Patent application number | Description | Published |
20130307646 | Adaptive Equalization of Impedance Mismatched Card-Edge Connections - A method includes tapping power from a broadband RF input, filtering the tapped power with a plurality of band pass filters, measuring the power filtered by each of the plurality of band pass filters and controlling an adaptive equalizer circuit to flatten excessive non-linear frequency response from the broadband RF input as a function of measured power filtered at each of the plurality of band pass filters. An apparatus, includes a broadband RF input, a plurality of band pass filters coupled to the broadband RF input, at least one power measurement circuit coupled to the plurality of band pass filters and an adaptive equalizer circuit coupled to the at least one power power measurement circuit and the plurality of band pass filters, wherein the at least one power measurement circuit provides control signals to the adaptive equalizer circuit as a function of measured power at each of the plurality of band pass files and wherein the adaptive equalizer circuit flattens excessive non-linear frequency response of the broadband RF input. | 11-21-2013 |
20130308912 | Blind Mate Optoelectronic Device - A method includes connecting a first end of an optoelectronic device with an electrical back plate including blind mating; and connecting a second end of the optoelectronic device with an optical back plate including blind mating. An apparatus includes an optoelectronic device including a first end having an electrical interface for blind mating and a second end having an optical interface for blind mating. | 11-21-2013 |
20130308952 | Small Form Factor, Pluggable, Analog Optical Transmitter and Host Module - A method includes hosting a plurality of transmitter modules with a host module, where the host module includes common circuitry shared by the plurality of pluggable transmitter modules. An apparatus includes a host module; and a plurality of transmitter modules coupled to the host module, where the host module includes common circuitry shared by the plurality of pluggable transmitter modules. | 11-21-2013 |
20130308953 | Universal Host Module for a Pluggable Optical Transmitter - A method includes tuning a host module to a reference module standard; and adjusting each of a plurality of pluggable optical modules coupled to the host module to mimic the reference module standard for a set of load conditions. An apparatus includes a host module tuned to a reference module standard; and a plurality of pluggable optical modules coupled to the host module, wherein each of the plurality of pluggable optical modules mimics the reference standard for a specific set of load conditions. | 11-21-2013 |
Patent application number | Description | Published |
20110040825 | Using Confidence About User Intent In A Reputation System - Reputations of objects are determined by a reputation system using reports from clients identifying the objects. Confidence metrics for the clients are generated using information determined from the reports. Confidence metrics indicate the amounts of confidence in the veracity of the reports. Reputation scores of objects are calculated using the reports from the clients and the confidence metrics for the clients. Confidence metrics and reputation scores are stored in correlation with identifiers for the objects. An object's reputation score is provided to a client in response to a request. | 02-17-2011 |
20110067086 | Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation System - To prevent gaming of a reputation system, a security token is generated for a security module using metadata about the client observed during the registration of the security module. The registration server selects metadata for use in generating the security token. The generated security token is provided to identify the client in later transactions. A security server may conduct a transaction with the client and observe metadata about the client during the transaction. The security server also extracts metadata from the security token. The security server correlates the observed metadata during the transaction with the extracted metadata from the security token. Based on the result of the correlation, a security policy is applied. As a result, the metadata in the security token enables stateless verification of the client. | 03-17-2011 |
20110067101 | Individualized Time-to-Live for Reputation Scores of Computer Files - An individualized time-to-live (TTL) is determined for a reputation score of a computer file. The TTL is determined based on the reputation score and the confidence in the reputation score. The confidence can be determined based on attributes such as the reputation score, an age of the file, and a prevalence of the file. The reputation score is used to determine whether the file is malicious during a validity period defined by the TTL, and discarded thereafter. | 03-17-2011 |
20140026199 | Using Metadata In Security Tokens to Prevent Coordinated Gaming In A Reputation System - To prevent gaming of a reputation system, a security token is generated for a security module using metadata about the client observed during the registration of the security module. The registration server selects metadata for use in generating the security token. The generated security token is provided to identify the client in later transactions. A security server may conduct a transaction with the client and observe metadata about the client during the transaction. The security server also extracts metadata from the security token. The security server correlates the observed metadata during the transaction with the extracted metadata from the security token. Based on the result of the correlation, a security policy is applied. As a result, the metadata in the security token enables stateless verification of the client. | 01-23-2014 |
20140188986 | Method and Apparatus for Identifying Computing Resource Trajectory - The present invention relates to the security of general purpose computing devices, such as laptop or desktop PCs, and more specifically to the detection of malicious software (malware) on a general purpose computing device. A challenge in maintaining a plurality of computing systems is that it may be required to have visibility into the extensive collection of computing related resources located across those systems as well as information about resources together with their behaviors and evolutions within those systems. Examples of such resources include files, file names, registry keys, entries in network communications logs, etc. Accordingly, we present novel methods, components, and systems for keeping track of information about these resources and presenting this information to an ultimate end user. More specifically, we describe methods, components, and systems that perform data analytics on system data to obtain and report upon resource trajectory information, such as when particular resources were seen in an environment, the actions associated with those resources, and other resources related to those original resources. If a particular resource is believed to be malicious or otherwise undesirable, then it can be determined which systems that resource is on, how it arrived on those systems, what it did on those systems as well as what resources are related to the original resource, and as such what might need to be removed from those systems to restore them to a more desirable state. Through the disclosed invention, system administrators will be better able to determine how to more effectively address issues related to the presence of those resources. | 07-03-2014 |
Patent application number | Description | Published |
20090217041 | PROVISIONAL SIGNATURE SCHEMES - A method and apparatus for implementing portions of a provisional signature scheme are disclosed. In one embodiment, the method comprises creating a provisional signature by performing an operation on a message and completing the provisional signature to create a final signature on the message. Such a scheme may be used for server assisted signature schemes, designated confirmer signature schemes and blind signature schemes. | 08-27-2009 |
20090217042 | PROVISIONAL SIGNATURE SCHEMES - A method and apparatus for implementing portions of a provisional signature scheme are disclosed. In one embodiment, the method comprises creating a provisional signature by performing an operation on a message and completing the provisional signature to create a final signature on the message. Such a scheme may be used for server assisted signature schemes, designated confirmer signature schemes and blind signature schemes. | 08-27-2009 |
20130276114 | METHOD AND APPARATUS FOR RETROACTIVELY DETECTING MALICIOUS OR OTHERWISE UNDESIRABLE SOFTWARE - A system for retroactively detecting malicious software on an end user system without performing expensive cross-referencing directly on the endpoint device. A client provides a server with information about files that are on it together with what it knows about these files. The server tracks this information and cross-references it against new intelligence it gathers on clean or malicious files. If a discrepancy is found (i.e., a file that had been called malicious, but that is actually benign or vice versa), the server informs the client, which in turn takes an appropriate action based on this information. | 10-17-2013 |
20140165203 | Method and Apparatus for Retroactively Detecting Malicious or Otherwise Undesirable Software As Well As Clean Software Through Intelligent Rescanning - The present invention relates to the security of general purpose computing devices, such as laptop or desktop PCs, and more specifically to the detection of malicious software (malware) on a general purpose computing device. A challenge in detecting malicious software is that files are typically scanned for the presence of malicious intent only once (and subsequent rescanning is typically performed in a simplistic manner). Existing methods in the art do not address how to most effectively rescan collections of files in a way that tries to optimize performance and efficacy. Accordingly we present novel methods, components, and systems for intelligently rescanning file collections and thereby enabling retroactive detection of malicious software and also retroactive identification of clean software. These methods may also be useful if additional information is now available regarding a file that might be useful to an end-user or an administrator, even though the file's core disposition might not have changed. More specifically, we describe methods, components, and systems that perform data analytics to intelligently rescan file collections for the purpose of retroactively identifying malware and retroactively identifying clean files. The disclosed invention provides a significant improvement with regard to efficacy and performance compared to previous approaches. | 06-12-2014 |