New Error Detection Patent Applications on Peer-to-Patent

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Email not displaying correctly? View it in your browser.

New Error Detection Applications
System Security Technologies A Priority for Many Applicants
In the information age, error detection and system security have become increasingly important.  Peer-to-Patent has recently posted a number of patent applications dealing with error/fault detection and system security.  

In their second patent application on Peer-to-Patent, eBay has submitted an application relating to exception detecting and alerting.  An error may occur in an application that is running in a testing system and/or production system. The error may be reported in the system as an exception.  Examples include environmental exceptions or programming logic exceptions.  The exception may be written to a log file for tracking and to enable further analysis. However, it may be time consuming to review the log.  For example, a developer may be unable to distinguish whether a particular error occurred with the same application or a different application on the server, the error was previously resolved but is occurring again, the error is the result of an environmental change or a change to the code of the application, and the like.  The patent application describes a method and system for exception detecting and alerting.  An exception indicating an occurrence of an error in an application and a path to the exception in an application space may be received. The received exception may be compared to a stored exception in a prior version of an exception data structure to determine whether the received exception is a new exception. The exception data structure may include a plurality of stored exceptions and the results of the comparison may be provided. The application will be available for review on Peer-to-Patent until July 1, 2009.

Red Hat has submitted patent application for the verification of loadable objects.  Operating systems generally include loading functions that enable loadable objects (e.g., device drivers, programs, dynamic link libraries (dlls), etc.) to be loaded into memory. When one of these loading functions receives a request to load an object into memory, it checks to ensure that the object is loadable before loading it into memory (e.g., that the structure of the object will support being loaded).  Commercial on-access virus scanners are third party applications that scan loadable objects for known virus signatures before the loadable objects are loaded into memory. However, on-access virus scanners do not prevent loadable objects from being loaded if the loadable object includes an unknown virus, if the loadable object has been modified, or if the loadable object has been corrupted. This patent application will be available for review until June 24, 2009

Similarly, Broadcom has submitted a patent application concerning the analysis of security threats.  Modern information systems are plagued by a variety of security problems such as viruses, worms, applications changing a user’s TCP port settings, malformed packets, etc.. Many of these problems arise from the fact that a given information processing component may be connected broadly to a large universe of other components and users, such as the internet. Some of these interactions, however, may be malicious. The existing technologies for defending against such attacks tend to require significant processing and memory. These requirements may be a problem for some systems thus making them more vulnerable to attack.  Some other devices, such as cable modems, have little processing power and memory.  Such an embedded device therefore has limited functionality for functions other than the basic operations required of it. There is therefore a need for a system and method that addresses the above security concerns with the limited computational resources of an embedded device or other lightweight device. The patent application relates to multi-stage deep packet inspection for lightweight devices. Three stages are used, each of which addresses a particular category of threat by examining the headers and/or payload of each packet ("deep packet inspection"). The first stage detects incoming viruses or worms. The second stage detects malicious applications. The third stage detects attempts at intrusion. These three stages are followed by a fourth stage that sends any detected possible attacks to a central verification facility. In an embodiment of the invention, the verification facility is a server, coupled with a database. Here, suspect packets are compared to entries in the database to more comprehensively determine whether or not the packets represent an attempt to subvert the information processing system. This patent application will be available for review until June 24, 2009.

Discretix Technologies has taken a different approach to software security.  Their patent application applies to concealing data processed in an integrated circuit.  The patent covers both an integrated circuit and a method of concealing data using an integrated circuit.  The integrated circuit incorporates a semi-random signal modifier that changes the state transition of the signal being processed.  Examples of these semi-random changes can include changes to power consumption, electromagnetic radiation of the circuit, or time delay in processing a signal in the circuit.  The method claimed essentially applies these semi-random changes or modifications to signals passing through an integrated circuit.  The patent application describes a device, system, and method of obfuscating data processed within an integrated circuit.  The claimed invention described has potential uses in security software, rights management software, and potentially other areas as well.


Database Management Patent Applications on Peer-to-Patent
A Number of Database Related Submissions from IBM Expiring Soon

IBM has number of patent applications concerning database technology posted on Peer-to-Patent that will be expiring soon.  The first such submission describes a method and apparatus for managing database records rejected due to referential constraints.  The claimed invention provides techniques for managing database records due to referential constraints. In one embodiment of this invention, such rejected records may be automatically processed. If automatically processed, the foreign key value attached to a rejected record may be forwarded to the parent table, and the rejected record may be reinserted to the destination table. In another embodiment, rejected records may be set aside in a rejection queue, and then presented to the user through a graphical interface unit (GIU). The GIU may be programmed to allow the user to manually update the parent table to include the missing foreign key value. The GIU may also be programmed to allow the user to select specific records to be added to their intended destination tables.  This patent application will be available until June 11, 2009

Another submission from IBM describes a method, system, and program product for building hierarchies.  Generally, the claimed invention enables a hierarchy to be built based on a user-defined starting point and limited to known compatibilities and/or business rules. In particular, the claimed invention allows a user to define both a hierarchy with one or more peers and no parent, and a hierarchy with one or more peers and a parent, subject to valid relationships only.   The claimed invention enables the user to define the starting point and drive in any desired direction as well as allows the user to define restrains on permissible relationships, thus limiting the relationships extant in the original data, or the known combining sets.  The patent application claims a method, system, and computer-implementable medium encoded with a program for building hierarchies; method for deploying a system for building hierarchies; software embodied with a propagated signal for building hierarchies; data processing system for building hierarchies; and a computer-implemented business method for building hierarchies.  This patent application will be available until June 3, 2009

Finally, IBM has submitted a patent application for a coverage analysis tool for database-aware applications.  Embodiments of this invention are related to testing devices of software applications. In particular, this invention provides coverage analysis of database elements accessed by a software application, therefore providing a more thorough testing of database-aware applications. In one embodiment of this invention, software configured to access a source code may be evaluated. In another embodiment, database elements accessed by the software application may be determined by a run-time test of the software application.  This application will be available until May 31, 2009



 

 



Expiring Applications
Below are links to applications that are expiring on or before July 1:

Virtual prepaid or credit card and process and system for providing same and for electronic payments (From VOICE.TRUST AG)
Methods and apparatus for incorporating a partial page on a client (From Richard Hayton)
Reducing likelihood of data loss during failovers in high-availability systems (From IBM)
Troubleshooting temporal behavior in "combinational" circuits (From PARC)
Dynamic domain abstraction through meta-analysis (From PARC)
Real time automated exception notification and reporting solution
(From Thomas DiMuzio)
System and method for balancing goal guarantees and optimization of revenue in advertisement delivery under uneven, volatile traffic conditions (From Yahoo!)
Apparatus, system, and method for ensuring query execution plan stability in a database management system (From IBM)
Process of encryption and operational control of tagged data elements (From Edward Scheidt) 
Diagnosing intermittent faults (From PARC)
Hybrid robust predictive optimization method of power system dispatch (From GE)
Electronic commerce rule-based multi-selection gifting (From Orix Venture Finance)
Soberteen(TM) driving insurance (From Markets, Patents, & Alliances)
Method and system for loan application non-acceptance follow-up (From PIPM II)
Education system to improve online reputation (From eBay)
Hybrid vehicle recharging system and method of operation (From ConEd)

New Applications
Below are links to applications that just been posted on Peer-to-Patent:

Systems and methods for displaying and visualizing information (From GE)
Data processing apparatus with shadow register and method thereof (From Wenshine Technologies)
Dynamic two-stage clinical data archiving and retrieval solution (From GE)
Method, system and device for enabling the public to access organizations' directories (From Wenshine Technologies)
Systems and methods for encrypting patient data (From GE)
Systems and methods for obtaining and preserving health care information (From Future Health Strategies)
Trade strategy monitor tool (From FMR)
Method and system of determining vulnerability of web application (From NHN Corp.)
Method for providing tissue products having coordinated decor features (From Proctor & Gamble)
Efficient hash based full-outer join (From Oracle)
System and method for masking arbitrary boolean functions (From Discretix Technologies)

For more information on how to participate, visit the DoTank at:

http://dotank.nyls.edu/communitypatent

Peer-to-Patent is accepting patent applications for Computer Architecture, Software, and Information Security as well as Business Methods and E-Commerce (class 705).


You are receiving this email because you are a valued member of the Peer-to-Patent community. Feel free to opt out of receiving future correspondence.

Unsubscribe @xxxxxxxxxxx from this list.

Our mailing address is:
Peer-to-Patent
IILP
57 Worth St
New York, NY 10013

Our telephone:
212-431-2368
Add us to your address book


This work is licensed by Peer-to-Patent under a Creative Commons Attribution-ShareAlike 2.5 License

Forward
this email to a friend
Update your profile

[Index of Archives]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Photo]     [Yosemite]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]     [Linux Resources]

  Powered by Linux