Patents Issued in May 12, 2016
  • Publication number: 20160132660
    Abstract: An electronic medication system including a network server (112), a patient device (104), and a medication storage device (132) is disclosed. The network server includes a network identification module (164) and a network adherence module (166). The patient device includes a patient adherence module (110) and a pill identification module (152). The medication storage device includes a storage device adherence module (182), a sensor (136), and a storage device display (192). The storage device adherence module is configured to synchronize with the network adherence module and the patient adherence module.
    Type: Application
    Filed: June 6, 2014
    Publication date: May 12, 2016
    Inventors: Veronica BARAJAS, Francis DEVLIN, Michael IGLESIAS, Nayanabhiram KALNAD, Christine LIM, Gines Diego MIRALLES, Taylor ROSENDALE, Brett STEWART, David TRIPI, Carl S. WASHBURN, Clarence D. WILHELM
  • Publication number: 20160132661
    Abstract: Technologies are generally provided for a pill dispensing device to track removal of a pill from a pill package. The device may include circuits printed/embedded on a composite sheet configured to be locally or completely flexible/stretchable with a multitude of slits corresponding to locations of pill containing cavities of the pill package. Composite sheet may include embedded rigid sections and be flexible near the slits. Additionally, top and/or bottom plates may further provide structural rigidity to achieve desired flexible behavior of the composite sheet. Electronic circuits printed/embedded on or in the composite sheet may detect removal of a pill from the pill package through the slits. Slits may include electrical contacts configured to switch a circuit corresponding to each slit between an active and an inactive state. Upon removal of the pill, the contacts may separate or touch each other, opening or closing the circuit corresponding to the expanded slit.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 12, 2016
    Inventors: Mandar Shirish Dixit, Mona Sharma, Himanshu Mishra
  • Publication number: 20160132662
    Abstract: A medication dispensing cart with remote integration includes a plurality of drawers operably attached to a mast, a drawer controller operably connected to the drawers and configured to locking and unlocking of the drawers, a battery operably connected to the drawer controller and configured to provide power to the drawer controller, and a computer operably connected to the drawer controller and configured to wirelessly connect to a network for a central server computer system to interact with the medication dispensing cart with remote integration for the central server computer system to lock or unlock the drawers.
    Type: Application
    Filed: December 29, 2015
    Publication date: May 12, 2016
    Inventors: Markos Paradissis, Cynthia Levy, Richard Caldwell, Jennifer Cartright, Ray Vrabel, Brad Blackwell, John Vahlberg
  • Publication number: 20160132663
    Abstract: A system and related methods of enhanced distribution of pharmaceuticals in long-term care facilities are provided. An embodiment of a system includes one or more pharmaceutical storage and electronic dispensing machines each positioned in a long-term care facility remote from a long-term care facility pharmacy group management server and in communication therewith, and long-term care facility pharmacy management computer programs associated with the long-term care facility pharmacy group management server to enhance use of the one or more of pharmaceutical storage and electronic dispensing machines.
    Type: Application
    Filed: January 20, 2016
    Publication date: May 12, 2016
    Inventors: James W. Moncrief, James J. Martin
  • Publication number: 20160132664
    Abstract: A processor receives a first list comprising a plurality of events from a portion of digital data of an unknown work and one or more metrics between each pair of adjacent events from the plurality of events. The processor compares the first list to a second list comprising events and metrics between events for a known work to determine a first quantity of hits and a second quantity of misses. The processor determines whether the first list matches the second list based on the first quantity of hits and the second quantity of misses. The processor determines that the unknown work is a copy of the known work responsive to determining that the first list matches the second list.
    Type: Application
    Filed: January 14, 2016
    Publication date: May 12, 2016
    Inventor: Erling Wold
  • Publication number: 20160132665
    Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating management of data in an on-demand services environment. In one embodiment and by way of example, a method for facilitating management of data in an on-demand services environment is provided. The method of embodiment includes detecting an attempt by a user to manipulate data via a collaboration application at a computing system, wherein the attempt includes attempted deletion of the data posted for viewing using the collaboration application. The method may further include determining whether the user is authorized to manipulate the data, and blocking the attempt if the user is not authorized to manipulate the data.
    Type: Application
    Filed: December 23, 2015
    Publication date: May 12, 2016
    Inventors: Marcus Eric EricssonSan Francisco, Thomas McCleary
  • Publication number: 20160132666
    Abstract: A method, computer program product and system for indicating the occurrence of a relicensing trigger event on a client electronic device includes generating a license request for the client electronic device. An expiration indicator is received for a subscription associated with the client electronic device. A device license is created for the client electronic device that includes the license request and the expiration indicator. A secure device license is created by digitally-securing the device license.
    Type: Application
    Filed: November 11, 2015
    Publication date: May 12, 2016
    Applicant: INTEL CORPORATION
    Inventor: Joshua D. Hug
  • Publication number: 20160132667
    Abstract: A method and system for generating a protected version of the digital content is disclosed. The method includes obfuscating the digital content to yield a functionally equivalent obfuscated digital content, encrypting the obfuscated digital content using at least one device or non-device parameter, generating a decryption logic to be used for generating a decryption key based upon the at least one device or non-device parameter, and concatenating the encrypted digital content and the decryption logic to generate the protected version of the digital content.
    Type: Application
    Filed: May 30, 2014
    Publication date: May 12, 2016
    Applicant: Jscrambler S.A.
    Inventors: Antonio Pedro Freitas Fortuna dos Santos, Rui Miguel Silvares Ribeiro, Filipe Manuel Gomes Silva
  • Publication number: 20160132668
    Abstract: A management method for billing system, the management method includes setting, by a processor, billing address for usage fees of a virtual machine, deployed based on a deploy instruction from a first account, to a second account from which execution instruction for software, which runs on the virtual machine, is issued.
    Type: Application
    Filed: January 19, 2016
    Publication date: May 12, 2016
    Applicant: FUJITSU LIMITED
    Inventor: Kenichirou SHIMOGAWA
  • Publication number: 20160132669
    Abstract: The present disclosure relates to a method and a system for authenticating a user. In one embodiment, one or more input and target data samples extracted from a plurality of physiological and movement signals of the user are processed to train one or more regression models. In real time authentication, the input and target data samples are extracted from the plurality of physiological and activity signals and mapped with trained regression models to determine a regression error. Based on the regression error, an appropriate authentication signal is then generated and transmitted to the user. Using dynamically selected multiple input and target data samples for user authentication increases the accuracy of authentication, thereby reducing possibilities of invalid authentication. Further, the power consumed by the sensors and computation load is reduced by dynamically powering up and powering down of the one or more sensors based on their usage during the authentication process.
    Type: Application
    Filed: March 4, 2015
    Publication date: May 12, 2016
    Applicant: WIPRO Limited
    Inventors: Vinod PATHANGAY, Satish Prasad RATH
  • Publication number: 20160132670
    Abstract: The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and information identifying portions of the image sequentially selected by the user. In one aspect, a communications device presents a first digital image of a first user on a touchscreen display. The communications device may receive, from the first user, information identifying portions of the first digital image selected in accordance with a candidate authentication sequence established by the first user. The selected first image portions may, for example, be associated with corresponding facial features of the first user. The communications device may determine whether the candidate authentication sequence matches a reference authentication sequence associated with the first digital image, and may authenticate an identity of the first user, when the first selection sequence is determined to match the second selection sequence.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 12, 2016
    Inventors: Hisham I. SALAMA, Paul Mon-Wah CHAN, Dino D'AGOSTINO, Orin DEL VECCHIO
  • Publication number: 20160132671
    Abstract: Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts.
    Type: Application
    Filed: January 14, 2016
    Publication date: May 12, 2016
    Applicant: iProov
    Inventor: Andrew Bud
  • Publication number: 20160132672
    Abstract: A system is disclosed for providing secure access to a controlled item, the system comprising a database of biometric signatures, a transmitter subsystem comprising a biometric sensor for receiving a biometric signal, means for matching the biometric signal against members of the database of biometric signatures to thereby output an accessibility attribute, and means for emitting a secure access signal conveying information dependent upon said accessibility attribute, wherein the secure access signal comprises one of at least a rolling code, an encrypted Bluetooth™ protocol, and a WiFi™ protocol, and a receiver sub-system comprising means for receiving the transmitted secure access signal and means for providing conditional access to the controlled item dependent upon said information.
    Type: Application
    Filed: January 19, 2016
    Publication date: May 12, 2016
    Applicant: Securicom (NSW) Pty. Ltd.
    Inventor: Christopher John Burke
  • Publication number: 20160132673
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Application
    Filed: November 12, 2014
    Publication date: May 12, 2016
    Inventors: Peter Daniel BIRK, Cesar Eduardo GONZALEZ BORJON, Nader M. NASSAR
  • Publication number: 20160132674
    Abstract: Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set passwords for respective user levels, where each user level is associated with a different authority to access applications. The passwords are registered for the respective user levels. At least one application is associated with one of the user levels.
    Type: Application
    Filed: December 29, 2015
    Publication date: May 12, 2016
    Inventor: Yong-Sang YUN
  • Publication number: 20160132675
    Abstract: Systems and methods for selective authorization of code modules are provided. According to one embodiment, a kernel mode driver monitors events occurring within a file system or an operating system. Responsive to observation of a trigger event performed by or initiated by an active process, in which the active process corresponds to a first code module within the file system and the event relates to a second code module within the file system, performing or bypassing a real-time authentication process on the second code module with reference to a multi-level whitelist database architecture. The active process is allowed to load the second code module into memory when the real-time authentication process is bypassed or when it is performed and results in an affirmative determination.
    Type: Application
    Filed: December 28, 2015
    Publication date: May 12, 2016
    Applicant: Fortinet, Inc.
    Inventors: Andrew F. Fanton, John J. Gandee, William H. Lutton, Edwin L. Harper, Kurt E. Godwin, Anthony A. Rozga
  • Publication number: 20160132676
    Abstract: A method and system for securely storing passwords and recalling any of the stored passwords in the computer using a single, master password. The system provides password handling software that is configured to enable a user to store in and retrieve from the computer the passwords via user interface. Whenever the password handling software is utilized, a facility in the software turns off communication hardware through which the computer ordinarily communicates with other computers over public communication lines, in order to prevent snooping or eavesdropping on the user's communications during password storage and retrieval sessions.
    Type: Application
    Filed: November 10, 2015
    Publication date: May 12, 2016
    Inventor: Meir Avganim
  • Publication number: 20160132677
    Abstract: A method and system for determining unauthorized account access is provided. The method includes receiving a username of a user and a passcode for access to a secure account or device belonging to a user. The passcode is determined to be incorrect. Unauthorized access attempts with respect to the secure account or the device are determined based on based on the incorrect passcode and in response, a quality factor associated with the incorrect passcode with respect to the secure account or device is determined. The quality factor is compared to a threshold value. Security functions associated with the secure account or device with respect to the incorrect passcode and the results of the comparison are performed based on the quality factor and the unauthorized access attempts.
    Type: Application
    Filed: January 14, 2016
    Publication date: May 12, 2016
    Inventors: Micah M. Cross, Sharan J. Patel
  • Publication number: 20160132678
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Application
    Filed: January 6, 2016
    Publication date: May 12, 2016
    Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Publication number: 20160132679
    Abstract: A system and method for detecting sensitive user input leakages in software applications, such as applications created for smartphone platforms. The system and method are configured to parse user interface layout files of the software application to identify input fields and obtain information concerning the input fields. Input fields that contain sensitive information are identified and a list of sensitive input fields, such as contextual IDs, is generated. The sensitive information fields are identified by reviewing the attributes, hints and/or text labels of the user interface layout file. A taint analysis is performed using the list of sensitive input fields and a sink dataset in order to detect information leaks in the sensitive input fields.
    Type: Application
    Filed: November 12, 2015
    Publication date: May 12, 2016
    Inventors: Zhichun Li, Xusheng Xiao, Zhenyu Wu, Jianjun Huang, Guofei Jiang
  • Publication number: 20160132680
    Abstract: A system, and computer program product for security auditing of database transactions are provided in the illustrative embodiments. For a specified period, an available capacity of a computing resource in a data processing system usable to analyze a database protocol packet. The database protocol packet is stored in a shared memory during a data communication. A number of database protocol packets expected in the shared memory during the specified period is determined Determining a second number of database protocol packets that can be analyzed using the available capacity of the computing resource is computed. During the specified period, the second number of database protocol packets is caused to be selected from every number of database protocol packets stored in the shared memory for analysis using the computing resource during the specified period.
    Type: Application
    Filed: November 6, 2014
    Publication date: May 12, 2016
    Applicant: International Business Machines Corporation
    Inventor: Leonid Rodniansky
  • Publication number: 20160132681
    Abstract: A method for performing a secure boot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key includes performing a measurement on each system and/or application specific file before said file is being loaded or launched by a kernel module or an application loader of the computing system, directing the measurement results to the tamper-resistant hardware, maintaining an extend-only global counter at the tamper-resistant hardware, increasing the extend-only global counter upon receiving a measurement result, executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key, and keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware.
    Type: Application
    Filed: June 14, 2013
    Publication date: May 12, 2016
    Applicant: NEC EUROPE LTD.
    Inventors: Ghassan Karame, Wenting Li
  • Publication number: 20160132682
    Abstract: Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users.
    Type: Application
    Filed: November 23, 2015
    Publication date: May 12, 2016
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20160132683
    Abstract: Confidential content within a file is masked for display on a flexible display device. A legend relating the masking to the confidential content is displayed in a hidden area created by bending the flexible display device. The flexible display device monitors secondary users and their gaze towards the flexible display device and the hidden area to determine if unauthorized secondary users can see the display and hidden area of the flexible display device.
    Type: Application
    Filed: November 11, 2014
    Publication date: May 12, 2016
    Inventors: James E. Bostick, John M. Ganci, JR., Sarbajit K. Rakshit, Craig M. Trim
  • Publication number: 20160132684
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: October 15, 2015
    Publication date: May 12, 2016
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20160132685
    Abstract: System, computer program product, and method embodiments for communication between a kernel operational on a storage subsystem and a key manager (KM) through a hardware management console (HMC) to provide encryption support are provided. In one embodiment, an event request is initiated by the kernel to the KM to execute an event flow. Pursuant to a communication request by the kernel to the HMC, a socket of the HMC is opened along a communication path between the KM and the kernel according to an event flow type selected by the KM for the event flow. Data including a data payload is sent by the KM to the kernel, the data payload corresponding to the selected event flow type.
    Type: Application
    Filed: January 18, 2016
    Publication date: May 12, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kurt A. Lovrien, Richard K. Martinez, Oladimeji O. Omoniyi, Matthew J. Ward
  • Publication number: 20160132686
    Abstract: In some example implementations, there is provided a method including determining, from a received request, one or more attributes; sending, by a permission controller, a query to a use case database, the query including the determined attributes to enable an identification by the use case database of a matching use case stored in the use case database; approving, by the permission controller, the requested access to the data, when a response to the query indicates the matching use case was found in the use case database; rejecting, by the permission controller, the requested access to the data, when the response to the query indicates the matching use case was not found in the use case database.
    Type: Application
    Filed: November 10, 2014
    Publication date: May 12, 2016
    Inventor: Yang Peng
  • Publication number: 20160132687
    Abstract: The present subject matter relates to securing data on a computing system. In an example, a request to execute an application instance of the application is received. After receiving the request a role to be associated with the application instance may be identified based on one of user inputs, an object-role mapping, and a set of rules. Further, the application is executable in a plurality of application instances and the role of the application instance is indicative of a nature of activity to be performed in the application instance. The identified role is then associated with the application instance. Based on the role, data pertaining to the application instance may be stored in a memory location allocated to the role of the application instance. Further, each role has a dedicated memory location.
    Type: Application
    Filed: February 6, 2015
    Publication date: May 12, 2016
    Inventors: Harshita Vani Nallagonda, Sitaram Venkata Chamarty, Lakshmi Padmaja Maddali, Praveen Gauravaram, R. Vigneswaran
  • Publication number: 20160132688
    Abstract: When the mobile device is awakened, a task oriented password system takes control of the device in order to present a screen in which the user must participate in a particular task prior to being granted access to the device contents or a particular application on the device. While not limited, in some embodiments, this particular task may be educational in nature. In this way, the user is exposed to educational content every time he attempts to access his device. Although each task is relatively short, the aggregate time during the course of a day may be substantial. The task oriented password system may include the mobile device, as well as one or more content providers, who generate the content that becomes part of the tasks described herein.
    Type: Application
    Filed: June 17, 2014
    Publication date: May 12, 2016
    Inventors: Fred Curtis, JR., Terry Potter, Stan Miloszewski
  • Publication number: 20160132689
    Abstract: A communication control device configured to access an information processing apparatus in which data is stored. The device and method acquires an operational condition of an information processing apparatus, and notifies the information processing apparatus of a security command for causing the information processing apparatus to execute a security process on the data in an event that an operational condition is activated and, in an event that the operational condition is a standby mode, a hibernate mode, or a shutdown mode, notifies the information processing apparatus of an activation command for activating the information processing apparatus, and notifies of a security command for causing the information processing apparatus to execute a security process on the data.
    Type: Application
    Filed: December 29, 2015
    Publication date: May 12, 2016
    Applicant: FUJITSU LIMITED
    Inventors: Kazuaki NIMURA, Yousuke NAKAMURA, Kouichi YASAKI, Fumio HONDA
  • Publication number: 20160132690
    Abstract: Systems and apparatuses for revoking access to one or more applications for one or more individuals or users are provided. In some examples, revocation settings may be received from different business divisions or enterprises or business groups within an entity and may be compiled to form a standardized set of revocation settings that may be applied across the entity. Accordingly, upon receiving an item that may be associated with access and may include one or more applications to which access may be revoked and/or one or more users from which access may be revoked, the system may apply the standardized revocation settings to determine whether access should be revoked. If it is determined that access should be revoked, the system may revoke access to the one or more applications for the one or more users.
    Type: Application
    Filed: January 5, 2016
    Publication date: May 12, 2016
    Inventor: Stephen J. McWhirter
  • Publication number: 20160132691
    Abstract: A system and method for logging a non-reader into a corresponding user account is disclosed. A system can include a processor, a user interface, a display, and a camera. The processor can be programmed to display a first plurality of pictures and configure the user interface to allow the user to select a first picture corresponding to the user from the first plurality of pictures to provide a first authentication step and allow the user to select a second picture from a second plurality of pictures providing a second authentication step. The system can log the user into the corresponding user account if the second picture selected from the second authentication step corresponds to the first picture selected from the first authentication step. A system and method for logging multiple users into corresponding user accounts is also disclosed.
    Type: Application
    Filed: January 15, 2016
    Publication date: May 12, 2016
    Inventors: Susan Evelyn Gunnewig, Robin Robin Norton, Matthew Thomas Nolan
  • Publication number: 20160132692
    Abstract: Methods, systems, and computer-readable storage media for selecting columns for selecting encryption to perform an operator during execution of a database query. Implementations include actions of determining a current encryption type of a column that is to be acted on during execution of the database query, the column storing encrypted data, determining a minimum encryption type for performance of the operator on the column, selecting a selected encryption type based on the current encryption type, the minimum encryption type, and a budget associated with the column, and performing the operator based on the selected encryption type.
    Type: Application
    Filed: November 6, 2014
    Publication date: May 12, 2016
    Inventors: Florian Kerschbaum, Martin Haerterich, Isabelle Hang, Mathias Kohler, Andreas Schaad, Axel Schroepfer, Walter Tighzert
  • Publication number: 20160132693
    Abstract: An electronic signature comprises an authenticated audio and/or visual recording of a spoken assent that conforms to a pre-established phrase. Alternatively, an electronic signature comprises an authenticated visual recording of a series of physical gestures that conforms to a pre-established sequence. Rules are established with respect to how the assent is to be recorded and authenticated. These rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an audio and/or visual recording of the assent is generated. Location information that defines or approximates the geographical location where the document recipient recorded the assent is also optionally recorded as well. Once recorded, the assent can be authenticated using any of a variety of suitable authentication processes. An authenticated assent can be considered a legally binding electronic signature that forms a part of, or is otherwise associated with, the document.
    Type: Application
    Filed: November 6, 2014
    Publication date: May 12, 2016
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventors: Divij Kumar, Neha Saxena, Aditya Kumar Pandey, Nikhil Dang, Pulkit Jain
  • Publication number: 20160132694
    Abstract: Methods, systems, and computer program products for preventing sharing of sensitive information through code repositories are provided herein. A method includes detecting one or more items of sensitive information in a check-in associated with a given user in a shared version management system; automatically refactoring the one or more items of sensitive information in the check-in by externalizing the one or more items of sensitive information as an encrypted file; and upon acceptance by the user of one or more changes to the check-in, automatically (i) decrypting the encrypted file using one or more code repository credentials associated with the given user, and (ii) incorporating the one or more items of sensitive information into the check-in.
    Type: Application
    Filed: November 10, 2014
    Publication date: May 12, 2016
    Inventors: Pankaj Dhoolia, Senthil Kumar Kumarasamy Mani, Rohan Raju Padhye, Vibha Singhal Sinha
  • Publication number: 20160132695
    Abstract: A system may include a database, a processor coupled to the database, and a user module executed by the processor. The user module may be configured to receive a value for an attribute of a user and determine whether the value is derived from an assessment sponsored by an organization associated with the user. When the value is derived from the assessment sponsored by the organization associated with the user, the user module may store the received value in the database in a record associated with the user only and in a record associated with the organization and the user. When the value is derived from the assessment not sponsored by an organization associated with the user, the user module may store the received value in the database in the record associated with the user only.
    Type: Application
    Filed: July 17, 2015
    Publication date: May 12, 2016
    Inventors: Brian David DUFFY, John Sloan CARNEY, Jesse Cole ENGLISH
  • Publication number: 20160132696
    Abstract: A system and a method for managing privacy of data are provided. The method includes causing generation of a trigger notification notifying an access to one or more fields of a user-profile in a first application. The trigger notification generated is by a second application integrated with the first application. The first application includes a plurality of fields comprising sensitive data associated with the user-profile. The method further includes enforcing one or more access preferences corresponding to the one or more fields by the second application on the generation of the trigger notification. The one or more access preferences are based at least on one of a plurality of preconfigured rules and contextual information associated with the trigger notification. Enforcing the one or more access preferences facilitates in managing data privacy.
    Type: Application
    Filed: November 10, 2015
    Publication date: May 12, 2016
    Inventors: Kumar Mansukhlal Vidhani, Akhil Anand Dixit, Vijayanand Mahadeo Banahatti, Sachin P. Lodha
  • Publication number: 20160132697
    Abstract: Examples disclosed herein relate to a multi-tier storage based on data anonymization. A processor may store data in a first data tier. The processor may anonymize the data according to a first anonymization level and store the anonymized data in a second data tier. The processor may associate a first user with the first data tier and associate a second user with the second data tier.
    Type: Application
    Filed: April 25, 2013
    Publication date: May 12, 2016
    Inventor: Steven J Simske
  • Publication number: 20160132698
    Abstract: A semiconductor device module according to embodiments includes a specific information storage unit configured to store individual identification information and class information, a control unit configured to perform authentication processing of maintenance information with signature signed using the class information, generate license information with signature signed using the individual identification information, the license information being based on the maintenance information, and store the license information with signature in a non-volatile memory, and a register to which a setting value based on the license information is set by the control unit.
    Type: Application
    Filed: September 8, 2015
    Publication date: May 12, 2016
    Inventor: Shingo Miyajima
  • Publication number: 20160132699
    Abstract: Apparatus and method for data security in a multi-device data storage enclosure. In some embodiments, the storage enclosure has a housing with opposing first and second ends. A plurality of active elements are disposed within the housing including an array of data storage devices, a control board, and an interconnection arrangement which mechanically and electrically interconnects the plurality of storage devices with the control board. A control circuit encrypts user data stored on a selected data storage device using a cryptographic encryption function and an associated cryptographic key. The key is partitioned into a plurality of portions, with each portion stored in a different one of the active elements.
    Type: Application
    Filed: November 12, 2014
    Publication date: May 12, 2016
    Inventors: Mike Miller, Manuel A. Offenberg, Sumanth Jannyavula Venkata
  • Publication number: 20160132700
    Abstract: The problem of the present invention is to provide a tablet-type portable electronic device that can perform payment by way of a card, as well as having a compact size. A tablet-type portable electronic device of the present invention includes a plate-shaped housing having a front surface, a touch panel and display unit provided to the front surface of the housing, and reading units that perform reading processing of a card related to payment. The reading units are configured integrally with the housing.
    Type: Application
    Filed: January 13, 2016
    Publication date: May 12, 2016
    Inventor: Yoshihiro AZUMA
  • Publication number: 20160132701
    Abstract: A credit card reader shields a credit card, stores data from one or more credit cards simultaneously and then selectively broadcasts data associated with one of the cards. A slim, electromagnetically shielding housing has a cavity and a card reader for reading data from a credit card received in the cavity. A processor connects the card reader to a memory component, and connects both to an RFID device, where the credit card data can be broadcast to an RFID reader. A control interface allows a user to initiate reading credit card data, to select a card data set to store in memory, or to broadcast a dataset. A display shows transaction information and stored card data. A retractable input/output plug can engage a socket on another device to transmit and receive data. A memory card device can selectively store credit card data and transaction data.
    Type: Application
    Filed: January 18, 2016
    Publication date: May 12, 2016
    Inventor: Adrian Gluck
  • Publication number: 20160132702
    Abstract: Signal interference is automatically avoided between product proximity subsystems that emit signals through mutually facing presentation windows of different workstations. A magnetometer in each workstation determines a direction faced by a respective presentation window. A controller in each workstation controls a respective product proximity subsystem to emit and receive a signal with a first signal characteristic when the respective magnetometer determines that the respective presentation window faces a first direction, and controls a respective product proximity subsystem to emit and receive a signal with a different second signal characteristic when the respective magnetometer determines that the respective presentation window faces a different second direction.
    Type: Application
    Filed: November 10, 2014
    Publication date: May 12, 2016
    Inventor: ROBERT W. DIGIOVANNA
  • Publication number: 20160132703
    Abstract: The subject technology relates to methods for processing a payment using a mobile card reader. Implementations of the subject technology provide include steps for determining, using a first communication module, a first available bandwidth for data transacted between the card reader and a payment processing service, and determining, using the second communication module, a second available bandwidth for data transacted between a local device and the payment processing service. In some implementations, the method can further include steps for selecting a communication path for communicating with the payment processing service based on the first available bandwidth and the second available bandwidth. Systems and computer-readable media are also provided.
    Type: Application
    Filed: December 27, 2015
    Publication date: May 12, 2016
    Inventors: Mike Lamfalusi, Jesse Dorogusker, Dan Post, Thomas Templeton
  • Publication number: 20160132704
    Abstract: A method for creating an authentication tag includes receiving, at an authentication server, tagging device data and item data from a tagging device, authenticating, by the authentication server, the tagging device using the tagging device data, generating an authentication tag, and sending, by the authentication server, the authentication tag to the electronic device. The tagging device is affixed to an item, and the authentication tag comprises a digital signature provided by the authentication server.
    Type: Application
    Filed: January 5, 2016
    Publication date: May 12, 2016
    Inventors: Daniel W. ENGELS, Eric M. Smith, Ross Mandel
  • Publication number: 20160132705
    Abstract: A method and system for facilitating cost effective, reliable, system redundant, self-driving vehicles involves the employment of specialized lane marking components that permit unprecedented sensor feedback, and in particular, a system and method that enables accurate lane marking recognition despite adverse weather conditions, which presently pose problems experienced by self-driving systems that rely upon vision based camera systems.
    Type: Application
    Filed: November 11, 2015
    Publication date: May 12, 2016
    Inventors: Joseph E. Kovarik, James J. Kovarik
  • Publication number: 20160132706
    Abstract: The present invention discloses a method and apparatus for a mobile terminal to process a visual graphics code. The method mainly comprises: obtaining a digital image recorded by the mobile terminal; analyzing the digital image to obtain a visual graphics code in the digital image; decoding the visual graphics code and classifying decoded information obtained after decoding; and processing the decoded information according to the classification of the decoded information. The present invention can achieve an effect that the mobile terminal can adaptively recognize and process various types of visual graphics codes, and greatly enhance the ability for the mobile terminal to intelligently process a visual graphics code, thereby improving the function of the mobile terminal, and causing the mobile terminal to meet the need of a user better.
    Type: Application
    Filed: June 4, 2014
    Publication date: May 12, 2016
    Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Liqiang HUANG, Haiyin SHEN, Zhaochun SONG, Jiankai ZHAO
  • Publication number: 20160132707
    Abstract: The described mobile device for optically reading a machine-interpretable code, used for example in an order picking system for consumer and/or consumable goods, includes a head-mountable scanner with a code reader and a control unit controlling the head-mounted scanner to switch the code reader between a detection mode and a reading mode. In the detection mode, the code reader operates in a low power mode sufficient to detect the presence of a machine-interpretable code. The control unit switches the code reader into the higher-powered reading mode when the code is detected to optically read the code. A wireless communication device may also be provided to wirelessly transmit information corresponding to the scanned code to a remote receiving unit for storage and/or data processing.
    Type: Application
    Filed: June 2, 2014
    Publication date: May 12, 2016
    Applicant: OCADO INNOVATION LIMITED
    Inventors: Lars Sverker Ture LINDBO, Paul CLARKE, Matthew D. ENGLE
  • Publication number: 20160132708
    Abstract: A displaying method for a dynamic recognizable two-dimensional code is disclosed, including: providing at least a two-dimensional code; providing at least a recognizable image; and sequentially displaying the at least a two-dimensional code and the at least a recognizable image on a display unit of an electronic device according to a displaying pattern, which defining a displaying sequence of displayed images with associated displaying duration and time interval to the next in the sequence, defined as the time lapse between a displayed image ending and a next displayed image appearing. A decoding method for a dynamic recognizable two-dimensional code is further disclosed. The present invention can display various types of the dynamic recognizable two-dimensional code by setting a two-dimensional code, a recognizable image, and a displaying pattern aiming to improve users' convenience and facilitate further interaction between electronic devices.
    Type: Application
    Filed: November 2, 2015
    Publication date: May 12, 2016
    Inventor: Kuei-Sheng TSOU
  • Publication number: 20160132709
    Abstract: A system and method by which mail sorting equipment can correct postal addresses utilizing cloud technology. The real-time address correction system for correcting addresses of mail articles in real-time, comprises sorters, vision systems, controllers, processors, printers, local and remote computers, databases, bins, and a cloud system to tie together the local and remote computers in addition to the sorters and controllers. Corrected postal addresses are stored remotely and locally to the sorter and provided to the sorter as needed by a cloud based system. The system and method accommodates delays in providing the corrected postal addresses to the sorter.
    Type: Application
    Filed: December 29, 2015
    Publication date: May 12, 2016
    Inventors: Henry Daboub, Tom Glassman, Jeremy S. McWilliam, Tom Grauberger