Digital file processing for secondary sale
    61.
    发明授权
    Digital file processing for secondary sale 有权
    数字文件处理二次销售

    公开(公告)号:US09311633B2

    公开(公告)日:2016-04-12

    申请号:US12141768

    申请日:2008-06-18

    Abstract: In one embodiment, a method for transferring digital files is provided. The method includes: downloading an application for facilitating the transfer of used digital files; storing the application at the client; receiving an indication of a used digital file that a user desires to sell; searching, using the application, storage on the client to determine any instances of the digital file; deleting any instances of the digital file if they are determined; transferring a forwarded file of the used digital file to a second entity; and deleting, using the application, the used digital file from the client upon transfer of the forwarded file.

    Abstract translation: 在一个实施例中,提供了一种用于传送数字文件的方法。 该方法包括:下载用于促进所使用的数字文件传送的应用程序; 将应用程序存储在客户端; 接收用户希望出售的所使用的数字文件的指示; 使用应用程序搜索客户端上的存储,以确定数字文件的任何实例; 删除数字文件的任何实例,如果它们被确定; 将所使用的数字文件的转发文件传送到第二实体; 以及在转发所述转发的文件时,使用所述应用从所述客户端删除所使用的数字文件。

    METHOD AND APPARATUS FOR SECURE ONLINE CREDIT CARD TRANSACTIONS AND BANKING
    62.
    发明申请
    METHOD AND APPARATUS FOR SECURE ONLINE CREDIT CARD TRANSACTIONS AND BANKING 审中-公开
    用于安全在线信用卡交易和银行的方法和装置

    公开(公告)号:US20160078446A1

    公开(公告)日:2016-03-17

    申请号:US14855155

    申请日:2015-09-15

    Inventor: Jonathan Trostle

    Abstract: A hardware based system and method that detects fraudulent financial activity originating from malicious programs on a user's computer and ensures that user sensitive information is not accessible to programs on the user's computer. The system includes an untrusted service process on the user's computer, a back end server/cloud based infrastructure, and a user device that records the user's computer at the time the transactions are executed. The device has a minimal TCB (Trusted Computing Base) and is trusted to carry out its functions. The device stores sensitive user information and enters this information into secure channels ensuring that the user's computer does not have access to this information. Periodic statement review is accomplished by comparing the device's record of transactions against the record in the payment system and discrepancies result in notifications to the user. The payment system entities may be unaware of the system, or they may exchange information with the system in order to obtain security benefits including fraud detection and tokenization services.

    Abstract translation: 一种基于硬件的系统和方法,用于检测来自用户计算机上的恶意程序的欺诈性金融活动,并确保用户敏感信息不能由用户计算机上的程序访问。 该系统包括用户计算机上的不可信服务过程,后端服务器/基于云的基础设施,以及在执行交易时记录用户计算机的用户设备。 该设备具有最小的TCB(可信计算基础),并被信任执行其功能。 该设备存储敏感的用户信息,并将该信息输入到安全通道中,确保用户的计算机无法访问该信息。 通过将设备的交易记录与支付系统中的记录进行比较来实现定期语句审查,并且差异导致向用户发送通知。 支付系统实体可能不知道系统,或者它们可以与系统交换信息,以便获得包括欺诈检测和标记服务在内的安全利益。

    LOCATION-BASED RECOVERY DEVICE AND RISK MANAGEMENT SYSTEM FOR PORTABLE COMPUTING DEVICES AND DATA
    67.
    发明申请
    LOCATION-BASED RECOVERY DEVICE AND RISK MANAGEMENT SYSTEM FOR PORTABLE COMPUTING DEVICES AND DATA 有权
    基于位置的恢复设备和便携式计算设备和数据的风险管理系统

    公开(公告)号:US20150319295A1

    公开(公告)日:2015-11-05

    申请号:US14704676

    申请日:2015-05-05

    Abstract: A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and system for acquiring such devices, protecting data on such devices, and for compensating owners of devices. A GPS mechanism of the invention provides real time tracking of missing devices that may be coordinated with security agencies to intercept and recover missing computing devices. When a stolen device is unrecoverable, the invention may receive a signal to initiate data recovery where a wireless network is available to recover data for the owner. Alternatively, the GPS mechanism instructs the device to encrypt or destroy stored data files to prevent commercial espionage or privacy violations. The invention discloses a software system and method for computing a purchase price of the GPS mechanism, computing compensation for loss of the device and lost data.

    Abstract translation: 一种利用全球定位卫星(GPS)技术监测和恢复便携式计算设备的设备和软件,以及用于获取这些设备的方法和系统,保护这些设备上的数据以及补偿设备的所有者。 本发明的GPS机制提供了可能与安全机构协调的丢失设备的实时跟踪,以拦截和恢复缺失的计算设备。 当被盗设备不可恢复时,本发明可以接收信号以发起数据恢复,其中无线网络可用于恢复所有者的数据。 或者,GPS机制指示设备加密或销毁存储的数据文件,以防止商业间谍活动或隐私侵犯。 本发明公开了一种用于计算GPS机构的购买价格的软件系统和方法,用于计算设备损耗和丢失数据的补偿。

    Sieving Nucleic Acid Samples
    68.
    发明申请
    Sieving Nucleic Acid Samples 审中-公开
    筛分核酸样品

    公开(公告)号:US20150315568A1

    公开(公告)日:2015-11-05

    申请号:US14680253

    申请日:2015-04-07

    Inventor: Michael Seul

    Abstract: A method of selecting nucleic acid samples including particular desired alleles from a plurality of nucleic acid samples including the steps of performing a first reaction in a plurality of pools containing the samples to produce reaction products including a source tag identifying said each pool; pooling the pools to provide pooled pools; for each of the desired alleles to be identified, performing a second reaction using said reaction products to produce allele-specific second reaction products comprising a marker tag and a derived source tag; identifying said allele-specific second reaction products, and further identifying nucleic acid samples with the desired alleles. A source tag sharing number “d” may be determined for each of the alleles. Alleles may also be binned together.

    Abstract translation: 从多个核酸样品中选择包括特定所需等位基因的核酸样品的方法,包括以下步骤:在包含样品的多个池中进行第一反应,以产生包括标识所述每个池的源标签的反应产物; 集中池塘提供池池; 对于待鉴定的每个所需等位基因,使用所述反应产物进行第二反应以产生包含标记标签和衍生源标签的等位基因特异性第二反应产物; 识别所述等位基因特异性第二反应产物,并进一步鉴定具有所需等位基因的核酸样品。 可以为每个等位基因确定源标签共享号“d”。 等位基因也可以合并在一起。

    SYSTEM AND METHOD FOR DOCUMENTING PATIENT INFORMATION
    69.
    发明申请
    SYSTEM AND METHOD FOR DOCUMENTING PATIENT INFORMATION 审中-公开
    用于记录患者信息的系统和方法

    公开(公告)号:US20150294068A1

    公开(公告)日:2015-10-15

    申请号:US14685405

    申请日:2015-04-13

    Applicant: VYNCA, LLC

    Abstract: A method for providing access to patient information from within an electronic medical record may involve: receiving, from a user, at least one piece of identifying information, identifying the user as a person authorized to access the patient information; providing an encrypted link on an electronic medical record of the patient, wherein the encrypted link is preloaded with the at least one piece of identifying information and a patient medical record number corresponding to the patient; decrypting the encrypted link in response to the user clicking on the encrypted link, without requiring the user to provide any further identifying information; and providing the patient information to the user via a secure web site, in response to the user clicking on the link.

    Abstract translation: 用于从电子医疗记录中提供对患者信息的访问的方法可以包括:从用户接收至少一条识别信息,将用户识别为被授权访问患者信息的人; 在所述患者的电子病历上提供加密的链接,其中所述加密的链接被预加载有所述至少一条识别信息和对应于所述患者的患者医疗记录号; 响应于用户点击加密的链路来解密加密的链接,而不需要用户提供任何进一步的识别信息; 以及响应于所述用户点击所述链接,经由安全网站向所述用户提供所述患者信息。

    SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES
    70.
    发明申请
    SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES 有权
    用于创建加密设备指纹的系统和方法

    公开(公告)号:US20150270961A1

    公开(公告)日:2015-09-24

    申请号:US14591223

    申请日:2015-01-07

    Abstract: Systems and methods for creating fingerprints for encryption devices are described herein. In various embodiments, the system includes an encryption device operatively connected to a device management system. According to particular embodiments, the device management system: 1) receives a first payload from the encryption device, the first payload including data in a particular format; 2) creates a fingerprint for the encryption device, the fingerprint including a section format for each of one or more distinct sections of the particular format; 3) storing a record of the fingerprint for the encryption device and the unique identifier at the at least one database; and 4) comparing a format of each subsequent payload received from the encryption device to the fingerprint for the device to determine whether the device has been compromised.

    Abstract translation: 本文描述了用于为加密设备创建指纹的系统和方法。 在各种实施例中,系统包括可操作地连接到设备管理系统的加密设备。 根据特定实施例,设备管理系统:1)从加密设备接收第一有效载荷,第一有效载荷包括特定格式的数据; 2)为加密设备创建指纹,指纹包括特定格式的一个或多个不同部分中的每一个的分段格式; 3)在所述至少一个数据库中存储所述加密设备的指纹记录和唯一标识符; 以及4)将从所述加密设备接收的每个后续有效载荷的格式与所述设备的指纹进行比较,以确定所述设备是否已被破坏。

Patent Agency Ranking