Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

54results about How to "Low false positive rate" patented technology

Malware detection using pattern classification

A malware classifier uses features of suspect software to classify the software as malicious or not. The classifier uses a pattern classification algorithm to statistically analyze computer software. The classifier takes a feature representation of the software and maps it to the classification label with the use of a trained model. The feature representation of the input computer software includes the relevant features and the values of each feature. These features include the categories of: applicable software characteristics of a particular type of malware; dynamic link library (DLL) and function name strings typically occurring in the body of the malware; and other alphanumeric strings commonly found in malware. By providing these features and their values to the classifier, the classifier is better able to identify a particular type of malware.
Owner:TREND MICRO INC

Rapid characterization of post-translationally modified proteins from tandem mass spectra

A software algorithm that matches tandem mass spectra created simultaneously and automatically to theoretical peptide sequences derived from a protein database is disclosed. The program characterizes shotgun proteomic data sets obtained from proteins (such as histones) that possess extensive posttranslational modifications that are often difficult to characterize. Data is searched against all theoretical peptides including all combinations of modifications. The program returns four scores to assess the quality of match. The employed algorithm is sensitive to mass accuracy. For high mass accuracy data, a false positive rate as low as 2% may be achieved. Monte Carlo Simulations were also used to obtain a solution to statistical models and calculate statistical scores. The program can also be used to automatically and directly identify disulfide linked proteins and peptides in tandem mass spectra without chemical reduction and / or other derivatization using a probabilistic scoring model.
Owner:THE OHIO STATE UNIV RES FOUND

System and method for information technology intrusion prevention

An open architecture, transparent and expandable system for proactively preventing cyber-attacks into and within a communication network of a user organization. The system includes a plurality of modals in the form of abstract security objects. The modals are the expandable feature of the system that perform at least one of the following security operations: Internet protocols (IP's); context-based pattern matching; target quarantine; faking responses; defragmentation; monitoring; a virtual honeypot; and protocol analysis, wherein the modals perform different operations using different data. The system also includes: a plurality of bricks, wherein the bricks are specific implementations of the modals, such that a brick equals a modal plus data, and such that the bricks create a course of action that defines the inspection flow within a single policy and between policy chains; a plurality of policies, wherein the policies are chains of bricks that are executed by the system architecture, wherein the security manager of the user organization may define the profile on which the policy will be performed; an intelligence database for storing information about the attacks and the attackers; and a modal system development kit (SDK), wherein third party companies develop new modals according to the open architecture, and transparently integrate the new modals into the system.
Owner:COBRADOR

Optical device for detecting and identifying damaged paper money by using photosensitive element

The invention relates to an optical device for detecting and identifying damaged paper money by using a photosensitive element. The optical device comprises a luminous tube array, a receiving tube array, a light transmission board and a bracket, wherein the light transmission board is fixedly arranged above the bracket; a luminous signal processing circuit board and a received signal processing circuit board are fixedly arranged at the inner bottom of the bracket; the inner part of the bracket is partitioned into relatively independent light detection cavities by partition walls; each light detection cavity is opposite to the luminous signal processing circuit board and the received signal processing circuit board; and the luminous tube array and the receiving tube array which are matched with each other in the light detection cavity are fixed on the luminous signal processing circuit board and the received signal processing circuit board respectively. By the optical device, the shortcomings of high error distinction rate and leakage rate, high cost, high maintenance requirement and high installation difficulty in the prior art are overcome; due to the specific design, whether various damages exist on paper money or not can be judged accurately; and the optical device has the advantages of low cost, simple structure and low mechanical installation requirement; furthermore, the optical device is not contacted with the paper money, so the optical device is not required to be maintained frequently.
Owner:温州泓鼎商用机器有限公司

Systems and/or methods for static-dynamic security testing using a test configurator to identify vulnerabilities and automatically repair defects

Certain example embodiments test an application for security vulnerabilities. Binary and / or source code representations are subjected to static testing. Static testing identifies potential security weaknesses in the application. For each potential security weakness, a corresponding dynamic test set, containing one or more test cases, is generated based on (i) the corresponding potential security weakness, and (ii) lookups to weakness, application context, and attack pattern databases. The weakness database includes different weakness types and descriptions thereof. The attack pattern database includes information about how to generate attacks for the different weakness types. An instance of the application running in a test runtime environment is dynamically tested using the dynamic test cases. The dynamic test results verify whether each potential security weakness is a real vulnerability. The dynamic test results include fewer false-positives than the raw static test results. Verified security weakness of the application are repairable automatically.
Owner:SOFTWARE AG

Methods for behavioral detection and prevention of cyberattacks, and related apparatus and techniques

A security engine may use event-stream processing and behavioral techniques to detect ransom ware. The engine may detect process behavior associated with encrypting a file, encrypting a storage device, or disabling a backup file, and may assign a ransomware category to the process based thereon The engine may initiate protection actions to protect system resources from the process, which may continue to execute. The engine may monitor the process for specific behavior corresponding to its ransomware category. Based on the extent to which such specific behavior is detected, the engine may determine that the process is not ransomware, assign a ransomware subcategory to the process, or adjust the process's threat score. Monitoring of the process may continue, and the threat score may be updated based on the process's behavior. If the threat score exceeds a threshold corresponding to the ransomware category (or subcategory), a corresponding policy action may be initiated.
Owner:VMWARE INC

Fingerprint and Voiceprint Dual Authentication Method

The invention discloses a fingerprint and voiceprint dual-authentication method and a fingerprint and voiceprint collector. The dual-authentication method includes: collecting a fingerprint and triggering voice collection at the same time; performing fingerprint recognition on the collected user fingerprint to obtain a fingerprint recognition score, performing voiceprint recognition on the collected user voice to obtain a voiceprint recognition score; performing integrated computation on the fingerprint recognition score and the voiceprint recognition score to obtain an integrated authentication score; judging a user identity according to the integrated authentication score; if the integrated authentication score is higher than or equal to a preset threshold, considering that both the fingerprint and the voiceprint come from a claimed user himself and the authentication passes, otherwise, considering that the authentication fails in passing. The fingerprint and voiceprint collector comprises a master control circuit which is connected with a fingerprint collector, a microphone and a fingerprint and voiceprint colligative authentication system. Fingerprint recognition and voiceprint recognition are combined to perform dual authentication, and accurately, safety and reliability of local and remote identity authentication are improved greatly by the dual-authentication mode.
Owner:BEIJING D EAR TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products