Patent application number | Description | Published |
20120185416 | LOAD ESTIMATION IN USER-BASED ENVIRONMENTS - Method, system, and computer program product for load estimation in a user-based environment. The method includes: inputting a set of time-dependent, raw operational indicators of the environment; creating a load function according to the specific needs of the environment; displaying an estimated load; receiving user feedback on the estimated load; and applying a dynamic learning mechanism to generated a user-tuned load function for estimating load on the environment. The dynamic learning mechanism may be an informative mechanism that supports backtracking to solve user-adaptability problems. | 07-19-2012 |
20130185231 | PREDICTING DIAGNOSIS OF A PATIENT - Method, system, and computer program product are provided for predicting diagnosis of a patient performed by a computerized device. The method may include: modeling data from a group of successfully diagnosed patients, wherein the data is modeled as treatment paths of patients including referrals to medical practitioners; and predicting diagnosis for a current patient by comparing a treatment path of the current patient with the modeled treatment paths of successfully diagnosed patients, including calculating a probability of a given diagnosis from the modeled treatment paths. The method may include: defining a set of medical entities including medical practitioners to which a patient has been referred; and gathering treatment paths of successfully diagnosed patients, wherein the treatment path links medical entities in a directional route. Predicting diagnosis for a current patient may use the modeled data to calculate the probability of each model instance for each diagnosis and choosing the model instance of the diagnosis that maximizes the treatment path probability. | 07-18-2013 |
20130227113 | MANAGING VIRTUALIZED NETWORKS BASED ON NODE RELATIONSHIPS - Systems and methods for optimizing a virtualized communication network are provided. The method comprises monitoring traffic among nodes in a virtualized communication network to determine one or more relationships among the nodes, wherein the nodes include physical and logically defined components; determining whether one or more edges connecting the nodes in the communications network satisfy a rule; grouping the nodes connected by the one or more edges that satisfy the rule into at least one group; ranking the nodes in the group in accordance with a parameter; and implementing a policy to optimize the virtualized communication network in accordance with information determined from the ranking or the grouping of the nodes. | 08-29-2013 |
20130301823 | Extracting social relations from calling time data - A method, apparatus, and computer program product for generating a social network data structure, the method comprising: receiving a corpus comprising one or more communication indications for one or more customers, each communication indication indicating start time and end time of a communication of the customer; and generating a social network data structure indicating connections between customers based upon the start time and end time indications of communication indication comprised in the communication indications. | 11-14-2013 |
20140203949 | Method and system for automatic residual consumption - A computer-implemented method performed by a computerized device, comprising: obtaining consumption data comprising readings indicating consumption of a product, the consumption data is monitored by a plurality of metering devices, wherein the metering devices are associated with a plurality of consumption entities, wherein the plurality of consumption entities comprising a consumption unit and one or more sub consumption units of the consumption unit, wherein the product is supplied serially to the one or more sub consumption units via the consumption unit; and calculating residual consumption of the plurality of consumption entities at a point in time, wherein the residual consumption is consumption of the consumption unit and which is not associated with a sub consumption unit, wherein the residual consumption is calculated based on the consumption by the plurality of consumption entities at a plurality of points in time. | 07-24-2014 |
Patent application number | Description | Published |
20100246825 | WIRELESS COMMUNICATION METHOD AND SYSTEM FOR TRANSMISSION AUTHENTICATION AT THE PHYSICAL LAYER - The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver. | 09-30-2010 |
20100272256 | Method and Implementation for Information Exchange Using Markov Models - The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks. | 10-28-2010 |
20110013814 | METHOD AND APPARATUS FOR AUTHENTICATING BIOMETRIC SCANNERS - A method and apparatus for authenticating a biometric scanner involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeited biometric information on the scanner, or on the user authentication system. | 01-20-2011 |
20110085472 | Novel topology selection and broadcast method for rule-based link state routing - An apparatus and method are provided for optimizing the link-state information that is to be broadcast in a routing domain of a communication network for QoS rule-based link-state routing. The routers include any device capable of implementing the routing primitives. The apparatus and method involve pruning the link-state information using local neighborhood information that has been discovered. The local link-state is pruned so that the QoS optimal paths are preserved for link-state routing. Pruning of the potential optimal paths is carried out to minimize the information broadcast to the intra domain routers in an autonomous system/routing domain. The apparatus and method also involve broadcasting the selected link-state information. | 04-14-2011 |
20110289311 | METHOD OF PERFORMANCE-AWARE SECURITY OF UNICAST COMMUNICATION IN HYBRID SATELLITE NETWORKS - A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly. | 11-24-2011 |
20120300988 | METHOD AND APPARATUS FOR AUTHENTICATING AREA BIOMETRIC SCANNERS - Methods and apparatuses for authenticating a biometric scanner, such as area type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeit biometric information on the scanner, or on the user authentication system. | 11-29-2012 |
20120300992 | METHOD AND APPARATUS FOR AUTHENTICATING SWIPE BIOMETRIC SCANNERS - Methods and apparatuses for authenticating a biometric scanner, such as swipe type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeit biometric information on the scanner, or on the user authentication system. | 11-29-2012 |
20130163761 | WIRELESS COMMUNICATION METHOD AND SYSTEM FOR TRANSMISSION AUTHENTICATION AT THE PHYSICAL LAYER - The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver. | 06-27-2013 |
20140133714 | METHOD AND APPARATUS FOR AUTHENTICATING BIOMETRIC SCANNERS - Methods and systems involving image processing extract from an image and estimate unique intrinsic characteristics (scanner pattern) of a biometric scanner, such as area type fingerprint scanner. The scanner pattern is permanent over time, can identify a scanner even among scanners of the same manufacturer and model, and can be used to verify if a scanner acquired an image is the same as the scanner used for biometric enrollment, i.e., to authenticate the scanner and prevent security attacks on it. One method comprises selecting pixels from an enrolled and query image, masking useful pixels from the images, computing a similarity score between the common pixels of the enrolled and query useful pixels, and comparing this score with a threshold to determine whether the query image has been acquired by the same scanner as the enrolled image. The method can further comprise inverting the pixel values and/or filtering the selected pixels. | 05-15-2014 |
20140274169 | ENHANCING PRIVACY IN CELLULAR PAGING SYSTEM USING PHYSICAL LAYER IDENTIFICATION - A method for negating location privacy attacks in cellular networks involves signal processing techniques at the physical identification layer. In particular the methodology involves embedding user's unique tags onto the downlink paging signal waveforms so that the tags are stealthy and robust. The scheme not only improves users' privacy but also saves system bandwidth. | 09-18-2014 |