41st week of 2015 patent applcation highlights part 44 |
Patent application number | Title | Published |
20150286728 | OBSERVER FILTERED ACTIVITY RECOMMENDATIONS - Technologies related to observer filtered activity recommendations are generally described. In some examples, a computing device may collect activity and observer information for a device user, may identify limited observer activities, and may generate observer filtered activity recommendations for the device user, the observer filtered activity recommendations corresponding to the identified limited observer activities. Observer filtered activity recommendations may optionally be restricted in the presence of current observers outside a limited observer group. In some examples, the computing device may provide automated access to observer information and/or to observer filtered activity information to enable observer filtered activity recommendations by applications accessing the observer information and/or the observer filtered activity information. | 2015-10-08 |
20150286729 | METHOD AND SYSTEM FOR CONTENT SEARCHING - A method of content searching is provided. The method includes registering a plurality of tabs operable to respectively display a plurality of web pages, receiving a keyword for content searching with respect to the plurality of tabs, searching for the keyword in each of the plurality of web pages displayed through the plurality of tabs, and filtering the web pages based on the search. | 2015-10-08 |
20150286730 | SEMANTIC ANALYSIS OF INFORMATION - Semantic information that describes data sets is inferred based upon a semantic analysis performed on data sets retained within a data repository. The semantic analysis can include a determination of formats associated with fields of the data sets and a comparison of values of the fields against reference data sets having predetermined semantic types. Correlations are inferred between data sets based upon respective semantic information. The correlations are incorporated into visualizations displayed in connection with a graphical user interface. | 2015-10-08 |
20150286731 | SEMANTIC ANALYSIS OF INFORMATION - Semantic information that describes data sets is inferred based upon a semantic analysis performed on data sets retained within a data repository. The semantic analysis can include a determination of formats associated with fields of the data sets and a comparison of values of the fields against reference data sets having predetermined semantic types. Correlations are inferred between data sets based upon respective semantic information. The correlations are incorporated into visualizations displayed in connection with a graphical user interface. | 2015-10-08 |
20150286732 | Method, Apparatus And System For Obtaining Associated Word Information - A method for obtaining associated word information, a searching keyword is obtained. An associated word list corresponding to the searching keyword is obtained, wherein the associated word list comprises one or more associated words containing the searching keyword. For each associated word in the associated word list, a process includes obtaining matching word information corresponding to the associated word, wherein the matching word information comprises text information same as the associated word list and the attribute information; obtaining a displaying template corresponding to the matching word information; generating associated word information to be displayed in a client according to the matching word information and the displaying template. | 2015-10-08 |
20150286733 | APPARATUS AND METHOD FOR SEARCH AND RETRIEVAL OF DOCUMENTS - A system for the support and management of search for documents is presents. The system includes knowledge-database, query interface and communication to a database of documents to be searched. Information generated during a search session is collected by the system and is added to the knowledge-database. The information is ranked automatically according to the usage of that information by the user. During successive search session, or during search made by other users, the system uses the knowledge-database to support the users with keywords, queries and reference to documents. | 2015-10-08 |
20150286734 | COMPUTER SYSTEM AND METHOD FOR INTEGRATING STRUCTURED DATA REPRESENTATION BETWEEN USERS AND FOREIGN NATIONAL/INTERNATIONAL TRADEMARK OFFICES - A computer system and method for integrating structured data foreign trademark office computer storage systems with one or more private disparate computer networks. The computer system in turn provides specific integration computer framework architecture with an integration layer for one or more private disparate networks to connect and share structured data with a national office computer filing system. | 2015-10-08 |
20150286735 | IDENTIFYING URL TARGET HOSTNAMES - Techniques are provided for displaying a uniform resource locator (URL) to assist a user in determining whether a URL destination is what the user expects. A link is presented for selection to a user, and a URL corresponding to the link is accessed. A portion of the URL that corresponds to a hostname component of the URL may be identified, and the URL may be displayed. The hostname component of the URL is visually distinguished from other components of the URL. In addition to or as an alternative to displaying the URL and visually distinguishing the hostname component, a warning message relating to the hostname portion of the URL may be displayed. The techniques may be implemented as a software plug-in or in any type of software application that is capable of recognizing URLs. | 2015-10-08 |
20150286736 | COLLECTING LEARNING MATERIALS FOR INFORMAL LEARNING - A method of collecting learning materials for informal learning may include detecting an addition of an item to a curation. The method may include extracting one or more links in a page referenced by the item. The method may include downloading pages corresponding to the one or more links. The method may include filtering the downloaded pages to generate candidate index pages. The method may also include identifying an appropriate index page from the candidate index pages. The method may further include locating a primary information block in the appropriate index page. The method may also include generating an automated extraction rule configured to direct a system to the primary information block of the appropriate index page. | 2015-10-08 |
20150286737 | SYSTEM AND METHOD TO SHARE CONTENT UTILIZING UNIVERSAL LINK FORMAT - A system to share content utilizing universal link format is described. The system may an access request detector, a universal link interpreter, and a communication module. The access request detector may detect a request to access target content provided by a resource host computer. The universal link interpreter may determine that the request is associated with a uniform resource locator (URL) that comprises one or more directives for directing the requested content to an execution environment suitable for a platform of the client computer, may determine a platform of the client computer, and determine execution environment for the requested target content. The universal link interpreter may then interpret the one or more directives in the URL, based on the determined execution environment. | 2015-10-08 |
20150286738 | METHOD, SYSTEM, ELECTRONIC DEVICE AND SERVER FOR SYNCHRONOUS DISPLAY OF OPERATING INFORMATION - A method for synchronous display of operating information includes the steps of: receiving a request from a first device for access to a file stored in a server; providing the file to the first device and a second devices, contents of the file being displayed on each of the first and second devices in a form of a web page using a respective web browser launched thereby; receiving, from the first device, operating information that is associated with an input operation performed upon the web page of the first device; and relaying the operating information to the second device. The operating information is used to display an indicator associated therewith on the web page of the second device. | 2015-10-08 |
20150286739 | HTML5-PROTOCOL-BASED WEBPAGE PRESENTATION METHOD AND DEVICE - Disclosed in an embodiment of the present application is an HTML5-protocol-based webpage presentation method, the method includes: acquiring an HTML5-protocol-based webpage resource; using Javascript Language to parse the webpage resource to generate a DOM object node; rendering the DOM object and presenting the webpage. Also disclosed in the embodiment of the present invention is an HTML5-protocol-based webpage presentation device. The embodiment of the present invention realizes support for the HTML5 protocol without using an external plug-in, thus avoiding the operations of plug-in installation, function upgrading and the like, and improving the presentation efficiency of an HTML5-protocol-based webpage. | 2015-10-08 |
20150286740 | DEVICE, MEDIUM, AND METHOD FOR RETRIEVING OBJECT - A device configured to retrieve a markup language file; identify, based on the markup language file, an item to be used on a web page, address information for retrieving an object for the item, and an object type corresponding to the object; retrieve an evaluation result for the object; identify the object as an object to be used based on the evaluation result; identify address information of the object; and retrieve and execute the object based on the address information. | 2015-10-08 |
20150286741 | Pre-Fetching Map Data Based on a Tile Budget - To select map data for storage in a memory of a computing device, geographic locations for which a user of a client device is expected to subsequently request digital maps are determined. Prior to receiving a user request for map data related to the geographic locations, pre-fetch map data for generating digital maps including the plurality of geographic locations is determined. Further, a memory budget for storing map data in a memory of the client device is determined along with a priority for retrieving map data from a remote database to the memory of the client device. At least a portion of the determined pre-fetch map data is retrieved from the remote database to the memory of the client device in accordance with the determined memory budget and the determined priority. | 2015-10-08 |
20150286742 | SYSTEMS AND METHODS FOR OPTIMIZING CONTENT LAYOUT USING BEHAVIOR METRICS - Systems and methods for optimizing content layout using behavior metrics are provided. Behavioral data is collected for a content item presented on a client device. The behavioral data indicates various locations within a display area of the content item at which a user action (e.g., clicking) occurs. The behavioral data is used to assign weights to various components of a layout scheme for the content item. A user action that occurs within an area of the content item associated with a particular component of the layout scheme contributes to the weight of the corresponding component. The weights associated with each component of the layout scheme are used to optimize the layout for the content item. Components with greater assigned weights are highlighted or emphasized. The display sizes of components in the optimized layout scheme may correspond to the weights associated with the components. | 2015-10-08 |
20150286743 | METHOD, SYSTEM, AND DEVICE FOR MARKING WEB CONTENT - Techniques for performing marking and reminding on contents in a web page are disclosed. A browser client of a mobile terminal presets reminder content and a display style and stores the same in the mobile terminal. The method comprises: acquiring a source code of a web page; looking up the source code to obtain content to be reminded semantically associated with the preset reminder content; and marking and displaying the content to be reminded using the preset display style in the web page. The present invention marks content which concerns a user before a web page is displayed to the user after loading has finished, and marks and displays new content in a designated format using a special preset style, so that the new content is more conspicuous in a page. | 2015-10-08 |
20150286744 | USING DOCUMENT TEMPLATES TO ASSEMBLE A COLLECTION OF DOCUMENTS - Methods and apparatus, including computer program products, to assemble a collection of documents according to a document list. The document list represents documents to be included in the collection, and includes multiple entries that identify document templates. Each document template includes instructions that a web server can execute to generate a web document based on one or more parameters. A web document corresponding to each of the multiple entries is requested; the requested web documents are received and stored in the collection of documents. Links in the received web documents can be identified and updated. The collection of documents can be accessed as part of a web site. | 2015-10-08 |
20150286745 | METHOD AND SYSTEM FOR DYNAMIC WEBPAGE INFORMATION PRESENTATION - A method for dynamically presenting webpage information and the related systems are disclosed. The method includes: receiving an instruction to invoke a dynamic webpage including first account information; sending an information acquisition instruction to each designated online social platform according to second account information, which corresponds to the first account information, of each designated online social platform; receiving data returned by each designated online social platform and performing format conversion on the data, so as to convert the data into data in a designated data format; and integrating the data in a converted format and of each designated online social platform into a complete data list and displaying the integrated data list. According to the solutions of the present disclosure, when webpage information of multiple online social platforms needs to be viewed, it is unnecessary to separately log in to multiple account numbers for viewing. After data is pulled from each online social platform, the data may be converted into data in a uniform format. The data may then be integrated and viewed. System consistent with the present disclosure enables data sharing between different types of online social network products. | 2015-10-08 |
20150286746 | Parser Wrapper Class - A system, a method, a device, and a computer program product for parsing a document are provided. A processing instance for parsing by at least one parsing module in a plurality of parsing modules is generated. The generated processing instance is intercepted. Based on the intercepted generated processing instance, a parsing module is selected. Using the selected parsing module, the processing instance is parsed to generate a parsed processing instance. | 2015-10-08 |
20150286747 | ENTITY AND ATTRIBUTE RESOLUTION IN CONVERSATIONAL APPLICATIONS - User input expressed as text may be analyzed for determining a type of response, such as an application response, and/or determining a type of task that is requested by the user input. Entity representations may be identified, classified and/or or tagged based on a type of response, type of task and/or a set of entity types. A surface form of an entity, ambiguous entity representation and/or other type of expression within the user input may be resolved, normalized and/or mapped to a normalized value. Normalizing entities and/or entity attributes may involve using a set of normalization rules, a lookup table, one or more machined learned methods, and/or an entity normalization index that associates entities with alternate surface forms derived from web corpora. The normalized value may be used to construct a request to a structured knowledge source and/or an application. | 2015-10-08 |
20150286748 | Data Transformation System and Method - A computer-implemented system and method for performing data-processing in a computing environment having a file system (FS) and a computing system (CS) to process at least one original Directed Graph (DG) having multiple edges and vertices. The DG includes at least one input vertex representing a source of data elements from the FS with each input vertex having at least one attribute that specifies data element processing constraints, at least one output vertex representing a destination of data elements, and at least one transform vertex representing transformation operations on the data elements. The system and method analyze and condition data elements available from the DG input vertices, and customize the original DG into at least one customized DG. A list of Tasks is created for execution in the CS to process the customized DG in an execution engine capable of performing requested data transformations in the computing environment. | 2015-10-08 |
20150286749 | WHOLE INTEGRATED ANALYSIS MODEL CREATION ASSIST DEVICE, AND WHOLE INTEGRATED ANALYSIS MODEL CREATION ASSIST METHOD - Provided is a whole integrated analysis model creation assist device and a whole integrated analysis model creation assist method such that an analysis model can be easily constructed and the construction time of the analysis model can be effectively reduced. Via a connection identifier associating boundaries for data exchange between an analysis model created with respect to one analysis domain and an analysis model created with respect to another analysis domain, at least one analysis model created with respect to the one analysis domain and a plurality of analysis models created with respect to the other analysis domain are connected and integrated. | 2015-10-08 |
20150286750 | MODEL DRIVEN CONNECTION APPROXIMATION FOR MECHANICAL, ELECTRICAL AND PLUMBING DRAWINGS - A system displays a raster-based or a vector-based formatted drawing on a user interface. A user selects a device on the drawing. The selected device is classified on a template. The drawing is searched for the classified template. Three-dimensional characteristics are imbued to the selected device. Connection types among different types of devices on the drawing are received into the system. A search is performed for all connection instances throughout the drawing using the received connection types. An object oriented and three-dimensionally, spatially referenced view of the drawing is generated on a user interface. | 2015-10-08 |
20150286751 | LOAD RATING OF BRIDGES, INCLUDING SUBSTRUCTURE - For bridges over waterways which are susceptible to scour, the load carrying capacity of the substructure may be reduced by scour. These bridges must be evaluated for reduced load rating and/or posting limits. Here, the substructure load rating is used in connection with calculating the bridge load rating. This is often limited by the substructure load carrying capacity and the tolerable deformation. Thus, bridges impacted by scour need to be judged based on both the superstructure and substructure components. The system/process to assess the substructure load rating uses an analytical method which combines numerical methods and empirical calculations to predict the behavior of a bridge's superstructure and substructure. Limited instrumentation is installed at critical locations on the bridge. The measurements are then used to verify and refine predictions to arrive at a substructure load rating which is usable with the superstructure load rating to define a safe load carrying capacity. | 2015-10-08 |
20150286752 | CONCRETE BLOCK MODULAR INTERFACE - A system for designing a structure comprising a design center system operating on a processor and configured to generate one or more user controls to generate an environment, the design center system further comprising. A model system operating on the processor and configured to receive the environment and to generate one or more user controls to place a plurality of modules at user-selected locations within the environment to form a structure. An assembly sequence system operating on the processor and configured to receive the structure and to generate a plurality of images showing a construction sequence for the structure. A bill of materials system operating on the processor and configured to receive the structure and to generate a bill of materials that lists materials required to build the structure. A countertop design system operating on the processor and configured to receive the structure and to generate a countertop template for the structure. An order generation system operating on the processor and configured to receive the structure and to generate an order for the materials required to build the structure. A remote interface system operating on a second processor and configured to allow a user to access the design center system and to interface with the user controls of the design center system. | 2015-10-08 |
20150286753 | Estimating Think Times - Methods, systems, and computer programs, for estimating think times. One of the methods includes receiving a request to perform a test of one or more computing resources. The test of the one or more computing resources is performed by simulating an interaction of one or more simulated users with the one or more computing resources. Requests are submitted from the simulated user for execution by the one or more computing resources. Respective response times of the one or more computing resources to each of the requests are measured. An estimated think time of the simulated user is computed, wherein the estimated think time is computed based on at least one preceding response time. | 2015-10-08 |
20150286754 | METHOD AND SYSTEM FOR MERGING AMBIENT SENSOR DATA WITH COMMUNICATION DATA, AND USE OF THE SYSTEM - A method for merging environment sensor data with communication data, wherein the environment sensor data is detected by at least one environment sensor and wherein the communication data is contained in vehicle-to-X messages which are received by vehicle-to-X communication. The communication data selected by pre-processing is fed directly to the sensor data merging process, wherein the sensor data merging process merges the selected communication data with environment sensor data to form an environment model. A corresponding system and a usage of the system are also disclosed. | 2015-10-08 |
20150286755 | METHOD FOR SIMULATION OF MULTIPHASE FLUID FLOW IN PIPELINES - This invention relates to a method for one dimensional simulation of multiphase fluid flow in pipelines enabling determination of pressure drop, fluid volume fractions, and heat and mass transfer coefficients in multiphase pipeline flows, wherein the method comprises providing real world values of the superficial velocities of each of the continuous fluid phases, the pipe diameter, and the inclination angle of the pipeline relative to the horizontal plane, providing initial values describing the flow geometry of the multiphase flow, where the initial values at least comprises the axial pressure gradient and the positions of the large scale interfaces separating the continuous fluid phases, employing a one-dimensional numerical model based on Eulerian formulated transport equations of the multiphase flow in the pipeline, solving the numerical model with the set of input values from step a) and b) to determine the flow parameters of the multiphase flow, and displaying one or more of the determined flow parameters. | 2015-10-08 |
20150286756 | THERMAL FLUID ANALYSIS METHOD, INFORMATION PROCESSING DEVICE, AND RECORDING MEDIUM STORING THERMAL FLUID ANALYSIS PROGRAM - A thermal fluid analysis method, includes: calculating, by a computer, a first component of a new first sample different from a plurality of second samples; setting a second component obtained by unitizing the first component to a first base; adding the first base to a plurality of second bases of the plurality of second samples when the first component is greater than a threshold value; and correcting a low-dimensional model that expresses a plurality samples with superposition of a plurality of bases by using the first base and the plurality of second bases. | 2015-10-08 |
20150286757 | Method for Efficiently Predicting the Quality of Additively Manufactured Metal Products - This invention is focused on a new method of numerical modeling of the Direct Metal Additive Manufacturing process with the layer-by-layer building of the metal products. This method separates the global macro-scale modeling and the local micro-scale modeling, with a database to link in between. The database containing the micro-scale modeling results can be established well before the global scale product simulation is conducted. As a result, this invention only uses the global modeling and database to simulate the additive manufacturing of the whole product, without using the time-consuming micro-scale modeling simultaneously. This new method enables very rapid simulation of the additive buildup process of products and prediction of product qualities, which only takes minutes to complete the simulation instead of weeks needed by the conventional methods of simulation known to those skilled in the art. | 2015-10-08 |
20150286758 | CIRCUIT SIMULATION DEVICE, CIRCUIT SIMULATION METHOD, AND PROGRAM - Provided is a circuit analysis system using a circuit simulation model generation method such that, in a circuit including an LSI, signal characteristics and power supply characteristics can be analyzed accurately and in a short time. Provided is a circuit simulation device characterized by having: an input device ( | 2015-10-08 |
20150286759 | COMPUTER IMPLEMENTED METHOD FOR HYBRID SIMULATION OF POWER DISTRIBUTION NETWORK AND ASSOCIATED COMMUNICATION NETWORK FOR REAL TIME APPLICATIONS - The present invention relates to a computer-implemented method for a hybrid simulation of an electric power distribution network and an associated communication network connected therewith to determine a time delay between an event occurring in the power distribution network and a desired effect of a performed measure in the power distribution network, the measure having been decided on by means of a decision-making algorithm as a reaction to the event. | 2015-10-08 |
20150286760 | SCAN CELL ASSIGNMENT - One or more systems and methods for scan cell assignment for a design layout of a semiconductor arrangement are provided. The design layout is evaluated to identify a set of sequential cells, such as flip flops connected to circuitry by data paths. Sequential cells within the set of sequential cells are assigned to either a scan cell assignment or a non-scan cell assignment based upon a control path criterion, a register bank criterion, a pipeline depth criterion, a sequential loop criterion, or other criteria to create a cell assignment list. Scan paths are connected to sequential cells assigned to the scan cell assignment so that test patterns can be sent to and received from such sequential cells during testing of the semiconductor arrangement for defects. Power, performance, and area utilization are improved because at least some sequential cells are assigned to the non-scan cell assignment. | 2015-10-08 |
20150286761 | MULTI-FPGA PROTOTYPING OF AN ASIC CIRCUIT - The invention concerns a method of designing a prototype comprising a plurality of programmable chips, such as FPGA chips, for modelling an ASIC circuit, said ASIC circuit being intended to implement a logic design comprising a hierarchy of logic modules communicating together. The method according to the invention comprises the steps of: —partitioning the hierarchy of logic modules into regions each comprising one or a plurality of programmable chips, while minimising: —inter-region communications in a manner correlated to the physical connections available between each pair of programmable chips; —and the number of crossings of programmable chips of a critical combinatorial path; —establishing a routing of the signals between programmable chips using the physical resources available. | 2015-10-08 |
20150286762 | LOGIC CONFIGURATION METHOD FOR RECONFIGURABLE SEMICONDUCTOR DEVICE - Provided is a logic configuration method for a semiconductor device having a plurality of memory units provided with a plurality of memory cells; each memory unit is configured to store truth table data in the memory cells thereof, the truth table data being for outputting a logic value in response to an address input, and to operate as a logic circuit; the memory units have n (where n is 2 or a higher integer) times two pairs of an input line and an output line; the n times two output lines from one memory unit among the memory units are connected to the n input lines of two other memory units; and the logic configuration method generates, on the basis of the circuit description describing the circuit configuration, a netlist having circuit connection information, extracts a logic cone from the netlist, and generates truth table data for the plurality of memory units, which constitute the logic cone, in the memory unit stage number corresponding to the number obtained by dividing the number of input lines to the logic cone by n/2. | 2015-10-08 |
20150286763 | PATTERN MATCHING FOR PREDICTING DEFECT LIMITED YIELD - Methods and apparatuses for pattern-based methodology for CAA and defect limited yield analysis are disclosed. Embodiments may include matching one or more patterns within a layer of an integrated circuit design layout to one or more pre-characterized patterns within a pattern library, determining respective critical areas of the one or more patterns based on respective pre-characterized critical areas of the one or more pre-characterized patterns, and predicting a defect limited yield of the layer based on the respective pre-characterized critical areas. | 2015-10-08 |
20150286764 | METHODS OF GENERATING CIRCUIT LAYOUTS USING SELF-ALLIGNED DOUBLE PATTERNING (SADP) TECHNIQUES - At least one method disclosed herein involves creating an overall pattern layout for an integrated circuit that is to be manufactured using a self-aligned double patterning (SADP) process, forming a first metal feature having a first width on a first track of a metal layer using the SADP process, forming a second metal feature having a second width on a second track of the metal layer. The second track is adjacent to the first track. The method also includes forming an electrical connection between the first metal feature and the second metal feature to provide an effectively single metal pattern having a third width that is the sum of the first and second widths, rendering the first and second features decomposable using the SADP process; and decomposing e overall pattern layout with the first and second metal features into a mandrel mask pattern and a block mask pattern. | 2015-10-08 |
20150286765 | CUT MASK DESIGN LAYERS TO PROVIDE COMPACT CELL HEIGHT - Some embodiments relate to a method of designing an integrated circuit layout. In this method, a plurality of design shapes are provided on different design layers over an active area within a graphical representation of the layout. A connection extends perpendicularly between a first design shape formed on a first design layer and a second design shape formed on the first design layer. First and second cut mask shapes on first and second cut mask design layers, respectively, are generated. The first cut shape removes portions of the first design layer and the second cut shape removes portions of the second design layer. | 2015-10-08 |
20150286766 | METHOD AND SYSTEM FOR AUTOMATED DESIGN OF AN INTEGRATED CIRCUIT USING CONFIGURABLE CELLS - According to the present disclosure, the present invention discloses a methodology wherein the integrated circuit (IC) design process is independent of a pre-existing standard cell library with fixed or static driving strengths. The present invention utilizes a completely automated process for IC design utilizing a neural network based configurable cell library which generates design specific standard cells with desired driving strengths on the run. The driving strengths of the design specific standard cells are determined based on the constraints of the target IC design. | 2015-10-08 |
20150286767 | CIRCUIT LAYOUT METHOD AND CIRCUIT LAYOUT APPARATUS - A circuit layout method and a circuit layout apparatus are disclosed. The circuit layout apparatus comprises a display apparatus, an input device, a stack up database and a processor. The display apparatus shows a system interface. The input device inputs a user request in response to the system interface. The processor selects a stack up data table, corresponding to the user request, from the stack up database, and generates a design rule of a computer aided design (CAD) according to the stack up data table. The processor checks whether a circuit board design complies with the design rule. | 2015-10-08 |
20150286768 | Routing Standard Cell-Based Integrated Circuits - This disclosure describes a multi-height routing cell and utilization of the multi-height routing in an integrated circuit to reduce routing congestion in a standard cell design floorplan. The multi-height routing cell includes a bypass connection, or “tunnel,” that routes a signal through a non-routing layer and under an impeding power rail. The multi-height routing cell includes bypass connectors on both sides of the bypass connection that provide connection points for which to connect standard cells on opposite sides of the impeding power rail. As such, the multi-height routing cell provides a route underneath the impeding power rail and, in turn, reducing routing congestion in the standard cell design floorplan. | 2015-10-08 |
20150286769 | METHOD FOR RETRIEVING A WIRING SCHEMATIC OF AN ELECTRICAL INSTALLATION - A method for reconstituting a diagram of an electrical installation including a plurality of electrical elements connected to a power source via protective elements arranged in an electrical panel. The wired electrical elements of the installation are identified using the electrical panel. The tree structure of the electrical connections of the elements identified and the position of each element in the arborescence are automatically determined. An electrical diagram of the installation is deduced using the tree structure of the electrical connections and the position of each element in the arborescence. | 2015-10-08 |
20150286770 | DESIGN RULE CHECK SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PRESENTATION PROGRAM - To specify high-risk error positions in consideration of effects of electromagnetic noise flowing through a printed wiring board. A design rule check system ( | 2015-10-08 |
20150286771 | CATEGORIZED STITCHING GUIDANCE FOR TRIPLE-PATTERNING TECHNOLOGY - A computer-implemented method for validating a design is disclosed. The method includes receiving, with the computer, the design, where the design is printable using a multiple-patterning process when the computer is invoked, and where the design includes a plurality of shapes and at least one conflict preventing decomposition of the design into a plurality of multiple-patterning masks. The method also includes forming a subset of the shapes, the subset including the shapes associated with the at least one conflict, categorizing each of the shapes of the subset into one of a plurality of topology types generating one or more stitch candidate solutions for each of the plurality of topology types, and decomposing the design into a plurality of masks. | 2015-10-08 |
20150286772 | Method and system for computer-aided design of radiation-hardened integrated circuits - A method, system, and computer program product include electronic design automation (EDA) tools used with standard CMOS processes to design and produce radiation-hardened (rad-hard) integrated circuits (ICs) having a predictable level of radiation hardness while maintaining a desired level of performance and tracking circuit area. The tools include rad-hard design rule checking (DRC) decks, rad-hard SPICE models, and rad-hard cell libraries. A rad-hard parasitic components extraction process makes use of rad-hard DRC rules to locate occurrences of parasitic devices, calculate their effects on circuit performance, and return this information to layout and circuit simulation tools. Changes to the layout are suggested and implemented with varying degrees of automation. Some of these tools can be provided as components of a rad-hard process design kit (PDK). They can be used in conjunction with commercial EDA tools to facilitate the incorporation of rad-hard features into new or existing IC designs. | 2015-10-08 |
20150286773 | METHODS AND SYSTEMS FOR DIAGNOSING PRENATAL ABNORMALITIES - Embodiments of various aspects described herein are directed to methods and systems for performing a prenatal diagnostic testing. In some embodiments, the methods and systems described herein can be used to diagnose structural rearrangements or chromosome breakpoints in a prenatal sample. In some embodiments, the methods and systems described herein can be used to diagnose de novo balanced chromosomal rearrangements in a prenatal sample. | 2015-10-08 |
20150286774 | METHOD AND ARRANGEMENT FOR DETERMINING TRAITS OF A MAMMAL - A system for determining traits for an individual mammal includes a first database with genomic data of known traits as well as identified correlations including details of the trait, mutation, disease risk and/or affected breeds of a mammal species, and a second database based on a gene test made for the individual mammal, the database including genotyping data of the individual mammal to be analyzed. A plurality of markers is determined for regions in the mammal's genome so that at least first portion of the markers relates to correlations in various known gene based traits, and at least second portion of the markers used in determining differs from the first portion of the markers. Then the genotyping data of the individual mammal's genome corresponding to the first portion of the markers is compared in order to make correlations and thereby determine a probability or risk or severity of the traits. | 2015-10-08 |
20150286775 | STRING GRAPH ASSEMBLY FOR POLYPLOID GENOMES - Exemplary embodiments provide methods and systems for string graph assembly of polyploid genomes. Aspects of the exemplary embodiment include receiving a string graph generated from sequence reads of at least 0.5 kb in length; identifying unitigs in the string graph and generating a unitig graph; and identifying string bundles in the unitig graph by: determining a primary contig from each of the string bundles; and determining associated contigs that contain structural variations compared to the primary contig. | 2015-10-08 |
20150286776 | High Resolution Melt Analysis Workflow Graphical User Interface - A method and a system for nucleic acid melting analysis are provided. Specifically, the system includes a biochip having at least one sample containing nucleic acids. A thermal generating apparatus ramps the temperature of the at least one sample to cause dissociation of the nucleic acids. A raw melting curve reflecting dissociation of the nucleic acids is generated. To analyze the raw nucleic acid melting curve, a normalization method is selected to define a mathematical relationship between a normalized melting curve and the raw melting curve. A derivative of the normalized melting curve is calculated based upon the mathematical relationship and a derivative of the raw melting curve obtained prior to calculating the normalized melting curve. Accordingly, the derivative of the normalized melting curve is calculated without using the Savitsky-Golay (SG) filter. The elimination of an additional SG filter in the melting analysis substantially reduces computation time. | 2015-10-08 |
20150286777 | Inhibition of Fibrosis and AF By TGF-Beta Inhibition in the Posterior Left Atrium (PLA) - The disclosed methods pertain to diagnosing whether a non-ablative, gene therapy is needed for reducing AF fibrosis in a subject, and if so, methods of reducing AF fibrosis in a subject using gene therapy with a dominant negative TGF-β R2 cDNA expression vector. Kits and computer program products are also described, wherein the kits provide materials for diagnosing and treating AF fibrosis, and the computer program products include a computer readable medium having computer readable program code for monitoring the efficacy of therapeutic ablation of fibrosis in a subject using a gene therapy method. | 2015-10-08 |
20150286778 | Methods of Evaluating Medical Measurement Curves, as Well as Computer Programs and Devices Therefor - Methods are provided for detecting an analyte concentration/presence in a body fluid sample that include providing a set of at least two different evaluation rules, each evaluation rule adapted to derive a set characteristic values from an optical measurement curve, where at least one first characteristic value is derived from at least one first evaluation rule and at least one second characteristic value is derived from at least one second evaluation rule. The methods also include performing at least one multivariate analysis of the at least one first and second characteristic values by using at least one predetermined multivariate evaluation algorithm to derive at least one estimate value for at least one target variable Y of the state variables. The methods also include determining at least one analyte concentration by using the at least one target variable Y. Also provided are computer programs and devices that incorporate the same. | 2015-10-08 |
20150286779 | SYSTEM AND METHOD FOR EMBEDDING A PHYSIOLOGICAL SIGNAL INTO A VIDEO - What is disclosed is a system and method for embedding a time-varying physiological signal corresponding to a physiological function of a subject into a video. In one embodiment, a video of a subject is received along with a time-varying signal corresponding to a physiological function of the subject. A representative image is obtained from the video. The received time-varying signal is divided into a plurality of signal segments. The obtained image is repeatedly replicated to generate a video sequence. The signal segments are encoded in the images comprising the generated video sequence. The video sequence containing the encoded physiological signal is then compressed using a video compression technique. | 2015-10-08 |
20150286780 | Imaging Protocol Optimization With Consensus Of The Community - A method for optimizing imaging protocols usage based on community voting includes a computer storing standard imaging protocol data associated with an imaging device type in a protocol database. The computer receives a request to modify the standard imaging protocol data. Next, the computer presents information from the request on a website accessible by a plurality of community members. Vote values are received from the community members via the website, each respective vote value selected from a range of values with a minimum value indicating rejection of the modified imaging protocol data and a maximum value indicating acceptance of the modified imaging protocol data. The computer then determines whether a consensus decision exists among the vote values. If the consensus decision exists, the computer determines whether to accept or reject the request to modify the standard imaging protocol data based on the consensus decision. | 2015-10-08 |
20150286781 | PACEMAKER ICD ELECTRONIC HEALTH RECORD - This invention concerns a novel practical application of using secured electronic form of medical record keeping in protecting and securing patient privacy specifically and only in regards to information pertaining to patients' pacemaker and or icd data or interrogation record. | 2015-10-08 |
20150286782 | SYSTEM, METHOD AND RECORDING MEDIUM FOR CALCULATING PHYSIOLOGICAL INDEX - A system, a method and a recording medium for calculating a physiological index are provided. The method includes: dividing a physiological data sequence into a plurality of windows; analyzing a data segment in each window to obtain metadata that represents data characteristics of the data segment; updating the metadata including the data characteristics of all data segments in the windows up to a previous window by using the metadata corresponding to one of the windows to obtain the metadata including the data characteristics of all data segments in the windows up to a current window; and finally, calculating the physiological index by using the updated metadata. | 2015-10-08 |
20150286783 | PEER GROUP DISCOVERY FOR ANOMALY DETECTION - One embodiment of the present invention provides a system for detecting anomalies. During operation, the system extracts from a data set of entities features which provide meaningful information about the entities. The system identifies a peer group for the entities in the data set based on auxiliary information which comprises information that is distinct from the extracted features. In order to determine the anomalies, the system compares the extracted features of an entity in the peer group against the extracted features of other entities in the corresponding peer group, where significant differences in results of the comparison are indicative of anomalies. | 2015-10-08 |
20150286784 | Epoch of Care-Centric Healthcare System - A computer-based system and method improves the efficiency of healthcare services provided to a patient by modeling an epoch of care (EOC) of the patient and by using the EOC model to assist in the provision of healthcare services to the patient, such as by generating predictions of healthcare outcomes for the patient and by making recommendations for actions to be taken in connection with the provision of healthcare services to the patient. An EOC of a patient may include all services, products, and outcomes that are related to a particular medical condition or complaint of the patient over a period of time. Embodiments of the present invention may model multiple EOCs for the same patient and may model EOCs for multiple patients. Predictions and recommendations may be made based on the EOC data, possibly in addition to external data outside of the EOC. | 2015-10-08 |
20150286785 | SYSTEMS, METHODS, AND DEVICES FOR IMAGE RECONSTRUCTION USING COMBINED PDE-CONSTRAINED AND SIMPLIFIED SPHERICAL HARMONICS ALGORITHM - Systems, methods, and devices for image reconstruction using combined PDE-constrained and simplified spherical harmonics (SPN) algorithm are presented herein. SPN equations can be used as the forward model in diffuse optical tomography (DOT) and employed in a PDE-constrained reduced space sequential quadratic programming (rSQP) optimization method to reconstruct spatially distributed optical properties, such as absorption, scattering, fat, oxygenated hemoglobin, de-oxygenated hemoglobin, fluorescent concentration, quantum yield, etc. The SPN algorithm with the PDE-constrained rSQP optimization method allows for DOT imaging that uses significantly less computational resources (e.g., time and random-access memory (RAM)) than methods employing the equation of radiative transfer (ERT). The techniques disclosed herein allow for more expeditious image processing as well as the potential for clinical diagnosis using DOT imaging. Diagnosis can be performed by a computer-aided diagnosis (CAD) system, which can provide clinically relevant analysis and interaction shortly after patient imaging. | 2015-10-08 |
20150286786 | COMPUTER AIDED DIAGNOSTIC SYSTEM FOR CLASSIFYING KIDNEYS - A computer aided diagnostic system and automated method to classify a kidney. Image data for a medical scan that includes image data of a kidney may be received. The kidney image data may be segmented from other image data of the medical scan. One or more iso-contours may be registered for the kidney image data, and renal cortex image data may be segmented from the kidney image data based on the one or more registered iso-contours. The kidney may be classified by analyzing one or more features determined from the segmented renal cortex image data using a learned model associated with the one or more features. | 2015-10-08 |
20150286787 | SYSTEM AND METHOD FOR MANAGING HEALTHCARE - Systems for automated transmission of communications to a patient following clinical treatment comprising: electronic datastores storing: a clinical profile reflective of characteristics of (i) the patient; and (ii) clinical treatment undergone by the patient; a response profile reflective of characteristics of responses by the patient to past communications; and a communication modality profile reflective of characteristics of communication channels or devices available for transmission of communications; communication interfaces associated with respective communication channels or devices; processors in communication with electronic datastores, the processors configured for: generating a communication to the patient based on the clinical profile, the communication providing a recommendation or inquiry to the patient; selecting communication channels or devices based on at least one of (i) the clinical profile and (ii) the response profile; and transmitting the generated communication to the patient by way of the communication interface associated with the selected communication channel or device. | 2015-10-08 |
20150286788 | Operating Room Management System with Smart Chart for Anesthesia Monitoring - An Operating Room Management System (ORMS) for facilitating the efficient and optimal organization of hospital medical personnel and resources runs on local and remote servers and comprises a real-time updated daily schedule which is displayed on digital whiteboards and other displays throughout the hospital. The schedule display simplifies the crucial information concerning common hospital concerns and permits quick, accurate decision making on the part of the hospital medical personnel and administrators. A digital version of an anesthesia monitoring chart on a tablet or other mobile device is used to record patient vitals and other important data during operations. | 2015-10-08 |
20150286789 | REMOTE PRESENCE SYSTEM INCLUDING A CART THAT SUPPORTS A ROBOT FACE AND AN OVERHEAD CAMERA - A tele-presence system that includes a cart. The cart includes a robot face that has a robot monitor, a robot camera, a robot speaker, a robot microphone, and an overhead camera. The system also includes a remote station that is coupled to the robot face and the overhead camera. The remote station includes a station monitor, a station camera, a station speaker and a station microphone. The remote station can display video images captured by the robot camera and/or overhead camera. By way of example, the cart can be used in an operating room, wherein the overhead camera can be placed in a sterile field and the robot face can be used in a non-sterile field. The user at the remote station can conduct a teleconference through the robot face and also obtain a view of a medical procedure through the overhead camera. | 2015-10-08 |
20150286790 | System and method for secure messaging - Disclosed herein is a secure messaging engagement hub for structuring of unstructured electronic messages. The secure messaging engagement hub has a natural language processor that structures an unstructured electronic message. The natural language processor structures the unstructured electronic message by using a lexical parser to parse free text within the unstructured electronic message. The natural language processor also may tokenize the parsed free text into tokens representing components of the parsed free text. Message component n-grams are generated based on the tokens representing the components of the parsed free text. The tokens are coded with various metadata tags based on an analysis of the tokens. The metadata tags indicate message components of the tokens. And a structured electronic message corresponding to the unstructured electronic message is generated, the structured electronic message comprising the tokens and the metadata tags. | 2015-10-08 |
20150286791 | SYSTEM AND METHOD FOR UPLOADING AND SHARING MEDICAL IMAGES WITHIN TRUSTED HEALTH-USER COMMUNITIES - Systems and methods of sharing medical images through a secure, HIPAA-compliant social network construct (CarePod) between two or more members of the CarePod are disclosed. A first user may communicate remotely with a CarePod that is created and associate with a patient having medical treatment in order to initiate the sharing of medical image(s) of a patient If the first user is not a member of the CarePod, the system may add the first user as a member of the CarePod through a verification/authentication process. Once authenticated, privileges of the first user may be set with respect to certain actions that the first user may perform with medical images. Medical image(s) may be shared asynchronously or streamed substantially in real-time—e.g., possibly to aid medical procedures that are occurring. | 2015-10-08 |
20150286792 | SYSTEMS AND METHODS FOR HEALTH RISK DETERMINATION - Embodiments of the present disclosure help provide an accurate and easily-interpreted measure of health risk based on medical claims, pharmaceutical claims, and lost time claims. Embodiments of the present disclosure also allow for the efficient and accurate comparison of the health risks between different groups of individuals. | 2015-10-08 |
20150286793 | SYSTEM AND METHOD FOR SLEEP APNEA ASSESSMENT - A computer system and method for determining an appropriate risk group of having obstructive sleep apnea (OSA) for an individual are disclosed. The system includes: an electronic data store storing a plurality of user profiles and a questionnaire; an input means for receiving one or more user inputs from a user related to the questionnaire; and an analytics module configured to determine if the user is obese or not based on the one or more user inputs, and further to determine the appropriate risk group of having OSA for the user based on the one or more user inputs. | 2015-10-08 |
20150286794 | APPARATUS FOR HEALTH CORRELATION ASSESSMENT - An apparatus, system and method for performing a health correlation assessment based upon results an eye contrast sensitivity measurement test of a person. The health correlation assessment yields a predictive and probabilistic measure of the likelihood of the person appropriately assigned to a particular clinical health classification. Such an eye contrast sensitivity measurement can be used to identify people who are likely to be within a pre-Alzheimer's disease state or within Alzheimer's disease state of health and identify those who should seek further clinical and/or other types of testing to ascertain their actual health status and to determine an appropriate course of medical treatment. | 2015-10-08 |
20150286795 | DYNAMIC MEDICAL ECOSYSTEMS AND INTELLIGENCE MODELING - Systems and methods of embodiments comprise receiving in real-time data of parameters representing an entity. Micro plots are generated, and each micro plot comprises a plot of the data for a corresponding time period of a multitude of time periods. Each time period is cyclical. A model plot is generated to include the micro plots plotted chronologically according to the time periods. The model plot comprises a continuous helix. A prediction of a state of the entity is generated using characteristics of the model plot. | 2015-10-08 |
20150286796 | METHOD AND SYSTEM FOR TREATING A DISEASE USING COMBINED RADIOPHARMACEUTICALS - A method and system of treating a disease for a patient, comprising assigning class data related to a class of patients that have characteristics similar to a specific patient and/or accessing patent data related to the specific patient; and optimizing a treatment plan, the optimizing being determined utilizing properties of a radio-pharmaceutical used to treat the patient and the class data and/or the patient data. | 2015-10-08 |
20150286797 | System and method for administering medication - A system and method monitors patient biological indicator signals, analyzes the indicators and transmits control signals to patient medication administration devices according to the analysis of the signals. | 2015-10-08 |
20150286798 | IMAGE ACQUISITION FOR MEDICAL DOSE PREPARATION SYSTEM - Use of improved image acquisition for a medical dose preparation system. The medical dose preparation system may include a work station for capturing medical dose preparation images (e.g., to document preparation of a mediation dose). The medical dose preparation image may be captured by a video data stream processor capable of performing an auto cropping technique on a video data stream received from an image device. Accordingly, memory resources may be more efficiently employed while maintaining high quality medical dose preparation images. | 2015-10-08 |
20150286799 | MANAGEMENT OF MEDICATION DOSE ORDERS - A system for preparing and managing patient-specific dose orders includes an order processing server configured to receive the patient-specific dose orders, define a queue of dose orders and distribute the dose orders to at least one dose preparation station. The dose preparation station is in bi-directional communication with the order processing server and has an interface for providing an operator with a protocol associated with each received drug order and specifying a set of steps to fill the drug order. Steps to fill the drug order are captured at the station and a display, positionable independent of the station outputs the dose order queue and metrics concerning activity at the dose preparation station. Systems for preparing patient-specific doses and a method for telepharmacy in which data captured while following the protocol are provided to a remote site for review and approval by a pharmacist. | 2015-10-08 |
20150286800 | CLOUD-BASED SERVER FOR FACILITATING HEALTH AND FITNESS PROGRAMS FOR A PLURALITY OF USERS - With the widespread use smartphones, sensors, connected devices the volume of data generated by users is staggering. Cloud based systems allow the statistical evaluation of user data which is vital for analyzing trends but privacy remains a major concern. What's needed is a system that establishes trust by providing the user full control over his data by specifying what parts of the data, how, when and for how long is shared with a particular program sponsor or an ecosystem partner that can improve the outcomes of the program. While this will set the stage to reward each user for the relevant events and data that they collect., the key to making this a reality is establishing a system that also provides the convenience of a single marketplace for the user to engage multiple sponsors who may be interested in the user's data and for the program sponsors to engage multiple ecosystem partners that can improve program outcomes. | 2015-10-08 |
20150286801 | Representing Inclusion and Exclusion Criteria for Identifying Clinical Cohorts - Embodiments relate to selection systems and methods for identifying patient cohorts. One aspect is a computer-implemented method including receiving one or more cohort criteria for a clinical study. The cohort criteria indicate at least one of inclusion criteria for inclusion in the clinical study and exclusion criteria for exclusion from the clinical study. The cohort criteria are transformed into a constraint tree. The constraint tree is traversed, by a computer processor, to apply the cohort criteria to the plurality of patient records. As a result of the traversing, a patient cohort of one or more patients is identified from among a plurality of patient records. | 2015-10-08 |
20150286802 | SYSTEM AND METHOD FOR CLINICAL TRIAL MANAGEMENT - A system for managing a clinical trial includes: a server programmed for establishing a database for clinical trial management by accessing form data, defining from the form data a plurality of forms and a plurality of associated form fields, defining a clinical trial structure and database fields from the form data; and a plurality of remote programmable devices, programmed to: direct the server to access the form data, including form correlation data and form use identifiers; send to the server information about patients participating in the clinical trial, the server assigning a patient identifier to each patient; and send to the server the patient identifier for one of the patients, receive from the server, in response to the patient identifier, a subset of the forms, receive input of trial data into form fields for the subset of the plurality of forms, and send the trial data to the server. | 2015-10-08 |
20150286803 | TEST STRIP AND METHODS AND APPARATUS FOR READING THE SAME - Embodiments of the present invention provide a method of analysing a response of an analyte test device, comprising recording, by a device reading device, an image of coded test information associated with the test device, determining, based directly on the image of the test information, one or more test parameters, recording, by the reading device, an image of one or more optically responsive portions of the test device, and determining the response of the test device based on the one or more test parameters and the image of the one or more optically responsive portions of the test device. | 2015-10-08 |
20150286804 | SYSTEM AND METHOD FOR PREVENTING OBSERVATION OF PASSWORD ENTRY USING FACE DETECTION - A method of preventing observation of password entry on an electronic device is provided. The electronic device has a processor coupled to a camera, a display, and a memory. The method comprises activating the camera to acquire an image when the electronic device is in a password entry mode; detecting one or more faces present in the image; and presenting a warning when more than one face is present in the image. | 2015-10-08 |
20150286805 | METHOD, SYSTEM, SERVER AND TERMINAL FOR IMPLEMENTING SECURE TRANSMISSION OF DATA - According to an embodiment of the present invention, a server divides data into multiple data segments, directly stores some of the data segments without encryption, and encrypts and stores the other data segments; the server receives, from the terminal, a download request of downloading the data, and sends the unencrypted data segments to the terminal; and the server receives an identity authentication request sent by the terminal, performs identity authentication on the terminal, and sends the encrypted data segments to the terminal after the identity authentication succeeds. | 2015-10-08 |
20150286806 | USER-SPECIFIC APPLICATION ACTIVATION FOR REMOTE SESSIONS - Disclosed herein are systems, methods, and software to enhance licensing in multi-user computing environments. In an implementation, for each user of a plurality of users engaged with an application installed in a multi-user computing environment, a user-specific license state is maintained for the user with respect to the application. In addition, for each of the plurality of users engaged with the application installed in the multi-user computing environment, the application is delivered in accordance with the user-specific license state for the user. | 2015-10-08 |
20150286807 | MARKED IMAGE FILE SECURITY SYSTEM AND PROCESS - The present invention is a system and process for inserting a marker inertly within an image file. The marker is inert in that it is nonconforming to file type schema and is positioned within an image file such that the rendered image is not contorted. File activity related to the marked image file is tracked. | 2015-10-08 |
20150286808 | MARKED IMAGE FILE SECURITY SYSTEM AND PROCESS - The present invention is a system and process for updating a marked image file. The system and process seeks a marker that is inertly placed in an image file such that the marker is nonconforming to file type schema and is positioned within an image file such that the rendered image is not contorted. File activity related to the marked image file is tracked. | 2015-10-08 |
20150286809 | FORENSIC MARKING USING A COMMON CUSTOMIZATION FUNCTION - Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization function flexibly employs a range of different marking techniques that are applicable to a wide range of forensic marking schemes. These customization functions are also applicable to pre-processing and post-processing operations that may be necessary for enhancing the security and transparency of the embedded marks, as well as improving the computational efficiency of the marking process. The common customization function supports a well-defined set of operations specific to the task of forensic mark customization that can be carried out with a modest and preferably bounded effort on a wide range of devices. This is accomplished through the use of a generic transformation technique for use as a “customization” step for producing versions of content forensically marked with any of a multiplicity of mark messages. | 2015-10-08 |
20150286810 | SMART PEN SYSTEM TO RESTRICT ACCESS TO SECURITY SENSITITIVE DEVICES WHILE CONTINUOUSLY AUTHENTICATING THE USER - Continuous authentication of a user of a computing device is established to ensure security of the computing device. A smart pen fingerprint print reader identifies a user fingerprint and a determination is made to grant access to a computer device for this user. Communication with the computing device is accomplished through the smart pen. A security event is detected when the continuous user contact with the smart pen device is disrupted. In addition, user inactivity or exceeding a threshold distance between the smart pen device and the computing device may also trigger a security event. Detection of a security event will cause the screen content of the computing device to become unintelligible and the computing device becomes inoperable. | 2015-10-08 |
20150286811 | METHOD FOR AUTHENTICATING A USER - The invention relates to a method for authenticating a user when accessing to an application securely stored on a secure element of a portable device, said method comprising a step of authenticating the user via two authentication factors. The method comprises requesting a further authentication factor to said user, in a form of challenge-response based on a randomised request associated to a biometric data of said user. | 2015-10-08 |
20150286812 | AUTOMATIC CAPTURE AND ENTRY OF ACCESS CODES USING A CAMERA - The manual entry of displayed access codes can be avoided by using a camera connected to or integrated with a computer system to capture an image of a display on another device containing a displayed access code. In response to an indication of where a pin is located in the captured image, optical character recognition is performed on the captured image to extract the access code and enter the access code into the computer system. | 2015-10-08 |
20150286813 | METHOD AND APPARATUS THAT FACILITATES A WEARABLE IDENTITY MANAGER - Various aspects directed towards a wearable identity manager system are disclosed. In a first aspect, an association status between a user and a wearable identity manager device is ascertained based on whether the wearable identity manager device is worn by the user, and motion data associated with a movement of the wearable identity manager device is monitored. Authentication data, which includes the motion data, is then transmitted based on the association status. In another aspect, an association status between a user and a wearable identity manager device is again determined based on whether the wearable identity manager device is worn by the user. Here, however, the wearable identity manager device is paired with a pairing device, and authentication data is transmitted to the pairing device based on the association status to facilitate a user authentication via the pairing device. | 2015-10-08 |
20150286814 | LOCK CONTROL METHOD AND ELECTRONIC DEVICE THEREOF - An electronic device having a lockscreen and a method implementing said lockscreen are disclosed herein, the electronic device including a display, a memory, and one or more processors configured to execute the method, the method including displaying a lockscreen pattern on the display including movable points repositionable in response to a drag input, and fixed points that are stationary, detecting drag inputs moving the movable points within the lockscreen pattern, and unlocking the electronic device if the detected drag inputs moving the movable points matches a pre-specified unlock condition stored in the memory. | 2015-10-08 |
20150286815 | ACCESS CONTROL MANAGEMENT APPARATUS AND METHOD FOR OPEN SERVICE COMPONENTS - An access control management apparatus and method for open service components are provided. The access control management apparatus may include a header extractor configured to extract a header from a request message for a service component which is received from an application, an authentication manager configured to authenticate a permission of the application for the service component using an application ID, a service key for the service component and an authorization code which are included in the header, and a history manager configured to store an execution result of the service component if the permission is authenticated. | 2015-10-08 |
20150286816 | METHOD AND SYSTEM FOR AUTOMATIC UPDATING OF RANDOMLY GENERATED USER PASSWORDS - A method for generating passwords at customized internals includes: storing a plurality of user profiles, each profile including data related to a user including a plurality of account data entries, each entry including a current password, password criteria, and a predetermined period of time set by the related user; identifying at least one user profile including one or more account data entries where the included predetermined period of time has expired; generating a new password for each of the one or more account data entries included in each of the at least one user profile using random password generation algorithms, each password being based on password criteria included in the respective account data entry; and updating the current password included in each of the one or more account data entries included in each of the at least one user profile based on the generated new password. | 2015-10-08 |
20150286817 | INTERNAL SIGNAL DIVERSION APPARATUS AND METHOD FOR MOBILE COMMUNICATION DEVICES - A mobile communications device includes a display, a plurality of sources which may comprise at least one microphone and/or at least one camera, a wireless communications module, a main processor, and a secured processor inaccessible by the main processor. A housing of the device is configured for hand-held manipulation and to support the display, the sources, the communications module, the main processor, and the secured processor. A switch is actuatable by a user of the device and coupled to at least the sources, the main processor, and the secured processor. The switch is configured to divert signals produced by the sources away from the main processor when activated, and couple signals produced by the sources to the main processor when deactivated. | 2015-10-08 |
20150286818 | CONTROL METHOD FOR ACCESSING JAVA CARD OBJECT - It is provided a control method for accessing a Java card object, which includes: obtaining, by a Java card virtual machine, a type of a current accessing object according to a current execution instruction, and performing corresponding operation according to the type of the current accessing object or prompting an exception. The multi-application security management of the Java card can be achieved. | 2015-10-08 |
20150286819 | INSIDER THREAT PREDICTION - A method for predicting insider threat includes mining electronic data of an organization corresponding to activity of an entity, determining features of the electronic data corresponding to the activity of the entity, classifying the features corresponding to the activity of the entity, determining sequences of classified features matching one or more patterns of insider threat, scoring the entity according to matches of the classified features to the one or more patterns of insider threat, and predicting an insider threat corresponding to the entity according to the score. | 2015-10-08 |
20150286820 | Method and System for Inferring Application States by Performing Behavioral Analysis Operations in a Mobile Device - Methods, systems and devices compute and use the actual execution states of software applications to implement power saving schemes and to perform behavioral monitoring and analysis operations. A mobile device may be configured to monitor an activity of a software application, generate a shadow feature value that identifies actual execution state of the software application during that activity, generate a behavior vector that associates the monitored activity with the shadow feature value, and determine whether the activity is malicious or benign based on the generated behavior vector, shadow feature value and/or operating system execution states. The mobile device processor may also be configured to intelligently determine whether the execution state of a software application is relevant to determining whether any of the monitored mobile device behaviors are malicious or suspicious, and monitor only the execution states of the software applications for which such determinations are relevant. | 2015-10-08 |
20150286821 | CONTINUOUS RUN-TIME VALIDATION OF PROGRAM EXECUTION: A PRACTICAL APPROACH - Trustworthy systems require that code be validated as genuine. Most systems implement this requirement prior to execution by matching a cryptographic hash of the binary file against a reference hash value, leaving the code vulnerable to run time compromises, such as code injection, return and jump-oriented programming, and illegal linking of the code to compromised library functions. The Run-time Execution Validator (REV) validates, as the program executes, the control flow path and instructions executed along the control flow path. REV uses a signature cache integrated into the processor pipeline to perform live validation of executions, at basic block boundaries, and ensures that changes to the program state are not made by the instructions within a basic block until the control flow path into the basic block and the instructions within the basic block are both validated. | 2015-10-08 |
20150286822 | Information Technology Enterprise Intrusion Prevention Implementation Tool - The software application for implementing intrusion prevention devices of the present invention has an information flow schema, mathematical calculation algorithm and a Web portal. The devices have built-in intelligence, which is used to match user's implementation requirements. | 2015-10-08 |
20150286823 | SYSTEM AND METHOD FOR BOOT SEQUENCE MODIFICATION USING CHIP-RESTRICTED INSTRUCTIONS RESIDING ON AN EXTERNAL MEMORY DEVICE - Various embodiments of methods and systems for modification of instructions and/or data associated with one or more boot stages in a boot sequence are disclosed. The authenticity and integrity of the modified instructions and/or data in certain embodiments may be ensured by using a confidential key and a message authentication code (“MAC”) algorithm to generate a MAC output. The MAC output is compared to an expected MAC associated with the modified instructions and/or data. The confidential key is uniquely associated with the system on a chip (“SoC”) or a component of the SoC. In this way, embodiments of the solution guard against unauthorized modification or replacement of the OEM boot instructions. | 2015-10-08 |
20150286824 | METHODS FOR SELECTION OF COLLABORATORS FOR ONLINE THREAT MITIGATION - One embodiment of the present invention provides a system for stable selection of collaborating partners for exchanging security data. During operation, the system receives vectors of collaboration values from a plurality of entities. A collaboration value is a measure of an expected benefit of collaborating with a respective entity. The system sorts each of the vectors by the collaboration values of the respective vector. The system then determines matching entities given a number of partners wanted by each organization in N. The system may add matching entities to lists of collaborating partners given the number of partners wanted by each organization in N. Subsequently, the system sends the lists of collaborating partners to facilitate exchanging security data with partners in the list of collaborating partners. | 2015-10-08 |
20150286825 | METHODS FOR CENTRALIZED PRIVACY-PRESERVING COLLABORATIVE THREAT MITIGATION - One embodiment of the present invention provides a system to facilitate collaboration for mitigating network threats. During operation, the system receives encrypted data sets from a plurality of entities. The data sets including data describing threats to network security. The system performs privacy-preserving operations on the encrypted data sets, such as private set intersection. The system then computes one or more metrics based on results of the private set intersection computations. The system may generate a similarity matrix based on the one or more metrics, and returns one or more similarity values from the similarity matrix to one or more entities of the plurality of entities. | 2015-10-08 |
20150286826 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a determination unit, a conversion unit, and a transmission unit. The determination unit determines information not to be transmitted in a step, which is managed according to a flow definition and is related to design information, if the step is a predetermined step. The conversion unit converts the design information by deleting the information determined by the determination unit from the design information or by converting the information determined by the determination unit into other information. The transmission unit transmits the converted design information to an external destination. | 2015-10-08 |
20150286827 | METHOD AND APPARATUS FOR NEARLY OPTIMAL PRIVATE CONVOLUTION - A method and apparatus for ensuring a level of privacy for answering a convolution query on data stored in a database is provided. The method and apparatus includes the activities of determining ( | 2015-10-08 |