Patent application number | Description | Published |
20140337175 | Universal Electronic Payment Apparatuses, Methods and Systems - The UNIVERSAL ELECTRONIC PAYMENT APPARATUS, METHODS AND SYSTEMS (“UEP”) transform touchscreen inputs into a virtual wallet mobile application interface via UEP components into purchase transaction triggers and receipt notices. In one implementation the UEP provides, via a user device, a product information search request; and obtains, in response to the product information search request, information on a first product for sale by a first merchant and a second product for sale by a second merchant. The UEP generates a single purchase transaction request, using the information on the first product for sale by the first merchant and the second product for sale by the second merchant. The UEP provides, via the user device, the single purchase transaction request for payment processing. Also, the UEP obtains an electronic purchase receipt for the first product for sale by the first merchant and the second product for sale by the second merchant. | 11-13-2014 |
20150046241 | Universal Value Exchange Multipoint Transactions Apparatuses, Methods and Systems - The UNIVERSAL VALUE EXCHANGE MULTIPOINT TRANSACTIONS APPARATUSES, METHODS AND SYSTEMS (“UVEMT”) transform cross-ecosystem currency exchange instructions via UVEMT components into cross-ecosystem currency exchanges. In one embodiment, the UVEMT may obtain a cross-ecosystem currency exchange instruction and determine one or more sources and destinations based on parsing the cross-ecosystem currency exchange instruction. The UVEMT may identify currency types associated with the sources and the destinations and determine exchange rates of the currency types relative to a standard currency. In one implementation, the UVEMT may obtain currency exchange restrictions and conditions associated with the sources and the destinations and generate a currency exchange flow path for currency transfer from the sources to the destinations. The UVEMT may also issue currency transfer requests to the sources and the destinations, determine that the cross-ecosystem currency exchange has been completed and provide a notification of completion of the cross-ecosystem currency exchange. | 02-12-2015 |
Patent application number | Description | Published |
20080217466 | AUXILIARY ON BOARD POWER SYSTEM FOR AN AIRCRAFT - An auxiliary on board power system for an aircraft provides the capability of taxiing the aircraft on the ground without using the main aircraft engine(s). The power system includes a small driver mounted on the aircraft. In one embodiment of the invention, the driver may be mounted at any desirable location on the aircraft and is designed to provide sufficient thrust to taxi the aircraft. Such a suitable system may be provided as original equipment to an aircraft or retrofitted to existing aircraft. In another embodiment of the invention, the driver includes a speed reducer with an output shaft to drive the wheels of one of the landing gear assemblies to provide power to taxi the aircraft. In a further embodiment of the invention, the auxiliary on board power system, in addition to the taxiing function, may be incorporated with an alternator to provide electrical power, an environmental control unit, and an emergency power units as desired. | 09-11-2008 |
20090072080 | ON BOARD SECONDARY PROPULSION SYSTEM FOR AN AIRCRAFT - An on board secondary propulsion system for an aircraft provides the capability of taxiing the aircraft on the ground without using the main aircraft engine(s). The power system includes a small driver mounted on the aircraft. In one embodiment of the invention, the driver may be mounted at any desirable location on the aircraft and is designed to provide sufficient thrust to taxi the aircraft. Such a suitable system may be provided as original equipment to an aircraft or retrofitted to existing aircraft. In a further embodiment of the invention, the on board secondary propulsion system, in addition to the taxiing function, may be incorporated with an alternator to provide electrical power, an environmental control unit, and an emergency power unit as desired. The system may also be used to supplement the main aircraft engines as necessary during takeoff and climb to further reduce fuel consumption, noise, engine emissions, maintenance costs and extend the life of the main aircraft engines. Additionally the thrust provided by the secondary propulsion system could essentially reduce the required takeoff distance of an aircraft, thus allowing the use of shorter runways. | 03-19-2009 |
20090173821 | AIRCRAFT TAXIING SYSTEMS - Thrust systems for passenger aircraft provide at least one flight engine and a taxi engine wherein all flight engines together provide, in total, a takeoff thrust arranged in a takeoff thrust direction and the taxi engine provides a taxi thrust which does not exceed 15% of the takeoff thrust and is directed substantially the same as the takeoff thrust direction. The taxi thrust is thereby sufficient to taxi the aircraft along a taxi path. In a system embodiment, the taxi thrust does not exceed 7.5% of the flight thrust. In another system embodiment, the flight engines have, in total, a flight engine weight and the taxi engine has a taxi engine weight that does not exceed 10% of the flight engine weight. In a system embodiment, the taxi engine weight does not exceed 7.0% of the flight engine weight. In another system embodiment, the taxi engine has a rated thrust and is configured so that the taxi thrust is within 40% and 100% of the rated thrust. In another system embodiment, the taxi engine includes a rotatable engine portion to divert the taxi thrust over an azimuth angle to assist taxiing along the taxi path. The taxi engine significantly reduces fuel costs because when flight engines are used for taxiing, they operate in a very inefficient region of their rated thrust and consume excessive fuel. The taxi engine also significantly reduces the brake repair and adjustment that is incurred when the flight engines are used for taxiing and the brakes are frequently engaged to counter their high thrust. | 07-09-2009 |
20120006935 | AIRCRAFT TAXIING AND SECONDARY PROPULSION SYSTEM - An on board secondary propulsion system for an aircraft provides the capability of taxiing the aircraft on the ground without using the main aircraft engine(s). The power system includes a small taxi engine mounted on or in the aircraft at a location suitable to provide a thrust sufficient only to taxi the aircraft. Such a suitable system may be provided as original equipment to an aircraft or retrofitted to existing aircraft. The on board secondary propulsion system, in addition to the taxiing function, can provide electrical power, an environmental control unit, power for the aircraft hydraulic system and an emergency power unit as desired. The system can also be used to supplement the main aircraft engines as necessary during takeoff and climb to further reduce fuel consumption, noise, engine emissions, maintenance costs and extend the life of the main aircraft engines, reduce the required takeoff distance of an aircraft when used in conjunction with the main engines and provide emergency glide support. | 01-12-2012 |
Patent application number | Description | Published |
20130038791 | RGB-Out Dither Interface - A display controller may include an RGB Interface module and a display port module, which may both use a target-master interface, in which the data receiving module pops pixels from the data sourcing module, and generates the HSync, VSync, and VBI timing signals. A dither module may be instantiated between the RGB interface module and display port module to perform dithering. The dither module may use a source-master interface, in which data signals and data valid signals are issued by the data sourcing module. In order to avoid having to use a large storage capacity FIFO with the dither module, a control unit may issue interface signals to the RGB Interface module and display port module, and clock-gate the dither module, to allow the data signals and data valid signals to properly interface with the RBG interface module and display port module, and provide data flow from the RGB interface module to the dither module to the display port module. | 02-14-2013 |
20130135351 | INLINE IMAGE ROTATION - Methods and apparatus for performing an inline rotation of an image. The apparatus includes a rotation unit for reading pixels from a source image in an order based on a specified rotation to be performed. The source image is partitioned into multiple tiles, the tiles are processed based on where they will be located within the rotated image, and each tile is stored in a tile buffer. The target pixel addresses within a tile buffer are calculated and stored in a lookup table, and when the pixels are retrieved from the source image by the rotation unit, the lookup table is read to determine where to write the pixels within a corresponding tile buffer. | 05-30-2013 |
20130215134 | Alpha Channel Power Savings in Graphics Unit - A graphics processing circuit and method for power savings in the same is disclosed. In one embodiment, a graphics processing circuit includes a number of channels. The number of channels includes a number of color component channels that are each configured to process color components of pixel values of an incoming frame of graphics information. The number of channels also includes an alpha scaling channel configured to process alpha values (indicative of a level of transparency) for the incoming and/or outgoing frames. The graphics processing circuit also includes a control circuit. The control circuit is configured to place the alpha scaling channel into a low-power state responsive to determining that at least one of the incoming or outgoing frames does not include alpha values. | 08-22-2013 |
20130222413 | BUFFER-FREE CHROMA DOWNSAMPLING - Methods and graphics processing pipelines for performing inline chroma downsampling of pixel data. The graphics processing pipeline includes a chroma downsampling unit for performing buffer-free downsampling of chroma pixel components. A vertical column of chroma pixel components is received in each clock cycle by the chroma downsampling unit, and downsampled chroma pixel components are generated on every clock cycle or every other clock cycle. Vertical, horizontal, and vertical and horizontal downsampling can be performed without buffers by the chroma downsampling unit. A programmable configuration register in the chroma downsampling unit determines the type of downsampling that is implemented. | 08-29-2013 |
20130223733 | PIXEL NORMALIZATION - Methods and apparatuses for performing lossless normalization of input pixel component values. The apparatus includes a normalization unit for converting pixel values from a range of 0 to (2 | 08-29-2013 |
20130223764 | PARALLEL SCALER PROCESSING - A parallel scaler unit for simultaneously scaling multiple pixels from a source image. The scaler unit includes multiple vertical scalers and multiple horizontal scalers. A column of pixels from the source image is presented to the vertical scalers, and each vertical scaler selects appropriate pixels from the column of pixels for scaling. Each vertical scaler scales the selected pixels in a vertical direction and then conveys the vertically scaled pixels to a corresponding horizontal scaler. Each horizontal scaler scales the received pixels in a horizontal direction. | 08-29-2013 |
20150092854 | PARALLEL HARDWARE AND SOFTWARE BLOCK PROCESSING PIPELINES - A block processing pipeline that includes a software pipeline and a hardware pipeline that run in parallel. The software pipeline runs at least one block ahead of the hardware pipeline. The stages of the pipeline may each include a hardware pipeline component that performs one or more operations on a current block at the stage. At least one stage of the pipeline may also include a software pipeline component that determines a configuration for the hardware component at the stage of the pipeline for processing a next block while the hardware component is processing the current block. The software pipeline component may determine the configuration according to information related to the next block obtained from an upstream stage of the pipeline. The software pipeline component may also obtain and use information related to a block that was previously processed at the stage. | 04-02-2015 |
20150095630 | GLOBAL CONFIGURATION BROADCAST - Methods and apparatus for configuring multiple components of a subsystem are described. The configuration memory of each of a plurality of components coupled to an interconnect includes a global configuration portion. The configuration memory of one of the components may be designated as a master global configuration for all of the components. A module coupled to the interconnect may receive writes to the components from a configuration source. For each write, the module may decode the write to determine addressing information and check to see if the write is addressed to the master global configuration. If the write is addressed to the master global configuration, the module broadcasts the write to the global configuration portion of each of the components via the interconnect. If the write is not addressed to the master global configuration, the module forwards the write to the appropriate component via the interconnect. | 04-02-2015 |
20150293172 | Method and Apparatus for Connecting Debug Interface to Processing Circuits Without Sideband Interface - An integrated circuit (IC) having a debug access port coupled to a processing circuit without a dedicated sideband interface is disclosed. In one embodiment, an IC includes a processor circuit and a DAP. The IC also includes a communications fabric over which communications transactions may be conveyed between the various functional circuits of the IC using a fabric protocol. Both the DAP and the processing circuit are coupled to the communications fabric. The IC also includes a translation circuit coupled between the processing circuit and the communications fabric. The translation circuit may translate transactions conveyed between the processing circuit and the DAP from or to a debug protocol to or from the fabric protocol. Thus, the DAP and the processing circuit may communicate according to the debug protocol without a dedicated sideband coupled therebetween. | 10-15-2015 |
Patent application number | Description | Published |
20100225176 | SYSTEMS AND METHODS FOR PROVIDING PROTECTION CIRCUITRY TO SELECTIVELY HANDLE MULTIPLE CABLE-TYPES THROUGH THE SAME PORT - This is generally directed to providing protection circuitry to selectively handle power-providing cables and headset cables that can couple to the same port of an electronic device. In some embodiments, the device can include a Headset Rx chip to communicate with the headset cable and a Power Rx chip to communicate with the power-providing cable. As the Headset Rx chip and the Power Rx chip can be coupled to the same contact of the device's port, these chips may prevent one another from operating correctly or may damage one another. Accordingly, in some embodiments, it can be determined whether a headset cable or a power-providing cable is coupled to the device. When a headset cable is coupled to the device, the protection circuitry can disconnect the Power Rx chip. Similarly, when a power-providing cable is coupled to the device, the protection circuitry can disconnect the Headset Rx chip. | 09-09-2010 |
20100232625 | DETECTING AND PROCESSING BUTTON PRESS EVENTS FOR PERFORMING ELECTRONIC DEVICE OPERATIONS - This is directed to processing inputs received from an input mechanism to control media playback operations and volume. The input mechanism can include a first button providing inputs by shorting an electrical circuit, and a second button providing inputs by changing the resistance or tone detected or received by a processor. To process inputs, a processor can first detect and process short events from the first button, and subsequently process button events from the second button. | 09-16-2010 |
20130200726 | SYSTEMS AND METHODS FOR PROVIDING PROTECTION CIRCUITRY TO SELECTIVELY HANDLE MULTIPLE CABLE-TYPES THROUGH THE SAME PORT - This is generally directed to providing protection circuitry to selectively handle power-providing cables and headset cables that can couple to the same port of an electronic device. In some embodiments, the device can include a Headset Rx chip to communicate with the headset cable and a Power Rx chip to communicate with the power-providing cable. As the Headset Rx chip and the Power Rx chip can be coupled to the same contact of the device's port, these chips may prevent one another from operating correctly or may damage one another. Accordingly, in some embodiments, it can be determined whether a headset cable or a power-providing cable is coupled to the device. When a headset cable is coupled to the device, the protection circuitry can disconnect the Power Rx chip. Similarly, when a power-providing cable is coupled to the device, the protection circuitry can disconnect the Headset Rx chip. | 08-08-2013 |
Patent application number | Description | Published |
20090320140 | Piracy Prevention Using Unique Module Translation - A method for providing solidified software in a computing environment includes creating a new reference for a function in a function table; copying an address of the function and associating the address with the new reference; replacing the address associated with an old reference of the function with a dummy address; and substituting each old reference in normal code with the new reference, where injected code is not able to execute in the computing environment. The function table entries can be further randomized by reordering the entries, introducing intermediate mappings, or providing non-operative entries. Alternatively, all or part of the code of the function can be copied and moved to a different storage location and associated with the new reference. The copied code can be further randomized by the insertion of dummy code, utilizing reverse peephole techniques, varying the size of the copied portion, or interleaving non-operative code. | 12-24-2009 |
20110093950 | PROGRAM-BASED AUTHORIZATION - Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the program file indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy. | 04-21-2011 |
20110119760 | CLASSIFICATION OF SOFTWARE ON NETWORKED SYSTEMS - A method and system for the classification of software in networked systems, includes: determining a software received by a sensor is attempting to execute on a computer system of the sensor; classifying the software as authorized or unauthorized to execute, and gathering information on the software by the sensor if the software is classified as unauthorized to execute. The sensor sends the information on the software to one or more actuators, which determine whether or not to act on one or more targets based on the information. If so, then the actuator sends a directive to the target(s). The target(s) updates its responses according to the directive. The classification of the software is definitive and is not based on heuristics or rules or policies and without any need to rely on any a priori information about the software. | 05-19-2011 |
20110138461 | EXECUTION ENVIRONMENT FILE INVENTORY - A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system. Each execution environment is in the group comprising a native binary execution environment configured to execute native machine language instructions and a non-native execution environment configured to execute at least one program to process non-native machine language instructions to yield native machine language instructions. The inventory is maintained based on a result of the considering step. The inventory may be used to exercise control over what executables are allowed to execute on the computer system. | 06-09-2011 |
20120290827 | METHOD AND APPARATUS FOR PROCESS ENFORCED CONFIGURATION MANAGEMENT - A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems. | 11-15-2012 |
20120290828 | METHOD AND APPARATUS FOR PROCESS ENFORCED CONFIGURATION MANAGEMENT - A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems. | 11-15-2012 |
20120297176 | METHOD AND APPARATUS FOR PROCESS ENFORCED CONFIGURATION MANAGEMENT - A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems. | 11-22-2012 |
20130024934 | CLASSIFICATION OF SOFTWARE ON NETWORKED SYSTEMS - A method and system for the classification of software in networked systems, includes: determining a software received by a sensor is attempting to execute on a computer system of the sensor; classifying the software as authorized or unauthorized to execute, and gathering information on the software by the sensor if the software is classified as unauthorized to execute. The sensor sends the information on the software to one or more actuators, which determine whether or not to act on one or more targets based on the information. If so, then the actuator sends a directive to the target(s). The target(s) updates its responses according to the directive. The classification of the software is definitive and is not based on heuristics or rules or policies and without any need to rely on any a priori information about the software. | 01-24-2013 |
20130247027 | Distribution and installation of solidified software on a computer - Techniques relating to the distribution and installation of solidified (or “frozen”) software on a computer are disclosed. Any additional software installed on the computer after the solidification process will not execute, regardless of whether the installation is initiated or otherwise performed by a person with administrative privilege. The installation of the solidified software can be carried out by installing pre-solidified software, by solidifying the software at the source code level and by solidifying the software by the compiler. The solidification can also be performed when software distributions are manufactured, for example on CDs, or as part of an installation procedure that can run and/or install differently each time. A business process for billing customers for the transfer or usage of solidified software is also disclosed. | 09-19-2013 |
20130247032 | Method of and system for computer system state checks - A system for and method of system state analysis of a computational system. The method is comprised of capturing selective state information of a computational system configured to operated with one or more guest machines running on a virtual machine layer and configured to output state information. The state information is then analyzed to for compliance checking. The system for system state analysis is comprised of a storage system, computation hardware configured to run the guest machines and the virtual machine layer, guest machines, a virtual machine layer configured to output guest machine state information, a system state snapshot server configured to control the virtual machine layer for the capture of state information. | 09-19-2013 |
20130247226 | CONNECTIVITY-BASED AUTHORIZATION - Techniques which allow definition and enforcement of connectivity-based action and execution authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The connectivity state of the computer, the subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the connectivity state indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy. | 09-19-2013 |
Patent application number | Description | Published |
20120030731 | System and Method for Local Protection Against Malicious Software - A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether the network access attempt is permitted and blocking the network access attempt if it is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the trust status is defined as trusted if the software program file is included in a whitelist of trustworthy program files and untrusted if the software program file is not included in a whitelist. In more specific embodiments, the method includes blocking the network access attempt if the software program file has an untrusted status. In further embodiments, an event is logged if the software program file associated with the network access attempt has an untrusted status. | 02-02-2012 |
20120030750 | System and Method for Network Level Protection Against Malicious Software - A method in one example implementation includes receiving information related to a network access attempt on a first computing device with the information identifying a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether network traffic associated with the software program file is permitted and then creating a restriction rule to block the network traffic if the network traffic is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the method includes pushing the restriction rule to a network protection device that intercepts the network traffic associated with the software program file and applies the restriction rule to the network traffic. In more specific embodiments, the method includes searching a whitelist identifying trustworthy software program files to determine the trust status of the software program file. | 02-02-2012 |
20130246422 | SYSTEM AND METHOD FOR CLUSTERING HOST INVENTORIES - A method in one example implementation includes obtaining a plurality of host file inventories corresponding respectively to a plurality of hosts, calculating input data using the plurality of host file inventories, and then providing the input data to a clustering procedure to group the plurality of hosts into one or more clusters of hosts. The method further includes each cluster of hosts being grouped using predetermined similarity criteria. In more specific embodiments, each of the host file inventories includes a set of one or more file identifiers with each file identifier representing a different executable software file on a corresponding one of the plurality of hosts. In other more specific embodiments, calculating the input data includes transforming the host file inventories into a matrix of keyword vectors in Euclidean space. In further embodiments, calculating the input data includes transforming the host file inventories into a similarity matrix. | 09-19-2013 |
20130246423 | SYSTEM AND METHOD FOR SELECTIVELY GROUPING AND MANAGING PROGRAM FILES - A method in one embodiment includes determining a frequency range corresponding to a subset of a plurality of program files on a plurality of hosts in a network environment. The method also includes generating a first set of counts including a first count that represents an aggregate amount of program files in a first grouping of one or more program files of the subset, where each of the one or more program files of the first grouping includes a first value of a primary attribute. In specific embodiments, each program file is unknown. In further embodiments, the primary attribute is one of a plurality of file attributes provided in file metadata. Other specific embodiments include either blocking or allowing execution of each of the program files of the first grouping. More specific embodiments include determining a unique identifier corresponding to at least one program file of the first grouping. | 09-19-2013 |
20130246685 | SYSTEM AND METHOD FOR PASSIVE THREAT DETECTION USING VIRTUAL MEMORY INSPECTION - A method in one example implementation includes synchronizing a first memory page set with a second memory page set of a virtual guest machine, inspecting the first memory page set off-line, and detecting a threat in the first memory page set. The method further includes taking an action based on the threat. In more specific embodiments, the method includes updating the first memory page set with a subset of the second memory page set at an expiration of a synchronization interval, where the subset of the second memory page set was modified during the synchronization interval. In other more specific embodiments, the second memory page set of the virtual guest machine represents non-persistent memory of the virtual guest machine. In yet other specific embodiments, the action includes at least one of shutting down the virtual guest machine and alerting an administrator. | 09-19-2013 |
20140006405 | SYSTEM AND METHOD FOR CLUSTERING HOST INVENTORIES | 01-02-2014 |
20140101783 | Execution Environment File Inventory - A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system. Each execution environment is in the group comprising a native binary execution environment configured to execute native machine language instructions and a non-native execution environment configured to execute at least one program to process non-native machine language instructions to yield native machine language instructions. The inventory is maintained based on a result of the considering step. The inventory may be used to exercise control over what executables are allowed to execute on the computer system. | 04-10-2014 |
20140351895 | METHOD AND APPARATUS FOR PROCESS ENFORCED CONFIGURATION MANAGEMENT - A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems. | 11-27-2014 |
20150180884 | SYSTEM AND METHOD FOR LOCAL PROTECTION AGAINST MALICIOUS SOFTWARE - A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether the network access attempt is permitted and blocking the network access attempt if it is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the trust status is defined as trusted if the software program file is included in a whitelist of trustworthy program files and untrusted if the software program file is not included in a whitelist. In more specific embodiments, the method includes blocking the network access attempt if the software program file has an untrusted status. In further embodiments, an event is logged if the software program file associated with the network access attempt has an untrusted status. | 06-25-2015 |
20150200968 | SYSTEM AND METHOD FOR NETWORK LEVEL PROTECTION AGAINST MALICIOUS SOFTWARE - A method in one example implementation includes receiving information related to a network access attempt on a first computing device with the information identifying a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether network traffic associated with the software program file is permitted and then creating a restriction rule to block the network traffic if the network traffic is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the method includes pushing the restriction rule to a network protection device that intercepts the network traffic associated with the software program file and applies the restriction rule to the network traffic. In more specific embodiments, the method includes searching a whitelist identifying trustworthy software program files to determine the trust status of the software program file. | 07-16-2015 |
20150310091 | SYSTEM AND METHOD FOR SELECTIVELY GROUPING AND MANAGING PROGRAM FILES - A method in one embodiment includes determining a frequency range corresponding to a subset of a plurality of program files on a plurality of hosts in a network environment. The method also includes generating a first set of counts including a first count that represents an aggregate amount of program files in a first grouping of one or more program files of the subset, where each of the one or more program files of the first grouping includes a first value of a primary attribute. In specific embodiments, each program file is unknown. In further embodiments, the primary attribute is one of a plurality of file attributes provided in file metadata. Other specific embodiments include either blocking or allowing execution of each of the program files of the first grouping. More specific embodiments include determining a unique identifier corresponding to at least one program file of the first grouping. | 10-29-2015 |
Patent application number | Description | Published |
20080312998 | SYSTEM AND METHOD FOR REDUCING RIKS ASSOCIATED WITH ACCEPTING A FINANCIAL INSTRUMENT - A system and method for verifying a financial instrument or a user's authorization to use a financial instrument. The system initiates one or more verifying transactions involving the instrument, with details that may vary from one transaction to another, such as the type of transaction (e.g., deposit, credit, debit), amount of the transaction, number of transactions, the merchant or vendor name or account for the transaction, and so on. Selected details, particularly variable ones are saved in the system. The user accesses information regarding the transaction, by accessing it on-line, via telephone, in a monthly statement, etc. The user then submits the requested details to the system, which compares them to the stored details. If they correspond, then the user may be allowed to use the instrument (e.g., for a purchase, a fund transfer). | 12-18-2008 |
20120109823 | VERIFYING THE SOURCE OF ELECTRONICALLY EXCHANGED VALUE - Computer-implemented method and system are provided for verifying a financial instrument. The method comprises performing a plurality of transactions using a source of electronically exchanged value identified by a user, recording details of the plurality of transactions, inviting the user to identify the details to a verification system, and verifying the source of electronically exchanged value based on the details provided by the user to the verification system. | 05-03-2012 |
20130332364 | AUTHORIZING USE OF A FINANCIAL INSTRUMENT - Computer-implemented method and system are provided for verifying a financial instrument. The method comprises receiving, via a user interface, a request to use a financial instrument. A transaction processor initiates at least one transaction having a variable detail, using the financial instrument, and saves the variable detail. A requested detail relating to the at least one transaction is received via the user interface and the transaction processor compares the stored detail with the requested detail. The transaction processor authorizes the use of the financial instrument in response to receiving the correct input that matches the saved variable detail. | 12-12-2013 |
Patent application number | Description | Published |
20090059813 | INTEGRATION OF EXTERNAL LOCATION ENGINE USING SWITCH - An RF switch is provided. The RF switch includes a processor adapted for communication with an external location engine. The processor is configured to receive notification regarding a status of a wireless asset, receive a plurality of input variables associated with the wireless asset, determine whether the wireless asset is associated with the external location engine, and if the wireless asset is associated with the external location engine, query the external location engine for location data associated with the wireless asset. | 03-05-2009 |
20090077620 | Method and System for Location-Based Wireless Network - Described are a method and a system for granting and denying network access to a device based on a location of that device. A method includes determining a current location of at least one mobile unit, permitting network access to a wireless network to the mobile unit if a network access policy of the mobile unit is configured to permit network access for the current location, and denying network access to the wireless network to the mobile unit if the network access policy of the mobile unit is configured to restrict network access for the current location. The system includes a processor generating network access policy data for at least one mobile unit, the network access policy data configured to one of permit network access and restrict network access for the at least one mobile unit depending on a location of the at least one mobile unit within an operating environment, a wireless switch providing a wireless network infrastructure, a location determination module calculating a current location of the at least one mobile unit, and a plurality of wireless access points in communication with the wireless switch, wherein each one of the wireless access points one of permits network access and restricts network access to the at least one mobile unit based on the current location and the network access policy data for the at least one mobile unit. | 03-19-2009 |
20090082015 | SYSTEMS AND METHODS FOR CONTROLLING MOBILE UNIT ACCESS TO NETWORK SERVICES BASED ON ITS LOCATION - Methods and systems for controlling mobile unit access to network services based on the location of the mobile unit are disclosed. One system includes determining if the mobile unit is located within an area and enabling access to the network services, by the mobile unit, in response to determining that the mobile unit is located within the area. A system includes a reader configured to determine if a mobile unit is located within the area and a switch coupled to the reader. The switch is configured to provide access to the network services, to the mobile unit, in response to the reader determining that the mobile unit is located within the area. An apparatus includes means for determining if a mobile unit is located within the area and means for enabling the mobile unit to access the network services in response thereto. | 03-26-2009 |
20090085741 | METHODS AND APPARATUS FOR LOCATING AN RFID READER USING RFID TAGS - Methods and systems are provided for determining the location of an RFID reader within an environment having a plurality of RFID tags located therein. One method includes activating a tag via an RFID reader and receiving data from an RFID tag. The method also includes transmitting the data from the reader to an access port and determining the location of the reader based on the data. A system includes an RFID tag configured to transmit data when activated by an RFID reader. Furthermore, the system includes an access port configured to receive the data from the reader and a module configured to receive the data and determine the location of the reader based on the data. One RFID reader includes means for activating an RFID tag including data identifying a location of the tag, means for receiving the data, and means for transmitting the data to an access port. | 04-02-2009 |
20090085743 | METHODS AND SYSTEMS FOR CONTROLLING OPERATIONS OF A MOBILE RADIO FREQUENCY READER BASED ON ITS LOCATION - Methods and systems are provided for controlling RF reader operations based the location of the RF reader. One method includes determining that the RF reader is located within a zone associated with an access level and enabling or disabling the RF reader based on the access level. A system includes multiple access ports (APs) defining multiple zones including an access level for the RF reader. The system also includes a switch configured to determine a present zone of the mobile RF reader and enabling the RF reader based on the access level of the present zone. Another system includes means for receiving a signal from an access port and means for determining a location of the RF reader based on the signal, the location associated with an access level. The system also includes means for enabling or disabling the RF reader based on the access level. | 04-02-2009 |
20090322536 | INTEGRATED SWITCH SYSTEMS AND METHODS FOR LOCATING IDENTIFICATION TAGS - Integrated switch systems and methods for locating ID tags are disclosed. One system includes an application, a plurality of different tag readers in communication with the ID tags, and an integrated switch configured to enable the application to receive tag information from the different tag readers. An integrated switch includes multiple reader adapters, an application adapter, and a virtualization core. The virtualization core is configured to provide a common interface between each tag reader and the application. One method includes receiving a first signal from a first tag reader and receiving a second signal from a second tag reader, the first and second signals having information related to first and second ID tags, respectively. The method also includes normalizing the first and second signals such that the signals are compatible with the application and transmitting an ID tag report based on the normalized first and/or second signal to the application. | 12-31-2009 |
20130249672 | SYSTEM AND METHOD OF LOCATING USERS INDOORS - Indoor locationing using radio frequency based tags includes distributing a plurality of radio frequency based tags at mapped locations within the indoor environment. The radio frequency based tags periodically transmit their identity information in a message. A mobile device in proximity to at least one of the radio frequency based tags receives the message. A location of the mobile device is associating to the mapped location of the radio frequency based tag identified in the received message. | 09-26-2013 |
20160100399 | EMULATING VIRTUAL PORT CONTROL OF AIRTIME FAIRNESS USING PER STATION ENHANCED DISTRIBUTED CHANNEL ACCESS (EDCA) PARAMETERS - A technique for emulating virtual port control of airtime fairness for wireless stations using per station Enhanced Distributed Channel Access (EDCA) parameters. Specific parameters are received for each of a plurality of stations connected to the access point. An EDCA field of a beacon that stores a general EDCA parameter is set to an empty state. The beacon is broadcast to a plurality stations on the wireless communication network and within range of an access point. The beacon comprises a BSSID (Basic Service Set Identifier) for use by the plurality of stations to connect with the access point for access to the wireless communication network. The beacon also comprises an empty EDCA field. In response to broadcasting the empty EDCA parameter, receiving a direct inquiry from each of the plurality of stations for the general EDCA parameter. Each of the plurality of stations is responded to with a direct communication of a specific parameter corresponding to each station. A transmission is received from at least one of the stations complying with the specific parameter. | 04-07-2016 |
20160112838 | BEACONS TO ADVERTISE PRESENCE OF NEARBY OBJECTS TO STATIONS IN A WIRELESS COMMUNICATION NETWORK - Beacons (e.g., mBeacons or meruBeacons) to advertise presence of nearby objects to stations in a wireless communication network from an access point are provided. Location of a station connected to the access point is detected. One or more physical objects having a location proximate to the station are identified and can be indicated to a user. To do so, in an embodiment, responsive to the proximity of locations, a beacon having a BSSID corresponding to each of the one or more physical objects is generated. The BSSID can uniquely identify the one or more physical objects. The beacon is transmitted the station which can request additional information concerning the one or more physical objects. For example, an Amazon listing for a nearby retail item can be automatically displayed on a smartphone. | 04-21-2016 |
20160112886 | ALTERNATIVE NETWORK COMMUNICATION FOR ACCESS POINT TROUBLESHOOTING AND MONITORING - The present description provides methods, computer program products, and systems for alternative network communication for access point troubleshooting and monitoring. When a station has difficulty initiating or maintaining a connection with an access point, or even when performance is suboptimal, alternative network communication is initiated. The issue can be handled by reporting to a troubled access point for self-correction, or by uploading interrogation commands or code for active correction externally by a station. Further actions can be taken, for example, when a station determines through alternative communication that a troubled access point itself has connection issues to a back end network, the station uses a different access point for reporting up to a network admin. Although Wi-Fi and Bluetooth are described herein, other combinations of wireless protocols are implementable. | 04-21-2016 |
Patent application number | Description | Published |
20140070959 | SYSTEM FOR MONITOR AND CONTROL OF EQUIPMENT - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for determining a current location and receiving energy usage information from devices in the location. | 03-13-2014 |
20140074257 | SYSTEM FOR LEARNING EQUIPMENT SCHEDULES - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for learning equipment schedules based on user occupancy patterns and equipment usage patterns. | 03-13-2014 |
20150094828 | SYSTEM FOR LEARNING EQUIPMENT SCHEDULES - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for learning equipment schedules based on user occupancy patterns and equipment usage patterns. | 04-02-2015 |