Patents Issued in December 15, 2016
-
Publication number: 20160364540Abstract: A patient communication system includes at least one patient communication device including a speaker and a microphone, a device number database having at least one quasi-unique device number, at least one display device associated with at least one user code, a user code database including at least one user code, a barcode scanner and a computer processing component. The patient communication device is associated with at least one quasi-unique device number magnetically represented as a barcode. The quasi-unique device number is associated with a patient database. The computer processing component is configured to associate the user code and the quasi-unique patient communication device number, and invoke a pairing function to send a signal to activate a device communication connection session. The computer processing component is configured to allow display of patient information from the patient database on the display device.Type: ApplicationFiled: October 23, 2015Publication date: December 15, 2016Inventor: Regina Holmes
-
Publication number: 20160364541Abstract: The present invention is directed to a system for controlling access for a telehealth network, wherein the controlled access is automatic and intermittent. A trigger enables access to the telehealth network. A second trigger disables access to the telehealth network.Type: ApplicationFiled: June 8, 2016Publication date: December 15, 2016Applicant: Wellspring Telehealth, LLCInventors: Menville B. Flippen, Robert Peyton Reaves
-
Publication number: 20160364542Abstract: Utilizing graphical elements representing human bodies to estimate physical measurements of a user is described. In at least one example, a service provider can access a database storing a plurality of data items. The service provider can cause a set of data items of the plurality of data items to be presented to the user. Data items in the set of data items are associated with at least one graphical element representing a human body with individual magnitudes corresponding to individual dimensions of a plurality of dimensions. The service provider can receive data indicating a selection of a data item associated with a first magnitude associated with a first dimension and a second magnitude associated with a second dimension. The service provider can estimate physical measurements associated with the user based partly on a first magnitude and/or the second magnitude.Type: ApplicationFiled: October 23, 2015Publication date: December 15, 2016Inventors: Jake M. Hofman, Daniel G. Goldstein
-
Publication number: 20160364543Abstract: Systems and methods are provided for evaluating an eye of a patient. A modeling component is configured to determine a representation of at least the cornea of the eye from a three-dimensional structural image of the eye and at least one biomechanical property of the eye. A feature extractor is configured to extract a plurality of features from the model of at least the cornea of the eye. An ectasia evaluation component is configured to calculate at least one parameter associated with the risk of ectasia in the eye from the extracted plurality of features. A system output is configured to provide the calculated at least one parameter to one of a treatment system and a user.Type: ApplicationFiled: February 13, 2015Publication date: December 15, 2016Applicant: The Cleveland Clinic FoundationInventor: William J. Dupps, JR.
-
Publication number: 20160364544Abstract: Systems for diagnostic decision support utilizing machine learning techniques are provided. A library of physiological data from prior patients can be utilized to train a classification component. Physiological data, including time parameterized data, can be mapped into finite discrete hyperdimensional space for classification. Dimensionality and resolution may be dynamically optimized. Classification mechanisms may incorporate recognition of quantitative interpretation information and exogenous effects.Type: ApplicationFiled: June 16, 2015Publication date: December 15, 2016Inventors: Ritankar Das, Daniel Alan Price, Drew Alan Birrenkott
-
Publication number: 20160364545Abstract: Systems for diagnostic decision support utilizing machine learning techniques are provided. A library of physiological data from prior patients can be utilized to train a classification component. Physiological data, including time parameterized data, can be mapped into finite discrete hyperdimensional space for classification. Dimensionality and resolution may be dynamically optimized. Classification mechanisms may incorporate recognition of quantitative interpretation information and exogenous effects. A radial expansion or contraction around a time-parameterized patient descriptor may be utilized to select library data for use in an analysis.Type: ApplicationFiled: November 27, 2015Publication date: December 15, 2016Inventors: Ritankar Das, Daniel Alan Price, Drew Alan Birrenkott
-
Publication number: 20160364546Abstract: The present invention provides a system for merchandising at a sales facility. The system has a first wireless device of an owner, a second wireless device in the sales facility, a low-energy electronic beacon in the sales facility electronically having a transmission range not extending substantially beyond the sales facility, and a software application. When the software application is executed it causes the electronic beacon to transmit a polling beam in the sales facility, senses the presence of the first wireless device in the sales facility, determines the physical location of the first wireless device, searches the database for pertinent information of the owner; and displays on the display the identity of the owner, the physical location of the first wireless device, and the pertinent information.Type: ApplicationFiled: June 10, 2016Publication date: December 15, 2016Inventors: Paul D. Murphy, Will H. Phillips
-
Publication number: 20160364547Abstract: In a system and method for filling post-discharge medications of a hospital patient a first receive signal carries a consent indicator indicating consent by the hospital patient or a caregiver of the hospital patient to fill at least one post-discharge medication prescribed or to be prescribed to the hospital patient, a second received signal carries an identifier of one of a plurality of affiliated retail pharmacies at which to fill the at least one post-discharge medication, the consent indicator is transmitted to a Pharmacy Benefit Management (PBM) service used by a physician of the hospital patient to process the at least one post-discharge medical prescription prescribed thereby in order to gain access to the at least one medical prescription prescribed by the patient's physician, the at least one medical prescription from the PBM service is received based on the consent indicator, and the obtained at least one medical prescription is transmitted to the identified one of the plurality of retail pharmacieType: ApplicationFiled: June 10, 2016Publication date: December 15, 2016Inventors: Nathaniel J. Love, Harold Brent Hubble, David Scott Pallas
-
Publication number: 20160364548Abstract: A personalized nutritional and metabolic modification system is described. The personalized nutritional and metabolic modification system includes a processor and a visual interface, which through a software program and in response to a user data set provides an avatar which transforms its appearance in response to changes in the user data set over time. A food selector component of the software program provides customized meal plans according to the characteristics and goals of the particular individual using the system by using evidence-based formulae to develop and adjusts a comprehensive nutritional plan in response to the individual's goals and changing activity. Changes in appearance of the avatar in response to changes in the user data over time provide feedback for tracking the user's progress through the visual interface.Type: ApplicationFiled: June 15, 2016Publication date: December 15, 2016Inventors: Mark Springer, Layne Norton
-
Publication number: 20160364549Abstract: System and method for monitoring a patient's health condition is disclosed. The system assesses the patient's health condition based on a data collected by observing the physical activity of the patient and the physical state of the patient. The physical state is measured by vital sign measuring sensors. The patient's health condition is assessed by the system by collectively analyzing the physical activity, the physical state, and a correlation among the acquired data. Further, an authorized personnel issues an intervention to interact with the patient and to validate the assessment of the patient's health condition.Type: ApplicationFiled: June 15, 2016Publication date: December 15, 2016Inventors: Baoguo Wei, Ravi Kuppuraj
-
Publication number: 20160364550Abstract: A method implemented in a system including a copier or scanner connected to a digital rights management (DRM) server, which can prevent unauthorized copy or scan while allowing authorized users to obtain high quality hardcopies or scans. After the copier or scanner scans an input hardcopy document, the server determines whether the scanned document image matches any protected document in the DRM system. If a match is found, and the server determines that the user is permitted to copy or distribute the document, the server transmits an electronic version of the matched document from the DRM system to the copier or user-selected email recipients, so that the user or the email recipients can receive a high quality document. If a matched document is found but the user is not permitted to copy or distribute it, the copier or scanner deletes the scanned document image without printing or saving it.Type: ApplicationFiled: June 10, 2015Publication date: December 15, 2016Applicant: KONICA MINOLTA LABORATORY U.S.A., INC.Inventor: Rabindra Pathak
-
Publication number: 20160364551Abstract: A method, receiver, and server enable content protection over broadcast channels. A method for receiving a media license includes receiving broadcast media data including at least a portion that is protected and requesting a message from a content decryption module (CDM) of the receiver. The method includes receiving a license signaling message including encrypted license data and identifying one or more hash codes in the license signaling message. Additionally, the method includes identifying the encrypted license data for the receiver based on a mapping between the one or more hash codes and a hash of the message from the CDM. A server for providing a media license sends, to a receiver or a group of receivers, a license signaling message including encrypted license data and a license message hash indicating a hash code used to identify the receiver or the group of receivers for the encrypted license data.Type: ApplicationFiled: January 11, 2016Publication date: December 15, 2016Inventors: Imed Bouazizi, Youngkwon Lim
-
Publication number: 20160364552Abstract: Managing and accessing media items, including: a plurality of domains configured to provide access to media items; a plurality of clients associated with the plurality domains, and providing a pathway for accessing the media items; and a spanning application configured to track and aggregate accessible media items from the plurality of domains based on authentication and registration information and associated rights of the plurality of clients and the plurality of domains, wherein the spanning application enables accessing of the media items across the plurality of domains.Type: ApplicationFiled: March 15, 2016Publication date: December 15, 2016Inventor: Richard Berger
-
Publication number: 20160364553Abstract: In one embodiment, a system comprises: a content provider interface logic to receive a content license from a content provider, the content license to indicate that the system may distribute digital content associated with the content license to one or more devices; an attestation logic to attest a state of a first device; and a key management logic to generate a content key for the first device responsive to a request by the first device for the digital content and attestation of the first device state, and provide the content key to the first device. Other embodiments are described and claimed.Type: ApplicationFiled: March 15, 2016Publication date: December 15, 2016Inventors: Ned M. Smith, Rajesh Poornachandran, Nathan Heldt-Sheller
-
Publication number: 20160364554Abstract: As disclosed herein a method, executed by a computer, includes receiving a deployed computer application to be staged, where the deployed computer application includes monitored items corresponding to a downloaded code package, verifying the integrity of the downloaded code package included in the deployed computer application, and staging the deployed computer application to provide a staged computer application. The method further includes monitoring the staged computer application for usage of monitored items corresponding to the downloaded code package and billing a customer according to usage of the monitored items. A computer system, and a computer program product corresponding to the method are also disclosed herein.Type: ApplicationFiled: June 15, 2015Publication date: December 15, 2016Inventors: Nicholas K. Lincoln, Josephine D. Messa, Simon D. Stone
-
Publication number: 20160364555Abstract: An administrative system generates a sequence of passwords by iterative evaluation of a hash function, initiated from a private key value and continuing to a final, public key value. A current token is created that includes a current one of the passwords. A protected device tests the validity of the current password by inputting it to a hash function sub-chain. The current password is considered valid if, after hashing the current password n+1 times, where n corresponds to the number of tokens previously received, the result is a revealed value, such as a previously verified password of the public key value. At least one unit of a one-time programmable hardware device, such as processor fuses or anti-fuses, is then physically and permanently altered, thereby incrementing a count entry indicating the number of tokens received. The protected device performs a desired action only if the current password is verified.Type: ApplicationFiled: June 14, 2015Publication date: December 15, 2016Applicant: GUARDTIME IP HOLDINGS LIMITEDInventor: Nicholas CHILD
-
Publication number: 20160364556Abstract: A computer system and method for user authentication and theft prevention. The computer system includes a speaker, a display, a processor, a non-transitory computer readable medium operatively connected to the processor, and a logic stored in the non-transitory computer readable medium that, when executed by the processor, causes the computer system to perform a method. The method includes the step of accepting a first password input from a user. If a predetermined number of incorrect inputs occur, the computer system emits an alarm through the speaker and displays contact information of the owner on the display. The user must then input a second password distinct from the first password in order to stop the alarm. After the alarm stops, the user must input a third password, which may be different than the first password, in order to access the computer system.Type: ApplicationFiled: April 18, 2016Publication date: December 15, 2016Inventor: Llewellyn Daniel
-
Publication number: 20160364557Abstract: A method and system for authenticating a user is provided. The method includes receiving keyboard entries from a user while a cursor of a computer screen is positioned in a password field of the user. The keyboard entries include a series of alphanumeric characters forming part of a password of the user and one or more function keys that either delete one or more of the alphanumeric characters or do not affect the alphanumeric characters as entered into the password field. The key board entries are logged. The logged keyboard entries checked to determine whether they match a stored valid password for the user such that the one or more function keys that either delete one or more of the alphanumeric characters or do not affect the alphanumeric characters are considered part of the submitted password which is compared to the stored valid password for authentication of the user.Type: ApplicationFiled: August 24, 2016Publication date: December 15, 2016Inventor: Jared A. Limberg
-
Publication number: 20160364558Abstract: A system, method, and computer-readable storage device for receiving data representative of an input sample comprising a user's motion while entering information into a data input device, calculating a statistical summary of the input sample representative data, and comparing, using geometric and geospatial constructs, the calculated statistical summary of the input sample representative data to statistical summaries of representative data of previous input samples in a stored profile of a selected user to generate an indication whether the user is the selected user.Type: ApplicationFiled: August 26, 2016Publication date: December 15, 2016Inventors: John D. Rome, Bethann G. Rome, Thomas E. Ketcham, II
-
Publication number: 20160364559Abstract: A system includes one or more biometric sensors, a sensor hub and a trusted application execution environment. The sensor hub has exclusive access to the sensors and also isolates untrusted/unauthenticated portions of the operating system from direct access to unencrypted biometric data acquired by the sensors. During a biometric scan/collection process, only the sensor hub and a security engine can access the sensors and a storage component. The sensor hub reads the sensors to obtain the biometric data associated with the scan/collection process and stores the biometric data in the storage component. The security engine encrypts the biometric data before the sensor hub removes the access restrictions. Various components transfer the encrypted biometric data from the storage component to the trusted environment, which hosts algorithms for processing the biometric data.Type: ApplicationFiled: June 9, 2015Publication date: December 15, 2016Applicant: INTEL CORPORATIONInventors: Niraj Bali, Kumar N. Dwarakanath, Asaf Haskel, Gennadi Iosad, Anoop K. Jayasankaran, Victoria C. Moore, Vinod Gomathi Nayagam, David Zahavi
-
Publication number: 20160364560Abstract: An electronic device and an information processing method are disclosed in the disclosure. The electronic device comprises: a wearable apparatus capable of forming a ring or an approximate ring, which is able to surround a first cylinder; a first sensor arranged at least partly in the wearable apparatus and towards an interior of the ring or the approximate ring, and configured to detect first biometric information of at least part of a wearer's body surrounded by the wearable apparatus if the wearable apparatus is worn on the part of the wearer's body; a first processor arranged in the wearable apparatus, and configured to determine whether the first biometric information matches first preset biometric information to obtain a determination result and to perform security processing corresponding to the determination result based on the determination result.Type: ApplicationFiled: September 29, 2015Publication date: December 15, 2016Applicants: LENOVO (BEIJING) LIMITED, BEIJING LENOVO SOFTWARE LTD.Inventor: Yiqiang Yan
-
Publication number: 20160364561Abstract: The present invention relates to a mobile terminal and a method for controlling the same, the mobile terminal comprising: a camera; a display unit for displaying an image inputted through the camera; and a control unit which performs a user authentication on the basis of a received first facial image when the first facial image including facial features necessary for the user authentication is received through the camera, and which performs a user authentication by using at least one facial feature included in a received second facial image when the second facial image which lacks a part of the facial features is received.Type: ApplicationFiled: February 25, 2015Publication date: December 15, 2016Applicant: LG ELECTRONICS INC.Inventor: Wonhee LEE
-
Publication number: 20160364562Abstract: A method for storage array self-configuration is disclosed. The method includes accessing an authenticated token that comprises encrypted configuration data for a storage array, decrypting the configuration data, and based on the configuration data, executing with configuration executing components of the storage array a configuration of the storage array. The configuration is executed responsive to an authentication of the token.Type: ApplicationFiled: June 9, 2015Publication date: December 15, 2016Inventors: John Hayes, Par Botes, John Colgrove
-
Publication number: 20160364563Abstract: A method, system or computer usable program product for managing access to an electronic system through a touchscreen device including presenting a display of a first and a second scrolling stream of icons; responsive to user input, detecting contemporaneous selection of a first icon from the first scrolling stream and a second icon from the second scrolling stream; and responsive to the selection of the first and second icon matching an established unlock pattern, unlocking the electronic system.Type: ApplicationFiled: June 9, 2015Publication date: December 15, 2016Inventors: Faraz Ahmad, Adekunle Bello, Gregory J. Boss, Anto A. R. John
-
Publication number: 20160364564Abstract: An apparatus and method for controlling lock-screen output are provided. The electronic device includes a touch screen display, a processor electrically connected to the display, and a memory electrically connected to the processor. The memory stores instructions that, when executed, cause the processor to display a first screen comprising sets of objects to the display, configure, in response to a first touch input for selecting an object displayed on the first screen, at least one object included in a set of objects related to the selected object as at least one lock object for releasing a lock screen, and display a second screen configured with the at least one lock object. In addition, various embodiments identified in the specification are enabled.Type: ApplicationFiled: June 9, 2016Publication date: December 15, 2016Inventors: Chul Hwan LEE, Yong Joon JEON, Geon Soo KIM, Doo Suk KANG, Sung Hyuk SHIN
-
Publication number: 20160364565Abstract: Systems and methods authenticate with application extensions. An application extension requests a token from a local application. The local application generates a token and either inserts the token into a protected storage accessible only by the application extension being run by the current user or returns the token back to the application extension after being confirmed by the legitimate user. The application extension uses the token to authenticate itself with the local application.Type: ApplicationFiled: June 10, 2016Publication date: December 15, 2016Inventors: Pavel Studený, Petr Vanek, Martin Havelka
-
Publication number: 20160364566Abstract: Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code associated with a browser-based application from a web server. The computing device collects real-time data generated by at least one sensor of the computing device and performs a multi-factor security assessment of the browser-based application as a function of the collected real-time data and the application code. Further, the computing device establishes a client-level web application runtime security policy associated with the browser-based application in response to performing the multi-factor security assessment and enforces the client-level web application runtime security policy.Type: ApplicationFiled: May 27, 2016Publication date: December 15, 2016Inventors: Hong Li, Prashant Dewan
-
Publication number: 20160364567Abstract: A monitoring device inspects a redirect code inserted into content of a compromised web site, and, in accordance with a result thereof, when information of a new malicious website is described in the redirect code, the monitoring device acquires information of the malicious website and registers the information on a blacklist. In addition, the monitoring device unregisters information of the malicious website that is no longer described in the redirect code in the content from the blacklist.Type: ApplicationFiled: March 6, 2015Publication date: December 15, 2016Applicant: NIPPON TELEGAPH AND TELEPHONE CORPORATIONInventors: Mitsuaki AKIYAMA, Takeo HARIU
-
Publication number: 20160364568Abstract: Methods, media, and systems for detecting an anomalous sequence of function calls are provided. The methods can include compressing a sequence of function calls made by the execution of a program using a compression model; and determining the presence of an anomalous sequence of function calls in the sequence of function calls based on the extent to which the sequence of function calls is compressed. The methods can further include executing at least one known program; observing at least one sequence of function calls made by the execution of the at least one known program; assigning each type of function call in the at least one sequence of function calls made by the at least one known program a unique identifier; and creating at least part of the compression model by recording at least one sequence of unique identifiers.Type: ApplicationFiled: August 25, 2016Publication date: December 15, 2016Applicant: The Trustees of Columbia University in the City of New YorkInventors: Angelos D. Keromytis, Salvatore J. Stolfo
-
Publication number: 20160364569Abstract: Protecting a module intended to be executed by an executing device that has an operating system and that is either genuine or jailbroken is described.Type: ApplicationFiled: June 8, 2016Publication date: December 15, 2016Inventors: Antoine MONSIFROT, Charles SALMON-LEGAGNEUR
-
Publication number: 20160364570Abstract: An apparatus includes a first interface configured to be coupled to a storage device via a first bus. The apparatus includes a second interface configured to be coupled to a system processor (e.g., a central processing unit (CPU), a graphics processing unit (GPU), a digital signal processor (DSP), etc.) via a second bus. The apparatus further includes a processor configured to, during a boot process of the system processor, receive boot code from the storage device via the first interface. The processor is configured to generate a first value based on the boot code. The processor is further configured to provide the boot code to the system processor via the second interface.Type: ApplicationFiled: June 10, 2015Publication date: December 15, 2016Inventor: Allon J. Stern
-
Publication number: 20160364571Abstract: A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a computer system. The method may also include identifying a plurality of processes that have network activity. The method may further include capturing the identified plurality of processes that have network activity. The method may also include storing the identified captured plurality of processes that have network activity. The method may include monitoring a plurality of selected programs associated with an operating system of the computer system. The method may also include identifying a plurality of selected programs that have network activity. The method may further include capturing a plurality of screen capture images associated with the identified plurality of selected programs. The method may include storing, by the second component the captured plurality of system process activity.Type: ApplicationFiled: August 26, 2016Publication date: December 15, 2016Inventors: Chien Pang Lee, Hariharan Mahadevan
-
Publication number: 20160364572Abstract: Exemplary embodiments of the present invention provide an input device including a keyboard having at least two keys. A heating or cooling element is connected to each key. A sensor is configured to detect key temperature. A controller is connected to the sensor for controlling the key temperature.Type: ApplicationFiled: June 15, 2015Publication date: December 15, 2016Inventors: Guy M. Cohen, Lior Horesh, Mayank Sharma
-
Publication number: 20160364573Abstract: Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager compliant application by tagging source code for the application with a data tag to indicate that a data element associated with the source code is a sensitive data element, accessing a policy file comprising transitive rules associated with the sensitive data element, and generating one or more object files for the application from the source code. These techniques also include storing a sensitive data element in a secure memory region managed by a secure asset manager, and managing the sensitive data element according to a policy associated with the sensitive data element by an application from which the sensitive data element originates, the policy defining transitive rules associated with the sensitive data element.Type: ApplicationFiled: June 11, 2015Publication date: December 15, 2016Inventors: Michael J.T. CHAN, Lu XIAO, Rosario CAMMAROTA, Olivier Jean BENOIT, Saurabh SABNIS, Yin Ling LIONG, Manish MOHAN
-
Publication number: 20160364574Abstract: Embodiments are directed to displaying content projected from a source computing device on a display of a locked target computing device. Embodiments are also directed to projecting control information onto a locked target computing device's display and allowing control of a second computing device using the control information displayed on the target computing device. In one scenario, a target computing device receives a request to display content projected from another computing system. The target computing device determines whether receiving projected content from the other computing system is permissible on the target computing device when the target computing device is in a locked state. Then, upon verifying permissibility, the target computing device provisions computing resources to display the received content while in the locked state. The target computing device may also control functions on the other computing system using control information.Type: ApplicationFiled: June 11, 2015Publication date: December 15, 2016Inventors: Scott Plette, Aaron Wesley Cunningham, Steven Marcel Elza Wilssens, Vincent Bellet
-
Publication number: 20160364575Abstract: Disclosed are various examples for an interface reflecting the states of files. A client application determines the states of files accessible through a file management system. An interface is generated with user interface elements corresponding to the files. The user interface elements are modified to reflect the states of the corresponding files.Type: ApplicationFiled: June 15, 2015Publication date: December 15, 2016Inventors: Colleen Caporal, Muhammad Abeer
-
Publication number: 20160364576Abstract: Large scale system operation may be provided. Upon receiving an action request from a user, a determination may be made as to whether the user requires elevated permissions to perform the action request. In response to determining that the user requires elevated permissions to perform the action request, the action request may be forwarded to a lockbox for evaluation and a permission response may be received from the lockbox.Type: ApplicationFiled: August 25, 2016Publication date: December 15, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Alexander MacLeod, Andrey Lukyanov, Colin Nash, Jaskaran Singh, Rajmohan Rajagopalan, Vivek Sharma
-
Publication number: 20160364577Abstract: A cloud data encryption and security system includes a central computing authority and a network of computing devices. At least some of the computing devices are pod computing devices physically hosted by an operator. The pod computing devices include a central processing unit and a computer readable storage media in data communication with the central processing unit. Data is encrypted in the computer readable storage media so that the owner can access the data but the operator cannot access the data.Type: ApplicationFiled: September 16, 2014Publication date: December 15, 2016Inventor: Henry R. Williams
-
Publication number: 20160364578Abstract: A method and system for performing an operation on protected sensitive data. A processor of a data processing system receives, from a computing system: (i) the protected sensitive data, (ii) an identification of an operation that accesses and utilizes the protected sensitive data during performance of the operation, and (iii) a request to perform the operation, wherein the computing system is external to the data processing system. The processor de-protects the received protected sensitive data, which generates unprotected sensitive data from the protected sensitive data. The processor performs the operation, which includes accessing and utilizing the unprotected sensitive data and generating a result. After the operation is performed, the processor re-protects the unprotected sensitive data, which restores the protected sensitive data. The processor sends the result to the computing system.Type: ApplicationFiled: June 9, 2015Publication date: December 15, 2016Inventor: Holger Karn
-
Publication number: 20160364579Abstract: A method is provided in accordance with an aspect of the present disclosure. The method includes receiving and processing information from a first electronic device. The information includes at least location data, privacy zone data, and privacy distance data of the first electronic device. The method further includes calculating a current distance between the first electronic device and at least one sensor of a second electronic device, comparing the current distance with a predetermined privacy distance retrieved from the privacy distance data for the first electronic device, and determining an orientation of the at least one sensor of the second electronic device when the current distance is less than or equal to the privacy distance. The orientation is determined in relation to a privacy zone of the first electronic device.Type: ApplicationFiled: February 24, 2014Publication date: December 15, 2016Inventor: EDWARD JOSEPH WILMES
-
Publication number: 20160364580Abstract: Methods, systems and computer readable media described herein may facilitate the automatic identification of a need for additional authentication based on a received private message or PID, the urgency of a received private message, thus determining whether an immediate alert is output to a user, and/or a determination whether a protected message is to be archived for later retrieval via authentication. A device may be configured (e.g., by user input) to control selective decoding and display of messages (e.g., private messages), registration and configuration of blacklists, and/or defining criteria for determining urgency of a received message. Device configurations may be dynamically changed or updated according to user preferences and user treatment of received messages.Type: ApplicationFiled: June 15, 2016Publication date: December 15, 2016Inventors: Sundar Murthy Tumuluru, Albert F. Elcock, Aravind Soundararajan, Lakshmi Arunkumar
-
Publication number: 20160364581Abstract: An multi-level privacy evaluation technology is described for increasing the performance of applications or services that experience high volumes of queries for data with privacy attributes. The multi-level privacy evaluation technology evaluates data using a subset of privacy policy rules and privacy information determined for the data at a backend server and thereby reduces the volume of data that need to be filtered at a frontend server. The multi-level privacy evaluation technology first applies an initial privacy check on a large data set at the backend to authoritatively filter out any data that a viewing user is not permitted to view or access and return as results a smaller data set that the viewing user may be permitted to view or access. A full privacy check is then performed at the frontend on the smaller data set, resulting in reduction in the overall cost of performing privacy checks and reducing latency in displaying data to the viewing user.Type: ApplicationFiled: August 26, 2016Publication date: December 15, 2016Inventors: Bhupinder Singh Sethi, Shiyu Zhao, Yang Xia
-
Publication number: 20160364582Abstract: Techniques for protecting data in a processor are provided. An example method according to these techniques includes performing one or more operations on encrypted data using one or more functional units of a data path of the processor to generate an encrypted result. Performing the one or more operations includes: receiving at least one encrypted parameter pair at a functional unit, each encrypted parameter pair comprising an encrypted parameter value and a challenge value associated with the encrypted parameter value, the encrypted parameter being encrypted using a homomorphic encryption technique, the challenge value being used to recover a key used to encrypt the encrypted parameter value, and performing a mathematical computation on the at least one encrypted parameter. The method also includes outputting the encrypted result.Type: ApplicationFiled: June 12, 2015Publication date: December 15, 2016Inventors: Rosario CAMMAROTA, Olivier Jean BENOIT
-
Publication number: 20160364583Abstract: Techniques for encrypting the data in the memory of a computing device are provided. An example method for protecting data in a memory according to the disclosure includes encrypting data associated with a store request using a memory encryption device of the processor to produce encrypted data. Encrypting the data includes: obtaining a challenge value, providing the challenge value to a physically unclonable function module to obtain a response value, and encrypting the data associated with the store request using the response value as an encryption key to generate the encrypted data. The method also includes storing the encrypted data and the challenge value associated with the encrypted data in the memory.Type: ApplicationFiled: June 12, 2015Publication date: December 15, 2016Inventors: Olivier Jean BENOIT, Rosario CAMMAROTA
-
Publication number: 20160364584Abstract: A computer system includes program instructions to generate a first virtual keypad for entry of a first portion of a password, wherein the first portion includes a first value and a second value. The program instructions receive the first portion, wherein the first portion includes a first number of keys selected equal to the first value and the second value present in the first number of keys selected. The program instructions generate a second virtual keypad for entry of a second portion, wherein the second portion includes a third and a fourth value. The program instructions receive the second portion, wherein the second portion includes a second number of keys selected equal to the third value and the fourth value present in the second number of keys selected. The program instructions determine to grant a user access to an account associated with the account password.Type: ApplicationFiled: September 2, 2016Publication date: December 15, 2016Inventors: Tao Jiang, Ping Li, Xian D. Meng, George J. Romano, Jianhua Rui, Zhao L. Wang
-
Publication number: 20160364585Abstract: An inverting amplifier creates a voltage C using a reference voltage (voltage B) as a reference point. An adder composed of two input inverting amplifier circuits ultimately creates a voltage D by carrying out weighted addition of the voltage A and the voltage C. By using the voltage D created by an input front-end circuit, the internal functions of the control IC can prevent the operating points and control amounts for each function from being different relative to the input voltage and make it possible to distinguish voltage within the control IC from zero voltage when the lowest input voltage is received.Type: ApplicationFiled: May 10, 2016Publication date: December 15, 2016Applicant: Fuji Electric Co., Ltd.Inventor: Nobuyuki HIASA
-
Publication number: 20160364586Abstract: Indicia-reading systems that interface with a user's nervous system include a device with electrodes capable of detecting electromagnetic signals produced in the brain or skeletal muscles of a user. The systems also include a computer with a processor and memory. The computer is configured to monitor the electromagnetic signals that are detected by the electrodes. The computer is also configured to perform operations in response to certain monitored electromagnetic signals. The computer may be an indicia-reading device configured to acquire indicia information in response to certain detected electromagnetic signals. The computer may also be a vehicle-mounted computer configured to sound an alarm in response to certain detected electromagnetic signals.Type: ApplicationFiled: June 10, 2015Publication date: December 15, 2016Inventor: Erik Todeschini
-
Publication number: 20160364587Abstract: The present invention relates to an intelligent energy management system and an energy management method for a passive radio frequency tag. Digital conversion is performed on the amplitude of a DC signal absorbed and rectified by an inductance coil antenna of the tag, by providing an intelligent energy management module. The input terminal of the intelligent energy management module is respectively connected to a power supply voltage detection and judgment circuit and a demodulator circuit, and configured to judge the level of charge and enabling state of the tag; and the output terminal thereof is respectively connected to a discharge path, a bias current source and an analog circuit module, and configured to bring the analog circuit module into the optimal operating state according to the enabling state of the tag, or to turn-off/get dormant each analog circuit module thus to reduce power consumption of the tag and improve the sensitivity of the tag.Type: ApplicationFiled: July 5, 2016Publication date: December 15, 2016Inventor: Patrick,Bian Wu
-
Publication number: 20160364588Abstract: Systems and methods are disclosed for tracking and utilizing data tag carriers involving a plurality of terminals, and associated data tags and data tag carriers. A first terminal obtains an initial data tag from an initial data tag carrier. The initial data tag includes initial service processing information and information about the initial data tag carrier. A first data tag carrier group is coupled to the first terminal and comprising at least one first data tag carrier. The first data tag carrier group obtains the initial data tag from the first terminal and to release the first data tag through the first data tag carrier. The first data tag includes a first service processing information, information about the first terminal and the first data tag carrier. The disclosed systems and methods are simple, easy to implement, and of low cost.Type: ApplicationFiled: July 18, 2014Publication date: December 15, 2016Inventor: Lidong Qu
-
Publication number: 20160364589Abstract: A read chamber device is disclosed for use within a radio frequency identification (RFID) scanning enclosure which provides a means of reading a plurality of cartons moving through the enclosure via a conveyor belt. The enclosure is positioned over a section of the conveyor belt, such that the plurality of cartons on the conveyor belt pass directly through the enclosure. The read chamber device is positioned centrally to the enclosure and projects a read zone via an antenna positioned in-line with the flow of the conveyor which allows the read chamber to read a large variety of inlays without changing the configuration settings of the device. The RFID scanning enclosure also utilizes dynamic power indexing (DPI) to combine parameter inputs to create a smarter reader that can anticipate changes. The reader is then manipulated in real-time to adapt to the needs of each carton and the tunnel scanning environment.Type: ApplicationFiled: June 10, 2015Publication date: December 15, 2016Inventor: Mark W. Roth