Patent application number | Description | Published |
20100013857 | Scene Independent Method for Image Formation in Lenslet Array Imagers - A method and system is provided for performing high-resolution image assembly regardless of observed scene content. An imaging system, including a focal plane array and lenslet array can be calibrated to account for subimage shifts. A calibration module can determine the subimage shifts by calculating an average point source position reference point coordinates for each of the subimages, and then determining the difference between the average point source position and the reference point coordinates for each subimage. The imaging system can then be calibrated utilizing the subimage shifts for each of the plurality of subimages. Finally, an assembly module can perform a high-resolution image assembly with the calibrated imaging system. | 01-21-2010 |
20110221926 | Spectral Anomaly Detection in Deep Shadows - A spectral anomaly detection method includes the steps of segmenting a panchromatic image, obtained from a hyperspectral sensor into cluster data sets. Principal component analysis can be separately performed on each of the cluster data sets to produce a plot of principal components. An anomaly detection algorithm can be applied to an adaptively selected subset of principal components for each of the cluster data sets to produce cluster detection scores. Finally, separate detection thresholding algorithms can be applied to each of the cluster detection scores, and the results of the detection thresholding algorithms can be combined into a single detection plane. | 09-15-2011 |
20140307982 | MULTI-FRAME SUPER-RESOLUTION OF IMAGE SEQUENCE WITH ARBITRARY MOTION PATTERNS - A computer implemented method is provided for computing a two-way optical flow between a reference frame and one or more associated frames in an optical flow module. A forward warping operator and a backward warping operator can be generated between the reference frame and each of the one or more associated frames in a warping module. The forward warping operator and the backward warping operator provide motion compensation between the frames. Weights for each of the forward warping operators and the backward warping operators can be computed in a weight module. The weights correspond to uncertainty of motion estimation. A super resolution iteration algorithm can be calculated in a super-resolution iteration module. | 10-16-2014 |
20150332434 | Demosaicking System and Method for Color array Based Multi-Spectral Sensors - A computer-implemented demosaicking system and method that can receive an image (or many images that represent individual frames of a video) at a demosaicking processor from a multi-spectral band camera. The image can include four or more band images that each correspond to an unique spectral band obtained by the multi-spectral band camera. A clustering module can perform spectral clustering of the four or more band images to identify multiple clusters. For each of the plurality of clusters, a weights module can determine a cluster weight by computing correlations between each of the unique spectral bands in each cluster. A super-resolution module can perform super-resolution for each of the unique spectral bands by utilizing the cluster weights from the weights module. The super-resolution module can iteratively apply the super-resolution for each of the unique spectral bands and a value for each unique spectral band can be updated after each iteration. | 11-19-2015 |
Patent application number | Description | Published |
20090024992 | SYSTEM AND METHOD FOR ADMINISTRATION OF MOBILE APPLICATION - An administration system and methods for mobile security and other software applications operating on mobile devices in a corporate network. The administration system comprises an administration server, administration database and administration console. To facilitate integration of mobile applications into the administration system, each mobile application is provided with an associated administration console plug-in component. The administration plug-in component provides a set of user interfaces for configuring via the administration console application configuration settings specific to the one or more associated mobile applications. In addition, the plug-in component provides web interfaces, such as SOAP interfaces, for communicating application-specific configuration settings to the associated mobile applications. Accordingly, the administration system enables rapid and highly concurrent installation, configuration, updating, and patching of various mobile applications without modifying infrastructure of the administration system. | 01-22-2009 |
20150088800 | SYSTEM AND METHOD FOR TESTING AND CONFIGURING APPLICATION CONTROL RULES - Disclosed are systems, methods and computer program products for configuring application control rules. The system creates a new application control rule that specifies restrictions or permission on execution a software application, a function of an application or a category of applications. The system then collects information about one or more computers in a network, including information about software applications deployed on the computers and existing application control rules. The system then tests the new application control rule using the collected information to determine verdicts rendered by the new application control rule that restrict or permit execution of an application, certain function of an application or a category of applications. The system then compares verdicts rendered by the new application rule with the verdicts rendered by the existing application control rules to identify conflicting rules, and reconfigures the new application control rule to eliminate conflicts. | 03-26-2015 |
20150207821 | SYSTEM AND METHOD FOR RESOLVING CONFLICTS BETWEEN APPLICATION CONTROL RULES - Disclosed are systems, methods and computer program products for configuring application control rules. An example method includes, in response to testing a new application control rule, transmitting, from each of a plurality of computing devices in a network, information relating to software applications deployed on each computing device and one or more application control rules including the new application control rule associated with the software applications, each of the one or more application control rules having a priority, the collected information identifying at least one conflict between at least one application control rule and the new application control rule in executing one of the software applications; and receiving, by at least one of the plurality of computing devices, the new application control rule reconfigured with a lower priority to eliminate the at least one conflict. | 07-23-2015 |
Patent application number | Description | Published |
20090089040 | SYSTEM AND METHOD FOR DETECTING MULTI-COMPONENT MALWARE - Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior. | 04-02-2009 |
20090089878 | System and Method for Detecting Multi-Component Malware - Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior. | 04-02-2009 |
20090126015 | SYSTEM AND METHOD FOR DETECTING MULTI-COMPONENT MALWARE - Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior. | 05-14-2009 |
20110083176 | ASYNCHRONOUS PROCESSING OF EVENTS FOR MALWARE DETECTION - A system, method and computer program product for malware detection based on the behavior of applications running on a computer system, including: asynchronous processing of system events for malware threat analyses using application filters; analyzing events using heuristic and signature data; analyzing applications behavior and detecting abnormal behavior of “clean” applications; automatically classifying applications (i.e., detecting new versions) based on behavior analysis; automatically analyzing the reliability of web sites based on behavior triggered by the web site accesses; in enterprise networks, detecting abnormalities in configuration of user computer systems; recognizing a user by his behavior profile and using the profile for an automatic configuration of user applications. | 04-07-2011 |
20110289308 | TEAM SECURITY FOR PORTABLE INFORMATION DEVICES - A portable information device (PID) having a security module that conducts security-related functionality. At least some of the security-related functionality for the benefit of the PID is provided by a security team of at least one other PID. In one type of arrangement, when configured in a team processing mode, certain ones of the security functions or components operating for the benefit of the PID can be processed on one or more of the security team member devices. In another type of arrangement, the team of devices exchanges security-related information determined as a result of a single team member device's processing of one or more security-related tasks. | 11-24-2011 |
20130326626 | ASYNCHRONOUS FILTERING AND PROCESSING OF EVENTS FOR MALWARE DETECTION - A method for asynchronous processing of system calls, including detecting a system call on a computer system; filtering the system call to determine when the system call call matches a filter parameter; making a copy of the system call and asynchronously asynchronously processing the system call copy, if the system call does not pass through at through at least one filter, and the filter parameter does not match the system call; placing placing the system call into a queue; releasing the system call after an anti-virus (AV) (AV) check of the system call copy and terminating an object that caused the system call call when the AV check reveals that the system call is malicious; and for an object associated with the system call that has behavior differences compared to a previous known known non-malicious version of the object but also similarities to the previous known non-known non-malicious object, classifying the object as non-malicious. | 12-05-2013 |
20150163231 | SYSTEM AND METHOD FOR REDUCING LOAD ON AN OPERATING SYSTEM WHEN EXECUTING ANTIVIRUS OPERATIONS - An initial trust status is assigned to a first object, the trust status representing one of either a relatively higher trust level or a relatively lower trust level. Based on the trust status, the first object is associated with an event type to be monitored, where the event type is selected from among: essential events, occurrence of which is informative as to trust status evaluating for an object, and critical events, including the essential events, and additional events, occurrence of which is informative as to execution of suspicious code. Occurrences of events relating to the first object are monitored. In response to the first object being assigned the relatively higher trust level, only the essential events are monitored. In response to the first object being assigned the relatively lower trust level, the critical events are monitored. A need for performing malware analysis is determined based on the trust status of the first object and the event type. In response to determination of the need for performing the malware analysis, the malware analysis for the first object is either performed, or not. | 06-11-2015 |
Patent application number | Description | Published |
20130175495 | Integrated Circuitry, Methods of Forming Memory Cells, and Methods of Patterning Platinum-Containing Material - Some embodiments include methods of patterning platinum-containing material. An opening may be formed to extend into an oxide. Platinum-containing material may be formed over and directly against an upper surface of the oxide, and within the opening. The platinum-containing material within the opening may be a plug having a lateral periphery. The lateral periphery of the plug may be directly against the oxide. The platinum-containing material may be subjected to polishing to remove the platinum-containing material from over the upper surface of the oxide. The polishing may delaminate the platinum-containing material from the oxide, and may remove the platinum-containing material from over the oxide with an effective selectivity for the platinum-containing material relative to the oxide of at least about 5:1. Some embodiments include methods of forming memory cells. Some embodiments include integrated circuitry having platinum-containing material within an opening in an oxide and directly against the oxide. | 07-11-2013 |
20130313718 | Substrates Comprising Integrated Circuitry, Methods Of Processing A Substrate Comprising Integrated Circuitry, And Methods Of Back-Side Thinning A Substrate Comprising Integrated Circuitry - A method of processing a substrate having integrated circuitry includes forming through-substrate vias partially through the substrate from a first side of the substrate. At least one through-substrate structure is formed partially through the substrate from the first substrate side. The at least one through-substrate structure extends deeper into the substrate than do the through-substrate vias. Substrate material is removed from a second side of the substrate to expose the through-substrate vias and the at least one through-substrate structure on the second substrate side. Additional implementations are disclosed. Integrated circuit substrates are disclosed independent of method of manufacture. | 11-28-2013 |
20140070419 | Platinum-Containing Constructions, and Methods of Forming Platinum-Containing Constructions - Some embodiments include constructions which have platinum-containing structures. In some embodiments, the constructions may have a planarized surface extending across the platinum-containing structures and across metal oxide. In some embodiments, the constructions may have a planarized surface extending across the platinum-containing structures, across a first material retaining the platinum-containing structures, and across metal oxide liners along sidewalls of the platinum-containing structures and directly between the platinum-containing structures and the first material. Some embodiments include methods of forming platinum-containing structures. In some embodiments, first material is formed across electrically conductive structures, and metal oxide is formed across the first material. Openings are formed to extend through the metal oxide and the first material to the electrically conductive structures. Platinum-containing material is formed within the openings and over the metal oxide. Chemical-mechanical polishing is utilized to form a planarized surface extending across the platinum-containing material and the metal oxide. | 03-13-2014 |
20140103285 | Integrated Circuitry, Methods of Forming Memory Cells, and Methods of Patterning Platinum-Containing Material - Some embodiments include methods of patterning platinum-containing material. An opening may be formed to extend into an oxide. Platinum-containing material may be formed over and directly against an upper surface of the oxide, and within the opening. The platinum-containing material within the opening may be a plug having a lateral periphery. The lateral periphery of the plug may be directly against the oxide. The platinum-containing material may be subjected to polishing to remove the platinum-containing material from over the upper surface of the oxide. The polishing may delaminate the platinum-containing material from the oxide, and may remove the platinum-containing material from over the oxide with an effective selectivity for the platinum-containing material relative to the oxide of at least about 5:1. Some embodiments include methods of forming memory cells. Some embodiments include integrated circuitry having platinum-containing material within an opening in an oxide and directly against the oxide. | 04-17-2014 |
20140162455 | METHOD OF FORMING A PLANAR SURFACE FOR A SEMICONDUCTOR DEVICE STRUCTURE, AND RELATED METHODS OF FORMING A SEMICONDUCTOR DEVICE STRUCTURE - A method of forming a planar surface for a semiconductor device structure. The method comprises forming a particle film comprising a plurality of discrete particles on a non-planar surface of a semiconductor device structure. The semiconductor device structure is subjected to at least one chemical-mechanical polishing process after forming the particle film on the non-planar surface of the semiconductor device structure. Methods of forming a semiconductor device structure are also described. | 06-12-2014 |