KUITY CORP. Patent applications |
Patent application number | Title | Published |
20120150581 | AUTOMATED ANALYSIS AND MECHANIZATION OF SCHEDULING - Systems and methods for cross-domain calendaring are described. A plurality of invitees is identified in response to an event scheduling request and scheduling information for each invitee is obtained. The scheduling information includes information obtained from at least two different types of calendaring system and comprises information regarding other events associated with each invitee. A priority is set for each invitee based on the scheduling information and the event scheduling request. | 06-14-2012 |
20110167496 | ENHANCED HARDWARE COMMAND FILTER MATRIX INTEGRATED CIRCUIT - A semiconductor integrated circuit includes a hardware mechanism arranged to ensure that associations between instructions and data are enforced so that a processor cannot execute an instruction that is not authorized. A Command Filter Matrix stores entries comprising instructions and associated data memory ranges. A hardware arrangement denies command execution if the CPU attempts to make a data fetch from an instruction that is outside the range associated with data in the Command Filter Matrix. The Command Filter Matrix may be implemented in a Field Programmable Gate Array such that the memory cell content is pre-programmed with entrusted code by a separate trusted hardware source. In this way, an operating system may function normally but only execute trusted instructions, commands and memory operations. The Command Filter Matrix also contains external write-only capability to enable external monitoring of performance. | 07-07-2011 |
20110010773 | HARDWARE COMMAND FILTER MATRIX INTEGRATED CIRCUIT WITH RESTRICED COMMAND ENFORCEMENT CAPABILITY - A semiconductor integrated circuit includes a hardware mechanism arranged to ensure that associations between instructions and data are enforced so that a processor cannot execute an instruction that is not authorized. A Command Filter Matrix stores entries comprising instructions and associated data memory ranges. A hardware arrangement denies command execution if the CPU attempts to make a data fetch from an instruction that is outside the range associated with data in the Command Filter Matrix. The Command Filter Matrix may be implemented in a Field Programmable Gate Array such that the memory cell content is pre-programmed with entrusted code by a separate trusted hardware source. In this way, an operating system may function normally but only execute trusted instructions, commands and memory operations. The Command Filter Matrix also contains external write-only capability to enable external monitoring of performance. | 01-13-2011 |
20100251376 | METHODOLOGIES, TOOLS AND PROCESSES FOR THE ANALYSIS OF INFORMATION ASSURANCE THREATS WITHIN MATERIAL SOURCING AND PROCUREMENT - Enterprise resource planning systems and methods are described. Point sources for at-risk components and technologies in an enterprise are assembled, identified and localized by identifying factors such as geo-political affiliation of parties including employers, employees, organizations, education levels of the parties, capability and abilities to create or modify malware, and the financial level of the per-capita population model-based threat rankings. Threats to a pipeline are determined, ranked, and a targeted risk mitigation prioritization plan against identified high-level threats is created. | 09-30-2010 |