Search Results - technology+classifications+%3e+software+%26+information+technology+%3e+security

12 Results Sort By:
A Method for Performing Permutation Operations using Phi-Bits (Acoustic Analogues of Qubits)
This invention consists of methods for obtaining all possible permutations using logical phi-bits, which are classical analogues of quantum bit (qubits) and are supported by driven acoustic metamaterials. Permutation operations are essential in quantum computing as they enable the manipulation of quantum states through fundamental gates. The method...
Published: 11/25/2024   |   Inventor(s): Pierre Deymier, Keith Runge, Akinsanmi Ige, David Cavalluzzi
Keywords(s):  
Category(s): Technology Classifications > Engineering & Physical Sciences > Communications & Networking, Technology Classifications > Engineering & Physical Sciences > Quantum, Technology Classifications > Software & Information Technology > Security
A Method for Encoding, Encrypting and Decrypting Information using Phi-Bits (Acoustic Analogues of Qubits)
This invention addresses the need for robust data security in the face of emerging quantum computing risks and presents logical phi-bits as a promising solution for encryption in the digital age. This cryptography method uses logical phi-bits, which are classical analogues of quantum bits (qubits) and are supported by driven acoustic metamaterials....
Published: 11/25/2024   |   Inventor(s): Pierre Deymier, Keith Runge, Akinsanmi Ige, David Cavalluzzi, Ivan Djordjevic
Keywords(s):  
Category(s): Technology Classifications > Engineering & Physical Sciences > Quantum, Technology Classifications > Software & Information Technology > Security, Technology Classifications > Engineering & Physical Sciences > Communications & Networking
SPINE (Shared Processing Infrastructure for NLP Ecosystems)
Shared Processing Infrastructure for NLP Ecosystems (SPINE) is an innovative software platform designed to optimize the deployment of large language models (LLMs) within enterprise environments. The platform leverages existing hardware resources within the organization to help businesses adopt a large language model to their workflows while protecting...
Published: 11/4/2024   |   Inventor(s): Michael Galde
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Databases & Data Mining
Adaptive Network Intelligence Agent with Dynamic Host Reassignment
The Adaptive Network Intelligence Agent with Dynamic Host Reassignment (DaRIA) is a cutting-edge cybersecurity tool designed to enhance intelligence collection capabilities across multiple platforms. This innovative system allows law enforcement and federal agencies to efficiently gather system-level intelligence on computer-based targets in real time....
Published: 11/4/2024   |   Inventor(s): Michael Galde
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Web & Internet, Technology Classifications > Software & Information Technology > Databases & Data Mining
GRID-LM: an AI-Powered Distributed Model for Infrastructure Threat Detection and Response
GRID-LM is an advanced, AI-powered distributed model designed for Operational Technology (OT) network security monitoring, infrastructure threat detection, and response. By leveraging machine learning, GRID-LM can detect deviations from established baselines, helping organizations identify and respond to potential threats before they impact operations....
Published: 11/4/2024   |   Inventor(s): Michael Galde
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Web & Internet, Technology Classifications > Software & Information Technology > Human Machine Interface
Advanced Occupational Knowledge-Based Authentication for Enhanced Digital Security
This technology is an advanced cybersecurity tool called Occupational Knowledge-Based Authentication (Occu-KBA). It enhances traditional identity verification methods by using occupation-specific questions. For instance, a doctor might be asked about medical terminology, while an accountant could face questions about financial regulations. By leveraging...
Published: 8/20/2024   |   Inventor(s): Joseph Valacich, Paul Weisgarber, Jeffrey Jenkins, David Wilson
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security
Situational Environment for Programming & Scripting (SEPS)
Situational Environment for Programming & Scripting (SEPS) is a hybrid cloud-based programming & scripting platform designed to deliver a world class learning experience for students developing critical capabilities needed to support our cyber security, cyber operations, incident response, and digital investigations infrastructure. SEPS will...
Published: 11/1/2023   |   Inventor(s): Chester Hosmer, Michael Duren
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Communications & Networking, Technology Classifications > Software & Information Technology > Education & Training, Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology
Systems and Methods for Identity Authentication using the Keystroke Dynamics of a Single Interaction Session
This technology is a method of detecting an online impostor using keystroke dynamics without requiring prior collection of behavioral data from the true user. Background: Keystroke dynamics is an area of behavioral biometrics that attempts to identify or authenticate a user by collecting data about how a user types, such as the length of time between...
Published: 4/3/2023   |   Inventor(s): Joseph Valacich, Jeffrey Jenkins
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Web & Internet
Road to War Web Application
This invention is software designed for the US Army to effectively train Non-Commissioned Officers (NCOs) in-person or remotely in a variety of situations. The application leverages an AI-based reactive unit structure and operational environment to teach leadership skills on a virtual unit comprised of reactive virtual soldier bots. Background: The...
Published: 4/3/2023   |   Inventor(s): Jason Denno
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology
Domain Transferable Neural Network Architecture for Fact Verification
The problem this invention solves is that of spurious patterns or invalid results from software neural networks tasked to use natural language programming for fact verification in news or articles. This approach increases the accuracy of fact verification. Neural architectures with improved transfer between domains enables re-use of trained models,...
Published: 2/7/2024   |   Inventor(s): Mithun Paul, Mihai Surdeanu, Sandeep Suntwal, Rebecca Sharp
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Web & Internet, Technology Classifications > Software & Information Technology > Databases & Data Mining
1 2