36th week of 2015 patent applcation highlights part 30 |
Patent application number | Title | Published |
20150248459 | RETRIEVAL OF ENTERPRISE CONTENT THAT HAS BEEN PRESENTED - When content is shared, the sharer of the content is identified, as are the audience members. An entry is generated in a data store that identifies the content, the sharer and the audience members. Content retrieval requests can then be processed against the data store to identify and return content. | 2015-09-03 |
20150248460 | MONITOR SYSTEM AND MONITOR PROGRAM - A monitor system transmits a request requesting event occurrence information to multiple node apparatuses, detects occurrence of an event on the basis of event occurrence information included in a response, calculates an index value of each of conclusions of multiple rules indicating corresponding relationship between one or more condition events and a conclusion, and generates, at a predetermined time point, a snapshot indicating an index value at that time point. When the monitor system receives a first response in reply to a first request, the monitor system updates the index value indicated by the snapshot generated in a period from a transmission date/time of the first request to a reception date/time of the first response, on the basis of the first response. | 2015-09-03 |
20150248461 | STREAMING QUERY DEPLOYMENT OPTIMIZATION - A streaming query control capability is presented herein. The streaming query control capability may support improvement or optimization of various aspects of streaming queries. The streaming query control capability may support improvements or optimization in streaming query performance within an environment. The streaming query control capability may support improvements in streaming query performance via improvements in deployment of a streaming query to an environment. The streaming query control capability may support improvements in streaming query performance via modification of a streaming query intended for execution in an environment based on measurement data collected from the environment. The streaming query control capability may support improvements in streaming query performance via integrated deployment and activation of multiple streaming queries sharing a common characteristic. Various combinations of such capabilities may be supported for improvement or optimization of various aspects of streaming queries. | 2015-09-03 |
20150248462 | DYNAMICALLY IMPROVING STREAMING QUERY PERFORMANCE BASED ON COLLECTED MEASUREMENT DATA - A streaming query control capability is presented herein. The streaming query control capability may support improvement or optimization of various aspects of streaming queries. The streaming query control capability may support improvements or optimization in streaming query performance within an environment. The streaming query control capability may support improvements in streaming query performance via improvements in deployment of a streaming query to an environment. The streaming query control capability may support improvements in streaming query performance via modification of a streaming query intended for execution in an environment based on measurement data collected from the environment. The streaming query control capability may support improvements in streaming query performance via integrated deployment and activation of multiple streaming queries sharing a common characteristic. Various combinations of such capabilities may be supported for improvement or optimization of various aspects of streaming queries. | 2015-09-03 |
20150248463 | Strategies for Result Set Processing and Presentation in Search Applications - In searching electronic documents, prior to executing a query, a reviewer indicates whether a result set of the query will be dynamic or static. The query is then executed on the electronic documents to obtain an original result set, which is provided to the reviewer through a user interface. Upon determining that one or more changes to one or more of the electronic documents have occurred, and if the result set is static, then the original result set continues to be provided to the reviewer without re-executing the query. If the result set is dynamic, then the query is re-executed on the electronic documents to obtain an updated result set, and the updated result set is provided to the reviewer through the user interface. The original result set may be associated with a search session and/or may be a random sample of the electronic documents for an overview query. | 2015-09-03 |
20150248464 | STRATEGIES FOR RESULT SET PROCESSING AND PRESENTATION IN SEARCH APPLICATIONS - In searching electronic documents, prior to executing a query, a reviewer indicates whether a result set of the query will be dynamic or static. The query is then executed on the electronic documents to obtain an original result set, which is provided to the reviewer through a user interface. Upon determining that one or more changes to one or more of the electronic documents have occurred, and if the result set is static, then the original result set continues to be provided to the reviewer without re-executing the query. If the result set is dynamic, then the query is re-executed on the electronic documents to obtain an updated result set, and the updated result set is provided to the reviewer through the user interface. The original result set may be associated with a search session and/or may be a random sample of the electronic documents for an overview query. | 2015-09-03 |
20150248465 | METHOD AND APPARATUS FOR PROCESSING HISTORY OPERATION RECORDS OF ELECTRONIC TERMINAL, AND STORAGE MEDIUM - The present disclosure relates to a method for processing history operation records of an electronic terminal, including: recording, after an application program completes a predetermined operation, an operation record about the predetermined operation, the operation record at least including a target object, an operation time, and an action; performing cluster analysis on the operation records to separately aggregate operation records of each target object; receiving a request for displaying operation records, acquiring a time period which is included in the request and during which operation records to be displayed are located; and displaying, in a first display area according to the request, aggregated operation records of at least one target object during the time period. The foregoing method helps a user quickly find a needed file or folder in history operation records. In addition, the present disclosure further provides an apparatus for processing history operation records of an electronic terminal. | 2015-09-03 |
20150248466 | DATA TRANSFER BETWEEN STORAGE SYSTEMS USING DATA FINGERPRINTS - A system and method for data replication is described. A destination storage system receives a message from a source storage system as part of a replication process. The message includes an identity of a first file, information about where the first file is stored in the source storage system, a name of a first data being used by the first file and stored at a first location of the source storage system, and a fingerprint of the first data. The destination storage system determines that a mapping database is unavailable or inaccurate, and accesses a fingerprint database using the fingerprint of the first data received with the message to determine whether data stored in the destination storage system has a fingerprint identical to the fingerprint of the first data. | 2015-09-03 |
20150248467 | REAL-TIME CALCULATION, STORAGE, AND RETRIEVAL OF INFORMATION CHANGE - A method, system, computer program product, and automated system for calculating a statistic of information change for a collection of information, the method including. A real-time calculation of an actual statistic value of information change is performed for the collection of information. The calculated statistic value is stored and updated when an item is added to or removed from the collection of information to accurately identify the effect of the change to the collection of information on the calculated statistic value. The collection of information may be an information database, and the statistic of information change may comprise cardinality. The statistic of information change may comprise a cardinality vector and be stored such that it can be obtained separately from the collection of information. The calculated statistic value may be used in query optimization for a database query. | 2015-09-03 |
20150248468 | METHOD AND SYSTEM FOR PROVIDING CONTENT FOR USER DEVICES - A method to provide content for user devices connected to an application server (WAS) via an intermediate device includes one or more of the user devices requesting content from the intermediate device. The intermediate device fetches the requested content, and executes the content. A content tree is generated based on the executed content, and the generated content tree is split into content sub trees for each user device. The respective content sub tree is provided to the respective user device. The content tree and/or content sub-trees are updated in case of a content change on at least one user device. | 2015-09-03 |
20150248469 | System and Method for knowledge discovery information retrieval and information management via tag dimensionalization and proxy archetypes - This invention describes a system and method for creating analyzing, and comparing proxy representations of persons, places, things, concepts, and constructs for purposes of knowledge management, knowledge discovery, and information retrieval. To facilitate the system an archetype is created that contains a list of words and or phrase descriptors of the object represented by the proxy, an additional list of draws to the proxy consisting of words or phrases describing objects that have a positive affinity with the object being described by the proxy, and an additional list of distances to the proxy consisting of words or phrases describing objects that have a negative affinity with the object being described by the proxy. Both draws and distances may be assigned an amplitude, such that the feature space described by the archetype becomes dimensionalized. | 2015-09-03 |
20150248470 | SYSTEMS AND METHODS FOR SENSORY AND COGNITIVE PROFILING - Methods, devices, and systems are disclosed for producing cognitive and/or sensory profiles. In one aspect, a method to provide a cognitive or sensory assessment of a subject includes selecting a profile category from among a cognitive performance profile, a sensory performance profile, and a cognitive and sensory performance profile, presenting a sequence of stimuli to a subject, the sequence of stimuli based on the selected profile category, acquiring physiological signals of the subject before, during, and after the presenting the sequence of stimuli to produce physiological data, and processing the physiological data to generate an information set including one or more quantitative values associated with the selected profile category. | 2015-09-03 |
20150248471 | GROUP FORMING METHOD, DATA COLLECTING METHOD AND DATA COLLECTING APPARATUS - A data collecting method performs a process to collect data open to public by investigation targets of which an attribute varies with respect to passage of time. The method is performed by a computer by executing a program to perform a process including: creating a keyword for searching the data of the investigation targets having a first attribute that lacks with respect to a population of the investigation targets based on a distribution of a second attribute different from the first attribute; estimating the first attribute of the investigation targets of data that is collected using the keyword; and replenishing the investigation targets to be replenished in the population by the investigation targets that are estimated as having the lacking first attribute. | 2015-09-03 |
20150248472 | CLUSTERING METHOD, APPARATUS, AND TERMINAL APPARATUS - A clustering method includes obtaining neighbor objects of an object to be visited. The object to be visited has a plurality of neighborhood domains. The method further includes determining whether a number of neighbor objects in at least one of the neighborhood domains is larger than or equal to a predetermined value, clustering the object to be visited into a group if the number of neighbor objects in the at least one of the neighborhood domains is larger than the predetermined value, and performing a cluster expansion on directly density-reachable objects in a predetermined neighborhood domain of the object to be visited. | 2015-09-03 |
20150248473 | Pangenetic Web User Behavior Prediction System - Computer based systems, methods, software and databases are presented in which correlations between web item preferences, behaviors and pangenetic (genetic and epigenetic) attributes of individuals are used for pangenetic based user behavior prediction in which predictions of a user's online behavior can be generated based on the user's pangenetic makeup. Data masking can be used to maintain privacy of sensitive portions of the pangenetic data. | 2015-09-03 |
20150248474 | Parallel Programming of In Memory Database Utilizing Extensible Skeletons - An execution framework allows developers to write sequential computational logic, constrained for the runtime system to efficiently parallelize execution of custom business logic. The framework can be leveraged to overcome limitations in executing low level procedural code, by empowering the system runtime environment to parallelize this code. Embodiments employ algorithmic skeletons in the realm of optimizing/executing data flow graphs of database management systems. By providing an extensible set of algorithmic skeletons the developer of custom logic can select the skeleton appropriate for new custom logic, and then fill in the corresponding computation logic according to the structural template of the skeleton. The skeleton provides a set of constraints known to the execution environment, that can be leveraged by the optimizer and the execution environment to generate parallel optimized execution plans containing custom logic, without the developer having to explicitly describe parallelization of the logic. | 2015-09-03 |
20150248475 | TEXT-SQL RELATIONAL DATABASE - The present invention is a method and system for storing, retrieving, and updating data stored in a persistent Name/Value storage container. The system and method combine similar data into data strings using a programming language referred to as Text-SQL that separates and relates the data using delimiters. The data strings are further combined into groups of like data strings that are also organized using delimiters. These groups of data strings are assigned a name and stored in a Name/Value storage container with the value being the grouped data string. The present invention uses simple dot-notation to parse the data strings into specific detailed information, which may be accomplished through an application programming interface (Text-SQL API) that provides functions for updating, deleting, retrieving, and storing data. The API utilizes a standard syntax for use with Cookies, HTML5 sessionStorage, and HTML5 localStorage providing cross-browser functionality and simplified programming. | 2015-09-03 |
20150248476 | Automatic Topic Discovery in Streams of Unstructured Data - A method is provided for automatically discovering topics in electronic posts, such as social media posts. The method includes receiving a corpus that includes a plurality of electronic posts. The method further includes identifying a plurality of candidate terms within the corpus and selecting, as a trimmed lexicon, a subset of the plurality of candidate terms using predefined criteria. The method further includes clustering at least a subset of the plurality of electronic posts according to a plurality of clusters using the lexicon to produce a plurality of statistical topic models. The method further includes storing information corresponding to the statistical topic models. | 2015-09-03 |
20150248477 | BUSINESS CONTENT HIERARCHY - A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy. | 2015-09-03 |
20150248478 | KNOWLEDGE REFERENCE SYSTEM AND METHOD - A computer system and method for maintaining and using a domain ontology. The computer system includes a triple store comprising a domain ontology, a computer-readable tangible medium comprising software instructions, and a processor configured to access the computer-readable tangible medium to load and execute the software instructions. The software instructions provide a write service configured for receiving a request from a client interface of an authenticated user to edit the domain ontology of the triple store and an interface for updating the domain ontology based on the received request. The method includes steps of providing access to a domain ontology stored on a triple store, receiving a request from a client interface of a first client computer an authenticated user to edit the domain ontology of the triple store, and updating the domain ontology based on the received request by storing updates to the domain ontology in the triple store. | 2015-09-03 |
20150248479 | RESTORING PROGRAM INFORMATION FOR CLIPS OF BROADCAST PROGRAMS SHARED ONLINE - To restore context information about a clip that was sampled from a broadcast program, the clip is identified by matching a digital fingerprint of the clip against a database of known digital fingerprints taken from broadcast programs. If the clip can be identified, it is then associated with information about the matching broadcast program. The loss of context data about the clip obtained from a broadcast program is thus remedied, enabling media content available online to be more useable for a variety of purposes, such as media searching, automatic broadcast attribution, and targeting advertisements. | 2015-09-03 |
20150248480 | DISPLAYING AND POSTING AGGREGATED SOCIAL ACTIVITY ON A PIECE OF ENTERPRISE CONTENT - A personalized view of insights into social activity surrounding a content item is provided that may indicate to a user why a given piece of content may be interesting to him/her. A user's activities, as well as the activities of others (e.g., colleagues of the user) may be shown, including such items as a total number of views, comments, followers, and likes associated with the content item. The insights view may be personalized based on the user's relationships with other users in association with the content item. The user may learn through the personalized view who among his/her relationships have commented, edited, shared, or liked the content item, as well as, how many of the user's colleagues have viewed the content item. In addition, through a search function that may be applied to the view content, a user may learn about related content items based on the social insights. | 2015-09-03 |
20150248481 | SEARCH RANKING DIVERSITY BASED ON ASPECT AFFINITY - Collaborative filtering along the aspect dimension and use of co-occurring aspects to qualify products that will be shown on a search page in response to unspecific user searches, such that diversity in the aspect value will add to the diversity of the search results and the collaborative nature of the aspects will induce diversity, is disclosed. A method and system for Search Ranking Diversity Based on Aspect Affinity comprises collecting user search queries, parsing the collected user search queries for aspect phrases, identifying aspect metadata for the aspect phrases, creating a ranked index list of aspects from the aspect metadata, assigning weights to the ranked index list of aspects, receiving a user query and associating the received query with the ranked index list of aspects to produce ranked search results, and re-ranking the search results using diversified aspects from the ranked index list of aspects to produce user search results. | 2015-09-03 |
20150248482 | EFFICIENT SOCIAL NETWORKING FACT CHECKING METHOD AND SYSTEM - An efficient fact checking system analyzes and determines the factual accuracy of information and/or characterizes the information by comparing the information with source information. The efficient fact checking system automatically monitors information, processes the information, fact checks the information efficiently and/or provides a status of the information. | 2015-09-03 |
20150248483 | Managed Social Media Publicity Business Network for Business Personnel - The invention is a method, system, and software for creating a managed online publicity venue for multiple business personnel in a social networking environment which works in conjunction with their centralized business online marketing materials and also exists independently as free standing, person-by-person online marketing materials. | 2015-09-03 |
20150248484 | CONTENT MANAGEMENT SYSTEMS - A method for pairing web pages with keywords may include obtaining a keyword paired with a public web page, the public web page configured to be published at a public address; determining a mapping between the public address of the public web page and an internal address of an internal web page that corresponds to the public web page, the internal address pointing to the internal web page used in a content management system that generates the internal web page and the public web page; creating a keyword-page pairing entry that includes the keyword and the mapping between the public address and the internal address, the keyword-page pairing entry indicating the keyword is paired with the internal web page; and sending the keyword-page pairing entry to the content management system. | 2015-09-03 |
20150248485 | STREAM RECOGNITION AND FILTERING - A method obtains a first data item signature for a first data item, the first data item signature comprising an association between a plurality of synch points in the first data item and a corresponding plurality of block signatures. The process attempts to find one of the synch points in a second data item; and, if such a synch point is found, then a block signature of a corresponding block of bits in the second data item is determined. The process ascertains whether the synch point and corresponding block signature from the second data item correspond to a synch point and block signature in the first data item. If a predetermined number of synch points and corresponding block signatures match, the first and second data items are considered to match. In response to said determining, one or more actions associated with the first data item are performed. | 2015-09-03 |
20150248486 | SYSTEM AND METHODS FOR SEARCHING AND COMMUNICATION - Described are computer-based methods and apparatuses, including computer program products, comprising the steps of, or structure for, storing a plurality of expert profiles in a database, each of the plurality of expert profiles comprising information associated with a person having knowledge in a particular category, subject or topic; receiving search criteria over a network from a query source; selecting at least one of the plurality of expert profiles comprising information that satisfy the search criteria; and transmitting expert profile data for each of the selected expert profiles to the remote search engine, the expert profile data comprising data that defines a displayable representation of a corresponding expert profile, the expert profile data further comprising data that facilitates a client-initiated, real-time communication session over the network with a person associated with the corresponding expert profile. | 2015-09-03 |
20150248487 | TOPOLOGY SERVICE USING CLOSURE TABLES AND METAGRAPHS - Methods and systems for a topology service providing an interface for specifying a topology and answering queries regarding the topology. Further, the topology service may create, from a specified topology, a directed acyclic graph and corresponding closure table. The topology service may also provide an interface for receiving metadata regarding the topology. In this way, the topology service, based at least in part on connections between nodes in the entries of the closure table and based at least in part on the metadata regarding the topology, may answer queries in regard to the specified topology. | 2015-09-03 |
20150248488 | KEYWORD-BASED NETWORKING METHOD - The keyword-based method can include a website accepting a first set of freely written keywords posted by a listing user who wants to be found. A searching user posts a second set of freely written keywords, which are also accepted by the website. A server-side application uses an algorithm to search for a match between first and second keyword sets. Search results are output to the listing and searching users. Matched users are connected to each other. The method can also be provided on standalone, non-networked computers. | 2015-09-03 |
20150248489 | SEARCH AND NAVIGATION VIA NAVIGATIONAL QUERIES ACROSS INFORMATION SOURCES - Search and navigation through navigational queries across a variety of information sources is provided. Upon receipt of a search query, a primary search is performed for information responsive to the query. Information responsive to the primary search is then used to browse one or more information sources for other information related to the result of the primary search. Navigational suggestions and navigational elements may be provided in a user interface to allow the searching user to select the result of the primary search and/or to navigate to other information items found for the primary search result from the one or more information sources. Thus, a seamless transition between searching and browsing is enabled where searching and browsing may be accomplished in response to a single searching or browsing action. | 2015-09-03 |
20150248490 | EFFICIENT WEB PAGE FACT CHECKING METHOD AND SYSTEM - An efficient fact checking system analyzes and determines the factual accuracy of information and/or characterizes the information by comparing the information with source information. The efficient fact checking system automatically monitors information, processes the information, fact checks the information efficiently and/or provides a status of the information. | 2015-09-03 |
20150248491 | DATA PROCESSING DEVICE AND DATA PROCESSING METHOD - A data processing device according to the present application includes an acquisition unit and a generation unit. The acquisition unit acquires first user information that includes a behavior history of a user. The generation unit generates second user information acquired by decomposing the first user information acquired by the acquisition unit for each predetermined behavior type. For example, the data processing device generates the second user information that can efficiently utilize the first user information by decomposing the first user information for each behavior type. | 2015-09-03 |
20150248492 | METHOD OF AND SYSTEM FOR DISPLAYING FACT CHECK RESULTS BASED ON DEVICE CAPABILITIES - An efficient fact checking system analyzes and determines the factual accuracy of information and/or characterizes the information by comparing the information with source information. The efficient fact checking system automatically monitors information, processes the information, fact checks the information efficiently and/or provides a status of the information. | 2015-09-03 |
20150248493 | DATA SOURCE ATTRIBUTION SYSTEM - A data attribution system uses a unique identifier (UID) that uniquely identifies a particular individual. A search is conducted of different data sources and, different types of profile information associated with the UID is extracted from the data sources. The different types of profile information associated with the same UID is aggregated together and displayed in a same screen presentation on a user interface. | 2015-09-03 |
20150248494 | SYSTEM OF PROVIDING SUGGESTIONS BASED ON ACCESSIBLE AND CONTEXTUAL INFORMATION - A system and method for offering suggestions to a user of a mobile computing device based on information relevant to the user and a context data. The mobile computing device has access to lists of data associated with the user. The mobile computing device also has a sensor for detecting data about the user's context. Based on the lists of information and the contextual data , the device generates a hypothesis as to information that may be of interest to the user. Using context data in conjunction with lists in this fashion focuses the system on information likely of interest, without requiring express user input. A search may be performed in accordance with the hypothesis. Based on the results of the search, one or more suggestions are then presented by the mobile computing device to the user. The user has the option to provide feedback input to the device resulting in an update of the suggestion. | 2015-09-03 |
20150248495 | UNIQUE CODE ISSUING METHOD AND ISSUING SYSTEM THEREFOR - A unique code issuing system is provided in which each company can easily and reliably perform identification management of individuals. A reception server ( | 2015-09-03 |
20150248496 | GENERATING USER-CUSTOMIZED SEARCH RESULTS AND BUILDING A SEMANTICS-ENHANCED SEARCH ENGINE - Systems and methods for generating user-customized search results and building a semantics-enhanced search engine are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of generating user-customized search results using user-defined semantic types. The method includes, identifying a first set of URI patterns that are associated with a first set of semantic types defined by a first user, storing the first set of URI patterns in a database embodied in a computer-readable storage medium, and/or semantically categorizing a first set of search results for the first user, as having content related to one or more of the first set of semantic types defined by the first user. The first set of search results can be categorized using the first set of URI patterns. | 2015-09-03 |
20150248497 | SYSTEM FOR PROVIDING IN REAL TIME TECHNICAL INFORMATION, RELATIVE TO THE CONTENT OF CHEMICAL SUBSTANCES REGULATED BY REGULATIONS OF THE EUROPEAN UNION, OF A PRODUCT PUT ON A COMMERCIAL DISTRIBUTION NETWORK - The present invention concerns a method for obtaining an information sheet relative to a product and comprising the operations of: Generation of one or more QR CODES, each QR CODE being associated to an information sheet relative to a product; Application of each QR Code to the product; Arrangement of a central server accessible through the Internet and comprising a file containing the information sheets associated with the QR CODES generated; And wherein the reading of the QR Code is through a reading device in such a way that the decoding of the QR Code read generates a connection via the Internet with the central server and the sending via the Internet of the corresponding information sheet. | 2015-09-03 |
20150248498 | Method of Delivering Customizable Personalized Digital Events from a Single Scannable Two-Dimensional Barcode by Executing Computer-Executable Instructions Stored On a Non-Transitory Computer-Readable Medium - A method of delivering customizable personalized digital events from a single scannable two-dimensional barcode utilizes a variety of variables and customization to enable dynamic delivery of digital events to users upon scanning a QR code. The same digital event or different digital events may be delivered to the same user or different users at the same location or different location from the same QR code. Administrators may define desired event trigger parameters in order to customize event delivery. User information is processed on-device and is not transmitted. | 2015-09-03 |
20150248499 | OPTIMIZED READ/WRITE ACCESS TO A DOCUMENT OBJECT MODEL - In an approach for optimizing read/write access to a document object model in a web browser, one or more computer processors detect one or more accesses to a first data structure of a document object model. Based on the detected one or more accesses, the one or more computer processors determine whether the first data structure is a highly dynamic part of the document object model. Responsive to determining the first data structure is a highly dynamic part of the document object model, the one or more computer processors trigger a conversion of the first data structure to an access optimized data structure. The one or more computer processors convert the first data structure to an access optimized data structure. | 2015-09-03 |
20150248500 | DOCUMENTATION PARSER - A documentation parser | 2015-09-03 |
20150248501 | CONTENT ANALYTICS - A content analytics system and method are described. The content analytics system can include a server, an asset database, a network, an end user device, and a behavioral analytics data repository. The content analytics process can include, but is not limited to, attaching dynamic, event-based, behavioral analytics data associated with communications initiatives to an asset. | 2015-09-03 |
20150248502 | INTERACTIVE WELLBORE DESIGN MANAGEMENT - Implementations of computer-implemented methods, computer-readable media, and computer systems for interactive wellbore design management include displaying a well design including a wellbore profile representing a wellbore in a user interface. A first well component object is positioned at a first user interface position in the user interface. The first user interface position corresponds to a first well position of a first well component represented by the first well component object in the wellbore. A positioning of a second well component object at a second user interface position in the user interface is detected. The second user interface position corresponds to a second well position of a second well component represented by the second well component object in the wellbore. Using the well design, a compatibility of the second well component positioned at the second well position with the first well position of the first well component is determined. | 2015-09-03 |
20150248503 | METHOD AND SYSTEM FOR CREATING 3D MODELS FROM 2D DATA FOR BUILDING INFORMATION MODELING (BIM) - A method and system for creating three dimensional (3D) models from two dimensional (2D) data for building information modeling (BIM). The method and system allow new, 2D, 3D and higher dimensional models to be created for existing 3D modeling programs (e.g., AUTODESK REVIT, AUTOCAD, VECTORWORKS, MICROSTATION, ARCHICAD, etc.). The new models are used to enhance and extend existing 3D modeling programs. The new models can also be used to directly create physical objects (e.g., windows, doors, etc.) represented by the new models with robots, 3D printers and manufacturing machines. | 2015-09-03 |
20150248504 | METHOD AND SYSTEM FOR CREATING COMPOSITE 3D MODELS FOR BUILDING INFORMATION MODELING (BIM) - A method and system for creating composite three dimensional (3D) models for building information modeling (BIM). The method and system provides the creation of new composite 3D and higher dimensional models from plural different 3D models from plural different manufacturers for existing 3D modeling (e.g., AUTODESK REVIT, AUTODESK INVENTOR, AUTOCAD, SKETCHUP, VECTORWORKS, MICROSTATION, ARCHICAD, SOLIDWORKS, PROE, etc.) The new composite 3D models are used to enhance and extend existing 3D modeling programs. The new models can also be used to directly create new physical objects (e.g., windows, doors, etc.) that never existed before with robots, 3D printers and manufacturing machines. | 2015-09-03 |
20150248505 | COMPUTER-IMPLEMENTED METHOD FOR SOLVING SETS OF LINEAR ARITHMETIC CONSTRAINTS MODELLING PHYSICAL SYSTEMS - A computer-implemented method for solving sets of linear arithmetic constraints modelling physical systems by programmed execution of mathematical operations in a processor unit, wherein the programmed execution of mathematical operations decide, given a set of constraints S, whether S has any solution, and if so, find one or more of them. | 2015-09-03 |
20150248506 | MULTIPLE PROGRAMMABLE LOGIC CONTROLLER SIMULATOR - The disclosed embodiments relate to simulation of multiple PLCs which are to be physically implemented in a networked or otherwise coordinated manner, such as to control various industrial machines and/or implement multiple steps used in performing an industrial process. Each simulated PLC | 2015-09-03 |
20150248507 | INFORMATION SYSTEM CONSTRUCTION SUPPORT DEVICE, INFORMATION SYSTEM CONSTRUCTION SUPPORT METHOD, AND STORAGE MEDIUM - A device includes a system model selection unit selecting a system model satisfying a construction requirement from a first DB when the construction requirement and the priority thereof are input, an operation information acquisition unit acquiring operation information from a second DB based on a selected system model group, a parameter computation unit computing an evaluation parameter by using a parameter of the operation information, a performance evaluation unit evaluating performance of the selected system model based on the evaluation parameter, a sizing factor determination unit determining a sizing factor of the selected system model so that the evaluated performance of the system model satisfies the construction requirement associated with the priority of a mandatory level, by comparing the evaluation result with the input construction requirement, and a construction candidate presentation unit presenting an information system constructable by using the system model after sizing factor determination as a candidate. | 2015-09-03 |
20150248508 | INFORMATION SYSTEM CONSTRUCTION DEVICE, INFORMATION SYSTEM CONSTRUCTION METHOD, AND STORAGE MEDIUM - An information system construction device includes a system model selection unit that selects a system model that satisfies a construction requirement among system models when the construction requirement of a system is input, an operation information acquisition unit that acquires operation information of an existing system based on the selected system model and a similar system model, a parameter computation unit that computes an evaluation parameter by using a parameter included in the operation information, a performance evaluation unit that evaluates the performance of the selected system model on the basis of the evaluation parameter, a sizing factor change unit that changes a sizing factor of the selected system model by comparing the evaluated performance of the system model with the input construction requirement, and a system construction unit that constructs the information system by using the system model after sizing factor change. | 2015-09-03 |
20150248509 | CONTROL SYSTEM SIMULATOR AND SIMPLIFIED INTERCONNECTION CONTROL SYSTEM - A computer-based simulator, separate from a computer process control system, that simplifies the electrical interconnection of the computer-based simulator to the computer control system and reduces the number of hardware components required to effect a computer-based simulator. The invention also facilitates remote configuration and operation of the control and simulator systems. | 2015-09-03 |
20150248510 | Systems and Methods for Automated Model-Based Real-Time Simulation of a Microgrid for Market-Based Electric Power System Optimization - Systems and methods for real-time modeling of a microgrid. In an embodiment, real-time data is acquired from a microgrid. Predicted data for the microgrid is generated using a first virtual system model of the microgrid, which comprises a virtual representation of energy sources within the microgrid. The real-time data and the predicted data are monitored, and a calibration and synchronization operation is initiated to update the first virtual system model in real-time when a difference between the real-time data and the predicted data exceeds a threshold. Parameters of the first virtual system model can be modified to create a second virtual system model, and aspects can be forecasted for the microgrid operating under the modified parameters of the second virtual system model. In a further embodiment, market price information can be received, and optimization solutions can be generated based on the market price information. | 2015-09-03 |
20150248511 | SYSTEMS AND METHODS FOR CO-PRODUCTION OF GEOTHERMAL ENERGY AND FLUIDS - Systems include a well having a production casing and a production tubing positioned therein, forming an annulus there between. A packer is positioned in the annulus at a position sufficient to separate the annulus into a first portion and a second portion. The well further includes a tie-back conduit positioned in the first portion of the annulus and configured to allow heat transfer between a working fluid flowing through the first portion of the annulus and a production fluid flowing through the production tubing, thus separating the circulating working fluid from fluids in the second portion of the annulus. A working fluid loop is fluidly connected to the first portion of the annulus. Co-production methods, methods of modeling, and computer-readable media including the methods of modeling are disclosed. | 2015-09-03 |
20150248512 | COMPONENT PLACEMENT WITH REPACKING FOR PROGRAMMABLE LOGIC DEVICES - Systems and methods are disclosed herein to provide improved placement of components in programmable logic devices (PLDs). In one example, a computer-implemented method includes receiving a design identifying operations to be performed by a PLD. The method also includes determining a layout comprising positions of components of the PLD configured to perform the operations. The method also includes performing a timing analysis on the layout. The method also includes selectively adjusting the positions of the components using the timing analysis. Related systems and non-transitory machine-readable mediums are also provided. | 2015-09-03 |
20150248513 | INTEGRATED CIRCUIT DESIGN TIMING PATH VERIFICATION TOOL - An EDA tool for validating predefined timing paths having corresponding timing constraints in an integrated circuit (IC) design has a processor that performs a static-timing-analysis (STA) of the IC design and generates a STA report that includes the first set of timing constraints, which include a first number of clock cycles required for propagating the first multi-cycle timing path. A simulation-based checker based on a STA that counts a second number of clock cycles that is actually required by the first multi-cycle timing path to propagate is generated while performing a unit-delay, gate-level netlist simulation of the first-multiple cycle timing path. The first set of timing constraints then are modified so that the first multi-cycle timing path is redefined to require the second number of clock cycles to propagate. | 2015-09-03 |
20150248514 | AUTOMATIC LAYOUT MODIFICATION TOOL WITH NON-UNIFORM GRIDS - A method (and system) of automatically legalizing a circuit layout with layout objects in a presence of a plurality of non-uniform grids is disclosed. The method comprises generating a set of layout constraints comprising design rule constraints and gridding requirements based on the plurality of non-uniform grids. In addition, the method comprises processing the set of layout constraints to a feasible form using Boolean variables by determining infeasibility of the set of layout constraints, identifying infeasible layout constraints from the set of layout constraints, and resolving the infeasibility by a constraint relaxation process. Additionally, the method comprises generating an output circuit layout, for display to a user, by solving the set of layout constraints in the feasible form with standard linear program solvers. | 2015-09-03 |
20150248515 | Scan Cell Selection For Partial Scan Designs - Various aspects of the disclosed technology relate to techniques of selecting scan cells from state elements for partial scan designs. Signal probability values for logic gates in a circuit design are first determined. Based on the signal probability values, next-state capture probability values for state elements in the circuit design are computed. Based on the next-state capture probability values, scan cells are selected from the state elements. Scan cells may be further selected based on continuously-updated control weight values and observation weight values associated with the state elements. | 2015-09-03 |
20150248516 | REDUCTION OF WARPAGE OF MULTILAYERED SUBSTRATE OR PACKAGE - A method that minimizes adjustment of a wiring layer in reducing a warpage of a multilayered substrate and enables location of a part of a wiring layer that needs correction in order to reduce the warpage. The difference in average coefficient of thermal expansion, Δα, varies in a substrate. The method focuses in on the difference in Δα with a great length scale (low frequency) having a relatively significant effect on the warpage compared to the difference in Δα with a smaller length scale (high frequency) and corrects only the difference in Δα with a greater length scale. The distribution of the difference in Δα in a plane of substrate is determined. Then digital filtering is performed to extract only the difference in Δα with a low frequency and the difference in Δα between before and after correction, thereby revealing a part that requires correction. | 2015-09-03 |
20150248517 | ELECTROMIGRATION RESISTANT STANDARD CELL DEVICE - A standard cell semiconductor integrated circuit device design provides a standard cell semiconductor device that includes first standard cells and user-defined target standard cells which consume more power or include other operational characteristics that differ from the operational characteristics of the first standard cells. The standard cells are routed to ground and power wires using one power rail and the target cells are routed to the ground and power lines using the first power rail and a second power rail to alleviate electromigration in either of the power rails. The two power rails include an upper power rail and a lower power rail. An intermediate conductive layer may be disposed between the upper and lower power rails to provide for signal routing by lateral interconnection between cells. | 2015-09-03 |
20150248518 | MINIMIZING HARMFUL EFFECTS CAUSED BY RETICLE DEFECTS BY RE-ARRANGING IC LAYOUT LOCALLY - Provided is a method of fabricating a semiconductor device. An integrated circuit (IC) layout plan is obtained. The IC layout plan contains critical features and non-critical features. Locational information regarding a defect on a blank reticle is obtained. The blank reticle is a candidate reticle for being patterned with the IC layout plan. Based on the locational information regarding the defect and the IC layout plan, a determination is made that at some of the critical features will intersect with the defect if the blank reticle is patterned with the IC layout plan, regardless of whether the IC layout plan is globally manipulated or not before being patterned onto the blank reticle. In response to the determination, selected local portions of the IC layout plan are re-arranged such that none of the critical features will intersect with the defect if the blank reticle is patterned with the IC layout plan. | 2015-09-03 |
20150248519 | SYSTEM FOR PARTITIONING INTEGRATED CIRCUIT DESIGN BASED ON TIMING SLACK - A method of physical design of an IC using an EDA tool includes identifying elements of the IC design that have excess positive timing slack. The excess timing slack elements are placed in a separate partition and then parameters of the characteristics of the excess timing slack elements are modified to reduce their excess timing slack, such as reducing the voltage supplied to the separate partition, thereby lowering power consumption of the IC design. | 2015-09-03 |
20150248520 | Method and Apparatus for Physical-Aware Hold Violation Fixing - The present invention discloses a method for fixing hold time violations in circuits. The method comprises: creating a topology diagram of the circuit with a branch indicating a signal path where the hold time violation occurs in the circuit, and a node on the branch indicating a port of an element where the hold time violation occurs; dividing the circuit into a plurality of regions; and placing a hold time correction element selectively in a region corresponding to the node in the topology diagram to fix the hold time violation thereof, according to a circuit element density of the region corresponding to the node in the topology diagram. With this method there will be no new element in a region whose circuit element density is excessively large, and it is unnecessary to move an element which has been placed in the circuit and an input/output pin thereof. | 2015-09-03 |
20150248521 | Methods and Apparatus for SRAM Cell Structure - An SRAM cell structure. In one embodiment, a bit cell first level contacts formed at a first and a second CVdd node, a first and a second CVss node, at a bit line node, at a bit line bar node, at a data node and at a data bar node; and second level contacts formed on each of the first level contacts at the first and second CVdd nodes, the first and second CVss nodes, the bit line node and the bit line bar node; wherein the first level contacts formed at the data node and the data bar node do not have a second level contact formed thereon. In another embodiment, a word line is formed and bit lines and a CVdd and a CVss line are formed overlying the SRAM cell and coupled to the corresponding ones of the nodes. Methods are disclosed for forming the cell structure. | 2015-09-03 |
20150248522 | Method and System for Identification of Disease Causing Variants - Embodiments of the present invention include methods for discovering deleterious human variants for a given human whole genome sequence or genotype and predicting the functional consequence of the variants. | 2015-09-03 |
20150248523 | METHOD FOR DETERMINING THE RISK PROFILE OF NEOPLASTIC TISSUE - A method of computing the risk profile of a neoplastic tissue in a patient is disclosed. The method includes the steps of (a) processing a sample of tumor tissue or cancer cells from the patient in a form suitable for visualization and demarcation of cell nuclei, individually distinguishable centrosomes (iCTRs) and megacentrosomes (mCTRs) in a region of interest (ROI) defined by a plurality of cell nuclei; (b) determining the numbers of iCTRs and mCTRs associated with each cell nucleus in the ROI; (c) determining the volume of each iCTR and mCTR in the ROI; and (d) calculating one or more centrosome amplification scores (CASs) values for the sample based on steps (b) and (c), wherein the one or more CASs indicate the severity of centrosome amplification, the frequency of centrosome amplification, or both, and wherein the one or more scores provide a measure of a level of risk and/or a prognosis associated with the neoplastic tissue. | 2015-09-03 |
20150248524 | OPTICAL PROCESSING - We describe a quantitative PCR (qPCR) instrument for combined qPCR and melt curve (dissociation and/or association curve) analysis. The instrument has at least one optical channel; a fluorescence excitation source; a fluorescence detector; an electronic analogue signal amplifier having an input coupled to an output of the fluorescence detector; and an analogue-to-digital converter (ADC) having analogue input coupled to an output of the analogue signal amplifier. The instrument further comprises a quantified automatic gain control (AGC) loop coupled between the signal output of the fluorescence detector and the analogue input of the ADC. The AGC loop is configured to apply a determined, numerical gain value to a fluorescence signal for the analogue input of the ADC. The instrument also includes a system to scale a digital output of the ADC responsive to the numerical gain value and to provide a digital fluorescence level signal from the scaled digital output. | 2015-09-03 |
20150248525 | CLOUD-LIKE MEDICAL-INFORMATION SERVICE - The current document is directed to methods and systems for organizing, storing, searching, aggregating, and distributing large quantities of biological information obtained for individual patients. In one described implementation, the knowledge and information is stored, in data-storage facilities within cloud-computing-like systems, as clinical actions, biological elements, and variants that are logically linked together to form network-like data structures. Individual patient data and clinical-knowledge databases, including the network-like clinical-knowledge data structures, are hosted in cloud-computing-like data centers along with a variety of services that receive and process queries from users, medical-service providers, and electronic-health-record-based applications and that return requested information to the requesting entities. Despite the enormous amounts of patient data and clinical knowledge that may be stored in the cloud-computing-like data centers, certain implementations of the currently disclosed systems return responses to medical-information queries in under a second, with other implementations providing even faster query-processing turnaround times. | 2015-09-03 |
20150248526 | Method for Preparing a Patient for Colonoscopy Procedures - The preferred embodiment of the invention features a method for preparing a patient for a medical procedure. In particular, the preferred embodiment provides a method for preparing a patient for a medical procedure for colonoscopy using an application on a mobile communication device. More particularly, the preferred embodiment provides a method for instructionally reminding to a patient on its mobile communication device using said application for all the steps involved in colonoscopy procedure at appropriate time point. Furthermore, preferred embodiment provides a method for multimedia instructional reminder simultaneously to a patient on its mobile communication device using said application for colonoscopy procedure. | 2015-09-03 |
20150248527 | PROMPTING MEDICATION SAFETY TECHNOLOGY - Method, apparatus, and hospital information system for prompting medication safety. The method includes: extracting identifier information and execution time of a prescribed drug from a treatment information database; according to the identifier information of the drug, extracting a record related to the drug from an information database; for each contributor factor of the prescribed drug, determining an unsafe time interval corresponding to the contributor factor of the drug; extracting identifier information and execution time of a target factor from the treatment information database; and, in response to the target factor matching with a contributor factor of the drug and at least a part of the execution time of the target factor falling within the unsafe time interval corresponding to the matched contributor factor, prompting medication safety in the complete drug taking lifetime. Through adopting the present invention, internal data process can be optimized and medication safety can be improved. | 2015-09-03 |
20150248528 | METHOD AND SYSTEM FOR QUALITY CONTROL SYSTEM AND FRAMEWORK FOR AN EVIDENCE-BASED ORGANIZATION - A quality control system and framework for an evidence-based organization are disclosed herein. The present disclosure relates to methods and systems for training, implementing and measuring outcomes, as well as techniques for improving outcomes of home visitation and consultation services provided by medical practitioners to, for example, first time parents and their families. | 2015-09-03 |
20150248529 | HEALTHCARE MANAGEMENT SYSTEM - Systems, methods, and computer-readable media for managing and facilitating the delivery of healthcare services are described. Some embodiments provide a healthcare management system configured to analyze and process healthcare information and healthcare expenditure information. Healthcare information may generally include medical information associated with a healthcare entity, such as a patient, a healthcare professional, a healthcare facility, or the like. Healthcare expenditure information may generally include any information associated with the cost of medical care related to a patient, healthcare professional, a healthcare facility, and/or a medical procedure. The healthcare management system may be configured to generate healthcare assessments based on the healthcare information and/or healthcare expenditure information. In general, a healthcare assessment may include any valuation, estimation, ranking, or the like that may indicate the efficiency of an element of healthcare information and/or a healthcare expenditure information, such as the cost efficiency of a medical claim. | 2015-09-03 |
20150248530 | SYSTEMS AND METHODS FOR DELIVERING ON-CALL DATA FOR HEALTH CARE LOCATIONS AND PHYSICIANS - A system which contains real-time specialist on-call data is disclosed. The system allows for the input and searching of specialist on-call data for various health care locations. The system is configured to allow a patient in need of the medical care of a specialist not currently available at the patient's location to search for the nearest health care location(s) with a physician of the desired specialization presently or soon to be on call. Methods of the same are also disclosed. | 2015-09-03 |
20150248531 | SYSTEM FOR ESTABLISHING HEALTH CARE REIMBURSEMENTS - A third party scoring entity establishes a market-based scoring system which can be used to generate a supply efficiency score to be assigned to a service provider seeking to begin providing a service in a territory. The supply efficiency score is indicative of the need for additional capacity to supply the service. The supply efficiency score is supplied to payers designated by the service provider and the payers will use the score to determine a reimbursement rate for the professional services provided based upon existing market saturation. | 2015-09-03 |
20150248532 | System and Method for Managing Cognitive Bandwidth to Prevent Failure of Valuable Tasks Requiring Cognition - Process mining and tipping point analysis is used to determine tasks at risk. Tasks At Risk Intervention lead time analysis determines whether those tasks at risk can be performed in an opportunity window cost-effectively and at a high rate of success by the current task force. Load balancing can be used to offload fungible tasks at risk to flexible resources that can perform those tasks at risk for the highest value opportunities to micro-target tasks at risk with specific countermeasures, perhaps partitioned among several task force members to ensure can be done within the window of opportunity, to ensure their success. The flexible cognitive resources performing fungible tasks can be housed in a hub resource facility to centralize load balancing and obtain scale economies benefits from the shared capacity. | 2015-09-03 |
20150248533 | ADAPTIVE ANALYTICAL BEHAVIORAL AND HEALTH ASSISTANT SYSTEM AND RELATED METHOD OF USE - This present disclosure relates to systems and methods for providing an Adaptive Analytical Behavioral and Health Assistant. These systems and methods may include collecting one or more of patient behavior information, clinical information, or personal information; learning one or more patterns that cause an event based on the collected information and one or more pattern recognition algorithms; identifying one or more interventions to prevent the event from occurring or to facilitate the event based on the learned patterns; preparing a plan based on the collected information and the identified interventions; and/or presenting the plan to a user or executing the plan. | 2015-09-03 |
20150248534 | System And Method Of Generating A User Interface Display Of Patient Parameter Data - A method and apparatus that displays at least one user interface display image including patient parameter data is provided. An acquisition processor selectively acquires, from a storage repository, at least one type of patient medical parameter data associated with at least one patient acquired over a period of time. A display processor generates a display including at least one display image representing at least a portion of the acquired patient medical parameter data and a navigation bar associated with the at least one display image including a user selectable window identifying a range of acquired patient medical parameter data to be displayed within the display image. A controller is electrically coupled to the acquisition processor and the display processor. The controller controls navigating through the patient medical parameter data and adjustment of the user selectable window, and causes the display processor to modify the generated at least one display image. | 2015-09-03 |
20150248535 | METHOD OF DISPLAYING HEALTH INFORMATION AND ELECTRONIC DEVICE FOR PROVIDING SAME - Disclosed is a method of displaying health information by an electronic device. The method includes: activating an application providing at least one piece of health-related information; identifying a user account pre-stored in the application and receiving health state measurement data of the user account; receiving pieces of health state measurement data of similar group accounts from a host device; determining an account with which to be compared among the similar group accounts based on a predetermined reference and identifying health state measurement data of the account with which to be compared; and displaying the health state measurement data of the user account and the health state measurement data of the account with which to be compared. | 2015-09-03 |
20150248536 | MODULAR TELEMEDICINE ENABLED CLINIC - A modular medical clinic system that includes a patient check in module | 2015-09-03 |
20150248537 | Personalized Health Score Generator - A computer may receive health related data from a plurality of data sources. Upon receiving the health related data, the computer may standardize the health related data based on a reference database. Further, based on a person-centric data framework, the computer may categorize the health related data into historical health related data and current health related data. Then, the computer may calculate a risk score based on the historical health related data and the current health related data. Once the risk score is calculated, the computer may determine a cost associated with a risk represented by the risk score. Further, the computer may generate a overall health score based on the risk score and the determined cost, which may then be transmitted for presentation to authorized end users. | 2015-09-03 |
20150248538 | 3D MODELLING OF BODIES - System or components such as software for 3D modelling of bodies is described. This can be realized by a computer based method for modelling a body by scanning a determined space divided into elementary spaces, each elementary space being assigned a signed distance parameter indicative of the distance of said elementary space to said body and a weight parameter indicative of the importance of the distance parameter; said scanning of said body providing scanned points and each scanned point thus obtained possibly modifying said signed distance and weight parameters of each elementary space of said determined space; wherein, each one of selected elementary spaces is modified by subdividing said selected elementary space into higher level elementary spaces defined by the same parameters; wherein, in order to decrease details of the model of said body, said elementary spaces are modified by replacing selected elementary spaces with lower level elementary spaces. | 2015-09-03 |
20150248539 | METHOD FOR REDUCING ERRORS IN MEDICATION ADMINISTRATION BY MEDICAL PROFESSIONALS AND NON-CLINICAL INDIVIDUALS - A method for reducing errors in medication administration comprises: (a) providing a computer program for a mobile handheld electronic device that includes a feature that visually verifies an intended recipient of each medication before medication is administered to the recipient and a feature that visually verifies the medication to be administered before each medication-administering event. Next, each medication-administering individual is provided with access to this mobile handheld device and training on how to run the computer program installed thereon. | 2015-09-03 |
20150248540 | METHOD AND SYSTEM FOR MONITORING MEDICATION ADHERENCE - A system and method for monitoring patient adherence to prescribed medications include a processor that analyzes prior authorization data and insurance claims data based on adherence rules, which are user configurable. The system assigns non-adherence cases for user review by creating work queues. Queues may be associated with respective user roles. In response to a non-adherence case, the system generates automated notifications using a notification template. Placeholder variables are insertable into the templates to describe a parameter applicable to a specific instance of non-adherence. The placeholder is replaced by an actual value of the parameter when a notification document is subsequently generated. | 2015-09-03 |
20150248541 | SYSTEM FOR COLLECTING PATIENT INFORMATION FOR DIABETES MANAGEMENT - A system is provided for collecting patient information for diabetes management. The system may comprise a patient interface device, a patient notification device, an input device for entering patient information, and an information collecting unit. The information collecting unit may include a processor electrically coupled to a memory having stored therein at least one algorithm executable by the processor to activate the patient notification device followed by presenting instructions to the patient via the patient interface device to collect specified information from the patient via the input device. | 2015-09-03 |
20150248542 | METHOD AND APPARATUS FOR MAINTAINING CONTENT VIEW STATISTICS IN A NAMED DATA NETWORK - A client device that obtains a data object for a local user, and can detect a check-in requirement in the data object that instructs the client device to share demographic information with a content broker. The client device generates a check-in message that indicates the data object, and includes identifying information for the local user or the local client device. The client device sends the check-in message to the content broker to share the identifying information. The content broker can analyze the check-in message to determine the user's identifying information, and to determine the data object being consumed by the user. The media broker then stores or aggregates the user's demographic information in a repository, in association with the data object. The media broker generates a response packet that grants the client device access to the data object's contents, and returns the response packet to the client device. | 2015-09-03 |
20150248543 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM AND STORAGE MEDIUM - The present invention is to ensure information safety of a user of service using API. An information processing device issues a service code in response to an API use request. The API use request relates to service using an application program that uses API and is transmitted from an application provider device. The information processing device makes service identification information and use API information correspond to the service code and registers the service identification information, the use API information, and the service code. According to user-specific information from the application provider, unapproved license information is issued for each application user. Approval of this license information by the application user side registers the license approval information. At service execution, authentication is performed based on the service code and the license information. When the authentication is passed, API use is permitted. | 2015-09-03 |
20150248544 | PRIVILEGED SHARED ACCOUNT PASSWORD SANITATION - Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into using the password; determining when the first machine enters an inconsistent state; and modifying a memory area associated with the first machine to eliminate occurrences of the password in the memory area. | 2015-09-03 |
20150248545 | SIGN SHORTCUT - An electronic device such as a smart phone or personal computer, adapted to both unlock and to execute at least one step of a standard operation such as placing a telephone call, responsive to the user executing only one input command The input command may comprise moving a slider on a touch screen, entering a predetermined combination of alphanumeric characters, and the like. The input command may also comprise hand drawing a symbol on the screen, whereupon the electronic device will execute a matching procedure similar to character recognition to authenticate the symbol. Authentication may then unlock the device and execute the at least one step of the standard operation. | 2015-09-03 |
20150248546 | Display Operation Apparatus, Display Operation Method, and Recording Medium That Ensure Safe and Accurate Confirmation of Registration Information Registered In Card - A display operation apparatus using a card includes a first registration information display unit, a user authentication unit, and a second registration information display unit. The first registration information display unit displays card information related to the card as first registration information corresponding to user identification information and card identification information of the card when the user identification information and the card identification information are read. The user authentication unit executes user authentication after the first registration information is displayed. The second registration information display unit displays personal information of an owner of the card as second registration information corresponding to the user identification information and the card identification information when login is executed as a result of the user authentication. | 2015-09-03 |
20150248547 | GRAPHICAL AUTHENTICATION - A method, electronic device, and non-transitory computer-readable medium for establishing graphical authentication on an electronic device are disclosed. The method comprises: receiving a first user input corresponding to an image, the image comprising a plurality of points of interest; receiving a second user input corresponding to a selected point of interest in the plurality of points of interest in the image; receiving a third user input corresponding to a selected password element; and storing the selected image, the selected point of interest, and the selected password element in association with a user authentication profile in a memory of the electronic device. | 2015-09-03 |
20150248548 | INCREASING ACCESS SECURITY WITH TIME SINCE LAST ACCESS - A computer program product for controlling access to a resource of an electronic device includes program instructions for executing a method. The method stores a first password and a second password in memory of the electronic device, wherein the first password and the second password are used to allow a user to gain access to a resource of the electronic device, and wherein the second password has greater password strength than the first password. The method further includes, during a first time period passing since the user last accessed the resource, granting the user access to the resource in response to receiving the first password, and, during a second time period following the first time period, granting the user access to the resource only in response to receiving the second password. An alternative method increases the number of required security measures as a function of time since the last access. | 2015-09-03 |
20150248549 | UNATTENDED SECURE DEVICE AUTHORIZATION - Unattended secure device authorization techniques are provided. An operating system (OS) module, which is responsible for device validation when that device is interfaced to a host device, is enhanced. The enhanced OS module silently checks the peripheral device's identifier against a white list and if a match occurs, the enhanced OS module grants permission to the host device applications; if no match occurs, the enhanced OS module silently rejects application access to the device. In an embodiment, the enhanced OS module interacts with the device to determine whether the device is to be authorized or rejected. | 2015-09-03 |
20150248550 | INCREASING ACCESS SECURITY WITH TIME SINCE LAST ACCESS - A method includes storing a first password and a second password in memory of the electronic device, wherein the first password and the second password are used to allow a user to gain access to a resource of the electronic device, and wherein the second password has greater password strength than the first password. The method further includes, during a first time period passing since the user last accessed the resource, granting the user access to the resource in response to receiving the first password, and, during a second time period following the first time period, granting the user access to the resource only in response to receiving the second password. An alternative method increases the number of required security measures as a function of time since the user last accessed the resource. | 2015-09-03 |
20150248551 | METHOD OF UNLOCKING AN ELECTRONIC DEVICE BASED ON MOTION RECOGNITIONS, MOTION RECOGNITION UNLOCKING SYSTEM, AND ELECTRONIC DEVICE INCLUDING THE SAME - A method of unlocking an electronic device based on motion recognitions generates motion information by detecting a user's motion, calculates optical flows based on the motion information, converts the optical flows into a code by sorting and grouping the optical flows based on predetermined reference directions, generates a comparison result indicating whether the code is consistent with a predetermined password by comparing the code with the predetermined password, and determines whether to unlock the electronic device based on the comparison result. | 2015-09-03 |
20150248552 | PASSWORD RECOVERING FOR MOBILE APPLICATIONS - An encryption manager may encrypt mobile data associated with a mobile application executing on a mobile device, where the mobile application is configured to interact with a remote application executing on a remote server, and the mobile data is encrypted using a mobile password. A mobile password recovery manager may encrypt the mobile password, using a remote password used to access the remote application executing on the remote server, and may recover the mobile data, in case of loss of the mobile password, including decrypting the encrypted mobile password using the remote password. | 2015-09-03 |
20150248553 | PROVISIONING ACCOUNT CREDENTIALS VIA A TRUSTED CHANNEL - Disclosed are various embodiments for provisioning account credentials via a trusted channel. An identification of an account is received. A security credential reset corresponding to the account is requested. The account is linked to a trusted channel of communication for reset purposes. A security credential communication corresponding to the account is received via the trusted channel of communication. The security credential communication may be parsed to obtain a token. | 2015-09-03 |
20150248554 | Systems And Methods For Executing Arbitrary Applications In Secure Environments - Described systems and methods allow protecting a host system, such as a computer system or smartphone, from malware such as viruses, exploits, and rootkits. In some embodiments, a hypervisor executes at the highest processor privilege level and displaces other software to a guest virtual machine (VM). A security application detects the launch of a target process within the guest VM. In response to the launch, the hypervisor instantiates a process VM isolated from the guest VM, and relocates the target process to the process VM. In some embodiments, when the relocated target process attempts to access a resource, such as a file or registry key, an instance of the respective resource is fetched on-demand, from the guest VM to the respective process VM. Executing the target process within an isolated environment helps to contain malware to the respective environment. | 2015-09-03 |
20150248555 | Malware Detection and Computer Monitoring Methods - A method is disclosed, where some embodiments of the method include installing at least one benign malware indicator on one or more computing devices, monitoring the one or more computing devices for the presence of the at least one benign malware indicator, and responsive to determining the benign malware indicator is no longer present, sending a notification indicating the benign malware indicator is no longer detected as present on the one or more computing devices. Other embodiments include performing an antivirus scan or identifying unauthorized software programs. An apparatus and one or more non-transitory computer-readable media storing computer-readable instructions capable of performing similar actions, the latter in conjunction with a computer executing instructions stored on the media, are also disclosed. | 2015-09-03 |
20150248556 | Firmware Disassembly System - Embodiments of the invention provide a method for disassembling firmware. A binary firmware image is received. If portions of the image are compressed, those portions are uncompressed. The binary firmware image is divided using a sliding window into a plurality of segments. Segments of the plurality of segments are classified as file types. Code file types are identified among the classified segments of the plurality of segments. Code architectures of the identified code file types of the classified plurality of segments are then classified. At least the classified code file types of the binary firmware image are disassembled based on the classified code architecture. The disassembled binary firmware image is evaluated for malware. | 2015-09-03 |
20150248557 | SYSTEM AND METHOD FOR BELOW-OPERATING SYSTEM TRAPPING AND SECURING LOADING OF CODE INTO MEMORY - A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a below-operating-system security agent. The below-operating-system security agent is configured to trap an attempted access of a resource of the electronic device, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic device accessing the memory. The attempted access includes attempting to write instructions to the memory and attempting to execute the instructions. | 2015-09-03 |
20150248558 | APPLICATION SECURITY TESTING - Example embodiments disclosed herein relate to actively modify execution at runtime of an application under test (AUT). The AUT is executed using a real-time modifier. A security test is performed on the AUT. Execution of the AUT is modified at a decision point. | 2015-09-03 |