Search Results - hardware+based+security

4 Results Sort By:
Extensible Body Sensor Network Platform For Wearable And Implantable Devices
­­Competitive Advantages Dynamic microcontroller role reconfiguration ensures the sensor network maintains functionality even if a controller is lost. Platform-independent, browser-based front-end simplifies developer interaction and real-time multimodal data visualization. Conserves platform power consumption with dynamic...
Published: 10/3/2023   |   Inventor(s): Robert Karam, Myles Keller
Keywords(s): Digital Healthcare, Hardware Based Security, Sensor, Wearable Monitoring Equipment
Category(s): Technology Classifications > Computer Science > C/S Sensors, Technology Classifications > Computer Science > Hardware, Technology Classifications > Energy & Environment > E/E Sensors, Technology Classifications > Electronics > Electronics Sensors, Technology Classifications > Engineering > Sensors, Technology Classifications > Medical > Medical Devices, Technology Classifications > Medical > Medical Sensors
Deploying Neural-Trojan-Resistant Convolutional Neural Networks for Self-Driving Vehicles
­Competitive Advantages This method can amplify Trojan’s malicious impact by making it more easily detectable so that system can provide rapid response and mitigation against the attacks This technology can prevent the spread of the attack to other connected systems and defend against attacks initiated through fake update requests The...
Published: 2/6/2024   |   Inventor(s): Robert Karam, Brooks Olney
Keywords(s): Autonomous Vehicle, Cryptography and Intrusion Detection, Cybersecurity, Hardware Based Security, Machine Learning
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Autonomous Vehicle, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
Competitive Advantages • Add-on to existing obfuscation approaches • Avoids frequently executed paths to prevent costly transformations • Locks out the design to increase difficulty of reverse engineering Summary Our inventors have developed the DLockout technique that provides an add-on to existing hardware IP obfuscation...
Published: 7/17/2023   |   Inventor(s): Srinivas Katkoori, Sheikh Ariful Islam
Keywords(s): Hardware Based Security, Industrial Applications, Mechanical and Structural Engineering
Category(s): Technology Classifications > Computer Science, Technology Classifications > Computer Science > C/S Cybersecurity
System And Method for Online Anomaly Detection In Surveillance Video
Competitive Advantages Faster processing times Higher accuracy than current technologies Simple implementation into current technology Summary We have developed an algorithm to detect anomalies in online surveillance video quickly and accurately. This technology incorporates two modules, the first of which is a novel feature extraction...
Published: 7/11/2023   |   Inventor(s): Keval Doshi, Mahsa Mozaffari, Yasin Yilmaz
Keywords(s): Computers Software and Information Technology, Forensic Applications, Hardware Based Security, Image Tracking
Category(s): Technology Classifications > Software > Multimedia, Technology Classifications > Software