Bettini
Anthony Bettini, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20130247133 | SECURITY ASSESSMENT OF VIRTUAL MACHINE ENVIRONMENTS - Each virtual machine in a set of virtual machines managed by the virtual machine manager is identified. For each virtual machine in the set, it is determined whether the respective virtual machine is online. For at least the virtual machines determined to be offline, a machine image is collected for each offline virtual machine. Security of the offline virtual machines is assessed from the collected images. For virtual machines identified as online, an agent is loaded on each online virtual machine in the set via the virtual machine manager. The loaded agents are used to assess security of the online virtual machines in the set. | 09-19-2013 |
Anthony J. Bettini, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20120117655 | System, Method, and Computer Program Product for Identifying Vulnerabilities Associated with Data Loaded in Memory - A system, method, and computer program product are provided for identifying vulnerabilities associated with data loaded in memory. In operation, a subset of data that is loaded in memory is identified. Additionally, the subset of data is compared to a list of known data. Furthermore, there is a reaction based on the comparison. | 05-10-2012 |
Anthony John Bettini, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20130227636 | OFF-DEVICE ANTI-MALWARE PROTECTION FOR MOBILE DEVICES - Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices includes receiving a software inventory for a mobile device, in which the software inventory identifies a plurality of applications installed on the mobile device; and determining whether one or more of the plurality of applications identified in the software inventory are associated with malware based on a policy. In some embodiments, the off-device anti-malware protection for mobile devices further includes enforcing the policy on the mobile device. In some embodiments, the off-device anti-malware protection for mobile devices is provided as a cloud service. | 08-29-2013 |
20130227683 | QUANTIFYING THE RISKS OF APPLICATIONS FOR MOBILE DEVICES - Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile. | 08-29-2013 |
20130347094 | IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS - Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation. | 12-26-2013 |
20140196150 | QUANTIFYING THE RISKS OF APPLICATIONS FOR MOBILE DEVICES - Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile. | 07-10-2014 |
20140331281 | IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS - Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation. | 11-06-2014 |
Charles Randall Bettini, Browns Summit, NC US
Patent application number | Description | Published |
---|---|---|
20110185629 | METHODS AND SYSTEMS FOR FUEL GENERATION - Systems, methods and compositions are shown and described. In one embodiment, a method of generating a hybrid liquid hydrocarbon fuel (HLHF) comprises locating a vineyard having a supply of grape waste (GW); loading the GW into a delivery system; delivering the GW to a transformation facility having a GW trough; depositing the GW into the GW trough; distilling the GW into ethanol; and mixing the ethanol with gasoline or diesel, thereby generating the HLHF. | 08-04-2011 |
Deborah Bettini, Browns Summit, NC US
Patent application number | Description | Published |
---|---|---|
20110185629 | METHODS AND SYSTEMS FOR FUEL GENERATION - Systems, methods and compositions are shown and described. In one embodiment, a method of generating a hybrid liquid hydrocarbon fuel (HLHF) comprises locating a vineyard having a supply of grape waste (GW); loading the GW into a delivery system; delivering the GW to a transformation facility having a GW trough; depositing the GW into the GW trough; distilling the GW into ethanol; and mixing the ethanol with gasoline or diesel, thereby generating the HLHF. | 08-04-2011 |
Luca Bettini, Zurich CH
Patent application number | Description | Published |
---|---|---|
20110156785 | TRIMMING OF A PSEUDO-CLOSED LOOP PROGRAMMABLE DELAY LINE - An embodiment is proposed for trimming a programmable delay line in an integrated device, which delay line is adapted to delay an input signal being synchronous with a synchronization signal of the integrated device—by a total delay. An embodiment of a corresponding method includes the steps of: preliminary programming the delay line to provide a selected nominal value of the total delay equal to a period of the timing signal, and trimming the delay line to vary an actual value of the total delay until the actual value of the total delay matches the period of the synchronization signal. | 06-30-2011 |
20120075010 | DISCHARGE CIRCUIT FOR VOLTAGE MULTIPLIERS - An embodiment of a discharge circuit for evacuating electric charge accumulated in circuit nodes of a charge pump during a discharge phase consequent to a shutdown of the charge pump is proposed. The charge pump is configured to bias each circuit node with a corresponding pump voltage during an operational phase of the charge pump. The discharge circuit includes a generator circuit configured to generate a discharge current during the discharge phase. The discharge circuit further includes means for evacuating the electric charge stored in each circuit node of the charge pump during a corresponding portion of the discharge phase; such means for evacuating include a respective discharge stage for each circuit node of the charge pump. Each discharge stage includes a first discharge circuit branch and a second discharge circuit branch coupled to the corresponding circuit node. The discharge stage is configured to cause the discharge current flowing through the first discharge circuit branch—during the portion of the discharge phase of the corresponding circuit node—when the pump voltage of the corresponding circuit node is higher than a respective threshold, and through the second discharge circuit branch when the pump voltage of the corresponding circuit node is lower than said respective threshold. | 03-29-2012 |