Patents Issued in February 18, 2016
-
Publication number: 20160048655Abstract: In the pharmaceutical research and development process, it may be necessary to process large amounts of medical records or clinical literature, to ensure safety of patients consuming a drug. A pharmacovigilance system may assist in this process by efficiently and automatically processing medical records to extract information and relationships contained therein and may also form a preliminary assessment regarding a medical or clinical judgment. The pharmacovigilance system may automatically generate reports based on this information, which may be validated by trained clinicians and medical experts.Type: ApplicationFiled: August 14, 2015Publication date: February 18, 2016Inventors: Anutosh Maitra, Annervaz Karukapadath Mohamedrasheed, Tom Geo Jain, Madhura Shivaram, Shubhashis Sengupta, Roshni Ramesh Ramnani, Neetu Pathak, Debapriya Banerjee, Vedamati Sahu
-
Publication number: 20160048656Abstract: Systems, apparatuses, and methods for measuring the acquisition of a medical product by a patient are disclosed. The systems and apparatuses, including databases and associated software modules, perform a method that includes receiving a data comprising a tracking code for the medical product and patient specific information, creating an electronic patient specific data file in a database corresponding to the tracking code and the patient information, activating at least one patient care module from a series of patient care modules that collects patient's information from a user, developing personalized patient monitoring parameters, receiving a second set of data associated to the patient's interaction with one or more patient care modules, evaluating the second set of data against the personalized patient monitoring parameters, generating a feedback action plan for the user that measures patient's adherence to medical products and/or patient care modules, and triggering an user authorized intervention.Type: ApplicationFiled: August 17, 2015Publication date: February 18, 2016Applicant: Global Pharmaceutical Services, LLCInventors: Christopher Di Lascia, Francis Di Lascia, Raman Kapur, Wilfred Shearer, Edward Sadowski
-
Publication number: 20160048657Abstract: A cap for a medication container includes a housing with a top portion and a bottom portion. The top and bottom portions together define a cavity therebetween. A sliding plate is disposed in the cavity adjacent the bottom portion. A microcontroller with a contact sensor is disposed in the cavity between the top portion and the sliding plate. The sliding plate is configured to slide toward and activate the contact sensor where the cap is secured to the medication container in a closed state. The sliding plate is also configured to slide away from and not activate the contact sensor where the cap is removed from the medication container in an open state.Type: ApplicationFiled: August 12, 2015Publication date: February 18, 2016Inventors: Jeffrey R. LeBrun, David McIntosh
-
Publication number: 20160048658Abstract: There is provided a research framework system. For example, in some implementations there is provided a sleep prediction system for pilots including a first data structure storing collected research data related to pilot sleep patterns, a second data structure storing data related to a flight schedule associated with a pilot, and a sleep prediction module configured to access the data stored in the first and second data structures and calculate, by one or more processors using the data stored in the first data structure, a likelihood that the pilot associated with the flight schedule stored in the second data structure is sleeping at a given time.Type: ApplicationFiled: August 15, 2014Publication date: February 18, 2016Inventor: Suresh Rangan
-
METHOD AND TOOLS FOR PREDICTING A PAIN RESPONSE IN A SUBJECT SUFFERING FROM CANCER-INDUCED BONE PAIN
Publication number: 20160048659Abstract: A method is described for predicting a pain response in a subject suffering from cancer-induced bone pain (CIBP). Data is collected from the subject by querying the subject on personality and/or health traits, and/or performing one or more social learning and/or (bio)physical tests by or on the subject. The data is used in a set of mathematical models to attribute one or more Scoring Factors to the subject. The Scoring Factor is a measure of the propensity of the subject to raise a response to a pain stimulus or a treatment strategy; and/or a measure of the intensity of the response of the subject.Type: ApplicationFiled: August 18, 2014Publication date: February 18, 2016Inventors: Alvaro Pereira, Chantal Gossuin, Dominique Demolle, Denis Gossen, Thibault Helleputte -
Publication number: 20160048660Abstract: Provided is a system including a data analytics module that is configured to process aggregated patient data to generate a report comprising relevant patient activities identified using a calculated relevance score. The aggregated patient data for each patient of a plurality of patients comprises historical data associated with a respective patient and recent patient activity associated with the respective patient received from electronic devices associated with a number of healthcare organizations. The recent patient activities are non-claim-based activities from a number of healthcare organizations received from the electronic devices associated with the plurality healthcare organizations. The system also includes a messaging module that is configured to transmit the report to an electronic device associated with one or more of the healthcare organizations responsive to the report generation.Type: ApplicationFiled: October 3, 2014Publication date: February 18, 2016Inventors: Cheryl Lulias, Kasu Sista, Annabelle E. Lim-Greene
-
Publication number: 20160048661Abstract: Expressing a line notation for distinguishing isomers for searching a compound includes, inter alia, input unit, an atom analysis unit, an atom alignment unit, and a string production unit. An input unit receives an input file regarding three-dimensional coordinate information of each target compound atom. An atom analysis unit analyzes bond relations between the atoms based on the three-dimensional coordinate information. Bond relations corresponding to isomers are defined separately. An atom alignment unit sequentially aligns the atoms based on the preset bond relations priority, producing an array of atoms. A string production unit produces a one-dimensional string corresponding to the target compound using predefined layers to express bond relations between the atoms and the array of atoms. Stereoisomers of compounds having peptide bonds, consecutive double bonds or metals can be more distinctly distinguished, and the double bonds of the compound can be expressed using four kinds of notation.Type: ApplicationFiled: October 23, 2015Publication date: February 18, 2016Inventor: Kwang-Hwi CHO
-
Publication number: 20160048662Abstract: Computerized CAPTCHA systems using a direct connection with user computing devices are provided. An example computerized CAPTCHA system is configured to perform operations. The operations include receiving a request from a user computing device to engage in a verification process. The request is received independent of a resource provider from which the user computing device has requested a resource. The operations include providing a challenge to the user computing device at least in part in response to the request for engagement in the verification process and receiving a response to the challenge from the user computing device. The operations include determining whether the user computing device should be verified based at least in part on the response and providing a verification token to the user computing device when it is determined that the user computing device should be verified.Type: ApplicationFiled: February 24, 2014Publication date: February 18, 2016Applicant: Google Inc.Inventors: Sacha Christophe Arnoud, Angelique Moscicki, Edison Tan, David John Abraham, Michael Crawford
-
Publication number: 20160048663Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and a basic input/output system (BIOS). The BIOS may comprise a program of instructions executable by the processor and configured to cause the processor to initialize one or more information handling resources of the information handling system. The BIOS may further be configured to, during a boot of an information handling system, and in response to a request to set a password associated with the information handling system, generate a random password, securely store the random password in a memory such that the password may be retrieved during a subsequent boot of the information handling system by a user physically present at the information handling system, and set the random password as the password associated with the information handling system.Type: ApplicationFiled: August 18, 2014Publication date: February 18, 2016Inventors: Kurt D. Gillespie, Ricardo L. Martinez, Janardan Rajagopal Pradeep Gopal, Richard Chan
-
Publication number: 20160048664Abstract: An apparatus and security method are provided. The apparatus includes at least one communication interface and a controller. The controller is configured to discover, using the at least one communication interface, an external electronic device available for a communication connection with the apparatus, the discovering including receiving information from the external electronic device, adjust a security level for the apparatus based at least in part on the information, and control at least part of the apparatus using the adjusted security level.Type: ApplicationFiled: October 27, 2015Publication date: February 18, 2016Inventor: Dong-Il SON
-
Publication number: 20160048665Abstract: Unlocking an electronic device includes displaying, by a security module, a plurality of objects including at least one target object and at least one decoy object, where the at least one target object is obtained from a stored history of viewed objects, detecting, by the security module, a user selection from the plurality of objects, and in response to detecting that the user selection is one of the at least one target objects, unlocking, by the security module, the electronic device.Type: ApplicationFiled: August 12, 2014Publication date: February 18, 2016Inventors: SHAREEF F. ALSHINNAWI, GARY D. CUDAK, JEFFREY S. HOLLAND, ROBERT B. RAINEY
-
Publication number: 20160048666Abstract: Methods, systems, and computer program products for automatically triggering actions on a user device based on biometrics of nearby individuals are provided herein. A method includes capturing, via one or more sensors resident on a first computing device, one or more items of biometric information from one or more individuals located within a given proximity of the first computing device; determining a degree of proximity of the one or more individuals to the first computing device; transmitting, to a second computing device, (i) the one or more captured items of biometric information from the one or more individuals and (ii) the determined degree of proximity of the one or more individuals to the first computing device; and automatically executing one or more actions on the first computing device based on an instruction provided by the second computing device in response to said transmitting.Type: ApplicationFiled: August 12, 2014Publication date: February 18, 2016Applicant: International Business Machines CorporationInventors: Kuntal Dey, Hemank Lamba, Seema Nagar
-
Publication number: 20160048667Abstract: Aspects of the subject disclosure may include, for example, generating a digital certificate responsive to an authentication of a user according to a dynamic biometric process, associating the digital certificate with a transaction record for the transaction, storing information associated with authentication conditions of the dynamic biometric process, receiving an access request associated with the transaction, and providing access to the transaction record, the information associated with the authentication conditions of the dynamic biometric process or a combination thereof responsive to the access request, where granting of the access is according to transmitting an access acknowledgement to equipment of the user, or obtaining another authentication to allow permission to access or a combination thereof. Other embodiments are disclosed.Type: ApplicationFiled: August 12, 2014Publication date: February 18, 2016Inventor: Frank Kao
-
Publication number: 20160048668Abstract: Chording techniques are described that may be utilized in a variety of ways to provide inputs to a computing device. The computing device, for instance, may include sensors disposed on a housing of the computing device such that the sensors are configured to detect fingers of a user when grasping the device. Detection of a likely indexed relative position of the fingers of the user's hand in relation to each other, and even an amount of pressure used by respective ones of the fingers, may be used to define and input chords that may be used to initiate operations of the computing device.Type: ApplicationFiled: August 13, 2014Publication date: February 18, 2016Inventor: John Zafiris
-
Publication number: 20160048669Abstract: A method of selectively authorizing access includes obtaining, at an authentication device, first information corresponding to first synthetic biometric data. The method also includes obtaining, at the authentication device, first common synthetic data and second biometric data. The method further includes generating, at the authentication device, second common synthetic data based on the first information and the second biometric data. The method also includes selectively authorizing, by the authentication device, access based on a comparison of the first common synthetic data and the second common synthetic data.Type: ApplicationFiled: December 19, 2014Publication date: February 18, 2016Inventors: Lae-Hoon Kim, Juhan Nam, Erik Visser
-
Publication number: 20160048670Abstract: A method of selectively authorizing access includes obtaining, at an authentication device, first information corresponding to first synthetic biometric data. The method also includes obtaining, at the authentication device, first common synthetic data and second biometric data. The method further includes generating, at the authentication device, second common synthetic data based on the first information and the second biometric data. The method also includes selectively authorizing, by the authentication device, access based on a comparison of the first common synthetic data and the second common synthetic data.Type: ApplicationFiled: December 26, 2014Publication date: February 18, 2016Inventors: Lae-Hoon Kim, Juhan Nam, Erik Visser
-
Publication number: 20160048671Abstract: A wearable device includes one or more biometric sensors, each of the one or more biometric sensors gathering biological data from a wearer of the wearable device, the wearable device further having a computer processor for receiving the biological data from the one or more biometric sensors and generating biometric information based on the biological data and according one or more biometrical algorithms, the biometric information including validation information to validate the wearer as a source of the biological data gathered by each of the one or more sensors, the biometric information further including sleep information to provide a sleep profile of the wearer.Type: ApplicationFiled: August 14, 2015Publication date: February 18, 2016Inventors: Dominic Munafo, David French, Bretton Hevener, William Hevener, Thinh Nguyen
-
Publication number: 20160048672Abstract: Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.Type: ApplicationFiled: August 17, 2015Publication date: February 18, 2016Inventors: James Paul Lux, Edward Chow, Michael Ray McKee, Salman-ul Mohammed Haque, Andre Tkacenko
-
Publication number: 20160048673Abstract: Embodiments are directed to simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock, authenticating the credential, unlocking the lock to provide access to a resource protected by the lock based on having authenticated the credential, determining a security level associated with the lock, and conditionally capturing the credential based on the security level.Type: ApplicationFiled: March 20, 2014Publication date: February 18, 2016Inventors: Alan Marchiori, Ulf J. Jonsson, Vijaya Ramaraju Lakamraju, Nicholas Charles Soldner, Ritesh Khire, Joseph Zacchio, Adam Kuenzi, Ron Chapin
-
Publication number: 20160048674Abstract: The invention comprises a method of providing additional assurance regarding a websites authenticity. The assurance is provided by using a credential that contains an image of the website operator or the website operator's business operations. The assurance is also provided by scanning the website associated with the credential for changes and alerting the website operator or a website visitor of the changes. The invention includes a method of ensuring the proper operation of the credential and a method of protecting the credential from mis-issuance.Type: ApplicationFiled: July 28, 2014Publication date: February 18, 2016Inventors: Ken Bretschneider, Paul Tiemann, Dan Egbert
-
Publication number: 20160048675Abstract: The invention relates to management of programs on a mobile device, and in particular, to a method for activating application programs on a mobile device, and a mobile device based on this method. The method for activating application programs on a mobile device according to an embodiment of the invention comprises the following steps: receiving an application request from a device which is located outside the mobile device; identifying a transmission protocol associated with the application request; and if there are a plurality of safety entities in the mobile device which support the transmission protocol and store application programs associated with the application request, activating an application program associated with the application request in a default safety entity.Type: ApplicationFiled: March 17, 2014Publication date: February 18, 2016Inventors: Hongfeng CHAI, Zhijun Lu, Shuo He, Yu Zhou, Wei Guo, Dinagzhou Li
-
Publication number: 20160048676Abstract: A method and apparatus for efficiently executing guest programs in a virtualized computing environment are presented. The method includes executing a virtual machine on a computing hardware; executing a single hypervisor in a first security ring on the virtual machine; executing a single guest program on the virtual machine, wherein the single guest program includes a single kernel being executed in the first security ring and at least one application being executed in a second security ring; and executing at least an instruction issued by the at least one application without trapping the single hypervisor.Type: ApplicationFiled: October 26, 2015Publication date: February 18, 2016Applicant: RAVELLO SYSTEMS LTD.Inventors: Izik EIDUS, Leonid SHATZ, Michael RAPOPORT, Alexander FISHMAN
-
Publication number: 20160048677Abstract: Some embodiments provide a system that executes a web application. During operation, the system loads the web application in a web browser and loads a native code module associated with the web application into a secure runtime environment. Next, the system provides input data associated with the web application to the native code module and processes the input data using the native code module to obtain output data. Finally, the system provides the output data to the web application for use by the web application.Type: ApplicationFiled: October 28, 2015Publication date: February 18, 2016Inventors: Evangelos Kokkevis, Matthew Papakipos, David C. Sehr
-
Publication number: 20160048678Abstract: A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices.Type: ApplicationFiled: October 30, 2015Publication date: February 18, 2016Inventors: Stefan Thom, Jeremiah Cox, David Linsley, Magnus Nystrom, Himanshu Raj, David Robinson, Stefan Saroiu, Rob Spiger, Alastair Wolman
-
Publication number: 20160048679Abstract: Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A processor is configured to generate a VM suspend event (e.g., a VM exit or a virtualization exception) when software executing within a guest VM performs a memory access violation. In some embodiments, the processor is further configured to save disassembly data determined for the processor instruction which triggered the VM suspend event to a special location (e.g., a specific processor register) before generating the event. Saved disassembly data may include the contents of individual instruction encoding fields, such as Prefix, Opcode, Mod R/M, SIB, Displacement, and Immediate fields on Intel® platforms.Type: ApplicationFiled: September 18, 2014Publication date: February 18, 2016Inventors: Andrei V. LUTAS, Sandor LUKACS
-
Publication number: 20160048680Abstract: Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A processor is configured to generate a VM suspend event (e.g., a VM exit or a virtualization exception) when a guest instruction executing within a guest VM performs a memory access violation. In some embodiments, the processor is further configured to delay generating the VM suspend event until the execution stage of the pipeline for the guest instruction is complete, and to save results of the execution stage to a specific location (e.g. a specific processor register readable by security software) before generating the event.Type: ApplicationFiled: September 18, 2014Publication date: February 18, 2016Inventors: Andrei V. LUTAS, Sandor LUKACS
-
Publication number: 20160048681Abstract: Machine generated event log data which includes events occurring over a window of time is received where each event includes a first node, a second node, and a timestamp. The events are aggregated into a plurality of aggregated graph snapshots. Communities within the plurality of aggregated graph snapshots are identified and community tracking links are determined between communities in the plurality of aggregated graph snapshots. A community that has an anomalous evolution in the plurality of aggregated graph snapshots compared to the evolution of other communities is identified based at least in part on the community tracking links. The communities are displayed where the display includes the community tracking links and identifies the community that has the anomalous evolution.Type: ApplicationFiled: October 27, 2015Publication date: February 18, 2016Inventors: Chunsheng Fang, Derek Lin, Teng Wang
-
Publication number: 20160048682Abstract: A method and an apparatus for clearing a malicious power-consuming application, and a user terminal are provided. An application whose background working power consumption is not less than a power consumption threshold is determined as a malicious power-consuming application; and a wakelock occupying time of each application if a screen is turned off is periodically calculated, and if a background working application's wakelock occupying time is not less than a set time threshold, the application is determined as a malicious power-consuming application.Type: ApplicationFiled: October 30, 2015Publication date: February 18, 2016Inventors: Junwei Gou, Wei Li, Zhishan Zhuang
-
Publication number: 20160048683Abstract: A potential malware sample is received from a security device at a server associated with a security cloud service. The sample is executed in a sandbox environment on the server, including by monitoring interaction of the sample with an application program interface (API), provided by the sandbox environment, in order to obtain an API log. It is determined whether the sample is associated with a known malware family including by determining, based at least in part on the API log, if the sample created an executable file and if the sample registered the executable file in a run key. If it is determined that the sample is associated with a known malware family, then an alert is generated.Type: ApplicationFiled: September 15, 2015Publication date: February 18, 2016Inventors: Kyle Sanders, Xinran Wang
-
Publication number: 20160048684Abstract: A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified.Type: ApplicationFiled: February 9, 2015Publication date: February 18, 2016Inventors: Paul C. Kocher, Pankaj Rohatgi, Joshua M. Jaffe
-
Publication number: 20160048685Abstract: On a computer system, a shell is invoked, through which a plurality of commands and/or scripts can be executed. Individual ones of the plurality of commands and/or scripts are validated. Given individual ones of the plurality of commands and/or scripts, for which the validation is successful, are executed via the shell.Type: ApplicationFiled: August 18, 2014Publication date: February 18, 2016Inventors: Constantin M. Adam, Shang Q. Guo, John J. Rofrano, Yaoping Ruan, Frederick Y. Wu, Sai Zeng
-
Publication number: 20160048686Abstract: A system, method, and computer program product are provided for monitoring an execution flow of a function. In use, data associated with a function is identified within a call stack. Additionally, a call stack frame is determined from freed memory in the call stack. Further, an execution flow of the function is monitored, utilizing the call stack frame from the freed memory.Type: ApplicationFiled: October 28, 2015Publication date: February 18, 2016Inventor: Gregory William Dalcher
-
Publication number: 20160048687Abstract: A computer implemented method for identifying tampering of an electronic document, the method comprising the steps of: generating a document digest for the document, the document having associated one or more modification records and the document digest being a copulative digest based on & digest of each of the modification records; receiving a modified version of the document from a document modifier, the modified version of the document having associated one or sore additional modification records; generating a new document digest for the modified document, the new document digest being a cumulative digest based on a digest of each of the modification records and the additional modification records; generating a validation digest, the validation digest being a cumulative digest based on the document digest and a digest of each of the additional modification records; comparing the new document digest and the validation digest to determine if the modified version of the document has been tampered with.Type: ApplicationFiled: March 27, 2014Publication date: February 18, 2016Applicant: Thunderhead LimitedInventor: James MCLENNAN
-
Publication number: 20160048688Abstract: Systems and techniques are provided for restricting system calls using protected storage. A system call to a restricted system component may be received from an application. The application may be determined to have permission to make the system call to the restricted system component. A signature associated with the application may be verified using a public key from a protected storage. The public key may be sent to the protected storage by a computing device of a party authorized to modify data in the protected storage. The restricted system component may be permitted to perform a function indicated by the system call when the public key successfully verifies the signature associated with application.Type: ApplicationFiled: August 14, 2014Publication date: February 18, 2016Inventors: Andrew Flynn, Shishir Kumar Agrawal, Simon Arscott, Lawrence Jonathan Brunsman
-
Publication number: 20160048689Abstract: There is provided a method of performing a cryptographic algorithm in software, the cryptographic algorithm comprising one or more processing steps, wherein each processing step is arranged to process a respective input to the processing step so as to generate an output corresponding to the input, characterized in that, for each of at least one of the one or more processing steps, the method comprises: providing a respective input for the processing step as an input to a plurality of implementations of the processing step, wherein each implementation is arranged to output a corresponding intermediate result represented using a respective predetermined output representation; and using the representation of the intermediate results to generate a result for the processing step that is based on each of the intermediate results, wherein, if each intermediate result is the output that corresponds to the input for the processing step then the result for the processing step is the output that corresponds to the inputType: ApplicationFiled: March 27, 2013Publication date: February 18, 2016Inventor: Michael WIENER
-
Publication number: 20160048690Abstract: An object is to enable to search genetic information in an encrypted state. An encryption apparatus (200) encrypts a target gene which is genetic information to be stored in a storage apparatus and generates an encrypted gene, as well compares a reference gene which is predefined genetic information with the target gene to generate differential information, and generates an encrypted tag which is encrypted by embedding the generated differential information. A data center (400) stores the encrypted gene with related to the encrypted tag in the storage apparatus. A search apparatus (300) generates a search query which is encrypted by embedding the differential information as a search keyword, and sends the generated search query to a data center (400). The data center (400) specifies the encrypted tag including the differential information specified in the search query, extracts the related encrypted gene, and sends the encrypted gene to the search apparatus (300).Type: ApplicationFiled: February 21, 2014Publication date: February 18, 2016Applicant: MITSUBISHI SPACE SOFTWARE CO., LTD.Inventors: Shigeki TANISHIMA, Nori MATSUDA
-
Publication number: 20160048691Abstract: A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a successful authentication, a user-specific security code is generated by the encryption unit. The security code is outputted by the encryption unit to the authenticated user. The security code and the user-ID are received by an authentication unit coupled to the analysis system via a user-interface coupled to the authentication unit. The security code is decrypted by the authentication unit. If the decrypted security code matches with the user-ID, the user is authenticated at the authentication unit and an authentication signal is generated by the authentication unit for permitting the user to initialize at least one function of the analysis system.Type: ApplicationFiled: October 22, 2015Publication date: February 18, 2016Inventors: Lothar Gramelspacher, Andrzej Knafel
-
Publication number: 20160048692Abstract: A token includes an interface for communicating with a host, a processor communicably coupled to the interface, and to a persistent storage unit. The processor receives, via the interface, a command from the host; determines whether the command is valid for the token and, if not, returns a result to the host indicating the command is not valid; otherwise, if the command is determined to be valid for the token, performs the command and return a result of performing the command to the host. The command is one of: a command to activate the token, a command to begin authentication, a command to authenticate the host, a command to generate an encryption key, and a command to change a token activation code (TAC) stored by the token, said TAC for use in activating the token.Type: ApplicationFiled: October 27, 2015Publication date: February 18, 2016Inventor: Guy Fielder
-
Publication number: 20160048693Abstract: Embodiments of the present invention provide a method to temporally isolate data accessed by a computing device so that the data accessed by the computing device is limited to a single set of data. The method includes removing any data that is accessed by the computing device when operating in different modes so that the data is inaccessible by the computing device when operating in the mode. The method also includes switching to the mode after the data associated with the modes different from the mode have been removed. The method also includes operating in the mode based on a plurality of rules associated with the security policy in temporal isolation from any other mode associated with the computing device. The computing device is limited to operating in the mode and is prevented from accessing any data that is distinct from the single set of data of the mode.Type: ApplicationFiled: August 12, 2015Publication date: February 18, 2016Inventors: Eric Ridvan Üner, Michael J. Collins, Kent H. Hunter, John E. Rosenstengel, James E. Sabin, Kevin S. Woods
-
Publication number: 20160048694Abstract: An information handling system includes a trusted platform module (TPM) and a storage device, the TPM provides boot authentication for the information handling system such that, during a pre-boot phase, the TPM can access a platform configuration register (PCR). During a first instance of the pre-boot phase, the information handling system provides a public/private key pair including a public key and a private key, stores the private key to an encrypted storage of the TPM, seals the private key in the encrypted storage to the PCR, and stores the public key to the storage device. During an operating system phase that is after the first instance of the pre boot phase, the information handling system retrieves the public key from the storage device, encrypts transfer data using the public key, and stores the encrypted transfer data to the storage device.Type: ApplicationFiled: August 18, 2014Publication date: February 18, 2016Inventors: Ricardo L. Martinez, Anand P. Joshi
-
Publication number: 20160048695Abstract: A technique is provided for controlling access by an application to data or a service supported by a computing system, a computer program product and an access control unit. The technique includes identifying a request from an application for access to data or a service supported by the system, determining whether access has been restricted to the data or service, and, if so, indicating to the application that the request for access has been granted by the system and emulating the data or service when the data or service is accessed by the application.Type: ApplicationFiled: March 5, 2014Publication date: February 18, 2016Inventor: Tommaso CUCINOTTA
-
Publication number: 20160048696Abstract: Techniques for generating a document according to attestation requirements are provided. A method determines attestation requirements for electronically signing an electronic document. The method modifies the document based in part on the requirements, and then provides the modified document to users requested to electronically sign the document, wherein the users are only permitted to electronically sign the document in circumstances satisfying the requirements. An electronic signature service can generate a document whose signing needs to be witnessed and/or recorded according to attestation requirements. The document may be associated with number of signers. The electronic signature service may determine one or more witnesses of the signers and may determine applicable attestation requirements based on the witnesses, the signers, and the document.Type: ApplicationFiled: August 13, 2014Publication date: February 18, 2016Inventor: Benjamin David Follis
-
Publication number: 20160048697Abstract: Data photo files with digital envelops may be used for many new applications for cloud computing. The new applications include games and entertainments featuring additional privacy and survivability on data storage and transport on cloud computing. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying an architecture that utilizes multi-dimensional waveforms has found applications in data storage and transport on cloud. Multiple data sets are preprocessed by WF muxing before stored/transported. WF muxed data is aggregated data from multiple data sets that have been “customized processed” and disassembled into any scalable number of sets of processed data, with each set being stored on a storage site. The original data is reassembled via WF demuxing after retrieving a lesser but scalable number of WF muxed data sets.Type: ApplicationFiled: April 14, 2015Publication date: February 18, 2016Inventors: Donald C.D. Chang, Juo-Yu Lee, Steve K Chen, Jeffrey Chijieh Chang
-
Publication number: 20160048698Abstract: A data storage system or service is provided for the data that is generated by the personalization system. The data storage system can be configured to support storing, retrieving or querying, and updating of data such as user information, personalized content such as personalized business information and collection information, statistics information related to users, collections, businesses, and the like. The data model design of the data storage system may be configured to optimize performance associated with specific features of the personalized system such as following and/or sharing of collections. Additionally, the data storage system may be configured to detect and provide user notifications of trigger events.Type: ApplicationFiled: April 8, 2015Publication date: February 18, 2016Inventors: Sudheer Sahu, Randell Beltran, Kiran Sugana, Monik Khare
-
Publication number: 20160048699Abstract: A method of deleting log records may include identifying a plurality of log records generated during a time period, for each identified log record, determining whether a delete request associated with the log record has been made, and, in response to determining that a delete request has not been received, identifying a unique identifier associated with the log record, searching a user activity table for an entry having a key table index associated with the unique identifier, where the entry is associated with a timestamp, using the key table index and the timestamp to identify a key associated with the unique identifier and the timestamp from a key table, encrypting at least a portion of the log record with the identified key to generate an encrypted value, and storing the encrypted value as an entry in the log record database that is associated with the identified log record.Type: ApplicationFiled: October 30, 2015Publication date: February 18, 2016Inventor: Joanne Syben
-
Publication number: 20160048700Abstract: A database containing personal information of a user can be selectively read from and written to by multiple entities. Access level rules determine who gets access to which entries of a user record in the database. Access to some entries and actions taken on some entries may be possible only by producing, in real time, a smartcard-based authorization for such access or actions.Type: ApplicationFiled: August 14, 2014Publication date: February 18, 2016Inventor: Philippe Stransky-Heilkron
-
Publication number: 20160048701Abstract: Remote video data files with digital multimedia envelops may be used for many new cloud computing applications. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying an architecture that utilizes multi-dimensional waveforms has found applications in data storage and transport on cloud. Multiple data sets are preprocessed by WF muxing before stored/transported via cloud. WF muxed data is aggregated data from multiple data sets that have been “customized processed” and disassembled into any scalable number of sets of processed data, with each set being stored on a storage site. The original data is reassembled via WF demuxing after retrieving a lesser but scalable number of WF muxed data sets.Type: ApplicationFiled: April 14, 2015Publication date: February 18, 2016Inventors: Donald C.D. Chang, Juo-Yu Lee, Steve K. Chen, Jeffrey Chijieh Chang
-
Publication number: 20160048702Abstract: An information receiving device according to the present invention includes: a request information generation unit which generates request information including actual behavior information which is behavior information representing an actual behavior of a user, and pseudo behavior information not representing an actual behavior of the user; a distribution information request unit which transmits the request information to an information distribution device, and receives distribution information distributed from the information distribution device on a basis of the transmission of the request information; and a distribution information selection unit which selects distribution information associated with the actual behavior information, out of the distribution information received by the distribution information request unit.Type: ApplicationFiled: March 7, 2014Publication date: February 18, 2016Applicant: NEC CORPORATIONInventor: Ryo FURUKAWA
-
Publication number: 20160048703Abstract: A method for providing integrity and consistency of a cloud storage service to a group of mutually trusted clients may be provided. The cloud storage service may offer a set of operations, such as read, write, update, delete in respect to stored data to the clients, whereby each client only executes its own client operations when consuming one of the set of operations of the cloud storage service, and wherein each client detects data correctness of the cloud storage service based on a protocol providing fork-linearizablity.Type: ApplicationFiled: July 2, 2015Publication date: February 18, 2016Inventors: Marcus Brandenburger, Christian Cachin, Nikola Knezevic
-
Publication number: 20160048704Abstract: An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the plaintext data into encrypted data, wherein at least a portion of the encryption circuit comprises IBG circuitry.Type: ApplicationFiled: October 28, 2015Publication date: February 18, 2016Inventor: William Eli Thacker, III