Patent application number | Description | Published |
20090119292 | PEER TO PEER TRAFFIC CONTROL METHOD AND SYSTEM - A system, apparatus, and method for controlling peer to peer traffic at a network gateway or server. Suspected peer to peer traffic is identified heuristically and collected for content analysis. Content digital fingerprint pattern matching software is received from a remote server. Peer to peer traffic is selectively disposed of. | 05-07-2009 |
20090144822 | WITHHOLDING LAST PACKET OF UNDESIRABLE FILE TRANSFER - A system and method for disrupting the download of undesirable files. A data store traps the final block or blocks of a file transfer which is held for detection of viruses, trojan horses, spyware, worms, dishonest ads, scripts, plugins, and other files considered computer contaminants. Innocuous file transfers are completed with minimum disruption as perceived by the user. | 06-04-2009 |
20090216875 | FILTERING SECURE NETWORK MESSAGES WITHOUT CRYPTOGRAPHIC PROCESSES METHOD - A network filtering system and method without requiring cryptographic processing of secure message transmissions. The method provides for determining target node ID associations corresponding to domain names of filtered node DNS requests and corresponding network address and address duration data determined according to a corresponding DNS responses. The method also provides for comparing a destination address of a current message transmission corresponding to a filtered node with the determined target node ID associations, and conducting filtering processing of the current message transmission. | 08-27-2009 |
20100211639 | APPARATUS AND METHOD FOR SERVING ANNULAR MESSAGES TO LOCAL BROWSERS - A system to enable a local area network operator to optimize bandwidth by controlling annular display surrounding sourced content. An apparatus for storing content sponsor messages locally to a user's network. A method for selecting among locally served messages, images, and applications to support delivery of content provider's intellectual property. In short, optimizing and tuning the delivery of the message annulus surrounding the “news hole” of a webpage. | 08-19-2010 |
20100318681 | PROTOCOL-INDEPENDENT, MOBILE, WEB FILTER SYSTEM PROVISIONING DNS TRIAGE, URI SCANNER, AND QUERY PROXY SERVICES - A system comprising three services: query string proxy, URI path scanner, and domain name system triage. A query string proxy sends a request on behalf of a client and analyzes the response from a remote server. A URI path scanner performs keyword matching on the entire path of a uniform resource identifier. A domain name system triage service receives a UDP request prior to establishing any protocol session between a client and a server and returns one IP address selected from the following: a block IP address, a trusted IP address, and a redirection to enhanced filter service IP address. | 12-16-2010 |
20110035795 | PORT HOPPING AND SEEK YOU PEER TO PEER TRAFFIC CONTROL METHOD AND SYSTEM - A network apparatus, system, and method for operating a server to identify and subsequently control suspected peer-to-peer (P2P) sources transmitting traffic from a first network to a second network. Identifying a peer-to-peer source by a characteristic of destination port profile. Identifying a peer-to-peer source by a characteristic of destination host IP address profile. Determining when hopping ports usage comprise a data stream. Determining when destination IP address usage represent “Seek You” (CQ) like call behavior analogous to a radio invitation for any operators listening to respond. | 02-10-2011 |
20110289575 | DIRECTORY AUTHENTICATION METHOD FOR POLICY DRIVEN WEB FILTERING - Enabling web filtering by authenticated group membership, role, or user identity is provided by embedding a uniform resource identifier into an electronic document requested by a client. A client browser will provide directory credentials to a trusted web filter apparatus enabling a policy controlled access to resources external to the trusted network. An apparatus comprises circuits for transmitting a uniform resource identifier to a client, receiving a request comprising authentication credentials, querying a policy database and determining a customized policy for access to an externally sourced electronic document or application. A computer-implemented technique to simplify web filter administrator tasks by removing a need to set each browsers settings or install additional software on each user terminal. | 11-24-2011 |
20120272319 | Apparatus, and system for determining and cautioning users of Internet connected clients of potentially malicious software and method for operating such - A system at a central server and at a plurality of web filters is installed to observe traffic and to protect users from attempting connection to suspicious, malicious, and/or infectious targets. Targets are defined as Uniform Resource Identifiers (URI) and Internet Protocol (IP) addresses. Traffic is collected, analyzed, and reported for further analysis. Behavior is analyzed for each client attempting a connection to an uncategorized target. IP addresses and URIs are evaluated toward placement in either a Trusted target store or an Anomalous target store. The accumulated content of Anomalous target store is provided back to the Network Service Subscriber Clients. Warnings and tools are presented when appropriate. | 10-25-2012 |
20120301130 | Magnetic array control system for angular orientation of an instrument - A system includes an instrument coupled to a magnetic material. The orientation of the instrument is influenced by a magnetic field generated by an array of magnetic elements. Each element of the array is controlled by a data value in a magnetic control store to produce a field strength and polarity. Overwriting the pattern in the magnetic control store will result in a magnetic field which applies a torque to the instrument and cause an azimuthal or elevational rotary movement about the center of the instrument. | 11-29-2012 |
20130061038 | Proxy Apparatus for Certificate Authority Reputation Enforcement in the Middle - Network security administrators are enabled with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server. The custom policy store overrides trusted root certificate stores accessible to an operating system web networking layer or to a third party browser. Importing revocation lists or updating browsers or operating system is made redundant. The apparatus redirects or rewrites traffic to protect a plurality of endpoints from a man-in-the-middle attack when a certificate authority has lost control over certificates used in TLS. | 03-07-2013 |
20130061281 | System and Web Security Agent Method for Certificate Authority Reputation Enforcement - Network security administrators are enabled with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server. The custom policy store overrides trusted root certificate stores accessible to an operating system web networking layer or to a third party browser. Importing revocation lists or updating browsers or operating system is made redundant. Proactive remediation is enabled to delete or disable root certificates in trusted operating system root certificate stores or in trusted browser root certificate stores by a web security agent installed at distributed endpoints. This removes the need for additional hardware or synchronous remote access over the protected endpoints. | 03-07-2013 |
20130145158 | System and Web Security Agent Method for Certificate Authority Reputation Enforcement - Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server when a CA is deprecated or has fraudulent certificate generation. The custom policy store overrides trusted root certificate stores accessible to an operating system web networking layer or to a third party browser. Importing revocation lists or updating browsers or operating system is made redundant. The apparatus protects an endpoint from a man-in-the-middle attack when a certificate authority has lost control over certificates used in TLS. | 06-06-2013 |
20140101442 | SYSTEM AND WEB SECURITY AGENT METHOD FOR CERTIFICATE AUTHORITY REPUTATION ENFORCEMENT - Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority reputation server when a CA is deprecated or has fraudulent certificate generation. The custom policy store overrides trusted root certificate stores accessible to an operating system web networking layer or to a third party browser. Importing revocation lists or updating browsers or operating system is made redundant. The apparatus protects an endpoint from a man-in-the-middle attack when a certificate authority has lost control over certificates used in TLS. | 04-10-2014 |
20140250086 | WAN Gateway Optimization by Indicia Matching to Pre-cached Data Stream Apparatus, System, and Method of Operation - A network gateway coupled to a backup server on a wide area network which receives and de-duplicates binary objects. The backup server provides selected data segments of binary objects to the gateway to store into a prescient cache (p-cache) store. The network gateway optimizes network traffic by fulfilling a local client request from its local p-cache store instead of requiring further network traffic when it matches indicia of stored data segments stored in its p-cache store with indicia of a first segment of a binary object requested from and received from a remote server. | 09-04-2014 |
Patent application number | Description | Published |
20100164455 | ADAPTIVE MULTI-MODE DIGITAL CONTROL IMPROVING LIGHT-LOAD EFFICIENCY IN SWITCHING POWER CONVERTERS - Adaptive multi-mode digital control schemes that improve the light-load efficiency (and thus the overall average efficiency) in switch-mode power converters without causing performance issues such as audible noises or excessive voltage ripples. Embodiments include a switch-mode power converter that reduces current in the power converter using a second pulse-width-modulation (PWM) mode before reaching switching frequencies that generate audible noises. As the load across the output of the power converter is reduced, the power converter transitions from a first PWM mode in high load conditions to a first pulse-frequency-modulation (PFM) mode, then to a second PWM mode, and finally to a second PFM mode. During the second PFM mode, the switching frequency is dropped to audible frequency levels. Current in the power converter, however, is reduced in the second PWM mode before transitioning to the second PFM mode. Therefore, the power converter produces less or no audible noise in light load conditions where the switching frequency drops to audible frequency levels, while achieving high efficiency across varying load conditions. | 07-01-2010 |
20120176819 | ADAPTIVELY CONTROLLED SOFT START-UP SCHEME FOR SWITCHING POWER CONVERTERS - A switching power converter provides regulated voltage to a load according to a desired regulation voltage. The switching power converter includes a transformer coupled to a switch and a switch controller for generating a control signal to control switching. The switch controller monitors a sensed voltage representing the output voltage of the switching power converter. The switch controller controls switching of the switch to operate the switching power converter in a continuous conduction mode while the sensed output voltage indicates that the output voltage is less than a first threshold voltage. The switch controller controls switching of the switch to operate the switching power converter in a discontinuous conduction mode while the sensed output voltage is above the first threshold voltage. | 07-12-2012 |
20120176820 | Switching Power Converter Having Optimal Dynamic Load Response with Ultra-Low No Load Power Consumption - A switch controller is disclosed that adaptively controls the operating frequency of a switching power converter in order to improve one-time load response and repetitive dynamic load responses. During a transition from a high load to low load condition, the switch controller clamps the operating frequency of the switching power converter at an intermediate frequency for a period of time before allowing the operating frequency to return to a frequency associated with the low load condition. The clamped frequency is higher than the frequency associated with the low load condition thereby allowing improved response to a subsequent load change to a high load condition. Thus, the system improves dynamic load response without compromising no-load power consumption. | 07-12-2012 |
Patent application number | Description | Published |
20090024967 | COMPUTER-IMPLEMENTED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR DETERMINING A MODEL FOR PREDICTING PRINTABILITY OF RETICLE FEATURES ON A WAFER - Computer-implemented methods, systems, and computer-readable media for determining a model for predicting printability of reticle features on a wafer are provided. One method includes generating simulated images of the reticle features printed on the wafer using different generated models for a set of different values of exposure conditions. The method also includes determining one or more characteristics of the reticle features of the simulated images. In addition, the method includes comparing the one or more characteristics of the reticle features of the simulated images to one or more characteristics of the reticle features printed on the wafer using a lithography process. The method further includes selecting one of the different generated models as the model to be used for predicting the printability of the reticle features based on results of the comparing step. | 01-22-2009 |
20130211736 | TIME-VARYING INTENSITY MAP GENERATION FOR RETICLES - An optical reticle inspection tool is used during a first inspection to obtain, for each set of one or more patch areas of the reticle, a reference average of multiple reference intensity values corresponding to light measured from sub-areas of each patch area. After using the reticle in photolithography processes, the optical reticle inspection tool is used during a second inspection to obtain, for each set of one or more patch areas, an average of multiple test intensity values corresponding to light measured from the of sub-areas. The first and second inspections use the same tool setup recipe. A difference intensity map is generated, and such map comprises map values that each corresponds to a difference between each average of the test and reference intensity values for each set of one or more patches. The difference intensity map indicates whether the reticle has degraded over time more than a predefined level. | 08-15-2013 |
20130236083 | DETECTION OF THIN LINES FOR SELECTIVE SENSITIVITY DURING RETICLE INSPECTION USING PROCESSED IMAGES - A detection method for a spot image based thin line detection is disclosed. The method includes a step for generating a band limited spot image from a transmitted and reflected optical image of the mask. The spot image is calibrated to minimize a plurality of optical aberrations from the spot image. The spot image is restored back to a mask image to allow at least one of: a more reliable segmentation between thin line and non-thin line areas on the mask image or a more accurate line width measurement for facilitating segmentation. Thin line features and non-thin lines features are distinguished on the restored mask image. Areas containing thin line features are grown while preventing the thin line growth from encroaching the non-thin line features. | 09-12-2013 |
20140369593 | DETECTION OF THIN LINES FOR SELECTIVE SENSITIVITY DURING RETICLE INSPECTION USING PROCESSED IMAGES - A detection method for a spot image based thin line detection is disclosed. The method includes a step for constructing a band limited spot image from a transmitted and reflected optical image of the mask. The spot image is calibrated to reduce noise introduced by the one or more inspection systems. Based on the band limited spot image, a non-printable feature map is generated for the non-printable features and a printable feature map is generated for the printable features. One or more test images of the mask are analyzed to detect defects on such mask. A sensitivity level of defect detection is reduced in areas of the one or more test images defined by the non-printable feature map, as compared with areas of the one or more test images that are not defined by the non-printable features map | 12-18-2014 |
20150054940 | QUALIFYING PATTERNS FOR MICROLITHOGRAPHY - Disclosed are methods and apparatus for qualifying a photolithographic reticle. A reticle inspection tool is used to acquire at least two images at different imaging configurations from each pattern area of the reticle. A reticle pattern is reconstructed based on each at least two images from each pattern area of the reticle. For each reconstructed reticle pattern, a lithographic process with two or more different process conditions is modeled on such reconstructed reticle pattern to generate two or more corresponding modeled test wafer patterns. Each two or more modelled test wafer patterns is analyzed to identify hot spot patterns of the reticle patterns that are susceptible to the different process conditions altering wafer patterns formed with such hot spot patterns. | 02-26-2015 |
20150078650 | Block-to-Block Reticle Inspection - Block-to-block reticle inspection includes acquiring a swath image of a portion of a reticle with a reticle inspection sub-system, identifying a first occurrence of a block in the swatch image and at least a second occurrence of the block in the swath image substantially similar to the first occurrence of the block and determining at least one of a location, one or more geometrical characteristics of the block and a spatial offset between the first occurrence of the block and the at least a second occurrence of the block. | 03-19-2015 |
20150103351 | USING REFLECTED AND TRANSMISSION MAPS TO DETECT RETICLE DEGRADATION - An optical reticle inspection tool is used during an inspection to obtain, for each local area, an average of multiple reflected intensity values corresponding to light reflected from a plurality of sub-areas of each local area of the reticle. The optical reticle inspection tool is also used during the inspection to obtain, for each local area, an average of multiple transmitted intensity values corresponding to light transmitted through the sub-areas of each local area of the reticle. A combined intensity map is generated by combining, for each local area, the average of multiple reflected intensity values and the average of multiple transmitted intensity values such that a reticle pattern of the reticle is cancelled from the combined intensity map if the reticle has not degraded and such that the reticle pattern of the reticle is not cancelled out of the combined intensity map if the reticle has degraded. | 04-16-2015 |
20150144798 | CRITICAL DIMENSION UNIFORMITY MONITORING FOR EXTREME ULTRAVIOLET RETICLES - Disclosed are methods and apparatus for facilitating an inspection of a sample using an inspection tool. An inspection tool is used to obtain an image or signal from an EUV reticle that specifies an intensity variation across the EUV reticle, and this intensity variation is converted to a CD variation that removes a flare correction CD variation so as to generate a critical dimension uniformity (CDU) map without the flare correction CD variation. This removed flare correction CD variation originates from design data for fabricating the EUV reticle, and such flare correction CD variation is generally designed to compensate for flare differences that are present across a field of view (FOV) of a photolithography tool during a photolithography process. The CDU map is stored in one or more memory devices and/or displayed on a display device, for example, of the inspection tool or a photolithography system. | 05-28-2015 |
20150279014 | MESOSCOPIC DEFECT DETECTION FOR RETICLE INSPECTION - In some embodiments, a method and/or system may include detecting defects in photomasks. The method may include acquiring a first image of a first die. The method may include acquiring a second image of a second die. In some embodiments, the method may include dividing the first and the second image into a number of first and second portions respectively. The method may include reducing one or more differences in sizing of the first and the second portions. In some embodiments, the method may include determining a difference in a function derived from an image intensity between the corresponding first and second portions. The method may include summing the differences in the function between the corresponding first and second portions. The method may include detecting mesoscopic scale defects in the second die. | 10-01-2015 |
20150324963 | Reticle Inspection Using Near-Field Recovery - Systems and methods for detecting defects on a reticle are provided. The embodiments include generating and/or using a data structure that includes pairs of predetermined segments of a reticle pattern and corresponding near-field data. The near-field data for the predetermined segments may be determined by regression based on actual image(s) of a reticle generated by a detector of a reticle inspection system. Inspecting a reticle may then include separately comparing two or more segments of a pattern included in an inspection area on the reticle to the predetermined segments and assigning near-field data to at least one of the segments based on the predetermined segment to which it is most similar. The assigned near-field data can then be used to simulate an image that would be formed for the reticle by the detector, which can be compared to an actual image generated by the detector for defect detection. | 11-12-2015 |
20160093040 | Integrated Multi-Pass Inspection - Methods and systems for integrated multi-pass reticle inspection are provided. One method for inspecting a reticle includes acquiring at least first, second, and third images for the reticle. The first image is a substantially high resolution image of light transmitted by the reticle. The second image is a substantially high resolution image of light reflected from the reticle. The third image is an image of light transmitted by the reticle that is acquired with a substantially low numerical aperture. The method also includes detecting defects on the reticle using at least the first, second, and third images for the reticle in combination. | 03-31-2016 |
Patent application number | Description | Published |
20100104551 | METHOD FOR PROLONGING ACTIVITY OF AUTODEGRADABLE ENZYMES AND COMPOSITIONS THEREOF - A composition of a long-acting enzyme comprises the enzyme in a formulation comprising a buffer and an additive selected from the group consisting of tranexamic acid, ε-aminocaproic acid, and analogs of L-lysine other than tranexamic acid and ε-aminocaproic acid, combinations thereof, and mixtures thereof. The composition can further comprise another additive selected from the group consisting of L-lysine, L-arginine, L-ornithine (or its pharmaceutically acceptable salts; e.g., L-ornithine hydrochloride), γ-aminobutyric acid, 5-aminovaleric acid, 7-aminoheptanoic acid, glycylglycine, triglycine, N-α-acetyl-L-arginine, betaine, sarcosine, gelatin, HSA, streptokinase, tPA, uPA, non-ionic surfactants, glycerin, D-sorbitol, combinations thereof, and mixtures thereof. A method for prolonging the activity of an autodegradable enzyme comprises storing the enzyme after manufacture at a low pH, and reconstituting the acidified enzyme before use with a solution containing at least one of such additives. The method is useful to provide enzyme for wide use, which otherwise would lose activity upon long storage. In one embodiment the method is applicable to provide enzyme for inducing controlled posterior vitreous detachment. | 04-29-2010 |