Varghese, CA
George Varghese, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20080307524 | Detecting Public Network Attacks Using Signatures and Fast Content Analysis - Network worms or viruses are a growing threat to the security of public and private networks and the individual computers that make up those networks. A content sifting method if provided that automatically generates a precise signature for a worm or virus that can then be used to significantly reduce the propagation of the worm elsewhere in the network or eradicate the worm altogether. The content sifting method is complemented by a value sampling method that increases the throughput of network traffic that can be monitored. Together, the methods track the number of times invariant strings appear in packets and the network address dispersion of those packets including variant strings. When an invariant string reaches a particular threshold of appearances and address dispersion, the string is reported as a signature for suspected worm. | 12-11-2008 |
20110282932 | ASYMMETRIC END HOST REDUNDANCY ELIMINATION FOR NETWORKS - An end host redundancy elimination system and method to provide redundancy elimination as an end system service. Embodiments of the system and method use optimization techniques that reduce server central processing unit (CPU) load and memory footprint as compared to existing approaches. For server storage, embodiments of the system and method use a suite of highly-optimized data structures for managing metadata and cached payloads. An optimized asymmetric max-match technique exploits the inherent structure in data maintained at the server and client and ensures that client processing load is negligible. A load-adaptive fingerprinting technique is used that is much faster than current fingerprinting techniques while still delivering similar compression. Load-adaptive means that embodiments of the fingerprinting technique can adapt CPU usage depending on server load. Embodiments of the system and method operate above the transmission control protocol (TCP) layer, thereby reducing the number of roundtrips needed for data transfer. | 11-17-2011 |
George Varghese, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20140201837 | METHODS AND SYSTEMS TO DETECT AN EVASION ATTACK - A method and system to detect an evasion attack are provided. The system may include a repository to store signature fragments that together constitute an attack signature, an interceptor to intercept a data packet associated with a network connection, a string-matching module to determine whether the payload of the data packet includes any of the stored signature fragments thereby identifying a match, a responder to perform a prevention action in response to the match, and a detector to detect that a size of the data packet is less than a size threshold. The system may further include a state machine to commence maintaining a state for the network connection in response to the detector determining that the size of the data packet is less than the size threshold. | 07-17-2014 |
Gijesh Varghese, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20160004912 | SYSTEM AND METHOD FOR ROBUST MOTION DETECTION - Method and system for detecting objects of interest in a camera monitored area are disclosed. Statistical analysis of block feature data, particularly Sobel edge and spatial high frequency responses is used to model the background of the scene and to segregate foreground objects from the background. This technique provides a robust motion detection scheme prone to catching genuine motions and immune against false alarms. | 01-07-2016 |
20160004929 | SYSTEM AND METHOD FOR ROBUST MOTION DETECTION - Method and system for detecting objects of interest in a camera monitored area are disclosed. Statistical analysis of block feature data, particularly Sobel edge and spatial high frequency responses is used to model the background of the scene and to segregate foreground objects from the background. This technique provides a robust motion detection scheme prone to catching genuine motions and immune against false alarms. | 01-07-2016 |
Gijesh Varghese, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20120093219 | I-Frame Size Estimation Based on Edge Strength - Various embodiments of the present invention relate to systems, devices and method of video encoding that select a quantization parameter set based on a global edge strength value and an available bitrate for a corresponding compressed frame. Quantization parameters are selected using a mathematical correlation between the global edge strength value of the I-frame and an available bitrate/maxim target frame size for the corresponding compressed frame. | 04-19-2012 |
Ivin Varghese, Livermore, CA US
Patent application number | Description | Published |
---|---|---|
20110059681 | CO2 NOZZLES - A nozzle and method of providing CO | 03-10-2011 |
20120279519 | Integrated Substrate Cleaning System and Method - A method for cleaning a substrate having organic and inorganic residues disposed thereon is provided. The method includes removing organic residue from the substrate using atmospheric oxygen plasma, and removing inorganic residue from the substrate using cryogenic CO | 11-08-2012 |
20130244550 | CO2 Nozzles - A nozzle for providing carbon dioxide for cleaning is disclosed. The nozzle includes a reservoir for receiving liquid carbon dioxide, a barrel defining a passageway therethrough, the passageway extending to an outlet of the barrel, an orifice effecting fluid communication between the reservoir and the passageway, and a screen member constructed and arranged for interrupting flow of the carbon dioxide pellets greater than a select size from being emitted from the passageway of the barrel. Liquid carbon dioxide flows through the orifice to phase transfer into gaseous carbon dioxide and carbon dioxide pellets in the passageway. An internal diameter of the passageway is smaller than an internal diameter of the reservoir. | 09-19-2013 |
20130306101 | Contamination Removal Apparatus and Method - A substrate dry cleaning apparatus, a substrate dry cleaning system, and a method of cleaning a substrate are disclosed. The substrate dry cleaning system includes a substrate support and a reactive species generator. The reactive species generator includes a first conduit defining a first flow channel that extends to an outlet of the first conduit, the Gullet of the first conduit facing the substrate support, a first electrode, a second electrode facing the first electrode, the first flow channel disposed between the first electrode and the second electrode, a first inert wall disposed between the first electrode and the first flow channel, and a second inert wall disposed between the second electrode and the first flow channel. | 11-21-2013 |
Jijo J. Varghese, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140122196 | SECURE VAULT FOR ONLINE-TO-OFFLINE TRANSACTIONS - Systems and methods are disclosed for providing online offers for rewards that can be tracked to offline transactions for redemption. In order to protect sensitive consumer information, payment processing details such as credit card numbers and other authorizing data are redirected through a secure network to payment processing platforms, and then tokenized for subsequent use in relatively less secure data network communications and transactions. After a secure payment processing platform has authorized a transaction such as a reward for purchases, the payment processing platform can detect qualifying retail activity and generate corresponding rewards, which may be signaled to the customer through any suitable communications medium. | 05-01-2014 |
John Varghese, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20080244334 | SYSTEM FOR SYNCHRONIZING REPLICAS OF A DATABASE - A system for synchronizing replicas of a database. The system detects a failure of update data from a first replica to be applied to a second replica and determines a cause of the failure. The system also resolves the cause of the failure. According to the system disclosed herein, the present invention synchronizes the replicas of the database without requiring manual intervention. | 10-02-2008 |
20100199127 | SYNCHRONIZING REPLICAS OF A DATABASE - Replicas of a database are synchronized. A failure of update data is detected from a first replica to be applied to a second replica. A cause of the failure is determined. The cause of the failure is resolved. The replicas of the database are synchronized without requiring manual intervention. | 08-05-2010 |
Joseph O. Varghese, Pasadena, CA US
Patent application number | Description | Published |
---|---|---|
20150219657 | PHOSPHORYLATED AKT-SPECIFIC CAPTURE AGENTS, COMPOSITIONS, AND METHODS OF USING AND MAKING - The present application provides stable peptide-based Akt capture agents and methods of use as detection and diagnosis agents and in the treatment of diseases and disorders. The application further provides methods of manufacturing Akt capture agents using iterative on-bead in situ click chemistry. | 08-06-2015 |
Mathew Varghese, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20120149021 | Device for Filtration of Fluids Therethrough and Accompanying Method - A microfluidic device for separating target components from a source fluid includes one or more source channels connected to one or more collection channels by one or more transfer channels. The target components of the source fluid can be magnetic or bound to magnetic particles using a know binding agent. A source fluid containing magnetically bound target components can be pumped through the source channel of the microfluidic device. A magnetic field gradient can be applied to the source fluid in the source channel causing the magnetically bound target components to migrate through the transfer channel into the collection channel. The collection channel can include a collection fluid that is stagnant until a predefined volume of source fluid is processed or a predefined volume of target components accumulate in the collection channel, at which point collection fluid can be pumped into the collection channel to flush the target components out of the collection channel. The target components can be subsequently analyzed for detection and diagnosis. | 06-14-2012 |
Mathew Varghese, Los Altos, CA US
Patent application number | Description | Published |
---|---|---|
20130207511 | METHOD AND APPARATUS FOR BUILDING THREE-DIMENSIONAL MEMS ELEMENTS - The disclosure generally relates to method and apparatus for forming three-dimensional MEMS. More specifically, the disclosure relates to a method of controlling out-of-plane buckling in microstructural devices so as to create micro-structures with out-of-plane dimensions which are 1×, 5×, 10×, 100× or 500× the film's thickness or above the surface of the wafer. An exemplary device formed according to the disclosed principles, includes a three dimensional accelerometer having microbridges extending both above and below the wafer surface. | 08-15-2013 |
20140214558 | REAL-TIME FEEDBACK OF ADVERTISEMENT REVIEW - As components of an advertisement are received by an online system, the online system determines whether the received components satisfy one or more policies of the online system. If a component does not satisfy a policy of the online system, the user providing the components is notified when the component is provided, allowing the user to modify the component. Additionally, stored data describing previously analyzed components are compared to received components, and the stored data is used if the received component matches a previously analyzed component This process expedites approval of advertisements by the online system. | 07-31-2014 |
20140358672 | MONITORING CONVERSIONS AND FEE DETERMINATION OF ONLINE ADVERTISEMENTS USING A SOCIAL NETWORKING SYSTEM - When the social networking system selects an advertisement for presentation to the user by a client device, a content identifier associated with the selected advertisement is stored in an advertisement history associated with the user. When the user performs a conversion event associated with the selected advertisement, the social networking system receives a content identifier and a user identifier from a client device used that performed the conversion event and retrieves the user's advertisement history. If the retrieved advertisement history includes a content identifier for the selected advertisement matching the content identifier received from the client device and a time between the conversion event and providing the selected advertisement to the client device is less than a threshold time period, a fee is determined for presentation of the selected advertisement. | 12-04-2014 |
20150227977 | GENERATING USER AUDIENCE GROUPS TO FACILITATE ADVERTISEMENT TARGETING - An online system receives one or more business rules associated with a third party system that associates online system users with an audience group based on characteristics of the user. When an online system user interacts with content provided by the third party system via a client device, contextual information describing the interaction is communicated from the client device to the online system. By applying one or more business rules to the contextual information, the online system associates the user with one or more audience groups. The online system determines that the user is eligible to be presented with the advertisement based at least in part on the one or more audience groups associated with the user and the one or more of the audience groups specified by the advertiser associated with the advertisement. And if eligible, the online system provides the advertisement to the client device for presentation. | 08-13-2015 |
Matthew Varghese, Los Altos, CA US
Patent application number | Description | Published |
---|---|---|
20130205895 | METHOD AND APPARATUS FOR BUILDING THREE-DIMENSIONAL MEMS ELEMENTS - The disclosure generally relates to method and apparatus for forming three-dimensional MEMS. More specifically, the disclosure relates to a method of controlling out-of-plane buckling in microstructural devices so as to create micro-structures with out-of-plane dimensions which are 1×, 5×, 10×, 100× or 500× the film's thickness or above the surface of the wafer. An exemplary device formed according to the disclosed principles, includes a three dimensional accelerometer having microbridges extending both above and below the wafer surface. | 08-15-2013 |
20130209747 | METHOD AND APPARATUS FOR BUILDING THREE-DIMENSIONAL MEMS ELEMENTS - The disclosure generally relates to method and apparatus for forming three-dimensional MEMS. More specifically, the disclosure relates to a method of controlling out-of-plane buckling in microstructural devices so as to create micro-structures with out-of-plane dimensions which are 1×, 5×, 10×, 100× or 500× the film's thickness or above the surface of the wafer. An exemplary device formed according to the disclosed principles, includes a three dimensional accelerometer having microbridges extending both above and below the wafer surface. | 08-15-2013 |
20140214557 | APPROVAL OF ADVERTISEMENTS BASED ON REVIEW OF ADVERTISEMENT COMPONENTS - As components of an advertisement are received by an online system, the online system determines whether the received components satisfy one or more policies of the online system. If a component does not satisfy a policy of the online system, the user providing the components is notified when the component is provided, allowing the user to modify the component. Additionally, stored data describing previously analyzed components are compared to received components, and the stored data is used if the received component matches a previously analyzed component. This process expedites approval of advertisements by the online system. | 07-31-2014 |
Philip Thomas Varghese, Davis, CA US
Patent application number | Description | Published |
---|---|---|
20130142759 | BIOCONTROL OF NEMATODES - A method for controlling nematodes in or on a plant, a plant part, and/or a locus for plant growth is provided, the method comprising applying to a plant, plant part, or locus for plant growth in need of protection from said nematodes an effective amount of | 06-06-2013 |
Shyni Varghese, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20100227836 | PARENTERAL ADMINISTRATION OF A GLUCOSAMINE - Materials and methods for local delivery of a glucosamine are provided to facilitate bone and cartilage growth. | 09-09-2010 |
20130017232 | SYNTHETIC BONE GRAFTS - The disclosure provides Bone-mimetic mineral/polymer composite materials useful for formation of artificial bone grafts and for bone tissue engineering. The disclosure provides a hydrogels, cryogels and macroporous compositions modified with varying lengths of anionic pendant side chains (CH | 01-17-2013 |
20130177980 | SYNTHETIC MATRICES FOR SELF-RENEWAL AND EXPANSION OF STEM CELLS - Provided herein is a synthetic polymer-based hydrogel for the self-renewal and expansion of human stem cells such as embryonic stem cells (ESCs) and induced pluripotent stem cells (iPSCs). Also provided are methods of making and using the same. | 07-11-2013 |
20140212968 | SYNTHETIC MATRICES FOR LONG TERM EXPANSION OF PLURIPOTENT HUMAN EMBRYONIC STEM CELLS - Provided herein is a synthetic polymer-based hydrogel for the self-renewal and expansion of human stem cells such as embryonic stem cells (ESCs) and induced pluripotent stem cells (iPSCs). Also provided are methods of making and using the same. | 07-31-2014 |
20140243428 | SELF HEALING HYDROGELS - The disclosure provides for self-healing hydrogels, complex structures made therefrom, and use thereof, including use of the hydrogels as self-healing coatings, self-healing sealants, tissue adhesives, and drug carriers. | 08-28-2014 |
Thomas Varghese, Los Altos, CA US
Patent application number | Description | Published |
---|---|---|
20140052497 | CORRELATING LOCATION DATA - An example embodiment includes a method of associating mobile devices with transactional entities. The method includes identifying a first transaction performed by a first transactional entity and identifying a first set of mobile devices in a location of the first transaction at a time of the first transaction. The method further includes identifying a second transaction performed by the first transactional entity and identifying a second set of mobile devices in a location of the second transaction at a time of the second transaction. The first set of mobile devices is compared to the second set of mobile devices. When a single mobile device is common to the first set of mobile devices and the second set of mobile devices, the single mobile device is associated with the first transactional entity. | 02-20-2014 |
20150067808 | Client Identification System Using Video Conferencing Technology - An aspect of the preset invention relates to a system for identifying a client, comprising a client device having a video camera and a voice transmitting and receiving device capable of transmitting a client's image and voice via a communication carrier system and a communications network to a user terminal, whereby the client is authenticated in real time, wherein, real-time dialogue between the client and a live person authenticates the client, wherein said dialogue authentication does not rely on information obtained from a public or government database. A further aspect of the present invention relates to a method of identifying a client, comprising the steps of using a client device having a video camera and voice transmitting and receiving device to initiate an authentication of a client's identity, transmitting a client's image and voice over a communication carrier system and a communications network to a user terminal, and authenticating the client's image and voice in real time, wherein, real-time dialogue between the client and a live person authenticates the client, wherein said dialogue, authentication does not rely on information obtained from a public or government database. A further aspect of the present invention relates to a method of identifying a fraudster, comprising the steps of using a client device having a video camera and voice transmitting and receiving device to initiate an authentication of a client's identity, transmitting the fraudster's image and voice over a communication carrier system and a communications network to a user terminal, comparing the fraudster's image and voice to the client; and storing the fraudster data, wherein, real-time dialogue between the fraudster and the live advisor authenticates the client, wherein said dialogue authentication does not rely on information obtained from a public or government database. | 03-05-2015 |
Thomas Varghese, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20110004580 | ROLE BASED IDENTITY TRACKER - Particular embodiments use roles to determine anomalies in a user's behavior. Different roles may be defined for a business. For example, users that have similar job responsibilities are grouped in a role. Behavior information is then monitored for the plurality of users in the role. This may include transactions or other actions taken by the user. Over time, a profile can be generated for the user based on the monitored behavior. This profile learns the user's behavior. Information for the user's behavior may then be compared to other users' profiles in the same role to determine anomalies in the user's behavior over time. For example, when differences in activities occur for a user as compared to other users with the same role, a message may be generated that indicates that there may be an anomaly in the user's behavior. This alert may then be output. | 01-06-2011 |
20110072500 | Client Identification System Using Video Conferencing Technology - A system and process for identifying a client, comprising a client device having a video camera and a voice transmitting and receiving device capable of transmitting a client's image and voice via a communication carrier system and a communications network to a user terminal, whereby the user terminal permits an authentication of the client's image and voice in real time. Another aspect of the present invention includes a method of identifying a fraudster, comprising the steps of using a client device having a video camera and voice transmitting and receiving device to initiate an authentication of a client's identity, transmitting the fraudster's image and voice over a communication carrier system and a communications network to a user terminal, comparing the fraudster's image and voice to client data, and storing the fraudster data. | 03-24-2011 |
20110225050 | Intelligent Selection Based on Customized Palate Preferences - A system and process for intelligently selecting consumable goods, comprising a consumer palate preference device capable of indicating a consumer's palate preferences, a consumable good having attributes, whereby the consumer's palate preferences are compared against the attributes of the consumable good to determine selection. Another aspect of the present invention includes a method of intelligently selecting a consumable good, comprising the steps of using a consumer palate preference device having consumer's palate preferences, comparing the consumer's palate preferences to a consumable good having attributes, and selecting the consumable good based on the consumer's palate preferences. Another aspect of the present invention includes a method of labeling consumable goods, comprising the steps of creating attributes for the consumable goods, scoring the attributes for the consumable goods, and associating the scores of the attributes with the consumable goods. Another aspect of the present invention includes a method of intelligently pairing consumable goods, comprising the steps of creating attributes for at least two separate consumable goods, scoring the attributes for the separate consumable goods, obtaining a consumer's palate preferences, and pairing the separate consumable goods based on the consumer's palate preferences. Another aspect of the present invention includes a method of promoting consumable goods, comprising the steps of obtaining a consumer's palate preferences, scoring the consumer's palate preferences, creating attributes for a consumable good, scoring the attributes of the consumable good, and using the consumer's palate preferences to promote consumable goods suited to the consumer's palate preferences. | 09-15-2011 |
Thomas Emmanual Varghese, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20080209526 | System and method for personalized security signature - Embodiments of the present invention provide techniques for authenticating users based on personalized (i.e., user-provided) authentication data. In one set of embodiments, the personalized authentication data includes acoustic, image, and/or video data, but is exclusive of biometric data of the user. In this manner, existing acoustic, image, and video-based authentication interfaces/mechanisms may be leveraged, without the problems associated with verifying biometric data. In some embodiments, a user may enroll or register multiple pieces of personalized authentication data into an authentication system. The user may then select one piece of personalized authentication data for use by the system at a time of authentication. | 08-28-2008 |
20090089869 | TECHNIQUES FOR FRAUD MONITORING AND DETECTION USING APPLICATION FINGERPRINTING - Techniques for fraud monitoring and detection using application fingerprinting. As used herein, an “application fingerprint” is a signature that uniquely identifies data submitted to a software application. In an embodiment, a plurality of historical application fingerprints are stored for data previously submitted to a software application. Each historical application fingerprint is associated with one or more contexts in which its corresponding data was submitted. When new (i.e., additional) data is subsequently submitted to the application, a new application fingerprint is generated based on the new data, and the new application fingerprint is associated with one or more contexts in which the new data was submitted. The new application fingerprint is then compared with one or more historical application fingerprints that share the same, or substantially similar, context(s). Based on this comparison, a risk score is generated indicating a likelihood that the new data was submitted for a fraudulent/malicious purpose. | 04-02-2009 |
20110055548 | ONLINE DATA ENCRYPTION AND DECRYPTION - Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user's computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows. | 03-03-2011 |