obtained the character-based information of the patient via the measuring module. Thus, the care of recipients by the medical staff can be facilitated, and erroneous data record due to human input can be avoided. | 2015-07-30 |
20150213209 | Care Service Transaction Method and System Thereof - A care service transaction method and system thereof. The method includes the following steps: first, a thermal camera and a control apparatus are disposed in a care place. Health data of the user is then received, and a care condition is determined based on the health data, and a transaction amount is determined based on the care condition. The control apparatus is set to control the thermal camera based on the care condition, upon reception of paid information. Therefore, the user can buy suitable intelligent care service, such as care in various time periods, various areas or various care levels, upon his/her demand. | 2015-07-30 |
20150213210 | SOFTWARE TOOL FOR VETERINARIANS - A system and method for generating options for treatment options and pertinent disease information for treating an animal of a first species suffering from an ailment comprises receiving input data representative of a diagnosis of the ailment for the first species, retrieving from a memory at least one treatment protocol associated with the diagnosis as received, and outputting the retrieved at least one treatment protocol. The memory is populated with a plurality of diagnoses each associated with at least a corresponding one of a plurality of treatment protocols adapted for treating at least one animal species and at least one ailment. Each one of the plurality of treatment protocols is supported by evidence-based research. | 2015-07-30 |
20150213211 | Systems, Methods, User Interfaces and Analysis Tools for Supporting User-Definable Rules and Smart Rules and Smart Alerts Notification Engine - Computer implemented methods and systems operating on real-time data derived from a plurality of data sources for supporting user-definable rules and providing user notifications for providing user notifications and smart alarms. A user-interface configured to dynamically display a parameter and toggle between a tabular display and a graphical display is generated. At least one of a user-defined rule or a threshold value associated with the parameter from a user-interface element is received. A notification is provided to a user when the parameter satisfies the user-defined rule or exceeds the threshold value. | 2015-07-30 |
20150213212 | METHOD AND APPARATUS FOR THE REAL TIME ANNOTATION OF A MEDICAL TREATMENT EVENT - A handheld medical event recorder ( | 2015-07-30 |
20150213213 | Method and System for Engagement, Logistics, and Technology for Health Services - A system and method to improve health care quality and/or reduce costs of providing health benefits includes collecting data about individuals receiving the health benefits through engagement with the individuals to collect data using an app executing on a mobile device, collecting data regarding logistics for delivery of the health benefits using the app executing on the mobile device, and managing the delivery of the health benefits from a remote location using a dashboard software application in operative communication with the app executing on the mobile device. | 2015-07-30 |
20150213214 | SYSTEM AND METHOD FOR FACILITATING COMMUNICATION WITH COMMUNICATION-VULNERABLE PATIENTS - A system for facilitating communication with communication-vulnerable patients is disclosed. A plurality of objects in the form of images and/or words representing patient conditions and/or desires is displayed on an electronic display utilizing a computer program. An object is selected using electronic means, resulting in a word or phrase corresponding with the selected object being audibly transmitted through a speaker and/or a phrase or sentence being automatically generated and displayed on the electronic display so as to communicate the patient's condition or desire to a caregiver. | 2015-07-30 |
20150213215 | MEDICAL WORK SUPPORT SYSTEM, SURGICAL CLOTHING, AND MEDICAL APPARATUS - A medical work support system according to an embodiment includes an interface apparatus, a reception unit, and a control unit. The interface apparatus accepts operation by the user, outputs a signal corresponding to the accepted operation, and is detachably attached to wearing clothing configured to be worn by the user. The reception unit receives a signal output from the interface apparatus. The control unit executes predetermined processing based on a reception signal received by the reception unit. | 2015-07-30 |
20150213216 | Device and System Tailored to Provide Healthcare Content, Information and Communication - The application is directed to a method and system for improving communication between a client and health care provider via an electronic device. The method includes the steps of displaying a communication from a health care provider on a display of the device. Next it is determined whether the communication was received by a predetermined health care provider. Further, a predetermined deduction rate is applied to the received communication on the device from the predetermined health care provider. | 2015-07-30 |
20150213217 | HOLISTIC HOSPITAL PATIENT CARE AND MANAGEMENT SYSTEM AND METHOD FOR TELEMEDICINE - A holistic hospital patient care and management system comprises a data store operable to receive and store patient data including clinical and non-clinical data; at least one video camera focused on a patient; presence detection sensors configured to detect presence of physicians to enable real-time tracking and location; at least one predictive model in consideration of the clinical and non-clinical data to identify at least one medical condition of the patient; a risk logic module to apply the predictive model to the clinical and non-clinical data to determine at least one risk score for the patient; and a telemedicine logic module to receive physician real-time location and status information, identify and alert a physician available to consult with the medical personnel regarding the patient, enable two-way audio and video communication between the physician and the medical personnel, and provide the patient's medical condition and stratified risk to the physician. | 2015-07-30 |
20150213218 | MEDICAL INFORMATION MANAGEMENT APPARATUS - A medical information management apparatus according to an embodiment is communicably connected to a plurality of client terminals. The medical information management apparatus includes a reference information storage device, a recommended information acquisition device, and a providing device. The reference information storage device stores reference information for medical information referred to by a participant in a past medical meeting. The recommended information acquisition device acquires recommended medical information from medical information of a target patient in a current medical meeting based on the reference information. The providing device provides the acquired recommended medical information to each of the client terminals. | 2015-07-30 |
20150213219 | SYSTEM AND METHOD OF REMOTELY OBTAINING AND RECORDING HEALTHCARE CODES VIA A DYNAMIC INFORMATION GATHERING SYSTEM - The present disclosure generally relates to dynamic information gathering systems and methods for automatically generating data representative of healthcare codes. In particular, the present disclosure relates to dynamic information gathering systems and methods for automatically generating data representative of healthcare codes that are based on personal information of a patient and patient electronic medical records. The personal information of the patient may be remotely obtained via a series of questions and a series of corresponding answers from the patient where at least one latter question is dynamically determined based on an answer to a former question. | 2015-07-30 |
20150213220 | MONITORING PATIENT HEALTH - A system and associated methods are provided monitoring patient health. A composite risk score is computed based upon the relevance of a set of risk factors to a patient. The composite risk score is then used to select one of a plurality of sets of health data thresholds. Measurements that exceed thresholds of the selected set of thresholds cause an alert to be generated to prompt medical intervention. | 2015-07-30 |
20150213221 | System and Method for Providing Multi-Organ Variability Decision Support for Extubation Management - A decision support system is provided for the management of extubation in intensive care unit patients. Based on multi-organ variability analysis of physiological signals, the proposed system transforms acquired waveforms into clinical information such as the risk of failing extubation and the probability of passing extubation. Furthermore, a variety of mechanisms are provided for displaying the extracted information to support a clinician's decisions. | 2015-07-30 |
20150213222 | HOLISTIC HOSPITAL PATIENT CARE AND MANAGEMENT SYSTEM AND METHOD FOR AUTOMATED RESOURCE MANAGEMENT - A holistic hospital patient care and management system comprises a data store to receive and store patient data including clinical and non-clinical data; a plurality of presence sensors to detect tags associated with medical resources and supplies to enable real-time tracking location and status; a risk logic module to apply at least one predictive model to the clinical and non-clinical data to determine at least one risk score associated with each of the plurality of patients, and to stratify the risks associated with the plurality of patients in response to the risk scores; a medical resource and supply monitoring logic module configured to receive location data from the presence sensors, analyze medical resource and supply real-time location and availability, assign medical resources and supplies to the plurality of patients in response to the patient stratified risks and medical resource and supply availability and location, and record each assignment. | 2015-07-30 |
20150213223 | HOLISTIC HOSPITAL PATIENT CARE AND MANAGEMENT SYSTEM AND METHOD FOR SITUATION ANALYSIS SIMULATION - A holistic hospital patient care and management system comprises a data store to receive and store patient data including clinical and non-clinical data; a resource monitoring logic module to track real-time location and status of resources and supplies in a medical facility; a medical staff monitoring logic module to track real-time location and status of medical staff working at the medical facility; a patient monitoring logic module to track real-time location and status of patients admitted to the medical facility; a risk logic module to apply a predictive model to the clinical and non-clinical data, including patient, medical staff, and medical resource and supply location and status to determine at least one risk score associated with the patients; a situation simulation analysis logic module to determine a simulation result in response to a variable simulation parameter value and the real-time resource and supply, patient, and medical staff location and status. | 2015-07-30 |
20150213224 | HOLISTIC HOSPITAL PATIENT CARE AND MANAGEMENT SYSTEM AND METHOD FOR AUTOMATED PATIENT MONITORING - A holistic hospital patient care and management system comprises a data store to receive and store patient data including clinical and non-clinical data; a plurality of RFID sensors to detect a plurality of RFID tags associated with patients to enable real-time tracking of location; at least one predictive model including a plurality of weighted risk variables and risk thresholds in consideration of the clinical and non-clinical data and configured to identify at least one medical condition associated with the patients; a risk logic module configured to apply at least one predictive model to the clinical and non-clinical data to determine at least one risk score associated with each patient; a patient monitoring logic module configured to receive location data of the patients and determine patient real-time location and status; and a user interface module configured to display patient medical condition, risk score, location, and status information to authorized personnel. | 2015-07-30 |
20150213225 | HOLISTIC HOSPITAL PATIENT CARE AND MANAGEMENT SYSTEM AND METHOD FOR ENHANCED RISK STRATIFICATION - A holistic hospital patient care and management system comprises a data store operable to receive and store patient data including clinical and non-clinical data; a plurality of RFID sensors distributed in medical and social service facilities and configured to detect a plurality of RFID tags associated with the plurality of patients to enable real-time tracking location and status; a patient monitoring logic module configured to receive location data from the RFID sensors, and determine patient status; at least one predictive model in consideration of the clinical and non-clinical data including the location and status information of the plurality of patients; and a risk logic module configured to apply the at least one predictive model to the clinical and non-clinical data including the location and status information to determine at least one risk score associated with each of the plurality of patients. | 2015-07-30 |
20150213226 | PERFOMING ANALYTICS ON PROTECTED HEALTH INFORMATION - This disclosure includes techniques for analyzing patient data. In one example, a method includes accessing, by a computer system, one or more databases comprising health information, with protected health information, for a plurality of patients, accessing, by the computer system, an analytical model, and receiving, by the computer system via a user interface, instructions to apply the analytical model to health information for each of the plurality of patients. The protected health information is isolated from the user interface to restrict access to the protected health information. The method further includes applying, by the computer system, the analytical model to health information for each of the plurality of patients, and storing a result of the analytical model to the one or more databases. | 2015-07-30 |
20150213227 | THE MODELING TECHNIQUES FOR PREDICTING MORTALITY IN INTENSIVE CARE UNITS - A medical modeling system and method predict a risk of a physiological condition, such as mortality, for a patient. Measurements of a plurality of predictive variables for the patient are received. The plurality of predictive variables are predictive of the risk of the physiological condition. The risk of the physiological condition is calculated by applying the received measurements to at least one model modeling the risk of the physiological condition using the plurality of predictive variables. The at least one model includes at least one of a hidden Markov model and a logistic regression model. An indication of the risk of the physiological condition is output to a clinician. | 2015-07-30 |
20150213228 | METHOD INCORPORATING COMPUTER-IMPLEMENTED STEPS, A COMPUTING DEVICE AND A COMPUTER READABLE STORAGE MEDIUM FOR PROVIDING ALIGNMENT INFORMATION DATA FOR THE ALIGNMENT OF AN ORTHOPAEDIC IMPLANT FOR A JOINT OF A PATIENT - The present disclosure relates to a method incorporating computer-implemented steps, a computing device, and a computer readable storage medium, for providing alignment information data for the alignment of an orthopaedic implant for a joint of a patient. The method comprises the computer-implemented steps of being responsive to patient specific information data for deriving patient data, where the patient specific information data is indicative of one or more dynamic characteristics, and being responsive to the patient data for providing the alignment information data for the alignment of the orthopaedic implant. | 2015-07-30 |
20150213229 | FAULT DIAGNOSIS METHOD AND APPARATUS - A fault diagnosis method is provided. The method includes: performing a technological process of a diagnostic object to obtain an online operation data sample; extracting a first set of data in a first predetermined period of time from the online operation data sample set as a detecting antigen; calculating deviations of the detecting antigen and all of normal antibodies in a normal antibody database to obtain a first deviation set; determining whether each deviation in the first deviation set is less than a normal antibody threshold; if each deviation in the first deviation set is less than the normal antibody threshold, determining that the technological process is normal, else determining that there is a fault in the technological process. | 2015-07-30 |
20150213230 | SYSTEM AND APPARATUS FOR ITEM MANAGEMENT - Item-management systems, apparatus, and methods are described, preferably for management of items such as medicaments. In embodiments, an item-management system comprises a holder defining plural cells, a docking station configured to receive the holder, at least one indicator selectively-operable to indicate the holder cell into which an item is to be loaded, and at least one controller operable to selectively operate each at least one indicator to indicate the cell into which the item is to be received. In embodiments, indicators are provided on the holder. In other embodiments, the indicators may by on a guide associated with the docking station to assist the user in loading the holder. The contents of the loaded holder may be easily loaded, for example, into an automated dispensing machine for packaging and subsequent administration to a patient or for another use. | 2015-07-30 |
20150213231 | METHOD, SERVER, AND USER DEVICE FOR PROVIDING USER'S PERSONAL MEDICINE INFORMATION MANAGEMENT SERVICE BETWEEN THE SERVER AND THE USER DEVICE - A method of managing a personal medicine information management service by a user device and a server includes obtaining a medicine image captured by photographing appearance of a user medicine; transmitting the obtained medicine image to the server as a request for recognition of the user medicine; and receiving medicine quantity information and personal medicine information from the server based on a result of the recognition of the user medicine. The personal medicine information includes an image of the user medicine of which recognition training is performed by the server. | 2015-07-30 |
20150213232 | INTERACTIVE AND ANALYTICAL SYSTEM THAT PROVIDES A DYNAMIC TOOL FOR THERAPIES TO PREVENT AND CURE DEMENTIA-RELATED DISEASES - A computer-implemented method, system, and apparatus for providing interactive and analytical components that provide a comprehensive and dynamic tool for therapies to prevent and cure dementia-related diseases. The invention includes one or more computers that receive and store personal information for people, including personal background information, pre-existing conditions, current medications, genomic data and diagnostic information. The computers also generate synergic data containing compounded probability data specifying an expected adjustment of individual biological mechanisms from particular combinations of therapies. For each person, the computers process personal information and identify a subset of biological mechanisms that are principally affected by dementia-related diseases or the substantial risk of dementia-related diseases. The computers also apply the personal information including the principally-affected biological mechanisms to the therapy data and generate for each person one or more messages communicating a therapy plan containing a combination of therapies and determines how to apply the therapies. | 2015-07-30 |
20150213233 | SYSTEMS AND METHODS FOR IMPROVING PATIENT ACCESS TO MEDICAL THERAPIES - The system and method utilizes a computer system having processors that receive quantitative data from users and generate data to facilitate prioritization and reduction of barriers that prevent patients from receiving medical therapies from a particular healthcare provider in rank order. The processors provide an initial rank order of potential barriers based on calculated correlation coefficient, and determine a subsequent rank order of potential barriers based on the calculated correlation coefficient and other data indicative of the effect of each barrier on the patients. The system and method provides for a systematic, data-driven, and validated process to improve patient access to healthcare providers. | 2015-07-30 |
20150213234 | Predictive Patient to Medical Treatment Matching System and Method - A predictive system and method for using a physician's existing patient database to more effectively and efficiently identify potential candidates for medical treatments or clinical research trials. The system and method includes an automated three-tiered qualification process using information about a specific medical treatment received from a company looking for potential candidates for the medical treatment wherein potential candidates are initially prequalified by comparing the information about the medical treatment to the information contained in a physician's patient database. The potential candidates that are identified by the first tier of the qualification process then answer additional questions from a patient screening survey. Finally, additional questions from a physician consultation questionnaire are completed by the referring physician's office. If a potential candidate passes all three tiers of qualification, the potential candidate is then passed to the company looking for potential candidates for the medical treatment. | 2015-07-30 |
20150213235 | SYSTEMS AND METHODS FOR PROFILE-INTEGRATED CLINICAL TRIAL FEASIBILITY ASSESSMENTS - The invention provides tools for generating online feasibility assessments that may be performed live and in which existing profiles of clinical research centers are integrated into the assessment creation process. Tools of the invention allow a planner to create and save new assessment questionnaires, and then to craft the questions in those assessment tools while also provisionally filtering centers, pre-populating assessment data based on center profiles, or both. | 2015-07-30 |
20150213236 | SYSTEMS AND METHODS FOR IMPLEMENTING SELF-DESTRUCTING CONTENT LINKS - A computer-implemented method performed in a computerized system incorporating a central processing unit, a network interface and a memory, the computer-implemented method involving: using the network interface to receive a content and an associated access restriction from a client computer system directly accessible by a user; causing the received content to be stored in a content storage system; using the central processing unit to generate a self-destructing content link for the stored content based on the received associated access restriction, wherein the generated self-destructing content link is configured to de-activate pursuant to the received associated access restriction; storing a metadata corresponding to the generated self-destructing content link for the stored content; and using the network interface to provide the generated self-destructing content link to the client computer system. The content storage system may be an online content storage system accessible via a network or a local content storage system. | 2015-07-30 |
20150213237 | FAIL-SAFE LICENSING FOR SOFTWARE APPLICATIONS - Technologies are generally described to provide a fail-safe licensing system. An example system may include a quorum detection module of an instance of a software program configured to query a licensing queue corresponding to the software program for messages to determine a number of active instances of the software program. Based on a comparison of the determined number of active instances and a maximum number of allowed instances of the software program, the quorum detection module may be configured to determine whether the instance of the software program is authorized. In response to a determination that the instance of the software program is authorized, the quorum detection module may generate a unique instance identification tag and post a message to the licensing queue, where the message includes an indication that the instance of the software program is active and an indication of the generated unique instance identification tag. | 2015-07-30 |
20150213238 | SYSTEM FOR PROVIDING MULTIPLE LEVELS OF AUTHENTICATION BEFORE DELIVERING PRIVATE CONTENT TO CLIENT DEVICES - A system for providing multiple levels of authentication before delivering private content to the client devices over the communications network. A product identifier on the physical product is scanned using a code reader/decoder in the client device to access or request private content from the server. The server receives the device identifier associated with the client device and the product identifier associated with the physical product from the client device over the communications network for authentication. The server processor transmits the requested content, preferably a webpage, to the client device if both the device identifier and the product identifier are authenticated by the server processor. | 2015-07-30 |
20150213239 | SYSTEM AND METHOD OF INTERLOCKING TO PROTECT SOFTWARE-MEDIATED PROGRAM AND DEVICE BEHAVIOURS - Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed. | 2015-07-30 |
20150213240 | System and Method for Tracking Copyrighted Audio Material Broadcast in a Commercial Establishment - A system and method of determining if copyrighted audio material is being performed or broadcast within an establishment. One or more audio monitoring units are placed within the establishment. The audio monitoring unit detects audio signals inside the establishment and converts those signals into a corresponding data. Server software is provided that receives the data via a communications network. The server software compares the data to at least one database of copyrighted material looking for segment matches. The server software analyzes the segment matches to determine if the duration and/or nature of any segment match warrants the payment of a royalty. One or more performing rights organizations are sent a report detailing performances within an establishment so proper royalties can be distributed to the appropriate songwriters. | 2015-07-30 |
20150213241 | COMPUTER-IMPLEMENTED METHOD FOR MANAGING AT LEAST ONE DATA ELEMENT IN CONTROL UNIT DEVELOPMENT - A computer-implemented method for managing at least one data element in control unit development, the method allows uniform management of data elements over the entire development process by providing a management unit having a user interface, associating the data element with the management unit, and associating an access configuration with the management unit. The access configuration defines the accessibility of the data element by a user via the user interface. | 2015-07-30 |
20150213242 | ELECTRONICS SECURITY APPLICATION - A method of restricting access on an electronic device by a first user restricting access of at least one electronic object to subsequent users of the electronic device. A method of restricting access on an electronic device by classifying an electronic object as private or public, entering a passcode to access the electronic device, and showing electronic objects based on the passcode entered. An application for restricting access on an electronic device, including a locking mechanism for locking out a portion of electronic objects on the electronic device and an accessing mechanism for unlocking and exposing user access to locked electronic objects. | 2015-07-30 |
20150213243 | METHOD AND APPARATUS FOR SECURE INFORMATION DISTRIBUTION - A system and method for secure generation and distribution of digital encryption keys is disclosed. The system may also be used to protect and distribute other types of secure information, including digital, audio, video, or analog data, or physical objects. The system may include a tamper-respondent secure token device, which may be configured to destroy or disable access to the secure information contained therein in response to attempts to physically or electronically breach the device. Outputs may be provided in a secure manner through various interfaces without using electricity (wires) or electromagnetic radiation. Inputs may be provided in a secure manner, including through the use of a gesture-based input interface. Destruction or disablement of the device and/or its secure contents may be provided upon detection of tamper attempts or upon input of a self-destruct command. Proof of the destruction or disablement of the device or its contents may be provided. | 2015-07-30 |
20150213244 | USER-AUTHENTICATION GESTURES - This document relates to user-authentication gestures. One example can capture multiple biometric features when a user-authentication gesture is performed as a device authentication attempt. The example can compare values of the multiple biometric features to previous values stored for the user. The example can further unlock the computing device in an instance where the values of the multiple biometric features satisfy a similarity threshold relative to the previous values. | 2015-07-30 |
20150213245 | DYNAMIC KEYBOARD AND TOUCHSCREEN BIOMETRICS - Embodiments of the present invention are directed toward providing ongoing authentication using biometric data. Fingerprints and/or other biometric data can be captured during the normal use of an electronic device, such as typing on a keyboard, and compared with associated reference biometrics to provide ongoing authentication to an application while the electronic device is being used. Comparison results may further be combined with additional physiological or behavioral biometrics to determine a level of authentication encompassing multiple biometric inputs and/or types. | 2015-07-30 |
20150213246 | METHOD, DEVICE, AND SYSTEM OF GENERATING FRAUD-ALERTS FOR CYBER-ATTACKS - Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device (a desktop computer, a laptop computer, a smartphone, a tablet, or the like) interacts and communicates with a server of a computerized server (a banking website, an electronic commerce website, or the like). The interactions are monitored, tracked and logged. User Interface (UI) interferences are intentionally introduced to the communication session; and the server tracks the response or the reaction of the end-user to such communication interferences. The system determines whether the user is a legitimate human user; or a cyber-attacker posing as the legitimate human user. The system displays gauges indicating cyber fraud scores or cyber-attack threat-levels. The system extrapolates from observed fraud incidents and utilizes a rules engine to automatically search for similar fraud events and to automatically detect fraud events or cyber-attackers. | 2015-07-30 |
20150213247 | METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD - Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network. | 2015-07-30 |
20150213248 | METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD - Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network. | 2015-07-30 |
20150213249 | SCREEN UNLOCKING METHOD AND SYSTEM BASED ON MOBILE TERMINAL, AND STORAGE MEDIUM FOR THE SAME - The method for unlocking a screen comprises the following steps: dividing a screen of a mobile terminal into M regions in advance; presetting a touch combination of N regions among the M regions of the screen as a screen unlocking combination regions, and storing the screen unlocking combination regions; receiving a user operation instruction, selecting and touching N regions combination of the mobile terminal screen as a user unlocking regions; comparing the user unlocking regions with the presetting screen unlocking combination regions to determine whether the user unlocking regions and the presetting screen unlocking combination regions are consistent, and if consistent, controlling the screen to unlock. | 2015-07-30 |
20150213250 | ELECTRONIC DEVICE AND UNLOCKING CONTROL METHOD - An unlocking control method and an electronic device are provided by this disclosure. The method includes the following steps. Displaying an unlocking prompt interface showing unlocking mode boxes on a touch screen of the electronic device. Generating a selection signal in response to a selection of one of the unlocking mode boxes; wherein each of the unlocking mode boxes associating with an unlocking mode. Controlling the electronic device to enter an unlocking mode associated with the selected unlocking mode box, in response to the selection signal. Displaying an unlocking interface corresponding to the selected unlocking mode. If the electronic device enters a sensing mode, scanning data from a magnetic card placed proximate the scan device and obtaining card data by analyzing and processing the scanned data. Determining whether the card data is consistent with user information stored in the storage device. If yes, unlocking the electronic device. | 2015-07-30 |
20150213251 | METHOD, DEVICE, AND SYSTEM OF PROTECTING A LOG-IN PROCESS OF A COMPUTERIZED SERVICE - Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device (a desktop computer, a laptop computer, a smartphone, a tablet, or the like) interacts and communicates with a server of a computerized server (a banking website, an electronic commerce website, or the like). The interactions are monitored, tracked and logged. User Interface (UI) interferences or irregularities are intentionally introduced to the communication session; and the server tracks the response or the reaction of the end-user to such communication interferences. The system determines whether the user is a legitimate human user, or a cyber-attacker or automated script posing as the legitimate human user. The system further detects click-fraud, and prevents or mitigates Application Distributed Denial-of-Service attacks. | 2015-07-30 |
20150213252 | MULTIPLE-ACCESS-LEVEL LOCK SCREEN - A multiple-access-level lock screen system allows different levels of functionality to be accessed on a computing device. For example, when a device is in a locked state, a user can select (e.g., by making one or more gestures on a touchscreen) a full-access lock screen pane and provide input that causes the device to be fully unlocked, or a user can select a partial-access lock screen pane and provide input that causes only certain resources (e.g., particular applications, attached devices, documents, etc.) to be accessible. Lock screen panes also can be selected (e.g., automatically) in response to events. For example, when a device is in a locked state, a messaging access lock screen pane can be selected automatically in response to an incoming message, and a user can provide input at the messaging access lock screen pane that causes only a messaging application to be accessible. | 2015-07-30 |
20150213253 | AUTHORIZING AN APPLICATION FOR USE BY A COMPUTING DEVICE - Disclosed is an apparatus and method to authorize an application for use. A computing device may utilize an application and may include a secure memory and a processor. The processor may: create a unique digest for the application upon a first boot-up; store the unique digest in the secure memory; calculate an application digest for the application upon a subsequent boot-up; and if the calculated application digest matches the stored unique digest, authorize the application for use. | 2015-07-30 |
20150213254 | SIGNAL SECURITY FOR WIRELESS ACCESS POINT - A wireless access point receives a set of invalid passwords from at least one wireless device attempting to connect to a network through the wireless access point. The wireless access point reduces RF signal power in response to receiving the set of invalid passwords. | 2015-07-30 |
20150213255 | AUTHENTICATION SYSTEM - An authentication system is disclosed herein. An example includes a computing device and a port associated with the computing device for connection of an accessory to the computing device. The example also includes an authentication device that generates an accessory response upon receipt of a challenge and a hardware controller. The hardware controller generates both the challenge and an expected response to the challenge. It compares the expected response to the accessory response to ascertain if the accessory response is one of a valid response and an invalid response, and it signals for the port to be enabled for the valid response to allow access to functionality of the accessory by the computing device. Other features and components of the authentication system are also disclosed herein, as is a method of authenticating an accessory for use by a computing device. | 2015-07-30 |
20150213256 | KEY CONTROL METHOD AND ASSOCIATED ELECTRONIC DEVICE FOR DETERMINING WHETHER TO PERFORM KEY OPERATION CORRESPONDING TO KEY EVENT - A key control method of an electronic device includes: receiving a key event; obtaining current key locking information of the electronic device from a system frame module of the electronic device; and determining whether to perform a key operation corresponding to the key event according to the key event and the current key locking information. | 2015-07-30 |
20150213257 | Password Authentication System and Password Authentication Method - A password authentication system and a password authentication method are disclosed. The password authentication method includes the following steps. An input of first color arranging information is received, and the first color arranging information is selected to select at least one of a plurality of colors from a color menu and arrange the at least one of a plurality of colors. The first color arranging information is converted into first color coding information. A server stores the first color coding information as a color token password. After the color token password is built, the server determines whether authentication information and the color token password match if a client device sends the authentication information to the server. When the authentication information and the color token password match, the client device is validated. | 2015-07-30 |
20150213258 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a warning unit. The warning unit outputs a warning to change authentication information from an initial setting value in a case when the authentication information has not been changed from the initial setting value, the authentication information being used for authentication for using at least one service in which information held by the information processing apparatus is provided via a communication unit. | 2015-07-30 |
20150213259 | Web Service Sandbox System - A web service sandbox system. The web service sandbox system provides a secure mechanism with little to no risk to an origination domain hosting a user agent for the user agent to retrieve content from a potentially insecure web service hosted in another domain and using JSONP to bypass same-origin policy restrictions. The user agent posts a command message to a separate quarantined web session of a sandbox service acting as intermediary between the user agent web session and the web service. The sandbox service makes the actual call to and parses the response from the web service. Scripts from the response are executed only in the quarantined web session of the sandbox service. The resulting “safe” content obtained from the web service by the sandbox service is returned to the user agent where it may be rendered. | 2015-07-30 |
20150213260 | DEVICE AND METHOD FOR DETECTING VULNERABILITY ATTACK IN PROGRAM - A device and method for detecting a vulnerability attack in a program, includes a hooking processing unit that suspends execution of a process by hooking a function when the process is executed and calls the function to perform a specific task; an information collecting unit that collects and outputs information about call stack return address by checking a call stack of the function hooked by the hooking processing unit; and an information determining unit that detects a malicious behavior by analyzing the call stack return address information output from the information collecting unit. The device and method for detecting a vulnerability attack in a program may prevent execution of a malicious code by detecting erroneous access or code execution in a whole area of memory. | 2015-07-30 |
20150213261 | METHOD OF SECURE COMPARATIVE PROCESSING - Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input with main secret data (CTRL, PIN) stored in said electronic component, characterized in that the processor implements, in addition to the comparison with the secret data (CTRL, PIN), complementary operations on the proof data (EPR, AUTH) which generate on the electronic component a variation of behaviour which is dependent on the proof data (EPR, AUTH) which it receives as input and which is compounded with the behavioural variation related to the comparison with the main secret data (CTRL, PIN). | 2015-07-30 |
20150213262 | Method And User Device For Processing Virus Files - A method and a user device for processing virus files. First information of at least one category of virus files and second information of a manner for processing each of the at least one category of virus files are provided. A category of a virus file when the virus file is identified. A manner of processing viruses of the category from the first information and the second information is obtained and the virus file is processed by using the manner without information about the virus file being presented to a user. | 2015-07-30 |
20150213263 | SYSTEMS AND METHODS FOR IDENTIFYING ASSOCIATIONS BETWEEN MALWARE SAMPLES - Systems and methods are disclosed for identifying associations between binary samples, such as e-mail files and their attachments or a document and an executable program associated with the document. In one implementation, the method includes receiving a plurality of binary samples, and extracting metadata from the plurality of binary samples. The metadata for a binary sample from the plurality of binary samples includes a set of attributes of the binary sample. The method further includes identifying a set of associations between the plurality of binary samples based on the extracted metadata. Each association is characterized by at least one attribute the associated binary samples have in common, and each association has a confidence level indicative of a strength of the association. The method also includes identifying associations with a confidence level that exceeds a predefined threshold. | 2015-07-30 |
20150213264 | SYSTEMS AND METHODS INVOLVING FEATURES OF HARDWARE VIRTUALIZATION SUCH AS SEPARATION KERNEL HYPERVISORS, HYPERVISORS, HYPERVISOR GUEST CONTEXT, HYPERVISOR CONTEXT, ROOTKIT DETECTION/PREVENTION, AND/OR OTHER FEATURES - Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or data isolation. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a rootkit defense mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or prevention of malicious code, for example, in a manner/context that is isolated and not able to be corrupted, detected, prevented, bypassed, and/or otherwise affected by the malicious code. | 2015-07-30 |
20150213265 | REMOTE ENTERPRISE SECURITY COMPLIANCE REPORTING TOOL - Described is a method for cross-referencing one or more defined entities against a system configuration, system component configuration and/or system IT asset configuration to thereby validate applicability, non-applicability, compliance and/or non-compliance of a policy, set of policies, and/or policy checks with respect to the system, system component and/or system IT asset configuration. Also described are an apparatus and a machine-readable medium for performing this method. | 2015-07-30 |
20150213266 | REMOTE ENTERPRISE SECURITY COMPLIANCE REPORTING TOOL - Described is a method for cross-referencing one or more defined entities against a system configuration, system component configuration and/or system IT asset configuration to thereby validate applicability, non-applicability, compliance and/or non-compliance of a policy, set of policies, and/or policy checks with respect to the system, system component and/or system IT asset configuration. Also described are an apparatus and a machine-readable medium for performing this method. | 2015-07-30 |
20150213267 | REMOTE ENTERPRISE SECURITY COMPLIANCE REPORTING TOOL - Described is a method for cross-referencing one or more defined entities against a system configuration, system component configuration and/or system IT asset configuration to thereby validate applicability, non-applicability, compliance and/or non-compliance of a policy, set of policies, and/or policy checks with respect to the system, system component and/or system IT asset configuration. Also described are an apparatus and a machine-readable medium for performing this method. | 2015-07-30 |
20150213268 | REMOTE ENTERPRISE SECURITY COMPLIANCE REPORTING TOOL - Described is a method for cross-referencing one or more defined entities against a system configuration, system component configuration and/or system IT asset configuration to thereby validate applicability, non-applicability, compliance and/or non-compliance of a policy, set of policies, and/or policy checks with respect to the system, system component and/or system IT asset configuration. Also described are an apparatus and a machine-readable medium for performing this method. | 2015-07-30 |
20150213269 | Providing a Secure Execution Mode in a Pre-Boot Environment - In one embodiment, the present invention includes a method to establish a secure pre-boot environment in a computer system and performs at least one secure operation in the secure environment. In one embodiment, the secure operation may be storage of a secret in the secure pre-boot environment. | 2015-07-30 |
20150213270 | SYSTEM AND METHOD FOR REPLACING SOFTWARE COMPONENTS WITH CORRESPONDING KNOWN-GOOD SOFTWARE COMPONENTS WITHOUT REGARD TO WHETHER THE SOFTWARE COMPONENTS HAVE BEEN COMPROMISED OR POTENTIALLY COMPROMISED - Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event. | 2015-07-30 |
20150213271 | SYSTEM AND METHOD FOR LIMITING EXPLOITABLE OR POTENTIALLY EXPLOITABLE SUB-COMPONENTS IN SOFTWARE COMPONENTS - Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component. | 2015-07-30 |
20150213272 | CONJOINT VULNERABILITY IDENTIFIERS - Conjoint vulnerability identifiers are determined for a vulnerability, and priorities are determined for the conjoint vulnerability identifiers. A highest priority conjoint vulnerability identifier is selected. An entry in a vulnerability cross reference table is created that associates the highest priority conjoint vulnerability identifier with a lower priority conjoint vulnerability identifier. | 2015-07-30 |
20150213273 | IMAGE PROCESSING APPARATUS CAPABLE OF EFFICIENTLY DELETING STORED DATA, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - An image processing apparatus reduced in a time period required to invalidate data while maintaining security against data leakage even in an environment in which encrypted data and unencrypted data are mixed. An image processing apparatus includes an HDD for storing data. Whether or not data stored in the HDD is encrypted is determined, and if it is determined that the data is encrypted, overwrite deletion is performed to make it impossible to read out an encryption key used when the data is encrypted or information necessary for creating the encryption key, whereas if it is determined that the data is not encrypted, overwrite deletion is performed to make it impossible to read out the data from the HDD. | 2015-07-30 |
20150213274 | DEVICE AND METHOD OF SHIELDING REGION OF DISPLAY SCREEN - A device and a method of shielding a region of a display screen in the device are provided. The method includes: acquiring at least one of shield information of an application executed in the device, and a shielding operation performed by a user to shield the region of the display screen; and shielding the region of the display screen based on the acquired at least one of the shield information and the shielding operation. | 2015-07-30 |
20150213275 | CONTEXT AWARE INTEGRATED DISPLAY KEYBOARD VIDEO MOUSE CONTROLLER - A system and method is provided to permit a first computer to interact with computers in different security domains without forming covert channels. Separate GPUs are provided for each computer. An image routing map (IRM) determines which security domain is the subject of an I/O event to determine to which security domain to send the I/O event. A response is transmitted to the associated GPU and multiplexor and another response used to update the IRM, which is then provided to the MUX. The MUX uses the updated IRM to adjust the content on the monitor. Content from the security domains are able to be displayed on the monitor and in a similar manner as by the computer in each security domain. | 2015-07-30 |
20150213276 | ADDRRESSABLE SMART AGENT DATA STRUCTURES - Independent and addressable smart agent data structures are assignable and discernible in large populations of them. Each provides for the recording and profiling of the corresponding constituent transaction behaviors of identifiable entities decodable in a stream of incoming transaction records. Each smart agent data structure comprises an array of attributes that together render the available details reported in the stream of incoming transaction records. | 2015-07-30 |