Patents Issued in September 24, 2015
-
Publication number: 20150269353Abstract: A device for identifying a drug, the device including at least one sensor for sensing and recording selected characteristics of a drug to be identified for compatibility with a pre-selected drug regimen, elements for transferring the recorded characteristics for analysis, elements for receiving analyzed data of the recorded characteristics, and a display for displaying the received data.Type: ApplicationFiled: May 7, 2015Publication date: September 24, 2015Inventors: Eyal Bartfeld, Amir Lass
-
Publication number: 20150269354Abstract: A user can perform in an activity which can be identified and/or tracked by a device associated with the user, such as a mobile communication device. Data can be identified and collected before, during and after the activity. A message can be defined based on the activity and the data, and presented to the user on the device. The user can alter or approve the message such that a form of the message is sent to a compute device, such as a social media network.Type: ApplicationFiled: March 19, 2014Publication date: September 24, 2015Applicant: AUDAX HEALTH SOLUTIONS, INC.Inventor: Ian H. Klassen
-
Publication number: 20150269355Abstract: A computer-based method includes receiving health-related data associated with each respective one of multiple individuals, all of whom have, had, or will likely have the same health-related experience. An algorithm identifies, based on the health-related data, information relevant to facilitate efficient allocation of medical expertise or resources to the health-related experience of one or more of the individuals. A notification is generated that, reveals the identified information. Feedback is received that corresponds to the generated notification, after medical expertise or resources have been allocated in response to the generated notification. The algorithm is then adjusted in view of the feedback received to improve the ability to accurately identify the information relevant to facilitate efficient allocation of medical expertise or resources.Type: ApplicationFiled: March 19, 2014Publication date: September 24, 2015Applicant: Peach Intellihealth, Inc.Inventor: Bruce Tidor
-
Publication number: 20150269356Abstract: In alternative embodiments the invention provides libraries of compounds, or drugs or drug candidates, manufactured and selected for having a desired property such as a biological or a chemical activity, and methods for making and using them. In one embodiment, the invention provides methods for identifying desirable compounds from very large compound sets using a compound fragment as the query. In alternative embodiments, the invention provides methods of making compounds, and libraries of compounds, using a “feasible reaction” growth scheme.Type: ApplicationFiled: September 20, 2013Publication date: September 24, 2015Inventors: Peter V. Pallai, Warren S. Wade
-
METHOD AND APPARATUS FOR DIGITAL RIGHTS MANAGEMENT THAT IS FILE TYPE AND VIEWER APPLICATION AGNOSTIC
Publication number: 20150269357Abstract: A computer implemented method and apparatus for file type and viewer application agnostic digital rights management. The method comprises intercepting processing of one or more operating system calls from a viewer application, wherein each of the one or more operating system call requests performance of a function on a digital asset of a plurality of digital assets subject to digital rights management (DRM); performing DRM enforcement of the digital asset with respect to the requested function; and returning processing of the digital asset to the viewer application.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Applicant: Adobe Systems IncorporatedInventor: Salil Taneja -
Publication number: 20150269358Abstract: An apparatus for content handling is provided. The apparatus comprises a content server arranged to provide a content analysis environment to a client terminal, and to provide content to the client terminal for analysis within the content analysis environment once the content analysis environment has been established at the client terminal, wherein the client terminal is arranged: to download the content from the content server into the content analysis environment; to encrypt the downloaded content and store the encrypted content therein in a persistent form; to decrypt the encrypted content into working memory therein for analysis within content analysis environment; to encrypt analysed content and store the encrypted analysed content therein in a persistent form; and to decrypt the encrypted analysed content and to upload this decrypted content to the content server.Type: ApplicationFiled: December 9, 2014Publication date: September 24, 2015Inventors: Adrian Hesketh, Arthur Christian Sloan, Jason Robert Wilkinson, Joshua Gould
-
Publication number: 20150269359Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: ApplicationFiled: December 15, 2014Publication date: September 24, 2015Inventors: David P. MAHER, James M. RUDD, Eric J. SWENSON, Richard A. LANDSMAN
-
Publication number: 20150269360Abstract: A control method executed includes acquiring, from a storage medium, content data and first encrypted information encrypted by a first unique key associated with the first information processing device, the first encrypted information including a first value for controlling a use right of the content data, obtaining the first value by decrypting the first encrypted information with the first unique key, enabling the first information processing device to use the content data when the first value is identified with a second value allocated to the first information processing device, generating second encrypted information by encrypting a third value with a second unique key that is associated with the second information processing device, the third value being for moving the use right from the first information processing device to the second information processing device, and updating the first encrypted information in the storage medium with the second encrypted information.Type: ApplicationFiled: March 10, 2015Publication date: September 24, 2015Inventor: Yasuhiko ABE
-
Publication number: 20150269361Abstract: Techniques for granting rights for content on a social network to multiple users include determining first data. It is also determined to associate a first user identifier and at least a second user identifier with the first data. It is further determined to grant a right for the first data to a first user identified by the first user identifier and at least a second user identified by the second user identifier.Type: ApplicationFiled: June 8, 2015Publication date: September 24, 2015Inventors: Guido Peter GRASSEL, Niko Tapani KIUKKONEN
-
Publication number: 20150269362Abstract: Methods, apparatus, and systems for signal continuity assessment using embedded watermarks are provided. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of the content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.Type: ApplicationFiled: June 8, 2015Publication date: September 24, 2015Applicant: VERANCE CORPORATIONInventors: Babak Tehranchi, Rade Petrovic, Joseph M. Winograd, Dean Anthony Angelico
-
Publication number: 20150269363Abstract: A system for securely downloading and playing coherent digital content such as music and preventing its play by unauthorized users. The system may include mass server/storage devices for receiving and storing digital content having predetermined gaps; and client devices communicating with the server/storage devices, and providing authorization to proceed. During playing of the digital content by the client devices, the missing gaps may be filled into the appropriate places, to allow the play of the coherent digital content.Type: ApplicationFiled: March 19, 2014Publication date: September 24, 2015Inventor: Marvin Marshall
-
Publication number: 20150269364Abstract: The present disclosure provides method for accessing digital web content. It provides for selective access rights for users, to a web content. When the user tries to retrieve the data, the system checks for the rights available to the user, and accordingly implements the access before providing the content.Type: ApplicationFiled: March 19, 2015Publication date: September 24, 2015Inventors: Shikha Gupta, Ravi Sankar Veerubhotla, Ashutosh Saxena, Harigopal K.B. Ponnapalli
-
Publication number: 20150269365Abstract: A method for playing content included in a media file in a playback apparatus is provided. The method includes obtaining file status indication information indicating a status of the media file from the media file, determining whether a Content Authentication Code (CAC) for playback of the content is included in the media file, if the file status indication information indicates that the content included in the media file is self-encoded content, and playing the content, if the CAC is not included in the media file. The self-encoded content is content that can be played without the CAC.Type: ApplicationFiled: March 20, 2015Publication date: September 24, 2015Inventors: Eric YIP, Bo-Gyeong KANG, Sung-Ryeul RHYU
-
Publication number: 20150269366Abstract: Methods and systems for handling a plurality of digital assets on a mobile device, wherein backups of the plurality of digital assets are created so as conform to digital rights management issues. Encrypted versions and/or links of the plurality of digital assets may be stored so that the mobile device or other electronic devices may access the backups.Type: ApplicationFiled: May 19, 2015Publication date: September 24, 2015Inventor: Matthew BELLS
-
Publication number: 20150269367Abstract: In one embodiment, a processing device includes a memory to store an executable program including a multiplicity of encrypted component blocks such that different combinations of blocks selected from the encrypted component blocks are operative when decrypted and executed to perform a same functionally equivalent data transformation, each of the component blocks being operative upon execution to convert input data into output data, and a processor operative to receive a selection of cryptographic keys, decrypt some of the encrypted component blocks using the cryptographic keys such that each one of the some encrypted component blocks is decrypted with a different one of the cryptographic keys yielding a multiplicity of decrypted component blocks, and execute the executable program including the multiplicity of decrypted component blocks to perform the same functionally equivalent data transformation. Related apparatus and methods are also described.Type: ApplicationFiled: May 20, 2015Publication date: September 24, 2015Inventors: Leonid SANDLER, Michael Burns
-
Publication number: 20150269368Abstract: A relay apparatus includes a storage unit, a first reception unit, a first request unit, a second reception unit, a second request unit, a third reception unit, and an access unit. The storage unit stores, for each user, authorization information for accessing a service providing apparatus. The first reception unit receives from a client apparatus an access request including a request for access to the service providing apparatus and identification information for identifying the user. The first request unit issues an acquisition request for the authorization information to a different relay apparatus. The second reception unit receives authorization information transmitted from the different relay apparatus. The second request unit requests the different relay apparatus to update the received authorization information. The third reception unit receives updated authorization information transmitted from the different relay apparatus.Type: ApplicationFiled: February 12, 2015Publication date: September 24, 2015Applicant: FUJI XEROX CO., LTD.Inventor: Yutaka SAKAI
-
Publication number: 20150269369Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password where the organizations providing/controlling access can establish geo-fences relating to the credential information.Type: ApplicationFiled: March 19, 2015Publication date: September 24, 2015Inventor: Laurence Hamid
-
Publication number: 20150269370Abstract: A client device captures biometric data from a user and stores the biometric data to identify the user. To simplify access to content from a content source, the user identifies the content source to the client device, which identifies authentication information associated with the user by the content source. For example, the user specifies a username and password associated with the content source to the client device. The authentication information is stored in the client device using the user's biometric data. For example, the client device stores the authentication information so it is not accessible unless the client device receives the user's biometric data. When the user subsequently requests access to the content source, the user provides biometric data to the client device, which retrieves and communicates the authentication information to the content source.Type: ApplicationFiled: June 11, 2014Publication date: September 24, 2015Inventors: Derek Phillips, Balaji Thiagarajan
-
Publication number: 20150269371Abstract: Methods and systems are provided for facilitating the secure entry of a user's PIN for electronic transactions such as merchant checkout, payment authorization, or access authorization. A physiological response of the user can indicate which one of a random sequence of numbers is a number of the user's PIN. For example, the user can blink, wink, or make a subtle facial movement to provide the indication.Type: ApplicationFiled: June 8, 2015Publication date: September 24, 2015Inventors: William Joseph Leddy, Bjorn Markus Jakobsson
-
Publication number: 20150269372Abstract: Systems and methods are provided for maintaining user profile information and allowing for biometric verification of the user's identity. The user stores or links to personal, financial, etc. information in a web page. The user can limit the types of information that is available to others. The information can be downloaded to a portable device. The information can be used for financial transactions, where the financial information is transmitted to a web site, an ATM, credit card machine, etc. for financial approval. The information can also be used to find other users with similar interest. The user stores selected characteristics that they would like to find in other users, which are compared with other user's profiles. Matching users are aided in locating one another, where they may then prove their identity to each other by biometrically verifying that they are the owner of the user profile.Type: ApplicationFiled: June 8, 2015Publication date: September 24, 2015Inventor: Lawrence A. Stevens
-
Publication number: 20150269373Abstract: A structure of an authentication device main includes a smart device and the authentication device having a plug terminal inserted into and connected to an audio jack of the smart device. An audio converting module converts data, stored in a data storage module, into an audio authentication signal transferred to the smart device. The smart device converts the audio authentication signal into a digital password through application software. An operation of the smart device is directly performed by automatically inputting authentication data.Type: ApplicationFiled: March 24, 2014Publication date: September 24, 2015Applicant: SMARTCHIP MICROELECTRONICS CORP.Inventor: Cheng-Tsung Tsai
-
Publication number: 20150269374Abstract: A screen unlocking method, device and terminal, wherein the method includes: a first terminal sending a key information acquisition message to a second terminal, wherein the key information is used to unlock the first terminal; and the first terminal unlocking the screen of the first terminal according to the key information from the second terminal. By using the embodiment of the present document, it solves the problem that, when the screen cannot be unlocked since the user forgets the password, the version needs to be upgraded to unlock the screen, resulting in a waste of time and a loss of important data in the terminal caused by upgrading the version, the user can unlock the terminal according to standby key information, thus avoiding the situation in which the terminal cannot be unlocked since the unlocking code of the terminal is forgotten, and further improving the ease for using the terminal.Type: ApplicationFiled: July 11, 2013Publication date: September 24, 2015Inventors: Xiaoli Fan, Fangfang Liao, Qi Zhou, Guoqiang Chen
-
Publication number: 20150269375Abstract: A multisided card having at least two obverse faces and two reverse faces that are adjacent one another, can be used to print and store relatively insecure information of the obverse faces and to have more sensitive information stored and printed on the adjacent reverse faces. To protect privacy, a caricature or cartoon of an individual can be placed on an obverse face, or in a virtual card, wallet or purse, which image cannot be read by facial recognition techniques but could be recognized by human observers.Type: ApplicationFiled: June 1, 2015Publication date: September 24, 2015Inventor: BRYAN P. CHAPMAN
-
Publication number: 20150269376Abstract: A mechanism is provided for unlocking a locked computing device based on a knowledge of a user. Responsive to detecting an intent to utilize the locked computing device, a subset of the images is randomly selecting in an identified tag category from a plurality of tagged images, the subset of images comprising a plurality of tags in the identified tag category. An order in which the user must gesture to the plurality of tags in the subset of images is randomly selected. The subset of images and the order in which the user must gesture to the plurality of tags in the subset of images to the user is presented to the user. Responsive to the user gesturing to a subset of tags in the subset of images in the selected order, the locked computing device is unlocked.Type: ApplicationFiled: March 19, 2014Publication date: September 24, 2015Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20150269377Abstract: An API gateway designed to process a high volume of API requests for data and services where relatively large payloads are returned to the requester. The API gateway includes an “on-line” component that, for each API request, examines information in the request to increment an API usage count by API ID and product key. The usage information is periodically pushed to an outbound message queue, where it is later populated in a database. An “off-line” component determines if a customer has exceeded its predetermined quota based on the information in the database. This determination is pushed to another message queue that is periodically read by the on-line component to update the in-memory API ID, product key and API validity flag values. As such the on-line component is able to service a high volume of API requests for data with a low latency.Type: ApplicationFiled: March 18, 2015Publication date: September 24, 2015Inventor: Sathish Kumar Gaddipati
-
Publication number: 20150269378Abstract: In order to check authentication using a physical unclonable function, an authenticator includes a physical unclonable function (PUF) and an authentication checking function. A challenge response pair provides challenge information and a response for the authenticator. The challenge information is used as an input for the PUF, which generates a PUF response in response to the input of the challenge information. The PUF response and the response are used for a comparison, wherein an enable signal is provided on the basis of a result of the comparison.Type: ApplicationFiled: August 13, 2013Publication date: September 24, 2015Inventor: Rainer Falk
-
Publication number: 20150269379Abstract: Reputations of objects are determined by a reputation system using reports from clients identifying the objects. Confidence metrics for the clients are generated using information determined from the reports. Confidence metrics indicate the amounts of confidence in the veracity of the reports. Reputation scores of objects are calculated using the reports from the clients and the confidence metrics for the clients. Confidence metrics and reputation scores are stored in correlation with identifiers for the objects. An object's reputation score is provided to a client in response to a request.Type: ApplicationFiled: June 5, 2015Publication date: September 24, 2015Inventors: Zulfikar Ramzan, Walter Bogorad, Ameet Zaveri, Vadim Antonov, Carey Nachenberg
-
Publication number: 20150269380Abstract: Disclosed are some aspects of systems and methods for providing security for online transactions. An example method includes determining, at a security service, that an online transaction related to a payment service has been initiated at a computer by a user of the computer, collecting first information from the computer and second information from the payment service, and determining, based on the collected information, whether the online transaction is suspicious. These aspects further include, when the online transaction is determined to be suspicious, determining whether a malicious program can be identified on the computer and when the malicious program is identified, performing corresponding remedial actions with respect to the detected malicious program.Type: ApplicationFiled: April 29, 2014Publication date: September 24, 2015Applicant: Kaspersky Lab ZAOInventors: Sergey Y. Golovanov, Alexey V. Monastyrsky
-
Publication number: 20150269381Abstract: Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a processor maintains a page directory and a page table within a system memory that contain information for translating virtual addresses to physical addresses. Virus processing of a content object is offloaded to a hardware accelerator coupled to the processor by storing scanning parameters, including the content object and a type of the content object, to the memory using one or more virtual addresses and indicating to the hardware accelerator that the content object is available for processing. Responsive thereto, the hardware accelerator: (i) translates the virtual addresses to corresponding physical addresses based on the page directory and the page table; (ii) accesses the scanning parameters based on the physical addresses; (iii) scans the content object for viruses by applying multiple virus signatures; and (iv) returns a result of the scanning to the processor.Type: ApplicationFiled: June 9, 2015Publication date: September 24, 2015Applicant: FORTINET, INC.Inventors: Xu Zhou, Lin Huang, Michael Xie
-
Publication number: 20150269382Abstract: A method of processing an electronic file by identifying portions of content data in the electronic file and determining if each portion of content data is passive content data having a fixed purpose or active content data having an associated function. If a portion is passive content data, then a determination is made as to whether the portion of passive content data is to be re-generated. If a portion is active content data, then the portion is analysed to determine whether the portion active content date is to be re-generated. A re-generated electronic file is then created from the portions of content data which are determined to be re-generated.Type: ApplicationFiled: May 18, 2015Publication date: September 24, 2015Inventors: Samuel Harrison Hutton, Trevor Goddard
-
Publication number: 20150269383Abstract: A system and method for managing implementation of policies in an information technologies system receives at least one policy function, at least one refinement template and at least one available policy function from the at least one memory, receives a policy input indicating a high-level policy for the IT system where the policy input is compliant with the at least one policy function and is received in a format that is not machine-enforceable at an enforcement entity of the IT system, based on the received policy input, automatically or semi-automatically generates a machine-enforceable rule and/or configuration by filling the at least one refinement template, where the machine-enforceable rule and/or configuration includes the at least one available policy function and being compliant with the received policy input, and distributes the machine-enforceable rule and/or configuration to the at least one memory of the IT system or another at least one memory to thereby enable implementation of the policies.Type: ApplicationFiled: January 22, 2015Publication date: September 24, 2015Applicant: Object Security LTDInventors: Ulrich LANG, Rudolf SCHREINER
-
Publication number: 20150269384Abstract: Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text.Type: ApplicationFiled: March 18, 2014Publication date: September 24, 2015Inventors: Pablos Holman, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud
-
Publication number: 20150269385Abstract: Disclosed is an apparatus and method to protect against key tampering. A computing device may include a cryptoprocessor that is configured to: write a first word including a first portion of a key; and write a plurality of subsequent words each including a portion of the key. If a same word is written more than once, the key is reset and not validated.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Applicant: QUALCOMM INCORPORATEDInventor: Ron KEIDAR
-
Publication number: 20150269386Abstract: A computer-implemented method for increasing compliance with data loss prevention policies may include (1) identifying a file that is subject to a data loss prevention policy, (2) determining a classification of the file according to the data loss prevention policy, (3) identifying a graphical user interface that is configured to display a representation of the file, and (4) enhancing the representation of the file within the graphical user interface with a visual indication of the classification of the file according to the data loss prevention policy. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: May 2, 2014Publication date: September 24, 2015Applicant: Symantec CorporationInventors: Rupesh Hanumant Khetawat, Amol Sharadchandra Ghatge, Sagar Shashikant Sonawane
-
Publication number: 20150269387Abstract: The various embodiments enable the prevention of an automated computer routine from passing a challenge-response test. A processor may generate a first character string and create a first image comprising first characters based on the first character string, and may generate a second character string and create a second image comprising second characters based on the second character string. The processor may create a third image by superimposing the first image and the second image. The processor may associate at least one decoy code with the third image, the at least one decoy code based on character(s) within the third image that are likely to be detected by an automatic character recognition process. The processor may present the third image as a verification challenge, and may determine that the verification challenge is failed in response to receiving a verification challenge response that matches the decoy code.Type: ApplicationFiled: March 16, 2015Publication date: September 24, 2015Inventor: Umberto Cannarsa
-
Publication number: 20150269388Abstract: Systems, methods, and programs of processing and transmitting information between devices are disclosed. A receiving device may generate a key. A transmitting device may scan the key. The transmitting device may transmit information to a file management system in response to scanning the key. A user associated with the receiving device may indicate a location to store the information. The user may access the information from the file management system.Type: ApplicationFiled: May 11, 2015Publication date: September 24, 2015Applicant: Fasetto, LLCInventors: Coy Christmas, Luke Malpass
-
Publication number: 20150269389Abstract: Provided are a first device for transmitting data, a second device for receiving data, and a system including the same. The first device includes: a controller configured to obtain biometric information of the second user; and a transceiver configured to transmit, to the device of the second user, the data and to transmit, to the device of the second user, the obtained biometric information to control an access to the data by the second user.Type: ApplicationFiled: March 20, 2015Publication date: September 24, 2015Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventor: Jung-kyuen LEE
-
Publication number: 20150269390Abstract: A system and method of establishing permissions for multi-tenancy storage using an organization matrices is provided. The method includes a computing application for setting permissions for accessing data entries of a multi-tenant database, the data entries storing data associated with a number of computing devices where the multi-tenant database is accessible by two or more tenants and/or sub-tenants. The method includes displaying via a graphical user interface that displays the one or more tenants in a single workspace where the tenants are displayed in a hierarchical structure. The method includes receiving a permission commands to establish the permissions for a tenant and causing the permissions to be set.Type: ApplicationFiled: March 21, 2014Publication date: September 24, 2015Applicant: PTC Inc.Inventors: John Schaefer, Rick Bullotta
-
Publication number: 20150269391Abstract: Method(s) and system(s) for providing an optimal trade off point between privacy of a private data and utility of a utility application thereof are described. The method includes quantifying privacy content of a private data associated with a user based on uniqueness of information in the private data, where the private content comprises sensitive information about the user. The method further includes determining a privacy-utility trade off point model based on analytical analysis of the privacy content, a privacy requirement of the user, and a utility requirement of third party to which the private data is disclosed, where the privacy-utility trade off point model is indicative of optimal private data sharing technique with the third party. Furthermore, the method also includes identifying privacy settings for the user based on risk appetite of the third party, utilizing the determined privacy-utility tradeoff point model.Type: ApplicationFiled: August 27, 2013Publication date: September 24, 2015Inventor: Arijit Ukil
-
Publication number: 20150269392Abstract: The invention is directed to improved systems, methods, and media for sharing digital content through social media. More particularly, the invention provides for sharing digital content using fragments. In some embodiments, two users share digital content with one other, where each digital content being shared is obscured and overlaid by fragments. Each user will take a turn to select a fragment to be revealed from the digital content being shared, and both users continue revealing fragments until all fragments are revealed. The revealed digital content can be further updated from an obscured format to an unobscured format. The revealed digital content can be available for both users to view for a predetermined period before it is deleted or recalled.Type: ApplicationFiled: March 20, 2015Publication date: September 24, 2015Inventors: Scott Robert LAUDER, Kristopher Grant Sutherland, David James Hudson
-
Publication number: 20150269393Abstract: The invention is directed to improved systems, methods, and media for sharing digital content through social media. More particularly, the invention provides for sharing digital content using fragments. In some embodiments, two users share digital content with one other, where each digital content being shared is obscured and overlaid by fragments. Each user will take a turn to select a fragment to be revealed from the digital content being shared, and both users continue revealing fragments until all fragments are revealed. The revealed digital content can be further updated from an obscured format to an unobscured format. The revealed digital content can be available for both users to view for a predetermined period before it is deleted or recalled.Type: ApplicationFiled: March 20, 2015Publication date: September 24, 2015Inventors: Scott Robert LAUDER, Kristopher Grant SUTHERLAND, David James HUDSON
-
Publication number: 20150269394Abstract: The invention relates to an enrolment method for enrolling biometric data in a database, each data item comprising an information vector on a biometric feature, and a mask vector, determining those bits of the information vector to be taken into account for data comparison, the method comprising the application of permutation to the bits of the vectors, the method being characterized in that it further comprises a step to encode the vectors using an enrolment code, the permutation being applied to the encoded vectors, and the said encoding comprising: the representation of each bit of the mask vector in a sequence of several bits, such that the mean weight of the representations of all the bits of the mask vector is constant or statistically constant irrespective of the values of the bits of the mask vector; and the representation of each bit of the information vector in a sequence comprising at least one bit drawn randomly, the randomly drawn bits following the same law of distribution as the bits of theType: ApplicationFiled: March 23, 2015Publication date: September 24, 2015Inventors: Julien Bringer, Herve Chabanne
-
Publication number: 20150269395Abstract: Techniques for enhancing electronic privacy utilize noise to prevent third parties from determining certain information based on search queries. Users submit search queries as part of their normal activities. For a user, the search queries submitted and information regarding search results used to generate additional search queries on different, but related topics. The generated additional search queries are submitted automatically on behalf of the user at a sufficient frequency to prevent high accuracy data analysis on search queries.Type: ApplicationFiled: June 4, 2015Publication date: September 24, 2015Inventors: Reza B'Far, Kent Spaulding, Patrick Crane
-
Publication number: 20150269396Abstract: A security-aware master is provided, such that a master can determine its security state before attempting access to secure resources or before requesting secure access level. An exemplary system include a system interconnect; one or more masters coupled with the system interconnect; and a master security check register coupled with the system interconnect. The master security check register is configured to receive a request from a master via the system interconnect to access the master security check register, wherein the request includes a master operating state signal that indicates a security state of the master requesting access, and return a data value to the master based on the master operating state signal, wherein the data value indicates a current security state of the master requesting access.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Applicant: ANALOG DEVICES, INC.Inventor: Richard F. Grafton
-
Publication number: 20150269397Abstract: The invention relates to a card contact-making apparatus for a card for installation in an installation assembly, wherein the card contact-making apparatus has an upper and a lower contact carrier receptacle and a flexible contact carrier, which is arranged between the upper and lower contact carrier receptacle, wherein the lower contact carrier receptacle forms a plurality of fastening means which are adapted for Listening on an installation assembly.Type: ApplicationFiled: September 14, 2013Publication date: September 24, 2015Inventor: Eckhard Schewe
-
Publication number: 20150269398Abstract: An RFID reading terminal can be configured, responsive to receiving a user interface action, to capture an image of at least one part of a physical structure sustaining a plurality of inventory items, locate and decode optical decodable indicia into a message comprising an identifier of the physical structure. The RFID reading terminal can be further configured to retrieve from a database, using the identifier of the physical structure, a reference image and/or a description of the physical structure. The portable RFID reading terminal can be further configured, while being moved to follow an imaginary trajectory within the physical structure, to repetitively capture an image of the physical structure using the imaging device, determine orientation and the current spatial position of the RFID reading terminal relative to the physical structure responsive to identifying one or more objects within each captured image, and displaying the RFID scan trace.Type: ApplicationFiled: June 5, 2015Publication date: September 24, 2015Inventor: Philip ZUMSTEG
-
Publication number: 20150269399Abstract: Writing incorrect information to an IC tag affixed to a label is prevented. When a control command including recording information, an instruction to print the recording information on a label, and an instruction to write data including at least time-related information to an IC tag affixed to the label is received from a host computer, the system controller of a label printer prints the recording information and writes the write data based on time information input from a RTC, but does not print the recording information and write the write data based on the control command if an error was detected by RTC error detector.Type: ApplicationFiled: June 8, 2015Publication date: September 24, 2015Inventor: Toshiaki Koike
-
Publication number: 20150269400Abstract: The present invention relates to a RFID reader with an antenna system for emitting and receiving RFID signals. The antenna system includes at least a first inverted F antenna and a second inverted F antenna each having a feed element, a radiating element with a first end coupled to the feed element and a second end free, and a tuning element having a first end coupled to the ground plane and a second end coupled to the first end of the radiating element. The radiating elements of the two inverted F antenna extend in a first direction and a second direction respectively, said first and second directions being offset by a non-zero sequential rotation. In addition, the two inverted F antennas are isolated from each other by a quarter wavelength slot etched in the ground plane between the two antennas.Type: ApplicationFiled: October 11, 2013Publication date: September 24, 2015Applicant: TagsysInventors: Benoit Poussot, Jean-Marc Laheurte, Christophe Loussert
-
Publication number: 20150269401Abstract: A method for reprogramming an automotive device writes a programming sequence to a transponder read/write memory, interfaces the transponder with at least one vehicle system while the at least one vehicle system is installed in a vehicle, and transfers the programming sequence to the at least one vehicle system.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Applicant: Continental Automotive Systems, Inc.Inventors: Jurgen Christian Hagedorn Maillard, Irving Morales Rodriguez, Luis Roberto Togo Peraza, Jorge Benitez Sosa, Alberto Navarro Hurtado
-
Publication number: 20150269402Abstract: There is described an imaging apparatus having an imaging assembly that includes an image sensor. The imaging apparatus can capture a frame of image data having image data corresponding to a first set of pixels of the image sensor. The imaging apparatus can capture a frame or image data having image data corresponding to a second set of pixels of the image sensor.Type: ApplicationFiled: May 29, 2015Publication date: September 24, 2015Inventors: Charles P. Barber, Carl W. Gerst, George S. Smith, Robert M. Hussey, Robert C. Gardiner, Matthew W. Pankow