43rd week of 2015 patent applcation highlights part 55 |
Patent application number | Title | Published |
20150302107 | SELECTIVE DATA INPUT SYSTEM AND METHOD - The present invention relates to a selective electronic data input system and method. The present invention presents a selective data input system including: a content storage unit configured to include content to be provided to a program of the user terminal; and a content ID recognition unit configured to, when a data input area adapted to input data into the program is selected at the user terminal, recognize an identifier (ID) of the selected data input area. The management computer that has received a signal selecting the data input area from the user terminal recognizes the ID of the data input area, and transmits content corresponding to the recognized ID to the user terminal, thereby displaying the content in the program. | 2015-10-22 |
20150302108 | COMPILATION OF ENCAPSULATED CONTENT FROM DISPARATE SOURCES OF CONTENT - Embodiments relate generally to electrical and electronic hardware, computer software, wired and wireless network communications, and media devices or wearable/mobile computing devices configured to facilitate presentation of content in a summarized form. More specifically, disclosed are systems, devices and methods to encapsulate or summarize a pool of content, such as music or audio tracks, in digest form. In some embodiments, a method may include identifying a pool of content as a function of a subset of parameters, selecting a subset of content from the pool based on one or more of the parameters to compile data representing encapsulated content, and forming data representing a digest of the pool of content including the compiled encapsulated content. Further, the method may include presenting the data representing the digest of the pool of content. | 2015-10-22 |
20150302109 | INTEGRATED MEDIA, PUBLICATION AND INTERACTIVE DISCUSSION ENGINE DRIVEN BY USER-SPECIFIED TOPIC - In an embodiment, the invention provides a system useful in serving web pages that integrate an online digital content service with a publication and interactive discussion engine so as to provide a single outlet for publication of multiple forms of content originating with the artist. In such embodiment, the system may include a data store containing data for populating a front end interface and a series of specific artist pages and a server operatively coupled to the data store. The system is programmed such that, in response to activation of a URL by a first visitor, the front end interface is served over a computer network such as the internet to a computing device under control of the first visitor. The front end interface includes a series of links to the series of corresponding artist pages. In response to activation of one of the links to a particular artist page by the first visitor, the system serves a specific artist page. The specific artist page is configured to display first digital content selected by the specific artist, the digital content being directed to at least one topic. The artist page further includes interactive element for provoking participation of a plurality of users regarding the a topic and the content. The artist page further includes a radio interface configured to control playback of music of the specific artist. In response to participation of a user, the system automatically creates an updated specific artist page by updating the specific artist page with second digital content provided by the user, the second digital content being directed to the topic. In response to activation of one of the links to a particular artist page by a second visitor, the system serves the updated specific artist page. | 2015-10-22 |
20150302110 | DECOUPLING FRONT END AND BACK END PAGES USING TAGS - Using tag-based program development is disclosed, including: receiving a request for a front end page; identifying a tag identifier associated with a location in the front end page; obtaining a tag entity corresponding to the tag identifier; executing the tag entity to obtain an execution result; rendering the front end page based at least in part by setting the execution result in the location in the front end page; and providing the rendered front end page to be presented. | 2015-10-22 |
20150302111 | Method and Apparatus for Constructing File System in Key-Value Storage System, and Electronic Device - A method and an apparatus for constructing a file system in a key-value storage system. According to the method for constructing a file system in a key-value storage system disclosed by the present invention, a directory number corresponding to a directory path of a directory at each level is acquired first; then, according to the directory number and a file stored in the directory at each level, corresponding keywords Key of the directory and the file are constructed. | 2015-10-22 |
20150302112 | Generating Probabilistic Transition Data - Systems and methods are presented for generating a transition graph from check-in data for determining probabilistic transitions of a user from an origin (location) to a destination. Check-in data for a plurality of users is obtained. The check-in data is organized and analyzed to determine a set of transition tuples for each of the plurality of users. These transition tuples are aggregated and used to generate a transition graph comprising a plurality of nodes and edges. Each node corresponds to a location and each edge indicates a transition from an origin node to a destination node and is associated with a likelihood of a user transitioning from the origin node to the destination node. | 2015-10-22 |
20150302113 | APPARATUS AND METHODS FOR ORGANIZING DATA ITEMS BY DIRECTED GRAPH - A data structure for storing items of information having a time of validity includes a validity interval for each item of information, and methods for making and using the same. The items of information are organized in a data structure having nodes and edges connecting the nodes. This data structure is preferably a directed graph structure that may include cyclical nodes. The data structure includes parent nodes and child nodes. The validity interval specified for any child node generally is contained within the validity interval specified for that child node's parent node, such that the data structure includes no child nodes with a validity interval that falls outside of the validity interval of its parent node. | 2015-10-22 |
20150302114 | DUPLICATE PATTERN OF ASSEMBLY COMPONENTS IN CAD MODELS - Systems and methods for efficient duplication of objects in a CAD model. A method includes receiving a CAD model including a plurality of objects in a model space. The method includes receiving a selection of a first object of the plurality of objects. The method includes receiving a selection of at least one target in the model space. The method includes deriving a transformation matrix corresponding to the model space. The method includes deriving a relative transform according to the transformation matrix and the first object. The method includes deriving a target transformation matrix for each of the targets. The method includes creating, for each target transformation matrix, a duplicate object located in the model space such that the transform between the corresponding target transformation matrix and the duplicate object is equal to the relative transform. The method includes storing the CAD model including the duplicate objects. | 2015-10-22 |
20150302115 | METHOD AND APPARATUS FOR CREATING 3D MODEL - The present invention provides a method and apparatus for creating a 3D model from an input 3D model based on repetitive structures of the input 3D model. The Method comprises: detecting repetitive structures of the at least one component of the input 3D model and hierarchical relationship of the repetitive structures, each repetitive structure comprising a component set as a representative and one or more components, if any, set as an instance; determining a relative transformation among all representatives and instances of all the repetitive structures of the input 3D model; and updating relevant components of the input 3D model according to a change of a representative in the repetitive structures and recalculating the poses of the updated components as a function of the determined relative transformation to create the 3D model. | 2015-10-22 |
20150302116 | EFFICIENT LIGHTING EFFECTS IN DESIGN SOFTWARE - A computerized method of for rendering a lighting effect can include receiving from a user inputs regarding the location of an object within a design space. Furthermore, the method can include receiving from the user one or more inputs regarding the location of one or more light sources within the design space. Additionally, the method can include calculating a lighting effect of the one or more lights on the object within the design space. Furthermore, the method can include rendering the lighting effect during a time interval that is independent of the number of the one or more light sources within the design space, such that rendering the lighting effect for one of the one or more light sources takes the same amount of time as rendering the lighting effect for a plurality of the light sources. | 2015-10-22 |
20150302117 | NUMERICAL SIMULATION SYSTEM AND NUMERICAL SIMULATION METHOD FOR ATMOSPHERIC FLOW BY COMPUTATIONAL FLUID DYNAMICS - Provided are a numerical simulation system and method for an atmospheric wind flow by computational fluid dynamics. In detail, provided are a numerical simulation system and method for an atmospheric wind flow by computational fluid dynamics capable of more rapidly and efficiently performing a fluid analysis and easily making a wind power resource map by setting an analysis result of a wind direction depending on the same analysis area as an initial condition (second initial condition in the present invention) of an analysis of another wind direction. | 2015-10-22 |
20150302118 | METHOD FOR DETERMINING A GAS FLOW IN A GEOGRAPHICAL SPACE - This method for determining a gas appearance or disappearance flow in a geographical space, from a priori flows, physical observations of the gas concentration values and the use of a numerical model expressing the gas behaviour and in particular its movements, and which comprises iterations of calculations and a convergence of successive determinations of flows towards a solution by minimizing a cost function, is characterized in that the model is implemented on succeeding time segments ( | 2015-10-22 |
20150302119 | METHOD FOR ASSESSING A QUANTITY OF HYDROCARBONS IN A DEPOSIT - Since the static volume of hydrocarbons in a deposit can be determined using a model built from a group of parameters, several sources of uncertainty are taken into consideration at least some of which are associated with respective parameters of the group. A base case is selected for each source of uncertainty. A probability distribution of the static volume of hydrocarbons is estimated when said source of uncertainty varies while the other sources comply with the base cases thereof. The Monte Carlo approach is used to draw a set of values of volumes from the distributions associated with each source value of volume V | 2015-10-22 |
20150302120 | DISPLAY IN A GRAPHICAL FORMAT OF TEST RESULTS GENERATED USING SCENARIO MODELS - A method for testing a system-on-a-chip (SoC) is described. The method includes parsing a file to determine functions to be performed components of the SoC. The method further includes receiving a desired output of the SoC and generating a test scenario model based on the desired output of the SoC. The test scenario model includes a plurality of module representations of the functions and includes one or more connections between two of the module representations. The desired output acts as a performance constraint for the test scenario model. The test scenario model further includes an input of the SoC that is generated based on the desired output, the module representations, and the one or more connections. The test scenario model includes a path from the input via the module representations and the connections to the desired output. | 2015-10-22 |
20150302121 | PIPELINE FLOW MODELING METHOD - A method of modeling a segment of a pipeline transporting a product comprising defining within the segment a plurality of discrete cells, each disposed between knots, preparing a system of equations relating the conservations of mass, momentum and energy for each cell along with equations for the liquid phase flow area of cells with tight, slack and minimum area flow modes, providing data relating to the product and the location and elevation of the cells, sensing a plurality of conditions within known cells, solving the system of equations, initiating a re-stepping process by re-assessing the flow modes of each cell and re-setting flow modes for cells with unstable flow modes, and re-solving the system of equations using stable flow modes. An embodiment of the method includes excepting one or more cells from the re-stepping portion where a recurrent pattern of flow mode change is detected. | 2015-10-22 |
20150302122 | COMPUTER SIMULATION OF ELECTROMAGNETIC FIELDS - A method and system is provided for solving for electromagnetic fields by approximating an electromagnetic function as a sum of basis functions multiplied by coefficients to be determined. The set of equations used to determine the coefficients results from taking derivatives of the action integral with respect to the coefficients (and/or other parameters) and setting the derivative equal to zero, thereby extremizing the action integral. | 2015-10-22 |
20150302123 | X-MAPS WITH FLEXIBLE TILES - Various exemplary embodiments relate to a method and server for processing X-Maps with flexible tiles including receiving measurements of at least one characteristic of a transmission, determining two or more geographic areas of similar transmission conditions, and storing indications of the determined geographic areas and indications of at least one characteristic of at least one transmission in each area. | 2015-10-22 |
20150302124 | Designing Photonic Switching Systems Utilizing Equalized Drivers - Designing a photonics switching system is provided. A photonic switch diode is designed to attain each performance metric in a plurality of performance metrics associated with a photonic switching system based on a weighted value corresponding to each of the plurality of performance metrics. A switch driver circuit is selected from a plurality of switch driver circuits for the photonic switching system. It is determined whether each performance metric associated with the photonic switching system meets or exceeds a threshold value corresponding to each of the plurality of performance metrics based on the designed photonic switch diode and the selected switch driver circuit. In response to determining that each performance metric associated with the photonic switching system meets or exceeds the threshold value corresponding to each of the performance metrics, the photonic switching system is designed using the designed photonic switch diode and the selected switch driver circuit. | 2015-10-22 |
20150302125 | METHOD AND SYSTEM OF CHANGE EVALUATION OF AN ELECTRONIC DESIGN FOR VERIFICATION CONFIRMATION - A computer implemented method and system of change evaluation of an electronic design for verification confirmation. The method has the steps of receiving the electronic design comprised a subcomponent, employing a banked signature of data representative of the subcomponent, receiving a review request of the subcomponent, generating a current signature of the data representative of the subcomponent and determining a difference of the current signature and the banked signature. | 2015-10-22 |
20150302126 | TESTING SOC WITH PORTABLE SCENARIO MODELS AND AT DIFFERENT LEVELS - A method for testing a system-on-a-chip (SoC) is described. The method includes parsing a file to determine functions to be performed components of the SoC. The method further includes receiving a desired output of the SoC and generating a test scenario model based on the desired output of the SoC. The test scenario model includes a plurality of module representations of the functions and includes one or more connections between two of the module representations. The desired output acts as a performance constraint for the test scenario model. The test scenario model further includes an input of the SoC that is generated based on the desired output, the module representations, and the one or more connections. The test scenario model includes a path from the input via the module representations and the connections to the desired output. | 2015-10-22 |
20150302127 | Semiconductor Overlay Production System and Method - Disclosed herein is a system and method for producing semiconductor devices using overlays, the method comprising associating one or more patterned overlays with respective ones of reserved regions in a layer template, receiving a layer design based on the layer template, identifying the reserved regions in the layer design, generating a production layer design based on the layer design, the production layer design describing at least one production overlay in one of the reserved regions, and fabricating one or more devices based on the production layer design. | 2015-10-22 |
20150302128 | ELECTROMIGRATION-AWARE LAYOUT GENERATION - In some embodiments, in a method, placement of a design layout is performed. The design layout includes a power rail segment, several upper-level power lines and several cells. The upper-level power lines cross over and bound the power rail segment at where the upper-level power lines intersect with the power rail segment. The cells are powered through the power rail segment. For each cell, a respective current through the power rail segment during a respective SW of the cell is obtained. One or more groups of cells with overlapped SWs are determined. One or more EM usages of the power rail segment by the one or more groups of cells using the respective currents of each group of cells are obtained. The design layout is adjusted when any of the one or more EM usages of the power rail segment causes an EM susceptibility of the power rail segment. | 2015-10-22 |
20150302129 | MASK ASSIGNMENT TECHNIQUE FOR M1 METAL LAYER IN TRIPLE-PATTERNING LITHOGRAPHY - In an embodiment, a method in the manufacture of triple-patterning lithography masks, each mask represented by one of three colors, where each cell layout has exactly one polygonal pattern at one-half the different-color spacing from its left boundary, and exactly one polygonal pattern at one-half the different-color spacing from its right boundary. During placement of the cell layouts into a row, the method includes switching assigned colors in a cell layout to ensure that no two polygonal patterns of the same color in the layout are at a distance from each other less than the same-color spacing. | 2015-10-22 |
20150302130 | METHOD AND SYSTEM FOR VERIFYING PRINTED CIRCUIT BOARD DESIGNS, AND CREATING OR VERIFYING RELATED ELECTRONIC COMPONENT PLACEMENT DATA FOR PRINTED CIRCUIT BOARD FABRICATION AND ASSEMBLY - A system for printed circuit board assembly includes a user interface provided on a display device for visual verification of printed circuit board design data, a user interface provided on the display device for inputting bill of material information, and a user interface provided on the display device for verification, alteration and creation of component placement data. | 2015-10-22 |
20150302131 | INFORMATION PROCESSING APPARATUS AND BACK ANNOTATION METHOD - A back annotation method includes a first process, a second process, and a third process. In the first process, first information is determined. In the second process, second information to be reflected into the first information is determined. In the third process, whether the first information is being locked is determined based on a log file. When it is determined that the first information is being locked, it is requested that a back annotation process for reflecting the second information into the first information is performed in the first process. When it is determined that the first information is not being locked, the back annotation process is performed in the third process. | 2015-10-22 |
20150302132 | MASK3D MODEL ACCURACY ENHANCEMENT FOR SMALL FEATURE COUPLING EFFECT - A method and apparatus of a novel full chip edge-based mask three-dimensional (3D) model for performing photolithography simulation with consideration for edge coupling effect is described. The method receives a mask design layout in order to perform mask topography effect modeling. The method generates scaling parameters for edge coupling effects. Each scaling parameter has an associated combination of feature width and space. The sum of feature width and space associated with at least one scaling parameter is less than a minimum pitch. The method applies a thick mask model that includes several edge-based kernels to the mask design layout to create a mask 3D residual. To apply the thick mask model to the mask design layout, the method updates the edge-based kernels with the scaling parameters. | 2015-10-22 |
20150302133 | SYSTEMS AND METHODS FOR AUTOMATED FUNCTIONAL COVERAGE GENERATION AND MANAGEMENT FOR IC DESIGN PROTOCOLS - A new approach is proposed that contemplates systems and methods to support automated functional coverage generation and management for an IC design protocol. The proposed approach takes advantage of table-based high-level (e.g., transaction-level) specifications of the IC design protocol, wherein the state tables are readable and easily manageable (e.g., in ASCII format) in order to automatically generate functional coverage for the IC design protocol, which include but are not limited to, coverage points, protocol transitions, and/or transaction coverage. The automatically generated functional coverage is then verified via formal verification and simulated at the register-transfer level (RTL) during the coverage generation and management process. The coverage data from the formal verification and the simulation runs are then analyzed and used to guide and revise the IC design protocol in a coverage-based closed-loop IC design process. | 2015-10-22 |
20150302134 | Design Rule Checking - There is provided a computer-implemented method for verification of a layout of an integrated circuit according to a design intent with a selected manufacturing process. The method comprises defining corner points of a first circuit part | 2015-10-22 |
20150302135 | METHOD FOR DESIGNING AND MANUFACTURING AN INTEGRATED CIRCUIT, SYSTEM FOR CARRYING OUT THE METHOD, AND SYSTEM FOR VERIFYING AN INTEGRATED CIRCUIT - A method of manufacturing an integrated circuit, a system for carrying out the method, and a system for verifying an integrated circuit may use a standard cell layout including a first layout region that may violate design rules. The method for designing an integrated circuit may comprise receiving a data file that includes a scaling enhanced circuit layout, and designing a first standard cell layout using design rules and the data file. The designing the first standard cell layout may include designing a first layout region of the first standard cell layout using the data file, and designing a second region of the first standard cell layout using the design rules. | 2015-10-22 |
20150302136 | Methods for Layout Verification for Polysilicon Cell Edge Structures in FinFET Standard Cells Using Filters - Methods for verifying the layout for standard cells using finFET standard cell structures with polysilicon on cell edges. Standard cells are defined using finFET transistors. Polysilicon dummy structures are formed on the edges of the active areas of the standard cells. Where two standard cells abut a single polysilicon dummy structure is formed. In a design flow, a pre-layout netlist schematic for the standard cells is formed that does not include devices corresponding to the polysilicon dummy structures. After an automated place and route process forms a device layout using the standard cells, a post layout netlist schematic is extracted including MOS devices corresponding to the polysilicon dummy structures. A layout versus schematic comparison is then performed, but during the comparison MOS devices corresponding to the polysilicon dummy structures are filtered from the post-layout netlist and are not compared. Additional methods are disclosed. | 2015-10-22 |
20150302137 | Expanded Canonical Forms Of Layout Patterns - Aspects of the disclosed technology relate to techniques for determining expanded canonical forms of layout patterns. Coordinates of vertices of geometric elements in a window of a layout design are first transformed into new coordinates of the vertices, wherein the coordinates of vertices do not comprise clipped coordinates and the transforming comprises: performing a translation on the coordinates of vertices based on differences between maximum and minimum X/Y coordinate values of the vertices. Based on sums of X/Y coordinate values of the new coordinates of the vertices, a canonical form of the geometric elements is determined. The canonical form coordinates of the vertices for a plurality of windows may then be determined. The plurality of windows comprise the window, are centered in the same location as the window, and have different sizes. | 2015-10-22 |
20150302138 | NATURAL GAS DEHYDRATION VESSEL HAVING REDUCED REGENERATION MODE CYCLE TIME AND METHOD OF USE AND DESIGN THEREOF - A vessel for dehydrating a natural gas stream using molecular sieve material contained therein and a method for designing such a vessel are described. The vessel includes cylindrical vessel walls having a plurality of thermally conductive plates attached to the inner surface thereof. The plurality of thermally conductive plates are distributed vertically and circumferentially through the cylindrical portion of the vessel. The dimensions of the thermally conductive plates can be determined using computational fluid dynamics analysis of a process for regenerating the molecular sieve material. It is possible to reduce the duration of operation in regeneration mode using the vessel of the present disclosure. | 2015-10-22 |
20150302139 | SYSTEMS AND METHODS FOR VIRTUAL CONTRAST AGENT SIMULATION AND COMPUTATIONAL FLUID DYNAMICS (CFD) TO COMPUTE FUNCTIONAL SIGNIFICANCE OF STENOSES - Systems and methods are disclosed for assessing a risk of disease. One method includes obtaining an anatomic model associated with a target anatomy; modeling, using a processor, an injection of one or more virtual contrast agents into the anatomic model; performing a simulation of flow of blood and the one or more virtual contrast agents through the anatomic model; and computing one or more characteristics of concentration associated with the one or more virtual contrast agents at one or more locations in the anatomic model based on the simulation. | 2015-10-22 |
20150302140 | IN SILICO IDENTIFICATION OF CANCER MOLECULAR SIGNALING PATHWAYS AND DRUG CANDIDATES - Disclosed is an in silico method to identify molecular signaling pathways that influence cancer development as well as therapeutic compounds with activity against them. | 2015-10-22 |
20150302141 | MULTICELLULAR METABOLIC MODELS AND METHODS - The invention provides a computer readable medium or media, having: (a) a first data structure relating a plurality of reactants to a plurality of reactions from a first cell, each of said reactions comprising a reactant identified as a substrate of the reaction, a reactant identified as a product of the reaction and a stoichiometric coefficient relating said substrate and said product; (b) a second data structure relating a plurality of reactants to a plurality of reactions from a second cell, each of said reactions comprising a reactant identified as a substrate of the reaction, a reactant identified as a product of the reaction and a stoichiometric coefficient relating said substrate and said product; (c) a third data structure relating a plurality of intra-system reactants to a plurality of intra-system reactions between said first and second cells, each of said intra-system reactions comprising a reactant identified as a substrate of the reaction, a reactant identified as a product of the reaction and a stoichiometric coefficient relating said substrate and said product; (d) a constraint set for said plurality of reactions for said first, second and third data structures, and (e) commands for determining at least one flux distribution that minimizes or maximizes an objective function when said constraint set is applied to said first and second data structures, wherein said at least one flux distribution is predictive of a physiological function of said first and second cells. The first, second and third data structures also can include a plurality of data structures. Additionally provided is a method for predicting a physiological function of a multicellular organism. The method includes: (a) providing a first data structure relating a plurality of reactants to a plurality of reactions from a first cell, each of said reactions comprising a reactant identified as a substrate of the reaction, a reactant identified as a product of the reaction and a stoichiometric coefficient relating said substrate and said product; (b) providing a second data structure relating a plurality of reactants to a plurality of reactions from a second cell, each of said reactions comprising a reactant identified as a substrate of the reaction, a reactant identified as a product of the reaction and a stoichiometric coefficient relating said substrate and said product; (c) providing a third data structure relating a plurality of intra-system reactants to a plurality of intra-system reactions between said first and second cells, each of said intra-system reactions comprising a reactant identified as a substrate of the reaction, a reactant identified as a product of the reaction and a stoichiometric coefficient relating said substrate and said product; (d) providing a constraint set for said plurality of reactions for said first, second and third data structures; (e) providing an objective function, and (f) determining at least one flux distribution that minimizes or maximizes an objective function when said constraint set is applied to said first and second data structures, wherein said at least one flux distribution is predictive of a physiological function of said first and second cells. | 2015-10-22 |
20150302142 | DETERMINING NOVEL ENZYMATIC FUNCTIONALITIES USING THREE-DIMENSIONAL POINT CLOUDS REPRESENTING PHYSICO CHEMICAL PROPERTIES OF PROTEIN CAVITIES - The invention relates to a method for determining catalophores including the steps of creating a point cloud database for target protein structures; creating a query point cloud; and searching said database with said query to thereby identify one or more catalophores. | 2015-10-22 |
20150302143 | GENE FUSIONS AND ALTERNATIVELY SPLICED JUNCTIONS ASSOCIATED WITH BREAST CANCER - The present invention relates to gene fusions and alternative spliced junctions associated with breast cancer. The present invention also relates to novel methods of identifying gene fusions and alternative spliced junctions in RNA sequencing data. The present invention further relates to predicting prognosis of a breast cancer patient based on the number of gene fusion events. | 2015-10-22 |
20150302144 | HIERARCHICAL GENOME ASSEMBLY METHOD USING SINGLE LONG INSERT LIBRARY - The present invention is generally directed to a hierarchical genome assembly process for producing high-quality de novo genome assemblies. The method utilizes a single, long-insert, shotgun DNA library in conjunction with Single Molecule, Real-Time (SMRT®) DNA sequencing, and obviates the need for additional sample preparation and sequencing data sets required for previously described hybrid assembly strategies. Efficient de novo assembly from genomic DNA to a finished genome sequence is demonstrated for several microorganisms using as little as three SMRT® cells, and for bacterial artificial chromosomes (BACs) using sequencing data from just one SMRT® Cell. Part of this new assembly workflow is a new consensus algorithm which takes advantage of SMRT® sequencing primary quality values, to produce a highly accurate de novo genome sequence, exceeding 99.999% (QV 50) accuracy. The methods are typically performed on a computer and comprise an algorithm that constructs sequence alignment graphs from pairwise alignment of sequence reads to a common reference. | 2015-10-22 |
20150302145 | SYSTEMS AND METHODS FOR TRANSCRIPTOME ANALYSIS - The invention generally provides systems and methods for analysis of RNA-Seq reads in which an annotated reference is represented as a directed acyclic graph (DAG) or similar data structure. Features such as exons and introns from the reference provide nodes in the DAG and those features are linked as pairs in their canonical genomic order by edges. The DAG can scale to any size and can in fact be populated in the first instance by import from an extrinsic annotated reference. | 2015-10-22 |
20150302146 | USER INTERFACE FOR MEDICAL IMAGE REVIEW WORKSTATION - Methods, systems and computer program products for controlling display of different types of medical images and providing touchscreen interfaces for display on a mobile communication device and associated with different image types, e.g., different imaging modalities or different view modes. Detection of a multi-finger tap on the screen of the mobile communication device while viewing a first touchscreen interface for an image type invokes a second or auxiliary touchscreen interface for that image type having a subset of interface elements of the first touchscreen interface. | 2015-10-22 |
20150302147 | Synchronization of Heatlhcare Data Across Disparate Data Centers - Methods, systems, and computer-readable media are provided for synchronizing healthcare data across disparate data centers. Healthcare data from healthcare data sources is received by a collector service that operates in a cloud computing platform. The data is sent to a staging platform associated with a first data center that is hosting the collector service. From here, the data is stored in association with a long-term storage data store associated with the first data center. As well, it is communicated to processing nodes associated with the first data center that subscribe to the data. The staging platform also communicates the data to a staging platform associated with a second data center. This staging platform also stores the data in association with a long-term storage data store located at the second data center and communicates the data to processing nodes located at the second data center that subscribe to the data. | 2015-10-22 |
20150302148 | METHOD AND SYSTEM FOR SECURING ELECTRONIC HEALTH RECORDS - A method for securing electronic health records (EHRs). The method includes receiving an EHR for a patient, obtaining patient metadata for the patient, generating a message digest using at least a portion of the patient metadata, extracting from the message digest a derived file name and a file encryption key, encrypting using the file encryption key the EHR to obtain encrypted file content, associating the encrypted file content with the derived file name and decoy file metadata to obtain an encrypted HER, and storing the encrypted EHR in a file directory. | 2015-10-22 |
20150302149 | AGGREGATION, PARTITIONING, AND MANAGEMENT OF HEALTHCARE DATA FOR EFFICIENT STORAGE AND PROCESSING - Methods, systems, and computer-readable media are provided for aggregating, partitioning, and storing healthcare data. Healthcare data is collected from various disparate healthcare data sources. The data is aggregated into batches of the same type of data. From here, the data is partitioned according to the data's originating healthcare data source. The aggregated and partitioned healthcare data is then stored in a long term storage data store. This system of storing healthcare data allows for efficient retrieval and processing by computing solutions that need access to batches of healthcare data. The system also reduces costs associated with storing data as duplicate storage is eliminated. | 2015-10-22 |
20150302150 | PATIENT CARE AND HEALTH INFORMATION MANAGEMENT SYSTEM - Streamlined and integrated patient care and health information management systems and methods for reducing the need for costly, near constant patient monitoring by providing system components that allow healthcare professionals to view the most important data for a number of patients in varying physical locations in a seamless manner are disclosed. Various components of the system can be used to monitor patients; measure, record, and track vital signs; and coordinate patient care in an automated fashion. Patients that have a achieved a relatively stable condition during a recovery process, but who still require or would benefit from near constant, or frequent vital sign monitoring can be provided with one or more body worn vital sign sensors. These patient worn sensors can track vital sign and other information about patients, including patient movement, activity, and sleep patterns. | 2015-10-22 |
20150302151 | INFORMATION MANAGEMENT SYSTEM AND METHOD - A method, computer program product, and computing system for associating a scannable tag with a medical device. Identifying indicia that is obtained by scanning the scannable tag with a client electronic device is received, thus defining an identified medical device. Technical information concerning the identified medical device is provided to the client electronic device. | 2015-10-22 |
20150302152 | INFORMATION MANAGEMENT SYSTEM AND METHOD - A method, computer program product, and computing system for associating a scannable tag with a healthcare consumable of a medical patient. Identifying indicia that is obtained by the medical patient scanning the scannable tag with a client electronic device is received, thus defining an identified healthcare consumable. Status update information that concerns the identified healthcare consumable is received from the client electronic device. | 2015-10-22 |
20150302153 | REVERSE DOCUMENT QUALITY REVIEW - Computerized systems and methods identify diagnoses that impact payments to hospitals and verify whether the diagnoses are properly supported. When a diagnosis is identified that impacts payment for services rendered to a patient, patient data for the patient is analyzed to determine if clinical indicators are present to support the diagnosis. If the diagnosis is not supported by the necessary clinical indicators, a notice is sent to a clinician that indicates a diagnosis that impacts payment is not supported, allowing the clinician to supplement the patient data to support the diagnosis. | 2015-10-22 |
20150302154 | POINT-OF-CARE PRICE TRANSPARENCY SYSTEMS AND METHODS - A method can include a patient presenting insurance information to a medical office where he or she is to receive medical care, the medical office confirming a reason for the patient's visit, and the system sending initial patient information directly to the patient's insurance company or to a clearinghouse. The method can further include the insurance company or clearinghouse replying with anticipated remittance advice including an estimate and the medical office presenting the estimate to the patient. | 2015-10-22 |
20150302155 | METHODS AND SYSTEMS FOR PREDICTING HEALTH CONDITION OF HUMAN SUBJECT - Disclosed are the methods and systems for classifying one or more patients in one or more categories. A distribution of one or more physiological parameters associated with the one or more patients is determined based on a patient dataset. The one or more physiological parameters correspond to at least a stroke scale score. One or more parameters associated with a copula are estimated by the one or more processors. In an embodiment, the copula defines a joint distribution of the one or more physiological parameters. A classifier is created based on the one or more parameters, wherein the classifier classifies the one or more patients in the one or more categories. The one or more categories correspond to a range of the stroke scale score. | 2015-10-22 |
20150302156 | SYSTEMS AND METHODS FOR PROCESSING AND DISPLAYING HEALTH AND MEDICAL DATA, PERFORMING WORK TASKS AND DELIVERING SERVICES - A computer system for processing and displaying medical data is provided. Health data pertaining to a user is received. The received health data is analyzed with respect to a set of active clinical guidelines. Medical diagnosis results are provided to the user based on the analyzed data. The received health data and the medical diagnosis results are displayed to the user via a mobile device. The mobile device is further configured to provide a plurality of health related services. | 2015-10-22 |
20150302157 | Apparatus, Method, and System for Counting Packaged, Consumable, Medical Items Such as Surgical Suture Cartridges - The present invention is directed to a method, system, and apparatus for tracking the use, waste, and/or other characteristics of consumable medical items (e.g., surgical sutures) that are used during surgery. In one version of the invention, a sterile, disposable apparatus, denominated as a “landing pad,” is used to receive and position relative to one another: (1) an electronic device capable of taking digital images; and (2) the item being imaged (such as a sterile suture cartridge). The landing pad positions the electronic device and consumable medical item for digital imaging of the medical item. The resulting digital image is processed to identify a database record matching the imaged medical item. The identified record is then used to provide information about the imaged medical item (e.g., the count of individual surgical sutures contained in an imaged sterile suture cartridge). The information can be used for a variety of purposes, including, for example, an accurate accounting of all surgical sutures passed into the sterile field of an operating room for a scheduled surgery. | 2015-10-22 |
20150302158 | VIDEO-BASED PULSE MEASUREMENT - Aspects of the subject disclosure are directed towards a video-based pulse/heart rate system that may use motion data to reduce or eliminate the effects of motion on pulse detection. Signal quality may be computed from (e.g., transformed) video signal data, such as by providing video signal feature data to a trained classifier that provides a measure of the quality of pulse information in each signal. Based upon the signal quality data, corresponding waveforms may be processed to select one for extracting pulse information therefrom. Heart rate data may be computed from the extracted pulse information, which may be smoothed into a heart rate value for a time window based upon confidence and/or prior heart rate data. | 2015-10-22 |
20150302159 | TRANSFER OF BREATHING ASSISTANCE APPARATUS DATA - A medical apparatus is adapted to facilitate a transfer of data to a computer system using a mobile device. The apparatus has a store of data, a display and a controller that generates a barcode encoding an access address for the computer system and the data, and displaying the barcode on the display. | 2015-10-22 |
20150302160 | Method and Apparatus for Monitoring Diet and Activity - A method and apparatus includes a memory, a display and user input module, a camera and micro spectroscopy module, and one or more communication modules communicably coupled to a processor. The processor is configured to capture one or more images and spectroscopy data of the food(s) using the camera and micro spectroscopy module, determine a food type and food amount for each of the food(s) using the image(s) and spectroscopy data, perform a dietary analysis of the food(s) based on the food type and food amount determined from the image(s) and spectroscopy data, determine the set of nutritional data for the food(s) based on the dietary analysis, and provide the set of nutritional data for the food(s) to the memory, the display and user input module or the one or more communication modules. | 2015-10-22 |
20150302161 | SYSTSEM FOR MONITORING A USER - A system for monitoring a user is provided that stores user information about a psychological profile of the user, and a list of monitoring parameters that each comprise a measurable parameter related to the user. A tailored list of monitoring parameters is selected from the set of monitoring parameters based on the user information, and the system then monitors the user using the tailored list of monitoring parameters to provide monitoring results. Information related to the monitoring results can then be outputted to the user. | 2015-10-22 |
20150302162 | CLOUD-ASSISTED REHABILITATION METHODS AND SYSTEMS FOR MUSCULOSKELETAL CONDITIONS - Embodiments of the invention include a cloud-assisted rehabilitation system for assisting in the rehabilitation of musculoskeletal conditions, and a method for rehabilitating patients having musculoskeletal conditions. A rehabilitation portal can aggregate and de-identified musculoskeletal rehabilitation information that is gathered from various intelligent musculoskeletal rehabilitation apparatuses attached to a group of patients. The rehabilitation portal can facilitate crowd communication among the group of patients. A particular rehabilitation experience can be compared with other rehabilitation experiences and data from other patients. The rehabilitation portal can also facilitate crowd communication among a group of healthcare professionals so that the plurality of healthcare professionals can communicate with each other and compare information regarding different rehabilitation experiences based at least on the aggregated de-identified musculoskeletal rehabilitation information. | 2015-10-22 |
20150302163 | PROGNOSTICS AND HEALTH MANAGEMENT SYSTEM - A flexible prognostics and health management (PHM) device is disclosed. Sensor data is generated that quantifies real-time conditions of components in a machine based on sensor signals generated by sensors. A PHM system loads a PHM module that implements externally invokable functions. The PHM system receives an analytics script. The analytics script comprises interpretable commands and predictive learning model parameter values associated with a predictive learning model. Some of the interpretable commands are configured to invoke some of the externally invokable functions with at least some of the predictive learning model parameter values. The PHM module invokes a command interpreter module to interpret an interpretable command and the predictive learning model parameter values and generate first executable bytecodes. The first executable bytecodes execute to generate a notification identifying a predicted future condition of a first component for presentation on a display device. | 2015-10-22 |
20150302164 | Method for Managing Treatment of a Health Condition Using Subjective Symptom Data - A method for managing treatment of a particular health condition afflicting a patient includes programming a processor with a health management application program that prompts a user for entry of health condition data, including a patient physiological data, subjective patient health condition data, and medication delivery data, compiles the health condition data into a data summary, and transmits the data summary through a communication unit. A drop-down list related to subjective symptoms is provided, which includes stress and depression. A display touch method is used to enter data, selections, and controls. The health management program also provides prompts for the entry of diet data, and further displays drop-down lists related to daily activities and alerts for medication delivery. | 2015-10-22 |
20150302165 | DETECTION DEVICE, METHOD, AND PROGRAM FOR ASSISTING NETWORK ENTROPY-BASED DETECTION OF PRECURSOR TO STATE TRANSITION OF BIOLOGICAL OBJECT - The invention provides a detection device, method, and program capable of highly accurately detecting a pre-disease state that indicates a precursor to a state transition from a healthy state to a disease state. The following processes are carried out: a process of obtaining measured data on genes, proteins, etc. related to a biological object as high-throughput data (s | 2015-10-22 |
20150302166 | METHOD FOR INVERSE TRAJECTORY PLANNING - The present invention relates to a data processing method of determining a trajectory of a medical instrument to be inserted into a patient's body for treatment of a target region in the patient's body, the method being executed by a computer and comprising the following steps:
| 2015-10-22 |
20150302167 | SYSTEM AND METHOD FOR DEVELOPMENT OF THERAPEUTIC SOLUTIONS - The present disclosure relates to a system for obtaining a therapeutic solution for treatment of a disease or a disorder. The present disclosure also relates to a method of drug discovery and designing therapeutic solutions for various medical conditions, through the said system, comprising database, digital drug library and a processor. | 2015-10-22 |
20150302168 | Method and System for Tuning a Musculoskeletal Model - A computer-implemented method and system for modifying a musculoskeletal model is provided. Test data for a set of ergonomic tests performed by a number of test subjects fitting a profile is obtained. A number of muscle parameters for a number of muscles in the musculoskeletal model are adjusted using the test data to modify the musculoskeletal model to adapt to the profile. | 2015-10-22 |
20150302169 | METHOD AND SYSTEM TO EXTEND THE CONDITIONS OF APPLICATION OF AN INVERSION OF THE HODGKIN-HUXLEY GATING MODEL - A method to quantify kinetics of voltage gated membrane channels by inversion of a Hodgkin Huxley formalism includes the steps of: providing an electrophysiology apparatus configured to provide a constant voltage difference across a cell membrane of a cell and to measure a current through the cell membrane and a computer configured to run at least one or more protocols; bounding R based on data generated by a T-step protocol or a G-step protocol; estimating a steady state based on data generated by a C-step protocol or a H step protocol; extracting a time constant based on the data generated by the T-step protocol or the G-step protocol as bounded by R; and assessing a range of time constants that can reproduce the data generated by the C-step protocol or the H step protocol and by the T-step protocol or the G-step protocol within and experimental error. C-step and a G-step voltage clamp stimulation protocols to generate a set of experimental data to quantify a channel availability of a cell are also described. | 2015-10-22 |
20150302170 | Method Of Creating An Accurate Bone And Soft-Tissue Digital Dental Model - A method of creating a 3-D anatomic digital model for determining a desired location for placing at least one dental implant in a patient's mouth. The method comprises the act of obtaining a first dataset associated with hard tissue of the patient's mouth. The method further comprises the act of obtaining a second dataset associated with soft tissue of the patient's mouth. The method further comprises the act of combining the first dataset and the second dataset to create a detailed structure of hard tissue and soft tissue having variable dimensions over the hard tissue. | 2015-10-22 |
20150302171 | BIOIMAGING GRID - A method, system, and medium for evidence-based statistical diagnosis support. An exemplary method may include standardizing an input image to produce a standardized input image; structurizing the standardized input image to be characterized by a plurality of anatomical properties; mapping the input image to one or more reference cases of a plurality of reference cases using the plurality of anatomical properties, wherein the one or more reference cases are associated with first non-image clinical information; and determining second non-image clinical information for the input image based on the one or more reference cases and the first non-image clinical information. | 2015-10-22 |
20150302172 | Method and Apparatus for Increasing Work Flow in a Pharmacy - A pharmacy is arranged in a plurality of stations that are designated for certain purposes that are required to receive, fill, check, and distribute prescriptions. Further, a pharmacy is arranged to provide stations for patient education and counseling. The stations are separated to reduce distractions and errors and to isolate different parts of the process. Often, some of the stations are isolated from patient access to reduce patient disruptions. The embodiments further aim to provide a designation of urgency to in-progress prescriptions. The subject embodiment also aim to provide a method and apparatus for managing in-progress prescriptions. Horizontal rows are arranged vertically in a carousel configuration such that in-progress prescriptions are stored vertically, thus reducing the amount of horizontal space required. | 2015-10-22 |
20150302173 | METHODS AND SYSTEMS FOR MONITORING MEDICATION COMPLIANCE - Systems and methods are provided for monitoring medication compliance to allow a doctor or medical care provider to determine whether a subject is ingesting a prescribed medication at the proper times. This can include the capability of remote access to remotely monitor compliance. A medication container includes at least one medication-containing cell, with a cover overlaying the cell. An electronic device including a capacitive touchscreen is electrically coupled to the medication container and programmed to detect whether the cell has been accessed through the cover. The base of the cell may be in capacitive contact with the capacitive touchscreen or there may be an insulator therebetween. An adaptor may be provided to electrically couple the medication container and the electronic device. | 2015-10-22 |
20150302174 | METHOD AND APPARATUS FOR VERIFYING THERAPUETIC COMPLIANCE - An identity standard (a name, cell number, face image, etc.), a therapeutic event standard associated with the identity standard (such as a stored image of a person taking a medication), and a parameter standard associated with the identity standard (e.g. a time range for taking medication) are established. If a transmission (such as a selfie from a cell phone) is observed, that transmission is received and determinations are made as to whether the transmission satisfies the identity standard, the therapeutic event standard, and the parameter standard. If the identity standard, therapeutic event standard, and parameter standard are satisfied, a satisfaction reaction is executed (logging data, sending a confirmation message, etc.). | 2015-10-22 |
20150302175 | MEDICATION MANAGEMENT AND REPORTING TECHNOLOGY - Medication management and reporting technology, in which output from at least one sensor configured to sense physical activity in a building in which medication of a patient is located is monitored and a determination is made to capture one or more images of the medication based on the monitoring. A camera is used to capture an image of the medication and the captured image is analyzed to detect a state of the medication. Information regarding a schedule by which the medication should be taken by the patient is accessed and an expected state of the medication is determined. The detected state is compared with the expected state and a determination is made that the patient has departed from the schedule based on the comparison revealing that the detected state does not match the expected state. A message indicating the departure from the schedule is sent based on the determination. | 2015-10-22 |
20150302176 | INFORMATION MANAGEMENT SYSTEM AND METHOD - A method, computer program product, and computing system for providing a first level reminder to a medical patient, the first level reminder concerning a medical procedure to be performed by the medical patient. Whether the medical patient responded to the first level reminder is determined. If the medical patient did not respond to the first level reminder, a second level reminder is provided to the medical patient. | 2015-10-22 |
20150302177 | DRUG DISPENSING SYSTEM - In a drug dispensing system, data about the medication of a patient is received and used for generating drug dose data. The drug dose data includes data on the drug dose to be administered at a time. Drug balances can be maintained on the basis of the drug dose data. The drug storage of the hospital can be controlled by maintaining drug balances of a first drug storage in a computerized storage control system, and by updating the drug balances of the first drug storage on the basis of a drug delivery from the first drug storage to a second drug storage, and also by maintaining the drug balances of this second drug storage and by updating the drug balances of the second drug storage on the basis of both the drug delivery and the dispensing of the drug from the second drug storage. | 2015-10-22 |
20150302178 | SYSTEM FOR USING PATIENT DATA COMBINED WITH DATABASE DATA TO PREDICT AND REPORT OUTCOMES - A system and associated method receives, by a database coupled to a communication network, patient medical data from multiple data sources including data retrieved from implantable medical devices implanted in patients. A processor accesses the database to generate a dataset from the medical data having at least one data characteristic matching a corresponding data characteristic of a patient group of at least one patient. At least one subset of the dataset is identified that had a therapy intervention subsequent to a time point that the subset had the matching data characteristic(s). An outcome of the subset is determined and a predictive outcome for the patient group is produced based on the outcome of at least one subset. | 2015-10-22 |
20150302179 | Real-time aggregation and display of data - Real-time technologies and data and gamification techniques, such as badges, leaderboards, performance scores, and other elements, to generate improvement in the work performance of employees, teams/departments, facilities, and organizations by providing actionable information via real-time dashboards using a variety of user interfaces. The invention also supports the automation of patient and staff workflow activities to enable optimized processes. | 2015-10-22 |
20150302180 | SIMULATION METHOD FOR HIGH-POLYMER MATERIAL - A computer-implemented simulation method for estimating the dispersion of filler contained in a high-polymer material is disclosed. Filler models numerically modeling the filler are each made up of F-particles. Polymer models numerically modeling the high-polymer material are each made up of P-particles. In a simulation process, a molecular dynamics calculation is performed using the filler models | 2015-10-22 |
20150302181 | Method and System for Simplified Recording to Discrete Media - In one aspect, a method for recordation of a content is described. A device requests a copy of the content for a discrete media (DM). The device retrieves metadata that supports the format of the DM, processes such metadata to generate a file. The file contains the content. The device causes the content to be recorded onto the DM using the file. | 2015-10-22 |
20150302182 | COMPARING APPLICATIONS AND ASSESSING DIFFERENCES - An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated. | 2015-10-22 |
20150302183 | METHOD AND SYSTEM FOR RESTRICTING EXECUTION OF VIRTUAL APPLICATION TO A MANAGED PROCESS ENVIRONMENT - Methods and systems for restricting the launch of virtual application files. In one embodiment, a launching application is signed with a digital signature. When the launching application launches a runtime engine and instructs it to execute an application file, the runtime engine determines whether an entity identifier associated with the launching application identifies an authorized entity. If the entity identifier identifies an authorized entity and the digital signature is valid, the runtime engine executes the application file. In another embodiment, a ticket is transmitted to the launching application along with an instruction to launch the application file. The ticket includes a digital signature and an expiration date. The launching application communicates the ticket to the runtime engine, which will execute the application file only if the digital signature is valid and a current date is not later than the expiration date. | 2015-10-22 |
20150302184 | COMPUTER SECURITY SYSTEM AND METHOD - A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an additional group process within the first process group; performing a first determination by an application programming interface (API) that the additional group process is within the first process group, and as a result of the first determination, causing the additional group process to inherit and duplicate a handle of the process. Process communications and control within isolated groups is permitted freely, whereas process control by an isolated process for non-isolated processes or isolated processes in different groups is constrained or prohibited. | 2015-10-22 |
20150302185 | METHOD AND APPARATUS FOR ACCOUNT INTERCOMMUNICATION AMONG APPS - A method and apparatus for account intercommunication among APPs. The method comprises: acquiring account information entered by a user in a current APP; and, after using the account information to log in successfully, providing the account information to other APPs having intercommunication permissions with the current APP for the other APPs to log in. Via the disclosed method, account information entered in any APP may be shared among APPs having intercommunication permissions with the APP, so that other APPs may be logged into using an intercommunicated account after they are opened, without the need to manage account information about various APPs through a unified entrance, and thus the APP need not access the entrance in advance, and login can be realized without the need to exit the APP to open the entrance; obviously, the flexibility and independence of APP login are improved, and the complexity of operation is reduced. | 2015-10-22 |
20150302186 | Expiration Time Authentication System, Expiration Time Authentication Device, and Expiration Time Authentication Method for Applications - A smartphone into which an application is installed includes a first and second authentication processing unit. The first authentication processing unit is configured to determine whether or not a current activation time of the application is past expiration time; permits authentication if the current activation time is not past the expiration time; and denies authentication if the current activation time is past the expiration time. The second authentication processing unit is configured to determine whether or not the current activation time is after previous activation time; permit authentication if the current activation time is after the previous activation time; and deny authentication if the current activation time is not after the previous activation time, wherein second authentication processing allows authentication to be denied if the current activation time (tampered and unauthorized activation time) is time before the previous activation time, as a result of turning back an internal clock of the smartphone. | 2015-10-22 |
20150302187 | APPARATUS AND METHOD FOR MANAGING MULTIPLE USER ACCOUNTS ON A MEMORY CARD - A memory card having a memory resident on the memory card and having stored thereon multiple isolated user accounts each having an associated user account data, and a firmware stored in memory, the firmware including coded instructions, which when executed, selectively manages each isolated user account so that an account access data for a predetermined isolated user account is accessed from the associated user account data when the firmware determines a predetermined condition is satisfied. | 2015-10-22 |
20150302188 | SYSTEM AND METHOD FOR WIRELESS PROXIMITY-BASED ACCESS TO A COMPUTING DEVICE - Disclosed herein is a system and method for wireless proximity-based access to a computing system, which in accordance with certain aspects of an embodiment of the invention includes a small, portable, person-carried or personal-item-carried (e.g., by attachment to a user's key's, purse, knapsack, etc.) wireless transmitter that serves as a “key,” and a wireless receiver configured for attachment to the computing system that serves as a “lock.” The lock may comprise, for example, a USB device that both wirelessly communicates with the key to detect its physical proximity, and communicates with the computer access software that is native on the computing system (e.g., standard WINDOWS username and password authentication processes) to either allow or disallow such computer access software from allowing access to the computing system based upon the physical proximity of the key to the lock. | 2015-10-22 |
20150302189 | EFFICIENT MODIFICATION AND CREATION OF AUTHORIZATION SETTINGS FOR USER ACCOUNTS - For efficient authorization settings in a computing environment, user access permissions are created or modified by mapping, granting, and/or limiting access to resources by resource type, and using checkboxes for controlling user access for individual resources and for mapping one of a multiplicity of icons to control a type of user access and control over the individual resources. | 2015-10-22 |
20150302190 | METHOD FOR DYNAMICALLY ADJUSTING PROGRAM LOGIN INTERFACE, AND INTERNET TERMINAL - Embodiments of the present disclosure disclose a method for dynamically adjusting a program login interface. The method includes: displaying a preset flash on a program login interface; detecting a user operation within a preset area in the login interface; and updating the displayed flash according to the user operation within the preset area. The embodiments of the present disclosure further disclose a computing terminal. During implementation of the embodiments of the present disclosure, dynamic interaction may be achieved in the program login interface, and more abundant content may be provided. | 2015-10-22 |
20150302191 | PROGRAM EXECUTION APPARATUS AND PROGRAM ANALYSIS APPARATUS - Execute a countermeasure process for vulnerability reliably before an attack aiming at vulnerability occurs. A vulnerability countermeasure processing unit performs a countermeasure process for vulnerability of a vulnerable library function being a general-purpose library function that has vulnerability among the general-purpose library functions included in a general-purpose library. A countermeasure selection unit, when a call for the vulnerable library function is requested at execution of a Web application, makes the vulnerability countermeasure processing unit perform the countermeasure process for the vulnerability of the vulnerable library function, and after the countermeasure process is performed by the vulnerability countermeasure processing unit, calls the vulnerable library function. | 2015-10-22 |
20150302192 | SYSTEM AND METHODS OF PERFORMING ANTIVIRUS CHECKING IN A VIRTUAL ENVIRONMENT USING DIFFERENT ANTIVIRUS CHECKING TECHNIQUES - Disclosed are methods, systems and computer program products for antivirus checking of software objects in a virtual environment. An example method includes monitoring and identifying, by an antivirus agent running on a virtual machine in the virtual environment, an event occurring in the virtual machine, an object related to the event, and a type of the object; upon determining that the object needs an antivirus checking, sending, by the antivirus agent, to a control module in the virtual environment, information of the object and the event; determining, by the control module, priorities of executing one or more antivirus checking methods determined for the object; and distributing, by the control module, among one or more selected components of an antivirus system in the virtual environment, the one or more antivirus checking methods to be performed on the object based on the priorities. | 2015-10-22 |
20150302193 | PARALLEL SNOOP AND HAZARD CHECKING WITH INTERCONNECT CIRCUITRY - A system-on-chip integrated circuitry includes interconnect circuitry for connecting transaction sources with transaction destinations. A buffer circuit buffers a plurality of access transactions received from the transaction sources before they are passed on to respective transaction destinations. Hazard checking circuitry, such as identifier reuse circuitry, performs hazard checks for access transactions in parallel with snoop operations performed by snoop circuitry for managing coherence between data values stored within the plurality of cache memories. The snoop circuitry includes snoop reordering circuitry for permitting reordering of snoop responses. The snoop circuitry may issue a snoop request for a given access transaction in parallel with the hazard checking circuitry performing one or more hazard checks for that transaction. | 2015-10-22 |
20150302194 | METHOD FOR PROTECTING AN ELECTRONIC TERMINAL, CORRESPONDING COMPUTER PROGRAM AND ELECTRONIC TERMINAL - A method is provided for protecting an electronic terminal. The method includes: activating a state of monitoring the terminal; in the state of monitoring, detecting a manipulation of the terminal, generating the passage of the terminal to a so-called suspect state, representative of a risk of attempted fraudulent use of the terminal; in the suspect state, triggering a reaction by the terminal, the reaction of the terminal including updating an alert level representative of a probability of attempted fraudulent use of the terminal, and a implementing at least one reactive action dependent on the alert level. | 2015-10-22 |
20150302195 | HARDWARE-BASED STACK CONTROL INFORMATION PROTECTION - Techniques for protecting contents of a stack associated with a processor are provided. The techniques include a method including receiving a store instruction from a software program being executed by the processor, the store instruction including control information associated with a subroutine, altering the control information to generate secured control information responsive to receiving the store instruction from the software program, storing the secured control information on the stack, receiving a load instruction from the software program; and responsive to receiving the load instruction from the software program, loading the secured control information from the stack, altering the secured control information to recover the control information, and returning the control information to the software program. | 2015-10-22 |
20150302196 | Local System Health Assessment - Techniques for local system health assessment are described. In at least some embodiments, a health assessment can be performed by an isolated security environment that resides locally on a system without requiring a network connection and/or access to a remote attestation service. In at least some embodiments, a health assessment ascertains whether modules that reside on a system have been altered such that the modules may be considered unsafe. For example, a known safe list is generated that includes measurements of known safe versions of modules that may be compared to current measurements of the modules to determine whether the modules have been altered. Health policies may be employed to specify various rules and parameters for performing system health assessments. | 2015-10-22 |
20150302197 | Apparatus and Method for Identifying Similarity Via Dynamic Decimation of Token Sequence N-Grams - An apparatus for identifying related code variants or text samples includes processing circuitry configured to execute instructions for receiving query binary code, processing the query binary code to generate one or more query code fingerprints comprising compressed representations of respective functional components of the query binary code, generating token sequence n-grams of the fingerprints, hashing the n-grams, partitioning samples by length to compare selected samples based on length, and identifying similarity via dynamic decimation of token sequence n-grams. | 2015-10-22 |
20150302198 | Detection of Malicious Code Insertion in Trusted Environments - Methods and computer program products which facilitate detection of malicious code insertion by an insider during the software development lifecycle are disclosed Aspects focus on behavioral characteristics associated with the introduction of malcode during the software development process. Injection of malcode by an insider threat, and the malcode itself, may leave behind behavioral signatures in the source code repository and source code that can be detected by a multi-dimensional combination of sensors. By detecting the behavioral signatures of malcode within artifacts generated by the software development process, instances of malcode can be isolated and prevented before release. | 2015-10-22 |
20150302199 | System and Method for Securing Embedded Controller Communications by Verifying Host System Management Mode Execution - An information handling system includes a processor operable to provide a branch trace message, and an embedded controller coupled to the processor via a primary interface and via a management interface. The embedded controller receives a management transaction from the processor via the primary interface. In response to receiving the management transaction, the embedded controller requests the branch trace message via the management interface and determines if the processor is operating in a system management mode based upon the branch trace message. | 2015-10-22 |
20150302200 | System and Method for Securing Embedded Controller Communications by Providing a Security Handshake - An information handling system includes a processor operable to receive a system management interrupt, and an embedded controller coupled to the processor via a primary interface and via a system management interrupt interface. The embedded controller receives a command to enable address decoding from the processor via the primary interface, sends the system management interrupt via the system management interrupt interface in response to receiving the command, and receives an indication from the processor via the primary interface, the indication including a determination if the processor was operating in a system management mode when the processor sent the command. | 2015-10-22 |
20150302201 | DEVICE AND METHOD FOR PROCESSING TRANSACTION REQUEST IN PROCESSING ENVIRONMENT OF TRUST ZONE - Provided is a device and method for operating a transaction application in a trust zone. The method includes confirming, by a processor, whether a transaction request from the application is performed in a processing environment of a secure world, and requesting an output unit, by the processor, for an output of notification information that corresponds to a result of the confirming, wherein the output of the notification information indicates that the transaction request is safe in response to the transaction request being performed in the processing environment of the secure world. | 2015-10-22 |
20150302202 | PROGRAM VERIFICATION APPARATUS, PROGRAM VERIFICATION METHOD, AND PROGRAM VERIFICATION PROGRAM - A necessary information extraction unit extracts, from variables used in a target program, an output variable to which output information to be output by an output function defined in an output function list is set. The necessary information extraction unit extracts, from the variables used in the target program, an encryption variable to which encrypted information encrypted by an encrypting function defined in an encryption function list is set. A protected state analysis unit refers to an assignment statement included in the target program, and extracts an encrypted state variable to which the encrypted information is assigned. A vulnerability determination unit determines whether or not the encrypted state variable and the output variable are the same variable, and outputs a program verification result based on a result of determination. | 2015-10-22 |
20150302203 | COMPUTER SYSTEM AND METHOD OF SECURELY BOOTING A COMPUTER SYSTEM - A computer system includes a data network connection, a reading device, an input component and a security device, wherein the security device establishes a data network link via the data network connection as the computer system is starting up and said security device further receives access data either via the data network link or via the reading device and the input component, and said security device compares the received access data with a data record stored in a firmware on a memory element and boots the computer system if the comparison was successful. | 2015-10-22 |
20150302204 | METHOD AND APPARATUS FOR DISPLAYING TEST RESULT OF TERMINAL - The present disclosure provides a method and an apparatus for displaying a test result of a terminal. The method includes: obtaining a last test value and a last test time of the terminal, the test value reflecting a system health condition of the terminal; determining a time span between a current time and the last test time; updating the last test value according to the time span to obtain a current test value; and displaying the current test value. By means of the present disclosure, the test value of the terminal can be updated over time; in this way, the test value can reflect the health condition of the system more accurately, and therefore the performance and security coefficients of the computer system can be improved by performing system optimization according to the test value. | 2015-10-22 |
20150302205 | INFORMATION ASSET PLACER - A computer-implemented method for the placing of information assets, including: discovering information about a new or changed information asset; determining one or more characteristics of an ideal location for the information asset; determining one or more characteristics of one or more locations in an information technology environment; determining the compatibility of the information asset with the location(s) by comparing the characteristic(s) of the ideal location to the characteristic(s) of the actual location(s); reporting the compatibility to a user; and optionally suggesting alternative placement locations. The locations may be part of one or more locational schemas. | 2015-10-22 |
20150302206 | METHOD AND SYSTEM FOR HIDING SENSITIVE DATA IN LOG FILES - An approach for hiding sensitive data in log files is provided. The approach uses a background program embedded within an operating system. The background program intercepts a write operation of an application and, in response to determining that the write operation is for a log file, gets content of the write operation. The background program checks a knowledge base that comprises information for the sensitive data and identifies the sensitive data in the content of the write operation. The background program masks the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked. In the log file, the background program writes modified content in which the sensitive data is masked. | 2015-10-22 |