Time Varying Metamaterial-Enabled Directional Modulation Schemes for Physical Layer Security in Wireless Communication Links
Simulated bit-error-rate (BER) for the decoding performance of a receiver corresponding to a proposed transmission scheme.
Invention Summary:
With continuing advancements in wireless communication systems and emerging applications of Internet-of-Things (IoT) devices, there is an urgent need to develop physical-layer (PHY) focused...
Published: 10/21/2024
|
Inventor(s): Waheed Bajwa, Narayan Mandayam, Chung-Tse Wu, Shaghayegh Vosoughitabar, Alireza Nooraiepour
Keywords(s): Cybersecurity, Networks, Wireless
Category(s): Technology Classifications > Telecommunications & Networking, Technology Classifications > Physical Sciences & Engineering, Technology Classifications > Electronics/Semiconductor
|
Finger-input Touch Authentication using Physical Vibration (VibWrite)
Invention Summary:
Researchers at Rutgers University have created an innovative authentication system named VibWrite. The system places an inexpensive vibration motor and receiver on a solid surface, such as wood, metal, plastic, glass (e.g., a door panel, a desk or an appliance). The motor sends vibrations to the receiver. When a user touches the...
Published: 5/15/2024
|
Inventor(s): Yingying Chen, Jian Liu, Chen Wang, Nitesh Saxena
Keywords(s): Cybersecurity, Electronics, Sensors & Probes
Category(s): Technology Classifications > Software & Copyright, Technology Classifications > Sensors, Technology Classifications > Physical Sciences & Engineering, Technology Classifications > Telecommunications & Networking
|
A Method and System for Dynamically Optimizing the Security of Persons Gathered in Bounded Spaces
Invention Summary:
This technology provides for a modified security system that optimizes security for people gathered in a bounded or enclosed spaces. By implementing a sophisticated algorithm, the technology ensures that large numbers of persons entering a venue have been screened to an acceptable standard, while minimizing inconvenience to those...
Published: 5/1/2024
|
Inventor(s): Paul Kantor, Dennis Egan, Vladimir Menkov
Keywords(s): Cybersecurity
Category(s): Technology Classifications > Software & Copyright, Technology Classifications > Software & Algorithms
|
Scalable, Secure, and Broad-Spectrum Mechanism for Enforcement of Protocols
Agents Interacting based on Protocols
Invention Summary:
There is a growing realization in the commercial world that trust among members of a multi-agent systems operating electronically over the Internet is needed. Trust can be accomplished by enforcing (governing) electronically, a contract, policy, or another type of protocol to govern transactions...
Published: 5/15/2024
|
Inventor(s): Naftaly Minsky, David Zimmerman, Chen Cong
Keywords(s): Cybersecurity, Networks
Category(s): Technology Classifications > Software & Copyright, Technology Classifications > Software & Algorithms, Technology Classifications > Telecommunications & Networking
|
Value-based Information Flow Tracking for Mobile, Wearable, and IOT Sensor Devices
Invention Summary:
Mobile devices have a variety of sensors that enable a wide range of useful applications from step tracking to point of care medical services. In addition, sensors are now in automobiles, IoT and other devices. As the use of devices with sensors increase, it becomes important that information from theses sensors does not leak to...
Published: 5/15/2024
|
Inventor(s): Saman Aliari Zonouz, Gabriel Salles-Loustau, Mani Srivastava, Moustafa Alzantot
Keywords(s): Cybersecurity
Category(s): Technology Classifications > Software & Copyright, Technology Classifications > Software & Algorithms
|
FileWall: Controlling Access to Network File Systems
Summary:
Filewall describes a system architecture for extending and enhancing file system functionality in a network, without modifying the underlying file system clients and servers. FileWall is meant to interpose on a network path between file system clients and servers. It operates by using file systems extensions that transform messages as they...
Published: 3/20/2024
|
Inventor(s): Liviu Iftode, Stephen Smaldone
Keywords(s): Cybersecurity
Category(s): Technology Classifications > Software & Copyright, Technology Classifications > Software & Algorithms, Technology Classifications > Telecommunications & Networking
|