Search Results - technology+classifications+%3e+wireless+technologies

5 Results Sort By:
ODD: Protecting Sensitive Data in Mobile Devices by Out-of-order Data Division
A novel, multi-layer distributed data security scheme that provides a triple layer of out-of-order divide and store protection of data Background: Technologists are looking to achieve a balance between making data difficult to be illegally or maliciously compromised while providing legitimate data users and owners sufficient encryption protection...
Published: 8/3/2021   |   Inventor(s): Yu Chen
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
Hardware Mechanism for Authenticating Program Execution at Run-Time in a Microprocessor
A mechanism for validating the legal execution path and instructions that works in parallel with normal program execution and imposes a small performance penalty Background: The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed...
Published: 12/29/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures
A simple hardware mechanism to validate the execution of a program continuously for fast validation of the program as it executes. Background: A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host...
Published: 4/10/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
System and Method for Validating Program Execution at Run-Time
A technology that enables the detection of tampering of a program as the program executes for security applications. Background: Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues...
Published: 7/22/2024   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
Authentication of Remotely Executed Program
A mechanism for authenticating remote executions on a server in a distributed environment, validating what is executed at the server on behalf of the client Background: As distributed systems become pervasive, security mechanisms have to be geared up to meet the increasing threats against such systems. For grid computing and other systems to...
Published: 7/27/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
© 2024. All Rights Reserved. Powered by Inteum