Search Results - Security

5 Results Sort By:
Mechanisms for Placing Physical Boundaries on Information Access/Storage and Computation of Mobile Devices (Ghost Box)
This research provides the algorithms, mechanisms, and architectures for placing physical boundaries on where commodity mobile devices can access/store information. The research includes algorithms/mechanisms for proximity authentication to prove that a device is in a specific location. Moreover, the work includes secure information jailing mechani...
Published: 3/14/2017   |   Inventor(s): Christopher White, Paul Miranda, Hamilton Turner, Daniel Guymon
Keywords(s):  
Category(s): Security
Casuality Analysis and Visualization Methods and Systems for Network Security
Studies estimate that nearly 25% of computers around the world are infected with malware, resulting in billions of dollars of damages. Stealthy malware residing on compromised machines can spy on the user, exfiltrating sensitive information and documents, abusing system and network resources, and disrupting user activities. Patching and scanning ar...
Published: 8/12/2014   |   Inventor(s): Danfeng (daphne) Yao, Hao Zhang
Keywords(s):  
Category(s): Computer Software, Security
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
To minimize the exposure of sensitive data and documents, an organization needs to prevent cleartext sensitive data from appearing in the storage or communication. We invent a novel data-leak screening tool that can be deployed to scan computer file systems, server storage, and inspect outbound network traffic for exposed sensitive data. The tool s...
Published: 1/8/2014   |   Inventor(s): Danfeng (daphne) Yao, Xiaokui Shu, Fang Liu
Keywords(s):  
Category(s): Computer Software, Security
Shepherd AUV
The Shepherd Autonomous Underwater Vehicle (AUV) is a fully autonomous underwater vehicle that is designed for general survey missions. Its design allows the use low friction dynamic seals to prevent catastrophic failure at higher depths.
Published: 7/15/2013   |   Inventor(s): Wayne Neu, Daniel Stilwell, Brian Mccarter, Timothy Pratt, Stephen Portner, Jason Mims, Dexter Malley
Keywords(s):  
Category(s): Devices, Electrical, Energy, Engineering, Environment, Security
A Technique for Synchronized Dynamically Obscured Addresses in IPv6
The Moving Target IPv6 Defense (MT6D) dynamically obscures network and transport layer addresses of packets to achieve anonymity, including authentication privacy, as well as protection against address tracking and traffic correlation. MT6D is an improvement over prior static approaches where, once they have been assigned, addresses remain constant...
Published: 9/5/2012   |   Inventor(s): Stephen Groat, Matthew Dunlop, William Urbanski, Randolph Marchany, Joseph Tront
Keywords(s):  
Category(s): Security
© 2019. All Rights Reserved. Powered by Inteum