摘要:
A method for making a patient monitor includes providing an electronic device operatively connected to the monitor. The device is configured to measure predetermined signals from a user and to generate therefrom a substantially unique signature specific to the user. The method further includes storing the signature in the electronic device. The electronic device is adapted to compare newly acquired signatures to the substantially unique signature, and to recognize at least one difference from the substantially unique signature. Recognition of a difference in the signatures signifies a new user, whereupon the electronic device acquires new predetermined signals and generates therefrom a new substantially unique signature specific to the new user.
摘要:
A method and system for providing recording device privileges through biometric assessment are disclosed herein. An embodiment of the method includes monitoring information associated with a recording device. The information includes a recording device location, dynamic biometric data, knowledge data, and recording device identification data. From the monitored information, an identity of a then-current user of the recording device is determined. An authorization level for the then-current user is determined, and recording device access privileges are dynamically adjusted based on the determined authorization level.
摘要:
A method of optimizing retention of signal information from a physiologically generated digital signal is provided. The method can comprise steps of generating a digital signal from a physiological source, storing the digital signal into a memory location as a stored digital signal, identifying within the stored digital signal a preferred digital signal event exclusive of a non-preferred digital signal event, wherein the preferred digital signal event has a first event compression level and the non-preferred digital signal event has a second event compression level, detecting a memory storage limitation in the memory location, and increasing the second event compression level of the non-preferred digital signal event as a result of detecting a memory storage limitation. Also, the portable monitor can detect the presence of an upload source to which the digital signal can be uploaded in order to minimize the need to compress the signal.
摘要:
Systems, methodologies, media, and other embodiments associated with electrocardiogram electrode characterization and compensation are described. One exemplary system embodiment includes a characterization logic configured to generate signals designed to facilitate characterizing an electrocardiogram electrode. The characterization logic may also be configured to analyze signals produced in response to introducing the signals into a subject. The example system may also include a compensation logic configured to determine whether an electrode is performing in a desired manner and to selectively compensate for electrode performance.
摘要:
A method for enhancing security printing includes generating data for a region of interest (14), where the data includes information for at least one of locating or analyzing the region of interest (14) using a secure registry (18). The method further includes encrypting a deterrent (12) with the data, and printing the deterrent (12) and the region of interest (14) on an object (10).
摘要:
An embodiment provides a method for compression of a real-time surveillance signal. This method includes receiving a signal from a monitoring device and analyzing the signal to be monitored to compute spectral content of the signal. This method also includes computing the information content of the signal and determining a count of a number of coefficients to be used to monitor the signal. This method includes deploying a strategy for computing a plurality of coefficients based on the spectral content of the signal and the count of the number of coefficients to be used for monitoring the signal. This method further includes monitoring the signal and resetting the system in the case of above-threshold changes in a selected portion of the plurality of coefficients.
摘要:
A covert label. A substrate comprises a field of ink. Disposed within the field of ink, is ink that can be preferentially removed according to a preconfigured pattern. The preconfigured pattern comprises information associable with at least one object.
摘要:
A forensic authentication system includes an imaging device to capture an image of a printed mark and a non-printed area of a substrate directly adjacent to the printed mark, and a processor to run computer readable instructions. The processor can run computer readable instructions to utilize a model to define a substrate region that corresponds with at least a portion of the non-printed area of the substrate directly adjacent to the printed mark; and computer readable instructions to generate a substrate signature for the defined substrate region. Each of the computer readable instructions is embedded on a non-transitory, tangible computer readable medium.
摘要:
The present disclosure includes a system and method for a service recommendation service. A method for a service recommendation service includes determining one or more queries that do not expose additional data items stored in a data source of a participant in a collaborative information system than are exposed by queries already implemented on the participant's data source. Query services that are not authorized to involve the data source, but which use the determined one or more queries are identified. The identified query services are recommended to the participant.
摘要:
A method of determining whether a mass serialization engine is cryptographically secure is provided herein. The method includes performing (202) a specified number of mass serializations to generate a corresponding number of mass serialization sets. A size of the mass serialization sets is increased from a first portion size to a second portion size by the mass serialized engine. The method further includes determining (204) a corresponding number of collisions for each of the specified number of mass serializations. Additionally, the method includes comparing (206) the number of collisions to an expected number of collisions. Further, the method includes determining (208) whether the mass serialization engine is cryptographically secure based on the comparison.