Patent application number | Description | Published |
20120223321 | III-Nitride Transistor Stacked with FET in a Package - One exemplary disclosed embodiment comprises a three-terminal stacked-die package including a field effect transistor (FET), such as a silicon FET, stacked atop a III-nitride transistor, such that a drain of the FET resides on and is electrically coupled to a source of the III-nitride transistor. A first terminal of the package is coupled to a gate of the FET, a second terminal of the package is coupled to a drain of the III-nitride transistor. A third terminal of the package is coupled to a source of the FET. In this manner, devices such as cascoded switches may be packaged in a stacked-die form, resulting in reduced parasitic inductance and resistance, improved thermal dissipation, smaller form factor, and lower manufacturing cost compared to conventional packages. | 09-06-2012 |
20120223322 | III-Nitride Transistor Stacked with Diode in a Package - One exemplary disclosed embodiment comprises a two-terminal stacked-die package including a diode, such as a silicon diode, stacked atop a III-nitride transistor, such that a cathode of the diode resides on and is electrically coupled to a source of the III-nitride transistor. A first terminal of the package is coupled to a drain of the III-nitride transistor, and a second terminal of the package is coupled to an anode of the diode. In this manner, devices such as cascoded rectifiers may be packaged in a stacked-die form, resulting in reduced parasitic inductance and resistance, improved thermal dissipation, smaller form factor, and lower manufacturing cost compared to conventional packages. | 09-06-2012 |
20140070786 | Power Converter Including Integrated Driver Providing Overcurrent Protection - In one implementation, a power converter includes an output stage integrated circuit (IC) in a group III-V die including a depletion mode group III-V transistor, and a driver IC in a group IV die. The driver IC is configured to drive the output stage IC. In addition, a group IV control switch in the group IV die is cascoded with the depletion mode group III-V transistor. The power converter further includes an overcurrent protection circuit for the depletion mode group III-V transistor, the overcurrent protection circuit monolithically integrated in the group IV die. | 03-13-2014 |
Patent application number | Description | Published |
20130227636 | OFF-DEVICE ANTI-MALWARE PROTECTION FOR MOBILE DEVICES - Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices includes receiving a software inventory for a mobile device, in which the software inventory identifies a plurality of applications installed on the mobile device; and determining whether one or more of the plurality of applications identified in the software inventory are associated with malware based on a policy. In some embodiments, the off-device anti-malware protection for mobile devices further includes enforcing the policy on the mobile device. In some embodiments, the off-device anti-malware protection for mobile devices is provided as a cloud service. | 08-29-2013 |
20130227683 | QUANTIFYING THE RISKS OF APPLICATIONS FOR MOBILE DEVICES - Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile. | 08-29-2013 |
20130347094 | IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS - Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation. | 12-26-2013 |
20140196150 | QUANTIFYING THE RISKS OF APPLICATIONS FOR MOBILE DEVICES - Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile. | 07-10-2014 |
20140331281 | IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS - Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation. | 11-06-2014 |
Patent application number | Description | Published |
20130204433 | PATIENT-SPECIFIC MEDICATION MANAGEMENT SYSTEM - Systems for use with a medical device for reducing medication errors are provided. In one aspect, a system includes a medical device that is configurable with operating limit parameters for providing medication to a patient, and a limiting system. The limiting system includes a memory that includes patient-specific information for the patient and a database includes acceptable operating parameters for providing the medication to the patient using the medical device, and a processor. The processor is configured to compare the acceptable operating parameters with the patient-specific information, and provide a modification of the operating limit parameters for providing the medication to the patient based on the comparison of the acceptable operating parameters with the patient-specific information. Methods and machine-readable media are also provided. | 08-08-2013 |
20140276548 | Fluid Bolus Delivery - The subject matter described herein relates to controlling and automating a delivery of one or boluses of a fluid medication to a patient. A user interface can display lists of parameters, such as a list of types of fluid in the fluid medication, a list of modes for delivery of the one or more boluses, a list of flow rates of each bolus delivery, a list of durations corresponding to each bolus, a list of initiation times of each bolus, and a list of initiation events for each bolus. In response, a clinician can select and/or specify parameters for the one or more boluses. Subsequently, the infusion device can deliver the one or more boluses based on the selected or specified parameters. Related apparatus, systems, techniques and articles are also described. | 09-18-2014 |
Patent application number | Description | Published |
20120072453 | SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD PATTERNS AND CREATING FRAUD BEHAVIORAL MODELS - Systems, methods, and media for analyzing fraud patterns and creating fraud behavioral models are provided herein. In some embodiments, methods for analyzing call data associated with fraudsters may include executing instructions stored in memory to compare the call data to a corpus of fraud data to determine one or more unique fraudsters associated with the call data, associate the call data with one or more unique fraudsters based upon the comparison, generate one or more voiceprints for each of the one or more identified unique fraudsters from the call data, and store the one or more voiceprints in a database. | 03-22-2012 |
20120253805 | SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD RISK FROM AUDIO SIGNALS - Systems, methods, and media for determining fraud risk from audio signals and non-audio data are provided herein. Some exemplary methods include receiving an audio signal and an associated audio signal identifier, receiving a fraud event identifier associated with a fraud event, determining a speaker model based on the received audio signal, determining a channel model based on a path of the received audio signal, using a server system, updating a fraudster channel database to include the determined channel model based on a comparison of the audio signal identifier and the fraud event identified, and updating a fraudster voice database to include the determined speaker model based on a comparison of the audio signal identifier and the fraud event identifier. | 10-04-2012 |
20120254243 | SYSTEMS, METHODS, AND MEDIA FOR GENERATING HIERARCHICAL FUSED RISK SCORES - Systems, methods, and media for generating fused risk scores for determining fraud in call data are provided herein. Some exemplary methods include generating a fused risk score used to determine fraud from call data by generating a fused risk score for a leg of call data, via a fuser module of an analysis system, the fused risk score being generated by fusing together two or more uniquely calculated fraud risk scores, each of the uniquely calculated fraud risk scores being generated by a sub-module of the analysis system; and storing the fused risk score in a storage device that is communicatively couplable with the fuser module. | 10-04-2012 |
20120263285 | SYSTEMS, METHODS, AND MEDIA FOR DISAMBIGUATING CALL DATA TO DETERMINE FRAUD - Systems, methods, and media for disambiguating call data are provided herein. Some exemplary methods include receiving, via a fraud notification system, notification of a fraud event associated with a customer account, the fraud event comprising a time stamp, determining, via a call selection module, unique voice samples or models from call events obtained within a time frame that is temporally proximate the fraud event, and generating a timeline presentation that includes each unique voice sample or model identified in the call events based upon a time stamp associated with the call events. | 10-18-2012 |
20150055763 | SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD PATTERNS AND CREATING FRAUD BEHAVIORAL MODELS - Systems, methods, and media for analyzing fraud patterns and creating fraud behavioral models are provided herein. In some embodiments, methods for analyzing call data associated with fraudsters may include executing instructions stored in memory to compare the call data to a corpus of fraud data to determine one or more unique fraudsters associated with the call data, associate the call data with one or more unique fraudsters based upon the comparison, generate one or more voiceprints for each of the one or more identified unique fraudsters from the call data, and store the one or more voiceprints in a database. | 02-26-2015 |
Patent application number | Description | Published |
20100303211 | METHOD AND SYSTEM FOR GENERATING A FRAUD RISK SCORE USING TELEPHONY CHANNEL BASED AUDIO AND NON-AUDIO DATA - Disclosed is a method for generating a fraud risk score representing a fraud risk associated with an individual, the method comprising: a) determining a telephony channel risk score from at least one of audio channel data and non-audio channel data of the individual; and b) generating the fraud risk score based on at least one of the telephony channel risk score, the audio channel data, and the non-audio channel data. | 12-02-2010 |
20100305946 | SPEAKER VERIFICATION-BASED FRAUD SYSTEM FOR COMBINED AUTOMATED RISK SCORE WITH AGENT REVIEW AND ASSOCIATED USER INTERFACE - Disclosed is method for screening an audio for fraud detection, the method comprising: providing a User Interface (UI) control capable of: a) receiving an audio; b) comparing the audio with a list of fraud audios; c) assigning a risk score to the audio based on the comparison with a potentially matching fraud audio of the list of fraud audios; and d) displaying an audio interface on a display screen, wherein the audio interface is capable of playing the audio along with the potentially matching fraud audio, and wherein the display screen further displays metadata for each of the audio and the potentially matching fraud audio thereon, wherein the metadata includes location and incident data of each of the audio and the potentially matching fraud audio. | 12-02-2010 |
20100305960 | METHOD AND SYSTEM FOR ENROLLING A VOICEPRINT IN A FRAUDSTER DATABASE - Disclosed is a method for enrolling a voiceprint in a fraudster database, the method comprising: a) defining a fraud model comprising at least one hypothesis indicative of a fraudulent transaction; b) processing audio data based on the fraud model to identify at least one suspect voiceprint in the audio data suspected of belonging to a fraudster; and c) enrolling the at least one suspect voiceprint in the fraudster database. | 12-02-2010 |
20130253919 | Method and System for Enrolling a Voiceprint in a Fraudster Database - Disclosed is a method for enrolling a voiceprint in a fraudster database, the method comprising: a) defining a fraud model comprising at least one hypothesis indicative of a fraudulent transaction; b) processing audio data based on the fraud model to identify at least one suspect voiceprint in the audio data suspected of belonging to a fraudster; and c) enrolling the at least one suspect voiceprint in the fraudster database. | 09-26-2013 |
20140254778 | SYSTEMS AND METHODS FOR IDENTIFYING A CALLER - Systems and methods for authenticating callers are disclosed that may obtain identifying data and a voice print, and compare the voice print to one or more stored voice prints. Further, one or more initial scores may be calculated based on the data and the comparison, and a confidence interval score may also be calculated. The systems and methods may determine whether to authenticate based on the one or more initial scores and the confidence interval score. | 09-11-2014 |