Patents Represented by Attorney San Diego IP Law Group
-
Patent number: 8330342Abstract: This light emitting diode (LED) device provides a 360 degree lighting angle in the horizontal plane and a 300 degree lighting angle in the vertical plane while simultaneously addressing LED die thermal management, which is critical to high lumen output LEDs. This LED lighting device is comprised of the LED lens, the LED holder and the heat sink stem. Light produced by at least one LED die traveling vertically is diffused by the top refractive portion of the lens. Light rays directed towards the pointed elements are totally internally reflected downwards then refracted out of the lens, thus resulting in a spherical light pattern. This technology is designed as a replacement for conventional light sources, such as incandescent light bulbs, halogen bulbs, CFLs (compact fluorescent lamps) and metal halide lamps.Type: GrantFiled: December 21, 2009Date of Patent: December 11, 2012Inventor: Malek Bhairi
-
Patent number: 8301712Abstract: Most unsolicited commercial email (UCE) countermeasures call for a message by message analysis. However, some UCE attacks occur when a single sender of UCE floods a mail transfer agent (MTA) with a number of copies of a UCE, in a mail flood attack. The attacks rarely rise to the level of denial of service attacks but are significant enough to place a strain on MTAs and anti-UCE countermeasures. The anti-mail flood methodology disclosed herein provides a system and method for protecting mail systems from such mail flood attacks enabling anti-UCE countermeasures to work more efficiently.Type: GrantFiled: May 14, 2012Date of Patent: October 30, 2012Assignee: Engate Technology CorporationInventors: Haw-minn Lu, Richard Paul White
-
Patent number: 8180835Abstract: Most unsolicited commercial email (UCE) countermeasures call for a message by message analysis. However, some UCE attacks occur when a single sender of UCE floods a mail transfer agent (MTA) with a number of copies of a UCE, in a mail flood attack. The attacks rarely rise to the level of denial of service attacks but are significant enough to place a strain on MTAs and anti-UCE countermeasures. The anti-mail flood methodology disclosed herein provides a system and method for protecting mail systems from such mail flood attacks enabling anti-UCE countermeasures to work more efficiently.Type: GrantFiled: October 14, 2006Date of Patent: May 15, 2012Assignee: Engate Technology CorporationInventors: Haw-minn Lu, Richard Paul White
-
Patent number: 8164496Abstract: In a compensator for compensating mismatches, and in methods for such compensation, the compensator compensates for mismatches in output signals of a system with mismatches during normal operation of the system with mismatches. The compensator comprises: a mismatch estimator that monitors at least two mismatched signals output by the system with mismatches during normal operation and that generates matching parameters indicating an amount of mismatch between the at least two mismatched signals, the mismatch estimator updating the matching parameters during normal operation of the system with mismatches, and a mismatch equalizer that compensates mismatches in the mismatched signals output by the system with mismatches during normal operation of the system with mismatches in response to the matching parameters.Type: GrantFiled: October 20, 2010Date of Patent: April 24, 2012Inventor: Scott R. Velazquez
-
Patent number: 8117458Abstract: Systems and methods for providing authentication using an arrangement of dynamic graphical images, which may display a popup element while a pointing device indicator is over a graphical image. The graphical images can be arranged as a grid or matrix for presentation on a device display for authentication of a user. The kinds of graphical images can be derived from a designated authentication category and non-authenticating categories. A series of password elements corresponding to the graphical images can be displayed with the graphical images. The user may enter the series of one or more password elements corresponding to graphical images from the authentication category which combine to form a password entry. An authentication server can compare the password entry to an authentication password corresponding to the particular arrangement of dynamic graphical images.Type: GrantFiled: February 21, 2008Date of Patent: February 14, 2012Assignee: Vidoop LLCInventors: Steven L. Osborn, III, Nicholas A. Davis, James L. Sontag, Joel Norvell
-
Patent number: 8089688Abstract: The present invention provides an amplified spontaneous emission fiber optic source having high optical power (>20 mW) and a spectral broadband emission (>70 nm) centered near a wavelength of 1060 nm. In an embodiment of the invention, the fiber source comprises a combination of Yb-doped and Nd-doped silica fibers in a dual-pumping configuration. The Yb-doped optical fiber has a peak absorption coefficient of 350 dB/nm at 977 nm band, and the Nd-doped fiber used has a dopant concentration of 500 ppm-wt in a glass host of aluminum-germano-phospho-silicate. A combination of these two doped-fibers along with optical spectral filtering provides a broadband spectrum giving coherence length <7 ?m (in air), which is well suited for optical coherence imaging.Type: GrantFiled: June 11, 2009Date of Patent: January 3, 2012Assignee: Multiwave Photonics SAInventors: António B. Lobo Ribeiro, Irina Trifanov, Miguel Alexandre Ramos De Melo, Martin Ole Berendt, José António Ribera Salcedo, Rosa M. Muniz
-
Patent number: 7940198Abstract: The present invention provides an advanced adaptive predistortion linearization technique to dramatically reduce nonlinear distortion in power amplifiers over a very wide instantaneous bandwidth (up to 2 GHz) and over a wide range of amplifier types, input frequencies, signal types, amplitudes, temperature, and other environmental and signal conditions. In an embodiment of the invention, the predistortion linearization circuitry comprises (1) a higher-order polynomial model of an amplifier's gain and phase characteristics—higher than a third-order polynomial model; (2) an adaptive calibration technique; and (3) a heuristic calibration technique. The higher-order polynomial model is generated by introducing, for example, a plurality of multi-tone test signals with varying center frequency and spacing into the power amplifier. From the power amplifier's corresponding output, the nonlinearities are modeled by employing a higher-order curve fit to capture the irregularities in the nonlinear transfer function.Type: GrantFiled: June 16, 2010Date of Patent: May 10, 2011Assignee: V Corp Technologies, Inc.Inventor: Scott R. Velazquez
-
Patent number: 7827303Abstract: Protective proxies are used to shield a destination agent from undesirable source agents or transactions. Because protective proxies are usually tied to one but sometimes more fixed destination agents, they are usually configured directly to the destination agent. As a result, many protective proxies are lightweight and allow the destination agent to manage the protocol. As a result, a catastrophic condition can occur if the protective proxy is inadvertently misconfigured so that a connectivity loop occurs. A low level loop detected can be incorporated into the protective proxy. Alternatively, a loop detector which augments the existing application layer protocol can also be employed in a protective proxy.Type: GrantFiled: September 14, 2005Date of Patent: November 2, 2010Assignee: Engate Technology CorporationInventor: Haw-minn Lu
-
Patent number: 7716351Abstract: The spam blocker monitors the SMTP/TCP/IP conversation between a sending message transfer agent MTA—0 and a receiving message transfer agent MTA—1; catches MTA—0's IP address IP—0, MTA—0's declared domain D—0, from-address A—0; and to-address A—1; and uses this source and content based information to test for unsolicited messages. It interrupts the conversation when MTA—0 sends a RCPT command and uses the various test results to decide if the message is suspected of being unsolicited. If the message is suspected of being unsolicited and to-address is not in the save_spam database then the spam blocker logs the rejected message, sends an error reply to MTA—0 which forces MTA—0 to terminate the connection before the body of the message is transmitted.Type: GrantFiled: January 20, 2004Date of Patent: May 11, 2010Assignee: Engate Technology CorporationInventors: Richard Paul White, Alan Huang, Haw-minn Lu, Ira Victor Spivack
-
Patent number: D639213Type: GrantFiled: June 30, 2010Date of Patent: June 7, 2011Inventor: Kevin McElroy
-
Patent number: D653017Type: GrantFiled: February 11, 2011Date of Patent: January 31, 2012Inventor: Neal Hamlin
-
Patent number: D659284Type: GrantFiled: November 8, 2010Date of Patent: May 8, 2012Inventor: Liora Amkie
-
Patent number: D661291Type: GrantFiled: October 8, 2010Date of Patent: June 5, 2012Inventors: Gubbi Umesh Renukanand, Muhamad Azlan Hassan, Faizal Bin Sanusi, Meng Wee Phang