Patent application number | Description | Published |
20140020049 | SYSTEM AND METHOD FOR POLICY DRIVEN PROTECTION OF REMOTE COMPUTING ENVIRONMENTS - A system that incorporates teachings of the subject disclosure may include, for example, receiving multiple software agents and configuring a network of the multiple software agents according to a predetermined policy. The process can further include facilitating secure communications among software agents of the network of the multiple software agents according to the predetermined policy. A state of one of the system, a system environment within which the system operates, or a combination thereof can be determined, based on the secure communications among the software agents of the network of the multiple software agents. A computing environment can be facilitated conditionally on the state of the one of the system, the system environment, or the combination thereof, according to the predetermined policy to support a mission application. Other embodiments are disclosed. | 01-16-2014 |
20140157392 | SYSTEM AND METHOD FOR USING A SEPARATE DEVICE TO FACILITATE AUTHENTICATION - A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes determining that the first device is authorized to access the information content according to authorization credentials, and determining a token associated with the request in response to determining that the first device is authorized to access the information content. The token is forwarded to the first device, and it is confirmed that the token was received at the first device. Access to the information content of the second device is authorized in response to confirming that the token was received at the first device. Other embodiments are disclosed. | 06-05-2014 |
Patent application number | Description | Published |
20090173145 | APPARATUS AND METHOD FOR DETERMINING ANALYTE CONTENT IN A FLUID - An apparatus and method to determine analytes in a fluid. One aspect of the present invention is for the determination of the oil content of water using UV, near-IR, IR or Raman spectroscopy or radiometry. In certain embodiments, a solid membrane material absorbs analytes from fluid brought into contact with it. The membrane is subsequently placed in a FTIR spectrometer, which spectrometer is enabled to determine the concentration of analytes in fluid by calibration. Certain embodiments can determine the type of hydrocarbon present, and thus can differentiate Total Petroleum Hydrocarbons (TPH) from Total Oil and Grease (TOG), without any separate sample preparation. | 07-09-2009 |
20110162441 | APPARATUS AND METHOD FOR DETERMINING ANALYTE CONTENT IN A FLUID - An apparatus and method to determine analytes in a fluid. One aspect of the present invention is for the determination of the oil content of water using UV, near-IR, IR or Raman spectroscopy or radiometry. In certain embodiments, a solid membrane material absorbs analytes from fluid brought into contact with it. The membrane is subsequently placed in a FTIR spectrometer, which spectrometer is enabled to determine the concentration of analytes in fluid by calibration. Certain embodiments can determine the type of hydrocarbon present, and thus can differentiate Total Petroleum Hydrocarbons (TPH) from Total Oil and Grease (TOG), without any separate sample preparation. | 07-07-2011 |
Patent application number | Description | Published |
20100018964 | CONTAINER WITH INTERIOR ENCLOSURE OF COMPOSITE MATERIAL HAVING EMBEDDED SECURITY ELEMENT - An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel. | 01-28-2010 |
20100295679 | CONTAINER DEFENSE SYSTEM - A method for scanning and securing a container including a plurality of at least partially composite panels defining an interior volume is disclosed. The method includes: storing unique identification information in an identification element within container; sealing the container; monitoring the container for intrusion; without breaching the seal of the container, remotely identifying the container based on the unique identity information without breaching the seal of the container; without breaching the seal of the container; scanning the identified container to determine the presence or absence of a nuclear weapon in the interior volume; and if the scan determines no nuclear weapon is present remotely storing certificate information associated with the identity of the container in a remote monitor unit. | 11-25-2010 |
20110095887 | CONTAINER SECURITY DEVICES, SYSTEMS, AND METHOD - A dosimeter is disclosed for use in container including outer walls defining an interior volume, the dosimeter including: a radon detection element adapted to detect a radon level for the interior volume; a neutron detection element adapted detect a neutron level for the interior volume. The dosimeter is adapted to measure the radon level and neutron level for a period of time, compare the measured radon level to a first threshold, compare the measured neutron level to a second threshold, and determine information indicative of the presence or absence of fissile material within the interior volume based on the comparisons. | 04-28-2011 |
Patent application number | Description | Published |
20080211669 | COMPOSITE WELDABLE PANEL WITH EMBEDDED DEVICES - A panel having a central panel element formed of a composite material, having peripheral edges formed of a weldable material, such as steel. In one form, the panel element is rectangular, and the panel element on two of its opposite edges have a corrugated profile, while the other two of its opposite edges have a linear profile. Multiple panels may be joined together by welding at the peripheral edges, to form a secure container. The composite material of the panel element in some forms, includes intrusion sensors, for example including optical fiber pathways at electrically conductive pathways, as well as processors for effecting data transfer and analyses and secure communications. In some embodiments, the electrically conductive pathways include one or more bypass resistors to produce a different circuit resistance upon interruption of one or more of the pathways. | 09-04-2008 |
20090007233 | System and methods for defending against root - A method is disclosed for securing sensitive material on a computer system comprising a network of computers from unauthorized access by a root level user of the computer system, the method including the steps of: limiting access to the sensitive material to one or more authorized users; controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material. | 01-01-2009 |
20120070002 | PROTECTING INFORMATION IN AN UNTETHERED ASSET - The technology described herein for protecting secure information includes a method. The method includes storing, by a plurality of data store devices, the secure information. Each of the data store devices stores at least one part of the secure information. The method further includes receiving, by at least one of a plurality of embedded sensors, a notification associated with a compromise of at least one part of the secure information. The method further includes destroying one or more parts of the secure information based on the notification. The method further includes processing, by a plurality of intelligent agent modules, one or more parts of the secure information received from one or more of the data store devices if no parts of the one or more parts of the secure information are destroyed. | 03-22-2012 |
20120181270 | INTELLIGENT RECONFIGURABLE CONTAINER SYSTEM AND METHOD - Described herein are devices and techniques for a standard-sized composite freight container, assembled from multiple composite sub-containers, whereby the assembled freight container is compliant with standard-sized freight containers, such as 20-foot and 40-foot ISO compliant single and double TEU containers. Each of the composite sub-containers is assembled from multiple panels, that can include one or more of embedded sensors, data paths, and electrical paths. Composite panels can be assembled together with screws or fasteners or flanges to form an enclosed sub-container. Such sub-containers can be joined together with screws or mechanical fasteners securely to form the standard sized freight container. | 07-19-2012 |
20120227091 | POLYMORPHIC ASSURED NETWORK - Described herein are devices and techniques for implementing a polymorphic network adapted to change network path configurations among a number of pre-determined network path configurations in response to a perceived threat. Such perceived threats can include detection of an unknown process, or simply according to some schedule, or randomly to prevent or otherwise reduce susceptibility to such perceived threats. Multiple (e.g., redundant) network communications paths can be pre-configured between two endpoints. Network communications between the two endpoints can be periodically redirected, for example, in response to a perceived threat or according to one or more rules and/or a schedule to otherwise avoid a perceived threat. A system adapted to permit such pre-configuration of multiple network paths can include an access restrictor in communication with a network configuration controller to prohibit unauthorized pre-configuration of the network paths. | 09-06-2012 |
20120227092 | CONTROLLING USER ACCESS TO ELECTRONIC RESOURCES WITHOUT PASSWORD - Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison. | 09-06-2012 |
20120227117 | SECURE PROCESSING MODULE AND METHOD FOR MAKING THE SAME - Described herein are devices and techniques related to implementation of a trustworthy electronic processing module. During fabrication, a manufacturer is provided with partial technical specifications that intentionally exclude at least one critical design feature. Fabrication of the electronic processing module is monitored from a trusted remote location; wherefrom, the intentionally excluded at least one critical design feature is implemented, thereby completing manufacture of the trustworthy electronic processing module. At least one of the acts of monitoring and implementing can be accomplished by instantiating executable software remotely from a trusted remote location and immediately prior to execution. It is the executable software that enables at least one of the acts of monitoring and implementing. Further, the instantiated executable software is removed or otherwise rendered inoperable immediately subsequent to execution. In some embodiments the critical design feature can be implemented within a configurable element, such as a field programmable gate array (FPGA). | 09-06-2012 |
20140061082 | SECURITY STRUCTURE OF COMPOSITE MATERIAL HAVING EMBEDDED SECURITY ELEMENTS - An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel. | 03-06-2014 |
20140082354 | SYSTEM AND METHOD FOR OBTAINING KEYS TO ACCESS PROTECTED INFORMATION - A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a portion of information necessary for generating the encryption key. Each software agent performs a respective examination, the results of which determine whether the respective portion of information is valid or not. A complete encryption key can be obtained only when all of the contributing portions of information are valid. | 03-20-2014 |
20140157392 | SYSTEM AND METHOD FOR USING A SEPARATE DEVICE TO FACILITATE AUTHENTICATION - A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes determining that the first device is authorized to access the information content according to authorization credentials, and determining a token associated with the request in response to determining that the first device is authorized to access the information content. The token is forwarded to the first device, and it is confirmed that the token was received at the first device. Access to the information content of the second device is authorized in response to confirming that the token was received at the first device. Other embodiments are disclosed. | 06-05-2014 |
Patent application number | Description | Published |
20120135446 | Microfluidic Device and Related Methods - A combinatorial microenvironment generator is configured for the generation of arbitrary, user-defined, steady-state, concentration gradients with negligible to no flow through the growth medium to perturb diffusion gradients or cellular growth. More importantly, the absolute concentrations and/or gradients can be dynamically altered upon request both spatially and temporally to impose tailored concentration fields for in-situ stimulus studies. Here, diffusion occurs via an array of ports, each of which can be an independently controlled source/sink. Together, the array of ports establishes a user-defined, 3D concentration profile. Useful methods related to this device are also provided. | 05-31-2012 |
20150111239 | MICROFLUIDIC DEVICE AND RELATED METHODS - A combinatorial microenvironment generator is configured for the generation of arbitrary, user-defined, steady-state, concentration gradients with negligible to no flow through the growth medium to perturb diffusion gradients or cellular growth. More importantly, the absolute concentrations and/or gradients can be dynamically altered upon request both spatially and temporally to impose tailored concentration fields for in-situ stimulus studies. Here, diffusion occurs via an array of ports, each of which can be an independently controlled source/sink. Together, the array of ports establishes a user-defined, 3D concentration profile. Useful methods related to this device are also provided. | 04-23-2015 |