Search Results - Wireless Technologies

9 Results Sort By:
An Extension of RDP Code with Optimal Decoding Procedure
Extended Row Diagonal Parity (EDP): RAID-6 Technology with Optimal Decoding Description: In modern data storage systems, Redundant Array of Independent Disks (RAID) techniques are preferred for achieving high performance and reliability. RAID systems protect data against disk failures by constructing an array of hard disks with redundant infor...
Published: 7/15/2016   |   Inventor(s): Yu Chen, Jun Feng
Keywords(s):  
Category(s): Computers, Wireless Technologies
EEO: an Efficient MDS-like RAID-6 Code for Parallel Implementation
Extension of the Even-Odd (EEO): RAID-6 Code for Parallel Implementation Description: Data storage technology has been recognized as one of the main dimensions of modern information technology. Traditionally, Redundant Array of Independent Disks (RAID) systems provide fault tolerance and capacity for recovery by making use of data redundancy. ...
Published: 7/15/2016   |   Inventor(s): Yu Chen, Jun Feng
Keywords(s):  
Category(s): Computers, Wireless Technologies
ODD: Protecting Sensitive Data in Mobile Devices by Out-of-order Data Division
TRIPLE-LAYER DISTRIBUTED DATA STORAGE SECURITYINVENTOR:Yu ChenDESCRIPTIONTechnologists are looking to achieve a balance between making data difficult to be illegally or maliciously compromised while providing legitimate data users and owners sufficient encryption protection that does not overly strain the computing power, storage space, processing ...
Published: 7/15/2016   |   Inventor(s): Yu Chen
Keywords(s):  
Category(s): Computers, Wireless Technologies
Displacement Sensor
This invention involved a sensor to detect the displacements of the substrate to which the proof mass is attached and is carefully designed to detect the montions. We have performed extensive preliminary work to validate the design. This includes simplified analyses of the response of only the first mode of vibration; we considered only one deg...
Published: 7/15/2016   |   Inventor(s): Ronald Miles, Weili Cui, Quang Su, Vladimir Bogachuk
Keywords(s):  
Category(s): Computers, Wireless Technologies
Hardware Mechanism for Authenticating Program Execution at Run-time in a Microprocessor
Hardware Mechanism for Authenticating Program Execution at Run-time in a Microprocessor A mechanism for validating the legal execution path and instructions along the legal execution path that works in parallel with normal program execution and imposes a very small performance penalty is disclosed. The reference information for the validation ...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s):  
Category(s): Computers, Wireless Technologies
System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures
System and Method for Validating Program Execution at Run-Time Using Control Flow SignaturesDescription:A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host platform and its software environment are poten...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s):  
Category(s): Computers, Wireless Technologies
System and Method for Validating Program Execution at Run-Time
System and Method for Validating Program Execution at Run-TimeDescription:Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues to worsen; novel attacks appear with high frequency and employ...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s):  
Category(s): Computers, Wireless Technologies
Authentication of Remotely Executed Program
System and Method for Authenticating Remote ExecutionDescription:As distributed systems become pervasive, security mechanisms have to be geared up to meet the increasing threats against such systems. For grid computing and other systems to become truly pervasive, mechanisms are needed to not only authenticate the remote serves but also to authentic...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s):  
Category(s): Computers, Wireless Technologies
Intrusion Detection using Object Access Graphs
Intrusion Detection Using Object Access GraphsTimely detection and elimination of advanced mal-ware is a pressing concern to even the most modern computer network system. Consequently, intrusion detection is a very active area of research that continually evolves to combat mal-ware.The objective of this technology is to provide defense mechanisms f...
Published: 1/28/2016   |   Inventor(s): Andrey Dolgikh, Victor Skormin, Alexander Volynkin, Arnur Tokhtabayev
Keywords(s):  
Category(s): Computers, Wireless Technologies
© 2018. All Rights Reserved. Powered by Inteum