Waruna
Waruna Kulatilaka, Beavercreek, OH US
Patent application number | Description | Published |
---|---|---|
20130270458 | All Fiber Coupled Ultraviolet Planar Laser Induced Fluorescence Detection System - A high energy UV fiber-coupled laser-induced fluorescence system is provided having a transmission component and a receiving component. The transmission component includes a laser source configured to produce high-energy UV pulses, a UV-enhanced fused-silica fiber coupled to the laser source, and optics coupled to the UV-enhanced fused-silica fiber for transmitting the high-energy UV pulses to a target area. The receiving component receives laser-induced florescence events from the target area and includes additional UV-enhanced fused-silica fiber coupled to optics and a receiving means. | 10-17-2013 |
Waruna Manchanayake, Newington AU
Patent application number | Description | Published |
---|---|---|
20130133079 | Systems and Methods for Data Protection - A data protection method includes identifying data indicative of a software element parameter of a software element to be protected, which may be a hash of the software element image or carrier medium image area. The method includes identifying data indicative of a medium parameter of a medium authorized to carry the software element, which may be a unique identifier embedded in a non-image area of the medium. A validation token is defined based on a predefined protocol and written to a non-image area of the medium, which token is a function of the software element parameter and medium parameter. A device for executing the software element uses the same predefined protocol to verify the token prior to allowing execution of the software element. If the software element is copied to another medium, the token is not verifiable for the copied software, thereby restricting execution of the copied software element. | 05-23-2013 |
Waruna Manchanayake, Sydney AU
Patent application number | Description | Published |
---|---|---|
20150235515 | Systems And Methods For Data Protection - A data protection method includes identifying data indicative of a software element parameter of a software element to be protected, which may be a hash of the software element image or carrier media image area. The method includes identifying data indicative of a medium parameter of a medium authorized to carry the software element, which may be a unique identifier embedded in a non-image area of the medium. A validation token is defined based on a predefined protocol and written to a non-image area of the medium, which token is a function of the software element parameter and medium parameter. A device for executing the software element uses the same predefined protocol to verify the token prior to allowing execution of the software element. If the software element is copied to another medium, the validation token is not verifiable for the copied software, thereby restricting execution of the copied software element. | 08-20-2015 |