Patent application number | Description | Published |
20100115621 | Systems and Methods for Detecting Malicious Network Content - A method for detecting malicious network content comprises inspecting one or more packets of network content, identifying a suspicious characteristic of the network content, determining a score related to a probability that the network content includes malicious network content based on at least the suspicious characteristic, identifying the network content as suspicious if the score satisfies a threshold value, executing a virtual machine to process the suspicious network content, and analyzing a response of the virtual machine to detect malicious network content. | 05-06-2010 |
20110078794 | Network-Based Binary File Extraction and Analysis for Malware Detection - A system and method are disclosed for network-based file analysis for malware detection. Network content is received from a network tap. A binary packet is identified in the network content. A binary file, including the binary packet, is extracted from the network content. It is determined whether the extracted binary file is detected to be malware. | 03-31-2011 |
20110093951 | Computer worm defense system and method - A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems. | 04-21-2011 |
20110099633 | System and method of containing computer worms - A computer worm containment system comprises a detection system and a blocking system. The detection system orchestrates a sequence of network activities in a decoy computer network and monitors that network to identify anomalous behavior and determine whether the anomalous behavior is caused by a computer worm. The detection system can then determine an identifier of the computer worm based on the anomalous behavior. The detection system can also generate a recovery script for disabling the computer worm or repairing damage caused by the computer worm. The blocking system is configured to use the computer worm identifier to protect another computer network. The blocking system can also use the recovery script to disable a computer worm within the other network and to repair damage caused to the network by the worm. | 04-28-2011 |
20110247072 | Systems and Methods for Detecting Malicious PDF Network Content - Systems and methods for detecting malicious PDF network content are provided herein. According to some embodiments, the methods may include at least the steps of examining received PDF network content to determine if one or more suspicious characteristics indicative of malicious network content are included in the PDF network content, providing PDF network content determined to include at least one suspicious characteristic to one or more virtual machines, and analyzing responses received from the one or more virtual machines to verify the inclusion of malicious network content in the PDF network content determined to include at least one suspicious characteristic. | 10-06-2011 |
20110314546 | Electronic Message Analysis for Malware Detection - An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in the electronic message itself. The present technology may analyze an electronic message and attachments to electronic messages to detect a uniform resource location (URL), identify whether the URL is suspicious, and analyze all suspicious URLs to determine if they are malware. The analysis may include re-playing the suspicious URL in a virtual environment which simulates the intended computing device to receive the electronic message. If the re-played URL is determined to be malicious, the malicious URL is added to a black list which is updated throughout the computer system. | 12-22-2011 |
20120117652 | Network-Based Binary File Extraction and Analysis for Malware Detection - A system and method are disclosed for network-based file analysis for malware detection. Network content is received from a network tap. A binary packet is identified in the network content. A binary file, including the binary packet, is extracted from the network content. It is determined whether the extracted binary file is detected to be malware. | 05-10-2012 |
20120174186 | Policy Based Capture with Replay to Virtual Machine - A suspicious activity capture system can comprise a tap configured to copy network data from a communication network, and a controller. The controller is coupled to the tap and is configured to receive the copy of the network data from the tap, analyze the copy of the network data to flag the network data as suspicious, and simulate transmission of the network data to a destination device. | 07-05-2012 |
20120222121 | Systems and Methods for Detecting Malicious PDF Network Content - Systems and methods for detecting malicious PDF network content are provided herein. According to some embodiments, the methods may include at least the steps of examining received PDF network content to determine if one or more suspicious characteristics indicative of malicious network content are included in the PDF network content, providing PDF network content determined to include at least one suspicious characteristic to one or more virtual machines, and analyzing responses received from the one or more virtual machines to verify the inclusion of malicious network content in the PDF network content determined to include at least one suspicious characteristic. | 08-30-2012 |
20120331553 | DYNAMIC SIGNATURE CREATION AND ENFORCEMENT - A dynamic signature creation and enforcement system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap. The controller is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heuristic to determine if the network data is suspicious, flag the network data as suspicious based on the heuristic determination, simulate transmission of the network data to a destination device to identify unauthorized activity, generate an unauthorized activity signature based on the identification, and transmit the unauthorized activity signature to a digital device configured to enforce the unauthorized activity signature. | 12-27-2012 |
20130036472 | Computer Worm Defense System and Method - A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. In various embodiments, the computer worm may be transported from a production network, where the computer worm is not readily identifiable, to an alternate network in the worm sensor where the computer worm may be readily identifiable. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems. | 02-07-2013 |
20130047257 | Systems and Methods for Computer Worm Defense - A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. In various embodiments, the computer worm may be transported from a production network, where the computer worm is not readily identifiable, to an alternate network in the worm sensor where the computer worm may be readily identifiable. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems. | 02-21-2013 |
20130227691 | Detecting Malicious Network Content - Systems and methods for detecting malicious content on portable data storage devices or remote network servers are provided. In an exemplary embodiment, a system comprises a quarantine module configured to detect one or more portable data storage devices upon insertion of the devices into a security appliance, wherein the security appliance is configured to receive the portable data storage devices, a controller configured to receive from the security appliance, via a communication network, data associated with the portable data storage devices, an analysis module configured to analyze the data to determine whether the data includes malware, and a security module to selectively identify, based on the determination, the one or more portable data storage devices storing the malware. | 08-29-2013 |
20130291109 | Systems and Methods for Scheduling Analysis of Network Content for Malware - A method for detecting malicious network content comprises inspecting one or more packets of network content, identifying a suspicious characteristic of the network content, determining a score related to a probability that the network content includes malicious network content based on at least the suspicious characteristic, identifying the network content as suspicious if the score satisfies a threshold value, executing a virtual machine to process the suspicious network content, and analyzing a response of the virtual machine to detect malicious network content. | 10-31-2013 |
20150180886 | Systems and Methods for Scheduling Analysis of Network Content for Malware - A method for detecting malicious network content comprises inspecting one or more packets of network content, identifying a suspicious characteristic of the network content, determining a score related to a probability that the network content includes malicious network content based on at least the suspicious characteristic, identifying the network content as suspicious if the score satisfies a threshold value, executing a virtual machine to process the suspicious network content, and analyzing a response of the virtual machine to detect malicious network content. | 06-25-2015 |
Patent application number | Description | Published |
20100078541 | ROTARY JOINT ASSEMBLY AND COMBINATION CLIP-HOOK AND JEWELRY PIECE EMPLOYING THE SAME - This invention provides a combination clip and hook (clip) for use generally in suspending articles having shoulder or hand straps, or carrying other accessories, such as keys, which is rotatably movable about a rotary joint between a first position in which two opposing, rotatably joined portions of the overall clip structure are oriented together to form a continuous, enclosed shape that can be secured around another strap or loop on an item or piece of clothing, and a second position in which the two portions of the structure are rotated out of the enclosed shape, and into, for example, a substantially S-shaped hook in which one portion of the structure supports the strap of the item and the other portion can be applied to a clothing hook, chair back, table surface, door top, or other supporting member. The joint between the two portions can define a spring-loaded rotating pivot assembly with at least two indexing positions that are opposed by 180 degrees thereby defining the enclosed orientation and hook orientation, respectively. The rotary joint can be constructed with a pair of confronting male and female wedge and detent inserts that are normally biased toward each other by an embedded spring assembly. The spring assembly can comprise a series of Belleville washers arranged in a stack about a pivot shaft. | 04-01-2010 |
20100163343 | PERSONAL ESCAPE DEVICE - A personal escape device which can be used by men, women, and children, including physically disabled persons, to descend in a controlled and secure manner from high structures such as office buildings, multistory homes, and the like. The device is designed for a relatively low-cost, small size which may be used by payloads of variable weights. The rescue device of the invention may be a single-use device or a multi-use device. | 07-01-2010 |
20130158550 | EXTERNAL ANKLE DISTRACTION AND LOAD BYPASSING SYSTEM AND METHOD - Ankle distraction or load bypassing devices include a shoe or shoe insert that securely holds a patient's foot, and a cuff that securely holds the patient's lower leg. A load bypassing device can transmit force between the cuff and the shoe or shoe insert bypassing a portion of the load around the joint. A distraction force generating mechanism between the cuff and the shoe or shoe insert can distract the patient's ankle, while permitting the ankle to flex at a joint which joins together the cuff and the shoe. | 06-20-2013 |
20130325123 | Load Transferring Systems and Methods for Transferring Load in a Joint - Load transferring systems and related methods for transferring load in a joint are provided. The load transferring system may include two bases configured to couple to bones defining a joint and a spring configured to couple to the bases. The spring may be configured to exert a tensile force between the bases during flexion of the joint. The load transferring system may be employed to treat symptoms associated with osteoarthritis of the lateral compartment of the knee joint. Thus, the bases may respectively couple to the femur and tibia. The spring may exert tensile force therebetween during flexion of the knee joint so as to unload the lateral compartment of the knee joint by transferring load from the lateral compartment of the knee joint to the medial compartment of the knee joint. | 12-05-2013 |
20140090654 | ADJUSTABLE TONGUE RETAINING ORAL APPLIANCE - A device for receipt in a user's mouth includes a tongue engagement element having a front region, a rear region, and side regions that define an opening for receiving a user's tongue, means for retaining the user's tongue in a forward position, and means for changing the size of the opening. The tongue engagement element is shaped such that when placed in a user's mouth, the rear region extends over the user's tongue and the front region extends under the user's tongue. A method of securing a tongue engagement element in a user's mouth includes moving an expanded tongue engagement element under a front region of a tongue and over a rear region of the tongue, and allowing the tongue engagement element to return toward a non-expanded state. The tongue engagement element acts to resist rearward motion of the tongue. | 04-03-2014 |
20140210627 | METHOD AND SYSTEM FOR MONITORING INTOXICATION - A method and system for monitoring a user's intoxication including receiving a set of signals, derived from a set of samples collected from the user at a set of time points; providing a sobriety task to the user proximal to a time point of the set of time points; generating a performance dataset characterizing performance of the sobriety task by the user; receiving a supplementary dataset characterizing a demographic profile of the user and/or a physiological state of the user; determining a set of values of an intoxication metric, derived from the set of signals; generating a predicted temporal profile of the intoxication metric for the user based upon the set of values, the set of time points, and the supplementary dataset; generating an analysis of the user's sobriety based upon the performance dataset and the predicted temporal profile; and providing a notification to the user based upon the analysis. | 07-31-2014 |
20140330290 | System for Delivering an Anchor - A system for treating a prostate includes a cartridge, a handle configured to receive the cartridge, and an anchor assembly. The cartridge includes the anchor assembly and the handle includes an actuator and a spring mechanism loaded with mechanical energy. The cartridge and handle mate via pivoting and are aligned via alignment features. | 11-06-2014 |
20140361900 | METHOD AND SYSTEM FOR MONITORING INTOXICATION - A method and system for monitoring a user's intoxication including receiving a set of signals, derived from a set of samples collected from the user at a set of time points; providing a sobriety task to the user proximal to a time point of the set of time points; generating a performance dataset characterizing performance of the sobriety task by the user; receiving a supplementary dataset characterizing a demographic profile of the user and/or a physiological state of the user; determining a set of values of an intoxication metric, derived from the set of signals; generating a predicted temporal profile of the intoxication metric for the user based upon the set of values, the set of time points, and the supplementary dataset; generating an analysis of the user's sobriety based upon the performance dataset and the predicted temporal profile; and providing a notification to the user based upon the analysis. | 12-11-2014 |
20150261927 | METHOD AND SYSTEM FOR MONITORING INTOXICATION - A method and system for monitoring a user's intoxication including receiving a set of signals, derived from a set of samples collected from the user at a set of time points; providing a sobriety task to the user proximal to a time point of the set of time points; generating a performance dataset characterizing performance of the sobriety task by the user; receiving a supplementary dataset characterizing a demographic profile of the user and/or a physiological state of the user; determining a set of values of an intoxication metric, derived from the set of signals; generating a predicted temporal profile of the intoxication metric for the user based upon the set of values, the set of time points, and the supplementary dataset; generating an analysis of the user's sobriety based upon the performance dataset and the predicted temporal profile; and providing a notification to the user based upon the analysis. | 09-17-2015 |
20160096668 | BOTTLE CAP WITH COSMETIC KIT - A cap for a bottle containing a cosmetic reservoir is cylindrical (not necessarily radially symmetric) and defines an inner volume containing at least one reservoir for cosmetics, the reservoir being accessible when the lid is opened and inaccessible when the lid is closed. The reservoir is refillable and can be a removable tray. The reservoir can be defined by a central wall dividing the reservoir into two or more cosmetic reservoirs. In another embodiment, two or more trays of cosmetics can be stacked, one upon the other. A method for carrying and dispensing cosmetics within a cap for a bottle includes opening the lid and filling a cosmetic reservoir within the cap with a cosmetic; opening the lid to access and remove a portion of the cosmetic from the reservoir; and applying the cosmetic and closing the lid. | 04-07-2016 |
Patent application number | Description | Published |
20100225362 | Reduced line driver output dependency on process, voltage, and temperature variations - According to one exemplary embodiment, a transmitter module includes a line drive including a current digital-to-analog converter, where the line driver provides an analog output waveform. The current digital-to-analog converter receives a digitally filtered input waveform including at least two voltage steps. The at least two voltage steps of the digitally filtered input waveform cause a rise time of the analog output waveform to have a reduced dependency on process, voltage, and temperature variations in the line driver, while meeting stringent rise time requirements. The digitally filtered input waveform has an initial voltage level and a final voltage level, where the final voltage level is substantially equal to a sum of the at least two voltage steps of the digitally filtered input waveform. | 09-09-2010 |
20100259300 | Circuit for digitally controlling line driver current - In one embodiment, a circuit for providing a tail current for a line driver includes an adjustable current source. The adjustable current source includes a number of current source cells coupled together in a parallel configuration, where the current source cells are configured to provide the tail current for the line driver in response to a digital control signal. The circuit can further include a digital core coupled to the adjustable current source, where the digital core provides the digital control signal. The digital control signal provides a number of bits, where each bit controls one of the current source cells. In one embodiment, a current source cell can comprise a number of current source sub-cells. The current source cells can be configured to provide the tail current for the line driver in response to the digital control signal when the line driver is operating in a class AB mode. | 10-14-2010 |
20100259340 | Active termination and switchable passive termination circuits - According to one exemplary embodiment, an active termination circuit includes at least one active termination branch, where the at least one active termination branch includes at least one transistor for providing an active termination output. The at least one active termination branch further includes an amplifier driving the at least one transistor, where the amplifier has a non-inverting input coupled to the active termination output via a feedback network. The amplifier controls a current flowing through the at least one transistor so as to provide the active termination output. The active termination output can be provided at a drain of the at least one transistor, where a source of the at least one transistor is coupled to ground through a degeneration transistor and a tail current sink. | 10-14-2010 |
20110199129 | Line Driver with Reduced Dependency on Process, Voltage, and Temperature - According to one exemplary embodiment, a transmitter module includes a line drive including a current digital-to-analog converter, where the line driver provides an analog output waveform. The current digital-to-analog converter receives a digitally filtered input waveform including at least two voltage steps. The at least two voltage steps of the digitally filtered input waveform cause a rise time of the analog output waveform to have a reduced dependency on process, voltage, and temperature variations in the line driver, while meeting stringent rise time requirements. The digitally filtered input waveform has an initial voltage level and a final voltage level, where the final voltage level is substantially equal to a sum of the at least two voltage steps of the digitally filtered input waveform. | 08-18-2011 |
20110204967 | False-link protection circuit and method for utilizing same - Disclosed is a false-link protection circuit comprising at least one native switch coupled between a communication terminal of a first differential switch and a communication terminal of a second differential switch. The at least one native switch is configured to provide an attenuation path for a pulse link signal received by either communication terminal when the first and second differential switches are in a powered down state. According to one embodiment, a method to attenuate a pulse link signal comprises activating a native switch of a false-link protection circuit by powering down first and second differential switches, receiving a pulse link signal at a communication terminal of one of the first and second differential switches, and attenuating the pulse link signal by diverting it through the false-link protection circuit when the first and second differential switches are in a powered down state. | 08-25-2011 |
20110254584 | Switchable Passive Termination Circuits - According to one exemplary embodiment, an active termination circuit includes at least one active termination branch, where the at least one active termination branch includes at least one transistor for providing an active termination output. The at least one active termination branch further includes an amplifier driving the at least one transistor, where the amplifier has a non-inverting input coupled to the active termination output via a feedback network. The amplifier controls a current flowing through the at least one transistor so as to provide the active termination output. The active termination output can be provided at a drain of the at least one transistor, where a source of the at least one transistor is coupled to ground through a degeneration transistor and a tail current sink. | 10-20-2011 |
20130268782 | System and Method for Power Control in a Physical Layer Device - A system and method for power control in a physical layer device. Energy savings during an active state can be produced through the monitoring of a received signal level by a receiver in a physical layer device. In one embodiment, based on an indication of the received signal level or other communication characteristic of the transmission medium, a control module can adjust the signal level or amplitude and/or adjust the voltage supply. | 10-10-2013 |
20130294294 | POWER-EFFICIENT DRIVER ARCHITECTURE - Disclosed are various embodiments for providing a power-efficient driver architecture supporting rail-to-rail operation in full duplex mode. A driver is configured to drive a duplex signal over a transmission medium. A hybrid is configured to recover a received signal from the duplex signal. The received signal is generated by a remote transceiver. The driver is configured to drive the duplex signal based at least in part on the received signal recovered by the hybrid. | 11-07-2013 |
Patent application number | Description | Published |
20100069884 | Multi-Shape Catheter Assembly - A catheter assembly configurable to multiple shapes is provided. The catheter assembly comprises a detachable, interchangeable and configurable outer catheter and a detachable, interchangeable and flexible inner catheter. The shape of the outer catheter is configured to facilitate guiding of the inner catheter into an inner cavity of a patient's anatomy. The inner catheter is generally coaxial with the outer catheter. The second flexible distal end of the inner catheter enables the inner catheter to engage the inner cavity of the patient's anatomy. A locking element is provided for securing the inner catheter to the outer catheter, when the second flexible distal end of the inner catheter engages the inner cavity of the patient's anatomy to allow equipment or material to be introduced into the inner cavity. The catheter assembly is configured and manipulated to fit inner cavities of multiple anatomies for enabling a medical practitioner to perform medical procedures. | 03-18-2010 |
20100286589 | Atherosclerotic Plaque Dissolution Composition - A method and chemical composition for modifying and dissolving atherosclerotic plaques formed in blood vessels of a patient is provided. The chemical composition comprising one or more of an organic substance, an inorganic substance, and a bioactive product is administered at sites of the plaques formed in the patient's blood vessels. The chemical composition comprises, for example, one or more of d-limonene, propylene glycol, octanic acid, 2-octane, and glycerine. The chemical composition enables modification of the plaques by altering composition of the plaques. The modification comprises partial dissolution, complete dissolution or elimination of the plaques. The modification makes the plaques amenable to different forms of plaque treatment, for example, balloon angioplasty, stenting, atherectomy, etc. The modified plaques are eliminated from the body of the patient. The modification or elimination of the plaques facilitates treatment of cardiovascular diseases caused due to plaques formed in the blood vessels of the patient. | 11-11-2010 |
20100305633 | Diagnostic And Therapeutic Chest Casing - A system and method is provided for detection, forewarning, and rapid therapeutic treatment of a patient's ischemic and arrhythmic heart condition, congestive heart failure, respiratory failure, etc. The system comprises a chest casing of a form fitting material. The inner surface of the chest casing comprises electrocardiogram sensor electrodes, auscultation sensors, impedance sensor electrodes, etc. The electrocardiogram sensor electrodes detect abnormal electrocardiogram signals. The auscultation sensors record internal sounds at predefined cardiac and respiratory auscultation sensor points. The impedance sensor electrodes measure thoracic impedance across two or more points on the chest wall. A control unit is connected to the sensors for collecting and processing patient information. The control unit transmits the processed patient information to an external monitoring station. The chest casing comprises therapeutic delivery points for delivering therapeutic electrical dosages and different therapies, for example, cooling therapy, to the patient via therapeutic devices connected on the chest casing. | 12-02-2010 |
20110196383 | Atherosclerotic Plaque Dissolution Composition - A method and chemical composition for modifying and dissolving atherosclerotic plaques formed in a patient's blood vessels is provided. A chemical composition comprising one or more of an organic substance, an inorganic substance, and a bioactive substance is administered at sites of the plaques. The chemical composition comprises one or more of d-limonene, propylene glycol, octanoic acid, 2-octane, glycerine, acetylsalicylic acid, acetic acid, omega-3 fatty acids, ethanol, methanol, ezetimibe, rosuvastatin, resveratrol, lactic acid, gluconic acid, chloroform, carbon disulfide, dichloromethane, toluene, lauryldimethyl hydroxysultaine, and any combination thereof. The chemical composition enables modification of plaques by altering their composition. The modification comprises partial dissolution, complete dissolution, or elimination of the plaques, and makes the plaques amenable to different forms of plaque treatment. The modified plaques are eliminated from the patient's body. The modification or elimination of the plaques facilitates treatment of cardiovascular diseases caused due to plaques formed in the blood vessels. | 08-11-2011 |