Abstract:
Systems and methods for providing variable access authentication respond to the need of a hierarchical level of security, which may include the use of multiple physically unclonable functions (PUFs) and/or the distribution of a set of authentication keys with “don't care” states. Each of the multiple PUFs can drive a separate level of access control, while “don't care” states can be included in the authentication keys when the security risk levels are lower. These two methods can be implemented independently, or in a combination for higher levels of security. At one end of the embodiment the IT manager can have backdoor capabilities if a user forgot a password, on the other end access control to an Internet device needs to be extremely stringent when the user operates in unsafe territory.
Abstract:
The present invention provides a method for authenticating distributed peripherals on a computer network using an array of physically unclonable functions (PUF). As each PUF is unique, each PUF is able to generate a plurality of challenge response pairs that are unique to that PUF. The integrated circuits of the PUF comprise a plurality of cells, where a parameter (such as a voltage) of each cell may be measured (possibly averaged over many readings). The plurality of cells in the PUF may be arranged in a one, two or more dimensional matrix. A protocol based on an addressable PUF generator (APG) allows the protection of a network having distributed peripherals such as Internet of things (IoT), smart phones, lap top and desk top computers, or ID cards. This protection does not require the storage of a database of passwords, or secret keys. and thereby is immune to traditional database hacking attacks.
Abstract:
The present invention comprises methods of treating an infection using a pharmaceutical composition comprising an active ingredient selected from Table 1. In some aspects, the infection can be caused by one or more pathogens, including fungal pathogens. For example, the infection may b
Abstract:
The present invention provides a method of detecting one or more Klebsiella species within a sample from a subject, the method comprising: subjecting DNA and/or RNA from the sample to a PCR amplification reaction using primer pairs targeting species-specific canonical single nucleotide polymorphisms (canSNPs); and analyzing amplification products resulting from the PCR amplification reaction to detect the one or more Klebsiella species. The present invention also provides a kit for detection of one or more Klebsiella species, Klebsiella clonal groups, AMR genes, and/or virulence genes, the kit comprising primer pairs targeting species-specific canSNPs, K. pneumoniae genes M1 and M2, clonal group-specific canSNPs, AMR genes, and/or virulence genes.
Abstract:
A composition of a capacitor and a method to form same are disclosed. The capacitor comprises a first electrode, a second electrode, and at least one cellular material disposed between said first electrode and said second electrode. Further, the capacitor is at least partially impregnated with one or more liquid prepolymers comprising an electrolyte material, which is cured to form a polymeric matrix.
Abstract:
The present invention provides a method for authenticating distributed peripherals on a computer network using an array of physically unclonable functions (PUF). As each PUF is unique, each PUF is able to generate a plurality of challenge response pairs that are unique to that PUF. The integrated circuits of the PUF comprise a plurality of cells, where a parameter (such as a voltage) of each cell may be measured (possibly averaged over many readings). The plurality of cells in the PUF may be arranged in a one, two or more dimensional matrix. A protocol based on an addressable PUF generator (APG) allows the protection of a network having distributed peripherals such as Internet of things (IoT), smart phones, lap top and desk top computers, or ID cards. This protection does not require the storage of a database of passwords, or secret keys, and thereby is immune to traditional database hacking attacks.
Abstract:
Embodiments of the invention provide a method of genotyping a C. gattii sample, which can include forming a plurality of mixtures for nucleic amplification. The method can include amplification of specific sequences within the C. gattii genome that can provide definitive genotype information to distinguish between one or more types or subtypes of C. gattii.
Abstract:
An authentication system for a computing environment uses physically unclonable functions (PUFs) to authenticate requests to perform an action in the environment. The system receives, from an imaging device, an image of a physically unclonable object associated with the electronic request. The system then obtains from a computer server operating within the system via an encrypted communication channel, a challenge associated with the object. The system uses extraction parameters encoded within the challenge to transform a portion of the image and produce authentication data representing a response to the challenge. The system extracts, using the extraction parameters, the authentication data from the image and determines whether the challenge and response match and the request is authenticated.
Abstract:
Some embodiments of the invention include a method of preparing a sample for sequencing that includes receiving a sample and amplifying at least one marker within the sample. In some embodiments, amplification of the first marker may include mixing the sample with a first oligonucleotide that comprises a first universal tail sequence and a second oligonucleotide that comprises a second universal tail sequence. In some aspects of the invention, the first universal tail sequence and the second universal tail sequence are different sequences.
Abstract:
Methods for the storage and retrieval of a digital file are disclosed. The file is encrypted with a random binary key. A mathematical CRP mechanism is used to generate an ordered list of responses from a list of challenges. A subset of responses within the ordered list of responses is selected, which each selected response occupying a position in the ordered list that is the same position as a first binary symbol in the random key. In this way, the key can be encoded in the selection of responses. To recover the key, the selected responses are compared to a full list of responses to determine which of the responses in the full list match selected responses. Matches indicate the first binary symbol in the corresponding position in the key and non-matches indicate the second binary symbol. In this way, the key is reconstructed, and file may be decrypted.