Patents Issued in April 13, 2017
-
Publication number: 20170103166Abstract: Disclosed herein is a wearable device. A blood alcohol level of a user is measured in real time, and information about the location of the user is measured. When the blood alcohol level of the user is a predetermined value or more, information about a coupon or point which may be used at a store within a predetermined range may be requested from a management server or a chauffeur service may be requested.Type: ApplicationFiled: October 11, 2016Publication date: April 13, 2017Applicant: SK PLANET CO., LTD.Inventors: Sungoh OH, Sunghyun YOON
-
Publication number: 20170103167Abstract: A blockchain configured system includes a router and a blockchain configured record bank. The router collects data and converts it in a format in accordance with a defined standard. The blockchain configured record bank can include or be coupled to a data repository. The blockchain configured record bank can be configured to be coupled to the data provider through the router over a communication network. The blockchain configured record bank stores the data received from the data provider and can be accessible or searchable from within or outside the blockchain configured record bank. The blockchain configured record bank can be coupled to or include a data logging unit that maintains metadata associated with the data and configured to facilitate natural language processing capabilities. The router and the blockchain configured record bank may be coupled to machine learning system, metadata validation system, and master data validation system.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Applicant: Netspective Communications LLCInventor: Shahid N. Shah
-
Publication number: 20170103168Abstract: The present invention provides a method for providing a knowledge-based personal intelligent health consultation, to which a medical knowledge base is constructed and utilized, and the correlations between the diseases and symptoms encompassed therein are statically and dynamically evaluated. The present invention also provides a system for providing a knowledge-based personal intelligent health consultation, in which an inference engine is configured to intelligently assess certainty values of diseases/symptoms presented in the medical knowledge base while interactively and adaptively adjust the certainty values of symptoms and possible diseases based on the instant selection of a user.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Chien-Chin Chen, Yea-Li Sun
-
Publication number: 20170103169Abstract: A method of maximizing the benefits from a group of diverse healthcare technologies, by establishing a management entity which in turn establishes a website which sets forth its activities, were the activities involve in-licensing a diverse group of healthcare technologies; obtaining a funding pool to be allocated for development; forming a group of business units which is each responsible for developing at least one of the group of technologies, and where distribution to each business unit from the funding pool is determined by the management entity and each business unit reports its technology development progress, available and projected funding for development, and expenditures to the management entity; pooling the management entity and business unit personnel to manage development of the group of technologies; determining the likelihood of a business unit obtaining outside funding to develop technology; and distributing funding to a unit from the funding pool based on said likelihood.Type: ApplicationFiled: February 23, 2016Publication date: April 13, 2017Inventors: Atul VARADHACHARY, Leo LlNBECK, Mark Worscheh
-
Publication number: 20170103170Abstract: Disclosed herein is a framework for facilitating a medical emergency workflow. In accordance with one aspect, a code cart is paired with a computer system. The code cart may include tracking tags attached to the code cart and cart items. The computer system may include a data collector for scanning the tracking tags and an application. The application may be executable by a processor to perform steps including receiving, from the data collector, information associated with the code cart and one or more selected cart items, and updating a medical emergency record based at least in part on the received information.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Inventor: Alan Mark Portnoy
-
Publication number: 20170103171Abstract: In one aspect the present disclosure implements a method for providing a personalized recommendation to a user of a health care service. In this regard, the method includes receiving a user's profile data that includes at least a location of the user, automatically prompting for and receiving a set of constraints from the user regarding their need to seek medical care, identifying a result set of medical care providers responsive to a user request, determining whether the result set satisfies the imposed constraints, and if the result set satisfies the imposed constraints, creating, in real-time, a list that identifies at least one medical care provider from the result set for display to the user.Type: ApplicationFiled: October 7, 2016Publication date: April 13, 2017Applicant: LIFE ACCOUNT, LLCInventors: Randolph Sentell, Preston Williams, Jared Ashman, Greg Morgan
-
Publication number: 20170103172Abstract: The present invention provides a system and method to geospatially and temporally predict a propagation event. The present invention for a plurality of predetermined locations, geospatially models the connections between each location. For each predetermined location, the invention temporally models the connections within each predetermined location. The present invention also pairs the geospatially modeling with the temporal modeling to generate a prediction of the spread of the propagation event.Type: ApplicationFiled: October 7, 2016Publication date: April 13, 2017Applicant: The Arizona Board of Regents on Behalf of the University of ArizonaInventors: Wolfgang Fink, Janet Meiling Roveda
-
Publication number: 20170103173Abstract: The present invention relates to a medical data processing method of determining an outcome quality of a medical procedure, the method comprising the following steps which are constituted to be executed by a computer: a) acquiring (S1) pre-completion medical image data describing an anatomical structure of a patient's body in a state before the medical procedure has been completed on the anatomical structure, the anatomical structure being subject to the medical procedure; b) acquiring (S1) pre-completion non-image medical data describing a state and medical history of the patient before the medical procedure has been completed on the anatomical structure; c) acquiring (S2) medical procedure planning data describing a plan for execution of the medical procedure to be carried out on the anatomical structure; d) determining (S2), based on the pre-completion medical image data and the medical procedure planning data, procedure application describing an application of the medical procedure planning data to the prType: ApplicationFiled: April 30, 2015Publication date: April 13, 2017Applicant: BRAINLAB AGInventors: Stefan Vilsmeier, Bálint Varkuti
-
Publication number: 20170103174Abstract: A system to generate a diagnosis model includes: a preprocessor configured to preprocess time-series data observed from a patient having a disease; a time-series analyzer configured to produce a data feature by applying an analysis model for a time-series variability analysis to the preprocessed time-series data; and a model generator configured to extract the produced data feature and to generate the diagnosis model based on the extracted produced data feature.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Applicant: Samsung Electronics Co., Ltd.Inventors: Ha-Young KIM, Hye-Jin KAM
-
Publication number: 20170103175Abstract: Described herein are systems and methods for managing medical alerts. In one embodiment, a method includes receiving a medical alert notification and user-generated content from a device of a patient. A message comprising the user-generated content and biometric data associated with the patient is generated and transmitted to a device associated with a care team of the patient.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: Gopal Chopra, Manju Chopra, Mohammad Tahir Khan
-
Publication number: 20170103176Abstract: According to one aspect of the present invention, a sensor for diagnosing a physiological or physical state includes a measurement system configured to determine clinical data for one or more parameters related to the physiological or physical state, a first memory configured to store the clinical data, a transmitter configured to transmit the clinical data according to a first communications protocol, a receiver configured to receive enhanced data according to a second communications protocol, and a second memory configured to store the enhanced data. The enhanced data is based on the clinical data.Type: ApplicationFiled: March 18, 2015Publication date: April 13, 2017Inventors: Todd T. Swanzey, Gregory Stefkovic, Christopher Dionisio
-
Publication number: 20170103177Abstract: Systems and methods for communicating with physicians are described.Type: ApplicationFiled: October 7, 2016Publication date: April 13, 2017Inventors: Daniel Charles Iliff, Paru Sanjaykumar Patel, Piyush Nilgiri, Sarah Sharp Upshaw
-
Publication number: 20170103178Abstract: The present invention relates to a device for detecting a health condition of a subject (15), comprising a data interface (12) for receiving sensor data (14) of said subject (15) and one or more disease classification parameters (16) for characterizing one or more diseases, a user interface (18) for receiving a user input (20) related to a disease activity, an analysis unit (26) for extracting one or more physiological and/or behavioral features from said received sensor data (14), an optimizer unit (28) for optimizing said one or more disease classification parameters (16) based on a correlation analysis between said one or more physiological and/or behavioral features and said user input (20), and a detection unit (30) for detecting a health condition of said subject (15) by applying said one or more disease classification parameters (16) to said one or more physiological and/or behavioral features.Type: ApplicationFiled: June 19, 2015Publication date: April 13, 2017Inventors: Adrienne HEINRICH, Jan TATOUSEK
-
Publication number: 20170103179Abstract: A computer system prompts a user to answer a series of questions from a collection of questions. From the user's answers, the computer system predicts a mortality outcome based on the value of a predetermined mortality parameter for one or more of the questions in the series.Type: ApplicationFiled: September 22, 2016Publication date: April 13, 2017Inventors: Shuo Jiao, Munjal Shah, Ryan Hinchey, Cathy Ye Fan, Ardaman Singh
-
Publication number: 20170103180Abstract: A computer system automates the determination of a health profile of a user based on a knowledge of the user regarding health related questions and social network content from an account of the user.Type: ApplicationFiled: September 22, 2016Publication date: April 13, 2017Inventors: Shuo Jiao, Munjal Shah, Ryan Hinchey, Cathy Ye Fan, Ardaman Singh
-
Publication number: 20170103181Abstract: A healthcare delivery system that embodies methods of empowering collaborative multidisciplinary healthcare and the clinics that support them for providing everyday care to patients with chronic conditions, through in part by eliminating the current referral system to multiple specialists and providing collaborative multidisciplinary healthcare.Type: ApplicationFiled: September 30, 2016Publication date: April 13, 2017Inventor: Barbara Czerska
-
Publication number: 20170103182Abstract: Modelling disease progression using non-clinical information proxies for clinical information, by accessing a computer-based Bayesian model of the progression of a disease, adapting the Bayesian model to include one or more clinical factors that are believed to influence progression of the disease, adapting the Bayesian model to include one or more non-clinical proxies for one or more clinical factors that are believed to influence progression of the disease, identifying interdependencies among variables of the Bayesian model based on a meta-analysis of literature associated with any of the disease, the clinical factors, and the non-clinical proxies, providing values for any of the variables of the Bayesian model, and presenting any portion of the Bayesian model via a computer-based output device.Type: ApplicationFiled: January 25, 2015Publication date: April 13, 2017Inventors: Saheed Akineinde, Michal Rosen-Zvi, Lavi Shpigelman, Omer Weissbrod
-
Publication number: 20170103183Abstract: Disclosed herein is a computer-implemented method for simulating a response of a drug, or a combination of drugs, being used for the treatment of a disease, the method comprising a computing device performing the steps of: generating one or more models of cell responses in a biological network of cellular processes, wherein each model is a self-contained logical model that comprises a network topology with nodes, edges between nodes and parameters of the nodes for modelling obtained state data of a plurality of biological signalling entities of one or more diseased cells, wherein generating each model comprises automatically determining logical rules that define at least the parameters of the nodes such that an attractor of the model substantially corresponds to said obtained state data of the plurality of biological signalling entities of one or more diseased cells; for each of the one or more models, simulating the effect of a drug, or a combination of drugs, by determining an output of the generated modelType: ApplicationFiled: October 12, 2016Publication date: April 13, 2017Inventor: Åsmund Flobak
-
Publication number: 20170103184Abstract: Systems and method are disclosed for body enhancements by modeling shape and size change in the body portion due to an implant; iteratively changing modeled body shapes or sizes until the patient is satisfied with a desired shape or size; controlling an automatic injector to deliver the implant in the patient; and monitoring injection into patient and providing feedback if needed to achieve the desired shape and size.Type: ApplicationFiled: October 22, 2016Publication date: April 13, 2017Inventors: Phi Nguyen, Bao Tran
-
Publication number: 20170103185Abstract: A secure cabinet that can secure and distribute products. The cabinet can have a user interface that receives information about a user and the user's identity can then be authenticated. The cabinet can accept a user's request to dispense a product and, if the user is approved, the cabinet can dispense a quantity of product to the approved user.Type: ApplicationFiled: December 21, 2016Publication date: April 13, 2017Inventors: Patrick Adams, William E. Bell
-
Publication number: 20170103186Abstract: Systems and methods are disclosed herein for supporting a patient's use of a drug delivery device. The patient may be associated with a support group via, for example, a social networking service for the purpose of increasing the likelihood that the patient will comply with a treatment regimen. Based on data representative of a condition and/or operational state of the drug delivery device, it may be determined whether the patient is compliant with the treatment regimen. If the patient is not compliant, the systems and method disclosed herein may transmit a communication to the support group requesting the support group to counsel the patient about the treatment regimen. The counseling may take the form of words of encouragement, coaching, suggestions, reminders, and/or any other communication likely to urge the patient to comply with the treatment regimen.Type: ApplicationFiled: June 3, 2015Publication date: April 13, 2017Inventors: Adam B. McCullough, Ferry Tamtoro, Huaying Yang, Mark Ka Lai Lee, Desheng Yin, Scott R. Gibson, Donald Busby, Peter V. Shultz, Keith P. Kogler, Basel Hasan Taha, Jimmie L. Ward, Steven William Badelt
-
Publication number: 20170103187Abstract: A video game in possession of and/or in the proximity of a patient. The patient computing system receives an indication that it is to begin a game, and executes the game using identified game parameters that are associated with the patient by a clinician as part of a disease therapy program. As the game executes, game state progresses in response to physical activity of the patient, causing the patient to exercise. The physical activity is received as input into the patient computing system. Such input causes game state to be progressed dependent on the identified game parameters that are associated with the game. Thus, the game is tailored for the patient by a clinician in order to motivate physical activity that is medically beneficial to the patient in order to advance through the disease therapy program.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Inventors: Grzegorz Wlodzimierz Bulaj, Carol S. Bruggers, Roger Alan Altizer, JR., Robert R. Kessler, Craig Bernreuter Caldwell, Wade Ray Paterson, Kurt Joseph Coppersmith, Laura Mae Warner, Brandon H. Davies
-
Publication number: 20170103188Abstract: In general, a computer-implemented method is described for receiving one or more requests to generate a medical study, retrieving from one or more data repositories one or more medical study instruments, receiving a selection of a particular medical study instrument to use in the medical study, generating by one or more computers a list of one or more research collaborators invited to review the medical study, and generating by one or more computers a list of one of more participants invited to join the medical study. Additionally, the computer-implemented method generates by one or more computer systems a data filter to format medical data from a first data format to a second data format, wherein the second data format complies with a third data format associated with one or more medical study instruments.Type: ApplicationFiled: June 11, 2014Publication date: April 13, 2017Inventor: Ali Adel Hussam
-
Publication number: 20170103189Abstract: A method for determining treatment plans for patients having one or more diagnoses, including multiple concurrent diagnoses. The method provides functionality to complete an OASIS and transforms the assessment into a treatment plan for one or more diagnoses for a patient.Type: ApplicationFiled: September 21, 2016Publication date: April 13, 2017Inventor: Mary Cott
-
Publication number: 20170103190Abstract: A computer implemented method for evaluating risks of clinical trial conducting sites is provided. The method includes steps of (i) obtaining a first data that corresponds to a first duration from the clinical trial conducting sites; (ii) performing a regression analysis on the first data to obtain a number of monitoring visit findings at a site in accordance with an equation (Y)=B1X1+B2X2+ . . . BnXn+ error; (iii) obtaining regression coefficients by applying the equation on the first data; (iv) obtaining a second data that corresponds to a second duration from the clinical trial conducting sites; (v) applying the regression coefficients on the second data to predict potential risks associated with the clinical trial conducting sites; (vi) computing an overall risks associated with the clinical trial conducting sites; and (vii) classifying a risk level associated with the site based on the overall risk associated with the clinical trial conducting site.Type: ApplicationFiled: October 7, 2016Publication date: April 13, 2017Inventors: Abby Abraham, Allabux Jaffer, Nithiyanandhan Ananthakrishnan, Hazel Sidona
-
Publication number: 20170103191Abstract: The system includes a passage presence/absence information acquiring and generating section that acquires or generates previous passage presence/absence information, which indicates whether passage work was conducted or not, at respective previous observation time points at which observation information containing a cell image and activity data were acquired in a time series manner through an observation information acquiring section; and a passage number acquiring and generating section that acquires or generates at least the current passage number at the current observation time point, automatically or through an operation by a user, based on the previous passage presence/absence information acquired or generated by the passage presence/absence information acquiring and generating section, thereby to prevent erroneous input of passage numbers by the user.Type: ApplicationFiled: September 27, 2016Publication date: April 13, 2017Applicant: OLYMPUS CORPORATIONInventors: Yasunobu IGA, Yohei TANIKAWA, Shinichi TAKIMOTO
-
Publication number: 20170103192Abstract: A method and apparatus for secure code delivery. In one embodiment the method is implemented on a computer system, and includes reading an access privilege from a first set of access privileges, wherein the first set of access privileges corresponds to a first file that comprises first encrypted source code. The first encrypted source code is decrypted to produce first decrypted source code. A determination is made as to whether the first access privilege is set to a first state or a second state. If the first access privilege is set to the first state, a first software development tool is permitted to access and process the first decrypted source code. If the first access privilege is set to a second state, the first software development tool is denied access to decrypted source code.Type: ApplicationFiled: October 12, 2016Publication date: April 13, 2017Inventors: Brandon Cranford Hussey, Jon Matthew Brabender, John L. Dallaway, James Mark Deadman, Mark Goodchild, Noriyuki Mori, Murthy L. Vedula
-
Publication number: 20170103193Abstract: A device to apply a digital fingerprint to a digital signal comprises a means of intercepting or acquiring a signal, a storage element and a processor for executing computer implemented programme code components in the storage element to effect the methods. The methods include transforming a plurality of signal samples onto a discrete orthonormal basis and ranking the transformed samples according to their magnitude. The n largest principal components of the ranked transformed samples are optionally permuted to generate a re-ordered set of principal components, which are then altered by a marking angle. The marked principal components and unmarked non-principal components are converted and combined and applying an inverse of the transform function to the combined principal and non-principal components to generate a fingerprinted digital signal. Methods to prepare the signal for marking, recover the digital fingerprint and verify the distributor and/or recipients of the signal are also disclosed.Type: ApplicationFiled: October 18, 2016Publication date: April 13, 2017Inventors: Oscar Moreno De Ayala, Anatol Zygmunt Tirkel
-
Publication number: 20170103194Abstract: Systems, methods, and/or techniques for performing active authentication on a device during a session with a user may be provided to detect an imposter. To perform active authentication, meta-recognition may be performed. For example, an ensemble method to facilitate detection of the imposter. The ensemble method may user discrimination using random boost and/or intrusion or change detection using transduction. Scores and/or results may be received from the ensemble method. A determination may be made, based on the scores and/or results, whether to continue to enable access to the device, whether to invoke collaborative filtering and/or challenge-responses for additional information, and/or whether to lock the device. Based on the determination, user profile adaptation on a user profile used in the ensemble method and/or the determination and/or retrain the ensemble method, collaborative filtering and/or challenge-responses, and/or a lock procedure may be performed.Type: ApplicationFiled: May 30, 2015Publication date: April 13, 2017Applicant: PCMS Holdings, Inc.Inventor: Harry Wechsler
-
Publication number: 20170103195Abstract: Various embodiments of the present disclosure relate to an electronic device and a method for authenticating a fingerprint in an electronic device, the electronic device performs operations including: performing an authentication process for an input fingerprint based on registered authentication information; when the authentication of the input fingerprint is successfully performed, detecting similarity information of the input fingerprint; storing the detected similarity information in conjunction with an authentication time in a fingerprint information database; and updating the registered authentication information using at least one piece of stored fingerprint information based on the similarity information stored in the fingerprint information database, thereby making it possible to prevent and/or reduce the fingerprint authentication rate from being decreased based on the change of the fingerprint so that security can be maintained.Type: ApplicationFiled: October 13, 2016Publication date: April 13, 2017Inventors: Dong-Ho YU, Jun-Ho LEE
-
Publication number: 20170103196Abstract: A system for securely sharing data and conducting transactions in an electronic environment. The system may include a personal information device having a processor, memory and biometric sensor. Personal data is stored in the memory of the personal information device. The personal information device may be registered with a centralized system. Data stored on the personal information device may be uploaded to an access device upon verification of a user's identity using a biometric recognition technique.Type: ApplicationFiled: October 28, 2016Publication date: April 13, 2017Inventors: J. Chance Anderson, Aaron Michael Best, David J. Havell, J. Ken Barton, Jandi Renee Carter
-
Publication number: 20170103197Abstract: An electronic device includes an authentication unit that performs authentication to determine whether a power supply apparatus connected to the electronic device is a predetermined apparatus, a selection unit that makes a user select whether to use the power supply apparatus, when the authentication has failed, a storage unit that stores information indicating that the authentication has succeeded or the user has selected to use the power supply apparatus as history information. When the power supply apparatus is detached from the electronic device, the history information is deleted from the storage unit. The electronic device permits use of the power supply apparatus connected to the electronic device when the history information is stored in the storage unit while the electronic device is in a power ON state.Type: ApplicationFiled: September 28, 2016Publication date: April 13, 2017Inventor: Yasusaburo Degura
-
Publication number: 20170103198Abstract: A system and associated method for controlling access to features of a device are provided. The system includes a feature access component that maintains an access control register configured to store an access control parameter indicating whether a user has access to a feature of the device. Responsive to receiving a request to modify the access control register to enable or disable access to the feature, an access authentication parameter is set to an authentication key of the request and an access parameter is set to a value of the request (e.g., 1 “Enable”). The access authentication parameter and access parameter are evaluated utilizing an authentication algorithm. Responsive to successfully authenticating the request, the access control register is modified based upon the value of the access parameter, such as to indicate that the user is now authorized to read and/or modify a parameter and/or invoke a service to execute.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Vladimir Dimitrov Kostadinov, Xiaoping Jiang, Min Huang
-
Publication number: 20170103199Abstract: A method, system and computer-usable medium are disclosed for injecting functionality into a security intelligence platform, comprising: providing the security intelligence platform with a plurality of backend endpoints; generating a modification to the security intelligence platform according to an application framework, the modification comprising metadata associated with functionality, the metadata corresponding to a predefined format; and, merging the modification with the security intelligence platform via a secure container system container.Type: ApplicationFiled: December 16, 2015Publication date: April 13, 2017Inventors: Rory F. Bray, Jason D. Keirstead, Declan J. Wilson
-
Publication number: 20170103200Abstract: A log information generation apparatus includes: a process information generation unit which generates first identification information for temporally and spatially uniquely identifying a process that is an execution subject of an application program at a start of a process behavior constituted by a series of events of the process, in a space of a system including a plurality of computers, and which generates process information including the first identification information; an event information generation unit which generates event type information indicating an event type for each of the events and which generates event information including the event type information; and a log information generation unit which generates, for each of the events, log information including the process information generated by the process information generation unit and the event information generated by the event information generation unit.Type: ApplicationFiled: July 29, 2016Publication date: April 13, 2017Inventors: Kazuhiro Uehara, Kaori Araki, Kazuo Nishikawa
-
Publication number: 20170103201Abstract: Provided herein are systems and methods for generating policies for a new application using a virtualized environment. Prior to allowing a new application to operate on a host system, the new application may be installed in a virtual environment. A first program execution restrictor of the virtualized environment may determine a set of policies for the new application. The set of policies may allow the new application to add specific program elements during installation and execution in the virtualized environment. The first program execution restrictor may verify an absence of malicious behavior from the new application while the new application executes in the virtualized environment. The new application may be executed on the host system responsive to the verification. The host system may have a second program execution restrictor that applies the set of policies when the new application is allowed to execute on the host system.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventor: John C. Fox
-
Publication number: 20170103202Abstract: An apparatus and method for monitoring a virtual machine based on a hypervisor. The method for monitoring a virtual machine based on a hypervisor includes monitoring an attempt to access an executable file located in a virtual machine, when the attempt to access the executable file is detected, extracting a system call transfer factor, input through a task that attempted to make access, acquiring, based on the system call transfer factor, an execution path corresponding to the executable file and a reference path corresponding to a reference file that is executed together with the executable file, and checking based on the execution path and the reference path whether any of the executable file and the reference file is malicious, and collecting a file in which malicious code is present when the malicious code is present in any of the executable file and the reference file.Type: ApplicationFiled: September 23, 2016Publication date: April 13, 2017Inventors: Sung-Jin KIM, Woomin HWANG, ByungJoon KIM, ChulWoo LEE, HyoungChun KIM
-
Publication number: 20170103203Abstract: Methods, systems, and computer program products for applying multi-level clustering at scale to unlabeled data for anomaly detection and security are disclosed. A computer-implemented method may include receiving transactional data associated with a plurality of user accounts, analyzing the transactional data of the accounts in view of a clustering model, associating each of the accounts with one of multiple peer groups from the clustering model, detecting anomalous account behavior in a peer group in view of a scatteredness score computed for each account in the peer group where each scatteredness score is computed based on a neighborhood of accounts in the peer group determined for each respective account of the peer group, and creating a report comprising account and scatteredness score information for one or more of the accounts in the peer group associated with detected anomalous account behavior.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Avani Goel Sharma, Fransisco Kurniadi
-
Publication number: 20170103204Abstract: A domain-specific hardwired symbolic communications machine is described that processes information via the hardwired mapping of symbols from one or more domains onto other such domains, computing and communicating with improved security and reduced power consumption because it has no CPU, no Random Access Memory (RAM), no instruction registers, no Instruction Set Architecture (ISA), no operating system (OS) and no applications programming. The machine provides web services by recognizing valid requests based on the processing of symbols and the validating of those symbols according to various domains. In some embodiments the requests may conform or be related to, for example, Long Term Evolution (LTE), Hypertext Transfer Protocol (HTTP), or fourth generation (4G) wireless technology. Further, in some embodiments, the machine has no unconstrained RAM into which malware may insert itself and needs no anti-virus software.Type: ApplicationFiled: October 13, 2016Publication date: April 13, 2017Inventor: Joseph Mitola, III
-
Publication number: 20170103205Abstract: A memory hacking detecting method and a system therefor are provided. The memory hacking detecting method for accurately detecting a level of a hacker (or a cheating user) and action of memory hacking by detecting the memory hacking on a stage-by-stage basis and assigning attributes to each of variables of a program executed on a memory and detecting memory hacking in different ways based on the assigned attributes.Type: ApplicationFiled: July 5, 2016Publication date: April 13, 2017Applicant: LINE CorporationInventors: Sungbeom AHN, Kwang-Hee HAN, Seong Yeol LIM, Dongpil SEO, Wang Jin OH, SangHun JEON, Myungju CHUNG
-
Publication number: 20170103206Abstract: The present application discloses a method and apparatus for capturing an operation, and security control in a container-based virtualization system. A specific implementation of the method for capturing the operation includes: detecting, in a user mode, a process launch operation in a container of the container-based virtualization system; and performing, in a kernel mode, a step of capturing a signal processing operation, if the process launch operation is detected, the step of capturing the signal processing operation comprising: determining a presence of an unprocessed signal in the process; causing an executable instruction indicated by the unprocessed signal to jump to an entry address of a self-defined first function, and passing a signal number of the unprocessed signal to the first function, if the unprocessed signal exists; and capturing a signal processing operation corresponding to the passed signal number, if the first function is called.Type: ApplicationFiled: August 16, 2016Publication date: April 13, 2017Inventors: Liang Ma, Ning Qu, Baisheng Wang, Zhipeng Wang
-
Publication number: 20170103207Abstract: A processor receives a signal and determines whether an application has registered a signal handler therewith for handling the signal. In response to determining that the application has registered the signal handler, the processor transmits the signal directly to the signal handler of the application for handling the signal, without an operating system in relation to which the trusted application is running intervening. In response to determining that the trusted application has not registered the signal handler, the processor transmits the signal to a signal handler of the operating system for handling the signal.Type: ApplicationFiled: December 13, 2016Publication date: April 13, 2017Inventors: Andrew D. Hilton, Brian M. Rogers
-
Publication number: 20170103208Abstract: Securely sending a complete initialization package in one example implementation can include adding a resource identifier that includes a mapping of a driver to a hardware component included in a physical machine hosting VMs to an initial random-access memory (RAM) file system (INITRAMFS) stored in memory of the physical machine to form a complete initialization package, sending the complete initialization package from read-only memory (ROM) of the physical machine to a location in RAM of the physical machine accessible by a hypervisor, and authenticating that the complete initialization package is secure.Type: ApplicationFiled: June 30, 2014Publication date: April 13, 2017Inventor: RICHARD A BRAMLEY, JR.
-
Publication number: 20170103209Abstract: Systems and methods facilitating a framework that provides a core trusted computing base (TCB) of an electronic device with various security capabilities. The framework can include a low-resource device and at least one distributed resource. The low-resource device can be configured to generate sealing keys, migration keys, and attestation keys that are based on a device secret associated with the low-resource device and one or more software modules. The low-resource device can further be configured to use the migration keys and the sealing keys to both verify a software update and migrate secrets from a previous version of the software to a newer version of the software. Additionally, the low-resource device can be configured to generate an attestation statement using the attestation keys and perform attestation using the attestation statement and the at least one distributed resource.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: David R. Wooten, Andrey Marochko, Dennis Mattoon, Paul England
-
Publication number: 20170103210Abstract: Using various embodiments, methods and systems for computing a self-assembling indirect control flow graph based on one or more function types and function pointer types are described. In one embodiment the indirect control flow graph is computed by finding one or more function types and function pointer types in source code and/or binary code, computing one or more identifier tags for each type, classifying functions and function pointers based on the computed tags. In one embodiment, the classification tags can be used in a tag check based Control Flow Integrity system. In another embodiment, the classification tags can be used to convert indirect function calls into direct function calls. Yet in another embodiment, tag checks can be eliminated in a Control Flow Integrity system.Type: ApplicationFiled: October 10, 2016Publication date: April 13, 2017Inventor: JÁNOS BAJI-GÁL
-
Publication number: 20170103211Abstract: Example embodiments disclosed herein relate to an approach for installing a runtime agent during a security test. A security test is initiated or performed on an application under test executing on a server. An application vulnerability associated with the application under test is determined. The application vulnerability is exploited to install the runtime agent on the server. The security test is continued using the runtime agent to receive additional information about the application under test.Type: ApplicationFiled: June 19, 2014Publication date: April 13, 2017Inventors: Matias MADOU, Ronald J. SECHMAN, Sam NG MING SUM
-
Publication number: 20170103212Abstract: Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.Type: ApplicationFiled: December 20, 2016Publication date: April 13, 2017Inventors: Yu Deng, Ruchi Mahindru, HariGovind V. Ramasamy, Lakshminarayanan Renganarayana, Soumitra Sarkar, Long Wang
-
Publication number: 20170103213Abstract: In one embodiment, a device receives a classifier tracking request from a coordinator device that specifies a classifier verification time period. During the classifier verification time period, the device classifies a set of network traffic that includes traffic observed by the device and attack traffic specified by the coordinator device. The device generates classification results based on the classified set of network traffic and provides the classification results to the coordinator device.Type: ApplicationFiled: December 21, 2016Publication date: April 13, 2017Inventors: Andrea Di Pietro, Jean-Philippe Vasseur, Javier Cruz Mota
-
Publication number: 20170103214Abstract: The disclosed embodiments provide a system that facilitates testing of an insecure computing environment. During operation, the system obtains a real data set comprising a set of data strings. Next, the system determines a set of frequency distributions associated with the set of data strings. The system then generates a test data set from the real data set, wherein the test data set comprises a set of random data strings that conforms to the set of frequency distributions. Finally, the system tests the insecure computing environment using the test data set.Type: ApplicationFiled: December 21, 2016Publication date: April 13, 2017Inventor: Colin R. DILLARD
-
Publication number: 20170103215Abstract: Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.Type: ApplicationFiled: December 28, 2016Publication date: April 13, 2017Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami