06th week of 2017 patent applcation highlights part 44 |
Patent application number | Title | Published |
20170039290 | METHOD FOR RANKING RESOURCES USING NODE POOL - An improved search engine creates correlations linking terms from inputs provided by a user to selected target terms. The correlation search process receives pre-processed inputs from a user including a wide variety of input formats including keywords, phrases, sentences, concepts, compound queries, complex queries and orthogonal queries. The pre-processing also includes pre-processing of general digital information objects and static or dynamic generation of questions. After a correlation search of the information presented by the pre-processing, the search results are processed in novel ways to provide an improved relevance ranking of results. | 2017-02-09 |
20170039291 | Application Cards Based On Contextual Data - A server includes a network communication device, a storage device, and a processing device. The processing device executes computer-readable instructions that, when executed by the processing device, cause the processing device to: receive contextual data from a client computing device via the network communication device, the contextual data indicates a first application view displayed on the client computing device; identify a first application function ID that identifies a first application function corresponding with the first application view; determine a first user intent ID that corresponds with the first application function ID; determine a second user intent ID that transitions from the first user intent ID; identify a second application function ID that corresponds with the second user intent ID; retrieve a card object corresponding with the second application function ID from the storage device; and transmit the card object to the client computing device via the network communication device. | 2017-02-09 |
20170039292 | SYSTEMS AND METHODS FOR INTEGRATING XML SYNDICATION FEEDS INTO ONLINE ADVERTISEMENT - A system for providing XML syndication content to an Internet advertisement panel rendered in a web browser is disclosed. The system includes a web content server, an Internet advertisement server, and a XML syndication content feed site server. Both the web content server and the Internet advertisement servers are in communications with the web browser. The web content server is configured to respond to requests from the web browser for a web page and to deliver the web page to the web browser. The Internet advertisement server is configured to choose and deliver an Internet advertisement panel, having embedded XML syndication content, to the web browser. The XML syndication content feed site server is in communications with the Internet advertisement server and is configured to send XML syndication content updates to the Internet advertisement server. | 2017-02-09 |
20170039293 | QUESTION ANSWERING SYSTEM WITH DATA MINING CAPABILITIES - A question is received. The question is in a natural language. The question is mapped to a data mining model. A query associated with the question is determined. The query is related to the data mining model. The query is executed on a dataset of structure data. | 2017-02-09 |
20170039294 | Data stream converter - A method and system for converting XML files to and from files in a data format based on hierarchies in real-time. A method for converting from XML to the data format based on hierarchies includes: applying a stylesheet to at least one XML file thereby generating at least one data record in an intermediate format and including information included in the at least one XML file; and, translating the at least one record in the intermediate format to the data format based on hierarchies. A method for converting from a data format based on hierarchies to XML includes: translating at least one record including information stored in the file format based on hierarchies to an intermediate format; and, applying a stylesheet to the at least one record in the intermediate format thereby generating at least one XML file being indicative of the information and suitable for transmission. | 2017-02-09 |
20170039295 | TRIBAL ABSTRACTION NETWORK - This invention relates to Tribal Abstraction Networks (TAN), a new type of Abstraction Network designed for hierarchies that do not have attribute relationships, assuming only the existence of multiple parents. A Tribal Association network can summarize the content and structure of terminology hierarchies and support their Quality Assurance (QA) by identifying concepts with a higher likelihood of incorrect or missing IS-A relationships. | 2017-02-09 |
20170039296 | TEAM ANALYTICS CONTEXT GRAPH GENERATION AND AUGMENTATION - A method for team analytics context graph generation and augmentation may include extracting a set of relevant features from a received message and predicting a context graph corresponding to the received message being sparse based on the extracted relevant features. A context of the received message is indeterminable from the context graph in response to the context graph being sparse. The method may also include generating an augmented context graph in response to the context graph being predicted to be sparse. The context of the received message is determinable from the augmented context graph. The method may additionally include presenting the augmented context graph. | 2017-02-09 |
20170039297 | Learning Graph - A learning graph is generated for documents according to a sequencing approach. The learning graph includes nodes corresponding to the documents and edges. Each edge connects two of the nodes and indicates a sequencing relationship between two of the documents to which the two of the nodes correspond that specifies an order in which the two of the documents are to be reviewed in satisfaction of the learning goal. The learning graph is a directed graph specifying a learning path through the documents to achieve a learning goal in relation to a subject. | 2017-02-09 |
20170039298 | MODEL DRIVEN COMPUTATIONAL PLATFORM FOR INTEGRATED DESIGN OF PRODUCTS, MATERIALS AND MANUFACTURING PROCESSES - The method(s) and system(s) for implementing extensibility of computational design and modelling of subject area on a computational platform in respect of a new subject in a subject area through a modelling schema includes populating the new subject in the model repository as data elements corresponding to the domain entity model of the domain entity meta model. The method includes generating a subject integration layer and a subject information interaction layer from the populated subject data elements and generating GUI screens for user interactions from the populated subject data elements. The method, further, includes integrating user determined external simulation tools with the computational platform by mapping the user determined external simulation tool parameters to the subject data elements. Subsequently, the method includes generating simulation tool adapters from said mapping to achieve said integration. | 2017-02-09 |
20170039299 | REGISTER FILE CIRCUIT DESIGN PROCESS - In some embodiments, a register file circuit design process includes instructing an automated integrated circuit design program to generate a register file circuit design, including providing a cell circuit design and instructing the automated integrated circuit design program to generate a selection design, a pre-decode design, and a data gating design. The cell circuit design describes a plurality of selection circuits that have a particular arrangement. The selection design describes a plurality of replica circuits that include respective pluralities of selection circuits having the particular arrangement. The pre-decode design describes a pre-decode circuit configured to identify a plurality of entries identified by a portion of a write instruction. The data gating design describes data gating circuits configured, in response to the pre-decode circuit not identifying respective entries, to disable data inputs to respective write selection circuits connected to the respective entries. | 2017-02-09 |
20170039300 | METHOD OF FABRICATING SEMICONDUCTOR DEVICE - A semiconductor device may be manufactured based on patterning groups to include a metal layer patterned according to separate patterning groups. The patterning groups may be based on a layout pattern. Preparing the layout pattern may include selecting first and second power patterns, selecting first and second patterns therebetween, and selecting a tie-connection pattern to connect the first power pattern to the first pattern. The manufacturing may include forming metal lines according to the patterning groups. Photomasks may be manufactured according to the layout pattern, and the metal lines may be formed according to the photomasks. A first photomask may be manufactured based on the first and second power patterns, the first pattern, and the tie-connection pattern, and a second photomask may be manufactured based on the second pattern. | 2017-02-09 |
20170039301 | COMPUTER SIMULATION OF ANIMAL TRAINING SCENARIOS AND ENVIRONMENTS - A method is described herein that comprises selecting a training objective, wherein the training objective comprises an objective to teach an animal to perform a behavior in an environment. The method includes testing the animal to determine a profile. The method includes identifying an optimal training product for the animal based on the profile. The method includes identifying an optimal training protocol for the animal based on the profile. The method includes simulating an experience of teaching the animal the behavior in a virtual training environment using the optimal training product and the optimal training protocol, the simulating including one or more applications running on a computing device for providing a virtual training environment, wherein the virtual training environment mimics the environment. | 2017-02-09 |
20170039302 | PROCESS SIMULATOR, LAYOUT EDITOR, AND SIMULATION SYSTEM - According to an embodiment, a process simulator has a layout processing unit to extract vertex coordinates of a first graphic of a layout of a semiconductor device described in a layout file used for a simulation, an initial mesh generation unit to generate a first initial mesh passing through the vertex coordinates in a plane direction of the layout, and a simulator unit to execute a process simulation of the semiconductor device based on simulation data in which a process flow of the semiconductor device is described, the layout, and the first initial mesh. | 2017-02-09 |
20170039303 | COMPUTER SIMULATION OF ANIMAL TRAINING SCENARIOS AND ENVIRONMENTS - A method is described herein that comprises providing through an electronic interface a simulated environment. The method includes representing a product within the simulated environment. The method includes representing use of the product within the simulated environment, wherein the represented product mimics an appearance and an operation of a corresponding physical product. The method includes providing one or more peripheral input devices for manipulating objects represented in the simulated environment, wherein the objects include the represented product. The method includes evaluating the manipulating of the represented product according to at least one criterion. | 2017-02-09 |
20170039304 | METHOD AND APPARATUS FOR PROVIDING PALLET LOADING GUIDE - Guide providing methods and an operator device are provided, one of methods comprises, acquiring item dimensions information and item constraint information of items and pallet dimensions information and pallet constraint information of pallets, classifying items into a plurality of item groups based on the acquired information, matching each of the item groups with a pallet for loading items included in a corresponding item group, when all items included in multiple item groups can be loaded together on a single pallet, merging the multiple item groups based on a remaining area of the matched pallet, performing a simulated loading of items included in each of the item groups on the pallet matched to a corresponding item group by changing loading sequences and arrangements, and determining a loading sequence and arrangement for loading the items included in each of the item groups on the pallet matched to the corresponding item group. | 2017-02-09 |
20170039305 | SYSTEMS AND METHODS FOR ORDER-OF-MAGNITUDE VIRAL CASCADE PREDICTION IN SOCIAL NETWORKS - Systems and methods for predicting order-of-magnitude viral cascades in social networks are disclosed. | 2017-02-09 |
20170039306 | Traffic System Optimization Device - In order to provide a device capable of flexibly responding to a change in a constraint in a traffic system, a traffic system optimization device according to the present invention includes: an optimization condition setting means that has a function of designating a condition as a range on a map when specifications of a traffic system are optimized; an optimization execution means that optimizes the specifications of the traffic system by a simulation using a calculator under an optimization condition set by the optimization condition setting means; an optimization result analysis means that groups optimal solutions analogous to each other obtained by the optimization execution means; and an analysis result display means that has at least a function of displaying a range of a design variable for each group of an optimal solution grouped by the optimization result analysis means on the map. | 2017-02-09 |
20170039307 | LARGE SCALE ANALYSIS OF CATASTROPHIC WEATHER DAMAGE - Estimating storm damage on a large scale includes collecting geospatial data from a plurality of sensors disparately situated in a defined geographic area; collecting the geospatial data occurs before and during a determined or simulated significant weather event. Geospatial property attribute information for each of a plurality of real property structures within the defined geographic area is also provided. A supercomputer estimates a magnitude and duration of significant weather event forces at points associated with each of the plurality of real property structures according to a significant weather event model in order to produce at least one model output data set. The model output data set is applied to the geospatial property attribute information and, based on the application of model output data, damage to the plurality of real property structures is automatically estimated. | 2017-02-09 |
20170039308 | Pre-Silicon Design Rule Evaluation - Roughly described, a method for developing a set of design rules for a fabrication process in development includes, for each of several candidate DRUTs for the fabrication process, laying our a logic cell based on the DRUT, the logic cell having at least one transistor and at least one interconnect, simulating fabrication of the logic cell according to the fabrication process and the layout, simulating behavior of the logic cell structure, including characterizing the combined behavior of both the first transistor and the first interconnect, evaluating performance of the logic cell structure in dependence upon the behavior as characterized, and recording in a database, in association with an indication of the DRUT, values indicating performance of the logic cell. The database can be used to select the best DRUT for the fabrication process. | 2017-02-09 |
20170039309 | Transient IR-drop waveform measurement system and method for high speed integrated circuit - A transient IR-drop waveform measurement system and method for a high speed integrated circuit are provided. The system includes all-digital elements and is based on a ring oscillator in GHz. Through oscillation with a Fast Ring Oscillator, sampling with an Edge Detector and counting with a Ripple Counter, a width and a peak of an IR-drop waveform are obtained. Moreover, a power supply network is adapted during a clock cycle through sending an adaptation signal to a connected dynamic voltage frequency scaling (DVFS) system. The measurement method includes 11 steps. The measurement system has following features: 1) IR-drop peak/width measurement ability; 2) low fabrication and test cost; 3) high accuracy and sensitivity; 4) early adaptation ability. Therefore, the measurement system can be used alone for chip monitoring or testing, in order to reduce a power supply noise disturbance to a chip. | 2017-02-09 |
20170039310 | CIRCUIT DESIGN METHOD AND SYSTEM - A method of designing a circuit includes designing a first layout of the circuit based on a first plurality of corner variation values for an electrical characteristic of a corresponding plurality of back end of line (BEOL) features of the circuit. Based on the layout, a processor calculates a first delay attributable to the plurality of BEOL features and a second delay attributable to a plurality of front end of line (FEOL) devices of the circuit. If the first delay is greater than the second delay, a second layout of the circuit is designed based on a second plurality of corner variation values for the electrical characteristic of the corresponding plurality of BEOL features. Each corner variation value of the first plurality of corner variation values is obtained by multiplying a corresponding corner variation value of the second plurality of corner variation values by a corresponding scaling factor. | 2017-02-09 |
20170039311 | SEMICONDUCTOR LAYOUT STRUCTURE AND DESIGNING METHOD THEREOF - A method for designing a semiconductor layout structure includes following steps. A first active feature group including at least a first active feature is received, and the first active feature includes a first channel length. A pair of first dummy features is introduced to form a first cell pattern. The first dummy features include a first dummy width. A first spacing width is defined between the first active feature group and one of the first dummy features and a third spacing width is defined between the first active feature group and the other first dummy feature. The first cell pattern includes a first cell width and a first poly pitch, and the first cell width is a multiple of the first pitch. The receiving of the first active feature group and the introducing of the first dummy features are performed in by at least a computer-aided design tool. | 2017-02-09 |
20170039312 | CELL LIBRARY AND DATA FOR DESIGNS - A cell library readable by a computer device includes cell data of a power supply reinforcement cell, specifying a conductive path that connects high-potential power supply routings located on both sides of one low-potential power supply routing with the routing interposed therebetween or low-potential power supply routings located on both sides of one high-potential power supply routing with the routing interposed therebetween, in data of plural cells which is used in designs of a semiconductor device including plural high-potential power supply routings, connected to a high-potential power supply trunk, which are separated from each other and are placed in parallel with each other, plural low-potential power supply routings, connected to a low-potential power supply trunk, which are placed alternately and in parallel with the high-potential power supply routings, and functional circuits which are formed in regions located between the high-potential power supply routings and the low-potential power supply routings. | 2017-02-09 |
20170039313 | METHOD AND SYSTEMS FOR OFF-LINE CONTROL FOR SIMULATION OF COUPLED HYBRID DYNAMIC SYSTEMS - Systems and methods are provided for controlling the simulation of a coupled hybrid dynamic system. A physical test rig configured to drive the physical structure component of the system and to generate a test rig response as a result of applying a test rig drive signal. A processor is configured with a virtual model of a complementary system to the physical structure component. The processor receives the test rig response and generates a response of the complementary system based on a received test rig response. The system can be driven with a random input. The processor compares the test rig response with the response of the complementary system, the difference being used to form a system dynamic response model. | 2017-02-09 |
20170039314 | BIOINFORMATIC PROCESSES FOR DETERMINATION OF PEPTIDE BINDING - This invention relates to the identification of peptide binding to ligands, and in particular to identification of epitopes expressed by microorganisms and by mammalian cells. The present invention provides polypeptides comprising the epitopes, and vaccines, antibodies and diagnostic products that utilize or are developed using the epitopes. | 2017-02-09 |
20170039315 | INFORMATION PROCESSING APPARATUS AND SIMULATION METHOD - A storage unit stores therein a collection of structures of biomolecules whose structure varies. A computing unit decreases a temperature set as a temperature parameter, which represents the temperature of the biomolecules, from a prescribed value in steps. When decreasing the temperature of the temperature parameter, the computing unit performs clustering on the structures included in the collection from before the decrease, detects detect outlier structures from the clustering result, and performs molecular dynamics simulations using the temperature parameter with the outlier structures as initial structures. Then, the computing unit stores structures generated by the molecular dynamics simulations in the storage unit. | 2017-02-09 |
20170039316 | Compositions, processes and algorithms for microbial detection - Processes for identifying whether any parasite or other organism is present in a host comprising: a. scanning for non-host signatures, b. scanning for one-error-removed non-host signatures; c. scanning for N-error removed non-host signatures; where N is selected to give the desired statistical certainty of the presence or absence of any parasite in the host. Algorithms useful for such detections and listings of specific signatures” (sequences or subsequences) for identifying specific microorganisms are also both provided. | 2017-02-09 |
20170039317 | METHODS AND SYSTEMS FOR ANALYSING HYBRIDISATION - A method is described for the analysis of hybridisation between a target in solution and a probe bound at a surface. The method comprises receiving detection intensity results for hybridisation of the target with a plurality of different probes, the probes being selected so that a range of hybridisation detection intensity results for the hybridisation between the target and the probe is covered. The method further comprises analysing the detection intensity results as function of the hybridisation free energy. According to embodiments of the present invention, the receiving and/or analysing takes into consideration a thermodynamic non-equilibrium state for the target-probe bounding state. | 2017-02-09 |
20170039318 | RESOLVING GENOME FRACTIONS USING POLYMORPHISM COUNTS - Methods of reliably estimating genomic fraction (e.g., fetal fraction) from polymorphisms such as small base variations or insertions-deletions are disclosed. Sequenced data from a multigenomic source is used to determine allele counts for one or more of the polymorphisms. For one or more of the polymorphisms, zygosity is assigned, and genomic fraction is determined from the zygosity and allele counts. Certain embodiments employ SNPs as the relevant polymorphism. The disclosed methods can be applied as part of an intentional, pre-designed re-sequencing study targeted against known polymorphisms or can be used in a retrospective analysis of variations found by coincidence in overlapping sequences generated from maternal plasma (or any other setting where a mixture of DNA from several people are present). | 2017-02-09 |
20170039319 | Displaying Status of Medical Lines - Displaying a status of a medical line includes receiving data characterizing a time at which use of the medical line commenced and a target usable time of the medical line. The medical line corresponds to a fluid transport channel for a patient. Using (i) the received data and (ii) a measure of elapsed time since use of the medical line commenced, the status of the medical line is determined that characterizes (a) a time until the target usable time of the medical line will be reached or (b) whether the target usable time of the medical line has been reached. A graphical user interface (GUI) element representing the status of the medical line as a function of time is displayed in a graphical user interface (GUI) display space. Related apparatus, systems, techniques and articles are also described. | 2017-02-09 |
20170039320 | METHODS AND APPARATUS FOR LOGGING INFORMATION USING A MEDICAL IMAGING DISPLAY SYSTEM - A method and apparatus for logging information using a medical image display system. In one embodiment, the method comprises accessing a first medical study; displaying one or more images from the first medical study in a first display area of a screen; receiving one or more user inputs related to a user's interactions with the first display area; receiving a user input to add a first selectable entry into a list of one or more entries displayed in a second display area; adding the first selectable entry to the list in response to receiving a user input; and storing the list for future access with the first medical study. | 2017-02-09 |
20170039321 | DATABASE SYSTEMS AND INTERACTIVE USER INTERFACES FOR DYNAMIC INTERACTION WITH, AND SORTING OF, DIGITAL MEDICAL IMAGE DATA - Database systems and techniques are disclosed for accessing data stores of digital medical images, processing the digital images, and displaying the digital images to efficiently provide information in an interactive user interface. The disclosure may advantageously provide efficient and rapid dynamic interaction with digital images accessed from one or more databases to enable user detection of differences between related digital images. Interactive user interfaces may be dynamically updated to provide rapid comparison of digital images. Further, digital images from multiple data sources may be automatically sorted by the system according to attributes associated with the images and rules and/or preferences of the user. In an embodiment the user may select a digital image from a first data source, and the system automatically determines and displays one or more comparison images from other image data sources. Images may additionally be automatically registered and/or matched to enable more efficient comparison and evaluation. | 2017-02-09 |
20170039322 | DATABASE SYSTEMS AND INTERACTIVE USER INTERFACES FOR DYNAMIC INTERACTION WITH, AND INDICATIONS OF, DIGITAL MEDICAL IMAGE DATA - Database systems and techniques are disclosed for accessing data stores of digital medical images, processing the digital images, and displaying the digital images to efficiently provide information in an interactive user interface. The disclosure may advantageously provide efficient and rapid dynamic interaction with digital images accessed from one or more databases to enable user detection of differences between related digital images. Interactive user interfaces may be dynamically updated to provide rapid comparison of digital images. Further, digital images from multiple data sources may be automatically sorted by the system according to attributes associated with the images and rules and/or preferences of the user. In an embodiment the user may select a digital image from a first data source, and the system automatically determines and displays one or more comparison images from other image data sources. Images may additionally be automatically registered and/or matched to enable more efficient comparison and evaluation. | 2017-02-09 |
20170039323 | REPORT LINKS - A medical and/or clinical report includes one or more links to various external (and/or internal) data sources and/or systems that include information relevant to the medical report. In an embodiment, a medical report may be in a PDF format and include links to images associated with the exam, information regarding the patient, a scheduling application useful to schedule additional procedures for the patient, and/or any other information associated with the patient or exam. The medical report, including various links, may be generated based on information received from external medical data systems. For example, a medical report from an external system may be updated to include various links to systems and sources of data related to the medical report, as described herein. | 2017-02-09 |
20170039324 | PATIENT STATE REPRESENTATION ARCHITECTURES AND USES THEREOF - Using a centralized system, it is possible to allow multiple disparate health care providers to gain a complete view of data regarding a patient's health and health care. Data accessible through such a central system can also be made available for researchers after being de-identified. Data in such a central system can not only include data culled from traditional physical and electronic medical records, but can also include data from distributed diagnostic devices, such as fitness trackers and consumer diagnostic equipment. Such a central system could potentially be accessed through applications made available to patients and health care providers and, in implementations where they are present, such applications could also be used for other purposes, such as performing interactive health evaluations and making recommendations of actions to take to maintain or restore a user's health. | 2017-02-09 |
20170039325 | COMMUNITY REFERRAL CLUSTER TECHNOLOGY PLATFORM - In a community referral cluster technology platform, principal investigators, hospitals, contract research organizations, life sciences partners, or other organizations create an invitation to one or more referring providers who have either in the past, or will in the future, make referrals for patients who require specialized care that the referring provider does not offer directly. The referring provider acts upon invitation, and makes an informed affirmative decision as to the interest of referring patients to the organization for possible involvement in a specified medical treatment. The technology platform identifies, filters, matches, and schedules patients for consultation appointments with the referring provider. The referring provider conducts consultation appointments facilitated by the technology platform and decides if referral to the organization is appropriate. | 2017-02-09 |
20170039326 | IDENTIFICATION AND ANALYSIS OF COPIED AND PASTED PASSAGES IN MEDICAL DOCUMENTS - This disclosure describes systems, devices, and techniques for identifying and analyzing copied and pasted passages of medical documents. In one example, a computer-implemented method includes receiving, by a computing device, a second medical document related to a patient encounter and determining, by the computing device, that a passage of the second medical document has been copied from a first medical document. The method may also include determining, by the computing device, a risk level for the passage, the risk level indicating a likelihood that the passage includes inaccurate information regarding the patient encounter, determining, by the computing device, that the risk level exceeds a risk threshold, and outputting, by the computing device, an indication of the passage for which the risk level exceeds the risk threshold. | 2017-02-09 |
20170039327 | CLIENT COMPUTING DEVICE HEALTH-RELATED SUGGESTIONS - A client computing device is disclosed that comprises a processor and an electronic personal assistant application program. The personal assistant application program may be configured to capture user data associated with user activities across a plurality of computer programs. The user data may be sent to a personal assistant user data interpretation engine. A health-related suggestion based on at least a subset of the user data and anonymized statistics of a user population retrieved from an aggregated knowledge base may be received. The health-related suggestion may be displayed on a display associated with the client computing device. | 2017-02-09 |
20170039328 | MOLECULAR PROFILING FOR CANCER - Provided herein are methods and systems of molecular profiling of diseases, such as cancer. In some embodiments, the molecular profiling can be used to identify treatments for a disease, such as treatments that were not initially identified as a treatment for the disease or not expected to be a treatment for a particular disease. | 2017-02-09 |
20170039329 | PET INSURANCE SYSTEM AND METHOD - This disclosure relates to a system and method implemented to facilitate real-time medical coverage for veterinary hospitals. More specifically, the disclosure as a pet medical insurance system and method utilizes data available in veterinary hospital practice information systems to facilitate real-time insurance enrollment and claims processing. | 2017-02-09 |
20170039330 | SYSTEM AND METHOD FOR DECENTRALIZED AUTONOMOUS HEALTHCARE ECONOMY PLATFORM - A system and method for a decentralized autonomous healthcare economy platform are provided. The system and method aggregates all of the healthcare data into a global graph-theoretic topology and processes the data via a hybrid federated and peer to peer distributed processing architectures. | 2017-02-09 |
20170039331 | METHODS AND SYSTEM FOR PROVIDING DRUG PRICING INFORMATION FROM MULTIPLE PHARMACY BENEFIT MANAGERS (PBMS) - A system according to certain aspects of the disclosure provides drug pricing information from multiple PBMs to users. For example, the system may obtain, calculate, and/or estimate drug prices that are available under contracts or agreements between PBMs and various pharmacies. These prices may be prices of drugs for purchase at the various pharmacies. In response to requests for prices of particular drugs, the system can display relevant prices. For example, the system displays a price for each pharmacy chain and/or displays prices for a particular geographical area. The users can compare the prices for a particular drug and determine which pharmacy they would like to purchase the drug from. The system can provide a discount coupon that allows the users to purchase the drug at the price listed by the system at the selected pharmacy. | 2017-02-09 |
20170039332 | SELECTING HEALTH NOTIFICATIONS BASED ON USER ACTIVITY - A method for presenting health notifications begins with creating a plurality of different health notifications, each conveying the same type of information. Each of the different health notifications is provided to a plurality of different users, each user categorized with user health metrics. Post-health notification user activity is tracked for each of the different users. A machine-learning classification machine is trained with tracked user activity, along with corresponding user health metrics, for each of the different health notifications. When provided with user health metrics received from a health-monitoring computing device associated with a user, the machine-learning classification machine chooses a selected health notification for the user from among the different health notifications, the selected notification determined to be more likely than any of the other health notifications to elicit a healthy response from the user. The selected health notification is then sent to the user. | 2017-02-09 |
20170039333 | SYSTEM AND METHOD OF INTERACTIVE NAVIGATION OF SUBJECT'S TREATMENT - System and method for monitoring a subject's condition. The system comprises a data input utility for receiving medical data indicative of a first condition of a subject; a communication utility for obtaining reference data comprising at least two predefined multi-dimensional functions and a multi-parameter space within said functions corresponding to a normal condition of a subject; a processing utility for processing said medical data of a subject by identifying a plurality of individual medical parameters describing said at least two predefined multi-dimensional functions, analyzing the identified plurality of individual parameters and determining a relation between the parameters and said multi-parameter space, for determining a treatment plan for navigating the subject from said first condition to a second subject condition in which values of said plurality of medical parameters define a parametric space matching the multi-parameter space of the normal condition; and an output utility for outputting said treatment plan. | 2017-02-09 |
20170039334 | METHODS AND SYSTEMS OF EVALUATING A RISK OF A GASTROINTESTINAL CANCER - A method of evaluating gastrointestinal cancer risk. The method comprises generating a set of features comprising a plurality of current blood test results from a blood collected from a target individual, providing at least one classifier generated according to an analysis of a plurality of respective historical blood test results of each of another of a plurality of sampled individuals, and evaluating, using a processor, a gastrointestinal cancer risk of the target individual by classifying the set of features using the at least one classifier. | 2017-02-09 |
20170039335 | NEAREST NEIGHBOR PREDICTIONS FOR PROVIDING HEALTH INSIGHTS - A network-accessible computer includes a network-communications interface, configured to receive health metrics of a user over a computer network. The network-accessible computer also includes a logic machine, which is configured to localize the user in a virtual space based on the health metrics, identify k nearest neighbors in the virtual space having k shortest Euclidean distances to the user, and generate a health insight comparing the user to the k nearest neighbors. The network-communications interface is further configured to send the health insight to a computing device associated with the user via the computer network. | 2017-02-09 |
20170039336 | HEALTH MAINTENANCE ADVISORY TECHNOLOGY - A computing system comprises a client computing device configured to execute a personal assistant application program. The personal assistant application program is configured to receive user data from interaction of a user with the client computing device, user interaction with additional devices, or system networked to the client computing device, to sense a user condition based on the user data received, to analyze the user condition to identify a user health issue, present, via a user interface associated with the client computing device, a suggestion for the user to treat, overcome or improve the user health issue, assess a degree to which the user has followed the suggestion, and modify subsequent suggestions to the user based on the degree to which the suggestion was followed. | 2017-02-09 |
20170039337 | METHODS AND SYSTEMS FOR COMPLIANCE CONFIRMATION AND INCENTIVES - Example methods, apparatus, and articles of manufacture for monitoring use of a research device is disclosed. The disclosed example includes producing monitored data by monitoring at least one of the user's heart activity, the user's breathing activity, the user's borborygmus (gastrointestinal noise), the user's vascular pattern, the user's facial and/or ear patterns, the user's fingerprint and/or handprint, and the user's retinal and/or iris pattern, and determining the user's compliance with a predetermined criterion for use of the portable research device based on the monitored data. | 2017-02-09 |
20170039338 | HEALTHCARE RESOURCE AVAILABILITY AND ALLOCATION SYSTEMS AND METHODS - Healthcare resource availability and allocation systems and methods include, for each of a plurality of healthcare providers, receiving data including one or more of ratings, type, availability, and location, and managing the data in a data store; from a physician with an associated patient, receiving a query for healthcare resources fulfilled by a healthcare provider of the plurality of healthcare providers; providing a subset of healthcare providers responsive to the query based in part of factors including the type, the availability, and the location; and receiving an allocation request for the healthcare provider, which is one of the subset, from the physician or the associated patient, and providing the allocation request to the healthcare provider for the fulfillment of the healthcare resources. | 2017-02-09 |
20170039339 | COMPUTING SYSTEM FOR IDENTIFYING HEALTH RISK REGIONS - A computing system is provided. The computing system includes an electronic personal assistant application server configured to determine a target location for a selected user and time, determine a group of other registered users who are or will be physically present at the target location at or around the predetermined time, determine group health data representing a health condition of the group of other registered users, the group health data being determined based on anonymous medical records statistics for the group of other registered users, the anonymous medical records statistics including biometric data sensed by at least one biometric sensor associated with at least one user computing device of one of the other registered users, identify a health risk level for the target location using the group health data, and generate an activity warning for the target location based on the health risk level. | 2017-02-09 |
20170039340 | METHODS AND SYSTEMS FOR PREDICTING SENSITIVITY OF BLOOD FLOW CALCULATIONS TO CHANGES IN ANATOMICAL GEOMETRY - Embodiments include methods and systems and for determining a sensitivity of a patient's blood flow characteristic to anatomical or geometrical uncertainty. For each of one or more of individuals, a sensitivity of a blood flow characteristic may be obtained for one or more uncertain parameters. An algorithm may be trained based on the sensitivities of the blood flow characteristic and one or more of the uncertain parameters for each of the plurality of individuals. A geometric model, a blood flow characteristic, and one or more of the uncertain parameters of at least part of the patient's vascular system may be obtained for a patient. The sensitivity of the patient's blood flow characteristic to one or more of the uncertain parameters may be calculated by executing the algorithm on the blood flow characteristic of at least part of the patient's vascular system, and one or more of the uncertain parameters. | 2017-02-09 |
20170039341 | EXTRACTING FACTS FROM UNSTRUCTURED DATA - Methods, systems, and apparatus, including computer programs encoded on computer storage media, to present a video. One of the methods includes obtaining one or more unstructured documents. The method includes obtaining, by a computer system, a data model, the data model identifying a type of fact that can be determined from the one or more unstructured documents. The method includes determining, by the computer system, a channel to extract facts from the document based on the type of fact. The method includes distributing, by the computer system, the one or more unstructured documents to the channel. The method includes extracting, by the channel, facts from the one or more unstructured documents. The method also includes storing the facts in a data model. | 2017-02-09 |
20170039342 | AUTOMATIC PRESCRIPTION MEDICATION SCHEDULING - An automatic prescription medication scheduling system and process provide for generating a medication schedule for a patient, the medication schedule having at least two time slots, each time slot allocated to a different medication event, a medication event comprising a medication and a dosage; determining whether two medication events in the medication conflict; and reallocating a medication event from one time slot to a second time slot to reduce the total number of time slots in the medication schedule that have an allocated medication event. | 2017-02-09 |
20170039343 | METHODS AND KITS FOR DETERMINING A PERSONALIZED TREATMENT REGIMEN FOR A SUBJECT SUFFERING FROM A PATHOLOGIC DISORDER - The invention relates to methods and kits for determining and optimizing a personalized treatment regimen for a subject suffering from a pathologic disorder based on calculating the value of M, that indicates the ability of said subject to eliminate said disorder. The invention specifically relates to optimization of interferon treatment of viral disorders. | 2017-02-09 |
20170039344 | RECOMMENDATIONS FOR HEALTH BENEFIT RESOURCES - A computing system comprises an electronic personal assistant application program executed on a client computing device. Included are a health insurance retriever configured to retrieve health insurance information of a user, a history combiner configured to combined aggregated histories of a plurality of users into an anonymized combined time and location-based data, and a health recommender configured to identify at least one health condition of the user, determine a health recommendation at least on the identified health condition, and output the health recommendation including the recommended health care service, providers, and an indication of insurance coverage of the recommended service at each of the providers. | 2017-02-09 |
20170039345 | Predictive test for melanoma patient benefit from antibody drug blocking ligand activation of the T-cell programmed cell death 1 (PD-1) checkpoint protein and classifier development methods - A method is disclosed of predicting cancer patient response to immune checkpoint inhibitors, e.g., an antibody drug blocking ligand activation of programmed cell death 1 (PD-1) or CTLA4. The method includes obtaining mass spectrometry data from a blood-based sample of the patient, obtaining integrated intensity values in the mass spectrometry data of a multitude of pre-determined mass-spectral features; and operating on the mass spectral data with a programmed computer implementing a classifier. The classifier compares the integrated intensity values with feature values of a training set of class-labeled mass spectral data obtained from a multitude of melanoma patients with a classification algorithm and generates a class label for the sample. A class label “early” or the equivalent predicts the patient is likely to obtain relatively less benefit from the antibody drug and the class label “late” or the equivalent indicates the patient is likely to obtain relatively greater benefit from the antibody drug. | 2017-02-09 |
20170039346 | INDIVIDUALLY CUSTOMIZED ALLERGY CREAM FOR INDIVIDUAL PATIENT PROFILE - A method for delivering an immunomodulator to a patient includes providing a bottle of concentrated immunomodulator extract; progressively diluting the antigen extract in sterile bottles; selecting a prescribed amount from a desired one of the dilution bottles; providing a viscous encapsulation material that is able to introduce antigens contained therein through the skin of a patient; introducing one or more doses of the selected prescribed amount of diluted immunomodulator into the viscous encapsulation material; disposing a prescribed amount of viscous encapsulation material containing the introduced diluted immunomodulator therein within a container that is able to dispense such viscous encapsulation material containing the introduced diluted immunomodulator; dispensing from the container the amount of viscous encapsulation material containing the diluted immunomodulator in an amount equal to a single dose; and applying the dispensed viscous encapsulation material containing the introduced diluted immunomodulator to the skin by the patient or a medical professional. | 2017-02-09 |
20170039347 | METHOD AND SYSTEM FOR MICROBIOME-DERIVED DIAGNOSTICS AND THERAPEUTICS FOR NEUROLOGICAL HEALTH ISSUES - A method for at least one of characterizing, diagnosing and treating a neurological health issue in at least a subject, the method comprising: receiving an aggregate set of biological samples from a population of subjects; generating at least one of a microbiome composition dataset and a microbiome functional diversity dataset for the population of subjects; generating a characterization of the neurological health issue based upon features extracted from at least one of the microbiome composition dataset and the microbiome functional diversity dataset; based upon the characterization, generating a therapy model configured to correct the neurological health issue; and at an output device associated with the subject, promoting a therapy to the subject based upon the characterization and the therapy model. | 2017-02-09 |
20170039348 | AUTOMATED REPORT GENERATION - Provided herein are various systems and methods for improved report interaction and generation. A computing system receives selection of an exam for display on a display device, either from a user or as automatically determined by a computing device. The computing system may then determine an exam characteristic associated with the exam, such as an exam type. A data structure storing associations between exam characteristics and respective report packages, each of the report packages comprising a parent report and one or more child reports, may be accessed in order to select a report package associated with the determined exam characteristic. The child reports of the selected report package, which are configured to receive input from a user of the computing system that is usable in automatically generating content of the parent report of the selected report package, may be selectively displayed on the one or more displays. | 2017-02-09 |
20170039349 | REPORT LINKS - A medical and/or clinical report includes one or more links to various external (and/or internal) data sources and/or systems that include information relevant to the medical report. In an embodiment, a medical report may be in a PDF format and include links to images associated with the exam, information regarding the patient, a scheduling application useful to schedule additional procedures for the patient, and/or any other information associated with the patient or exam. The medical report, including various links, may be generated based on information received from external medical data systems. For example, a medical report from an external system may be updated to include various links to systems and sources of data related to the medical report, as described herein. | 2017-02-09 |
20170039350 | SYSTEM AND METHOD OF PROVIDING DYNAMIC AND CUSTOMIZABLE MEDICAL EXAMINATION FORMS - A system and method of providing dynamic and customizable medical forms is disclosed. In certain specific embodiments, these dynamic and customizable medical forms may be automatically presented to users based on a predefined series of rules which allow multiple users having different roles in the clinical process to collaborate and contribute to a medical examination report, while at the same time maintaining an independent record of what was contributed and by whom it was contributed. | 2017-02-09 |
20170039351 | In-Vehicle Content Delivery System Operable in Autonomous Mode and Non-Autonomous Mode - Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the content may be distributed from a data center to various nodes of the content-delivery network, each node acting as a semi-independent content-delivery system. Each content-delivery system is capable of delivering received content to end-users and implementing a key-management scheme to facilitate secure content-delivery and usage tracking, even when the content-delivery system is disconnected from the data center. In other words, the disclosed systems and methods facilitate the operation of nodes which may operate in “autonomous mode” when disconnected from a larger content-delivery network, thus maintaining content-delivery capabilities despite having little if any connectivity to external networks. | 2017-02-09 |
20170039352 | ROOT OF TRUST - First transistor logic is arranged by a first logic provider in circuit form and provides a minimum of functionality of the semiconductor device employed to bring up the semiconductor device, wherein the minimum of functionality is encrypted using a first encryption key. Second transistor logic is arranged by a second logic provider, different than the first logic provider, in circuit form to include security keys capable to perform cryptographic capabilities using a second encryption key. The second transistor logic further includes functionality that completes the semiconductor device as a chip device and is ready to process secure communication signals. | 2017-02-09 |
20170039353 | LEVERAGING A UNIFICATION OF CONTENT HOSTING AND SOCIAL NETWORKING - Content hosting architectures and/or social networking architectures can be improved by, e.g., unifying the two architectures to some extent. Services or features from both can be leveraged to provide an ecosystem that can be superior or preferred by users or consumers. For example, premium content that typically must be purchased via a transaction with the content hosting service can be accessed by certain users that have not purchased the premium content provided those users have a social relationship with one that has purchased the premium content, which can be determined based on data managed by the social networking service. | 2017-02-09 |
20170039354 | MOBILE TOKEN DRIVEN SOFTWARE LICENSING - A token contains licensing information for software stored on another computer. The token connects to the computer wirelessly, and transmits the licensing information, preferably automatically. While the token is connected to the computer, at least one factor in a multi-factor authentication scheme is satisfied for licensed use of the software. When the token disconnects from the computer either at will, or by exceeding the range of the wireless connection, the software on the computer becomes unlicensed and then can no longer execute. | 2017-02-09 |
20170039355 | USER-SPECIFIC APPLICATION ACTIVATION FOR REMOTE SESSIONS - Disclosed herein are systems, methods, and software to enhance licensing in multi-user computing environments. In an implementation, for each user of a plurality of users engaged with an application installed in a multi-user computing environment, a user-specific license state is maintained for the user with respect to the application. In addition, for each of the plurality of users engaged with the application installed in the multi-user computing environment, the application is delivered in accordance with the user-specific license state for the user. | 2017-02-09 |
20170039356 | VEHICLE AUTHORIZATION BASED ON NEAR FIELD COMMUNICATION - In an approach for automated vehicle authorization. A processor receives a first set of credentials from at least a first near field communication device, wherein the first set of credentials indicates information about a person. A processor receives a second set of credentials from at least a second near field communication device, wherein the second set of credentials indicates information about a vehicle. A processor compares the first set of credentials to the second set of credentials. A processor determines whether the person indicated by the first set of credentials has authority to operate the vehicle, based on, at least, the comparison of the first set of credentials to the second set of credentials. | 2017-02-09 |
20170039357 | MULTI-MODAL FUSION METHOD FOR USER AUTHENTICATION AND USER AUTHENTICATION METHOD - A user authentication method includes receiving a first input image including information on a first modality; receiving a second input image including information on a second modality; determining at least one first score by processing the first input image based on at least one first classifier, the at least one first classifier being based on the first modality; determining at least one second score by processing the second input image based on at least one second classifier, the at least one second classifier being based on the second modality; and authenticating a user based on the at least one first score, the at least one second score, a first fusion parameter of the at least one first classifier, and a second fusion parameter of the at least one second classifier. | 2017-02-09 |
20170039358 | TRANSACTION PREVENTION USING FITNESS DATA - The disclosure relates to methods, devices, and systems for preventing a wearable fitness monitor from allowing a transaction, the prevention being based on data obtained using the wearable fitness monitor. Data obtained from motion sensors of the wearable fitness monitor may be used to determine if a transaction should be prevented. | 2017-02-09 |
20170039359 | ELECTRONIC DEVICE CONTROLLING AND USER REGISTRATION METHOD - An electronic device controlling method and a user registration method are provided. In the electronic device controlling method, when a target device receives a first and a second control commands which are identical, but performed by different users simultaneously or separately, the target device performs a first predetermined operation based on an identity of the user performing the first control command, and performs a second predetermined operation based on an identity of the user performing the second control command. In the user registration method, a user registered identity model corresponding to a user to be registered is established according to identity information of the user, and is mapped to a user profile comprising a relationship between the control commands and the predetermined operations. By acquiring the registered information, the target device is able to perform the user dependent operations. | 2017-02-09 |
20170039360 | ELECTRONIC DEVICE AND PASSWORD ENTERING METHOD - A password entering method executed by at least one processor of an electronic device is provided. The electronic device includes a touch device, a storage device and a vibration device. The method includes detecting at least one stable touch on the touch device. For each of the detected stable touch, the number of vibrations produced by the vibration device according to a preset vibration frequency is counted. And the electronic device is controlled to perform a preset function when the at least one number of vibrations matches with a preset password code stored in the storage device. | 2017-02-09 |
20170039361 | Method And Device For Fuzzily Inputting Password - A method for fuzzily inputting password includes the steps of: displaying a plurality of graph-text regions on a user interface, an information unit consisted of a plurality of information elements being mapped onto a corresponding graph-text region; obtaining a direction information detected by a gravity sensor, upon change of the direction information, a displaying angle of each graph-text region on the user interface being changed to show the plurality of graph-text layers which are arranged at equal pitch, each graph-text layer displaying an information element of an information unit associated with the same graph-text region; and selecting a specific information unit mapped with the graph-text region to verify whether a specific password character is identical to an information element of the unit. Also disclosed is a device for realizing the same method. | 2017-02-09 |
20170039362 | OCR-BASED SINGLE SIGN-ON - A method and technique for OCR-based single sign-on in a computing environment includes automatically causing a display of a dialog screen of an application in response to launching a login interface of the application. An image of the dialog screen is automatically captured, and version information about the application is derived from the image of the dialog screen. An image of the login interface is automatically captured, and the launched login interface is automatically verified as corresponding to a version of the application based on the version information derived from the image of the dialog screen. | 2017-02-09 |
20170039363 | 3D Printing Design, Printing, and Licensing Methods, Apparatuses,and Systems - A 3D printing design method is provided, which can implement determining by a 3D printing system on safety of a target print file. The method includes determining a target print file; determining whether the target print file meets a first safety criterion; and if the target print file meets the first safety criterion, sending the target print file to a 3D printing and manufacturing system, so that the 3D printing and manufacturing system performs printing according to the target print file. Related 3D printing and manufacturing and licensing methods and related apparatuses and systems are further provided. | 2017-02-09 |
20170039364 | SYSTEM AND METHOD TO CAUSE AN OBFUSCATED NON-FUNCTIONAL DEVICE TO TRANSITION TO A STARTING FUNCTIONAL STATE USING A SPECIFIED NUMBER OF CYCLES - A system and method to cause an obfuscated non-functional device to transition to a starting functional state using a specified number of cycles are disclosed. A particular embodiment includes: an electronic system comprising: a protected electronic device; and an embedded obfuscation unit coupled with the protected electronic device, the embedded obfuscation unit including an obfuscation state machine, the embedded obfuscation unit further including control logic to: obtain a randomized seed value; extract a first number of bits from the randomized seed value, the first number of bits representing an initial obfuscation state; extract a second number of bits from the randomized seed value, the second number of bits representing a starting functional reset state; determine a number of traversal cycles needed to traverse through states of the obfuscation state machine from the initial obfuscation state to the starting functional reset state; and initiate a state traversal operation to traverse through states of the obfuscation state machine from the initial obfuscation state to the starting functional reset state in the determined number of traversal cycles. | 2017-02-09 |
20170039365 | Non-Repudiation of Broadcast Messaging - A method performed by a computing system includes receiving from a publishing entity a message and a first piece of evidence that the message was sent by the publishing entity, time-stamping the first piece of evidence, storing the time-stamped first piece of evidence, sending the message to a first subscribing entity, receiving from the first subscribing entity a second piece of evidence that the message was received by the first subscribing entity, time-stamping the second piece of evidence, and storing the time-stamped second piece of evidence. | 2017-02-09 |
20170039366 | User-Mode Component Injection and Atomic Hooking - Techniques are described herein for loading a user-mode component associated with a kernel-mode component based on an asynchronous procedure call (APC) built by the kernel-mode component. The APC is provided to the main thread of a user-mode process while that user-mode process loads, causing the user-mode process to load the user-mode component. The APC also causes allocation of memory at a location adjacent to that of the user-mode process and stores instructions at the allocated memory. The user-mode component then atomically hooks function(s) of the user-mode process, including modifying a single instruction or set of instructions of the function(s) to jump to the allocated memory. When that modified instruction is executed and jumps to the allocated memory, the instructions at the allocated memory request loading of the user-mode component, which receives data from the hooked function. The user-mode component then provides that data to the kernel-mode component. | 2017-02-09 |
20170039367 | User-Mode Component Injection Techniques - Techniques are described herein for loading a user-mode component of a security agent based on an asynchronous procedure call (APC) built by a kernel-mode component of the security agent. The APC is executed while a process loads, causing the process to load the user-mode component. The user-mode component then identifies slack space of the process, stores instructions in the slack space, and hooks function(s) of the process, including modifying instruction(s) of the function(s) to call the instructions stored in the slack space. When those modified instruction(s) call the stored instructions, the stored instructions invoke the user-mode component, which receives data from the hooked function(s). Also, the security agent may bypass a control-flow protection mechanism of the operating system by setting a pointer of the control-flow protection mechanism to point to an alternate verification function. | 2017-02-09 |
20170039368 | TRUSTED EXECUTION OF AN EXECUTABLE OBJECT ON A LOCAL DEVICE - In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user; and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine if the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device. | 2017-02-09 |
20170039369 | CONFIGURING A SANDBOX ENVIRONMENT FOR MALWARE TESTING - A device may receive a file to be analyzed in a sandbox environment, and may determine configuration information for configuring the sandbox environment. The configuration information may be determined based on at least one of: file information associated with the file to be analyzed, or client device information associated with a client device for which the file is intended. The device may configure the sandbox environment using the configuration information. The configuration information may identify a system configuration for the sandbox environment. The device may analyze the file in the sandbox environment based on configuring the sandbox environment using the configuration information. | 2017-02-09 |
20170039370 | METHOD AND SYSTEM FOR USING PRINCIPAL COMPONENTS ANALYSIS (PCA) TO DISPLAY TRENDS IN AIRCRAFT CYBER EVENTS IN REAL TIME - A system, method, and computer readable media for using principal components analysis (PCA) to graphically display cyber event information about an aircraft or fleet of aircraft. A ground-based security module collects historical cyber log data about the aircraft and performs PCA on the historical data to derive two principal components and their corresponding loading vectors. The loading vectors are transmitted to an air-based security module on the aircraft. The air-based security module collects real time cyber log data, computes numerical scores associated with the loading vectors on board the aircraft while the aircraft is in flight, and transmits the numerical scores to the ground-based module. The ground-based module graphically displays a comparison of the numerical scores to the corresponding loading vectors for the historical log data on a biplot to reveal trends in the cyber health of the aircraft. | 2017-02-09 |
20170039371 | Computer Security Systems and Methods Using Asynchronous Introspection Exceptions - Described systems and methods enable an efficient analysis of security-relevant events, especially in hardware virtualization platforms. In some embodiments, a notification handler detects the occurrence of an event within a virtual machine, and communicates the respective event to security software. The security software then attempts to match the respective event to a collection of behavioral and exception signatures. An exception comprises a set of conditions which, when satisfied by an tuple, indicates that the respective entity is not malicious. In some embodiments, a part of exception matching is performed synchronously (i.e., while execution of the entity that triggered the respective event is suspended), while another part of exception matching is performed asynchronously (i.e., after the triggering entity is allowed to resume execution). | 2017-02-09 |
20170039372 | DEVICES, SYSTEMS AND METHODS FOR UPGRADING FIRMWARE IN INTELLIGENT ELECTRONIC DEVICES - The present disclosure is directed to devices, systems and methods for upgrading firmware in intelligent electronic devices (IEDs). The present disclosure provides for checking a remote server for updates for one or more firmware packages installed on an IED and determines if an update is available for the one or more firmware packages installed on the IED. If an update for one or more packages is available, the update is downloaded and installed on the IED. The update of the package may be automatic or initiated by a user. | 2017-02-09 |
20170039373 | BOOTSTRAPPING WITHOUT TRANSFERRING PRIVATE KEY - A machine implemented method of communication between server and remote device, the method comprising: determining an availability and address of the remote device on a network for communication with the server; obtaining a public key attributed to the remote device; signing the public key attributed to the remote device with a private key of the server and so generating a digitally signed certificate to verify the ownership of the public key as the remote device; and transmitting the digitally signed certificate to the remote device. | 2017-02-09 |
20170039374 | Randomization and Informed Search for Cyber Attack Protection - A method for protecting a software system against cyber attacks comprising the following steps: subdividing the software system into components, wherein each component maps a set of input vectors to a non-deterministic set of stochastic output vectors; saving the components in a database; testing the software system by associating each component in the database with at least two mutually random input/output (I/O) test vector pairs that serve to map a random input vector to correct a non deterministic output vector; storing I/O test vectors with their respective component, wherein components in satisfaction of their I/O test vectors are valid by definition; and expunging components having invalid output vectors. | 2017-02-09 |
20170039375 | SYSTEM, METHOD AND APPARATUS FOR SIMULTANEOUS DEFINITION AND ENFORCEMENT OF ACCESS-CONTROL AND INTEGRITY POLICIES - Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions. | 2017-02-09 |
20170039376 | SYSTEMS AND METHODS FOR PROVIDING SECURE DATA - Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with policies/rules that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data. | 2017-02-09 |
20170039377 | SECURE COMPARISON OF INFORMATION - The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in particular an asymmetric method of secure computation that relies on the private-key/public key paradigm with homomorphic encryption. The methods and programmed computing apparatuses herein harness mathematical concepts and apply them to services or tasks that are commercially useful and that have not hitherto been possible. Applications of the methods and apparatus herein are far-ranging and include, but are not limited to: purchase-sale transactions such as real estate or automobiles, where some aspect of price negotiation is expected; stock markets; legal settlements; salary negotiation; auctions, and other types of complex financial transactions. | 2017-02-09 |
20170039378 | ENFORCEMENT MITIGATIONS FOR A PROTECTED FILE - Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data. | 2017-02-09 |
20170039379 | PLATFORM FOR ADOPTING SETTINGS TO SECURE A PROTECTED FILE - Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data. | 2017-02-09 |
20170039380 | UNIFIED SYSTEM FOR AUTHENTICATION AND AUTHORIZATION - A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. In view of the request, it is determined whether the client application is authorized to access the trusted application in view of an authorization policy. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication. | 2017-02-09 |
20170039381 | HARDWARE ENFORCED CONTENT PROTECTION FOR GRAPHICS PROCESSING UNITS - This disclosure proposes techniques for graphics processing. In one example, a graphics processing unit (GPU) is configured to access a memory according to one of an unsecure mode and a secure mode. The GPU may include a memory access controller configured to direct memory transactions from at least one hardware unit of the GPU to an unsecure memory unit or a secure memory unit based on the unsecure mode or secure mode and a resource descriptor associated with a memory resource. | 2017-02-09 |
20170039382 | Filesystem Access for Web Applications and Native Code Modules - One embodiment provides a system that facilitates the execution of a web application. During operation, the system allocates a storage space on one or more storage devices for use by the web application. Next, the system creates, for the web application, a private filesystem comprising a private root directory within the storage space. Finally, the system enables access to the private filesystem for the web application through the private root directory in a manner that does not allow access to a host filesystem associated with the one or more storage devices from the web application. | 2017-02-09 |
20170039383 | METHOD AND APPARATUS FOR ACCESS CONTROL OF APPLICATION PROGRAM FOR SECURE STORAGE AREA - The present invention relates to a method for, when using security software which allows documents to be utilized in PCs and terminals in companies or institutions but not to be leaked therefrom, enabling members to view, generate, edit and delete work files that are generated in the course of business in only secure areas and to freely view, generate and edit non-business personal documents with the same PCs and the same editing software in non-secure areas. More specifically, the present invention relates to a method for, when a program enabling access to a certain secure storage space is set to be a security program, allowing the program to be driven only in the secure storage space by pre-copying a temporary work file (cache file), a folder path, a license file, etc. required to drive the program, to a secure storage space; switching so as to recognize the space as a secure area to which the original path that the program uses has been copied; and allowing the program to view, correct, delete and edit documents in only secure storage spaces. | 2017-02-09 |
20170039384 | SYSTEM AND METHOD FOR SECURE RECIPROCAL EXCHANGE OF DATA - A system for transmission of data from a first device operated by a first user includes a wireless device and a database. The wireless device is used by a second user and includes a memory for storage of data. The database is in network communication with the first device and the wireless device. The database receives and stores data from the first device. The database can synchronize a portion of the data from the first device with the memory of the wireless device on a periodic basis that is determined by the second user. The wireless device can include a mobile phone. Data from the first device can include a current mode of access of the first user. The database can synchronize a portion of the data from the first device with the memory of the wireless device automatically according to a predetermined time determined by the second user. Further, the database can synchronize a portion of the data from the first device with the memory of the wireless device whenever the data received by the database from the first device changes. In certain embodiments, the portion of the data from the first device that is synchronized between the database and the memory of the wireless device can be determined by the second user using the second device. | 2017-02-09 |
20170039385 | RECORD-LEVEL SECURITY ACCESS IN WORKFLOWS - In a first method, a developer mode is determined when a workflow template patch is received, and execution of new workflow instances is either blocked or permitted, or continued execution of workflow instances is forbidden. In a second method, parallelization of workflow execution is provided in an in-memory database management system. In a third method, after received user privilege information, database records associated with a workflow are determined and stored for use at workflow instance runtime. In a fourth method, artifacts used by a workflow are identified using a workflow template. When a command to execute a workflow instance is received, information is stored for generating instances of artifacts for use during execution of the workflow instance. In a fifth method, for a workflow template to be inactivated, the associated workflow template is suspended after currently executing workflow instances have completed and job executors have acknowledged a suspending state. | 2017-02-09 |
20170039386 | SYSTEM FOR PROCESSING DATA - The present disclosure relates to a computer system for querying a database residing on a server computer of the computer system, said database storing data records, the database further comprising a relation, wherein the relation comprises data items, wherein the data items are encrypted with a first encryption method in the relation, wherein the data items form a partially ordered set in the relation, the partial order being formed with respect to the data items in non-encrypted form, wherein a referential connection exists assigning each encrypted data item in the relation to a respective data record of the data records, wherein the encrypted data items are annotated with data elements of a linear order in the database, the linear order corresponding the order in which the encrypted data items are stored in the relation with respect to the partial ordered set, the computer system further comprising a client computer, the client computer being configured for sending to the server computer a request for data records whose associated data items lie within a search interval, the request indicating an encrypted data item forming a first and a second interval boundary of the search interval, respectively; for each data item forming the first and second boundaries the server computer is configured for determining if a cache entry is associated with the data item forming the interval boundary, wherein in case a cache entry is not associated with the data item forming the interval boundary, the client computer is configured for traversing the partially ordered set by the client computer for determining a respective data item of the partially ordered set forming the interval boundary. | 2017-02-09 |
20170039387 | METHOD AND SYSTEM FOR DIFFERENTIATED PRIVACY PROTECTION - A computer-implemented method, computerized apparatus and computer program for receiving and processing user requests, the method comprising: receiving a request for content, the request associated with user credentials; determining a policy associated with the user, in accordance with the user credentials; receiving the content and metadata associated with the content; obtaining a part of the content to be masked; creating an overlay of the content in accordance with the policy and with the metadata, the overlay masking a part of the content; and associating the overlay with the content, such that the part of the content is not available to the user. | 2017-02-09 |
20170039388 | MULTI-PARTY AUTHENTICATION AND AUTHORIZATION - Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data stored by a managed device by way of an authorization by one or more other users. This access can be granted even if the managed device is in an off-line mode or if a management server cannot be reached. In another example, access to secured data can depend upon authorization by a minimum quantity of other users. The authorization can involve an explicit approval or disapproval. Alternatively, the authorization can correspond to the presence of the minimum quantity of other users within a threshold proximity of the user who desires access. | 2017-02-09 |
20170039389 | PRIVACY ENFORCEMENT VIA LOCALIZED PERSONALIZATION - This disclosure is directed to privacy enforcement via localized personalization. An example device may comprise at least a user interface to present content. A message may be received into a trusted execution environment (TEE) situated within the device or remotely, the message including at least metadata and content. The TEE may determine relevance of the content to a user based on the metadata and user data. Based on the relevance, the TEE may cause the content to be presented to the user via the user interface. In one embodiment, the TEE may be able to personalize the content based on the user data prior to presentation. If the content includes an offer, the TEE may also be able to present counteroffers to the user based on user interaction with the content. The TEE may also be able to cause feedback data to be transmitted to at least the content provider. | 2017-02-09 |