Search Results - technology+classifications+%3e+others+%3e+security

18 Results Sort By:
Biometric Recognition System for Secure and Private Internet of Things Usage
‘BLOcKeR’ Uses Hardware Obfuscation to Restrict Access and Operation of Critical Device Hardware Without Biometric Verification This biometric recognition system secures Internet of Things (IoT) devices, safeguarding user’s sensitive biometric data against common attacks. Shortly, billions of devices will be electronically connected...
Published: 3/31/2025   |   Inventor(s): Domenic Forte, Damon Woodard, Fatemeh Ganji, Sumaiya Shomaji
Keywords(s):  
Category(s): Technology Classifications > Engineering > Electrical, Technology Classifications > Others > Security
Unsupervised Segmentation of Scanning Electron Microscope Images for Reverse Engineering of Integrated Circuits
Classifies low-resolution images of integrated circuits to achieve compatibility with faster, cheaper imaging This image-processing algorithm produces robust segmented images from low-resolution scanning electron microscope images of integrated circuits without a reference ground-truth image. Arriving at images of integrated circuits that are segmented,...
Published: 3/28/2025   |   Inventor(s): Damon Woodard, Domenic Forte, Navid Asadi-Zanjani, Ronald Wilson
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Engineering > Electrical, Technology Classifications > Others > Security
Dynamic Obfuscation Technique for Firmware Protection of Internet-Embedded Systems
Enhances the Security of Internet-of-Things Devices Against Firmware Attacks This obfuscation technique enhances the firmware security of internet-embedded systems in security-critical applications. The number of embedded systems is increasing exponentially globally with the advent of technology and the ever-growing demands for automation. However,...
Published: 5/1/2023   |   Inventor(s): Mark Tehranipoor, Farimah Farahmandi, Fahim Rahman, Muhammad Monir Hossain
Keywords(s):  
Category(s): Technology Classifications > Engineering > Electrical, Technology Classifications, Technology Classifications > Others > Security
Malicious Hardware Detection System to Prevent Information Leakage and System Malfunction
Significantly Improves Detection of Hardware Trojans and Reduces Test Time This malicious hardware detection system identifies hardware Trojans present in system-on-chips that can lead to undesired information leakage and system malfunction. System-on-chips are critical components of nearly all modern electrical systems, and the system-on-chip market...
Published: 6/27/2022   |   Inventor(s): Prabhat Mishra, Jennifer Sheldon, Zhixin Pan
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
Credit Card-Sized Device That Tests for Skimmers in Card Readers
Quickly and Accurately Detects if Card Payment Readers Are Safe to Use Inserting this device into a card reader before you insert your credit card can alert you to the presence of credit card skimmers so you won’t be scammed. Skimmers (and shimmers) are malicious card readers attached to the interior or exterior of the real payment terminal...
Published: 2/21/2022   |   Inventor(s): Patrick Traynor, Christian Peeters, Walter Scaife
Keywords(s):  
Category(s): Technology Classifications > Engineering > Electrical, Technology Classifications > Others > Security
Physical Unclonable Function in FPGAs That Serves as Security Key
Produces Unique Signatures to Serve as a Digital Fingerprint Using Existing Architecture at Little Cost This physical unclonable function (PUF) based authentication and key generation mechanism utilizes the existing reconfigurable logic elements of an FPGA (Field-Programmable Gate Array) to enhance a device's security. An FPGA facilitates reconfiguring...
Published: 6/8/2023   |   Inventor(s): Swarup Bhunia, Christopher Vega, Shubhra Deb Paul
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Engineering > Electrical, Technology Classifications > Others > Security
Integrated Circuit Camouflaging to Protect Intellectual Property
Covert Gates Based on Doping and Dummy Contacts This cell camouflaging design leverages doping and dummy contacts to create camouflaged cells indistinguishable from regular standard cells to provide greater protection of integrated circuits in cyber-attacks. Available methods of integrated circuit camouflaging based on standard cells assuming Boolean...
Published: 12/1/2021   |   Inventor(s): Domenic Forte, Mark Tehranipoor, Haoting Shen, Bicky Shakya
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
Smart Transaction Sharding to Increase Efficiency of Blockchain Systems
Optimizes Transaction Placement into Shards to Create More Scalable Blockchains This blockchain technology intelligently groups related transactions into the same shards to minimize cross-shard transactions and increase blockchain performance. The blockchain technology market was valued at $3.4 billion in 2020 and should reach $72 billion by 2027....
Published: 1/3/2023   |   Inventor(s): My Thai, Lan Nguyen, Truc Nguyen, Thang Dinh
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
Smart Films with Photonic Crystal Micropatterns to Prevent Counterfeiting
Programs Hidden Micropatterns into Nanostructured Shape Memory Polymer Films for Computer Science and Anti-Counterfeiting Applications This process creates micropatterns in the nanostructure of smart polymers, forming films that help secure against counterfeiting. Over the past decade there has been a global increase in fraud and sale of counterfeit...
Published: 6/27/2021   |   Inventor(s): Peng Jiang, Calen Leverant, Yifan Zhang
Keywords(s):  
Category(s): Technology Classifications > Engineering > Materials, Technology Classifications > Others > Security
Obscuring High-Frequency Iris Features to Improve Security of Eye Tracking Devices
Security Implementation Protects Users from Secure Authentication Breaches by Hackers This eye scan security feature removes iris signatures from the digital images used in eye-tracking devices. Eye-tracking functionality will enable many features in the next generation of automobiles, educational hardware, and more. Mixed and virtual reality headsets...
Published: 9/2/2021   |   Inventor(s): Eakta Jain, Sanjeev Koppal, Brendan David-John
Keywords(s):  
Category(s): Technology Classifications > Engineering > Computer Science, Technology Classifications > Others > Security
1 2