Patent application number | Description | Published |
20130318611 | SYSTEM AND METHOD FOR DETECTING NETWORK ACTIVITY OF INTEREST - A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest. | 11-28-2013 |
20140215606 | SYSTEM AND METHOD FOR DETECTING A COMPROMISED COMPUTING SYSTEM - A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection. | 07-31-2014 |
20150020187 | SYSTEM AND METHOD FOR DETECTING A COMPROMISED COMPUTING SYSTEM - A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection. | 01-15-2015 |
20150163230 | SYSTEM AND METHOD FOR DETECTING NETWORK ACTIVITY OF INTEREST - A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest. | 06-11-2015 |
Patent application number | Description | Published |
20100070917 | SYSTEM AND METHOD FOR PLAYLIST GENERATION BASED ON SIMILARITY DATA - System, method and computer program for facilitating media playlist generation based at least in part on media library inventory information provided by a plurality of program participants. Data is transmitted from a program participant's client device indicative of media inventory in a media library of the program participant. Media item similarity ratings are received at the client device that have been compiled based on cumulative data collected from a plurality of program participants, including identification data of individual media items contained in media libraries of the program participants regardless of each individual media item's source. Similarity ratings compilation includes processing the cumulative data to determine an incidence of co-occurrence of pairs of individual media items in different program participants' media libraries and making an assignment of a similarity rating based on the determined incidence of co-occurrence. | 03-18-2010 |
20100076982 | SYSTEM AND METHOD FOR PLAYLIST GENERATION BASED ON SIMILARITY DATA - Methods and arrangements for facilitating media playlist generation for a program participant based at least in part on media library inventory information provided by a number of program participants. The system or program in which the individuals are participating is an on-line media store. Those individuals that decide to be program participants are interested in organizing, maintaining and playing their music, based at least in part, on data derived from a population of other participants in the program that have similar or the same music in their libraries. To be a program participant, the individual music holder must send, and the on-line music store receive, data representative of that program participant's media inventory. This data typically contains identification data of the individual media items presently contained in that participant's media library regardless of the individual media item's source. The system or program determines an incidence of co-occurrence of pairs of individual media items in different program participants' media libraries. Based on this determination, a similarity rating is assigned between the pairs of individual media items based on the determined incidence of co-occurrence in the different program participants' media libraries. | 03-25-2010 |
20100076983 | SYSTEM AND METHOD FOR PLAYLIST GENERATION BASED ON SIMILARITY DATA - System, method and computer program that encompasses one or more client devices cooperating with a program host's on-line data processing center to generate media playlists. Data is transmitted from a program participant's client device to the processing center and is representative of media inventory in a media library on the client device and includes identification data of contained individual media items. Data is further received from a plurality of program participants representative of each respective program participant's media inventory, regardless of the source of the members of the inventory. Co-occurrence of pairs of individual media items in different program participants' media libraries is determined and a similarity rating is assigned between the pairs of individual media items based on the determined incidence of co-occurrence in the different program participants' media libraries. From this, a media playlist is generated. | 03-25-2010 |
Patent application number | Description | Published |
20080236606 | Heat Retaining Hair Curling System and Method of Styling - An improved hair styling device comprises heating elements and heat retaining clips inside the device's housing. The clips present concave inner faces, and form an enclosed space when in a closed position. A heat retaining means with an elevated heat capacity is incorporated into the clips adjacent the inner surface of the jaws of the clips; and also presents a concave surface to the inside of the clips when in a closed position. The heating elements comprise elongated heating rods with multiple heating locations along their length. Each heating location comprises an enlarged convex area on the surface of the heating rods. The heating locations are complimentary to the shape of the heat retaining means, and therefore heat the clips quickly and evenly. | 10-02-2008 |
20110271977 | HEAT RETAINING CURLING SYSTEM AND METHOD OF STYLING - An improved hair styling device comprises heating elements and heat retaining clips inside the device's housing. The clips present concave inner faces, and form an enclosed space when in a closed position. A heat retaining means with an elevated heat capacity is incorporated into the clips adjacent the inner surface of the jaws of the clips; and also presents a concave surface to the inside of the clips when in a closed position. The heating elements comprise elongated heating rods with multiple heating locations along their length. Each heating location comprises an enlarged convex area on the surface of the heating rods. The heating locations are complimentary to the shape of the heat retaining means, and therefore heat the clips quickly and evenly. | 11-10-2011 |
20120073595 | HEATING APPARATUS FOR HEAT RETAINING HAIR CLIPS - An improved hair styling device with heating elements and heat retaining clips inside the device's housing. The clips present double concave inner faces, and form an enclosed space when in a closed position. A heat retaining element with an elevated heat capacity is incorporated into the clips adjacent the inner surface of the jaws of the clips; and also presents a double concave surface to the inside of the clips when in a closed position. The heating elements are made up of elongated heating rods with multiple heating locations along their length. Each heating location has an enlarged double convex area on the surface of the heating rods. The heating locations are complimentary to the shape of the heat retaining element, and therefore heat the clips quickly and evenly. | 03-29-2012 |
20130247932 | HEAT RETAINING HAIR CURLING SYSTEM AND METHOD OF STYLING - An improved hair styling device with heating elements and heat retaining clips inside the device's housing. The clips present double concave inner faces, and form an enclosed space when in a closed position. A heat retaining-element with an elevated heat capacity is incorporated into the clips adjacent the inner surface of the jaws of the clips; and also presents a double concave surface to the inside of the clips when in a closed position. The heating elements are made up of elongated heating rods with multiple heating locations along their length. Each heating location has an enlarged double convex area on the surface of the heating rods. The heating locations are complimentary to the shape of the heat retaining element, and therefore heat the clips quickly and evenly | 09-26-2013 |
Patent application number | Description | Published |
20100142601 | DSL RING SIGNAL COMPATIBILITY - A method of detecting that a condition exists that adversely impacts a digital subscriber line service (DSL) over a telephone line shared by the DSL service and a telephone service. The method includes obtaining information regarding operation of the DSL service over a plurality of different time periods, comparing the information for a first of the plurality of time periods with the information for a second of the plurality of time periods, and determining the condition exists based on the comparison. | 06-10-2010 |
20130170629 | NON-INVASIVE DIAGNOSTIC TRANSMISSION LINE TESTING - A probing signal transmitted on a twisted pair telephone line in a DSL system is reflected and received at a DSL device. An estimate of one of a DSL data transmission signal or DSL synch symbol transmission signal is removed from the received probing signal to recover the reflected probing signal. The recovered reflected probing signal is processed to determine characteristics information of the twisted pair telephone line. | 07-04-2013 |
20140334609 | NON-INVASIVE DIAGNOSTIC TRANSMISSION LINE TESTING - A probing signal transmitted on a twisted pair telephone line in a DSL system is reflected and received at a DSL device. An estimate of one of a DSL data transmission signal or DSL synch symbol transmission signal is removed from the received probing signal to recover the reflected probing signal. The recovered reflected probing signal is processed to determine characteristics information of the twisted pair telephone line. | 11-13-2014 |
20150030139 | APPARATUS, SYSTEMS AND METHODS OF COMMON MODE BASED DIAGNOSTICS - In accordance with embodiments disclosed herein, there are provided apparatus, systems and methods for detecting a boundary condition via common mode diagnostics; and to apparatus, systems and methods for detecting a fault condition via common-mode rejection ratio diagnostics. For example, in one embodiment such means include, means for injecting a common mode signal probe onto a first end of a Digital Subscriber Line (DSL line); means for measuring impedance of the common mode signal probe on the DSL line at the first end of the DSL line; means for detecting an impedance anomaly on the DSL line based on the measured impedance of the common mode signal probe; and means for correlating the impedance anomaly on the DSL line to a boundary condition on the DSL line. | 01-29-2015 |
20150043720 | APPARATUS, SYSTEMS AND METHODS OF COMMON-MODE REJECTION RATIO BASED DIAGNOSTICS - In accordance with embodiments disclosed herein, there are provided apparatus, systems and methods for detecting a boundary condition via common mode diagnostics; and to apparatus, systems and methods for detecting a fault condition via common-mode rejection ratio diagnostics. For example, in one embodiment such means include, means for injecting differential mode signal probes onto two conductors of a Digital Subscriber Line (DSL line); means for measuring a common-mode rejection ratio (CMRR) of the differential mode signal probes; means for measuring impedance of the differential mode signal probes; and means for identifying which of an asymmetric fault condition or a symmetric fault condition is present on the line based on both: (a) the measured CMRR of the differential mode signal probes and (b) the measured impedance of the differential mode signal probes. | 02-12-2015 |
20150124891 | APPARATUS, SYSTEMS AND METHODS FOR IMPULSE NOISE DETECTION AND MITIGATION - In accordance with embodiments disclosed herein, there are provided apparatus, systems and methods for impulse noise detection and mitigation. For example, in one embodiment such means include, means for detecting impulse noise; means for classifying the detected impulse noise into one of a plurality of impulse noise classes affecting communications on a Digital Subscriber Line (DSL line); means for selecting a noise mitigation strategy from among a plurality of noise mitigation strategies; means for applying the selected noise mitigation strategy; and means for validating application of the noise mitigation strategy. | 05-07-2015 |
Patent application number | Description | Published |
20090112327 | BURR HOLE PLUG DESIGNS - A burr hole plug comprises a plug base including a flange configured for being mounted around a burr hole, an aperture through which an elongated medical device may pass, and tabs configured for extending within the cranial burr hole to center the plug base relative to the cranial burr hole. The burr hole plug further comprises a retainer configured for being mounted within the aperture of the plug base to secure the medical device. A method may comprise locating the plug base within a burr hole, such that the tabs are disposed within the burr hole to center the plug base relative to the cranial burr hole, introducing the elongated medical device through the cranial burr hole and into the brain tissue of the patient, mounting the retainer within the aperture of the plug base, and actuating the retainer to secure the medical device. | 04-30-2009 |
20100145357 | BURR HOLE PLUG HAVING DUAL SLIDABLE CLAMPING MECHANISMS - A burr hole plug comprises a plug base configured for being mounted around a burr hole. The plug base includes an aperture through which an elongated medical device exiting the burr hole may pass. The burr hole plug further comprises a retainer configured for being mounted within the aperture of the plug base. The retainer further includes first and second slidable clamping mechanisms configured for securing the medical devices therebetween within the aperture of the plug base. A method comprises introducing the medical device through the burr hole, mounting a plug base around the burr hole, such that the medical device extends through the plug base aperture, mounting the retainer within the aperture of the plug base, and sliding the first and second clamping mechanisms secure the medical device therebetween. | 06-10-2010 |
20140243945 | BURR HOLE PLUG DESIGNS - The burr hole plug comprises a plug base configured for being mounted around a burr hole, and having an aperture through which an elongated medical device exiting the burr hole may pass. The burr hole plug further comprises a retainer configured for being mounted within the plug base aperture. The retainer includes a retainer support, a slot formed in the retainer support for receiving the medical device, and a clamping mechanism having a clamping bar and a flange slidably engaged with the retainer support to laterally slide the clamping bar to secure the medical device. A method comprises introducing the medical device through the burr hole, mounting the plug base around the burr hole, mounting the retainer within the plug base aperture, receiving the medical device into the slot, and sliding the slidable flange relative to the retainer support to laterally slide to secure the medical device. | 08-28-2014 |
Patent application number | Description | Published |
20130158579 | VITRECTOMY PROBE WITH ADJUSTABLE CUTTER PORT SIZE - Vitrectomy probes and system related thereto are disclosed herein. The disclosure describes various example vitrectomy probes having an adjustable cutting port size. Various example features are described for adjusting the size of the cutting port. Further, the disclosure provides examples for adjusting the size of the cutter port while the vitrectomy probe is in operation. | 06-20-2013 |
20130158580 | VITRECTOMY PROBE WITH ADJUSTABLE CUTTER PORT SIZE - Vitrectomy probes and system related thereto are disclosed herein. The disclosure describes various example vitrectomy probes having an adjustable cutting port size. Various example features are described for adjusting the size of the cutting port. Further, the disclosure provides examples for adjusting the size of the cutter port while the vitrectomy probe is in operation. | 06-20-2013 |
20130158581 | VITRECTOMY PROBE WITH ADJUSTABLE CUTTER PORT SIZE - Vitrectomy probes and system related thereto are disclosed herein. The disclosure describes various example vitrectomy probes having an adjustable cutting port size. Various example features are described for adjusting the size of the cutting port. Further, the disclosure provides examples for adjusting the size of the cutter port while the vitrectomy probe is in operation. | 06-20-2013 |
20130158583 | VITRECTOMY PROBE WITH ADJUSTABLE CUTTER PORT SIZE - Vitrectomy probes and system related thereto are disclosed herein. The disclosure describes vitrectomy probes including an adjustable stroke limiter longitudinally moveable therein in response to a rotation of the stroke limiter. The adjustable stroke limiter is operable to adjust a cutting port size of a cutter. | 06-20-2013 |
20130158584 | VITRECTOMY PROBE WITH ADJUSTABLE CUTTER PORT SIZE - Vitrectomy probes and system related thereto are disclosed herein. The disclosure describes various example vitrectomy probes having an adjustable cutting port size. Various example features are described for adjusting the size of the cutting port. Further, the disclosure provides examples for adjusting the size of the cutter port while the vitrectomy probe is in operation. | 06-20-2013 |