m Methods and compositions for extraction and storage of nucleic acids By www.freepatentsonline.com Published On :: Tue, 02 Jun 2015 08:00:00 EDT The present disclosure generally relates to solid matrices for the extraction, stabilization, and storage of nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for extracting, collecting, and recovering nucleic acids from the solid compositions are also described. Full Article
m Electronic device provided with cryptographic circuit and method of establishing the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention provides for an electronic device having cryptographic computation means arranged to generate cryptographic data within the device for enhancing security of communications therewith, the device including an onboard power supplying means arranged to provide for the driving of the said cryptographic computational means, and so as to provide a device by way of a manufacturing phase and a post manufacturing phase arranged for distribution and/or marketing of the device, and wherein the step of generating the cryptographic data occurs during the post manufacturing phase. Full Article
m Implementing security measures for authorized tokens used in mobile transactions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user. Full Article
m Systems and methods for data security By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user. Full Article
m Multiple volume encryption of storage devices using self encrypting drive (SED) By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating the encrypted data chunks with encryption key indexes of the computing device. Moreover, the method further includes receiving the encryption key indexes for given logical block addresses of the data chunks. The method further includes determining the encryption keys to be used to encrypt the data chunks based on the encryption key indexes of the data chunks to the disk drive. Full Article
m Discarding sensitive data from persistent point-in-time image By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A network storage server implements a method to discard sensitive data from a Persistent Point-In-Time Image (PPI). The server first efficiently identifies a dataset containing the sensitive data from a plurality of datasets managed by the PPI. Each of the plurality of datasets is read-only and encrypted with a first encryption key. The server then decrypts each of the plurality of datasets, except the dataset containing the sensitive data, with the first encryption key. The decrypted datasets are re-encrypted with a second encryption key, and copied to a storage structure. Afterward, the first encryption key is shredded. Full Article
m Method and apparatus for a trust processor By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT In an embodiment, an apparatus includes a cryptographic processor within a wireless device. The cryptographic processor includes at least one cryptographic unit. The cryptographic processor also includes a nonvolatile memory to store one or more microcode instructions, wherein at least one of the one or more microcode instructions is related to a sensitive operation. The cryptographic processor also includes a controller to control execution of the one or more microcode instructions by the at least one cryptographic unit, wherein the controller is to preclude execution of the sensitive operation if the apparatus is within an untrusted state. Full Article
m Device incorporating data communication function By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A device incorporating a data communication function 15 having a power supply circuit 38 of a dispersed power supply system is provided with a terminal 51-2 for receiving power supply from another device 14 which initiates data communication and a drive circuit 53-2 for performing the data communication with the another device 14, wherein when the terminal 51-2 is supplied with power, the power supplied to the terminal 51-2 is supplied to the drive circuit 53-2 in an off state of the power supply circuit 38. It thereby reduces self-power-loss and ensures reliability of performance. Full Article
m Method and apparatus for power management according to a situation mode By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosure discloses a power management method, for setting a power supply arrangement of an electronic device intelligently, comprising providing at least two sensors, corresponding to at least one threshold respectively; detecting a state of the electronic device for generating a detecting signal respectively; comparing the at least two detecting signals with the at least one threshold corresponding to the at least two sensors respectively; generating at least two situation signals when the at least two detecting signals meet the at least one threshold corresponding to the at least two sensors respectively; looking up a look-up table according to the at least two detecting signals for generating a control command; and writing in at least one independent bit of a register according to the control command for changing or maintaining a power supply arrangement of at least one peripheral component. Full Article
m Resolution programmable dynamic IR-drop sensor with peak IR-drop tracking abilities By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A data processing system on an integrated circuit includes a core that performs switching operations responsive to a system clock that draws current from the power supply network. An IR-drop detector includes a resistor ladder having outputs representative of an IR-drop caused by the core during the switching operations. The system further includes a plurality of amplifiers coupled to the outputs indicative of the IR-drop, a plurality of flip-flops coupled to the amplifiers, and a variable clock generator. The variable clock generator outputs a sampling clock comprising a group consisting of a variable phase or a variable frequency to the plurality of flip-flops. The flip-flops are triggered by the sampling clock so that the IR-drop at a time during a clock cycle of the system clock can be detected, and the peak IR-drop value for can be tracked. Full Article
m Power-saving network management server, network system, and method of determining supply of power By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result. Full Article
m Energy management device and power management system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An energy management system has an application storage, an application executing unit, a plurality of network interfaces, a policy setting unit configured to set whether each application should be permitted to access each of the network interfaces, a policy storage configured to store identification information for each application set by the policy setting unit, and access permit/inhibit information showing whether the application is permitted to access each of the network interfaces, an I/F management unit managing a correspondence relationship between a network address and each of the network interfaces, and to specify a network interface used by the application executed by the application executing unit, and an access controller configured to judge whether the application executed by the application executing unit is permitted to access the network interface to be used thereby, based on the access permit/inhibit information stored in the policy storage. Full Article
m Host initiated state control of remote client in communications system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system and method for low-cost, fault tolerant, EMI robust data communications, particularly for an EV environment. A data communications method, including a) enabling a transmission of a wake signal from a host to a remote client through an isolator disposed at the remote client when the wake signal is asserted from the host at a host-portion of the isolator concurrent with a periodic enablement of a client-portion of the isolator by the remote client; and thereafter b) transmitting the wake signal from the host to the remote client through the isolator; c) controlling enablement of the client-portion responsive to the wake signal transmitted through the isolator; and thereafter d) disabling the transmission by deassertion of the wake signal at the host. Full Article
m Method and apparatus for power-efficiency management in a virtualized cluster system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements. Full Article
m Processor bridge power management By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A power controller can set the power state of a processor bridge based on which processor modules are in a communicative state. In addition, for a power state where selected processor modules are expected to be non-communicative, the power controller can set the supplied voltage to have a reduced voltage guard band as compared to other power states. These power management techniques can reduce the power consumed by the processor. Full Article
m Power shifting in multicore platforms by varying SMT levels By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading level in at least one physical core is adjusted by changing the number of logical cores on that physical core in response to a power consumption level of the multi-core microprocessor platform exceeding the peak power level. Performance and power data based on simultaneous multi-threading levels are used in selecting the physical core to be adjusted. Full Article
m Methods and apparatuses for controlling the temperature of a data processing system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and apparatuses to manage working states of a data processing system. At least one embodiment of the present invention includes a data processing system with one or more sensors (e.g., physical sensors such as tachometer and thermistors, and logical sensors such as CPU load) for fine grain control of one or more components (e.g., processor, fan, hard drive, optical drive) of the system for working conditions that balance various goals (e.g., user preferences, performance, power consumption, thermal constraints, acoustic noise). In one example, the clock frequency and core voltage for a processor are actively managed to balance performance and power consumption (heat generation) without a significant latency. In one example, the speed of a cooling fan is actively managed to balance cooling effort and noise (and/or power consumption). Full Article
m Power management of multiple compute units sharing a cache By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT We report methods, integrated circuit devices, and fabrication processes relating to power management transitions of multiple compute units sharing a cache. One method includes indicating that a first compute unit of a plurality of compute units of an integrated circuit device is attempting to enter a low power state, determining if the first compute unit is the only compute unit of the plurality in a normal power state, and in response to determining the first compute unit is the only compute unit in the normal power state: saving a state of a shared cache unit of the integrated circuit device, flushing at least a portion of a cache of the shared cache unit, repeating the flushing until either a second compute unit exits the low power state or the cache is completely flushed, and permitting the first compute unit to enter the low power state. Full Article
m Multi-cluster processing system and method of operating the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A multi-cluster processing system and a method of operating a multi-cluster processing system are provided. The multi-cluster processing system includes: a first cluster including a plurality of first-type cores: a second cluster including a plurality of second-type cores; and a control unit configured to monitor loads of the first-type cores and the second-type cores, wherein when utilization of at least one of enabled first-type cores exceeds a predetermined threshold utilization of each of the first-type cores, the control unit enables at least one of disabled first-type cores in a first mode, and the control unit enables at least one of the disabled second-type cores and disables the first cluster in a second mode, wherein an amount of computation per unit of time of each of the second-type cores is greater than an amount of computation per unit of time of each of the first-type cores. Full Article
m Image forming apparatus, system-on-chip (SoC) unit, and driving method thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An image forming apparatus is connected to a host device including first and second power domains which are separately supplied with power and includes first and second memories to be disposed in the second power domain, a main controller disposed in the first power domain and to perform a control operation using the first memory in a normal mode, and a sub-controller disposed in the second power domain and perform a control operation using the second memory in a power-saving mode, where when the normal mode is changed to the power-saving mode a power supply to the first power domain is shut off, the first memory operates in a self-refresh mode, and the main controller copies central processing unit (CPU) context information into a context storage unit, and when the power-saving mode is changed to the normal mode, the main controller is booted using the CPU context information stored in the context storage unit. Full Article
m Power supply control system, method, and computer program product By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT According to an embodiment, a control system includes a detector, an estimating unit, a determining unit, and a controller. The detector detects an idle state. The estimating unit estimates an idle period. When the idle state is detected, the determining unit determines whether a first power consumption when writeback of data which needs to be written back to a main storage device is performed and supply of power to a cache memory is stopped, is larger than a second power consumption when writeback of the data is not performed and supply of power is continued for the idle period. The controller stops the supply of power to the cache memory when the first power consumption is determined to be smaller than the second power consumption and continues the supply of power when the first power consumption is determined to be larger than the second power consumption. Full Article
m Memory controller with transaction-queue-monitoring power mode circuitry By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An integrated-circuit memory controller outputs to a memory device a first signal in a first state to enable operation of synchronous data transmission and reception circuits within the memory device. A transaction queue within the memory controller stores memory read and write requests that, to be serviced, require operation of the synchronous data transmission and reception circuits, respectively, within the memory device. Power control circuitry within the memory controller determines that the transaction queue has reached a predetermined state and, in response, outputs the first signal to the memory device in a second state to disable operation of the synchronous data transmission and reception circuits within the memory device. Full Article
m Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component. Full Article
m Identification and management of unsafe optimizations By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Techniques for implementing identification and management of unsafe optimizations are disclosed. A method of the disclosure includes receiving, by a managed runtime environment (MRE) executed by a processing device, a notice of misprediction of optimized code, the misprediction occurring during a runtime of the optimized code, determining, by the MRE, whether a local misprediction counter (LMC) associated with a code region of the optimized code causing the misprediction exceeds a local misprediction threshold (LMT) value, and when the LMC exceeds the LMT value, compiling, by the MRE, native code of the optimized code to generate a new version of the optimized code, wherein the code region in the new version of the optimized code is not optimized. Full Article
m Experiment manager for manycore systems By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing workloads. A monitoring or instrumentation system may collect operational and performance data from hardware and software components within the system. A modeling system may create an operational model of the execution environment, then may determine different sets of parameters for the execution environment. A feedback loop may change various operational characteristics of the execution environment. The monitoring, analysis, and feedback loop may optimize the performance of a computer system for various metrics, including throughput, performance, energy conservation, or other metrics based on the applications that are currently executing. The performance model of the execution environment may be persisted and applied to new applications to optimize the performance of applications that have not been executed on the system. Full Article
m Method for operating invisible system services on android platform By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for operating an invisible system service on Android platform is disclosed. The method for operating system services on Android platform includes selectively registering a created system service in a context manager according to a type of the created system service, where the type of the system service comprises a first type for permitting access from an outside and a second type for not permitting access from the outside, and the selectively registering comprises registering in the context manager the created system service belonging to the first type and not registering in the context manager the created system service belonging to the second type. Full Article
m Method and apparatus for rejecting untrusted network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method of accessing a communication system and a communication device for performing the same are disclosed. The method includes transmitting, by a communication device to a node of a communication system through a communication link between the communication device and the node, a request to negotiate basic capabilities for communicating with the node, receiving, by the communication device from the node, a response to the request to negotiate basic capabilities, and, transmitting, by the communication device to the node, a request to disconnect the communication link, when the response to the request to negotiate basic capabilities indicates that the node does not support authentication. Full Article
m Variable domain resource data security for data processing systems By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model. Full Article
m Apparatus for controlling processor execution in a secure environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a first context to a second context when switching execution from a first portion of software to a second portion of software. A context manager, which can be in communication with the secure processor, can be configured to receive and initiate a requested context swap. A trust vector verifier, which can be in communication with the secure processor and the context manager, can be configured to load a trust vector descriptor upon command from a context manager. Full Article
m Managing physical presence across multiple blades By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method uses a firmware interface setup program for a selected compute node (“node”) to cause a firmware interface to enable a trusted platform module (TPM) on the selected node to receive a physical presence (PP) signal. The selected node is selected from a plurality of nodes within a multi-node chassis, wherein each node includes a firmware interface and a TPM. A device within the multi-node chassis is manually actuated to transmit a PP signal to each of the plurality of nodes, such that each node receives the PP signal. The PP signal is asserted to the TPM of the selected node in response to both enabling the TPM of the selected node to be able to receive the PP signal and receiving the PP signal. Still further, the method allows modification of a security setting of the selected node in response to the TPM receiving the PP signal. Full Article
m Method of processing data to enable external storage thereof with minimized risk of information leakage By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs) is utilized as a substitute for a trusted institution. Encryption of consolidated data can reduce risk of information leakage and enhance security. Since the virtual execution framework can control connection and direction of communication, financial institutions are allowed to apply encryption to data on their own, which makes the data further appropriate for external storage. By allowing financial institutions to apply their own decryption, it is possible to prevent one of two financial institutions from retrieving externally stored data into the external execution framework without intervention of the other. Additionally, associated acting subjects can be provided with freedom depending on the degree of information leakage risk. Full Article
m System, method, and device for delivering communications and storing and delivering data By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server. Full Article
m Secured wireless access system and related method By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access. Full Article
m Method for controlling content and digital device using the same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and device for controlling content that includes plural display pages in a sequence, the method including: displaying a current page included in the content; receiving a user input to or above a display screen of the display unit for changing from the current page to another page of the content; extracting fingerprint information from the user input; determining whether the content of the another page is or is not accessible based on the extracted fingerprint information; if all of the content of the another page is determined to be accessible based on the extracted fingerprint information, displaying the another page; and if any of the content of the another page is determined not to be accessible based on the extracted fingerprint information, displaying a page following the current page without displaying content of the another page that was determined not to be accessible. Full Article
m Techniques to transmit commands to a target device to reduce power consumption By www.freepatentsonline.com Published On :: Tue, 09 Jun 2015 08:00:00 EDT Techniques are described to transmit commands to a display device. The commands can be transmitted in header byte fields of secondary data packets. The commands can be used to cause a target device to capture a frame, enter or exit self refresh mode, or reduce power use of a connection. In addition, a request to exit main link standby mode can cause the target enter training mode without explicit command to exit main link standby mode. Full Article
m Apparatus and method for managing power of an electronic appliance By www.freepatentsonline.com Published On :: Tue, 21 Jul 2015 08:00:00 EDT There is provided a power management apparatus including: a managed appliance registering unit carrying out authentication on an electronic appliance connected to a power network and registering an electronic appliance for which the authentication has succeeded as a managed appliance, a control unit controlling operation of the managed appliance and supplying of power to the managed appliance, a managed appliance information acquiring unit acquiring, from the managed appliance, as managed appliance information, at least any of appliance information including identification information that is unique to the electronic appliance, information indicating an operation state of the electronic appliance, information indicating an usage state of the electronic appliance and power information of the electronic appliance, and an appliance state judging unit judging a state of the managed appliance based on the managed appliance information acquired by the managed appliance information acquiring unit. Full Article
m Data transform method and data transformer By www.freepatentsonline.com Published On :: Tue, 18 Aug 2015 08:00:00 EDT A data transform method and a data transformer. The method includes: importing a data transform rule; acquiring from the data transform rule a source data definition, a destination data definition and a data transform rule definition; predicting resource energy consumption parameters of a data transform node server according to the source data definition, the destination data definition and the data transform rule definition; and deploying a resource energy consumption optimization policy of the data transform node server according to the predicted resource energy consumption parameters of the data transform node server. Full Article
m Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method By www.freepatentsonline.com Published On :: Tue, 22 Sep 2015 08:00:00 EDT A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers. Full Article
m Biometric attribute anomaly detection system with adjusting notifications By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, methods and server for monitoring health and safety of individuals in a population and sending alert notifications when exceptions are detected include comparing biometric data obtained from the individuals to a biometric model generated for the individual through computer-learning methods. Biometric data may be gathered by wireless biometric sensor devices which transmit biometric data to receiver devices, which relay the biometric data to a server. The biometric model may be maintained in the server and include nominal and threshold biometric parameters for each individual based on biometric sensor data gathered or analyzed over a period of time. An alert may be issued by the server when an individual's biometric data is outside a threshold in the biometric model. The transmitted alert may depend upon the nature of the exception, user settings and past notification experience. Alerts may be escalated when not answered within defined durations. Full Article
m Monitoring or feedback systems and methods By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention generally relates to systems and methods for monitoring and/or providing feedback for drugs or other pharmaceuticals taken by a subject. In one aspect, the present invention is directed to devices and methods for determining a species within the skin of a subject; and producing feedback to a subject based on the determination of the species. The feedback may be, for example, visual, audible, tactile, a change in temperature, etc. In some cases, information regarding the determination of the species may be transmitted to another entity, e.g., a health care provider, a computer, a relative, etc., which may then provide feedback to the subject in some fashion. In some cases, the feedback may be directly indicative of the species, e.g., whether the species is present, the concentration of the species, whether a by-product of a reaction involving the species is present, whether a compound affected by the species is present, etc. However, the feedback may also be indirect in some embodiments. For example, the subject may be presented with an external reward, e.g., based on the determination of the species within the skin. For instance, a reward such as cash, coupons, songs, discounts, personal items, etc., may be offered based on the level of compliance of the subject. Still other aspects of the invention are generally directed to kits involving such devices (with or without the drug to be monitored), methods of promoting such systems, or the like. Full Article
m System and method for detecting and preventing drowsiness By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system for preventing drowsiness in a driver by employing a thermal grill. The system includes a detection module and an intervention module. The detection module monitors a driver's parameters to determine whether the driver is drowsy. If the driver is determined to be drowsy, the intervention module activates a thermal grill with interlaced hot and cold regions. This activation causes the hot regions to approach one temperature and the cold regions to approach another. Additionally, this activation leads to an uncomfortable sensation for the driver, alerts the driver, and prevents the driver from getting drowsy. Full Article
m Method and system for determining treatments by modifying patient-specific geometrical models By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems and methods are disclosed for evaluating cardiovascular treatment options for a patient. One method includes creating a three-dimensional model representing a portion of the patient's heart based on patient-specific data regarding a geometry of the patient's heart or vasculature; and for a plurality of treatment options for the patient's heart or vasculature, modifying at least one of the three-dimensional model and a reduced order model based on the three-dimensional model. The method also includes determining, for each of the plurality of treatment options, a value of a blood flow characteristic, by solving at least one of the modified three-dimensional model and the modified reduced order model; and identifying one of the plurality of treatment options that solves a function of at least one of: the determined blood flow characteristics of the patient's heart or vasculature, and one or more costs of each of the plurality of treatment options. Full Article
m Automatic detection and correction of magnetic resonance imaging data By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems and methods for processing magnetic resonance imaging (MRI) data are provided. A method includes receiving MRI data comprising a plurality of k-space points and deriving a plurality of image data sets based on the MRI data, each of the plurality of MRI image sets obtained by zeroing a different one of the plurality of k-space points. The method further includes computing image space metric values for each of the plurality of image data sets and adjusting a portion of the MRI data associated with ones of the image space metric values that fail to meet a threshold value to yield adjusted MRI data. Full Article
m Region-growing algorithm By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A region growing algorithm for controlling leakage is presented including a processor configured to select a starting point for segmentation of data, initiate a propagation process by designating adjacent voxels around the starting point, determine whether any new voxels are segmented, count and analyze the segmented new voxels to determine leakage levels, and identify and record segmented new voxels from a previous iteration when the leakage levels exceed a predetermined threshold. The processor is further configured to perform labeling of the segmented new voxels of the previous iteration, select the segmented new voxels from the previous iteration when the leakage levels fall below the predetermined threshold, and create a voxel list based on acceptable segmented voxels found in the previous iteration. Full Article
m System and method for automatic detection of a plurality of SPO2 time series pattern types By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The disclosed embodiments relate to pulse oximetry. An exemplary pulse oximeter comprises a probe that is adapted to be attached to a body part of a patient to create a signal indicative of an oxygen saturation of blood of the patient, and a processor that is adapted to receive the signal produced by the probe, to calculate an SPO2 value based on the signal, to detect a plurality of pattern types of SPO2 indicative of pathophysiologic events, and to produce an output indicative of a detected one of the plurality of pattern types. Full Article
m Analyte monitoring device and methods of use By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An analyte monitor includes a sensor, a sensor control unit, and a display unit. The sensor has, for example, a substrate, a recessed channel formed in the substrate, and conductive material disposed in the recessed channel to form a working electrode. The sensor control unit typically has a housing adapted for placement on skin and is adapted to receive a portion of an electrochemical sensor. The sensor control unit also includes two or more conductive contacts disposed on the housing and configured for coupling to two or more contact pads on the sensor. A transmitter is disposed in the housing and coupled to the plurality of conductive contacts for transmitting data obtained using the sensor. The display unit has a receiver for receiving data transmitted by the transmitter of the sensor control unit and a display coupled to the receiver for displaying an indication of a level of an analyte. The analyte monitor may also be part of a drug delivery system to alter the level of the analyte based on the data obtained using the sensor. Full Article
m Analyte sensors comprising hydrogel membranes By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Generally, embodiments of the present disclosure relate to analyte determining methods and devices (e.g., electrochemical analyte monitoring systems) that have improved signal response and stability by inclusion of a coating including a hydrogel, a crosslinker, and a swelling modulator, where the coating is disposed proximate to a working electrode of in vivo and/or in vitro analyte sensors, e.g., continuous and/or automatic in vivo monitoring using analyte sensors and/or test strips. Also provided are systems and methods of using the, for example electrochemical, analyte sensors in analyte monitoring. Full Article
m Reference electrodes having an extended lifetime for use in long term amperometric sensors By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present application provides Ag/AgCl based reference electrodes having an extended lifetime that are suitable for use in long term amperometric sensors. Electrochemical sensors equipped with reference electrodes described herein demonstrate considerable stability and extended lifetime in a variety of conditions. Full Article
m Device and method for electroimpedance tomography By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A device for electroimpedance tomography with an electrode belt (2), which has electrodes (E1 . . . E16), wherein at least two groups (5, 6) of electrodes located next to each other are formed and the electrodes of one group are contacted with at least one, multiwire feed cable (7, 8). For a reduced noise level during data acquisition, provisions are made for at least one electrode (E9) of two mutually adjacently located electrodes (E8, E9) of two different groups (5, 6) to have an additional electrode feed line (15), which is led over the feed cable (7) of the adjacent group (5). Full Article
m MRI-guided localization and/or lead placement systems, related methods, devices and computer program products By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT MRI compatible localization and/or guidance systems for facilitating placement of an interventional therapy and/or device in vivo include: (a) a mount adapted for fixation to a patient; (b) a targeting cannula with a lumen configured to attach to the mount so as to be able to controllably translate in at least three dimensions; and (c) an elongate probe configured to snugly slidably advance and retract in the targeting cannula lumen, the elongate probe comprising at least one of a stimulation or recording electrode. In operation, the targeting cannula can be aligned with a first trajectory and positionally adjusted to provide a desired internal access path to a target location with a corresponding trajectory for the elongate probe. Automated systems for determining an MR scan plane associated with a trajectory and for determining mount adjustments are also described. Full Article