23rd week of 2016 patent applcation highlights part 53 |
Patent application number | Title | Published |
20160162622 | High-Speed Shape-Based Router - A high-speed shape-based router is applicable to standard-cell digital designs, chip-level-block assembly designs, and other styles of design. In a flow of the invention, the technique establishes an initial structure for each net to be routed. Nets or parts of them are ordered. Each part of the net may be routed using a spine routing search, depth first search, or a space flood search, or any combination of these. Where sections fail or an error occurs, conflicts are identified, and the technique tries routing again. | 2016-06-09 |
20160162623 | METHOD, COMPUTER READABLE STORAGE MEDIUM AND COMPUTER SYSTEM FOR CREATING A LAYOUT OF A PHOTOMASK - A method includes providing a layout of a portion of a photomask. The layout includes a plurality of target features having a shape in accordance with a corresponding one of a target shape. For each of the target shapes, a local map specifying a respective value of a local sub-resolution assist feature (SRAF) usefulness for each of a plurality of positions relative to the target shape is provided. For each of the target features, an assignment of a part of the values of the local SRAF usefulness of the local map for the target shape corresponding to a target feature to a position relative to the portion of the photomask is provided. A global map specifying a global SRAF usefulness for each of the positions relative to the portion of the photomask is provided on the basis of the assignment of the values of the local SRAF usefulness. | 2016-06-09 |
20160162624 | METHODS FOR OPTICAL PROXIMITY CORRECTION IN THE DESIGN AND FABRICATION OF INTEGRATED CIRCUITS USING EXTREME ULTRAVIOLET LITHOGRAPHY - A method of optical proximity correction (OPC) in extreme ultraviolet lithography (EUV) lithography includes providing a patterned layout design including first and second design polygons that correspond with the pre-pattern opening, wherein the first and second design polygons are separated by a separation distance, and correcting the patterned layout design using OPC by generating (1) a third polygon that has dimensions corresponding to a combination of the first and second design polygons and the separation distance and (2) and filled polygon within the third polygon, thereby generating an OPC-corrected patterned layout design. EUV photomasks may be manufactured from the OPC-corrected patterned layout design, and integrated circuits may be fabricated using such EUV photomasks. | 2016-06-09 |
20160162625 | Mapping Intermediate Material Properties To Target Properties To Screen Materials - A system for evaluating candidate materials for fabrication of integrated circuits includes a data processor coupled to a memory. Roughly described, the data processor is configured to: calculate and write to a first database, for each of a plurality of candidate materials, values for each property in a set of intermediate properties; calculate and write to a second database, values for a selected target property for various combinations of values for the intermediate properties and values describing candidate environments; and for a particular candidate material and a particular environment in combination, determine values for the intermediate properties for the candidate material by reference to the first database, and determine the value of the target property for the candidate material by querying the second database with, in combination, (1) the determined intermediate property values of the candidate material and (2) a value or values describing the particular environment. | 2016-06-09 |
20160162626 | LITHOGRAPHY PROCESS WINDOW PREDICTION BASED ON DESIGN DATA - A method of manufacturing a semiconductor device, comprising providing design data, producing lithography masks based on the design data, predicting a product process window and producing a wafer including semiconductor structures by means of the lithography masks and observing conditions defined by the product process window. | 2016-06-09 |
20160162627 | Method for Integrated Circuit Manufacturing - Provided is an integrated circuit (IC) manufacturing method. The method includes receiving an IC design layout, wherein the IC design layout includes multiple IC regions and each of the IC regions includes an initial IC pattern. The method further includes performing a correction process to a first IC region, thereby modifying the initial IC pattern in the first IC region to result in a first corrected IC pattern in the first IC region, wherein the correction process includes location effect correction. The method further includes replacing the initial IC pattern in a second IC region with the first corrected IC pattern. | 2016-06-09 |
20160162628 | GENERIC DESIGN RULE CHECKING (DRC) TEST CASE EXTRACTION - A computer-aided testing is provided for design verification of integrated circuits. More specifically, a method of generating a test case in design rule checking is provided for that includes extracting coordinates of an error marker for a first error identified in an integrated circuit design. The method further includes identifying a first rectangle that encloses the error marker. The method further includes generating a first test case based on data of the integrated circuit design contained within the rectangle. The method further includes determining whether the first test case is representative of the first error. The method further includes in response to determining the first test case is not representative of the first error, identifying a second rectangle that is between the first rectangle and a third rectangle. The method further includes generating a second test case based on data of the integrated circuit design contained within the second rectangle. | 2016-06-09 |
20160162629 | METHOD FOR MODELING A NON-STREAMLINED PROPELLER BLADE - The present invention concerns a method for modelling at least a part of a blade ( | 2016-06-09 |
20160162630 | DEVICE AND METHOD FOR MODELLING A CORNEA - A patient-specific finite element model of the cornea is generated for the purposes of modeling a cornea for simulating tissue cuts in the cornea. A first group of tissue fibers, with main fibers that extend parallel to the surface of the cornea, is distributed in the finite element model in accordance with a first distribution function. Moreover, a second group of tissue fibers, with inclined cross-linked fibers that do not extend parallel to the surface of the cornea, is distributed in the finite element model in accordance with a second distribution function. Here, the second distribution function distributes the cross-linked fibers with a non-uniform weighting function over the depth of the cornea, from the outer surface of the cornea to the inner surface of the cornea. | 2016-06-09 |
20160162631 | DETERMINATION OF THE POSITION OF THE CONDYLAR ARTICULATION AXIS FOR CREATING A VIRTUAL ARTICULATOR - A method is proposed for creating a virtual articulator for a jaw and the associated dentition having the following steps:
| 2016-06-09 |
20160162632 | METHOD OF SCREENING REACTIONS OR BIOLOGICAL PATHWAYS INDUCED BY COMPOUND - Provided is a method of screening biochemical reactions induced by a compound or biological pathways induced by a compound. | 2016-06-09 |
20160162633 | METHOD OF SCREENING PROTEIN CAPABLE OF BINDING TO COMPOUND - Provided is a method of screening a protein capable of binding to a specific compound using gene ontology terms. | 2016-06-09 |
20160162634 | ANALYSIS OF A POLYMER COMPRISING POLYMER UNITS - A sequence of polymer units in a polymer ( | 2016-06-09 |
20160162635 | METHOD AND SYSTEM FOR DETERMINING A BACTERIAL RESISTANCE TO AN ANTIBIOTIC DRUG - The invention relates to a method, a databank, a system and a computer program product for determining a bacterial resistance to an antibiotic drug. A data bank is provided which comprises a plurality of bacterial reference nucleic acid sequences, wherein at least some reference nucleic acid sequences are associated with a respective antibiotic drug resistance information. A comparison unit is used for comparing said bacterial nucleic acid sequence information obtained from a sample with said plurality of bacterial reference nucleic acid sequences. | 2016-06-09 |
20160162636 | SYSTEM AND METHOD FOR INTER-SPECIES DNA MIXTURE INTERPRETATION - Methods and systems for characterizing two or more nucleic acids in a sample. The method can include the steps of providing a hybrid machine learning approach that enables rapid and automated deconvolution of DNA mixtures of multiple contributors. The input is analyzed by an expert system which is implemented in the form of a rule set. The rule set establishes requirements based on expectations on the biology and methods used. The methods and systems also include a machine learning algorithm that is either incorporated into the expert system, or utilizes the output of the expert system for analysis. The machine learning algorithm can be any of a variety of different algorithms or combinations of algorithms used to perform classification in a complex data environment. | 2016-06-09 |
20160162637 | Cloud-based Medical Imaging Viewer and Methods for Establishing A Cloud-based Medical Consultation Session - A viewing system and methods for medical consultation includes an electronic medical records (EMR) system and a cloud viewing network. The EMR system includes a PACS having a PACS image file and the cloud viewing network includes a non-diagnostic viewing module having a non-diagnostic radiological viewer and a tooling module. The non-diagnostic radiological viewer displays a non-diagnostic PACS image based on the corresponding PACS image file to an authorized user accessing the non-diagnostic PACs image through user equipment interfaced with the network. With successful user verification, methods for medical consultation with the viewing system includes the step of sharing network status with the at least one authorized user of the viewing system via a network status social network indicator. The viewing system sends a consultation session invitation for a cloud-based, physician curbside consultation session. Optionally, a non-diagnostic PACS file is viewed and, optionally, edited during the consultation session. | 2016-06-09 |
20160162638 | SYSTEM AND METHOD FOR CONTEXTUALIZING PATIENT HEALTH INFORMATION IN ELECTRONIC HEALTH RECORDS - System and method for contextualizing input and presentation of patient information in Electronic Health Record systems. The system and method enhance the ease of use and usefulness of Electronic Health Record systems, and are configurable to capture and automatically integrate dictated and transcribed free-form text into an Electronic Health Record (“EHR”) and present discrete health data maintained in an EHR to system users in an interactive, contextualized, and annotated graphical form. | 2016-06-09 |
20160162639 | DIGITAL IMAGE ANALYSIS AND CLASSIFICATION - A computing platform may receive data comprising digital images associated with a healthcare provider. Each digital image may comprise an image of at least a portion of one or more physical documents associated with the healthcare provider. The computing platform may identify a portion of the digital images corresponding to financial instruments, a portion of the digital images corresponding to explanation-of-benefits documents, and/or a portion of the digital images corresponding to other documents and may classify (e.g., in accordance with a set of classification rules associated with the healthcare provider) each digital image of the portion corresponding to the other documents into a category (e.g., a category specified by the set of classification rules associated with the healthcare provider). | 2016-06-09 |
20160162640 | METHOD AND APPARATUS FOR TRACKING RELEVANT INFORMATION RELATED TO ANIMAL CARE - An apparatus, system and method may provide for maintaining and updating an animal's medical records. An animal medical memory device may be assigned to an animal and used to store the animal's medical record, which may be accessible to a veterinary healthcare professional. The medical record may be updated with new medical information derived from a visit with a veterinary healthcare professional by storing the new medical information in a memory of the memory device and/or in a remote computer database. A memory reader and writer may be provided to read and write to the memory. | 2016-06-09 |
20160162641 | MEDICAL SUPPORT SERVER AND MEDICAL SUPPORT SYSTEM - In an initial step of emergency in which a patient is transported from a site to a hospital, a medical support system creates general-purpose emergency timeline information that is available in the initial step of emergency of a plurality of diseases according to treatment start of a paramedic for the patient, and manages medical care information of the patient based on the created emergency timeline information. After specifying of disease of the patient, the medical support system creates dedicated timeline information corresponding to the specified disease, and manages the medical care information of the patient based on the created dedicated timeline information. The medical care information managed using the emergency timeline information transitions to the dedicated timeline information. | 2016-06-09 |
20160162642 | Integrated Medical Record System using Hologram Technology - In one aspect of the invention, a computer-implemented method may include maintaining in a computer system, a plurality of relationships among users in an aggregated data network. A user may receive a plurality of data points, where at least one of the data points, was requested via a relationship inquiry, made using a Health Insurance Portability and accountability Act (HIPAA) compliant security clearance user interface. The computer-implemented method may generate a Global Patient Health Record Timeline (GPHRT), comprising a chronological representation of one or more of the received data points, by utilizing their time stamps to correctly order the data points. The computer-implemented method may include an interactive holographic display system, to render the GPHRT as a holographically produced image. The user may be able to manipulate and navigate the holographic image via gestures and haptic feedback. | 2016-06-09 |
20160162643 | METHOD AND APPARATUS FOR CREATING AND UPDATING MEDICAL RECORDS - An apparatus, system and method may provide for maintaining and updating a patient's medical records. A patient medical memory device may be assigned to a patient and used to store the patient's medical record, which may be accessible to a healthcare professional when visited by the patient. The medical record may be updated with new medical information derived from a visit with a healthcare professional by storing the new medical information in a memory of the memory device and/or in a remote computer database. A memory reader and writer may be provided to read and write to the memory. | 2016-06-09 |
20160162644 | STANDARD OF CARE PROCESS SYSTEM - An emergency mobile electronic guidance apparatus having a processor, a memory containing an exigent standard of care process associated with a patient, wherein the processor is configured to present, on a display, a plurality of codes defining different patient care actions associated with the exigent standard of care process, each different patient care wherein the processor is configured to collect, with the input device, patient care action performance information associated with each code and integrate the patient care action performance information to form a dynamic, real-time model of the patient's condition in the memory, wherein, the processor is further configured to display an at-a-glance representation of the current state of the exigent standard of care process and the patient's current condition based on the dynamic, real-time model, wherein the processor is further configure to generate prompts associated with each different patient care action. | 2016-06-09 |
20160162645 | System and Method for Normalizing and Communicating Care Plans - A system and method for normalizing and communicating health care plans is provided. In one aspect of the invention, the method includes converting one or more care plans into a common digital format, identifying tasks within the care plans, determining if one or more of the tasks are in a standardized form, and classifying the tasks if the tasks are in a standardized form. In another aspect of the invention, the method includes unifying the one or more care plans, selecting one or more communication mediums for communicating care plans, and communicating the care plans to one or more users and or patients. | 2016-06-09 |
20160162646 | FIRST TIME CONFIRMATION OF DATABASE ENTRY - Provided is an apparatus that stores a formulary. The apparatus includes a memory device that stores the formulary, the formulary comprising a plurality of drug entries. A user input device allows a user to verify a drug of the plurality of drug entries of the formulary. A code reader interprets computer-readable codes. After a computer-readable code that is associated with the drug is read by the code reader, the drug is verified using the user input device. | 2016-06-09 |
20160162647 | System for Processing Medical Operational Performance Information and Root Causes Thereof - A system for analyzing medical operational performance information comprising: defining a set of operational performance metrics relevant to a medical treatment setting, determining the value of one or more members of the set of operational performance metrics based on information from one or more data sources, determining an expected value for the operational performance metric, associating a set of potential correlational factors or root causes with each operational performance metric; and determining the significance of the correlational factors or root causes on the deviation of the operational performance metric from its expected value by applying standard statistical methods. | 2016-06-09 |
20160162648 | Method for Creating Standardized Patient Care Pathways - A method and process for devising and designing standardized patient care pathways, gaining approval for such patient care pathways, communicating such standardized patient care pathways to relevant healthcare providers and educating such healthcare providers as to the standardized patient care pathway, and implementing and monitoring such standardized patient care pathways. | 2016-06-09 |
20160162649 | Regression Modeling System Using Activation Scale Values as Inputs to a Regression to Predict Healthcare Utilization and Cost and/or Changes Thereto - In a regression modeling system, activation scale values over a plurality of survey participants is used to generate a regression to identify a predictive model that can have a direct explanatory relationship to healthcare utilization and cost. The survey can comprise a number of declarative statements and the responses can be an indication of a participant's level of agreement. The activation scale value for a given individual is thus a predictive dependent variable that can be changed with a known effect on outcomes (independent variables). For example, healthcare utilization and costs will decline as an activation scale value goes up. | 2016-06-09 |
20160162650 | METHOD FOR AUTOMATING MEDICAL BILLING - A system and method provide for automatic billing for medical services or supplies. Processors may search patient medical files and medical documents to find keys and/or codes associated with the medical services or supplies. Processors may determine costs associated with the medical services or supplies based on the found medical codes. Processors may also create billing documents including all or part the cost and automatically send the billing documents to entities responsible for payment of the medical services or supplies. | 2016-06-09 |
20160162651 | MESSAGING SYSTEM AND METHOD - A computer-implemented method, computer program product, and computing system for associating a health monitoring device with a user. Status data is received from the health monitoring device concerning the user. Whether the status data indicates that the user is in need of emotional support is determined. If the user is in need of emotional support, a personal media file is provided to the user, chosen from a plurality of available personal media files. | 2016-06-09 |
20160162652 | SYSTEMS AND METHODS FOR MODELING AND PREDICTING EFFECTIVE TREATMENTS FOR SCHIZOPHRENIA AND OTHER DISORDERS - A system and method for evaluating an effectiveness of a therapy for a psychological condition includes selecting a therapy to be analyzed relative to psychological pathology. The selected therapy is applied to a model of the psychological condition that includes hyperdopaminergia as a function. A response is determined using an output of the model of the psychological condition. The response is compared to a control to determine a wellness metric and a report is generated indicating an effectiveness of the therapy based on the wellness metric. | 2016-06-09 |
20160162653 | REDUNDANT ERROR DETECTION IN A CLINICAL DIAGNOSTIC ANALYZER - Disclosed is a clinical diagnostic analyzer employing a redundant error detection capability to further examine the internal message traffic for possible errors or questionable results by comparing the actual parameters against a fingerprint generated for each assay using an assay database and a configuration file. This testing does not rely on inputs from the software module being tested, and hence is an independent test. Further, a testing mechanism is provided to test the Redundant Error Detection (“RED”) capability itself. | 2016-06-09 |
20160162654 | SYSTEMS AND METHODS FOR OVULATION STATUS AND PREGNANCY DETECTION - Systems and methods are disclosed for detecting pregnancy or ovulation status by detecting a wireless connection between a pregnancy test sensor and a mobile device; if the wireless connection is made: displaying guidance information on the mobile device for a user to dip a strip into a liquid; detecting at the sensor the presence of liquid on the strip and color change on the strip; and displaying on the mobile device one or more multimedia presentations based on personalized options relating to pregnancy detection. | 2016-06-09 |
20160162655 | SYSTEMS AND METHODS FOR GUARDING AGAINST SIDE EFFECTS - The present invention provides computer-implemented methods and systems for monitoring and informing a user about known side effects of drugs (e.g., prescription, over-the-counter) using a wearable device, the method including: polling for sensor data from a wearable device; the sensor data indicating one or more vital signs measurement parameters of a user, wherein the sensor data is used for evaluating whether one or more known side effects has been detected; transmitting a request for information to various networks, the information request including identification of at least one drug the user is using; receiving the requested information from the various networks for monitoring and detecting one or more known side effects of the identified drug; storing the received information from the various networks into memory of the wearable device; evaluating, for each identified drug, the obtained sensor data with the stored information received from the various networks pertaining to that identified drug; determining whether one or more known side effects have been detected, wherein the determination is based on the evaluation of the sensor data with the stored information about the identified drug; executing one or more actions to notify the user and other third parties based on the detected one or more known side effects; and executing an algorithm to adjust the drug delivery regime responsive to the determination that one or more known side effects have been detected. | 2016-06-09 |
20160162656 | SYSTEM FOR USING MEDICATION SAMPLES TO MEASURE MEDICATION ACQUISITION AND IMPROVE PATIENT OUTCOMES - Systems and methods for measuring the acquisition of a medical product by a patient are disclosed. The system may include a patient registration system, one or more patient care systems that includes at least one interactive response system. The patient registration system may capture a tracking code for the medical product the patient is taking and create an electronic patient specific data file in a database corresponding to the tracking code and the patient information. The patient care system may activate at least one system that collects patient's information, develops personalized patient monitoring parameters, receives a second set of data associated to the patient's interaction with the interactive response system, evaluate the second set of data against the personalized patient monitoring parameters, generate a feedback action plan for the user that measures patient's adherence to medical products and/or patient care systems, and triggers an intervention. | 2016-06-09 |
20160162657 | Methods For Identifying Complex Disease Subtypes - The present technology relates to methods that determine one or more subgroups of subjects within a population of subjects diagnosed with the same disease. In some embodiments, the methods include determining differential gene expression of at least one subgroup in the population using divisive Shuffling Approach (VIStA). In some embodiments, the method includes determining at least one clinical characteristic of each subgroup and/or determining a significant set of clinical characteristics of the disease order. | 2016-06-09 |
20160162658 | System and Method for Generating a Prescription Information Output - A system and method for generating a prescription information output. The present system enables healthcare professionals and patients to keep track of the medications consumed by the patient. The present invention is a method of receiving information from a patient's prescriptions, retrieving a picture of the prescribed medication, and arranging the picture and other information into a chart. The chart is arranged by an administration time selection that is made based on the prescribed dosage. The chart generated by the present system can be attached to multi-medication bubble packs and used to verify medicine dispensed to patients. | 2016-06-09 |
20160162659 | APPARATUS AND METHOD FOR OPTIMIZING TREATMENT USING MEDICATION COMPLIANCE PATTERNS AND GLUCOSE SENSOR - Methods and apparatus monitor medication usage data for one patient or a population of patients, which can be processed to determine compliance patterns. Such methods and systems can associate, analyze, organize and present medication usage data, compliance patterns, and correlations between compliance patterns and outcomes data for electronic analysis or analysis by a caretaker. Such methods and apparatus permit analysis of compliance patterns to enable, for example, establishment or adjustment of safe and effective treatment regimens, and may include feedback systems for ensuring authenticity of medication and/or effects of medication on a patient. Such methods and apparatus also permit detection of medication in a biological sample of the patient through a medication monitor having a detection device, such as a skin-prick device, and a glucose sensor that can detect a target agent in the biological sample. | 2016-06-09 |
20160162660 | MEDICATION MANAGEMENT - Methods and systems for managing medications of a patient are described. A dispenser device having compartments for holding medications and containing a patient profile is provided. The dispenser device is delivered to a pharmacist, who can fill the dispenser device and bill a patient based on the patient profile. The pharmacist can access medical records and other information, such as insurance and payment information, that is needed to fill the prescription, by reading the patient profile. In various embodiments, the dispenser device includes a security component to control that accesses the dispenser device. | 2016-06-09 |
20160162661 | MEDICAMENT COMPILATION AND DISPENSATION SYSTEM - The invention relates to a medicament dispensing device and system. In particular, the invention relates to a system having multiple containers capable of dispensing multiple medicaments. A center dispensing mechanism then actuates the containers release tray based on prscribed computer controlled settings. | 2016-06-09 |
20160162662 | BLOOD GLUCOSE VALIDATION FOR A CLOSED-LOOP OPERATING MODE OF AN INSULIN INFUSION SYSTEM - A method of controlling an insulin infusion device is presented here. The method can be implemented in a suitably configured electronic device, on an electronic storage medium, or the like. In accordance with certain embodiments, the method evaluates the operational integrity of a glucose sensor that measures sensor glucose values for a user of the insulin infusion device, and calculates a sensor integrity metric based on the evaluation. The calculated sensor integrity metric is used to adjust the aggressiveness of a closed-loop therapy algorithm that is used to control a closed-loop operating mode of the insulin infusion device. The insulin infusion device is operated in the closed-loop operating mode in accordance with the adjusted therapy setting. | 2016-06-09 |
20160162663 | METHOD OF ANALYZING CHARACTERISTICS OF MOLECULAR ORBITAL THROUGH SEQUENTIAL BLOCK FORMATION AND SYSTEM USING SAME - The present invention relates to a method of analyzing the characteristics of a molecular orbital through a sequential block formation, the method including: a) selecting a targeted molecular orbital of which the characteristics are analyzed, and then using a quantum mechanics calculation to calculate the distribution of the molecular orbital; b) forming N blocks in a radial direction at the molecular center in the molecular structure of the molecule; c) calculating a molecular orbital ratio (BX(k)) associated with each block; and d) re-arranging the blocks sequentially based on the size of the molecular orbital ratio (BX(k)) to obtain a re-arranged block spectrum. | 2016-06-09 |
20160162664 | Method To Represent Metal Content In Crude Oils, Reactor Feedstocks, And Reactor Products - A computer-implemented method of characterizing metal content and chemical composition of crude oil, including determining at least one respective organometallic class and subclass derived from physical and chemical property data for each organometallic class and crude oil physical and chemical property data and at least one segment type and segment number range of the segment type bound to each organometallic subclass. The method determines a relative ratio of each organometallic class and subclass that forms a chemical composition representative of the given crude oil, such that the determined relative ratio and the determined respective organometallic class and subclass, segment type, and segment number range form a characterization of the metal content and the chemical composition of the given crude oil, resulting in a display, as output to an end-user, of the formed characterization of the metal content and the chemical composition of the given crude oil. | 2016-06-09 |
20160162665 | METHOD FOR SELECTING SOLVENT FOR SOLUTION PROCESS USING SOLVENT GROUP INDEX AND SYSTEM USING SAME - The present invention relates to a method of selecting a solvent for solution process, and a system using the same. More particularly, the present invention relates to a method of selecting a solvent for solution process which can discriminate two or more solvents that exhibit different performance when they are applied to solution process, but which are difficult to discriminate with the conventional assessing method using Hansen Solubility Parameter (HSP). | 2016-06-09 |
20160162666 | Software Management in Dynamically Scalable Cloud Environment - A license manager includes a processor and non-transitory computer readable media having encoded thereon a set of instructions executable by the at least one processor to receive a request, from a virtual machine, to reserve an individual license of the set of authorized licenses for a vendor software instance, determine the availability licenses for the requested vendor software, register a unique identifier of the virtual machine in association with an available individual license, grant the individual license to the virtual machine, and prevent the granted individual license from concurrent use by other virtual machines or devices. | 2016-06-09 |
20160162667 | FUNCTION SETTING METHOD - A method of setting function includes first to fourth steps. The first step connects a recording medium to a first electrical apparatus having an optional function either disabled or temporarily enabled, the recording medium containing license information to enable the optional function. The second step allows first electrical apparatus to authenticate the license information. The third step, subsequent to the second step, enables the optional function of the first electrical apparatus. The fourth step, subsequent to the third step, records the optional function as having been authenticated in the license information. | 2016-06-09 |
20160162668 | LICENSE MANAGEMENT METHOD AND APPARATUS - A client apparatus determines whether a license system of an application is a node-locked system or a floating system when the application is activated. The client apparatus further determines whether a node-locked license is acquired if it is determined that the license system of the application is the node-locked system. The client apparatus initializes a user interface to display a license-required function in an enabled state if the node-locked license of the node-locked system is acquired or the license system is the floating system. The client apparatus initializes a user interface to display the license-required function in a disabled state if the node-locked license of the node-locked system is not acquired. | 2016-06-09 |
20160162669 | MEDIA CLIENT DEVICE AUTHENTICATION USING HARDWARE ROOT OF TRUST - A client device for media playback includes a user-installable media client application which implements the client-side of a digital rights management (DRM) system. The client device employs secure boot and verifies the user-installed application. The application is hardened against reverse engineering, and it utilizes a special API provided by the client device to tie into the secure boot, bridging the gap between the secure boot and the client-side of the DRM system contained within the application. | 2016-06-09 |
20160162670 | MANAGING AND TRACKING COMMANDS ASSOCIATED WITH A CHANGE ON A COMPUTER SYSTEM - A method, computer program product, and computer system for managing and tracking commands associated with a change on a managed computer system. The managed computer system receives a log-on of an administrator onto the managed computer system, determines the lockdown level of the managed computer system by querying a managing computer system, and retrieves a list of authorized commands under the lockdown level from the managing computer system. The managed computer system determines, by querying the managing computer system, whether an authorized change on the managed computer system exists. The managed computer system removes the lockdown level to receive from the managing computer system authorization of commands that have been locked down, in response to determining that the authorized change exists. The managed computer system sets the lockdown level with the authorized commands on the managed computer system, in response to determining that the authorized change does not exist. | 2016-06-09 |
20160162671 | MULTIPLE USER BIOMETRIC FOR AUTHENTICATION TO SECURED RESOURCES - Various embodiments are generally directed to the provision and use of multiple person biometric authentication systems. An apparatus including a processor element and logic executable by the processor component is disclosed. The logic is configured to cause the apparatus to receive information including an indication of a plurality of biometric measurements and generate a combined biometric indicator based in part on the plurality of biometric measurements. The combined biometric indicator can be generated using fuzzy hashing techniques. | 2016-06-09 |
20160162672 | RHYTHM-BASED USER AUTHENTICATION - The present invention is directed to an apparatus, a method, and a computer program product for authenticating a user based on a sequence of rhythmic inputs. The user via a mobile device provides one or more inputs (e.g., pushing a button, tapping a touchscreen, a biometric, or the like) to one or more sensors associated with the mobile device as an attempt of authorization. The one or more inputs may be provided in a rhythmic manner (e.g., provided in time with music). The present invention then compares the provided one or more inputs to one or more predetermined sequences of inputs that are associated with positive authentication of the user (e.g., a known password). The phone determines that the one or more provided inputs match one or more predetermined rhythmic sequences associated with positive authentication of the user and authenticates the user. | 2016-06-09 |
20160162673 | TECHNOLOGIES FOR LEARNING BODY PART GEOMETRY FOR USE IN BIOMETRIC AUTHENTICATION - Technologies for learning body part geometry are described. In some embodiments the technologies include systems, methods and computer readable medium for extracting biometric information from a body part of a user, such as the user's hand. In some instances the extraction is performed with the aid of a calibrated computer model of the body part in question. Body part information may be saved in a data structure for use as a biometric template. The Biometric authentication processes utilizing the technologies are also described. | 2016-06-09 |
20160162674 | METHOD AND APPARATUS FOR PROCESSING SENSOR DATA OF DETECTED OBJECTS - A system that incorporates teachings of the subject disclosure may include, for example, a method for detecting, by a system including at least one processor, a presence of an object from sensor data generated by a sensor device, retrieving, by the system, from a memory device a plurality of profiles biometrically descriptive of approved objects, asserting, by the system, an alarm responsive to determining from the sensor data that the detected object is not biometrically correlated to any of the plurality of profiles, classifying, by the system, the detected object as an authorized object responsive to determining from the sensor data that the detected object is biometrically correlated to at least one of the plurality of profiles, and notifying, by the system, at least one neighboring device responsive to asserting the alarm or responsive to classifying the detected object as the authorized object. Other embodiments are disclosed. | 2016-06-09 |
20160162675 | Biometric Receipt - An electronic device provides a tracking report to a computing device that is located remotely from the electronic device. The tracking report may include location information that identifies the geographical location of the electronic device, and device user information that identifies the user of the electronic device. The electronic device acquires location information for the tracking report through a location awareness capability such as a global positioning system. The electronic device acquires user identification information for the tracking report through a biometric scanning component, such as a finger print sensor or other device that senses biometric properties when a user is touching or in close proximity to the device. | 2016-06-09 |
20160162676 | METHOD, APPARATUS AND SYSTEM FOR GESTURE BASED SECURITY - A method, system, token and scanning device for gesture-based security are provided. The token includes an information storage module such as an RFID system or a microchip system of a contactless smart card, and a fiducial marker of the token, such as a unique optically recognizable pattern. The token scanning device includes a detection module configured for retrieving details from the information storage module, a motion tracking module for tracking a trajectory of the fiducial marker relative to the scanning device, and an authentication module for authenticating the token if the tracked trajectory matches sufficiently to a reference trajectory associated with the token. A user can authenticate a usage of the token such as a financial transaction by gesture-based motion of the token to match the reference trajectory. | 2016-06-09 |
20160162677 | PERFORMING AUTHENTICATION BASED ON USER SHAPE MANIPULATION - In one embodiment, an apparatus comprises: a first logic to receive a user selection of an authentication shape, the authentication shape to be displayed on a display of a system during a user authentication, associate at least one identity characteristic with each of a plurality of sides of the authentication shape, and receive a plurality of user indications each corresponding to a manipulation of the authentication shape to enable one of the plurality of sides of the authentication shape to be a prominent side of the authentication shape on the display; an encoding logic to encode an identification of the authentication shape, the at least one identity characteristic associated with each of the plurality of sides, and the plurality of user indications into an encoded value; a security logic to generate a secure authentication value based on the encoded value; and a secure storage to store the secure authentication value. Other embodiments are described and claimed. | 2016-06-09 |
20160162678 | VEHICLE AND METHOD OF CONTROLLING VEHICLE - A vehicle and a method of controlling the vehicle are provided. The vehicle includes an input device that is implemented as at least any of one or more hard keys and a jog shuttle that rotates or is inclined in at least one direction within the vehicle. The input device is configured to receive a command according to a manipulation. In addition, a storage unit is configured to store a combination of commands for the input device as a security pattern. A controller is then configured to perform user authentication based on whether a combination of commands input from the input device matches a security pattern previously stored in the storage unit. | 2016-06-09 |
20160162679 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR HIDING ACCESS TO INFORMATION IN AN IMAGE - Methods, apparatuses, and computer program products are herein provided for hiding access to information in an image. A method may include receiving user input indicating a desire of a user to magnify a region within an image to a level of magnification. The method may further include causing the region to be magnified to the level of magnification. The method may further include determining whether the region is associated with at least one of an application or information and determining whether the level of magnification satisfies a level of magnification threshold. The method may further include causing the at least one application to be launched or information to be opened in an instance in which the region is associated with the at least one of an application or information and the level of magnification satisfies the level of magnification threshold. Corresponding apparatuses and computer program products are also provided. | 2016-06-09 |
20160162680 | Login System And Method With Integrated Password And Verification Code - A login system and method with an integrated password and verification code are provided, in which an input frame and verification code are displayed on a login interface having a user message and the password and the verification code are prompted to be simultaneously keyed into the input frame, so that a key-in message may be decomposed into a password message and a verification message for a login verification use, whereby achieving the technical efficacy of an enhanced convenience of the login operation onto the login interface of a mobile device. | 2016-06-09 |
20160162681 | COMMUNICATION DEVICE AND QUICK SELECTION METHOD - A quick selection method executable on a touch screen communication device for quickly initiating communication includes designating a predetermined quick selection action and a quick selection region of the touch screen, choose one or more quick contacts from a list of previously entered contacts to initiate quick communication with, and performing the predetermined quick selection action on the predetermined quick selection region of the touch screen. | 2016-06-09 |
20160162682 | METHOD AND APPARATUS FOR MANAGING CONFIDENTIAL INFORMATION - The invention is a method and apparatus for managing the secure acquisition, storage and disclosure of confidential information, to facilitate identity rights management; and/or preemptively authorized data querying techniques to preserve the anonymity of disclosed personal data. | 2016-06-09 |
20160162683 | PASSIVE SECURITY OF APPLICATIONS - Example embodiments disclosed herein relate to performing a security function on an application based on processed passive user information. Applications are associated with a passive security engine. Passive user information is monitored via inputs. The passive user information is processed. A security function is performed for at least two of the applications based on the processed passive user information. | 2016-06-09 |
20160162684 | METHODS FOR ENABLING REAL-TIME DIGITAL OBJECT AND TANGIBLE OBJECT INTERACTIONS - A method for authorizing an electronic device to perform an action includes detecting interaction data from an interaction between a hardware sensor and an identity-augmented tangible object; wherein data of the first set of interaction data is intrinsically dependent on physical characteristics of the identity-augmented tangible device; computing parametric descriptors from the interaction data; transmitting the parametric descriptors and supplementary data to a remote database system; generating, on the remote database system, identity data from a comparison of parametric descriptors with a known set of parametric descriptors; and authorizing, in response to both of the identity data and the supplementary data, the electronic device to perform a first action. | 2016-06-09 |
20160162685 | MONITORING APPLICATION EXECUTION IN A CLONE OF A VIRTUAL COMPUTING INSTANCE FOR APPLICATION WHITELISTING - In a virtualized computer system, gray applications that are selected to be executed in a first virtual computing instance are executed and monitored in a second virtual computing instance that is a clone of the first virtual computing instance, and classified according to their monitored behavior. This process is conducted in real-time, in response to a notification that a gray application has been selected for execution in the first virtual computing instance. The execution of the gray application in the first virtual computing instance is delayed until the first virtual computing instance receives a notification from an application admission control manager that the gray application is safe to be executed in the first virtual computing instance. Although the execution of the gray application in the first virtual computing instance is delayed, all other processes running in the first virtual computing instance continue to their execution so that a user accessing the first virtual computing instance will not experience any downtime. | 2016-06-09 |
20160162686 | METHOD FOR VERIFYING INTEGRITY OF DYNAMIC CODE USING HASH BACKGROUND OF THE INVENTION - Disclosed are methods for verifying the integrity of a dynamic code using a hash and for generating a hash registry for the verification. Provided is the method for generating a hash registry for verification of the integrity of a dynamic code using a hash, comprising: a step for setting a security tag only for a specific function which is a part of program and requires security; a binary generation step for generating a binary by compiling a source code including at least one function to which the security tag is applied; a hash code extraction step for extracting a hash code for a code block of the specific function, if the binary is searched and the security tag is detected; and a hash registry generation step for generating a hash registry including the hash codes for at least one function generated in the has code extraction step. | 2016-06-09 |
20160162687 | ELECTRONIC ASSEMBLY COMPRISING A DISABLING MODULE - An electronic assembly for an electronic device may include a detection module to detect a security anomaly of a Rich-OS operating system and a disabling module to disable at least one secure function of the electronic device in response to the detection. The disablement nevertheless allows use of the electronic device in fail-soft mode. The electronic assembly may be implemented such that these two modules are dependent on a trusted operating system, and the trusted operating system and the Rich-OS operating system may be stored in a memory of the electronic assembly and executed on the electronic assembly. | 2016-06-09 |
20160162688 | SECURE APP UPDATE SERVER AND SECURE APPLICATION PROGRAMMING INTERFACE ("API") SERVER - A coupled set of servers in a server system protect an application programming interface (“API”) from unwanted automation facilitated by unauthorized reverse engineering of an endpoint app or communications channel used by the endpoint app. The server system comprises at least one secure app update server that transforms an app code object received from an enterprise app server into a transferred app code object, and at least one secure application programming interface (“API”) server that interacts with an endpoint device that executes the transformed app code object. The secure API is adapted to convert API requests made by the transformed app code object into renormalized API requests formatted for processing by an enterprise API server. The transforming of the app code object results in API requests from the client that would constitute invalid API requests if presented to the enterprise API server without renormalization. | 2016-06-09 |
20160162689 | Basic Input/Output System (BIOS) Security Display - Methods and systems for generating and using a BIOS security display include determining whether a change in a BIOS user setting is associated with security of an information handling system. When the BIOS user setting is associated with security, a security level for the BIOS may be calculated based on weighted security values for BIOS user settings. Security levels for boot phases may also be individually calculated. The security levels may be displayed in the BIOS to the user when the BIOS user setting is changed. | 2016-06-09 |
20160162690 | RECOMBINANT THREAT MODELING - Dynamically developing and maintaining threat models, threat landscapes and threat matrices are described. Specifically described are techniques on how to relate: (1) attack surfaces, (2) attack histories, (3) threats and (4) historical responses, by loading these four types of data, as well as other data, into a data store. One example data store disclosed includes some variations of a graph data structure. Upon loading the data, the populated data store may be used to develop Threat Models that will represent a Threat Landscape and a Threat Matrix. These may then be queried for recommended reactive and proactive responses with respect to an installation, in order to improve security. | 2016-06-09 |
20160162691 | SYMBOL STRING MATCHING MECHANISM - A two-stage, very fast symbol string matching mechanism measures the similarity of content between data sources, allowing for efficient detection and evaluation of exact as well as inexact matches. The disclosed approach pairs complementary encoding technique comprising a first fast lookup that identifies regions of possible similarity, and a second, more computationally intensive analysis that evaluates metrics of similarity and delimits copy boundaries. The original content remains private (encrypted) during processing. | 2016-06-09 |
20160162692 | Determining Whether a Data Storage Is Encrypted - A method, program and/or system reads a file through a first path from a data storage to obtain a first data. The file is read through a second path from the data storage to obtain a second data. The first data is compared to the second data. When the first data matches the second data, the file is determined not to be encrypted in the data storage. When the first data does not match the second data, the file is determined to be encrypted in the data storage. | 2016-06-09 |
20160162693 | AUTOMATED MANAGEMENT OF CONFIDENTIAL DATA IN CLOUD ENVIRONMENTS - A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality rating may be received. The confidentiality rating may indicate a level of confidentiality the data is associated with. The storage request with the data and the confidentiality rating may be received via a shared networked storage access interface by a security layer. The data to be stored by the key vault system and the confidentiality rating may be encrypted on request of the security layer and into a data container. The shared networked storage may be categorized into Cloud zones. Each Cloud zone may be assigned a trust level. The data container may be stored in one of the Cloud zones of the shared networked storage. The trust level of the one of the Cloud zones may correspond to the confidentiality rating. | 2016-06-09 |
20160162694 | INSTRUCTIONS PROCESSORS, METHODS, AND SYSTEMS TO PROCESS SECURE HASH ALGORITHMS - A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a | 2016-06-09 |
20160162695 | METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR DATA EXCHANGE - Presented are a method, apparatus, and computer-readable medium for data exchange. The method includes specifying, by a user equipment (UE), a first data, and creating, by the UE, a rule set, the rule set governing access to the first data. The method further includes uploading, by the UE, the first data with the rule set to a user selected server, the first data being accessible at the user selected server based on the rule set. | 2016-06-09 |
20160162696 | Camouflaged Communication Device - A transmission system is used in a method of transmitting a camouflaged transmission of signals by generating an underlying transmission comprising a plasma transmission discharge constituting background noise having a first amplitude and generating an embedded transmission of signals within the underlying transmission. | 2016-06-09 |
20160162697 | AUTOMATICALLY PREVENTING UNAUTHORIZED SIGNATORIES FROM EXECUTING ELECTRONIC DOCUMENTS FOR ORGANIZATIONS - In some embodiments, an electronic signature service automatically updates electronic documents to prevent execution by an unauthorized signatory. The electronic signature service can receive an electronic document to be electronically signed on behalf of an organization. The electronic signature service can retrieve organization data indicative of signatories that are authorized to electronically sign the electronic document. The organization data may be inaccessible to a first signatory that is associated with the document. The electronic signature service can determine from the organization data that the first signatory is not authorized to electronically sign the document. The electronic signature service can update the electronic document with a second signatory that is determined from the organization data as being authorized to execute the document. The electronic signature service can prevent the first signatory from executing the document and provide access to the electronic document by a computing device associated with the second signatory. | 2016-06-09 |
20160162698 | REGULATING ACCESS TO AND PROTECTING PORTIONS OF APPLICATIONS OF VIRTUAL MACHINES - Embodiments of apparatus, computer-implemented methods, systems, and computer-readable media are described herein for a virtual machine manager, wherein the virtual machine manager is configured to selectively employ different views with different permissions to map guest physical memory of a virtual machine of the apparatus to host physical memory of the apparatus, to regulate access to and protect different portions of an application of the virtual machine that resides in different portions of the physical memory. Other embodiments may be described and/or claimed. | 2016-06-09 |
20160162699 | OPTIMIZED ENCRYPTION FILTERING OF FILES - Read data blocks are selectively decrypted and write data bocks are selectively encrypted in an input-output path between an application and a file system driver. If a read data block contains all zeroes, the read data block is not decrypted even though the read data block is a block of an encrypted file. Likewise, if a write data block contains all zeroes, the write data block is not encrypted even though the write data block is a block of an encrypted file. In this manner, the handling of zero blocks of an encrypted file is efficiently processed outside the file system without relying on bitmaps or other data structure maintained by the file system that may inform which blocks contain all zeroes | 2016-06-09 |
20160162700 | METHOD FOR SHARING MULTIPLE DATA ITEMS USING A SINGLE URL - A way of sharing a set of data where each data item is stored at a different file path. The data items may be files or folders that reside on different remote storage servers or within the same file system. One or more data items in the set of data do not share a common root folder. Data items in the set of data that share a common root folder are stored amongst other data items in the common root folder that do not belonging to the set of data items to be shared. A single URL or link is generated to provide immediate access to the set of data to recipients of the URL or link. | 2016-06-09 |
20160162701 | Stack Fusion Architecture Including Distributed Software Clusters to Enable Software Communication Services - A stack fusion architecture enables a cloud provider to provide Software-as-a-Service (SaaS) offerings to multiple organizations. Each organization operates a Infrastructure-as-a-Service (IaaS) platform and is associated with an organization domain. A cluster of software/communication services is deployed to each platform. Users registered to an organization domain have access limited to the cluster uniquely associated with that domain. The architecture includes a globally accessible domain-to-cluster map used to map each cluster to the associated domain. A locally accessible user-to-cluster map is stored in each cluster to map that cluster to each user registered to the domain uniquely associated with that cluster. The architecture enables communication between users provisioned on different clusters and registered to different domains without exposing private information to the cloud provider. | 2016-06-09 |
20160162702 | MANAGING ACCESS PERMISSIONS TO CLASS NOTEBOOKS AND THEIR SECTION GROUPS IN A NOTEBOOK APPLICATION - A method of adding a co-teacher to an original teacher's class notebook can include, in response to receiving a request, at a client device, to add a co-teacher to a class notebook managed by a classroom notebook application, assigning the co-teacher full read/write permissions to the teacher's class notebook including any section groups having connected role inheritances. The co-teacher is also assigned full read/write permissions to the student-specific section groups and the collaboration space section group, which are all in the class notebook and which have broken permission inheritance. To protect the teacher's personal folder, which is a parent folder to the teacher's class notebook, the classroom notebook application removes the co-teacher's permissions to the teacher's personal folder. | 2016-06-09 |
20160162703 | SYSTEM AND METHOD FOR PROCESSING DOCUMENTS - A system and method for processing documents includes a first component for receiving document data of at least one document, authenticating a user and storing the received document data of the at least one document in a database when the authenticated user corresponds with a pre-specified or entitled user; a second component for receiving document data of at least one document, generating at least one document in a portable document format based on the received document data, authenticating a user, digitally signing and/or encrypting the at least one generated document in the portable document format, and storing the at least one digitally signed and/or encrypted document in the portable document format in a database when the authenticated user corresponds with a pre-specified or entitled user; and a third component for deciding whether the at least one document shall be processed either in the first component or in the second component. | 2016-06-09 |
20160162704 | METHOD AND APPARATUS FOR GENERATING PRIVACY PROFILES - A privacy processing system may use privacy rules to filter sensitive personal information from web session data. The privacy processing system may generate privacy profiles or privacy metadata that identifies how often the privacy rules are called, how often the privacy rules successfully complete actions, and the processing time required to execute the privacy rules. The privacy profiles may be used to detect irregularities in the privacy filtering process that may be associated with a variety of privacy filtering and web session problems. | 2016-06-09 |
20160162705 | APPARATUS AND METHOD FOR MANAGING HEALTH DATA - An apparatus and method for managing health data through a user terminal are provided. The method includes inputting a user terminal number for identifying the user terminal, and information of a medical instrument for measuring the health data to a management server interworked with the user terminal, receiving, by a receiver, a security type table mapped onto the user terminal number and comprising a security type code for instructing the health data which the medical instrument has measured to be stored in a first memory without security or in a second memory with security, from the management server, and storing the health data in the first memory or the second memory, which the security type code instructs, through determining the security type code of the security type table when the health data is received from the medical instrument. | 2016-06-09 |
20160162706 | METHOD FOR PROCESSING GEOLOCATION DATA - The present invention relates to a method for processing geolocation data, including the implementation, by means for processing data from a server, of the steps of: (a) transmitting a geolocation request to a mobile terminal including geolocation means; (b) receiving geolocation data from the mobile terminal; (c) associating said geolocation data with a unique identifier, itself associated with the mobile terminal, in a database stored in data storage means; (d) receiving a geolocation request transmitted by an application server, the request including said unique identifier associated with the mobile terminal; (e) generating and sending, to the application server, a response to the request depending on the geolocation data associated with the unique identifier in said data base, and on the rules associated with the application server. | 2016-06-09 |
20160162707 | AUTOMATIC APPLICATION DEPENDENT ANONYMIZATION - Disclosed are various embodiments for facilitating the anonymization of unique entity information. A service may send anonymized responses to requests for data from multiple requestors, the data being associated with entity identifiers. The anonymized responses may comprise the data requested in association with anonymous entity identifiers as opposed to the entity identifiers. | 2016-06-09 |
20160162708 | SEMICONDUCTOR INTEGRATED CIRCUIT - A logic circuit includes n storage elements (n is a positive integer) which can each store 1-bit information, and an attack detection circuit. The attack detection circuit includes an error determination circuit which can detect through a logic operation that k-bit or less errors (k is a positive integer) have occurred in n-bit codes stored in the n storage elements, and a light irradiation detection circuit which has light detection elements and can detect that light has been irradiated to (k+1) or more of the n storage elements, and it is determined that the logic circuit has been attacked from outside when the error determination circuit detects an error or the light irradiation detection circuit detects light irradiation. | 2016-06-09 |
20160162709 | 3D GRAPHICS SYSTEM - A 3D graphics system uses encryption keys to decrypt received and stored texture tiles of a texture in accordance with received and stored texture tile status data which indicates whether a texture tiles is encrypted or not and which one of the encryption keys is used. The decrypted texture tiles are rendered and at least a plurality of the rendered tiles is encrypted. The encrypted rendered tiles are stored in a frame buffer. Buffer tile status data is stored which indicates whether a rendered tile is encrypted or not before storage in the frame buffer, and which one of the encryption keys has been used. The encrypted rendered tiles stored in the frame buffer are decrypted in accordance with the buffer tile status data. | 2016-06-09 |
20160162710 | INFORMATION HANDLING OF ACCESS SECURITY - A method of effectuating access security includes sending authentication data with a specific lifetime from a mobile device to an information handling system. The information handling system includes a controller and a housing. The housing includes a chassis and a latch component, with the controller electrically coupled to the latch component. The method includes determining by the controller in accordance with the authentication data whether the mobile device is authorized to activate the latch component and activating the latch component by the controller to lock or unlock the housing in response to a determination that the mobile device is authorized to activate the latch component. | 2016-06-09 |
20160162711 | Data Storage and Access Systems - Data storage and access systems enable downloading and paying for data such as audio and video data, text, software, games and other types of data. A portable data carrier has an interface for sending and receiving data, data memory for storing received content data, and payment validation memory for providing payment validation data to an external device. The carrier may also store a record of access made to the stored content, and content use rules for controlling access to the stored content. Embodiments store further access control data and supplementary data such as hot links to web sites and/or advertising data. A complementary data access terminal, data supply computer system, and data access device are also described. The combination of payment data and stored content data and use rule data helps reduce the risk of unauthorized access to data such as compressed music and video data, especially over the Internet. | 2016-06-09 |
20160162712 | CARD READER - A card reader may include a card passage where a card inserted into an insertion port for the card is passed, a shutter member for closing the card passage, a magnetic head disposed on a rear side relative to the shutter member and structured to perform reading of magnetic data recorded in a magnetic stripe of the card and/or recording of magnetic data to the magnetic stripe, and a foreign matter detection mechanism which is structured to detect a foreign matter attached to the card passage. The foreign matter detection mechanism is disposed on a rear side relative to the shutter member and is disposed at a position in the width direction of the card where the magnetic stripe is passed. The foreign matter detection mechanism may be structured of an electrostatic capacitance sensor. | 2016-06-09 |
20160162713 | SYSTEMS AND METHODS FOR DRIVE CIRCUITS FOR DYNAMIC MAGNETIC STRIPE COMMUNICATIONS DEVICES - Dynamic magnetic stripe communications devices are provided as magnetic stripe emulators. A magnetic stripe emulator may include a coil. Drive circuits may be coupled to this coil in order to produce electromagnetic fields from the coil operable to communicate with a magnetic stripe reader. | 2016-06-09 |
20160162714 | ASSOCIATION OF PROCESSED ITEMS WITH PROCESS LOGS - A system for associating processed items with process logs, including a server computer for tracking the items and a tag reader positioned in the vicinity of a device for processing the items; wherein the items are marked with a tag that is readable with a tag reader; wherein the device produces a process log listing a commencement time of the process, a type of process performed and an indication if the process completed successfully; wherein the tag reader records identity information of the items inserted and/or removed from the device for processing; and wherein the process log and identity information are provided to the server computer to associate the processes recorded in the process log with the processed items to form tracking information for an item. | 2016-06-09 |
20160162715 | COMPARTMENTALIZED SMART REFRIGERATOR WITH AUTOMATED ITEM MANAGEMENT - A smart refrigerator system includes a plurality of compartments for storing food items and one or more tag readers. The smart refrigerator system may read a tag coupled to a food item using one of one or more tag readers. The smart refrigerator system may determine an identity of the food item, an associated date of the food item, and/or a compartment containing the food item. The smart refrigerator system may track item information that includes the identity of the food item, a state of the food item, and/or a compartment location of the food item. The smart refrigerator system may receive item usage information indicating when a user plans to use the food item and change a temperature of the food item. The smart refrigerator system may also generate a notification regarding freshness and/or a spoilage level of the food item and present it to the user. | 2016-06-09 |
20160162716 | Method and Apparatus for Fractal Identification of an Object - A method and system for applying and reading a fractal image to and from a plurality of objects to act as an identification label is provided. The system includes a printer for printing a fractal pattern to the plurality of objects and a reader for reading the printed fractal pattern. Such a fractal image is robust to printing and imaging difficulties and inconsistencies, and is difficult to copy, thus defending against counterfeiting. | 2016-06-09 |
20160162717 | OPTICAL INDICIA READING TERMINAL WITH COLOR IMAGE SENSOR - An optical indicia reading terminal can comprise a microprocessor, a memory, and an image sensor integrated circuit for decoding decodable indicia. The image sensor integrated circuit can be configured to output a plurality of digital signals, each digital signal being representative of light incident on at least one pixel of the two-dimensional image sensor. The optical indicia reading terminal can be configured to selectively acquire a plurality of luminance signals from the plurality of digital signals. Whether the output image data from the sensor is digitally stored as YUV data or YC | 2016-06-09 |
20160162718 | DYE RIBBON, IDENTIFYING DEVICE AND IDENTIFYING METHOD FOR IDENTIFYING PRODUCT INFORMATION OF THE DYE RIBBON - A dye ribbon, an identifying device and an identifying method for identifying product information of the dye ribbon are provided in the disclosure. The identifying method includes steps of moving the dye ribbon; emitting light to information interpretation pattern of the dye ribbon which is being moved; sensing the light transmitted through the information interpretation pattern, so as to generate a number of sensing signals corresponding to the information interpretation pattern; and identifying at least one set of product information of the dye ribbon in accordance with the sensing signals. | 2016-06-09 |
20160162719 | DEVICES HAVING AN AUXILIARY DISPLAY - A portable electronic device includes a housing, a first display operably coupled to the housing, and a second display operably coupled to the housing. A processor is operably coupled to the first display and to the second display. A wireless receiver is coupled to the processor for receiving data comprising, for example, an electronic ticket having machine-readable data, and the processor and the second display are operable to display of the machine-readable data. The second display is operable to display the machine-readable data such as a barcode with at least one of a lower reflectance, a higher resolution, and a higher contrast compared to display of the machine-readable data on the first display. | 2016-06-09 |
20160162720 | DECODING MACHINE-READABLE OPTICAL CODES WITH AESTHETIC COMPONENT - Techniques are provided for decoding machine-readable optical codes that have an aesthetic component that is integrated into the codes themselves. In this manner, the machine-readable optical codes can be designed to be aesthetically pleasing and/or can convey information to human viewers, and can even be disguised so that they do not appear to be machine-readable optical codes at all. Such information can be (but need not be) distinct from the information encoded for reading by a machine, even when the information is integrated into the code itself. The techniques described herein can be applied to any type of machine-readable optical code. | 2016-06-09 |
20160162721 | ELECTRONIC DEVICE WITH FINGERPRINT RECOGNITION CIRCUIT POWERED BY DEDICATED POWER SOURCE - An electronic device with fingerprint recognition circuit powered by dedicated power source includes a functional circuit, a plurality of fingerprint sensing electrodes, and a fingerprint sensing control circuit. The functional circuit is powered by a first power source. The fingerprint sensing electrodes are provided for sensing a contact of a finger. The fingerprint sensing control circuit is powered by a second power source which is different from the first power source. The fingerprint sensing control circuit is connected to the fingerprint sensing electrodes for driving the fingerprint sensing electrodes to sense the fingerprint, wherein there is no common current loop between the first power source and the second power source during an operation of fingerprint sensing. | 2016-06-09 |