Patents Issued in December 21, 2017
-
Publication number: 20170364640Abstract: A method for automated analysis of medical records which executes a medical analysis algorithm to analyze patient data to generate an electronic narrative document. The electronic narrative document is stored in a patient database, which may be retrieved for viewing and editing by a user. As changes are made by the user, the medical analysis algorithm will predict and make suggestions in real-time. If the user selects to manually modify the electronic narrative document, the changes are stored for subsequent use.Type: ApplicationFiled: June 13, 2017Publication date: December 21, 2017Inventor: Omar BADAWI
-
Publication number: 20170364641Abstract: Methods, computer-readable media, and systems for providing disease management. In one implementation, a system develops a treatment recommendation for a patient based on patient data. The system may receive patient data, execute a basic model of the physiological system of the patient to generate a modified model for the patient based on the patient data, perform a statistical analysis of the patient data to detect data excursions of the parameter values; use the modified model to determine factors causing the data excursions; and use the model to develop a treatment recommendation to ameliorate negative effects of the disease.Type: ApplicationFiled: August 7, 2017Publication date: December 21, 2017Applicant: WellDoc, Inc.Inventors: Ryan A. SYSKO, Suzanne K. Sysko, James M. Minor, Anand K. Iyer, Andrew V. Fletcher
-
SYSTEMS, APPARATUS, ARTICLES, AND METHODS FOR IDENTIFYING LEVELS OF SERVICE IN A HOSPITAL DEPARTMENT
Publication number: 20170364642Abstract: Provided are at least one system, apparatus, article, and method for providing an evaluation and management tool for identifying levels of service provided by a hospital department, such as the emergency department (ED). The at least one system, apparatus, article, and method may be applied for a patient visit to the hospital department, such as the ED, and for identifying the level of service associated with the visit.Type: ApplicationFiled: June 12, 2017Publication date: December 21, 2017Applicant: Texas Health Biomedical Advancement Center, Inc.Inventors: Sharon Renee Bogdanowicz, Kimberley Ann Shomette -
Publication number: 20170364643Abstract: Example methods, systems, and computer readable media are disclosed to allocate a medical exam. An example method includes identifying an exam characteristic associated with the medical exam. The example method includes determining a plurality of allocation scores for a plurality of radiologists by comparing the exam characteristic to a radiologist characteristic for each of the plurality of radiologists. The example method includes determining one of the plurality of allocation scores with a highest value. The example method includes allocating the medical exam to one of the plurality of radiologists associated with the one of the plurality of allocation scores with the highest value. The example method includes marking the medical exam as allocated to the one of the plurality of radiologists associated with the one of the plurality of allocation scores with the highest value. The example method includes providing an indication that the medical exam is allocated via a graphical user interface.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Eric Jester, Arun Viswanath, Madhu Seepani, Shaoyu Feigler, Jeff Chu, Jiaohuan Wang, Vineet Ahuja, Charlotte Mae Shelton, Rhonda Eckstein
-
Publication number: 20170364644Abstract: The system and method disclosed herein provides an integrated and automated workflow, sensor, and reasoning system that automatically detects breaches in protocols, appropriately alarms and records these breaches, facilitates staff adoption of protocol adherence, and ultimately enables the study of protocols for care comparative effectiveness. The system provides real-time alerts to medical personnel in the actual processes of care, thereby reducing the number of negative patient events and ultimately improving staff behavior with respect to protocol adherence.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Christopher Donald Johnson, Peter Henry Tu, Piero Patrone Bonissone, John Michael Lizzi, JR., Kunter Seref Akbay, Ting Yu, Corey Nicholas Bufi, Viswanath Avasarala, Naresh Sundaram Iyer, Yi Yao, Kedar Anil Patwardhan, Dashan Gao
-
Publication number: 20170364645Abstract: An example system to distribute a medical exam to an examiner includes a first interface to display a medical exam identifier associated with a medical exam stored in a patient record database and an examiner availability indicator to be displayed via the first interface. The examiner availability indicator is to be updated via a second interface. The example system includes an exam allocator to automatically allocate the medical exam to the examiner and an assignment tool to be displayed to a user via the first interface and to facilitate assignment of the allocated exam to the examiner. At least one of the exam allocator or the assignment tool is to be communicatively associated with the examiner availability indicator. Upon assignment of the medical exam to the examiner, the medical exam identifier is displayed in an examiner work queue via the first interface, the second interface, and a third interface.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Eric Jester, Arun Viswanath, Madhu Seepani, Shaoyu Feigler, Jeff Chu, Jiaohuan Wang, Vineet Ahuja, Brittany Melissa Johnson, Charlotte Mae Shelton, Rhonda Eckstein
-
Publication number: 20170364646Abstract: A computer implemented method and system for optimization of medical resource utilization within a set of physicians in order to calculate a potential cost savings opportunity is described. Input classified discharge data directed to cost information for service items grouped by a Diagnosis Related Group (DRG) is assigned to a physician which was most responsible for the resource utilization in treating the patient while the patient was hospitalized. For each DRG in the classified data, the responsible physicians are dynamically clustered based on resource utilization to identify the factors that are consistently different across the clustered physicians as a difference index value. The difference index value can be analyzed for determining potential cost savings opportunities. An interactive user interface can be used for entering discharge data, dynamically displaying resource utilization by the difference index value and potential cost savings opportunities.Type: ApplicationFiled: June 20, 2016Publication date: December 21, 2017Inventors: George CHALISSERY, Verghese VERGHESE, Jineesh Kachira JAMES, Sindhumol SABU, Afsal Tharupeedikayil ABDULKHADER, Udaya ADUKKADUKKAM, Sreekumar Mullasseril SASIDHARAN
-
Publication number: 20170364647Abstract: A system and method generates a rule set. The method being performed by a rule generating device includes receiving a plurality of previously generated reports where each of the previously generated reports includes respective analysis content of a respective image. The method includes generating a candidate rule based upon the analysis content where the candidate rule is configured to increase a quality assurance of future reports. The method includes generating a respective score for each candidate rule based upon the candidate rule and the previously generated reports. The method includes including the candidate rule into the rule set when the score is above a predetermined threshold.Type: ApplicationFiled: December 18, 2015Publication date: December 21, 2017Inventors: MERLIJN SEVENSTER, THOMAS ANDRE FORSBERG
-
Publication number: 20170364648Abstract: The invention suggests a system for monitoring the exposure of a patient (1) to at least one environmental factor. The system particularly comprises a database (8) storing an environmental prescription for the patient, the environmental prescription specifying a maximum level of the environmental factor and a minimum duration for the level of the environmental factor to be smaller than the maximum level, and an evaluation module (7) configured to detect on the basis of a measurement signal and the stored environmental prescription a time interval in which a level of the environmental factor is below the maximum level and to compare the duration of the detected time interval with the minimum duration. On the basis of the result of this comparison, healthcare staff can plan activities in such a way that the patient is provided with a rest period substantially having the minimum duration.Type: ApplicationFiled: December 15, 2015Publication date: December 21, 2017Inventors: KATJA LEUSCHNER, MUN HUM PARK, ANDRE MELON BARROSO, FRANK MUELLER
-
Publication number: 20170364649Abstract: An apparatus, a process and a system for monitoring a plurality of patients (P) affected by kidney failure over a time frame (T) are disclosed. The system includes blood treatment units, laboratory storage units, at least one hub module, and client units. The system collects values (VM) of a plurality of session parameters, set values (VS) of a plurality of prescription parameters, values (VL) of a plurality of laboratory parameters and the hub module stores values (KPVi) of selected parameters (KPi) which are a subclass of the collected values (VM, VS, VL) and which are transferred to the client units. Each client unit may define, for each of said patients, a number of indicators (IDk) based on the values (KPVi,k) taken by a respective subclass (KPi,k) of said selected parameters (KPi) and to operate the respective display according to various display modes.Type: ApplicationFiled: August 29, 2017Publication date: December 21, 2017Inventors: Bernard Bene, Archille Fouilleul, Lionel Buttin
-
Publication number: 20170364650Abstract: Disclosed is a novel system, computer program product, and method for managing a therapeutic state of a subject of interest. A combination of location-based information, contextual-based information, and cognitive-based information is accessed for the subject of interest. A machine learning algorithm calculates a therapeutic state of the subject of interest using as inputs the location-based information, contextual-based information, and cognitive-based information. A predefined policy associated with the therapeutic state of the subject of interest. Based on the policy, the vital signs of the subject of interest are monitored.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventors: Lisa Seacat DELUCA, Jeremy Adam GREENBERGER, James Robert KOZLOSKI, John Jeremy RICE
-
Publication number: 20170364651Abstract: Data that is derived from a medical device connected to or communicating with, a patient monitor mount, is detected by the patient monitor mount. The data is monitored for events associated with the medical device. The patient monitor mount then determines that the monitored event corresponds to an event. The patient monitor mount generates at least one command for a visualization device to change the data displayed on the visualization device. The command is then transmitted to the visualization device. Related apparatus, systems, methods and articles are also described.Type: ApplicationFiled: November 30, 2015Publication date: December 21, 2017Inventors: Michael D. Hirst, Joshua Abell
-
Publication number: 20170364652Abstract: The present invention relates to a method for the management of the protocols used by devices for clinical-diagnostic analyses and the results obtained by said devices. The present invention further relates to the systems apt to perform such method.Type: ApplicationFiled: December 11, 2015Publication date: December 21, 2017Inventor: Stefano LO PRIORE
-
Publication number: 20170364653Abstract: At a first computer connected to a medical monitoring device, first data are received from the monitoring device repetitively. The first computer is within a first local network, the monitoring device is configured to monitor characteristics of a patient, and the first data represent monitored characteristic(s) of the patient or associated metadata. The first data are sent from the first computer to a second computer via the local area network and a public network. The second computer is outside the first local area network and connected to the public network, and the first data is sent from the first computer to the second computer based on an IP address stored at the first computer. A value of one of the monitored characteristics is determined as within a predetermined range, and a polling frequency for each of the monitored characteristics is set to a common frequency based on that determination.Type: ApplicationFiled: December 18, 2015Publication date: December 21, 2017Applicant: Neximatic, Inc.Inventors: Bobby Wong, Jack Li
-
Publication number: 20170364654Abstract: Disclosed is a method for facilitating provisioning of health data during emergencies. The method includes receiving a health data associated with an individual from an individual device. Further, the method includes storing the health data in association with an identifier associated with the individual. Yet further, the method includes receiving an indication of a medical emergency associated with the individual. Further, the method includes retrieving the health data associated with the individual based on receipt of the indication of the medical emergency. Further, the method includes receiving a location of the individual from a mobile device, wherein the mobile device is configured to detect the location. Moreover, the method includes identifying at least one professional device based on the location. Further, the method includes transmitting the health data to the at least one professional device.Type: ApplicationFiled: June 15, 2017Publication date: December 21, 2017Inventor: Jeffrey Joseph Schemansky
-
Publication number: 20170364655Abstract: Various aspects and embodiments relate to a healthcare adherence monitoring system (HAMS) that can be used to monitor adherence of a healthcare recipient to a healthcare plan (e.g., a medication, exercise, and nutrition regimen). The HAMS may receive a personalized prescription including one or more pre-coded prescription components and/or customized recommendations of the healthcare plan from a healthcare provider device via a communication network. The HAMS may then incorporate the received personalized prescription for the healthcare recipient into a healthcare mobile application that a healthcare recipient device can access via the communication network.Type: ApplicationFiled: June 15, 2017Publication date: December 21, 2017Inventor: Arshad Farooqi
-
Publication number: 20170364656Abstract: A communicative water bottle includes communication logic and wireless transmission logic technology electronically connected with a variety of sensors either on the water bottle or located remote from the water bottle. The sensors on the bottle create digital data associated with amount of fluid in the bottle and change thereof. The sensors remote from the bottle, which can be on an activity tracker, create digital data associated with an activity being performed by a user, such as running, or the absence of activity, such as remaining sedentary. A display on the bottle can indicate to the user the amount of fluid consumed or a reminder that fluid should be consumed. The fluid consumption data syncs with other remote devices such as mobile applications executable on smartphones.Type: ApplicationFiled: August 30, 2017Publication date: December 21, 2017Inventors: Kathryn A. Wernow, Howard L. Wernow
-
Publication number: 20170364657Abstract: A method for determining a numerical score representative of a patient's health, is characterized by the following steps. At an initial calibration step, a database is established from a series of indicators relating to the state of health of the patient, each indicator being assigned a numerical value, and afterwards a statistical analysis of this database is performed so as to establish for each of said indicators a score depending on a measured value of the indicators of the state of health with respect to reference values, and to establish at least four groups constituted by said indicators, each of said groups representing information corresponding respectively to oxidative stress, hereinafter Group 1; to functions of the digestive brain, hereinafter Group 2; to functions of the reptilian brain, hereinafter Group 3; and to physical abilities of the patient coupled to his information on his general state of health, hereinafter Group 4.Type: ApplicationFiled: December 10, 2015Publication date: December 21, 2017Inventor: Michel GOLAY
-
Publication number: 20170364658Abstract: A method for vascular assessment is disclosed. The method includes receiving a plurality of medical images of a portion of a vasculature of a subject and processing the medical images to produce a model of the vasculature. The method further includes obtaining a flow characteristic of the model and calculating an index indicative of vascular function, based, at least in part, on the flow characteristic in the model.Type: ApplicationFiled: June 30, 2017Publication date: December 21, 2017Inventors: Ifat Lavi, Ran Kornowski, Idit Avrahami, Nessi Benishti, Guy Lavi
-
Publication number: 20170364659Abstract: The present invention relates to a method of dental implant treatment planning, a device and a recording medium therefore. The device for dental implant treatment planning according to the present invention can move or rotate the grouped objects together in 2D or 3D model about teeth arrangement for implant treatment planning with grouping function of the implant objects. So, it decreases complexity of manipulation of the implant objects, provides users with convenience to easily modify position or size of the implant objects, and improves the accuracy of the modification.Type: ApplicationFiled: December 4, 2015Publication date: December 21, 2017Applicant: OSSTEMIMPLANT CO., LTD.Inventors: Kyoo Ok CHOI, Tae Hwan KIM, Seung Yong HWANG, Seong Yun LEE
-
Publication number: 20170364660Abstract: Infusion devices and related patient management systems and methods are provided. An exemplary method of presenting information pertaining to operation of an infusion device to deliver fluid to a body of a patient involves identifying a plurality of event patterns within different monitoring periods based on measurement values for the patient's condition, prioritizing the identified event patterns based on one or more prioritization criteria, filtering the prioritized list of identified event patterns based on one or more filtering criteria, and then providing a respective pattern guidance display for each identified event pattern remaining in the filtered prioritized list. In exemplary embodiments, a respective pattern guidance display includes graphical indicia of one or more remedial actions, such as recommended therapy modifications for addressing the respective event pattern.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Robert A. Vigersky, Pratik Agrawal, Risako Morawiec, Yi Guan
-
Publication number: 20170364661Abstract: Technical solutions are described for monitoring health of a user by a healthcare system. An example computer-implemented method includes accessing a current image of the user. The computer-implemented method also includes determining a healthcare routine for the user. The computer-implemented method also includes generating a modified image of the user, where the modified image includes a predicted effect of the healthcare routine. The computer-implemented method also includes displaying, for viewing by the user, the modified image, and information about the healthcare routine.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Rick A. Hamilton, II, James R. Kozloski, Brian M. O'Connell, Ninad D. Sathaye
-
Publication number: 20170364662Abstract: According to embodiments of the disclosed subject matter, a server can include processing circuitry configured to receive a virtual modeling file encoded with an orthodontic treatment plan such that the encoded information of the virtual modeling file format allows all steps of the orthodontic treatment plan to be displayed without a separate file for each treatment step. Additionally, the processing circuitry can be configured to download a first treatment step of the virtual modeling file format, receive gingiva and teeth geometries corresponding to the first treatment step, and display the first treatment step. Further, a selected treatment step can be displayed based on information encoded into the orthodontic virtual modeling file format.Type: ApplicationFiled: June 15, 2017Publication date: December 21, 2017Applicant: CLEARCORRECT OPERATING, LLCInventor: Lance THOMPSON
-
Publication number: 20170364663Abstract: The present invention provides group performance monitoring systems and methods.Type: ApplicationFiled: August 16, 2017Publication date: December 21, 2017Inventors: Michael MCBREARTY, Qaizar HASSONJEE, Roger ARMITAGE, Brian Keith WHEELER, Meg Susan BURICH, Hagen DIESTERBECK, Markus STRECKER
-
Publication number: 20170364664Abstract: The disclosure concerns a method for patient stratification and selection of patients who are candidates for a specific therapy is described which is based on quantifying one or more digital image analysis feature distributions from stained tissue. The method extends beyond the abilities of a manual observer and a microscope, and generally comprises: acquiring digital images of stained tissue sections from patients submitted for evaluation, applying an algorithm process to said images with a computer to extract the morphometric and staining features of image pixels and tissue objects, deriving one or more distribution function for one or more image analysis features, calculating a summary statistic of the one or more distribution functions, and using said summary statistic along with an associated predefined patient stratification paradigm to separate a patient cohort into distinct strata which correspond to a decision to include or exclude a patient for a specific therapy.Type: ApplicationFiled: September 5, 2017Publication date: December 21, 2017Applicant: Flagship Biosciences, Inc.Inventors: Joshua Black, Carsten Schnatwinkel, Kristin Wilson, Nathan T. Martin, Joseph Krueger, Holger Lange
-
Publication number: 20170364665Abstract: Systems and methods are described for modifying a cosmetic product based on a microbe profile including an ingredient-microbe interaction dataset including information associated with interactions between reference cosmetic ingredients and types of reference microbes; and a computing device including circuitry configured to receive information associated with the microbe profile of an individual, receive information associated with an ingredient list of the cosmetic product, compare the microbe profile of the individual and the ingredient list of the cosmetic product to the ingredient-microbe interaction dataset, identify an interaction between at least one cosmetic ingredient in the ingredient list of the cosmetic product and at least one of the one or more types of microbes in the microbe profile of the individual, recommend a modification to the ingredient list in response to an identified interaction, and report to a user the recommended modification.Type: ApplicationFiled: August 30, 2017Publication date: December 21, 2017Inventors: Michael H. Baym, Roderick A. Hyde, Jordin T. Kare, Eric C. Leuthardt, Gary L. McKnight, Tony S. Pan, Elizabeth A. Sweeney, Clarence T. Tegreene, Lowell L. Wood, JR.
-
Publication number: 20170364666Abstract: At least one of the disclosed embodiments describes a computer system that enables efficient strain typing by comparing strain k-mer profiles to generate a strain typing relationship mapping. The system may include one or more processors, and one or more hardware storage devices with stored computer-executable instructions. The instructions may cause the computer system to receive a set of nucleotide sequence data. The nucleotide sequence data may include a plurality of nucleotide sequence data structures each corresponding to a separate microbial strain to be analyzed. For each nucleotide sequence data structure, a k-mer profile may be generated. K-mer profiles may be compared to determine a similarity score between the k-mer profiles, which may indicate a relationship mapping of the respective microbial strains corresponding to the k-mer profiles.Type: ApplicationFiled: June 9, 2017Publication date: December 21, 2017Inventors: Mark Fisher, Keith Simmon
-
Publication number: 20170364667Abstract: A multi-tired, modular, electronic system which utilizes restricted usage management. In a multi-tiered environment, lower tiered systems contain, based on configuration, mobile units that are capable of performing simple tasks such as lawnmowers, vacuum cleaners, mobile audio/video players to more complex ones capable of performing as human assistants such as robots. Higher tiered systems typically reside in the cloud. Lower tiered mobile units contain modular sensors such as temperature sensor and image/video cameras that generate vast amount of data. The lower tiered mobile units also contain modular emitters that consume vast amount of data. Restrictions for the usage of these mobile units are sent, in the form of metadata, to the lower tiered mobile units, from an intermediate to higher tiered control devices and the rendering app may limit the usage. The intermediate tiered renderer can interact to make sure rules have been followed.Type: ApplicationFiled: June 14, 2017Publication date: December 21, 2017Inventors: James Duane Bennett, Bindu Rama Rao
-
Publication number: 20170364668Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: ApplicationFiled: June 29, 2017Publication date: December 21, 2017Inventor: Wulf Harder
-
Publication number: 20170364669Abstract: Systems and techniques are provided for restricted accounts on a mobile platform. A request to create a restricted account may be received. The restricted account may be a user account with a restriction. Credentials for the restricted account may be received. A restriction for the restricted account may be received. The restriction may include an access restriction or a lifetime restriction. An access restriction may prevent an application from accessing the restricted account and a lifetime restriction may limit the lifetime of the restricted account. The restricted account may be stored with the credentials and the restriction. A request may be received for a list of user accounts from an application. The restricted account may be determined to include an access restriction that prevents the application from accessing the restricted account. The list of user accounts may be sent to the application and without an identifier for the restricted account.Type: ApplicationFiled: September 1, 2017Publication date: December 21, 2017Inventors: Ushasree Kode, Carlos Valdivia
-
Publication number: 20170364670Abstract: A method for an electronic device to restrict functionality according to working mode is provided. The method establishes a fingerprint database, wherein the fingerprint database stores at least one fingerprint of each authorized user for unlocking the electronic device, a finger type corresponding to each fingerprint stored in the fingerprint database, and a preset finger area corresponding to each finger type stored in the fingerprint database. A fingerprint of a user is obtained through a sensor. The fingerprint is matched against database for authorized status and size of fingerprint currently obtained is also analyzed and compared to a preset size of the type corresponding to the obtained fingerprint. The electronic device is unlocked for an authorized user and controlled to enter into an unrestricted working mode for an adult or into a restricted working mode for a child, according to the comparison.Type: ApplicationFiled: June 16, 2017Publication date: December 21, 2017Inventor: TANG-WEI WU
-
Publication number: 20170364671Abstract: A mobile, wireless biometric identification system includes a biometric capture device which enables a smartphone, using a commercially established wireless communication networks, to capture a digital image of a human biometric (iris, fingerprint, etc.) for transmission to a central server. The biometric capture device captures a high quality image for encoding and comparison, while the overall system leverages the existing cellular communication network. The device can be used as an interface to medical databases and devices used to diagnose and treat patients.Type: ApplicationFiled: September 5, 2017Publication date: December 21, 2017Applicant: BI2 Technologies, LLCInventor: Sean Mullin
-
Publication number: 20170364672Abstract: A method of controlling screen lock and a mobile terminal employing the same is provided. The mobile device includes a User Interface (UI) for setting a screen unlock mode using a wireless device other than the mobile terminal and stores IDentifier (ID) information of the wireless device designated by the UI corresponding to the screen unlock mode. The mobile terminal is capable of detecting a wireless device. After the ID information of the wireless device is stored, if the wireless device is detected by the mobile terminal and ID information of the detected wireless device is identical to the stored ID information, the mobile terminal controls not to display an unlock requesting screen when the display unit of the mobile terminal is turned on.Type: ApplicationFiled: December 8, 2016Publication date: December 21, 2017Inventors: Ju-youn LEE, Sang-hyup LEE
-
Publication number: 20170364673Abstract: One embodiment provides a method for ensuring device security via swipe pattern recognition, the method comprising: utilizing at least one processor to execute computer code that performs the steps of: receiving, using a touch device, at least one swipe input of a user; determining, using the at least one processor, if the at least one swipe input matches a known swipe pattern of the user, the match requiring exceeding a match confidence level; and responsive to said determining, executing an action associated with the touch device. Other aspects are described and claimed.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: Megha Gupta, Apurva Kumar, Ashish Kundu, Amit Anil Nanavati
-
Publication number: 20170364674Abstract: Systems and methods are described for accessing a secure system requiring multi-point authentication by receiving an optical image, wherein the optical image includes at least a portion of an identification badge; determining a plurality of characteristics from the optical image of at least a portion of the identification badge; comparing one or more of the plurality of characteristics to a database of characteristics of authorized users; assigning a confidence factor based on the comparison; and prompting for a second form of authentication if the confidence factor meets or exceeds a threshold or denying access to the secure system if the confidence factor does not meet or exceed the threshold.Type: ApplicationFiled: November 20, 2014Publication date: December 21, 2017Inventors: Robert William GRUBBS, Justin Varkey JOHN
-
Publication number: 20170364675Abstract: Methods and systems for authenticating a user include presenting a list of themes on a user interface of a client device for user selection. Images of a plurality of objects and query prompts are presented on a client device for a theme selected from the list. Images of objects selected in response to the query prompts are received and verified to determine that the objects that are selected are theme-based objects and correspond to the query prompts. The selected objects are stored as answers to the query prompts identified for the theme and are used for authenticating the user during subsequent requests received from an application that is used to access a sensitive, digital asset.Type: ApplicationFiled: June 13, 2017Publication date: December 21, 2017Inventor: Stephen D. Vilke
-
Publication number: 20170364676Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.Type: ApplicationFiled: August 16, 2017Publication date: December 21, 2017Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
-
Publication number: 20170364677Abstract: Disclosed is a computer and method in a computer that detects attachment of an external device. A determination may be made whether the external device is trusted or untrusted. When the external device is deemed to be trusted, a first device stack may be instantiated in a first OS executing on the computer to conduct interactions with the external device. When the external device is deemed to be untrusted, a second device stack may be instantiated in a second OS executing on the computer to conduct interactions with the external device.Type: ApplicationFiled: June 20, 2016Publication date: December 21, 2017Inventors: Sisimon Soman, Matt Conover
-
Publication number: 20170364678Abstract: The present invention is directed to system for and methods of real time observing, monitoring, and detecting anomalies in programs' behavior at instruction level. The hardware assist design in this invention provides fine grained observability, and controllability. Fine grained observability provides unprecedented opportunity for detecting anomaly. Controllability provides a powerful tool for stopping anomaly, repairing the kernel and restoring the state of processing. The performance improvement over pure software approach is estimated to be many orders of magnitudes. This invention is also effective and efficient in detecting mutating computer viruses, where normal, signature based, virus detection is under performing.Type: ApplicationFiled: August 30, 2017Publication date: December 21, 2017Inventor: Sukarno MERTOGUNO
-
Publication number: 20170364679Abstract: Examples described herein include receiving a loading request of an executable file from a requester. The executable file may include original content. Examples described herein also include determining an instrumented version of the executable file to provide to the requester based on a security policy, determining an existence of the instrumented version of the executable file on a storage, and providing the instrumented version of the executable file to the requester. The instrumented version may include protective content in addition to the original content of the executable file.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventor: David John Babcock
-
Publication number: 20170364680Abstract: A number of events are counted in different layers of a computing environment during execution of a software application. The number of counted events can be compared to a previously generated cluster set to determine that at least one of the counted events is an outlier. Data can then be provided that characterizes the at least one of the counted events determined to be an outlier. In some cases, some or all of the functionality of the software application can be selectively disabled. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: June 20, 2016Publication date: December 21, 2017Inventors: Martin HAERTERICH, Martin JOHNS
-
Publication number: 20170364681Abstract: Methods of preserving and protecting user data from modification or loss due to malware are disclosed, as well as systems and computer program products related to the same.Type: ApplicationFiled: June 21, 2017Publication date: December 21, 2017Inventors: Stanislav Roguine, Eugene Aseev, Serguei Beloussov, Stanislav Protasov, Mark Shmulevich, Nikolay Grebennikov
-
Publication number: 20170364682Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.Type: ApplicationFiled: September 5, 2017Publication date: December 21, 2017Inventor: Raymond Lloyd Reddington
-
Publication number: 20170364683Abstract: A device includes a processor, a hardware component, a communication channel between the processor and the hardware component, and a secure memory that stores a baseline value of an electrical characteristic of the connection. The processor is configured to determine, during a boot process of the computing device, a value of the electrical characteristic, the electrical characteristic being one or more of impedance, inductance, capacitance, or frequency response, determine whether the value is within a threshold amount of the baseline value, and, responsive to determining that the value of the electrical characteristic is within the threshold amount, complete the boot process, and, responsive to determining that the value of the electrical characteristic is not within the threshold amount, prevent the computing device from completing the boot process.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventors: Shawn Willden, Jorge Coronel
-
Publication number: 20170364684Abstract: Examples relate to in-memory attack prevention. The examples disclosed herein enable obtaining, in response to a first boot command, a first encryption key generated based on a randomization process. The examples further enable determining whether first information of a page table indicates that a memory page is intended to be secure, the page table storing mapping between a virtual address of the memory page and a physical address of the memory page. In response to determining that the first information indicates that the memory page is intended to be secure, the examples further enable determining whether second information of the page table indicates that the memory page is encrypted. In response to determining that the second information indicates that the memory page is not encrypted, the examples further enable encrypting the memory page in a physical memory using the first encryption key.Type: ApplicationFiled: November 26, 2014Publication date: December 21, 2017Inventor: PERRY V LEA
-
Publication number: 20170364685Abstract: Described herein are methods, device, and systems that provide security to various computing systems, such as, smartphones, tablets, personal computers, computing servers, or the like. Security is provided to computing systems at various stages of their operational cycles. For example, a secure boot of a base computing platform (BCP) may be performed, and security processor (SecP) may be instantiated on the BCP. Using the SecP, an integrity of the OS of the BCP may be verified, and an integrity of a hypervisor may be verified. A virtual machine (VM) may be created on the BCP. The VM is provided with virtual access to the SecP on the BCP. Using the virtual access to the TAM, an integrity of the guest OS of the VM is verified and an integrity of applications running on the guest OS are verified.Type: ApplicationFiled: November 20, 2015Publication date: December 21, 2017Inventors: Yogendra C. SHAH, Andreas SCHMIDT, John W. MARLAND
-
Publication number: 20170364686Abstract: A method for automatically enhancing security and fixing security vulnerabilities in the source code of a computer program in an object oriented run time environment includes evaluating the source code file of a monitored computer program. The source code file includes a plurality of class files. Each session includes two or more session segments. A security assessment on each of the plurality of class files is performed to identify one or more potential security issues associated with the plurality of class files. One or more security controls configured to address the identified potential security issues are automatically injected into a source code of one or more class files identified as having potential security issues. The automatically modified source code file of the monitored computer program is deployed to the run-time environment.Type: ApplicationFiled: June 21, 2017Publication date: December 21, 2017Inventor: Tony Stafford
-
Publication number: 20170364687Abstract: Embodiments are provided for initializing a sealed network. A sealed network does not require administrators and may run on hardware and software that has been stripped of privileged capabilities. In one embodiment, an obfuscator generates a root, which is the first instance of a sealed network, and the root presents a control panel allowing an authorized operator to further guide the network. In one embodiment, a new instance is added to a sealed network via the control panel. In one embodiment, a unique identifier is found in a network.Type: ApplicationFiled: June 18, 2016Publication date: December 21, 2017Inventor: Lior Malka
-
Publication number: 20170364688Abstract: Technologies for trusted I/O include a computing device having a hardware cryptographic agent, a cryptographic engine, and an I/O controller. The hardware cryptographic agent intercepts a message from the I/O controller and identifies boundaries of the message. The message may include multiple DMA transactions, and the start of message is the start of the first DMA transaction. The cryptographic engine encrypts the message and stores the encrypted data in a memory buffer. The cryptographic engine may skip and not encrypt header data starting at the start of message or may read a value from the header to determine the skip length. In some embodiments, the cryptographic agent and the cryptographic engine may be an inline cryptographic engine. In some embodiments, the cryptographic agent may be a channel identifier filter, and the cryptographic engine may be processor-based. Other embodiments are described and claimed.Type: ApplicationFiled: June 20, 2017Publication date: December 21, 2017Inventors: Soham Jayesh Desai, Siddhartha Chhabra, Bin Xing, Pradeep M. Pappachan, Reshma Lal
-
Publication number: 20170364689Abstract: Technologies for securely binding a manifest to a platform include a computing device having a security engine and a field-programmable fuse. The computing device receives a platform manifest indicative of a hardware configuration of the computing device and a manifest hash. The security engine of the computing device blows a bit of a field programmable fuse and then stores the manifest hash and a counter value of the field-programmable fuse in integrity-protected non-volatile storage. In response to a platform reset, the security engine verifies the stored manifest hash and counter value and then determines whether the stored counter value matches the field-programmable fuse. If verified and current, trusted software may calculate a hash of the platform manifest and compare the calculated hash to the stored manifest hash. If matching, the platform manifest may be used to discover platform hardware. Other embodiments are described and claimed.Type: ApplicationFiled: June 20, 2017Publication date: December 21, 2017Inventors: Pradeep M. Pappachan, Reshma Lal, Siddhartha Chhabra, Gideon Gerzon, Baruch Chaikin, Bin Xing, William A. Stevens, JR.