26th week of 2015 patent applcation highlights part 52 |
Patent application number | Title | Published |
20150178399 | DATA STORAGE WITH LOCK-FREE STATELESS PAGING CAPABILITY - Disclosed are a method and apparatus for limiting the number of results returned by a store in response to a query. Upon receiving an initial query, the data store returns a page of results that includes a subset of the data items within the data store satisfying the conditions of the query. The data store also provides a marker indicating the extent of the set of data items. If a subsequent query that requests additional results which satisfy the same query conditions and that includes the marker is received, the data store returns a page of results that includes a subset of data items that are disjoint from the initial subset, and provides an updated marker which indicates the extent of the union of the initial and subsequent subsets. If still further results are desired from the data store, an additional query containing the updated marker may be submitted. | 2015-06-25 |
20150178400 | Method and device for acquiring terminal information in heterogeneous terminal environment - Disclosed are a method and device for acquiring terminal information in a heterogeneous terminal environment, and the method includes: terminal information uploaded by one or more heterogeneous terminals is stored, feature information is extracted from the stored terminal information, the extracted feature information is described in a unified language or unified grammars, the feature information described in the unified language or unified grammars is classified, and the classified feature information is stored; or firstly the stored terminal information is described in a unified language or unified grammars, then the feature information is extracted from terminal information described in the unified language or unified grammars. The present disclosure can implement effective acquisition of terminal information in a multi-heterogeneous-terminal environment. | 2015-06-25 |
20150178401 | METHODS AND SYSTEMS FOR IDENTIFYING STRANDED CAPACITY - Embodiments of the present invention are directed towards systems and methods for managing environmental variables associated with electronic equipment within a datacenter. In an embodiment, the present invention is a data center physical infrastructure management system that is managed by IT personnel. The system comprises at least one of a rack and a cabinet having rack spaces and at least one sensor, a data communication arrangement for propagating communications signals from the sensor to a management database that receives information from the communications signals, the received information being stored, and a data processor for determining algorithmically, from the received information, stranded capacity within the at least one of a rack and a cabinet. | 2015-06-25 |
20150178402 | METHOD FOR COMPUTER EVALUATION OF CONTAINERS AND FOOD TO OBTAIN OPTIMUM STORAGE AND/OR USE - An apparatus includes a scanner, a keypad, a wireless communication component, and an electronic readout device, which are communicatively coupled to a processing device. The processing device is configured to communicate data indicative of a barcode or data indicative of a food product to the remote electronic device. The processing device is also configured to receive from the remote electronic device an indication of a particular container and a corresponding portion size associated with the particular container and the food product. Further, the processing device is configured to effect electronic readout via the electronic readout device of a container indicator corresponding to the indication of the particular container and the corresponding portion size. The container indicator distinguishes the particular container from at least one other particular container and the container indicator corresponds to a physical container indicator of a physical particular container. | 2015-06-25 |
20150178403 | History of Reading Positions in eBooks - A user device for presenting eBooks generates a navigation history that allows a user to easily navigate to previously accessed positions within the eBook. The navigation history can be stored on an eBook server and shared with other user devices used by the same user. The navigation history may be generated by receiving actions regarding navigation within the eBook, an action navigating from a current reading position within the eBook to a corresponding navigation position in the eBook; filtering the received actions and the corresponding navigation positions to produce a filtered list of navigation positions; storing the filtered list of navigation positions in a navigation history; presenting the navigation history to the user; receiving a request from the user to navigate to a selected one of the navigation positions from the navigation history; and presenting a portion of the eBook at the selected navigation position. | 2015-06-25 |
20150178404 | FAST RENDERING OF VISUALIZATION - A system for fast rendering of visualization includes a server computer and a client device. The client device determines a set of data required for rendering a visualization on a client device based on a user input and transmits a request for the set of data to the server computer. The client device receives one or more terse tables corresponding to the set of data, generates the set of data by combining the received one or more terse tables, and rendering a visualization on the client device based on the set of data. | 2015-06-25 |
20150178405 | FINDING COMMON NEIGHBORS BETWEEN TWO NODES IN A GRAPH - Techniques for identifying common neighbors of two nodes in a graph are provided. One technique involves performing a binary split search and/or a linear search. Another technique involves creating a segmenting index for a first neighbor list. A second neighbor list is scanned and, for each node indicated in the second neighbor list, the segmenting index is used to determine whether the node is also indicated in the first neighbor list. Techniques are also provided for counting the number of triangles. One technique involves pruning nodes from neighbor lists based on the node values of the nodes whose neighbor lists are being pruned. Another technique involves sorting the nodes in a node array (and, thus, their respective neighbor lists) based on the nodes' respective degrees prior to identifying common neighbors. In this way, when pruning the neighbor lists, the neighbor lists of the highly connected nodes are significantly reduced. | 2015-06-25 |
20150178406 | COUNTING TRIANGLES IN A GRAPH - Techniques for identifying common neighbors of two nodes in a graph are provided. One technique involves performing a binary split search and/or a linear search. Another technique involves creating a segmenting index for a first neighbor list. A second neighbor list is scanned and, for each node indicated in the second neighbor list, the segmenting index is used to determine whether the node is also indicated in the first neighbor list. Techniques are also provided for counting the number of triangles. One technique involves pruning nodes from neighbor lists based on the node values of the nodes whose neighbor lists are being pruned. Another technique involves sorting the nodes in a node array (and, thus, their respective neighbor lists) based on the nodes' respective degrees prior to identifying common neighbors. In this way, when pruning the neighbor lists, the neighbor lists of the highly connected nodes are significantly reduced. | 2015-06-25 |
20150178407 | CONSTRUCTING QUERIES FOR EXECUTION OVER MULTI-DIMENSIONAL DATA STRUCTURES - Various technologies pertaining to construction of a query for execution over a cube are described. Tabular data is presented on a displayed on a display screen, where the tabular data represents at least a portion of a data cube. Input is received with respect to the tabular data, and responsive to the input being received, a query is constructed based upon the input. The query is executed over the data cube, resulting in provisioning of a new table. | 2015-06-25 |
20150178408 | CONTEXTUAL QUERY REVISION - Apparatus, systems and methods for contextual query revision are disclosed. A current search query is received during a search session. The current search query includes one or more current search tokens. Potentially inaccurate search tokens are identified from the one or more current search tokens. A possible replacement token is identified based upon the potentially inaccurate search token. A group of related tokens is identified from query logs, and a modified search query is generated if the replacement token is not included in the related tokens. | 2015-06-25 |
20150178409 | ART SEARCH RESULTS - One or more techniques and/or systems are provided for populating an interactive map with art search results. For example, an art search query may be received (e.g., a user may submit a query “French Cubism”). A set of art search results, such as artwork, artists, galleries, geographical locations and/or other art search results, may be identified based upon the art search query. An interactive map may be populated with the set of art search results. For example, the interactive map may be populated with map pins representing galleries that display French Cubist artwork. Various task completion functionality may be supported, such as travel planning to a gallery, purchasing prints, reserving gallery tickets, sharing art search results through a social network, etc. In this way, the user may explore artwork and/or locations, such as galleries, that display such artwork. | 2015-06-25 |
20150178410 | Underground Tactical Optimization - In an embodiment, a computer-implemented method includes, in a processor, slicing an ore-body solid model stored in a memory into a plurality of horizontal and a plurality of vertical pieces and deriving, from the sliced horizontal pieces and the vertical pieces, information corresponding to stope blocks and pillar blocks of the ore-body, stope blocks and pillar blocks corresponding to particular pieces of the plurality of horizontal pieces and the plurality of vertical pieces. | 2015-06-25 |
20150178411 | ASYMMETRIC CABLE-MEMBRANE TENSEGRITY STRUCTURE OF OPENING TYPE, METHOD OF CONSTRUCTING THE SAME AND METHOD OF DESIGNING THE SAME - A cable-membrane tensegrity structure which is asymmetric, and construction method and design method thereof are provided. The cable-membrane tensegrity structure comprises a central opening and is formed by a ring cable ( | 2015-06-25 |
20150178412 | THREE-DIMENSIONAL COORDINATE SCANNER AND METHOD OF OPERATION - A system and method of determining 3D coordinates of an object is provided. The method includes determining a first set of 3D coordinates for a plurality of points on the object with a structured light scanner. An inspection plan is determined for the object, which includes features to be inspected with a remote probe. The points are mapped onto a CAD model. The features are identified on the plurality of points mapped onto a CAD model. A visible light is projected with the scanner proximate a first feature of the features. A sensor is contacted on the remote probe to at least one first point on the first feature on the object. A first position and orientation of the remote probe are determined with the scanner. A second set of 3D coordinates of the at least one first point are determined on the first feature on the object. | 2015-06-25 |
20150178413 | Top-Down CAD Design - In one embodiment, a computer-readable medium is configured to store instructions for creating a model in a three-dimensional (3D) environment, where the model represents a real-world object. The instructions, when loaded and executed by a processor, causes the processor to, given a two-dimensional (2D) sketch comprised of sketch entities, automatically create one or more 3D part in the 3D environment corresponding to respective groupings of sketch entities. The instructions further cause the processor to create a derived layout sketch in the 3D environment associated with a first 3D part, where the derived layout sketch is a reference to or a copy of the 2D sketch, and automatically create a relationship between the first 3D part and a second 3D part where the relationship is based on a constraint between corresponding respective groupings of sketch entities. | 2015-06-25 |
20150178414 | Automatic Motion of a Computer-Aided Design Model - A computer-implemented method automates motion of a computer-aided design (CAD) model. The CAD model represents a real-world object comprised of a number of parts. The part containing a user-specified entity is analyzed to collect data relevant to a motion study, for example, size data, location data, and material type data are collected. Based on the user-specified entity, parameters for automating motion are inferred and used to automate motion. The parameters include at least one of a part that is moved directly by a motor, a location on the part where the motor is mounted, a motor type, an axis of motion of the part, and a motion function indicating a change of motion over time. | 2015-06-25 |
20150178415 | MATERIAL STRUCTURE PREDICTION APPARATUS, PRODUCT MANUFACTURING METHOD AND MATERIAL STRUCTURE PREDICTION METHOD - The material structure prediction apparatus includes a temperature calculator calculating temperatures at calculation points, based on a temperature condition, a nucleation count calculator calculating a nucleation count in the calculation target region, a precipitated phase generation point determining module determining, from the calculation points, a precipitated phase generation point, a grain growth calculator calculating a grain growth of the precipitated phase at the precipitated phase generation point, and a material structure prediction module predicting the structure of the material, based on the grain growth of the precipitated phase. | 2015-06-25 |
20150178416 | COMPUTER SYSTEM FOR AUTOMATICALLY CLASSIFYING ROOF ELEMENTS - A set of instructions stored on at least one computer readable medium for running on a computer system. The set of instructions includes instructions for identifying line segments of a roof that is preferably displayed within a geo-referenced image, instructions for determining position, orientation and length of the line segments utilizing the geo-referenced image, and instructions for classifying, automatically, at least one of the line segments as one of a plurality of predefined roof elements utilizing at least one of the relative position and orientation of the line segments. | 2015-06-25 |
20150178417 | METHOD FOR SHOWING HIERARCHICAL STRUCTURE FOR A GIVEN POWER INTENT DESCRIBED IN A POWER INTENT DESCRIPTION LANGUAGE WITH A DESIGN DESCRIBED IN A HARDWARE DESIGN DESCRIPTION LANGUAGE, AND ASSOCIATED APPARATUS AND ASSOCIATED COMPUTER PROGRAM PRODUCT - A method for showing hierarchical structure for a given power intent described in a power intent description language (e.g. a formal power intent description language) with a design described in a hardware design description language, an associated apparatus, and an associated computer program product are provided, where the method includes: retrieving hardware design description contents written in the hardware design description language from a hardware design description file, and retrieving power intent description contents written in the power intent description language from a power intent description file; and controlling a display module to display a power domain hierarchy associated with the power intent description contents and the hardware design description contents respectively retrieved from the power intent description file and the hardware design description file, wherein the power domain hierarchy includes at least one power domain. For example, the power intent description language is the unified power format (UPF) language. | 2015-06-25 |
20150178418 | MODEL-BASED RETIMING WITH FUNCTIONAL EQUIVALENCE CONSTRAINTS - A system and method tests for functional equivalence prior to automatically retiming a high-level specification. An Intermediate Representation (IR) includes one or more graphs or trees based on the high-level specification. A functional equivalence (FE) analyzer determines whether one or more components in the graph meet certain value and state conditions and thus is a candidate for retiming. A scheduler can use components that fail FE as a retiming boundary. | 2015-06-25 |
20150178419 | METHOD AND APPARATUS FOR ESTIMATING A COMPLETION TIME FOR MAPREDUCE JOBS - A method, non-transitory computer readable medium, and apparatus for estimating a completion time for a MapReduce job are disclosed. For example, the method builds a general MapReduce performance model, computes one or more performance characteristics of each one of one or more benchmark workloads, computes one or more performance characteristics of the MapReduce job in the known processing system, selects a subset of the one or more benchmark workloads that have similar performance characteristics as the one or more performance characteristics of the MapReduce job, targets a cluster of processing nodes in a distributed processing system, computes one or more performance characteristics of the subset of the one or more benchmark workloads in the cluster of processing nodes and estimates the completion time for the MapReduce job. | 2015-06-25 |
20150178420 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, METHOD OF PROCESSING INFORMATION, AND PROGRAM - An information processing apparatus includes a memory unit that stores information of each of machine bodies of apparatuses or each of machine types of the apparatuses in association with identification information of each of the machine bodies or each of the machine types; a receipt unit that receives a designation of the identification information of the machine body, which is a target of emulation, or the machine type, which is the target of the emulation; and an imitation unit that imitates an operation of a first apparatus among the apparatuses based on the information stored in the memory unit and corresponding to the identification information, of which designation is received by the receipt unit, when a request is received from an application program corresponding to the first apparatus. | 2015-06-25 |
20150178421 | SYSTEMS FOR AND METHODS OF MODELING, STEP-TESTING, AND ADAPTIVELY CONTROLLING IN-SITU BUILDING COMPONENTS - A system for and method of modeling thermal performance characteristics of HVAC components in a building uses the building power or other meter to measure power consumed by the components. The models are used to test the components, preferably during off hours, to ensure proper and efficient operation. Preferably, the testing software is written in a high-level interpretive language that is independent of the HVAC component being modeled. The models are adaptively maintained by periodically ensuring that their measured output matches the predicted output. When the two do not match, the model parameters are updated. These models can also be used to generate reports comparing costs and cost savings for different temperature and other environmental settings within selected zones in the building. | 2015-06-25 |
20150178422 | SYSTEM AND METHOD FOR AUTOGENERATING SIMULATIONS FOR PROCESS CONTROL SYSTEM CHECKOUT AND OPERATOR TRAINING - A method and system for automatically generating simulations for a distributed control system is disclosed herein. A programmed process model generator automatically incorporates a variety of process model data from pre-defined model libraries into descriptions of process equipment including control devices to render simulation models of various degrees of fidelity. | 2015-06-25 |
20150178423 | Intra-Increment Adjustments of Implicit Finite Element Simulation - An embodiment of the invention involves increasing the penalty stiffness within a finite element simulation increment, which is more accurate because it avoids following a solution path with significant non-physical penetrations. An embodiment of the present invention begins by determining a first value of a parameter used by a finite element simulation of a load increment. Next, a first solution of the finite element simulation is determined by performing Newton iterations using the first value of the parameter until a first convergence check is satisfied. Then, a second value the parameter is determined wherein the second value of the parameter is unequal to the first value of the parameter. Finally, a second solution of the finite element simulation is determined by continuing the Newton iterations using the second value of the parameter until a second convergence check is satisfied, the first convergence check being different than the second convergence check. | 2015-06-25 |
20150178424 | CAD-Based Initial Surface Geometry Correction - The present invention relates to a method and system for performing a finite element simulation. Embodiments of the present invention determine accurate contact simulations. A method according to the principles of the present invention begins by obtaining a first finite element model and a first computer aided design (CAD) model that the first finite element model represents. Next, a finite element simulation is performed using at least the first finite element model and the first CAD model. According to an embodiment of the present invention, performing the finite element simulation comprises determining one or more variations between the first finite element model and the first CAD model. | 2015-06-25 |
20150178425 | METHOD FOR MODELING GRAPHICS ON A FLEXIBLE FORM - A method for modeling a flexible form that includes creating a computer based predictive simulation of a flexible form surface with graphics comprised of a mesh made of one or more nodes is disclosed. The method is used in the creation of flexible forms. | 2015-06-25 |
20150178426 | HARDWARE SIMULATION CONTROLLER, SYSTEM AND METHOD FOR FUNCTIONAL VERIFICATION - Systems and methods of using hardware to simulate software, specifically the semantic operations defined in HDL simulation languages. Traditional software HDL simulation kernel operations of advancing time, activating threads in response to notified events, and scheduling those threads of execution are handled via a simulation controller. The simulation controller is comprised of a timing wheel, an event-processor, a thread/process dispatch engine, a token processor, and a resource-allocator. These components work together with a control logic component to perform the semantic operations of an HDL software kernel. | 2015-06-25 |
20150178427 | STACKED MULTIPLE-INPUT DELAY GATES - Embodiments of the present invention disclose a method, program product, and a logic circuit structure for correcting early-mode timing violations in a digital circuit design. A portion of a digital circuit design is identified having an early-mode timing violation. A logic circuit is identified within the identified portion of a digital circuit design having the early-mode timing violation. At least one input of the identified logic circuit is identified as having the early-mode timing violation. At least one transistor is added to the identified logic circuit, wherein the input of the added at least one transistor is coupled to the identified at least one input of the identified logic circuit, and wherein the addition of the at least one transistor delays the signal received at the identified at least one input to eliminate the early-mode timing violation. | 2015-06-25 |
20150178428 | Analog Mixed Signal Model Equivalence Checking - An approach is provided in which a hybrid mixed signal equivalence checking system partitions a mixed signal reference model and a mixed signal model under verification into analog sections and digital sections. The hybrid mixed signal equivalence checking system simulates the analog sections from the two different models to determine analog equivalence. As such, the hybrid mixed signal equivalence checking system verifies digital equivalence between the digital reference section and the digital section model under verification in response to evaluating one or more difference functions that represent at least a portion of the first digital section and the second digital section. As a result, the hybrid mixed signal equivalence checking system verifies equivalence between the mixed signal reference model and the mixed signal model under verification based upon the verified analog equivalence and the verified digital equivalence. | 2015-06-25 |
20150178429 | SOI MOS DEVICE MODELING METHOD - The present invention provides a SOI MOS device modeling method. The SOI MOS device is one having a source-drain injection not reaching the bottom. The method comprises: a) establishing an overall model comprising a primary MOS device model simulating an SOI MOS device having the source-drain injection reaching the bottom, a source body PN junction bottom capacitance model simulating a source body PN junction bottom capacitance, and a drain body PN junction bottom capacitance model simulating a drain body PN junction bottom capacitance; and b) extracting parameters respectively for the primary MOS device model, the source body PN junction bottom capacitance model, and the drain body PN junction bottom capacitance model in the overall model. In the prior art, the source body junction bottom capacitance and the drain body junction bottom capacitance in the SOI MOS device having a source-drain injection not reaching the bottom affect the performances of the device. The modeling method of the present invention takes the effect into consideration, improves model precision, and can be effectively used for the simulation design of a device. | 2015-06-25 |
20150178430 | TIMING DELAY CHARACTERIZATION METHOD, MEMORY COMPILER AND COMPUTER PROGRAM PRODUCT - A memory compiler includes a processor configured to perform a simulation of an operation of an input stage coupled to an input terminal of a memory circuit, wherein the simulation of the operation of the input stage is performed for various slew rate values at the input terminal to obtain corresponding extrinsic input timing delays. The processor is further configured to perform a simulation of an operation of an output stage coupled to an output terminal of the memory circuit, wherein the simulation of the operation of the output stage is performed for various capacitance loading values at the output terminal to obtain corresponding extrinsic output timing delays. The processor is further configured to perform a simulation of an operation of a section of the memory circuit between the input stage and the output stage to obtain an intrinsic timing delay. The processor is further configured to generate timing delays of the memory circuit based on the extrinsic input timing delays, the extrinsic output timing delays and the intrinsic timing delay. | 2015-06-25 |
20150178431 | MASK PATTERN GENERATION METHOD - A method for generating a pattern of a mask includes obtaining data of a plurality of polygons representing a plurality of pattern elements, grouping polygons which overlap or contact with each other among the plural polygons in one group, not setting an evaluation position for evaluating an image of a pattern of the one group on a line segment of sides which overlap or contact with each other among sides of the polygon of the one group, and setting an evaluation position at a portion except for the line segment, and repeating calculating the image of the pattern of the one group, evaluating the calculated image at the set evaluation position, and correcting the pattern based on a result of the evaluating, and generating the pattern of the mask based on a result of the repeating step. | 2015-06-25 |
20150178432 | AUTOMATED STATE MACHINE EXTRACTION FOR RAPID-SINGLE FLUX-QUANTUM CIRCUITS - The invention provides a method and system for extracting a state machine representation of a digital logic superconductive circuit from an alphanumeric representation of the circuit. The alphanumeric representation typically specifies circuit components including inductive elements, their interconnectivity and input and output nodes. The method according to the invention comprising the steps of simulating the circuit in a suitable software environment utilising the alphanumeric representation; identifying inductive loops in the circuit; identifying inductive loops in the circuit capable of storing one or more magnetic fluxons and discarding all others; and extracting the state machine representation, using only the inductive loops in the circuit capable of storing magnetic fluxons. | 2015-06-25 |
20150178433 | SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE AND METHOD FOR DESIGNING LAYOUT OF THE SAME - A method for designing a layout of a semiconductor integrated circuit device includes placing a plurality of standard cells respectively constituting a plurality of functional blocks in a part of a logic circuit placement region, placing a plurality of basic cells in a part of regions of the logic circuit placement region in which no standard cells are placed, and placing at least one diode cell in at least a part of regions of the logic circuit placement region in which no standard cells and no basic cells are placed, the diode cell including a first and a second diode, the first diode being connected between a gate electrode of a predetermined transistor and a first power supply line and the second diode between the gate electrode and a second power supply line. | 2015-06-25 |
20150178434 | METHOD OF DESIGNING IMPEDANCE TRANSFORMATION CIRCUIT - To design an impedance transformation circuit, a transformer ratio of a transformer circuit is determined according to an impedance ratio. A coupling coefficient between a first inductance element and a second inductance element, an inductance of the first inductance element, and an inductance of the second inductance element are determined. A shape of the second inductance element is determined. A shape of the first inductance element is determined such that the first inductance element includes at least two layers of loop conductors, and an interlayer distance between the loop conductors is determined such that an inductance value of the first inductance element is a desired value. | 2015-06-25 |
20150178435 | AUTOMATIC PIPELINING OF NOC CHANNELS TO MEET TIMING AND/OR PERFORMANCE - Systems and methods for automatically generating a Network on Chip (NoC) interconnect architecture with pipeline stages are described. The present disclosure includes example implementations directed to automatically determining the number and placement of pipeline stages for each channel in the NoC. Example implementations may also adjust the buffer at one or more routers based on the pipeline stages and configure throughput for virtual channels. | 2015-06-25 |
20150178436 | CLOCK ASSIGNMENTS FOR PROGRAMMABLE LOGIC DEVICE - Various techniques are provided to perform clock assignments in a programmable logic device (PLD). In one example, a computer-implemented method includes receiving a design identifying operations to be performed by a programmable logic device (PLD), synthesizing the design into a plurality of components of the PLD configured to perform the operations, and performing a simulated annealing process to determine a layout of the components in the PLD based on a system cost including a clock assignment cost for global clock signals of the PLD. Additional methods, systems, machine-readable mediums, and other techniques are also provided. | 2015-06-25 |
20150178437 | GROUP BASED ROUTING IN PROGRAMMABLE LOGIC DEVICE - Various techniques are provided to route connections within a programmable logic device (PLD). In one example, a method includes determining timing slacks for connections described in a netlist for a programmable logic device (PLD). The method also includes determining a plurality of priority groups. The connections are associated with one or more of the priority groups based on the timing slacks. The method also includes routing the connections associated with each priority group, from a highest priority group to a lowest priority group. Each priority group is iteratively routed to remove routing conflicts before lower priority groups are routed. Additional methods, systems, machine-readable mediums, and other techniques are also provided. | 2015-06-25 |
20150178438 | SEMICONDUCTOR MANUFACTURING USING DESIGN VERIFICATION WITH MARKERS - A first circuit design is entered in an electronic design automation (EDA) computer system. The first circuit design includes a first feature with a first node. A marker is associated with the first node and represents a voltage associated with the first node as an algebraic expression of a numerical value representing a property of the circuit design. The marker is used to determine if the component of the circuit design violates a design rule. | 2015-06-25 |
20150178439 | ELECTRON BEAM DRAWING APPARATUS, ELECTRON BEAM DRAWING METHOD, AND STORAGE MEDIUM - An electron beam drawing apparatus includes: an accepting unit that accepts input graphic information, which is information representing at least one graphic; a graphic width acquiring unit that acquires a width of each of the at least one graphic represented by the input graphic information; a generating unit that generates approximate graphic information representing at least one approximate graphic, which is a graphic configured by at least one rectangle matching the width of the graphic, and is a graphic that approximates each of the at least one graphic represented by the input graphic information; and a drawing unit that draws the at least one approximate graphic represented by the approximate graphic information generated by the generating unit. | 2015-06-25 |
20150178440 | Method and Device for Creating System Layout of Photovoltaic Open-Space Power Plant Having Solar Trackers - A method for creating a system layout of a photovoltaic open-space power plant includes: providing configuration data for the photovoltaic open-space power plant and components thereof, predefined configuration rules for the photovoltaic open-space power plant, and configuration parameters that define the configuration rules; and optimizing allocation of location of the components of the power plant in a system layout matrix, wherein the system layout matrix images a site for the photovoltaic open-space power plant using the configuration data and the defined configuration rules to create the system layout of the photovoltaic open-space power plant. | 2015-06-25 |
20150178441 | METHOD FOR WIRE WIDENING IN CIRCUIT ROUTING SYSTEM - A method for designing an integrated circuit (IC) includes, in part, dividing the wires disposed in the IC into a multitude of segments each having a length extending from a first end point to a second end point. Each segment is then widened without overlapping any adjacent object. As an example, an intermediate, or expanded, segment is formed that includes the first and the second end points and has a size to overlap with an adjacent object. The method includes identifying regions in the adjacent objects that overlap with the expanded segment. For each of the identified regions, an expanded region is formed, which has a shape and size to enclose the identified object with additional spacing around the perimeter. Next, the size of the expanded segment is reduced to form the wide segment such that the wide segment does not overlap any of the adjacent expanded objects. | 2015-06-25 |
20150178442 | METHODS AND SYSTEMS FOR CALCULATING FREE ENERGY DIFFERENCES USING A MODIFIED BOND STRETCH POTENTIAL - A method and system for calculating the free energy difference between a target state and a reference state. The method includes determining one or more intermediate states using a coupling parameter, performing molecular simulations to obtain ensembles of micro-states for each of the system states, and calculating the free energy difference by an analysis of the ensembles of micro-states of the system states. The method can be particularly suited for calculating physical or non-physical transformation of molecular systems such as ring-opening, ring-closing, and other transformations involving bond breaking and/or formation. A soft bond potential dependent on a bond stretching component of the coupling parameter and different from the conventional harmonic potential is used in the molecular simulations of the system states for the bond being broken or formed during the transformation. | 2015-06-25 |
20150178443 | COMPUTER-IMPLEMENTED METHOD FOR DESIGNING A BIOLOGICAL MODEL - A computer-implemented method for designing a biological model provides a set of biological models, each biological model comprising a plurality of elements and interactions between elements. Next the method provides groups of elements identified as identical, each element having an associated biological model. The method moves an element from a first group to a second group in order to correct the grouping of the elements; updates both groups; and creates a combined model by combining the set of biological models according to the updated groups. | 2015-06-25 |
20150178444 | METHOD AND DEVICE FOR DETERMINING HYDROPHOBIC ENERGY OF PROTEIN - A method and a device for determining hydrophobic energy of protein are provided. The method for determining hydrophobic energy of the protein includes: based on space coordinates of the amino acids, determining distances of one amino acid to the remaining amino acids (S | 2015-06-25 |
20150178445 | DETECTING VARIANTS IN SEQUENCING DATA AND BENCHMARKING - A system, method, and computer program product for detecting variants from sequencing data. Aligned sequencing data can be provided and filters can be applied to the aligned sequencing data. The filtered data can be used as input, and a first classifier can be applied to determine if any alteration is present beyond an expected threshold due to a sequencing error and candidate variants can be identified. The identified candidate variants can be passed through additional filters to remove false positives. A somatic status of the filtered candidate variants can be determined using a second classifier. The related apparatus, systems, techniques and articles are also described. | 2015-06-25 |
20150178446 | ITERATIVE CLUSTERING OF SEQUENCE READS FOR ERROR CORRECTION - Exemplary embodiments provide methods and systems for iterative clustering of sequence reads for error correction. Aspects of the exemplary embodiment include receiving a set of sequence reads and associated quality values; grouping the sequence reads into a set of initial clusters based on sequence similarity; generating a cluster consensus for each of the initial clusters; iteratively improving the clustering based on the cluster consensus and the quality values associated with the sequence reads; and generating and outputting a final cluster consensus for each of the clusters. | 2015-06-25 |
20150178447 | METHOD AND SYSTEM FOR INTEGRATING MEDICAL IMAGING SYSTEMS AND E-CLINICAL SYSTEMS - The present invention provides an imaging service method and system by which medical images stored in the DICOM standard in a central medical imaging repository may be seamlessly and securely accessed, and operated on, by electronic data capture (EDC) or eClinical data systems. The interoperability between web-based Medical Imaging Repositories and eClinical systems provided by the present invention may increase data quality and visibility to clinical workflow involving medical imaging, decrease delays in accessing images and their clinical measurements, and improve the functionality of DICOM-based MIR systems by providing measurement-based versions. | 2015-06-25 |
20150178448 | REAL-TIME COMMUNICATION BETWEEN MEDICAL DEVICES OVER A DICOM NETWORK - A method includes sending from a first medical device to a second medical device a request for data using a communication protocol that includes messages for conveying medical measurement results. In response to the request, at least one message is produced in the second medical device that includes the requested data and a dummy payload instead of the medical measurement results, and the at least one message is sent from the second medical device to the first medical device using the communication protocol. | 2015-06-25 |
20150178449 | Methods and Systems For Automated Personal Health Information Retrieval and Release - Methods and systems related to automating the retrieval and release of patient health care records are disclosed to make the process more accessible, more accurate, more timely, and more secure. The methods comprise enabling a requestor to transmit over a network a health care records request, proof of identity, and a designated destination to a system manager for review. The methods also comprise enabling the system manager to ensure that the requestor is authorized to obtain or release the requested records, access the requested records electronically, and send the requested records to the designated destination. The methods may also allow for automated payment of the fees associated with the records request. Systems employing the methods over one or more computer networks are also disclosed. | 2015-06-25 |
20150178450 | Web-hosted Engine for Continuously Improving the Identification of Safer Products for Administration - Genetic information relating to clinically significant attributes are generated as encrypted molecular signatures, which are provided to a subscriber to be carried as a card or in another form, including for display by a subscriber's computer or smart-phone or PDA. Different features of an individual's molecular attribute profile are preferably each represented by a particular shape, and the encryption can be by changing the color, or spatial orientation of the shapes. The signature is periodically updated as new clinically significant attributes become known. The process of updating the signature and using it to obtain suitable products (which don't have an unacceptable risk of generating an adverse reaction or outcome) is also described. | 2015-06-25 |
20150178451 | SYSTEM AND METHOD FOR HOSPITAL PERFORMANCE MEASURES - A system and method for analyzing performance of a health care facility is provided. The system and method includes accessing performance data for a plurality of performance parameters for the health care facility. The system and method also includes calculating a performance value for each performance parameter of the plurality of performance parameters. The system and method further includes calculating an overall performance value for the healthcare facility based on all of the performance values for the plurality of performance parameters. The system and method still further includes providing an indication of the overall performance value. | 2015-06-25 |
20150178452 | ORDERING A LIST OF CASES - A system for ordering a list of cases to be discussed in a meeting comprises an urgency unit ( | 2015-06-25 |
20150178453 | Systems and Methods for Core Measures - Included are systems and methods for providing core measures. One embodiment of a method includes receiving patient information regarding a patient, where the patient information includes data related to a treatment for the patient that was performed at a treatment facility, determining whether at least a portion of the patient information is related to a measure that is defined by a compliance agency, where the measure establishes a benchmark for quality regarding the treatment, and in response to determining that a least a portion of the patient information is related to the measure, categorizing the portion into the measure. Some embodiments include providing a question to a user wherein the question is associated with the measure and the treatment, receiving an answer to the question, and determining from the answer whether the treatment meets the benchmark of the measure. | 2015-06-25 |
20150178454 | CENTRALIZED EOB ARCHIVING AND ACCESS - Methods and systems provide substantiation proof of claims made against medical spending accounts. Medical-insurance adjudication explanations are received at a benefits-records system, specifying a medical-insurance claim submitted to a medical insurer and identifying an adjudication decision of the medical insurance claim. The medical-insurance adjudication explanations are stored in a common format. A request is received from an insured party to apply a payment amount to a medical spending account. The payment amount corresponds to an expense associated with a medical-insurance claim submitted to one of the medical insurers but not paid. The request is posted to a third-party administrator with information from the corresponding medical-insurance adjudication explanations. | 2015-06-25 |
20150178455 | Method and system for collecting medication adherence data - This is a method and system by which medication adherence data may be remotely collected to generate metrics for measuring adherence to a medication therapy as well as the appropriateness of a prescribed medication therapy. This invention provides the user of the apparatus with a system for taking medications both at and away from the home where the apparatus is located. Operation of the apparatus is monitored over time and with local calculation over time of the pattern of use to permit displaying a visual representation thereof. This invention is suited to improving the operation of a medication adherence program targeted at persons with acute or chronic conditions. | 2015-06-25 |
20150178456 | REMOTE HEALTH CARE VIA A TELEVISION COMMUNICATION SYSTEM - Methods and systems for providing health care remotely via a television communication system are presented. In one example, a communication gateway configured to communicate with a head-end of a television communication system may receive information associating a user with the communication gateway. Health care information related specifically to the user, as well as a gateway identifier associated with the user, may be received at the gateway from the head-end. The health care information may be forwarded to a display communicatively coupled to the gateway based on the gateway identifier corresponding to the communication gateway. | 2015-06-25 |
20150178457 | GRAPHICAL USER INTERFACE FOR OBTAINING A RECORD OF A MEDICAL TREATMENT EVENT IN REAL TIME - A handheld medical event recorder ( | 2015-06-25 |
20150178458 | PATIENT HEALTH MANAGEMENT PORTAL - A secure online patient health management portal for patient and payer/provider communication, documentation and improved workflow efficiency. A payer/provider portal provides patient and file management, patient tasking and reminders, calendaring, creation and management of medical condition templates, aggregate report generation and electronic informed consent. A patient portal provides personal health management, task management and reminders, comprehensive access to and management of health records and documentation, calendaring, online payer/provider and institution communication, prescription and finance management and discussion forums. | 2015-06-25 |
20150178459 | SYSTEM AND METHOD FOR MANAGEMENT OF PATIENTS AND CRITICAL INFORMATION - A computerized system and method for management of patients and critical information is disclosed. Such a method includes receiving a medical request at a processor from a patient, identifying the patient and an available health care provider from a database with a processor, sending a push notification to a first mobile device, wherein the first mobile device is operated by the available health care provider and the push notification includes a reference to the medical request, and transmitting the medical request and a clinical information of the patient to the first mobile device upon receipt of the reference at the processor. | 2015-06-25 |
20150178460 | SYSTEM, METHOD AND APPARATUS FOR SECOND OPINION - A method for providing a medical second opinion includes receiving a first ICD-9 code from a physician at a computerized system. The first ICD-9 code is related to a clinical interest of the physician. A second ICD-9 code is received at the computerized system from a patient. The computerized system compares the first and second ICD-9 code values. By finding equivalent or equal ICD-9 codes, a physician having an appropriate clinical interest is automatically referred to the patient. The physician provides a second medical opinion. | 2015-06-25 |
20150178461 | GROUP POSTURE HEALTH RISK MANAGEMENT - The seated posture of a subject person and a group of subject persons over a long term is analyzed to determine long-term health risk factors. Responses to the determined long-term health risk factors include posture improvement messages and group activity recommendations to reduce the long-term health risk factors as well as adjustments to reserves and premiums insuring costs associated with the long-term risks. | 2015-06-25 |
20150178462 | Methods and Compositions for Determining Smoking Status - Peripheral blood markers are provided whose expression levels correlate with smoking status. Predictive models developed using highly informative markers are disclosed, along with systems, kits, and methods for using the markers to provide a biochemical surrogate for a subject's smoking status. In some embodiments, the smoking-related disease is chronic obstructive pulmonary disease, chronic bronchitis, emphysema, lung cancer, and/or asthma. | 2015-06-25 |
20150178463 | SYSTEM AND METHOD FOR THE PROVISION, COORDINATION, AND DELIVERY OF COMPREHENSIVE COPD CARE - Provided are a method and system for assessing a condition of a patient with chronic condition. The system includes a non-transitory, computer-readable storage device that stores a plurality of variables relating to symptoms being experienced by the patient during an exacerbation of the chronic condition. A baseline component is operable to establish a baseline indicative of a normal condition of the patient with the chronic condition. And a risk assessment component is operable to compare the condition of the patient as determined based on the variables to the baseline to determine a severity of the exacerbation of the chronic condition relative to the baseline. | 2015-06-25 |
20150178464 | INSTRUMENT AND METHOD FOR ASSESSING SYMPTOMS OF VENOUS INSUFFICIENCY - The method of determining eligibility for seeking medical intervention to treat venous insufficiency. An individual is presented with a group of questions relating to varicose veins and an output score is calculated based on the individual's answer and the predetermined weight of the question. The output score is analyzed to determine the individual's eligibility for medical intervention. | 2015-06-25 |
20150178465 | MEDICATION RISK MITIGATION SYSTEM AND METHOD - A medication risk mitigation method utilizing three interventions: a prospective intervention performed by a prescriber, a concurrent intervention performed by a pharmacist and a retroactive intervention performed by a pharmacist. At each intervention, the system of the instant invention utilizes a computer program to compare each prescribed medication to a series of intrinsic and extrinsic data sources in order to identify potential contraindications and, if necessary, modify a prescription. The system also permits secure messaging between prescribers and pharmacists, each with access to the computer program, so as to facilitate communication and reduce medication risks. The system of this invention also permits modeling for hypothetical medication modifications based on the same intrinsic and extrinsic data sources. | 2015-06-25 |
20150178466 | METHODS FOR AGGREGATE REPORTING OF HEALTH DATA AND DEVICES THEREOF - A method for aggregate reporting of health data includes obtaining health data for a plurality of subjects in a population associated with an entity, the health data comprising diagnostic laboratory testing results, biometric information, or demographic information. Each of the subjects is allocated to one or more dimensions based on the obtained health data and one or more boundary conditions of each of the dimensions, the dimensions corresponding to biometric or demographic information of a specified type. Whether a number of subjects allocated to one of the dimensions is below a threshold is determined. One or more of the boundary conditions for one or more of the dimensions is adjusted when the number of subjects allocated to the one dimension is determined to be below the threshold. The determining and the adjusting are repeated until a number of subjects allocated to the dimensions is not below the threshold. | 2015-06-25 |
20150178467 | METHOD TO DETERMINE A PATIENT-SPECIFIC INJECTION PROFILE FOR ADMINISTERING A THERAPEUTIC SUBSTANCE - In a method to determine a patient-specific injection profile for injection of a therapeutic active substance into a vascular system of a patient, which can be implemented by an image analysis device a model of the current flow of a bodily fluid located in the vascular system is determined using a provided 3D image data set of a sub-region of the vascular system, by segmentation of the 3D image data. Inflows and outflows are determined, as well as an inflow curve of the fluid in the sub-region. A virtual two-dimensional representation of a contrast agent injected into the sub-region is determined. A provided 2D image data set, as a real two-dimensional depiction of the sub-region, is compared with the virtual representation and/or the model is adapted to individualize the model. The injection profile is determined by determination of at least one parameter of the planned injection using the individualized model. | 2015-06-25 |
20150178468 | SYSTEMS AND METHODS FOR CUSTOMIZING INTERACTIVE VIRTUAL BOUNDARIES - A method for customizing an interactive control boundary based on a patient-specific feature comprises identifying a reference feature associated with a virtual implant model. The method also comprises determining an intersection between the identified reference feature and a virtual model associated with an anatomy of the patient. A virtual boundary is generated based on the determined intersection between the identified reference feature associated with the virtual implant model and the virtual model associated with the anatomy of the patient. | 2015-06-25 |
20150178469 | METHOD OF MANAGING A TAKING MEDICINE, USER TERMINAL FOR THE SAME AND SYSTEM THEREFOR - A method of managing a taking medicine, user terminal for the same and system therefor are disclosed. The present invention includes detecting an identification information of a medicine using a user terminal, transmitting a taking medicine information of the medicine from a sever to the user terminal using the detected identification information, setting a user's taking medicine schedule in the user terminal in accordance with the taking medicine information. Accordingly, a user is guided in taking a medicine. And, it is able to check whether a medicine has been taken. | 2015-06-25 |
20150178470 | CLINICAL EFFECT OF PHARMACEUTICAL PRODUCTS USING COMMUNICATION TOOL INTEGRATED WITH COMPOUND OF SEVERAL PHARMACEUTICAL PRODUCTS - A combination of N>1 substances with pharmaceutical activity against at least one medical condition for treating the medical condition with a program including instructions causing a computer to perform a method including:
| 2015-06-25 |
20150178471 | IMPROVED CLINICAL EFFECT OF PHARMACEUTICAL PRODUCTS USING COMMUNICATION TOOL AND LIFE-STYLE FACTORS - Substance with pharmaceutical activity against a medical condition for use in a treatment of the medical condition in combination with a computer program product including instructions causing a computer to perform a method including the steps
| 2015-06-25 |
20150178472 | INTERVENTIONAIRE - A computerized web-based system for designing interactive screening and brief interventions targeting risky health behaviors, providing complex content branching sequences based on user inputs, the ability to create readily usable databases from participant responses, the ability to seamlessly incorporate text, audio, images, and video into intervention content, and the dynamic creation of informative graphics based on user response. The surveys are targeted towards individuals who indulge in harmful behaviors such as excessive use of alcohol or drugs. It is used to evaluate and give feedback based on a user's response to a set of questions. | 2015-06-25 |
20150178473 | System for Clinical Trial Subject Compliance - The present invention is designed to develop research protocols for clinical trials. The invention also can track and enhance subject compliance with a research protocol. The invention further provides evaluability data related to subject performance in the clinical trial. According to an alternative embodiment of the invention, a portable electronic device is used to query and collect data from the subject. | 2015-06-25 |
20150178474 | System for Clinical Trial Subject Compliance - The present invention is designed to develop research protocols for clinical trials. The invention also can track and enhance subject compliance with a research protocol. The invention further provides evaluability data related to subject performance in the clinical trial. According to an alternative embodiment of the invention, a portable electronic device is used to query and collect data from the subject. | 2015-06-25 |
20150178475 | Selective Oligomerization Catalysts and Methods of Identifying Same - A method comprising obtaining a control catalyst set having a plurality of members each having a control characteristic, wherein the members of the control catalyst set comprise a transition metal and an organic ligand, selecting an intermediate formed during a catalytic cycle of each member of the control catalyst set, geometrically and energetically optimizing a structure of the intermediate, determining one or more characteristics of the geometrically and energetically optimized structure of the intermediate, determining a mathematical relationship between the control characteristic and the one or more characteristics of the geometrically and energetically optimized structure of the intermediate, utilizing the mathematical relationship to identify one or more members of a sample catalyst set having a control characteristic within a desired range, contacting the identified sample catalyst with a reactant under conditions suitable for the formation of product, and recovering the product. | 2015-06-25 |
20150178476 | SYSTEM AND METHOD OF MONITORING FONT USAGE - A system and method of monitoring font usage is provided whereby fonts are monitored on a distributed computer network such as the Internet by searching for a font represented by a font image or font file, extracting metadata from said font image or font file to populate a font database, and using information extraction means and comparison means with information on the font database to detect and record whether usage of the font has been authorized according to the license of the copyright owner. Preferably, said comparison means are implemented by generating an image preview of an unknown font file and comparing the hash of the resulting image with hashes of images of known font files. Reports may be generated which rank infringing websites according to predetermined criteria including estimated number of downloads of restricted font files and financial status of the website owner. | 2015-06-25 |
20150178477 | Data Collection Privacy Agent to Ensure, Absent an Agreement, that Only Public Standards are Collected, and to Package Private Data Exclusively for Intended Recipients - A system protects a mobile wireless device owner/user who has entered into a private data collection agreement with a service provider or subscribed as a survey participant. The system enables each survey or service to define a profile, which contains triggers, data to be collected, conditions to package it, and targets to receive packages. Embedded within the user's device, a data collection privacy agent verifies the owner/user's permission for each profile. When a permitted privacy agent is triggered, it stores the data to be collected upon each specific trigger condition or event. Upon determining a condition to package collected data, the permitted privacy agent compiles a package containing only the data related to a permitted profile sourced from an authenticated survey or service, encrypts it, transmits the encrypted package to a target defined within the profile, and reallocates any storage space which is no longer needed. | 2015-06-25 |
20150178478 | PROTECTING MEDIA ITEMS USING A MEDIA SECURITY CONTROLLER - A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller sends a message in response to the rendering device reading an authorization file. The message being for the rendering device to read a portion of data from the memory and to provide the portion of data to the media security controller. The media security controller receives the portion of the data from the rendering device, trans forms the portion of the data, and sends the transformed portion of the data to the rendering device. | 2015-06-25 |
20150178479 | Transmission of a Digital Content Between a Source Terminal and a Recipient Terminal - A method is provided for transmission, between a source terminal and at least one first recipient terminal, of digital content containing a datum representing a number of authorized loans of the digital content by the source terminal. The method includes the following steps: modification of the digital content including insertion, by the source terminal, into the digital content, of a datum representing a number of authorized loans of the digital content by the first recipient terminal, which is lower than the number of authorized loans of the digital content by the source terminal; and transmission of the modified digital content to the at least one recipient terminal. | 2015-06-25 |
20150178480 | RECORDING MEDIUM DEVICE, TERMINAL DEVICE, DISTRIBUTION DEVICE, CONTROL METHOD, AND PROGRAM RECORDING MEDIUM - When the terminal device attempts to use a special content, which has an attribute including information distinguishing the special content from regular contents and which is stored in the recording medium device, the recording medium device refers to the revocation information indicating terminal devices restricted from using the special content. When the recording medium device determines the terminal device as a terminal device to be restricted from using the special content based on the terminal identifying information of the terminal device, the usage information output unit of the recording medium device does not transmit the necessary information for using the special content to the terminal device. | 2015-06-25 |
20150178481 | PLATFORM-HARDENED DIGITAL RIGHTS MANAGEMENT KEY PROVISIONING - Embodiments of an invention for platform-hardened digital rights management key provisioning are disclosed. In one embodiment, a processor includes an execution unit to execute one or more instructions to create a secure enclave in which to run an application to receive digital rights management information from a provisioning server in response to authentication of the application by a verification server. | 2015-06-25 |
20150178482 | LICENSE INFORMATION ACCESS BASED ON DEVELOPER PROFILES - Disclosed herein are systems, methods, and software for facilitating application licensing. In at least one implementation, license information for an application is identified based at least in part on a developer profile associated with the application and a state of a license for the application identified from at least a portion of the license information. Presentation of the application in accordance with the state of the license for the application can then be initiated. | 2015-06-25 |
20150178483 | SOFTWARE SYSTEM TEMPLATE PROTECTION - Various embodiments herein are in the form of at least one of systems, methods, and software for software system template protection. With the help of software system template protection, developments, configurations, and information technology (IT) infrastructure setup can be protected and controlled in an efficient manner during the change process, while building and configuring applications and IT Infrastructure as well during the whole Application Lifecycle Management process. When changes are made in an instance of a software system deployment, prior to committing (i.e., storing) the changes, a change management service is called to determine whether such changes are allowed in view of one or more templates deployed to the instance of the software system and change restrictions associated therewith. | 2015-06-25 |
20150178484 | Remote Accessory Management in a Programming Environment for a Progammable Metrology System - A programming environment for a metrology system comprises a remote accessory managing portion that connects to a remote device (e.g., a user's smart phone or tablet) that is not normally associated with the metrology system. The remote accessory managing portion may comprise an accessory communication portion configured to communicate with a remote device, an accessory authorization portion configured to authorize the remote device for connection to the programming environment, and an accessory data management portion configured to receive and store a set of reference information data from the authorized remote device. The remote accessory managing portion is configured such that when an authorized remote device sends the set of reference information data to the accessory data management portion, it is automatically associated with a current part program instruction representation indicated in at least one of the program editing environment and a user interface of the remote device. | 2015-06-25 |
20150178485 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus comprises: storage unit that stores a first converted value converted by a one-way function in association with user identification information; input unit that receives, from a user, input of the user identification information and authentication information; holding unit that holds the authentication information input by the user; authentication unit that executes user authentication by converting, by the one-way function, the authentication information input by the user into a second converted value and checking the second converted value against the first converted value stored in the storage unit in association with the user identification information input by the user; and control unit that, based on success of the user authentication, causes the storage unit to store the authentication information held by the holding unit in place of the first converted value stored in the storage unit. | 2015-06-25 |
20150178486 | Authentication Frequency and Challenge Type Based on Environmental and Physiological Properties - An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.). | 2015-06-25 |
20150178487 | METHODS AND SYSTEMS FOR BIOMETRIC-BASED USER AUTHENTICATION BY VOICE - Disclosed herein are system, method, and computer program product embodiments for authentication of users of electronic devices by voice biometrics. An embodiment operates by comparing a power spectrum and/or an amplitude spectrum within a frequency range of an audio signal to a criterion, and determining that the audio signal is one of a live audio signal or a playback audio signal based on the comparison. | 2015-06-25 |
20150178488 | METHOD AND APPARATUS FOR EYE-SCAN AUTHENTICATION USING A LIQUID LENS - A method and apparatus for providing authentication using an adaptive liquid lens are disclosed. For example, in one embodiment, the method receives a request for authentication from a mobile endpoint device of a user, wherein the request comprises a first retinal image of the user captured using an adaptive liquid lens of the mobile endpoint device. The method obtains a second retinal image of the user, wherein the second retinal image is a stored retinal image of the user. The method authenticates the first retinal image against the second retinal image. In another embodiment, the method captures a first retinal image of a user via a mobile endpoint device of the user, wherein the mobile endpoint device comprises an adaptive liquid lens. The method then sends a request for authentication from the mobile endpoint device over a network, wherein the request comprises the first retinal image. | 2015-06-25 |
20150178489 | METHOD OF AUTHENTICATION OF AT LEAST ONE USER WITH RESPECT TO AT LEAST ONE ELECTRONIC APPARATUS, AND A DEVICE THEREFOR - A method of authentication of at least one user, by using a portable electronic authentication device, with respect to at least one electronic apparatus. The method includes establishing a communication between the authentication device and the electronic apparatus, detecting a movement performed by the user using the authentication device, comparing the detected movement with a stored user profile, and authenticating the user if the detected movement matches a stored user profile. | 2015-06-25 |
20150178490 | System For And Method Of Generating Visual Passwords - Systems and methods for creating a visual password are presented. A user having an account or profile is given the option to create a visual password via a graphical user interface. The interface displays a plurality of themes to the user, wherein each theme represents a category of images. The user selects a theme and is presented with a plurality of images within the category. The user selects one or more images in a certain order to create a visual password. The selected images and order of selection are saved as the user's visual password. When the user later attempts to electronically access his account, the user will be required to select the correct pictures in the correct sequence in order to access his account. | 2015-06-25 |
20150178491 | PORTABLE ELECTRONIC DEVICE - A portable electronic device includes a display unit; an input detection unit that detects an input to the display unit, and a lock control unit that sets or releases a locked state for a part or all of functions of the portable electronic device when a predetermined input is detected by the input detection unit, wherein the predetermined input includes inputs, in which a preset screen operation is continuously performed by a predetermined number of times in an area of the display unit. | 2015-06-25 |
20150178492 | SECURE INFORMATION FLOW - Secure information flow may include a service receiving a request for data from a caller. The service may respond to the request with the requested data via a secure flow container. The secure flow container may then send the information to the caller component. Before the secure flow container receives or sends the information, a monitoring environment may permit the secure flow container to receive or send the information, respectively. | 2015-06-25 |
20150178493 | Systems and Methods for Password Reset - Systems and methods are provided for password reset. For example, a first server receives a request operation instruction from a user terminal, wherein the request operation instruction includes account information and identity information; the first server determines whether to permit password reset for a first account indicated by the account information; in response to the password reset for the first account being permitted, the first server authenticates the account information and the identity information; if the authentication of the account information and the identity information is successful, the first server processes the request operation instruction and sends a password reset prompt to the user terminal; the user terminal receives the password reset prompt and sends to the first server password information set by a user in response to the password reset prompt; and the first server sends to a second server a password reset request that carries the password information. | 2015-06-25 |
20150178494 | METHOD AND SYSTEM FOR VERIFYING AN ACCESS REQUEST - Systems and methods for use in verifying a request for access to data in a system comprising a first module having access to a first trusted indicator of time, a second module having access to an untrusted indicator of time and a computing device having access to a second trusted indicator of time. The first module generates a password using at least the first trusted indicator of time. The second module receives a password associated with the request for access to data and validates the received password using at least the untrusted indicator of time. The second module then causes a message to be transmitted to the computing device, the message comprising data indicative at least of the untrusted indicator of time used to validate the received password. The computing device then generates data indicative of a comparison between the untrusted indicator of time and the second trusted indicator of time, and uses the generated data to provide said access to data. | 2015-06-25 |
20150178495 | Pervasive Package Identifiers - A package identifier for a package from which an application is installed on a computing device is obtained. The package identifier is assigned to each of one or more processes created for running the application and, for each of the one or more processes, whether the process is permitted to access a resource of the computing device is determined based at least in part on the package identifier. | 2015-06-25 |
20150178496 | PROTECTION SYSTEM INCLUDING MACHINE LEARNING SNAPSHOT EVALUATION - This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to generate snapshots of device operation. The MLE may use active or planned operations in the snapshot to learn user behavior. Once normal user behavior is established for the device, the MLE may be able to determine when snapshots include unusual behavior that may signify a threat to the device. Snapshots determined to include unusual behavior may be transmitted to a remote resource for evaluation. The remote resource may include at least a user behavior classification engine (UBCE) to classify the user behavior by characterizing it as at least one type of use. The snapshot may be analyzed by the UBCE to determine if potential threats exist in the device, and the threat analysis may be provided to the device for evaluation and/or corrective action. | 2015-06-25 |
20150178497 | Strongly Isolated Malware Scanning Using Secure Virtual Containers - Described systems and methods allow protecting a host system, such as a computer or smartphone, from malware. In some embodiments, an anti-malware application installs a hypervisor, which displaces an operating system executing on the host system to a guest virtual machine (VM). The hypervisor further creates a set of virtual containers (VC), by setting up a memory domain for each VC, isolated from the memory domain of the guest VM. The hypervisor then maps a memory image of a malware scanner to each VC. When a target object is selected for scanning, the anti-malware application launches the malware scanner. Upon intercepting the launch, the hypervisor switches the memory context of the malware scanner to the memory domain of a selected VC, for the duration of the scan. Thus, malware scanning is performed within an isolated environment. | 2015-06-25 |
20150178498 | SECURE ATTENTION FOR MOBILE DEVICES - For a secure attention indicator at a mobile device, a method is disclosed for detecting a secure attention indicator at a mobile computing device, the secure attention indicator comprising input from one or more of a microphone, a touch sensor, an accelerometer, a photoreceptor, and an orientation sensor, notifying the mobile computing device in response to detecting the secure attention indicator, and executing secure trusted executable code in response to the notification, the secure trusted executable code not modifiable by a user. | 2015-06-25 |