46th week of 2015 patent applcation highlights part 47 |
Patent application number | Title | Published |
20150324521 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING PROGRAM - An information processing apparatus includes an acquisition unit configured to acquire patient's medical information, an extraction unit configured to extract a part of the medical information as material candidates for a reduced medical image, a selection unit configured to assign priorities to a plurality of the extracted material candidates, and, based on the priorities, select materials to be used for generation of the reduced medical image out of a plurality of the material candidates, and a generation unit configured to generate the reduced medical image based on a plurality of the selected materials. | 2015-11-12 |
20150324522 | BIOPSY MAPPING TOOLS - Apparatus for plotting pathological diagnoses on anatomical diagrams is provided. The apparatus may include a mapping tool. The mapping tool may identify a plurality of biopsy marker records including a received criterion. The mapping tool may identify a body part image associated with a body part image ID. The mapping tool may section the body part image into a first quadrant and a second quadrant. The mapping tool may loop through the plurality of biopsy marker records to identify an X,Y coordinate associated with each of the plurality of biopsy marker records. For each X,Y coordinate identifying a location within the first quadrant, the mapping tool may iteratively tally a first count for the first quadrant. For each X,Y coordinate identifying a location within the second quadrant, the mapping tool may iteratively tally a second count for the second quadrant. | 2015-11-12 |
20150324523 | SYSTEM AND METHOD FOR INDICATING THE QUALITY OF INFORMATION TO SUPPORT DECISION MAKING - A system for indicating the quality of a medical report including a medical report system which generates a medical score based on a clinician's interpretation of medical data, a portion of the medical report including text in a natural language; and a medical report grading device which processes the portion of text in natural language and generates one or more scores of one or more categories relating to the quality of the medical report. | 2015-11-12 |
20150324524 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a receiving unit, an acquiring unit, an extracting unit, and a presenting unit. The receiving unit receives at least one document related to a treatment administered to a patient. The acquiring unit acquires a type of the document received by the receiving unit. The extracting unit extracts, from an association memory that stores a type of a first document and a type of a second document in association with each other, a type of a second document associated with the type of the document acquired by the acquiring unit, the second document being to be registered in a case where the first document is registered. The presenting unit presents the type of the second document extracted by the extracting unit for a document to be registered in conjunction with the document of the type acquired by the acquiring unit. | 2015-11-12 |
20150324525 | PATIENT CONTROLLED ELECTRONIC MEDICAL RECORD SYSTEM - A computer system and method for management of electronic medical records. The system includes the facility to share patients' medical records amongst multiple healthcare providers and other organizations, as permitted by each individual patient, and providing social networking tools to facilitate interactions between the various parties and the electronic medical records. | 2015-11-12 |
20150324526 | REMOTE HEALTHCARE DATA-GATHERING AND VIEWING SYSTEM AND METHOD - A medical data collection system for gathering medical data from an individual when the individual is located remotely from a healthcare professional includes at least in part an aggregation device is used at the patient remote site for collecting medical data/information from various medical devices. The aggregation device sends the recorded medical data using a Service Oriented Architecture (SOA) web service/application to a network. A video conference system is also located at the remote site. A healthcare provider can access the medical data in real time or from the optional data storage device while the data is being captured from the patient at any time in the future if the data is stored using a personal computer or handheld device such as a notebook, Ipad, smart phone or the like that is capable of running a browser that can consume the medical record service provided by the aggregation device. | 2015-11-12 |
20150324527 | LEARNING HEALTH SYSTEMS AND METHODS - A method for providing personalized healthcare for a patient is provided. The method may include receiving information indicative of a patient, retrieving a record associated with the patient, receiving a query identifying a healthcare related issue associated with the patient, performing analytics via a statistical discovery component and a natural language processing component configured to interface with respective portions of heterogeneous data sources to selectively identify correlations between genomic profile information of the patient and selected data of the data sources, applying a selected risk model based on the query; and providing a response to the query including information associated with clinical decision support tailored to an identity of the user, the user being a selected one of a patient, a researcher and a clinician. | 2015-11-12 |
20150324528 | SYSTEM AND METHOD FOR TRACKING PATIENT-SERVICE PROVIDER INTERACTIONS - Disclosed is a system and method for tracking patient-service provider interactions. In some implementations, a method includes gathering near real-time information about patient interactions with staff in healthcare facilities such as hospitals, nursing care facilities, retirement communities, home health care environments, assisted living facilities, and senior living facilities. The patient interaction information can be used to help ensure accurate health care information is collected from patient and healthcare provider interactions using a wearable identification transceiver having an embedded microprocessor system as well as an integrated RFID reader and an RFID tag. | 2015-11-12 |
20150324529 | PERSONAL INFORMATION SYSTEM - Systems and methods realize the benefit of portable storage devices by taking advantage of PCs including an optical disk drive, optical disks, such as a CD or a DVD, and the Internet. An individual patient provides personal data to a healthcare service center. The healthcare service center can then create a portable optical disk for the patient to carry. The personal data written onto the portable optical disk is stored on a database management server database and is readable and updateable by the individual patient using his/her PC with an optical disk drive and connected to the Internet. The individual patient can choose to update his/her personal data on the portable optical disk and can receive a new portable optical disk that includes the update. The new portable optical disk containing the latest update is created and delivered to the patient by the database management server. | 2015-11-12 |
20150324530 | PERSONALIZED MANAGEMENT AND COMPARISON OF MEDICAL CONDITION AND OUTCOME BASED ON PROFILES OF COMMUNITY PATIENTS - The invention can be directed toward a method for personalized management and comparison of medical condition and outcome based on patient profiles of a community of patients. The method can include the steps of providing a database of patient profiles, providing a user interface for inputting a query of the database from a user, generating a query result including one or more matching patient profiles from the database, and displaying the query result as a correlation medical condition parameters of the user with a medical outcome. | 2015-11-12 |
20150324531 | SYSTEM AND METHOD FOR SCHEDULING EVENTS - The present invention relates to systems for planning use of resources under consideration of time constraints. The present invention further relates to methods for scheduling use of resources under consideration of time constraints. | 2015-11-12 |
20150324532 | VIRTUAL MENTAL HEALTH PLATFORM - According to various embodiments, systems and methods herein describe a virtual mental health/therapy platform. In particular embodiments, the systems and methods disclosed herein describe a system that includes matching a particular patient to one or more therapists, providing an initial assessment of the particular patient to the one or more therapists, and providing a continuous care application to the particular patient (e.g., to track process, receive care plan related reminders, and various other functionality). | 2015-11-12 |
20150324533 | Hand Sanitization Verification System - Systems, apparatuses, methods, and software for monitoring compliance of sanitizees (e.g., health care workers, food service workers, sanitization/janitorial workers etc.) with sanitization protocols to be followed for encounters with sanitization-protocol targets (e.g., patients, food-preparation areas, health care facilities/appurtenances, restrooms, etc.). In one example, a system includes sanitization verification systems located close to the targets and mobile node devices issued to the sanitizees. Each verification system can be configured to test the efficacy of sanitization procedures performed by the sanitizees prior to encountering a target, to provide authorizations, via the node devices, to the sanitizees to proceed with target encounters, and to open monitoring sessions during which the node devices record information concerning interactions with the targets. The node devices are configured to annunciate sanitization statuses of the sanitizees throughout a work period as the sanitizees continually interact with verification stations and encounter targets. | 2015-11-12 |
20150324534 | Diagnostic with recommendation tool for treatment with naturally occuring organic material - The invention provides a diagnostic system for naturally occurring organic material including cannabinoid, cannabidiol, and terpenoid treatment. A central computer utilizes a database containing treatment data relating to the use of naturally occurring organic material treatment of specific human conditions. Using patient generated information from a remote data entry apparatus, the central computer withdraws relevant treatment modalities and presents these treatments to the patient and treatment professional. | 2015-11-12 |
20150324535 | Patient Care Cards - Methods, computer systems, and computer readable media for a patient care card graphical user interface are provided. The patient care card graphical user interface comprises a requirements display area configured to display one or more clinical measures relating to a patient, and a visual indicator that changes depending on whether the at least one or more clinical measures has been met. | 2015-11-12 |
20150324536 | Medical Support System and Method Thereof (as amended) - A medical support system enables one server bidirectionally connected to one terminal to bidirectionally communicate with another server bidirectionally connected to another terminal. Each of the one server and the other server comprises: a conference processing unit configured to perform a conference between the one terminal and the other terminal; an image sharing processing unit configured to bidirectionally share an image between the one server and the other server; and a control unit configured to control the entire server over a network, wherein the control unit of the one server transmits only operation information sent from the one terminal to the control unit of the other server, and the control unit of the other server controls based on the received operation information. | 2015-11-12 |
20150324537 | METHOD FOR CONTROLLING MEDICAL EXAMINATIONS VIA A PATIENT COMMUNICATION SYSTEM, AND A PATIENT COMMUNICATION SYSTEM, A PATIENT DEVICE AND A CLINIC SERVER UNIT - A method for controlling medical examinations by means of a patient communication system and includes connecting a patient device to a clinic server unit, and exchanging examination information between the patient device and the clinic server unit. The exchange of examination information can include a retrieval of examination information from the clinic server unit by means of the patient device, a retrieval of a calendar entry, and a retrieval of patient information. | 2015-11-12 |
20150324538 | MEDICAL SUPPORT SYSTEM INCLUDING MEDICAL EQUIPMENT CASE - A medical equipment case is provided for containing and transporting at least one article of medical equipment and a two-way audio-visual system. Such equipment may be used, for example, for telemedicine applications by a patient discharged from a hospital, or other subject in need of remote health care monitoring. The medical equipment case may include features that provide for security and facilitate return of the medical equipment case and medical equipment and audio-visual system contained therein, such as machine-readable indicia encoding information for return of the case from a usage location. The medical equipment case and contained medical equipment and two-way audio visual system together form a medical support system that can be used by a patient discharged from a hospital. Methods of controlling the medical support system are also described. | 2015-11-12 |
20150324539 | PATIENT EMERGENCY RESPONSE SYSTEM - An improved emergency response system is provided. The system includes a patient or subscriber location database having a schedule of patient or subscriber activities. In one implementation, an emergency services server detects when the patient or subscriber is having a possible medical event as indicated by medical physiologic data transmitted from a wireless communication device proximate the patient. A third party such as a technologist and/or doctor diagnoses the patient and determines whether treatment is required. If treatment is required, a phone located remotely from the patient is used to call an emergency services first responder from a public safety access point in the patient's location. The remotely located phone has an automatic location identification database record that is updated based on the patient's current location as indicate by the patient location database. The address information in the patient location database includes street number, building number, floor and room number information, if applicable, to ensure that first responders are directed to the patient's specific location. Other implementations of the emergency response system are also described, including natural disasters, home security, and travel applications. | 2015-11-12 |
20150324540 | Digital Health Information System - A set of information including manually entered health-related data for a user, automatically collected health-related data for the user, and test results for the user may be received. In response to receiving the set of information, the manually entered health-related data for the user, the automatically collected health-related data for the user, and the test results for the user may be integrated into a comprehensive health profile for the user. Upon a request made on behalf of the user, at least part of the comprehensive health profile may be provided to the user. | 2015-11-12 |
20150324541 | HEALTH MONITORING SYSTEM FOR CALCULATING A TOTAL RISK SCORE - Embodiments of the invention provide for a health monitoring system comprising an activity monitor. The health monitoring system further comprises a processor and a memory for storing machine readable instructions. The instructions cause the processor to derive activity counts from the activity data acquired by the activity monitor. The instructions further cause the processor to store the activity counts in the memory, and are associated with a time. The instructions further cause the processor to calculate at least two statistical parameters from the activity counts, wherein the at least two statistical parameters are descriptive of the activity counts as a function of time. The instructions further causes the processor to calculate a risk score for each of the at least two statistical parameters. The instructions further cause the processor to calculate a total risk score using the risk score for each of the at least two statistical parameters. | 2015-11-12 |
20150324542 | System and Method for Surveillance and Evaluation of Safety Risks Associated with Medical Interventions - Systems and methods configured for estimating safety-related risks associated with adverse events and poor patient outcomes associated with the use of medical products and treatment (e.g., drugs, vaccines, medications, dietary supplements, and medical devices) are provided. More particularly, the present description relates to a method and system for estimating the downstream medical costs and therefore the risk (e.g., using a safety risk score, ranking, designation, estimate, or the like) associated with the use of an individual medical treatment. | 2015-11-12 |
20150324543 | PATHWAYS FOR TREATING PATIENTS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium are provided, including a method for presenting information for treating patients. The method comprises presenting, in a user interface, a pathway for use in treating a patient with a disease and including a combination of therapeutic and diagnostic pathway elements including an integration of diagnostic, radiation, chemotherapy, surgical and other elements. The method further comprises augmenting the pathway including providing controls for accessing additional information associated with a given pathway element, augmenting pathway elements to include indicators for pricing, efficacy and/or toxicity of a treatment associated with a given treatment element, and augmenting the pathway with a connection to another pathway including providing a link to another pathway at a point in a given pathway that provides information for a related pathway. The method further comprises presenting an augmented pathway to a patient or treating physician. | 2015-11-12 |
20150324544 | PAIN SURVEYING AND VISUALIZATION IN A HUMAN BODILY REGION - Techniques for pain surveying and visualization in a bodily region including a 3-dimensional rendering of a bodily region or an anatomical grid for presentation to a subject suffering from pain for collection of pain intensity and pain location information. A device is provided to the patients for display of the rendering of the bodily region or anatomical grid for collection of pain intensity and location information. A pain analysis module may then create an aggregate pain data set for visual data analyses, user reports, or data export focused on one or multiple region(s), as well as the entire body. The pain data sets may include patient data from a single patient or aggregated data from multiple patients. | 2015-11-12 |
20150324545 | SYSTEMS AND METHODS FOR DETERMINING BLOOD FLOW CHARACTERISTICS USING FLOW RATIO - Embodiments include a system for determining cardiovascular information for a patient which may include at least one computer system configured to receive patient-specific data regarding a geometry of an anatomical structure of a patient; create a model representing at least a portion of the anatomical structure; create a physics-based model relating to a blood flow characteristic within the anatomical structure; determine a first blood flow rate at at least one point of interest in the model; modify the model; determine a second blood flow rate at a point in the modified model corresponding to the at least one point of interest in the model; and determine a fractional flow reserve value as a ratio of the second blood flow rate to the first blood flow rate. | 2015-11-12 |
20150324546 | METHOD FOR PREDICTING DRUG-TARGET INTERACTIONS AND USES FOR DRUG REPOSITIONING - Described herein are methods of predicting drug-target interactions and method of using the information for drug repurposing. The methods described herein combine different descriptors including, for example, shape, topology and chemical signatures, physico-chemical functional descriptors, contact points of the ligand and the target protein, chemical similarity, and docking score. | 2015-11-12 |
20150324547 | METHODS AND SYSTEMS FOR PHARMACEUTICAL PRESCRIPTION AUTHORIZATION RULES GENERATION - A system generates executable prior authorization drug request rules using a compiler. A data repository stores drug criteria. The system is configured to generate a criteria specification user interface that enables a user to specify exclusion criteria, inclusion criteria, preferred or step therapy criteria, concurrent therapy criteria, assessment criteria, quantity limits, and/or refill instructions. A prescription prior authorization rules compiler module is configured to access a criteria specification for the drug from the repository and to automatically compile the criteria specification into executable prescription prior authorization rules. A drug criteria object generation module is configured to generate a drug criteria object for the drug, including drug criteria object identification information, the executable prescription prior authorization rules, a data dictionary, and/or canonical data. A rules engine may be provided with access to the drug criteria object for execution of the prescription prior authorization rules. | 2015-11-12 |
20150324548 | MEDICATION DELIVERY SYSTEM - This disclosure comprises a system, non-transitory computer readable storage medium and method for delivering medications and/or medical treatments that are appropriate to the resilient context of an individual patient. The resilient context comprises a predictive model for each of one or more patient function measures and a predictive model of patient resilience where said models are all developed by learning from the data associated with the individual patient. The medical advice, medical diagnoses and/or medical treatments may be provided “as is” and/or they may be customized to match the specific resilient context of the individual patient. | 2015-11-12 |
20150324549 | MANAGEMENT OF IMPLANTABLE CARDIAC DEVICE INTERROGATION DATA AND REPORTS - An interrogation data management system operates to manage implantable cardiac device interrogation data and reports. In one example the system generates a report including a reading physician note, a summary report, and an implantable cardiac device manufacturer's report. Some embodiments include smart routing, to automatically route interrogation data reports to medical professionals based on predetermined rules. The interrogation data management system interacts with the reading physician to formally review the interrogation data reports and to generate a reading physician note. The reading physician note includes the reading physician's findings/interpretations and conclusions. Other aspects are also described in this disclosure. | 2015-11-12 |
20150324550 | MEDICAL INFORMATION ANALYSIS SYSTEMS AND METHODS - A method for evaluating drug study information to determine suitability of the drug study information for acceptance by a regulatory authority. The method includes receiving a drug study identification and study type, indicating whether the drug study is either (i) a nonclinical study that is intended to be a Good Laboratory Practice study, or (ii) a clinical study that is intended to support the efficacy indication of a drug that is the subject of the drug study information, and associating one or more checklists with the drug study. Each checklist has elements identifying one or more features to be identified in the drug study information, and a query to select a deficiency type from a predetermined list of deficiency types. The method receives the deficiency types and automatically assigns a criticality value to each based on the nature of the type of drug study. | 2015-11-12 |
20150324551 | SYSTEMS AND METHODS FOR NON-VERBALLY COMMUNICATING PATIENT COMFORT DATA - Systems and methods for nonverbally communicating patient comfort data are disclosed herein. In some embodiments, the systems and methods may include one or more operations including receiving patient comfort data associated with one or more patients through a patient comfort level input device during a course of a treatment session, transmitting the patient comfort data associated with one or more patients received through the patient comfort level input device, and alerting one or more practitioners of the patient comfort data associated with one or more patients received through the patient comfort level input device. In some embodiments, the systems and methods may include at least one of the additional operations of receiving objective data indicating one or more particular treatment types substantially contemporaneously with a performance of the one or more particular treatment types and automatically generating one or more objective treatment session notes for inclusion within at least one of one or more patient charts and one or more medical records. | 2015-11-12 |
20150324552 | Share Restriction for Media Items - Embodiments are described herein that allow for applying a share restriction on a plurality of media items that is part of a playback queue. In one aspect, a method is provided that involves a first computing device (a) receiving input data indicating an instruction to share a playback queue, where the playback queue includes at least a plurality of media items, (b) determining one or more characteristics of the plurality of media items, where at least one of the one or more characteristics indicates a source of the plurality of media items, (c) based on the determined one or more characteristics of the plurality of media items, assigning to the plurality of media items a share restriction that limits access to the plurality of media items, and (d) transmitting to a second computing device an indication of the share restriction assigned to the plurality of media items. | 2015-11-12 |
20150324553 | Providing Display Content According to Confidential Information - A method, system, and program to prevent leakage of confidential information included in a display content. A terminal device controls the displays of an internal display and an external display provided separately from the internal display. The terminal device includes a display control section which, when confidential information is included in an image to be displayed on the external display, causes the external display to display a substitute content instead of this image, and the internal display to display the image including the confidential information, and a confidential information processing section for performing processing on the confidential information included in the image displayed on the internal display by the display control section. | 2015-11-12 |
20150324554 | REGISTRATION OF DEVICES IN A DIGITAL RIGHTS MANAGEMENT ENVIRONMENT - Methods and structure for Digital Rights Management (DRM) are provided. An exemplary system includes a Digital Rights Management (DRM) licensing server. The DRM licensing server is able to receive authentication information generated by a DRM module of a client device, and to receive a device identifier that uniquely distinguishes the client device from other client devices, wherein the device identifier has been generated by the DRM module. The DRM licensing server is further able to authenticate the DRM module based on the authentication information, to create a signed identifier based on the device identifier responsive to authenticating the DRM module, and to transmit the signed identifier to the client device. The system also includes an application server able to register the client device with an account at the application server, based on the signed identifier. | 2015-11-12 |
20150324555 | CONTENT DISCOVERY IN MANAGED WIRELESS DISTRIBUTION NETWORKS - A content store is maintained in a device, the device being one of multiple devices in a managed wireless distribution network that allows portions of protected content to be transferred among the multiple devices via multiple wireless networks hosted by various ones of the multiple devices. The content store is configured to maintain portions of protected content that can be consumed by a user of the device only if the user of the device is licensed to consume the protected content. An indication of portions of protected content stored in the content store is provided to each of a set of the multiple devices or to a network management service. Routes to portions of content in the managed wireless distribution network can be identified by the network management service or the multiple devices. | 2015-11-12 |
20150324556 | CONTENT DELIVERY PRIORITIZATION IN MANAGED WIRELESS DISTRIBUTION NETWORKS - A managed wireless distribution network includes multiple devices that communicate with one another via multiple wireless networks (e.g., multiple Wi-Fi networks). Each device in the managed wireless distribution network can host at least one wireless network and/or join at least one wireless network. Content in the managed wireless distribution network is protected so that the content cannot be consumed unless permission to consume the content is obtained. Devices can host portions of protected content regardless of whether they can consume the protected content, and can obtain portions of protected content via the wireless networks of the managed wireless distribution network without having to access a content service over the Internet. | 2015-11-12 |
20150324557 | ELECTRONIC DEVICE, UNLOCKING METHOD, AND NON-TRANSITORY STORAGE MEDIUM - An object is to provide a technology for preventing content of an unlocking operation from being easily recognized by another person even when the unlocking operation is seen by the other person. In order to achieve the object, there is provided an electronic device ( | 2015-11-12 |
20150324558 | FLEXIBLE AUTHENTICATION USING MULTIPLE RADIUS AVPS - An apparatus, method and machine readable storage medium, for an authentication server such as a RADIUS server, for authenticating a subscriber are disclosed. The method comprises: receiving a request message including a plurality of attributes such as attribute value pairs (AVPs) having respective attribute names and respective attribute values; retrieving an authentication profile object; identifying a plurality of authentication attributes to use for authentication from the authentication profile object; extracting the plurality of authentication attribute values from the message; pre-processing one or more of the extracted attribute values; and authenticating the request message based on the pre-processed extracted attribute values. | 2015-11-12 |
20150324559 | DYNAMIC ADJUSTMENT OF AUTHENTICATION POLICY - Embodiments relate to managing authentication policies for users on a network of an organization. A computer-implemented method for managing an authentication policy for a user on a network of an organization is provided. The method maintains a current risk assessment score of the user based on an organizational role of the user within the organization and a history of security violations on the network. The method determines the authentication policy for the user based on the current risk assessment score. | 2015-11-12 |
20150324560 | Abbreviated Authentication of an Electronic Device's User - A method authenticates a user of an electronic device located in and affiliated with a retail environment. The method includes prohibiting certain operations from being performed on the electronic device in a locked state. The method also includes, responsive to a user authenticating himself or herself through an authentication process, allowing those certain operations to be performed on the electronic device in an unlocked state. The method further entails configuring an extent to which the authentication process required for authentication at any given time is abbreviated. The method performs this configuring depending on whether operations performed on the electronic device at or within a defined interval before the given time are included in a defined list of operations. This defined list includes operations performed in the course of business associated with the retail environment. | 2015-11-12 |
20150324561 | INCREASING SECURITY OF A DEVICE AND/OR SYSTEM VIA QUESTIONING ABOUT A CHARACTERISTIC OF THE DEVICE AND/OR SYSTEM - A method for preventing unauthorized access to and/or modification of a page of a device and/or system according to one embodiment includes presenting a question via a graphical user interface; receiving a response to the question; allowing access to and/or modification of the page when the response to the question includes the answer; and not allowing access to and/or modification of the page when the response to the question does not include the answer. An answer to the question includes a characteristic of the device and/or system. | 2015-11-12 |
20150324562 | USER AUTHENTICATION ON DISPLAY DEVICE - Embodiments are disclosed that relate to authenticating a user of a display device. For example, one disclosed embodiment includes displaying one or more virtual images on the display device, wherein the one or more virtual images include a set of augmented reality features. The method further includes identifying one or more movements of the user via data received from a sensor of the display device, and comparing the identified movements of the user to a predefined set of authentication information for the user that links user authentication to a predefined order of the augmented reality features. If the identified movements indicate that the user selected the augmented reality features in the predefined order, then the user is authenticated, and if the identified movements indicate that the user did not select the augmented reality features in the predefined order, then the user is not authenticated. | 2015-11-12 |
20150324563 | Behavioral Authentication System using a Behavior Server for Authentication of Multiple Users based on their Behavior - A method and a corresponding device for authenticating a user for access to protected information, the method comprising generating a behavioral user profile associated with a first user known to be a legitimate user of the protected information, obtaining from a second user, using a behavioral input device associated with a second computing device, a behavioral user sample, storing the behavioral user sample, associated with the second user, in a temporary user profile, comparing the behavioral user sample of the second user to the behavioral user profile, and if the behavioral user sample does not match the behavioral user profile contacting the legitimate first user and receiving from the legitimate first user information regarding the legitimacy of the second user and based on the information received from the first user, providing a response to the second user and updating the user profile. | 2015-11-12 |
20150324564 | DYNAMIC ACTIVATION OF USER PROFILES BASED ON BIOMETRIC IDENTIFICATION - A method, an apparatus, and a computer program product for biometric identification are provided. The apparatus may be a user device. The apparatus may detect biometric information for a predetermined period of time. The predetermined period of time may be set by a hysteresis timer. The apparatus may compare the detected biometric information with stored biometric information associated with a stored user profile of a plurality of user profiles. The apparatus may then determine whether to display the stored user profile based on the comparison after the predetermined period of time has elapsed. | 2015-11-12 |
20150324565 | DISPLAY DEVICE AND METHOD FOR CONTROLLING THE SAME - A display device and a method for controlling the same are disclosed. The display device comprises an input unit configured to receive a command for generating an event and a fingerprint; a control unit configured to generate the event in accordance with the command and process the generated event; and a display unit configured to display a user menu, wherein the input unit includes a touch recognition layer for recognizing a touch input and a fingerprint recognition layer for recognizing a fingerprint, the touch recognition layer and the fingerprint recognition layer being formed in a single body with the display unit and receiving a command for generating an event of a temporary unlock fingerprint setting mode and a first fingerprint different from a registered fingerprint, the control unit implements the temporary unlock fingerprint setting mode in accordance with the command for generating the input event, sets the input first fingerprint to a temporary unlock fingerprint, and unlocks the display device if the temporary unlock fingerprint is input thereto, and the temporary unlock fingerprint is released in accordance with a predetermined condition. | 2015-11-12 |
20150324566 | Authentication Device and Authentication Method - An authentication device that authenticates an individual by using features of a biological object includes an input device | 2015-11-12 |
20150324568 | SYSTEMS AND METHODS FOR USING EYE SIGNALS WITH SECURE MOBILE COMMUNICATIONS - Apparatus, systems, and methods are provided for secure mobile communications (SMC) by an individual using biometric signals and identification in real time. The apparatus includes a wearable computing device where identification of the user is based on iris recognition, and/or other physiological and anatomical measures. Biometric identity measures can be combined with other security-based information such as passwords, date/time stamps, and device identification. Identity verification can be embedded within information that is transmitted from the device and/or to determine appropriate security measures. SMC addresses security issues associated with the transmission of eye-signal control and biometric identification data using secure interfaces with network devices within a system of systems (SoS) software architecture. | 2015-11-12 |
20150324569 | FINGERPRINT RECOGNITION METHOD AND ELECTRONIC DEVICE PERFORMING THEREOF - A fingerprint recognition method and electronic device performing the same are provided. The electronic device includes a fingerprint sensor configured to perform fingerprint sensing according to a control signal of a processor, and includes the processor configured to obtain a fingerprint-unrecognizable position from a sensing area of the fingerprint sensor, to obtain, based on the fingerprint-unrecognizable position, a distance to a fingerprint from the fingerprint-unrecognizable position, and to control, based on the distance, the fingerprint sensor by adjusting a sensing operation of the fingerprint sensor. | 2015-11-12 |
20150324570 | METHOD FOR PROCESSING FINGERPRINT AND ELECTRONIC DEVICE THEREFOR - A method for operating an electronic device is provided. The method includes detecting a fingerprint, detecting reference value based on situation information of the electronic device, and performing a fingerprint recognition based on the detected fingerprint and the reference value. A method for operating an electronic device is not limited to the above method, and other embodiments are possible within the same or similar scope as the present disclosure. | 2015-11-12 |
20150324571 | CONVERGED LOGICAL AND PHYSICAL SECURITY - A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential issuance and incident(s) management. An exemplary aspect of the invention also relates to physical and logical security management and information technology/network security management, with a credential issuance and integrity checking system as well as associated readers and printers of the credential. Still further aspects of the invention relate to obtaining, assembling and analyzing one or more of data, video information, image information, biometric information, sensor information, terrorist information, profile information, and/or other types of information to provide a comprehensive platform for all aspects of security management. A toolkit is also provided that allows complete management, integration, scalability, interoperability and centralized control of all aspects of security including personnel credentialing, personnel management, personnel tracking, task management, security system integration, security information exchange and scalability. | 2015-11-12 |
20150324572 | METHOD FOR GENERATING AN IDENTIFIER - The invention relates to a method for generating an identifier for identifying a pair, wherein the pair comprises a cryptographic device and a computer system ( | 2015-11-12 |
20150324573 | METHOD AND SYSTEM FOR GENERATING VERIFICATION CODES - Generating verification codes includes selecting at least two verification code generators from a verification code generator set comprising a plurality of verification code generators to compose a current use set, executing each verification code generator in the current use set to obtain corresponding partial verification codes, composing a current verification code from the partial verification codes, outputting the current verification code to a user, receiving a user response that is made in response to the current verification code, and comparing the current verification code and the user response to determine whether the user is verified. | 2015-11-12 |
20150324574 | SERVER DEVICE, SOFTWARE PROGRAM, AND SYSTEM | 2015-11-12 |
20150324575 | INTELLIGENT CONTROLLER SYSTEM AND METHOD FOR SMART CARD MEMORY MODULES - A storage device contains a smart-card device and a memory device, both of which are accessed though a controller. The storage device may be used in the same manner as a conventional smart-card device, or it may be used to store a relatively large amount of data in various partitions corresponding to the protection level of the data stored therein. The smart-card device stores critical security parameters that are provided to the controller to protect access to some or all of the partitions of the memory device. A host connected to the controller issues commands, and the controller analyzes the commands and responds to them in various ways depending upon the nature of the command. In particular, depending upon the nature of the command, the controller may either pass the command to the smart-card device, or ignore the command either indefinitely or until a predetermined event has occurred. | 2015-11-12 |
20150324576 | METHOD FOR IMPLEMENTING A COMMUNICATION BETWEEN CONTROL UNITS - A method for implementing a communication between at least two control units, and a control unit interconnection for implementing the method are provided. An electronic hardware security module is provided in each control unit, the communication taking place via an additional communications link. | 2015-11-12 |
20150324577 | DYNAMIC CHANGING OF ACCESS TOKEN TYPES - A system, method and computer program product for dynamically changing access tokens in a communication system. A client computer system is communicatively coupled by a communication channel to at least one target server. The client computer system includes a processor connected to a storage device that has a non-transitory machine-readable storage medium. The storage device stores a connection failure recovery program. The client computer system is programmed to implement the connection failure recovery program. The client computer system initiates a session by transmitting a first request for a connection to the target server using a first token type such as a client security token and if the first request fails, transmits a second request for a connection to the target server using a different token type. | 2015-11-12 |
20150324578 | RE-VERIFICATION OF A DEVICE - A user of a user device may be verified based on user credentials. The user device may be self-registered in a network. After a predetermined period of time, a re-verification timer may be implemented to re-verify credentials of a user of a user device. | 2015-11-12 |
20150324579 | METHOD, APPARATUS, AND SYSTEM FOR MANAGING USER ACCOUNTS - Embodiments of the present application relate to a method and system for managing user accounts. The method includes receiving a registration request from a current user, wherein the registration request comprises a login name main part, determining, in a database, whether a conflicting old user exists, wherein a conflicting old user corresponds to another user that has a conflicting login name main part that is the same as the login name main part received in connection with the registration request, in the event that a conflicting old user exists, executing a login password differentiation process that requires a user to register a different login password that is different from a login password associated with the conflicting old user, and storing the different login password to the database in connection with a registration of the current user. | 2015-11-12 |
20150324580 | APPARATUS AND METHOD FOR ANALYZING MALICIOUS CODE IN REAL ENVIRONMENT - An apparatus and method for analyzing malicious code in a real environment are provided. The apparatus for analyzing malicious code in a real environment includes a storage unit, a VHD control unit, and an analysis unit. The storage unit stores an original virtual hard disk (VHD) and a child VHD. The VHD control unit performs booting using an uninfected clean VHD. The analysis unit executes an object of analysis after the booting, generates the first results of the analysis based on static, dynamic and state analyses, generates the second results of the analysis by comparing the state of an infected VHD with the state of the clean, generates the results of malicious code analysis based on the first results of the analysis and the second results of the analysis, and sends the results of the malicious code analysis to the VHD control unit. | 2015-11-12 |
20150324581 | DISPLAYING REAL-TIME SECURITY EVENTS - A system and method for displaying a number of real-time security events comprises a number of client devices and an administrator device communicatively coupled to the client devices. The administrator device may comprise a preferences module and an event rate adapter module communicatively coupled to the preferences module. The preferences module receives input describing how to display a number of security events on the screen of a graphical user interface the event rate adapter module displays a number of real-time scrolling security events for a relatively longer period of time than other security events. | 2015-11-12 |
20150324582 | DISTRIBUTED VOTING MECHANISM FOR ATTACK DETECTION - In one embodiment, a network node receives a voting request from a neighboring node that indicates a potential network attack. The network node determines a set of feature values to be used as input to a classifier based on the voting request. The network node also determines whether the potential network attack is present by using the set of feature values as input to the classifier. The network node further sends a vote to the neighboring node that indicates whether the potential network attack was determined to be present. | 2015-11-12 |
20150324583 | Method for operating a control unit - A method for operating a control unit, such a control unit, and an electronic hardware security module are provided. A manipulation of a main computer unit is detected by the electronic hardware security module, and a check takes place whether reprogramming is possible. | 2015-11-12 |
20150324584 | METHOD AND DEVICE FOR PROVIDING A SECURITY BREACH INDICATIVE AUDIO ALERT - A device for providing a security breach indicative audio alert. The device includes: a security monitor adapted to detect a security breach in device and a loudspeaker, the device wherein including a secure audio alert generating hardware, adapted to participate, in response to the detection of the security breach, in a generation of a security breach indicative audio alert. The secure audio alert generating hardware is connected to an audio mixer that is adapted to mix the security breach indicative audio alert signal with audio signals generated by a software controlled audio source to provide a mixed signal. The audio mixer is further adapted to provide the mixed signal to the loudspeaker that reproduces the mixed signal as sound. | 2015-11-12 |
20150324585 | RETURN-ORIENTED PROGRAMMING AS AN OBFUSCATION TECHNIQUE - A method for obfuscating functionality of computer software is disclosed. In an embodiment, the method involves determining a first set of instructions needed to perform a target operation and a second set of instructions for at least one or more additional operations. The second set of instructions is tuned to contain instructions such that, by executing the second set of instructions, the function of the first set of instructions can be performed. Once the first and second sets of instruction are determined and tuned, a code library is created and code fragments in the library correspond to code needed to perform the function of the first set of instructions when executed. Instructions are then added to the second set of instructions such that, when executed, will cause the functionality of the first set of instructions to be achieved. | 2015-11-12 |
20150324586 | METHODS AND APPARATUS FOR CONTROL AND DETECTION OF MALICIOUS CONTENT USING A SANDBOX ENVIRONMENT - A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior. | 2015-11-12 |
20150324587 | METHODS FOR FIRMWARE SIGNATURE - A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware. | 2015-11-12 |
20150324588 | PRE-BOOT SOFTWARE VERIFICATION - Methods and systems for implementing pre-boot software verification may involve using an embedded controller (EC) and a basic input/output system (BIOS) to confirm each other's firmware using hash values. The hash values may be generated from certain portions of the firmware, which may overlap and may be specific to a particular firmware version. | 2015-11-12 |
20150324589 | SYSTEM AND METHOD FOR CONTROLLED DEVICE ACCESS - An industrial environment includes an industrial system device. The industrial system device includes a processor to receive a certificate describing a security policy of one or more access constraints for the industrial system device and to implement the security policy on the industrial system device. Accordingly, access to the device may be customizable based upon a particular job to be completed on the device, providing more appropriate device access. Further, the security policy certificate may be provided to the device without relying on an “always-on” server-based system, resulting in fewer points of failure for accessing the device. | 2015-11-12 |
20150324590 | METHOD FOR PROTECTING DATA - In the present disclosure, a hash function is computed over a known image, for example, an address range in a program. The result of the hash function is known to be the same at two distinct points in time, before the program is run, i.e. signing at build-time, and during the running of the program, i.e. run time. The value that the programmer wishes to hide, i.e. the secret value, is also known at build-time. At build-time, the secret value is combined with the hash in such a way that the combining operation can be reversed at run time. This combined value, i.e. the salt, is stored along with the program. Later, at runtime, the program computes the same hash value as was computed at signing time, and does the reverse combining operation in order to reveal the secret value. | 2015-11-12 |
20150324591 | INFORMATION PROCESSING APPARATUS AND METHOD, RECORDING MEDIUM, AND PROGRAM - Information processing apparatus and method, recording medium, and program are provided. An information processing apparatus includes the following elements. A receiver receives a command requesting for the execution of predetermined processing. A storage unit stores data and first information indicating, among a plurality of stages in a lifecycle of the information processing apparatus, the current stage determined by the stored data and second information indicating an executable command in the current stage, the executable command being determined for each of the plurality of stages. A determining unit determines on the basis of the first information and the second information whether the command received by the receiver is an executable command in the current stage. | 2015-11-12 |
20150324592 | SYSTEMS AND METHODS FOR DOCUMENT AND DATA PROTECTION - The present disclosure includes a method comprising encrypting sensitive data, generating a token comprising a data identifier, tokenizing the encrypted sensitive data, and/or storing the encrypted sensitive data in association with the token to a token vault. Tokenizing may comprise mapping the encrypted sensitive data to the token. The method may further comprise storing the token to a cloud application, wherein the cloud application comprises a software application that functions within a cloud computing environment. | 2015-11-12 |
20150324593 | INTELLIGENT SECURITY ANALYSIS AND ENFORCEMENT FOR DATA TRANSFER - An approach is provided for managing a message in a transfer from a computer. A level of sensitivity of data in a payload of the message is determined. A level of security protecting the transfer of the data is determined. Based on the level of sensitivity, the level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the levels of sensitivity and security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action is executed to connect the computer and transfer the message using the changed level of security. | 2015-11-12 |
20150324594 | CONTENT PROVIDER WITH MULTI-DEVICE SECURE APPLICATION INTEGRATION - Methods and systems for providing access to content are disclosed. The method is performed at least in part at a client computer system having a processor and memory. The method includes detecting, via a supplemental application associated with a host application at the client computer, a user selection of content. The supplemental application is unauthorized to independently access the content. The method further includes accessing the content at a server computer via a communication channel between the host application and the server computer, in response to the user selection detected via the supplemental application. The communication channel is inaccessible to applications executed separately from the host application at the client computer. The method further includes initiating presentation of the content at the client computer. | 2015-11-12 |
20150324595 | PROVIDING ACCESS TO APPLICATION DATA - Disclosed are various embodiments for providing access to application data associated with multiple applications of a user. A request to store application data is obtained by a data storage service from an application associated with a user. The application is executed in a client computing device, and the request is obtained by way of a network. The application data is stored by the data storage service in response to the request to store. The data storage service may be configured to store data for multiple applications associated with the user. | 2015-11-12 |
20150324596 | BULK DATA ERASE UTILIZING AN ENCRYPTION TECHNIQUE - A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a computer configured to send to a data storage drive a command to eliminate access to data on a removable storage media cartridge, and send to the data storage drive a command to shred at least one key in response to the command, where shredding the at least one key eliminates access to the data on the removable storage media cartridge. A determination to eliminate access to the data on the removable storage media cartridge is based on a number of read and/or write errors encountered for the removable storage media cartridge. | 2015-11-12 |
20150324597 | A SYSTEM FOR PROTECTION OF EMBEDDED SOFTWARE CODES - A system for securing embedded software codes having an industrial application from unauthorized access and use is disclosed. The system for code security according to the present invention provides protection for embedded software codes implemented in an automated application. According to the disclosed invention, the code is divided into plurality of segments and parts of the algorithm are distributed and executed in multiple environments, thereby preventing hacking of the code. | 2015-11-12 |
20150324598 | Method and System for Managing Uniquely Identifiable Bookmarklets - A method and system for collecting data contained within web resources in a uniquely identifiable bookmarklet system wherein the uniquely identifiable bookmarklet system includes uniquely generated bookmarklets that execute an unobtrusive script within the document object model of a currently loaded Web Page in a Web Browser program, whereby the script sends a request containing an identifying marker associated with the bookmarklet. The request containing the identifying marker is authenticated and authorized in order to allow one or more users executing the bookmarklet to submit data extracted from the document object model of a currently loaded Web Page to one or more data collections associated with the bookmarklet. | 2015-11-12 |
20150324599 | PROCESSING DATA IN A DEVICE - According to an example, a device for processing data is suggested, said device comprising a first component, wherein the first software component is arranged for receiving the data; a security processor for receiving said data and a first signature, wherein the security processor is arranged for determining based on the first signature whether the data are valid; for determining a second signature for the data; and for conveying the second signature to the first component. | 2015-11-12 |
20150324600 | MULTI-LEVEL PRIVACY EVALUATION - An multi-level privacy evaluation technology is described for increasing the performance of applications or services that experience high volumes of queries for data with privacy attributes. The multi-level privacy evaluation technology evaluates data using a subset of privacy policy rules and privacy information determined for the data at a backend server and thereby reduces the volume of data that need to be filtered at a frontend server. The multi-level privacy evaluation technology first applies an initial privacy check on a large data set at the backend to authoritatively filter out any data that a viewing user is not permitted to view or access and return as results a smaller data set that the viewing user may be permitted to view or access. A full privacy check is then performed at the frontend on the smaller data set, resulting in reduction in the overall cost of performing privacy checks and reducing latency in displaying data to the viewing user. | 2015-11-12 |
20150324601 | Managed Wireless Distribution Network - A managed wireless distribution network includes multiple devices that communicate with one another via multiple wireless networks (e.g., multiple Wi-Fi networks). Each device in the managed wireless distribution network can host at least one wireless network and/or join at least one wireless network. Content in the managed wireless distribution network is protected so that the content cannot be consumed unless permission to consume the content is obtained. Devices can host portions of protected content regardless of whether they can consume the protected content, and can obtain portions of protected content via the wireless networks of the managed wireless distribution network without having to access a content service over the Internet. | 2015-11-12 |
20150324602 | Managing Access of Information Using Policies - An information management system approves or denies user requests to access information of the system. The information includes all types of information including documents and e-mail. The information management system is driven using a policy language having policies and policy abstractions. The information management system may approve or deny many different types of requests including opening a document or file, copying a file, printing a file, sending an e-mail, reading an e-mail, cut and paste of a portion of a document, saving a document, executing an application on a file, and many others. | 2015-11-12 |
20150324603 | SOCIAL NETWORK SITE INCLUDING TRUST-BASED WIKI FUNCTIONALITY - A social network site with enhanced user interaction functionality. In particular implementations, a method includes receiving, at a social network site, a request from a first user for a personal page corresponding to a second user; transmitting a response to the request, wherein the response comprises the requested personal page of the second user, Wherein the personal page comprises one or more controls that enable modification of the personal page; responsive to an activation of the one or more controls by the first user, determining if the first user is included in a group of trusted users associated with the second user, wherein the group of trusted users are permitted to modify the personal page of the second user; and conditionally storing data characterizing modification of the personal page by the first user. | 2015-11-12 |
20150324604 | TRUSTED AND PRIVACY-PRESERVING MECHANISM FOR ELECTRICITY USAGE DATA DISCLOSURE USING VERIFIABLE NOISE - A method of energy usage data privacy preservation is described. The method includes downloading energy usage data and a signature from a repository. The method includes determining whether the signature is that of a utility. When the signature is not that of the utility, the method includes rejecting the energy usage data. When the signature is that of the utility, the method includes generating noisy data, encrypting a message-signature pair, constructing a proof, and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. The noisy data is generated by adding random noise to the energy usage data. The message-signature pair includes the energy usage data and a verified signature. The proof is configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language. | 2015-11-12 |
20150324605 | METHOD AND APPARATUS FOR SHARING CONTENT BETWEEN ELECTRONIC DEVICES - A method of a first device and an electronic device are provided. The method includes receiving a request signal related to contents stored in the first device from a second device communicatively coupled to the first device; transmitting the contents to the second device in response to the request signal, wherein the contents are security applied contents; and releasing the security of the contents by authenticating a user related to the contents. | 2015-11-12 |
20150324606 | Identifying and Securing Sensitive Data at its Source - A data management service identifies sensitive data stored on enterprise databases according to record classification rules that classify a data record as having a sensitive data type if the data record includes fields matching at least one of the record classification rules. The data management service determines assessment scores for enterprise databases according to sensitive data records and protection policies on the enterprise databases. The data management service provides an interface that groups enterprise databases having common attributes or common sensitive data types and indicates aggregated assessment scores for the groups of enterprise databases. Through the interface with the grouped enterprise databases, an administrator apply protection policies to enterprise databases. To apply the protection policy, the data management service applies the protection policy to a source database from which dependent enterprise databases access the sensitive database. | 2015-11-12 |
20150324607 | METHODS AND SYSTEMS FOR OBFUSCATING SENSITIVE INFORMATION IN COMPUTER SYSTEMS - A data-masking tool encoded on one or more computing readable storage media that includes a code that uses a combination of fields that uniquely identifies data in a record and utilizing it as a reference to mask original data with substitute values, by either aggregating several into one, mapping one-to-one or expanding one into a set. | 2015-11-12 |
20150324608 | Functionality Management via Application Modification - Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. Upon determining that the action is associated with a metered resource, a further determination may be made as to whether the request complies with at least one management policy. In response to determining that the request complies with the at least one management policy, the requested action may be authorized and/or caused to be performed. | 2015-11-12 |
20150324609 | SEMANTICALLY DETERMINING A SECURITY CLASSIFICATION OF DATA - Disclosed herein is a method for determining a security classification for data that includes generating a classification signature for data based on a semantic interpretation of the data. The classification signature is associated with a security classification for the data. The method also includes comparing the generated classification signature to a predetermined classification signature associated with the security classification. Further, the method includes verifying the generated classification signature matches the predetermined classification signature. | 2015-11-12 |
20150324610 | METHOD FOR MANAGING SOFTWARE FUNCTIONALITIES IN A CONTROL UNIT - A method and an electronic hardware security module are provided for managing software functionalities in a control unit. The hardware security module records results of a security functionality and acts on software functionalities as a function of the results. | 2015-11-12 |
20150324611 | LAYOUT-OPTIMIZED RANDOM MASK DISTRIBUTION SYSTEM AND METHOD - A data processing system includes a module for generating and distributing random masks to a number of cryptographic accelerators while providing for fewer total interconnects among the components generating the random masks. The module segments the tasks associated with generating random masks across a number of modules and blocks such that routing and timing problems can be minimized and layout can be optimized. A method for generating and distributing random masks to a number of cryptographic accelerators is also provided. The random masks are utilized by cryptographic accelerators to protect secret keys, and data associated with those keys, from discovery by unauthorized users. | 2015-11-12 |
20150324612 | SYSTEM AND METHOD FOR RECOVERING FROM AN INTERRUPTED ENCRYPTION AND DECRYPTION OPERATION PERFORMED ON A VOLUME - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation. | 2015-11-12 |
20150324613 | METHOD AND APPARATUS FOR PROTECTING BINARY DATA IN NON-VOLATILE MEMORY - A method and an apparatus of protecting binary data stored in non-volatile memory are disclosed herein. The apparatus for protecting binary data in non-volatile memory includes a reception unit, a detection unit, a generation unit, an encryption unit, and a storage unit. The reception unit receives program code. The detection unit detects the binary pattern of binary data constituting the program code by analyzing the received program code. The generation unit generates unique pattern information corresponding to the binary pattern based on the detected binary pattern. The encryption unit encrypts the program code using the generated unique pattern information as a key value. The storage unit stores the encrypted program code in memory. | 2015-11-12 |
20150324614 | Image Analysis - Provided is a method for performing analysis on an image. An image is provided to users, wherein contents of the image are hidden from the users. Information regarding the contents of the image is collected from the users wherein a question is posed to the users to determine contents of the image. Alternate inputs are received from the users to reveal the contents of the image, wherein each input from the users partially reveals the contents of the image. A response to the question from the users is received until it is determined that an input from one of the users would reveal an identity of a human subject present in the image. | 2015-11-12 |
20150324615 | INFORMATION PROCESSING DEVICE AND PORTABLE SETTLEMENT TERMINAL DEVICE - An information processing device includes a first information processing unit that is accommodated in a housing, and in which a first input display section is provided on an operational surface of the housing, and a tamper-resistant secure second information processing unit that is accommodated in front of the first information processing unit in the housing gripped by an operator, and in which a second input display section is provided in front of the first input display section on the operational surface. Further, in the information processing device, for example, a secure state display section that indicates a secure mode in authentication input, or indicates a non-secure mode in a case other than the authentication input is disposed on the operational surface. Even when a secure portion and a non-secure portion are present together, security of authentication information is secured, and an operator's mistake or an incorrect operation is suppressed. | 2015-11-12 |
20150324616 | SECURITY AND PROTECTION DEVICE AND METHODOLOGY - A mobile device includes a security device. The security device determines whether the mobile device is inside or outside security zones defined around a device being carried around by a user and an access point disposed at or near a place where the user regularly visit by detecting presence or absence of the wireless connection therewith. The device further determines whether or not there is an ongoing scheduled event and whether the mobile device is at or near an event location. The device further assesses a risk level of an environment where the mobile device is currently disposed based on determination results, and executes one of preset security action controls in response to the risk level determined to allow the mobile device to perform a security action to alert the user. | 2015-11-12 |
20150324617 | System and Method for Remotely Initiating Lost Mode on a Computing Device - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic | 2015-11-12 |
20150324618 | INTEGRATED UNIT FOR READING IDENTIFICATION INFORMATION BASE ON INHERENT DISORDER - The invention provides an authentication unit for reading identification and/or authentication information from a tag or object. The authentication unit includes a near-field reader configured to read a first identification feature based on inherent disorder, and a far-field reader configured to read a second identification feature, such as a bar code, optical characters, or an RFID tag. The near-field and far-field readers may be combined in a single integrated scanning module, which also includes circuitry for receiving signals from the readers, and an interface for communicating with a host device. | 2015-11-12 |
20150324619 | APPARATUS AND METHOD FOR CONTROLLING TAG - Disclosed herein is an apparatus for controlling a tag including: a communication interface receiving a read request; a tag communicating unit connected to one or more memory tags and transmitting and receiving data; a memory storing instructions for performing reads for the memory tags; and a processor performing a control for the memory tags according to the read request based on the instructions, wherein the instructions include instructions for performing the steps of: transmitting a configuration information request to the memory tags; receiving configuration information from the memory tags; calculating the number of data segment according to the configuration information and transmitting the read request including the number of data segment to the memory tags; and receiving a data segment corresponding to the number of data segment from the memory tags. | 2015-11-12 |
20150324620 | Image Plate Readout Device - The invention relates to an image plate readout device, the readout device comprising receiver elements for the reception of an image plate and/or a transfer element intended for an image plate. In connection with the readout device is provided, for detecting an object, at least one sensing element, which is in turn set in data communication with the readout device in such a way that, upon detecting an object, the sensing element delivers a signal to the readout device. In response to being triggered by a signal delivered by the sensing element, the readout device executes some function. | 2015-11-12 |
20150324621 | RFID HANDHELD DEVICE FOR READING RFID INFORMATION - An RFID handheld device is connected at an antenna input to an RFID reading apparatus for the stationary installation at a reading zone, said RFID handheld device having a trigger switch as well as a first antenna and an antenna connector connected to the first antenna so that an RFID signal received by the RFID handheld device, but not evaluated there, can be supplied to the receiver via the antenna input. On actuating a trigger switch at the RFID handheld devices, a trigger signal can be transmitted to the evaluation unit which then carries out a reading procedure via the first antenna. | 2015-11-12 |