Patents Represented by Attorney Okamoto & Benedicto LLP
  • Patent number: 8085849
    Abstract: One embodiment relates to an automated method for estimating motion of an image segment. An image frame is segmented into irregularly-shaped image segments. Motion vectors of blocks of pixels in the image frame are estimated. A determination is made as to the blocks which overlap a segment, and candidate motion vectors are determined from the motion vectors for those overlapping blocks. A motion vector for the segment is selected from amongst the candidate motion vectors. Other embodiments, aspects, and features are also disclosed.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: December 27, 2011
    Assignee: Keystream Corporation
    Inventors: Edward R. Ratner, Schuyler A. Cullen
  • Patent number: 8085516
    Abstract: A ground fault circuit interrupter (GFCI) includes a GFCI controller configured to detect for ground faults and to periodically perform a self test. The self test may be performed during a positive half cycle of an AC line voltage coupled to a load by the GFCI. The self test may include testing of a critical component of the GFCI without opening load contacts coupling the AC line voltage to the load. The self test may further include testing of monitoring coils in the GFCI.
    Type: Grant
    Filed: July 11, 2008
    Date of Patent: December 27, 2011
    Assignee: Fairchild Semiconductor Corporation
    Inventor: Bruce G. Armstrong
  • Patent number: 8082583
    Abstract: Method and system for performing content filtering services in a computer network. A gateway computer may be configured to be in the data path of network communications between client computers in a private computer network and computers in a public computer network. A master entity in the gateway computer may be configured to determine content filtering services available in the client computers. The master entity may delegate to the client computers performance of content filtering services that may be reliably performed in the client computers. Each of the client computers may include a trusted agent in communication with the master entity to coordinate content filtering in the private computer network.
    Type: Grant
    Filed: July 9, 2007
    Date of Patent: December 20, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Narasimham Kodukula, Bharath Kumar Chandra Sekhar
  • Patent number: 8062693
    Abstract: A contact mask for inkjet printing on a solar cell substrate may be generated by creating a printing bitmap of contacts to be printed on the solar cell substrate. The contacts may be located on the solar cell substrate by mapping coordinates of the printing bitmap to coordinates of the solar cell substrate as positioned in the inkjet printer. The location of the contacts on the solar cell substrate may be defined relative to a location on the solar cell substrate, such as relative to center of mass. The contact mask may be printed by the inkjet printer using the printing bitmap and location information of the contacts.
    Type: Grant
    Filed: September 22, 2008
    Date of Patent: November 22, 2011
    Assignee: SunPower Corporation
    Inventor: Peter John Cousins
  • Patent number: 8063365
    Abstract: One embodiment relates to an electron source apparatus for an electron beam lithography tool or an electron beam inspection tool. A cathode is configured to emit electrons, and an anode is configured to accelerate the electrons so as to create an electron beam. There are no beam apertures in the electron source apparatus that are positioned at non-focal planes. An electron lens may be configured to focus the electron beam to form a cathode image at a focal plane, and a beam aperture may positioned at the focal plane. Other embodiments, aspects and features are also disclosed.
    Type: Grant
    Filed: December 2, 2008
    Date of Patent: November 22, 2011
    Assignee: KLA-Tencor Corporation
    Inventors: Keith Standiford, Alan Brodie
  • Patent number: 8056132
    Abstract: Software robots (“bots”) may be detected in a client computer using a client-side bot detector. The client-side bot detector may be configured to receive bot event profiles indicating IP (Internet Protocol) addresses involved in malicious online activities perpetrated by bots and time frames when the malicious online activities occurred. The client-side bot detector may determine dynamic IP addresses that have been dynamically assigned to the client computer by consulting a dynamic IP assignment profile of the client computer. The client-side bot detector may compare the bot event profiles against the dynamic IP assignment profile of the client computer to determine if the client computer is infected by a bot.
    Type: Grant
    Filed: October 29, 2008
    Date of Patent: November 8, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Ming-Tai Chang, Jui-Pang Casper Wang, Lio Cheng, Kuan-Hua Chen
  • Patent number: 8056133
    Abstract: In one embodiment, a peer-to-peer (P2P) protect server may include a crawler to obtain files available for P2P data transfer. The P2P protect server may employ a scan engine to scan the files for computer viruses, and store the results of the scanning in a database. A P2P protect application running in a P2P client may request the P2P protect server for information on whether or not a particular file available for P2P data transfer is infected with a computer virus. This allows the user of the P2P client to make an informed decision before downloading the file from another P2P client.
    Type: Grant
    Filed: July 26, 2006
    Date of Patent: November 8, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Pei-Chun Yao, Chia-Chi Chang
  • Patent number: 8051487
    Abstract: A system and a method are disclosed for sensitive document management. The system includes one or more agents, a behavior analysis engine, a local policy engine, and a local matching service. The method identifies whether a document is sensitive, identifies behaviors applied to the document, determines whether the document contains sensitive information and determines whether to allow the identified behavior to continue based on security policies.
    Type: Grant
    Filed: April 27, 2006
    Date of Patent: November 1, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Fei Huang, Shu Huang, Liwei Ren
  • Patent number: 8045808
    Abstract: A pure adversarial optical character recognition (OCR) approach in identifying text content in images. An image and a search term are input to a pure adversarial OCR module, which searches the image for presence of the search term. The image may be extracted from an email by an email processing engine. The OCR module may split the image into several character-blocks that each has a reasonable probability of containing a character (e.g., an ASCII character). The OCR module may form a sequence of blocks that represent a candidate match to the search term and calculate the similarity of the candidate sequence to the search term. The OCR module may be configured to output whether or not the search term is found in the image and, if applicable, the location of the search term in the image.
    Type: Grant
    Filed: August 16, 2007
    Date of Patent: October 25, 2011
    Assignee: Trend Micro Incorporated
    Inventor: Jonathan James Oliver
  • Patent number: 8032757
    Abstract: Processes for fingerprinting a document and for preventing information leakage at a deployment point are disclosed. For fingerprinting a document, a sequence of hash values for a document is generated, a portion of said hash values to be selected as fingerprints for the document. A current window is positioned over a portion of the sequence of hash values. The hash values are examined starting from one end of the current window, and a first-encountered hash value that is 0 modulo P is selected to be a fingerprint for the current window. For information leakage prevention at a deployment point, a rolling hash calculation is performed on a target document, and a determination is made if a hash value is 0 modulo P. A first filter is applied if the hash value is 0 modulo P, and a second filter is otherwise applied. Other embodiments, aspects and features are also disclosed.
    Type: Grant
    Filed: May 16, 2008
    Date of Patent: October 4, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Xiaoming Zhao, Gang Chen, Kan Dong
  • Patent number: 8029683
    Abstract: A solar cell is fabricated by etching one or more of its layers without substantially etching another layer of the solar cell. In one embodiment, a copper layer in the solar cell is etched without substantially etching a topmost metallic layer comprising tin. For example, an etchant comprising sulfuric acid and hydrogen peroxide may be employed to etch the copper layer selective to the tin layer. A particular example of the aforementioned etchant is a Co-Bra Etch® etchant modified to comprise about 1% by volume of sulfuric acid, about 4% by volume of phosphoric acid, and about 2% by volume of stabilized hydrogen peroxide. In one embodiment, an aluminum layer in the solar cell is etched without substantially etching the tin layer. For example, an etchant comprising potassium hydroxide may be employed to etch the aluminum layer without substantially etching the tin layer.
    Type: Grant
    Filed: October 14, 2008
    Date of Patent: October 4, 2011
    Assignee: SunPower Corporation
    Inventors: Douglas H. Rose, Pongsthorn Uralwong, David D. Smith
  • Patent number: 8024807
    Abstract: A mechanism for determining a probabilistic security score for a software package is provided. The mechanism calculates a raw numerical score that is probabilistically linked to how many security vulnerabilities are present in the source code. The score may then be used to assign a security rating that can be used in either absolute form or comparative form. The mechanism uses a source code analysis tool to determine a number of critical vulnerabilities, a number of serious vulnerabilities, and a number of inconsequential vulnerabilities. The mechanism may then determine a score based on the numbers of vulnerabilities and the number of lines of code.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: September 20, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Kylene Jo Hall, Dustin C. Kirkland, Emily Jane Ratliff
  • Patent number: 8024790
    Abstract: A portable secured computing environment for performing online confidential transactions in an untrusted host computer. The secured computing environment may be loaded from a portable storage device, such as a USB stick, plugged into a peripheral port of the host computer. The secured computing environment may include a virtual machine running under a host operating system of the host computer. A secured operating system may be running in the virtual machine. An online application, such as a web browser in communication with an online service, may be run under the secured operating system. Operation of the online application may be restricted by a security profile. For example, the online application may only access network addresses specifically indicated in a whitelist of the security profile.
    Type: Grant
    Filed: April 11, 2007
    Date of Patent: September 20, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Xiaoming Zhao, Gang Chen, Heather Xing
  • Patent number: 8023974
    Abstract: In one embodiment, a content filtering system generates a support vector machine (SVM) learning model in a server computer and provides the SVM learning model to a mobile phone for use in classifying text messages. The SVM learning model may be generated in the server computer by training a support vector machine with sample text messages that include spam and legitimate text messages. A resulting intermediate SVM learning model from the support vector machine may include a threshold value, support vectors and alpha values. The SVM learning model in the mobile phone may include the threshold value, the features, and the weights of the features. An incoming text message may be parsed for the features. The weights of features found in the incoming text message may be added and compared to the threshold value to determine whether or not the incoming text message is spam.
    Type: Grant
    Filed: February 15, 2007
    Date of Patent: September 20, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Lili Diao, Vincent Chan, Patrick MG Lu
  • Patent number: 8019856
    Abstract: A scan client in a subnet of an intranet may be designated as a root agent to provide subnet information to a scan server in the intranet. The subnet information may include addresses of computers belonging to the subnet. The scan server may use subnet information collected from various root agents to build a map of the intranet. The intranet map may be forwarded from the scan server to the root agents, which in turn provide the intranet map to scan clients in their respective subnets. The root agents may also receive antivirus modules from the scan server for distribution to scan clients. A scan client may look for computers indicated in the intranet map to determine whether or not it is connected to the intranet.
    Type: Grant
    Filed: November 7, 2007
    Date of Patent: September 13, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Kun-Shan Lin, Chia-Chi Chang, Kai-Chih Hu
  • Patent number: 8008575
    Abstract: In one embodiment, a solar cell has base and emitter diffusion regions formed on the back side. The emitter diffusion region is configured to collect minority charge carriers in the solar cell, while the base diffusion region is configured to collect majority charge carriers. The emitter diffusion region may be a continuous region separating the base diffusion regions. Each of the base diffusion regions may have a reduced area to decrease minority charge carrier recombination losses without substantially increasing series resistance losses due to lateral flow of majority charge carriers. Each of the base diffusion regions may have a dot shape, for example.
    Type: Grant
    Filed: July 24, 2006
    Date of Patent: August 30, 2011
    Assignee: SunPower Corporation
    Inventors: Denis De Ceuster, Peter John Cousins
  • Patent number: 7996905
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: August 9, 2011
    Assignee: Trend Micro Incorporated
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7992156
    Abstract: In one embodiment, an address of a system call table is determined by invoking a first system call from a user-level program running in user space. When the first system call executes, the first system call retrieves the address of the system call table from kernel stack, which that has been populated by the kernel with various data including the address of the system call table. Using the retrieved address to locate the system call table, the system call table is modified to allow interception of calls made to one or more system calls included in the system call table. This allows a scan module to scan data for computer viruses before a system call is allowed to execute and operate on the data, for example.
    Type: Grant
    Filed: April 3, 2006
    Date of Patent: August 2, 2011
    Assignee: Trend Micro Incorporated
    Inventor: Chih Mu Wang
  • Patent number: 7992206
    Abstract: In one embodiment, an add-on pre-scanner card is removably pluggable into a local bus of a computer. The add-on pre-scanner card may be coupled to a computer network to receive network traffic. The add-on pre-scanner card may be configured to extract payloads from received packets and scan the payloads for computer viruses. The add-on pre-scanner card may pass scanned payloads and other data to the computer by way of a shared memory interface. The pre-scanner card may identify each payload as infected with a virus, virus-free, or unknown to allow the computer to distinguish payloads that do not need further scanning from those that do. The computer may further scan for viruses payloads that the pre-scanner card cannot ascertain as either virus free or virus infected.
    Type: Grant
    Filed: December 14, 2006
    Date of Patent: August 2, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Mark W. Painter, Jawed Sayed
  • Patent number: 7983152
    Abstract: One embodiment relates to a method of providing dual-homing in a Layer 2 switch. A determination is made as to whether a link is available to an upstream network on for a currently active port. If the link is unavailable, then the Layer 2 switch a) performs a switchover such that the currently active port becomes a newly passive port, and a currently passive port becomes a newly active port, b) clears entries in an address table of the Layer 2 switch, and c) spoofs MAC addresses out of the newly active link. Other embodiments are also disclosed.
    Type: Grant
    Filed: August 18, 2009
    Date of Patent: July 19, 2011
    Assignee: Garrettcom, Inc.
    Inventors: Dileep Sivasankaran, Frank S. Madren