50th week of 2015 patent applcation highlights part 50 |
Patent application number | Title | Published |
20150356218 | Method and Apparatus for Shape-Based Energy Analysis of Solids - A method of evaluating response of a physical structure to external stimulus includes defining a mesh of finite elements, each defined by edges, for a model of the physical structure. The method includes identifying a governing differential equation and associated complementary functions, which are each associated with a scalar multiplier. The method includes generating an energy optimization model that minimizes a difference between internal and external energies of the finite elements. The internal energy is based on strain energy in a volume defined by the edges of the finite element and resulting from deformations by the complementary functions. The external energy of each finite element is based on external work done by the external stimulus acting on the finite element as deformed by the complementary functions. The method includes solving the energy optimization model for the scalar multipliers and calculating a resulting parameter of interest of the physical structure. | 2015-12-10 |
20150356219 | EFFICIENT MECHANISM IN HARDWARE AND SOFTWARE CO-SIMULATION SYSTEM - The described embodiments provide an efficient mechanism for performing hardware and software co-simulation that greatly simplifies system implementation, and improves the user controllability and ease-of-use. The mechanism includes the hardware and software co-simulators synchronizing at finite and predetermined synchronization points (e.g., five synchronization points) without using polling or busy-wait techniques. The hardware and software co-simulators run freely and independently from each other until one of the synchronization points is reached. At such point the simulators can communicate and/or control other simulation states, thereby reducing the amount of communication and control between the simulators. | 2015-12-10 |
20150356220 | AUTOMATED INPUT SIMULATION FOR SIMULATED PROGRAMMABLE LOGIC CONTROLLER - Input simulation is provided ( | 2015-12-10 |
20150356221 | SIMULATION METHOD USING MEMORY FRAME PROXY ARCHITECTURE FOR SYNCHRONIZATION AND CHECK HANDLING - A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame. | 2015-12-10 |
20150356222 | SYSTEM AND METHOD FOR REDUCING POWER OF A CIRCUIT USING CRITICAL SIGNAL ANALYSIS - A system and methods provide for an analysis of at least a portion of an integrated circuit (IC) that comprises a plurality of modules, for the purpose of identifying signals that can be indicative of the activity of the modules. By analyzing the activity of these signal immediately before and immediately after each module going from non-idle to idle and from idle to non-idle respectively, it is possible to determine which signals provide an indication that the module should be shut down. If the module can be shut down in idle state, then these input signals may be used as control signals for this purpose. By reporting to a designer the role of such signals a simple design change for detecting the activity and controlling the module, can save on power consumption, in ways not previously detected by the designer. | 2015-12-10 |
20150356223 | Techniques for Generating Nanowire Pad Data from Pre-Existing Design Data - In one aspect, a CAD-based method for designing a lithographic mask for nanowire-based devices is provided which includes the steps of: create a design for the mask from existing (e.g., FINFET or planar CMOS) design data which includes, for each of the devices, one or more nanowire mask shapes (FINFET design data) or continuous shapes (planar CMOS design data); for FINFET design data, merging the nanowire mask shapes into continuous shapes; expanding the continuous shapes to join all of the continuous shapes in the design together forming a single polygon shape; removing the continuous shapes from the single polygon shape resulting in landing pad shapes for anchoring the nanowire mask shapes; for CMOS design data, dividing the continuous active shapes into one or more nanowire mask shapes; and merging the landing pad shapes with the nanowire mask shapes to form the lithographic mask. | 2015-12-10 |
20150356224 | METHOD AND CONTROL DEVICE FOR CIRCUIT LAYOUT MIGRATION - A method for circuit layout migration comprises creating a list of layout components in a source layout; determining a plurality of first groups of layout components being regularly aligned horizontally or vertically; determining first subsets of layout components which each belong to at least two of a respective set of determined first groups; determining a plurality of second groups of layout components, each second group comprising mutually exclusive ones of the first subsets of layout components; determining symmetry axes for pairs of second groups; building a constraint graph of the layout components of the source layout using alignment constraints for the alignment of layout components within each of the second groups and distance constraints for preserving a regularity pattern within each of the second groups and symmetry constraints for the determined symmetry axes for pairs of second groups; and performing constraint-graph-based compaction of the source layout. | 2015-12-10 |
20150356225 | MASKS FORMED BASED ON INTEGRATED CIRCUIT LAYOUT DESIGN HAVING CELL THAT INCLUDES EXTENDED ACTIVE REGION - A set of masks corresponds to an integrated circuit layout. The integrated circuit layout includes a first cell having a first transistor region and a second transistor region, and a second cell having a third transistor region and a fourth transistor region. The first cell and the second cell adjoin each other at side cell boundaries thereof, the first transistor region and the third transistor region are formed in a first continuous active region, and the second transistor region and the fourth transistor region are formed in a second continuous active region. The set of masks is formed based on the integrated circuit layout. | 2015-12-10 |
20150356226 | REMOTE CONFIGURATION OF VOLTAGE REGULATOR INTEGRATED CIRCUITS - A design server provides an online service for remotely configuring a voltage regulator integrated circuit (IC). A customer may employ a customer computing device to connect to the design server. The design server may receive from the customer computing device a user requirement for the voltage regulator IC. The design server may select one or more external components to configure the voltage regular IC to meet the user requirement. The design server may automatically place an order for the external components online. The external components may be available from commercial partners of the vendor of the voltage regulator IC. | 2015-12-10 |
20150356227 | PERFORMING STATIC TIMING ANALYSIS IN THE PRESENCE OF INSTANCE-BASED SYSTEMATIC VARIATIONS - A method may include obtaining gate-level circuit design data that describes a gate-level circuit design. The gate-level circuit design data may include one or more instances of each of multiple cells that each may be associated with a corresponding default cell static timing data and a corresponding default cell stress data. The method may include selecting one of the instances of one of the multiple cells, determining in-design stress data associated with the selected instance, and determining whether the in-design stress data is not within a tolerance of the default cell stress data. In response to the in-design stress data not being within the tolerance of the default cell stress data, the method may include generating in-design static timing data describing a timing performance for the selected instance and updating the gate-level circuit design data such that the selected instance is associated with the in-design static timing data. | 2015-12-10 |
20150356228 | PHOTOMASK ERROR CORRECTION - Design errors generated employing a mask rule check (MRC) program are indexed and examined one by one by an automated computer program connected to a false error pattern database that contains previously known waivered patterns, a real error pattern database that contains previously known pairs of an error-containing pattern and a corresponding error-free pattern, and optionally a mask house rule database. A waiver is applied to each design error for which a matching pattern is found in the false error pattern database. Each design error for which a match is found in the real error pattern database is modified to substitute an error-free pattern for an error-containing pattern therein. The output of the automated program includes a list of design errors for which no solution is found by the automated program. | 2015-12-10 |
20150356229 | PHYSICAL CELL ELECTROMIGRATION DATA GENERATION - Systems and methods for efficiently generating electromigration reliability data for physical cells in an integrated circuit cell library are disclosed. Data for tables of electromigration susceptibility can be iteratively generated for multiple capacitive loadings on a cell output and for multiple transition times of a cell input. Each iteration can include simulating electrical performance of the physical cell and identifying a region with the largest ratio of current density to electromigration reliability limit. Between iterations, the data period of the input signal is updated using the ratio of current density to electromigration reliability limit and a relationship between currents and data period. Iterations may end when the ratio is close to one. The result can be used to evaluate electromigration reliability of an integrated circuit design and modify the design accordingly. | 2015-12-10 |
20150356230 | OPTICAL PROXIMITY CORRECTION (OPC) ACCOUNTING FOR CRITICAL DIMENSION (CD) VARIATION FROM INTER-LEVEL EFFECTS - Various embodiments include computer-implemented methods, computer program products and systems for modeling at least one feature in an integrated circuit (IC) layout for an inter-layer effect. In some cases, approaches include a computer-implemented method of modeling at least one feature in an IC layout for an inter-level effect, the method including: building a set of shape measurement regions each connected with an edge of the at least one feature; determining a set of shape parameters for each shape measurement region in the set of shape measurement regions; and creating a column vector representing each shape measurement region using the set of shape parameters, the column vector representing the inter-layer effect of the at least one feature, wherein the inter-layer effect includes a physical relationship between the at least one feature and another feature on a distinct level of the IC layout. | 2015-12-10 |
20150356231 | PLANAR DESIGN TO NON-PLANAR DESIGN CONVERSION METHOD - A planar design to non-planar design conversion method includes following steps. At least a diffusion region pattern including a first side and a second side perpendicular to each other is received. A look-up table is queried to obtain a first positive integer according to the first side of the diffusion region pattern and a second positive integer according to the second side of the diffusion region pattern. Then, a plurality of fin patterns is formed. An amount of the fin patterns is equal to the second positive integer. The fin patterns respectively include a first fin length, and the first fin length is a product of the first positive integer and a predetermined value. The forming is performed by at least a computer-aided design (CAD) tool. | 2015-12-10 |
20150356232 | Method and System for Generating a Circuit Design, Method for Calibration of an Inspection Apparatus and Method for Process Control and Yield Management - A method for generating a circuit design of an integrated circuit, the circuit design comprising a functional area (FA) and a non-functional area is provided. The method comprises the steps of providing a description of a test cell (TC) to an electronic design automation (EDA) tool and inserting the test cell (TC) into the circuit design. Therein, the description of the test cell (TC) comprises a description of a test structure (HS) and the test structure (HS) is designed to be sensitive to variations of a manufacturing process. Furthermore, the test cell (TC) is inserted into a non-functional area and the inserting is performed automatically by the EDA tool. The test structure (HS) is intentionally designed to be sensitive to variations of the manufacturing process, in contrast to regular structures within the circuit description. | 2015-12-10 |
20150356233 | COMPUTATIONAL WAFER INSPECTION - Disclosed herein is a computer-implemented defect prediction method for a device manufacturing process involving processing a portion of a design layout onto a substrate, the method comprising: identifying a hot spot from the portion of the design layout; determining a range of values of a processing parameter of the device manufacturing process for the hot spot, wherein when the processing parameter has a value outside the range, a defect is produced from the hot spot with the device manufacturing process; determining an actual value of the processing parameter; determining or predicting, using the actual value, existence, probability of existence, a characteristic, or a combination thereof, of a defect produced from the hot spot with the device manufacturing process. | 2015-12-10 |
20150356234 | FAST FREEFORM SOURCE AND MASK CO-OPTIMIZATION METHOD - The present disclosure relates to lithographic apparatuses and processes, and more particularly to tools for optimizing illumination sources and masks for use in lithographic apparatuses and processes. According to certain aspects, the present disclosure significantly speeds up the convergence of the optimization by allowing direct computation of gradient of the cost function. According to other aspects, the present disclosure allows for simultaneous optimization of both source and mask, thereby significantly speeding the overall convergence. According to still further aspects, the present disclosure allows for free-form optimization, without the constraints required by conventional optimization techniques. | 2015-12-10 |
20150356235 | GENERATING A SEMICONDUCTOR COMPONENT LAYOUT - A method includes generating a first set of configurations of a layout of semiconductor components. The configurations of the first set of configurations each satisfy a first sub-set of a set of design rules. The method also includes generating a second set of configurations of the layout of semiconductor components. The second set of configurations are generated by eliminating one or more configurations of the first set of configurations based on a determination that the eliminated one or more configurations of the first set of configurations fail to satisfy a second sub-set of the set of design rules. The method further includes manufacturing a semiconductor device having semiconductor components arranged based on one of the configurations of the second set of configurations. | 2015-12-10 |
20150356236 | Method And Apparatus For Aligning Segments - An apparatus for aligning segments with one another include a positioning device and a projection device, installed on the construction site, projecting projection lines onto the segments from different directions so that distances between the projection lines and reference points applied to the segments can be determined. The position of the individual reference points on the segments can be determined with reference to a coordinate system by an evaluation device. Based on the spatial arrangement of the reference points, theoretical best-fit planes and best-fit lines are then generated for each segment. The segments are levelled by moving the positioning device or adjusting the shortest possible distance between the theoretical best-fit planes and best-fit lines to the projection lines and are aligned by again moving the positioning device so that the distances between the theoretical best-fit planes and best-fit lines of the first segment and of the second segment are minimised. | 2015-12-10 |
20150356237 | METHOD AND APPARATUS FOR ANALYSIS OF SHAPE OPTIMIZATION - A method for analysis of shape optimization includes: a design space setting step of setting a design space; an optimization block model generating step of generating an optimization block mode in the set design space; a connection processing step of connecting the generated optimization block model with a structural body model; a material property setting step of setting a material property for the optimization block model; a crashworthy optimum shaping condition setting step of setting a crashworthy optimum shaping condition for the optimization block model; a crashworthiness analysis condition setting step of setting a crashworthiness analysis condition for the structural body model; a three-dimensional element necessity calculation step of executing a crashworthiness analysis on the optimization block model, and calculating information related to necessity of each of three-dimensional elements of the optimization block model; and an optimum shape determining step of determining an optimum shape. | 2015-12-10 |
20150356238 | Scoring the Deviation of an Individual with High Dimensionality from a First Population - Techniques for scoring deviations of individuals from a population include obtaining profile data for each individual in a first population and from a subject drawn from a second population. The profile data indicates values for each of multiple parameters. Within the first population, a first neighbor and a second neighbor are determined, different from the subject and each other. A first distance of a vector distance metric between the subject and the first neighbor is less than a distance between the subject and any other individual of the first population. A second distance between the first neighbor and the second neighbor is less than a distance between the first neighbor and any other individual of the first population. A deviation of the subject from the first population is determined based on a ratio of the first distance divided by the second distance and presented on a display device. | 2015-12-10 |
20150356239 | METHODS, MODELS, SYSTEMS, AND APPARATUS FOR IDENTIFYING TARGET SEQUENCES FOR CAS ENZYMES OR CRISPR-CAS SYSTEMS FOR TARGET SEQUENCES AND CONVEYING RESULTS THEREOF - Disclosed are thermodynamic and multiplication methods concerning CRISPR-Cas systems, and apparatus therefor. | 2015-12-10 |
20150356240 | Self-Assembling Protein Nanostructures - Synthetic nanostructures, proteins that are useful, for example, in making synthetic nanostructures, and methods for designing such synthetic nanostructures are disclosed herein. | 2015-12-10 |
20150356241 | METHODS AND SYSTEMS FOR DETERMINING META-GENOTYPES - In one exemplary embodiment, a computer-implemented method for determining a genetic result from a biological sample is provided. The method includes receiving nucleic acid amplification data of a biological sample, by a processor, from a biological instrument. The method further includes storing translation data, in a memory. The translation data includes a pattern of assay values associated with possible genetic results. The method further includes comparing the translation data with the nucleic acid amplification data, by the processor, to generate the genetic result of the biological sample. Moreover, the method includes displaying the genetic result, on a display, to a user. | 2015-12-10 |
20150356242 | Systems and Methods for Gene Expression Analysis - The present disclosure provides systems, methods, and a computer-readable storage medium for identifying and selecting highly relevant sets of genes (or Gene Signatures and biomarkers), which, when coupled with clinical and/or demographic data are highly predictive of potential clinical responses to a targeted therapy. It also provides systems, methods, and a computer-readable storage medium for determining the expected response to the targeted therapy when using the selected gene/biomarker set. | 2015-12-10 |
20150356243 | SYSTEMS AND METHODS FOR IDENTIFYING POLYMORPHISMS - The present invention relates to processes, systems and methods for estimating the effects of genetic polymorphisms associated with traits and diseases, based on distributions of observed effects across multiple loci. In particular, the present invention provides systems and methods for analyzing genetic variant data including estimating the proportion of polymorphisms truly associated with the phenotypes of interest, the probability that a given polymorphism has a true association with the phenotypes of interest, and the predicted effect size of a given genetic variant in independent de novo samples given effect size distributions in observed samples. The present invention also relates to using the described systems and methods and use of genetic polymorphisms across a plurality of loci and a plurality of phenotypes to diagnose, characterize, optimize treatment and predict diseases and traits. | 2015-12-10 |
20150356244 | Protocol Management System (PROMS) - A computer-implemented method for managing imaging protocols among a plurality of image scanners includes creating a plurality of parent node data records, each respective parent node data record corresponding to a distinct type of image scanner. A plurality of imaging protocols are stored, each imaging protocol associated with a distinct parent node data record included in the plurality of parent node data records. Next, a child node creation process is performed for each respective image scanner included in the plurality of image scanners. The child node creation process may include, for example: determining a respective image scanner type associated with a respective image scanner; identifying a respective parent node data record corresponding to the respective image scanner type; creating a child node data record associated with the respective parent node data record; identifying a respective imaging protocol associated with the respective parent node; and storing a copy of the respective imaging protocol at the respective scanner. | 2015-12-10 |
20150356245 | CONTROL METHOD AND RECORDING MEDIUM - A method for controlling an information terminal causes a computer of the information terminal to receive, from a case retrieval system, a plurality of similar medical images having a feature quantity of a region of interest and a certain degree of similarity in accordance with the region of interest included in a target medical image, displays a display screen displaying the plurality of received similar medical images on a touch panel display, the display screen including a display region in which at least some of the plurality of received similar medical images are displayed, displays, if selection of a first similar medical image from among the at least some of the plurality of received similar medical images displayed in the display region is detected, the first similar medical image across the display region, and displays, if a swipe operation performed on the first similar medical image is detected, a second similar medical image, which has second highest similarity next to the first similar medical image among the plurality of similar medical images, in the display region such that a corresponding region of interest included in the second similar medical image is located at a certain position in the display region. | 2015-12-10 |
20150356246 | MEDICAL CODING SYSTEM WITH CDI CLARIFICATION REQUEST NOTIFICATION - Techniques are provided whereby a clarification request may be generated with a clinical documentation improvement (CDI) system for resolution by a clinician, and notification of the clarification request may be transmitted to a medical coding system. At a medical coding system, notification may be received of a clarification request generated at a CDI system for resolution by a clinician. In some embodiments, the medical coding system may be a computer-assisted coding (CAC) system. | 2015-12-10 |
20150356247 | System and Method for Processing Healthcare Information - A method for processing healthcare information includes: receiving information related to a patient and a plurality of providers involved with caring for the patient; using the information to generate patient centered provider graphs that describe relationships among the patient and the plurality of providers and include an indication of provider availability within a clinical situation; and presenting the graphs to a plurality of uses. An apparatus that is used to practice the method is also provided. | 2015-12-10 |
20150356248 | System and Method for Generating Medical Service Provider Information Incorporating Referral Pattern Data - A system is described for rendering medical service provider entity information. The system is configured to identify a medical service provider entity for which referrals data enhanced medical service provider information will be rendered for presentation to a requesting user. The a medical service provider referral processing engine accesses medical service provider referral information relating to the medical service provider entity, wherein the referral information specifies a value representing referrals received by the medical service provider entity. The referral processing engine transforms the referral information to render a received referrals value, wherein the transformation comprises at least summing a plurality of referral values corresponding to referrals received by the medical service provider entity. The referrals value is incorporated with medical service provider information to render referrals data enhanced medical service provider information. | 2015-12-10 |
20150356249 | PATIENT STATUS NOTIFICATION - A healthcare facility server identifies an anonymous identifier (ID) associated with a patient at a healthcare facility. The healthcare facility server identifies data indicating that the healthcare facility server has received a medical status update for the patient. In response to identifying that the data indicating the medical status update for the patient has been received, the healthcare facility server sends a request to a server to send a medical status notification about the patient to a computing device that is registered to receive notifications associated with the anonymous ID. The request includes the patient's anonymous ID and the medical status update for the patient. The medical status notification is based on the medical status update and includes only non-patient identifiable information. | 2015-12-10 |
20150356250 | Method for an Interactive, Patient Controlled Medical Information System in a Digital, Real Time Manner which Features a Single Point of Entry for Patients, Physicians, all other Health Care Providers, Health Care Payers, Researchers and Pharmaceutical Companies - A system and method of managing and maintaining electronic health care records on a web based database controlled by the patient where the electronic health care records are updated on the web based database immediately at the point of service. A user patient logs into the system and authorizes health care providers to have access to that user patient's medical records database. These health care providers generate electronic medical records pertaining to the user patient. These electronic medical records are uploaded onto the user patient's database and sorted by HL7/FHIR resource code in that database. The electronic medical records are immediately available to the patient and authorized health care providers through the patient's medical records management system database. Additionally, the electronic medical records of all patients on the medical records management system database are available to be searched as a function of medically relevant data stored on the database. | 2015-12-10 |
20150356251 | CONTEXT DEPENDENT APPLICATION/EVENT ACTIVATION - The system includes a computer-readable memory having a data structure configured with electronic data indicative of the patient's cognitive ability and/or context information relevant to the patient. The computer system is programmed to dynamically present information based on the patient's cognitive ability and/or context, obtained by accessing the computer-readable memory. The system is thus able to dynamically customize the way the system interacts with the patient, dynamically rendering information and automatically launching specific applications and events based on set parameters to meet the assistive needs of the patient. The system also captures information about the patient's health and wellbeing which is dynamically communicated to the caregiver, which information is also in part based on cognitive ability of the patient and/or context. | 2015-12-10 |
20150356252 | MEDICAL DATABASE AND SYSTEM - A medical database and system and method using same are provided. The medical database includes a data unit for storing modules representing medical records of subjects. Each module includes a plurality of module elements each representing a medically-relevant parameter of the subject with each element assigned a specific identifier in the module and a numerical value corresponding to the medically-relevant parameter. | 2015-12-10 |
20150356253 | MEDICAL INFORMATION SYSTEM WITH AUTOMATIC RECONFIGURATION AND DATA BINDING - Disclosed herein are methods, apparatus and computer program products for a customizable and contextually relevant medical system with automatic reconfiguration and data binding. Some embodiments relate to an enterprise digital assistant capable of changing its functionality based on context and binding medical information associated with one medical entity, for example, a care giver, patient or medical system/device, to medical information associated with another medical entity. Other embodiments relate to a method for automatically reconfiguring an enterprise digital assistant based on context and performing contextually relevant data binding. In this regard, the method provides a module for processing medical data from a plurality of medical entities and transmitting the data to one or more clinical information systems. | 2015-12-10 |
20150356254 | Centralized System for Tracking and Maintaining Vascular Access Records Across a Healthcare Continuum - A system is provided for tracking and maintaining vascular access medical records across a continuum of healthcare facilities, facilitators or providers having respectively compartmentalized vascular access records. The system centrally aggregates vascular access records in association with a patient, with the vascular access records including at least past vascular access services rendered across the healthcare continuum. The system provides access by third party vascular access service providers to the vascular access records, responsive to new vascular access service requests for the patient from any one of the plurality of the healthcare entities. The system further enables supplementing the vascular access records to reflect results from the new vascular access service request, and/or post-service results, wherein the results are available for access in association with subsequent vascular access service requests for the patient by any one of the plurality of healthcare entities. | 2015-12-10 |
20150356255 | ELECTRONIC MEDICATION ORDER TRANSFER AND PROCESSING METHODS AND APPARATUS - A pharmacy system for the automated transfer and processing of electronic medication order information to and from a computerized patient care system associated with a healthcare facility includes a pharmacy engine configured to receive a first HL7 message including information relating to an electronic medication order for a medication that is to be prepared for intravenous administration to a patient, and transmit a second HL7 message including information relating to preparation of the medication corresponding to the electronic medication order, the information from the second HL7 message being used to bill for the medication corresponding to the electronic medication order. The pharmacy system also includes a pharmacy computer configured to process the electronic medication order, including identifying one or more ingredients required to prepare the medication corresponding to the electronic medication order and a pharmacy workstation configured to provide instructions for preparing the medication corresponding to the electronic medication order. | 2015-12-10 |
20150356256 | APPARATUS AND METHOD FOR MANAGING A CARE SERVICE - A method manages a care service by a terminal apparatus of a caregiver. The method includes recognizing a smart card of a patient, receiving encrypted data including encrypted time information from the smart card, the encrypted time information being generated at the smart card by encrypting time information corresponding to a point in time when the terminal apparatus recognizes the smart card, and transmitting the encrypted data to a management server. The encrypted data is generated by the smart card using an encryption key and decrypted by the management server using a decryption key corresponding to the encryption key. A time corresponding to time information acquired from the decrypted data is stored in the management server as a care service providing time. | 2015-12-10 |
20150356257 | PATIENT STATUS NOTIFICATION - A server receives data for obtaining an anonymous ID associated with a resident of an assisted living facility from a first computing device. The server obtains the anonymous identifier (ID) associated with the resident of the assisted living facility. The server provides a list of selectable status updates for display on the first computing device. The server receives data indicating selection of a status update from the list of selectable status updates from the first computing device. And the server sends a status notification about the resident to a second computing device that is registered to receive notifications associated with the anonymous ID, where the status notification is based on the selected status update. | 2015-12-10 |
20150356258 | REAL-TIME NATIONAL RADIATION DOSE DATABASE AND MONITORING RADIATION DOSAGES USING THIS DATABASE - An inventive system and method for monitoring radiation dose data comprises in one aspect, a database storing at least recommended dose data and benchmark dose data for one or more facilities, a scanner located in one facility, the scanner can perform a scan with radiation dose data, an application server, a user interface comprising at least a display, and a module, operable on the processor, to receive the radiation dose data from the scanner, store the radiation dose data, monitor the radiation dose data in accordance with effective dose data and the benchmark dose data for the facilities, and display the monitored dose data and the benchmark dose data for the facility. In one aspect, convert the radiation dose data in accordance with the recommended dose data stored in the database and obtain an effective dose data based on the converted radiation dose data. | 2015-12-10 |
20150356259 | MULTIPLE COMPUTER SERVER SYSTEM FOR ORGANIZING HEALTHCARE INFORMATION - A method of providing changes in healthcare policy information is provided, including: providing a first database, the first database containing a plurality of records, each record containing a copy of a website and tags associated with the website, the website pertaining to healthcare policy information; retrieving current versions of tags associated with the websites on the Internet; for each website, determining if the tags associated with the website have changed by comparing the current version of the tags to the copy of the tags in the first database; if the tags have changed, updating the copy of the website associated with the tags in the first database; determining the changes in the website, and providing access to reports generated to reflect changes in the website. | 2015-12-10 |
20150356260 | NLU TRAINING WITH USER CORRECTIONS TO ENGINE ANNOTATIONS - Techniques for training a natural language understanding (NLU) engine may include generating a first annotation of free-form text documenting a healthcare patient encounter and a link between the first annotation and a corresponding portion of the text, using the NLU engine. A second annotation of the text and a link between the second annotation and a corresponding portion of the text may be received from a human user. The first annotation and its corresponding link may be merged with the second annotation and its corresponding link. Training data may be provided to the engine in the form of the text and the merged annotations and links. | 2015-12-10 |
20150356261 | CONTENT SUGGESTION ENGINE - Systems and methods for content selection and processing in an information system are described herein. In one example, a content suggestion engine operates to select, suggest, or recommend content to human users. The selection of content may be suited to a goal or set of goals set by a human user (for example, content recommendations used to assist the human user with achieving a personal health goal). The content suggestion engine may evaluate information to help determine the appropriateness of the content suggestions, considering factors such as a psychological profile, medical conditions, lifestyle, demographics, and goals. The content may be further filtered and weighted to select a subset of content and suggested actions most relevant to the human user. | 2015-12-10 |
20150356262 | SYSTEMS AND METHODS FOR PROVIDING A USER ENGAGEMENT PLATFORM TO SUPPORT CLINICAL DECISIONS - Systems and methods are disclosed for providing a user engagement platform to support clinical decisions. The user engagement platform is a point of care decision support platform for inpatients in an emergency department (ED), an intensive care unit (ICU), or other medical care department or facility that services patients with critical care needs. The user engagement platform is configured to receive and process data parameters obtained from a patient electronic health record (EHR), identify abnormalities based on such data parameters, prompt a user (e.g., clinician or other healthcare professional such as a nurse) to consider conditions common in ICU or ED patients that could result in patient death and update the patient EHR based on such user input. | 2015-12-10 |
20150356263 | Intelligent Health Home Monitoring System Supporting Congestive Heart Failure Self-Care - A telehealth system for monitoring the health of a CHF patient has a communication application operating on an electronic device, in communication with a medical authority, a scale connected to the application and configured to provide weight of the patient, a glucometer connected to the application and configured to provide a glucose measurement of the patient, a blood pressure meter connected to the application and configured to provide a blood pressure measurement of the patient, a database in communication with the application configured to store the weight measurement, glucose measurement and blood pressure measurement data, a rule-based expert system in communication with the monitoring database and with the application, wherein the expert system provides a risk assessment based on the weight, glucose reading and blood pressure of the patient. | 2015-12-10 |
20150356264 | Medical System Having Plug And Play Function - A medical system is disclosed, which can be useable in particular for monitoring and/or controlling at least one bodily function of a user. The medical system comprises a control device and at least one medical user element embodied separately from the control device. The medical user element and the control device are designed to exchange data wirelessly. The medical system is designed to enable an automatic assignment step, wherein an exchange of personal data between the medical user element and the control device is enabled by the automatic assignment step. The medical system is furthermore designed to automatically initiate the automatic assignment step by means of an assignment coupling between the medical user element and the control device. The medical system is furthermore designed to enable a separation of the assignment coupling for medical operation of the medical system after the assignment step. | 2015-12-10 |
20150356265 | HEALTHCARE MANAGEMENT SYSTEM AND METHOD - A system for providing a community in which treatments may be tested for conditions associated with one or more entities. Information may be received that includes a condition of an entity, the condition associated with a particular domain, and one or more symptoms of the condition experienced by the entity. Access to the information may be provided to one or more domain experts. The provision of one or more treatments for the condition to the community may be facilitated. The treatment of the condition may be tracked and analyzed for efficacy. Treatment plans may be suggested for conditions based on the analysis of the information provided to the community. | 2015-12-10 |
20150356266 | IMMUNE AND OXYGEN SYSTEM MEASURING AND DRUG SCREENING METHOD AND APPARATUS - Method and apparatus for monitoring health as related to immune system function, and for measuring the effects of toxins and other stresses. A method for pre-screening drugs for the pharmaceutical pipeline. A method for using an Immunogram as a research tool. A method for preparing compounds or drugs for treatment, therapy, or cure of diseases. | 2015-12-10 |
20150356267 | REDUCED MODELING METHOD FOR NEURONS - Disclosed herein is modeling method which is enabled to analyses neurons in order to reduce real neurons physiologically properly using the relationship between asymmetry in signal propagation between a soma and dendrites and dendritic excitability. The modeling method for neurons include determining voltage attenuation factors which represent properties of signal propagation between dendrites and a soma and is represented as functions of distance from the soma; and determining a plurality of passive parameter at a pre-determined path length using system parameters defined from the anatomical model comprising the voltage attenuation factors at the pre-determined path length. | 2015-12-10 |
20150356268 | Dental Occlusion Analysis Tool - An electronic 3D model of at least a portion of a maxillary arch of a patient is displayed. Inputs indicating a tip of a mesiobuccal cusp of a maxillary first molar are received for both the patient's right and left sides. In addition, an electronic 3D model of at least a portion of a mandibular arch of a patient is displayed. Inputs indicating relevant points on the mandibular first molar are received for both the patient's right and left sides. Side scores are generated for the patient's right and left sides based on the indicated points. A final occlusion score for the patient is displayed. The final occlusion score is based on the side score for the right side and the side score for the left side. | 2015-12-10 |
20150356269 | RAPID IDENTIFICATION OF OPTIMIZED COMBINATIONS OF INPUT PARAMETERS FOR A COMPLEX SYSTEM - Multiple tests of a complex system are conducted by applying varying combinations of input parameters from a pool of input parameters. Results of the tests are fitted into a model of the complex system by using multi-dimensional fitting. Using the model of the complex system, identification is made of at least one optimized combination of input parameters to yield a desired response of the complex system. | 2015-12-10 |
20150356270 | AUTOMATED MEDICAL PROBLEM LIST GENERATION FROM ELECTRONIC MEDICAL RECORD - Methods, systems, and devices map data of an electronic medical record to standardized medical concepts. The standardized medical concepts are defined by medical industry standards organizations. The methods, systems, and devices identify medical problem concepts, from the standardized medical concepts, generate feature values of the medical problem concepts based on features within the mapped standardized medical concepts, and weight the medical problem concepts based on the feature values according to a weighting function. These methods, systems, and devices identify medical problems as ones of the medical problem concepts that have a weighted score above a threshold, according to the weighting, and output a list of the medical problems. | 2015-12-10 |
20150356271 | CONTROL METHOD AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - Similar medical images having a predetermined similarity to a region of interest in a medical image to be interpreted are received from a case search system. A display screen on which the received similar medical images are displayed is displayed on a display. The display screen includes display frames within which similar medical images are displayed. In response to an instruction for enlarging the similar medical images, corresponding regions of interest in the similar medical images are enlarged and displayed with the sizes of the display frames maintained unchanged on the display screen. In response to an instruction for causing a selected similar medical image among the enlarged and displayed similar medical images to move within a corresponding display frame, the other unselected similar medical image(s) is caused to move within a corresponding display frame synchronously with the movement of the selected similar medical image in the same movement direction. | 2015-12-10 |
20150356272 | PRESCRIPTION ANALYSIS SYSTEM AND METHOD FOR APPLYING PROBABILISTIC MODEL BASED ON MEDICAL BIG DATA - A prescription analysis system and method are introduced. The prescription analysis system includes a knowledge database, an access module, a storage module, and a judgment module. The judgment module judges whether a new prescription is appropriate according to three prescription appropriateness criteria. The prescription analysis method is integrated in the prescription analysis system. Therefore, the prescription analysis system and method enhance the accuracy of prescriptions, reduce likelihood of medication errors, cut medical expenditure, and save patients' lives. | 2015-12-10 |
20150356273 | APPARATUS FOR RECORDING INFORMATION CONCERNING THE USE OF AN INJECTION DEVICE - Apparatus for recording information concerning the use of an injection device, the apparatus comprising: one or more sensors for providing information indicative of how the injection device is used; a processor configured to analyse said information detected by the one or more sensors to determine use information, said use information corresponding to how the injection device is used; and a memory for storing said use information in an image format such that said use information can be retrieved from the memory and displayed in an image. | 2015-12-10 |
20150356274 | METHODS AND SYSTEMS TO CREATE AND APPLY MODELS THAT SCREEN PATIENTS FOR REFERRAL TO A SPECIALIST FOR A MEDICAL THERAPY - A screening tool for deciding whether to refer patients to a specialist who provides a particular medical therapy is created as a model that is trained, validated, and then applied to subject patients. The training of the model utilizes a training set of answers to the set of questions and a specialist conclusion about referral for the patients who provided the training set of answers in order to drive the model to an ideal sensitivity and an ideal specificity. The model is then validated using a validation set of answers and a specialist conclusion about referral for the patients who provided the validation set of answers to produce a resulting sensitivity and specificity. Once the resulting sensitivity and specificity achieve a target, the model is validated and is then used in practice for subject patients. | 2015-12-10 |
20150356275 | System and Method for Eliciting Patient Engagement Corresponding to an Engagement Plan - A processor-implemented system and method is provided for monitoring patient parameters of engagement plans administered to patients. A builder software application on a first processor-based device is provided for creating an engagement plan from an engagement protocol. An engagement software application on the first processor-based device is configured for monitoring the engagement plan to determine that an administering time for administering the engagement plan has been reached. The engagement software application is further configured for generating a notification message when it is determined that the administering time has been reached. The notification message is transmitted to a registered second processor-based device. The notification message includes an interactive software component for receiving a response message from the second processor-based device. The engagement software application is configured to receive the response message and a status, and to determine patient parameters, thereby engaging patients corresponding to the administered engagement plan. | 2015-12-10 |
20150356276 | EQUATIONS DESCRIBING THE STRUCTURAL FLUCTUATION AND DYNAMICS OF BIOPOLYMERS IN SOLUTION - The applicant devised a novel theoretical means for determining a variance-covariance matrix of the structural fluctuation of a biopolymer by deriving, on the basis of the equilibrium and non-equilibrium statistical mechanics of liquids, two theoretical formulae that are set forth in claim | 2015-12-10 |
20150356277 | METHOD FOR AUTOMATING THE MANAGEMENT AND INTERPRETATION OF DIGITAL DOCUMENTS AND THEIR OWNERS RIGHTS METADATA FOR GENERATING DIGITAL RIGHTS MANAGEMENT PROTECTED CONTENTS - A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document. | 2015-12-10 |
20150356278 | Physical Confirmation for Network-Provided Content - A computer-implemented method includes receiving, from a remote communication device and at a server system, information that indicates a unique identifier for a physical item that corresponds to media content, the identifier differing from identifiers for other physical items that correspond to the same content; associating the received information with an account of a first user of a hosted internet service; and subsequently providing, by the hosted internet service, content that matches the content that corresponds to the physical item, based on a determination that the received information authorizes the first user to obtain the content provided by the hosted internet service. | 2015-12-10 |
20150356279 | METHODS AND SYSTEMS FOR MANAGING LICENSE DISTRIBUTION FOR SOFTWARE - Methods, computing systems, and computer-readable media include software license management. The method includes receiving, from a user, a request to use one or more software applications for a period of time. The one or more software applications are protected by access controls unlocked by one or more hardware dongles. The method also includes configuring, by one or more processors, a virtual machine that executes the one or more software applications for the period of time. The virtual machine is configured to request authorization to unlock the access controls for the one or more software application from a license server coupled to the one or more hardware dongles. The method includes providing, to the user, connection information for communicating with the virtual machine. | 2015-12-10 |
20150356280 | SYSTEMS AND METHODS FOR DETERMINING COMPATIBILITY BETWEEN SOFTWARE LICENSES - A non-transitory storage device stores instructions that, when executed by a processor, causes the processor to receive, from an input device, input identifying software licenses for software components to be included in an application. The instructions also cause the processor to receive usage information identifying how the application is to be used, determine whether an incompatibility exists between a first one of the software licenses for a first software component and a second one of the software licenses for a second software component, and based on a determination of the existence of an incompatibility, display a recommendation by the processor as to how to avoid the incompatibility. | 2015-12-10 |
20150356281 | Secure Watermarking of Content - Methods and systems for secure watermarking of at least part of a content item X are described, wherein the method comprises: providing a distorted content item X+y, comprising one or more distorted data units wherein the payload of a distorted data unit comprises a distortion signal y which distorts the rendering of the payload in said distorted data unit; providing a compensating watermark payload w-y comprising one or more compensating watermark signals S−y; using homomorphic encryption for en-crypting at least part of said distorted content item X−y and said compensating watermark payload into an encrypted distorted content item E(X+y) and an encrypted compensating watermark payload E(w-y) on the basis of one or more encryption keys; and, combining said encrypted distorted content item with said encrypted compensating watermark payload on the basis of one or more homomorphic computations, wherein said one or more computations modify a distortion signal y in the payload of a distorted data unit into a non-perceptible watermark signal S. | 2015-12-10 |
20150356282 | APPARATUS AND METHOD FOR DATA TAINT TRACKING - A controlled system performs internal taint tracking of data items. When a data item is created, the controlled system computes a name and a taint for the data item and performs an initialization function, thus informing a tracking entity that of the name and data of the data item. The taint is propagated to further data items, while the name may change, and when a data item is exported to or imported from a further device, the controlled system informs the tracking entity of the name and taint of the exported or imported data item as well as its source and destination. A controlled system may request a propagation history from the tracking entity. As the tracking entity is shared by more than one controlled system, it is possible to perform taint tracking across controlled systems even if these do not use the same taint tracking framework. | 2015-12-10 |
20150356283 | User Configurable Profiles for Security Permissions - Permissions specified within an application permission manifest file of an application may be superseded with customized permissions. A user may customize the permissions by denying permissions, granting permissions, or requesting a prompt prior to an application attempting to access functionality and/or data protected by a permission. A user may customize permissions on a global or per application basis. Upon receiving input to customize a permissions profile, a package manager module creates a new permissions manifest file associated with an application. Upon receiving input to execute an application, a runtime environment that may be provided by the runtime accesses the new permissions manifest file instead of an original permissions manifest file, and operates the application using permissions granted in the new permissions manifest file. | 2015-12-10 |
20150356284 | USER AUTHENTICATION - A method and system for authenticating a user is provided. The method includes receiving keyboard entries from a user while a cursor of a computer screen is positioned in a password field of the user. The keyboard entries include a series of alphanumeric characters forming part of a password of the user and one or more function keys that either delete one or more of the alphanumeric characters or do not affect the alphanumeric characters as entered into the password field. The key board entries are logged. The logged keyboard entries checked to determine whether they match a stored valid password for the user such that the one or more function keys that either delete one or more of the alphanumeric characters or do not affect the alphanumeric characters are considered part of the submitted password which is compared to the stored valid password for authentication of the user. | 2015-12-10 |
20150356285 | SYSTEM OR DEVICE FOR RECEIVING A PLURALITY OF BIOMETRIC INPUTS - A system or device includes a substrate and a plurality of sides. A plurality of pixel stacks, each of which includes a plurality of pixel elements, or a plurality of input layers are positioned on at least one of the sides. The pixel stacks or input layers are configured to receive a plurality of biometric, or multi-biometric, inputs, and at least one biometric input passes entirely through at least one pixel element or at least one pixel layer before being received by another pixel element or layer. | 2015-12-10 |
20150356286 | Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management - A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use. On a next interaction, the state machine transitions to full authentication requiring robust authentication to continue operating in a normal mode. | 2015-12-10 |
20150356287 | Methods, Apparatus and Computer Programs for Entity Authentication - An identity of an entity ( | 2015-12-10 |
20150356288 | PASSWORD INPUT INTERFACE - A trigger instruction is received to set a password input interface. A setting of a term represented by a key is triggered. A selection or input of the term represented by the key on the password input interface is received. A first corresponding relationship between the key and the represented term is established. The password input interface is displayed. An electronic device sets terms, which are commonly used by a user to set a password, in a same password input interface. Thus, when a user password includes different types of terms, the user inputs the password without switching among different input interfaces to ensure that the user input the password conveniently. | 2015-12-10 |
20150356289 | Secure Current Movement Indicator - Methods, devices, systems, and non-transitory processor-readable storage media for authenticating a computing device to access functionalities. An embodiment method may include operations for receiving in the computing device a signal from a proximity beacon device, obtaining from the received signal information that indicates whether the proximity beacon device has detected movement, determining whether the obtained information matches stored data corresponding to the proximity beacon device, performing an abbreviated authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal matches the stored data, and performing a normal authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal does not match the stored data. | 2015-12-10 |
20150356290 | ALTERNATE AUTHENTICATION - A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device comprises a cryptographic chip. The device can receive a user authentication token from the digital user identification service, which authenticates a user's identity. Further, the security-enabled device can validate the user authentication token, and provide the user access to device security operations on the security-enabled device if the user authentication token is successfully validated, allowing the user to reset their security access information for the device. | 2015-12-10 |
20150356291 | SYSTEM AND METHODS FOR DETECTING HARMFUL FILES OF DIFFERENT FORMATS IN VITUAL ENVIRONMENT - Disclosed are systems, methods and computer program products for detection of harmful files of different formats. An example method includes: receiving a suspicious file; determining a file format of the suspicious file; determining, using antivirus software, if the suspicious file is dean or harmful; and when the antivirus software fails to determine whether the suspicious file is clean or harmful, selecting, based on at least the file format of the suspicious file, a configuration of a virtual machine for analyzing a maliciousness of the suspicious file by at least: selecting a program associated with the file format of the suspicious file, opening the suspicious file using the associated program in the virtual machine, collecting data of at least one activity on the virtual machine, and analyzing the data to determine the maliciousness of the suspicious file. | 2015-12-10 |
20150356292 | METHODS AND APPARATUSES FOR SECURE COMPILATION - A method and an apparatus that provide secure executable codes generated during run time via a trusted compiler server are described. An application can send a service request to the compiler server to request executable codes. The compiler server can determine whether the service request is permitted to be served based on a security policy imposed and the security settings associated with the service request. Availability of certain compilers can be allowed if the application is authorized according to the service request. | 2015-12-10 |
20150356293 | SECURE APPLICATION DEVELOPMENT AND EXECUTION - Examples of secure application development and execution are disclosed herein. An example method may include parsing code of an application configured for execution on a user device to identify one or more sensitive portions of the code. Example methods may further include identifying a trusted execution environment, different from the user device, suitable to execute the one or more sensitive portions of the code. Example methods may further include configuring the code to provide the one or more sensitive portions of the code from the user device to the trusted execution environment during execution of the application on the user device. | 2015-12-10 |
20150356294 | METHODS FOR ENFORCING CONTROL FLOW OF A COMPUTER PROGRAM - One aspect of the invention provides a method of controlling execution of a computer program. The method comprises the following runtime steps: parsing code to identify one or more indirect branches; creating a branch ID data structure that maps an indirect branch location to a branch ID, which is the indirect branch's equivalence class ID; creating a target ID data structure that maps a code address to a target ID, which is an equivalence class ID to which the address belongs; and prior to execution of an indirect branch including a return instruction located at an address: obtaining the branch ID associated with the return address from the branch ID data structure; obtaining the target ID associated with an actual return address for the indirect branch from the target ID data structure; and comparing the branch ID and the target ID. | 2015-12-10 |
20150356295 | KEEP-ALIVE SYSTEM AND METHOD FOR CLOUD-BASED DATABASE SYSTEMS - A keep-alive system and method for cloud-based database systems. A plurality of fields of the database are monitored to track a predetermined pattern of changes with respect to time. A departure from the predetermined pattern of change indicates an unexpected action of the database such as, for example, a roll-back of the state of the database. | 2015-12-10 |
20150356296 | PROTECTION OF DATA STORED IN AN INTEGRATED CIRCUIT - A method of detecting a cold-boot attack on an integrated circuit, including the steps of: periodically sampling a signal delivered by at least one ring oscillator; and verifying that the proportion of states “1” and of states “0” of the result of the sampling is within a range of values. | 2015-12-10 |
20150356297 | METHOD AND SYSTEM FOR PROTECTING COMPUTERIZED SYSTEMS FROM MALICIOUS CODE - The invention relates to a method for providing a computerized system which is protected from malicious programs coming from an external source, the method comprises the steps of (a) secretly, and in a manner unknown to authors of external programs, modifying one or more essential elements at the protected system in a manner which causes all running programs to fail, unless they are subjected to a compatible modification which enables them to run properly; and (b) modifying each program at the computerized system which is known to be benign in order to comply with said modification of one or more essential elements, thereby to enable it to be executed properly. | 2015-12-10 |
20150356298 | METHOD AND SYSTEM FOR UNLOCKING AND DELETING FILE AND FOLDER - A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder. The embodiments of the present invention relieves layer by layer the protections arranged by files infected with a virus by employing a plurality of means such as removing the read-only lock, removing the routine lock, adding the authority and closing the handle, thereby increasing the confrontation capacity of a security software against a malignant program. | 2015-12-10 |
20150356299 | BIOS SECURE DATA MANAGEMENT SYSTEM - A Basic Input/Output System (BIOS) secure data management system includes a BIOS that is configured to perform a boot process. At least one memory system is configured to provide a System Management (SM) memory location that is only accessible by the BIOS. A trusted platform module (TPM) includes at least one register and is configured to store sealed first secure data. The TPM is configured to use at least one first value in the at least one register that depends on the boot process to unseal the sealed first secure data to provide unsealed first secure data, and provide that unsealed first secure data to the BIOS for storage in the SM memory location. The BIOS is configured to retrieve the unsealed first secure data from the SM memory location and use the unsealed first secure data to perform a security function. | 2015-12-10 |
20150356300 | PROTECTION OF DATA STORED IN A VOLATILE MEMORY - A method of detecting a cold-boot attack on an integrated circuit including the steps of: transferring, into a first volatile memory of the integrated circuit, a pattern stored in a non-volatile memory of the circuit; periodically causing a switching down and a switching up of the first volatile memory; and verifying that the number of bits having switched state is within a range of values. | 2015-12-10 |
20150356301 | Real-Time Model of States of Monitored Devices - A model representing system components and events of a plurality of monitored devices as data objects is described herein. The model resides on a security service cloud and is updated in substantially real-time, as security-relevant information about the system components and events is received by the security service cloud. Each data object in the model has a scope and different actions are taken by security service cloud modules depending on different data object scopes. Further, the security service cloud maintains a model specific to each monitored device built in substantially real-time as the security-relevant information from that device is received. The security service cloud utilizes these device-specific models to detect security concerns and respond to those concerns in substantially real-time. | 2015-12-10 |
20150356302 | PRESENTATION OF USER INTERFACE ELEMENTS BASED ON RULES - Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted. | 2015-12-10 |
20150356303 | DISSOLVABLE PROTECTION OF CANDIDATE SENSITIVE DATA ITEMS - Reducing risk of data loss by automatically background scanning a data set to detect a plurality of candidate sensitive data items. For at least some of those candidate sensitive data items that are deemed not to concretely classified as sensitive, a dissolvable encryption is applied to the data item to at least temporarily protect the data item. When the user requests access to the data item, the system determines that the data item has been dissolvably encrypted and that the user is authorized to define the sensitivity of the data item. In response, the user is allowed to direct the system as to whether the data item is to be concretely encrypted (such as if the user was to confirm the data item as sensitive), or whether the dissolvable encryption of the data item is to be dissolved (such as if the user was to confirm the data item as not sensitive). | 2015-12-10 |
20150356304 | DEVICE AND METHOD FOR ACTIVATING SECURITY FUNCTION FOR CHATTING REGION - There may be provided a method that activates a security function. The method includes: displaying a chatting region on a display of a user device; presenting chatting texts of multiple users on the displayed chatting region; receiving a security request signal for requesting activation of a security function through a user interface; receiving a signal for selecting a non-security region in the displayed chatting region through the user interface; and displaying the non-security region differently from a security region in the displayed chatting region. | 2015-12-10 |
20150356305 | SECURE DATA ACCESS IN A DISPERSED STORAGE NETWORK - A method begins by a processing module of a dispersed storage network (DSN) dividing data into a plurality of data units and generating a plurality of encryption keys from a master key associated with the data and a data identifier associated with the data. The method continues with the processing module encrypting the plurality of data units using the plurality of encryption keys to produce a plurality of encrypted data units and sending the plurality of encrypted data units to a first set of storage units of the DSN for storage. The method continues with the processing module encoding the master key to produce a plurality of encoded master key units and sending the plurality of encoded master key units to a second set of storage units of the DSN for storage. | 2015-12-10 |
20150356306 | SYSTEMS AND METHODS FOR QR CODE VALIDATION - Embodiments described herein combine both glyph technologies and cryptography technologies by encrypting data with a private key of an entity tasked with issuing controlled documents, and then converting the resulting encryption as a visual glyph, such as a QR code. This permits validation of the printed document by scanning the QR code using a smartphone and decrypting using the issuing entity's public key. In some embodiments, a purpose-built software application executed by the smartphone may automatically recognize QR codes on a document presented for review and then automatically decrypt the QR code using the public key of the issuing entity. A user performing the validation may then compare the document's content with the decrypted data on the smartphone. | 2015-12-10 |
20150356307 | SAFE INPUT METHOD AND SYSTEM - A safe input method and system are provided. The method includes: starting a virtual machine mode of a central processing unit when safe input is to be performed; in the virtual machine mode, switching a guest operating system into a non-root mode, and switching a virtual machine monitor allocated for a safe input protection program into a root mode; receiving, by the guest operating system, input data of a user, and transmitting the input data of the user to the virtual machine monitor; encrypting and saving, by the virtual machine monitor, the input data to be retrieved by an authorized program; generating, by the virtual machine monitor, false input data, and returning the false input data to the guest operating system; and shutting down the virtual machine mode of the central processing unit when it is confirmed that the safe input is completed. | 2015-12-10 |
20150356308 | SECURITY MANAGEMENT UNIT, HOST CONTROLLER INTERFACE INCLUDING SAME, METHOD OPERATING HOST CONTROLLER INTERFACE, AND DEVICES INCLUDING HOST CONTROLLER INTERFACE - A method of operating a host controller interface includes receiving a buffer descriptor including sector information from a main memory, fetching data by using a source address included in the buffer descriptor, selecting one of a plurality of entries included in a security policy table by using the sector information, and determining whether to encrypt the fetched data by using a security policy included in the selected entry. | 2015-12-10 |
20150356309 | Electronic Device and Method for Protecting Applications Thereof - Disclosed is a method for protecting application programs of an electronic apparatus. The electronic apparatus is provided with a touch screen, and stores a screen sharing program, other application programs, a prohibited list, a first touch track and a second touch track. The electronic apparatus runs the screen sharing program to share the screen, and senses a touch track of a user on the touch screen, when the first touch track is sensed, adds an application program corresponding to it into the list; when the second touch track is sensed, deletes an application program corresponding to it from the list; and when a point touch is sensed, searches for whether an application program corresponding to it is in the list, if yes, the screen sharing program stops screen sharing and then runs the application program; otherwise, the application program is run, and the screen sharing program performs normal screen sharing. | 2015-12-10 |
20150356310 | APPLICATION SOFTWARE SERVICE SYSTEM FOR CONTROLLING UI ACCESS ACCORDING TO USER LEVEL AND METHOD THEREOF - Disclosed is a technology for controlling UI access to application software according to user's levels. The method for controlling UI access according to users' levels is characterized in providing a user with differentiated UI information according to user levels based on user-level-specific UI data in which UI information about functions to which access is allowed among functions provided by the application software is defined according to types of users. | 2015-12-10 |
20150356311 | MOBILE DATA VAULT - A portable electronic device is provided. The portable electronic device includes a data interface module that processes files associated with a user, the data interface module receives and validates a password from a user of the portable electronic device before the user is allowed access to files processed by the data interface module, an encryption key formed by the data interface module upon validation of the password, the encryption key further comprising the password, a hard coded private string and a serial number of the portable electronic device and a data storage area that stores files received from the data interface module the stored files are encrypted using the encryption key and where neither the encryption key or the password are stored in an unencrypted foiniat anyplace within the portable electronic device. | 2015-12-10 |
20150356312 | INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING APPARATUS - An information processing system configurable with one or more information processing apparatuses includes a minutes manager to manage a minutes, a communication controller to control a reception of loading data receivable from an information terminal, the loading data attachable with attached information, a display controller to control displaying of the loading data received by the communication controller on a display, an agenda switching detector to detect an agenda switching for marking an agenda boundary between agendas based on the attached information attachable to the loading data received by the communication controller, and an agenda information generator to generate agenda information for the agenda marked with the agenda boundary by the agenda switching detector. The generated agenda information of the agenda-boundary-marked agenda is associable with the minutes managed by the minutes manager. | 2015-12-10 |
20150356313 | Integrated Systems and Methods Providing Situational Awareness of Operations In An Orgranization - A system which comprises a series of native applications, suited to run on mobile devices, and a series of web-based applications for which functionality and processing are optimized. The native applications and the web-based applications are coordinated to optimize processes of acquiring, storing and disseminating data for speed, integrity and security. | 2015-12-10 |
20150356314 | SYSTEMS AND METHODS FOR IMPLEMENTING AN ENCRYPTED SEARCH INDEX - In accordance with disclosed embodiments, there are provided systems and methods for implementing an encrypted search index. According to a particular embodiment such a system a processor and a memory to execute instructions at the system; a search index stored on disk within the system comprised of a plurality of individual search index files, the search index having customer information stored therein, wherein at least one of the individual search index files constitutes a term dictionary or a term index type file having internal structure which allows a portion of the individual search index file to be updated, encrypted, and/or decrypted without affecting the internal structure of the individual search index file; a file input/output (IO) layer to encrypt the customer information being written into the individual search index file and to decrypt the customer information being read from the individual search index file, wherein the file IO layer encrypts and decrypts only a portion of the individual search index file in reply to an operation without requiring decryption or encryption of the individual search index file in its entirety; and a query interface to execute the operation against the customer information stored in the memory in its decrypted form. Other related embodiments are disclosed. | 2015-12-10 |
20150356315 | Unified ID - A unified ID system implementing a “single point” account in the Internet to allow a user to enter, aggregate, manage and control personal data is disclosed. | 2015-12-10 |
20150356316 | SYSTEM, METHOD AND PROGRAM FOR MANAGING A REPOSITORY OF AUTHENTICATED PERSONAL DATA - The present invention relates to a method, system and computer program for managing a repository of personal data and, more particularly, a repository of authenticated personal data. Among its many advantages, the present invention allows a user to control access to their personal data by third parties. In particular, the present invention may allow a user to control the parties with whom their personal data is shared and customise which elements of their personal data may be shared with each such third party. Furthermore, the present invention allows a user to specify a fee for sharing particular aspects of their personal data, thereby allowing the user to monetise their personal data assets and be remunerated for their contribution. | 2015-12-10 |
20150356317 | SYSTEM AND METHOD FOR PROVIDING SENSITIVE INFORMATION ACCESS CONTROL - A system and method enabling information access control of the sensitive information, based on a trust computing platform is provided. The trustworthiness of the information seekers is computed and accordingly the information owner is capacitated to decide upon sharing the information completely or sharing with some perturbation. The objective is to provide the information owner with the ability to decide on sharing its private data with respect to a parameter so that the decision is less subjective. This invention allows minimum leakage of sensitive data and makes information owner aware of the risk of privacy breach when private data is shared. | 2015-12-10 |