Patent application number | Description | Published |
20080209557 | SPYWARE DETECTION MECHANISM - A system and method that facilitates and effectuates detection of malware secreted and/or hidden in plain sight on a machine. The system and method in order to achieve its aims generates a list of all loaded modules, identifies from the list a set of modules common to more than a threshold number of processes, and eliminates from the list those modules included in an authentication list. The resultant list is prioritized based, in one instance, on the number of occurrences a particular module makes in the resultant list, and thereafter the list is distributed analyst workstations. | 08-28-2008 |
20090199297 | THREAD SCANNING AND PATCHING TO DISABLE INJECTED MALWARE THREATS - An arrangement for scanning and patching injected malware code that is executing in otherwise legitimate processes running on a computer system is provided in which malware code is located in the memory of processes by extracting the start addresses of processes' threads and then searching near these addresses. Additional blocks of code in memory that are invoked by the code identified by each start address are also identified and the blocks are then matched against scanning signatures associated with known malware threads. If the entire signature can be matched against a subset of the blocks, then the thread is determined to be infected. The infected thread is suspended and in-memory modifications are performed to patch the injected code to render it harmless. The thread can be resumed or terminated to disable the protection mechanisms of the malware without causing any harm to the process in which the thread is injected. | 08-06-2009 |
20100192222 | MALWARE DETECTION USING MULTIPLE CLASSIFIERS - A method of identifying a malware file using multiple classifiers is disclosed. The method includes receiving a file at a client computer. The file includes static metadata. A set of metadata classifier weights are applied to the static metadata to generate a first classifier output. A dynamic classifier is initiated to evaluate the file and to generate a second classifier output. The method includes automatically identifying the file as potential malware based on at least the first classifier output and the second classifier output. | 07-29-2010 |
20110067109 | SYSTEM AND METHOD OF CACHING DECISIONS ON WHEN TO SCAN FOR MALWARE - In accordance with this invention, a system, method, and computer-readable medium that selectively scans files stored on a computing device for malware is provided. One aspect of the present invention includes identifying files that need to be scanned for malware when a software update that includes a malware signature is received. More specifically, attributes of the new malware are identified by searching metadata associated with the malware. Then, the method searches a scan cache and determines whether each file with an entry in the scan cache is the type that may be infected by the malware. If a file is the type that may be infected by the malware, the file is scanned for malware when a scanning event such as an I/O request occurs. Conversely, if the file is not the type that may be infected by the malware, the file may be accessed without a scan being performed. | 03-17-2011 |
20120297488 | Discovering Malicious Input Files and Performing Automatic and Distributed Remediation - The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file. | 11-22-2012 |
20120317644 | Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries - The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt. | 12-13-2012 |
20120323829 | GRAPH-BASED CLASSIFICATION BASED ON FILE RELATIONSHIPS - A reliable automated malware classification approach with substantially low false positive rates is provided. Graph-based local and/or global file relationships are used to improve malware classification along with a feature selection algorithm. File relationships such as containing, creating, copying, downloading, modifying, etc. are used to assign malware probabilities and simultaneously reduce the false positive and false negative rates on executable files. | 12-20-2012 |
20130086683 | SELECTIVELY SCANNING OBJECTS FOR INFECTION BY MALWARE - Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects are infected by malware). For instance, metadata that is associated with the objects may be reviewed to determine whether update(s) have been made with regard to the objects since a determination was made that the objects were not infected by malware. An update may involve increasing a number of the objects, modifying one of the objects, etc. Objects that have been updated (e.g., added and/or modified) since the determination may be scanned. Objects that have not been updated since the determination need not necessarily be scanned. For instance, an allowance may be made to perform operations with respect to the objects that have not been updated since the determination without first scanning the objects for infection by malware. | 04-04-2013 |
20130160126 | MALWARE REMEDIATION SYSTEM AND METHOD FOR MODERN APPLICATIONS - A system is described for remediating a malicious modern application installed on an end user device. In an embodiment, the system includes an antimalware program executing on the end user device that can detect and attempt to remediate the malicious modern application, an operating system executing on the end user device that is configured to interact with the antimalware program for the purpose of facilitating the establishment of a connection between the end user device and an application support system in response to determining that the antimalware program has detected and attempted to remediate the malicious modern application, and the application support system that can perform remediation operations beyond those that can be performed by the antimalware program. | 06-20-2013 |
20140020103 | System and Method of Opportunistically Protecting a Computer from Malware - The present invention provides a system, method, and computer-readable medium that opportunistically install a software update on a computer that closes a vulnerability that existed on the computer. In accordance with one aspect of the present invention, when antivirus software on a computer identifies malware, a method causes a software update that closes the vulnerability exploited by the malware to be installed on the computer. The method includes identifying the vulnerability exploited by the malware, using a software update system to obtain a software update that is configured to close the vulnerability; and causing the software update to be installed on the computer where the vulnerability exists. | 01-16-2014 |
20140020104 | System and Method of Opportunistically Protecting a Computer from Malware - The present invention provides a system, method, and computer-readable medium that opportunistically install a software update on a computer that closes a vulnerability that existed on the computer. In accordance with one aspect of the present invention, when antivirus software on a computer identifies malware, a method causes a software update that closes the vulnerability exploited by the malware to be installed on the computer. The method includes identifying the vulnerability exploited by the malware, using a software update system to obtain a software update that is configured to close the vulnerability; and causing the software update to be installed on the computer where the vulnerability exists. | 01-16-2014 |
20140373147 | SCANNING FILES FOR INAPPROPRIATE CONTENT DURING SYNCHRONIZATION - The present invention extends to methods, systems, and computer program products for scanning files for inappropriate content during file synchronization. Embodiments of the invention are mindful of the order of operations when scanning files for inappropriate content and in subsequent file processing. In some embodiments, during synchronization, an intermediary server scans a file for inappropriate content. The file is not permitted to be fully downloaded to a client device until the scan determines that the file does not contain inappropriate content. In other embodiments, during synchronization, a client device scans a newer version of a file for inappropriate content. An older version of the file is not deleted until the scan determines that the newer version of the file does not contain inappropriate content. In further embodiments, server side scanning and client side scanning are both used to enhance capabilities for detecting inappropriate content. | 12-18-2014 |
20140379637 | REVERSE REPLICATION TO ROLLBACK CORRUPTED FILES - The present invention extends to methods, systems, and computer program products for reverse replication to rollback corrupted files. When a computer system detects that a copy of a file includes inappropriate content, the computer system can coordinate with other computer systems (e.g., in replicated storage system) to determine that a viable (e.g., clean) copy of the file exists. The computer system can access the viable copy and replace the copy that includes the inappropriate content with the viable copy. As such, a computer system can “reverse replicate” a file rather than break a synchronization relationship. Reverse replication can be used to rollback a copy of an infected file to another (possibly earlier) copy of the file that is not infected. Embodiments of the invention can be used to rollback data files, such as, for example, pictures, videos, documents, etc. | 12-25-2014 |
Patent application number | Description | Published |
20090265212 | ADVERTISING IN A STREAMING MEDIA ENVIRONMENT - A method, system and apparatus of advertising in a streaming media environment are disclosed. In one embodiment, a method includes selecting a media content from a content database having content of a plurality of artists and media labels based on a request of a user of a social community environment, streaming the media content from a central server associated with the central database to the user without requiring consideration of the user to access the media content, and generating an advertisement that is displayed to the user when the media content is streamed to the user. The method may include selecting a good and/or a service being marketed in the advertisement based on an artist, an album, a track, a genre, a type, and/or a tempo of the media content and/or based on interests defined in a user profile associated with the user. | 10-22-2009 |
20090265213 | RELEVANT CONTENT TO ENHANCE A STREAMING MEDIA EXPERIENCE - A method, system and apparatus of relevant content to enhance a streaming media experience are disclosed. In one embodiment, a method includes selecting a media content from a content database having content of a plurality of artists and media labels based on a request of a user of a social community environment, automatically selecting a relevant content related to the media content from at least one of a user generated content library and a professional content library based on match between a meta-data associated with the media content and the relevant content, streaming the media content from a central server associated with the central content database to the user without requiring consideration of the user to access the media content, and displaying the relevant content to the user when the media content is being streamed. | 10-22-2009 |
20090265356 | AUTOMATIC META-DATA SHARING OF EXISTING MEDIA TO CREATE STREAMABLE COLLECTIONS - A method, system, and/or apparatus of automatic meta-data sharing of existing media to create streamable collections are disclosed. In one embodiment, a method of a server device includes analyzing a media data of a client device to determine at least one meta-data identifier associated with the media data and automatically populating a new mark-up language file using a existing media-collection data associated with certain items of the media data, and creating a streamable media content of the existing media-collection data on the server device based on a reference of the at least one meta-data identifier associated with each of the existing media collection data with a content database of a central server. The method may include communicating the streamable media content from the central server to the user on any client device without requiring consideration of the user to access the media content. | 10-22-2009 |
20090265369 | PLAYABLE MUSIC LIBRARY BUILDING IN A STREAMING MEDIA ENVIRONMENT - A method, system, and apparatus of a playable music library building in a streaming media environment are disclosed. In one embodiment, a method of a server device includes, creatin a streamable playlist associated with a user, determining that the streamable playlist is associated with an artist, and determining that a central database includes new tracks of the artist, automatically adding the new tracks to the streamable playlist without charging a consideration to the user. The method may include communicating an alert message to the user when the new tracks may be added to the streamable playlist. The method may create a category playlist associated with the user based on a category of a media content. The method may include determining that the central database may include additional tracks in the category. The method may request that the user to add the additional tracks in the category playlist. | 10-22-2009 |
Patent application number | Description | Published |
20110057756 | Rare Earth Composite Magnets with Increased Resistivity - Dielectric rare earth fluorides are blended with rare earth magnet powders to produce high-resistivity fluoride composite rare earth magnets. | 03-10-2011 |
20110200839 | Rare Earth Laminated, Composite Magnets With Increased Electrical Resistivity - Laminated, composite, permanent magnets comprising layers of permanent magnets separated by layers of dielectric or high electrical resistivity substances, wherein the laminated magnets indicate increased electrical resistivity. | 08-18-2011 |
20120019341 | COMPOSITE PERMANENT MAGNETS MADE FROM NANOFLAKES AND POWDERS - Composite RE-TM permanent magnets fabricated by using powders and nanoflakes produced by surfactant-assisted, wet, high energy, ball milling, with or without prior dry, high energy, ball milling; where RE represents rare earth elements and TM represents transition metals and where the powders include Fe nanoparticles, Fe—Co nanoparticles, B | 01-26-2012 |
20120019342 | Magnets made from nanoflake precursors - RE-TM based permanent magnets (single phase, hybrid, laminated or polymer bonded magnets) fabricated by using nanoflakes produced by surfactant assisted, wet, high energy ball-milling, with or without prior dry high energy ball-milling, where RE represents rare earth elements and TM represents transition metals. | 01-26-2012 |
20120021219 | MAGNETIC NANOFLAKES - Magnetic nanoflakes fabricated by surfactant assisted, wet, high energy ball milling of bulk precursors, with or without preceding dry, high energy ball milling, wherein certain nanoflakes indicate hard magnetic properties, crystallographic texture and magnetic anisotropy. | 01-26-2012 |
20130038159 | METHODS FOR SEQUENTIALLY LAMINATING RARE EARTH PERMANENT MAGNETS WITH SUFLIDE-BASED DIELECTRIC LAYER - Methods of manufacturing laminated, rare earth, permanent magnets with dielectric layers having increased electrical resistivity and improved mechanical strength suitable for use in high performance, rotating machines comprising sequentially laminating permanent magnet layers with transition and/or diffusion reaction layers; wherein the transition and/or diffusion reaction layers surround sulfide-based dielectric layers, thereby avoiding direct contact between the dielectric layers with permanent magnet layers. | 02-14-2013 |
20130038160 | SEQUENTIALLY LAMINATED, RARE EARTH, PERMANENT MAGNETS WITH SULFIDE-BASED DIELECTRIC LAYERS AND REINFORCED BY DIFFUSION REACTION LAYERS - Laminated, mechanically strong, rare earth, permanent magnets with dielectric layers having increased electrical resistivity and improved mechanical strength suitable for use in high performance, rotating machines comprising sequential laminates of permanent magnet layers and transition and/or diffusion reaction layers; wherein the transition and/or diffusion reaction layers surround sulfide-based dielectric layers, thereby avoiding direct contact between the dielectric layers with permanent magnet layers. | 02-14-2013 |
20130038164 | SEQUENTIALLY LAMINATED, RARE EARTH, PERMANENT MAGNETS WITH DIELECTRIC LAYERS REINFORCED BY TRANSITION AND/OR DIFFUSION REACTION LAYERS - Laminated, rare earth, permanent magnets with one or more dielectric layers, suitable for use in high performance, rotating machines comprising: sequential laminates of permanent magnet layers and dielectric layers separated by transition and/or diffusion reaction layers, where said sequentially laminated magnets indicate increased electrical resistivity with improved mechanical strength. | 02-14-2013 |
20150104645 | MAGNETIC NANOFLAKES - Magnetic nanoflakes fabricated by surfactant assisted, wet, high energy ball milling of bulk precursors, with or without preceding dry, high energy ball milling, wherein certain nanoflakes indicate hard magnetic properties, crystallographic texture and magnetic anisotropy. | 04-16-2015 |
20150132174 | Rare Earth Composite Magnets with Increased Resistivity - Dielectric rare earth fluorides are blended with rare earth magnet powders to produce high-resistivity fluoride composite rare earth magnets. | 05-14-2015 |
20150155082 | Rare Earth Laminated, Composite Magnets With Increased Electrical Rersistivity - Laminated, composite, permanent magnets comprising layers of permanent magnets separated by layers of dielectric or high electrical resistivity substances, wherein the laminated magnets indicate increased electrical resistivity compared to a magnet which does not include the dielectric or high electrical resistivity material layers. | 06-04-2015 |