Multi-user permission strategy to access sensitive information, AKA Shared Trust | The major reason of sensitive and intellectual property data breach is malicious insiders who had the access rights, knowledge of data values and technical know- how of escalating their privileges in launching such insider attacks. Traditional access control policies were framed according to the trust on legitimate users’ access rights (read, write and execute) based on their jobs and role hierarchy in an organization. However, misuse of such privileges is increasing day by day. This innovative work introduces a multi- user permission strategy by considering role based organizational structure. According to sensitivity of the classified file access being requested by a user, approvers are selected dynamically satisfying certain conditions. | 10671747 |
Efficient Forwarding Information Base Caching Systems and Methods | The invention could result in a new hardware implementation for Network Processor Unit and being used by Internet Service Providers to save operational costs | 10091105 |
Devices and Methods For Forwarding Information Base Aggregation | This inventions provides an oppurtunity for network operators and router vendors to reduce both their operational and hardware costs of upgrading expensive line-card memory after appying our FIB aggregation algorithims on thir routers. | 9491087 |
Memory Devices, Methods of Storing and Reading Data, SMM Junctions, and Methods of Preparing Alumina Substrates | The various aspects of the invention provide memory devices, methods of storing and reading data, and silver/molecular-layer/metal (SMM) junctions. | 9183927 |
Methods of Evaluating Semantic Differences, Methods of Identifying Related Sets of Items in Semantic Spaces, and Systems and Computer Program Products For Implementing the Same | This process provides a method for evaluating semantic spaces within a unified theoretical framework. | 9158841 |
"Eclipse ligature" for single reed musical instruments | The enhanced design of the ligature provides improvements in tone, control, articulation and richness in the core of sound produced by the instrument. | 7923618 |
Adaptive Multi-Factor Authentication System and Multi-User Permission Strategy to Access Sensitive Information | Systems and related methods for providing greater security and control over access to protected or classified resources, files and documents and other forms of sensitive information based upon an initial adaptive selection of multiple modalities for authentication in different operating environments, with subsequent multi-user permission strategy centering on organizational structure. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit. Upon authentication of an access request, based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature. | 11038896 |
Fully Reconfigurable Modular Body-Worn Sensors | This invention is a sensor level modular and fully reconfigurable EEG system along with other body-worn sensors that will allow Lego-like connectivity of multi-modal sensors on the body. this is achieved by elimination of the DRL circuit from the traditional EEG (and ECG) circuit design with a new analog front end design that is independent for each channel. Consequentially, a system is envisioned where the number of EEG channel (sensor nodes) can be one or many, independent of the design, and can be customized at the time of deployment in a Lego-Like fashion. Subsequently, such system can incorporate any type of body worn sensors with the network. Additionally, the sensors can be equipped to perform some computation on the local sensor data that will enable distributed intelligence. The outcomes will enhance capabilities of neurological and physiological data collection at natural environments | 10973430 |