Patents Issued in March 2, 2017
-
Publication number: 20170061077Abstract: A method and system being used to provide patient/provider information for use by a medical visual referral tool, the method being carried out by one or more servers, wherein the one or more servers comprises at least one database stored on a computer-readable memory, wherein each of the servers comprises a plurality of electronic computing machines, wherein the electronic computing machines each comprise a processor and a computer-readable memory, and wherein the method comprises: obtaining data from data sources, standardizing the data, storing the data in one or more of the databases, receiving a client request from a client computing machine, processing the client request, and sending a response to the client computing machine, wherein the response provides the patient/provider information usable for the medical visual referral tool, and wherein at least some of the patient/provider information is to be displayed on an electronic geographical map at the client machine.Type: ApplicationFiled: August 26, 2016Publication date: March 2, 2017Inventors: Patrick CLINE, Robert NARY, Michael HOXTER, Jerry SHULTZ
-
Publication number: 20170061078Abstract: Provided is a protocol chart creation device, including: an initial symbol arrangement unit configured to arrange an initial symbol representing an initial state of a container for containing a specimen; a procedure line arrangement unit configured to arrange a procedure line representing a process order for the container in a direction along a first axis from the initial symbol; a process symbol arrangement unit configured to arrange a process symbol representing a process to be carried out on the container along the procedure line, and to arrange, when there are a plurality of processes to be carried out on one container, the process symbols representing the processes along the procedure line; and a separation unit configured to separate arrangements of the initial symbols, the procedure lines, and the process symbols for different containers in a direction along a second axis intersecting the first axis.Type: ApplicationFiled: November 16, 2016Publication date: March 2, 2017Inventors: Toru NATSUME, Kenji MATSUKUMA, Takashi NAGASAKI, Makoto UMENO, Tatsuro IPPOSHI, Hirokazu KARIYAZAKI
-
Publication number: 20170061079Abstract: A computer implemented method of optimizing delivery of treatment management plans. The method includes receiving an input identifier of a diagnosis by a store processor, processing by the store processor each of a dietary therapy store, a medical therapy store, a natural product supplement therapy store, a bioenergetics/bioinformation therapy store, a physical activity therapy store, a mental and emotional therapy store, an environmental exposure therapy store, a precautions and consents store, and a costs store, to determine recommendations of each store, and outputting a treatment management plan formatted by categories of each store.Type: ApplicationFiled: August 31, 2016Publication date: March 2, 2017Inventor: J. William LaValley
-
Publication number: 20170061080Abstract: A method for assessing and analyzing one or more drugs, adverse effects and associated risks, and patient characteristics resulting from the use of at least drug of interest is disclosed. The method comprises the steps of selecting one or more cases for analysis, said cases describing the behavior between at least one drug of interest and a patient genotype; profiling statistically derived values from multiple cases related to the safety of the at least one drug, wherein at least one filter is employed for deriving said values; at least one data mining engine; and an output device for displaying the analytic results from the data mining engine. A system for performing the method is likewise disclosed.Type: ApplicationFiled: March 3, 2016Publication date: March 2, 2017Inventor: Victor V. Gogolak
-
Publication number: 20170061081Abstract: Methods and systems are disclosed for tracking quality measures in abstracted documents. Embodiments include, determining, based on the abstracted content, a quality measure category, obtaining a quality measure definition corresponding to a quality measure included in the determined quality measure category, determining, based on keywords corresponding to the criterion, whether a portion of the abstracted content satisfies a criterion, recording, in association with the criterion, a reference to the portion of the abstracted content that satisfies the criterion; and selectively generating, a report including the query corresponding to the criterion, a query response, and the portion of the abstracted content satisfying the criterion.Type: ApplicationFiled: October 11, 2016Publication date: March 2, 2017Inventors: Vasudevan Jagannathan, Henry W. Ware, Brian A. Ellenberger, Sandra J. Leonard
-
Publication number: 20170061082Abstract: The present invention relates to a relay service providing method for a connection between a consumer (e.g., a patient) and a provider (e.g., a hospital) on the basis of the Internet, and more particularly, to a service relay method considering a matching degree comprising: calculating a matching degree on the basis of various matters, such as a consumer's taste or requirements and a provider's merit or supply history, among matters irrespective of price; and connecting a consumer and a provider having a matching degree of a predetermined reference value or above, wherein the consumer side provides a bidding document to only providers having the matching degree of the predetermined reference value or above and compares the bidding document with a corresponding bid document so as to allow making a choice considering a cost and a service.Type: ApplicationFiled: April 21, 2014Publication date: March 2, 2017Inventor: Jaeseok JEONG
-
Publication number: 20170061083Abstract: An example embodiment provides a method, including: communicating, using a plurality of receivers placed throughout a hospital, with a tag affixed to a moveable object; receiving, via one or more of the plurality of receivers, location data of the tag affixed to the movable object; identifying, using data received from the tag, the movable object; determining, based on the one or more of the plurality of receivers transmitting the location data, a location within the hospital of the movable object; associating, using location information of a database, a use state for the movable object based on the location of the movable object within the hospital, the database storing the location information associated with placements of the plurality of receivers and a use state for a movable object associated with the placements; and updating, using a processor, a use state for the movable object. Related methods and products are also described and/or claimed herein.Type: ApplicationFiled: November 14, 2016Publication date: March 2, 2017Inventor: Stephen S. Jackson
-
Publication number: 20170061084Abstract: A health insurance exchange is disclosed. The health insurance exchange collects health information from consumers and uses this information to derive Wellness Index Number (WIN). The WIN number of a consumer is used by insurance companies to offer health insurance plans to the consumer.Type: ApplicationFiled: September 2, 2015Publication date: March 2, 2017Inventor: Ashish Pandya
-
Publication number: 20170061085Abstract: This disclosure describes a computerized system for managing medical information, the system including at least one computing device configured to receive a plurality of medical documents, determine skip grams comprising tokens for the plurality of medical documents, wherein each of the skip grams comprises one or more tokens of at least one of the medical documents, and populate a trie data structure based on the skip grams. The at least one computing device is further configured to prune the plurality of nodes of the trie based on one or more criteria to produce a pruned trie of nodes, determine rules for associating medical billing codes with the skip grams of the pruned trie of nodes based on pointwise mutual information, and output the determined rules.Type: ApplicationFiled: August 22, 2016Publication date: March 2, 2017Inventors: Michael A. Nossal, Guoli Wang
-
Publication number: 20170061086Abstract: The described invention provides a method, a system and non-transitory computer readable medium storing computer program instructions that when executed on a processor cause communicatively linked clinical outcome tracking and analysis modules to perform operations that use CNA-guided care to improve clinical outcomes at a specific patient level and to decrease total cost of care at the population level.Type: ApplicationFiled: November 14, 2016Publication date: March 2, 2017Inventor: Andrew L. Pecora
-
Publication number: 20170061087Abstract: When evaluating patient cases to determine complexity thereof, a computer-aided stratification technique is applied to analyze historical patient case diagnoses and correctness thereof in order to calculate a stratification score (20) for each of a plurality of abnormality types and/or anatomical locations. When a new patient case is received, the computer-aided stratification technique is applied to evaluate the patient case in view of historical data and assign a stratification score thereto. A ranked list (21) of current patient cases can be generated according to stratification scores, and physician workload can be adjusted as a function thereof so that workload is balanced across physicians and/or according to physician experience level.Type: ApplicationFiled: April 16, 2015Publication date: March 2, 2017Inventors: LILLA BOROCZKY, MICHAEL CHUN-CHIEH LEE
-
Publication number: 20170061088Abstract: A method includes receiving an indication of an order for a patient having a diagnosis. The method also includes determining an estimated reimbursement or an estimated average cost to treat for the order based on the diagnosis. The method further includes displaying, to a user, the estimated reimbursement or an estimated average cost to treat for the order.Type: ApplicationFiled: November 14, 2016Publication date: March 2, 2017Inventor: George Fidone
-
Publication number: 20170061089Abstract: A system (38) and a method (150) for optimization of alarm settings of a clinical alarm algorithm. Clinical monitoring data (CMD) employed by the clinical alarm algorithm is acquired over a user-defined period of time. Proposed settings are determined for one or more parameters of the clinical alarm algorithm. The clinical monitoring algorithm is applied to the acquired CMD with the proposed settings to determine regeneration results predicting alarm load for different combinations of the proposed settings.Type: ApplicationFiled: March 3, 2015Publication date: March 2, 2017Applicant: KONINKLIJKE PHILIPS N.V.Inventors: Stijn De Waele, Larry Nielsen, Lin Yang
-
Publication number: 20170061090Abstract: An information processing apparatus is connected via a network with an external server that manages identification information of wireless apparatuses in a facility, and information about detector apparatuses that detect identification information of the wireless apparatuses.Type: ApplicationFiled: August 23, 2016Publication date: March 2, 2017Applicant: Ricoh Company, Ltd.Inventor: Masahiko ITOH
-
Publication number: 20170061091Abstract: Disclosed herein are systems, devices, and methods related to patient response to outreach options of healthcare facilities. Examples involve determining patient response metrics for patients based on patient data and/or other data. A patient response metric indicates a probability that a patient will perform a medically-related patient action in response to an outreach option. Example output data can indicate various outreach options, patient response metrics for outreach options, expected value of implementing outreach options, and/or recommendations of outreach options.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Adam McElhinney, Alexander Gutfraind, Nelson Bowers
-
Publication number: 20170061092Abstract: Remote collaboration systems and methods may involve a server in communication with a network and a plurality of remote computers in communication with the network. The server may connect to the plurality of remote computers via the network. The server may generate a collaboration environment for each of the remote computers. The server may assign an access level from a plurality of access levels to each of the remote computers, the plurality of access levels including a view only access level and an edit access level. The server may provide secure access to a file to each of the remote computers at the access level assigned to each of the remote computers via the collaboration environment. The file can be remotely viewed by any of the remote computers having a view only access level and remotely viewed and remotely edited by any of the remote computers having an edit access level via the collaboration environment.Type: ApplicationFiled: August 21, 2015Publication date: March 2, 2017Inventors: Shahin BARATPOUR, Sanjay RAO
-
Publication number: 20170061093Abstract: A dashboard user interface method includes displaying a navigable list of patients each associated with a target disease with a calculated risk level, displaying historic and current data associated with a selected patient in the patient list identified as being associated with the target disease, displaying an identification of key factors in the selected patient's health data that contribute to the risk level for the selected patient with respect to the target disease, receiving and displaying care management notes for transitional care intervention for the selected patient, and displaying automatically-generated intervention and treatment recommendations.Type: ApplicationFiled: August 25, 2015Publication date: March 2, 2017Inventors: Rubendran AMARASINGHAM, Timothy S. SWANSON, Sambamurthy NALLA, Yu QIAN, George R. Oliver, Kimberly P. GERRA
-
Publication number: 20170061094Abstract: The present invention includes methods and system for improving a medication adherence rate of a patients including constructing a medication list for the patient and notifying the patient of each dosing event. A response or non-response of the patient to the notification is recorded and a medication adherence rate for each patient is calculated and displayed to the patient and/or medical professional.Type: ApplicationFiled: August 26, 2016Publication date: March 2, 2017Inventor: Arvind Movva
-
Publication number: 20170061095Abstract: A medical enclosure includes a frame that defines an enclosure for storing medical supplies. An electronic controller is integrated with the frame and configured to receive access credentials from a user. At least one door covers the enclosure, the door having a latch for securing the door to the frame, the latch being arranged to selectively lock and unlock the door in response to commands from the electronic controller. The electronic controller is programmed to unlock the door to provide access to the medical supplies to the user based on the user's credentials.Type: ApplicationFiled: August 29, 2016Publication date: March 2, 2017Inventors: David Waskin, John Pierson
-
Publication number: 20170061096Abstract: Methods, computer systems and computer readable media for generating workflow driven barcodes for medical devices are provided. In embodiments, after an identification of a patient and an infusion has been received and communication has been established between an infusion device and an electronic medical record associated with the patient, a digital barcode is provided via a user interface of an infusion device. Once the barcode is scanned, the order is communicated to the infusion device. After a confirmation is received from the clinician, the infusion begins.Type: ApplicationFiled: August 31, 2015Publication date: March 2, 2017Inventors: LISA KELLY, JUDITH A. ZAKUTNY, BRYAN MUEHLMEIER
-
Publication number: 20170061097Abstract: Methods, computer systems and computer readable media for modifying characteristics of a medical device via a mobile device are provided. In embodiments, data communicated by an infusion device providing an infusion to a patient is provided to a mobile device associated with a clinician. A notification associated with the infusion device is received and communicated to the mobile device. Confirmation of the notification is received from the clinician via the mobile device and the notification is communicated to the infusion device. Characteristics of the infusion are automatically modified in accordance with the notification.Type: ApplicationFiled: August 31, 2015Publication date: March 2, 2017Inventors: LISA KELLY, JUDITH A. ZAKUTNY, BRYAN MUEHLMEIER
-
Publication number: 20170061098Abstract: A method and system for a centralized professional platform for interaction between patients and physicians is disclosed. The method and system includes a website arrangement containing at least one profile having a medical study containing at least one medical image and personally identifying material. The method and system further includes a computer server coupled to the website arrangement and programmed to (i) remove the personally identifying material from the medical study, creating a redacted medical study; (ii) storing the redacted medical study; (iii) authorizing a plurality of authorized individuals to access the redacted medical study; and (iv) facilitate discussion between the plurality of authorized individuals about the redacted medical study to form a first opinion of the redacted medical study. The computer server stores the first opinion of the authorized individuals.Type: ApplicationFiled: August 23, 2016Publication date: March 2, 2017Inventor: Nagaraj Setty Holalkere
-
Publication number: 20170061099Abstract: Methods and systems for using contextual information to generate reports for image studies. One method includes determining contextual information associated with an image study, at least one image included in the image study loaded within a reporting application and automatically selecting, with an electronic processor, at least one discrete data element for a structured report generated using the reporting application for the image study based on the contextual information. The method also includes receiving a value for the at least one discrete data element and adding the value for the at least one discrete data element to the structured report.Type: ApplicationFiled: August 23, 2016Publication date: March 2, 2017Inventor: Marwan Sati
-
Publication number: 20170061100Abstract: Methods and systems for using contextual information to generate reports for image studies. One method includes determining contextual information associated with an image study wherein at least one image included in the image study loaded in a reporting application. The method also includes automatically selecting, with an electronic processor, a vocabulary for a natural language processing engine based on the contextual information. In addition, the method includes receiving, from a microphone, audio data and processing the audio data with the natural language processing engine using the vocabulary to generate data for a report for the image study generated using the reporting application.Type: ApplicationFiled: August 23, 2016Publication date: March 2, 2017Inventor: Marwan Sati
-
Publication number: 20170061101Abstract: Introduced are methods and systems for gathering information from a healthcare consumer using context-based questions, and progressively presenting information associated with a ranked list of suggested healthcare providers. First, the server gathers information associated with the healthcare consumer using context-based questions. Each question is formulated based on the answers the healthcare consumer has provided to previous questions, so that minimal and necessary questions are asked. Second, the server progressively sends to a healthcare consumer device, information associated with a ranked list of suggested healthcare providers. The first information tier sent to the healthcare consumer device includes a graphic representing the match strength between the healthcare consumer and the healthcare provider, and the number of similar healthcare consumers the healthcare provider has treated. Based on the healthcare consumer interest, the server displays additional information to the healthcare consumer.Type: ApplicationFiled: October 16, 2015Publication date: March 2, 2017Inventors: Mary Audrey Hampden, Sumul Mahendra Shah, Rebecca Ackermann, Nicholas C. Dunkman, Jorge A. Caballero, Abraham M. Othman, David A. Vivero
-
Publication number: 20170061102Abstract: Embodiments of various aspects described herein are directed to systems (e.g., computer systems), computer-implemented methods, and non-transitory computer-readable storage media for identifying or selecting high value patients and applications thereof.Type: ApplicationFiled: February 20, 2015Publication date: March 2, 2017Inventors: Griffin M. WEBER, Isaac S. KOHANE
-
Publication number: 20170061103Abstract: There is provided a system for operating a clinical trial, and a method for conducting a clinical trial using said system, wherein the system is capable of uniting all stakeholders in a single instance model. More particularly there is provided a paperless system for operating and management of data for a clinical trial which is capable of operating across different user levels, and is adapted to provide data to organisations in a variable hierarchical tiered environment, and which provides built-in privacy protection.Type: ApplicationFiled: July 8, 2016Publication date: March 2, 2017Applicant: eClinicalHealth LimitedInventors: William D. Bain, Ian M. Mills
-
Publication number: 20170061104Abstract: A computing system record security architecture comprises, in one example, a record generation component configured to generate a record in a computing system, the record having an owner property that identifies a first user as an owner of the record, a record security component configured to control modification of the record based on the owner property of the record, and a record ownership transfer component configured to receive an indication of an ownership transfer of the record from the first user to a second user and to modify the owner property to identify the second user as the owner of the record.Type: ApplicationFiled: September 22, 2015Publication date: March 2, 2017Inventors: Jaskaran Singh, Dipak S. Pawar, Andrew W. Lu
-
Publication number: 20170061105Abstract: The present invention is configured to acquire a license having a valid time period and periodically renew the license. The present invention stops the regular renewal of the license if an environment executing an application is inactivated, and restarts the regular renewal of the license if determining that the environment is activated.Type: ApplicationFiled: August 26, 2016Publication date: March 2, 2017Inventor: Tomonori Minagawa
-
Publication number: 20170061106Abstract: Computer-implemented systems, methods, and computer-readable media for generating and executing anti-reverse engineering software include receiving at least one of a set of input instructions and a set of input values; creating a deterministic environment; executing one or more functions corresponding to at least one of the set of input instructions and the set of input values while simultaneously generating a set of output values corresponding to the executed one or more functions, wherein the set of output values is generated based on a deterministic function of the computing device executing the one or more functions; and outputting the set of output values.Type: ApplicationFiled: July 8, 2015Publication date: March 2, 2017Inventor: Binh K. Thai
-
Publication number: 20170061107Abstract: A system and method of managing applications and event notifications using a cursor-based GUI, wherein the cursor-based GUI is located adjacent to the cursor and provides a user with the ability manage and monitor a plurality of dynamically updated applications, commands and event notifications via a persistent and centralized interface. Since the cursor-based GUI is persistent in nature, the plurality of applications, commands and event notifications can be accessed regardless of the user's computer environment. The user can manage user authentication requirements and other configuration information for the cursor-based GUI.Type: ApplicationFiled: November 11, 2016Publication date: March 2, 2017Inventor: James J. Nicholas, III
-
Publication number: 20170061108Abstract: A fingerprint sensing device includes a sensing circuit configured to extract sensing data from nodes included in each of sampling regions of a sensor array. The fingerprint sensing device also includes a control circuit configured to calculate a number of the nodes based on the extracted sensing data to produce sensing data distributions for each of the sampling regions and compare the sensing data distributions with reference distributions, configured to determine that the sampling regions from which the sensing data distributions corresponding to the reference distributions are extracted are effective contact regions, and configured to generate fingerprint information from the sensor array when the number of effective contact regions is greater than or equal to a threshold.Type: ApplicationFiled: April 19, 2016Publication date: March 2, 2017Applicant: SAMSUNG ELECTRO-MECHANICS CO., LTD.Inventors: Tae Hyeon KWON, Kang Joo KIM, Yong Il KWON
-
Publication number: 20170061109Abstract: An electronic apparatus, a recording medium, and an operating method of an electronic apparatus are disclosed. In one embodiment, an electronic apparatus comprises a case, a first hardware button located in one of a right side surface and a left side surface of the case, a fingerprint sensor configured to detect a fingerprint of a finger being in contact with the first hardware button, an operation button, and at least one processor. The at least one processor is configured to execute user authentication based on a fingerprint detection result obtained by the fingerprint sensor and to execute a function assigned to the operation button in response to an operation performed on the operation button. The at least one processor executes the user authentication and the function when an operation is performed on the operation button in a state in which the first hardware button is in contact with a finger.Type: ApplicationFiled: August 23, 2016Publication date: March 2, 2017Inventor: Hayato TAKENOUCHI
-
Publication number: 20170061110Abstract: An accessory configured to authenticate a transaction is disclosed. The accessory comprises a communication circuit configured to communicate with a transaction system. The accessory further comprises at least one data collection device and a processor. The processor is in communication with the communication circuit and the data collection device. The processor is configured to compare captured data captured by the data collection device with stored data to generate an authentication of a previously identified operator.Type: ApplicationFiled: August 25, 2016Publication date: March 2, 2017Inventors: Thomas S. Wright, Steven L. Geerlings, Marc A. Smeyers
-
Publication number: 20170061111Abstract: An electronic device is provided. The electronic device includes an output module, a sensing module, and a processor. The output module is configured to output contents. The sensing module is configured to obtain at least one of user information and environment information. The processor is configured to control an operation of the electronic device in response to at least one of the user information and the environment information depending on an attribute of the contents.Type: ApplicationFiled: October 21, 2016Publication date: March 2, 2017Inventors: Tae-Young LEE, Soo-Jin PARK, Heung-Sik SHIN, Bo-Hyun YU, Ki-Tae LEE, Cheol-Ho CHEONG, Jin-Gil YANG, Jae-Seok JOO
-
Publication number: 20170061112Abstract: A method of two-factor authentication for gaining access to an application using at least a first device and a second device registered to a user. The first and second devices each have a plurality of sensors for detecting activity modalities of the user on the first and the second devices and are in communication with a server computer. In the method, the server computer: receives credentials and detected activity modality for gaining access to the application from the first device; sends a request to the second device registered to the user for activity modality of the user; receives the detected activity modality from the second device; compares the detected activity modality of first device to the detected activity modality of the second device; and if the detected activity modalities of first device and the second device match, granting access to the user on the first device to the application.Type: ApplicationFiled: August 27, 2015Publication date: March 2, 2017Inventors: Sambaran Bandyopadhyay, Vijay Ekambaram, Saravanan Sadacharam, Ashok Pon Kumar Sree Prakash
-
Publication number: 20170061113Abstract: Systems and methods for testing to tell computers and humans apart and generating said tests are described. To generate a test, a selection of a range of characters at least including the 8-bit ASCII character range is received. Each character in the selected range of characters is tested to determine if the character has a glyph in the selected font, if the character is a whitespace character, and if the character leaves a visible impression. From all the characters in the selected range of characters that pass the tests, a plurality of characters is selected for a challenge, and a larger set of characters (that includes the plurality of characters from the challenge) is selected for a response. An image is generated that includes the challenge and the response, and a solution threshold is calculated based on the location of the challenge characters within the generated response.Type: ApplicationFiled: August 28, 2015Publication date: March 2, 2017Inventor: Gursev Singh KALRA
-
Publication number: 20170061114Abstract: Systems and methods for testing to tell computers and humans apart and generating said tests are described. An interface is generated that includes a challenge and a response. The challenge includes a plurality of challenge characters in a challenge region. The response includes a plurality of response characters that includes the plurality of challenge characters drawn in a response region. The drawing the response characters includes drawing a first response character, calculating a second set of coordinates for a second response character, and drawing the second response character. After all of the response characters have been drawn, locations of each of the challenge characters within the response are identified, and a maximum allowed distance is calculated based on the identified locations of the challenge characters within the response.Type: ApplicationFiled: August 28, 2015Publication date: March 2, 2017Inventor: Gursev Singh KALRA
-
Publication number: 20170061115Abstract: Systems and methods for testing to tell computers and humans apart and generating said tests are described. An interface is generated that includes a challenge and a response is provided, and a plurality of user selections of locations in the interface are received. A server compares the x coordinate and the y coordinate of each user selection with x and y coordinates for a subset of the plurality of characters in the response to obtain a distance value for each user selection. The server then sums the distance values for each user selection to obtain a total distance value. The server subsequently compares the total distance to a predetermined threshold, the server validating the user response when the total distance is less than the predetermined threshold, the validating causing access to be provided to web content specified in the user request.Type: ApplicationFiled: August 28, 2015Publication date: March 2, 2017Inventor: Gursev Singh KALRA
-
Publication number: 20170061116Abstract: A method of generating an identifier for an electronic device, wherein the electronic device includes a processor and a memory. The memory is communicatively coupled to the processor and includes a plurality of memory locations. The method includes identifying a target memory segment. The target memory segment includes a subset of the plurality of the memory locations. The method further includes accessing, by an access procedure, the target memory segment. One or more execution behavioral properties associated with the execution of the access procedure are monitored. A device identifier is generated based on the one or more execution behavioral properties. A computer-implemented method for authenticating the device identifier of an electronic device is also disclosed. Computer systems and computer program products corresponding to the invention are also disclosed.Type: ApplicationFiled: September 21, 2016Publication date: March 2, 2017Inventors: Jonathan Dunne, Liam Harpur, Matthew F. Rutkowski
-
Publication number: 20170061117Abstract: An information processing device having a lock function for restricting user operations and a mechanism executed by this information processing device are provided in which the information processing device includes: an input unit for receiving a first password and a specified location from a user; a mode setting unit for switching to a restricted mode restricting at least some of the functions of the information processing device in response to receiving the first password and location; and a releasing unit for releasing the restricted mode on condition that the information processing device has reached the specified location.Type: ApplicationFiled: October 21, 2016Publication date: March 2, 2017Inventors: Taku Aratsu, Sanehiro Furuichi, Tomohiro Shioya
-
Publication number: 20170061118Abstract: An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying information is extracted and the application is distributed for operation on a user device. A user interacts with the application, creating an access request that is transmitted to the application service system along with the extracted identifying information. The application service system transmits an access token to the user device comprising the received identifying information. The user device transmits the access token with a service request to the application service system. The application service system compares the identifying information from the access token to the identifying information extracted from the application program code received from the merchant services system. If the identifying information matches, the service request is processed.Type: ApplicationFiled: November 10, 2016Publication date: March 2, 2017Inventors: Michael David Galpin, Jon Christian Boekenoogen, Scott Roy Atwood, Jeffrey William Hamilton, IV
-
Publication number: 20170061119Abstract: A method of protecting a modular exponentiation calculation executed by an electronic circuit using a first register and a second register, successively comprising, for each bit of the exponent: a first step of multiplying the content of one of the registers, selected from among the first register and the second register according to the state of the bit of the exponent, by the content of the other one of the first and second registers, placing the result in said one of the registers; a second step of squaring the content of said other one of the registers by placing the result in this other register, wherein the content of said other one of the registers is stored in a third register before the first step and is restored in said other one of the registers before the second step.Type: ApplicationFiled: February 29, 2016Publication date: March 2, 2017Inventor: Yannick Teglia
-
Publication number: 20170061120Abstract: Embodiments relate to an isolated program execution environment. An aspect includes receiving, by the isolated program execution environment on a computer comprising a processor and a memory, a request to run a program. Another aspect includes wrapping program code corresponding to the program as a function. Another aspect includes cloning a real global object of the isolated program execution environment to create a fake global object. Another aspect includes passing the fake global object to the function. Another aspect includes executing the function, such that the function executes the program.Type: ApplicationFiled: November 11, 2016Publication date: March 2, 2017Inventors: Anthony Ffrench, Libra C. Huang, Timothy J. Smith, Chih-Wen Su, Yi-Hong Wang
-
Publication number: 20170061121Abstract: A side-channel attack resistant circuit topology for performing logic functions. This topology includes combinatorial logic to perform the at least one logic function. A logic input selector alternately supplies, in response to a first timing reference signal, an input to the combinatorial logic with noise generating input values and valid input values. A first latch input selector alternately supplies, in response to the first timing reference signal, a first memory element input with noise generating input values and valid logic output values. The valid logic output values are received from the combinatorial logic. A first memory element latches the valid logic output values in response to a second timing reference signal.Type: ApplicationFiled: August 24, 2016Publication date: March 2, 2017Applicant: Cryptography Research, IncInventors: Roberto Rivoir, Elke De Mulder, Jean-Michel Cioranesco
-
Publication number: 20170061122Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for determining where to store a version of an object in an isolated environment. In one aspect, a method include actions of obtaining, from a process running in an isolated environment, a request to access an object and determining a frequency that changes to a version of the object stored in the isolated environment will be mapped back to a version of the object stored in the non-isolated environment. Additional actions include determining, based on the frequency that changes to a version of the object stored in the isolated environment are mapped back to a version of the object stored in the non-isolated environment, whether to store the version of the object in primary memory associated with the isolated environment or secondary memory associated with the isolated environment.Type: ApplicationFiled: August 24, 2015Publication date: March 2, 2017Inventor: Amin Hassanzadeh
-
Publication number: 20170061123Abstract: Suspicious file prospecting activity is detected based on patterns of file system access. A user's file system access is monitored over a specific time period. A sequence of the file accesses (e.g., represented as path names) made by the user during the time period is recorded. Distances between the recorded file accesses are determined, for example as edit distances. A distance sequence is recorded, comprising a record of the determined distances. The distance sequence is reduced to one or more baseline statistics describing the pattern of the user's access of the file system during the given period of time. At least one subsequent anomaly in the user's access of the file system is detected, by comparing at least one subsequently calculated statistic representing at least one subsequent pattern of the user's file system access to the at least one baseline statistic.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Aleatha Parker-Wood, Andrew Gardner
-
Publication number: 20170061124Abstract: A method for a logic circuit including a plurality of components and channels which are each assigned functional properties in a circuit model to simulate how the logic circuit functions, where the circuit model, in a section of the method, is expanded by mechanisms for security analysis, and where in a further section of the method, the following method steps are implemented via a simulation unit, i.e., check whether the security property of the respective component and/or the respective channel corresponds to the security requirement of the security-relevant data and generate a security risk report if it does not correspond thereto, apply a modeled attack to a component and/or to a channel, and determine a vulnerability of the security property of the respective component and/or of the respective channel to the applied attack, and if there is vulnerability of the security property, generate an attack report.Type: ApplicationFiled: August 26, 2016Publication date: March 2, 2017Inventors: Bernhard FISCHER, Martin MATSCHNIG, Herbert TAUCHER
-
Publication number: 20170061125Abstract: In accordance with one embodiment of the present disclosure, a method for determining the similarity between a first data set and a second data set is provided. The method includes performing an entropy analysis on the first and second data sets to produce a first entropy result, wherein the first data set comprises data representative of a first one or more computer files of known content and the second data set comprises data representative of a one or more computer files of unknown content; analyzing the first entropy result; and if the first entropy result is within a predetermined threshold, identifying the second data set as substantially related to the first data set.Type: ApplicationFiled: November 15, 2016Publication date: March 2, 2017Inventors: David Neill Beveridge, Abhishek Ajay Karnik, Kevin A. Beets, Tad M. Heppner, Karthik Raman
-
Publication number: 20170061126Abstract: One or more computer processes executing on a client computer are monitored for an anomalous condition relative to an adaptive reference model of the client computer. In response to detecting the anomalous condition, information is gathered regarding the anomalous condition as the processes continue to execute. A score is computed indicating a risk for continued execution of each of the processes based on the gathered information. Any of the processes for which the corresponding risk score meets a predetermined continued execution risk criterion is terminated.Type: ApplicationFiled: September 2, 2016Publication date: March 2, 2017Inventor: David Eugene HOOKS