Search Results - technology+classifications+%3e+software+%26+information+technology+%3e+security

15 Results Sort By:
CardSync
CardSync is a middleware credential management system designed to work with systems in which one ID card is used to access a wide range of services. Unlike traditional credential management systems in which direct connections must be established between the provider and every downstream system, CardSync requires only a single upstream and downstream...
Published: 5/12/2025   |   Inventor(s): Zach Meyer, Christopher Augustine, Brett Bendickson, Todd Dalton, Ami Buczek, Joseph Harting
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security
Consistent and Compliant Access Control in Microservice Systems
This innovation offers a new way to verify access control policies across microservice systems using constraint modeling. Instead of relying on manual checks or inconsistent logic spread across endpoints, this method introduces a structured and automated approach to ensure secure authorization is applied consistently throughout an entire system. Developers...
Published: 4/23/2025   |   Inventor(s): Tomas Cerny, Amr Elsayed, Connor Wojtak
Keywords(s):  
Category(s): Technology Classifications > Engineering & Physical Sciences > Communications & Networking, Technology Classifications > Software & Information Technology > Security
Architectural Change Impact Analysis in Microservice Ecosystems
This invention is for a software service that mitigates architectural degradation during complex multi-team projects that aim to develop several different microservices in parallel. This new, cloud-native approach involves decentralization with selective scalability leading to enhanced developmental processes and communication structures. Background:...
Published: 4/17/2025   |   Inventor(s): Tomas Cerny
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Communications & Networking, Technology Classifications > Software & Information Technology > Computer-Aided Design & Engineering, Technology Classifications > Software & Information Technology > Databases & Data Mining, Technology Classifications > Software & Information Technology > Security
A Method for Performing Permutation Operations using Phi-Bits (Acoustic Analogues of Qubits)
This invention consists of methods for obtaining all possible permutations using logical phi-bits, which are classical analogues of quantum bit (qubits) and are supported by driven acoustic metamaterials. Permutation operations are essential in quantum computing as they enable the manipulation of quantum states through fundamental gates. The method...
Published: 11/25/2024   |   Inventor(s): Pierre Deymier, Keith Runge, Akinsanmi Ige, David Cavalluzzi
Keywords(s):  
Category(s): Technology Classifications > Engineering & Physical Sciences > Communications & Networking, Technology Classifications > Engineering & Physical Sciences > Quantum, Technology Classifications > Software & Information Technology > Security
A Method for Encoding, Encrypting and Decrypting Information using Phi-Bits (Acoustic Analogues of Qubits)
This invention addresses the need for robust data security in the face of emerging quantum computing risks and presents logical phi-bits as a promising solution for encryption in the digital age. This cryptography method uses logical phi-bits, which are classical analogues of quantum bits (qubits) and are supported by driven acoustic metamaterials....
Published: 11/25/2024   |   Inventor(s): Pierre Deymier, Keith Runge, Akinsanmi Ige, David Cavalluzzi, Ivan Djordjevic
Keywords(s):  
Category(s): Technology Classifications > Engineering & Physical Sciences > Quantum, Technology Classifications > Software & Information Technology > Security, Technology Classifications > Engineering & Physical Sciences > Communications & Networking
SPINE (Shared Processing Infrastructure for NLP Ecosystems)
Shared Processing Infrastructure for NLP Ecosystems (SPINE) is an innovative software platform designed to optimize the deployment of large language models (LLMs) within enterprise environments. The platform leverages existing hardware resources within the organization to help businesses adopt a large language model to their workflows while protecting...
Published: 3/13/2025   |   Inventor(s): Michael Galde
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Databases & Data Mining
Adaptive Network Intelligence Agent with Dynamic Host Reassignment
The Adaptive Network Intelligence Agent with Dynamic Host Reassignment (DaRIA) is a cutting-edge cybersecurity tool designed to enhance intelligence collection capabilities across multiple platforms. This innovative system allows law enforcement and federal agencies to efficiently gather system-level intelligence on computer-based targets in real time....
Published: 3/13/2025   |   Inventor(s): Michael Galde
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Web & Internet, Technology Classifications > Software & Information Technology > Databases & Data Mining
GRID-LM: an AI-Powered Distributed Model for Infrastructure Threat Detection and Response
GRID-LM is an advanced, AI-powered distributed model designed for Operational Technology (OT) network security monitoring, infrastructure threat detection, and response. By leveraging machine learning, GRID-LM can detect deviations from established baselines, helping organizations identify and respond to potential threats before they impact operations....
Published: 3/13/2025   |   Inventor(s): Michael Galde
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Web & Internet, Technology Classifications > Software & Information Technology > Human Machine Interface
Advanced Occupational Knowledge-Based Authentication for Enhanced Digital Security
This technology is an advanced cybersecurity tool called Occupational Knowledge-Based Authentication (Occu-KBA). It enhances traditional identity verification methods by using occupation-specific questions. For instance, a doctor might be asked about medical terminology, while an accountant could face questions about financial regulations. By leveraging...
Published: 8/20/2024   |   Inventor(s): Joseph Valacich, Paul Weisgarber, Jeffrey Jenkins, David Wilson
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security
Situational Environment for Programming & Scripting (SEPS)
Situational Environment for Programming & Scripting (SEPS) is a hybrid cloud-based programming & scripting platform designed to deliver a world class learning experience for students developing critical capabilities needed to support our cyber security, cyber operations, incident response, and digital investigations infrastructure. SEPS will...
Published: 11/1/2023   |   Inventor(s): Chester Hosmer, Michael Duren
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Communications & Networking, Technology Classifications > Software & Information Technology > Education & Training, Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology
1 2