13th week of 2016 patent applcation highlights part 39 |
Patent application number | Title | Published |
20160092592 | PROVIDING SEPARATE VIEWS FOR ITEMS - Disclosed are various embodiments for providing separate views for items. A network page providing a summary view of at least a portion of a pool of items is encoded in a computing resource for rendering by a client computing device. A window superimposed over at least a portion of the summary view is rendered by the client computing device. The summary view is deemphasized relative to the window that is superimposed. The window provides a separate view for examination of one item from the pool of items, and the window facilitates a serial examination of the pool of items. | 2016-03-31 |
20160092593 | PAGE-BASED METADATA SYSTEM FOR DISTRIBUTED FILESYSTEM - Methods and systems are described for storing metadata in a network of distributed remote storage devices. An example computer implemented method includes identifying a plurality of metadata inodes, grouping the plurality of metadata inodes into one or more metadata pages, mapping the plurality of metadata inodes and the plurality of metadata pages, and storing the mapping as a manifest page, and storing data to and retrieving data from the distributed remote storage devices using the plurality of metadata inodes. | 2016-03-31 |
20160092594 | VIRTUALIZING SCHEMA RELATIONS OVER A SINGLE DATABASE RELATION - According to one embodiment of the present invention, a system maps one or more virtual relations to a table of a relational database management system. The system generates a structured query language (SQL) statement for the table from a SQL statement for a virtual relation by applying the mapping to one or more elements of the SQL statement for the virtual relation. Embodiments of the present invention further include a method and computer program product for mapping virtual relations to a table in substantially the same manners described above. | 2016-03-31 |
20160092595 | Systems And Methods For Processing Graphs - Systems and methods are provided for organizing and processing information in a graph having a number of nodes interconnected by a number of edges. An array E lists neighboring nodes for nodes of the graph that have at least one neighboring node in a determined order of the nodes. Positions in array E of a last neighboring node listed in array E for respective nodes are listed as corresponding entries in an array V based on the determined order of the nodes. In various aspects, array E and array V are used to determine information for the graph, including degrees or neighboring nodes of one or more given nodes of the graph. The system and methods disclosed herein are applicable for determining relative ranks for the nodes of the graph. | 2016-03-31 |
20160092596 | DATABASE MIGRATION METHOD AND APPARATUS - A method for migrating data from a relational DB to a graph DB comprises, collecting constraints of referencing tables having a column set as a foreign key, among tables of a relational DB which is a migration source DB, determining a relation type of each of the referencing tables, based on constraints of the referencing table, determining a node generation target table and a relation frame for each of the referencing tables, based on the relation type of the referencing table, and converting data in each row of the node generation target table into a node of a graph DB which is a migration target DB and generating a relation of the graph DB, which connects the generated nodes, according to the relation frame. | 2016-03-31 |
20160092597 | METHOD, CONTROLLER, PROGRAM AND DATA STORAGE SYSTEM FOR PERFORMING RECONCILIATION PROCESSING - A method for reconciling a target data node with a data graph encoding a plurality of interconnected data nodes. The method includes filtering an initial candidate set of data nodes from among the plurality of interconnected data nodes by performing a partial comparison process of a member of the initial candidate set with the target data node. The partial comparison process comprises comparing using hash function and removing: a member from the initial candidate set; and any other members from the initial candidate set having a semantic similarity with the member above threshold. Repeating the performing and removing until each remaining members of the initial candidate set has had the partial comparison process completed. The method includes performing full comparison processing between the target data node and each remaining member of the initial candidate set following the filtering, the full comparison processing using more hash functions. | 2016-03-31 |
20160092598 | METHOD OF IDENTIFYING TEMPORAL DEMAND OF QUERIES AND METADATA TO GIVE BETTER AUTOCOMPLETE QUERIES AND IMPROVED SEARCH RESULTS - Embodiments describe systems and methods for identifying temporal demand for queries and using metadata to modify autocomplete results. In one embodiment, a record of historical queries is stored by a system and analyzed to identify periodic or repeated events where demand for autocomplete results associated with one or more categories deviates from normal demand. A temporal model based on this record is used to adjust autocomplete search results during subsequent time periods associated with the repeated events. | 2016-03-31 |
20160092599 | AUTONOMIC IDENTIFICATION AND HANDLING OF AD-HOC QUERIES TO LIMIT PERFORMANCE IMPACTS - A method for processing a database query includes receiving a database query to be executed according to a first processing profile and determining whether the database query is likely to be an ad hoc query. The determining of whether the database query is likely to be an ad hoc query is based on a factor. The factor can include a query originator factor, a job type factor, a run history factor, or a query quality factor. A second processing profile is generated before executing the database query in response to determining that the database query is likely to be an ad hoc query. The second processing profile is configured to limit performance impacts, such as by providing a lower execution priority, prohibiting parallel database operations, limiting memory allocation, or delaying or blocking the query. | 2016-03-31 |
20160092600 | Contextual Management of Client Devices - Centralized contextual awareness is used to resolve conflicts. When two or more client devices interact, a current context of each client device is evaluated for rule-based decisions. Conflicts in rules may be arbitrated based on policies and goals to generate a resolution. | 2016-03-31 |
20160092601 | Event Limited Field Picker - An event limited field picker for a search user interface is described. In one or more implementations, a service may operate to collect and store data as events each of which includes a portion of the data correlated with a point in time. Clients may use a search user interface perform searches by input of search criteria. Responsive to receiving search criteria, the service may operate to apply a late binding schema to extract events that match the search criteria and provide search results for display via the search user interface. The search user interface exposes an event limited field picker operable to make selections of fields with respect to individual events in a view of the search results. In response to receiving an indication of a fields selected via the picker, visibility of selected fields may be updated to control which field and values are included in different views. | 2016-03-31 |
20160092602 | Customizable Data Services - Embodiments are directed to methods and systems for defining customizable data services through dynamic configuration of a dashboard using data feeds, analytics, and visual artifacts. A customizable dashboard is built using a basic framework, design time configuration, instantiation time binding, and runtime ad hoc data input. The customizable data service binds business logic in a data query service with a visual tile template that provides specific parameters for visualizations and/or queries. The visual tile templates are pluggable visual on multiple dashboard pages. | 2016-03-31 |
20160092603 | AUTOMATED SUPPLEMENTATION OF DATA MODEL - Mechanisms to help a computing system respond to a request for information within a data model. After determining that there is insufficient information within the data model to respond to the request, the computing system identifies one or more additional data sources that are external to the data model and that contain information suitable to respond to the request. The computing system then automatically supplements the data model with at least one of such additional data sources. The computing system then responds to the request using the supplemented data model. In some embodiments, the supplementation may be performed in advance of the request by analyzing the characteristics of the data model and/or by anticipating possible future requests. Thus, a data model may grow automatically in response to particular usage of that data model to satisfy requests. | 2016-03-31 |
20160092604 | METHOD FOR METAMODELING UNIFICATION - The present invention relates to a method for metamodeling unification, in particular to a method for metamodeling unification to guarantee interoperability between an UML model of IEC 61850 and an UML model of IEC 61970. | 2016-03-31 |
20160092605 | SYSTEM AND METHOD FOR GENERATING PLANAR SECTION 3D SHAPE REPRESENTATIONS - A system and method for creating, configuring, and visualizing 3D shape representations is provided. The system enables a user to create, interact with and visualize planar section representations. In further aspects, methods are provided for enabling modification suggestions for structural and/or fabrication improvement. | 2016-03-31 |
20160092606 | MULTI-OBJECTIVE DESIGN OPTIMIZATION USING ADAPTIVE CLASSIFICATION - Definition of a design space and an objective space for conducting multi-objective design optimization of a product is received in a computer system having a design optimization application module installed thereon. Design space is defined by design variables while objective space is defined by design objectives. First set of designs in the design space is selected. Each of the first set is evaluated in the objective space for non-dominance. The design space is partitioned into first and second regions using a multi-dimensional space division scheme (e.g., SVM). The first region is part of the design space containing all of the non-dominated design alternatives while the second region contains remaining of the design space. Second set of designs is selected within the first region. Each of the second set and existing non-dominated design alternatives is evaluated for non-dominance. Multi-objective optimization repeats the partition and evaluation until an end condition is reached. | 2016-03-31 |
20160092607 | METHOD FOR ALLOY DESIGN COMBINING RESPONSE SURFACE METHOD AND ARTIFICIAL NEURAL NETWORK - There is provided a method for alloy design combining a response surface method and an artificial neural network that can significantly reduce the number of times, the time, and the cost for experiments by designing the minimum experiments using a response surface method, obtaining results through actual experiments, and modeling the obtained results using an artificial neural network. | 2016-03-31 |
20160092608 | MODELING DEVICE, THREE-DIMENSIONAL MODEL GENERATION DEVICE, MODELING METHOD, PROGRAM AND LAYOUT SIMULATOR - A modeling device obtains three-dimensional coordinates from a measurement device for taking three-dimensional measurements of the three-dimensional structure having faces to produce model information of the three-dimensional structure, and includes a face extractor, a vertex extractor and a model producer. The face extractor produces a plane equation describing a face based on coordinates of each measurement point of the face. The vertex extractor extracts a point simultaneously satisfying plane equations describing adjoining faces as a vertex shared among the faces. The model producer produces model information representing the three-dimensional structure based on plane equations and vertexes. The face extractor determines a plane equation by recalculation based on measurement points existing in a range of a prescribed distance from a plane candidate. | 2016-03-31 |
20160092609 | Optimizing Designs of Integrated Circuits - Methods and systems for optimizing and/or designing integrated circuits. In one embodiment, a method for dynamically routing a net from equivalent resources is described, comprising identifying a critical load, determining whether a driver driving the critical load drives other components, and whether the critical load requires an improvement in slack, replicating the driver, to create a replicated driver, when the critical load requires an improvement in slack, coupling the replicated driver to the load; and tagging the replicated driver. | 2016-03-31 |
20160092610 | DOMAIN DECOMPOSITION FOR TRANSPORT TRAJECTORIES IN ADVECTION DIFFUSION PROCESSES - Efficient prediction of trajectories of pollutants in a fluid is accomplished by automatic activation and deactivation of sub-domains within the mesh representing the body of fluid in question. Activation and deactivation are triggered by the transport characteristics of the pollutant, that is, the sub-domains are activated as the pollutant enters a sub-domain and deactivated as the pollutant exits a sub-domain. | 2016-03-31 |
20160092611 | METHOD FOR CONSTRUCTING REAL-TIME SOLAR IRRADIATION METERING NETWORK OF GIGAWATTS LEVEL PHOTOVOLTAIC POWER GENERATION BASE - A method for constructing real-time solar irradiation metering network of gigawatt-level photovoltaic power generation base comprises the following steps: Spatial and temporal distribution characteristics of irradiation quantity of the target area is analyzed based on the historical observation data of the irradiation quantity. The outline location of solar irradiation metering stations is determined by dividing the typical areas where the spatial and temporal distribution characteristics are consistent. The detailed location of solar irradiation metering stations is selected based on the center location distribution of photovoltaic power station clustering. A solar irradiation metering device is constructed on the detailed location of the solar irradiation metering station. | 2016-03-31 |
20160092612 | SYSTEMS AND METHODS FOR MODELING AN ABSORBENT ARTICLE - Included are embodiments of a method for modeling an absorbent article. Accordingly, some embodiments include assigning at least one material property of the absorbent article, assigning at least one initial condition and at least one boundary condition associated with a fluid to be virtually introduced to the absorbent article, and creating a three dimensional simulation of the absorbent article based on the at least one material property and the at least one initial condition. Some embodiments include dividing the three dimensional simulation of the absorbent article into a plurality of cells, simulating introduction of the fluid to a predetermined cell of the plurality of cells, and providing the simulation for display. | 2016-03-31 |
20160092613 | SYSTEMS AND METHODS FOR PERFORMING A REDUCED ORDER APPROXIMATION TO MODEL AN ABSORBENT ARTICLE - Included are embodiments for performing a reduced order approximation to model an absorbent article. Some embodiments include assigning at least one material property of the absorbent article, wherein the absorbent article includes a plurality of absorbent plies, assigning at least one initial condition and at least one boundary condition associated with a fluid to be virtually introduced to the absorbent article, performing a reduced order approximation to create a simulation of the absorbent article, based on the at least one material property and the at least one initial condition, and providing the simulation for display. | 2016-03-31 |
20160092614 | SYSTEMS AND METHODS FOR MODELING FLUID REMOVAL FROM AN ABSORBENT ARTICLE - Included are embodiments of a method for modeling removal of fluid from an absorbent article. Accordingly, some embodiments include assigning at least one material property of the absorbent article, assigning at least one initial condition and at least one boundary condition associated with a fluid to be virtually removed from the absorbent article, and creating a three dimensional simulation of the absorbent article based on the at least one material property, the at least one initial condition, and the at least one boundary condition. Some embodiments of the method may also include dividing the three dimensional simulation of the absorbent article into a plurality of cells, simulating removal of the fluid from a predetermined cell of the plurality of cells, and providing the simulation for display. | 2016-03-31 |
20160092615 | METHOD AND APPARATUS FOR DETERMINING WEATHER DATA CONFIDENCE - A method, apparatus and computer program product are provided for weather station data usage based on weather data confidence. In the context of a method, the method includes receiving historical weather data associated with a candidate weather station and plurality of weather stations, determining distances between a candidate weather station and respective ones of the plurality of weather stations, and generating a station to station location based model of weather attribute errors associated with the distances between the candidate weather station and the respective weather stations of the plurality of weather stations. | 2016-03-31 |
20160092616 | THERMAL SIMULATIONS USING CONVOLUTION AND ITERATIVE METHODS - Systems and methods for performing thermal simulations of a system are disclosed herein in. In one embodiment, a computer-implemented method for thermal simulation comprises determining a leakage power profile for a circuit in the system, adding the leakage power profile to a dynamic power profile of the circuit to obtain a combined power profile, and convolving the combined power profile with an impulse response to obtain a thermal response at a location on the system. | 2016-03-31 |
20160092617 | INTEGRATED CIRCUIT FOR ESTIMATING POWER OF AT LEAST ONE NODE USING TEMPERATURE AND A SYSTEM INCLUDING THE SAME - A power estimation circuit including: a power estimation manager circuit configured to receive power data and temperature data; and a storage circuit that includes a first region storing resistive-capacitive (RC) thermal modeling data, a second region storing the power data and a third region storing the temperature data, wherein the power estimation manager circuit is configured to estimate power consumption of a first node at a second time point, which occurs after a first time point, using the RC thermal modeling data, the power data and the temperature data. | 2016-03-31 |
20160092618 | METHOD FOR REJECTING TUNING DISTURBANCES TO IMPROVE LAMP FAILURE PREDICTION QUALITY IN THERMAL PROCESSES - Embodiments disclosed herein include methods for reducing or eliminating the impact of tuning disturbances during prediction of lamp failure. In one embodiment, the method comprises monitoring data of a lamp module for a process chamber using one or more physical sensors disposed at different locations within the lamp module, creating virtual sensors based on monitoring data of the lamp module, and providing a prediction model for the lamp module using the virtual sensors as inputs. | 2016-03-31 |
20160092619 | SYSTEM AND METHOD FOR SIMULATING REAL-TIME VISUALIZABLE ELECTRONIC WARFARE - Disclosed herein is a system and method for simulating real-time visualizable electronic warfare. The system includes a location calculation unit for calculating location coordinates of the aircraft and the missile for each frame according to a display frame rate, a display unit for visualizing, for each frame, movement of the aircraft and the missile depending on the location coordinates thereof, a precise tracking unit for, when a relative distance between the aircraft and the missile is less than a dangerous distance, dividing an interval between a current frame and a subsequent frame into sub-intervals based on the display frame rate, and sampling locations of the aircraft and the missile, and a proximity fuse control unit for processing the missile to explode when a relative distance between sampled locations of the aircraft and the missile, is less than or equal to a maximum explosible distance of a proximity fuse of the missile. | 2016-03-31 |
20160092620 | METHOD FOR POWER STATION SIMULATION FOR TEST AND TRAINING PURPOSES BY MEANS OF A PIECE OF DISTRIBUTED SIMULATION HARDWARE - A method for power station simulation, particularly for test purposes, by means of a piece of distributed simulation hardware that includes one or more emulation units, each having at least one emulation component, and also a simulation unit having a process model, where the method includes operating the emulation components cyclically with a common cycle time, using a respective cycle to form a time stamp, and automatically providing a data packet that is saved by each emulation component with the respective time stamp upon an appropriate command, wherein the data of the data packet are organized in accordance with a prescribed format and comprise a signal map. | 2016-03-31 |
20160092621 | ROAD NETWORK GENERATION - A method and an apparatus for generating a road network are disclosed. The method for generating a road network comprises: aggregating a plurality of grid cells partitioned in advance on a trajectory map based on trajectories in each grid cell of the plurality of grid cells to form level-1 regions; and generating a link of the road network by merging a level-1 region having two valid neighbors with its neighbor level-1 regions having two valid neighbors. | 2016-03-31 |
20160092622 | METHOD FOR MODELING MEDIUM AND LONG TERM WIND POWER OUTPUT MODEL OF MEDIUM AND LONG TERM OPTIMAL OPERATIONOF POWER SYSTEM - Disclosed is a method for modeling a medium and long term wind power output model optimally operating in a medium and long term in a power system. By calculating the wind power output of the power system during daily peak time period, daily valley time period, and daily shoulder load time period, and optimizing wind power output data during the daily shoulder load time period, the capacity substitute benefit of wind power generation is rationally taken into account, the operation reliability level of the power system is guaranteed, the bidirectional peak regulation characteristic of wind power output is considered, the peak regulation balance of the power system is guaranteed, the benefits of energy conservation and emission reduction of wind power resources are fully exerted, the highest utilization rate of the wind power generation capacity is guaranteed, the feature of low wind power schedulability is fully taken into account, the randomness and volatility of wind power output are correctly simulated, the practical situation of a simulation project optimally operating in a medium and long term in the power system is met, and the purpose of better calculating the randomness, the volatility, the regionalism and bidirectional peak regulation performance of wind power generation and a correlation between same and loads is achieved. | 2016-03-31 |
20160092623 | AUTOMATIC CREATION OF GRAPH TIME LAYER OF MODEL OF COMPUTER NETWORK OBJECTS AND RELATIONSHIPS - A method and system create a model of a set of relationships between a set of parent computer network objects and a set of corresponding child computer network objects, over a period of time, and output a user interface graphing the model in a single view to illustrate the set of relationships over the period of time. The parent computer network objects include virtual machines and the child computer network objects include hosts. The user interface includes a search option to provide for a search of problems with the child computer network objects over the period of time. | 2016-03-31 |
20160092624 | FILLER INSERTION IN CIRCUIT LAYOUT - A method for filler insertions in a circuit layout having a cell row of standard cells and gaps between the standard cells is disclosed. First, a set of filler classes, each filler class having a set of filler cells, is classified that are configured to fill the gaps depending on a design requirement. Then, a filler insertion pattern based on a required ratio is identified such that horizontal and vertical density of the set of filler classes in the circuit layout are as per the required ratio and the cell row of the circuit layout has at least one filler cell from each of the set of filler classes. | 2016-03-31 |
20160092625 | INTEGRATED CIRCUIT INDUCTORS - An integrated circuit inductor design is provided in which the path crossings are designed such that the voltage differences between the adjacent paths in the loops are (in total) minimised. | 2016-03-31 |
20160092626 | Methods and Apparatus for Repeater Count Reduction via Concurrent Gate Sizing and Repeater Insertion - Techniques for circuit concurrent gate sizing and repeater insertion considering the issue of size conflicts are described herein. Certain of these techniques can be directed to coupled gates within levels of a levelized circuit falling within a coupling window defined by a minimum slack gate and adjacent gates coupled to the minimum slack gate with an adjacency parameter less than a predefined adjacency limit. | 2016-03-31 |
20160092627 | METHOD FOR ORGANIZING, CONTROLLING, AND REPORTING ON DESIGN MISMATCH INFORMATION IN IC PHYSICAL DESIGN DATA - Systems and methods allow an IC design process to continue in the face of errors while those errors are being investigated and fixed in the actual design data. Potential mismatches can be categorized and a user can choose which action (if any) to take when a specific mismatch is discovered. A set of potential mismatches and their action settings can be aggregated into a higher level setting that the end user of the system can choose during different stages of a design project. A record of the mismatches that have been encountered, the design elements that are involved in each mismatch, and what action where taken to repair the mismatch is kept and maintained. | 2016-03-31 |
20160092628 | MODELING TOOL, METHOD AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY GENERATING A MAINTENANCE SIMULATION OF A VEHICLE - The present modeling tool and method dynamically generate a maintenance simulation of a vehicle. For doing so, a configuration interface receives a list of components of the vehicle, each particular component comprising parameters defining the particular component. The configuration interface further receives relationships between the components in the list, and determines a plurality of state, transitions, conditions, triggers and actions. A processing unit processes the data received and determined via the configuration interface to generate the maintenance simulation, the maintenance simulation comprising an aggregation of all the determined transitions between the components into a global state machine. The present method may further be performed by a computer program product. | 2016-03-31 |
20160092629 | AIRCRAFT DESIGNING METHOD, AIRCRAFT DESIGNING PROGRAM AND AIRCRAFT DESIGNING APPARATUS - An aircraft designing apparatus receives set values of design parameters related to the shape of an intake duct, creates analysis models for an aerodynamic characteristic analysis and a radar-cross-section analysis by using the values of the design parameters, calculates aerodynamic characteristics and radar-cross-section characteristics of the intake duct, and determines whether or not this analytical result satisfies a preset design condition. If it is determined that the analytical result does not satisfy the design condition, the values of the design parameters are updated. The updating of the design parameters, the analyses of the aerodynamic characteristics and the radar-cross-section characteristics, and the determining process are repeated until it is determined that the analytical result satisfies the design condition. | 2016-03-31 |
20160092630 | ACCURATE AND FAST MAPPING OF READS TO GENOME - Accurate and fast mapping of sequencing reads obtained from a targeted sequencing procedure can be provided. Once a target region is selected, alternate regions of the genome that are sufficiently similar to the target region can be identified. If a sequencing read is more similar to the target region than to an alternate region, then the read can be determined as aligning to the target region. The reads aligning to the target region can then be analyzed to determine whether a mutation exists in the target region. Accordingly, a sequencing read can be compared to the target region and the corresponding alternate regions, and not to the entire genome, thereby providing computational efficiency. | 2016-03-31 |
20160092631 | METHODS AND SYSTEMS FOR GENOME ANALYSIS - The present disclosure provides methods and systems for prioritizing phenotype-causing genomic variants. The methods include using variant prioritization analyses and in combination with biomedical ontologies using a sophisticated re-ranking methodology to re-rank these variants based on phenotype information. The methods can be useful in any genomics study and diagnostics; for example, rare and common disease gene discovery, tumor growth mutation detection, drug responder studies, metabolic studies, personalized medicine, agricultural analysis, and centennial analysis. | 2016-03-31 |
20160092632 | Cloud-Based Processing of Medical Imaging Data - A method for processing medical imaging data includes: (a) selecting a subset of medical imaging data to be processed, wherein the medical imaging data is stored in a cloud-based storage system; (b) choosing a processing algorithm to apply to the selected subset of medical imaging data, wherein the chosen processing algorithm is stored in the cloud-based storage system; (c) executing the chosen processing algorithm in the cloud-based storage system to generate a processing result; and (d) displaying the processing result to a client via a user interface. Systems for processing medical imaging data are described. | 2016-03-31 |
20160092633 | MEDICAL IMAGING STUDY RETRIEVAL SYSTEM - A programmed computer system receives an imaging study of the patient including metadata associated with the study. The metadata are analyzed to determine an anatomic region represented by the study. Additional imaging studies for the same patient are requested and the metadata associated with the additional studies are analyzed to determine relevant studies for the same or adjacent anatomic regions. Once the relevant prior studies have been identified, the computer requests the images associated with the identified prior imaging studies including the associated reports for review by a physician or other medical personnel. | 2016-03-31 |
20160092634 | METHOD AND MEDICAL IMAGING APPARATUS FOR OPTIMIZING AN EXAMINATION - A method for optimizing an examination implemented by a medical imaging apparatus includes selection of at least one information protocol, that includes at least one information parameter, display of at least one examination protocol, that includes at least one examination parameter from an examination protocol catalog of a server unit in accordance with the selected information protocol, selection of an examination protocol, and transfer of the selected examination protocol from the server to the processor of the medical imaging apparatus. | 2016-03-31 |
20160092635 | APPARATUS AND METHOD FOR SUPPORTING MEDICAL EXAMINATION BASED ON PERSONALIZED CHECKLIST - An apparatus and method for supporting a medical examination based on a personalized checklist. The apparatus includes a checklist generator to generate a personalized checklist based on a patient's medical information; and an item performance confirmer to determine whether each item included in the checklist is performed by analyzing a medical examination process of the patient. | 2016-03-31 |
20160092636 | Automated and Timely Alert Method of Notifying an adverse reaction at Point of Service - An automated and timely method of notifying the possibility of an adverse reaction at the point of service is implemented through a computing device and at least one data-transceiver as the computing device is communicatively coupled with the data-transceiver through a wireless network. The computing device is able to receive a user information and the possibility of an adverse reaction information from a desired transceiver of the at least one data-transceiver, where the adverse reaction information notifies any possible adverse reactions at the point of service. As a result, the service provider or seeker who operates the computing device is able to assess an appropriate service procedure for the desired transceiver in such a way that the appropriate service procedure avoids further medical complication for the person with the desired transceiver at the point of service. | 2016-03-31 |
20160092637 | MEDICAL ASSISTANCE DEVICE, MEDICAL ASSISTANCE SYSTEM, MEDICAL ASSISTANCE PROGRAM, AND MEDICAL ASSISTANCE METHOD - A medical assistance server generates a medical assistance screen, and distributes the medical assistance screen to a client terminal. The medical assistance screen includes a medical schedule display region where a medical schedule is displayed and a relevant information display region where relevant information is displayed. In the medical schedule display region, a medical schedule in which medical acts are arranged in time series is displayed, so that one of the displayed medical acts can be selected. In the relevant information display region, various kinds of information that are referred to when performing the medical act selected in the medical schedule display region are displayed. The user can perform a medical examination by referring to the schedule and the relevant information. | 2016-03-31 |
20160092638 | Management of Medication Preparation with Formulary Management - A pharmacy workflow management application with improved functionality related thereto. The improved functionality may include enhancements to a user interface for maintenance of a formulary at a local system executing the pharmacy workflow management application. The formulary management may include user interface elements provided at least partially based on a user profile. Additional enhancements to a user interface associated with a user profile may be provided for dose order record maintenance using the pharmacy workflow management application. Furthermore, enhancements to triggered scan events for updating a status of a dose order, situation board enhancements related to formatting of the situation board in relation to a user profile, encryption of communication by the pharmacy workflow application, and improved methods of installing updates to terminals of the pharmacy workflow management application are discussed. | 2016-03-31 |
20160092639 | CENTRAL USER MANAGEMENT IN A DISTRIBUTED HEALTHCARE INFORMATION MANAGEMENT SYSTEM - Centralized support user management in a distributed healthcare information management system. Support user management may include generation of permission data that may be distributed from a central server to one or more local systems. The local systems may execute a healthcare information management application such as, for example, a pharmacy workflow management application. In any regard, central support users at the central server may periodically require access to the local systems to perform, among other activities, technical support or troubleshooting in relation to the application executed at the local system. In turn, provision of permission data from the central server to the local system may allow support users to access the local system with specific permission identification's provided specific ones of the support users. In turn, specific user permissions may be established and support user tracking may be carried out at the local systems. | 2016-03-31 |
20160092640 | SYSTEM AND METHOD TO MONITOR INVENTORY OF STORAGE CONTAINER - A system and method for monitoring the inventory of a medical storage container that has a required inventory of medical articles. An enclosure is used to isolate, scan, and take an inventory of a tray or other container of medical articles each of which has an RFID tag. The enclosure having a size smaller than the size needed for a resonant frequency at the RFID frequency of operation of the tags. An injection device is used to create a robust electromagnetic field standing wave of constructive interference in the enclosure and a program compares the scanned present inventory of the tray to the required inventory database and indicates any differences. Expired and recalled articles are identified. | 2016-03-31 |
20160092641 | FACILITATING CLINICALLY INFORMED FINANCIAL DECISIONS THAT IMPROVE HEALTHCARE PERFORMANCE - Systems, methods and computer readable media that facilitate providing clinically informed financial decisions that improve healthcare performance are provided. In an aspect, a system includes a performance evaluation component configured to identify groups of patients having received healthcare service by a healthcare organization and associated with a common healthcare service parameter and uncommon healthcare service parameters. The system further includes a scoring component configured to determine performance scores for respective groups of patients, wherein the performance scores reflect clinical and financial performance of the healthcare organization in association with provision of the healthcare service to the respective groups of patients. A comparison component further compare the respective groups of patients based on the performances scores respectively associated therewith to facilitate identifying one or more of the uncommon healthcare service parameters that are responsible for variance between at least a subset of performance scores. | 2016-03-31 |
20160092642 | Determining Orphan Drug Eligibility for Reduced Pricing - Systems, methods, and computer-readable media are disclosed for determining whether an orphan drug is eligible for replenishment at a 340B price for the drug by evaluating orphan drug identification data, patient encounter data, and/or dispensing data with respect to one or more eligibility criteria to determine whether the orphan drug has been prescribed, dispensed, or otherwise used to treat the rare disease or condition for which it is designated or an alternate condition. | 2016-03-31 |
20160092643 | SYSTEM AND PROCESS FOR PROVIDING VERIFICATION AND VALIDATION OF AN INDIVIDUAL'S IDENTITY - A system and process for providing the recording of provided health care transactions to an individual and the verification and validation of both the recipient and provider's identities. More particularly, to a system and process for providing verification and validation of an individual's identity for use in the prevention of identity theft and fraud in the medical industry and the recording of all medical related treatments and record requests by authorized providers, among other features. The verification and validation, referred to as “Positive Identification (PI)” for an individual who is seeking or in need of medical diagnosis and/or treatment may include a collection of novel processes by which a person's PI may be obtained and captured in an electronic database each time a person's medical information is accessed or treatment is provided, and in full compliance with the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This may substantially prevent fraud of medical services. | 2016-03-31 |
20160092644 | DIAGNOSIS SUPPORT PROGRAM DEVELOPMENT PROMOTING APPARATUS, OPERATION METHOD AND OPERATION PROGRAM FOR DIAGNOSIS SUPPORT PROGRAM DEVELOPMENT PROMOTING APPARATUS, AND DIAGNOSIS SUPPORT PROGRAM DEVELOPMENT PROMOTING SYSTEM - Provided are a diagnosis support program development promoting apparatus, an operation method and operation program for the diagnosis support program development promoting apparatus, and a diagnosis support program development promoting system, capable of promoting development of a diagnosis support program while protecting privacy of a medical facility. An information collecting unit collects actual usage situation information of a diagnosis support program, and facility information of a medical facility. A concealment unit conceals facility specifying information for specifying the medical facility in the facility information of the medical facility. An information providing unit provides development reference information including the actual usage situation information and the facility information in which the facility specifying information is concealed, in response to an information providing request from a vendor or the like. | 2016-03-31 |
20160092645 | PATIENT INTERFACE DEVICE SELECTION SYSTEM AND METHOD BASED ON THREE-DIMENSIONAL MODELLING - An electronic apparatus ( | 2016-03-31 |
20160092646 | REMOTE MEDICAL CONSULTATION AND DIAGNOSIS - A method for providing remote medical consultation and diagnosis, the method including a patient visiting a service facility where a secondary healthcare provider is located, establishing a teleconferencing session between a first teleconferencing station located in the service facility and a second teleconferencing station located in a provider facility that is remote from the service facility, a primary healthcare provider being present at the provider facility, and the primary healthcare provider performing an examination on the patient using audio and video that are captured at the first teleconferencing station and transmitted to the second teleconferencing station. | 2016-03-31 |
20160092647 | METHOD FOR RECORDING MEDICAL INFORMATION OF A USER AND FOR SHARING USER EXPERIENCE WITH SYMPTOMS AND MEDICAL INTERVENTION - The present invention relates to an integrated system of ‘Electronic Medical Record for Individuals’ (EMRI) and ‘Patient Information Exchange (PIE) to perform a method for creating and recording medical information of a user and for sharing user experience with symptoms and medical intervention details. In this method for creating and recording medical information of the individual user, comprehensive health information of the individual user in the user interface module is organized and prepared based on the personal details, the health details, the symptoms, the treatment details, the health reports and the medical insurance details of the individual user through a user interface module of the EMRI module. The health information of the individual user are tracked and displayed from the user interface module into a doctor interface module of the EMRI module. Such systems and methods facilitate easy availability of comprehensive and chronological medical records or health information of the user and easy public sharing of the user experience with symptoms and medical intervention benefiting the society at large through such dissemination. Further, it achieves effective diagnosis and determination of right course of medical intervention to enhance the quality of life and mitigating trauma for the user, and also minimizes the information gap between the patients and the doctors for effective diagnosis. | 2016-03-31 |
20160092648 | RISK MANAGEMENT SYSTEM DIRECTED TO HEALTH CARE ENVIRONMENTS AND METHODS OF USING THE SAME - Disclosed herein is a system and method for a risk management system for use in a health care environment by healthcare practitioners in the creation, recording, and tracking of progress notes. In an embodiment, the system is comprised of an input/output interface for receiving from a user the beginning data elements of a patient, a computing device configured to receive said beginning data elements of said patient and computing for displaying to said user the initial progress note form component, subjective/chief complaint. Based on the initial progress note form component inputs for subjective/chief complaint, said computer computes for displaying to said user the second progress note form component, objective. This is continued for the remaining progress note form components diagnosis/assessment, plans/treatment recommendations, risks/complications, benefits of proposed treatments, alternative treatments, and sequalae of non treatment. That is the inputs from the previous progress note form component is used to compute for displaying to said user, the following progress note form component until the progress note is completed. | 2016-03-31 |
20160092649 | System and Method for Determining Drug Usage by Indication - A computer-assisted method that includes: identifying practitioners affiliated with a non-retail facility; gathering longitudinal prescription scripts by the identified prescribing practitioners as well as medical claims submitted by the identified prescribing practitioners to insurance carriers; linking the medical claims submitted by the identified practitioners to the longitudinal prescription scripts; based on each linked medical claim and longitudinal prescription script, generating a record of using the prescription drug for the corresponding one or more indication; generating a distribution factor of using the prescription drug for each of the one or more indications by the identified practitioners outside the non-retail facility; receiving information showing a volume of the prescription drug sold to the non-retail facility; and generating usage data by indications of the prescription drug for the non-retail facility by applying the generated distribution factor to the received information showing the volume of the prescription drug sold to the non-retail facility. | 2016-03-31 |
20160092650 | SYSTEM AND METHOD FOR DETECTING PRESCRIPTION, TRANSCRIPTION AND ADMINISTRATION ERRORS IN DRUG ADMINISTRATION - A method of administration of a drug or drug regime to a potentially unlimited number of drug recipients, the method comprising the steps of; a) providing a prescription for at least one drug in a drug dosing regime to a drug recipient, b) prior to administration of the at least one drug, inputting drug parameters and drug recipient profile particulars for a particular drug recipient into a computer program c) allowing the program to compare the prescription parameters to a set of safety parameters to determine if the parameters fall within predetermined safety limits thereby avoiding over-doses or under-doses of prescribed drug dosages. | 2016-03-31 |
20160092651 | APPARATUS AND METHOD FOR ADMINISTERING A MEDICAL DEVICE PRESCRIPTION - Methods and devices for providing instructions to treat and for treating patients through the use of medical devices are provided. Some embodiments treat musculoskeletal conditions by providing for alignment of bones by use of bone alignment devices in accordance with instructions provided through a prescription. Other embodiments may facilitate or provide revised prescriptions in response to treatment conditions. Embodiments may also provide effective ways of communicating prescription and compliance information between patients and health care providers. | 2016-03-31 |
20160092652 | CONTROL SYSTEM FOR CONTROL OF DISTRIBUTION OF MEDICATION - A system of controlling distribution of a medication in the treatment or prevention of epilepsy is provided. A central controller of the system has a data store and one or more processors for reading and writing data to the data store. The data store comprises a database of patient records, each patient record having a medication authorization field. The central controller can output an authorization of a first prescription of epilepsy medication to a patient in dependence upon genetic test results for the patient and schedules a subsequent test for the patient prior to authorization of a subsequent prescription of epilepsy medication. Also provided are methods in which the subject systems find use. The systems and methods find use in the treatment of severe subtypes of epilepsy or refractory epilepsy, such as Dravet Syndrome. | 2016-03-31 |
20160092653 | NUTRITIONAL INTAKE VIEWER (NutriWeb) - A nutritional intake viewing apparatus monitors patient nutrient intake. One or more processors receives nutrient input information, generates one or more multi-axis web diagrams on the display, and graphs calculated nutrient amounts onto a corresponding one of the axes. Each multi-web diagram includes a plurality of axes diverging from a single common point of intersection, calculated nutrient amounts displayed on the axes, and connecting lines that connect the calculated nutrient amounts on the axes to form a polygon of the calculated nutrient amounts. | 2016-03-31 |
20160092654 | SYSTEMS AND METHODS FOR FITNESS REPORTING USING PAYMENT CARDS - A computer-implemented method for tracking fitness data of a cardholder by using a fitness payment card and a fitness tracking computing device is provided. The method includes storing registration data, wherein the registration data includes an account identifier associated with the fitness payment card and the cardholder. The method also includes receiving, by the fitness tracking computing device, a fitness data transfer message that includes the registration data and fitness data of the cardholder, wherein the fitness data is collected by the fitness payment card. The method further includes determining that the fitness payment card is registered in a fitness tracking program based on the registration data. The method also includes electronically generating a fitness report including at least the fitness data of the cardholder and providing the fitness report to the cardholder. | 2016-03-31 |
20160092655 | METHOD AND APPARATUS FOR VOLUNTARY REPORTING - A voluntary reporting apparatus performs report generation and includes a check-in interface to receive patient identification information. The voluntary reporting apparatus determines whether a patient is taking a medication under study and receives side effects experienced by the patient related to the medication under study. The severity levels of the side effects are compared to severity level thresholds, and reports are generated that include the side effects and severity levels experienced by the patient related to the medication under study. | 2016-03-31 |
20160092656 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR PREPARING A MEDICAL REPORT - A user interacts with a medical imaging system and a medical reporting system to prepare a medical report. The medical reporting system includes report templates for medical reports. The report templates include placeholder fields with unique placeholder designations and metadata. After a user entry in the medical imaging system to select an image dataset, the image dataset and analysis tools are made available to the user. After a user entry in the medical reporting system to select a report template, a report template is made available. Placeholders contained in the selected report template are displayed with corresponding placeholder designations and metadata, automatically sent to the imaging system, and displayed as data requests. According to the data requests displayed, the data corresponding to the data requests is ascertained or determined by the user and assigned to the placeholder designations. A report editor automatically saves the data in the placeholder fields. | 2016-03-31 |
20160092657 | METHODS AND APPARATUS FOR GEOGRAPHY-BASED ANTIMICROBIAL RESISTANCE TRACKING - Methods and apparatus for tracking antimicrobial resistance based on geography. An application server receives a query from a client application to provide antimicrobial resistance data for a geographic location. The application server determines a geographic region based, at least in part, on the geographic location included in the query, and antimicrobial data for samples collected from patients residing in the geographic region are retrieved from at least one health information datastore of a health information system. The retrieved antimicrobial data comprises information describing antimicrobial resistance of an infectious organism detected in the biological samples to at least one antimicrobial agent, and is transmitted to a client device on which the client application that issued the query is executing. | 2016-03-31 |
20160092658 | METHOD OF EVALUATING INFORMATION TECHNOLOGIES - A computer implemented method of evaluating an information technology in a computer network having multiple applications and users. The computer is programmed to create objective metric data of organizational, technical and utilization dimensions. This is accomplished through quantitative and qualitative data collection methods, such as surveys, usage tracking and system monitoring. The computer is programmed to create objective metric data on actual use and performance. From the metric data of organizational, utilization, and technical dimensions the computer is able to provide an analysis of the overall degree of utilization, individual net benefits and organizational net benefits. As data is compiled, the method produces industry sector standards for the purpose of benchmarking. | 2016-03-31 |
20160092659 | Method For Developing Parenteral Therapeutic Product With Drug Delivery Device Through Clinical Trial - The method set out herein involves conducting clinical trial to develop parenteral therapeutic product with drug delivery device. The method comprises conducting a dose-finding clinical study using a variable dose drug delivery device to evaluate multiple clinical doses, wherein the variable dose drug delivery device is automatic, portable and for user self-administration. During the dose-finding clinical study, both the performance of the drug and the performance of the variable dose drug delivery device are evaluated. | 2016-03-31 |
20160092660 | Characterization of Complex Hydrocarbon Mixtures for Process Simulation - A process for simulating the composition and properties of hydrocarbon mixtures such as petroleum fractions with a reduced number of representative compounds that closely match the characteristics of the complete molecular composition of the mixture. | 2016-03-31 |
20160092661 | METHOD OF MAKING PERFUMED GOODS - The present invention relates to methods of designing and making perfumed products and perfume raw materials for use in products and perfume raw materials selected by such methods and the use of same. | 2016-03-31 |
20160092662 | CONTENT READING METHOD FOR READING OUT COPYRIGHT-PROTECTED CONTENT FROM NON-TRANSITORY RECORDING MEDIUM, CONTENT READING APPARATUS, AND NON-TRANSITORY RECORDING MEDIUM - A content reading method includes identifying first version information indicating a version of a content copyright protection method of an optical disk based on this optical disk, identifying second version information indicating a version of a protocol used in authentication of a host apparatus, determining whether the authentication is to be approved or not by comparing the first version information and the second version information, authenticating the host apparatus according to a result of the determination, reading out, from the optical disk, Volume ID used in decrypting an encrypted content and sending it to the authenticated host apparatus, and 0 the encrypted content from the optical disk and sending it to the authenticated host apparatus. | 2016-03-31 |
20160092663 | DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols. | 2016-03-31 |
20160092664 | ELECTRONIC APPARATUS, AUTHENTICATION METHOD AND STORAGE MEDIUM - According to one embodiment, an electronic apparatus includes an input controller and circuitry. The input controller is configured to receive a password. The circuitry is configured to detect an external device which is externally connected, and to determine whether the password received by the input controller matches a password set in association with the detected external device. | 2016-03-31 |
20160092665 | Liveness Detection for User Authentication - An initial authentication of a user, if successful, causes a token to be stored on, and presented from, a wearable device (WD). The WD continually monitors one or more of the wearer's vital signs to confirm that (1) the WD is being worn by a living person rather than an inanimate simulacrum, and (2) the WD is still worn by the same person who underwent the authentication. The token can be read by a token-reader on at least one protected device (PD). If the token is valid, its presentation serves as authentication and the token-reader grants the user access to the PD. If the WD vital-sign signal is interrupted when the user removes the WD, the WD stops presenting the token and can no longer be used to access a PD. | 2016-03-31 |
20160092666 | ANTI-PASSBACK ALGORITHM FOR READING A PUBLIC OR SECURE OBJECT - An anti-passback algorithm for an access control system is described. The anti-passback algorithm prevents the use of valid credentials to gain access to an access-controlled area by more than one person within a given period of time. The algorithm is capable of distinguishing between credentials intentionally presented to the access control system and credentials that are unintentionally read by the access control system. Certain variables may be set by the access control system manufacturer or a trusted individual to adapt the algorithm for applications. | 2016-03-31 |
20160092667 | SYSTEM AND METHOD FOR UTILIZING AND REPLACING ANONYMOUS RECOGNITION CARDS - A system and method for utilizing and replacing an anonymous recognition substrates, which can be anonymous recognition cards, codes, emitters, tags, or any combination. The invention permits replacing and utilizing of anonymous recognition substrates at anonymous web-based program and/or at an anonymous interactive display terminals. Whereby the anonymous substrate holder may create an anonymous account on a web-based program and/or at an interactive display terminal using the anonymous substrate's anonymous code. The user may securely request a new anonymous substrate from the web-based program and/or at the interactive display terminal. The web-based program provider and/or the interactive display terminal provider can anonymously message and track the anonymous account holder and/or anonymous substrate holder. | 2016-03-31 |
20160092668 | METHODS AND DEVICES FOR AUTHORIZING OPERATION - A system for authorizing an operation is provided. The system may acquire motion data collected by a wearable device. A mobile terminal may determine whether the motion data matches with a physical motion for verification. If the motion data matches with the physical motion for verification, the mobile terminal may be authorized to perform a predetermined operation corresponding to the physical motion for verification. Thus, a user's identity may be verified based on the wearable device that collects motion data. | 2016-03-31 |
20160092669 | AUTHENTICATION PROCESSING DEVICE FOR PERFORMING AUTHENTICATION PROCESSING - The present invention is to enable a user to input authentication information without burden, such that the user only has to memorize part of the authentication information even when inputting lengthy authentication information in order to ensure high-level security. When an operation of inputting and arranging authentication information in an information arrangement region is performed in a state where an arrangement status of a specified portion in the information arrangement region is set in advance as partial-authentication reference information in a reference authentication information memory, a CPU detects an arrangement status of the specified portion from an overall arrangement status in the information arrangement region, and performs, as partial authentication, processing of matching the detected arrangement status of the specified portion and the arrangement status of the specified portion set as the partial-authentication reference information. | 2016-03-31 |
20160092670 | Answer Question User Authentication Process - A process of authenticating a person into a computer system as an authorized user by comparing the person's answers to questions that were defined by the authorized user during computer system account creation. The process is analogous to a property security system in that they both use concepts of Gate, Door, Safe, Frisk, and Key. Gate question prevents imposters from entering the computer system. Door question prevents imposters from viewing data should they get past the Gate. Safe question prevents imposters from updating data and viewing confidential data should they get past the Door. Frisk question catches imposters should they enter the computer system by guessing the correct answers to the authorized user's Key, Gate, Door or Safe questions. Key question mitigates imposter brute force attacks by silently locking and unlocking the authorized user account during Gate, Door, Safe, and Frisk questions when the authorized user answers with the Key question instead. | 2016-03-31 |
20160092671 | SYSTEM AND METHOD OF AUTOMATIC PASSWORD RECOVERY FOR A SERVICE - There are disclosed a system and method for automatic password recovery for a service. The method comprises: obtaining, via a communication network, user registration data and a request password restoration; determining of a first security question for the user, the first security question being associated with a first complexity factor; causing the first security question to be asked to the user; responsive to the first security question, obtaining the first user's answer; assigning a first weighting factor to the first user's answer, the first assigned weighting factor of the user's answer depending on the first complexity factor of the first security question; determining of a second security question to be asked of the user, the second security question being associated with a second complexity factor; causing the second security question to be asked to the user; responsive to the second security question, obtaining the second user's answer; assigning a second weighting factor to the second user's answer, the second assigned weighting factor of the user's answer depending on the second complexity factor of the second security question; adding up the first weighting factor and the second weighting factor; if the sum of the first weighting factor and the second weighting factor exceeds a given threshold, automatically restoring the password; if the sum of the first weighting factor and the second weighting factor is below the given threshold, denying automatic password restoration. | 2016-03-31 |
20160092672 | SYSTEM AND METHOD FOR SECURING INTER-COMPONENT COMMUNICATIONS IN AN OPERATING SYSTEM - System and methods for securing inter-component communications in an operating system are provided. Systems and methods provided herein secure inter-component communications in an operating system by selectively generating instances when inter-component communication requests occur, whereby each of the generated instances are attached to a newly created blocked permissions list. System and methods further manage the invocation of Application Programming Interfaces by applications or instances in the operating system by determining whether the invocation of the Application Programming Interface is allowed or declined based on the blocked permissions list and default permission list associated with each invoking application or instance. | 2016-03-31 |
20160092673 | HARDWARE SHADOW STACK SUPPORT FOR LEGACY GUESTS - Technologies for shadow stack support for legacy guests include a computing device having a processor with shadow stack support. During execution of a call instruction, the processor determines whether a legacy stack pointer is within bounds and generates a virtual machine exit if the legacy stack pointer is out-of-bounds. If not out-of-bounds, the processor pushes a return address onto the legacy stack and onto a shadow stack protected by a hypervisor. During execution of a return instruction, the processor determines whether top return addresses of the legacy stack and the shadow stack match, and generates a virtual machine exit if the return addresses do not match. If the return addresses match, the processor pops the return addresses off of the legacy stack and off of the shadow stack. The stack out-of-bounds and the stack mismatch virtual machine exits may be handled by the hypervisor. Other embodiments are described and claimed. | 2016-03-31 |
20160092674 | ASLR MAP OBFUSCATION - A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping. | 2016-03-31 |
20160092675 | FINE-GRAINED ADDRESS SPACE LAYOUT RANDOMIZATION - A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping. | 2016-03-31 |
20160092676 | MITIGATION OF STACK CORRUPTION EXPLOITS - In an example, a stack protection engine is disclosed for preventing or ameliorating stack corruption attacks. The stack protection engine may operate transparently to user-space processes. After a call to a subroutine from a parent routine, the stack protection engine encodes the return address on the stack, such as with an exclusive or cipher and a key selected from a key array. After the subroutine returns control to the main routine, the stack protection engine decodes the address, and returns control. If a stack corruption attack occurs, the malicious return address is not properly encoded, so that when decoding occurs, the program may simply crash rather than returning control to the malicious code. | 2016-03-31 |
20160092677 | ALLOCATION OF SHARED SYSTEM RESOURCES - Techniques are described for allocating resources to a task from a shared hardware structure. A plurality of tasks may execute on a processor, wherein the processor may include one or more processing cores and each task may include a plurality of computer executable instructions. In accordance with one technique for allocating resources to a task from a shared hardware structure amongst multiple tasks, aspects of the disclosure describe assigning a first identifier to a first task from the plurality of tasks, associating a portion of the shared hardware resource with the first identifier, and restricting access and/or observability for computer executable instructions executed from any other task than the first task to the portion of the hardware resource associated with the first identifier. | 2016-03-31 |
20160092678 | Protecting Application Secrets from Operating System Attacks - Various embodiments provide techniques and devices for protecting application secrets from operating system attacks. In some examples, applications execute with an isolated user mode of a secure execution environment, while relying on an operating system executing within a separate execution environment for resource management and system services. A proxy kernel can control access by the operating system to data associated with the secure execution environment. Further, the proxy kernel can act as a transparent interface between isolated user mode applications and the operating system during the provision of resource management and system services. | 2016-03-31 |
20160092679 | INSPECTION AND RECOVERY METHOD AND APPARATUS FOR HANDLING VIRTUAL MACHINE VULNERABILITY - An inspection and recovery method and apparatus for handling virtual machine vulnerability, which inspect the security status of a virtual machine in a hypervisor domain, and recover a main system file or limit the use of a virtual machine suspected of being damaged due to hacking depending on the results of inspection, thus providing a secure virtual machine use environment for cloud computing. In the presented method, collection target information and inspection criteria including vulnerability inspection criteria, recovery criteria, and hacking damage criteria are updated. Then, the collection target information is collected from the virtual disk and virtual memory of each virtual machine. Vulnerability is inspected in conformity with the inspection criteria, based on the collected information. A damaged main system file depending on inspection results is recovered based on recovery criteria. | 2016-03-31 |
20160092680 | APPARATUS AND METHOD COMPRISING A CARRIER WITH CIRCUIT STRUCTURES - An apparatus having a carrier with circuit structures including a complex impedance has a measurement unit implemented to measure the complex impedance of the circuit structures at a first time to get a first result and at a later second time to get a second result. Further, either a control implemented to enable operation of a component or to judge whether unauthorized to the component has taken place in dependence on whether the first result matches the second result, or an interface implemented to transmit the first result and the second result in a wireless or wired manner to such a control are provided. | 2016-03-31 |
20160092681 | CLUSTER ANOMALY DETECTION USING FUNCTION INTERPOSITION - Systems and methods may provide for identifying a runtime behavioral pattern of an application and detecting an anomaly in the runtime behavioral pattern. In addition, a security event may be triggered in response to the anomaly. In one example, the anomaly is detected with regard to one or more of a library call count, a library call type, a library call argument configuration or a library call timing associated with a runtime operation of the application. | 2016-03-31 |
20160092682 | IDENTIFYING AN EVASIVE MALICIOUS OBJECT BASED ON A BEHAVIOR DELTA - A security device may receive actual behavior information associated with an object. The actual behavior information may identify a first set of behaviors associated with executing the object in a live environment. The security device may determine test behavior information associated with the object. The test behavior information may identify a second set of behaviors associated with testing the object in a test environment. The security device may compare the first set of behaviors and the second set of behaviors to determine a difference between the first set of behaviors and the second set of behaviors. The security device may identify whether the object is an evasive malicious object based on the difference between the first set of behaviors and the second set of behaviors. The security device may provide an indication of whether the object is an evasive malicious object. | 2016-03-31 |
20160092683 | Scanning Content Items Based on User Activity - In some embodiments, a content management system can initiate a scan of a content item when the content management system detects that activity associated with the content item triggers a scan policy. In some embodiments, a content management system can initiate a scan of a user's account when the content management system detects that activity associated with the content item triggers a scan policy. A scan policy can specify, for example, a number of shares, downloads and/or previews of the content item allowable in a period of time. When the number of shares, downloads, and/or previews exceeds the specified number in the policy in the specified period of time, the content management system can initiate a scan (e.g., virus scan, malware scan, etc.) of the content item and/or the user's account. | 2016-03-31 |
20160092684 | DYNAMICALLY OPTIMIZING PERFORMANCE OF A SECURITY APPLIANCE - A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat prediction model associated with a set of security functions, a set of predicted threat scores. The device may determine, based on the set of predicted threat scores, a set of predicted utility values. The device may determine a set of costs corresponding to the set of security functions. The device may determine a set of predicted efficiencies, associated with the set of security functions, based on the set of predicted utility values and the set of costs. The device may identify, based on the set of predicted efficiencies, a particular security function, and may cause the particular security function to be executed on the unknown object. The device may determine whether another security function is to be executed on the unknown object. | 2016-03-31 |
20160092685 | PASSIVE COMPLIANCE VIOLATION NOTIFICATIONS - Disclosed are various embodiments for passive compliance violation notifications. In one embodiment, it is detected that that a policy violation with respect to use of a client device has occurred. It is then determined that the policy violation may be passive. A user notification of the policy violation is generated by the client device in response to determining that the policy violation may be passive. The frequency and/or intensity of this notification may depend upon an extent of the policy violation. If the policy violation is later determined to be active, additional actions may be performed, such as disabling access to or removing managed resources on the client device. | 2016-03-31 |
20160092686 | File System Compliance Checking - A method of checking file system compliance including receiving a plurality of compliance rules corresponding to a file system of a production system, collecting, by a collector, file system meta data from the file system, analyzing, by an analyzer, the file system meta data using the plurality of compliance rules to determine at least one compliance deviation of the file system, and throttling the collector and the analyzer independently of one-another, wherein the collector and the analyzer are configured according to a model of performance for the production system and a schedule for the collection and analyzing. | 2016-03-31 |
20160092687 | HARDWARE SECURITY MODULE ACCESS MANAGEMENT IN A CLOUD COMPUTING ENVIRONMENT - Trusted firmware on a host server is used for managing access to a hardware security module (HSM) connected to the host server. The HSM stores confidential information associated with an operating system. As part of access management, the firmware detects a boot device identifier associated with a boot device configured to boot the operating system on the host server. The firmware then receives a second boot device identifier from the HSM. The boot device identifier and the second boot device identifier are then compared by the firmware. Based on the comparison, the firmware determines that the boot device identifier matches with the second boot device identifier. Based on this determination, the firmware grants the operating system access to the HSM. | 2016-03-31 |
20160092688 | INSTRUCTIONS AND LOGIC TO PROVIDE SIMD SM3 CRYPTOGRAPHIC HASHING FUNCTIONALITY - Instructions and logic provide SIMD SM3 cryptographic hashing functionality. Some embodiments include a processor comprising: a decoder to decode instructions for a SIMD SM3 message expansion, specifying first and second source data operand sets, and an expansion extent. Processor execution units, responsive to the instruction, perform a number of SM3 message expansions, from the first and second source data operand sets, determined by the specified expansion extent and store the result into a SIMD destination register. Some embodiments also execute instructions for a SIMD SM3 hash round-slice portion of the hashing algorithm, from an intermediate hash value input, a source data set, and a round constant set. Processor execution units perform a set of SM3 hashing round iterations upon the source data set, applying the intermediate hash value input and the round constant set, and store a new hash value result in a SIMD destination register. | 2016-03-31 |
20160092689 | Indexing and Searching Documents with Restricted Portions - One or more computer devices may receive a document from private content that is accessible by a set of users, and may extract metadata from the document. The metadata may provide information relating to one or more aspects of the document. The one or more computer devices may determine, based on the metadata, whether a portion of the document includes information that is only to be accessible by a particular user from the set of users, and may append a restrict indicator to the metadata when the portion of the document includes information that is only to be accessible by the particular user. The restrict indicator may identify the particular user and the portion of the document. The one or more computer devices may store the metadata and the restrict indicator in a personal search index. | 2016-03-31 |
20160092690 | SECURE COPY AND PASTE OF MOBILE APP DATA - Secure transfer of mobile application content is disclosed. A state-related event associated with a managed application in a managed set of applications may be detected. It may be determined that content from the managed application is stored at a public storage location on a mobile device. At least a portion of the content may be transferred to a secure storage location accessible to the managed set. | 2016-03-31 |
20160092691 | Representation of Operating System Context in a Trusted Platform Module - Techniques for representation of operating system context in a trusted platform module are described. In at least some embodiments, authorization principals that corresponds to representations of operating system context are derived in a trusted platform module. The authorization principals can be used to define authorization policies for access to security assets stored in a trusted platform module. | 2016-03-31 |