Patent application number | Description | Published |
20090248322 | METHOD AND SYSTEM FOR MONITORING CHANGES IN A SAMPLE FOR A PROCESS OR AN ENVIRONMENT - Systems and methods for monitoring a sample or a sample flow associated with a process or an environment. The systems and methods transmit terahertz signals at the sample, receive a resulting spectral response, perform a spectral analysis, and display a result or choose a course of action. The analysis compares the sample's absorption or reflection spectral response to known spectrums to determine composition; or to determine if the sample flow has deviated from “normal”. In one embodiment, the systems and methods use reflection terahertz on a contained sample; in another it uses transmission terahertz to look at a sample flow outside the vehicle. In this embodiment the analysis is used to determine sample composition. In other embodiments, the analysis is used to discern or warn of changes, or to choose a course of action. | 10-01-2009 |
20090248342 | METHOD AND SYSTEM FOR MONITORING CHANGES IN A SAMPLE FOR A PROCESS OR AN ENVIRONMENT - Systems and methods for monitoring a sample or a sample flow associated with a process or an environment. The systems and methods detect one or more chemical or biological agents present in a sample or for detecting changes in the chemical/biological composition of a sample flow. The systems and methods transmit light at the sample, receive a resulting spectral response, perform a spectral analysis, and display a result or choose a course of action. The analysis compares the sample's response to known spectrums to determine composition or to determine if the composition of the sample flow has deviated from “normal”. In one embodiment, the systems and methods uses deep ultraviolet light to produce both a Raman and a fluorescence response, separated in frequency, which are simultaneously discerned and analyzed. In this embodiment the analysis is used to determine sample composition. In other embodiments, the analysis is used to discern or warn of changes, or to choose a course of action. | 10-01-2009 |
Patent application number | Description | Published |
20150020198 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 01-15-2015 |
20150089650 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 03-26-2015 |
20150089651 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 03-26-2015 |
20150089652 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 03-26-2015 |
20150089653 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION - A method for detecting software exploitation broadly comprises the steps of gathering information about processes and threads executing on a computing device, monitoring instructions executed by a thread that is currently running, performing the following steps if a function to create a process or a function to load a library is called, examining a thread information block, determining whether an address included in a stack pointer of the thread is in a range of addresses for a stack specified by the thread information block, and determining whether a first plurality of no-operation instructions is followed by shell code that is followed by a second plurality of no-operation instructions. | 03-26-2015 |