Patents Issued in March 31, 2016
-
Publication number: 20160092635Abstract: An apparatus and method for supporting a medical examination based on a personalized checklist. The apparatus includes a checklist generator to generate a personalized checklist based on a patient's medical information; and an item performance confirmer to determine whether each item included in the checklist is performed by analyzing a medical examination process of the patient.Type: ApplicationFiled: September 23, 2015Publication date: March 31, 2016Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventor: Ha Young KIM
-
Publication number: 20160092636Abstract: An automated and timely method of notifying the possibility of an adverse reaction at the point of service is implemented through a computing device and at least one data-transceiver as the computing device is communicatively coupled with the data-transceiver through a wireless network. The computing device is able to receive a user information and the possibility of an adverse reaction information from a desired transceiver of the at least one data-transceiver, where the adverse reaction information notifies any possible adverse reactions at the point of service. As a result, the service provider or seeker who operates the computing device is able to assess an appropriate service procedure for the desired transceiver in such a way that the appropriate service procedure avoids further medical complication for the person with the desired transceiver at the point of service.Type: ApplicationFiled: September 8, 2015Publication date: March 31, 2016Inventor: Surabhi K. Venkataramu
-
Publication number: 20160092637Abstract: A medical assistance server generates a medical assistance screen, and distributes the medical assistance screen to a client terminal. The medical assistance screen includes a medical schedule display region where a medical schedule is displayed and a relevant information display region where relevant information is displayed. In the medical schedule display region, a medical schedule in which medical acts are arranged in time series is displayed, so that one of the displayed medical acts can be selected. In the relevant information display region, various kinds of information that are referred to when performing the medical act selected in the medical schedule display region are displayed. The user can perform a medical examination by referring to the schedule and the relevant information.Type: ApplicationFiled: September 10, 2015Publication date: March 31, 2016Inventors: Yuya KUDO, Satoshi UEDA, Hironori MATSUMASA, Ryosuke USAMI, Takamasa YAGUCHI, Yasunori OHTA
-
Publication number: 20160092638Abstract: A pharmacy workflow management application with improved functionality related thereto. The improved functionality may include enhancements to a user interface for maintenance of a formulary at a local system executing the pharmacy workflow management application. The formulary management may include user interface elements provided at least partially based on a user profile. Additional enhancements to a user interface associated with a user profile may be provided for dose order record maintenance using the pharmacy workflow management application. Furthermore, enhancements to triggered scan events for updating a status of a dose order, situation board enhancements related to formatting of the situation board in relation to a user profile, encryption of communication by the pharmacy workflow application, and improved methods of installing updates to terminals of the pharmacy workflow management application are discussed.Type: ApplicationFiled: September 29, 2015Publication date: March 31, 2016Inventors: Bhavesh S. Padmani, Matthew A. Valentine, Jayson Bender, Matt Crooks, Bapu Hirave, Maher Yassine, Ghalib Abbasi, Kristina Yevseyeva
-
Publication number: 20160092639Abstract: Centralized support user management in a distributed healthcare information management system. Support user management may include generation of permission data that may be distributed from a central server to one or more local systems. The local systems may execute a healthcare information management application such as, for example, a pharmacy workflow management application. In any regard, central support users at the central server may periodically require access to the local systems to perform, among other activities, technical support or troubleshooting in relation to the application executed at the local system. In turn, provision of permission data from the central server to the local system may allow support users to access the local system with specific permission identification's provided specific ones of the support users. In turn, specific user permissions may be established and support user tracking may be carried out at the local systems.Type: ApplicationFiled: September 29, 2015Publication date: March 31, 2016Inventors: Bhavesh S. Padmani, Matthew A. Valentine, Robert Bossio
-
Publication number: 20160092640Abstract: A system and method for monitoring the inventory of a medical storage container that has a required inventory of medical articles. An enclosure is used to isolate, scan, and take an inventory of a tray or other container of medical articles each of which has an RFID tag. The enclosure having a size smaller than the size needed for a resonant frequency at the RFID frequency of operation of the tags. An injection device is used to create a robust electromagnetic field standing wave of constructive interference in the enclosure and a program compares the scanned present inventory of the tray to the required inventory database and indicates any differences. Expired and recalled articles are identified.Type: ApplicationFiled: November 16, 2015Publication date: March 31, 2016Applicant: MEPS Real-Time, Inc.Inventors: Jimmy C. Caputo, Shariq Hussain, Jeffrey Shamblin, James P. Williams, JR.
-
Publication number: 20160092641Abstract: Systems, methods and computer readable media that facilitate providing clinically informed financial decisions that improve healthcare performance are provided. In an aspect, a system includes a performance evaluation component configured to identify groups of patients having received healthcare service by a healthcare organization and associated with a common healthcare service parameter and uncommon healthcare service parameters. The system further includes a scoring component configured to determine performance scores for respective groups of patients, wherein the performance scores reflect clinical and financial performance of the healthcare organization in association with provision of the healthcare service to the respective groups of patients.Type: ApplicationFiled: November 30, 2015Publication date: March 31, 2016Inventors: Conor Delaney, James Evans
-
Publication number: 20160092642Abstract: Systems, methods, and computer-readable media are disclosed for determining whether an orphan drug is eligible for replenishment at a 340B price for the drug by evaluating orphan drug identification data, patient encounter data, and/or dispensing data with respect to one or more eligibility criteria to determine whether the orphan drug has been prescribed, dispensed, or otherwise used to treat the rare disease or condition for which it is designated or an alternate condition.Type: ApplicationFiled: September 29, 2014Publication date: March 31, 2016Inventors: Andrew Maurer, Soranarom Kumsaitong, Richard Selby
-
Publication number: 20160092643Abstract: A system and process for providing the recording of provided health care transactions to an individual and the verification and validation of both the recipient and provider's identities. More particularly, to a system and process for providing verification and validation of an individual's identity for use in the prevention of identity theft and fraud in the medical industry and the recording of all medical related treatments and record requests by authorized providers, among other features. The verification and validation, referred to as “Positive Identification (PI)” for an individual who is seeking or in need of medical diagnosis and/or treatment may include a collection of novel processes by which a person's PI may be obtained and captured in an electronic database each time a person's medical information is accessed or treatment is provided, and in full compliance with the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This may substantially prevent fraud of medical services.Type: ApplicationFiled: September 25, 2015Publication date: March 31, 2016Inventors: Robert Daniel Hinkle, Elton Ray Williams
-
Publication number: 20160092644Abstract: Provided are a diagnosis support program development promoting apparatus, an operation method and operation program for the diagnosis support program development promoting apparatus, and a diagnosis support program development promoting system, capable of promoting development of a diagnosis support program while protecting privacy of a medical facility. An information collecting unit collects actual usage situation information of a diagnosis support program, and facility information of a medical facility. A concealment unit conceals facility specifying information for specifying the medical facility in the facility information of the medical facility. An information providing unit provides development reference information including the actual usage situation information and the facility information in which the facility specifying information is concealed, in response to an information providing request from a vendor or the like.Type: ApplicationFiled: September 10, 2015Publication date: March 31, 2016Applicant: FUJIFILM CorporationInventor: FUMITAKE TANAKA
-
Publication number: 20160092645Abstract: An electronic apparatus (1) including a display generation unit (110) configured to generate a display area (210) in a user interface, the display area being configured to display a 3-D model of a patient's face and a 3-D model of a patient interface device fitted to the 3-D model of the patient's face; and an interaction map unit (160) configured to generate an interaction map tool (260) in the user interface and to calculate an interaction map between the patient's face and the patient interface device indicating levels of an interaction characteristic between the patient's face and the patient interface device, wherein the interaction map tool is operable to toggle display of the interaction map in the user interface.Type: ApplicationFiled: May 1, 2014Publication date: March 31, 2016Inventors: RUUD VLUTTERS, KARL CATHARINA VAN BREE
-
Publication number: 20160092646Abstract: A method for providing remote medical consultation and diagnosis, the method including a patient visiting a service facility where a secondary healthcare provider is located, establishing a teleconferencing session between a first teleconferencing station located in the service facility and a second teleconferencing station located in a provider facility that is remote from the service facility, a primary healthcare provider being present at the provider facility, and the primary healthcare provider performing an examination on the patient using audio and video that are captured at the first teleconferencing station and transmitted to the second teleconferencing station.Type: ApplicationFiled: September 29, 2015Publication date: March 31, 2016Inventors: John S. Rinkacs, Tobias Barker, James Murray
-
Publication number: 20160092647Abstract: The present invention relates to an integrated system of ‘Electronic Medical Record for Individuals’ (EMRI) and ‘Patient Information Exchange (PIE) to perform a method for creating and recording medical information of a user and for sharing user experience with symptoms and medical intervention details. In this method for creating and recording medical information of the individual user, comprehensive health information of the individual user in the user interface module is organized and prepared based on the personal details, the health details, the symptoms, the treatment details, the health reports and the medical insurance details of the individual user through a user interface module of the EMRI module. The health information of the individual user are tracked and displayed from the user interface module into a doctor interface module of the EMRI module.Type: ApplicationFiled: September 29, 2014Publication date: March 31, 2016Inventors: Muralidharan Pillapayam Narasimhachari, Radhika Muralidharan
-
Publication number: 20160092648Abstract: Disclosed herein is a system and method for a risk management system for use in a health care environment by healthcare practitioners in the creation, recording, and tracking of progress notes. In an embodiment, the system is comprised of an input/output interface for receiving from a user the beginning data elements of a patient, a computing device configured to receive said beginning data elements of said patient and computing for displaying to said user the initial progress note form component, subjective/chief complaint. Based on the initial progress note form component inputs for subjective/chief complaint, said computer computes for displaying to said user the second progress note form component, objective. This is continued for the remaining progress note form components diagnosis/assessment, plans/treatment recommendations, risks/complications, benefits of proposed treatments, alternative treatments, and sequalae of non treatment.Type: ApplicationFiled: September 25, 2015Publication date: March 31, 2016Inventor: George Mitchell Angelos
-
Publication number: 20160092649Abstract: A computer-assisted method that includes: identifying practitioners affiliated with a non-retail facility; gathering longitudinal prescription scripts by the identified prescribing practitioners as well as medical claims submitted by the identified prescribing practitioners to insurance carriers; linking the medical claims submitted by the identified practitioners to the longitudinal prescription scripts; based on each linked medical claim and longitudinal prescription script, generating a record of using the prescription drug for the corresponding one or more indication; generating a distribution factor of using the prescription drug for each of the one or more indications by the identified practitioners outside the non-retail facility; receiving information showing a volume of the prescription drug sold to the non-retail facility; and generating usage data by indications of the prescription drug for the non-retail facility by applying the generated distribution factor to the received information showing theType: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Michel Denarie, Melissa Leonhauser
-
Publication number: 20160092650Abstract: A method of administration of a drug or drug regime to a potentially unlimited number of drug recipients, the method comprising the steps of; a) providing a prescription for at least one drug in a drug dosing regime to a drug recipient, b) prior to administration of the at least one drug, inputting drug parameters and drug recipient profile particulars for a particular drug recipient into a computer program c) allowing the program to compare the prescription parameters to a set of safety parameters to determine if the parameters fall within predetermined safety limits thereby avoiding over-doses or under-doses of prescribed drug dosages.Type: ApplicationFiled: June 26, 2014Publication date: March 31, 2016Inventor: Mohammed ELASHWAH
-
Publication number: 20160092651Abstract: Methods and devices for providing instructions to treat and for treating patients through the use of medical devices are provided. Some embodiments treat musculoskeletal conditions by providing for alignment of bones by use of bone alignment devices in accordance with instructions provided through a prescription. Other embodiments may facilitate or provide revised prescriptions in response to treatment conditions. Embodiments may also provide effective ways of communicating prescription and compliance information between patients and health care providers.Type: ApplicationFiled: May 14, 2014Publication date: March 31, 2016Inventors: Gene E. Austin, John R. Mason
-
Publication number: 20160092652Abstract: A system of controlling distribution of a medication in the treatment or prevention of epilepsy is provided. A central controller of the system has a data store and one or more processors for reading and writing data to the data store. The data store comprises a database of patient records, each patient record having a medication authorization field. The central controller can output an authorization of a first prescription of epilepsy medication to a patient in dependence upon genetic test results for the patient and schedules a subsequent test for the patient prior to authorization of a subsequent prescription of epilepsy medication. Also provided are methods in which the subject systems find use. The systems and methods find use in the treatment of severe subtypes of epilepsy or refractory epilepsy, such as Dravet Syndrome.Type: ApplicationFiled: September 28, 2015Publication date: March 31, 2016Inventors: Richard Alistair Balfour STEWART, Anthony CLARKE
-
Publication number: 20160092653Abstract: A nutritional intake viewing apparatus monitors patient nutrient intake. One or more processors receives nutrient input information, generates one or more multi-axis web diagrams on the display, and graphs calculated nutrient amounts onto a corresponding one of the axes. Each multi-web diagram includes a plurality of axes diverging from a single common point of intersection, calculated nutrient amounts displayed on the axes, and connecting lines that connect the calculated nutrient amounts on the axes to form a polygon of the calculated nutrient amounts.Type: ApplicationFiled: September 10, 2015Publication date: March 31, 2016Inventor: Maria F. HENDRICKSON
-
Publication number: 20160092654Abstract: A computer-implemented method for tracking fitness data of a cardholder by using a fitness payment card and a fitness tracking computing device is provided. The method includes storing registration data, wherein the registration data includes an account identifier associated with the fitness payment card and the cardholder. The method also includes receiving, by the fitness tracking computing device, a fitness data transfer message that includes the registration data and fitness data of the cardholder, wherein the fitness data is collected by the fitness payment card. The method further includes determining that the fitness payment card is registered in a fitness tracking program based on the registration data. The method also includes electronically generating a fitness report including at least the fitness data of the cardholder and providing the fitness report to the cardholder.Type: ApplicationFiled: September 26, 2014Publication date: March 31, 2016Inventor: Dexter E. Bryant, II
-
Publication number: 20160092655Abstract: A voluntary reporting apparatus performs report generation and includes a check-in interface to receive patient identification information. The voluntary reporting apparatus determines whether a patient is taking a medication under study and receives side effects experienced by the patient related to the medication under study. The severity levels of the side effects are compared to severity level thresholds, and reports are generated that include the side effects and severity levels experienced by the patient related to the medication under study.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Applicant: UMM AL-QURA UNIVERSITYInventor: Hassan HAZAZI
-
Publication number: 20160092656Abstract: A user interacts with a medical imaging system and a medical reporting system to prepare a medical report. The medical reporting system includes report templates for medical reports. The report templates include placeholder fields with unique placeholder designations and metadata. After a user entry in the medical imaging system to select an image dataset, the image dataset and analysis tools are made available to the user. After a user entry in the medical reporting system to select a report template, a report template is made available. Placeholders contained in the selected report template are displayed with corresponding placeholder designations and metadata, automatically sent to the imaging system, and displayed as data requests. According to the data requests displayed, the data corresponding to the data requests is ascertained or determined by the user and assigned to the placeholder designations. A report editor automatically saves the data in the placeholder fields.Type: ApplicationFiled: September 29, 2015Publication date: March 31, 2016Inventors: Karlheinz Glaser-Seidnitzer, Andrew John Hewett, Martin Huber, Gerhard Kohl, Michael Rusitska
-
Publication number: 20160092657Abstract: Methods and apparatus for tracking antimicrobial resistance based on geography. An application server receives a query from a client application to provide antimicrobial resistance data for a geographic location. The application server determines a geographic region based, at least in part, on the geographic location included in the query, and antimicrobial data for samples collected from patients residing in the geographic region are retrieved from at least one health information datastore of a health information system. The retrieved antimicrobial data comprises information describing antimicrobial resistance of an infectious organism detected in the biological samples to at least one antimicrobial agent, and is transmitted to a client device on which the client application that issued the query is executing.Type: ApplicationFiled: September 29, 2014Publication date: March 31, 2016Inventors: Robert Nix, Shayne Guiliano, Anne Meneghetti, Peter Hung, Nathan Wilkinson, Abbe Don, Alexander C. Jergensen, Jeremy Magid
-
Publication number: 20160092658Abstract: A computer implemented method of evaluating an information technology in a computer network having multiple applications and users. The computer is programmed to create objective metric data of organizational, technical and utilization dimensions. This is accomplished through quantitative and qualitative data collection methods, such as surveys, usage tracking and system monitoring. The computer is programmed to create objective metric data on actual use and performance. From the metric data of organizational, utilization, and technical dimensions the computer is able to provide an analysis of the overall degree of utilization, individual net benefits and organizational net benefits. As data is compiled, the method produces industry sector standards for the purpose of benchmarking.Type: ApplicationFiled: September 17, 2015Publication date: March 31, 2016Inventor: Marianne LEENAERTS
-
Publication number: 20160092659Abstract: The method set out herein involves conducting clinical trial to develop parenteral therapeutic product with drug delivery device. The method comprises conducting a dose-finding clinical study using a variable dose drug delivery device to evaluate multiple clinical doses, wherein the variable dose drug delivery device is automatic, portable and for user self-administration. During the dose-finding clinical study, both the performance of the drug and the performance of the variable dose drug delivery device are evaluated.Type: ApplicationFiled: September 19, 2015Publication date: March 31, 2016Inventor: Min Wei
-
Publication number: 20160092660Abstract: A process for simulating the composition and properties of hydrocarbon mixtures such as petroleum fractions with a reduced number of representative compounds that closely match the characteristics of the complete molecular composition of the mixture.Type: ApplicationFiled: May 27, 2014Publication date: March 31, 2016Inventors: Jorge M. Martinis, Charles C. Solvason
-
Publication number: 20160092661Abstract: The present invention relates to methods of designing and making perfumed products and perfume raw materials for use in products and perfume raw materials selected by such methods and the use of same.Type: ApplicationFiled: September 25, 2015Publication date: March 31, 2016Inventors: Judith Ann HOLLINGSHEAD, Prakash J. MADHAV, David Thomas STANTON
-
Publication number: 20160092662Abstract: A content reading method includes identifying first version information indicating a version of a content copyright protection method of an optical disk based on this optical disk, identifying second version information indicating a version of a protocol used in authentication of a host apparatus, determining whether the authentication is to be approved or not by comparing the first version information and the second version information, authenticating the host apparatus according to a result of the determination, reading out, from the optical disk, Volume ID used in decrypting an encrypted content and sending it to the authenticated host apparatus, and 0 the encrypted content from the optical disk and sending it to the authenticated host apparatus.Type: ApplicationFiled: September 15, 2015Publication date: March 31, 2016Inventors: MASAYA YAMAMOTO, KAORU MURASE
-
Publication number: 20160092663Abstract: There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols.Type: ApplicationFiled: December 10, 2015Publication date: March 31, 2016Inventors: Nicol C. So, Thomas L. Du Breuil, Barry P. Falvo, Rama Raju Kaldindi, Ambikacharan P. Makam, Geetha Mangalore, Paul Moroney
-
Publication number: 20160092664Abstract: According to one embodiment, an electronic apparatus includes an input controller and circuitry. The input controller is configured to receive a password. The circuitry is configured to detect an external device which is externally connected, and to determine whether the password received by the input controller matches a password set in association with the detected external device.Type: ApplicationFiled: April 1, 2015Publication date: March 31, 2016Inventor: Toshitaka Sanada
-
Publication number: 20160092665Abstract: An initial authentication of a user, if successful, causes a token to be stored on, and presented from, a wearable device (WD). The WD continually monitors one or more of the wearer's vital signs to confirm that (1) the WD is being worn by a living person rather than an inanimate simulacrum, and (2) the WD is still worn by the same person who underwent the authentication. The token can be read by a token-reader on at least one protected device (PD). If the token is valid, its presentation serves as authentication and the token-reader grants the user access to the PD. If the WD vital-sign signal is interrupted when the user removes the WD, the WD stops presenting the token and can no longer be used to access a PD.Type: ApplicationFiled: September 27, 2014Publication date: March 31, 2016Inventors: Melissa A. Cowan, Ramune Nagisetty, Jason Martin, Richard A. Forand, Conor P. Cahill, Bradley A. Jackson
-
Publication number: 20160092666Abstract: An anti-passback algorithm for an access control system is described. The anti-passback algorithm prevents the use of valid credentials to gain access to an access-controlled area by more than one person within a given period of time. The algorithm is capable of distinguishing between credentials intentionally presented to the access control system and credentials that are unintentionally read by the access control system. Certain variables may be set by the access control system manufacturer or a trusted individual to adapt the algorithm for applications.Type: ApplicationFiled: September 25, 2015Publication date: March 31, 2016Inventors: Toby Mark Padilla, David Edward Andresky, Bryan Stephen Holloway, Kieran Wingfield, Michael Margraf
-
Publication number: 20160092667Abstract: A system and method for utilizing and replacing an anonymous recognition substrates, which can be anonymous recognition cards, codes, emitters, tags, or any combination. The invention permits replacing and utilizing of anonymous recognition substrates at anonymous web-based program and/or at an anonymous interactive display terminals. Whereby the anonymous substrate holder may create an anonymous account on a web-based program and/or at an interactive display terminal using the anonymous substrate's anonymous code. The user may securely request a new anonymous substrate from the web-based program and/or at the interactive display terminal. The web-based program provider and/or the interactive display terminal provider can anonymously message and track the anonymous account holder and/or anonymous substrate holder.Type: ApplicationFiled: December 10, 2015Publication date: March 31, 2016Inventor: Richard A. Ferdinand
-
Publication number: 20160092668Abstract: A system for authorizing an operation is provided. The system may acquire motion data collected by a wearable device. A mobile terminal may determine whether the motion data matches with a physical motion for verification. If the motion data matches with the physical motion for verification, the mobile terminal may be authorized to perform a predetermined operation corresponding to the physical motion for verification. Thus, a user's identity may be verified based on the wearable device that collects motion data.Type: ApplicationFiled: July 14, 2015Publication date: March 31, 2016Applicant: XIAOMI INC.Inventors: Liang Ding, Bolin Huang, Jiajin Yin
-
Publication number: 20160092669Abstract: The present invention is to enable a user to input authentication information without burden, such that the user only has to memorize part of the authentication information even when inputting lengthy authentication information in order to ensure high-level security. When an operation of inputting and arranging authentication information in an information arrangement region is performed in a state where an arrangement status of a specified portion in the information arrangement region is set in advance as partial-authentication reference information in a reference authentication information memory, a CPU detects an arrangement status of the specified portion from an overall arrangement status in the information arrangement region, and performs, as partial authentication, processing of matching the detected arrangement status of the specified portion and the arrangement status of the specified portion set as the partial-authentication reference information.Type: ApplicationFiled: December 8, 2015Publication date: March 31, 2016Inventor: Shinichi Hayakawa
-
Publication number: 20160092670Abstract: A process of authenticating a person into a computer system as an authorized user by comparing the person's answers to questions that were defined by the authorized user during computer system account creation. The process is analogous to a property security system in that they both use concepts of Gate, Door, Safe, Frisk, and Key. Gate question prevents imposters from entering the computer system. Door question prevents imposters from viewing data should they get past the Gate. Safe question prevents imposters from updating data and viewing confidential data should they get past the Door. Frisk question catches imposters should they enter the computer system by guessing the correct answers to the authorized user's Key, Gate, Door or Safe questions. Key question mitigates imposter brute force attacks by silently locking and unlocking the authorized user account during Gate, Door, Safe, and Frisk questions when the authorized user answers with the Key question instead.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventor: Frank Douglas Moseley
-
Publication number: 20160092671Abstract: There are disclosed a system and method for automatic password recovery for a service.Type: ApplicationFiled: November 12, 2015Publication date: March 31, 2016Inventors: Ekaterina Aleksandrovna ANDREEVA, Alexey Andreevich GONCHAROV, Aleksandra Arsenyevna EPIFANOVSKAIA, Ilya Gennadievich LEVINSON, Yury Alekseyevich LEONYCHEV
-
Publication number: 20160092672Abstract: System and methods for securing inter-component communications in an operating system are provided. Systems and methods provided herein secure inter-component communications in an operating system by selectively generating instances when inter-component communication requests occur, whereby each of the generated instances are attached to a newly created blocked permissions list. System and methods further manage the invocation of Application Programming Interfaces by applications or instances in the operating system by determining whether the invocation of the Application Programming Interface is allowed or declined based on the blocked permissions list and default permission list associated with each invoking application or instance.Type: ApplicationFiled: September 21, 2015Publication date: March 31, 2016Inventors: Yingjiu LI, Daibin WANG, Haixia YAO, Ke XU
-
Publication number: 20160092673Abstract: Technologies for shadow stack support for legacy guests include a computing device having a processor with shadow stack support. During execution of a call instruction, the processor determines whether a legacy stack pointer is within bounds and generates a virtual machine exit if the legacy stack pointer is out-of-bounds. If not out-of-bounds, the processor pushes a return address onto the legacy stack and onto a shadow stack protected by a hypervisor. During execution of a return instruction, the processor determines whether top return addresses of the legacy stack and the shadow stack match, and generates a virtual machine exit if the return addresses do not match. If the return addresses match, the processor pops the return addresses off of the legacy stack and off of the shadow stack. The stack out-of-bounds and the stack mismatch virtual machine exits may be handled by the hypervisor. Other embodiments are described and claimed.Type: ApplicationFiled: September 26, 2014Publication date: March 31, 2016Inventors: Michael LeMay, Barry E. Huntley
-
Publication number: 20160092674Abstract: A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Gregory D. Hughes, Simon P. Cooper, Jacques A. Vidrine, Nicholas C. Allegra
-
Publication number: 20160092675Abstract: A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Jacques A. Vidrine, Nicholas C. Allegra, Simon P. Cooper, Gregory D. Hughes
-
Publication number: 20160092676Abstract: In an example, a stack protection engine is disclosed for preventing or ameliorating stack corruption attacks. The stack protection engine may operate transparently to user-space processes. After a call to a subroutine from a parent routine, the stack protection engine encodes the return address on the stack, such as with an exclusive or cipher and a key selected from a key array. After the subroutine returns control to the main routine, the stack protection engine decodes the address, and returns control. If a stack corruption attack occurs, the malicious return address is not properly encoded, so that when decoding occurs, the program may simply crash rather than returning control to the malicious code.Type: ApplicationFiled: September 26, 2014Publication date: March 31, 2016Inventor: Simon Crowe
-
Publication number: 20160092677Abstract: Techniques are described for allocating resources to a task from a shared hardware structure. A plurality of tasks may execute on a processor, wherein the processor may include one or more processing cores and each task may include a plurality of computer executable instructions. In accordance with one technique for allocating resources to a task from a shared hardware structure amongst multiple tasks, aspects of the disclosure describe assigning a first identifier to a first task from the plurality of tasks, associating a portion of the shared hardware resource with the first identifier, and restricting access and/or observability for computer executable instructions executed from any other task than the first task to the portion of the hardware resource associated with the first identifier.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Rahul Gautam Patel, Nachiketh Rao Potlapally, William John Earl, Matthew Shawn Wilson
-
Publication number: 20160092678Abstract: Various embodiments provide techniques and devices for protecting application secrets from operating system attacks. In some examples, applications execute with an isolated user mode of a secure execution environment, while relying on an operating system executing within a separate execution environment for resource management and system services. A proxy kernel can control access by the operating system to data associated with the secure execution environment. Further, the proxy kernel can act as a transparent interface between isolated user mode applications and the operating system during the provision of resource management and system services.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: David B. Probert, Jeff Engel, Arsalan Ahmad, Arun U. Kishan, Jonathan E. Lange
-
Publication number: 20160092679Abstract: An inspection and recovery method and apparatus for handling virtual machine vulnerability, which inspect the security status of a virtual machine in a hypervisor domain, and recover a main system file or limit the use of a virtual machine suspected of being damaged due to hacking depending on the results of inspection, thus providing a secure virtual machine use environment for cloud computing. In the presented method, collection target information and inspection criteria including vulnerability inspection criteria, recovery criteria, and hacking damage criteria are updated. Then, the collection target information is collected from the virtual disk and virtual memory of each virtual machine. Vulnerability is inspected in conformity with the inspection criteria, based on the collected information. A damaged main system file depending on inspection results is recovered based on recovery criteria.Type: ApplicationFiled: July 6, 2015Publication date: March 31, 2016Inventors: Sung-Jin KIM, ByungJoon KIM, ChulWoo LEE, HyoungChun KIM
-
Publication number: 20160092680Abstract: An apparatus having a carrier with circuit structures including a complex impedance has a measurement unit implemented to measure the complex impedance of the circuit structures at a first time to get a first result and at a later second time to get a second result. Further, either a control implemented to enable operation of a component or to judge whether unauthorized to the component has taken place in dependence on whether the first result matches the second result, or an interface implemented to transmit the first result and the second result in a wireless or wired manner to such a control are provided. In that way, specifically embedded systems without integrated security functions can be upgraded with cryptographic routines in a simple and cost effective manner.Type: ApplicationFiled: September 28, 2015Publication date: March 31, 2016Inventors: Maxim HENNIG, Oliver SCHIMMEL, Philipp ZIERIS, Bartol FILIPOVIC
-
Publication number: 20160092681Abstract: Systems and methods may provide for identifying a runtime behavioral pattern of an application and detecting an anomaly in the runtime behavioral pattern. In addition, a security event may be triggered in response to the anomaly. In one example, the anomaly is detected with regard to one or more of a library call count, a library call type, a library call argument configuration or a library call timing associated with a runtime operation of the application.Type: ApplicationFiled: September 26, 2014Publication date: March 31, 2016Inventors: Antonio C. Valles, Vincent J. Zimmer
-
Publication number: 20160092682Abstract: A security device may receive actual behavior information associated with an object. The actual behavior information may identify a first set of behaviors associated with executing the object in a live environment. The security device may determine test behavior information associated with the object. The test behavior information may identify a second set of behaviors associated with testing the object in a test environment. The security device may compare the first set of behaviors and the second set of behaviors to determine a difference between the first set of behaviors and the second set of behaviors. The security device may identify whether the object is an evasive malicious object based on the difference between the first set of behaviors and the second set of behaviors. The security device may provide an indication of whether the object is an evasive malicious object.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Kyle Adams, Daniel J. Quinlan
-
Publication number: 20160092683Abstract: In some embodiments, a content management system can initiate a scan of a content item when the content management system detects that activity associated with the content item triggers a scan policy. In some embodiments, a content management system can initiate a scan of a user's account when the content management system detects that activity associated with the content item triggers a scan policy. A scan policy can specify, for example, a number of shares, downloads and/or previews of the content item allowable in a period of time. When the number of shares, downloads, and/or previews exceeds the specified number in the policy in the specified period of time, the content management system can initiate a scan (e.g., virus scan, malware scan, etc.) of the content item and/or the user's account.Type: ApplicationFiled: September 26, 2014Publication date: March 31, 2016Inventor: Anton Mityagin
-
Publication number: 20160092684Abstract: A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat prediction model associated with a set of security functions, a set of predicted threat scores. The device may determine, based on the set of predicted threat scores, a set of predicted utility values. The device may determine a set of costs corresponding to the set of security functions. The device may determine a set of predicted efficiencies, associated with the set of security functions, based on the set of predicted utility values and the set of costs. The device may identify, based on the set of predicted efficiencies, a particular security function, and may cause the particular security function to be executed on the unknown object. The device may determine whether another security function is to be executed on the unknown object.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Jacob Asher LANGTON, Daniel J. Quinlan