EBG DESIGNS FOR MITIGATING RADIO FREQUENCY INTERFERENCE
    2.
    发明申请
    EBG DESIGNS FOR MITIGATING RADIO FREQUENCY INTERFERENCE 审中-公开
    EBG设计用于减轻无线电频率干扰

    公开(公告)号:US20150303562A1

    公开(公告)日:2015-10-22

    申请号:US14258683

    申请日:2014-04-22

    申请人: Joseph CHEN

    发明人: Joseph CHEN

    IPC分类号: H01Q1/52 B29C65/50 H05K9/00

    摘要: An apparatus for electromagnetic interference shielding is described herein. The apparatus includes an electromagnetic bandgap (EBG) structure. The EBG structure is attached to a surface of the apparatus such that noise propagation is mitigated. The apparatus may be a chassis of an electronic device, and the EBG structure may be attached to one surface of the chassis. Further, the apparatus may be a heat sink, and the EBG structure can be attached to one surface of the heat sink.

    摘要翻译: 这里描述了用于电磁干扰屏蔽的装置。 该装置包括电磁带隙(EBG)结构。 EBG结构附着在装置的表面上,使噪声传播得到缓解。 该装置可以是电子设备的底盘,并且EBG结构可以附接到底盘的一个表面。 此外,该装置可以是散热器,并且EBG结构可以附接到散热器的一个表面。

    Systems and methods for identifying malware threat vectors
    3.
    发明授权
    Systems and methods for identifying malware threat vectors 有权
    用于识别恶意软件威胁载体的系统和方法

    公开(公告)号:US08819828B1

    公开(公告)日:2014-08-26

    申请号:US13457152

    申请日:2012-04-26

    摘要: A computer-implemented method for identifying malware threat vectors may include 1) identifying a computing system that includes a first human interface device, 2) detecting an introduction of a new device to the computing system that presents itself to the computing system as a second human interface device, 3) determining that the second human interface device is configured to generate a type of input event equivalent to the type of input event generated by the first human interface device, 4) determining, based on the second human interface device being configured to generate the type of input event equivalent to the type of input event generated by the first human interface device, that the second human interface device includes a potential malware attack vector. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于识别恶意软件威胁载体的计算机实现的方法可以包括:1)识别包括第一人机接口设备的计算系统,2)检测将新设备引入到计算系统的计算系统,所述计算系统将自身呈现为计算系统作为第二人 接口设备,3)确定所述第二人机界面设备被配置为生成等同于由所述第一人机接口设备生成的输入事件的类型的输入事件的类型,4)基于所述第二人机接口设备被配置为 生成等同于由第一人机接口设备生成的输入事件的类型的输入事件的类型,第二人机接口设备包括潜在的恶意软件攻击向量。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for detecting malicious digitally-signed applications
    4.
    发明授权
    Systems and methods for detecting malicious digitally-signed applications 有权
    用于检测恶意数字签名应用程序的系统和方法

    公开(公告)号:US08756432B1

    公开(公告)日:2014-06-17

    申请号:US13477580

    申请日:2012-05-22

    申请人: Joseph Chen Rui Jing

    发明人: Joseph Chen Rui Jing

    IPC分类号: G06F21/00

    CPC分类号: G06F21/51 G06F21/565

    摘要: A computer-implemented method for detecting malicious digitally-signed applications. The method may include 1) identifying an application package file that has been digitally signed, wherein the application package file is used to distribute an application, 2) comparing the application package file to a set of known application package files, 3) determining that the application package file has been repackaged from a known application package file, 4) comparing a public key associated with a digital signature of the application package file to a public key associated with a digital signature of the known application package file, 5) determining that the public key associated with the digital signature of the application package file and the public key associated with the digital signature of the known application package file are different, and 6) performing a security action on the application. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于检测恶意数字签名应用程序的计算机实现的方法。 该方法可以包括:1)识别已被数字签名的应用包文件,其中应用包文件用于分发应用; 2)将应用包文件与一组已知应用包文件进行比较,3)确定 应用程序包文件已经从已知应用程序包文件重新打包,4)将与应用程序包文件的数字签名相关联的公钥与已知应用程序包文件的数字签名相关联的公钥进行比较,5)确定 与应用程序包文件的数字签名相关联的公开密钥和与已知应用程序包文件的数字签名相关联的公共密钥是不同的,并且6)对该应用执行安全动作。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for using acquisitional contexts to prevent false-positive malware classifications
    5.
    发明授权
    Systems and methods for using acquisitional contexts to prevent false-positive malware classifications 有权
    使用获取性上下文来防止虚假的恶意软件分类的系统和方法

    公开(公告)号:US08627469B1

    公开(公告)日:2014-01-07

    申请号:US13420492

    申请日:2012-03-14

    IPC分类号: G06F11/00

    CPC分类号: G06F21/567 H04L63/145

    摘要: A method for using acquisitional contexts to prevent false-positive malware classifications. The method may include (1) receiving, from at least one client-side computing device within a community of users, contextual information associated with a file, (2) determining, based at least in part on the contextual information received from the client-side computing device, a reputation rating for the file, and (3) providing the reputation rating for the file to at least one additional client-side computing device within the community in order to prevent the additional client-side computing device from falsely classifying the file as untrustworthy due to acquiring an additional instance of the file via a context that is insufficient to determine that the additional instance of the file is trustworthy. Various other methods and systems are also disclosed.

    摘要翻译: 一种使用获取性上下文来防止假阳性恶意软件分类的方法。 该方法可以包括(1)从用户社区内的至少一个客户端计算设备接收与文件相关联的上下文信息,(2)至少部分地基于从客户端接收的上下文信息来确定, 侧面计算设备,文件的信誉评级,以及(3)向社区内的至少一个附加的客户端计算设备提供该文件的信誉评级,以防止附加的客户端计算设备被错误地分类 由于通过不足以确定文件的附加实例是可信赖的上下文获取文件的附加实例,因此文件不可信。 还公开了各种其它方法和系统。

    EDGE-EMITTING ANTENNAS FOR ULTRA SLIM WIRELESS MOBILE DEVICES
    6.
    发明申请
    EDGE-EMITTING ANTENNAS FOR ULTRA SLIM WIRELESS MOBILE DEVICES 有权
    用于超薄无线移动设备的边缘发射天线

    公开(公告)号:US20130335284A1

    公开(公告)日:2013-12-19

    申请号:US13527015

    申请日:2012-06-19

    IPC分类号: H01Q7/08

    摘要: Described herein are techniques related to near field coupling and wireless power transfers. A mobile device may include an edge-emitting antenna that offers ultra slim, all-metallic chassis packaging option with no cutout, uses lesser area, has robust mechanical strength, and provides EMI/ESD protection. In one example, an inductor coil is wrapped around a magnetic core and a pair of conductive layers is configured to interpose the magnetic core and the inductor coil between them to expose an edge of the magnetic core. The inductor coil being operable in a transmit mode to generate a magnetic field in response to a current passing through it. The edge is configured to enhance outward radiation of the magnetic field. Based on simulation results, the edge-emitting antenna occupies less space and provides an acceptable level of performance for coupling coefficients compared to conventional antenna.

    摘要翻译: 这里描述了与近场耦合和无线功率传输相关的技术。 移动设备可以包括边缘发射天线,其提供超薄,全金属底盘封装选项,没有切口,使用较小的面积,具有坚固的机械强度,并且提供EMI / ESD保护。 在一个示例中,电感线圈缠绕在磁芯周围,并且一对导电层被配置为将磁芯和电感线圈插入它们之间以暴露磁芯的边缘。 电感线圈可在发射模式下工作,以响应于通过它的电流而产生磁场。 边缘被配置为增强磁场的向外辐射。 基于仿真结果,与传统天线相比,边缘发射天线占用更少的空间,并且提供了耦合系数的可接受的性能水平。

    Collecting malware samples via unauthorized download protection
    7.
    发明授权
    Collecting malware samples via unauthorized download protection 有权
    通过未经授权的下载保护收集恶意软件样本

    公开(公告)号:US08353033B1

    公开(公告)日:2013-01-08

    申请号:US12166785

    申请日:2008-07-02

    IPC分类号: H04L9/00

    摘要: A hook is set for one or more downloading functions. Subsequently, code is executed within an application process. Responsive to the executed code calling one of the hooked functions to download code, a return address of the called function is examined. If the return address is within a memory area not marked executable, the code is permitted to be downloaded and the downloaded code is submitted to a security server for analysis.

    摘要翻译: 挂钩设置为一个或多个下载功能。 随后,在应用程序进程中执行代码。 响应于执行的代码调用一个挂钩函数来下载代码,检查被调用函数的返回地址。 如果返回地址在未标记可执行的内存区域内,则允许下载代码,并将下载的代码提交到安全服务器进行分析。

    Enhanced hyperlink feature for web pages
    8.
    发明授权
    Enhanced hyperlink feature for web pages 失效
    网页增强的超链接功能

    公开(公告)号:US08135617B1

    公开(公告)日:2012-03-13

    申请号:US11975362

    申请日:2007-10-18

    IPC分类号: G06Q30/00

    CPC分类号: G06Q30/0241

    摘要: The invention in some embodiments features a contextual content delivery system (CCDS) for enhancing conventional web content with pop-up bubbles that display information when a cursor hovers over a word, link, or icon. The CCDS is configured to identify words or links in a document, determine their context, select the appropriate bubble from a plural of bubble types for each of the words or links, select content for each bubble based, in part, on the context in which the words and hyperlinks are used. The context can be determined from various sources including the resource in which the word or link appears and the target resource to which the link points. Thereafter, the CCDS enhances the words or links so that bubbles are automatically invoked in response to the appropriate trigger.

    摘要翻译: 本发明在一些实施例中具有上下文内容传递系统(CCDS),用于通过弹出泡泡增强常规网页内容,该弹出窗口在光标悬停在单词,链接或图标上时显示信息。 CCDS被配置为识别文档中的单词或链接,确定其上下文,从每个单词或链接的多个气泡类型中选择适当的气泡,为每个气泡选择内容,部分地基于其中 使用单词和超链接。 可以从各种来源确定上下文,包括出现单词或链接的资源以及链接指向的目标资源。 此后,CCDS增强了单词或链接,以便响应适当的触发自动调用气泡。

    Systems and Methods for Creating Customized Confidence Bands for Use in Malware Detection
    9.
    发明申请
    Systems and Methods for Creating Customized Confidence Bands for Use in Malware Detection 有权
    用于创建用于恶意软件检测的自定义置信区的系统和方法

    公开(公告)号:US20120005751A1

    公开(公告)日:2012-01-05

    申请号:US12830286

    申请日:2010-07-02

    IPC分类号: G06F11/00 G06F21/00

    摘要: A computer-implemented method for creating customized confidence bands for use in malware detection may include 1) identifying a portal for receiving executable content, 2) identifying metadata relating to the portal, 3) analyzing the metadata to determine what risk executable content received via the portal poses, and then 4) creating, based on the analysis, a confidence band to apply during at least one disposition of executable content received via the portal. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于创建用于恶意软件检测的定制置信区段的计算机实现的方法可以包括:1)识别用于接收可执行内容的门户,2)识别与门户相关的元数据,3)分析元数据以确定经由 门户架构,然后4)基于分析,创建在通过门户接收到的可执行内容的至少一个处理中应用的置信区间。 还公开了各种其它方法,系统和计算机可读介质。

    Methods for Generating and Indicating a Time Relevant Status for an Operating Entity
    10.
    发明申请
    Methods for Generating and Indicating a Time Relevant Status for an Operating Entity 审中-公开
    生成和指示运营实体的时间相关状态的方法

    公开(公告)号:US20090187563A1

    公开(公告)日:2009-07-23

    申请号:US12358240

    申请日:2009-01-22

    申请人: Joseph Chen

    发明人: Joseph Chen

    IPC分类号: G06F17/30

    CPC分类号: G06Q10/109

    摘要: A method for generating an operating status at a defined time for an operating entity, comprising the steps of: generating one or more time rules for hours of operation of the operating entity; determining an operating status value by comparing the time with the time rules; and matching an operating status to said operating status value.

    摘要翻译: 一种用于在操作实体的规定时间生成运行状态的方法,包括以下步骤:产生操作实体的操作小时的一个或多个时间规则; 通过将时间与时间规则进行比较来确定操作状态值; 并将操作状态与所述操作状态值相匹配。