Patent application number | Description | Published |
20080211669 | COMPOSITE WELDABLE PANEL WITH EMBEDDED DEVICES - A panel having a central panel element formed of a composite material, having peripheral edges formed of a weldable material, such as steel. In one form, the panel element is rectangular, and the panel element on two of its opposite edges have a corrugated profile, while the other two of its opposite edges have a linear profile. Multiple panels may be joined together by welding at the peripheral edges, to form a secure container. The composite material of the panel element in some forms, includes intrusion sensors, for example including optical fiber pathways at electrically conductive pathways, as well as processors for effecting data transfer and analyses and secure communications. In some embodiments, the electrically conductive pathways include one or more bypass resistors to produce a different circuit resistance upon interruption of one or more of the pathways. | 09-04-2008 |
20090007233 | System and methods for defending against root - A method is disclosed for securing sensitive material on a computer system comprising a network of computers from unauthorized access by a root level user of the computer system, the method including the steps of: limiting access to the sensitive material to one or more authorized users; controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material. | 01-01-2009 |
20120070002 | PROTECTING INFORMATION IN AN UNTETHERED ASSET - The technology described herein for protecting secure information includes a method. The method includes storing, by a plurality of data store devices, the secure information. Each of the data store devices stores at least one part of the secure information. The method further includes receiving, by at least one of a plurality of embedded sensors, a notification associated with a compromise of at least one part of the secure information. The method further includes destroying one or more parts of the secure information based on the notification. The method further includes processing, by a plurality of intelligent agent modules, one or more parts of the secure information received from one or more of the data store devices if no parts of the one or more parts of the secure information are destroyed. | 03-22-2012 |
20120181270 | INTELLIGENT RECONFIGURABLE CONTAINER SYSTEM AND METHOD - Described herein are devices and techniques for a standard-sized composite freight container, assembled from multiple composite sub-containers, whereby the assembled freight container is compliant with standard-sized freight containers, such as 20-foot and 40-foot ISO compliant single and double TEU containers. Each of the composite sub-containers is assembled from multiple panels, that can include one or more of embedded sensors, data paths, and electrical paths. Composite panels can be assembled together with screws or fasteners or flanges to form an enclosed sub-container. Such sub-containers can be joined together with screws or mechanical fasteners securely to form the standard sized freight container. | 07-19-2012 |
20120227091 | POLYMORPHIC ASSURED NETWORK - Described herein are devices and techniques for implementing a polymorphic network adapted to change network path configurations among a number of pre-determined network path configurations in response to a perceived threat. Such perceived threats can include detection of an unknown process, or simply according to some schedule, or randomly to prevent or otherwise reduce susceptibility to such perceived threats. Multiple (e.g., redundant) network communications paths can be pre-configured between two endpoints. Network communications between the two endpoints can be periodically redirected, for example, in response to a perceived threat or according to one or more rules and/or a schedule to otherwise avoid a perceived threat. A system adapted to permit such pre-configuration of multiple network paths can include an access restrictor in communication with a network configuration controller to prohibit unauthorized pre-configuration of the network paths. | 09-06-2012 |
20120227092 | CONTROLLING USER ACCESS TO ELECTRONIC RESOURCES WITHOUT PASSWORD - Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison. | 09-06-2012 |
20120227117 | SECURE PROCESSING MODULE AND METHOD FOR MAKING THE SAME - Described herein are devices and techniques related to implementation of a trustworthy electronic processing module. During fabrication, a manufacturer is provided with partial technical specifications that intentionally exclude at least one critical design feature. Fabrication of the electronic processing module is monitored from a trusted remote location; wherefrom, the intentionally excluded at least one critical design feature is implemented, thereby completing manufacture of the trustworthy electronic processing module. At least one of the acts of monitoring and implementing can be accomplished by instantiating executable software remotely from a trusted remote location and immediately prior to execution. It is the executable software that enables at least one of the acts of monitoring and implementing. Further, the instantiated executable software is removed or otherwise rendered inoperable immediately subsequent to execution. In some embodiments the critical design feature can be implemented within a configurable element, such as a field programmable gate array (FPGA). | 09-06-2012 |
20140061082 | SECURITY STRUCTURE OF COMPOSITE MATERIAL HAVING EMBEDDED SECURITY ELEMENTS - An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel. | 03-06-2014 |
20140082354 | SYSTEM AND METHOD FOR OBTAINING KEYS TO ACCESS PROTECTED INFORMATION - A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a portion of information necessary for generating the encryption key. Each software agent performs a respective examination, the results of which determine whether the respective portion of information is valid or not. A complete encryption key can be obtained only when all of the contributing portions of information are valid. | 03-20-2014 |
20140157392 | SYSTEM AND METHOD FOR USING A SEPARATE DEVICE TO FACILITATE AUTHENTICATION - A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes determining that the first device is authorized to access the information content according to authorization credentials, and determining a token associated with the request in response to determining that the first device is authorized to access the information content. The token is forwarded to the first device, and it is confirmed that the token was received at the first device. Access to the information content of the second device is authorized in response to confirming that the token was received at the first device. Other embodiments are disclosed. | 06-05-2014 |