Abstract: Two-bladed vertical axis wind turbines (VAWT) have many efficiency advantages over turbines with other numbers of blades. Principles for making them in the ideal fashion are presented for both drag and lift configurations.
Type:
Grant
Filed:
May 26, 2010
Date of Patent:
February 9, 2016
Assignee:
Leviathan Energy Wind Lotus Ltd.
Inventors:
Daniel Farb, Joe Van Zwaren, Avner Farkash, Ken Kolman
Abstract: Methods, systems and media are shown for detecting a heap spray event involving examining user allocated portions of heap memory for a process image, determining a level of entropy for the user allocated portions, and, if the level of entropy is below a threshold, performing secondary heuristics, and detecting a heap spray event based on results of the secondary heuristics. In some examples, performing the secondary heuristics may include analyzing a pattern of memory allocation for the user allocated portions, analyzing data content of the user allocated portions of heap memory, or analyzing a heap allocation size for the user allocated portions of heap memory.
Abstract: Systems, methods and media are shown for automatically detecting a use-after-free exploit based attack that involve receiving crash dump data relating to a fault event, determining whether the fault event instruction is a call type instruction and, if so, identifying a UAF attack by checking whether it includes a base address in a first register that stores a pointer to free memory and, if so, generating a UAF alert. In some examples, generating a use-after-free alert includes automatically sending a message that indicates a UAF attack or automatically triggering a system defense to the UAF attack. Some examples may include, for a call type faulting instruction, identifying a UAF attack, checking whether a base address in the first register includes a pointer in a second register to a free memory location associated with the base address.
Abstract: Systems and methods are shown for detecting potential attacks on a domain, where one or more servers, in response to a failure event, obtain a lambda value from a baseline model of historical data associated with a current time interval corresponding to the failure event, determine a probability of whether a total count of failure events for the current time interval is within an expected range using a cumulative density function based on the lambda value, and identify a possible malicious attack if the probability is less than or equal to a selected alpha value.
Type:
Application
Filed:
June 11, 2015
Publication date:
January 7, 2016
Applicant:
LEVIATHAN, INC.
Inventors:
Falcon Momot, Lorne Schell, Duncan Smith
Abstract: Methods are disclosed for improving security of computer software and preventing potential attackers from gaining control of computer software via function pointer overwrite attacks. One or more additional layers of complexity may be imposed that would have to be circumvented in order to gain execution control over portions of software. One or more function pointers can be encoded using a value that may be generated on program initialization and decoded before any dynamic function call occurs. In the event of memory corruption that affects an encoded function pointer, the value will cause the destination of the function pointer to decode to an invalid and random address and will induce an error. An application may be prevented from calling an attacker corrupted function pointer by introducing various checks around the call point at compile time that check the validity of the destination to which the function pointer points.
Abstract: The special circumstances of working with hydroelectric turbines in pipes require innovations in blade shapes and systems that are presented here. An example is streamlining of the blades greater than that found in traditional hydroelectric turbines.
Type:
Grant
Filed:
May 26, 2010
Date of Patent:
July 14, 2015
Assignee:
Leviathan Energy Hydroelectric Ltd.
Inventors:
Daniel Farb, Joe Van Zwaren, Avner Farkash, Ken Kolman
Abstract: A video game system includes a feature in which contracts can be formed and enforced. Virtual and/or real world obligations, penalties and remedies are available for entities that are parties to or breach contracts or other obligations in virtual contracts.
Abstract: Processes and products according to embodiments of the invention include video games with the possibility to obtain funding, such as through venture capital or the issuance of private shares among player characters.
Abstract: According to various embodiments, a video game allows one or more players to enter contracts, where credit cards or other financial instruments are used to secure the contracts. A player defaulting on such a contract can be subjected to penalties in the video game and/or in the real world.
Abstract: According to an embodiment, a video game permits valuation of a game environment and/or sharing value in the game. For example, players can buy and sell whole or fractional portions of the revenue sources derived from a particular game environment. The ownership may be represented as debt, stock or as some other allocations mechanism.
Abstract: Processes and products according to embodiments of the invention include video games with the possibility to obtain funding, such as through venture capital or the issuance of private shares among player characters.
Abstract: In an embodiment, apparatus and methods for video games permit obtaining funding for developing game environments. A variety of possible funding sources are possible, such as venture capital, the issuance of private shares, transforming the game environment into a public company through an initial public offering, or through a follow on offering such as the issuance of common stock, preferred stock, or treasury stock.
Abstract: Video game methods and apparatus permit contracts to be formed and enforced within a video game. Virtual and/or real world obligations, penalties and remedies are available for entities that are parties to or breach contracts or other obligations in virtual contracts.
Abstract: According to an embodiment, a virtual environment is configured in which characters are able to engage in a variety of financial transactions is provided. Characters who are unable to fulfill their financial obligations may enter into bankruptcy. Bankruptcy contracts may identify various conditions which must be fulfilled by the character in order to get out of bankruptcy. While in bankruptcy, the player's avatar or avatar's may be altered to indicate to the player and/or others that the character represented by the avatar is in bankruptcy.
Abstract: According to various embodiments, a video game allows one or more players to enter contracts, where credit cards or other financial instruments are used to secure the contracts. A player defaulting on such a contract can be subjected to penalties in the video game and/or in the real world.
Abstract: Methods are disclosed for improving security of computer software and preventing potential attackers from gaining control of computer software via function pointer overwrite attacks. One or more additional layers of complexity may be imposed that would have to be circumvented in order to gain execution control over portions of software. One or more function pointers can be encoded using a value that may be generated on program initialization and decoded before any dynamic function call occurs. In the event of memory corruption that affects an encoded function pointer, the value will cause the destination of the function pointer to decode to an invalid and random address and will induce an error. An application may be prevented from calling an attacker corrupted function pointer by introducing various checks around the call point at compile time that check the validity of the destination to which the function pointer points.
Abstract: A virtual environment in which characters are able to engage in a variety of financial transactions is provided. Characters who are unable to fulfill their financial obligations may enter into bankruptcy. Bankruptcy contracts may identify various conditions which must be fulfilled by the character in order to get out of bankruptcy. While in bankruptcy, the player's avatar or avatar's may be altered to indicate to the player and/or others that the character represented by the avatar is in bankruptcy.
Type:
Grant
Filed:
March 29, 2007
Date of Patent:
December 17, 2013
Assignee:
Leviathan Entertainment, LLC
Inventors:
Andrew S. Van Luchene, Raymond J. Mueller
Abstract: Players of a video game can enter contracts and engage in various simple or complex financial transactions employing credit systems such as credit cards, other financial instruments and other mechanisms to facilitate the enforcement of such contracts. Default on agreements by players or player characters can result in financial penalties which the video game system can apply.
Abstract: An in-pipe turbine has uses in energy storage and circulation. Specific applications are in storage systems working by elevation, smart grid systems, pressure release, and heating/cooling systems.
Type:
Application
Filed:
May 26, 2010
Publication date:
August 15, 2013
Applicant:
Leviathan Energy Hydroelectric Ltd.
Inventors:
Daniel Farb, Joe Van Zwaren, Avner Farkash, Ken Kolman
Abstract: According to an embodiment, various features in an online video game permit characters to provide assistance to other characters, and to advertise offers to help other characters. In an embodiment, the game tracks the amount of helpfulness of each character and permits rewards to be received based on the amount of helpfulness provided.