24th week of 2017 patent applcation highlights part 47 |
Patent application number | Title | Published |
20170169172 | HAND-HELD SPHERICAL ANTENNA SYSTEM TO DETECT TRANSPONDER TAGGED OBJECTS, FOR EXAMPLE DURING SURGERY - A hand-held antenna system allows medical personnel to ascertain the presence or absence of objects (e.g., medical supplies) tagged with transponders in an environment in which medical procedures are performed. In use, the hand-held antenna system may be positioned proximate a patient at a time after a medical procedure, such as after child birth, so the system can scan the patient's body to determine the presence of objects tagged with transponders. The antenna system includes three antenna elements arranged mutually orthogonal to each other to transmit and receive signals in three coordinate directions. A controller is coupled to the antenna elements to transmit signals to the transponders and to receive response signals. The antenna system may operate in a static scan mode wherein the antenna system is held in a fixed position by a user and a dynamic scan mode wherein the antenna system is moved by a user. | 2017-06-15 |
20170169173 | SYSTEM FOR ADAPTING HEALTHCARE DATA AND PERFORMANCE MANAGEMENT ANALYTICS - Methods and systems for monitoring and managing healthcare performance. The system comprises one or more network interfaces configured to provide access to a network and one or more data processing servers coupled to the one or more network interfaces to enable communication with one or more healthcare manager devices. The one or more data processing servers to execute instructions to receive healthcare data from a plurality of data source devices over the network, extract patient medical data from the received healthcare data, group the patient medical data according to episodes of care, analyze the patient medical data to determine variances, generate prescriptive opportunity scripts to reduce the determined variances, add the prescriptive opportunity scripts to a playbook, and generate output corresponding to the analysis and the playbook to the one or more healthcare manager devices. | 2017-06-15 |
20170169174 | DETECTION OF FRAUD OR ABUSE - An example method includes receiving a first set of data identifying entities and performance information for analysis, receiving a second set of data identifying entities and performance information associated with known or suspected past fraud or abuse, receiving metric and lens selections, performing metric and lens functions based on the metric and lens selections on first and second set of data, generating cover of reference space and cluster mapped performance information to identify nodes in a graph, each node including one or more entities as members, each node being connected to another node if they share at least one common entity as members, identifying nodes that include at least one member from the second set of data, determining entities that are members of the identified nodes that are from the first set of data, and generating a first report listing the determined entities as possibly involved in fraud or waste. | 2017-06-15 |
20170169175 | PATIENT CARE MANAGEMENT SYSTEM - Embodiments for automated patient care management are provided by a platform. A patient application executes on a remote device and is configured to present patient data inquiries and, in response, receive patient data at the remote device. The patient data includes data of medication and physical condition. A provider application executes on the platform and is configured to receive and process the patient data from the remote device. The provider application and/or the patient application generates the patient data inquiries using information of the patient data reported during at least one prior session. Numerous provider dashboards include the patient data and controls for interacting with the corresponding patient and recording care data. The provider application, which includes the classification and care notifications on the provider dashboards, automatically controls classification of patients and generates care notifications based on the patient data. | 2017-06-15 |
20170169176 | CONNECTED MULTIFUNCTION MEDICAL DEVICE - A multifunction medical device includes a base unit. The base unit includes a plurality of first medical sensors for acquiring first health information, a first wireless radio for transmitting the acquired first health information and second health information to a healthcare entity, and a second wireless radio for receiving the second health information from an accessory device. The accessory device includes a second medical sensor for acquiring the second health information, and a third wireless radio for transmitting the acquired second health information to the second wireless radio of the base unit. | 2017-06-15 |
20170169177 | TREATMENT INTELLIGENCE AND INTERACTIVE PRESENCE PORTAL FOR TELEHEALTH - The present invention relates to a computerized system for and method of providing precision healthcare services such as consultation, education, assessment, diagnosis, intervention, or treatment at a distance via encrypted real-time image and audio presence where the healthcare professional's assessment, diagnosis, and intervention activities are informed by patient feedback, smart objects, and artificial intelligence and patient outcomes are optimized through recursive system feedback. The present invention is unlimited with regard to the type of patient entity or healthcare professional entity. | 2017-06-15 |
20170169178 | Methods, Systems, and Mediums for Identifying Changes to the Brain Profile of an Individual - The invention relates to computer-based methods, systems, and mediums for identifying a change to the cumulative characterization of certain brain performance data collected from an individual, wherein the collected brain performance data is directly related to how at least one of the individual's neuromotor or cognitive brain functions is performing, hereinafter such a cumulative characterization is referred to as the individual's “Brain Performance Profile”. The computer-based methods, systems, and mediums of the present invention identify and monitor changes in an individual's Brain Performance Profile by employing a computer system which is programmed and configured to perform at least the following tasks: to compute an individual's Normal Brain Performance Profile through the implementation of a test session taken at least two separate times; to compute the individual's Current Brain Performance Profile through the implementation of the test session taken at a time after their Normal Brain Performance Profile has been computed; and, to calculate whether a change to the individual's Brain Performance Profile has occurred through a mathematical manipulation of their Normal Brain Performance Profile and their Current Brain Performance Profile. | 2017-06-15 |
20170169179 | Multimarker Risk Stratification - Measurement of circulating ST2 and natriuretic peptide (e.g., NT-proBNP) concentrations is useful for the prognostic evaluation of subjects, in particular for the prediction of adverse clinical outcomes, e.g., mortality, transplantation, and heart failure. | 2017-06-15 |
20170169180 | SITUATION-DEPENDENT BLENDING METHOD FOR PREDICTING THE PROGRESSION OF DISEASES OR THEIR RESPONSES TO TREATMENTS - A method of predicting progression of a disease in a patient includes selecting a physiological parameter of interest and a range of inputs for a set of individual predictive disease models; running, using a processor, the set of individual predictive disease models with the range of inputs to obtain an estimate from model; identifying experimental observations; identifying critical parameters among the estimates of the physiological parameters of interest, the critical parameters exhibiting a specified correlation with an error in estimation of the physiological parameters of interest; obtaining, for each subspace of all possible combinations of critical parameters, a model based on blending the estimates so that the blended prediction best fits the experimental observations; and determining a prediction to predict disease progression or response to a treatment for the patient using the blended model. | 2017-06-15 |
20170169181 | Patient-Case Sorting Method for Medical Procedures - The present invention provides a method to stratify patient-cases based on acuity for patient care performed outside of the hospital setting. Using medical code combinations, diagnostic code information, and patient demographic data, the method sorts and ranks patient cases to determine the level of acuity and predicts whether a hospital admission or hospital observation is prevented. The invention presents a program that uses patient-case information recorded by care-givers and accumulated over the course of an observation period. The method analyzes patient-case data and categorizes the observed patient-cases. Once categorized, the extent of successful emergency room diversion can be assessed. In addition to showing the number of patient-cases diverted from the emergency room, using market data comparisons, cost savings reports can be generated quantifying the total estimated savings over a reporting period based on prevented hospital admissions and observations. Other benefits relating to the method are disclosed herein. | 2017-06-15 |
20170169182 | GEOGRAPHIC UTILIZATION OF ARTIFICIAL INTELLIGENCE IN REAL-TIME FOR DISEASE IDENTIFICATION AND ALERT NOTIFICATION - Systems and methods for generating a diagnosis are provided. In some aspects, a computing device receives medical information for a patient, wherein each medical information item in the medical information comprises a date, a source, and a medical state. The computing device constructs, in a memory of the computing device, a diagnosis tree for the patient, wherein the diagnosis tree comprises a patient node, the patient node having first children nodes corresponding to the dates or the sources, and the first children nodes having second children nodes corresponding to the medical states. The computing device generates a diagnosis for the patient using the constructed diagnosis tree. | 2017-06-15 |
20170169183 | QUANTITATIVE ASSESSMENT OF DRUG RECOMMENDATIONS - Embodiments are directed to a computer implemented method of assessing a relevancy of a drug to a disease state of a patient. The method includes assessing an impact of the drug on driver genes (DGs) of the disease state of the patient, assessing an impact of the drug on druggable target genes (DTs) of the drug, and assessing the relationship between the DGs and DTs that are in one of a plurality of biological pathways of the disease state of the patient. The method further includes combining the impact of the drug on the DGs, the impact of the drug on the DTs, and the relationship between the DGs and DTs that are in the one of the biological pathways, wherein the combining results in an assessment of the relevancy of the drug to the disease state of the patient. | 2017-06-15 |
20170169184 | METHODS AND APPARATUS FOR MONITORING AND/OR REGULATING MEDICAMENT AND MEDICAMENT DISPENSATION - Some embodiments are directed to a system for monitoring an inhaler that includes a volume of medicament for dispensation to an individual. The system includes a transmitter, disposed at the inhaler, for wirelessly transmitting data relating to the aspect of the inhaler. A monitor, which is remote from the transmitter and the inhaler, includes a receiver for receiving the data wirelessly transmitted from the transmitter, the data relating to the aspect of the inhaler including positional data relating to a relative position of the inhaler relative to the monitor and in particular a distance separating the inhaler and the monitor. The monitor also includes a processor for determining whether the distance separating the inhaler and the monitor exceeds a predetermined distance, the processor causing actuation of a notification device upon determining that the distance separating the inhaler and the monitor exceeds the predetermined distance. | 2017-06-15 |
20170169185 | Robust Health Tracking Service - A solution is provided to monitor and to analyze a user's medicine consumption related to a prescribed therapeutic regimen or a prescribed medication anywhere and anytime through a variety of sensors attached to a health tracking device, e.g., a pillbox. A health tracking service analyzes the sensor data collected by the sensors of the pillbox, e.g., by correlating the sensor data with selected historical health data of the user, and generating health related suggestions for the user based on the correlation. The analysis, recommendations and instructions are presented in a user friendly way to users on users' various consumer electronic devices, such as computers, mobile devices, television sets, and any other suitable electronic devices. | 2017-06-15 |
20170169186 | SYSTEM AND METHOD FOR PRESCRIPTION DRUG MANAGEMENT - A system is provided. The system includes a central server. The central server houses medical information on a patient. The central server may be in communication with a plurality of computing systems. The plurality of computing systems may be configured with a user interface. The user interface enables a plurality of stake holders to view, add, retrieve, and edit medical information on a patient in the central server. The central server may be configured for analysing and managing the medical information on the patient and for sending prescription drug management and medication compliance alerts to the different stake holders in reference to the medical information of the patient. | 2017-06-15 |
20170169187 | STICK PACK PACKAGING WITH INTEGRATED CIRCUIT - A stick pack having a top sealed portion with a top edge, a horizontal notch parallel with the top edge and passing through the stick pack, and further including a horizontal perforation line parallel with the top edge. The stick pack also has a bottom edge portion with a bottom sealed edge, a longitudinal seal extending from the top sealed edge to the bottom edge; an integrated RLC circuit; and a spout formed at least partially in the top sealed portion but not extending past the top sealed edge. The stick pack is configured to be folded along its longitudinal axis to fold the notch, and only when the notch is folded can a user easily tear the top sealed edge along the horizontal perforation line to expose the spout. | 2017-06-15 |
20170169188 | Method And Apparatus For Dispensing Medicaments - A pharmacy workflow platform and prescription checking and medicament dispensing station and method comprising (a) script display means; (b) scanning means for providing script data and stock bottle label data in electronic format from the prescription and a stock bottle label; (c) CPU means comprising i) means for receiving and storing the script data and stock bottle data in electronic format; ii) means for transferring the script data to the script display means to effect display of the script; means cooperable with medicament dispensing weighing and counting means; (d) medicament-dispensing weighing means in communication with the CPU means;; and (e) control means for controlling the CPU means. Medication is dispensed in a more safe, efficient and cost-effective manner. | 2017-06-15 |
20170169189 | METHOD AND APPARATUS FOR RECEIVING NUTRITIONAL INFORMATION VIA A NETWORK - A method and apparatus for receiving nutritional information are disclosed. For example, the method receives a profile of a user, receives over the communications network, grocery information on one or more grocery items at one or more locations of the user, receives over the communications network, ingestion information on ingestion by the user of at least one grocery item from the one or more grocery items, generates nutritional information, wherein the nutritional information is determined by performing an analysis based on the profile of the user, the grocery information, and the ingestion information, and provides over the communications network, the nutritional information, to an endpoint device of the user. | 2017-06-15 |
20170169190 | HEALTH COACHING SYSTEM BASED ON USER SIMULATION - In an embodiment, an apparatus ( | 2017-06-15 |
20170169191 | MONITORING TREATMENT COMPLIANCE USING PATIENT ACTIVITY PATTERNS - Methods and systems for monitoring compliance of a patient with a prescribed treatment regimen are described. Patient activity is detected unobtrusively with an activity sensor at the patient location, and activity data is transmitted to a monitoring location. Patient speech detected during use of a communication system such as a mobile telephone by the patient may also be used as an activity signal. Patient activity and/or speech is processed at the patient location or monitoring location to identify activity parameters or patterns that indicate whether the patient has complied with the prescribed treatment regimen. The activity sensor and other components at the patient location may be incorporated into, or associated with, a cell phone, computing system, game system, or vehicle system, for example. The system may provide a report to an interested party, for example a medical care provider or insurance company, regarding patient compliance with the prescribed treatment regimen. | 2017-06-15 |
20170169192 | INSERTING STRUCTURED CONTENT IN ITEMIZED REPORTS - The present application relates to a system and method for inserting structured content into template-based documents including retrieving one or more information objects queried from a database, detecting one or more paragraph identifiers in a document, mapping the one or more information objects to the detected one or more paragraph identifiers, automatically inserting the mapped information objects into the paragraph identifiers, and displaying the document with the one or more information objects inserted into the detected one or more paragraph identifiers. | 2017-06-15 |
20170169193 | VERIFIED PATIENT DATA COLLECTION SYSTEM - A verified patient data collection system configured to aggregate and provide verified patient feedback is presented. The verified patient data collection system comprises a data store comprising patient data and provider data. The verified patient data collection system also comprises a data processing system. The data processing system is configured to generate a patient survey to a verified patient, using survey generation logic. The data processing system is also configured to analyze a survey response from the verified patient, using response analyzer logic to generate the verified patient feedback. The verified patient data collection system also comprises a response data store configured to store the analyzed survey response, verified patient feedback, and a searchable response index. In response to a request for feedback, the data processing system is also configured to, using surfacing logic, search the response index and provide the verified patient feedback. | 2017-06-15 |
20170169194 | METHOD AND SYSTEM FOR PROVIDING SECURE CODECS - A system and method is arranged to provide compression and decompression of digital content in a secure manner. The system is configured to authenticate a source of the digital content, and to further determine a consumer's entitlements and rights for access to the digital content. Based upon the determined entitlements and rights for access, the system is directed to decrypt, and decompress the digital content. In one embodiment, a component of the system is enabled to establish a trust relationship with at least one other component of the system, to minimize an opportunity for piracy of the digital content. In another embodiment, a secure clock is directed to provide protection against hackers that may employ an in-circuit emulator, or the like. | 2017-06-15 |
20170169195 | TECHNIQUES FOR GRANULAR LICENSING - Techniques and architectures for granular licensing in a computing environment having access to an app exchange that provides a listing of multiple apps available to a remote client electronic device in response to a download request. A registration request corresponding to a software package having multiple modules is received. A license definition is transmitted from the management entity. The license definition includes a license for one or more of the multiple modules. The software package and license definition are registered with the management entity, so that only authorized management entities can store license definitions or grant licenses. The license definitions are stored in a memory associated with the management entity. One or more licenses are transmitted to a client electronic device. The one or more licenses correspond to one or more of the multiple modules of the software package that the client electronic device is authorized to utilize. The client electronic device is capable of acquiring the software package from the app exchange. The one or more licenses are capable of authorizing the client electronic device to utilize the one or more licensed modules. | 2017-06-15 |
20170169196 | DEVICE AND METHOD FOR EXECUTING PROTECTED IOS SOFTWARE MODULES - A device comprising a hardware processor and memory storing an application of an application package comprising a first version and a second version of the application, the first version being intended to be executed on a genuine device and the second version on a jailbroken device. The hardware processor determines a jailbreak status of the device, i.e. genuine or jailbroken and derives a key based on at least the jailbreak status. In case the device is genuine, the hardware processor deciphers using the key at least a first part of the first version and executes, the first version using the first deciphered part, for example a jump table used to execute CFG flattened code. In case the jailbreak status is jailbroken, the hardware processor deciphers using the key at least a first part of the second version and executes the second version using the second deciphered part, for example comprising executable instructions. | 2017-06-15 |
20170169197 | METHOD FOR CUSTOMIZING RESTRICTED DESKTOP ON MOBILE TERMINAL AND MOBILE TERMINAL THEREOF - Disclosed are a method for customizing a restricted desktop on a mobile terminal and the mobile terminal thereof. The method includes: pre-configuring a customized restricted desktop application, and setting, upon successful password verification from the customized restricted desktop application, at least one guest desktop in the customized restricted desktop application; entering the guest desktop for the mobile terminal user failing to pass the password verification from the customized restricted desktop application uses, and, unrestrictedly entering, upon successful password verification of the customized restricted desktop application, any desktop of the customized restricted desktop application, for the mobile terminal user having the password of the customized restricted desktop application, wherein the any desktop of the customized restricted desktop application comprising a normal desktop. According to the present disclosure, privacy of a user may be well protected while guest's use requirements are satisfied. | 2017-06-15 |
20170169198 | GENERATION OF RANDOMIZED PASSWORDS FOR ONE-TIME USAGE - An electronic device dynamically generates a password for one-time only usage. The one-time password is constructed by placing, in a random sequential order: (i) several randomly chosen digits and (ii) several digits, which are randomly selected from personal identification numbers, which were previously provided by an authorized user. The current user of the device is presented with a natural-language password hint, which describes the sequence of digits in the password. Only the authorized user knows the personal identification numbers; and so is able to construct, on-the-fly, the one-time password, and present that password to the device. The password hint may be presented aloud, in audio form, and the password may be entered into the device via speech. If someone nearby hears the hint and/or the password, they cannot use it at a later time to gain device control or data access, since the password is only valid the one time. | 2017-06-15 |
20170169199 | SWIPE MECHANISM - A device can include a processor; memory operatively coupled to the processor; a touchscreen display operatively coupled to the processor; a sensor operatively coupled to the processor; and instructions stored in the memory and executable by the processor to render targets to the touchscreen display, receive, via the touchscreen display, pattern information associated with the targets, receive sensor information via the sensor, and transition the device from a locked state to an unlocked state based at least in part on stored pattern information, the received pattern information and the received sensor information. | 2017-06-15 |
20170169200 | METHOD AND APPARATUS FOR UNLOCKING THE LOCKED STATE OF A LOST MOBILE TERMINAL - The present disclosure provides a method and electronic device for unlocking a mobile terminal in a loss lock state. The method includes: creating a wifi open button on a home page of the mobile terminal in the loss lock state; receiving a triggering instruction of a user for the wifi open button and opening a wifi setting page; establishing a network connection according to setting Information inputted by the user on the wifi setting page; receiving an unlocking password inputted by the user and uploading the unlocking password to a server for verification through wifi; and unlocking the mobile terminal in the loss lock state, if the verification is successful. With the disclosure, after the mobile terminal is locked and the data is cleared, the user can directly configure a wifi network and unlock the locked mobile terminal using the wifi network when no Sim card exits in the mobile terminal or a mobile data network of the Sim card is unavailable, so that the user can unlock the mobile terminal simply and quickly. | 2017-06-15 |
20170169201 | Dynamic Instruction Processing Method, Dynamic Instruction Processing Apparatus, and Terminal - The present invention provides a dynamic instruction processing method used for a terminal. The terminal includes multiple operating systems. The dynamic instruction processing method includes: when a dynamic instruction acquisition request sent by a specified application program in a specified operating system among the multiple operating systems is received, generating a target dynamic instruction; and acquiring the generated target dynamic instruction, and performing a corresponding authentication operation by using the target dynamic instruction. Correspondingly, the present invention further provides a dynamic instruction processing apparatus and a terminal. | 2017-06-15 |
20170169202 | METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA - A method of capturing biometric data is provided that includes calculating, by a terminal device, an angle between a surface of the terminal device and an X-axis of the terminal device. When the angle is other than ninety degrees, a prompt is displayed on the terminal device that is designed to cause a terminal device user to adjust the position of the terminal device into an optimal position. After adjusting the position of the terminal device, the terminal device calculates the angle and when the angle is ninety degrees the terminal device captures biometric data from the user. | 2017-06-15 |
20170169203 | ROBOT-HUMAN INTERACTIVE DEVICE, ROBOT, INTERACTION METHOD, AND RECORDING MEDIUM STORING PROGRAM - An authenticator of an interactive device authenticates a user. A speech urger urges the user to speak when the authenticator unsuccessfully authenticates the user. An interaction controller performs interaction according to the authenticated user when the authenticator successfully authenticates the user by voice of the user urged to speak. | 2017-06-15 |
20170169204 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 2017-06-15 |
20170169205 | CONTROLLING PRIVACY IN A FACE RECOGNITION APPLICATION - Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context. | 2017-06-15 |
20170169206 | CONTROLLING PRIVACY IN A FACE RECOGNITION APPLICATION - Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context. | 2017-06-15 |
20170169207 | User Identification Based on the Motion of a Device - Disclosed herein are embodiments for user identification based on the motion of a device. An embodiment operates by detecting a motion of a remote control. The detected motion is compared with one or more stored motions. A user ID corresponding to the motion based on the comparison is determined. Access to a system is provided based on the determined user ID. | 2017-06-15 |
20170169208 | METHODS AND SYSTEMS FOR VALIDATING AN AUTONOMOUS SYSTEM THAT INCLUDES A DYNAMIC-CODE MODULE AND A STATIC-CODE MODULE - Disclosed herein are methods and systems for validating an autonomous system that comprises a static-code module and a dynamic-code module, the method including the steps of performing a code-integrity-validation process on the static-code module and performing a behavior-integrity-validation process on the dynamic-code module. In some embodiments, performing the code-integrity-validation process on the static-code module includes performing a signature-verification process on the static-code module. In some embodiments, performing the behavior-integrity-validation process on the dynamic-code module includes using an encrypted-and-signed test vector. In some embodiments, performing the behavior-integrity-validation process on the dynamic-code module includes selecting a test vector from among a plurality of test vectors, generating a modified test vector at least in part by modifying the selected test vector, and performing the behavior-integrity-validation process on the dynamic-code module using the modified test vector. | 2017-06-15 |
20170169209 | IMPLEMENTING EXTENT GRANULARITY AUTHORIZATION PROCESSING IN CAPI ADAPTERS - A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator Processor Interface (CAPI) adapter. An Application Client requests authorization to a File from a system processor file system. The file system validates the request, determines the location of each Extent that comprises the File, and requests authorization to each Extent from a System CAPI Authorization manager. The System CAPI Authorization manager requests the CAPI Client manager to assign a Child Client ID and CAPI Server Register range to the requesting Application Client and requests a previously authorized CAPI Parent Client to authorize the Child ID to the list of Extents. The CAPI Parent Client sends a Create Authorizations command to the CAPI Adapter via the Parent's CAPI Server Registers. The CAPI Adapter validates the Parent Authorization Handle and CPI Server Register range for the specific Extent/Command/Resource, and creates an Authorization List by assigning a new Child Authorization Handle for each requested, validated Extent/Command/Resource. The Authorization List and the Child Client ID are returned to the File System. | 2017-06-15 |
20170169210 | DETECTING USER CREDENTIALS FROM INPUTTED DATA - A system for detecting user credentials comprising an interface and a processor. The interface is configured to receive a plurality of data chunks. The processor is configured to determine a number of continuous bytes in the plurality of data chunks having appropriate values and, in the event that the number of the continuous bytes is greater than or equal to a threshold number of bytes, determine whether continuous byte data of the continuous bytes comprises a credential. | 2017-06-15 |
20170169211 | ONE KIND OF WEBSITE PASSWORDS GENERATING METHOD AND APPARATUS - A method and electronic device for generating a website password are provided. The method for generating a website password includes: receiving a key, a domain name of a website, and a username on the website entered by a user, receiving a password setting rule of the website from the user or acquiring a password setting rule of the website; and performing computation on the following items to automatically generate a unique and constant website password for the user: the key, the domain name of the website, the username on the website, and the password setting rule of the website. With the method and electronic device for generating a website password, a unique and constant website password may be automatically generated for the user. | 2017-06-15 |
20170169212 | SECURITY ENFORCEMENT IN THE PRESENCE OF DYNAMIC CODE LOADING - A method (and structure) for enforcing a security policy includes retrieving from a memory a program to be verified against a security policy and a security specification defining the security policy. A static program analysis is performed on the program, using a processor on a computer, to determine whether the program is compatible with the security specification. The program is rejected if the program is determined by the static program analysis as being incompatible with the security specification. If the program is determined during the static program analysis as compatible with the security specification under static analysis criteria, then building a call-graph representation of the program for use to evaluate any dynamically-loaded code during an execution of the program. Any paths, if any, of the call-graph representation that reach at least one policy-relevant operation is marked. | 2017-06-15 |
20170169213 | ELECTRONIC DEVICE AND METHOD FOR RUNNING APPLICATIONS IN DIFFERENT SECURITY ENVIRONMENTS - Disclosed is an electronic device, including a processor for running a plurality of applications in different security environments; a display unit for displaying the plurality of applications; an input device that operatively initiates an application to be run by the processor; wherein the processor operatively: detects initiation of the application; determines a security level for running the application; selects a security environment from a plurality of security environments based on the determined security level, the security environments providing different security levels; and runs the application in the selected security environment. Other aspects are described and claimed | 2017-06-15 |
20170169214 | DISTANCE AND METHOD OF INDEXING SANDBOX LOGS FOR MAPPING PROGRAM BEHAVIOR - Systems and methods index and search log files created after execution of binaries. A plurality of log files each have one or more sequences. An index tree is created for the log files. A first log file is placed into a bucket of the index tree according to the lengths of the one or more sequences of the first log file. Remaining logs files are placed the index tree according to their respective sequence lengths. Each log becomes a representative in the bucket or associated with a representative in the bucket. The index tree can be searched, where an incurred distance and a remaining distance is maintained during the search. Nodes are pruned based, at least in part, on the incurred distance and the remaining distance. | 2017-06-15 |
20170169215 | IDENTIFICATION OF MISLABELED SAMPLES VIA PHANTOM NODES IN LABEL PROPAGATION - Systems and method identify potentially mislabeled file samples. A graph is created from a plurality of sample files. The graph includes nodes associated with the sample files and behavior nodes associated with behavior signatures. Phantom nodes are created in the graph for those sample files having a known label. During a label propagation operation, a node receives data indicating a label distribution of a neighbor node in the graph. In response to determining that the current label for the node is known, a neighborhood opinion is determined for the associated phantom node, based at least in part on the label distribution of the neighboring nodes. After the label propagation operation has completed, differences between the neighborhood opinion and the current label distribution for nodes are determined. If the difference exceeds a threshold, then the current label may be incorrect. | 2017-06-15 |
20170169216 | COMPILER ASSISTED PROTECTION AGAINST ARBITRARY CODE EXECUTION - A method, computer program product, and computer system are provided. A processor receives an executable file for execution by an operating system, where the executable file includes a plurality of sections in a first order. A processor determines a second order that indicates a loading order for the plurality of sections, where the second order is distinct from the first order. A processor loads the plurality of sections of the executable file into a plurality of locations in memory of a device based on the second order. A processor resolves one or more memory references for the plurality of sections based on the plurality of locations in memory. A processor executes the plurality of sections of the executable file in the plurality of locations in memory. | 2017-06-15 |
20170169217 | ATTACK PATTERN FRAMEWORK FOR MONITORING ENTERPRISE INFORMATION SYSTEMS - Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving parameters defining a detection technique, an attack scenario, and detection logic, receiving configuration data that is specific to a target system that is to be monitored, providing an attack pattern based on the parameters and the configuration data, monitoring the target system based on the attack pattern and data provided by one or more logs of the target system, and selectively generating, based on monitoring, an alert indicating a potential end-to-end intrusion into the target system. | 2017-06-15 |
20170169218 | ELECTRONIC DEVICE AND METHOD OF OPERATING THE SAME - Provided is an electronic device including a sensor configured to detect a power-off input regarding the electronic device; a processor; a memory for storing one or more programs and the processor being configured to execute the one or more programs, wherein the one or more programs include instructions for, when the power-off input is detected, monitoring opening of resources included in the electronic device by at least one process and, if a resource to be used by the at least one process is an important resource, preventing the resource from being opened. | 2017-06-15 |
20170169219 | CONTROL DEVICE, INTEGRATED INDUSTRIAL SYSTEM, AND CONTROLMETHOD THEREOF - A control device of an integrated industrial system which is established in a plant, the control device includes a defender configured to perform a countermeasure of restricting at least a part of functions of a self-device, based on a detection result of a detector which detects a cyber-attack from at least one of inside and outside to the integrated industrial system. | 2017-06-15 |
20170169220 | MULTI-TOPOLOGY LOGIC GATES - An RMTL gate includes at least two logic blocks, where at least one of the logic blocks operates in multiple modes. The respective logic block mode(s) are selected by a topology selector which applies mode control signals to the logic blocks in order to obtain a selected topology for logic circuit operation. RMTL logic gates may be cascaded and/or interconnected to form an RMTL logic circuit with multiple logic gates which may operate with dynamically varying topologies. Use of random, semi-random or specified control sequences may protect the logic circuit against security attacks. | 2017-06-15 |
20170169221 | EMBEDDED SYSTEM - An embedded system wherein the system includes a computer, a watchdog, and an electrical power supply. The computer is electrically connected to the power supply. The power supply is connected in terms of measurement to the watchdog. The watchdog is configured in such a way that the watchdog measures a power consumption of the computer, ascertains a first power signature on the basis of the power consumption, carries out a comparison of the first power signature with a specified second power signature, and introduces specified measures if the comparison fails. | 2017-06-15 |
20170169222 | Hacking-Resistant Computer Design - A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal computer, smartphone, or any other computing device suitable for network communication, comprises a first partition and a second partition. The second partition can communicate over a network such as the Internet. In contrast, the first partition cannot connect to the Internet, and can directly communicate only with the second partition or with input/output devices directly connected to the first partition. Further, the first partition segments its memory addressing for program code and hardware-protects it from alteration. The second partition is hardware-limited from reading or writing to the memory addressing of the first partition. As a result, the critical data files and program code stored on the first partition are protected from malicious code affecting the second partition. | 2017-06-15 |
20170169223 | DETECTION SYSTEM AND METHOD THEREOF - A detection system and method thereof are provided. The detection method comprises the following steps: decompiling a first application package file to generate a plurality of first decompiled files, and the first decompiled files comprising a first decompiled code; comparing the first decompiled code with a second decompiled code of a second application package file to analyze a different code segment between the first decompiled code and the second decompiled code; classifying a changed code type corresponding to the different code segment according to a function call flow of the first decompiled code; loading a correspondence table and selecting at least one detection rule corresponding to the changed code type in the correspondence table; confirming a detection region of the first decompiled code according to the at least one detection rule; and detecting the detection region to generate a security detection result. | 2017-06-15 |
20170169224 | APPARATUS AND METHOD FOR DETECTING MALICIOUS MOBILE APP - An apparatus for detecting a malicious app. The apparatus may include a collector to collect a mobile app, a static analyzer to extract basic information from the collected mobile app, analyze the basic information of the extracted mobile app, and generate a call flow graph (CFG) of the mobile app, a dynamic analyzer to execute the collected mobile app, expand the CFG of the mobile app, generated by the static analyzer, to a dynamic action-based CFG, and determine a similarity between the expanded CFG and a flow graph that performs a malicious action, and a malicious app determiner to determine whether the collected mobile app is malicious by analyzing the basic information, the CFG, the call flow graph, and the similarity. | 2017-06-15 |
20170169225 | METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHIC SECURE COMMUNICATIONS TERMINAL OPERABLE IN A PLURALITY OF LANGUAGES - Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the secure boot device, the operating system in a first language and receiving a selection of a second language different from the first language within a user interface of the operating system. The method further includes performing a desktop reset to execute the operating system in the second language. | 2017-06-15 |
20170169226 | METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHIC SECURE COMMUNICATIONS TERMINAL OPERABLE TO PROVIDE A PLURALITY OF DESKTOP ENVIRONMENTS - Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the secure boot device, the operating system in a first language and receiving a selection of a second language different from the first language within a user interface of the operating system. The method further includes performing a desktop reset to execute the operating system in the second language. | 2017-06-15 |
20170169227 | METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHIC SECURE COMMUNICATIONS TERMINAL PROVIDING A REMOTE DESKTOP ACCESSIBLE IN SECURED AND UNSECURED ENVIRONMENTS - Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance. Further, the method comprises receiving, from the service appliance a destination address of a secure gateway device connected to the enterprise network and community of interest keys and filters based on the authenticated credentials; and establishing a cleartext communication channel with the secure gateway device, thereby allowing communication between the computing system and one or more trusted endpoints within the secure enterprise network. | 2017-06-15 |
20170169228 | MACHINE-CHECKABLE CODE-ANNOTATIONS FOR STATIC APPLICATION SECURITY TESTING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving source code and an indication that a portion of the source code is insecure. Receiving an annotation to the source code that identifies the indication as being a false positive indication. The annotation includes a logical statement showing that the portion of the source code is not insecure, where the logical statement can be executed by a processor to prove that the portion of the source code is not insecure. Processing the annotation to determine whether the logical statement proves that the portion of the source code is not insecure. In response to determining that the logical statement proves that the portion of the source code is not insecure, retaining the annotation in the source code, and removing the indication that the portion of the source code is insecure. | 2017-06-15 |
20170169229 | VULNERABILITY ANALYSIS OF SOFTWARE COMPONENTS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving an application developed by a first vendor. Processing the application, by performing a byte-code analysis of the application, to: identify a plurality of software components used by the application that were developed by vendors other than the first vendor, and provide a list of third-party software components associated with the application, the list including each of the identified software components. determining, for each software component included in the list, whether the software component has a vulnerability and, if so, selectively providing code to correct the vulnerability of the software component. | 2017-06-15 |
20170169230 | Intelligent Threat Modeling and Visualization - A computer-implemented system is provided for visualizing and analyzing security threats in a suite of software applications. The system includes a visualization module for rendering, on a computer display, a map with components representative of the suite of software applications and relationships among the software applications. The components are displayed in a base layer of the map. The system also includes a threat modeling module configured to automatically identify one or more security threats in the suite of software applications. The threat modeling module is adapted to interact with the visualization module to graphically depict on the computer display the one or more security threats on the map in a threat modeling layer. The system further includes a security controls module configured to implement security controls for mitigating the one or more security threats identified by the threat modeling module. | 2017-06-15 |
20170169231 | TECHNOLOGIES FOR ENHANCED USER AUTHENTICATION USING ADVANCED SENSOR MONITORING - Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful authentication, analyze sensor data to determine whether it is likely that the user authenticated under duress. If so, the computing device performs a security operation such as generating an alert or presenting false but plausible data to the user. Additionally or alternatively, the computing device, within a trusted execution environment, may monitor sensor data and apply a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack. For example, the classifier may identify potential user identification fraud. The computing device may trigger a security response if elevated risk of attack is detected. For example, the trusted execution environment may trigger increased authentication requirements or increased anti-theft monitoring for the computing device. Other embodiments are described and claimed. | 2017-06-15 |
20170169232 | DEVICES AND METHODS FOR ENCRYPTION AND DECRYPTION OF GRAPHICAL 3D OBJECTS - A processor of an encryption device obtains a graphical 3D object having a plurality of points, each point being defined by at least three coordinate values, generates a mask, applies the mask, using an operator, to at least selected points of the plurality of points to obtain an encrypted graphical 3D object and outputs the encrypted graphical 3D object. The mask is applied separately to the coordinate values or wherein the mask is applied to the at least three coordinate values together and separately to each selected point. In an embodiment, the processor applies the mask digit wise so that each input digit results in an output digit. The processor can also perform at least one of scaling and translation on the graphical 3D object before applying the mask. Decryption of an encrypted graphical 3D object is an essentially reverse procedure. | 2017-06-15 |
20170169233 | DISTRIBUTED DATA METHOD FOR ENCRYPTING DATA - Techniques for performing data encryption on data to be stored within a storage system are provided. A client application executing on a host machine may generate a data storage write request to write data to a storage system. A host-side module, executing on the host machine receives the write request. The host-side module is configured to generate one or more fingerprints for the data corresponding to the write request, where the one or more fingerprints are unique identifiers used to identify data blocks that make up the data. The host-side module generates encrypted data by encrypting the data blocks using an encryption technique. The encrypted data is then sent to a storage node within the storage system. Deduplication may be performed on the encrypted data using the one or more generated fingerprints. | 2017-06-15 |
20170169234 | SYSTEM AND METHOD FOR REMOVING INTERNET ATTACK SURFACE FROM INTERNET CONNECTED DEVICES - A system and method is introduced for communicating over the internet with no internet attack surface using internet connected devices. An isolated device referred to as a dc device, is introduced to function as a place for carrying out computations in isolation from internet connected devices as well as from other instances within the dc device. A user is able to interact with the dc device through a dc terminal. The dc terminal may make use of the input/output interfaces of the user internet connected device, while maintaining the isolation of the dc device. A dc server is introduced for communicating with the dc device over the internet with no internet attack surface. Having introduced the dc device, the dc terminal and the dc server, a dc domain is defined where communication between devices and between users and devices takes place in the dc domain over the internet with no internet attack surface. Uses for the dc domain may be user authentication, messaging between users, payment applications, cloud applications, IoT, smart vehicles, medical applications, document uses and so forth. In the dc domain content and ad serving may take place between a dc server and a dc device. | 2017-06-15 |
20170169235 | COPYRIGHT DETECTION AND PROTECTION SYSTEM AND METHOD - A method for detecting against unauthorized transmission of digital works comprises the steps of maintaining a registry of information permitting identification of digital copyrighted works, monitoring a network for transmission of at least one packet-based digital signal, extracting at least one feature from the at least one digital signal, comparing the extracted at least one feature with registry information and applying business rules based on the comparison result. | 2017-06-15 |
20170169236 | MULTI-TIERED FILE LOCKING SERVICE IN A DISTRIBUTED ENVIRONMENT - A multi-tiered file locking service provides file locking at the thread and process level, and can optionally include locking at the file system level. A local locking mechanism maintains a list of local locks for threads within a process. When a thread requests a lock for a file, and a local lock is obtained, a process lock for the file may be requested. When no file system locking is used, when the process lock is obtained, the thread receives the lock for the file. When file system locking is used, when the process lock is obtained, a file system lock for the file may be requested. When the file system lock for the file is obtained, the thread receives the lock for the file. The result is a file locking service that functions across threads, processes and nodes in a distributed computing environment. | 2017-06-15 |
20170169237 | CONTROLLING PRIVACY IN A FACE RECOGNITION APPLICATION - Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context. | 2017-06-15 |
20170169238 | PROTECTING COMPUTER SECURITY APPLICATIONS - Protecting a computer security application by executing the computer security application on a computer in a first namespace associated with an operating system of the computer, and creating a second namespace associated with the operating system of the computer, where the second namespace is accessible to the computer security application, and where the first namespace is inaccessible from the second namespace. | 2017-06-15 |
20170169239 | METHOD FOR FILE SYNCHRONIZATION, THE RECEIVER EQUIPMENT AND SYSTEMS - A file synchronization method may include: receiving a file synchronization request from a sender device; sending a response message based on the request, wherein the response message includes a plurality of storage area addresses of a receiver device; receiving a plurality of file chunks that are sent by the sender device based on the response message, wherein the plurality of file chunks are obtained by chunking a to-be-transmitted file, and each of the plurality of file chunks includes a unique identifier and a storage area address, of the receiver device, corresponding to the unique identifier; and allocating each file chunk to a corresponding storage area according to the unique identifier of the file chunk and the storage area address, of the receiver device, corresponding to the unique identifier, and assembling, in real time, the plurality of file chunks that are stored in the storage areas, to obtain the to-be-transmitted file. | 2017-06-15 |
20170169240 | CONDITIONAL SECURITY INDICATOR SHARING - According to an example, conditional security indicator sharing may include analyzing a security indicator that is received from a first entity by a security indicator sharing platform for sharing with a second entity. A determination may be made as to whether to share the security indicator with a third entity based on a condition. In response to a determination that the security indicator is to be shared or not to be shared with the third entity based on the condition, the security indicator may be respectively shared with the third entity, or not shared with the third entity. | 2017-06-15 |
20170169241 | SEARCH METHOD, SEARCH DEVICE, SEARCH SYSTEM, AND PROGRAM - A data search method of a first device storing multiple sets of privacy data acquired from multiple persons and multiple reference features corresponding to the multiple sets of privacy data, where the multiple reference features each are expressed by an n-dimensional vector, includes receiving first encrypted features from a second device connected to the first device, generating multiple second converted features by a second conversion of the multiple reference features, generating of multiple second encrypted features by encrypting the multiple second converted features using inner product encryption, acquiring multiple inner product values by performing inner product computation of each of the first encrypted features and the multiple second encrypted features, determining whether or not the first features and the first reference features are similar, and transmitting of first privacy data corresponding to the first reference features out of the multiple sets of privacy data to the second device. | 2017-06-15 |
20170169242 | MANAGING METHOD AND DEVICE FOR SENSOR ACCESS AUTHORITY - The application provides a managing method and device for a sensor access authority, and relates to the field of information security, The method comprises: determining a second sensor corresponding to a first sensor and having a type different from the first sensor in response to adjustment of an access authority of an application program to the first sensor, and then adjusting the access authority of the application program to the second sensor. The second sensor corresponding to a first sensor is determined when an access authority of an application program to the first sensor is adjusted, and the access authority of the application program to the second sensor is adjusted, thereby avoiding the second sensor collecting and leaking privacy information of the user and protecting privacy security of the user. | 2017-06-15 |
20170169243 | POWER EFFICIENT STORAGE MANAGEMENT - One or more systems and/or techniques are provided for managing a partially encrypted file system, for storage hardware virtualization, and/or for storage management. In example, data may be stored in a partially encrypted file system, where sensitive data is encrypted for security and non-sensitive data is unencrypted, which may mitigate energy usage otherwise used for encrypting non-sensitive data, thus improving battery life. In an example, a storage device may be exposed to applications as a plurality of isolated storage structures where an application is provided data access to an isolated storage structure assigned to the application but not to isolated storage structures assigned to other applications, which may provide hardware level isolation with improved energy efficiency. In an example, a storage management component, configured to provide isolation and encryption, may be integrated into a computing device as an application specific integrated circuit (ASIC) or a system on a chip (SoC). | 2017-06-15 |
20170169244 | PROVIDING UNIQUE VIEWS OF DATA BASED ON CHANGES OR RULES - In one embodiment, a method comprises creating and storing, in a revisioning database, one or more data objects; wherein a first plurality of the data objects is associated with a base realm representing data shared across all users of the database; wherein a second plurality of the data objects is associated with one or more child realms, wherein each of the child realms represents data local to a project, wherein each of the users is associated with one or more of the child realms; wherein the revisioning database associates each data object to a realm identifier value and to a version identifier value for a plurality of versions of the data object, wherein each of the versions represents a change to the data object by any of a plurality of users; receiving a request from a first user to view a third plurality of data objects in the revisioning database; selecting, based on the base realm, the particular realm, the version identifier value for the data objects in the third plurality, and one or more rules associated with the particular realm and the first user, data objects in the third plurality that can be viewed by the first user; creating a particular data view that includes only the selected data objects; and providing a display of the particular data view to the first user. | 2017-06-15 |
20170169245 | Dynamic Data Masking of Post-Output Database Data - Dynamic data masking by intercepting data derived from a database, creating a tabular representation of the data, and masking any of the data in accordance with a masking policy that specifies which of the data are to be masked if a masking condition is met, where the masking condition references the tabular representation of the data using a tabular positional reference. | 2017-06-15 |
20170169246 | INSTRUCTION EXECUTION THAT BROADCASTS AND MASKS DATA VALUES AT DIFFERENT LEVELS OF GRANULARITY - An apparatus is described that includes an execution unit to execute a first instruction and a second instruction. The execution unit includes input register space to store a first data structure to be replicated when executing the first instruction and to store a second data structure to be replicated when executing the second instruction. The first and second data structures are both packed data structures. Data values of the first packed data structure are twice as large as data values of the second packed data structure. The execution unit also includes replication logic circuitry to replicate the first data structure when executing the first instruction to create a first replication data structure, and, to replicate the second data structure when executing the second data instruction to create a second replication data structure. The execution unit also includes masking logic circuitry to mask the first replication data structure at a first granularity and mask the second replication data structure at a second granularity. The second granularity is twice as fine as the first granularity. | 2017-06-15 |
20170169247 | Secure Database Searching - Method and system for securely storing data in a database comprising: receiving data to be stored. Dividing the data into a plurality of elements. Encrypting each element of the plurality of elements with an encryption function. Combining the encrypted elements to form a data attribute. Storing the data attribute in the database. | 2017-06-15 |
20170169248 | ENHANCED MANAGEMENT CAPABILITIES FOR COLLECTABLE DATA STRUCTURES - Technologies provide management capabilities for collectable data structures. The collectable data structure can be configured to define an object and attributes related to the object. For example, the collectable data structure can be used to represent a digital card and the object can represent a person, item, or location. The collectable data structure can be configured to function as a stand-alone collectable item, or the collectable data structure can be configured to interact with an application or platform, such as a game application, productivity application, operating system, or a Web-based service. In some configurations, the management capabilities can utilize a system that is configured to function as a closed system, such as an application store, or an open system that can be managed by a pool of entities. Techniques for generating and modifying collectable data structures are also provided. | 2017-06-15 |
20170169249 | END USER CONTROL OF PERSONAL DATA IN THE CLOUD - Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving, by an authorization manager of a cloud-platform, a request from an application, the request indicating a request to access personal user data stored in a database system of the cloud-platform, determining, by the authorization manager and based on user input from a user, that access to the personal user data is to be granted, and in response: providing, by the authorization manager, an access token to the application, receiving an access request from the application, the access request including the access token, and selectively providing the personal user data from a database container of the database system based on the access token, the database container being specific to the user. | 2017-06-15 |
20170169250 | DEVICE USING SECURE STORAGE AND RETRIEVAL OF DATA - An appliance is capable of storing and processing data related to details surrounding its ownership, behavior, and history within itself in a secure and unalterable way. The appliance may experience multiple transfers in ownership during its lifetime. Certain data stored in the appliance may be encrypted such that only qualifying parties (e.g., owners) may be able to access the data. Some data may remain private to an individual owner while other data may be made available to subsequent owners by passing a shared secret that can be utilized to decrypt the other data. Data may be stored in the appliance in chronological order and may be signed by appropriate parties such that it is not possible to alter the data without detection. | 2017-06-15 |
20170169251 | ENFORCING ANONYMITY IN THE AUDITING OF ELECTRONIC DOCUMENTS - Methods, systems, and computer-readable media for anonymizing electronic documents. In accordance with one or more embodiments, structurally-similar electronic documents can be identified among a group of electronic documents (e.g., e-mail messages, documents containing HTML formatting, etc.). A hash function can be specifically tailored to identify the similarly structured documents. The structurally-similar electronic documents can be grouped into a same equivalence class. Masked anonymized document samples can be generated from the structurally-similar electronic documents utilizing the same equivalence class, thereby ensuring that the anonymized document samples when viewed as a part of an audit remain anonymous. An online process is provided to guarantee k-anonymity of the users over the entire lifetime of the auditing process. An auditor's productivity can be measured based on the amount of content revealed to the auditor within the samples he is assigned. The auditor's productivity is maximized while ensuring anonymization over the lifetime of the audit. | 2017-06-15 |
20170169252 | METHOD FOR ANONYMIZATION OF DATA COLLECTED WITHIN A MOBILE COMMUNICATION NETWORK - The invention relates to a method for anonymization of event data collected within a system or network providing a service for subscribers/customers wherein each event data set is related to an individual subscriber/customer of the system/network and includes at least one attribute wherein the method counts the number of event data sets related to varying individual subscribers having identical or nearly identical values for at least one attribute. The invention further relates to a method for anonymization of static data related to individual subscribers of a mobile communication network wherein each static data set consist of different attributes and the method identifies specific profiles derivable form the static data and drops one or more respective attribute of the static data sets and/or classifies two or more static data sets to a certain group having at least one matching attribute. | 2017-06-15 |
20170169253 | PRIVACY-AWARE QUERY MANAGEMENT SYSTEM - A privacy-aware query management system receives a query to aggregate data from a number of datasets, wherein at least one of the datasets contains private information for one or more people. The privacy-aware query management system retrieves data from the datasets. Each of the plurality of datasets has associated privacy parameters that determine a level of noise to be applied to query results obtained from that dataset, and the levels of noise are used to determine an order of operations for the query to retrieve the data from the datasets. The privacy-aware query management system applies the levels of noise to each query result obtained from each of the datasets in accordance with the privacy parameters associated with that dataset, computes aggregated data from the query results with the levels of noise applied, and responds to the query with the aggregated data. | 2017-06-15 |
20170169254 | PREEMPTION OF A CONTAINER IN A SECURE COMPUTATION ENVIRONMENT - A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege. | 2017-06-15 |
20170169255 | SCRAMBLING APPARATUS AND METHOD THEREOF - A memory device is provided which comprises a memory array, a first scrambling circuit and a second scrambling circuit. The first scrambling circuit is configured to provide first scrambled data with a first scrambling pattern in response to input data. The second scrambling circuit is configured to provide second scrambled data with a second scrambling pattern in response to the first scrambled data. | 2017-06-15 |
20170169256 | SMART CARD DEVICE, SYSTEM INCLUDING THE SAME AND METHOD OF OPERATING SMART CARD SYSTEM - A smart card may include data storage and transmission circuitry, a plurality of voltage controllers to supply operational power to card circuitry, a plurality of oscillators to supply an internal clock for the card, and power management circuitry. The power management circuitry may be configured to shut down the oscillators and at least one, but not all, voltage controllers during a period after a data transmission is completed. | 2017-06-15 |
20170169257 | METHOD AND SYSTEM FOR MAGNETIC STRIPE READING USING MOBILE MAGNETOMETERS - In various example embodiments, a system and method for reading magnetic information by a mobile device are presented. In example embodiments, the mobile device comprises a housing having an integrated surface for swiping a magnetic swipe card and a magnetometer positioned within the housing to produce digital magnetometer output signals. The digital magnetometer output signals represent magnetic information derived from the magnetic swipe card and from the Earth's magnetic fields (or other sources). | 2017-06-15 |
20170169258 | METHOD AND DEVICE FOR PHASE CALIBRATION WITH ACTIVE LOAD MODULATION - A method for operating an RFID device is disclosed. In the embodiment, the method involves establishing a radio-frequency link, receiving signal samples of the radio-frequency link, determining the offset of an initial phase of the link by filtering noise from the signal samples, windowing the filtered signal samples, and calculating an offset value from phase differences between the windows of signal samples, and modifying a configuration profile based on the offset value. During data transmission the configuration profile can be used to configure the transmitter in order to maintain the constant phase during transmission. | 2017-06-15 |
20170169259 | SYSTEM, METHOD FOR INFORMATION DELIVERY, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM - A system for information delivery includes: an electronic tag for holding a tag identifier being updatable; a server for storing the tag identifier held in the electronic tag and information corresponding to the tag identifier; and a terminal for causing the information corresponding to the tag identifier to be delivered from the server. The terminal includes a memory, and a processor coupled to the memory and configured to execute a process. The process executed by the processor includes reading the tag identifier from the electronic tag, updating the tag identifier in the electronic tag with a new tag identifier that is different in content from the tag identifier read from the electronic tag, and establishing, after updating the tag identifier in the electronic tag, a time period in which a discrepancy between the tag identifier in the electronic tag and the tag identifier stored in the server occurs. | 2017-06-15 |
20170169260 | PTP INTERACTION ASSOCIATION SYSTEM SUPPORTING CONNECTION BETWEEN PRINT BOOKS AND PERIODICALS PRODUCT AND INTERNET - Invention relates to Internet of Things technology, particularly to a PTP interactive interconnected system supporting a connection of a plane publication product with Internet to provide technical support enabling Internet Plus for traditional industry. The system comprises a communication terminal supporting the PTP interactive interconnected system, a URL electronic data device, a print book and magazine product and a numeric mark. A carrier of the plane publication product is attached with the numeric mark; the communication terminal supports input of a numeric character corresponding to the numeric mark; and an operating system of the communication terminal receives an instruction from the numeric mark, calls out paired URL electronic data stored in the URL electronic data device, and sends a request to a back-end server after processing the paired URL electronic data, and the back-end server returns an electronic file associated with the URL electronic data according to the request. | 2017-06-15 |
20170169261 | ARRAY ANTENNA SYSTEM AND ALGORITHM APPLICABLE TO RFID READERS - Embodiments of the invention pertain to Radio Frequency Identification (RFID) method and system using an antenna array, an array controller, and control algorithms. Embodiments of the invention can induce strong radio-frequency (RF) excitation, for a given level of radiated RF power, at any point within an arbitrary inhomogeneous medium. For RFID applications, one typical inhomogeneous medium is an ensemble of cases on a pallet. Another typical medium is a warehouse environment having stored goods together with shelving and other material present. An embodiment of the invention is applicable to the process of reading battery-less, or “passive” RFID tags, which rely on incident RF electromagnetic fields established by RFID readers to power the electronic circuitry within the tags. | 2017-06-15 |
20170169262 | READING AND WRITING VERIFICATION DEVICE FOR RFID MEDIUM, AND READING AND WRITING VERIFICATION METHOD FOR SAME - Focusing on providing a plurality of device antennas along a transfer path of the RFID media, and providing a device antenna for verification, the reading and writing verification device comprises: a data reading and writing unit having a first device antenna, a second device antenna and a third device antenna provided sequentially in the transfer path; and a data verification unit having a fourth device antenna provided on a downstream side of the third device antenna, reading and writing of medium data being made sequentially executable by wireless data communication between the data reading and writing unit and the RFID medium, and in the data verification unit, the medium data being read from the RFID medium to enable verification of the medium data. | 2017-06-15 |
20170169263 | SYSTEMS AND METHODS FOR A CLOUD CONNECTED TRANSPONDER - A system comprising a server configured to store a plurality of storage formats associated with one or more auto-identification technologies transponders; and a mobile device comprising: a plurality of application configured to handle auto-identification data, a communication interface, a reader circuit configured to implement at least one auto-identification protocol, a processor configured to implement operating system instructions, the operating system instructions configured to cause the processor to: receive context data, receive auto-identification data from the reader circuit, send at least some of the auto-identification data and the context data to the server via the communication link, receive one of the plurality of storage formats via the communication link that was selected based on the auto-identification data and the context data, and identify and launch one of the plurality of applications based on the received storage format. | 2017-06-15 |
20170169264 | INTERNET OF THINGS (IOT) APPARATUS AND METHOD FOR ELECTRONIC SHELF TAGS - A system and method are described for Internet of Things (IoT) shelf tags. For example, one embodiment of a system comprises: a shelf tag IoT device comprising a local wireless communication interface to establish a local wireless communication link with one or more IoT hubs or client devices, the shelf tag IoT device further comprising a secure communication module to establish a secure communication channel with an IoT service over the Internet using the local wireless communication link; a low power display coupled to the shelf tag IoT device to display product information related to retail products placed on shelves at a retail location; a products database maintained on the IoT service and/or an external retail service, the products database to store an association between each IoT device and each of a plurality of products sold by a retailer; shelf tag management logic executed on the IoT service and/or the external retail service and configured to push pricing updates for products to each respective shelf tag IoT device upon detecting a change in price for the products associated with the shelf tag IoT devices. | 2017-06-15 |
20170169265 | APPARATUS HAVING HYBRID MONOCHROME AND COLOR IMAGE SENSOR ARRAY - There is provided in one embodiment an apparatus having an image sensor array. In one embodiment, the image sensor array can include monochrome pixels and color sensitive pixels. The monochrome pixels can be pixels without wavelength selective color filter elements. The color sensitive pixels can include wavelength selective color filter elements. | 2017-06-15 |
20170169266 | Method of Controlling Operation of Cataloged Smart Devices - A method of controlling operation of cataloged smart devices includes generating an image of an item using a camera of a mobile computing device, the item corresponding to a smart device, identifying the item in the image, establishing a link to the smart device in response to identifying the item in the image, and controlling the smart device using the mobile computing device after establishing the link to the smart device. | 2017-06-15 |
20170169267 | ENCODING AND DECODING DATA IN TWO-DIMENSIONAL SYMBOLOGY - Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method for encoding data in a 2D symbology is provided. The method includes assigning a first color representative of a 0-bit and a second color representative of a 1-bit. The method further includes designating a starting indicator and an ending indicator. The method also includes generating, by a processor, the 2D symbology, the 2D symbology includes a series of data segments and null segments representing a binary string. The series of data segments and null segments starts with the starting indicator and ends with the ending indicator. The data segments include 0-bit segments of the first color and 1-bit segments of the second color. The null segments are positioned between each of the data segments and are of a third color. | 2017-06-15 |
20170169268 | ENCODING AND DECODING DATA IN TWO-DIMENSIONAL SYMBOLOGY - Examples of techniques for encoding data in a | 2017-06-15 |
20170169269 | DECODING A MAIN IMAGE USING AN AUXILIARY IMAGE - Example implementations relate to using an auxiliary image to identify an image analysis mechanism associated with a main image. For example, a computing device may include a processor and an image capture device. The processor may capture with the image capture device a representation of a combined image. The combined image may include a main image and an auxiliary image. The processor may also identify the auxiliary image in the representation of the combined image and decode the identified auxiliary image via an auxiliary image decoding mechanism to determine image analysis mechanism identification information associated with the main image. The processor may further determine, based on the image analysis mechanism identification information, a main image analysis mechanism useable to determine an identifier associated with the main image. The auxiliary image decoding mechanism is different than the main image analysis mechanism. | 2017-06-15 |
20170169270 | SYSTEM FOR READING INFORMATION CODE - A system including a reader and an information terminal is provided. The information terminal displays an information code, while the reader optically reads the information code. The reader includes an emission unit and an imaging unit. The emission unit emits light in a predetermined emission state when the information code is imaged by the imaging unit. The information terminal includes an imaging unit, a control unit and a display unit. The control unit of the information terminal drives/controls the display unit to display the information code only when the predetermined emission state is imaged by the imaging unit. That is, unless the predetermined emission state of the emission unit of the reader is imaged by the imaging unit of the information terminal, the information code is not displayed on the display unit of the information terminal. Thus, security in reading the information code is further improved. | 2017-06-15 |
20170169271 | METHOD AND FINGERPRINT SENSING SYSTEM FOR ACQUIRING A FINGERPRINT IMAGE - The present invention generally relates to a method for acquiring a fingerprint image using a fingerprint sensing system. Advantages with the invention include improved acquisition of fingerprint images of e.g. wet (sweaty) fingers. The invention also relates to a corresponding fingerprint sensing system and to a computer program product. | 2017-06-15 |