Patent application number | Description | Published |
20090192807 | Identification of specialty drugs - Methods for determining whether a drug is a specialty drug, methods for creating tools to be used in making the determination, and the tools themselves are disclosed. The overall value of a drug depends on the drug's attribute values with respect to each of a set of drug attributes (concerning, e.g., the drug's route of administration, targeted disease, possible adverse reactions, risk of toxicity, cost, need for patient compliance with the treatment regime, and handling, preparation, and/or storage requirements. If the overall value or its partial overall values meet certain criteria, the drug is deemed to be a specialty drug. | 07-30-2009 |
20110307271 | IDENTIFICATION OF SPECIALTY DRUGS - Methods for determining whether a drug is a specialty drug, methods for creating tools to be used in making the determination, and the tools themselves are disclosed. The overall value of a drug depends on the drug's attribute values with respect to each of a set of drug attributes (concerning, e.g., the drug's route of administration, targeted disease, possible adverse reactions, risk of toxicity, cost, need for patient compliance with the treatment regime, and handling, preparation, and/or storage requirements. If the overall value or its partial overall values meet certain criteria, the drug is deemed to be a specialty drug. | 12-15-2011 |
20120084097 | IDENTIFICATION OF SPECIALTY DRUGS - Methods for determining whether a drug is a specialty drug, methods for creating tools to be used in making the determination, and the tools themselves are disclosed. The overall value of a drug depends on the drug's attribute values with respect to each of a set of drug attributes (concerning, e.g., the drug's route of administration, targeted disease, possible adverse reactions, risk of toxicity, cost, need for patient compliance with the treatment regime, and handling, preparation, and/or storage requirements. If the overall value or its partial overall values meet certain criteria, the drug is deemed to be a specialty drug. | 04-05-2012 |
Patent application number | Description | Published |
20080293450 | Consumption of Items via a User Device - An item-providing system supplies items to a user device for consumption at the user device via communication infrastructure. In one illustrative implementation, the communication infrastructure may rely, in part, on wireless communication. The device may correspond to a book reader device or other type of device. | 11-27-2008 |
20130019166 | AUTOMATICALLY CLASSIFYING PAGE IMAGES - Systems and methods are disclosed for automatically classifying images of pages of a source, such as a book, into classifications such as front cover, copyright page, table of contents, text, index, etc. In one embodiment, three phases are provided in the classification process. During a first phase of the classification process, a first classifier may be used to determine a preliminary classification of a page image based on single-page criteria. During a second phase of the classification process, a second classifier may be used to determine a final classification for the page image based on multiple-page and/or global criteria. During an optional third phase of classification, a verifier may be used to verify the final classification of the page image based on verification criteria. If automatic classification fails, the page image may be passed on to a human operator for manual classification. | 01-17-2013 |
20130086662 | PARAMETER BASED KEY DERIVATION - Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information that, as a result of being used to generate the keys, renders the generated keys usable for a smaller scope of uses than the secret credential. Further, key generation may involve multiple invocations of a function where each of at least a subset of the invocations of the function results in a key that has a smaller scope of permissible use than a key produced from a previous invocation of the function. Generated keys may be used as signing keys to sign messages. One or more actions may be taken depending on whether a message and/or the manner in which the message was submitted complies with restrictions of the a key's use. | 04-04-2013 |
20130086663 | KEY DERIVATION TECHNIQUES - Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information that, as a result of being used to generate the keys, renders the generated keys usable for a smaller scope of uses than the secret credential. Further, key generation may involve multiple invocations of a function where each of at least a subset of the invocations of the function results in a key that has a smaller scope of permissible use than a key produced from a previous invocation of the function. Generated keys may be used as signing keys to sign messages. One or more actions may be taken depending on whether a message and/or the manner in which the message was submitted complies with restrictions of the a key's use. | 04-04-2013 |
20140258732 | SOURCE IDENTIFICATION FOR UNAUTHORIZED COPIES OF CONTENT - Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder's ability to decrypt data depends on the key's position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content. | 09-11-2014 |
20140310769 | TECHNIQUES FOR DELEGATION OF ACCESS PRIVILEGES - Systems and methods for controlling access to one or more computing resources relate to generating session credentials that can be used to access the one or more computing resources. Access to the computing resources may be governed by a set of policies and requests for access made using the session credentials may be fulfilled depending on whether they are allowed by the set of policies. The session credentials themselves may include metadata that may be used in determining whether to fulfill requests to access the one or more computing resources. The metadata may include permissions for a user of the session credential, claims related to one or more users, and other information. | 10-16-2014 |
20150304294 | ENTITY TO AUTHORIZE DELEGATION OF PERMISSIONS - Systems and methods are described for delegating permissions to enable account access. The systems utilize a delegation profile that can be created within a secured account of at least one user. The delegation profile includes a name, a validation policy that specifies principals which may be external to the account and which are permitted to assume the delegation profile, and an authorization policy that indicates the permitted actions within the account for those principals which are acting within the delegation profile. Once the delegation profile is created, it can be provided to external principals or services. These external principals or services can use the delegation profile to obtain credentials for performing various actions in the account using the credentials of the delegation profile. | 10-22-2015 |
20150341368 | AUTHORIZED DELEGATION OF PERMISSIONS - Systems and methods are described for delegating permissions to enable account access to entities not directly associated with the account. The systems determine a delegation profile associated with a secured account of at least one customer. The delegation profile includes a name, a validation policy that specifies principals which may be external to the account and which are permitted to assume the delegation profile, and an authorization policy that indicates the permitted actions within the account for those principals which are acting within the delegation profile. Once the delegation profile is created, it can be provided to external principals or services. These external principals or services can use the delegation profile to obtain credentials for performing various actions in the account using the credentials of the delegation profile. | 11-26-2015 |
Patent application number | Description | Published |
20090006066 | Method and System for Automatic Selection of Test Cases - A system for selecting a test case. A test case with a high score is selected. A simulation job is run on a device under test on a plurality of processors using the selected test case. Simulation performance and coverage data is collected for the selected test case and the collected simulation performance and coverage data is stored in a database. | 01-01-2009 |
20090043559 | Hardware Verification Batch Computing Farm Simulator - The exemplary embodiments provide a computer implemented method, apparatus, and computer usable program code for calculating the expected behavior of a group of hardware verification test cases. Batch simulation parameters are configured. A test case is submitted for evaluation. Historical performance data for test cases associated with the submitted test case is gathered. A set of performance statistics for the submitted test case is generated based on the historical performance data and the configured batch simulation parameters. A set of values for the submitted test is generated based on the generated performance statistics for the submitted test case and the historical performance data. The generated set of values and the generated set of performance statistics for the submitted test case are displayed to a user. | 02-12-2009 |
20090112552 | Method, System and Program Product for Reporting Temporal Information Regarding Count Events of a Simulation - At a simulation client, a design is simulated utilizing a hardware description language (HDL) simulation model by stimulating the HDL simulation model with a testcase. The HDL simulation model includes instrumentation not forming a portion of the design that includes a plurality of count event counters that count occurrences of count events in the design during stimulation by the testcase. At multiple intervals during stimulation of the HDL simulation model by the testcase, the simulation client records count values of the plurality of count event counters. The simulation client determines, for each of the multiple intervals, a temporal statistic regarding the count values of the plurality of count event counters and outputs a report containing temporal statistics for the multiple intervals. | 04-30-2009 |
20090112561 | Method, System and Program Product for Defining and Recording Threshold-Qualified Count Events of a Simulation By Testcases - A design is simulated utilizing a hardware description language (HDL) simulation model by stimulating the HDL simulation model with a testcase. The HDL simulation model includes instrumentation not forming a portion of the design that includes a count event counter for a count event in the design, and the simulation includes counting occurrences of the count event in the count event counter to obtain a count event value. A threshold is also established for an aggregate count event value for the count event counter. After completion of the testcase, a determination is made whether addition of the count event value to the aggregate count event value for the count event counter would cause the aggregate count event value to exceed the threshold. If not, the count event value is recorded in a testcase data storage area, and the count event value is accumulated in the aggregate count event value. If so, the count event value is discarded without recording the count event value in the testcase data storage area. | 04-30-2009 |
Patent application number | Description | Published |
20090059316 | Enhanced Scanner Design - Improved scanner designs are provided to improve imaging and reduce errors during the scanning process. Embodiments disclosed include, for example, the use of dual cameras to improve imagery and reduce the scanner enclosure size, synchronized lighting techniques during the scanning sequence, shielded lens for the camera scanner, a scanner enclosed on at least three sides, adjustments to scanner lighting based on the levels of ambient lighting, a combined branding and scanner apparatus, a gimbaled scanner mount, and a tilted platen with stop for document alignment. | 03-05-2009 |
20090065574 | LOTTERY TICKET BAR CODE - Security can be provided for lottery tickets having data printed thereon in a bar code or other machine readable media by covering only a portion of the bar code with a scratch-off material. Removing the scratch-off material, or in some cases only a portion of the scratch-off material, can permit machine validation of the lottery tickets. For bar codes having a specified level of redundancy, it is desirable to cover at least enough of the bar code to prevent the machine reading of ticket validation data encoded in the bar code. Also, a lottery ticket can include a bar code printed on the ticket having both inventory and validation data along with a bar code printed on the front of the ticket including the validation data. All or part of the bar code printed on the front of the ticket can be covered by a scratch-off material. Also, the validation and redemption process can be expedited by having a player ticket checker read a ticket identifier printed on the lottery ticket so that this information can be checked and automatically entered in an agent terminal. | 03-12-2009 |
20090163263 | Method and System for Multiple In-Lane Lottery Ticket Sales at a Retail Establishment - A lottery sales method and related system utilize an in-lane lottery sales computing device that is configured to interface with a point-of-sale terminal and determine when the point-of-sale terminal has identified a code corresponding to a desired lottery product. A request identifying the desired lottery product is transmitted to a lottery central system device used to administer and coordinate the sales of lottery products. | 06-25-2009 |
20100051708 | LOTTERY TICKET BAR CODE - Security can be provided for lottery tickets having data printed thereon in a bar code or other machine readable media by covering only a portion of the bar code with a scratch-off material. Removing the scratch-off material, or in some cases only a portion of the scratch-off material, can permit machine validation of the lottery tickets. For bar codes having a specified level of redundancy, it is desirable to cover at least enough of the bar code to prevent the machine reading of ticket validation data encoded in the bar code. Also, a lottery ticket can include a bar code printed on the ticket having both inventory and validation data along with a bar code printed on the front of the ticket including the validation data. All or part of the bar code printed on the front of the ticket can be covered by a scratch-off material. Also, the validation and redemption process can be expedited by having a player ticket checker read a ticket identifier printed on the lottery ticket so that this information can be checked and automatically entered in an agent terminal. | 03-04-2010 |
20100239118 | Optical Signature to Enable Image Correction - A method and system for performing document image correction using a document reader is disclosed. The method includes generating a document image representative of a document having a deformation; decoding an optical pattern embedded in the document from the document image to determine an optical signature for the document; receiving document classification data associated with the optical signature; and applying an image correction technique to the document image based on the document classification data to generate a corrected document image. A document capable of being read by a document reader is also disclosed. The document includes a substrate and an optical pattern embedded on the substrate. The optical pattern is part of a background pattern printed on the substrate. The optical pattern defines an optical signature unique to the particular class of document and is associated with document classification data for the document. | 09-23-2010 |
20120250118 | Enhanced Scanner Design - Improved scanner designs are provided to improve imaging and reduce errors during the scanning process. Embodiments disclosed include, for example, the use of dual cameras to improve imagery and reduce the scanner enclosure size, synchronized lighting techniques during the scanning sequence, shielded lens for the camera scanner, a scanner enclosed on at least three sides, adjustments to scanner lighting based on the levels of ambient lighting, a combined branding and scanner apparatus, a gimbaled scanner mount, and a tilted platen with stop for document alignment. | 10-04-2012 |
20120267888 | Methods for Securing Variable Indicia on Instant (Scratch-Off) Tickets - A security-enhanced document, such as an instant lottery ticket, includes a substrate. Indicia is provided on the substrate, and a scratch-off-coating (SOC) layer is applied over the indicia to maintain the indicia unreadable until removal of the SOC layer. The indicia is printed onto the substrate as pigmented particles. One or more opacity film layers may be provided over or under the pigmented particle indicia. | 10-25-2012 |
20140004922 | System for Detecting Unauthorized Movement of a Lottery Terminal | 01-02-2014 |