Patents by Inventor Myles Jordan
Myles Jordan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11870575Abstract: Systems and methods for error detection in video data is described. An encoding computing system can receive a video frame. The encoding computing system can encode and decode the video frame based on an encoding scheme. The encoding computing system can generate a frame error detection code for the decoded video frame based on an error detection code generation scheme. The encoding computing system can send the encoded video frame and the error detection code to a decoding computing system. The decoding computing system can decode the encoded video frame and generate a second error detection code using the code generation scheme. The decoding computing system can detect that the decoded video frame is corrupted by comparing the error detection code and the second error detection code.Type: GrantFiled: May 5, 2020Date of Patent: January 9, 2024Assignee: GOOGLE LLCInventors: Sergey Anatolyevich Babkin, Myles Jordan
-
Publication number: 20210351867Abstract: Systems and methods for error detection in video data is described. An encoding computing system can receive a video frame. The encoding computing system can encode and decode the video frame based on an encoding scheme. The encoding computing system can generate a frame error detection code for the decoded video frame based on an error detection code generation scheme. The encoding computing system can send the encoded video frame and the error detection code to a decoding computing system. The decoding computing system can decode the encoded video frame and generate a second error detection code using the code generation scheme. The decoding computing system can detect that the decoded video frame is corrupted by comparing the error detection code and the second error detection code.Type: ApplicationFiled: May 5, 2020Publication date: November 11, 2021Inventors: Sergey Anatolyevich Babkin, Myles Jordan
-
Patent number: 10999344Abstract: Systems and methods for multi-attendee video conferencing are described. A system can receive a request to stream video associated with a first attendee for a high-resolution display region and video associated with a second attendee for a low-resolution display region at a client device. The system can generate a first video stream for the first attendee at a first resolution for the high-resolution display region. The system can determine a second resolution for a second video stream for the second attendee that is larger than a requested resolution for the low-resolution display region. The system can determine a video quality for the second video stream at the second resolution based on maximizing use of a bandwidth. The system can generate the second video stream for the client device.Type: GrantFiled: June 15, 2020Date of Patent: May 4, 2021Assignee: Google LLCInventors: Sergey Anatolyevich Babkin, Myles Jordan
-
Patent number: 8830271Abstract: A density smoothing server determines the zoom level at which one or more points-of-interest are to be displayed on an electronic map. The density smoothing server may be in communication with a global points-of-interest database, where the global points-of-interest database includes previously ranked points-of-interest. The density smoothing server selects a group of points-of-interest as local points-of-interest and extracts the local points-of-interest, along with corresponding prominence values, from the global points-of-interest database. Using a centroid determination manager and a centroid surface manager, the density smoothing server determines a number of centroids for the surface of the electronic map and then constructs centroid surfaces based on the determined centroids. A zoom level is assigned to each of the extracted local points-of-interest based on a comparison of the prominence values for the local points-of-interest with the constructed centroid surfaces.Type: GrantFiled: January 7, 2011Date of Patent: September 9, 2014Assignee: Google Inc.Inventors: Myles Jordan, Bernhard Seefeld
-
Patent number: 8341743Abstract: A method and apparatus for detecting viral code that uses calls to an operating system to damage computer systems, computers and/or computer files is provided. The apparatus comprises a CPU emulator, a memory manager component and a monitor component. An artificial memory region spanning one or more components of the operating system is created by the memory manager component. Execution of computer executable code in a subject file is emulated by the CPU emulator. An attempt by the emulated computer executable code to access the artificial memory region is detected by the monitor component. The apparatus optionally may comprise an auxiliary component and an analyzer component. The auxiliary component determines an operating system call that the emulated computer executable code attempted to access. The analyzer component monitors the operating system call to determine whether the computer executable code is viral.Type: GrantFiled: July 14, 2001Date of Patent: December 25, 2012Assignee: CA, Inc.Inventors: Antony John Rogers, Trevor Yann, Myles Jordan
-
Patent number: 8140492Abstract: According to one embodiment, a method for transposing data trees includes translating a first data tree and a second data tree into a first format. A label within the second data tree is replaced with a label within the first data tree if the data in the first data tree matches the data in the second data tree and such a label is provided in the first data tree. The replaced label is stored in a third data tree, and the third data tree is translated into a second format.Type: GrantFiled: September 29, 2005Date of Patent: March 20, 2012Assignee: Computer Associates Think, Inc.Inventor: Myles Jordan
-
Patent number: 7350235Abstract: A method of detecting decryption of encrypted viral code is provided. Executable code in a subject file is emulated by a code emulator. A memory monitor monitors memory access information supplied by the emulator. A memory area that is read during emulation of an instruction in the code is flagged. Modification to the flagged memory area which was read is determined. The memory monitor determines whether a memory region that is contiguous with the modified memory area, and then updates the memory region to encompass the modified memory area. The memory monitor also determines whether the updated memory region is larger than a predetermined size to trigger viral detection. The detection method may be embodied in a computer system, in a computer program (or some unit of code) stored on a computer readable medium, such as a floppy disk, CD, DVD, etc., and/or transmitted via a network, such as the Internet, or another transmission medium.Type: GrantFiled: July 14, 2001Date of Patent: March 25, 2008Assignee: Computer Associates Think, Inc.Inventor: Myles Jordan
-
Patent number: 7231667Abstract: A computer virus detection method includes compiling a list of heuristic events and a chronological order in which they occur, comparing the list of heuristic events and the chronological order with a defined list of heuristic events occurring in a defined chronological order and determining whether a computer virus is present based on a result of the comparing.Type: GrantFiled: May 29, 2003Date of Patent: June 12, 2007Assignee: Computer Associates Think, Inc.Inventor: Myles Jordan
-
Patent number: 7210040Abstract: Methods and apparatus for detecting computer viruses that attempt to gain access to restricted computer system resources are provided. The apparatus comprises an emulator component, a monitor component and a detector component. The emulator emulates computer executable code in a subject file. The monitor component monitors emulation of the computer executable code and monitoring a memory state of the computer system for modifications caused by the emulated instructions in the computer executable code. Based on information supplied by the monitor component regarding the emulated code and any modifications of the memory state, the detector component detects an attempt by the emulated code to access one or more of the restricted computer system resources.Type: GrantFiled: July 14, 2001Date of Patent: April 24, 2007Assignee: Computer Associates Think, Inc.Inventor: Myles Jordan
-
Publication number: 20070073752Abstract: According to one embodiment, a method for transposing data trees includes translating a first data tree and a second data tree into a first format. A label within the second data tree is replaced with a label within the first data tree if the data in the first data tree matches the data in the second data tree and such a label is provided in the first data tree. The replaced label is stored in a third data tree, and the third data tree is translated into a second format.Type: ApplicationFiled: September 29, 2005Publication date: March 29, 2007Inventor: Myles Jordan
-
Publication number: 20040243829Abstract: A computer virus detection method includes compiling a list of heuristic events and a chronological order in which they occur, comparing the list of heuristic events and the chronological order with a defined list of heuristic events occurring in a defined chronological order and determining whether a computer virus is present based on a result of the comparing.Type: ApplicationFiled: May 29, 2003Publication date: December 2, 2004Applicant: Computer Associates Think, Inc.Inventor: Myles Jordan
-
Publication number: 20020091934Abstract: A method of detecting decryption of encrypted viral code is provided. Executable code in a subject file is emulated by a code emulator. A memory monitor monitors memory access information supplied by the emulator. A memory area that is read during emulation of an instruction in the code is flagged. Modification to the flagged memory area which was read is determined. The memory monitor determines whether a memory region that is contiguous with the modified memory area, and then updates the memory region to encompass the modified memory area. The memory monitor also determines whether the updated memory region is larger than a predetermined size to trigger viral detection. The detection method may be embodied in a computer system, in a computer program (or some unit of code) stored on a computer readable medium, such as a floppy disk, CD, DVD, etc., and/or transmitted via a network, such as the Internet, or another transmission medium.Type: ApplicationFiled: July 14, 2001Publication date: July 11, 2002Applicant: Computer Associates Think, Inc.Inventor: Myles Jordan
-
Publication number: 20020083334Abstract: A method and apparatus for detecting viral code that uses calls to an operating system to damage computer systems, computers and/or computer files is provided. The apparatus comprises a CPU emulator, a memory manager component and a monitor component. An artificial memory region spanning one or more components of the operating system is created by the memory manager component. Execution of computer executable code in a subject file is emulated by the CPU emulator. An attempt by the emulated computer executable code to access the artificial memory region is detected by the monitor component. The apparatus optionally may comprise an auxiliary component and an analyzer component. The auxiliary component determines an operating system call that the emulated computer executable code attempted to access. The analyzer component monitors the operating system call to determine whether the computer executable code is viral.Type: ApplicationFiled: July 14, 2001Publication date: June 27, 2002Inventors: Antony John Rogers, Trevor Yann, Myles Jordan
-
Publication number: 20020073323Abstract: Methods and apparatus for detecting computer viruses that attempt to gain access to restricted computer system resources are provided. The apparatus comprises an emulator component, a monitor component and a detector component. The emulator emulates computer executable code in a subject file. The monitor component monitors emulation of the computer executable code and monitoring a memory state of the computer system for modifications caused by the emulated instructions in the computer executable code. Based on information supplied by the monitor component regarding the emulated code and any modifications of the memory state, the detector component detects an attempt by the emulated code to access one or more of the restricted computer system resources.Type: ApplicationFiled: July 14, 2001Publication date: June 13, 2002Inventor: Myles Jordan