Patents Issued in December 7, 2017
-
Publication number: 20170351817Abstract: An analyte measurement system includes one or more handheld analyte meters and/or measurement devices and a means for collecting data, preserving data integrity, and uniquely identifying patient data received from multiple sources. For example, provided herein is a means to uniquely identify patients and their data when the data is collected from one or more measurement devices. By providing a way to allow the patients to use multiple sources to collect data, the system described herein provides patients with more flexibility, which should encourage better compliance to protocols. Further, by having a way to uniquely identify patients' data without requiring a patient to only use one analyte meter, for example, data can be centralized and analysis can be done with more assurance that all of the patient's data is being considered in the analyses.Type: ApplicationFiled: August 23, 2017Publication date: December 7, 2017Inventors: Daniel M. Bernstein, Gary A. Hayter, Timothy C. Dunn, Mani Gopal, Eric Davis, Brittany K. Bradrick, Todd Winkler
-
Publication number: 20170351818Abstract: The invention herein is a real-time tracking system of injuries that happen to athletes in practice and in games. More particularly, such injury data may be immediately inputted into a database that tracks such data, organizes it and provides statistically relevant information about such injury data.Type: ApplicationFiled: August 20, 2015Publication date: December 7, 2017Inventor: GREGORY KNOX MCGRATH
-
Publication number: 20170351819Abstract: Systems and methods are provided for data driven analysis, modeling, and semi-supervised machine learning for qualitative and quantitative determinations. The systems and methods include obtaining data associated with individuals, and determining features associated with the individuals based on the data and similarities among the individuals based on the features. The systems and methods can label some individuals as exemplary, generate a graph wherein nodes of the graph represent individuals, edges of the graph represent similarity among the individuals, and nodes associated labeled individuals are weighted. The disclosed system and methods can apply a weight to unweighted nodes of the graph based on propagating the labels through the graph where the propagation is based on influence exerted by the weighted nodes on the unweighted nodes. The disclosed systems and methods can provide output associated with the individuals represented on the graph and the associated weights.Type: ApplicationFiled: June 1, 2016Publication date: December 7, 2017Applicant: Grand Rounds, Inc.Inventors: Seiji James YAMAMOTO, Ranjit CHACKO
-
Publication number: 20170351820Abstract: The present invention relates to a scheduling system (2) for scheduling interaction with a subject (3). A receiving unit (6) receives sensor data acquired by one or more sensors (4, 5), wherein the sensor data are indicative of a situation of the subject. An analyzing unit (6) analyses the received sensor data for a past period of time to detect recurring patterns in the situation of the subject during the past period of time. A predicting unit (7) predicts the situation of the subject during a future period of time based on the received sensor data for a current period of time and the detected recurring patterns. A scheduling unit (9) generates a schedule for interacting with the subject based on the predicted situation. By utilizing the predicted situation to generate a schedule for interacting with the subject, it is possible to identify opportune moments for interacting with the subject.Type: ApplicationFiled: January 6, 2016Publication date: December 7, 2017Inventors: Aart Tijmen VAN HALTEREN, Sebastiaan Valentijn DEN BOER, Jolijn TEUNISSE
-
Publication number: 20170351821Abstract: A healthcare claims processing and decision support system and method are disclosed that allow for the pre-processing of the healthcare claims as well as a method to reduce much of this overhead and alerting the user to any errors that occur during the claims processing.Type: ApplicationFiled: June 6, 2016Publication date: December 7, 2017Inventors: Theodore C. Tanner, JR., Colin E. Alstad, W. Bryan Smith, Denise K. Gosnell, Virginia C. Harrison
-
Publication number: 20170351822Abstract: A computer implemented method and system for optimization of medical resource utilization within a set of physicians in order to calculate a potential cost savings opportunity is described. Input classified discharge data directed to cost information for service items grouped by a Diagnosis Related Group (DRG) is assigned to a physician which was most responsible for the resource utilization in treating the patient while the patient was hospitalized. For each DRG in the classified data, the responsible physicians are dynamically clustered based on resource utilization to identify the factors that are consistently different across the clustered physicians as a difference index value. The difference index value can be analyzed for determining potential cost savings opportunities. An interactive user interface can be used for entering discharge data, dynamically displaying resource utilization by the difference index value and potential cost savings opportunities.Type: ApplicationFiled: June 7, 2016Publication date: December 7, 2017Inventors: George CHALISSERY, Verghese VERGHESE, Jineesh Kachira JAMES, Sindhumol SABU, Afsal Tharupeedikayil ABDULKHADER, Udaya ADUKKADUKKAM, Sreekumar Mullasseril SASIDHARAN
-
Publication number: 20170351823Abstract: A medical payment system is described in which a provider of medical goods and/or services submits, via telephone or other communications medium, a request for payment amount determination for a patient encounter. A price determination system determines which of a plurality of fee schedules negotiated by the provider applies to the patient encounter and calculates, based at least in part on information entered by the provider, a payment amount for the encounter. In one embodiment, the provider receives the payment amount information while the patient is at the point of service. In one embodiment, the provider may use the system to submit a claim for payment by at least one responsible party.Type: ApplicationFiled: June 19, 2017Publication date: December 7, 2017Inventors: Kimberly A. Darling, Dorothy M. Baylor
-
Publication number: 20170351824Abstract: A system for paying healthcare providers near-instantaneously for services rendered to a specific patient based exclusively on said patient's identity and medical needs. Additionally, the status of said bills, said processing and said payments may be displayed upon a display panel as a result of an automatic signal initiated by said system initiation.Type: ApplicationFiled: June 26, 2017Publication date: December 7, 2017Inventor: William J. DeGasperis
-
Publication number: 20170351825Abstract: A computer-implemented method of assessing the frailty of a subject, the method comprising: receiving a plurality of force measurements obtained by a measurement apparatus configured to determine the weight of a subject standing on a user support surface of the measurement apparatus by measuring a force experienced by the user support surface; wherein the force measurements are obtained at regular time intervals over a measurement period during which the subject steps onto and subsequently stands on the user support surface; calculating a frailty index indicative of a degree of frailty of the subject using the received force measurements; wherein calculating a frailty index comprises: (a) identifying a first section of the received force measurements within the measurement period as a mounting period, wherein the mounting period extends between a first time at which the subject first contacts the user support surface, and a second time at which entire weight of the subject becomes supported by the user supporType: ApplicationFiled: November 10, 2015Publication date: December 7, 2017Inventors: GIJS GELEIJNSE, NAGARAJU BUSSA, RAJENDRA SINGH SISODIA, VIKRAM BASAWARAJ PATIL OKALY
-
Publication number: 20170351826Abstract: The MedMobile Device (MMD), is a medical device or circuit, software, application or App, software program, or platform, that enables a smart phone, tablet, laptop, computer, or any other mobile computer device, to take mobilized blood pressure readings, temperature readings, pulse readings, heart readings (EKG/ECG), and other vital sign readings, of a patient located outside of a heath care facility; and to monitor, track, store, process, the patient's data or information. This is accomplished by a special software App or program installed on a smart phone, tablet, computer, or any other mobile computer device, network, or platform. This software App or program communicates with the MMD, and the MMD simultaneously communicates with a special attached sensing device or sensor by sending and receiving data to and from the attached sensing device or sensor; this data may represent the blood pressure, temperature, pulse, heart rate, or other vital sign readings of the patient.Type: ApplicationFiled: June 7, 2016Publication date: December 7, 2017Inventors: James Edward Mclean, JR., Edward D. Mclean
-
Publication number: 20170351827Abstract: This document describes techniques and apparatuses enabling determination of health state trends for a consistent patient situation. Various noninvasive health monitors can be used to sense a patient's situation and health states, including disease progression, at those states. These noninvasive health monitors may also act passively and in a patient's normal course of life, which enhances many patient's desire to submit to monitoring, as well as increase consistency of use, as in many cases the patient does little or nothing to cause his or her health monitoring and health-trend determination. With health states determined for a consistent patient situation, more accurate and more robust health trends can be determined.Type: ApplicationFiled: January 27, 2016Publication date: December 7, 2017Inventor: Jeffrey L. Rogers
-
Publication number: 20170351828Abstract: A computer-implemented method or system is provided for providing connecting relationships between wearable devices. The method includes measuring a first health parameter of a user via one or more sensors of a first wearable device; measuring a second health parameter of the user via one or more sensors of a second wearable device; determining an alert action based on a combination of the measurements of first health parameter and the second health parameter; and generating a notification to the user based on the alert action.Type: ApplicationFiled: December 2, 2015Publication date: December 7, 2017Inventors: John CRONIN, Joseph George BODKIN, Jan Martijn KRANS, Boris Emmanuel Rachmund DE RUYTER
-
Publication number: 20170351829Abstract: A smart device for monitoring and capturing patient data and systems, assays and methods of using the device, the smart device comprising a memory for storing a dynamic disease model and patient data, at least one input for receiving patient data and storing such patient data in the memory of the smart device, and a dynamic output driven by the dynamic disease model in response to capture of patient data.Type: ApplicationFiled: November 18, 2015Publication date: December 7, 2017Inventors: Robin Mitja Benjamin Wolz, Derek Lionel Glendon Hill
-
Publication number: 20170351830Abstract: A health provider matching service is provided to match patients to health providers based on a semantic relationship graph of data associated with conditions of patients. Using natural language processing, the service identifies terms describing symptoms, treatments, and health providers associated with a condition. The service then identifies semantic relations among the terms and probability distributions of the terms to generate a semantic relationship graph. Quality information of therapists is combined with machine learning techniques to identify features that are used to distinguish high quality and low quality providers. Based on the semantic relationship graph and the derived quality information, the service matches a patient to a health provider suitable to treat the particular needs of the patient. The service also handles social, behavioral, or emotional issues for which medications are not appropriate.Type: ApplicationFiled: June 3, 2016Publication date: December 7, 2017Inventors: Jessie M. Burger, Daniella J. Perlroth, Aaron Archer Waterman
-
Publication number: 20170351831Abstract: Individual health vulnerability is assessed by obtaining health risk prevalence level data containing health risk prevalence levels for one or more health risks over a given geographical area. The health risk prevalence level data to generate for each health risk a prevalence level forecast as a function of time and location. A health risk prevalence level map is generated for the given geographical area illustrating current and future health risk prevalence levels for each health risk at a plurality of locations within the given geographical area. Personal health status data are obtained for a given individual along with a proposed travel itinerary f covering at least a portion of the geographical area over a given time duration. The personal health status data, travel itinerary and map generate a personal health risk vulnerability model containing a quantification of vulnerability to the one or more health risks resulting from the travel itinerary.Type: ApplicationFiled: June 1, 2016Publication date: December 7, 2017Inventors: Amos CAHAN, Hung-yang CHANG, Ning LI, Fei LIU, Qiqing Christine OUYANG, Yajuan WANG
-
Publication number: 20170351832Abstract: Individual health vulnerability is assessed by obtaining health risk prevalence level data containing health risk prevalence levels for one or more health risks over a given geographical area. The health risk prevalence level data to generate for each health risk a prevalence level forecast as a function of time and location. A health risk prevalence level map is generated for the given geographical area illustrating current and future health risk prevalence levels for each health risk at a plurality of locations within the given geographical area. Personal health status data are obtained for a given individual along with a proposed travel itinerary f covering at least a portion of the geographical area over a given time duration. The personal health status data, travel itinerary and map generate a personal health risk vulnerability model containing a quantification of vulnerability to the one or more health risks resulting from the travel itinerary.Type: ApplicationFiled: June 1, 2016Publication date: December 7, 2017Inventors: Amos CAHAN, Hung-yang CHANG, Ning LI, Fei LIU, Qiqing Christine OUYANG, Yajuan WANG
-
Publication number: 20170351833Abstract: Individual health vulnerability is assessed by obtaining health risk prevalence level data containing health risk prevalence levels for one or more health risks over a given geographical area. The health risk prevalence level data to generate for each health risk a prevalence level forecast as a function of time and location. A health risk prevalence level map is generated for the given geographical area illustrating current and future health risk prevalence levels for each health risk at a plurality of locations within the given geographical area. Personal health status data are obtained for a given individual along with a proposed travel itinerary f covering at least a portion of the geographical area over a given time duration. The personal health status data, travel itinerary and map generate a personal health risk vulnerability model containing a quantification of vulnerability to the one or more health risks resulting from the travel itinerary.Type: ApplicationFiled: June 2, 2016Publication date: December 7, 2017Inventors: Amos CAHAN, Hung-yang CHANG, Ning LI, Fei LIU, Qiqing Christine OUYANG, Yajuan WANG
-
Publication number: 20170351834Abstract: Individual health vulnerability is assessed by obtaining health risk prevalence level data containing health risk prevalence levels for one or more health risks over a given geographical area. The health risk prevalence level data to generate for each health risk a prevalence level forecast as a function of time and location. A health risk prevalence level map is generated for the given geographical area illustrating current and future health risk prevalence levels for each health risk at a plurality of locations within the given geographical area. Personal health status data are obtained for a given individual along with a proposed travel itinerary f covering at least a portion of the geographical area over a given time duration. The personal health status data, travel itinerary and map generate a personal health risk vulnerability model containing a quantification of vulnerability to the one or more health risks resulting from the travel itinerary.Type: ApplicationFiled: June 2, 2016Publication date: December 7, 2017Inventors: Amos CAHAN, Hung-yang CHANG, Ning LI, Fei LIU, Qiqing Christine OUYANG, Yajuan WANG
-
Publication number: 20170351835Abstract: Methods, systems, and apparatuses, including computer programs encoded on a computer storage medium, can be implemented to perform actions for capturing assessments. The actions can include receiving data that is related to an entity from one or more sources, processing one or more portions of the data to provide one or more analyses associated with the one or more portions of the data, generating a user interface that displays one or more portions of the data in association with the one or more analyses and a section for assessing the entity, outputting the user interface to a processing device for display of the section and display of the one or more portions of the data in association with the one or more analyses, receiving an assessment of the entity from the user interface, and storing the assessment in association with the entity.Type: ApplicationFiled: June 6, 2016Publication date: December 7, 2017Inventors: Tawfik Jarjour, Marc A. Warren, Drew Boston, Joshua Tauber, Timothy Schulte, Vishrut Prakash Srivastava, Dipak Patel, Alan W. Nalle, Pranitha Patil, Sama Kadakia
-
Publication number: 20170351836Abstract: A method for estimating fractional fat content of an object of interest is described. The method comprises obtaining thermoacoustic data of a region of interest containing an object of interest and a reference, and estimating fractional fat content of the object of interest using the thermoacoustic data and at least one parameter of the reference.Type: ApplicationFiled: June 5, 2017Publication date: December 7, 2017Inventors: Michael M. Thornton, Jang Hwan Cho, Aghapi G. Mordovanakis
-
Publication number: 20170351837Abstract: Clinical information, molecular information and/or computer-generated morphometric information is used in a predictive model for predicting the occurrence of a medical condition. In an embodiment, a model predicts whether a patient is likely to have a favorable pathological stage of prostate cancer, where the model is based on features including one or more (e.g., all) of preoperative PSA, Gleason Score, a measurement of expression of androgen receptor (AR) in epithelial and stromal nuclei and/or a measurement of expression of Ki67-positive epithelial nuclei, a morphometric measurement of a ratio of area of epithelial nuclei outside gland units to area of epithelial nuclei within gland units, and a morphometric measurement of area of epithelial nuclei distributed away from gland units. In some embodiments, quantitative measurements of protein expression in cell lines are utilized to objectively assess assay (e.g.Type: ApplicationFiled: August 25, 2017Publication date: December 7, 2017Inventors: Michael Donovan, Faisal Khan, Jason Alter, Gerardo Fernandez, Ricardo Mesa-Tejada, Douglas Powell, Valentina Bayer Zubek, Stefan Hamann, Carlos Cordon-Cardo, Jose Costa
-
Publication number: 20170351838Abstract: A reminder system and methods may be configured for medicine regimen compliance and monitoring. Embodiments may include a control device, a medicine container, a medicine identifier, a medicine container input device, a monitoring device and a portable electrical device. The control device, the medicine container input device and the monitoring device may include microprocessors, memories, input devices and output devices. The control device may provide operations including input and compare, by the microprocessor, a prescription and medicine information. The monitoring device may provide operations including compare, by the microprocessor, the medicine identifier of the medicine container and the medicine information. The monitoring device may also provide operations including determining, by the microprocessor, the amount of medication removed from the medicine container. The operations may further include generate, by the output device, an alert in response to the distance exceeding a threshold.Type: ApplicationFiled: June 5, 2017Publication date: December 7, 2017Inventors: Changhai Chen, Daniel Chen, Michael Chen
-
Publication number: 20170351839Abstract: An automatic picking machine for pharmaceutical drug packages includes at least one storage rack, at least one storage and retrieval machine, a control apparatus for controlling the storage and retrieval machine, and a filling apparatus for successively filling each of a plurality of transport containers with a group of pharmaceutical drug packages corresponding to one order, wherein the filling apparatus includes a plurality of collection containers, first transport apparatuses, each having a transport channel for conveying the pharmaceutical drug packages towards the respective collection container, and a receiving apparatus for receiving a transport container to be filled at a filling location of the filing apparatus.Type: ApplicationFiled: June 2, 2016Publication date: December 7, 2017Inventor: Christoph Hellenbrand
-
Publication number: 20170351840Abstract: A system and method for controlling medication-dispensing patches by a wearable device is provided. The method comprises receiving a transmission at a wearable device, wherein the transmission identifies a medication-dispensing patch; transmitting information corresponding to the identified medication-dispensing patch to an external computing device; receiving information at the wearable device from the external computing device, wherein the received information corresponds to a dosage of a medication that should be dispensed by the medication-dispensing patch; and transmitting information from the wearable device, wherein the transmission is configured for controlling a medication dosage that is dispensed by the medication-dispensing patch.Type: ApplicationFiled: December 17, 2015Publication date: December 7, 2017Inventor: Jonathan T. Goguen
-
Publication number: 20170351841Abstract: A computer configured to monitor medical device data for presentation on a user interface. The computer comprises a processing circuit and a network interface circuit configured to provide communications over a network. The processing circuit is configured to receive at configurable time intervals a medical device status message from a medical device over the network; set a device last connection time, comprising a date and time that a most recent status message was received over the network by the computer from the medical device; receive input from a user interface in communication with the computer to retrieve pump information; calculate a delta between the device last connection time and a date and time the processing circuit received the input from the user interface; compare the delta with a device connection threshold value; and display a warning on the user interface if the delta is greater than the threshold value.Type: ApplicationFiled: May 22, 2017Publication date: December 7, 2017Inventor: Witold Moskal
-
Publication number: 20170351842Abstract: A method includes obtaining blood glucose measurements and blood glucose times of a patient from a blood glucose meter and executing a patient management program configured to display on a screen a graphical user interface having a trend window of the blood glucose measurements on the time line. The patient management program is configured to receive, in the trend window magnifying inputs for a magnification window superimposed on a segment of the timeline to specify a date range for a magnified window. The patient management program is further configured to display the magnified window including the blood glucose measurements of the patient from the specified date range and display a first information window including quantitative information associated with the blood glucose measurements from the specified date range.Type: ApplicationFiled: May 31, 2017Publication date: December 7, 2017Applicant: Aseko, Inc.Inventors: Robert C. Booth, Robert Salitsky, Andrew Rhinehart
-
Publication number: 20170351843Abstract: According to the present invention, the production of repeated examination reports for each examination is limited in a report producing unit. In an ultrasonic diagnostic device according to the present invention, when a user provides an instruction to start producing a report, the report producing unit is activated. For example, the user inputs observations and the like into an examination report. When there is an instruction to finish producing the report from the user, the report producing unit produces an examination report indicating content at the time the instruction is received. When the examination is finished, the examination report is automatically transmitted to a work station. When an examination report is not produced at the time the examination is finished, the report producing unit automatically produces the examination report. In this case, the examination report is also automatically transmitted to the work station.Type: ApplicationFiled: October 13, 2015Publication date: December 7, 2017Applicant: Hitachi, Ltd.Inventors: Fumie TAJIMA, Yukihiro MITA
-
Publication number: 20170351844Abstract: A system for determining relative operational performance in a clinical trial may include a processor, a data comparator and visualizer, and a graphical user interface. The processor filters received clinical data into multiple metric criteria to generate multiple metric data sets and filters each metric data set into a respective industry data set and a respective candidate data set. The processor then calculates statistical measures for each industry data set and candidate data set and transforms each industry data set and candidate data set based on each data set's respective statistical measures. The data comparator and visualizer compares each transformed candidate data set to the transformed industry data set for the respective metric criterion to determine a candidate percentile for each metric criterion. The graphical user interface displays the candidate percentiles for the metric criteria. A method for determining relative operational performance in a clinical trial is also described.Type: ApplicationFiled: April 26, 2017Publication date: December 7, 2017Inventors: David Lee, Michael Elashoff, Joshua Hartman, Richard Kwock, John Savage, Steven Schwager
-
Publication number: 20170351845Abstract: Provided herein are systems and methods for clinical research study data acquisition and quality control.Type: ApplicationFiled: June 1, 2017Publication date: December 7, 2017Inventors: J. Dmitri POPPA, Cassandra L. WALLENDER, Saqib ROKADIA, Brian CARUSO
-
Publication number: 20170351846Abstract: Gestures for creating chemical structures on a touch screen device include circular motions, check marks, and swipes that cause a touch screen enabled device to display symbols representing chemical structures or related information in response to the gestures.Type: ApplicationFiled: August 17, 2017Publication date: December 7, 2017Inventors: John David Clark, Mary Catherine Johnson, Atsuo Kuki
-
Publication number: 20170351847Abstract: An obfuscation macro can expand obfuscation identification information into a data value during or prior to compiling source code, and insert a de-obfuscation call where the data value is referenced in the source code. An obfuscation utility can scan compiled binaries for data values containing obfuscation identification information. The obfuscation utility identifies and obfuscates data values containing obfuscation identification information within the compiled binaries. The de-obfuscation call de-obfuscates obfuscated data values during runtime.Type: ApplicationFiled: June 3, 2016Publication date: December 7, 2017Inventor: Alex Zvenigorodsky
-
Publication number: 20170351848Abstract: Device, system, and method of user authentication utilizing an optical microphone or laser-based microphone. An optical microphone transmits an outgoing optical signal or laser beam towards a face of a human speaker; receives an incoming optical feedback that is reflected back from the face of the human speaker; performs self-mix interferometry that is based on the outgoing optical signal and the incoming reflected optical signal; and generates a user-specific feature or characteristic that uniquely characterizes said human speaker. A user authentication module operates to authenticate the user for performing a privileged or an access-controlled action, based on the user-specific characteristic that was generated, optionally in combination with one or more biometric features or authentication requirements.Type: ApplicationFiled: June 7, 2016Publication date: December 7, 2017Inventor: Tal Bakish
-
Publication number: 20170351849Abstract: Disclosed is a method for authenticating a user by using an electronic apparatus including an authentication module and a secure module, which includes the following steps: the authentication module transmits a recognition result to the secure module according to a process that allows the authentication module to be authenticated by the secure module; the secure module generates an authentication token by signing, with a private key stored in the secure module, data including data representing at least one feature of the authentication module; and transmitting the generated authentication token. Also disclosed is an associated secure module, electronic apparatus and system.Type: ApplicationFiled: December 17, 2015Publication date: December 7, 2017Inventors: Emmanuelle DOTTAX, Philippe MURESIANU, Michele SARTORI, Fabien CORDIER
-
Publication number: 20170351850Abstract: An electronic device is provided. The electronic device includes a housing, a touch display, a pressure sensing circuit, a fingerprint sensor, a processor, and a memory. The memory is configured to store fingerprint data associated with a plurality of reference fingerprints. The processor is configured to, when pressure is applied by the finger in the fingerprint sensing area, receive first data associated with the pressure from the pressure sensing circuit and receive second data associated with the fingerprint of the finger from the fingerprint sensor, identify a selected function corresponding to the second data based on comparing result of the second data and the reference fingerprint data, and execute the selected function.Type: ApplicationFiled: May 31, 2017Publication date: December 7, 2017Inventors: Yun Jang JIN, Kyung Hoon SONG, Kwang Sub LEE, Se Young JANG, Chi Hyun CHO
-
Publication number: 20170351851Abstract: An infusion system to administer fluid is disclosed. The infusion system includes an infusion pump having a pump processor, a pump memory and a pump radio to enable bi-directional communication. The pump memory stores a plurality of fingerprint tokens and security conditions. The infusion system includes a controller with a processor, a controller memory and a controller radio to transmit and receive communication from the pump radio. The controller includes a fingerprint scanner and a graphical user interface (GUI) and controls to manipulate the GUI. The GUI and fingerprint scanner enable the controller to scan and determine tokens based on scanned fingerprints. Additionally, communication between the infusion pump and the controller establish relative proximity between the infusion pump and the controller such that when the relative proximity exceeds a threshold distance at least one of the plurality of security conditions is automatically matched.Type: ApplicationFiled: August 25, 2017Publication date: December 7, 2017Inventors: Yongbo Wang, Bozhil Makaveev
-
Publication number: 20170351852Abstract: An identity authentication method is provided, including: obtaining a virtual-resource data processing request sent by a mobile terminal, the virtual-resource data processing request carrying a prestored digital fingerprint, and the digital fingerprint being generated by using device information and user information; performing virtual-resource data processing authentication on the virtual-resource data processing request according to a pre-established user value transfer behavior model; after virtual-resource data processing authentication succeeds, generating a value transfer token according to the digital fingerprint, and returning the value transfer token to the mobile terminal; receiving a value transfer request sent by the mobile terminal, the value transfer request carrying the value transfer token; and checking whether the value transfer token is valid, if the value transfer token is valid, identity authentication succeeding; otherwise, identity authentication failing.Type: ApplicationFiled: August 11, 2017Publication date: December 7, 2017Inventors: Dongpo BAO, Huan JIN, Songjian WANG, Jianwei DENG, Yin LI, Ruizhou WU, Cheng YANG
-
Publication number: 20170351853Abstract: A communication management method for managing communication made by a plurality of users with a computer including a processor, the computer being accessible to a storage device holding user management information including information on users participating in a community, group management information including information on groups to which the users belong, and community management information including information on the community, and the communication management method comprising steps of: registering, by the processor, in a case of receiving a request to let a group join a community from a client terminal, an administrative user of the group designated by the request to the user management information; registering, by the processor, the group designated by the request to the group management information; and registering, by the processor, the group designated by the request to the community management information, to allow users belonging to the group to participate in the community.Type: ApplicationFiled: January 5, 2016Publication date: December 7, 2017Inventors: Motoki KAMITANI, Masahiko MANO, Ryo NISHIMURA, Takashi SAITO
-
Publication number: 20170351854Abstract: A system includes one or more protected nodes within a protected system, where each protected node is configured to be coupled to a storage device. The system also includes a server configured to perform a check-in process so that one or more files on the storage device are (i) accessible by the one or more protected nodes within the protected system and (ii) not accessible by nodes outside of the protected system while the storage device is checked-in. The server is also configured to perform a check-out process so that the one or more files on the storage device are (i) accessible by the nodes outside of the protected system and (ii) not accessible by the one or more protected nodes within the protected system while the storage device is checked-out. The server could be configured to modify a file system of the storage device during the check-in process.Type: ApplicationFiled: March 27, 2017Publication date: December 7, 2017Inventors: Eric D. Knapp, Eric T. Boice
-
Publication number: 20170351855Abstract: A method for identifying sensitive information in a communication may include analyzing a plurality of communications associated with a user in a social networking system for concept and entity sharing to create a relationship graph of concept and entity sharing history. The method may also include analyzing a current communication from the user to extract one or more elements from the current communication. Each element may include an associated concept or entity and an associated sensitivity level. The method may additionally include determining a recipient based sensitivity level for each element based on an identity of each recipient and a relationship or connection of each recipient with each element using the relationship graph. The method may further include providing an indication of sending sensitive information in response to the recipient based sensitivity level of a particular element exceeding a configurable risk level threshold.Type: ApplicationFiled: June 3, 2016Publication date: December 7, 2017Inventors: Corville O. Allen, Joseph N. Kozhaya, Neil Sahota
-
Publication number: 20170351856Abstract: A method includes creating, in a secure platform, multiple securely-partitioned system sandboxes under control of at least one user associated with an industrial process control and automation system. Different system sandboxes are associated with different third parties who are not owners or operators of the industrial process control and automation system. The method also includes receiving content from the third parties in the system sandboxes. The method further includes receiving from the at least one user a selective activation of at least some of the content in the system sandboxes in order to place the at least some of the content into use by the industrial process control and automation system. The content could include equipment configurations for equipment associated with the industrial process control and automation system, and the equipment configurations could include control strategies and visualizations for the equipment.Type: ApplicationFiled: March 27, 2017Publication date: December 7, 2017Inventors: Stephen R. McGeorge, Peter Carl Davis, David Barry Granatelli, Graeme Laycock, Rhett Newman, Paul Vellacott
-
Publication number: 20170351857Abstract: Embodiments for scanning data within and between distributed computing components by a processor. Data scanning functionality is allocated through an object storlet located at a local node of the distributed computing components. The data scanning functionality is performed using computational components of the object storlet on local data contained within the local node to alleviate transfer of the local data outside of the local node to be scanned.Type: ApplicationFiled: June 7, 2016Publication date: December 7, 2017Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John J. AUVENSHINE, Anthony J. CIARAVELLA, John T. OLSON, Richard A. WELP
-
Publication number: 20170351858Abstract: A method includes detecting a storage device and performing a check-in process for the storage device. The check-in process includes scanning the storage device to identify any malware contained on the storage device, digitally signing one or more clean files on the storage device, and modifying a file system of the storage device. The method may also include performing a check-out process for the storage device, where the check-out process includes restoring the file system of the storage device. The file system of the storage device can be modified during the check-in process so that one or more protected nodes within a protected system are able to recognize the modified file system of the storage device and nodes outside of the protected system cannot recognize the modified file system of the storage device.Type: ApplicationFiled: March 27, 2017Publication date: December 7, 2017Inventors: Eric D. Knapp, Eric T. Boice
-
Publication number: 20170351859Abstract: Disclosed are systems and method for detecting a malicious computer system. An exemplary method comprises: collecting, via a processor, characteristics of a computer system; determining relations between collected characteristics of the computer system; determining a time dependacy of at least one state of the computer system based on determined relations; determining the at least one state of the computer system based at least on determined time dependacy; and analyzing the at least one state of the computer system in connection with selected patterns representing a legal or malicious computer system to determine a degree of harmfulness of the computer system.Type: ApplicationFiled: July 20, 2016Publication date: December 7, 2017Inventors: Alexey E. Antonov, Alexey M. Romanenko
-
Publication number: 20170351860Abstract: A malware detection system to detect malware in a client computer system includes a behavior profile generator adapted to generate a behavior profile specifying operational behaviors of a computer system indicative of the existence of malware in the computer system; an interface adapted to communicate the behavior profile to the client; and an identifier responsive to a message from the client that the behavior profile is exhibited by the client and adapted to identify a reaction instruction for performance by the client, wherein the interface is further adapted to communicate the reaction instruction to the client.Type: ApplicationFiled: December 17, 2015Publication date: December 7, 2017Applicant: British Telecommunications Public Limited CompanyInventors: Fadi EL-MOUSSA, Behnan AZVINE
-
Publication number: 20170351861Abstract: A malware detection system to detect malware in a virtual machine (VM), the system including a profile generator adapted to generate a profile of a deployment of the VM, the profile including execution characteristics of the deployment; a VM package generator to generate a VM package including: a VM descriptor describing a particular deployment of the VM; and an image of the particular deployment, the image including a representation of data stored for the particular deployment of the VM; and a malware identifier adapted to identify malware in a deployment of the VM responsive to the identification of a difference between profiles of multiple different deployments of the VM.Type: ApplicationFiled: December 17, 2015Publication date: December 7, 2017Applicant: British Telecommunications Public Limited CompanyInventors: Fadi EL-MOUSSA, Andreas MAUTHE, Angelos MARNERIDES, Michael WATSON
-
Publication number: 20170351862Abstract: In an example, a system and method are described for providing trusted updaters and trusted processes. An updater may be subject to a whitelist of files that it, and any child processes, are allowed to modify. But trust inheritance may break across reboots and over interprocess communication. Thus, it is desirable to provide a system and method to maintain trust across such events. In the case of a trusted installer, inheritance may be maintained by cross referencing a digital certificate to a workflow grid. In the case of updater processes, trust may be maintained by using a combination of digital certificates that are part of a trust chain and a unique identifier for each trust chain workflow.Type: ApplicationFiled: December 11, 2015Publication date: December 7, 2017Inventors: Preet Mohinder, Ratnesh Pandey, Jaskaran Singh Khurana, Amritanshu Johri
-
Publication number: 20170351863Abstract: Systems, methods, and computer program products are provided for managing data re-installation including service re-installation. A re-installation procedure re-installs and optionally activates data at least partially installed on a secure element without intervention middleware to repair a personalization procedure failure. Thus, personalization data on a secure element (SE) may be comprehensively managed by interfacing between one of a plurality of service provider (SP) trusted service managers (TSM) and a central trusted service manager (central TSM). The processing time required to manage the re-installation procedure is minimized.Type: ApplicationFiled: August 18, 2017Publication date: December 7, 2017Inventor: Michael J. Gargiulo
-
Publication number: 20170351864Abstract: An information processing system includes a first apparatus and at least one second apparatus. The first apparatus includes a unit that receives input of data, a storage unit that stores concealed data corresponding to the input data with a concealment target thereof concealed, a unit that, if instructed by a user to refer to the stored concealed data, transmits a reference request containing information indicating the user to the second apparatus, and a unit that, if provided with reconstruction information from the second apparatus, reconstructs the concealment target with the reconstruction information. The second apparatus includes a memory that stores the reconstruction information, a determining unit that makes a determination on reference authority of the user to the reconstruction information, and a responding unit that provides the first apparatus with the reconstruction information if the determining unit determines that the user has reference authority to the concealment target.Type: ApplicationFiled: November 9, 2016Publication date: December 7, 2017Applicant: FUJI XEROX CO., LTD.Inventor: Tetsunori MURAKAMI
-
Publication number: 20170351865Abstract: Aspects may relate to a computing device that comprises a processor operable in a secure mode and a memory. The processor may be configured to: obtain a first layer of graphics that includes image elements; obtain a second layer of graphics that includes image elements; randomly select an image element from the first layer of graphics; randomly select an image element from the second layer of graphics; and compose the selected image elements from the first and second layer of graphics to create a composed random image. Further, the processor may command the memory to store the composed random image.Type: ApplicationFiled: June 6, 2016Publication date: December 7, 2017Inventor: Or ELNEKAVEH
-
Publication number: 20170351866Abstract: Described herein is a method comprising obtaining a user identifier code associated with a document and receiving a password from a user. The method further comprising authenticating the user identifier code with the password and applying an image to the document in response to the identifier code and the password being authenticated.Type: ApplicationFiled: April 11, 2015Publication date: December 7, 2017Inventors: Kian Hwa GOH, Chun Wei Shaun TAN