Abstract: A system, method and computer program product are provided for updating security software on a client. Initially, a parameter indicating a difference between a security update file and a previous security update file is identified. Next, a security program is conditionally updated with the security update file based on the parameter.
Type:
Grant
Filed:
April 2, 2002
Date of Patent:
August 31, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Igor G. Muttik, Vincent P. Gulletten, Craig D. Schmugar
Abstract: A method, apparatus and article of manufacture are provided for sequencing graphics processing in a transform or lighting operation. A plurality of mode bits are first received which are indicative of the status of a plurality of modes of process operations. A plurality of addresses are then identified in memory based on the mode bits. Such addresses are then accessed in the memory for retrieving code segments which each are adapted to carry out the process operations in accordance with the status of the modes. The code segments are subsequently executed within a transform or lighting module for processing vertex data.
Type:
Grant
Filed:
June 21, 2002
Date of Patent:
August 17, 2004
Assignee:
Nvidia Corporation
Inventors:
John Erik Lindholm, Simon Moy, Kevin Dawallu, John Montrym
Abstract: A graphics processing system is provided. The graphics processing system includes a front end module for receiving pixel data. A setup unit is coupled to the front end module and generates parameter coefficients. A raster unit is coupled to the setup unit and generates stepping information. A virtual texturing array engine textures and colors the pixel data based on the parameter coefficients and stepping information. Also provided is a pixel engine adapted for processing the textured and colored pixel data received from the virtual texturing array engine.
Abstract: A system, method and computer program product are provided for depth clamping in a hardware graphics pipeline. Initially, a depth value is identified. It is then determined as to whether a hardware graphics pipeline is operating in a depth clamping mode. If the hardware graphics pipeline is operating in the depth clamping mode, the depth value is clamped within a predetermined range utilizing the hardware graphics pipeline.
Abstract: One embodiment of the present invention provides a system for determining whether software is likely to exhibit malicious behavior by analyzing patterns of system calls made during emulation of the software. The system operates by emulating the software within an insulated environment in a computer system so that the computer system is insulated from malicious actions of the software. During the emulation process, the system records a pattern of system calls directed to an operating system of the computer system. The system compares the pattern of system calls against a database containing suspect patterns of system calls. Based upon this comparison, the system determines whether the software is likely to exhibit malicious behavior. In one embodiment of the present invention, if the software is determined to be likely to exhibit malicious behavior, the system reports this fact to a user of the computer system.
Abstract: Z-buffer rendering of three-dimensional scenes is made more efficient through a method for occlusion culling by which occluded geometry is removed prior to rasterization. The method uses hierarchical z-buffering to reduce the quantity of image and depth information that needs to be accessed. A separate culling stage in the graphics pipeline culls occluded geometry and passes visible geometry on to a rendering stage. The culling stage maintains its own z-pyramid in which z-values are stored at low precision (e.g., in 8 bits). The efficiency of hierarchical z-buffering is improved through hierarchical evaluation of line and plane equations.
Type:
Grant
Filed:
July 10, 2002
Date of Patent:
July 27, 2004
Assignee:
Nvidia Corporation
Inventors:
Edward Colton Greene, Patrick Matthew Hanrahan
Abstract: A system, method and article of manufacture are provided for efficient storage of texture data in memory for use with a computer graphics pipeline. Provided is a data structure including at least one compressed sub-block representing a group of texels in a predetermined image plane and at predetermined locations in a first and a second dimension in a texture map. A number of the sub-blocks is based on a depth of texture data in the texture map.
Abstract: An analyzer for a wireless network is configured for surfing a plurality of channels, each for an individually selectable period of time, for monitoring each channel to obtain packet information for analysis, to detect any defects in communication over each respective channel.
Type:
Grant
Filed:
October 26, 2001
Date of Patent:
July 27, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Peter O. Schmitz, Dominick A. Cafarelli, James P. Anderson, Elazar Rosenthal
Abstract: A system, method and computer program product are provided for detecting an unwanted message. First, an electronic mail message is received. Text in the electronic mail message is decomposed. Statistics associated with the text are gathered using a statistical analyzer. A neural network engine coupled to the statistical analyzer is taught to recognize unwanted messages based on statistical indicators. The statistical indicators are analyzed utilizing the neural network engine for determining whether the electronic mail message is an unwanted message.
Type:
Grant
Filed:
July 26, 2001
Date of Patent:
July 27, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Anton C. Rothwell, Luke D. Jagger, William R. Dennis, David R. Clarke
Abstract: Clip-less rasterization is provided by a plurality of operations. First, a primitive is received that is defined by a plurality of vertices. Each of such vertices includes a W-value. Thereafter, an area is identified based on the W-values. Such area is representative of a portion of a display to be drawn corresponding to the primitive.
Type:
Grant
Filed:
December 6, 1999
Date of Patent:
July 20, 2004
Assignee:
Nvidia Corporation
Inventors:
Douglas A. Voorhies, Nicholas J. Foskett, Matthew N. Papakipos
Abstract: A computer program for checking user configurable security settings operates as either an on-demand application or a memory resident application. The security checking program may enforce the recommended settings or may generate a report to the user as to where the recommended settings are not in place.
Type:
Grant
Filed:
October 3, 2000
Date of Patent:
July 20, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Mark Harris, Christopher Scott Bolin, David Emm
Abstract: An Internet network protocol stack, along with special logic, is embedded with a modem, thereby enabling a modem to become Internet-ready. As a result, the modem offloads much of the network protocol processing from the main CPU and improves the overall performance of the communication system.
Type:
Grant
Filed:
May 28, 1999
Date of Patent:
July 20, 2004
Assignee:
NVIDIA Corporation
Inventors:
Michael Ward Johnson, John Shigeto Minami, Ryo Koyama
Abstract: A system and method are provided for creating a vector map in a hardware graphic pipeline. Initially, one of a plurality of transforms is selected in a hardware graphic pipeline. Further, input is processed in order to generate a vector map utilizing the selected transform in the hardware graphics pipeline. Subsequently, a plurality of pixel color values is rendered utilizing the vector map.
Abstract: A system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufacturered by diverse, unrelated software vendors. The system includes a service provider computer system, a number of client computers and software vendor computer systems communicating on a common network. The service provider computer system stores in an update database information about the software updates of the diverse software vendors, identifying the software products for which software updates are available, their location on the network at the various software vendor computer systems, information for identifying in the client computers the software products stored thereon, and information for determining for such products, which have software updates available. Users of the client computers connect to the service provider computer and obtain a current version of portions of the database.
Type:
Grant
Filed:
April 17, 2002
Date of Patent:
July 13, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
William Cheng, Kenneth Hwang, Ravi Kannan, Babu Katchapalayam, Bing Liu, Balaji Narasimhan, Gopal Ramanujam, Jonathan Tran
Abstract: A system, method and computer program product are provided for analyzing a network. Initially, network traffic information relating to network traffic is collected. Next, the network traffic information is encrypted. In use, the network traffic information is capable of being analyzed by a network analyzer adapted for decrypting the network traffic information.
Abstract: A system and method are provided for executing a cellular automata program in a hardware graphics pipeline. Initially, cell values are received in a hardware graphics pipeline. Next, the cell values are rendered to generate a condition value utilizing the hardware graphics pipeline. A cell value result for the subsequent generation is read from a rule map according to the condition value utilizing the hardware graphics pipeline. Still yet, additional cell values are stored based on the rule map value.
Abstract: Received e-mail messages are subject to a minimum delay period determined in dependence upon characteristics of the e-mail message received. Prior to release of the e-mail message upon expiry of the minimum delay period a check is made that the most up-to-date anti-virus and anti-spamming tests have been applied to the e-mail message. Characteristics that may be used to determine the minimum delay period applied include sender characteristics, recipient characteristics, attachment type characteristics and message content type characteristics.
Type:
Grant
Filed:
October 3, 2000
Date of Patent:
June 29, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Nicholas Paul Kelly
Abstract: A system, method and computer program product are provided for managing the use of a plurality of security service providers during network communication. A first security service provider is utilized for affording secure communication between applications using a network. During operation, the system is monitored for events relating to the secure communication between the applications. Upon the detection of an event, a second security service provider is utilized for affording secure communication between the applications using the network.
Type:
Grant
Filed:
May 31, 2000
Date of Patent:
June 29, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Richard J. Feiertag, Roshan Thomas, Jaisook Rho, Eve L. Cohen, Sebastien T. Rosset, Timothy Redmond
Abstract: A magnetic tunnel junction (MTJ) sensor system and a method for fabricating the same are provided. First provided are a first lead layer, and a pinned layer. Positioned adjacent to pinned layer is a free layer. The magnetization direction of the pinned layer is substantially perpendicular to the magnetization direction of the free layer at zero applied magnetic field. Also included is a tunnel barrier layer positioned between the pinned layer and the free layer. Further provided is a second lead layer, where the pinned layer, the free layer, and the tunnel barrier layer are positioned between the first lead layer and the second lead layer. A pair of hard bias layers are positioned adjacent to the pinned layer, the free layer, and the tunnel barrier layer. To prevent shunt currents from flowing, insulating layers are positioned between the hard bias layers and the first lead layer and the second lead layer. Such insulating layers are constructed from a non-conductive, magnetic material.
Type:
Grant
Filed:
March 25, 2002
Date of Patent:
June 29, 2004
Assignee:
International Business Machines Corporation
Abstract: A system, method and computer program product are provided for filtering communications over a network. Initially, a user is allowed to select from a plurality of network communication protocol layers associated with communications over a network. This may be accomplished in any manner such as allowing the user to select from the layers themselves, various faults that are inherent to certain layers, etc. An adaptive filter is then generated which is capable of collecting communications only involving the selected network communication protocol layers based on the user selection. Such adaptive filter is then used to collect the communications involving the selected network communication protocol layers. Further, an analysis process is executed for analyzing information at the selected network communication protocol layers of the collected communications for the detection of faults therein.