564 patents
Page 7 of 29
Utility
Automatically generating malware definitions using word-level analysis
11 Jan 22
Methods and systems are provided for automatically generating malware definitions and using generated malware definitions.
Weiliang Li, Zhicheng Zeng
Filed: 25 Mar 19
Utility
Apparatus and method for generating a Laplacian pyramid
11 Jan 22
An image processing apparatus is provided that comprises an input configured to receive an image and a Laplacian generator configured to generate, from the image, a Laplacian pyramid that represents the image as a series of frames that contain different frequency components of the image.
James Andrew Hutchinson, Thomas Oscar Miller, Stephen John Barlow, Jack Stuart Haughton
Filed: 9 Mar 18
Utility
Punctured null data packet (NDP) within wireless communications
4 Jan 22
A wireless communication device (alternatively, device, WDEV, etc.) includes at least one processing circuitry configured to support communications with other WDEV(s) and to generate and process signals for such communications.
Ron Porat, Jun Zheng
Filed: 30 Jan 19
Utility
Multi-user (MU) enhanced distributed channel access (EDCA) termination signaling
4 Jan 22
In some aspects, the disclosure is directed to methods and systems for early termination of multi-user enhanced distributed channel access parameter application for one or more stations or devices.
Zhou Lan, Chunyu Hu
Filed: 12 Feb 20
Utility
Token exchange with client generated token
28 Dec 21
A client can be authenticated with an identity provider.
Ravi Kumar Kanukollu
Filed: 9 Oct 18
Utility
Control of memory bandwidth consumption of affine mode in versatile video coding
28 Dec 21
Video encoding or decoding includes performing affine motion compensation in an affine mode in which a prediction unit (“PU”) of the digital video coded in the affine mode uses inter prediction and a reference block bounding box size and determining whether the reference block bounding size exceeds a predefined threshold.
Minhua Zhou
Filed: 28 Oct 19
Utility
Efficient convergence in network events
28 Dec 21
One embodiment of the present invention provides a switch.
Rajesh Pukhraj Jain, Eswara S. P. Chinthalapati, Sandeep G. Bhat
Filed: 27 Apr 17
Utility
Systems and methods for safely executing unreliable malware
21 Dec 21
The disclosed computer-implemented method for safely executing unreliable malware may include (i) intercepting a call to an application programming interface (API) in a computing operating system, the API being utilized by malware for disseminating malicious code, (ii) determining an incompatibility between the API call and the computing operating system that prevents successful execution of the API call, (iii) creating a proxy container for receiving the API call, (iv) modifying, utilizing the proxy container, the API call to be compatible with the computing operating system, (v) sending the modified API call from the proxy container to the computing operating system for retrieving the API utilized by the malware, and (vi) performing a security action during a threat analysis of the malware by executing the API to disseminate the malicious code in a sandboxed environment.
Bahaa Naamneh, Felix Leder
Filed: 4 Sep 19
Utility
High bit-depth graphics compression
7 Dec 21
A device implementing the subject high bit-depth graphics compression may include at least one processor configured to receive pixel data for a pixel block, obtain endpoints of a first bit length based on the pixel data in the pixel block, quantize the endpoints to a second bit length smaller than the first bit length, select the quantized endpoints for pixel values in the pixel block, determine a weight for each pixel of the pixel block in each of a plurality of planes corresponding to the endpoints selected for the pixel block, and generate a compressed data block representative of the pixel block based at least on the endpoints for the pixel block and the weight for each pixel of the pixel block in each of the plurality of planes corresponding to the endpoints.
David Chao Hua Wu, Brian Francis Schoner, Richard Hayden Wyman
Filed: 22 Apr 19
Utility
Systems and methods for protecting against malicious content
7 Dec 21
The disclosed computer-implemented method for protecting against malicious content may include intercepting, by a security application installed on the computing device, an original message intended for a target application installed on the same computing device.
Everett Lai, Tamas Rudnai
Filed: 25 Jun 19
Utility
Protocols for flexible channel utilization
7 Dec 21
In some aspects, the disclosure is directed to methods and systems for utilizing protocols to enable two 802.11 devices to exchange their dynamically-changing local channel availability table and form a mutual channel availability table with time, frequency, and transmission rate domains available.
Sundaram Vanka, Matthew J. Fischer, Rohit Gaikwad, Vinko Erceg, Ron Porat
Filed: 3 Oct 19
Utility
Light-weight mechanism for checking message integrity in data packets
30 Nov 21
This disclosure presents a technique to include a packet sequence number and an integrity check value (ICV) into a data frame while maintaining a total number of transmitted bytes.
Jeffrey Tzeng, Abhijit K. Choudhury, Alan Y. Kwentus
Filed: 26 Oct 18
Utility
Acoustic resonator device
23 Nov 21
The present disclosure provides an acoustic resonator device, among other things.
Richard Ruby, Steve Gilbert, David Archbold
Filed: 26 Sep 19
Utility
Hyperscalar packet processing
23 Nov 21
The disclosed systems and methods provide hyperscalar packet processing.
Sachin Prabhakarrao Kadu
Filed: 30 Dec 19
Utility
Systems and methods for managing endpoint security states using passive data integrity attestations
16 Nov 21
The disclosed computer-implemented method for managing endpoint security states using passive data integrity attestations may include (i) receiving passively collected network data from an endpoint device of a computing environment, (ii) determining a security state of the endpoint device using the passively collected network data from the endpoint device, (iii) determining that the security state of the endpoint device is below a threshold, and (iv) in response to determining that the security state of the endpoint device is below a threshold, performing a security action to protect the computing environment against malicious actions.
Joseph Chen, Qubo Song, Spencer Smith, Shaun Aimoto, Haik Mesropian, David Kane, Peter Ferrie, Jordan Saxonberg, Costin Ionescu
Filed: 22 May 19
Utility
Systems and methods for detecting anomalous behavior within computing sessions
16 Nov 21
The disclosed computer-implemented method for detecting anomalous behavior within computing sessions may include (i) identifying, by the computing device, a set of execution events that correspond to a computing session, (ii) providing, by the computing device, the set of execution events as input to an autoencoder, (iii) receiving, by the computing device and from the autoencoder, a reconstruction error associated with autoencoding the set of execution events, (iv) detecting, by the computing device and based on the reconstruction error, an anomaly within the computing session, and (v) performing, by the computing device, a security action to address the anomaly within the computing session.
Aditya Kuppa, Slawomir Grzonkowski, Sidharth Pipriya
Filed: 29 Jan 19
Utility
Low latency IMS-based media handoff between a cellular network and a WLAN
9 Nov 21
Methods for transporting a media call between an IMS server and a User Equipment (UE) and of handing over the media call between a cellular network and a WLAN are provided.
Dutt Kalapatapu, Kamesh Medapalli
Filed: 17 Oct 17
Utility
Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data
2 Nov 21
The present disclosure relates to using correlations between support interaction data and telemetry data to discover emerging incidents for remediation.
Kevin A. Roundy, Mahmood Sharif, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Dong Chung
Filed: 22 Mar 19
Utility
Bi-directional transistor devices having electrode covering sidewall of the Fin structure
2 Nov 21
A transistor device includes a substrate a first transistor structure.
Qing Liu
Filed: 9 Oct 18
Utility
Bulk acoustic wave resonator
2 Nov 21
A bulk acoustic wave (BAW) resonator is disclosed.
Chris Kirkendall, Brice Ivira, Wingra Fang
Filed: 1 Oct 19